text
stringlengths
2.85k
2.55M
label
class label
11 classes
International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 Integrating Fuzzy and Ant Colony System for Fuzzy Vehicle Routing Problem with Time Windows Sandhya and V.Katiyar Department of Computer Science and Engineering, Maharishi Markandeswar University, Ambala, Haryana,India. Abstract In this paper fuzzy VRPTW with an uncertain travel time is considered. Credibility theory is used to model the problem and specifies a preference index at which it is desired that the travel times to reach the customers fall into their time windows. We propose the integration of fuzzy and ant colony system based evolutionary algorithm to solve the problem while preserving the constraints. Computational results for certain benchmark problems having short and long time horizons are presented to show the effectiveness of the algorithm. Comparison between different preferences indexes have been obtained to help the user in making suitable decisions Keywords: VRPTW, Fuzzy sets, Credibility theory, ant colony system, uncertainty, stochastic simulation. 1.Introduction Transportation is one important component of logistics. Efficient utilization of vehicles directly affects the logistic cost as 40% to 50% money is spent on transportation. Moreover proper utilization of vehicles is also important from environmental view point. The use of automated route planning and scheduling can lead to huge savings in transportation cost ranging from 5% to 20% [25]. So efficient routing of fleets is a crucial issue for companies and this can be formulated as vehicle routing problem.Vehicle Routing Problem was first introduced by Danting and Rameser [26] in 1959. Till now many variants of the problem have been proposed [2]. Vehicle Routing Problem with Time Windows is one flavor of VRP. In VRPTW a least cost route from central depot to all customers is to be designed in such a way that all customers are visited by homogenous vehicles once and only once while preserving the capacity and time window constraints. In this problem it is assumed that the time to travel from one customer to another is equivalent to distance between the customers. Moreover in these types of problems, all parameters are assumed to deterministic. In real life scenarios these assumptions donot hold because of varying road conditions, link failures, rush hours, congestion etc. which lead to uncertainties in data. Most of the algorithms developed for deterministic problems do not work in these situations. In this paper VRPTW with fuzzy travel time is considered. This uncertainty is handled using fuzzy logic. The fuzzy travel time is represented by triangular fuzzy number. DOI:10.5121/ijcsa.2014.4506 73 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 Credibility theory is used to model the problem. Improved Ant Colony System (IACS) [4] is then used to find the most efficient route for the problem. The main goal of this paper is to develop an algorithm that can provide the user with a route having minimum distance with uncertain travel time at a desired preference index. The rest of the paper is organized as follows.Literature review is presented in section 2. Section 3 discusses the essential basics of fuzzy theory. A model based on credibility theory is then proposed in section 4. Section 5 presents improved ACS that is used to solve the model. Results based on experimentations are discussed in section 6. Finally section 7 presents the conclusions and scope for future work. 2.Literature Review VRP is concerned with finding the minimum set of routes, starting and ending at the central depot, for homogenous vehicles to serve number of customers with demands for a goods such that capacity constraint is preserved.Latest taxonomy on VRP can be found in [2]. The VRPTW considers the time window for each customer in which service has to be provided. A vehicle can arrive before the starting time of the window but it cannot arrive after the closing time of window. A taxonomy can be found on [5,6].VRPTW is NP-hard problem. Many exact and metaheuristics algorithms have been proposed for solving VRPTW [7,8,9,10]. A categorized bibliography of metaheuristics and their extensions can be found in [1].But these became infeasible for dynamic problems.In [11] a mixed integer linear programming approach and a nearest neighbor, branch and cut algorithm is used to solve the problem for time dependent VRPTW.However this model does not follow FIFO property.Ichoua et al [12] proposed a tabu search approach to solve TDVRPTW, where customers are characterized by soft time windows. The model presented satisfies the FIFO property.In another approach Donati et al. [13] use multi ant colony and local search improvement approach to update the slack or the feasible time delays. The travel times are analyzed by discretizing the time space thus satisfying the FIFO property. However these models fail when uncertainties arises in various parameters.A detailed summary for various uncertain parameters for VRPTW can be found in [19].Because of lack of data or due to extreme complexity of the problem it requires subjective judgment. Fuzzy set theory provides meaningful methodologies to handle uncertainty, vagueness and ambiguity.In [14] triangular fuzzy numbers are used to represent fuzzy travel time and a route construction method is proposed to solve the problem.A fuzzy optimization model using imperialist competitive algorithm is presented for fuzzy vehicle routing problem with time window in [15].Cao Erbao et al [16] use fuzzy credibility theory to model the vehicle routing problem with fuzzy demand. It uses integration of stochastic simulation and differential evolution algorithms to solve the same model. However it requires a lot of parameters to be taken care of.Yongshuang Zheng and Baodinf Liu [17] present an integration of fuzzy simulation and genetic algorithms to design a hybrid intelligent algorithm for solving fuzzy vehicle routing model. In [18] two new types of credibility programming models including fuzzy chance constraint programming and fuzzy chance-constraint goal programming are presented to model fuzzy VRP with fuzzy travel time. In [3] fuzzy concepts and genetic algorithm are used for the solution multi-objective VRP. Finally J.Brito et al [20] proposes a GRASP meta heuristic to solve the VRPTW in which travel time is uncertain. A chance constraint model is build using credibility approach to solve the problem. However the proposed algorithm appears to be inefficient because in GRASP metaheuristic each restart is independent of the previous one.On the other hand the stochastic element of ACO allows to build 74 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 variety of different solutions.In this paper VRPTW with fuzzy travel time is considered. Credibility theory is used to build a chance constraint programming model for the problem. An improved ant colony [4] metaheuristic is then used to obtain the optimal routes .Moreover using this approach a decision maker can also evaluate different planning scenarios to choose the best alternative with desired confidence level. 3.Fuzzy Credibility Theory In this section, some basic concepts and results about fuzzy measure theory are summarized. The term fuzzy logic was introduced by Lofti A. Zadeh [21]. In contrast to conventional logic, fuzzy logic allows the intermediate values to be defined between conventional evaluations like true or false. Fuzzy numbers are the numbers that possess fuzzy properties. In this paper we have represented the fuzzy travel time between two customers as the triangular fuzzy number. A triangular fuzzy number is represented by triplet TFN=(a, b, c) where b is the mean value (i.e. mode) and  and  the left and right extremes of its spread. Its membership function is  = 0 0     < ≤≤ ≤≤ >  (1) Zadeh [23] proposed the concept of possibility measure for fuzzy variables as a counterpart of probability theory in crisp sets.Concept of the fuzzy set, fuzzy variable, possibility measure, necessity theory are available in [22].Liu [24] proposed the credibility as the average of possibility and necessity. Possibilityof an event is measured by most favorable cases only in contrast to probability of an event where all favorable cases are measured. Let  be nonempty set and P () be the power set. Each element in P is called an event. Also denotes an empty set. In order to present an axiomatic definition of possibility, it is necessary to assign a number Pos{A} to each event A, which indicates the possibility that A will occur [16]. Axiom 3.1: Pos() =1 (Normality Axiom) Axiom 3.2:Pos()=0 (Non negativity Axiom) Axiom 3.3: For each  ⋀  " Pos ⋃" #$  %=⋁#$ '()  (Maximality Axiom) Figure 2.1 shows the possibility of fuzzy event {X< = x0} Pos(X<=x0) x 75 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 Figure 2.1 Possibility of fuzzy event The explicit expression for possibility Pos(X<=x0) is given by: Pos * ≤ +  = , 1  < +  ≤ + ≤   .   0 + <  (2) Necessity for an event A is defined as the impossibility of complement of that event Aci.e Nec{A}=1-Pos {Ac}. Fig 2.2 shows the necessity of fuzzy event {X<=x0} 1 Nec{X<=x0}=1-Pos(X<=x0 ) xo x Figure 2.2 Necessity of fuzzy event The explicit expression for possibility Nec(X<=x0) is given by: Nec * ≤ +  = , 1 .   0  < +  ≤ + ≤   + <  (3) The credibility for event A is Cr{A}=1/2(Pos{A}+Nec{A}).}). The credibility measure signifies the credibility how the solution satisfies the constraints. The explicit expression for credibility in case of triangular fuzzy measure is: Cr  * ≤ +  = 1 . /0 / .  / 0  < +  ≤ + ≤   ≤ + ≤  + <   (4) 4.Chance Constraint Model for Fuzzy VRPTW We define a Fuzzy VRPTW as follows: Given a set of n geographically distributed customers requiring services within a specific time period from set of k homogenous vehicles stationed at a central depot with known demands of customers having uncertain travel time between customers but lying within known ranges with 76 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 most likely values being known then the objective of fuzzy VRPTW is to find the route with minimum distance with specified confidence level that will meet all customers’ time windows requirements assuming that: 1. Each vehicle starts and ends its tour at central depot indexed by 0. 2. Each vehicle has fixed identical capacity. 3. Each customer is to be visited once and only once by only one vehicle. 4. Each customer has a predefined time window in which it has to be served [ei , li]. 5. The demand of the customer is fixed and is assumedthat it will not exceed the vehicle capacity. 6. The travel time between each customer is not fixed and it is assumed to be expressed as triangular fuzzy number 25 34 =(26$ , 26/ , 268 ). Let D[i] be the departure time of vehicle v from customer i, then arrival time A[j]at j will be the summation of departure time from previous customer i and the fuzzy travel time from node i to j. A[j] = D[i] +29 34 (5) The time to begin service will be maximum of arrival time or the opening time. (6) TS[j] =max (A[j], ej) Because of fuzzy travel time, arrival time and time to begin service at next customer will also be fuzzy. However the service time S[i] and opening of the time windows e[i] are crisp numbers that are special case of triangular fuzzy numbers where the three defining numbers are equal. We obtain the credibility that the time to begin service at next customer does not exceed its close time to be 0 Cr(TS[j] ≤lj) = AB CD>6@E /∗CD 6@G CD>6@E AB /∗CD>6@G 0CD>6@K /∗CL>6@K CD>6@G 1 :; <6 < =>?@$ :; <6 ≥ =>?@$ IJ <6 < =>?@/ :; <6 ≥ =>?@/ IJ <6 < =>?@8 :; <6 ≥ =>?@8  (7) As we know that if the travel time to next customer is smaller than its closing time then the chances of serving that customer by that vehicle will grow. That is greater the difference between the closing time and the maximum travel time greater is the chance to serve that customer and if this difference is small that customer may not be served. Therefore, at some preference index Cr*, the solution r verifies the fuzzy constraint of service times within the corresponding time window if: Cr(TS[r] ≤lj).≥ Cr*.The goal is to determine the value of MN ∗ which will result in a route having minimum distance. For this stochastic simulation is done. Thus the objective of corresponding chance constraint model of fuzzy VRPTW using credibility theory is as follows: R R Q Q  = O:I ∑S Q#$ ∑#+ ∑6#+ 6 6 (8) 77 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 subject to: Q ∑RQ#$ ∑R,6#+ 6 =1 Q Q ∑R6#$ +6 =1 and ∑R#$ + =1 (9) Q ∑R6#+ 6 - ∑R#+ 6Q =0 (10) ∑RW#$ ∑R6#+ MN=>N@ (13) ∑R#$ J ≤ TQ Q 5 ∑R#+ ∑R6#+ 6 234 + )6 + V2  ≤ < ≤ <6  > MN ∗ (11) (12) (14) Following indices and notations are considered: • i=0,1,2,…,n are the customer indexes with 0 denoting base station. • k=1,2,…,m are the vehicles. • di is the demand of the customer. • Qk is the capacity of the vehicle. • cij cost of moving from node i to j, expressed in terms of distance from customer i to j. • sij is the service time at customer i. • [ei, li] is the time window of customer i. • tij is the fuzzy travel time between i and j. • wtiis the waiting time at customer i. • TS[i] is the fuzzy time to begin service. Q Q A binary variable 6 is introduced such that 6 =1 if vehicle k travels directly from customer i to customer j and otherwise 0. The objective function (8) seeks to minimize the total traveled distance whereas constraint (9), specifies that every customer is visited by one vehicle and splitting of deliveries are forbidden.Eq (10), states that each tour starts and ends at depot indexed 0. Capacity constraint is preserved in Eq (12) and it ensure that demand of each customer does not exceeds vehicle capacity.Eq. (13), preserves the constraints and ensuring that sum of fuzzy travelling time to the customer, service time and waiting time are less than the closing time of customer’s window. Eq (14), preserves time to begin service for route r is within a specified preference index. 5.Proposed Solution Approach In this section, first, stochastic simulation will be used to calculate the total distance. Then ant colony heuristic is used to obtain the least cost route plan with the best value of dispatcher preference index Cr*. 78 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 a.Stochastic Simulation for additional distance In this paper, as travel time between each customer is uncertain and they are represented as triangular fuzzy numbers, so algorithms for deterministic problems cannot be applied for the fuzzy VRPTW. Moreover real values of the travel time will be known after reaching the customer. However uncertain travel time can be considered deterministic by stochastic simulation. We summarize the algorithm as follows: Step 1: Simulate actual travel time for each customer by following process: Step 1.1: Generate a random number x within the left and right boundaries of a triangular fuzzy travel time between each customer and calculate its membership u(x). Step 1.2: Generate a random number r ∈ 0,1. Step 1.3: Compare r and u(x): if r<u(x), use x as the actual travel time, otherwise generate x and r again and compare them until they satisfy the condition r<u(x). Step 2: Calculate total distance by moving along the planned route. Step 3: Repeat step 1 and 2 N times and calculate the average total distance. b.Route Construction using Ant Colony Optimization To obtain the best solution, enhance ant colony optimization of [4] is applied. The algorithm works as under. Step 1: Initialize the pheromone matrix Z6 = 1[6 and place O ants at depot and the set of unvisited. customers  as Step 2: Repeat while all the customers are not marked as visited. Step 2.1 Start an ant and mark depot as the current location. Step 2.2 From the current location (i) choose the customer (j) to be visited by a pseudorandom proportional rule given by: ?=\ a c N]O ^_Z6 ` . _b6 ` d , e :; N ≤ N+  (2ℎgNV:)g (15) whereN ∈ >0,1@is a uniformly generated random number, and b6 is the visibility of customer j and defined by b6 = 1m j l > hM6 + V26 i + h<6 − g6 i @ (16) Here M6 is the cost of travelling from node i to j which is distance from node i to j. In our case as travel time are uncertain and their values will be known after reaching the customers so it may be possible that vehicle arrives at acustomer but cannot serve it because of expiry of time window. 79 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 g6 − 6 :; g6 > 6  is the waiting time at location j before service can be started 0 (2ℎgNV:)g and<6 − 6 , 6 < <6 , i.e. the difference between the latest arrival time ljand actual arrival time aj at customer j is the measure of urgency of customer j to be served. <)( e ∈ oQ is the customer selected according to the probability pq given by Also V26 = n pq = t _rsB ` ._usB ` t v ∑B∈w _rsB ` ._usB ` x v (17) yz is the set of customers which will be successfully visited from the current location by the same vehicle without violating the following time and capacity constraints. (i) Time constraints: 6 ≤ <6 i.e. arrival at {|} customer must be up to the closing time<6 of that customer with 6 = O6$ , g6$  + =6$ + 26$,6 and Cr(TS[r] ≤lj).≥ Cr* Q Q (ii) Capacity constraints:h6 J6 ≤ TQ i (18) (19) Step 2.3 Mark (j) as the current location and update the set of unvisited customers~ → ~ – ?. Also update capacity and current time of the ant k. Step 2.4 From the current location again find oQ . If oQ = ~‚<< then go to 2.1 else repeat the 2.2. Step 3: Out of O paths find the best path to be followed with minimum total travelled distance and further try for improving that route by applying local search. Step 4: Update the pheromone matrix by the global pheromone updation rule: Z6 = 1 − ƒZ6 + ∑Q#$ ΔZ6 (20) whereƒ ∈ 0, 1is a constant that controls the speed of evaporation of pheromone. † is number of routes in the current best solution. The deposited pheromone ΔZ6 on the links is given byΔZ6 = T/ˆ. Here T is the constant, ˆ is the tour length of current solution. Step 5: Repeat the step 2, 3 for desired number of iteration and provide the best obtained solution. 6.Computational Experience The proposed algorithm has been encoded in MATLAB 8.0. This study uses the dataset of J.Brito et al [20] which was generated from the example of Zheng and Liu [17]. Two types of 80 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 experimental conditions based on the time windows are generated. We assume that there are 18 customers with short time horizons and with long time horizons. Customer labeled 0 is assumed as depot. In each experiment demand for each customer, distance and fuzzy travel time between each customer is same as that of J.Brito et al. Start time and the closing time for each customer in long time horizon is assumed to be same but for dataset with short time period the total opening duration is assumed to be 100 for each customer. The relative parameters and their values that were used during implementation are listed in table6.1 . Table 6.1 Simulation Parameters Sr. No. Simulation Parameter Parameter Value 1 Number of customers 18 2 Number of iterations 1000 3 Capacity of Vehicles(Q) 1000 4 Initial Pheromone value for all arcs 1 5 Α 2.5 6 Β .7 7 Γ .5 8 Ρ 0.2 9 q0 0.5 10 No. of Ants 11 11 Credibility .8 12 Depot Close time 5000 13 Service Time 15 Comparison of results obtained by our algorithm,J.Brito[20] and Zheng et al [17] on various parameters are presented in table 6.2 81 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 Table 6.2 Comparison Table Factors Zheng et al[17] J.Brito et al[20] Our Approach Meta Heuristics Genetic GRASP ANT COLONY SYSTEM Total Iterations 10,000 - 1000 Time Consumed 10 hours 1 minute 3 minutes Vehicle used 4 3 3 Total Distance 457.5 365.5 373 Vehicle Routes R1:0-16-17-18-5-0 R1:0-17-18-16-1514-12-13-0 R1:0-1- 2-3-18-17-13– 8-0 R2:0-10-12-13-14-15-80 R3:0-1-2-3-0 R2:0-2-1-3-4-6-8-0 R2:0-4-5-6-10-11-7-9-0 R3:0-16-15-14-12-0 R3:0-10-9-11-7-5-0 R4:0-9-6-7-11-4-0 Loads of Vehicles 590,815,440,640 795,930,760 955,840,550 Robust Less More More One can observe that our algorithm produces effective results than Zheng et al [17]and comparable results with GRASP. Moreover proposed algorithm is more robust than [17] in terms of utilization of vehicles. To evaluate the importance of dispatcher preference Cr varied with the interval of 0 to 1 with a step of 0.1. The average computational results of 10 times are given in fig 6.1 Aggregated Cost Influence of prefrence index Cr Fig 6.1 Influence of preference index 82 International Journal on Computational Sciences & Applications (I (IJCSA) JCSA) Vol.4, No.5, October 2014 From above figure on can conclude that if decision maker is risk lover it will choose lower values of Crr whereas if he is risk adverse he will go for higher values with plan having higher cost. Figure 6.2 shows the effect of fuzzy travel time on time windows for long duration problems with a confidence level of 0.8. Time Missed Time Windows customers Arrival_Time Close_Time Fig 6.2 Missed time windows for long horizon problems with Cr=0.8 One can note that if we are travelling with the same fuzzy sspeed as given in [19]] all customers are served within their time windows. But for short horizon problems if Cr<=0.4 r<=0.4 some customers are suffered as shown in fig 6.3.. For example for customer 4 and 5 the closing time window is around 900 but the actual arrival time of the vehicle is around 1000. Time Missed Time Windows at (.3) Customers A_T (.3) C_T Fig 6.3 Missed time w windows for short problems with Cr=0.3 If we set the Cr>=0.5 r>=0.5 every customer can be served within it itss time boundaries as shown in fig6.4 fig 83 International Journal on Computational Sciences & Applications (I (IJCSA) JCSA) Vol.4, No.5, October 2014 Time Missed Time Windows at (0.5) Customers A_T(.5) C_T Fig 6.4 Missed time windows for short problems wi with Cr=0.5 7.Conclusions Deterministic assumptions of the VRPTW make it unsuitable for real world environment. In this paper, VRPTW with fuzzy travel time is considered to capture the real life scenario. scenario Our goal is to construct efficient and reliable routes for the problem. We propose a chance constrained model for the problem using fuzzy credibility theory where fuzzy travel time is represented as triangular fuzzy number. Additionally, stochastic tochastic simulation is done to get the fuzzy travel time and then ant colony optimization algorithm is used to get the optimal solution for the problem in reasonable time. We apply ly our solution approach to problems having short and long duration of time windows. It was concluded that the proposed approach performs well in each structure of the problem and provides improved results on [17] and comparable results with [20] [20 approach.Further Further comparison between different confidence levels is done to show the influence on total distance and it was concluded that higher values of preference index leads to higher cost. This comparison helps a decision maker in choosing different values for confidence level to get different results based on cheapness and robustness robustness. References 1. 2. 3. Gendreau, Michel, et al. Metaheuristics for the vehicle routing problem and its extensions: A categorized bibliography. Springer US, 2008. Eksioglu, Burak, ArifVolkanVural, and Arnold Reisman. "The vehicle routing problem: A taxonomic review." Computers & Industrial Engineering 57.4 (2009): 1472 1472-1483. Gupta, Radha, Bijendra Singh, and Dhaneshwar Pandey. "Multi "Multi-objective objective fuzzy vehicle routing problem: a casee study." International Journal of Contemporary Mathematical Sciences 5.29 (2010): 1439-1454. 84 International Journal on Computational Sciences & Applications (IJCSA) Vol.4, No.5, October 2014 4. Bansal Sandhya, Rajeev Goel, and C. Mohan. "Use of Ant Colony System in Solving Vehicle Routing Problem with Time Window Constraints." Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Springer India, 2014. 5. Soo, Raymond Kuo Yang, and Yong HaurTay. "A survey on the progress of research on vehicle routing problem with time window constraints." Symposium on Progress in Information and Communication Technology (SPICT). 2009. 6. Laporte, Gilbert. "Fifty years of vehicle routing." Transportation Science 43.4 (2009): 408-416. 7. Laporte, G. and Y. Nobert (1997). Exact algorithms for the vehicle routing problem.Surveys in Combinatorial Optimization, North-Holland, Amsterdam 132, 147_184. 8. R. Baldacci, E. Bartolini, A. Mingozzi, R. Roberti, 2010, “An exact solution framework for a broad class of vehicle routing problems”, Computational management Time, vol7(3), 229-268. 9. Lysgaard, Jens. "Clarke & Wright’s Savings Algorithm." Department of Management Science and Logistics, The Aarhus School of Business (1997). 10. Bräysy, Olli, and Michel Gendreau. "Metaheuristics for the vehicle routing problem with time windows." Report STF42 A 1025 (2001). 11. Malandraki, Chryssi, and Mark S. Daskin. "Time dependent vehicle routing problems: Formulations, properties and heuristic algorithms." Transportation science 26.3 (1992): 185-200. 12.I choua, Soumia, Michel Gendreau, and Jean-Yves Potvin. "Vehicle dispatching with time-dependent travel times." European journal of operational research144.2 (2003): 379-396. 13. Donati, Alberto V., et al. "Time dependent vehicle routing problem with a multi ant colony system." European journal of operational research 185.3 (2008): 1174-1191. 14. Demirel, Tufan, Nihan Cetin Demirel, and BelginTasdelen. "Time Dependent Vehicle Routing Problem with Fuzzy Traveling Times Under Different Traffic Conditions." Journal of Multiple-Valued Logic & Soft Computing 14 (2008). 15. Wang, Geng-jia, Yuan-Biao Zhang, and Jia-Wei Chen. "A novel algorithm to solve the vehicle routing problem with time windows: Imperialist competitive algorithm." Advances in Information Sciences and Service Sciences 3.5 (2011): 108-116. 16. Erbao, Cao, and Lai Mingyong. "A hybrid differential evolution algorithm to vehicle routing problem with fuzzy demands." Journal of computational and applied mathematics 231.1 (2009): 302-310. 17. Zheng, Yongshuang, and Baoding Liu. "Fuzzy vehicle routing model with credibility measure and its hybrid intelligent algorithm." Applied Mathematics and Computation 176.2 (2006): 673-683. 18. Goncalves, Gilles, Tiente Hsu, and JianXu. "Vehicle routing problem with time windows and fuzzy demands: an approach based on the possibility theory."International Journal of Advanced Operations Management 1.4 (2009): 312-330. 19. Brito, Julio, José Andrés Moreno, and José L. Verdegay. "Fuzzy Optimization in Vehicle Routing Problems." IFSA/EUSFLAT Conf.. 2009. 20. Brito, J., et al. "Fuzzy Vehicle Routing Problem with Time Windows."Proceedings of IPMU. Vol. 8. 2008. 21 .L.A. Zadeh, Fuzzy Sets, Information and Control 8 (1965) 338_353. 22. A. Kaufman, Introduction to the Theory of Fuzzy Subsets, Academic Press, New York, 1975. 23 .L.A. Zadeh, Fuzzy sets as a basis for a theory of possibility, Fuzzy Sets and Systems 1 (1978) 3_28. 24 B. Liu, Uncertain Theory: An Introduce to its Axiomatic Foundations, Springer, Berlin, 2004. 25. Gemeinschaften, Europäische, ed. White paper-European transport policy for 2010: time to decide. Office for Official Publications of the European Communities, 2001. 26. Dantzig, George B., and John H. Ramser. "The truck dispatching problem."Management science 6.1 (1959): 80-91. 85
9cs.NE
Prediction and Control of Projectile Impact Point using Approximate Statistical Moments arXiv:1710.00289v1 [cs.SY] 1 Oct 2017 Cenk Demir1 , Abhyudai Singh2 Abstract— In this paper, trajectory prediction and control design for a desired hit point of a projectile is studied. Projectiles are subject to environment noise such as wind effect and measurement noise. In addition, mathematical models of projectiles contain a large number of important states that should be taken into account for having a realistic prediction. Furthermore, dynamics of projectiles contain nonlinear functions such as monomials and sine functions. To address all these issues we formulate a stochastic model for the projectile. We showed that with a set of transformations projectile dynamics only contains nonlinearities of the form of monomials. In the next step we derived approximate moment dynamics of this system using mean-field approximation. Our method still suffers from size of the system. To address this problem we selected a subset of first- and second-order statistical moments and we showed that they give reliable approximations of the mean and standard deviation of the impact point for a real projectile. Finally we used these selected moments to derive a control law that reduces error to hit a desired point. I. I NTRODUCTION In a broad sense, a projectile is a ranged weapon that moves through the air in the presence of external forces and endures its motion because of its own inertia. Begining from Aristotle and later Galileo, projectile trajectory prediction and its impact points have been studied [1], [2]. The goal of these studies is to provide a realistic mathematical model in order to explain the behavior of projectiles. Mathematical modeling allows us to understand the motion of projectiles while requiring a much lower cost than experimental analysis. However, mathematical models become rapidly convoluted when all the parameters of the system are considered (e.g. atmospeheric conditions, air density, fuel, etc.). Hence, forming an optimal model, that contains only critical information about a projectile, is essential. Various approximations, methods, and assumptions are used to obtain reliable models [3]–[6]. In this paper, we define a novel model to predict impact points for ballistic targets. Predicting these points is essential in order to avoid hitting constrained areas [7], and to create effective defense systems for those points [8]. In order to reach to a reasonable Impact Point Prediction (IPP), several deterministic and stochastic approaches are studied, such as various types of Kalman Filters [9], Maximum Likelihood Estimator [10], and Stochastic Model Predictive Control [7]. Recent works have also included the 1 C. Demir is with Department of Electrical and Computer Engineering, University of Delaware, Newark, DE USA 19716. [email protected] 2 A. Singh is with the Department of Electrical and Computer Engineering, Biomedical Engineering, Mathematical Sciences, Center for Bioinformatics and Computational Biology, University of Delaware, Newark, DE USA 19716. [email protected] wind effect which is crucial to obtaining realisctic IPP [11]. However, it is highly inaccessible to receive information about wind instantaneously and hastily because of limited sensor accuracy [12]. Furthermore, the deviations of wind speed and direction are random which makes it unrealizable to predict the future evolution of wind [13]. This noise also shifts the impact points of projectiles which makes classic IPP model erroneous. In this paper, the effect of wind is modelled as a stochastic process. In the presence of such randomness, statistical moments are reliable tools that give us useful information about the mean and variance of impact points. However, it is not always possible to determine statistical moments for highly nonlinear systems because of the unclosed moment dynamics which means that higher order moments appear in lower ones. To interpret moments in this case, various approximation techniques are used which are called closure techniques (see, e.g., [14]–[18]). Unfortunately, these methods are mainly developed to deal with higher order moments of monomial form. For instance, how to approximate skewness as a function of mean and variance. However, IPP contains nonlinearities of the trigonometric form due to its nature. Here we show that by using Euler formula we can transform a system to new coordinates. The transformed system can be modelled as classic monomial form with a change of variables. In the next step, we derive moment dynamics for the transformed system. These dynamics are free of trigonometric functions, yet they are still unclosed. Hence, we apply mean-field approximation to close them [19]. Mean-field approximation gives reliable results in the limit of weak correlation between states of the system, which is the case here due to the presence of independent noise terms in different states of IPP [20]. The ultimate aim of aerospace studies is to control projectile around its desired trajectory which is named as projectile guidance. To do so, many guidance laws are developed [21], [22]. In between them, propotional navigation guidance (PNG) is the most used and well performed when the target is stationary [23]. PNG is applied to a projectile by changing forces that act on it. Such changes can be obtained by using configurations of canards, wings or tails [12]. Change of configurations is achieved through various control strategies [7], [24], [25]. In this paper, we used feedback control to move along a projectile in a desired trajectory. In the next, we start our analysis by defining projectile dynamic models. II. E XACT DYNAMIC M ODEL OF P ROJECTILE To model a projectile motion we first need to define proper coordinates. Projectile dynamics contain two frames. One TABLE I. Summary of notation used Parameter x, y, z θ, ψ, φ p, q, r u, v, w X, Y, Z L, M, N I sθ , cθ , tθ V D ρ CNA vw , ww CLP , CM Q RM CM RM CP CY P A Cx0 W1 , W2 , W3 α, β uci , vci , wci Di Si Li , D i CL , CD Mi λi rxi , ryi , rzi θE , ψE Kp , Kψ , Kθ , Kφ ep , eq , er Description Location of projectile Roll, pitch, yaw angles Angular velocity components Projectile velocity components Force components of projectile Physical moment components of projectile Inertia matrix Sine, cosine and tangent of θ Total velocity Projectile characteristic length Atmospheric density Normal force aerodynamic coefficient Wind components Roll and pitch damping aerodynamic coefficients Distance from center of mass to center of Magnus pressure Distance from center of mass to center of pressure Magnus force aerodynamic coefficient Zero yaw axial force aerodynamic coefficient Zero-mean white noise components Angle of attack and side slip angle ith canard velocity ith canard characteristic length ith canard surface area ith canard lift and drag force Canard aerodynamic lift and drag coefficients ith canard Mach number ith canard angle ith canard distance from center of gravity Yaw and pitch angle error Control gains Control inputs of them is the inertial frame which is often construed as the Earth coordinate frame. The other one is the projectile referenced frame which is the body frame. In these frames, position states are denoted by (x, y, z), and orientation states are denoted by (ψ, φ, θ). Note that position (x, y, z) and orientation (φ, θ, ψ) are independent parameters, and called six degrees of freedom [26], [27] which can also be seen in Figure 1. The position states (x, y, z) give information about location of the projectile in the Earth coordinate which is portrayed as of Euler angles (φ̇, θ̇, ψ̇)     p  φ̇  q = LB E  θ̇  .   r ψ̇ (2) This transformation is a non-orthogonal transformation because the axes on which we measured Euler angle derivatives are non-orthogonal. For this reason, it is necessary to define LB E which is the matrix that allow us to separate Euler angle derivatives to orthonormal components [29]. Thus, from taking inverse of LB E , we can define the dynamics of φ̇, θ̇, ψ̇      1 sφ tθ cφ tθ p  φ̇  (3) θ̇ = 0 cφ −sφ  q . cφ sφ     0 r ψ̇ cθ cθ The body velocity components depend on the acting force on the projectile (X, Y, Z); explicitly gravitational force, aerodynamic steady state force, aerodynamic Magnus force, and canard lifting force [30]. Further, velocity components (u, v, w) are   X     0 −r q  u   u̇   m  0 −p v . v̇ = Y −  r (4)     m Z −q p 0 w ẇ m Moreover, angular velocity depends on the physical moments that acting on a projectile, (L, M, N ). These moments are aerodynamic steady state moment, aerodynamic unsteady moment, aerodynamic Magnus moment, and the moment of the canard [30]. The connection between angular velocity and physical moment is given by         0 −r q   p ṗ   L −1  M − r q̇ = I q , 0 −p I       ṙ r N −q p 0 (5) ⃗I φ    cθ cψ ẋ ẏ = cθ sψ   ż −sθ   sθ cψ cφ + sψ sφ  u  sθ sψ cφ − cψ sφ  v .   cθ cφ w (1) This equation shows that position states (x, y, z) depend on the body translational velocities (u, v, w). Furthermore x, y, z depend on angles between projectile and Earth frame origin (Figure 1). The matrix in equation (1) is known as rotation matrix. This matrix is created by the standard aerospace rotation sequence [28]. It allows us to represent the speed of projectile in all directions in the Earth coordinate system. The orientation states of the projectile, (φ, θ, ψ), are known as Euler’s angles, they are called specifically: roll, pitch, and yaw. The inertial angular rates (p, q, r) are the time derivative sφ sθ cψ − sψ cφ sφ sθ sψ + cψ cφ sφ cθ θ ψ -z y ⃗ I Impact Point ⃗ x I Fig. 1. Model schematic of a projectile in inertial coordinate frame. A projectile is fully identified by its position in inertial coordinates (x, y, z) and its orientation (φ, θ, ψ). By knowing these 6 degrees of freedom one can predict the impact points, i.e. the point where the projectile hits. where I is inertia matrix of  IXX I =  IY X IZX a projectile IXY IY Y IZY  IXZ IY Z  . IZZ (6) The force and the moment terms in equations (4) and (5) are defined as the following: the gravitational force is the force that pulls projectile towards the center of the Earth [31]. Aerodynamic force and physical moment are the effect of pressure and shear stress on the body of projectile [32]. This force can be split into lift force which is opposite to gravitational force, and drag force which is perpendicular to gravitational force and opposite to the lateral velocity of a projectile. After these definitions, the aerodynamic moment can be constructed for any point on the body by using these forces. In addition, canard lifting force and moment are the aerodynamic force and moment over the canard surface. The last phenomena on the projectile is Magnus force and moment which is seen in the spinning projectiles. The pressure difference between opposite sides of a spining projectile creates this force and moment [26]. Equations (1)-(6) are full description of dynamics for a projectile [33], and it is clear that these dynamics are highly nonlinear. Hence different variations of this model are used by considering different assumptions. In the next section, we briefly review the current approximations. III. L INEAR M ODEL AND M ODIFIED L INEAR M ODEL OF P ROJECTILE In order to decrease the complexity of projectile dynamics, researchers came up with different assumptions [33], [34]. One famous framework which is built based on series of simplifying assumptions is known as projectile linear theory. This theory allows us to define analytic solution of projectile [35], however it usually generates considerable error on impact point prediction [36]. To overcome this issue, projectile modified linear model is interpreted with relaxing some of the assumptions. Specifically, • The pitch angle, θ, is not small sin (θ) 6= θ, cos (θ) 6= 1. • (7) Projectile roll rate and pitch angle are not assumed constant p 6= p0 , θ 6= θ0 . (8) After these two changes projectile modified linear model is ẋ = cos (θ)D, D ẏ = cos (θ)Dψ + ṽ, V D cos (θ) ż = −D sin (θ) + w̃, V D φ̇ = p̃, V D θ̇ = q̃, V D ψ̇ = r̃, V cos (θ) 3 πρD Cx0 V Dg sin (θ) V̇ = − − , 8m V (9) (10) (11) (12) (13) (14) (15) πρD3 CNA (ṽ − ṽw ) ṽ˙ = − − Dr̃, 8m Dg cos θ πρD3 CNA (w̃ − w̃w ) + Dq̃ + , w̃˙ = − 8m V 4 5 πρD V CDD πρD CLP p̃ p̃˙ = + , 8Ixx 16Ixx 4 πρD5 CM Q q̃ πρD RM CM CY P A p̃(ṽ − ṽw ) + q̃˙ = 16V Iyy 16Iyy πρD3 RM CP CNA (w̃ − w̃w ) Ixx Dp̃r̃ + − , 8Iyy Iyy V 5 4 πρD CM Q r̃ πρD RM CM CY P A p̃(w̃ − w̃w ) + r̃˙ = 16V Iyy 16Iyy 3 πρD RM CP CNA (ṽ − ṽw ) Ixx Dp̃q̃ − + 8Iyy Iyy V (16) (17) (18) (19) (20) [36]. Note that in this paper, a superscript ∼ is used to describe components in the fixed frame. All of these projectile models are deterministic. However, in reality, motion of projectiles is not deterministic, and has noise components. This calls for a new model for a projectile. In the next section, we will introduce a new stochastic model for a projectile with stochastic noise effect. IV. S TOCHASTIC M ODIFIED L INEAR M ODEL OF P ROJECTILE We start with introducing the general Stochastic Differential Equation (SDE). A typical equation of the form of SDE can be written as dx = f (x, t)dt + g(x, t)dW t , (21) where x = [x1 x2 ... xn ]T ∈ Rn is the state vector. The system dynamics are f (x, t) = [f1 (x, t) f2 (x, t) ... fn (x, t)]T ∈ Rn × [0, ∞) → Rn , and g(x, t) = [g1 (x, t) g2 (x, t) ... gn (x, t)]T ∈ Rn × [0, ∞) → Rn . W t = [W1 W2 ...Wn ] is a n-dimensional Wiener process whose mean is zero. Projectiles contain miscellaneous physical components that are subject to noise. Various noise sources include measurement noise, sensor noise, wind effect and, etc. Consistent with previous studies, we model these noise terms as state independent white noise [11], [37]–[40] dx = (cos (θ)D)dt + a1 dW1 , D dy = (cos (θ)Dψ + ṽ)dt + a2 dW2 , V D cos (θ) dz = (−D sin (θ) + w̃)dt + a3 dW3 , V where a1 , a2 and a3 are constant, and hdWi dWi i = dt, hdWi dWj i = 0, i 6= j (22) (23) (24) (25) In the rest of this paper, hi denotes the expected value. W1 , W2 and W3 can be understood as the effect of noise on different coordinates (Figure 2). After these modifications, dynamics of projectile is in the form of SDE equation (21), thus we call this model Projectile Stochastic Modified Linear Model (PSMLM). A. Statistical Moment Dynamics of PSMLM The moment dynamics of a general SDE in the form of equation (21) can be derived by using Itø formula We start our analysis by writing the first statistical moment dynamics,   n  n  n X ∂ 2 x[m] ∂x[m] 1 XX dhx i (gg T )ij fi + , = dt ∂xi 2 i=1 j=1 ∂xi ∂xj i=1 (26) (35) [m] T where [m] = [m1 m2 ...mn ] [41]. The sum of mj is the order of the moment. If f (x, t) and g(x, t) are linear, then moment dynamics can be written compactly as dµ = c + Aµ, (27) dt where µ contains all the moment of the system up to order M n X mj . (28) M≡ j=1 The vector c, and the matrix A are determined by using f (x, t) and g(x, t). To solve the linear equation (27) is effortless because the desired moment order is always combination of higher or the same order moments. However, when f (x, t) or g(x, t) are nonlinear, it is not simple to determine all the moments, and (27) needs new configuration. This is dµ = c + Aµ + B µ̄, (29) dt where µ̄ only contains the higher moments than the desired ones. This problem is a fundamental problem of statistical moments determination when f (x, t) or g(x, t) are nonlinear. To overcome this fundamental problem, we used well-known mean-field closure technique [42], [43]. This approach is convenient for the systems that have computational complexity or high-dimension [44]. The basic idea of this moment closure technique is to define higher order moments as the product of the moments of individuals. For instance m m j mi j i hxm i xj i ≈ hxi ihxj i, D dhδ + i = j hδ + q̃i dt V0 dhe−jθ i D = −j hδ − q̃i dt V0 D dhxi = ( (hδ + i + hδ − i) dt 2 (36) (37) These moment dynamics depend on the second order moment dynamics hδ + q̃i and hδ − q̃i. In the next step, we add dynamic of these two moment to our system which are dhδ + q̃i πρD4 RM CM CY P A + D hδ p̃(ṽ − ṽw )i = j hδ + q̃ 2 i + dt V0 16V0 Iyy πρD5 CM Q + πρD3 RM CP CNA + + hδ q̃i + hδ (w̃ − w̃w )i 16Iyy 8Iyy Ixx D + hδ p̃r̃i, (38) − Iyy V0 dhδ − q̃i πρD5 CM Q − D hδ q̃i = −j hδ − q̃ 2 i + dt V0 16Iyy πρD4 RM CM CY P A − + hδ p̃(ṽ − ṽw )i 16V0 Iyy 3 πρD RM CP CNA − Ixx D − + hδ (w̃ − w̃w )i − hδ p̃r̃i. (39) 8Iyy Iyy V0 These dynamics depend on the third order moments hδ + q̃ 2 i and hδ − q̃ 2 i. The moment dynamics of this system are not closed in the sense that any close set of moments depends on higher order moments. To overcome this issue, mean-field closure technique is used hδ + q̃ 2 i ≈ hδ + ihq̃ 2 i, hδ − q̃ 2 i ≈ hδ − ihq̃ 2 i. (40) In order to calculate mean, we need to add second order moment dynamics in the next. mi , mj ∈ [0, 1, 2, . . .]. (30) 1) Approximation of mean of PSMLM using mean-field: It is handy to use (26) to find moments of the system. For example for state x, D cos (θ)dt + a1 dW1 . (31) 2 This dynamic is nonlinear because of cosine term. If we use Euler’s relation, dx = eiθ + e−iθ eiθ − e−iθ , sin θ = . 2 2i Thus, (31) can be rewritten as cos θ = dx = ( D jθ (e + e−jθ )dt + dW1 . 2 (32) (33) To proceed from (33), we define two new states δ + = ejθ and δ − = e−jθ D D dδ + = j δ + , dδ − = −j δ − (34) V0 V0 Fig. 2. Our approximation technique captures the mean behavior of projectile. The bold lines show the mean trajectory of a projectile obtained from numerical simulations and mean-field approximation. The approximation results are indistinguishable from numerical results, showing significant performance of our method. 9200 10000 Mean-field Standard Deviation Data Standard Deviation 9100 9000 9500 y-coordinates (ft) y-coordinates (ft) 8900 8800 8700 8600 9000 8500 8500 8400 8000 Mean-field Standard deviation Data Standard Deviation Impact Points 8300 8200 1250 1300 1350 1400 1450 7500 1200 1500 1250 1300 x-coordinates (ft) 2) Second order moments of PSMLM: This system has 14 states, which means there exist 14 first order statistical moments, and 105 second order statistical moments. This number of equations make running different methods and finding optimal solutions in real time impossible. Hence, here we only consider a few number of second order moments and we approximate the rest as functions of first order moments. Namely we add the 14 equations of the form of a sole state, for instance dhx2 i = D(hxδ + i + hxδ − i) + a1 . (41) dt Moreover, we include hxδ + i, hxδ − i and the moments that show up in the moment dynamics of coordinates. The rest of moments are approximated, hδ + q̃i ≈ hδ + ihq̃i, hδ − q̃i ≈ hδ − ihq̃i, + hδ p̃ṽi ≈ hδ ihp̃ṽi, hδ p̃ṽi ≈ hδ ihp̃ṽi, hδ + p̃r̃i ≈ hδ + ihp̃r̃i, hδ − p̃r̃i ≈ hδ − ihp̃r̃i. − 1400 1450 1500 1550 1600 x-coordinates (ft) Fig. 3. Our method successfully predicts the standard deviation of the impact points. Every cross represents impact point when a projectile have noise component. The blue and red ellipse are the standard deviation of x and y coordinates by using mean-field approximation and data simulations, respectively. + 1350 − (42) (43) (44) By applying these closures, we have closed set of first order moment dynamics and selected sub-set of second order moments of PSMLM. Solving these equations give us approximate time trend of the mean and the standard deviation. V. S IMULATION R ESULTS OF P ROJECTILE P REDICTION U SING M EAN - FIELD In this paper, fin stabilized projectile is used with following initial conditions for location, x = 0 ft, y = 0 ft, and z = 0 ft which is origin of reference frame. Speed terms are considered as ũ = 400 ft/s, ṽ = 0 ft/s, and w̃ = 0 ft/s. Angles in reference coordinates system are φ = 2.9 rad, θ = 0.267 rad, and ψ = −0.007 rad. Angular velocities are p̃ = 399.7 rad/sec, q̃ = 0.43 rad/sec, and Fig. 4. Randomness in starting point increase the errors in impact points, hence it vitiates the accuracy of the missile. Mean field approximation is capable of giving accurate estimations of error even in the presence of random initial conditions. r̃ = −1.54 rad/sec. Physical parameters are selected as air density of ρ = 0.00238 slug/(cu ft), and gravity constant of g = 32.174 ft/s2 . The rest of physical parameters are chosen as in [35], i.e. reference diameter is 0.343521 ft, weight of the projectile is m = 0.0116 slug. Aerodynamic coefficients are CX0 = 0.279, Cdd = 2.672, Clp = −0.042, Cna = 2.329, Cypa = −0.295, Cmq = −1.800. Distances from center of mass for aerodynamic moment and force are Rmcp = −0.1657 ft, and Rmcm = −0.1677 ft. Moments of inertia are Ixx = 2.85 × 10−5 slug/ft2 , Iyy = 2.72 × 10−5 slug/ft2 [35]. In addition, wind speed can be taken from weather cast agencies, here we used ṽw = 15 ft/s and w̃w = 15 ft/s. After using these initial conditions and parameters, we simulated PSMLM. The result of this simulation can be seen in Figure 2. As it is clear from this figure, our approximation is able to predict the mean behavior of projectile through the time successfully. In the next, we analyzed the impact points. Figure 3 shows that our method is able to predict standard deviation of impact points around their mean with small error. TABLE II. Initial Values of Probability Distribution Parameter x y z φ θ ψ Mean 0 0 0 2.9 0.267 -0.007 S.D. 3 3 0 1 0.017 0.002 Parameter u v w p q r S.D. 400 5 5 399.7 0.43 -1.54 Mean 2 0.01 0.001 3 0.01 0.01 Moreover, in reality the initial condition may change because of the randomness in nature such as wind, and topology of the terrain. To address such uncertainty projectile prediction is performed for a distribution of initial conditions [7], [45], [46]. We implemented this source of uncertainty in our numerical simulations by choosing a random initial + Canard 1 −β VI. D ESIGN OF + P ROJECTILE C ONTROL L AW 2 1 2 2 πDi ρ(u2ci + vci + wci ) CL , i = 1, 2, 3, 4, 2 4 and the drag force of canard is [26] Li = Di = 2 1 2 2 πDi ρ(u2ci + vci + wci ) CD , i = 1, 2, 3, 4, 2 4 where Si = πDi2 4 , (45) (46) M2 Canard 3 M3 CD = cd0 (Mi ) + cd2 (Mi )α2i + (48) We have 4 canards in different locations. Two of them are located parallel to missile body in y-direction. The force terms for these two are Xci Yci Zci  L √ wci 2 − Di √ 2uci 2   i u2ci +wci uci +wci 0 =  ci −Li √ 2uci 2 − Di √ w 2 2 uci +wci uci +wci    , i = 1, 3. (50)   The other two are located parallel to missile body in zdirection. Their force terms are ( Xci Yci Zci ) + Canard 4 - ++ + ++ + + -+ ++ F3 u v w q r θ ψ φ M4 eφ eθ eψ xd yd zd p F4 x y z Σ e1 e2 e3 pitch & yaw θE ψΕ Fig. 5. The controller schematic for following the desired projectile by changing the angle of canards. The control process starts with getting information about the current states of a projectile (x, y, z, α, β, u, v, w, φ, p). The states (x, y, z) are subtracted from desired states (xd , yd , zd ) to find the location error. According to this error, yaw and pitch angle errors are calculated by using velocity states (u, v, w). Then, yaw and pitch angle errors and states (p, φ) are used to control system through a feedback. Canards’ angle are updated using output of controller, angle of attack and side slip angle. (47) ci (Mi )CL2 . Here Mi is Mach number on which aerodynamic coefficients depend [25]. Mach number is the ratio between speed of sound and the speed of air vehicles [29]. In addition, αi is the angle of attack of each canard which depends on the location of that canard and projectile angle of attack. For each canard, this angle can be defined as wci αi = λi ± tan−1 ( ). (49) uci ) −β β and coefficients are defined as [25] CL = clα (Mi )αi , ( + F2 Canard 2 α In this section, we focus on controlling a projectile. To apply control, four canards are used whose characteristics are exactly the same. These canards allow us to adjust forces and physical moments that act on a projectile [25]. Controlling these forces and moments are generally obtained by manipulating canard angles (λ1 , λ2 , λ3 , λ4 ). Here, we design a feedback control with the subjective of following a desired trajectory (e.g. the trajectory with minumum flight time [12]) by using these angles. In the next, we define canard properties and feedback control law with details. The four symmetric canards are added into projectile. The lift force of canard is [26] α F1 M1 PROJECTILE DYNAMICS α Controller condition drawn from a distribution introduced in Table II. Figure 4 shows that our method is still capable of predicting impact points. As expected standard deviation increases in presence of stochastic starting point.   −L √ vci 2 − Di √ u2 ci 2    i u2ci +vci uci +vci  Li √ u2 ci 2 − Di √ v2ci 2 , i = 2, 4. = uci +vci uci +vci     0 (51) Moreover, physical moments of these 4 canards are defined as      0 −rzi ryi Xci   Lci  Mci =  rzi 0 −rxi  Yci , (52)     Zci Nci −ryi rxi 0 where rxi , ryi and rzi are the distance from center of gravity for each canard in each direction. Then, these forces and moments are added into the system dynamic model directly. To design a controller for a projectile by using feedback control law, a desired trajectory is required. In this paper, we assume that the desired trajectory is pre-defined. The error terms (e1 , e2 , e3 ) between the desired trajectory and actual trajectory are the difference along x, y and z coordinates [25]. According to these error terms, yaw and pitch angle errors are described as w̃ e3 θE = tan−1 ( ) − tan−1 ( ), ũ e1 −1 ṽ −1 e2 ψE = − tan ( ) + tan ( ) ũ e1 (53) (54) −1 v ( u ) are angle of attack (α) and where tan−1 ( w u ) and tan side slip angle (β). By using these errors, the control law is eφ = Kp p + Kφ φ, e θ = K θ θE , eψ = Kψ ψE , (55) (56) where Kp , Kφ , Kθ , Kψ are feedback control gains [25]. Finally, the control is applied by updating the angle of each canard [25]. λ1 = eθ − eφ , λ3 = eθ + eφ , λ2 = eψ + eφ , λ4 = eψ − eφ . (57) (58) The entire control design schematic is shown in Figure 5. VII. S IMULATION R ESULTS FOR I MPLEMENTING THE C ONTROLLER We assumed that the aerodynamic coefficients of canards (clα , cd0 , cd2 , ci ) are constant. Also, the distance of each canards from center of gravity is described as the following. TABLE III. Distance from center of gravity for each canards Parameter rx1 rx2 rx3 rx4 Value (f t) 0.474 0.474 0.474 0.474 Parameter ry1 ry2 ry3 ry4 Value 0.102 0 -0.102 0 Parameter rz1 rz2 rz3 rz4 Value 0 0.102 0 -0.102 Because of usage of identical canards, all the canard wing areas are equal to Si = 0.02104 f t2 . The velocities of canards are not the same because of angular rates and position of each canard [25]. However, these velocities can be calculated by considering location of canards and angular velocities in each iteration. In control process, we selected the control gain parameters as Kp = −2, Kφ = −1.5, Kθ = 0.01, Kψ = 0.015. By using these control parameters, change of standard deviation and impact points are shown in Figure 6. Our control law successfully reduced the variance of impact points. Hence, it increases the reliability and accuracy of the missile. However, the error between the simulation results and mean-field approximation is small, but not negligible. One way to reduce this error is to add more moment dynamics to our analysis. Future work will quantify bounds on error of estimation to find the optimal number of dynamics needed to be added to reach to a desired error. Such bounds on approximation error of moments is recently developed for simple dynamic systems [47], [48]. 9200 9100 y-coordinates (ft) 9000 Mean-field Standard deviation Standard Deviation Impact Points Uncontrolled Standard Deviation 8900 8800 8700 8600 8500 8400 8300 8200 1250 1300 1350 1400 1450 1500 x-coordinates (ft) Fig. 6. By controlling a projectile, standard deviation of impact points location reduces considerably. The control law successfully rejected the contribution of the noise and made the projectile to follow the desired path. This results in lower deviation of impact point. VIII. C ONCLUSION In this paper, we used SDEs to model projectiles under noise effect. Next, we applied Euler’s formula to deduce nonlinearities of the trigonometric to monomial form. Then, we employ mean-field approximation to obtain closed form equations describing mean and standard deviation of the system. Our approximation gives reliable results in predicting time evolution of projectile and characteristics of impact points. Finally, we proposed a control scheme to reduce the errors in impact points. Furthermore, while the aim of a projectile is to hit the exact target point, it also evades to hit constrained areas. For this purpose, skewness, and kurtosis can be used to avoid hitting those areas by changing the shape of distribution of impact points. Further research will study the higher order moments of projectile such as skewness and kurtosis. Finally in this work we assumed that the controller is built in the projectile. Sometimes we need to give a new control law to the projectile through a transmission channel. Prospect research will merge dynamics of the projectile with random discrete transmission events modelled as renewal transitions to address this requirement [49]–[51]. ACKNOWLEDGMENT AS is supported by the National Science Foundation Grant ECCS-1711548. R EFERENCES [1] E. Hussey, Physics: books III and IV. Clarendon Aristotle Series, 1983, vol. 2. [2] R. H. Naylor, “Galileo’s theory of projectile motion,” Isis, vol. 71, no. 4, pp. 550–570, 1980. [3] D. N. Mavris, D. A. DeLaurentis, O. Bandte, and M. A. Hale, “A stochastic approach to multi-disciplinary aircraft analysis and design,” in 36th Aerospace Sciences Meeting & Exhibit, Reno, NV, 1998. [4] A. Charters, “The linearized equations of motion underlying the dynamic stability of aircraft, spinning projectiles, and symmetrical missiles,” 1955. [5] B. J. Guidos and G. R. Cooper, “Linearized motion of a fin-stabilized projectile subjected to a lateral impulse,” Journal of spacecraft and rockets, vol. 39, no. 3, pp. 384–391, 2002. [6] L. Zhao and Y. Jia, “Finite-time attitude stabilisation for a class of stochastic spacecraft systems,” IET Control Theory & Applications, vol. 9, no. 8, pp. 1320–1327, 2015. [7] J. Rogers, “Stochastic model predictive control for guided projectiles under impact area constraints,” Journal of Dynamic Systems, Measurement, and Control, vol. 137, no. 3, p. 034503, 2015. [8] M. Finn, “Value of area defense impact-point prediction in a two-layer defense with perfect attackers and defenders. final report,” Institute for Defense Analyses, Alexandria, VA (USA), Tech. Rep., 1986. [9] A. Fieee, S. Immediata, L. Timmoneri, M. Meloni, and D. Vigilante, “Comparison of recursive and batch processing for impact point prediction of ballistic targets,” in IEEE International Radar Conference, 2005, pp. 121–126. [10] A. Farina, L. Timmoneri, and D. Vigilante, “Classification and launchimpact point prediction of ballistic target via multiple model maximum likelihood estimator (mm-mle),” in IEEE Conference on Radar, 2006, pp. 802–806. [11] T. Yuan, Y. Bar-Shalom, P. Willett, and D. Hardiman, “Impact point prediction for thrusting projectiles in the presence of wind,” IEEE Transactions on Aerospace and Electronic Systems, vol. 50, no. 1, pp. 102–119, 2014. [12] R. Yanushevsky, Modern missile guidance. CRC Press, 2007. [13] J. F. Manwell, J. G. McGowan, and A. L. Rogers, Wind energy explained: theory, design and application. John Wiley & Sons, 2010. [14] M. Soltani, C. A. Vargas-Garcia, and A. Singh, “Conditional moment closure schemes for studying stochastic dynamics of genetic circuits,” IEEE transactions on biomedical circuits and systems, vol. 9, no. 4, pp. 518–526, 2015. [15] C. H. Lee, K.-H. Kim, and P. Kim, “A moment closure method for stochastic reaction networks,” The Journal of chemical physics, vol. 130, no. 13, p. 134107, 2009. [16] C. S. Gillespie, “Moment-closure approximations for mass-action models,” IET systems biology, vol. 3, no. 1, pp. 52–58, 2009. [17] C. Kuehn, “Moment closurea brief review,” in Control of selforganizing nonlinear systems. Springer, 2016, pp. 253–271. [18] A. Singh and J. P. Hespanha, “Approximate moment dynamics for chemically reacting systems,” IEEE Transactions on Automatic Control, vol. 56, no. 2, pp. 414–418, 2011. [19] V. M. Tsarenko and A. M. Yaglom, Second-Order Modeling Of Turbulent Diffusion in an Atmospheric Surface Layer. Springer New York, 1992, pp. 39–58. [20] K. R. Ghusinga, M. Soltani, A. Lamperski, S. Dhople, and A. Singh, “Approximate moment dynamics for polynomial and trigonometric stochastic systems,” arXiv preprint arXiv:1703.08841, 2017. [21] W. Zhang, J. Yang, and J. Zhan, “Analysis on guidance law performance of semi-active radar guided surface-to-air missile,” Journal of Projectiles, Rockets, Missiles and Guidance, vol. 6, p. 007, 2008. [22] P. Metz, “Terminal guidance method and a guided missile operating according to this method,” Feb. 4 1986, uS Patent 4,568,040. [Online]. Available: https://www.google.com/patents/US4568040 [23] H. Wang, D. Cao, and X. Wang, “The stochastic sliding mode variable structure guidance laws based on optimal control theory,” Journal of Control Theory and Applications, vol. 11, no. 1, pp. 86–91, 2013. [24] M. Gross and M. Costello, “Impact point model predictive control of a spin-stabilized projectile with instability protection,” Proceedings of the Institution of Mechanical Engineers, Part G: Journal of Aerospace Engineering, vol. 228, no. 12, pp. 2215–2225, 2014. [25] M. F. Costello, “Potential field artillery projectile improvement using movable canards.” Military Academy West Point NY, Tech. Rep., 1997. [26] R. McCoy, Modern exterior ballistics: The launch and flight dynamics of symmetric projectiles. Schiffer Pub., 1999. [27] M. J. Amoruso, “Euler angles and quaternions in six degree of freedom simulations of projectiles,” Army Armament Research Development and Engineering Center Picatinny Arsenal NJ Armament Engineering Directorate, Tech. Rep., 1996. [28] F. Fresconi, I. Celmins, and S. I. Silton, “Theory, guidance, and flight control for high maneuverability projectiles,” Army Research Lab Aberdeen Proving MD Weapons and Materials Research Directorate, Tech. Rep., 2014. [29] R. F. Stengel, Exploring the Flight Envelope. Princeton University Press, 2015, pp. 29–146. [30] M. Costello, “Extended range of a gun launched smart projectile using controllable canards,” Shock and Vibration, vol. 8, no. 3-4, pp. 203– 213, 2001. [31] M. V. Cook, Flight dynamics principles: a linear systems approach to aircraft stability and control. Butterworth-Heinemann, 2012. [32] J. D. Anderson Jr, Fundamentals of aerodynamics. Tata McGraw-Hill Education, 2010. [33] B. Etkin, Dynamics of atmospheric flight. Courier Corporation, 2012. [34] C. H. Murphy, “Free flight motion of symmetric missiles,” Army Ballistic Research Lab Aberdeen Proving Ground MD, Tech. Rep., 1963. [35] G. Cooper and M. Costello, “Flight dynamic response of spinning projectiles to lateral impulsive loads,” Journal of Dynamic Systems, Measurement, and Control, vol. 126, no. 3, pp. 605–613, 2004. [36] L. C. Hainz and M. Costello, “Modified projectile linear theory for rapid trajectory prediction,” Journal of Guidance Control and Dynamics, vol. 28, no. 5, pp. 1006–1014, 2005. [37] T. Yuan, Y. Bar-Shalom, P. Willett, D. Hardiman, and H. A. AMRDEC, “Impact point prediction for short range thrusting projectiles,” in Proc. of SPIE Vol, vol. 7698, 2010, pp. 76 981G–1. [38] R. G. Hutchins and A. San Jose, “Imm tracking of a theater ballistic missile during boost phase,” in SPIE Proceedings on Signal and Data Processing of Small Targets, vol. 3373, 1998, pp. 528–537. [39] Angle-only tracking and prediction of boost vehicle position, vol. 1481, 1991. [40] J. M. Maley, “Optimal estimation with two process models and no measurements,” Army Research Lab Aberdeen Proving Ground MD Weapons and Materials Reseach Directorate, Tech. Rep., 2015. [41] J. P. Hespanha and A. Singh, “Stochastic models for chemically reacting systems using polynomial stochastic hybrid systems,” International Journal of robust and nonlinear control, vol. 15, no. 15, pp. 669–689, 2005. [42] A. Bobbio, M. Gribaudo, and M. Telek, “Mean field methods in performance analysis,” in Fifth International Conference on Quantitative Evaluation of Systems, QEST, 2008, pp. 215–224. [43] S. Chibbaro and J.-P. Minier, “Stochastic modelling of polydisperse turbulent two-phase flows,” in Stochastic Methods in Fluid Mechanics. Springer, 2014, pp. 39–86. [44] M. D. Vrettas, M. Opper, and D. Cornford, “Variational meanfield algorithm for efficient inference in large systems of stochastic differential equations,” Physical Review E, vol. 91, no. 1, p. 012148, 2015. [45] D. Ollerenshaw and M. Costello, “Model predictive control of a direct fire projectile equipped with canards,” Journal of Dynamic Systems, Measurement, and Control, vol. 130, no. 6, p. 061010, 2008. [46] J. Rogers, M. Costello, and G. Cooper, “Design considerations for stability of liquid payload projectiles,” Journal of Spacecraft and Rockets, vol. 50, no. 1, pp. 169–178, 2013. [47] K. R. Ghusinga, C. A. Vargas-Garcia, A. Lamperski, and A. Singh, “Exact lower and upper bounds on stationary moments in stochastic biochemical systems,” Physical Biology, vol. 14, 2017. [48] A. Lamperski, K. R. Ghusinga, and A. Singh, “Stochastic optimal control using semidefinite programming for moment dynamics,” in Decision and Control (CDC), 2016 IEEE 55th Conference on. IEEE, 2016, pp. 1990–1995. [49] M. Soltani and A. Singh, “Stochastic analysis of linear time-invariant systems with renewal transitions,” in 2017 American Control Conference (ACC), 2017, pp. 1734–1739. [50] ——, “Control design and analysis of a stochastic network control system,” arXiv preprint:1704.00236, 2017. [51] ——, “Moment-based analysis of stochastic hybrid systems with renewal transitions,” Automatica, vol. 84, pp. 62–69, 2017.
3cs.SY
Fast Estimation of the Median Covariation Matrix with Application to Online Robust Principal Components arXiv:1504.02852v5 [math.ST] 9 Jul 2016 Analysis Hervé Cardot, Antoine Godichon-Baggioni Institut de Mathématiques de Bourgogne, Université de Bourgogne Franche-Comté, 9, rue Alain Savary, 21078 Dijon, France July 12, 2016 Abstract The geometric median covariation matrix is a robust multivariate indicator of dispersion which can be extended without any difficulty to functional data. We define estimators, based on recursive algorithms, that can be simply updated at each new observation and are able to deal rapidly with large samples of high dimensional data without being obliged to store all the data in memory. Asymptotic convergence properties of the recursive algorithms are studied under weak conditions. The computation of the principal components can also be performed online and this approach can be useful for online outlier detection. A simulation study clearly shows that this robust indicator is a competitive alternative to minimum covariance determinant when the dimension of the data is small and robust principal components analysis based on projection pursuit and spherical projections for high dimension data. An illustration on a large sample and high dimensional dataset consisting of individual TV audiences measured at a minute scale over a period of 24 hours confirms the interest of considering the robust principal components analysis based on the median covariation matrix. All studied algorithms are available in the R package Gmedian on CRAN. Keywords. Averaging, Functional data, Geometric median, Online algorithms, Online principal components, Recursive robust estimation, Stochastic gradient, Weiszfeld’s algorithm. 1 Introduction Principal Components Analysis is one of the most useful statistical tool to extract information by reducing the dimension when one has to analyze large samples of multivariate or functional data (see e.g. Jolliffe (2002) or Ramsay and Silverman (2005)). When both the dimension and the sample size are large, outlying observations may be difficult to detect automatically. Principal components, which are derived from the spectral analysis of the 1 covariance matrix, can be very sensitive to outliers (see Devlin et al. (1981)) and many robust procedures for principal components analysis have been considered in the literature (see Hubert et al. (2008), Huber and Ronchetti (2009) and Maronna et al. (2006)). The most popular approaches are probably the minimum covariance determinant estimator (see Rousseeuw and van Driessen (1999)) and the robust projection pursuit (see Croux and Ruiz-Gazen (2005) and Croux et al. (2007)). Robust PCA based on projection pursuit has been extended to deal with functional data in Hyndman and Ullah (2007) and Bali et al. (2011). Adopting another point of view, robust modifications of the covariance matrix, based on projection of the data onto the unit sphere, have been proposed in Locantore et al. (1999) (see also Gervini (2008) and Taskinen et al. (2012)). We consider in this work another robust way of measuring association between variables, that can be extended directly to functional data. It is based on the notion of median covariation matrix (MCM) which is defined as the minimizer of an expected loss criterion based on the Hilbert-Schmidt norm (see Kraus and Panaretos (2012) for a first definition in a more general M -estimation setting). It can be seen as a geometric median (see Kemperman (1987) or Möttönen et al. (2010)) in the particular Hilbert spaces of square matrices (or operators for functional data) equipped with the Frobenius (or Hilbert-Schmidt) norm. The MCM is non negative and unique under weak conditions. As shown in Kraus and Panaretos (2012) it also has the same eigenspace as the usual covariance matrix when the distribution of the data is symmetric and the second order moment is finite. Being a spatial median in a particular Hilbert space of matrices, the MCM is also a robust indicator of central location, among the covariance matrices, which has a 50 % breakdown point (see Kemperman (1987) or Maronna et al. (2006)) as well as a bounded gross sensitivity error (see Cardot et al. (2013)). The aim of this work is twofold. It provides efficient recursive estimation algorithms of the MCM that are able to deal with large samples of high dimensional data. By this recursive property, these algorithms can naturally deal with data that are observed sequentially and provide a natural update of the estimators at each new observation. Another advantage compared to classical approaches is that such recursive algorithms will not require to store all the data. Secondly, this work also aims at highlighting the interest of considering the median covariation matrix to perform principal components analysis of high dimensional contaminated data. Different algorithms can be considered to get effective estimators of the MCM. When the dimension of the data is not too high and the sample size is not too large, Weiszfeld’s algorithm (see Weiszfeld (1937) and Vardi and Zhang (2000)) can be directly used to estimate effectively both the geometric median and the median covariation matrix. When both the dimension and the sample size are large this static algorithm which requires to store all the data may be inappropriate and ineffective. We show how the algorithm developed by Cardot et al. (2013) for the geometric median in Hilbert spaces can be adapted to estimate recursively and simultaneously the median as well as the median covariation matrix. Then an averaging step (Polyak and Juditsky (1992)) of the two initial recursive 2 estimators of the median and the MCM permits to improve the accuracy of the initial stochastic gradient algorithms. A simple modification of the stochastic gradient algorithm is proposed in order to ensure that the median covariance estimator is non negative. We also explain how the eigenelements of the estimator of the MCM can be updated online without being obliged to perform a new spectral decomposition at each new observation. The paper is organized as follows. The median covariation matrix as well as the recursive estimators are defined in Section 2. In Section 3, almost sure and quadratic mean consistency results are given for variables taking values in general separable Hilbert spaces. The proofs, which are based on new induction steps compared to Cardot et al. (2013), allow to get better convergence rates in quadratic mean even if this new framework is much more complicated because two averaged non linear algorithms are running simultaneously. One can also note that the techniques generally employed to deal with two time scale Robbins Monro algorithms (see Mokkadem and Pelletier (2006) for the multivariate case) require assumptions on the rest of the Taylor expansion and the finite dimension of the data that are too restrictive in our framework. In Section 4, a comparison with some classic robust PCA techniques is made on simulated data. The interest of considering the MCM is also highlighted on the analysis of individual TV audiences, a large sample of high dimensional data which, because of its dimension, can not be analyzed in a reasonable time with classical robust PCA approaches. The main parts of the proofs are described in Section 5. Perspectives for future research are discussed in Section 6. Some technical parts of the proofs as well as a description of Weiszfeld’s algorithm in our context are gathered in an Appendix. 2 Population point of view and recursive estimators Let H be a separable Hilbert space (for example H = Rd or H = L2 (I), for some closed interval I ⊂ R). We denote by h., .i its inner product and by k·k the associated norm. We consider a random variable X that takes values in H and define its center m ∈ H as follows: m := arg min E [kX − uk − kXk] . u∈H (1) The solution m ∈ H is often called the geometric median of X. It is uniquely defined under broad assumptions on the distribution of X (see Kemperman (1987)) which can be expressed as follows. Assumption 1. There exist two linearly independent unit vectors (u1 , u2 ) ∈ H 2 , such that for u ∈ {u1 , u2 }. Var(hu, Xi) > 0, If the distribution of X − m is symmetric around zero and if X admits a first moment that is finite then the geometric median is equal to the expectation of X, m = E [X]. Note however that the general definition (1) does not require to assume that the first order moment of kXk is finite since |E [kX − uk − kXk] | ≤ kuk. 3 2.1 The (geometric) median covariation matrix (MCM) We now consider the special vector space, denoted by S(H), of d×d matrices when H = Rd , or for general separable Hilbert spaces H, the vector space of linear operators mapping H → H. Denoting by {ej , j ∈ J} an orthonormal basis in H, the vector space S(H) equipped with the following inner product: hA, BiF = X hAej , Bej i (2) j∈J is also a separable Hilbert space. In S(Rd ), we have equivalently  hA, BiF = tr AT B , (3) where AT is the transpose matrix of A. The induced norm is the well known Frobenius norm (also called Hilbert-Schmidt norm) and is denoted by k.kF . When X has finite second order moments, with expectation E [X] = µ, the covariance   matrix of X, E (X − µ)(X − µ)T can be defined as the minimum argument, over all the elements belonging to S(H), of the functional Gµ,2 : S(H) → R, h i 2 2 Gµ,2 (Γ) = E (X − µ)(X − µ)T − Γ F − (X − µ)(X − µ)T F . Note that in general Hilbert spaces with inner product h., .i, operator (X − µ)(X − µ)T should be understood as the operator u ∈ H 7→ hu, X − µi(X − µ). The MCM is obtained by removing the squares in previous function in order to get a more robust indicator of "covariation". For α ∈ H, define Gα : S(H) → R by Gα (V ) := E  (X − α)(X − α)T − V F − (X − α)(X − α)T  F . (4) The median covariation matrix, denoted by Γm , is defined as the minimizer of Gm (V ) over all elements V ∈ S(H). The second term at the right-hand side of (4) prevents from having to introduce hypotheses on the existence of the moments of X. Introducing the random variable Y := (X − m)(X − m)T that takes values in S(H), the MCM is unique provided that the support of Y is not concentrated on a line and Assumption 1 can be rephrased as follows in S(H), Assumption 2. There exist two linearly independent unit vectors (V1 , V2 ) ∈ S(H)2 , such that Var(hV, Y iF ) > 0, for V ∈ {V1 , V2 }. We can remark that Assumption 1 and Assumption 2 are strongly connected. Indeed, if Assumption 1 holds, then Var(hu, Xi) > 0 for u ∈ {u1 , u2 }. Consider the rank one matrices V1 = u1 uT1 and V2 = u2 uT2 , we have hV1 , Y iF = hu1 , X − mi2 which has a strictly positive variance when the distribution of X has no atom. More generally Var(hV1 , Y iF ) > 0 unless there is a scalar a > 0 such that P [hu1 , X − mi = a] = P [hu1 , X − mi = −a] = 12 (assuming also that P [X − m = 0] = 0). 4 Furthermore it can be deduced easily that the MCM, which is a geometric median in the particular Hilbert spaces of Hilbert-Schmidt operators, is a robust indicator with a 50% breakdown point (see Kemperman (1987)) and a bounded sensitive gross error (see Cardot et al. (2013)). We also assume that Assumption 3. There is a constant C such that for all h ∈ H and all V ∈ S(H) i h −1 T (a) : E (X − h)(X − h) − V F ≤ C. h i −2 (b) : E (X − h)(X − h)T − V F ≤ C. This assumption implicitly forces the distribution of (X −h)(X −h)T to have no atoms. It is more "likely" to be satisfied when the dimension d of the data is large (see Chaudhuri (1992) and Cardot et al. (2013) for a discussion). Note that it could be weakened as in Cardot et al. (2013) by allowing points, necessarily different from the MCM Γm , to have strictly positive masses. Considering the particular case V = 0, Assumption 3(a) implies that for all h ∈ H,   1 ≤ C, (5) E kX − hk2 and this is not restrictive when the dimension d of H is equal or larger than 3. Under Assumption 3(a), the functional Gh is twice Fréchet differentiable, with gradient   (X − h)(X − h)T − V ∇Gh (V ) = −E . (6) k(X − h)(X − h)T − V kF and Hessian operator, ∇2h G(V ) : S(H) → S(H), " !# 1 (Y (h) − V ) ⊗ (Y (h) − V ) F ∇2h G(V ) = E IS(H) − . kY (h) − V kF kY (h) − V kF 2 (7) where Y (h) = (X − h)(X − h)T , IS(H) is the identity operator on S(H) and A ⊗F B(V ) = hA, V iF B for any elements A, B and V belonging to S(H). Furthermore, Γm is also defined as the unique zero of the non linear equation: ∇Gm (Γm ) = 0. Remarking that previous equality can be rewritten as follows,   1 (X − m)(X − m)T iE , Γm = h 1 k(X − m)(X − m)T − Γm kF E k(X−m)(X−m) T −Γ k m (8) (9) F it is clear that Γm is a bounded, symmetric and non negative operator in S(H). As stated in Proposition 2 of Kraus and Panaretos (2012), operator Γm has an important stability property when the distribution of X is symmetric, with finite second moment, 5 h i   i.e E kXk2 < ∞. Indeed, the covariance operator of X, Σ = E (X − m)(X − m)T , which is well defined in this case, and Γm share the same eigenvectors: if ej is an eigenvector of Σ with corresponding eigenvalue λj , then Γm ej = λ̃j ej , for some non negative value λ̃j . This important result means that for Gaussian and more generally symmetric distribution (with finite second order moments), the covariance operator and the median covariation operator have the same eigenspaces. Note that it is also conjectured in Kraus and Panaretos (2012) that the order of the eigenfunctions is also the same. 2.2 Efficient recursive algorithms We suppose now that we have i.i.d. copies X1 , . . . , Xn , . . . of random variables with the same law as X. For simplicity, we temporarily suppose that the median m of X is known. We consider a sequence of (learning) weights γn = cγ /nα , with cγ > 0 and 1/2 < α < 1 and we define the recursive estimation procedure as follows (Xn+1 − m)(Xn+1 − m)T − Wn k(Xn+1 − m)(Xn+1 − m)T − Wn kF  1 = Wn − W n − Wn+1 . n+1 Wn+1 = Wn + γn (10) W n+1 (11) This algorithm can be seen as a particular case of the averaged stochastic gradient algorithm studied in Cardot et al. (2013). Indeed, the first recursive algorithm (10) is a stochastic gradient algorithm,   (Xn+1 − m)(Xn+1 − m)T − Wn E |F n = ∇Gm (Wn ) k(Xn+1 − m)(Xn+1 − m)T − Wn kF where Fn = σ(X1 , . . . , Xn ) is the σ-algebra generated by X1 , . . . , Xn whereas the final estimator W n is obtained by averaging the past values of the first algorithm. The averaging step (see Polyak and Juditsky (1992)), i.e. the computation of the arithmetical mean of the past values of a slowly convergent estimator (see Proposition 3.4 below), permits to obtain a new and efficient estimator converging at a parametric rate, with the same asymptotic variance as the empirical risk minimizer (see Theorem 3.1 below). In most of the cases the value of m is unknown so that it also required to estimate the median. To build an estimator of Γm , it is possible to estimate simultaneously m and Γm by considering two averaged stochastic gradient algorithms that are running simultaneously. For n ≥ 1, mn+1 = mn + γn(m) Xn+1 − mn kXn+1 − mn k 1 (mn − mn+1 ) n+1 (Xn+1 − mn )(Xn+1 − mn )T − Vn = V n + γn k(Xn+1 − mn )(Xn+1 − mn )T − Vn kF  1 =Vn− V n − Vn+1 , n+1 mn+1 = mn − (12) Vn+1 (13) V n+1 6 (14) where the averaged recursive estimator mn+1 of the median m is controlled by a sequence (m) (m) of descent steps γn . The learning rates are generally chosen as follows, γn = cm n−α , where the tuning constants satisfy cm ∈ [2, 20] and 1/2 < α < 1. Note that by construction, even if Vn is non negative, Vn+1 may not be a non negative matrix when the learning steps do not satisfy γn ≤ 1. k(Xn+1 − mn )(Xn+1 − mn )T − Vn kF Projecting Vn+1 onto the closed convex cone of non negative operators would require to compute the eigenvalues of Vn+1 which is time consuming in high dimension even if Vn+1 is a rank one perturbation to Vn (see Cardot and Degras (2015)). We consider the following simple approximation to this projection which consists in replacing in (13) the descent step γn by a thresholded one, γn,pos = min γn , (Xn+1 − mn )(Xn+1 − mn )T − Vn  F (15) which ensures that Vn+1 remains non negative when Vn is non negative. The use of these modified steps and an initialization of the recursive algorithm (13) with a non negative matrix (for example V0 = 0) ensure that for all n ≥ 1, Vn and V n are non negative. 2.3 Online estimation of the principal components It is also possible to approximate recursively the q eigenvectors (unique up to sign) of Γm associated to the q largest eigenvalues without being obliged to perform a spectral decomposition of V n+1 at each new observation. Many recursive strategies can be employed (see Cardot and Degras (2015) for a review on various recursive estimation procedures of the eigenelements of a covariance matrix). Because of its simplicity and its accuracy, we consider the following one:   uj,n 1 uj,n+1 = uj,n + V n+1 − uj,n , j = 1, . . . , q (16) n+1 kuj,n k combined with an orthogonalization by deflation of u1,n+1 , . . . uq,n+1 . This recursive algorithm is based on ideas developed by Weng et al. (2003) that are related to the power method for extracting eigenvectors. If we assume that the q first eigenvalues λ1 > · · · > λq are distinct, the estimated eigenvectors u1,n+1 , . . . uq,n+1 , which are uniquely determined up to sign change, tend to λ1 u1 , . . . , λq uq . Once the eigenvectors are computed, it is possible to compute the principal components as well as indices of outlyingness for each new observation (see Hubert et al. (2008) for a review of outliers detection with multivariate approaches). 2.4 Practical issues, complexity and memory The recursive algorithms (13) and (14) require each O(d2 ) elementary operations at each update. With the additional online estimation given in (16) of the q eigenvectors associated 7 to the q largest eigenvalues, O(qd2 ) additional operations are required. The orthogonalization procedure only requires O(q 2 d) elementary operations. Note that the use of classical Newton-Raphson algorithms for estimating the MCM (see Fritz et al. (2012)) can not be envisaged for high dimensional data since the computation or the approximation of the Hessian matrix would require O(d4 ) elementary operations. The well known and fast Weiszfeld’s algorithm requires O(nd2 ) elementary operations for each sample with size n. However, the estimation cannot be updated automatically if the data arrive sequentially. Another drawback compared to the recursive algorithms studied in this paper is that all the data must be stored in memory, which is of order O(nd2 ) elements whereas the recursive technique require an amount of memory of order O(d2 ). The performances of the recursive algorithms depend on the values of tuning parameters cγ , cm and α. The value of parameter α is often chosen to be α = 2/3 or α = 3/4. Previous empirical studies (see Cardot et al. (2013) and Cardot et al. (2010)) have shown that, thanks to the averaging step, estimator mn performs well and is not too sensitive to the choice of cm , provided that the value of cm is not too small. An intuitive explanation could be that here the recursive process is in some sense "self-normalized" since the deviations at each iteration in (10) have unit norm and finding some universal values for cm is possible. Usual values for cm and cγ are in the interval [2, 20]. When n is fixed, this averaged recursive algorithm is about 30 times faster than the Weiszfeld’s approach (see Cardot et al. (2013)). 3 Asymptotic properties When m is known, W n can be seen as an averaged stochastic gradient estimator of the geometric median in a particular Hilbert space and the asymptotic weak convergence of such estimator has been studied in Cardot et al. (2013). They have shown that: Theorem 3.1. (Cardot et al. (2013), Theorem 3.4). If assumptions 1-3(a) hold, then as n tends to infinity,  √ n W n − Γm N (0, ∆) −1 −1 2 2 stands for convergence in distribution is h and ∆ = ∇m (Γm ) i Ψ ∇m (Γm ) (Y (m)−Γm )⊗F (Y (m)−Γm ) the limiting covariance operator, with Ψ = E . kY (m)−Γ k 2 where m F As explained in Cardot et al. (2013), the estimator W n is efficient in the sense that it has the same asymptotic distribution as the empirical risk minimizer related to Gm (V ) (see for the derivation of its asymptotic normality in Möttönen et al. (2010) in the multivariate case and Chakraborty and Chaudhuri (2014) in a more general functional framework). Using the delta method for weak convergence in Hilbert spaces (see Dauxois et al. (1982) or Cupidon et al. (2007)), one can deduce, from Theorem 3.1, the asymptotic normality of the estimated eigenvectors of W n . It can also be proven (see Godichon-Baggioni (2016)), under Assumptions 1-3, that there is a positive constant K such that for all n ≥ 1, h i K 2 E W n − Γm F ≤ . n 8 Note finally that non asymptotic bounds for the deviation of W n around Γm can be derived readily with the general results given in Cardot et al. (2016). The more realistic case in which m must also be estimated is more complicated because V n depends on mn which is also estimated recursively with the same data. We first state the strong consistency of the estimators Vn and V n . Theorem 3.2. If assumptions 1-3(b) hold, we have lim kVn − Γm kF = 0 n→∞ a.s. and lim n→∞ V n − Γm F =0 a.s. The obtention of the rate convergence of the averaged recursive algorithm relies on a fine control of the asymptotic behavior of the Robbins-Monro algorithms, as stated in the following proposition. Theorem 3.3. If assumptions 1-3(b) hold, there is a positive constant C 0 , and for all β ∈ (α, 2α), there is a positive constant Cβ such that for all n ≥ 1, h i C0 E kVn − Γm k2F ≤ α , n h i C 00 E kVn+1 − Γm k4F ≤ β . n The obtention of an upper bound for the rate of convergence at the order four of the Robbins-Monro algorithm is crucial in the proofs. Furthermore, the following proposition ensures that the exhibited rate in quadratic mean is the optimal one. Proposition 3.4. Under assumptions 1-3(b), there is a positive constant c0 such that for all n ≥ 1, h i c0 E kVn − Γm k2F ≥ α . n Finally, the following theorem is the most important theoretical result of this work. It shows that, in spite of the fact that it only considers the observed data one by one, the averaged recursive estimation procedure gives an estimator which has a classical parametric √ n rate of convergence in the Hilbert-Schmidt norm. Theorem 3.5. Under Assumptions 1-3(b), there is a positive constant K 0 such that for all n ≥ 1, h i K0 2 E V n − Γm F ≤ . n Assuming the eigenvalues of Γm are of multiplicity one, it can be deduced from Theorem 3.5 and Lemma 4.3 in Bosq (2000), the convergence in quadratic mean of the eigenvectors of V n towards the corresponding (up to sign) eigenvector of Γm . 9 4 An illustration on simulated and real data A small comparison with other classical robust PCA techniques is performed in this section considering data in relatively high dimension but samples with moderate sizes. This permits to compare our approach with classical robust PCA techniques, which are generally not designed to deal with large samples of high dimensional data. In our comparison, we have employed the following well known robust techniques: robust projection pursuit (see Croux and Ruiz-Gazen (2005) and Croux et al. (2007)), minimum covariance determinant (MCD, see Rousseeuw and van Driessen (1999)) and spherical PCA (see Locantore et al. (1999)). The computations were made in the R language (R Development Core Team (2010)), with the help of packages pcaPP and rrcov. For reproductible research, our codes for computing the MCM have been posted on CRAN in the Gmedian package. We will denote by MCM(R) the recursive estimator V n defined in (14) and MCM(R+) its non negative modification whose learning weights are defined in (15). If the size of the data n × d is not too large, an effective way for estimating Γm is to employ Weiszfeld’s algorithm (see Weiszfeld (1937) and Vardi and Zhang (2000) as well the Supplementary file for a description of the algorithms in our particular situation). The estimate obtained thanks to Weiszfeld’s algorithm is denoted by MCM(W) in the following. Note that other optimization algorithms which may be preferred in small dimension (see Fritz et al. (2012)) have not been considered here since they would require the computation of the Hessian matrix, whose size is d4 , and this would lead to much slower algorithms. Note finally that all these alternative algorithms do not admit a natural updating scheme when the data arrive sequentially so that they should be completely ran again at each new observation. 4.1 Simulation protocol Independent realizations of a random variable Y ∈ Rd are drawn, where Y = (1 − O(δ))X + O(δ), (17) is a mixture of two distributions and X, O and  are independent random variables. The random vector X has a centered Gaussian distribution in Rd with covariance matrix [Σ]`,j = min(`, j)/d and can be thought as a discretized version of a Brownian sample path in [0, 1]. The multivariate contamination comes from , with different rates of contamination controlled by the Bernoulli variable O(δ), independent from X and , with P(O(δ) = 1) = δ and P(O(δ) = 0) = 1 − δ. Three different scenarios (see Figure 1) are considered for the distribution of : • The elements of vector  are d independent realizations of a Student t distribution with one degree of freedom. This means that the first moment of Y is not defined when δ > 0. • The elements of vector  are d independent realizations of a Student t distribution 10 0 10 20 30 40 50 1 -2 -1 0 1 0 -1 -2 -2 -1 0 1 2 Reverse time BM 2 Student 2 df 2 Student 1 df 0 10 20 30 40 50 0 10 20 30 40 Figure 1: A sample of n = 20 trajectories when d = 50 and δ = 0.10 for the three different contamination scenarios: Student t with 1 degree of freedom, Student t with 2 degrees of freedom and reverse time Brownian motion (from left to right). with two degrees of freedom. This means that the second moment of Y is not defined when δ > 0. • The vector  is distributed as a "reverse time" Brownian motion. It has a Gaussian centered distribution, with covariance matrix [Σ ]`,j = 2 min(d − `, d − j)/d. The covariance matrix of Y is (1 − δ)Σ + δΣ . For the averaged recursive algorithms, we have considered tuning coefficients cm = cγ = 2 and a speed rate of α = 3/4. Note that the values of these tuning parameters have not been particularly optimised. We have noted that the simulation results were very stable, and did not depend much on the value of cm and cγ for cm , cγ ∈ [1, 20]. The estimation error of the eigenspaces associated to the largest eigenvalues is evaluated by considering the squared Frobenius norm between the associated orthogonal projectors. Denoting by Pq the orthogonal projector onto the space generated by the q eigenvectors of b q an estimation, the covariance matrix Σ associated to the q largest eigenvalues and by P we consider the following loss criterion,  T   b b b R(Pq , Pq ) = tr Pq − Pq Pq − Pq h i b q Pq . = 2q − 2tr P (18) 11 50 0.500 0.200 0.050 0.020 0.005 Oracle MCD MCM(W) MCM(R+) MCM(R) SphPCA PP Figure 2: Estimation errors (at a logarithmic scale) over 500 Monte Carlo replications, for n = 200, d = 50 with no contamination (δ = 0). MCM(W) stands for the estimation performed by the Weiszfeld’s algorithm whereas MCM(R) denotes the averaged recursive approach and MCM(R+) its non negative modification (see equation 15). b q , Pq ) ≤ 2q and R(P b q , Pq ) = 2q means that the eigenspaces Note that we always have R(P generated by the true and the estimated eigenvectors are orthogonal. 4.2 Comparison with classical robust PCA techniques We first compare the performances of the two estimators of the MCM based on the Weiszfeld’s algorithm and the recursive algorithms (see (14)) with more classical robust PCA techniques. We generated samples of Y with size n = 500 and dimension d ∈ {50, 200}, over 500 replications. Different levels of contamination are considered : δ ∈ {0, 0.02, 0.05, 0.10, 0.20}. For both dimensions d = 50 and d = 200, the first eigenvalue of the covariance matrix of X represents about 81 % of the total variance, and the second one about 9 %. The median errors of estimation of the eigenspace generated by the first two eigenvectors (q = 2), according to criterion (18), are given in Table 1 for non contaminated data (δ = 0). b q , Pq ) is drawn for the different approaches The distribution of the estimation error R(P in Figure 2 when the dimension is not large (d = 50). As expected, the "Oracle", which is the classical PCA in this situation, provides the best estimations of the eigenspaces. Then, the MCD and the median covariation matrix, estimated by the Weiszfeld algorithm 12 2.000 0.500 0.200 0.050 0.020 0.005 Oracle MCD MCM(W) MCM(R+) MCM(R) SphPCA PP PCA Figure 3: Estimation errors (at a logarithmic scale) over 500 Monte Carlo replications, for n = 200, d = 50 and a contamination by a t distribution with 2 degrees of freedom with δ = 0.02. MCM(W) stands for the estimation performed by the Weiszfeld’s algorithm whereas MCM(R) denotes the averaged recursive approach and MCM(R+), its non negative modification with learning steps as in (15). 13 d=50 d=200 PCA 0.0156 0.0148 MCD 0.0199 - MCM(W) 0.0208 0.0200 MCM(R+) 0.0211 0.0209 MCM(R) 0.0243 0.0246 SphPCA 0.0287 0.0275 PP 0.0955 0.0895 b q , Pq ) with a dimension Table 1: Median estimation errors, according to criterion R(P q = 2, for non contaminated samples of size n = 200, over 500 Monte Carlo experiments. or the modified MCM(R+) recursive estimator, behave well and similarly. Note that when the dimension gets larger, the MCD cannot be used anymore and the MCM is the more effective robust estimator of the eigenspaces. When the data are contaminated, the median errors of estimation of the eigenspace generated by the first two eigenvectors (q = 2), according to criterion (18), are given in b q , Pq ) is drawn for the Table 2. In Figure 3, the distribution of the estimation error R(P different approaches. We can make the following remarks. At first note that even when the level of contamination is small (2% and 5%), the performances of classical PCA are strongly affected by the presence of outlying values in such (large) dimensions. When d = 50, the MCD algorithm and the MCM estimation provide the best estimations of the original two dimensional eigenspace, whereas when d gets larger (d = n = 200), the MCD estimator can not be used anymore (by construction) and the MCM estimators, obtained with Weiszfeld’s and the non negative recursive algorithm, remain the most accurate. We can also remark that the recursive MCM algorithms, which are designed to deal with very large samples, performs well even for such moderate sample sizes (see also Figure 3). The modification of the descent step suggested in (15), which corresponds to estimator MCM(R+), permits to improve the accuracy the initial MCM estimator, specially when the noise level is not small. The performances of the spherical PCA are slightly less accurate whereas the median error of the robust PP is always the largest among the robust estimators. When, the contamination is highly structured temporally and the level of contamination is not small (contamination by a reverse time Brownian motion, with δ = 0.20), the behavior of the MCM is different from the other robust estimators and, with our criterion, it can appear as less effective. However, one can think that we are in presence of two different populations with completely different multivariate correlation structure and the MCD completely ignores that part of the data, which is not necessarily a better behavior. 4.3 Online estimation of the principal components We now consider an experiment in high dimension, d = 1000, and evaluate the ability of the recursive algorithms defined in (16) to estimate recursively the eigenvectors of Γm associated to the largest eigenvalues. Note that due to the high dimension of the data and limited computation time, we only make comparison of the recursive robust techniques with the classical PCA. For this we generate growing samples and compute, for each sample size the approximation error of the different (fast) strategies to the true eigenspace generated 14 t 1 df δ 2% 5% 10% 20% Method PCA PP MCD Sph. PCA MCM (Weiszfeld) MCM (R+) MCM (R) PCA PP MCD Sph. PCA MCM (Weiszfeld) MCM (R+) MCM (R) PCA PP MCD Sph. PCA MCM (Weiszfeld) MCM (R+) MCM (R) PCA PP MCD Sph. PCA MCM (Weiszfeld) MCM (R+) MCM (R) 3.13 0.086 0.022 0.028 0.021 0.022 0.026 3.82 0.090 0.022 0.029 0.023 0.025 0.029 3.83 0.107 0.023 0.033 0.025 0.030 0.035 3.84 0.110 0.025 0.037 0.030 0.044 0.050 t 2 df d = 50 1.04 0.097 0.021 0.029 0.021 0.022 0.025 1.91 0.103 0.023 0.031 0.023 0.024 0.027 1.96 0.108 0.022 0.033 0.026 0.027 0.032 2.02 0.135 0.026 0.038 0.030 0.036 0.041 inv. B. t 1 df 0.698 0.090 0.021 0.027 0.021 0.024 0.027 0.862 0.093 0.021 0.033 0.028 0.035 0.037 1.03 0.099 0.023 0.054 0.059 0.089 0.088 1.19 0.138 0.026 0.140 0.174 0.255 0.251 3.95 0.085 – 0.027 0.021 0.023 0.026 3.96 0.089 – 0.029 0.022 0.024 0.028 3.96 0.088 – 0.031 0.023 0.027 0.032 3.96 0.091 – 0.034 0.026 0.038 0.042 t 2 df d = 200 1.87 0.094 – 0.030 0.022 0.023 0.027 1.98 0.098 – 0.031 0.023 0.024 0.028 1.99 0.101 – 0.033 0.024 0.027 0.031 2.01 0.122 – 0.037 0.028 0.032 0.037 inv. B. 0.731 0.084 – 0.028 0.022 0.025 0.028 0.910 0.087 – 0.034 0.030 0.039 0.040 1.10 0.097 – 0.057 0.056 0.086 0.086 1.25 0.137 – 0.150 0.181 0.256 0.256 b q , Pq ) with a dimension Table 2: Median estimation errors, according to criterion R(P q = 2, for datasets with a sample size n = 200, over 500 Monte Carlo experiments. 15 by the q eigenvectors associated to the q largest eigenvalues of Γm . We have drawn in Figure 4, the evolution of the mean (over 100 replications) approximation error R(Pq , P̂q ), for a dimension q = 3, as a function of the sample size for samples contaminated by a 2 degrees of freedom Student t distribution with a rate δ = 0.1. An important fact is that the recursive algorithm which approximates recursively the eigenelements behaves very well and we can see nearly no difference between the spectral decomposition of V n (denoted by MCM in Figure 4) and the estimates produced with the sequential algorithm (16) for sample sizes larger than a few hundreds. We can also note that the error made by the classical PCA is always very high and does not decrease with the sample size. 4.4 Robust PCA of TV audience The last example is a high dimension and large sample case. Individual TV audiences are measured, by the French company Médiamétrie, every minutes for a panel of n = 5422 people over a period of 24 hours, d = 1440 (see Cardot et al. (2012) for a more detailed presentation of the data). With a classical PCA, the first eigenspace represents 24.4% of the total variability, whereas the second one reproduces 13.5% of the total variance, the third one 9.64% and the fourth one 6.79%. Thus, more than 54% of the variability of the data can be captured in a four dimensional space. Taking account of the large dimension of the data, these values indicate a high temporal correlation. Because of the large dimension of the data, the Weiszfeld’s algorithm as well as the other robust PCA techniques can not be used anymore in a reasonable time with a personal computer. The MCM has been computed thanks to the recursive algorithm given in (14) in approximately 3 minutes on a laptop in the R language (without any specific C routine). As seen in Figure 5, the first two eigenvectors obtained by a classical PCA and the robust PCA based on the MCM are rather different. This is confirmed by the relatively large distance between the two corresponding eigenspaces, R(Pb2P CA , Pb2M CM ) = 0.56. The first robust eigenvector puts the stress on the time period comprised between 1000 minutes and 1200 minutes whereas the first non robust eigenvector focuses, with a smaller intensity, on a larger period of time comprised between 600 and 1200 minutes. The second robust eigenvector differentiates between people watching TV during the period between 890 and 1050 minutes (negative value of the second principal component) and people watching TV between minutes 1090 and 1220 (positive value of the second principal component). Rather surprisingly, the third and fourth eigenvectors of the non robust and robust covariance matrices look quite similar (see Figure 6). 5 Proofs We give in this Section the proofs of Theorems 3.2, 3.3 and 3.5. These proofs rely on several technical Lemmas whose proofs are given in the Supplementary file. 16 5.000 2.000 0.500 0.200 0.050 0.005 0.020 Estimation error (R) PCA Oracle MCM MCM−update 0 500 1000 1500 2000 n b q )) with d = 1000 and q = Figure 4: Estimation errors of the eigenspaces (criterion R(P 3 for classical PCA, the oracle PCA and the recursive MCM estimator with recursive estimation of the eigenelements (MCM-update) and with static estimation (based on the spectral decomposition of V n ) of the eigenelements (MCM). 17 PC 2 0.00 -0.06 0.00 -0.04 0.02 0.04 TV audience PCA MCM 0.02 0.04 PCA MCM -0.02 0.06 0.06 0.08 PC 1 0 200 400 600 800 1000 1200 1400 0 minutes 200 400 600 800 1000 1200 1400 minutes Figure 5: TV audience data measured the 6th September 2010, at the minute scale. Comparison of the principal components of the classical PCA (black) and robust PCA based on the Median Covariation Matrix (red). First eigenvectors on the left, second eigenvectors on the right. 18 PC 4 0.06 0.06 0.08 PC 3 0.00 -0.06 -0.04 -0.04 -0.02 -0.02 0.00 0.02 TV audience 0.02 0.04 0.04 PCA MCM PCA MCM 0 200 400 600 800 1000 1200 1400 0 minutes 200 400 600 800 1000 1200 1400 minutes Figure 6: TV audience data measured the 6th September 2010, at the minute scale. Comparison of the principal components of the classical PCA (black) and robust PCA based on the MCM (red). Third eigenvectors on the left, fourth eigenvectors on the right. 19 5.1 Proof of Theorem 3.2 Let us recall the Robbins-Monro algorithm, defined recursively by Vn+1 = Vn + γn (Xn+1 − mn ) (Xn+1 − mn )T − Vn (Xn+1 − mn ) (Xn+1 − mn )T − Vn F = Vn − γn Un+1 , with Un+1 := − (Xn+1 −mn )(Xn+1 −mn )T −Vn k(Xn+1 −mn )(Xn+1 −mn )T −Vn kF . Since Fn := σ (X1 , ..., Xn ), we have E [Un+1 |Fn ] = ∇Gmn (Vn ). Thus ξn+1 := ∇mn G(Vn ) − Un+1 , (ξn ) is a sequence of martingale differences adapted to the filtration (Fn ). Indeed, E [ξn+1 |Fn ] = ∇Gmn (Vn ) − E [Un+1 |Fn ] = 0. The algorithm can be written as follows Vn+1 = Vn − γn ∇Gmn (Vn ) + γn ξn+1 . Moreover, it can be considered as a stochastic gradient algorithm because it can be decomposed as follows: Vn+1 = Vn − γn (∇Gmn (Vn ) − ∇Gmn (Γm )) + γn ξn+1 − γn rn , (19) with rn := ∇Gmn (Γm ) − ∇Gm (Γm ). Finally, linearizing the gradient,  Vn+1 − Γm = IS(H) − γn ∇2m G(Γm ) (Vn − Γm ) + γn ξn+1 − γn rn − γn rn0 − γn δn , (20) with  rn0 := ∇2mn G (Γm ) − ∇2m G (Γm ) (Vn − Γm ) , δn := ∇Gmn (Vn ) − ∇Gmn (Γm ) − ∇2mn G (Γm ) (Vn − Γm ) . The following lemma gives upper bounds of these remainder terms. Its proof is given in the Supplementary file. Lemma 5.1. Under assumptions 1-3(b), we can bound the three remainder terms. First, kδn kF ≤ 6C kVn − Γm k2F . (21) In the same way, for all n ≥ 1,  krn kF ≤ 4 √  q C + C kΓm kF kmn − mk . (22) Finally, for all n ≥ 1, rn0 F  q  3/4 ≤ 12 C kΓm kF + C kmn − mk kVn − Γm kF . 20 (23) We deduce from decomposition (33) that for all n ≥ 1, kVn+1 − Γm k2F = kVn − Γm k2F − 2γn hVn − Γm , ∇Gmn (Vn ) − ∇Gmn (Γm )iF + γn2 k∇Gmn (Vn ) − ∇Gmn (Γm )k2F + γn2 kξn+1 k2F + 2γn hVn − Γm − γn (∇Gmn (Vn ) − ∇Gmn (Γm )) , ξn+1 iF + γn2 krn k2F − 2γn hrn , Vn − Γm iF − 2γn2 hrn , ξn+1 − ∇Gmn (Vn ) + ∇Gmn (Γm )iF . Note that for all h ∈ H and V ∈ S(H) we have k∇Gh (V )kF ≤ 1. Furthermore, krn kF ≤ 2 and kξn+1 kF ≤ 2. Using the fact that (ξn ) is a sequence of martingale differences adapted to the filtration (Fn ), h i E kVn+1 − Γm k2F |Fn ≤ kVn − Γm k2F − 2γn hVn − Γm , ∇mn G (Vn ) − ∇mn G (Γm )iF + 28γn2 − 2γn hrn , Vn − Γm iF . Let αn = n−β , with β ∈ (1 − α, α), we have h i E kVn+1 − Γm k2F |Fn ≤ (1 + γn αn ) kVn − Γm k2F − 2γn hVn − Γm , ∇mn G (Vn ) − ∇mn G (Γm )iF (24) γn + 28γn2 + krn k2F . αn Moreover, applying Lemma 5.1 and Theorem 5.1 in Godichon-Baggioni (2016), we get for all positive constant δ, ! 1+δ   (ln n) a.s. krn k2F = O kmn − mk2 = O n Thus, since 2γn hVn − Γm , ∇mn G (Vn ) − ∇mn G (Γm )iF ≥ 0, the Robbins-Siegmund Theorem (see Duflo (1997) for instance) ensures that kVn − Γm kF converges almost surely to a finite random variable and X γn hVn − Γm , ∇mn G (Vn ) − ∇mn G (Γm )iF < +∞ a.s. n≥1 Furthermore, by induction, inequality (24) becomes ! ∞ h i h i Y 2 E kVn+1 − Γm kF ≤ (1 + γk αk ) E kV1 − Γm k2F + 28 k=1 + ∞ Y k=1 ∞ Y k=1 ! (1 + γk αk ) ∞ X γk2 k=1 ∞ i X γk h E krk k2F . (1 + γk αk ) αk ! k=1 Since β < α, applying Theorem 4.2 in Godichon-Baggioni (2016) and Lemma 6.1, there is a positive constant C0 such that ∞ ∞ i X X γk h E krk k2F = C0 k −α−1−β < +∞. αk k=1 k=1 21 h i Thus, there is a positive constant M such that for all n ≥ 1, E kVn − Γm k2F ≤ M . Since mn converges almost surely to m, one can conclude the proof of the almost sure consistency of Vn with the same arguments as in the proof of Theorem 3.1 in Cardot et al. (2013) and the convexity properties given in the Section B of the supplementary file. Finally, the almost sure consistency of V n is obtained by a direct application of Topelitz’s lemma (see e.g. Lemma 2.2.13 in Duflo (1997)). 5.2 Proof of Theorem 3.3 The proof of Theorem 3.3 relies on properties of the p-th moments of Vn for all p ≥ 1 given in the following three Lemmas. These properties enable us, with the application of Markov’s inequality, to control the probability of the deviations of the Robbins Monro algorithm from Γm . Lemma 5.2. Under assumptions 1-3(b), for all integer p, there is a positive constant Mp such that for all n ≥ 1, i h E kVn − Γm k2p F ≤ Mp . Lemma 5.3. Under assumptions 1-3(b), there are positive constants C1 , C10 , C2 , C3 such that for all n ≥ 1, h i h i C2 0 1−α sup E kVk − Γm k4 , E kVn − Γm k2 ≤ C1 e−C1 n + α + C3 n E(n/2)+1≤k≤n−1 where E(x) is the integer part of the real number x. Lemma 5.4. Under assumptions 1-3(b), for all integer p0 ≥ 1, there are a rank np0 and positive constants C1,p0 , C2,p0 , C3,p0 , cp0 such that for all n ≥ np0 , h i   h i C 0 i C2,p0 h C3,p0 − 1−α 1,p E kVn+1 − Γm k4F ≤ 1 − cp0 γn n p0 E kVn − Γm k4F + 3α + 2α E kVn − Γm k2F + 1−α . 3α−3 n n p0 n We can now prove Theorem 3.3. Let us choose an integer p0 such that p0 > 3/2. Thus, 2 + α − 3 1−α ≥ 3α, and p0 applying Lemma 5.4, there are positive constants C1,p0 , C2,p0 , cp0 and a rank np0 such that for all n ≥ np0 , h i   h i C 0 i C2,p0 h − 1−α 1,p E kVn+1 − Γm k4F ≤ 1 − cp0 γn n p0 E kVn − Γm k4F + 3α + 2α E kVn − Γm k2F . n n (25) 1−α 1−α 0 0 Let us now choose β ∈ (α, 2α) and p such that p > 2α−β . Note that 3α −β > α + p0 . One can check that there is a rank n0p0 ≥ np0 such that for all n ≥ n0p0 , 1 1 + C3 2β+1 ≤ 1, 2 (n + 1)β−α    n + 1 β C1,p0 + C2,p0 − 1−α 0 1 − cp0 γn n p + 23α ≤ 1. n (n + 1)3α−β 0 1−α (n + 1)α C1 e−C1 n + 22 With the help of a strong induction, we are going to prove the announced results, that is to say that there are positive constants Cp0 , Cβ such that 2Cp0 ≥ Cβ ≥ Cp0 ≥ 1 and Cp0 ≥ 2α+1 C2 (with C2 defined in Lemma 5.3), such that for all n ≥ 1, h i C0 p E kVn − Γm k2F ≤ α , n h i C β E kVn − Γm k4F ≤ β . n First, let us choose Cp0 and Cβ such that n h io 2 α Cp0 ≥ max k E kV − Γ k , m k F 0 k≤np0  Cβ ≥ max 0 k≤np0 β  k E Vn0 0 − Γm p 4  . F Thus, for all k ≤ n0p0 , h i C0 p E kVk − Γm k2F ≤ α , k h i C β E kVk − Γm k4F ≤ β . k We suppose from now that n ≥ n0p0 and that previous inequalities are verified for all k ≤ n − 1. Applying Lemma 5.2 and by induction, n h io h i C2 0 1−α sup E kVk − Γm k4F E kVn+1 − Γm k2F ≤ C1 e−C1 n + α + C3 n E((n+1)/2)+1≤k≤n   Cβ C2 −C10 n1−α ≤ C1 e + α + C3 sup n kβ E((n+1)/2)+1≤k≤n 0 ≤ C1 e−C1 n 1−α + Cβ C2 + C3 2 β β . α n n Since 2Cp0 ≥ Cβ ≥ Cp0 ≥ 1 and since Cp0 ≥ 2α+1 C2 , factorizing by h E kVn+1 − Γm k2F i Cp0 (n+1)α , 1 β 2Cp0 + C 2 3 nα nβ  α Cp0 Cp 0 Cp 0 n C3 2β+1 α −C10 n1−α −α ≤ (n + 1) C e + 2 + 1 (n + 1)α n+1 2(n + 1)α (n + 1)β−α (n + 1)α Cp0 Cp0 1 Cp 0 1 0 1−α ≤ C1 (n + 1)α e−C1 n + + C3 2β+1 α α β−α (n + 1) 2 (n + 1) (n + 1)α (n + 1)   Cp 0 1 1 0 1−α ≤ (n + 1)α C1 e−C1 n . + + C3 2β+1 β−α 2 (n + 1)α (n + 1) 0 1−α ≤ Cp0 C1 e−C1 n + Cp0 2−α−1 By definition of n0p0 , Cp 0 . (26) (n + 1)α In the same way, applying Lemma 5.4 and by induction, h i   h i C 0 i C2,p0 h − 1−α 1,p E kVn+1 − Γm k4F ≤ 1 − cp0 γn n p0 E kVn − Γm k4F + 3α + 2α E kVn − Γm k2F n n  C 0 0 Cp 0 C C − 1−α β 1,p 2,p ≤ 1 − cp0 γn n p0 + 3α + 2α α . n n n nβ h i E kVn+1 − Γm k2F ≤ 23 Since Cβ ≥ Cp0 ≥ 1, factorizing by Cβ , (n+1)β h i    Cβ − 1−α Cβ E kVn+1 − Γm k4F ≤ 1 − cp0 γn n p0 + C1,p0 + C2,p0 3α β n n  β  1−α  C C Cβ n+1 − β 1,p0 + C2,p0 ≤ 1 − cp0 γn n p0 + 23α β 3α−β n n (n + 1) (n + 1)β !    n + 1 β C1,p0 + C2,p0 Cβ − 1−α 0 p + 23α ≤ 1 − cp0 γn n . 3α−β n (n + 1) (n + 1)β By definition of n0p0 , h i E kVn+1 − Γm k4F ≤ Cβ , (n + 1)β (27) which concludes the induction and the proof. 5.3 Proof of Theorem 3.5 In order to prove Theorem 3.5, we first recall the following Lemma. Lemma 5.5 (Godichon-Baggioni (2016)). Let Y1 , ..., Yn be random variables taking values in a normed vector space such that for all positive constant q and for all k ≥ 1, E [kYk kq ] < ∞. Then, for all real numbers a1 , ..., an and for all integer p, we have " n !p p# n X X p p1 E (28) ak Yk ≤ |ak | (E [kYk k ]) k=1 k=1 We can now prove Theorem 3.5. Let us rewrite decomposition (34) as follows ∇2m G (Γm ) (Vn − Γm ) = Tn Tn+1 − + ξn+1 − rn − rn0 − δn , γn γn (29) with Tn := Vn −Γm . As in Pelletier (2000), we sum these equalities, apply Abel’s transform and divide by n to get ∇2m G (Γm ) V n − Γm  1 = n n T1 Tn+1 X − + Tk γ1 γn+1 k=2  1 1 − γk γk−1  − n X k=1 δk − n X k=1 rk − n X rk0 k=1 We now bound the quadratic   mean of each term at the right-hand side of previous equality. 2  T1 1 First, we have n2 E γ1 = o n1 . Applying Theorem 3.3, F 1 E n2 " Tn+1 γn 2 F # 1 C 0 c−2 γ ≤ 2 −α = o n n   1 . n −1 Moreover, since γk−1 − γk−1 ≤ 2αcγ−1 k α−1 , the application of Lemma 5.5 and Theorem 3.3 24 + n X k=1 ! ξk+1 . gives  1  E n2 n X 2 γk−1 − −1 γk−1  Tk k=2 F  n X ≤ 1 n2 γk−1 − −1 γk−1 ! r h i 2 2 E kTk kF k=2 1 0 ≤ 2 4α2 c−2 γ C n   1 =O n2−α   1 =o , n n X k=2 1 !2 k 1−α/2 since α < 1. In the same way, since kδn kF ≤ 6C kTn k2F , applying Lemma 5.5 and Theorem 3.3 with β > 1,   ! 2 n n r h i 2 X X 1  1 2 E E kδk kF δk  ≤ 2 n2 n k=1 k=1 F ! n r h i 2 36C 2 X ≤ E kTk k4F n2 k=1 !2 n 36C 2 Cβ X 1 ≤ n2 k β/2 k=1   1 =O nβ   1 =o , n  √ p C + C kΓm kF . Since krn kF ≤ D kmn − mk, and since there Moreover, let D := 12 h i is a positive constant C 00 such that for all n ≥ 1, E kmn − mk2 ≤ C 00 n−1 ,  n 1  X E rk n2 k=1 2 F  n X ≤ 1 n2 ≤ ≤ ! r h i 2 2 E krk kF k=1 D2 n2 n X ! r h i 2 E kmn − mk k=1 D2 C 00 n2   1 =O . n n X 1 1/2 k k=1 !2 Since krn0 kF ≤ C0 kmn − mk kVn − Γm k2F with C0 := 12 C 25 p  kΓm kF + C 3/4 , Cauchy- Schwarz’s inequality and Lemma 5.5 give   ! 2 n r h n i 2 X X 1  1 2 0 E E krn0 kF rn  ≤ 2 n2 n k=1 k=1 F ! r h i 2 E kmn − mk2 kVn − Γm k2F C2 ≤ 20 n n X C2 ≤ 20 n n  h i 1  h i 1 X 4 4 E kVn − Γm k4F E kmn − mk4 k=1 !2 . k=1 Applying Theorem 4.2 in Godichon-Baggioni (2016) and Theorem 3.3,   !2 p √ 2 n n X C02 Cβ K2 X 1  1 0 E rn  ≤ n2 n2 k β/4+1/2 k=1 k=1 F   1 =O n1+β/2   1 =o , n h i since β > 0. Finally, one can easily check that E kξn+1 k2F ≤ 1, and since (ξn ) is a sequence of martingale differences adapted to the filtration (Fn ),   ! 2 n n n n h i X X X X 1  1 E E kξk+1 k2F + 2 ξk+1  = 2 E [hξk+1 , ξk0 +1 iF ] n2 n 0 =k+1 k=1 k=1 k=1 k F ! n n n iE i i hD h X X 1 X h E kξk+1 k2F + 2 E ξk+1 , E ξk0 +1 Fk0 = 2 n F 0 = 1 n2 k=1 n X k=1 k =k+1 h i E kξk+1 k2F k=1 1 ≤ . n Thus, there is a positive constant K such that for all n ≥ 1, h  2i K E ∇2m G (Γm ) V n − Γm F ≤ . n Let λmin be the smallest eigenvalue of ∇2m G (Γm ). We have, with Proposition B.1 in the supplementary file, that λmin > 0 and the announced result is proven, h i K 2 E V n − Γm F ≤ 2 . λmin n 6 Concluding remarks The simulation study and the illustration on real data indicate that performing robust principal components analysis via the median covariation matrix, which can bring new 26 information compared to classical PCA, is an interesting alternative to more classical robust principal components analysis techniques. The use of recursive algorithms permits to perform robust PCA on very large datasets, in which outlying observations may be hard to detect. Another interest of the use of such sequential algorithms is that estimation of the median covariation matrix as well as the principal components can be performed online with automatic update at each new observation and without being obliged to store all the data in memory. A simple modification of the averaged stochastic gradient algorithm is proposed that ensures non negativeness of the estimated covariation matrices. This modified algorithms has better performances on our simulated data. A deeper study of the asymptotic behaviour of the recursive algorithms would certainly deserve further investigations. Proving the asymptotic normality and obtaining the limiting variance of the sequence of estimators V n when m is unknown would be of great interest. This is a challenging issue that is beyond the scope of the paper and would require to study the joint weak convergence of the two simultaneous recursive averaged estimators of m and Γm . The use of the MCM could be interesting to robustify the estimation in many different statistical models, particularly with functional data. For example, it could be employed as an alternative to robust functional projection pursuit in robust functional time series prediction or for robust estimation in functional linear regression, with the introduction of the median cross-covariation matrix. Acknowledgements. We thank the company Médiamétrie for allowing us to illustrate our methodologies with their data. We also thank Dr. Peggy Cénac for a careful reading of the proofs. A Estimating the median covariation matrix with Weiszfeld’s algorithm Suppose we have a fixed size sample X1 , . . . , Xn and we want to estimate the geometric median. The iterative Weiszfeld’s algorithm relies on the fact that the solution m∗n of the following optimization problem n X min kXi − µk µ∈H satisfies, when m∗n i=1 6= Xi , for all i = 1, . . . , n m∗n = n X wi (m∗n ) Xi i=1 where the weights wi (x) are defined by wi (x) = kXi − xk−1 . n X −1 kXj − xk j=1 27 Weiszfeld’s algorithm is based on the following iterative scheme. Consider first a pilot (e+1) estimator m b (0) of m. At step (e), a new approximation m bn to m is given by m b (e+1) n = n X   wi m b (e) Xi . n (30) i=1 (e+1) (e) The iterative procedure is stopped when m bn −m b n ≤ , for some precision  known in advance. The final value of the algorithm is denoted by m b n. b (e) has been calculated at The estimator of the MCM is computed similarly. Suppose Γ b (e+1) to Γm is defined by step (e), then at step (e + 1), the new approximation Γ b (e+1) Γ = n n X   b (e) (Xi − m b n )(Xi − m b n )T . Wi Γ (31) i=1 b (e+1) − Γ b (e) The procedure is stopped when Γ ≤ , for some precision  fixed in advance. F Note that by construction, this algorithm leads to an estimated median covariation matrix that is always non negative. B Convexity results In this section, we first give and recall some convexity properties of functional Gh . The following one gives some information on the spectrum of the Hessian of G. Proposition B.1. Under assumptions 1-3(b), for all h ∈ H and V ∈ S(H), S(H) admits an orthonormal basis composed of eigenvectors of ∇2h G(V ). Let us denote by {λh,V,i , i ∈ N} the set of eigenvalues of ∇2h G(V ). For all i ∈ N, 0 ≤ λh,V,i ≤ C. Moreover, there is a positive constant cm such that for all i ∈ N, 0 < cm ≤ λm,Γm ,i ≤ C. Finally, by continuity, there are positive constants , 0 such that for all h ∈ B (m, ) and V ∈ B (Γm , 0 ), and for all i ∈ N, 1 cm ≤ λh,V,i ≤ C. 2 The proof is very similar to the one in Cardot et al. (2013) and consequently it is not given here. Furthermore, as in Cardot et al. (2016), it ensures the local strong convexity as shown in the following corollary. Corollary B.2. Under assumptions 1-3(b), for all positive constant A, there is a positive constant cA such that for all V ∈ B (Γm , A) and h ∈ B (m, ), h∇h G(V ) − ∇h G(Γm ), V − Γm iH ≥ cA kV − Γm k2F . 28 Finally, the following lemma gives an upper bound on the remainder term in the Taylor’s expansion of the gradient. Lemma B.3. Under assumptions 1-3(b), for all h ∈ H and V ∈ S(H), ∇Gh (V ) − ∇Gh (Γm ) − ∇2h G (Γm ) (V − Γm ) F ≤ 6C kV − Γm k2F . (32) Proof of Lemma B.3. Let δV,h := ∇Gh (V ) − ∇Gh (Γm ) − ∇2h G (Γm ) (V − Γm ), since R1 ∇Gh (V ) − ∇Gh (Γm ) = 0 ∇2h G (Γm + t (V − Γm )) (V − Γm ) dt, we have Z kδV,h kF = 1 ∇2h G (Γm + t (V − Γm )) ((V − Γm ) dt − ∇2h G (Γm ) (V − Γm ) 0 1 Z F ∇2h G (Γm + t (V − Γm )) ((V − Γm ) − ∇2h G (Γm ) (V − Γm ) ≤ 0 F dt. As in the proof of Lemma 5.1 in Cardot et al. (2016), under assumptions 1-3(b), one can check that for all h ∈ H, and t ∈ [0, 1], ∇2h G (Γm + t (V − Γm )) ((V − Γm ) − ∇2h G (Γm ) (V − Γm ) F ≤ 6C kV − Γm k2F , which concludes the proof. C Decompositions of the Robbins-Monro algorithm and proof of Lemma 5.1 Let us recall that the Robbins-Monro algorithm is defined recursively by Vn+1 = Vn + γn (Xn+1 − mn ) (Xn+1 − mn )T − Vn (Xn+1 − mn ) (Xn+1 − mn )T − Vn F = Vn − γn Un+1 , T (Xn+1 −mn )(Xn+1 −mn ) −Vn . Let us remark that ξn+1 := ∇mn G(Vn ) − k(Xn+1 −mn )(Xn+1 −mn )T −Vn kF Un+1 , (ξn ) is a sequence of martingale differences adapted to the filtration (Fn ) and the algorithm can be written as follows with Un+1 := − Vn+1 = Vn − γn (∇Gmn (Vn ) − ∇Gmn (Γm )) + γn ξn+1 − γn rn , (33) with rn := ∇Gmn (Γm ) − ∇Gm (Γm ). Finally, let is consider the following linearization of the gradient,  Vn+1 − Γm = IS(H) − γn ∇2m G(Γm ) (Vn − Γm ) + γn ξn+1 − γn rn − γn rn0 − γn δn , with  rn0 := ∇2mn G (Γm ) − ∇2m G (Γm ) (Vn − Γm ) , δn := ∇Gmn (Vn ) − ∇Gmn (Γm ) − ∇2mn G (Γm ) (Vn − Γm ) . 29 (34) Proof of Lemma 5.1. The bound of kδn k is a corollary of Lemma B.3. Bounding krn k Let us recall that for all h ∈ H, Y (h) := (X − h) (X − h)T . We now define for all h ∈ H the random function ϕh : [0, 1] −→ S(H) defined for all t ∈ [0, 1] by Y (m + th) − Γm . kY (m + th) − Γm kF i h Note that rn = E ϕmn −m (0) − ϕmn −m (1) Fn . Thus, by dominated convergence, ϕh (t) := krn kF ≤ sup E h 0 ϕm (t) n −m t∈[0,1] F i Fn . Moreover, one can check that for all h ∈ H, h (X − m − th)T (X − m − th) hT − kY (m + th) − Γm kF kY (m + th) − Γm kF D E Y (m + th) − Γm + Y (m + th) − Γm , h (X − m − th)T F kY (m + th) − Γm k3 F Y (m + th) − Γm T . + Y (m + th) − Γm , (X − m − th) h F kY (m + th) − Γm k3F ϕ0h (t) = − We now bound each term on the right-hand side of previous equality. First, applying Cauchy-Schwarz’s inequality and using the fact that for all h, h0 ∈ H, hh0T F = khk kh0 k,  E h (X − m − th)T  F kY (m + th) − Γm kF Thus, since E h  kX − m − thk kY (m + th) − Γm kF # " p kY (m + th)kF ≤ khk E kY (m + th) − Γm kF " # " #! p kΓm kF 1 ≤ khk E +E p . kY (m + th) − Γm kF kY (m + th) − Γm kF 1 kY (m+th)−Γm kF  E   ≤ khk E i ≤ C, h (X − m − th)T  F kY (m + th) − Γm kF  q  √  ≤ khk C kΓm k + C . F (35) In the same way, " (X − m − th) hT F E kY (m + th) − Γm kF #   q √ ≤ khk C kΓm kF + C . 30 (36) Applying Cauchy-Schwarz’s inequality, " E D Y (m + th) − Γm , h (X − m − th)T Thus, since E h 1 kY (m+th)−Γm kF i kY (m + th) − Γm kF E F  # h (X − m − th)T  F kY (m + th) − Γm kF   kX − m − thk ≤ khk E kY (m + th) − Γm kF " p # kY (m + th)kF ≤ khk E . kY (m + th) − Γm kF ≤ E kY (m + th) − Γm k3F ≤ C, and since for all positive constants a, b, √ a+b ≤ √ a+ √ b, " p # " # " #! p kY (m + th)kF kΓm kF 1 khk E ≤ khk E +E p kY (m + th) − Γm kF kY (m + th) − Γm kF kY (m + th) − Γm kF   q √ ≤ khk C kΓm kF + C . Finally, " D E Y (m + th) − Γm , h (X − m − th)T E kY (m + th) − Γm kF F # kY (m + th) − Γm k3F  q  √ ≤ khk C kΓm kF + C , (37) " E Y (m + th) − Γm , (X − m − th) hT kY (m + th) − Γm kF F kY (m + th) − Γm k3F #   q √ ≤ khk C kΓm kF + C . (38) Applying inequalities (35) to (38) with h = mn − m, the announced result is proven,   q √ krn kF ≤ 4 C + C kΓm kF kmn − mk . Bounding krn0 k For all h ∈ H and V ∈ S(H), we define the random function ϕh,V : [0, 1] −→ S(H) such that for all t ∈ [0, 1], ! 1 (Y (m + th) − Γm ) ⊗F (Y (m + th) − Γm ) IS(H) − ϕh,V (t) := (V ) . kY (m + th) − Γm kF kY (m + th) − Γm k2F h i Note that rn0 = E ϕmn −m,Vn −Γm (1) − ϕmn −m,Vn −Γm (0) Fn . By dominated convergence, rn0 F ≤ sup E t∈[0,1] h ϕ0mn −m,Vn −Γm (t) F i Fn . Moreover, as for the bound of krn k, one can check, with an application of Cauchy-Schwarz’s 31 inequality, that for all h ∈ H, V ∈ S(H), and t ∈ [0, 1], ϕ0h,V (t) ≤ 6 +6 kY (m + th) − Γm kF hT (X − m − th) kY (m + th) − Γm kF h(X − m − th)T kY (m + th) − ≤ 12 F kV kF F k(Y (m + th) − Γm ) ⊗F (Y (m + th) − Γm ) (V )kF kY (m + th) − Γm k3F h(X − m − th)T F kY (m + th) − Γm k2F Γm k5F kV kF . Finally, " E h(X − m − th)T kY (m + th) − F 2 Γm kF # kV kF " # khk kX − m − thk ≤E kV kF kY (m + th) − Γm k2F " # p kΓm kF ≤ khk kV kF E kY (m + th) − Γm k2F # " 1 + khk kV kF E 3/2 kY (m + th) − Γm kF  q  ≤ C kΓm kF + C 3/4 khk kV kF . (39) Then the announced result follows from an application of inequality (39) with h = mn − m and V = Vn − Γm ,   q 3/4 0 kmn − mk kVn − Γm kF . rn ≤ 12 C kΓm kF + C D Proofs of Lemma 5.2, 5.3 and 5.4 Proof of Lemma 5.2. Using decomposition (33), kVn+1 − Γm k2F = kVn − Γm k2F − 2γn hVn − Γm , ∇Gmn (Vn ) − ∇Gmn (Γm )iF + γn2 k∇Gmn (Vn ) − ∇Gmn (Γm )k2F + γn2 kξn+1 k2F + 2γn hVn − Γm − γn (∇Gmn (Vn ) − ∇Gmn (Γm )) , ξn+1 iF + γn2 krn k2F − 2γn hrn , Vn − Γm iF − 2γn2 hrn , ξn+1 − ∇Gmn (Vn ) + ∇Gmn (Γm )iF . Note that for all h ∈ H and V ∈ S(H) we have k∇Gh (V )kF ≤ 1. Moreover, krn kF ≤ 2 and kξn+1 kF ≤ 2. Since for all h ∈ H, Gh is a convex function, we get with Cauchy-Schwarz’s inequality, kVn+1 − Γm k2F a ≤ kVn − Γm k2F + 36γn2 + 2γn hξn+1 , Vn − Γm iF − 2γn hrn , Vn − Γm iF . (40)  √ p Let C 0 := 4 C + C kΓm kF , let us recall that krn kF ≤ C 0 kmn − mk. We now prove by induction that for all h i integer p ≥ 1, there is a positive constant Mp such that for all 2p n ≥ 1, E kVn − Γm kF ≤ Mp . 32 The case p = 1 has been studied in the proof of Theorem 3.2. Let p ≥ 2 and suppose from now that for all k ≤ p − 1, there is a positive constant Mk such that for all n ≥ 1, h i E kVn − Γm k2k ≤ Mk . F h i Bounding E kVn − Γm k2p F . Let us apply inequality (40), for all p ≥ 2 and use the fact that (ξn ) is a sequence of martingales differences adapted to the filtration (Fn ), h i h p i 2 2 E kVn+1 − Γm k2p ≤ E kV − Γ k + 36γ + 2γ kr k kV − Γ k n m F n n F n m F n F    p  p−k  X p k 2 2 E (2γn hVn − Γm , ξn+1 iF ) kVn − Γm kF + 36γn + 2γn krn kF kVn − Γm kF . + k k=2 (41) Let us denote by (∗) the second term on the right-hand side of inequality (41). Applying Cauchy-Schwarz’s inequality and since kξn+1 kF ≤ 2, n     p−k  X p k 2 2 (∗) = E (2γn hVn − Γm , ξn+1 i) kVn − Γm kF + 36γn + 2γn krn kF kVn − Γm kF k k=2  p    p−k  X p 2k k k 2 2 ≤ 2 γn E kVn − Γm kF kVn − Γm kF + 36γn + 2γn krn kF kVn − Γm kF . k k=2 With the help of Lemma E.1, (∗) ≤ p X p h i i X h 22k 3p−k−1 36p−k γn2p−k E kVn − Γm kkF 22k 3p−k−1 γnk E kVn − Γm kF2p−k + k=2 k=2 + p X i h p p−k p+k p−k−1 p 2 3 γn E krn kF kVn − Γm kF . k=2 Applying Cauchy-Schwarz’s inequality, p X p i X h i h p+1−k p−1 2k p−k−1 k kV − Γ k = 2 3 γ E kV − Γ k 22k 3p−k−1 γnk E kVn − Γm k2p−k n m F n m F n F k=2 k=2 ≤ p X 22k 3p−k−1 γnk r h ir h i 2(p−1) 2(p+1−k) E kVn − Γm kF E kVn − Γm kF . k=2 By induction, p X 22k 3p−k−1 γnk E p h i X p p 2p−k kVn − Γm kF ≤ 22k 3p−k−1 γnk Mp−1 Mp+1−k k=2 k=2  = O γn2 . 33 (42) In the same way, applying Cauchy-Schwarz’s inequality and by induction, p X 2k p−k−1 2 3 36p−k γn2p−k E h kVn − Γm kkF i = k=2 p X h i 22k 3p−k−1 36p−k γn2p−k E kVn − Γm kF kVn − Γm kk−1 F k=2 ≤ p X 22k 3p−k−1 36p−k γn2p−k p p M1 Mk−1 k=2  = O γn2 , (43) since p ≥ 2. Similarly, since krn kF ≤ 2 and since p ≥ 2, applying Cauchy-Schwarz’s inequality and by induction, p X 2p+k 3p−k−1 γnp E h krn kp−k F kVn − Γm kpF i ≤ k=2 p X   22p 3p−k−1 γnp E kVn − Γm kpF k=2 ≤ p X 22p 3p−k−1 γnp p p M1 Mp−1 k=2  = O γn2 . (44) Finally, applying inequalities (42) to (44), there is a positive constant A01 such that for all n ≥ 1, " p   #  p−k X p k 2 2 E (2γn hVn − Γm , ξn+1 iF ) kVn − Γm kF + 36γn + 2γn krn kF kVn − Γm kF ≤ A01 γn2 . k k=2 (45) We now denote by (∗∗) the first term at the right-hand side of inequality (41). With the help of Lemma E.1 and applying Cauchy-Schwarz’s inequality, p   h i X h i k p 2p E 36γn2 + 2γn hrn , Vn − Γm iF kVn − Γm kF2p−2k (∗∗) ≤ E kVn − Γm kF + k k=1  p i X p h  i h 2p . 2k−1 E 36k γn2k + 2k γnk krn kkF kVn − Γm kkF kVn − Γm k2p−2k ≤ E kVn − Γm kF + F k k=1 Moreover, let p    i X p k−1 h k 2k (∗ ∗ ∗) := 2 E 36 γn + 2k γnk krn kkF kVn − Γm kkF kVn − Γm k2p−2k F k k=1  p p   h i X i X p p 2k−1 k h 2p−2k k−1 k 2k = 2 36 γn E kVn − Γm kF + 2 γn E krn kkF kVn − Γm kF2p−k . k k k=1 k=1 By induction, p   p   i X X p k−1 k 2k h p k−1 k 2k 2p−2k 2 36 γn E kVn − Γm kF = 2 36 γn Mp−k k k k=1 k=1  = O γn2 . 34 Moreover, p   p   i i X X p 2k−1 k h p 2k−1 k h 2p−k k 2 γn E krn kkF kVn − Γm kF2p−k = 2 γn E krn kF kVn − Γm kF k k k=2 k=1 h i + 2pγn E krn kF kVn − Γm k2p−1 . F Applying Cauchy-Schwarz’s inequality and by induction, since krn kF ≤ 2, p   p   i i X X p 3k−1 k h p 2k−1 k h 2p−k k 2 γn E kVn − Γm kF2p−k ≤ 2 γn E krn kF kVn − Γm kF k k k=2 k=2 p   X p p 3k−1 k p 2 γn Mp+1−k Mp−1 ≤ k k=2  = O γn2 . Moreover, applying Theorem 4.2 in Godichon-Baggioni (2016) and Hölder’s inequality, since krn kF ≤ C 0 kmn − mk, h i h i 2p−1 0 ≤ 2C pγ E km − mk kV − Γ k 2pγn E krn kF kVn − Γm k2p−1 n n n m F F i 2p−1  h i 1  h 2p 2p ≤ 2C 0 pγn E kmn − mk2p E kVn − Γm k2p F 1 i 2p−1 Kp2p  h 2p . ≤ 2C pγn 1/2 E kVn − Γm k2p F n 0 Finally, 1 1 n h i 2p−1 io Kp2p  h Kp2p 2p 2p 0 2C pγn 1/2 E kVn − Γm kF ≤ 2C 0 pγn 1/2 max 1, E kVn − Γm k2p F n n 1 i h Kp2p  . ≤ 2C 0 pγn 1/2 1 + E kVn − Γm k2p F n Thus, there are positive constants A000 , A001 such that   h i 1 1 00 (∗∗) ≤ 1 + A000 α+1/2 E kVn − Γm k2p F + A1 α+1/2 . n n (46) Finally, thanks to inequalities (45) and (46), there are positive constants A00 , A01 such that  h h i  i 1 1 2p 0 0 E kVn+1 − Γm kF ≤ 1 + A0 α+1/2 E kVn − Γm k2p F + A1 α+1/2 n n     n n n h i Y X Y 1 1 1 0 0 ≤ 1 + A00 α+1/2 E kV1 − Γm k2p + 1 + A 0 α+1/2 A1 α+1/2 F k j k k=1 k=1 j=k+1  h X ∞  ∞  ∞ i Y Y 1 1 1 2p 0 0 ≤ 1 + A0 α+1/2 E kV1 − Γm kF + 1 + A0 α+1/2 A01 α+1/2 k j k j=1 k=1 k=1 ≤ Mp , which concludes the induction and the proof. 35 Proof of Lemma 5.3. Let us define the following linear operators: αn := IS(H) − γn ∇2m G(Γm ), βn := n Y αk = k=1 n Y  IS(H) − γk ∇2m G(Γm ) , k=1 β0 := IS(H) . Using decomposition (34) and by induction, for all n ≥ 1, Vn − Γm = βn−1 (V1 − Γm ) + βn−1 Mn − βn−1 Rn − βn−1 Rn0 − βn−1 ∆n , (47) with Mn := Rn0 := n−1 X γk βk−1 ξk+1 , Rn := k=1 n−1 X γk βk−1 rk0 , ∆n := k=1 n−1 X k=1 n−1 X γk βk−1 rk , γk βk−1 δk . k=1 We now study the asymptotic behavior of the linear operators βn and βn−1 βk−1 . As in Cardot et al. (2013), one can check that there are positive constants c0 , c1 such that for all integers k, n ≥ 1 with k ≤ n − 1, kβn−1 kop ≤ c0 e−λmin Pn k=1 γn βn−1 βk−1 , op ≤ c1 e−λmin Pn j=k γj , (48) where k.kop is the usual spectral norm for linear operators. We now bound the quadratic mean of each term in decomposition (47). Step 1: the quasi deterministic term βn−1 (V1 − Γm ). Applying inequality (48), there is a positive constant c00 such that h i h i E kβn−1 (V1 − Γm )k2F ≤ kβn−1 k2op E kV1 − Γm k2F h i Pn ≤ c0 e−2λmin k=1 γn E kV1 − Γm k2F h i 0 1−α ≤ c0 e−c0 n E kV1 − Γm k2F . (49) This term converges exponentially fast to 0. Step 2: the martingale term βn−1 Mn . Since (ξn ) is a sequence of martingale differences adapted to the filtration (Fn ), h i n−1 X h 2 E kβn−1 Mn kF = E βn−1 βk−1 γk ξk+1 2 F i 2 βn−1 βk−1 γk ξk+1 F i +2 = h E +2 n−1 X n−1 X n−1 X k=1 k0 =k+1 k=1 = n−1 X γk γk 0 E  γk γk 0 E  βn−1 βk−1 ξk+1 , βn−1 βk−1 0 ξk 0 +1  F k=1 k0 =k+1 k=1 n−1 X n−1 X h E βn−1 βk−1 γk ξk+1 2 F i k=1 36 . βn−1 βk−1 ξk+1 , βn−1 βk−1 0 E [ξk 0 +1 |Fk 0 ]  F Moreover, as in Cardot et al. (2016), Lemma E.2 ensures that there is a positive constant C10 such that for all n ≥ 1, h i C0 E kβn−1 Mn k2F ≤ α1 . (50) n Step 3: the first remainder √ termpβn−1 Rn . C + C kΓm kF kmn − mk, Remarking that krn kF ≤ 4  h n−1 X i E kβn−1 Rn k2F ≤ E  !2  γk βn−1 βk−1 op krk kF  k=1  ≤ 16 √  2 n−1 q X  C + kΓm kF E γk βn−1 βk−1 !2  op kmk − mk . k=1 Applying Lemma 4.3 and Theorem 4.2 in Godichon-Baggioni (2016), h E kβn−1 Rn k2F i ≤ 16  √ 2 q C + C kΓm kF n−1 X γk βn−1 βk−1 op ! r h i 2 2 E kmk − mk k=1 ≤ 16  √ 2 q C + C kΓm kF K1 n−1 X γk βn−1 βk−1 op k=1 1 !2 . k 1/2 Applying inequality (48), h i E kβn−1 Rn k2F ≤ 16 √ p 2 C + C Γm K1 n−1 X γk e− Pn γk e − Pn j=k γj ≤ 16 p 2 C + C Γm K1 n X !2 k 1/2 k=1 √ 1 j=k k=1 γj 1 k 1/2 !2 . Splitting the sum into two parts and applying Lemma E.2, we have  2  2 E(n/2) q h i Pn X √ 1 E kβn−1 Rn k2F ≤ 32 C + C kΓm kF K1  γk e− j=k γj 1/2  k k=1  2 2  n q Pn X √ 1 C + C kΓm kF K1  γk e− j=k γj 1/2  + 32 k k=E(n/2)+1   1 =O . n Thus, there is a positive constant C20 such that for all n ≥ 1, h i C0 E kβn−1 Rn k2F ≤ 2 . n (51) Step 4: the second remainder term βn−1 Rn0 . Let us recall that for all n ≥ 1, krn0 kF ≤ 12D kmn − mk kVn − Γm kF with D := 37 C p kΓm kF + C 3/4 . Thus,  n−1 h i X 2 E βn−1 Rn0 F ≤ E  γk βn−1 βk−1 !2  op rk0  F k=1  n−1 X ≤ 144D2 E  !2  γk βn−1 βk−1 op kmk − mk kVk − Γm kF . k=1 Applying Lemma 4.3 in Godichon-Baggioni (2016), h E 2 βn−1 Rn0 F i ≤ 144D 2 n−1 X γk βn−1 βk−1 op ! r h i 2 2 2 E kmk − mk kVk − Γm kF . k=1 h i Thanks to Lemma 5.2, there is a positive constant M2 such that for all n ≥ 1, E kVn − Γm k4F ≤ M2 . Thus, applying Cauchy-Schwarz’s inequality and Theorem 4.2 in Godichon-Baggioni (2016), h E βn−1 Rn0 2 F i ≤ 144D2 n−1 X γk βn−1 βk−1  h i 1 i 1  h 4 4 4 4 E km E kV − Γ k − mk m F k k op !2 k=1 p ≤ 144D M2 K2 2 n−1 X γk βn−1 βk−1 op k=1 !2 1 k 1/2 . As in step 3, splitting the sum into two parts, one can check that there is a positive constant C100 such that for all n ≥ 1, h i C 00 2 E βn−1 Rn0 F ≤ 1 . (52) n Step 5: the third remainder term: βn−1 ∆n Since kδn kF ≤ 6C kVn − Γm k2F , applying Lemma 4.3 in Godichon-Baggioni (2016),  !2  n−1 h i X E kβn−1 ∆n k2F ≤ E  γk βn−1 βk−1 op kδk kF  k=1  ≤ 36C 2 E  n−1 X !2  γk βn−1 βk−1 op kVk − Γm k2F  k=1 ≤ 36C 2 n−1 X γk βn−1 βk−1 ! r h i 2 E kVk − Γm k4F . op k=1 h Γm k4F Thanks to Lemma 5.2, there is a positive constant M2 such that for all n ≥ 1, E kVn − Thus, splitting the sum into two parts and applying inequalities (48) and Lemma E.2, there 38 i ≤ M2 . are positive constant c00 , C20 such that for all n ≥ 1,  2 E(n/2) h i Pn X E kβn−1 ∆n k2 ≤ 72C 2 M22  γk e− j=k γj  F k=1 + 72C 2 sup E(n/2)+1≤k≤n−1 ≤ C20 sup E(n/2)+1≤k≤n−1  n h io E kVk − Γm k4F  n X 2 γk e− Pn j=k γj  k=E(n/2)+1 n h io   0 1−α E kVk − Γm k4F + O e−2c0 n . Thus, there is a positive constant C00 such that for all n ≥ 1, h i n h io 0 1−α + C20 sup E kβn−1 ∆n k2F ≤ C00 e−2c0 n E kVk − Γm k4F . (53) E(n/2)+1≤k≤n−1 Conclusion: Applying Lemma E.1 and decomposition (47), for all n ≥ 1, h i h i h i h i 2 2 2 2 E kVn − Γm kF ≤ 5E kβn−1 (V1 − Γm )kF + 5E kβn−1 Mn kF + 5E kβn−1 Rn kF h i h i 2 + 5E βn−1 Rn0 F + 5E kβn−1 ∆n k2F . Applying inequalities (49) to (53), there are positive constants C1 , C10 , C2 , C3 such that for all n ≥ 1, h i h i C2 0 1−α sup E kVk − Γm k4F . E kVn − Γm k2 ≤ C1 e−C1 n + α + C3 n E(n/2)+1≤k≤n−1 Proof of Lemma 5.4. Let us define Wn := Vn − Γm − γn (∇Gmn (Vn ) − ∇Gmn (Γm )) and use decomposition (33), kVn+1 − Γm k2F = kWn k2F + γn2 kξn+1 k2F + γn2 krn k2F + 2γn hξn+1 , Vn − Γm iF + 2γn2 hξn+1 , ∇Gmn (Vn )iF − 2γn2 hrn , ∇Gmn (Vn ) − ∇Gmn (Γm )iF − 2γn hrn , Vn − Γm iF . Since kξn+1 kF ≤ 2, krn kF ≤ 2 and the fact that for all h ∈ H, V ∈ S(H), ∇h G(V ) ≤ 1, we get with an application of Cauchy-Schwarz’s inequality kVn+1 − Γm k2F ≤ kWn k2F + 2γn hξn+1 , Vn − Γm iF + 2γn krn kF kVn − Γm kF + 20γn2 . Thus, since (ξn ) is a sequence of martingale differences adapted to the filtration (Fn ), and  since kWn k2F ≤ 1 + C 2 c2γ kVn − Γm k2F (this inequality follows from Proposition B.1 and from the fact that for all h ∈ H, Gh is a convex application), h i h i h i E kVn+1 − Γm k4F ≤ E kWn k4F + 2γn E krn kF kWn k2F kVn − Γm kF h i  + 40 1 + C 2 c2γ γn2 E kVn − Γm k2F h i h i + 4γn2 E hξn+1 , Vn − Γm i2F + 400γn4 + 40γn3 E krn kF kVn − Γm k2F i h + 4γn2 E krn k2F kVn − Γm k2F . 39 Since kξn+1 kF ≤ 2 and krn kF ≤ 2, applying Cauchy-Schwarz’s inequality, there are positive constants C10 , C20 such that for all n ≥ 1, h i h i h i C0 i C20 h 1 E kVn+1 − Γm k4F ≤ E kWn k4F +2γn E krn kF kWn k2F kVn − Γm kF + 3α + 2α E kVn − Γm k2F . n n (54) We now bound the two first terms at the right-hand side of inequality (54). h i Step 1: bounding E kWn k4F . R1 Since ∇Gmn (Vn )−∇Gmn (Γm ) = 0 ∇2mn G (Γm + t (Vn − Γm )) (Vn − Γm ) dt, applying Proposition B.1, one can check that kWn k2 = kVn − Γm k2F − 2γn hVn − Γm , ∇Gmn (Vn ) − ∇Gmn (Γm )iH + γn2 k∇Gmn (Vn ) − ∇Gmn (Γm )k2F  ≤ 1 + C 2 γn2 kVn − Γm k2F − 2γn hVn − Γm , ∇Gmn (Vn ) − ∇Gmn (Γm )iH .  Since for all h ∈ H, Gh is a convex application, kWn k2F ≤ 1 + c2γ C 2 kVn − Γm k2F . Let p0  be a positive integer. We now introduce the sequence of events An,p0 n∈N defined for all n ≥ 1 by n o 1−α An,p0 := ω ∈ Ω, kVn (ω) − Γm kF ≤ n p0 , and kmn (ω) − mk ≤  , (55) with  defined in Proposition B.1. For the sake of simplicity, we consider that 0 defined in Proposition B.1 verifies 0 ≤ 1. Applying Proposition B.1, let Bn : = h∇Gmn (Vn ) − ∇Gmn (Γm ), Vn − Γm iF 1An,p0 1{kVn −Γm k ≤0 } F Z 1 = ∇2mn G (Γm + t (Vn − Γm )) (Vn − Γm ) , Vn − Γm F 1{kVn −Γm k F ≤ 0 0 } 1An,p0 dt 1 ≥ cm kVn − Γm k2F 1{kVn −Γm k ≤0 } 1An,p0 . F 2 (56) In the same way, since Gmn is convex, let Bn0 : = h∇Gmn (Vn ) − ∇Gmn (Γm ), Vn − Γm iF 1An,p0 1{kVn −Γm k >0 } F Z 1 = ∇2mn (Γm + t (Vn − Γm )) (Vn − Γm ) , Vn − Γm 1{kVn −Γm k 0 F > 0 Z ≥ 0 kVn −Γm kF 0 } 1An,p0 dt ∇2mn (Γm + t (Vn − Γm )) (Vn − Γm ) , Vn − Γm 1{kVn −Γm k >0 } 1An,p0 dt F Applying Proposition B.1, Bn0 Z ≥ 0 0 kVn −Γm kF 1 cm kVn − Γm k2F 1{kVn −Γm k >0 } 1An,p0 dt F 2 0 cm kVn − Γm k2F 1{kVn −Γm k >0 } 1An,p0 F 2 kVn − Γm kF 0  cm − 1−α ≥ n p0 kVn − Γm k2F 1{kVn −Γm k >0 } 1An,p0 . F 2 ≥ 40 (57) 0 − 1−α There is a rank n0p0 such that for all n ≥ n0p0 , we have  c2m n p ≤ 12 cm . Thus, applying inequalities (56) and (57), for all n ≥ n0p0 ,   0 cm − 1−α 2 0 p kVn − Γm k2F 1An,p0 . γn n kWn kF 1An,p0 ≤ 1 − 2 Thus, there are a positive constant cp0 and a rank np0 such that for all n ≥ np0 , 2 h h i  i 0 cm − 1−α 4 0 p E kWn kF 1An,p0 ≤ 1 − γn n E kVn − Γm k4F 1An,p0 2 i   h − 1−α (58) ≤ 1 − 2cp0 γn n p0 E kVn − Γm k4F . i h  Now, we must get an upper bound for E kWn k4F 1Acn,p0 . Since kWn k2F ≤ 1 + c2γ C 2 kVn − Γm k2F and since there is a positive constant c0 such that for all n ≥ 1, kVn − Γm kF ≤ kV1 − Γm kF + n X γk ≤ c0 n1−α k=1 we have h i i  h 4 4 2 2 2 c c E kVn − Γm kF 1An,p0 E kWn kF 1An,p0 ≤ 1 + cγ C    2 ≤ 1 + c2γ C 2 c40 n4−4α P Acn,p0  h 1−α i 2 ≤ 1 + c2γ C 2 c40 n4−4α P [kmn − mk ≥ ] + P kVn − Γm kF ≥ n p0 . Applying Markov’s inequality, Theorem 4.2 in Godichon-Baggioni (2016) and Lemma 5.2, i i h  h 2q 2p00 h i − mk E kV − Γ k E km n n m  F 2  E kWn k4F 1Acn,p0 ≤ 1 + c2γ C 2 c40 n4−4α  + 2q 1−α 2p00 n p0 2 2 Kp00 00 4−4α−2q 1−α p0 . ≤ 2p00 1 + c2γ C 2 c40 n4−4α−p + 1 + c2γ C 2 c40 Mq n  4−α Taking p00 ≥ 4 − α and q ≥ p0 2(1−α) ,   h i 1 4 . (59) E kWn kF 1Acn,p0 = O n3α Thus, applying inequalities (58) and (59), there are positive constants cp0 , C1,p0 and a rank np0 such that for all n ≥ np0 , h  h i  i C 0 − 1−α 1,p E kWn k4F ≤ 1 − 2cp0 γn n p0 E kVn − Γm k4F + 3α . (60) n h i Step 2: bounding 2γn E krn kF kWn k2F kVn − Γm kF .  Since kWn k2F ≤ 1 + c2γ C 2 kVn − Γm k2F , applying Lemma E.1, let h i Dn : = 2γn E krn kF kWn k2F kVn − Γm kF h i  ≤ 2 1 + c2γ C 2 γn E krn kF kVn − Γm k3F h i 1 h i 1−α 2 2 − 1−α 1 + c2γ C 2 γn n p0 E krn k2F kVn − Γm k2F + cp0 γn n p0 E kVn − Γm k4F ≤ cp0 2 h i h i 1−α 1−α  2 3 p0 − p0 4 4 2 2 4 0 ≤ 2 1 + cγ C γn n E krn kF + cp γn n E kVn − Γm kF . cp0 41 √  p Since krn kF ≤ C + C kΓm kF kmn − mkF and applying Theorem 4.2 in GodichonBaggioni (2016),  4 q h h i i  √ 2 − 1−α 3 1−α 2 2 4 Dn ≤ 2 1 + cγ C C + C kΓm kF γn n p0 E kmn − mk4 + cp0 γn n p0 E kVn − Γm k4F cp0  4 q h i  √ 2 − 1−α 3 1−α 1 2 2 4 ≤ 2 K2 1 + cγ C C + C kΓm kF γn n p0 2 + cp0 γn n p0 E kVn − Γm k4F n cp0   h i 1 − 1−α . (61) = cp0 γn n p0 E kVn − Γm k4F + O 0 2+α−3(1−α)/p n Step 3: Conclusion. Applying inequalities (54), (60) and (61), there are a rank np0 and positive constants cp0 , C1,p0 , C2,p0 , C3,p0 such that for all n ≥ np0 , i i   h i C 0 C 0 h h C3,p0 − 1−α 1,p 2,p . E kVn+1 − Γm k4F ≤ 1 − cp0 γn n p0 E kVn − Γm k4F + 3α + 2α E kVn − Γm k2F + 2+α−3 1−α n n p0 n E Some technical inequalities First, the following lemma recalls some well-known inequalities. Lemma E.1. Let a, b, c be positive constants. Then, a2 b2 c + , 2c 2 c a2 a≤ + . 2 2c Moreover, let k, p be positive integers and a1 , ..., ap be positive constants. Then,  k p p X X  aj  ≤ pk−1 akj . ab ≤ j=1 j=1 The following lemma gives the asymptotic behavior for some specific sequences of descent steps. Lemma E.2. Let α, β be non-negative constants such that 0 < α < 1, and (un ), (vn ) be two sequences defined for all n ≥ 1 by cu cv vn := β , un := α , n n with cu , cv > 0. Thus, there is a positive constant c0 such that for all n ≥ 1, E(n/2) X e− Pn j=k uj   1−α uk vk = O e−c0 n , (62) k=1 n X e− Pn j=k uj k=E(n/2)+1 where E(.) is the integer part function. 42 uk vk = O (vn ) , (63) Proof of Lemma E.2. We first prove inequality (62). For all n ≥ 1, E(n/2) E(n/2) e− X Pn j=k uj uk vk = cu cv k=1 X e− Pn j=k uj k=1 E(n/2) ≤ cu cv X −cu e 1 k α+β Pn 1 j=k j α . k=1 Moreover, for all k ≤ E(n/2), cu n X n 1 1 ≥ cu α j 2 nα j=k ≥ cu 1−α n . 2 Thus, E(n/2) X e− Pn j=k uj uk vk ≤ cu cv ne− cu 1−α n 2 . k=1 We now prove inequality (63). With the help of an integral test for convergence, n X n X 1 uj = cu jα j=k j=k Z n+1 1 ≥ cu dt tα k  cu (n + 1)1−α − k −α . ≥ 1−α Thus, n X e− Pn j=k uj 1−α uk vk ≤ cu cv e−(n+1) k=E(n/2)+1 n X ek 1−α k −α−β k=E(n/2)+1 With the help of an integral test for convergence, there is a rank nu,v (for sake of simplicity, we consider that nu,v = 1) such that for all n ≥ nu,v , Z n+1 n X 1−α k1−α −α−β e k ≤ et t−α−β dt E(n/2)+1 k=E(n/2)+1 1 h t1−α −β in ≤ e t +β 1−α E(n/2)+1 Z n+1 (n+1)1−α (n+1)−β =e +o Z n 1−α et E(n/2)+1 et 1−α t−α−β dt , E(n/2)+1 since α < 1. Thus, n X ek 1−α  1−α −β  k −α−β = O en n . k=E(n/2)+1 As a conclusion, we have n X e− Pn j=k uj   1−α 1−α uk vk = O e−(n+1) +n vn k=E(n/2)+1 = O (vn ) . 43 t−1−β dt ! References Bali, J.-L., Boente, G., Tyler, D.-E., and Wang, J.-L. (2011). Robust functional principal components: a projection-pursuit approach. The Annals of Statistics, 39:2852–2882. Bosq, D. (2000). Linear processes in function spaces, volume 149 of Lecture Notes in Statistics. Springer-Verlag, New York. Theory and applications. Cardot, H., Cénac, P., and Chaouch, M. (2010). Stochastic approximation to the multivariate and the functional median. In Lechevallier, Y. and Saporta, G., editors, Compstat 2010, pages 421–428. Physica Verlag, Springer. Cardot, H., Cénac, P., and Godichon-Baggioni, A. (2016). Online estimation of the geometric median in Hilbert spaces: non asymptotic confidence balls. The Annals of Statistics (to appear). Cardot, H., Cénac, P., and Monnez, J.-M. (2012). A fast and recursive algorithm for clustering large datasets with k-medians. Computational Statistics and Data Analysis, 56:1434–1449. Cardot, H., Cénac, P., and Zitt, P.-A. (2013). Efficient and fast estimation of the geometric median in Hilbert spaces with an averaged stochastic gradient algorithm. Bernoulli, 19:18–43. Cardot, H. and Degras, D. (2015). Online principal components analysis: which algorithm to choose ? Technical report, arXiv:1511.03688. Chakraborty, A. and Chaudhuri, P. (2014). The spatial distribution in infinite dimensional spaces and related quantiles and depths. The Annals of Statistics, 42:1203–1231. Chaudhuri, P. (1992). Multivariate location estimation using extension of R-estimates through U -statistics type approach. Ann. Statist., 20(2):897–916. Croux, C., Filzmoser, P., and Oliveira, M. (2007). Algorithms for projection-pursuit robust principal component analysis. Chemometrics and Intelligent Laboratory Systems, 87:218– 225. Croux, C. and Ruiz-Gazen, A. (2005). High breakdown estimators for principal components: the projection-pursuit approach revisited. J. Multivariate Anal., 95:206–226. Cupidon, J., Gilliam, D., Eubank, R., and Ruymgaart, F. (2007). The delta method for analytic functions of random operators with application to functional data. Bernoulli, 13:1179–1194. 44 Dauxois, J., Pousse, A., and Romain, Y. (1982). Asymptotic theory for principal components analysis of a random vector function: some applications to statistical inference. Journal of Multivariate Analysis, 12:136–154. Devlin, S., Gnanadesikan, R., and Kettenring, J. (1981). Robust estimation of dispersion matrices and principal components. J. Amer. Statist. Assoc., 76:354–362. Duflo, M. (1997). Random iterative models, volume 34 of Applications of Mathematics (New York). Springer-Verlag, Berlin. Translated from the 1990 French original by Stephen S. Wilson and revised by the author. Fritz, H., Filzmoser, P., and Croux, C. (2012). A comparison of algorithms for the multivariate L1 -median. Comput. Stat., 27:393–410. Gervini, D. (2008). Robust functional estimation using the median and spherical principal components. Biometrika, 95(3):587–600. Godichon-Baggioni, A. (2016). Estimating the geometric median in Hilbert spaces with stochastic gradient algorithms; Lp and almost sure rates of convergence. J. of Multivariate Analysis, 146:209–222. Huber, P. and Ronchetti, E. (2009). Robust Statistics. John Wiley and Sons, second edition. Hubert, M., Rousseeuw, P., and Van Aelst, S. (2008). High-breakdown robust multivariate methods. Statistical Science, 13:92–119. Hyndman, R. and Ullah, S. (2007). Robust forecasting of mortality and fertility rates: A functional data approach. Computational Statistics and Data Analysis, 51:4942–4956. Jolliffe, I. (2002). Principal Components Analysis. Springer Verlag, New York, second edition. Kemperman, J. H. B. (1987). The median of a finite measure on a Banach space. In Statistical data analysis based on the L1 -norm and related methods (Neuchâtel, 1987), pages 217–230. North-Holland, Amsterdam. Kraus, D. and Panaretos, V. M. (2012). Dispersion operators and resistant second-order functional data analysis. Biometrika, 99:813–832. Locantore, N., Marron, J., Simpson, D., Tripoli, N., Zhang, J., and Cohen, K. (1999). Robust principal components for functional data. Test, 8:1–73. Maronna, R. A., Martin, R. D., and Yohai, V. J. (2006). Robust statistics. Wiley Series in Probability and Statistics. John Wiley & Sons, Ltd., Chichester. Theory and methods. Mokkadem, A. and Pelletier, M. (2006). Convergence rate and averaging of nonlinear twotime-scale stochastic approximation algorithms. Ann. Appl. Probab., 16(3):1671–1702. 45 Möttönen, J., Nordhausen, K., and Oja, H. (2010). Asymptotic theory of the spatial median. In Nonparametrics and Robustness in Modern Statistical Inference and Time Series Analysis: A Festschrift in honor of Professor Jana Jurec̆ková, volume 7, pages 182–193. IMS Collection. Pelletier, M. (2000). Asymptotic almost sure efficiency of averaged stochastic algorithms. SIAM J. Control Optim., 39(1):49–72. Polyak, B. and Juditsky, A. (1992). Acceleration of stochastic approximation. SIAM J. Control and Optimization, 30:838–855. R Development Core Team (2010). R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. ISBN 3-900051-07-0. Ramsay, J. O. and Silverman, B. W. (2005). Functional Data Analysis. Springer, New York, second edition. Rousseeuw, P. and van Driessen, K. (1999). A fast algorithm for the minimum covariance determinant estimator. Technometrics, 41:212–223. Taskinen, S., Koch, I., and Oja, H. (2012). Robustifying principal components analysis with spatial sign vectors. Statist. and Probability Letters, 82:765–774. Vardi, Y. and Zhang, C.-H. (2000). The multivariate L1 -median and associated data depth. Proc. Natl. Acad. Sci. USA, 97(4):1423–1426. Weiszfeld, E. (1937). On the point for which the sum of the distances to n given points is minimum. Tohoku Math. J., 43:355–386. Weng, J., Zhang, Y., and Hwang, W.-S. (2003). Candid covariance-free incremental principal component analysis. IEEE Trans. Pattern Anal. Mach. Intell., 25:1034–1040. 46
10math.ST
Learning ELM network weights using linear discriminant analysis Philip de Chazal1, Jonathan Tapson1 and André van Schaik1 1 The MARCS Institute, University of Western Sydney, Penrith NSW 2751, Australia {p.dechazal, j.tapson, a.vanschaik}@uws.edu.au Abstract. We present an alternative to the pseudo-inverse method for determining the hidden to output weight values for Extreme Learning Machines performing classification tasks. The method is based on linear discriminant analysis and provides Bayes optimal single point estimates for the weight values. Keywords: Extreme learning machine, Linear discriminant analysis, Hidden to output weight optimization, MNIST database 1 Introduction The Extreme Learning Machine (ELM) is a multi-layer feedforward neural network that offers fast training and flexible non-linearity for function and classification tasks. Its principal benefit is that the network parameters are calculated in a single pass during the training process [1]. In its standard form it has an input layer that is fully connected to a hidden layer with non-linear activation functions. The hidden layer is fully connected to an output layer with linear activation functions. The number of hidden units is often much greater than the input layer with a fan-out of 5 to 20 hidden units per input frequently used. A key feature of ELMs is that the weights connecting the input layer to the hidden layer are set to random values. This simplifies the requirements for training to one of determining the hidden to output unit weights, which can be achieved in a single pass. By randomly projecting the inputs to a much higher dimensionality, it is possible to find a hyperplane which approximates a desired regression function, or represents a linear separable classification problem [2]. A common way of calculating the hidden to output weights is to use the MoorePenrose pseudo-inverse applied to the hidden layer outputs using labelled training data. In this paper we present an alternative method for hidden to output weight calculation for networks performing classification tasks. The advantage of our method over the pseudo-inverse method is that the weights are the best single point estimates from a Bayesian perspective for a linear output stage. Using the same network architecture and same random values for the input to hidden layer weights, we applied the two weight calculation methods to the MNIST database and demonstrated that our method offers a performance advantage. 2 Methods If we consider a particular sample of input data x k ∈  L×1 where k is a series index and K is the length of the series, then the forward propagation of the local signals through the network can be described by: M L  (2)  (1) yn ,k = ∑ wnm g  ∑ wml xl ,k  = m 1= l 1  (1) Where y k ∈  N ×1 is the output vector corresponding to the input vector x k , l and L are the input layer index and number of input features respectively, m and M are the hidden layer index and number of hidden units respectively, and n and N are the output layer index and number of output units respectively. w(1) and w(2) are the weights associated with the input to hidden layer and the hidden to output layer linear sums respectively. g ( ) is the hidden layer non-linear activation function. With ELM, w(1) are assigned randomly which simplifies the training requirements to task of optimisation of the w(2) only. The choice of linear output neurons further simplifies the optimisation problem of w(2) to a single pass algorithm. The weight optimisation problem for w(2) can be stated as M  L (1)  (2) yn ,k = ∑ wnm am ,k where am ,k = g  ∑ wml xl ,k  . m =1  l =1  (2) (2) , We can restate this as matrix equation by using W ∈  N × M with elements wnm and A ∈  M × K in which each column contains outputs of the hidden unit at one instant in the series ak ∈  M ×1 , and the output Y ∈  N × K where each column contains output of the network at one instance in the series as follows: Y = WA . (3) The optimisation problem involves determining the matrix W given a series of desired outputs for Y and a series of hidden layer outputs A . We represent the desired outputs for y k using the target vectors t k ∈  N ×1 where tn ,k has value 1 in the row corresponding to the desired class and 0 for the other N-1 elements. For example t k = [0,1, 0, 0] indicates the desired target is class 2 (of four T classes). As above we can restate the desired targets using a matrix T ∈  N × K where each column contains the desired targets of the network at one instance in the series. Substituting T in for the desired outputs for Y , the optimization problem involves solving the following linear equation for W : T = WA . 2.1 (4) Output weight calculation using the pseudo-inverse In ELM literature W is often determined by the taking the Moore-Penrose pseudo-inverse A + ∈  K × M of A [3]. If the rows of are A are linearly independent (which normally true if K>M) then W maybe calculated using ( W = TA + where A + = A T AA T ) -1 . (5) This minimises the sum of square error between networks outputs Y and the desired outputs T , i.e. T2 A + minimises Y −= K N ∑∑ ( y k 1= n 1 = n ,k − tn , k ) 2 (6) We refer to the pseudo-inverse method for output weight calculation as PI-ELM. We note that in cases where the classification problem is ill-posed it may be necessary to regularize this solution, using standard methods such as Tikhonov regularization (ridge regression). 2.2 Output weight calculation using linear discriminant analysis In this paper we develop an alternative approach to estimating W based on a maximum likelihood estimator assuming a linear model. We refer to it as the LDA-ELM method as it is equivalent to applying linear discriminant analysis to the hidden layer outputs. Our presentation is based on the notation of Ripley [4]. For an N-class problem Bayes’ rule states that the posterior probability of the nth class pn is related to its prior probability π k and its class density function f n ( d, θ n ) by pn = π n f n ( d, θ n ) N ∑ π z f z ( d, θ z ) (7) z =1 where d is the input data vector (in our case the hidden layer output), and θ n are the parameters of the class density function. The class densities are modelled with a multi-variate Gaussian model with common covariance Σ and class dependent mean vectors μ k . Given an input vector ak the class density is f n ( ak , θn = μn , Σ ) = ( 2π ) − M2 Σ − 12 T exp  − 12 ( ak − μ n ) Σ −1 ( ak − μ n )    (8) We set the dimension of the Gaussian model equal to the number of hidden units so that ak is as defined above for the hidden unit output and hence Σ ∈  M × M and μ n ∈  M ×1 . To begin with, the training data is partitioned according to the class membership so N that we K = ∑ K n labelled have data vectors of hidden unit outputs, n =1 M ×1 a(n) ,k = 1..K n where all members a k ∈ (n) belong to class n . For a given set of hidden unit output data and class membership a likelihood function l ( θ ) is formed using = l (θ) l= ( θ1 , θ2 ,..., θ N ) Kn N ∏∏ π = n 1= k 1 n f n ( a(kn ) , θ n ) (9) Our aim is to find values of θ n that maximise l ( θ ) for given set of training data. Equivalently we can maximise the value of the log-likelihood: = = L ( θ1 , θ 2 ,..., θ N ) log ( l ( θ1 , θ2 ,..., θ N ) ) ∑∑ log ( f ( a N Kn = n 1= k 1 n (n) k ) , θ n ) + ∑ K n log (π n ) (10) N = n 1 Substituting our multi-variate Gaussian model for f n ( ak , θ n ) we get L= ( θ1 , θ2 ,..., θ N ) L= ( μ1 ,..., μ N , Σ ) ∑∑ ( − N Kn = n 1= k 1 M 2 ) log ( 2π ) − 12 log ( Σ ) − 12 ( a(kn ) − μ n ) Σ −1 ( a(kn ) − μ n ) + ∑ K n log (π n ). T N (11) = n 1 This is maximized when Kn μ n = ∑ a(kn ) K n , and Σ= k =1 Kn ∑∑ ( a N = n 1= k 1 (n) k − μ k )( a(kn ) − μ k ) T K. (12) Having determined the μ n ’s and Σ from the training data we now need to find the values for W . We begin by substituting (8) into (7), bringing the π n into exponential function and removing the common numerator and denominator term ( 2π ) − M2 Σ − 12 , giving us T exp  − 12 ( ak − μ n ) Σ −1 ( ak − μ n ) + log (π n )    . pn = N T exp  − 12 ( ak − μ z ) Σ −1 ( ak − μ z ) + log (π z )  ∑   z =1 After expanding the (13) − 12 ( ak − μ n ) Σ−1 ( ak − μ n ) terms and removing the T − 12 aTk Σ −1ak from the numerator and denominator we get pn = exp ( yn ) (14) N ∑ exp ( ya ) a =1 where yn = log (π n ) + μTn Σ −1ak − 12 μTn Σ−1μ n (15) Classification is performed by choosing the class with the highest value of pn . As pn in (14) is a monotonic function of yn in (15) we can use either function when deciding our final class. We choose to use yn defined in (15) as it is a linear function of the input data vector ak and it can be used to determine W for our network as follows: log (π 1 ) − 12 μ1T Σ −1μ1 log (π 2 ) − 12 μT2 Σ −1μ 2  log (π N ) − 12 μTN Σ −1μ N  W=  . (16) μ1T Σ −1 μT2 Σ −1  μTN Σ −1   Note that W ∈  N × M +1 , as a constant term has been introduced into the hidden to output layer weights (the first row of W ). If we want to determine the posterior probabilities then we use (14) applied to the network outputs. Summary of method In summary calculating W proceeds as follows (i) Partitioned the hidden unit output data according to the class membership N L×1 so that we have K = ∑ K n labelled data vectors, a(n) ,k = 1..K n where k ∈ n =1 all members a(n) belong to class n Kn (ii) Calculate μ n = ∑ a(kn ) K n and Σ= k =1 Kn ∑∑ ( a N = n 1= k 1 (n) k − μ k )( a(kn ) − μ k ) T K (iii) Set the prior probabilities π n (iv) Calculate log (π 1 ) − 12 μ1T Σ −1μ1 log (π 2 ) − 12 μT2 Σ −1μ 2  log (π N ) − 12 μTN Σ −1μ N  W=  μ1T Σ −1 μT2 Σ −1  μTN Σ −1   To classify new data we (i) Calculate the network output y in response to the hidden layer output a is 1  y = W  a  (ii) (Optional) Calculate the posterior probabilities pn = exp ( yn ) N ∑ exp ( y ) a =1 a (iii) The final decision of the network is the output with the highest value of yn or, equivalently, pn . Combining Classifiers Equation (14) provides an easy way to combine the outputs of multiple classifiers. Once the posterior probabilities are calculated for each class for each classifier we can form a combined posterior probability and choose the class with the highest combined posterior probability. There are any schemes for doing this [5] with unweighted averaging across the posterior probability outputs being one of the most simple schemes. 3 Experiments We applied the LDA-ELM and PI-ELM weight calculation method to the MNIST handwritten digit recognition problem [6]. Authors JT and AvS have previously reported good classification results using ELM on this database [2]. The database has 60,000 training and 10,000 testing examples. Each example is a 28*28 pixel 256 level grayscale image of a handwritten digit between 0 and 9. The 10 classes are approximately equally distributed in the training and testing sets. The ELM algorithms were applied directly to the unprocessed images and we trained the networks by providing all data in batch mode. The random values for the input layer weights were uniformly distributed between -0.5 and 0.5. The prior probabilities for the 10 classes for LDA-ELM were each set to 0.1. In order to perform a direct comparison of the two methods we used the following protocol: For fan-out of 1 to 20 hidden units per input, repeat 200 times (i) Assign random values to the input layer weights and determine the hidden layer outputs for the 60,000 training data examples. (ii) Determine PI-ELM network weights using data from (i). (iii) Determine LDA-ELM network weights using data from (i). (iv) Evaluate both networks on the 10,000 test data examples and store results. We averaged the results for the 200 repeats of the experiment for each fan-out and compared the misclassification rates. These results are shown in Fig. 1 and Table 1. 7 Error (%) 6 5 LDA-ELM 4 PI-ELM 3 2 0 5 10 15 20 Fan-out Fig. 1. The error rate of the LDA-ELM and the PI-ELM on the MNIST database for fan-out varying between 1 and 20. All results at each fan-out are averaged from 200 repeats of the experiment. The results show that the LDA-ELM outperforms the PI-ELM at every fan-out value. The average performance benefit was a 3.1% decrease in the error rate of LDA-ELM with a larger benefit at smaller fan-out values. Table 2 below shows that there is little extra computational requirement for the LDA-ELM method. Table 1. The error rate (%) and percentage improvement of the LDA-ELM over the PI-ELM on the MNIST database. Results averaged from 200 repeats. 1 2 3 4 5 6 Fanout 7 8 9 10 12 15 20 PI-ELM 7.20 5.21 4.32 3.80 3.45 3.20 3.00 2.86 2.74 2.63 2.49 2.31 2.15 LDA-ELM 6.84 5.03 4.17 3.68 3.35 3.11 2.92 2.78 2.66 2.55 2.42 2.25 2.08 % improvement 4.9 3.5 3.3 3.1 2.9 3.0 2.6 2.9 2.8 2.7 2.6 2.6 3.3 Table 2. Computation times (in seconds). The elapsed time is shown for training the PI-ELM and LDA-ELM networks on the 60,000 images from MNIST database and testing on the 10,000 images using MATLAB R2012a code running on 2012 Sony Vaio Z series laptop with an Intel i7-2640M 2.8GHz processor and 8GB RAM. Fan-out 1 3 4 5 6 7 8 9 10 12 15 20 6.2 13.9 24.9 37.8 53.3 68.5 88.2 111 136 162 228 339 630 LDA-ELM 6.2 13.9 25.2 38.1 54.0 69.5 90.6 113 140 167 238 357 702 PI-ELM 2 The last experiment we performed investigated combining multiple networks using the LDA-ELM by averaging posterior probabilities. We investigated using an ensemble number between 1 and 20 and repeated the training and testing 10 times at each ensemble number. We then averaged the results which are shown below in Fig. 2. 2.1 2.0 Error (%) 1.9 1.8 1.7 1.6 1.5 0 5 10 15 20 Ensemble Fig. 2. The error rate of the LDA-ELM on the MNIST database at a fan-out of 20 with the ensemble number varying between 1 and 20. The result at each ensemble number is averaged from 10 repeats of the experiment. The results shown in Fig. 2 demonstrate the benefit of combining multiple LDAELM networks on the MNIST database. Combining two networks reduced the error rate from 2.08% to 1.86% and adding more networks further reduced the error. The best error rate was 1.69% achieved when 20 networks were combined. 4 Discussion The results on the MNIST database shown in Fig. 1 suggest that there is a performance benefit to be gained by using the LDA-ELM output weight calculation over the PI-ELM method. As there is only a small extra computation overhead we believe it is a viable alternative to the pseudo-inverse method especially at small fan-out values. Another benefit of the LDA-ELM is the ability to combine outputs from networks by combining the posterior probabilities estimates of the individual networks. When we applied this to the MNIST database we were able to reduce the error rate to 1.7%. This result is comparable to the best performance of most other 2 and 3 layer neural networks processing the raw data [7]. Further work will include comparing the two weight calculation methods on other publicly available databases such as abalone and iris data sets [8]. 5 Conclusion We have presented a new method for weight calculation for hidden to output weights for ELM networks performing classification tasks. The method is based on linear discriminant analysis and requires a modest amount of extra calculation time compared to the pseudo-inverse method (<12% for a fan-out ≤ 20). When applied to the MNIST database the average misclassification rate improvement was 3.1% in comparison to the pseudo-inverse method for identically configured and initialized networks. 6 Bibliography 1. G.B. Huang, Q.Y. Zhu and C.K. Siew, “Extreme Learning Machine: Theory and Applications,” Neurocomputing, vol. 70, pp. 489–501, 2006. 2. J. Tapson and A. van Schaik, “Learning the pseudoinverse solution to network weights,” Neural Networks, vol. 45, pp. 94–100, Sep. 2013. 3. R. Penrose and J. A. Todd, “On best approximate solutions of linear matrix equations,” Mathematical Proceedings of the Cambridge Philosophical Society, vol. 52, pp 17-19, 1956. 4. B.D. Ripley, Pattern Recognition and Neural Networks, Cambridge Univ. Press, 1996. 5. L.I. Kuncheva, Combining Pattern Classifiers: Methods and Algorithms, Wiley Press, 2004. 6. Y. LeCun and C. Cortes, “The MNIST database of handwritten digits”, Available at: http://yann.lecun.com/exdb/mnist. 7. Y. LeCun, L. Bottou, Y. Bengio and P. Haffner, “Gradient-Based Learning Applied to Document Recognition,” Proceedings of the IEEE, vol. 86(11), pp. 2278-2324, Nov. 1998. 8. Data sets from the UCI Machine Learning Repository, http://archive.ics.uci.edu/ml/.
9cs.NE
Recurrent Orthogonal Networks and Long-Memory Tasks Mikael Henaff New York University, Facebook AI Research arXiv:1602.06662v2 [cs.NE] 15 Mar 2017 Arthur Szlam Facebook AI Research MBH 305@ NYU . EDU ASZLAM @ FACEBOOK . COM Yann LeCun New York University, Facebook AI Research Abstract Although RNNs have been shown to be powerful tools for processing sequential data, finding architectures or optimization strategies that allow them to model very long term dependencies is still an active area of research. In this work, we carefully analyze two synthetic datasets originally outlined in (Hochreiter & Schmidhuber, 1997) which are used to evaluate the ability of RNNs to store information over many time steps. We explicitly construct RNN solutions to these problems, and using these constructions, illuminate both the problems themselves and the way in which RNNs store different types of information in their hidden states. These constructions furthermore explain the success of recent methods that specify unitary initializations or constraints on the transition matrices. 1. Introduction Recurrent Neural Networks (RNNs) are powerful models which are naturally suited to processing sequential data. They can maintain a hidden state which encodes information about previous elements in the sequence. For a classical version of RNN (Elman, 1990), at every timestep, the hidden state is updated as a function of both the input and the current hidden state. In theory, this recursive procedure allows these models to store complex signals for arbitrarily long timescales. However, in practice RNNs are considered difficult to train due to the so-called vanishing and exploding gradient problems (Bengio et al., 1994). These problems arise when the Proceedings of the 33 rd International Conference on Machine Learning, New York, NY, USA, 2016. JMLR: W&CP volume 48. Copyright 2016 by the author(s). YANN @ CS . NYU . EDU spectral norm of the transition matrix is significantly different than 1, or due to the non-linear transition functions. If the spectral norm of the transition matrix is greater than 1, the gradients will grow exponentially in magnitude during backpropagation, which is known as the exploding gradient problem. If the spectral norm is less than 1, the gradients will vanish exponentially quickly, which is known as the vanishing gradient problem. Recently, a simple strategy of clipping gradients has been introduced, and has proved effective in addressing the exploding gradient problem (Mikolov, 2012). The problem of vanishing gradients has shown itself to be more difficult, and various strategies have been proposed over the years to address it. One very successful approach, known as Long Short-Term Memory (LSTM) units (Hochreiter & Schmidhuber, 1997), has been to modify the architecture of the hidden units by introducing gates which explicitly control the flow of information as a function of both the state and the input. Specifically, the signal stored in a hidden unit must be explicitly erased by a forget gate and is otherwise stored indefinitely. This allows information to be carried over long periods of time. LSTMs have become very successful in applications to language modeling, machine translation, and speech recognition (Zaremba et al., 2014; Sutskever et al., 2014; Graves et al., 2013). Other methods have been proposed to deal with learning long-term dependencies, such as adding a separate contextual memory (Mikolov et al., 2015), stabilizing activations (Krueger & Mimesevic, 2015) or using more sophisticated optimization schemes (Martens & Sutskever, 2011). Two recent methods propose to directly address the vanishing gradient problem by either initializing or parameterizing the transition matrix with orthogonal or unitary matrices (Arjovsky et al., 2015; Le et al., 2015). These works have used a set of synthetic problems (originally outlined in (Hochreiter & Schmidhuber, 1997) or variants thereof) for testing the ability of methods to learn long-term dependencies. These synthetic problems are Recurrent Orthogonal Networks and Long-Memory Tasks designed to be pathologically difficult, and require models to store information over very long timescales (hundreds of timesteps). Different approaches have solved these problems to varying degrees of success. In (Martens & Sutskever, 2011), the authors report that their HessianFree optimization based method solves the addition task for T = 200 timesteps. The authors of (Krueger & Mimesevic, 2015) reported that their method beat the chance baseline for the adding task in 8/9 cases for T = 400. In (Le et al., 2015), the IRNN is reported to solve the addition task for T = 300. The method proposed in (Arjovsky et al., 2015) is able to solve the copy task for up to T = 500 timesteps, and is able to completely solve the addition task for up to T = 400 timesteps, and partially solves it for T = 750. In this work we analyze these “long-memory” tasks, and construct explicit RNN solutions for them. The solutions illuminate both the tasks, and provide a theoretical justification for the success of recent approaches using orthogonal initializations of, or unitary constraints on, the transition matrix of the RNN. In particular, we show that a classical Elman RNN with no transition non-linearity and random orthogonal initialization is with high probability close to our explicit RNN solution to the sequence memorization task, and the same network architecture with identity initialization is close to the explicit solution to the addition task. We verify experimentally that initializing correctly (i.e. random orthogonal or identity) is critical for success on these tasks. Finally, we show how l2 pooling can be used to allow a model to “choose” between a random-orthogonal or identity-like memory. There are several other works which have studied the properties of orthogonal matrices in relation to neural networks. The work of (Saxe et al., 2013) gives exact solutions to the learning dynamics of deep linear networks, and based on this analysis, suggests an orthogonal initialization scheme to accelerate learning. The authors of (White et al., 2004) and (Ganguli et al., 2008) study the ability of linear RNNs (with orthogonal and generic transition matrices, respectively) to store scalar sequences in their hidden state, and show that the memory capacity scales with the number of hidden units. Our work complements theirs by providing a related analysis for discrete input sequences. 2. Architectures We review some recurrent neural network (RNN) architectures for processing sequential data, and discuss the modifications we use for the long memory problems. We fix the following notation: input sequences are denoted x0 , x1 , ..., xt , ..., and output sequences are denoted by y0 , y1 , ..., yt , ... . 2.1. sRNN An sRNN (Elman, 1990) consists of a d × d transition matrix V , an M × d decoder matrix W (where M is the output dimension), a d × N encoder matrix U (where N is the input dimension), and a bias b. If either the output or input is categorical, M (respectively N ) is the number of classes, and we use a one-hot representation. As the sRNN ingests a sequence, it keeps running updates to a hidden state h, and using the hidden state and the decoder matrix, produces outputs y: ht = σ(U xt + V ht−1 + b) yt = W ht (1) where xt , yt , ht are the input, output and hidden state respectively at time t. While there have been great improvements in the training of sRNNs since their introduction, and while they have been shown to be powerful models in tasks such as language modeling (Mikolov, 2012), it can still be difficult to train generic sRNNs to use information about inputs from hundreds of timesteps previous for computing the current output (Bengio et al., 1994; Pascanu et al., 2013). In the following, we will use a simplification of the sRNNs that makes them in some sense less powerful models, but makes it easier to train them to solve simple long-memory tasks. Namely, by placing the non-linearity between the input and hidden state, rather than between the hidden state and output, we obtain RNNs with linear transitions (or, in the case of categorical inputs, not using a non-linearity at all). We call these LT-RNNs. The update equations are then: ht = σ(U xt + b) + V ht−1 yt = W ht (2) Finally, note that by appropriately scaling the weights and biases, an sRNN can be made to approximate a LT-RNN, but not the other way around (and of course the optimization may never find this scaling). 2.2. LSTM The LSTM of (Hochreiter & Schmidhuber, 1997) is an architecture designed to improve upon the sRNN with the introduction of simple memory cells with a gating architecture. In this work we use the architecture originally proposed in (Hochreiter & Schmidhuber, 1997). For each memory cell, the network computes the output of four gates: an update gate, input gate, forget gate and output gate. The outputs of these gates are: Recurrent Orthogonal Networks and Long-Memory Tasks 3.1. Copying Problem i = σ(Ui xt + Vi ht−1 ) f = σ(Uf xt + Vf ht−1 ) o = σ(Uo xt + Vo ht−1 ) (3) g = tanh(Ug xt + Vg ht−1 ) The cell state is then updated as a function of the input and the previous state: ct = f ct−1 + i g (4) Finally, the hidden state is computed as a function of the cell state and the output gate: ht = o tanh(ct ) (5) A relatively common variation of the original LSTM involves adding so-called “peephole connections” (Gers et al., 2003) which allows information to flow from the cell state to the various gates. This variant was originally designed to measure or generate precise time intervals, and has proven successful for speech recognition and sequence generation (Graves, 2013; Graves et al., 2013). 2.3. LT-RNN with l2 pooling Below we will consider LT-RNNs initialized with either random orthogonal transition matrices, or identity transitions, and we will see that there is a large difference in behavior between these initializations. However, we can set up an architecture where a random orthogonal initialization behaves much closer to an identity initialization by using an l2 pooling layer at the output. If we feed both the pooled and unpooled hidden layer to the decoder, the model can choose whether it wants an identity-like or randomorthogonal like representation. We fix a pool size k, and then the update equations for this model are: ht = σ(U xt + b) + V ht−1 yt = WI ht + WP Pk (ht ) (6) where if h is the kd dimensional vector h = [h1 , ..., hkd ]T , then P (h) is the d dimensional vector defined by v u ki u X P (h)i = t h2j This task tests the network’s ability to recall information seen many time steps previously. We follow the same setup as (Arjovsky et al., 2015), which we briefly outline here. Let A = {ai }K i=1 be a set of K symbols, and pick numbers S and T . The input consists of a T + 2S length vector of categories, starting with S entries sampled uniformly from {ai }K i=1 which are the sequence to be remembered. The next T − 1 inputs are set to aK+1 , which is a blank category. The following (single) input is aK+2 , which represents a delimiter indicating that the network should output the initial S entries of the input. The last S inputs are set to aK+1 . The required output sequence consists of T + S entries of aK+1 , followed by the first S entries of the input sequence in exactly the same order. The task is to minimize the average cross-entropy of the predictions at each time step, which amounts to remembering a categorical sequence of length S for T time steps. 3.1.1. A SOLUTION MECHANISM We can write out an LT-RNN solution for this problem. We will write out descriptions for U, V, W from equation (2). Note that since the inputs are categorical, we assume that no non-linearity is used. Fix a number d. For each j in {1, ..., d}, pick a random integer lj drawn uniformly from {1, ..., T + S}, and let   cos(2lj π/(T + S)) sin(2lj π/(T + S)) Qj = . − sin(2lj π/(T + S)) cos(2lj π/(T + S)) Now define Q, and then V from (2) by   Q1 0 · · · 0    0 Q2 · · · 0  Q 0   , V = . Q= .  .. 0 1  .. . 0 0 0 Qd So V is a (2d + 1) × (2d + 1) block diagonal matrix. Note that iterating Q “spins” each of the Qi at different rates, but they all synchronize at multiples of S +T . Thus Q acts as a “clock” with period S+T . Now set Ũ to be a 2d×K matrix with columns sampled uniformly from the unit sphere, and form U by appending two zero columns to Ũ and then one extra row, with −1/S for each entry between 1 and K, −1 for the K + 1 entry, and T + S + 1 for the K + 2 entry. Schematically, j=k(i−1)+1 3. Tasks In this section we describe tasks from (Hochreiter & Schmidhuber, 1997; Arjovsky et al., 2015; Le et al., 2015) which involve dependencies over very long timescales which are designed to be pathologically hard for the sRNN.  U= Ũ − S1 0 −1  0 . S+T +1 Finally, set W = U T , except scale the K + 1 column by S + 1, zero out the K + 2 column, and also zero out the entries below Ũ . Recurrent Orthogonal Networks and Long-Memory Tasks This gives  T Ũ W = 0 0  0 −(S + 1) . 0 Now we will show how the RNN operates, starting with a high-level overview. The last dimension of the hidden state divides the state space into two regions, one where the model outputs the blank symbol and the other where it outputs one of the first K symbols in the dictionary. The model begins in the first region and remains there until it encounters the delimiter symbol, which sends it into the second. Now, the symbols in the input sequence are all encoded in the hidden state and a rotation is applied with each timestep. A key result is that rotation by powers of Q “hides” a symbol encoded in the hidden state, i.e. decorrelates its current representation from its original one. Due to the periodicity of Q, after T + S timesteps, the different symbols in the input sequence will surface from the hidden state one at a time, in the order in which they were seen, while the other symbols in the sequence, whose representations have rotations applied to them, remain hidden. This causes the output units of each of the symbols to fire in the correct order. We now give a more precise description, for which we need a little more notation. Denote by h̃ the first 2d coordinates of h, and by h2d+1 the last coordinate, and denote by uj the jth column of Ũ . Then the RNN works as follows, initialized with hidden state 0: • After the first S inputs, we have h̃ = S X S−j Q Figure 1. Success percentage of the mechanism from 3.1.1 to the copy problem for T = 500, computed over 500 trials with d = 128. • The sum continues to cycle, giving ij as output for each following j up to S. PS We now briefly argue that uTi1 j=2 Q1−j uij is small when d is large enough w.r.t. S and K. We will repeatedly use that the variance of a sum of independent, mean-zero random variables grows as the sum of the variances. Denote by uji the pair of coordinates of the jth column uj of Ũ corresponding to the ith block; since u are uniform on the sphere, we expect ||uji ||2 ∼ 1/d. Since for each fixed p ∈ {1, T + S}, over the choices of li in the definition of Qi , the Qpi are independent, uTji Qpi uji has mean zero, and since uTj Qp uj = uij . d X uTji Qpi uji i=1 j=1 we expect • For the next T inputs, only h2d+1 changes, incrementing by −1 at each step. Note that WK+1 has so far been the best match to h because it has large negative last component. • At time T + S when the aK+2 token is seen, h2d+1 is set positive, which ensures the blank symbol will not be output. Moreover, since the Qp uj are uniform on the sphere, |uTj Qp uj 0 |2 ∼ 1/d for j 0 6= j. Similarly, we expect uTi1 • At time T + S + 1, h̃ = ui1 + |uTj Qp uj |2 ∼ 1/d. S X 2 1−j Q uij ∼ (S − 1)/d. j=2 S X Q1−j uij . j=2 We argue below that if d is large PS enough w.r.t. S and K, with high probability, uTi1 j=2 Q1−j uij is small, and so multiplication with W has max value at i1 . Thus we can fix a small number , say  = .1, and choose PSd large enough so that with high probability |wiT1 j=2 Qj−S uij |2 < , even though wiT ui = 1. Finally, there is a weak dependence on K here; for fixed  and K it is exponentially unlikely (in d) that the nearest neighbor i0 6= i1 is close enough to ui to interfere. Recurrent Orthogonal Networks and Long-Memory Tasks This solution mechanism suggests that a random orthogonal matrix (chosen, for example, via QR decomposition of a Gaussian matrix) is a good starting point for solving this task. The construction above is invariant to rotations; and we can always find a basis so that a given orthogonal matrix has the block form above in that basis. Thus all that is necessary is for the descent to nudge the eigenvalues of the orthogonal matrix to be S + T roots of unity, and then it already has the basic form of the construction above. This also gives a good explanation for the performance of the models used for the copy problem in (Arjovsky et al., 2015) is added to the hidden state, as xj [1] ≤ 1. On the other hand, if xj [2] = 1, then exactly xj [2] is added to h. This mechanism has been known (at least implicitly, although we don’t know if it has been written down explicitly before) at least since (Hochreiter & Schmidhuber, 1997), and it can be seen as a very simple LSTM model, with the following gates: i = xj [1] f =1 o=1 g = (xj [2] − 1)+ (7) Finally, note that although we used the setup of (Arjovsky et al., 2015), the construction can be modified to solve problems 2a and 2b in (Hochreiter & Schmidhuber, 1997) and no non-linearity in Equation (5). 3.1.2. SOLUTION MECHANISM EXPERIMENTS 3.3. Comparison between the tasks Since the construction of the copy mechanism is randomized, we provide an experiment to show how the solution degrades as a function of K (the dictionary size) and S (the length of the sequence to be remembered). There is not a strong dependence on T (the length of time to remember the sequence). Figure 1 shows the number of successes over 500 runs with d = 128. Note that the 1 × 1 matrix V in the mechanism for the adding problem is the “identity”. We can build a more redundant solution by using a larger identity matrix. We can describe the identity using the same block structure as the matrix Q defined for the copy task; namely each lj = 0. On the other hand, the Q for the copy task acts as a “clock” that synchronizes after a fixed number of steps T + S. It is important for the mechanism we described that the clock looks random at any time between 1 and S + T . For example, if we had instead used the same lj in each block Qj , the mechanism would not succeed. The transition matrices for the addition task and the copy task are thus opposites in the sense that for addition, all the lj are the same (i.e. a δ mass on the unit circle), and for copy, the lj are as uniformly distributed on the unit circle as possible. 3.1.3. VARIABLE L ENGTH C OPY P ROBLEM Note that the solution mechanism for the copy problem above depends on having a fixed location for regurgitating the input. In the experiments below, we also discuss a variant of the copy task, where the symbol to indicate that the memorized sequence must be output is randomly located in S + 1, S + T ; this can be considered a variant of task 2c in (Hochreiter & Schmidhuber, 1997). We do not know a bounded in T explicit LT-RNN or sRNN solution for this variable length problem (although the above solution using a multiplicative RNN instead of an sRNN, and keeping d2 extra hidden variables to track the power of V solves it). 3.2. Adding Problem The adding problem requires the network to remember two marked numbers in a long sequence and add them. Specifically, the input consists of a two dimensional sequence {x1 , ..., xT }. The first coordinate xj [1] is uniformly sampled between 0 and 1, and the second coordinate is 0 at each j save two; in these two entries, xj [2] = 1. The required output is xj1 [1] + xj2 [1], where xji [2] = 1. 3.2.1. A SOLUTION MECHANISM This problem has a simple, explicit solution using a LTRNN with a ReLU non-linearity and a one dimensional hidden state. Namely: set U = [11], b = −1, W = 1, and V = 1. At each time step j, if xj [2] = 0 then nothing In the experiments below, we will show that it is hard for an LT-RNN to learn the adding task when its transition matrix is initialized as a random orthogonal matrix but easy when initialized with the identity, and vice-versa for the copy task. One way to get a “unified” solution is to use l2 pooling, as in 6. Then when initialized with a matrix with lj distributed uniformly, the decoder can choose to use the pooled hiddens (which through away the phase, and so appear identity-like) for the adding task, or use the raw hiddens, which are clock-like. 4. Experiments 4.1. Impact of Initialization Based on the above analysis, we hypothesize that an LTRNN with random orthogonal initialization (denoted LTORNN) should perform well on the sequence memorization problem, and an LT-RNN with identity initialization (denoted LT-IRNN) should perform well on the addition task. To test this, we conducted the following experiment on both the copy and addition task for different timescales. Recurrent Orthogonal Networks and Long-Memory Tasks c opy ta s k, T = 200 0.20 c opy ta s k, T = 500 0.20 LSTM LT-IRNN LT-ORNN LSTM LT-IRNN LT-ORNN 0.15 Cros s Entropy Cros s Entropy 0.15 0.10 0.05 0.00 0.10 0.05 0 200 400 600 ite ra tions (hundre ds ) 800 0.00 1000 0 200 400 600 ite ra tions (hundre ds ) 800 1000 Figure 2. Results for the copy task. a dd ta s k, T = 200 0.5 a dd ta s k, T = 400 0.5 LSTM LT-IRNN LT-ORNN 0.4 0.4 MSE 0.3 MSE MSE LSTM LT-IRNN LT-ORNN 0.4 0.3 0.3 a dd ta s k, T = 750 0.5 LSTM LT-IRNN LT-ORNN 0.2 0.2 0.2 0.1 0.1 0.1 0.0 0 200 400 600 800 1000 1200 ite ra tions (hundre ds ) 1400 1600 1800 0.0 0 200 400 600 800 1000 1200 ite ra tions (hundre ds ) 1400 1600 1800 0.0 0 200 400 600 800 1000 1200 ite ra tions (hundre ds ) 1400 1600 1800 Figure 3. Results for the addition task. For each task and timescale, we trained 8 LT-ORNNs and 8 LT-IRNNs with different random seeds. The transformation matrices for all models were intialized using √ a Gaussian distribution with mean 0 and variance 1/ n (where n is the number of incoming connections to each hidden unit). For LT-ORNNs, we then projected the transition matrix to its nearest orthogonal matrix by setting its singular values to 1. In all experiments, we used RMSProp to train our networks with a fixed learning rate and a decay rate of 0.9. In preliminary experiments we tried different learning rates in {1, 10−1 , 10−2 , 10−3 , 10−4 , 10−5 } and chose the largest one for which the loss did not diverge, for the LT-RNN’s we used 10−4 . We also included LSTMs in all our experiments as a baseline. We used the same method as for LT-RNN to pick the learning rate, and ended up with 10−3 . For all experiments, we normalized the gradients with respect to hidden activations by 1/T , where T denotes the number of timesteps. In preliminary experiments, we also found that for LT-RNN models the activations frequently exploded whenever the largest singular value of the transition matrix became much greater than 1. Therefore, we adopted a simple activation clipping strategy where we rescaled activations to to have magnitude l whenever their magnitude exceeded l. In our experiments we chose l = 1000. Figure 2 shows the results on the copy task for the LSTM, LT-ORNN and LT-IRNN. All networks are trained with 80 hidden units. We see that the LSTM has difficulty beating the baseline performance of only outputting the empty symbol; however it does eventually converge to the solution (this is not shown in the figure). However, the LT-ORNN solves the task almost immediately. We note that this behavior is similar to that of the uRNN in (Arjovsky et al., 2015), which is paramaterized in a way that makes it easy to recover the explicit solution described above. The LTIRNN is never able to find the solution. Figure 3 shows the results of the addition task for T = 200, 400 and 750 timesteps. All networks are trained with 128 hidden units. For T = 750, we trained a single LTORNN and LT-IRNN due to time constraints. In contrast to the copy task, here the LT-IRNN is able to efficiently solve Recurrent Orthogonal Networks and Long-Memory Tasks a dd ta s k, T = 400 0.5 0.4 LSTM LT-IRNN LT-ORNN LT-ORNN-POOL 0.4 MSE 0.3 MSE 0.3 0.2 0.2 0.1 0.1 0.0 0 200 400 600 800 1000 1200 ite ra tions (hundre ds ) 1400 1600 0 500 0.05 2000 LSTM LT-IRNN LT-ORNN LT-ORNN-POOL 0.15 c ros s e ntropy 0.10 1000 1500 ite ra tions (hundre ds ) c opy ta s k, T = 500 0.20 LSTM LT-IRNN LT-ORNN LT-ORNN-POOL 0.15 0.00 0.0 1800 c opy ta s k, T = 200 0.20 c ros s e ntropy a dd ta s k, T = 750 0.5 LSTM LT-IRNN LT-ORNN LT-ORNN-POOL 0.10 0.05 0 200 400 600 ite ra tions (hundre ds ) 800 1000 0.00 0 200 400 600 ite ra tions (hundre ds ) 800 1000 Figure 4. Results for copy and addition task with pooling architectures. Note that the LSTM will eventually solve the copy task, but the LT-IRNN will not. the problem whereas the LT-ORNN is only able to solve it after a very long time, or not at all. The LSTM is also able to easily solve the task, which is consistent with the original work of (Hochreiter & Schmidhuber, 1997) where the authors report solving the task for up to 1000 timesteps. We note that this LSTM baseline differs from that of (Arjovsky et al., 2015; Le et al., 2015) where it is reported to have more difficulty solving the addition task. We hypothesize that this difference is due to the use of different variants of the LSTM architecture such as peephole connections. 4.2. Pooling Experiments We next ran a series of experiments to examine the effect of feeding pooled outputs to the decoder, to see if we could obtain good performance on both the copy and addition tasks with a single architecture and initialization. In these experiments, we added a soft penalty on the transition matrix V to keep it orthogonal throughout training. Specifi- cally, at every iteration we applied one step of stochastic gradient descent to minimize the loss ||V T V − I||, evaluated at m random points on the unit sphere. Note that this requires O(md2 ) operations and a regular update requires O(T md2 ) operations, so adding this soft constraint has negligible computational overhead. In our experiments we set m = 50, which was the same at the minibatch size. In all pooling experiments we used a pool size and stride of 2. The results are shown in Figure 4. The LT-ORNN with pooling is easily able to solve the copy task for both timescales, and approximately solves the addition task for both timescales as well, even though convergence is slower than the LT-IRNN. Its success on the copy task is not surprising, since by zeroing out the matrix WP in Equation 6 it can solve the problem with the same solution as the regular LT-ORNN. The good performance on the adding task is somewhat more interesting. To gain insight into how the network stores information in a stable manner while having Recurrent Orthogonal Networks and Long-Memory Tasks va ria ble le ng th c opy ta s k, T = 100 0.5 LSTM LT-IRNN LT-ORNN LT-ORNN-POOL c ros s e ntropy 0.4 0.3 0.2 0.1 0.0 0 200 400 600 800 ite ra tions (hundre ds ) 1000 1200 Figure 5. Results for the variable length copy task. an (approximately) orthogonal transition matrix, we plotted the activations of its hidden states over time as it processes an input sequence. This is displayed in Figure 6. We observe relatively constant activations until the first marked number is encountered, which triggers oscillatory patterns along certain dimensions. When the second marked number is seen, existing oscillations are amplified and new ones emerge. This suggests that the network stores information stably through the radius of its hidden state’s rotations along different 2-dimensional subspaces. The information is then recovered as the phase is discarded though the pooling operation. Thus the model can have “uniform” clocklike oscillations that are perceived as δ-like after the pooling. 4.3. Variable Length Copy Task Having seen the stark impact of initialization on the performance of LT-IRNNs and LT-ORNNs for the copy and addition task, and its mitigation through the addition of a pooling layer, we then tested all the models on a problem for which we did not have a (roughly fixed size) solution mechanism, namely the variable length copy task. Figure 5 shows the performance of an LT-IRNN, LT-ORNN, LT-ORNN with l2 pooling, and LSTM (each with 80 hidden units) on the variable length copy task with T = 100 timesteps. Even though the number of timesteps is significantly less than in other tasks, none of the LT-RNNs are able to beat the chance baseline, whereas the LSTM is able to solve the task even though its convergence is slow. This experiment is a classic example of how a detail of construction of a synthetic benchmark can favor a model in a way that fails to generalize to other tasks. Figure 6. Activation patterns of pooling network. The two marked numbers to be added occur at positions 264 and 463. 5. Conclusion In this work, we analyzed two standard synthetic long-term memory problems and provided explicit RNN solutions for them. We found that the (fixed length T ) copy problem can be solved using an RNN with a transition matrix that is a T + S root of the identity matrix I, and whose eigenvalues are well distributed on the unit circle, and we remarked that random orthogonal matrices almost satisfy this description. We also saw that the addition problem can be solved with I as a transition matrix. We showed that correspondingly, initializing with I allows a linear-transition RNN to easily be optimized for solving the addition task, and initializing with a random orthogonal matrix allows easy optimization for the copy task; but that flipping these leads to poor results. This suggests an optimization difficulty in transitioning between oscillatory and steady dynamics, which can be mitigated by adding an l2 pooling layer that allows the model to easily choose between the two regimes. Finally, our experiment with the variable length copy task illustrates that although synthetic benchmarks can be useful for evaluating specific capabilities of a given model, success does not necessarily generalize across different tasks, and novel model architectures should be evaluated on a broad set of benchmarks as well as natural data. References Arjovsky, M, Shah, A, and Bengio, Y. Unitary Evolution Recurrent Neural Networks, September 2015. URL http://arxiv.org/abs/1511.06464. Bengio, Y., Simard, P., and Frasconi, P. Learning long-term dependencies with gradient descent is difficult. IEEE Transactions on Neural Networks, 5(2):157–166, 1994. Recurrent Orthogonal Networks and Long-Memory Tasks Elman, Jeffrey L. Finding structure in time. COGNITIVE SCIENCE, 14(2):179–211, 1990. Ganguli, Surya, Huh, Dongsung, and Sompolinsky, Haim. Memory traces in dynamical systems. 105(48):18970– 18975, 2008. doi: 10.1073/pnas.0804451105. Gers, Felix A., Schraudolph, Nicol N., and Schmidhuber, Jürgen. Learning precise timing with lstm recurrent networks. J. Mach. Learn. Res., 3:115– 143, March 2003. ISSN 1532-4435. doi: 10.1162/ 153244303768966139. URL http://dx.doi.org/ 10.1162/153244303768966139. Graves, Alex. Generating Sequences with Recurrent Neural Networks, September 2013. URL http:// arxiv.org/abs/1308.0850. Graves, Alex, Mohamed, Abdel-rahman, and Hinton, Geoffrey E. Speech recognition with deep recurrent neural networks. In IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2013, Vancouver, BC, Canada, May 26-31, 2013, pp. 6645–6649, 2013. doi: 10.1109/ICASSP.2013. 6638947. URL http://dx.doi.org/10.1109/ ICASSP.2013.6638947. Hochreiter, S and Schmidhuber, J. Long short-term memory. Neural Computation, 8(9):1735–1780, 1997. Krueger, D and Mimesevic, R. Regularizing RNNs by Stabilizing Activations, September 2015. URL http: //arxiv.org/abs/1511.08400. Langley, P. Crafting papers on machine learning. In Langley, Pat (ed.), Proceedings of the 17th International Conference on Machine Learning (ICML 2000), pp. 1207– 1216, Stanford, CA, 2000. Morgan Kaufmann. Le, Quoc, Jaitly, N, and Hinton, G. A Simple Way to Initialize Recurrent Networks of Rectified Linear Units, September 2015. URL http://arxiv.org/abs/ 1504.00941. Martens, J and Sutskever, I. Learning recurrent neural networks with hessian-free optimization. In Proceedings of the 28th International Conference on Machine Learning, ICML 2011, Bellevue, Washington, USA, June 28 - July 2, 2011, pp. 1033–1040, 2011. Mikolov, T, Joulin, A, and Chopra, S et. al. Learning Longer Memory in Recurrent Neural Networks, September 2015. URL http://arxiv.org/abs/1412. 7753. Mikolov, Tomáš. Statistical Language Models Based on Neural Networks. PhD thesis, 2012. URL http://www.fit.vutbr.cz/research/ view_pub.php?id=10158. Pascanu, Razvan, Mikolov, Tomas, and Bengio, Yoshua. On the difficulty of training recurrent neural networks. In Proceedings of the 30th International Conference on Machine Learning, ICML 2013, Atlanta, GA, USA, 1621 June 2013, pp. 1310–1318, 2013. Saxe, Andrew M., McClelland, James L., and Ganguli, Surya. Exact solutions to the nonlinear dynamics of learning in deep linear neural networks, 2013. URL http://arxiv.org/abs/1312.6120. cite arxiv:1312.6120. Sutskever, Ilya, Vinyals, Oriol, and Le, Quoc V. Sequence to sequence learning with neural networks. In Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada, pp. 3104–3112, 2014. White, O, Lee, D, and Sompolinky, H. Short-term memory in orthogonal neural networks. Physical Review Letters, 92, 2004. ISSN 14. Zaremba, W, Sutskever, I, and Vinyals, O. Recurrent Neural Network Regularization, September 2014. URL http://arxiv.org/abs/1409.2329.
9cs.NE
MINT: Mutual Information based Transductive Feature Selection for Genetic Trait Prediction arXiv:1310.1659v1 [cs.LG] 7 Oct 2013 Dan He1 , Irina Rish1 , David Haws1 , Simon Teyssedre2 , Zivan Karaman2, Laxmi Parida1 1 2 1 IBM T.J. Watson Research, Yorktown Heights, NY, USA {dhe, rish, dhaws, parida}@us.ibm.com Limagrain Europe, Chappes Research Center, CS 3911, 63720 Chappes, France {simon.teyssedre, zivan.karaman}@limagrain.com Introduction Whole genome prediction of complex phenotypic traits using high-density genotyping arrays has recently attracted a lot of attention, as it is relevant for the fields of plant and animal breeding and genetic epidemiology. Given a set of biallelic molecular markers, such as SNPs, with genotype values encoded as 0, 1, 2 on a collection of plant, animal or human samples, the goal is to predict the values of certain traits, usually highly polygenic and quantitative, by modeling simultaneously all marker effects, unlike the traditional GWAS. rrBLUP [9,14] has been used widely for trait prediction where it builds a linear model by fitting all the genotypes and the coefficient computed for each marker can be considered as a measure of the importance of the marker. The underlying hypothesis of normal distribution of marker effects is well suited for highly polygenic traits, and as the computations are fast and robust, it is one of the most used models in whole genome prediction. Other popular predictive models are Elastic-Net, Lasso, Ridge Regression[13,2] , Bayes A, Bayes B[9], Bayes Cπ[7], and Bayesian Lasso [8,10], etc. As the number of genotypes is generally much bigger than the number of samples, the predictive models suffer from the “curse of dimensionality”. The “curse of dimensionality” problem not only affects the computational efficiency of the learning algorithms, but can also lead to poor performance, mainly because of the correlation among markers. Feature selection [15,4,6] has been considered as a successful solution for this problem, where a subset of important features are selected and the predictive models are trained only on these features. A popular criterion for feature selection is called Max-Relevance and Min-Redundancy (MRMR) [11] where the selected features are maximally relevant to the class value and simultaneously minimally dependent on each other. The method mRMR [11] has been proposed which greedily selects features that maximize the relevance while minimize the redundancy. mRMR has been applied successfully on various applications [5,1,16]. Transductive learning, first introduced by Vapnik [3], assumes test data for predictor variables (here markers) are available to the learning algorithms (the target variable values for test samples are of course unknown). Therefore the models are built on both the training and test data, and usually lead to better predictive performance on the test data. In this work, we proposed a transductive feature selection method MINT based on information theory. MINT applies the MRMR criterion and integrates the test data in a natural way in the feature selection process. A dynamic programming 2 algorithm is developed to speed up the selection process. Our experiments on both simulated and real data show that MINT generally achieves similar or better results than mRMR does which relies on training data only. To our knowledge, this is the first transductive feature selection method based on the MRMR criterion. 2 Methods A popular criterion for feature selection is Max-Relevance and Min-Redundancy (MRMR) [11]. Max-Relevance searches for features satisfying the Equation 1, which measures the mean value of all mutual information values between individual feature xi and class variable c. 1 X max D(S, c), D = I(xi ; c) (1) |S| xi ∈S where S are the selected features, and I(xi ; c) is the mutual information between xi and c. However, feature selection just based on max-relevance tends to select features that have high redundancy, namely the correlations of the selected features tend to be big. If we remove some of the features that are highly correlated with other features, the respective class-discriminative power would not change much. Therefore, Min-Redundancy is proposed to select mutually exclusive features: X 1 I(xi , xj ) (2) min R(S), R = |S|2 xi ,xj ∈S An operator Φ(D, R) is defined to combine D and R from the above two equations where D and R are optimized at the same time: max Φ(D, R), Φ = D − R (3) In this work, based on the MRMR criterion, we proposed a novel method MINT (Mutual INformation based Transductive feature selection), which targets feature selection with both the training data and the unlabeled test data. We developed a dynamic programming based greedy algorithm to efficiently select features. We observe that the MRMR criterion has two components, one for maximum relevance and one for minimum redundancy and that the two components are independent. Maximum relevance requires calculation of the mutual information between the selected features and the target variable. As in transductive learning, the target variable values of the test samples are not available, this component remains untouched. Minimum redundancy, on the other hand, calculates the mutual information among all the selected features and the target variable values are not involved. Therefore we can make the method transductive by including all the test samples in this component to help improve the estimation of mutual information. We applied the same incremental search strategy used in [11] to effectively find the near-optimal features defined by Φ() in equation 3. The incremental algorithm works as the following: Assume feature set Sm−1 is already generated and contains m − 1 features. The m-th feature needs to be selected from the set X − Sm−1 , which maximizes the following objective function: 3 h ; ctraining ) − maxxj ∈X−Sm−1 I(xtraining j 1 m−1 X I(xjtraining+test ; xitraining+test ) i (4) xi ∈Sm−1 where xtraining denotes the j-th feature vector including only the training data, xtraining+test j j denotes the j-th feature vector including both the training and test data, ctraining denotes the class value vector including only the training data, I(xi , xj ) is the mutual information between xi and xj . We next propose an efficient greedy algorithm to incrementally select the features P based on a dynamic programming strategy. Our motivation is that the operation xi ∈Sm−1 I(xj ; xi ) (for simplicity, we ignore the superscripts of “training” and “test”) need not be re-conducted for every xj . Since the features are added in an incremental manner, the differences between Sm−1 and Sm−2 is just the (m − 1)-th feature. Therefore, we do not need to re-compute the sum between xj and P P of the mutual information xi where 1 ≤ i ≤ m − 2. The two sums xi ∈Sm−2 I(xj ; xi ) and xi ∈Sm−1 I(xj ; xi ) are P just different by I(xj ; xm−1 ). Therefore, we can save this sum xi ∈Sm−1 I(xj ; xi ) at every step and reuse them in the next step. The complexity of this dynamic programming algorithm is O(N M ), where N is the number of selected features and M is the number of total features. 3 Experimental Results We compare the predictive performance of rrBLUP [9,14] on the full set of variables versus its performance on the subsets of variables of different size selected by mRMR [11] and MINT, referred to as ”mRMR + rrBLUP” and ”MINT + rrBLUP”, respectively. Similar results, not included due to space restrictions, were obtained when applying some other predictive methods to features selected by mRMR and MINT. In all experiments, we perform 10-fold cross-validations and measure the average coefficient of determination r2 (computed as the square of Pearson’s correlation coefficient) between the true and predicted outputs; higher r2 indicates better performance. Simulated Data. As our method is based on the MRMR criterion, we experiment with different levels of relevance and redundancy, and show that the performance of MINT relies on both components. We randomly simulate 10 different data sets for each parameter settings, and report average results. First, we simulate a 200-dimensional target variable vector Y following multivariate uniform distribution Y ∼ U (0, 1), and then we simulate the features as F = Y + e, where e ∼ N (0, δ 2 ) is a 200-dimensional noise vector following a multivariate normal distribution. Thus, the large-δ features are noisy (“bad”), while lower-δ features are less noisy (“good”). We simulate 100 “good” features with e ∼ N (0, 100) and 1900 “bad” features with e′ ∼ N (0, 1000). The results are shown in Table 1, Case one. In this case the feature selection methods work well, but as the good features are randomly simulated and they have low redundancy, the performances of mRMR+rrBLUP and MINT+rrBLUP are almost identical. Next, we again simulate a target variable vector Y ∼ U (0, 1). For the design matrix X, we simulate 50 “seed” features F = Y + e with e ∼ N (0, 500). Then for each seed feature, we simulate 9 “duplicate” features as F ′ = F + e′ where e′ ∼ N (0, 100). We consider all these 500 features as “good” features. We also simulate 4500 “bad” features F ′′ = Y + e′′ with e′′ ∼ N (0, 1000). Therefore the good and bad features 4 are still relatively easy to be distinguished and there are large redundancies among the good features. The results are shown in Table 1, Case two. MINT+rrBLUP consistently outperforms mRMR+rrBLUP, due to the redundancy we introduced in the good feature set; both methods outperform rrBLUP. Table 1. Performance (average r2 over 10-fold CV) of rrBLUP on the full set of features vs. MINT+rrBLUP and mRMR+rrBLUP, on simulated data for two different cases. Case rrBLUP Number of MINT mRMR (all features) selected features + rrBLUP +rrBLUP 50 0.940 0.938 One 0.845 100 0.958 0.962 150 0.281 0.280 250 0.376 0.363 Two 0.187 350 0.434 0.411 450 0.432 0.414 550 0.456 0.448 Real data. Next, we compare the same methods on the two Maize data sets Dent and Flint [12] and show the results in Tables 2. Each data set, Dent and Flint, has three phenotypes, thus we have six phenotypes overall. Dent has 216 samples and 30,027 features and Flint has 216 samples and 29,094 features. We vary the number of selected features as 100, 200, 300, 400 and 500. It is obvious that both mRMR+rrBLUP and MINT+rrBLUP outperform rrBLUP significantly, indicating feature selection in general is able to improve the performance of the predictive model. On the other hand, in almost all data sets, MINT outperforms mRMR consistently, illustrating the effectiveness of transduction. Table 2. Performance (average r2 over 10-fold CV) of rrBLUP (all features) vs. mRMR+rrBLUP and MINT+rrBLUP on Maize (Dent and Flint) and n is the number of selected features. Data Set (Dent) rrBLUP (all features) Heritability n=100 n=200 n=300 n=400 n=500 Pheno 1 (mRMR+rrBLUP) 0.426 0.514 0.526 0.563 0.536 0.439 0.952 Pheno 1 (MINT+rrBLUP) 0.623 0.662 0.668 0.653 0.663 Pheno 2 (mRMR+rrBLUP) 0.584 0.591 0.603 0.619 0.629 0.410 0.932 Pheno 2 (MINT+rrBLUP) 0.687 0.674 0.678 0.667 0.669 Pheno 3 (mRMR+rrBLUP) 0.502 0.523 0.521 0.515 0.498 0.228 0.791 Pheno 3 (MINT+rrBLUP) 0.517 0.515 0.514 0.536 0.537 Data Set (Flint) rrBLUP (all features) Heritability n=100 n=200 n=300 n=400 n=500 Pheno 1 (mRMR+rrBLUP) 0.493 0.472 0.476 0.495 0.508 0.275 0.954 Pheno 1 (MINT+rrBLUP) 0.627 0.599 0.606 0.588 0.601 Pheno 2 (mRMR+rrBLUP) 0.340 0.407 0.411 0.408 0.405 0.255 0.643 Pheno 2 (MINT+rrBLUP) 0.480 0.500 0.498 0.486 0.491 Pheno 3 (mRMR+rrBLUP) 0.199 0.250 0.288 0.275 0.271 0.047 0.355 Pheno 3 (MINT+rrBLUP) 0.320 0.350 0.361 0.352 0.350 4 Conclusions In this work, we proposed a transductive feature selection method MINT based on information theory where the test data is integrated in a natural way into a greedy 5 Table 3. Performance of Feature Selection Data Set MINT+rrBLUP (n=500) mRMR+rrBLUP (n=500) rrBLUP Data 1 0.14 0.015 0.018 Data 2 0.303 0.110 0.204 Data 3 0.563 0.536 0.607 Data 4 0.369 0.235 0.31 Data 5 0.364 0.201 0.22 Data 6 0.276 0.148 0.17 Lasso Elastic Net 0.018 0.019 0.129 0.146 0.540 0.545 0.255 0.261 0.212 0.214 0.15 0.162 SVR num. of samples 0.079 220 0.234 319 0.615 1217 0.306 671 0.174 532 0.184 620 feature selection process. A dynamic programming algorithm is developed to speed up the greedy selection. Our experiments on both simulated and real data show that MINT is generally a better method than the inductive feature selection method mRMR. What’s more, MINT is not restricted to genetic trait prediction problems but is a generic feature selection model. References 1. Y. Cai, J. He, X. Li, K. Feng, L. Lu, K. Feng, X. Kong, and W. Lu. Prediction of protein subcellular locations with feature selection and analysis. Protein and Peptide Letters, 17(4):464–472, 2010. 2. Scott Shaobing Chen, David L. Donoho, Michael, and A. Saunders. Atomic decomposition by basis pursuit. SIAM Journal on Scientific Computing, 20:33–61, 1998. 3. A. Gammerman, V. Vovk, and V. Vapnik. Learning by transduction. In Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, pages 148–155. Morgan Kaufmann Publishers Inc., 1998. 4. I. Guyon and A. Elisseeff. An introduction to variable and feature selection. The Journal of Machine Learning Research, 3:1157–1182, 2003. 5. T. Huang, X.H. Shi, P. Wang, Z. He, K.Y. Feng, L.L. Hu, X. Kong, Y.X. Li, Y.D. Cai, and K.C. Chou. Analysis and prediction of the metabolic stability of proteins based on their sequential features, subcellular locations and interaction networks. PLoS One, 5(6):e10972, 2010. 6. A. Jain and D. Zongker. Feature selection: Evaluation, application, and small sample performance. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 19(2):153– 158, 1997. 7. K Kizilkaya, RL Fernando, and DJ Garrick. Genomic prediction of simulated multibreed and purebred performance using observed fifty thousand single nucleotide polymorphism genotypes. Journal of animal science, 88(2):544–551, 2010. 8. Andrés Legarra, Christele Robert-Granié, Pascal Croiseau, François Guillaume, Sébastien Fritz, et al. Improved lasso for genomic selection. Genetics research, 93(1):77, 2011. 9. T.H.E. Meuwissen, B.J. Hayes, and M.E. Goddard. Prediction of total genetic value using genome-wide dense marker maps. Genetics, 157:1819–1829, 2001. 10. Trevor Park and George Casella. The bayesian lasso. Journal of the American Statistical Association, 103:681–686, June 2008. 11. H. Peng, F. Long, and C. Ding. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 27(8):1226–1238, 2005. 12. Renaud Rincent, Denis Laloë, Stéphane Nicolas, Thomas Altmann, Dominique Brunel, Pedro Revilla, Victor M Rodriguez, J Moreno-Gonzalez, A Melchinger, Eva Bauer, et al. 6 13. 14. 15. 16. Maximizing the reliability of genomic selection by optimizing the calibration set of reference individuals: Comparison of methods in two diverse groups of maize inbreds (zea mays l.). Genetics, 192(2):715–728, 2012. Robert Tibshirani. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society, Series B, 58:267–288, 1994. J.C. Whittaker, R. Thompson, and M.C. Denham. Marker-assisted selection using ridge regression. Genet Res, 75:249–252, 2000. Y. Yang and J.O. Pedersen. A comparative study on feature selection in text categorization. In Machine Learning-International Workshop then Conference-, pages 412–420. Morgan Kaufmann Publishers, INC., 1997. Y. Zhang, C. Ding, and T. Li. Gene selection algorithm by combining relieff and mrmr. BMC genomics, 9(Suppl 2):S27, 2008.
5cs.CE
Bayesian Network Learning via Topological Order Young Woong Park ∗1 and Diego Klabjan †2 1 2 College of Business, Iowa State University, Ames, IA 50011, USA Department of Industrial Engineering and Management Sciences, Northwestern University, Evanston, IL 60208, USA arXiv:1701.05654v2 [stat.ML] 20 Aug 2017 August 22, 2017 Abstract We propose a mixed integer programming (MIP) model and iterative algorithms based on topological orders to solve optimization problems with acyclic constraints on a directed graph. The proposed MIP model has a significantly lower number of constraints compared to popular MIP models based on cycle elimination constraints and triangular inequalities. The proposed iterative algorithms use gradient descent and iterative reordering approaches, respectively, for searching topological orders. A computational experiment is presented for the Gaussian Bayesian network learning problem, an optimization problem minimizing the sum of squared errors of regression models with L1 penalty over a feature network with application of gene network inference in bioinformatics. 1 Introduction Directed graph G is a directed acyclic graph (DAG) or acyclic digraph if G does not contain a directed cycle. In this paper, we consider a generic optimization problem over a directed graph with acyclic constraints, which require the selected subgraph to be a DAG. Let us consider a complete digraph G. Let m be the number of nodes in digraph G, Y ∈ Rm×m a decision variable matrix associated with the arcs, where Yjk is related to arc (j, k), supp(Y ) ∈ {0, 1}m×m the 0-1 (adjacency) matrix with supp(Y )jk = 1 if Yjk 6= 0, supp(Y )jk = 0 otherwise, G(supp(Y )) the sub-graph of G defined by supp(Y ), and let A be the collection of all acyclic subgraphs of G. Then, we can write the optimization problem with acyclic constraints as G(supp(Y )) ∈ A, min F (Y ) s.t. Y (1) where F is a function of Y . Acyclic constraints (or DAG constraints) appear in many network structured problems. The maximum acyclic subgraph problem (MAS) is to find a subgraph of G with maximum cardinality while the subgraph satisfies acyclic constraints. MAS can be written in the form of (1) with F (Y ) = −ksupp(Y )k0 . Although exact algorithms were proposed for a superclass of cubic graphs [10] and for general directed graphs [22], most of the works have focused on approximations [9, 20] or inapproximability [18] of either MAS or the minimum feedback arc set problem (FAS). FAS of a directed graph G is a subgraph of G that creates a DAG when the arcs in the feedback arc set are removed from G. Note that MAS is closely related to FAS and is dual to the minimum FAS. Finding a feedback arc set with minimum cardinality is N P-complete in general [24]. However, minimum FAS is solvable in polynomial time for some special graphs such as planar graphs [28] and reducible flow graphs [33], and a polynomial time approximation scheme was developed for a special case of minimum FAS, where exactly one arc exists between any two nodes (called tournament) [25]. DAGs are also extensively studied in Bayesian network learning. Given observational data with m features, the goal is to find the true unknown underlying network of the nodes (features) while the selected arcs (dependency relationship between features) do not create a cycle. In the literature, approaches are ∗ [email protected][email protected] 1 classified into three categories: (i) score-based approaches that try to optimize a score function defined to measure fitness, (ii) constraint-based approaches that test conditional independence to check existence of arcs between nodes (iii) and hybrid approaches that use both constraint and score-based approaches. Although there are many approaches based on the constraint-based or hybrid approaches, our focus is solving (1) by means of score-based approaches. For a detailed discussion of constraint-based and hybrid approaches and models for undirected graphs, the reader is referred to Aragam and Zhou [1] and Han et al. [19]. For estimating the true network structure by a score-based approach, various functions have been used as different functions give different solutions and behave differently. Many works focus on penalized least squares, where penalty is used to obtain sparse solutions. Popular choices of the penalty term include BIC [26], L0 -penalty [5, 37], L1 -penalty [19], and concave penalty [1]. Lam and Bacchus [26] use minimum-description length as a score function, which is equivalent to BIC. Chickering [5] proposes a two-phase greedy algorithm, called greedy equivalence search, with the L1 norm penalty. Van de Geer and Bühlmann [37] study the properties of the L0 norm penalty and show positive aspects of using L0 regularization. Raskutti and Uhler [34] use a variant of the L0 norm. They use cardinality of the selected subgraph as the score function where the subgraphs not satisfying the Markov assumption are penalized with a very large penalty. Aragam and Zhou [1] introduce a generalized penalty, which includes the concave penalty, and develop a coordinate descent algorithm. Han et al. [19] use the L1 norm penalty and propose a Tabu search based greedy algorithm for reduced arc sets by neighborhood selection in the pre-processing step. With any choice of a score function, optimizing the score function is computationally challenging, because the number of possible DAGs of G grows super exponentially in the number of nodes m and learning Bayesian networks is also shown to be N P-complete [4]. Many heuristic algorithms have been developed based on greedy hill climbing [5, 21, 19] or coordinate descent [14], or enumeration [34] when the score function itself is the main focus. There also exist exact solution approaches based on mathematical programming. One of the natural approaches is based on cycle prevention constraints, which are reviewed in Section 2. The model is covered in Han et al. [19] as a benchmark for their algorithm, but the MIP based approach does not scale; computational time increases drastically as data size increases and the underlying algorithm cannot solve larger instances. Baharev et al. [2] studied MIP models for minimum FAS based on triangle inequalities and set covering models. Several works have been focused on the polyhedral study of the acyclic subgraph polytopes [3, 15, 17, 27]. In general, MIP models have gotten relatively less attention due to the scalability issue. In this paper, we propose an MIP model and iterative algorithms based on the following well-known property of DAGs [6]. Property 1. A directed graph is a DAG if and only if it has a topological order. A topological order or topological sort of a DAG is a linear ordering of all of the nodes in the graph such that the graph contains arc (u, v) if and only if u appears before v in the order [7]. Suppose that Z is the adjacency matrix of an acyclic graph. Then, by sorting the nodes of acyclic graph G(Z) based on the topological order, we can create a lower triangular matrix from Z, where row and column indices of the lower triangular matrix are in the topological order. Then, any arc in the lower triangular matrix can be used without creating a cycle. By considering all arcs in the lower triangular matrix, we can optimize F in (1) without worrying to create a cycle. This is an advantage compared to arc-based search, where acyclicity needs to be examined whenever an arc is added. Although the search space of topological orders is very large, a smart search strategy for a topological order may lead to a better algorithm than the existing arc-based search methods. Node orderings are used for Bayesian Network learnings based on Markov chain Monte Carlo methods [8, 13, 30] as alternatives to network structure based approaches. The proposed MIP assigns node orders to all nodes and add constraints to satisfy Property 1. The iterative algorithms search over the topological order space by moving from one topological order to another order. The first algorithm uses the gradient to find a better topological order and the second algorithm uses historical choice of arcs to define the score of the nodes. With the proposed MIP model and algorithms for (1), we consider a Gaussian Bayesian network learning problem with L1 penalty for sparsity, which is discussed in detail in Section 4. Out of many possible models in the literature, we pick the L1 -penalized least square model from recently published 2 work of Han et al. [19], which solves the problem using a Tabu search based greedy algorithm. The algorithm is one of the latest algorithms based on arc search and is shown to be scalable when m is large. Further, their score function, L1 penalized least squares, is convex and can be solved by standard mathematical optimization packages. Hence, we select the score function from Han et al. [19] and use their algorithm as benchmark. In the computational experiment, we compare the performance of the proposed MIP model and algorithms against the algorithm in Han et al. [19] and other available MIP models for synthetic and real instances. Our contributions are summarized in the following. 1. We consider a general optimization problem with acyclic constraints and propose an MIP model and iterative algorithms for the problem based on the notion of topological orders. 2. The proposed MIP model has significantly less constraints than the other MIP models in the literature, while maintaining the same order of the number of variables. The computational experiment shows that the proposed MIP model outperforms the other MIP models when the subgraph is sparse. 3. The iterative algorithms based on topological orders outperform when the subgraph is dense. They are more scalable than the benchmark algorithm of Han et al. [19] when the subgraph is dense. In Section 2, we present the new MIP model along with two MIP models in the literature. In Section 3, we present two iterative algorithms based on different search strategies for topological orders. The Gaussian Bayesian network learning problem with L1 -penalized least square is introduced and computational experiment are presented in Sections 4 and 5, respectively. In the rest of the paper, we use the following notation. J = {1, · · · , m} = index set of the nodes J k = J \ {k} = index set of the nodes excluding node k, k ∈ J Z = supp(Y ) ∈ {0, 1}m×m π = topological order Given π, we define πk = q to denote that the order of node k is q. For example, given three nodes a, b, c, and topological order b − c − a, we have πa = 3, πb = 1, and πc = 2. With this notation, if πj > πk , then we can add an arc from j to k. 2 MIP Formulations based on Topological Order In this section, we present three MIP models for (1). The first and second models, denoted as MIPcp and MIPin, respectively, are models in the literature for similar problems with acyclic constraints. The third model, denoted as MIPto, is the new model we propose based on Property 1. A popular mathematical programming based approach for solving (1) is the cutting plane algorithm, which is well-known for the traveling salesman problem formulation. Let C be the set of all possible cycles and Cl ∈ C be the set of the arcs defining a cycle. Let H(supp(Y ), Cl ) be a function that counts the number of selected arcs in supp(Y ) from Cl . Then, (1) can be solved by MIPcp min F (Y ) s.t. Y H(supp(Y ), Cl ) ≤ |Cl | − 1, Cl ∈ C, (2) which can be formulated as an MIP. Note that (2) has exponentially many constraints due to the cardinality of C. Therefore, it is not practical to pass all cycles in C to a solver. Instead, the cutting plane algorithm starts with an empty active cycle set C A and iteratively adds cycles to C A . That is, the algorithm iteratively solves min F (Y ) s.t. Y H(supp(Y ), Cl ) ≤ |Cl | − 1, Cl ∈ C A , (3) with the current active set C A , detects cycles from the solution, and adds the cycles to C A . The algorithm terminates when there is no cycle detected from the solution of (3). One of the drawbacks of the cutting 3 plane algorithm based on (3) is that in the worst case we can add all exponentially many constraints. In fact, Han et al. [19] study the same model and concluded that the cutting plane algorithm does not scale. Baharev et al. [2] recently presented MIP models for the minimum feedback arc set problem based on linear ordering and triangular inequalities, where the acyclic constraints presented were previously used for cutting plane algorithms for the linear ordering problem [16, 29]. For any F , we can write the following MIP model based on triangular inequalities presented in [2, 16, 29]. MIPin min F (Y ) (4a) s.t. Z = supp(Y ), (4b) Zqj + Zjk − Zqk ≤ 1, 1 ≤ q < j < k ≤ m, (4c) − Zqj − Zjk + Zqk ≤ 0, 1 ≤ q < j < k ≤ m, (4d) Zjk ∈ {0, 1}, 1≤j<k≤m (4e) Note that Zjk is not defined for all j ∈ J k and k ∈ J. Instead of having a full matrix of binary variables, the formulation only uses lower triangle of the matrix using the fact that Zjk + Zkj = 1. We can also use this technique to any of the MIP models presented in this paper. However, for ease of explanation, we will use the full matrix, while the computational experiment is done with the reduced number of binary variables. Therefore, the cutting plane algorithm with MIPcp should be more scalable than the implementation in Han et al. [19], which has twice more binary variables. Baharev et al. [2] also provides a set covering based MIP formulation. The idea is similar to MIPcp. In the set covering formulation, each row and column represents a cycle and an arc, respectively. Similar to MIPcp, existence of exponentially many cycles is a drawback of the formulation and Baharev et al. [2] use the cutting plane algorithm. Next, we propose an MIP model based on Property 1. Although MIPin uses significantly less constraints than MIPcp, MIPin still has O(m3 ) constraints which grows rapidly in m. On the other hand, the MIP model we propose has O(m2 ) variables and O(m2 ) constraints. In addition to Z, let us define decision variable matrix O ∈ {0, 1}m×m .  1 if πk = q, Okq = k ∈ J, q ∈ J 0 otherwise, Then, we have the following MIP model. MIPto min F (Y ) s.t. (5a) Z = supp(Y ), Zjk − mZkj ≤ (5b) X r(Okr − Ojr ), j ∈ J k , k ∈ J, (5c) j ∈ J k , k ∈ J, (5d) k ∈ J, (5e) q ∈ J, (5f) r∈J Zjk + Zkj ≤ 1, X Okq = 1, q∈J k X Okq = 1, k∈J q Z, O ∈ {0, 1}m×m , Y unrestricted (5g) The key constraint in (5) is (5c). Recall that Zjk indicates which node comes first in the topological order and Okr stores the exact location in the order. With these definitions, (5c) forces correct values of Zjk and Zkj by comparing the order difference. Recall that we can reduce the number of binary variables 4 Zjk ’s by plugging Zjk + Zkj = 1, but we keep the full matrix notation for ease of explanation. We next show that (5) correctly solves (1). Proposition 1. An optimal solution to (5) is an optimal solution to (1). Proof. By Property 1, any DAG has a corresponding topological order. Let π ∗ be the topological order defined by an optimal solution Y ∗ for (1). Note that (5e) and (5f) define a topological order. Hence, it suffices to show that (5) gives a DAG given π ∗ . Note that the right hand side of (5c) measures the difference in the topological order between nodes j and k. If the value is positive, it implies πk > πj . P Consider (5c) for j1 and j2 with πj∗2 > πj∗1 . When j = j1 and k = j2 , we have r∈J r(Oj2 r − Oj1 r ) > 0 in P (5c) and at most one of zj1 j2 and zj2 j1 can be 1 by (5d). When j = j2 and k = j1 , we have r∈J r(Oj1 r − Oj2 r ) < 0 in (5c) and we must have zj1 j2 = 1 by the left hand side of (5c). Therefore, we have correct value zj1 j2 = 1 when πj∗2 > πj∗1 . This completes the proof. In Table 1, we compare the MIP models introduced in this section. Although all three MIP models have O(m2 ) binary variables, MIPto has more binary variables than MIPcp and MIPin due to Okq ’s. MIP models MIPin and MIPto have polynomially many constraints, whereas MIPcp has exponentially many constraints. MIPto has the smallest number of constraints among the three MIP models. In the computational experiment, we use a variation of the cutting plane algorithm for MIPcp as it has exponentially many constraints. For MIPin and MIPto, we do not use a cutting plane algorithm. Name MIPcp MIPin MIPto Reference (2) (4) (5) # binary variables O(m2 ) O(m2 ) O(m2 ) # constraints exponential O(m3 ) O(m2 ) Table 1: Number of binary variables and constraints of MIP models 3 Algorithms based on Topological Order Although the MIP models introduced in Section 2 guarantee optimality, the execution time for solving an integer programming problem can be exponential in problem size. Further, the execution time could increase drastically in m, as all of the models require at least O(m2 ) binary variables and O(m2 ) constraints. In order to deal with larger graphs, we propose iterative algorithms for (1) based on Property 1. Observe that, if we are given a topological order of the nodes, then Z and O are automatically determined in (5). In other words, we can easily obtain a subset of the arcs such that all of the arcs can be used without creating a cycle. Let R̄ be the determined adjacency matrix given topological order π̄. In detail, we set R̄jk = 1 if π̄j > π̄k , R̄jk = 0 otherwise. Let adj(π̄) be the function generating R̄ given input topological order π̄. If we are given π̄, then we can generate R̄ by adj(π̄), and solving (1) can be written as min F (Y ) s.t. R̄ ≥ supp(Y ). Y (6) Note that (6) has acyclic constraint R̄ ≥ supp(Y ), not R̄ = supp(Y ). The inequality is needed when we try to obtain a sparse solution, i.e., only a subset of the arcs is selected among all possible arcs implied by R̄. As long as we satisfy the inequality, Y forms an acyclic subgraph. Hence, R̄ can be different from adjacency matrix supp(Y ) in an optimal solution of (6), and any arc (j, k) such that R̄jk = 1 can be selected without creating a cycle. For this reason, we call R̄ an adjacency candidate matrix. The algorithms proposed later in this section solve (6) by providing different π̄ and R̄ = adj(π̄) in each iteration. In fact, (6) is separable into m sub problems if F is separable. Let Yk and Zk be the k th columns of Y and R, respectively, for node k. Then, solving min Fk (Yk ) s.t. Yk 5 R̄k ≥ supp(Yk ), (7) P for all k ∈ J gives the same solution as solving (6) if F is separable as F (Y ) = k∈J Fk (Yk ). In Section 3.1, a local improvement algorithm for a given topological order is presented. The algorithm swaps pairs of nodes in the order. In both of the iterative algorithms proposed in Sections 3.2 and 3.3, we use the local improvement algorithm presented in the following section. 3.1 Topological Order Swapping Algorithm Algorithm 1 tries to improve the solution by swapping the topological order. In each iteration, the algorithm determines the nodes to swap that have order s1 and s2 in Line 3, where s2 = s1 + 1 implies that we select two nodes which are neighbors in the current topological order. Then in Line 4, the actual node indices k1 and k2 such that πk1 = s1 and πk2 = s2 are detected. The condition in Line 5 is to avoid meaningless computation when Y ∗ is sparse. If |Yk∗2 k1 | > 0, we know for sure that Yk∗2 k1 = 0 after swapping the orders of k1 and k2 and thus we will get a different solution. However, if Yk∗2 k1 = 0, we will still have Yk∗2 k1 = 0 after the swap forced by the new order. In Line 6, we create a new topological order π̄ by swapping nodes k1 and k2 in π ∗ . After obtaining adjacency candidate matrix R̄ in Line 7, we solve (6) with R̄. It is worth noting that, if F is separable, we only need to solve (7) with k = k1 and k2 because the values of R̄ are the same with R∗ except for k1 and k2 as the order difference was 1 in π ∗ . In Line 9, we update the best solution if the new solution is better. The iterations continue until there is no improvement in the past m iterations, which implies that we would swap the same nodes if we proceed after this iteration. Algorithm 1 is illustrated by the following toy example. Algorithm 1 TOSA (Topological Order Swapping Algorithm) Input: Y 0 , R0 , π 0 Output: Best solution Y ∗ , R∗ , π ∗ 1: (Y ∗ , R∗ , π ∗ ) ← (Y 0 , R0 , π 0 ), t ← 0 2: While there is an improvement in the past m iterations 3: t ← t + 1, s1 ← (t mod (m − 1)) + 1, s2 ← s1 + 1 4: (k1 , k2 ) ← node indices satisfying πk1 = s1 and πk2 = s2 5: If |Yk∗2 k1 | > 0 then 6: π̄ ← π ∗ , π̄k1 = s2 , π̄k2 = s1 7: R̄ ← adj(π̄) 8: Ȳ ← solve (6) with R̄ 9: If F (Ȳ ) < F (Y ∗ ) then update (Y ∗ , R∗ , π ∗ ) 10: End if 11: End While Example. Consider a graph with m = corresponding order 3 − 1 − 2 − 4,  0 0  0 0 Y0 =  0 0 0.4 0.8 4 nodes. Let us assume that inputs are π 0 = (2, 3, 1, 4) with   0.5 0 0  0.5 0  , and R0 =  0  0 0 0  0.1 0 1 0 0 0 1 1 1 0 1  0 0  . 0  0 In iteration 1, t = 1, s1 = 1, s2 = 2, k1 = 3, and k2 = 1. Hence, we are swapping nodes 3 and 1. Since ∗ |Y13 | = 0.5 > 0, π̄ = (1, 3, 2, 4) is created in Line 6, where the associated order is 1 − 3 − 2 − 4. If π̄ gives an improved objective function value, then π ∗ is updated in Line 9. Let us assume that π ∗ is not ∗ | = 0, Lines 6 - 9 are not updated. In iteration 2, t = 2, s1 = 2, s2 = 3, k1 = 1, and k2 = 2. Since |Y21 executed.  3.2 Iterative Reorering Algorithm We propose an iterative reordering algorithm based on Property 1, which solves (6) in each iteration aiming to optimize (1). In each iteration of the algorithm, all nodes are sorted based on scores defined 6 by (i) merit scores of the arcs, (ii) historical choice of the arcs (used as weights), (iii) and some random components. Then the sorted node order is directly used as a topological order. The selected arcs by the topological order give updates on arc weights. Let us first define notation. ν = uniform random variable on [νlb , νub ], νlb < 1 < νub ρjk = pre-determined merit score of arc (j, k) for j ∈ J, k ∈ J wjk = weight of arc (j, k) for j ∈ J, k ∈ J ck = score of node k, k ∈ J The range [νlb , νub ] of the uniform random variable ν balances the randomness and structured scores. Note that ρjk should be determined based on the data and the characteristic of the problem considered, where larger ρjk implies that arc (j, k) is attractive. Based on the arc merit scores ρ, the score for node k, k ∈ J, is defined as X  wjk ρjk , k ∈ J, ck = ν · (8) j∈J k which can be interpreted as a weighted summation of ρjk ’s multiplied by perturbation random number ν. Hence, nodes with high scores are attractive. Initially, all arcs have equal weights and the weights are updated in each iteration based on the topological order in the iteration. If R̄ = adj(π̄) is the adjacency candidate matrix in the iteration, then, the weights are updated by wjk = wjk + 1, if R̄jk = 1. (9) The overall algorithmic framework is summarized in Algorithm 2. In Line 1, weights wjk ’s are initialized to 1 and t̄, which counts the number of iterations without a best solution update, is initialized. Also, a random order π ∗ of the nodes is generated, and the corresponding solution becomes the best solution. In each iteration, first node scores ck ’s are calculated (Line 3), then topological order π̄ is obtained by sorting the nodes, and finally adjacency candidate matrix R̄ is generated (Line 4). Then, in Lines 5 and 6, solution Ȳ is obtained by solving (6) with R̄ and the best solution is updated if available. In Lines 7 - 10, TOSA is executed if the current solution is within a certain percentage α from the best solution. Lines 11 and 12 update t̄, and Line 13 updates wjk ’s. This ends the iteration and the algorithm continues until π̄ is converged or there is no update of the best solution in the last t∗ iterations. Algorithm 2 is illustrated by the following toy example. Algorithm 2 IR (Iterative Reordering) Input: Merit score ρ ∈ Rm×m , termination parameter t∗ , TOSA execution parameter α Output: Best solution Y ∗ , R∗ , π ∗ 1: wjk ← 1, π ∗ ← a random order, R∗ ← adj(π ∗ ), π̄ ← π ∗ , Y ∗ ← solve (6) with R∗ , t̄ ← 0 2: While (i) π̄ is not convergent or (ii) t̄ < t∗ 3: Calculate score ck by (8) 4: π̄ ← sort nodes with respect to ck , R̄ ← adj(π̄) 5: Ȳ ← solve (6) with R̄ 6: If F (Ȳ ) < F (Y ∗ ) then update (Y ∗ , R∗ , π ∗ ) 7: If F (Ȳ ) < F (Y ∗ ) · (1 + α) 8: (Y 0 , R0 , π 0 ) ← TOSA(Ȳ , R̄, π̄), 9: If F (Y 0 ) < F (Y ∗ ) then update (Y ∗ , R∗ , π ∗ ) 10: End If 11: If (Y ∗ , R∗ , π ∗ ) is updated then t̄ ← 0 12: Else t̄ ← t̄ + 1 13: Update weights by (9) 14: End While Example. Consider a graph with m = 3 nodes. In the current iteration, let us assume that we are given 7     0.5 0 1 2 0.2  and w =  1 0 1 . 0 2 1 0 P P Note P that we have j∈J 1 wj1 ρj1 = 0.2 · 1 + 0.3 · 2 = 0.8, j∈J 2 wj2 ρj2 = 0.5 · 1 + 0.3 · 1 = 0.8, and j∈J 3 wj3 ρj3 = 0.4 · 2 + 0.2 · 1 = 1. If random numbers (ν) are 0.9, 1.1, 0.8 for nodes 1,2, and 3, respectively, then by (8), c1 = 0.9 · 0.8 = 0.72, c2 = 1.1 · 0.8 = 0.88, and c3 = 0.8 · 1 = 0.8. Then in Line 4, we obtain π̄ = (3, 1, 2), with corresponding order 2 − 3 − 1, and R̄ = [0, 1, 1; 0, 0, 0; 0, 1, 0]. After obtaining Ȳ and updating the best solution in Lines 5-12, the weights are updated by (9) as follows.     0 1 2 0 2 3 wnew =  1 0 1  + R̄ =  1 0 1  2 1 0 2 2 0 0 0.5 ρ =  0.2 0 0.3 0.3 This ends the current iteration. 3.3  Gradient Descent Algorithm In this section, we propose a gradient descent algorithm based on Property 1. The algorithm iteratively executes: (i) moving toward an improving direction by gradients, (ii) DAG structure is recovered and topological order is obtained by a projection step. The algorithm is based on the standard gradient descent framework while the projection step takes care of the acyclicity constraints by generating a topological order from the current (possibly cyclic) solution matrix. In order to distinguish the solutions with and without the acyclicity property, we use the following notation. U t ∈ Rm×m = decision variable matrix without acyclicity requirement in iteration t Y t ∈ Rm×m = decision variable matrix satisfying G(supp(Y t )) ∈ A in iteration t Let γ t be the step size in iteration t, ∇F (Y t ) be the derivative of F at Y t , and Gt ∈ Rm×m be a weight matrix that weighs each element. We assume k∇F (Y t )k∞ ≤ M1 for a constant M1 , where k · k∞ is the uniform (infinity) norm. The update formula   U t = Y t − γ t ∇F (Y t ) ◦ Gt , t ≥ 0, (10) updates Y t based on the weighted gradient, where ◦ represents the entrywise or Hadamard product of the two matrices. Given topological order π t , we define Gt as t  1 πk , Gtjk = 1 + t πk j ∈ Jk (11) to balance gradients of the nodes with different orders (small and large values of πkt ). For nodes k1 and k2 with πkt 1 = 1 and πkt 2 = m, most of the gradients for node k1 are zero and most of the gradients for node k2 are nonzero. Weight (11) tries to adjust this gap. Note that we have 2 ≤ Gtjk ≤ e for any large m. Since U t may not satisfy acyclic constraints, in order to obtain a DAG, the algorithm needs to solve the projection problem Y ∗ = argminY kY − U t k22 s.t. G(supp(Y )) ∈ A, (12) where k · k2 is the L2 norm. Proposition 2. If U t is arbitrary, then optimization problem (12) is N P-hard. Proof. Recall that feedback arc set is N P-complete [24] and maximum acyclic subgraph is the dual of the feedback arc set problem. With U t = 1, (12) becomes the weighted maximum acyclic subgraph problem. Therefore, (12) is N P-complete. Because solving (12) to optimality does not guarantee an optimal solution for (1), we use a greedy strategy to solve (12). The greedy algorithm, presented in Algorithm 3, sequentially determines and fixes the topological order of a node where in each iteration the problem is solved optimally given the currently 8 fixed nodes and corresponding orders. The detailed derivations of the algorithm and the proof that each iteration is optimal, given already fixed node orders, are available in Appendix A. In other words, we show that Line 3 is ‘locally’ optimal, i.e., it selects the best next node given that q + 1, q + 2, · · · , m P the order t 2 is fixed. In each iteration, in Line 3, the algorithm first calculates score j∈J¯(Ūjk ) for each node k in J¯ and picks node k ∗ with the minimum value. Then, in Line 4, the order of the selected node is fixed to q. The fixed node is then excluded from the active set J¯ and iterate q is decreased by 1 in Line 5. At the end of the algorithm, we can determine Ȳ based on the order π̄ determined and (18) in Appendix A. We illustrate Algorithm 3 by the following example. Algorithm 3 Greedy Input: U t ∈ Rm×m Output: Ȳ feasible to (12), topological order π̄ 1: q ← m, J¯ ← J 2: While J¯ 6= ∅ o nX t 2 (Ujk ) 3: k ∗ = argmink∈J¯ j∈J¯ π̄k∗ = q J¯ ← J¯ \ {k ∗ }, q ← q − 1 End While 7: Determine Ȳ by (18) in Appendix A 4: 5: 6: Example. Consider a graph with m = 3 following.  0 Ut =  4 5 nodes. Given U t , the algorithm returns Ȳ presented in the 1 0 2  2 2  0  0 Ȳ =  4 5 0 0 0  0 2  0 Algorithm 3 starts with q = 3 and J¯ = {1, 2, 3}. In iteration 1, node 2 is selected to have π2 = 3 based on argmin{42 + 52 , 12 + 22 , 22 + 22 }. Then, set J¯ and integer q are updated to J¯ = {1, 3} and q = 2. In iteration 2, node 3 is selected to have π3 = 2 based on argmin{52 , 22 }. Then, set J¯ and integer q are updated to J¯ = {1} and q = 1. In iteration 3, node 1 is selected. Hence, we have node order 1-3-2 and we obtain Ȳ presented above with objective function value kȲ − U t k22 = 12 + 22 + 22 = 9.  The overall gradient descent algorithm for (1) is presented in Algorithm 4. In Line 1, the algorithm generates a random order π ∗ and obtain corresponding R∗ and Y ∗ and save them as the best solution. In each iteration of the loop, Lines 3-6 follow the standard gradient descent algorithm. The weighted gradient H t is calculated in Line 3, and the step size is determined in Line 4 based on the ratio between t t maxj∈J k ,k∈J |Hjk | and maxj∈J k ,k∈J |Yjk |. In Line 5, the solution is updated based on the weighted gradient and, in Line 6, the greedy algorithm is used to obtain the projected solution and the topological order. Observe that we do not directly use the projected solution. This is because the projected solution is not necessarily optimal given π t+1 . Hence, in Line 7, a new solution Y t+1 is obtained based on π t+1 . In Lines 9 - 12, T OSA is executed if the current solution is within a certain percentage from the current best solution. Lines 13 and 14 update t̄ and Line 15 copies Y ∗ to Y t+1 if t̄ ≥ t∗2 in order to focus on the solution space near Y ∗ . The algorithm continues until Y t is convergent or t̄ ≥ t∗1 . In gradient based algorithms, it is common to have γ t depend only on t, but in our case dependency on H t and Y t is justifiable since we multiply the gradient by Gt . We next show the convergence of Y t in Algorithm 4 when t∗1 = t∗2 = ∞. This makes the algorithm not to terminate unless Y t has converged and modification of Y t in Line 15 is not executed. Further, we assume the following for the analysis. t t Assumption 1. For any non-zero element Yjk , j, k ∈ J, of Y t in any iteration t, we assume ε < |Yjk |< M2 , where ε is a small positive number and M2 is a large enough number. Note that Assumption 1 is a mild assumption, as ignoring near-zero values of Y t happens in practice anyway due to finite precision. For notational convenience, let Lt = γ t ∇F (Y t ) ◦ Gt = γ t H t be the second 9 Algorithm 4 GD (Gradient Descent) Input: Parameters t∗1 and t∗2 , TOSA execution parameter α Output: Best solution Y ∗ , R∗ , π ∗ 1: t ← 1, t̄ ← 0, π ∗ ← a random order, R∗ ← adj(π ∗ ), Y ∗ ← solve (6) with R∗ 2: While (i) Y t is not convergent or (ii) t̄ < t∗ 1 3: H t ← ∇F (Y t ) ◦ Gt , Gt defined in (11) t k∞ √ t 4: γ t ← kH kY t k∞ t t t t 5: U ←Y −γ H 6: π t+1 ← Greedy(U t ) 7: Y t+1 ← solve (6) with Rt+1 = adj(π t+1 ) 8: If F (Y t+1 ) < F (Y ∗ ) then (Y ∗ , R∗ , π ∗ ) ← (Y t+1 , Rt+1 , π t+1 ) 9: If F (Ȳ ) < F (Y ∗ ) · (1 + α) 10: (Y 0 , R0 , π 0 ) ← T OSA(Y t+1 , Rt+1 , π t ), 11: If F (Y 0 ) < F (Y ∗ ) then (Y ∗ , R∗ , π ∗ ) ← (Y 0 , R0 , π 0 ), (Y t+1 , Rt+1 , π t+1 ) ← (Y 0 , R0 , π 0 ) 12: End If 13: If (Y ∗ , R∗ , π ∗ ) is updated then t̄ ← 0 14: Else t̄ ← t̄ + 1 15: If t̄ ≥ t∗2 then Y t+1 ← Y ∗ 16: t←t+1 17: End While term in (10). Then, U t can be written as U t = Y t − Lt = Y t − γ t H t . In the following lemma, we show that the node orders converge. √ 2 Lemma 1. If t is sufficiently large satisfying t > √ 2(M12e) , then π t = π t+1 . ε( M2 +ε /m−M2 ) Proof. Recall that Y t is obtained by solving (20) and we know the corresponding node order π t . Let k1 , k2 , · · · , km be the node indices defined based on π t . In other words, node k1 appears first, followed by nodes k2 , k3 , and so on in the topological order π t . In the proof, we show that there is no change in the √ 2 node order when the condition t > √ 2(M12e) is met, where M1 and M2 are the upper bounds ε( M2 +ε /m−M2 ) for k∇F (Y t )k∞ and kY t k∞ , respectively, as assumed. We first derive t t kL k∞ = γ H t ∞ 1 kH t k∞ t = √ H t kY t k∞ ∞ 2 1 kH t k∞ 1 (M1 e)2 √ , ≤√ < ε t kY t k∞ t (13) where the last inequality holds since (i) kY t k∞ > ε by Assumption 1, (ii) kH t k∞ = k∇F (Y t ) ◦ Gt k∞ ≤ M1 e because k∇F (Y t )k∞ ≤ M1 by the assumption and kGt k∞ ≤ e, where e is natural number. Now let us consider q = q̄ in Algorithm 3 to decide node order q̄ in iteration t + 1 and assume πkt r = πkt+1 for r = m, m − 1, · · · , q̄ − 1. Note that we currently have J¯ = {k1 , k2 , · · · , kq̄ }. r  2 2 P P P t t 1. For kq̄ , we derive j∈J¯(Ujk )2 = j∈J¯(Yjk − Ltjkq̄ )2 = j∈J¯(Ltjkq̄ )2 < m (M√1tεe) , where the q̄ q̄ t second equality holds since Yjk = 0 for all j ∈ J¯ since πkq̄ = q̄ and no arc can be used to the nodes q̄ ¯ and the last inequality holds due to (13) and |J| ¯ ≤ m. in J, 2. For all other nodes kr ∈ J¯ \ {kq̄ }, we derive P P t 2 = (Y t r − Ltjkr )2 j∈J¯(Ujkr ) Pj∈J¯ jk P P t = (Y t r )2 + j∈J¯(Ltjkr )2 − 2 j∈J¯ Yjk · Ltjkr r Pj∈J¯ jk P t 2 t t ) − 2 j∈J¯ Yjkr · Ljkr > j∈J¯(Y Pjkr t > ε2 − 2 j∈J¯ Yjk · Ltjkr r P t ≥ ε2 − 2 j∈J¯ |Yjk · Ltjkr | m > 2 e) √1 ε2 − 2M2 m(M tε 10 t where the fourth line holds due to |Yjk | > ε by Assumption 1, and the sixth line holds due to r (M1 e)2 t t ¯ |Y | ≤ M2 , |J| ≤ m, and |L | < √ by (13). jk jkr tε  (M1 e)2 2 P t 2 √ < ε2 − Combining the two results for kq̄ and kr ∈ J¯ \ {kq̄ }, we obtain j∈J¯(Ujkq̄ ) < m tε 2 P e) t √1 2M2 m(M < j∈J¯(Ujk )2 , for any r ∈ {1, 2, · · · , q̄ − 1}, where the second inequality holds due to the r tε √ 2 condition t > √ 2(M12e) . The result implies that we must have πkt+1 = πkt q̄ = q̄ by Line 3 in q̄ ε( M2 +ε /m−M2 ) Algorithm 3. Note that, when q̄ = m, we have J = J¯ and the assumption of πkt r = πkt+1 for r = m, m − 1, · · · , q̄ − 1 r automatically holds. By iteratively applying the above derivation technique from q = m to 1, we can show that π t = π t+1 . When (6) is solved with the identical node orders, the resulting solutions are equivalent. Hence, the following proposition holds. Proposition 3. In Algorithm 4, Y t converges in t. 4 Estimation of Gaussian Bayesian Networks In this section, we introduce the Gaussian Bayesian network learning problem, which follows the form of (1). The goal is to learn or estimate unknown structure between the nodes of a graph, where the error is normally distributed. The network can be estimated by optimizing a score function, testing conditional independence, or a mix of the two, as described in Section 1. Among the three categories, we select the score based approach with the L1 -penalized least square function recently studied in Han et al. [19]. Let X ∈ Rn×m be a data set with n observations and m features. Let I = {1, · · · , n} and J = {1, · · · , m} be the index set of observations and features, respectively. For each k ∈ J, we build a regression model in order to explain feature k using a subset of variables in J k . In other words, we set feature k as the response variable and a sparse subset of J k as explanatory variables of the regression model for variable k. In order to obtain a subset of J k , the LASSO penalty function is added. Considering regression models for all k ∈ J together, the problem can be represented on a graph. Each feature is a node in the graph, and the directed arc from node j to node k represents explanatory and response variable relationship between node j and k. The goal is to minimize the sum of penalized SSE over all regression models for k ∈ J, while the selected arcs do not create a cycle. Let βjk , j ∈ J k , k ∈ J, be the coefficient of attribute j for dependent variable k. Then the problem can be written as XX X 1 XX |βjk | s.t. G(supp(β)) ∈ A, (14) (xik − βjk xij )2 + λ min β n k k k∈J i∈I j∈J k∈J j∈J which P follows Pthe form of (1). In Han et al. [19], individual weights are used for the penalty term, i.e., λ k∈J j∈J k wjk |βjk |, however, in the computational experiment, we set all weights equal to 1 for simplicity. Let Zjk = 1 if attribute j is used for dependent variable k and Zjk = 0 otherwise. Then, we can formulate MIPto for (14) as min X XX 1 XX (xik − βjk xij )2 + λ |βjk | n k k k∈J i∈I j∈J s.t. |βjk | ≤ M Zjk , Zjk − mZkj ≤ X (15a) k∈J j∈J r(Okr − Ojr ), j ∈ J k , k ∈ J, (15b) j ∈ J k , k ∈ J, (15c) j ∈ J k , k ∈ J, (15d) r∈J Zjk + Zkj ≤ 1, 11 X Okq = 1, k ∈ J, (15e) Okq = 1, q ∈ J, (15f) q∈J X k∈J Z, O ∈ {0, 1}m×m , (15g) j ∈ J k ∪ {0}, k ∈ J, βjk not restricted, (15h) where M is a large constant. Note that (15b) is the linear constraint corresponding to Z = supp(Y ) in (5). Similarly, (15a), (15b), (4c) - (4e) and (15h) can be used to formulate MIPin for (14). For MIPcp, (15a), (15b), (15h), and the constraints in (2) can be used for (14). Note that M in (15b) plays an important role in computational efficiency and optimality. If M is too small, the MIP model cannot guarantee optimality. If M is too large, the solution time can be as large as enumeration. The algorithm for getting a valid value for M in Park and Klabjan [31] can be used. However, the valid value of big M for multiple linear regression is often too large [31]. For (15), we observed that a simple heuristic presented in Section 5 works well. In each iteration of IR (Algorithm 2) and GD (Algorithm 4), we are given topological order π̄ and matrix R̄ = adj(π̄). Let S k = {j ∈ J k |R̄jk = 1} be the set of selected candidate arcs for dependent variable k. Given fixed R̄, (14) is separable into m LASSO linear regression problems min X X 1X |βjk |, βjk xij )2 + λ (xik − n k k i∈I 5 k ∈ J. (16) j∈S j∈S Computational Experiment For all computational experiments, a server with two Xeon 2.70GHz CPUs and 24GB RAM is used. Although there are many papers studying Bayesian network learning with various error measures and penalties, here we focus on minimizing the LASSO type objective (SSE and penalty) and we picked one of the latest paper of Han et al. [19] with the same objective function as benchmark. The MIP models MIPcp, MIPin, and MIPto are implemented with CPLEX 12.6 in C#. For MIPcp, instead of implementing the original cutting plane algorithm, we use CPLEX Lazy Callback, which is similar to the cutting plane algorithm. Instead of solving (3) to optimally from scratch in each iteration, we solve (2) with Lazy Callback, which allows updating (adding) constraints (cycle prevention constraints) in the process of the branch and bound algorithm whenever an integer solution with cycles is found. Given a solution with the cycles, we detect all cycles and add cycle prevention constraints for the detected cycles. For MIPcp, MIPin, and MIPto, we set big M as follows. Given λ, we solve (14) without acyclic constraints. Hence, we are allowed to use all arcs in J k for each model k ∈ J. Then, we obtain the estimated upper bound for big M by   M =2 max |βjk | . (17) j∈J k ,k∈J We observed that the above formula gives large enough big M for all cases in the following experiment. In Appendix B, we present comparison of regression coefficients of implanted network (DAG) with big M values by (17). The result shows that the big M value in (17) is always valid for all cases considered. We compare our algorithms and models with the algorithm in Han et al. [19], which we denote as DIST here. Their algorithm starts with neighborhood selection (NS), which filters unattractive arcs and removes them from consideration. The procedure is specifically developed for high dimensional variable selection when m is much larger than n. In our experiment, many instances considered are not high dimensional and some have dense solutions. Further, by filtering arcs, there exists a probability that an arc in the optimal solution can be removed. Hence, we deactivated the neighborhood selection step of their original algorithm, where the R script of the original algorithm is available on the journal website. For GD and IR, the algorithms are written in R [32]. We use glmnet package [12] function glmnet for solving LASSO linear regression problems in (16). For IR, we use parameters α = 0.01, t∗ = 10, νlb = 0.8, 12 and νub = 1.2. For GD, we use parameters α = 0.01, t∗1 = 10, and t∗2 = 5. Because both GD and IR start with a random solution, they perform different with different random solutions. Further, since we observe that the execution time of GD and IR are much faster than DIST, we decided to run GD and IR with 10 different random seeds and report the best solution. To emphasize the number of different random seeds for GD and IR, we use the notation GD10 and IR10 in the rest of the section. We first test all algorithms with synthetic instances generated using R package pcalg [23]. Function randomDAG is used to generate a DAG and function rmvDAG is used to generate multivariate data with the standard normal error distribution. First, a DAG is generated by randomDAG function. Next, the generated DAG and random coefficients are used to create each column (with standard normal error added) by rmvDAG function which uses linear regression as the underlying model. After obtaining the data matrix from the package, we standardize each column to have zero mean with standard deviation equal to one. The DAG used to generate the multivariate data is considered as the true structure or true arc set while it may not be the optimal solution for the score function. The random instances are generated for various parameters described in the following. m: number of features (nodes) n: number of observations s: expected number of true arcs per node d: expected density of the adjacency matrix of the true arcs By changing the ranges of the above parameters, three classes of random instances are generated. Sparse data sets: The expected total number of true arcs is controlled by s and most of the instances have a sparse true arc set. We use n ∈ {100, 200, 300}, m ∈ {20, 30, 40, 50}, and s ∈ {1, 2, 3} to generate 10 instances for each (n, m, s) triplet. This yields a total of 360 random instances. Dense data sets: The expected total number of true arcs is controlled by d and most of the instances have a dense true arc set compared with the sparse data sets. We use n ∈ {100, 200, 300}, m ∈ {20, 30, 40, 50}, and d ∈ {0.1, 0.2, 0.3} to generate 10 instances for each (n, m, d) triplet, and thus we have a total of 360 random instances. High dimensional data sets: The instances are high dimensional (m ≥ n) and very sparse. The expected total number of true arcs is controlled by s. We use n = 100 and m ∈ {100, 150, 200}, and s ∈ {0.5, 1, 1.5} to generate 10 instances for each (m, s) pair, which yields a total of 90 random instances. We use four λ values differently defined for each data set in order to cover the expected number of arcs with the four λ values. For each sparse instance, we solve (14) with λ ∈ {1, 0.5, 0.1, 0.05}. For dense data sets, a wide range of λ values are needed to obtain selected arc sets that have similar cardinalities with the true arc sets. Hence, for each dense instance, instead of fixed values over all instances in the set, we use λ values based on expected density d: λ = λ0 · 10−(10·d−1) , where λ0 ∈ {1, 0.1, 0.01, 0.001}. For each high dimensional instance, we use λ ∈ {1, 0.8, 0.6, 0.4}. Observe that the expected densities of the adjacency matrices vary across the three data sets. The sparse instances have expected densities between 0.02 and 0.15, the dense instances have expected densities between 0.1 and 0.3, and the high dimensional instances have expected densities between 0.002 and 0.015. Hence, different ranges of λ values are necessary. For all of the results presented in this section, we present the average performance by n, m, s, d and λ. For example, the result for n = 100 and m = 20 are the averages of 120 and 90 instances, respectively. In all of the comparisons, we use the following metrics. time: computation time in seconds δsol : relative gap (%) from the best objective value among the compared algorithms or models. For example, if we compare the three MIP models, δsol of an MIP model is the relative gap from the best of the three objective function values obtained by the MIP models. kzk0 : number of arcs selected (number of nonzero regression coefficients βjk ’s) In comparing the performance metrics, we use plot matrices. In each Figure 1, 2, 3, 5, and 6, multiple bar plots form a matrix. The rows of the plot matrix correspond to performance metrics and the columns stand for parameters used for result aggregation. For example, the left top plot in Figure 1 shows 13 execution times of the algorithms where the results are aggregated by n (the number of observations), because the first row and first column of the plot matrix in Figure 1 are for execution times and n, respectively. In Section 5.1, we compare the performance of iterative algorithms GD10 and IR10 and the benchmark algorithm DIST. In Section 5.2, we compare the performance of MIP models MIPcp, MIPin, and MIPto. We also compare all models and algorithms with a subset of the synthetic instances in Section 5.2. Finally, in Section 5.4, we solve a popular real instance of Sachs et al. [35] in the literature. 5.1 Comparison of Iterative Algorithms Time (seconds) In this section, we compare the performance of GD10, IR10, and DIST by time, δsol , and kzk0 for each of the three data sets. In Figure 1, the result for the sparse data sets is presented. The bar plot matrix presents the performance measures aggregated by n, m, s, and λ. 150 150 150 150 100 100 100 100 50 50 50 50 0 0 100 𝛿𝑠𝑜𝑙 0 0 0 20 300 30 40 50 1 2 0.05 3 1.2% 1.2% 1.2% 1.2% 1.0% 1.0% 1.0% 1.0% 0.8% 0.8% 0.8% 0.8% 0.6% 0.6% 0.6% 0.6% 0.4% 0.4% 0.4% 0.4% 0.2% 0.2% 0.2% 0.2% 0.0% 0.0% 0.0% 100 𝑧 200 200 300 20 30 40 2 3 0.05 400 400 400 400 300 300 300 300 200 200 200 200 100 100 100 100 0 0 100 200 By n (# obs) 300 30 40 50 1 By m (# nodes) GD10 2 3 By s (# arcs per node) IR10 1 0.1 0.5 1 0.5 1 0 0 20 0.5 0.0% 1 50 0.1 0.05 0.1 By λ (penalty) DIST Figure 1: Performance of GD10, IR10, and DIST (sparse data) The computation time of all three algorithms increases in increasing m and decreasing λ, where the computation time of DIST increases faster than the other two. The computation time of DIST is approximately 10 times faster than the GD10 time when λ = 1, but 2 times slower when λ = 0.05. With increasing n, the computation times of all algorithms stay the same or decrease. This can be seen counter-intuitive because larger instances do not increase time. However, a larger number of observations can make predictions more accurate and could reduce search time for unattractive subsets. Especially, the computation time of DIST decreases in increasing n. We think this is because more observations give better local selection in the algorithm when adding and removing arcs. The number of selected arcs (kzk0 ) of GD10 and IR10 is greater than DIST for all cases because the topological order based algorithms  are capable of using the maximum number of arcs m(m−1) , while arc selection based algorithms, such 2 as DIST, are struggling to select many arcs without violating acyclic constraints. In terms of the solution quality, all algorithms have δsol less than 1.2% and perform good. However, we observe several trends. As 14 Time (seconds) λ decreases (required to select more arcs), GD10 and IR10 start to outperform. We also observe that, as the problem requires to select more arcs (increasing m, increasing s, and decreasing λ), GD10 and IR10 perform better. As n increases, δsol of GD10 and DIST decrease, whereas δsol of IR10 increases. The result for the dense data sets is presented in Figure 2. The bar plot matrix presents the performance measures aggregated by n, m, d, and λ0 . Recall that, for the dense data set, we solve (14) with λ = λ0 · 10−(10·d−1) and λ0 ∈ {1, 0.1, 0.01, 0.001}. For simplicity of presenting the aggregated result, we use λ0 in the plot matrix, while λ values are used for actual computation. 800 800 800 800 600 600 600 600 400 400 400 400 200 200 200 200 0 0 100 𝛿𝑠𝑜𝑙 200 30 40 50 0.1 0.2 0.001 0.3 50% 50% 50% 50% 40% 40% 40% 40% 30% 30% 30% 30% 20% 20% 20% 10% 0.47% 0.51% 0.26% 0.46% 0.32% 0.49% 0% 10% 0.06% 0.40% 0.20% 0.72% 0.15% 0.59% 0.47% 10% 0.75% 200 300 20 30 40 0.85% 0.38% 0.59% 0.15% 0.47% 10% 0.2 0.3 600 600 600 600 500 500 500 500 400 400 400 400 300 300 300 0 200 300 200 200 200 100 100 100 100 0 0 0 100 200 By n (# obs) 300 20 30 40 50 GD10 0.2 0.3 By d (density of solution matrix) IR10 1 0.57% 0.49% 0.39% 0.47% 0.56% 0.33% 0.63% 0.12% 0.37% 0.001 0.01 0.1 1 0.001 0.01 0.1 1 0 0.1 By m (# nodes) 0.1 0% 0.1 50 0.01 20% 0.08% 0% 0% 100 𝑧 0 0 20 300 By λ0 (penalty) DIST Figure 2: Performance of GD10, IR10, and DIST (dense data) The computation time of all three algorithms again increases in increasing m and decreasing λ, where the computation time of DIST increases faster than the other two. Compare to the result for the sparse data sets, the execution times are all larger for the dense data set. The number of selected arcs (kzk0 ) of GD10 and IR10 is again greater than DIST for all cases, where kzk0 is twice larger for GD10 and IR10 when m or d is large, or λ is small. In terms of the solution quality, GD10 and IR10 outperform in most of the cases, while δsol values of DIST increase fast in changing m, d, and λ. The values of δsol for all algorithms are larger than the sparse data sets result. GD10 and IR10 are better for most of the cases. In general, we again observe that GD10 and IR10 perform better when the problem requires to select more arcs. The result for the high dimensional data sets is presented in Figure 3. The bar plot matrix presents the performance measures aggregated by m, s, and λ, while n is excluded from the matrix as we fixed n to 100. The computation time of all three algorithms again increases in increasing m and decreasing λ. However, unlike the previous two sets, the computation times of GD10 and IR10 increase faster than DIST. This is due to the efficiency of the topological order based algorithms. When a very small portion of the arcs should be selected in the solution, topological orders are not informative. For example, consider a graph with three nodes A, B, C and assume that only one arc, (A, B), is selected due to a large penalty. For this case, three topological orders A − B − C, A − C − B, and C − A − B can represent the selected arc. The third row of Figure 3 shows that kzk0 of the three algorithms are very similar, while DIST has 15 Time (seconds) 600 600 600 500 500 500 400 400 400 300 300 300 200 200 200 100 100 100 0 0 100 𝛿𝑠𝑜𝑙 0 200 0 0.5 1 1.5 0.4 0.5% 0.5% 0.5% 0.4% 0.4% 0.4% 0.3% 0.3% 0.3% 0.2% 0.2% 0.2% 0.1% 0.1% 0.1% 0.0% 0.0% 100 𝑧 150 150 200 1 1.5 0.4 400 400 300 300 300 200 200 200 100 100 100 0 0 150 200 1 0.6 0.8 1 0.6 0.8 1 0 0.5 By m (# nodes) 0.8 0.0% 0.5 400 100 0.6 1 0.4 1.5 By s (# arcs per node) GD10 IR10 By λ (penalty) DIST Figure 3: Performance of GD10, IR10, and DIST (high dimensional data) much smaller values for the previous two data sets. This implies that arc based search by DIST does not have difficulties preventing cycles and the algorithm can decide whether to include arcs easier. The comparison of δsol values also show that arc based search is competitive. Although all algorithms have δsol values less than 0.5%, we find clear evidence that the performance of IR10 decreases in increasing m and s and decreasing λ. Although the δsol values of GD10 and DIST are similar, considering the fast computing time of DIST, we recommend to use DIST for very sparse high dimensional data. In Figure 4, we present combined results of all three data sets by relating solution densities and δsol . Observe that, for each quadruplet of n, m, s(or d), λ, we have results from 10 random instances for each algorithm. Value δsol is the average of the 10 results for each quadruplet and for each algorithm, AvgDen is the average density of the adjacency matrices of the 10 results and the three algorithms. In Figure 4, we present a scatter plot of ln(1 + AvgDen) and ln(1 + 100 · δsol ). Each point in the plot is the average of 10 results by an algorithm and each algorithm has 324 points displayed 1 . The numbers in the parenthesis along the axes are the corresponding values of δsol and AvgDen. In the plot, we first observe that the algorithms perform similarly when the solutions are sparse and the δsol values have large variance when the solutions are dense. When the log transformed solution density is less than 2, the average δsol values of GD10, IR10, and DIST are 0.06%, 0.15%, and 0.04%, respectively. However, the solution quality of DIST drastically decreases as the solutions become denser. This makes sense because sparse solutions can be efficiently searched by arc-based search, while dense solutions are not easy to obtain by adding or removing arcs one by one. This also explains the relatively small and large δsol values for dense and spares solutions, respectively, by the topological order based algorithms. Between GD10 and IR10, we do not observe a big difference. 1 324 = (3 · 4 · 3 · 4) + (3 · 4 · 3 · 4) + (1 · 3 · 3 · 4), where the three terms are for the three data sets and each term is obtained by multiplying the number of parameters n, m, s(d), and λ, respectively. 16 Log transformed δsol 5 (147.4%) 4 (53.6%) 3 (19.1%) 2 (6.4%) 1 (1.7%) 0 0 0.5 (0.006) 1 (0.017) 1.5 (0.035) 2 (0.064) 2.5 (0.11) 3 (0.19) 3.5 (0.32) 4 (0.54) Log transformed average subgraph density GD10 IR10 DIST Figure 4: Scatter plot of δsol and average solution densities 5.2 Comparison of MIP Models In this section, we compare the performance of MIPto, MIPin, and MIPcp using time, δsol , and kzk0 and the following additional metric. δIP : the optimality gap (%) obtained by CPLEX within allowed 15 · m seconds Due to scalability issues of all models, we only use the sparse data with m = 20, 30, 40. We also limit n = 100. For all instances, we use the 15 · m seconds time limit for CPLEX. For example, we have time limit of 300 seconds for instances with m = 20. The result is presented in Figure 5. Comparing the time of all models with the time limit for CPLEX, we observe that MIPin and MIPcp were able to terminate with optimality for several instances when m = 20 and λ = 1. This implies that MIPin and MIPcp are efficient when the problem is small and the number of selected arcs kzk0 is small. However, in general, δIP values tend to be consistent with different models, while they increase in increasing m and s and in decreasing λ for all three MIP models. The execution times of all models increase in increasing m and s, and in decreasing λ. The same trend can be found for δIP for all models. By comparing δsol values, we observe that MIPin is best when m = 20 and 30. However, the performance of MIPin drops drastically as m and s increase and λ decreases. Actually, MIPin fails to obtain a reasonably good solution within the time limit for several instances. This gives large δsol values and increases the average. The δsol values of MIPto are smaller than MIPcp when m and s are small, while MIPcp outperforms when m = 40 or s = 3. 5.3 Comparison of all MIP Models and Algorithms In Figure 6, we compare all models and algorithms for selected sparse instances with n = 100 and m ∈ {20, 30, 40}, which were used to test MIP models. In the plot matrix, we show the average computation time and δsol (gap from the best objective value among the six models and algorithms) by m, s, and λ. Note that δsol values of a few MIPin results are not fully displayed in the bar plots due to their large values. Instead, the actual numbers are displayed next to the corresponding bar. The result shows that MIP models spent more time while the solution qualities are inferior in general. The values of δsol for the MIP models are competitive only when λ is large, which requires sparse solution. However, even for this case, MIP models spend longer time than the algorithms. Hence, ignoring the benefit of knowing and guaranteeing optimality by the MIP models, we conclude that the algorithms perform better for all cases. The primary reason for inferior performance of the MIP models is the difficulty of solving integer programming problems. Further, all of the MIP models have at least O(m2 ) binary variables and O(m2 ) 17 Time (seconds) 600 600 600 500 500 500 400 400 400 300 300 300 200 200 200 100 100 100 0 0 20 𝛿𝐼𝑃 30 0 1 2 3 30% 30% 30% 25% 25% 25% 20% 20% 20% 15% 15% 15% 10% 10% 10% 5% 5% 5% 0% 0% 20 𝛿𝑠𝑜𝑙 40 30 2 3 8% 8% 8% 6% 6% 6% 4% 4% 4% 2% 2% 2% 0% 0% 20 30 By m (# nodes) 2 3 1 0.05 0.1 0.5 1 0.5 1 0.05 By s (# arcs per node) MIPto 0.5 0% 1 40 0.1 0% 1 40 0.05 MIPin 0.1 By λ (penalty) MIPcp Figure 5: Performance of MIPto, MIPin, and MIPcp (sparse data with n = 100 and m ∈ {20, 30, 40}) constraints and the problem complexity grows fast. Finally, large values of big M in (15b) make the problem even more difficult. Due to non-tight values of big M, fathoming does not happen frequently in the branch and bound procedure. Hence, at least for sparse Gaussian Bayesian network learning, the MIP models may not be the best option unless other complicated constraints, which cannot be easily dealt with iterative algorithms, are needed. 5.4 Real Data Example In this section, we study the flow cytometry data set from Sachs et al. [35] by solving (14). The data set has been studied in many works including Friedman et al. [11], Shojaie and Michailidis [36], Fu and Zhou [14], and Aragam and Zhou [1]. The data set is often used as a benchmark as the casual relationships (underlying DAG) are known. It has n = 7466 cells obtained from multiple experiments with m = 11 measurements. The known structure contains 20 arcs. For the experiment, we standardize each column to have zero mean with standard deviation equal to one. In Table 2, we compare the performance of the three algorithms GD10, IR10, and DIST for various values of λ. The MIP models are excluded due to scalability issue 2 . We compare the previously used performance measures execution time, solution cardinalities (kzk0 ), and solution quality (δsol ). In addition, we also compare sensitivities (true positive ratio) of the solutions. By comparing with the known structure with 20 arcs, we calculate directed true positive (dTP) and undirected true positive (uTP). If arc (j, k) is in the known structure, dTP counts only if arc (j, k) is in the algorithm’s solution, whereas uTP counts either of arcs (j, k) or (k, j) is in the algorithm’s solution. The solution times of the three algorithms are all within a few seconds, as m is small. Also, the 2 Although m is small, with n =7466 observations, the MIP models have at least 7466 · 11 · 2 = 164,252 continuous variables and 7466 · 11 = 82,126 constraints just for the residual terms. Combined with the complexity increment due to the binary variables and acyclicity constraints, it was not feasible to obtain a reasonable solution by any of the MIP models. 18 Time (seconds) 700 600 500 400 300 200 100 0 700 600 500 400 300 200 100 0 20 30 𝛿𝑠𝑜𝑙 40 ≈ 4.0% 700 600 500 400 300 200 100 0 1 2 3 ≈ 4.0% 9.2% 0.05 4.0% 7.8% 3.0% 3.0% 3.0% 2.0% 2.0% 2.0% 1.0% 1.0% 1.0% 0.0% 0.0% 20 30 40 MIPin 1 0.1 0.5 1 9.0% 2 3 0.05 By s (# arcs per node) MIPto 0.5 0.0% 1 By m (# nodes) ≈ 0.1 MIPcp GD10 By λ (penalty) IR10 DIST Figure 6: Performance of all models and algorithms (sparse data with n = 100 and m ∈ {20, 30, 40}) solution cardinalities (kzk0 ) are similar. The best δsol value among the three algorithms in each row is in boldface. We observe that GD10 provides the best solution (smallest δsol ) in most cases and IR10 is the second best. The δsol values of DIST increase as λ increases. This is consistent with the findings in Section 5.1. Note that the density of the underlying structure is 20/112 = 0.165, which is dense. This explains the good performance of GD10 and IR10. On the other hand, even though GD10 provides the best objective function values for most of the cases, the dTP and uTP values of GD10 are not always the best. The highest value among the three algorithms in each row is in boldface. While δsol values of DIST are the largest among the three algorithms, dTP and uTP values are the best in some cases. When λ is small, DIST tends to have higher dTP and uTP. However, as λ increases, GD10 gives the best dTP and uTP values. To further improve the prediction power, we may need weighting features or observations. λ 0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 time 14.6 13.7 14.3 16.0 15.1 14.4 16.0 16.4 17.4 17.7 kzk0 9 11 11 13 13 16 16 21 24 28 GD10 δsol 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% 0.32% dTP 0.22 0.27 0.27 0.23 0.23 0.38 0.31 0.33 0.25 0.39 uTP 0.56 0.55 0.55 0.54 0.46 0.56 0.56 0.57 0.50 0.50 time 10.8 10.9 14.8 12.4 14.3 14.8 14.6 15.6 11.0 11.5 kzk0 9 13 13 17 17 20 22 25 28 30 IR10 δsol 0.22% 0.30% 0.36% 0.42% 0.21% 0.22% 0.31% 0.32% 0.26% 0.00% dTP 0.22 0.15 0.15 0.12 0.24 0.25 0.32 0.32 0.07 0.10 uTP 0.56 0.46 0.46 0.41 0.41 0.50 0.55 0.52 0.43 0.47 time 5.8 8.5 7.0 8.6 8.0 6.7 6.8 9.5 9.1 10.1 kzk0 9 9 13 15 17 20 21 23 27 32 DIST δsol 0.38% 0.49% 0.61% 0.73% 0.84% 0.94% 1.12% 1.26% 1.45% 1.87% dTP 0.56 0.56 0.38 0.33 0.29 0.30 0.33 0.30 0.26 0.22 uTP 0.56 0.56 0.46 0.47 0.47 0.50 0.52 0.52 0.44 0.41 Table 2: Performance on the real data set from Sachs et al. [35] From Table 2, we observe that a slight change in solution quality δsol affects the final selection of DAG significantly. Also, the best objective function value does not necessarily give the highest true positive value since the L1 -norm penalized least square (14) may not be the best score function. In Figure 7, we present the graphs of known casual interactions (a), estimated subgraph by GD10 (b), IR10 (c), and DIST (d). All graphs are obtained with λ = 0.25, but the numbers of arcs are different (see Table 2). In fact, the difference between δsol values of IR10 and DIST is less than 1% while the subgraphs have only 10 common arcs. 19 (a) (b) (c) (d) Figure 7: Known DAG (a) and estimated subgraphs with λ = 0.25 by GD10 (b), IR10 (c), and DIST (d) 6 Conclusion We propose an MIP model and iterative algorithms based on topological order. Although the computational experiment is conducted for Gaussian Bayesian network learning, all the proposed model and algorithms are applicable for problems following the form in (1). While many MIP models and algorithms are designed based on arc search, using topological order provides some advantages that improve solution quality and algorithm efficiency. 1. DAG constraints (acyclicity constraints) are automatically satisfied when arcs from high order nodes to low order nodes are used. 2. In applying the concept for MIP, a lower number of constraints is needed (O(m2 )) whereas arc based modeling can have exponentially many constraints in the worst case. 3. In applying the concept in designing iterative algorithms, one of the biggest merits is the capability of utilizing the maximum number of arcs possible ( m(m−1) ), while arc based algorithms struggle 2 with using all possible arcs. The proposed MIP model has the smallest number of constraints while the number of binary variables is in the same order with the already known MIP models. It performs as good as a cutting plane algorithm. The proposed iterative algorithms get the biggest benefit when the solution matrix is dense. The result presented in Section 5.1 clearly indicates that the topological order based algorithms outperform when the density of the resulting solution is high. On the other hand, arc-based search algorithms, represented by DIST in our experiment, can be efficient when the desired solutions are very sparse. Comparing all models and algorithms used in the experiment, we observe that the MIP models are not competitive or scale well compared to the heuristic algorithms except for small instances. The experiment shows that the solution times of the MIP models are significantly affected by the number of nodes m. For Gaussian Bayesian network learning, we observe that large n could also decrease the MIP model efficiency even when m is small (Section 5.4). Among the iterative algorithms, we recommend DIST for very sparse high dimensional data and GD10 and IR10 for dense data. Among the two topological order based algorithms, GD10 performs slightly better and is more stable. References [1] B. Aragam and Q. Zhou. Concave penalized estimation of sparse Gaussian Bayesian networks. Journal of Machine Learning Research, 16:2273–2328, 2015. [2] A. Baharev, H. Schichl, and A. Neumaier. An exact method for the minimum feedback arc set problem. Technical report, 2015. Available from http://www.mat.univie.ac.at/∼neum/. [3] G. Bolotashvili, M. Kovalev, and E. Girlich. New facets of the linear ordering polytope. SIAM Journal on Discrete Mathematics, 12(3):326–336, 1999. 20 [4] D. M. Chickering. Learning Bayesian networks is NP-complete. In Learning from data, pages 121– 130. Springer, 1996. [5] D. M. Chickering. Optimal structure identification with greedy search. Journal of Machine Learning Research, 3(Nov):507–554, 2002. [6] W. J. Cook, W. H. Cunningham, W. R. Pulleyblank, and A. Schrijver. Combinatorial Optimization. John Wiley & Sons, Inc., New York, NY, USA, 1998. [7] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to algorithms. MIT press, 2009. [8] B. Ellis and W. H. Wong. Learning causal Bayesian network structures from experimental data. Journal of the American Statistical Association, 103(482):778–789, 2008. [9] G. Even, J. S. Naor, B. Schieber, and M. Sudan. Approximating minimum feedback sets and multicuts in directed graphs. Algorithmica, 20(2):151–174, 1998. [10] H. Fernau and D. Raible. Exact algorithms for maximum acyclic subgraph on a superclass of cubic graphs. In International Workshop on Algorithms and Computation, pages 144–156. Springer, 2008. [11] J. Friedman, T. Hastie, and R. Tibshirani. Sparse inverse covariance estimation with the graphical Lasso. Biostatistics, 9(3):432–441, 2008. [12] J. Friedman, T. Hastie, and R. Tibshirani. Regularization paths for generalized linear models via coordinate descent. Journal of Statistical Software, 33(1):1–22, 2010. [13] N. Friedman and D. Koller. Being Bayesian about network structure. A Bayesian approach to structure discovery in Bayesian networks. Machine Learning, 50(1):95–125, Jan 2003. [14] F. Fu and Q. Zhou. Learning sparse causal Gaussian networks with experimental intervention: regularization and coordinate descent. Journal of the American Statistical Association, 108(501):288– 300, 2013. [15] M. X. Goemans and L. A. Hall. The strongest facets of the acyclic subgraph polytope are unknown. In International Conference on Integer Programming and Combinatorial Optimization, pages 415–429. Springer, 1996. [16] M. Grötschel, M. Jünger, and G. Reinelt. A cutting plane algorithm for the linear ordering problem. Operations Research, 32(6):1195–1220, 1984. [17] M. Grötschel, M. Jünger, and G. Reinelt. On the acyclic subgraph polytope. Mathematical Programming, 33(1):28–42, 1985. [18] V. Guruswami, R. Manokaran, and P. Raghavendra. Beating the random ordering is hard: Inapproximability of maximum acyclic subgraph. In 49th Annual IEEE Symposium on Foundations of Computer Science, pages 573–582. IEEE, 2008. [19] S. W. Han, G. Chen, M.-S. Cheon, and H. Zhong. Estimation of directed acyclic graphs through two-stage adaptive Lasso for gene network inference. Journal of the American Statistical Association, pages 1–48, 2016. [20] R. Hassin and S. Rubinstein. Approximations for the maximum acyclic subgraph problem. Information Processing Letters, 51(3):133–140, 1994. [21] D. Heckerman, D. Geiger, and D. M. Chickering. Learning Bayesian networks: The combination of knowledge and statistical data. Machine learning, 20(3):197–243, 1995. [22] R. Kaas. A branch and bound algorithm for the acyclic subgraph problem. European Journal of Operational Research, 8(4):355–362, 1981. 21 [23] M. Kalisch, M. Mächler, D. Colombo, M. H. Maathuis, and P. Bühlmann. Causal inference using graphical models with the R package pcalg. Journal of Statistical Software, 47(11):1–26, 2012. [24] R. M. Karp. Reducibility among combinatorial problems. Springer, 1972. [25] C. Kenyon-Mathieu and W. Schudy. How to rank with few errors. In Proceedings of the thirty-ninth annual ACM symposium on Theory of computing, pages 95–103. ACM, 2007. [26] W. Lam and F. Bacchus. Learning Bayesian belief networks: An approach based on the mdl principle. Computational Intelligence, 10(3):269–293, 1994. [27] J. Leung and J. Lee. More facets from fences for linear ordering and acyclic subgraph polytopes. Discrete Applied Mathematics, 50(2):185–200, 1994. [28] C. Lucchesi and D. Younger. A minimax theorem for directed graphs. Journal of the London Mathematical Society, 17(3):369–374, 1978. [29] J. E. Mitchell and B. Borchers. Solving linear ordering problems with a combined interior point/simplex cutting plane algorithm. In High Performance Optimization, pages 349–366. Springer, 2000. [30] T. Niinimäki, P. Parviainen, and M. Koivisto. Structure discovery in Bayesian networks by sampling partial orders. The Journal of Machine Learning Research, 17(1):2002–2048, 2016. [31] Y. W. Park and D. Klabjan. Subset selection for multiple linear regression via optimization. Technical report, 2013. Available from http://www.klabjan.dynresmanagement.com. [32] R Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2016. [33] V. Ramachandran. Finding a minimum feedback arc set in reducible flow graphs. Journal of Algorithms, 9(3):299–313, 1988. [34] G. Raskutti and C. Uhler. Learning directed acyclic graphs based on sparsest permutations. arXiv preprint arXiv:1307.0366, 2013. [35] K. Sachs, O. Perez, D. Pe’er, D. A. Lauffenburger, and G. P. Nolan. Causal protein-signaling networks derived from multiparameter single-cell data. Science, 308(5721):523–529, 2005. [36] A. Shojaie and G. Michailidis. Penalized likelihood methods for estimation of sparse high-dimensional directed acyclic graphs. Biometrika, 97(3):519–538, 2010. [37] S. Van de Geer and P. Bühlmann. L0-penalized maximum likelihood for sparse directed acyclic graphs. The Annals of Statistics, 41(2):536–567, 2013. APPENDIX A Greedy Algorithm for Projection Problem In this section, we present the detail derivations and proofs of Algorithm 3 (greedy). The algorithm sequentially determines topological order by optimizing the projection problem given an already fixed order up to the iteration point. Solving the projection problem is N P-complete and our algorithm may not give a global optimal solution. However, the result of this section shows that Algorithm 3 gives an optimal choice of the next node to have fixed order given pre-fixed orders. We start by describing some properties of Y ∗ in the following three lemmas. For the following lemmas, let πj∗ represent the topological order of node j defined by Y ∗ . ∗ ∗ ∗ t Lemma 2. For any Yjk , we must have either Yjk = 0 or Yjk = Ujk . 22 ∗ ∗ t Proof. For a contradiction, let us assume that there exist indices q and r such that Yqr 6= 0 and Yqr 6= Uqr . ∗ t Let us create a new solution Ȳ such that Ȳ = Y except Ȳqr = Uqr . Note that Ȳ is a feasible solution to ∗ (12) because supp(Ȳ ) ≤ supp(Y ∗ ) element-wise since Yqr 6= 0. Further, we have kY ∗ − U t k2 > kȲ − U t k2 ∗ t 2 t 2 ∗ ∗ because (Yqr − Uqr ) > 0 = (Ȳqr − Uqr ) and Ȳ = Y except Yqr 6= Ȳqr . This contradicts optimality of ∗ Y . ∗ ∗ Note that Lemma 2 implies that solving (12) is essentially choosing between 0 and Ujk for Yjk . This selection is also based on the following property. ∗ t = Ujk . Lemma 3. If πj∗ > πk∗ , then Yjk ∗ t Proof. For a contradiction, let us assume that there exist indices q and r such that Yqr 6= Uqr while ∗ ∗ ∗ t πq > πr . Let us create a new solution Ȳ such that Ȳ = Y except Ȳqr = Uqr . ∗ 1. If Yqr 6= 0, then Ȳ is a DAG since supp(Ȳ ) ≤ supp(Y ∗ ) element-wise. ∗ 2. If Yqr = 0, then arc (q, r) can be used in the solution without creating a cycle because πq∗ > πr∗ . Hence, Ȳ is a DAG. Therefore, Ȳ is a feasible solution to (12). However, it is easy to see that kȲ − U t k2 < kY ∗ − U ∗ k2 ∗ t 2 t 2 because (Yqr − Uqr ) > 0 = (Ȳqr − Uqr ) . This contradicts optimality of Y ∗ . Given the topological order by Y ∗ , let Jˆk = {j ∈ J k |πj∗ > πk∗ } be the subset of J k such that the nodes in Jˆk are earlier than node k. Combining Lemmas 2 and 3, we conclude that Y ∗ has the following structure. ( t if j ∈ Jˆk , Ujk ∗ k∈J (18) Yjk = 0 if j ∈ J \ Jˆk , Further, we can calculate node k’s contribution to the objective function value without explicitly using Y ∗. Lemma 4. For each node k ∈ J, it contributes X t 2 (Ujk ) j∈J\Jˆk to the objective function value for (12). In other words, the contribution of node k is the squared sum of t Ujk for nodes with πj∗ < πk∗ . Proof. For node k, we can derive P P P ∗ t 2 ∗ t 2 t 2 j∈J (Yjk − Ujk ) = j∈J\Jˆk (Yjk − Ujk ) = j∈J\Jˆk (Ujk ) , ∗ t where both equal signs are due to (18). The first equality is due to Yjk = Ujk for j ∈ Jˆk and the second ∗ k equality holds since Yjk = 0 for j ∈ J \ Jˆ . We next detail the derivation of the greedy algorithm presented in Algorithm 3. Let J¯ ⊆ J be the index set of yet-to-be-ordered nodes and J¯c = J \ J¯ be the index set of the nodes that have already been ordered. The procedure is equivalent to iteratively solving n o X t 2 k ∗ = argmink∈J¯ min (Yjk − Ujk ) , (19) Yk j∈J where Yk = [Y1k , Y2k , · · · , Ymk ] ∈ Rm×1 is the column in Y corresponding to node k. Set J¯ is updated ¯ after solving (19). We propose an algorithm to solve (19) based on the by J¯ = J¯ \ {k ∗ } and πk∗∗ = |J| ¯ we solve properties of Y ∗ described in Lemmas 2 - 4. Given J, nX o t 2 k ∗ = argmink∈J¯ (Ujk ) . (20) j∈J¯ 23 Next, we show that solving (20) gives an optimal solution Ȳjk∗ , j ∈ J k to (19). We can actually replicate the properties of Y ∗ for Ȳjk∗ . t k Lemma 5. An optimal solution to (19) must have either Ȳjk∗ = 0 or Ȳjk∗ = Ujk ∗ for all j ∈ J . t ¯ Lemma 6. An optimal solution to (19) must have Ȳjk∗ = Ujk ∗ for j ∈ J \ J. P P t 2 t 2 Lemma 7. An optimal solution to (19) must satisfy j∈J (Ȳjk∗ − Ujk ∗) = j∈J¯(Ujk∗ ) The proofs are omitted as they are P similar to the proofs of Lemmas 2 - 4, respectively. Note that, by P t 2 t 2 Lemma 7, we show the equivalence of j∈J (Yjk∗ − Ujk and j∈J¯(Ujk ∗) ∗ ) . This result also holds for ¯ each term, k ∈ J, of the argmin function in (19). Hence, the following lemma holds. Lemma 8. Solving (20) is equivalent to solving (19). Observe that (20) is used in Line 3 of the greedy algorithm in Algorithm 3. Hence, by property (19), the algorithm gives an optimal choice of node to be fixed with the pre-fixed topological order. B Summary Statistics for Maximum Coefficients In this section, we show that the heuristic formula (17) for selecting big M gives reasonable and large enough values. Note that, when creating a synthetic instance, we used a random DAG to generate multivariate data. Although the optimal DAG for the penalized least squares are unknown, with appropriate penalty constants, we can use the implanted DAG to obtain coefficients estimation. That is, we calculate B̂ = max j∈J k ,k∈K |β̂jk | by using the implanted DAG. The B̂ value is then compared with the big M value in (17) for all instances used for MIP models (sparse data with n = 100 and m ∈ {20, 30, 40}). We calculate minimum, average, and maximum of B̂ and M by m, s, and λ. The result is presented in Table 3. Note that we have B̂ < M for all columns Min, Avg, and Max and for all rows. Although only the summary statistics are presented in Table 3, we observed that M is greater than B̂ for all cases considered. By Param Value 20 m 30 40 1 s 2 3 0.05 0.1 λ 0.5 1 Min 0.17 0.18 0.18 0.17 0.23 0.32 0.62 0.60 0.41 0.17 B̂ Avg 0.65 0.62 0.63 0.53 0.63 0.74 0.82 0.78 0.59 0.35 Max 1.48 0.95 1.03 0.79 0.94 1.48 1.48 0.96 0.74 0.49 Min 0.33 0.36 0.36 0.33 0.45 0.63 1.24 1.19 0.82 0.33 M Avg 1.34 1.32 1.33 1.13 1.33 1.53 1.95 1.54 1.14 0.69 Max 3.73 3.10 3.30 2.04 3.54 3.73 3.73 2.35 1.45 0.97 Table 3: Comparison of maximum coefficients and big M (sparse data with n = 100 and m ∈ {20, 30, 40}) 24
8cs.DS
Under consideration for publication in Theory and Practice of Logic Programming 1 arXiv:0712.3830v1 [cs.PL] 26 Dec 2007 TCHR: a framework for tabled CLP TOM SCHRIJVERS∗ and BART DEMOEN Dept. of Computer Science, K.U.Leuven, Belgium (e-mail: {toms,bmd}@cs.kuleuven.ac.be) DAVID S. WARREN Dept. of Computer Science, State University of New York at Stony Brook, USA (e-mail: [email protected]) submitted 25 September 2006 ; revised 19 July 2007; accepted 19 Dec 2007 Abstract Tabled Constraint Logic Programming is a powerful execution mechanism for dealing with Constraint Logic Programming without worrying about fixpoint computation. Various applications, e.g in the fields of program analysis and model checking, have been proposed. Unfortunately, a high-level system for developing new applications is lacking, and programmers are forced to resort to complicated ad hoc solutions. This papers presents TCHR, a high-level framework for tabled Constraint Logic Programming. It integrates in a light-weight manner Constraint Handling Rules (CHR), a high-level language for constraint solvers, with tabled Logic Programming. The framework is easily instantiated with new application-specific constraint domains. Various high-level operations can be instantiated to control performance. In particular, we propose a novel, generalized technique for compacting answer sets. KEYWORDS: Constraint Logic Programming, Constraint Handling Rules, tabled execution 1 Introduction The notion of tabled Constraint Logic Programming (CLP) originates from the constraint databases community (Kanellakis et al. 1995). In an ordinary database, data is stored in relations of atomic values. Constraint databases generalize atomic values to constraint variables: a field is restricted to a range of values rather than a single value. This allows for more compact representations than explicitly enumerating the atomic values. DATALOG, a formalism for reasoning about ordinary databases and queries in particular, is generalized to DATALOGD for this purpose. Just as DATALOG is a restricted form of Logic Programming, DATALOGD is a restricted form of Constraint Logic Programming. The restrictions enforce programs to have finite interpretations. ∗ Research Assistant of the fund for Scientific Research - Flanders (Belgium)(F.W.O. - Vlaanderen) 2 T. Schrijvers et al. Due to the finiteness properties, queries on DATALOGD programs can be resolved by bottom-up computation rather than the usual top-down goal-directed computation of CLP. The former has the advantage that it terminates for DATALOGD programs, whereas the latter may get stuck in infinite loops. However, a goaldirected approach usually obtains the desired result much faster and uses less space. For this reason, Toman (Toman 1997b) proposed a compromise: tabling. Tabling is an LP technique for improving the termination properties of the goal-directed approach through the memoization of intermediate results. By generalizing tabled DATALOGD to Tabled CLP, we benefit from both the generalized expressivity of CLP and the improved termination properties of tabling. A number of different applications have been proposed for tabled DATALOGD and Tabled CLP. Toman himself considers it an alternative approach to implementing abstract interpretation (Toman 1997a): constraints abstract concrete values and tabling takes care of fixpoints. Various applications in the context of model checking have been developed (Mukund et al. 2000; Du et al. 2000; Pemmasani et al. 2002): constraints impose restrictions on parameters in parametrized models while tabling takes care of cycles in the model graphs. The above establishes a clear need for Tabled CLP, but let us consider the availability of Tabled CLP systems. It turns out that a user-friendly and comprehensive system for developing new Tabled CLP applications is missing completely. The above-mentioned model checking applications (e.g. (Mukund et al. 2000; Du et al. 2000; Pemmasani et al. 2002)) have adapted an existing tabled logic programming system, XSB (Warren et al. 2005), with constraint programming facilities in various ad hoc and laborious ways. At first, XSB developers resorted to interfacing with foreign language libraries or implementing constraint solvers in XSB itself with a close coupling of constraint solver and application as a consequence. For instance, the initial feasibility study of a real-time model checking system used a meta interpreter written in XSB to deal with constraints (see (Mukund et al. 2000)). The subsequent full system implements an interface between XSB and the POLINE polyhedra-based constraint solver library, and passes around handles to the constraint store in the XSB program (see (Du et al. 2000)). At a later stage this real time model checking application used distance bound matrices implemented in XSB itself (see (Pemmasani et al. 2002)). In an attempt to facilitate the use of constraints, XSB was extended with attributed variables (Cui and Warren 2000a). Attributed variables (Holzbaur 1992) are Prolog language feature widely used for implementing constraint solvers. It allows to associate data with unbound variables, manipulate it at will and also to interrupt the unification of these variables. Unfortunately, constraint solvers are complex programs and even with attributed variables it can be a daunting task to implement them. In order to substantially lower the threshold for tabled CLP, a high-level formalism is needed for writing new constraint solvers and integrating them in a tabled logic programming system. In this work we present such a formalism: Tabled Constraint Handling Rules, or TCHR for short. TCHR is a high-level framework for developing new constraint solvers in a tabled TCHR: a framework for tabled CLP 3 logic programming environment. It integrates Constraint Handling Rules (CHR) (Frühwirth 1998), an established high-level formalism for writing new constraint solvers, and tabled logic programming. The framework offers a number of default operations that can be specialized by instantiations to control both semantics and performance. A practical implementation of the framework is presented: the integration of K.U.Leuven CHR in XSB. The integration shows how a tabled constraint logic programming system can be obtained from a Constraint Logic Programming and a tabled logic programming system with little impact on either. Although we have chosen XSB as our particular tabled logic programming system, we believe that our ideas readily apply to other table-based LP systems. In summary, the major contributions of this work are: • a high-level framework for developing new constraint solvers in a tabled logic programming system, • a practical implementation of the framework in terms of K.U.Leuven CHR and XSB, and • a novel, generalized approach for answer set reduction. The CHR-XSB integration, we believe, combines both the bottom-up and topdown fixpoint computations, the superior termination properties of XSB and the constraint programming capabilities of CHR. This combined power enables programmers to easily write highly declarative programs that are easy to maintain and extend. Overview The rest of this text is structured as follows. First, in Sections 2 and 3 we provide basic technical background knowledge on tabled execution of Constraint Logic Programs and Constraint Handling Rules, respectively. Section 4 outlines our contribution: a framework for tabled CLP system integrated in terms of SLG and Constraint Handling Rules. Subsequent sections discuss in more detail the different options and operations of the framework: call abstraction (Section 6), answer projection (Section 7) and answer set optimization (Section 8). Finally, Section 9 discusses related and possible future work, and Section 10 concludes. But first we end this introduction with a small motivating example from the domain of model checking: Example 1 Data-independent systems (Wolper 1986) manipulate data variables over unbounded domains but have a finite number of control locations. Such systems can be modeled as extended finite automata (Sarna-Starosta and Ramakrishnan 2003): finite automata with guards on the transitions and variable mapping relations between source and destination locations. They are useful for modelling and subsequently checking e.g. buffers and protocols. A simple example of such a data-independent system, modeled in CLP(FD), is: edge(a,b,Xa,Xb) :- Xa < 10, Xb = Xa. edge(b,a,Xb,Xa) :- Xb > 0, Xa = Xb + 1. edge(b,c,Xb,Xc) :- Xb > 3, Xc = Xb. 4 T. Schrijvers et al. This system has three control locations a,b,c each with one variable, respectively Xa,Xb,Xc. Each edge/4 clause represents an edge in the system: a possible transition from one control location (the source) to another (the destination). The inequality constraint in each clause guards the transition, and the equality constraint relates the source variable to the destination variable (the variable mapping). Suppose that we are interested in whether location c is reachable from location a, and for which values of the parameter Xa. Let us define a reachability predicate: reach(A,A,X). reach(A,C,X) :edge(A,B,X,NX), reach(B,C,NX). Then our reachability question is captured by the query ?- reach(a,c,X). In order to answer this query, tabling is required to avoid the non-termination trap of the a-b cycle in the graph. At the same time, constraints allow a compact symbolic representation of the infinite search space for X. Without a good interaction between both tabling and constraints, we would not be able to obtain as concise a solution as 0 < X < 10 with so little effort.  2 Tabled Constraint Logic Programs In this section we cover the basics of tabled Constraint Logic Programming. First, the syntax of Constraint Logic Programs is presented in Section 2.1. Next, Section 2.2 explains about the constraints part of CLP: the constraint domain. Finally, Section 2.3 presents the (operational) semantics SLGD of Tabled Constraint Logic Programs. 2.1 Syntax of Constraint Logic Programs A Constraint Logic Program consists of a number of rules, called clauses, of the form: H:-C, L1 , . . . ,Ln . where n ≥ 0 and H is an atom, C is a constraint and L1 , . . . , Ln are literals. A literal is either an atom A or a negated atom ¬A. H is called the head of the clause and C, L1 , . . . , Ln is called the body. The comma “,” is called conjunction as it corresponds with logical conjunction in the semantics of Constraint Logic Programs. The atoms are constructed from predicate symbols p/n and variables. Their meaning is defined by the Constraint Logic Programming itself. The syntax and semantics of constraints is defined by the constraint domain D (see Section 2.2). If all the literals in the body are positive, the clause is a definite clause. A normal clause is a clause that may also contain negative literals. A definite Constraint Logic Program consists of definite clauses only, while a normal Constraint Logic Program TCHR: a framework for tabled CLP 5 has normal clauses. From now one we will only consider definite programs and address them as programs for short. 2.2 Constraint Domains A constraint solver is a (partial) executable implementation of a constraint domain. A constraint domain D consists of a set Π of constraint symbols, a logical theory T and for every constraint symbol c/n ∈ Π a tuple of value sets hV1 , . . . , Vn i. A primitive constraint is constructed from a constraint symbol c/n and for every argument position i (1 ≤ i ≤ n) either a variable or a value from the corresponding value set Vi , similar to the way an atom is constructed in a logic program. A constraint is of the form c1 ∧ . . . ∧ cn where n ≥ 0 and c1 , . . . , cn are primitive constraints. Two distinct constraints are true and false. The former always holds and the latter never holds. The empty conjunction of constraints is written as true. The logical theory T determines what constraints hold and what constraints do not hold. Typically, we use D to also refer specifically to T . For example D |= c means that under the logical theory T of constraint domain D the constraint c holds. A valuation θ for a constraint C is a variable substitution that maps the variables in vars(C) onto values of the constraint domain D. If θ is a valuation for C, then it is a solution for C if Cθ holds in the constraint domain D, i.e. D |= Cθ. A constraint C is satisfiable if it has a solution; otherwise it is unsatisfiable. Two constraints C1 and C2 are equivalent, denoted D |= C1 ↔ C2 , if and only if they have the same solutions. A constraint domain of particular interest is the Herbrand domain H. Its only constraint symbol is term equality = /2, which ranges over Herbrand terms. Plain Logic Programming can be seen as a specialized form of Constraint Logic Programming over the Herbrand domain. Two problems associated with a constraint C are the solution problem, i.e. determining a particular solution, and the satisfaction problem, i.e. determining whether there exists at least one solution. An algorithm for determining the satisfiability of a constraint is called a constraint solver. Often a solution is produced as a by-product. A general technique used by many constraint solvers is to repeatedly rewrite a constraint into an equivalent constraint until a solved form is obtained. A constraint in solved form has the property that it is clear whether it is satisfiable or not. See (Marriott and Stuckey 1998) for a more extensive introduction to constraint solvers. 2.3 Semantics of Constraint Logic Programs In a survey of Constraint Logic Programming (CLP) (Jaffar and Maher 1994) various forms of semantics are listed for Constraint Logic Programs: logic semantics based on Clark completion(Clark 1987), fixpoint semantics (Jaffar and Lassez 1987) as well as a new framework for top-down and bottom-up operational semantics. 6 T. Schrijvers et al. The CLP fixpoint semantics are defined, in the usual way, as the fixpoint of an extended immediate consequence operator. Definition 1 (CLP Immediate Consequence Operator ) The one-step consequence function TPD for a CLP program P with constraint domain D is defined as: ¯ T D (I) = {p(d)| p(x̄) ← c, b1 , . . . , bn ∈ P, P ∃v.v is a valuation on D : D |= v(c), ¯ v(x̄) = d, ∀i : 1 ≤ i ≤ n ⇒ v(bi ) ∈ I} A goal-directed execution strategy, SLGD , using tabling for the above CLP fixpoint semantics has been developed by Toman in (Toman 1997b). This SLGD semantics encompasses the best of both top-down and bottom-up operational semantics: it is goal-directed like top-down evaluation and has the favorable termination properties like bottom-up evaluation. 2.3.1 Basic SLGD Semantics The SLGD semantics makes two assumptions about the constraint domain D. Firstly, D includes a projection operation that returns a disjunction of constraints: ¯T C is used to state that Cj is one of the dis¯T C = W Ci . The notation Cj ∈ ∃ ∃ i juncts in this disjunction. Secondly, it is assumed that a relation ≤D is provided. This relation should be at least as strong as implication, i.e. ∀C1 , C2 : C1 ≤D C2 ⇒ D |= C1 → C2 SLGD is formulated in terms of four resolution (or rewriting) rules, listed in Table 1. These rules either expand existing tree nodes or create new root nodes. There are four different kinds of tree nodes: root(G; C), body(G; B1 , . . . , Bk ; C), goal(G; B, C ′ ; B2 . . . , Bk ; C) and ans(G; A) where G is an atom, B1, . . . , Bk are literals, and C, C ′ , A are constraints1 in D. An SLGD tree is built from a root(G; C) node using the resolution rules. An SLGD forest is a set of SLGD trees. The meaning of the different resolution rules is the following: • The Clause Resolution rule expands a root node: for every matching clause head a body node is created containing the clause’s body literals. • If there is at least one literal in a body node, it is expanded by the Query Projection rule into goal nodes. This rule selects a literal to be resolved. The given Query Projection rule implements a left-to-right selection strategy, which is common to most LP systems, including XSB. However, any other strategy is valid as well. The current constraint store C is projected onto the selected literal’s variables, yielding only the constraints relevant for that 1 Also known as constraint stores. TCHR: a framework for tabled CLP 7 literal. As the projection yields a disjunction of constraints, one goal node is created for every disjunct. • If there is no literal in a body node, it is expanded by the Answer Projection rule into a number of answer nodes. For this purpose the current constraint store C is projected onto the goal’s variables, retaining only those constraints relevant to the goal. In this way variables local to the chosen clause’s body are eliminated. • A goal node is expanded into new body nodes by the Answer Propagation rule. This rule substitutes the selected literal by its answers: the selected literal’s answer constraint stores are incorporated in the current store. Note that the Answer Propagation and Answer Projection rules cooperate: whenever a new answer is produced, it is propagated to all the nodes that have already been resolved using answers from this tree. Also the Answer Propagation rule is responsible for creating new SLGD trees: when no tree with a root node that subsumes the goal (B, C ′ ) to be resolved can be found, a node root(B, C ′ ) is created to start a separate tree. Finally, a query in the SLGD formalism is a tuple (G, C, P ) where vars(C) ⊆ vars(G) and all arguments of G are variables. The SLGD resolution rules are used for query evaluation as follows: 1. create an SLGD forest containing a single tree {root(G, C)}, 2. expand the leftmost node using the resolution rules as long as they can be applied, and 3. return the set ans(G, C) as the answers for the query. Definition 2 (Answer Set) The answer set ans(G, C) is the set of all A such that ans(G; A) ∈ slg(G, C), where slg(G, C) is the SLGD tree rooted at root(G, C). 2.3.2 An Example Let us consider the following very simple CLP program P : p(X) :- X = 1-Y, q(Y). p(X) :- X = 0. q(X) :- true, p(X). The constraint domain is that of domain integers. The supported basic constraint =/2 is equality of arithmetic expressions. Figure 1 depicts the SLGD forest for the query (p(U ); true; P ). The full arrows represent the SLGD tree branches, whereas the dashed arrow indicates the start of a new tree and the dotted arrows indicate the propagation of new answers. Each arrow is labeled with its step number. The answer set ans(p(U ), true) consists of two answers: U = 0 and U = 1. 8 T. Schrijvers et al. Parent Children Conditions Clause Resolution 8 body(G; B11 , . . . , Bk11 ; C ∧ θ ∧ D1 ) > > < .. root(G; C) . > > : l body(G; B1 , . . . , Bkl l ; C ∧ θ ∧ Dl ) for all 0 < i ≤ l such that G′ → Di , B1i , . . . , Bki i and θ ≡ (G = G′ ) and C ∧ θ ∧ Di is satisfiable Query Projection 8 goal(G; B1 , C1 ; B2 . . . , Bk ; C) > > < .. body(G; B1 , . . . , Bk ; C) . > > : goal(G; B1 , Cl ; B2 . . . , Bk ; C) ¯B C for all Ci ∈ ∃ 1 Answer Propagation 8 body(G; B2 , . . . , Bk ; C ∧ θ ∧ A1 ) > > < .. goal(G; B1 , C1 ; B2 . . . , Bk ; C) . > > : body(G; B2 , . . . , Bk ; C ∧ θ ∧ Al ) for all Ai ∈ ans(B ′ , C ′ ) where θ ≡ (B ′ = B1 ) and C1 ∧ θ ≤D C ′ and C ∧ θ ∧ Ai is satisfiable Answer Projection 8 ans(G; A1 ) > > < .. body(G; ; C) . > > : ans(G; Al ) ¯G C for all Ai ∈ ∃ Table 1. SLGD resolution rules Parent Children Optimized Query Projection 8 goal(G; B1 , C1 ; B2 . . . , Bk ; C) > > < .. body(G; B1 , . . . , Bk ; C) . > > : goal(G; B1 , Cl ; B2 . . . , Bk ; C) Conditions ¯ B C → C1 ∨ . . . ∨ Cl D |= ∃ 1 for some C1 , . . . , Cl Table 2. Optimized Query Projection for SLGD resolution 2.3.3 SLGD Optimizations Several optimizations to the rewriting formulas have been proposed by Toman, of which one, Query Projection, is of particular interest to us. The optimization allows for more general goals than strictly necessary to be resolved. In this way fewer goals have to be resolved, as distinct specific queries can be covered by the same general goal. Table 2 lists the modified Query Projection rule, called Optimized Query Projection. A second important optimization is a modified version of the answer set definition: 9 TCHR: a framework for tabled CLP root(p(U ); true) TTTT TTT(1:CR) TTTT TTTT T* ggg gggg g g g g gggg s ggg g (1:CR) body(p(U ); ; U = 0) body(p(U ); q(Y ); U = 1 − Y ) (6:AP j) (2:QP )   goal(p(U ); q(Y ), true; ; U = 1 − Y ) ans(p(U ); U = 0) WWWWW WWW(13:AP WWWW p) F (9:AP p) WWWW F WWW+  F F body(p(U ); ; U = 1 − Y ∧ Y =F0) body(p(U ); ; U = 1 − Y ∧ Y = 1) f C F (3) F (10:Apj) (14:AP j) F F   F ans(p(U ); U = 1) F ans(p(U ); U = 0) F (11) F F F" F F (7) root(q(Y ); true) (4:CR) (13)  body(q(U ); p(U ); true) (9) (5:QP )  goal(q(U ); p(Y ), true; ; true) gggg gggg g g g gggg(7:AP p) s ggg u g body(q(U ); ; U = 0) TTTT TTT(11:AP TTTT p) TTTT T* - body(q(U ); ; U = 1) (8:AP j)  ans(q(U ); U = 0) (12:AP j)  ans(q(U ); U = 1) Fig. 1. Example SLGD forest Definition 3 (Optimized Answer Set) The optimized answer set of the query (G, C, P ), denoted ans(G, C), is the set of all A such that ans(G; A) ∈ slg(G, C) and no A′ is already in ans(G, C) for which A ≤D A′ . This alternative definition allows for answers to be omitted if they are already entailed by earlier more general answers. While logically the same answers are entailed, the set of answers is smaller with the new definition. Note that SLG, the operational semantics of tabled Logic Programming, is in fact a specialized form of the SLGD semantics for the Herbrand domain. Several implementations of SLG exist, including XSB. The topic of this paper, the integration of CHR with tabled execution, is in effect an implementation of SLGD for arbitrary D defined by a CHR program. In (Toman 1996) Toman has also extended his work to a goal-directed execution 10 T. Schrijvers et al. strategy for CLP programs with negation. This extension realizes the well-founded semantics. An implementation of this extension is not covered by our work. It imposes additional requirements on the constraint solver: a finite representation of the negation of any constraint should exist. Moreover, the detection of loops through negation requires a more complicated tabling mechanism. 3 Constraint Handling Rules In this section we give a brief overview of Constraint Handling Rules (CHR) (Frühwirth 1998; Frühwirth and Abdennadher 2003). 3.1 Syntax of CHR We use two disjoint sets of predicate symbols for two different kinds of constraints: built-in (pre-defined) constraint symbols which are solved by a given constraint solver, and CHR (user-defined) constraint symbols which are defined by the rules in a CHR program. There are three kinds of rules: Simplification rule: Propagation rule: Simpagation rule: N ame @ H <=> C | B, N ame @ H ==> C | B, N ame @ H \ H ′ <=> C | B, where Name is an optional, unique identifier of a rule, the head H, H ′ is a non-empty comma-separated conjunction of CHR constraints, the guard C is a conjunction of built-in constraints, and the body B is a goal. A query is a conjunction of built-in and CHR constraints. A trivial guard expression “true |” can be omitted from a rule. The head of a simplification rule is called a removed head, as the rule replaces its head by its body. Similarly, the head of a propagation rule is called a kept head, as the rule adds its body in the presence of its head. Simpagation rules abbreviate simplification rules of the form N ame @ H, H ′ <=> C | H, B, i.e. H is a kept head and H ′ a removed head. A CHR program P consists of an ordered set of CHR rules. 3.2 Operational Semantics of CHR The formal operational semantics of CHR is given in terms of a state transition system in Figure 2. The program state is an indexed 4-tuple hG, S, B, T in . The first part of tuple, the goal G is the multiset of constraints to be rewritten to solved form. The CHR constraint store S is the multiset of identified CHR constraints that can be matched with rules in the program P . An identified CHR constraint c#i is a CHR constraint c associated with some unique integer i, the constraint identifier. This number serves to differentiate among copies of the same constraint. We introduce the functions chr (c#i) = c and id (c#i) = i, and extend them to sequences, sets and multisets of identified CHR constraints in the obvious manner, e.g. chr (S) = {c | c#i ∈ S}. The built-in constraint store B is the conjunction of all built-in constraints that TCHR: a framework for tabled CLP 11 1. Solve h{c} ⊎ G, S, B, T in ֌solve hG, S, c ∧ B, T in where c is a built-in constraint. 2. Introduce h{c} ⊎ G, S, B, T in ֌introduce hG, {c#n} ⊎ S, B, T i(n+1) where c is a CHR constraint. 3. Apply hG, H1 ⊎ H2 ⊎ S, B, T in ֌apply hC ⊎ G, H1 ⊎ S, θ ∧ B, T ′ in where there exists a (renamed apart) rule in P of the form r @ H1′ \ H2′ ⇐⇒ g | C and a matching substitution θ such that chr(H1 ) = θ(H1′ ), chr(H2 ) = θ(H2′ ) and ¯ B (θ ∧ g). In the result T ′ = T ∪ {id(H1 ) ++ id(H2 ) ++ [r]}. It Db |= B → ∃ should hold that T ′ 6= T . Fig. 2. The transition rules of the operational semantics of CHR have been passed to the underlying solver. Since we will usually have no information about the internal representation of B, we will model it as an abstract logical conjunction of constraints. The propagation history T is a set of sequences, each recording the identities of the CHR constraints that fired a rule, and the name of the rule itself. This is necessary to prevent trivial non-termination for propagation rules: a propagation rule is allowed to fire on a set of constraints only if the constraints have not been used to fire the same rule before. Finally, the counter n represents the next free integer that can be used to number a CHR constraint. Given an initial query G, the initial program state is: hG, ∅, true, ∅i1 . The rules of a program P are applied to exhaustion on this initial program state. A rule is applicable, if its head constraints are matched by constraints in the current CHR store one-by-one and if, under this matching, the guard of the rule is implied by the built-in constraints in the goal. Any of the applicable rules can be applied, and the application cannot be undone, it is committed-choice (in contrast to Prolog). When a simplification rule is applied, the matched constraints in the current CHR store are replaced by the body of the rule; when a propagation rule is applied, the body of the rule is added to the goal without removing any constraints. 3.3 Implementation of CHR This high-level description of the operational semantics of CHR leaves two main sources of non-determinism: the order in which constraints of a query are processed and the order in which rules are applied.2 As in Prolog, almost all CHR implementations execute queries from left to right and apply rules top-down in the textual order of the program. This behavior has been formalized in the so-called refined semantics that was also proven to be a concretization of the standard operational semantics (Duck et al. 2004). 2 The nondeterminism due to the wake-up order of delayed constraints and multiple matches for the same rule are of no relevance for the programs discussed here. 12 T. Schrijvers et al. In this refined semantics of actual implementations, a CHR constraint in a query can be understood as a procedure that goes efficiently through the rules of the program in the order they are written, and when it matches a head constraint of a rule, it will look for the other, partner constraints of the head in the constraint store and check the guard until an applicable rule is found. We consider such a constraint to be active. If the active constraint has not been removed after trying all rules, it will be put into the constraint store. Constraints from the store will be reconsidered (woken) if newly added built-in constraints constrain variables of the constraint, because then rules may become applicable if their guards are now implied. The refined operational semantics is implemented by all major CHR systems, among which the K.U.Leuven CHR system (Schrijvers and Demoen 2004). This system is currently available in three different Prolog systems (hProlog (Demoen 2004), SWI-Prolog (Wielemaker 2004) and XSB) and it serves as the basis of our integration with tabled execution in this paper. The K.U.Leuven CHR system (Schrijvers and Demoen 2004) is based on the general compilation schema of CHR by Holzbaur (Holzbaur and Frühwirth 2000). For this paper (Section 5) it is relevant to know that the CHR constraint store is implemented as a global updatable term, containing identified constraints, in this context also called suspended constraints, grouped by their functor. Each suspended constraint c#i is represented as a suspension term, including the following information: • The constraint c itself. • The constraint identifier i. • The continuation goal, executed on reactivation. This goal contains the suspension itself as an argument and it is in fact a cyclic term. • The part of the propagation history T containing for each propagation rule the tuple of identifiers of other constraints that this constraint has interacted with. Variables involved in the suspended constraints behave as indexes into the global store: they have the suspensions attached to them as attributes. Because we aim towards a light-weight integration of CHR with tabled Logic Programming, we do not question these established representation properties, but consider them as something to cope with. We refer the interest reader to (Schrijvers 2005) for more details on CHR implementation. 3.4 CHR for Constraint Solving The CHR language is intended as a language for implementing constraint solvers. A CHR program P is a constraint solver for the constraint domain DP whose constraint symbols ΠP are the CHR and built-in constraint symbols. The constraint theory TP of the program consists of the built-in constraint theory together with the declarative meaning of the CHR rules. The declarative meaning of a simplification TCHR: a framework for tabled CLP 13 rule of the form Hr <=> G | B is: ∀x̄.∃ȳ.G → (H ↔ ∃z̄.B) where x̄ = vars(H)∪, ȳ = vars(G)\vars(H) and z̄ = vars(B)\(vars(H)∪vars(G)). Similarly, the declarative meaning of a propagation rule of the form H ==> G | B is: ∀x̄.∃y.G → (H → ∃z̄B)). Value sets are not explicitly defined by the CHR program, but they exist implicitly in the intention of the programmer. See (Frühwirth and Abdennadher 2003) for an extensive treatment of CHR for writing constraint solvers. 4 The TCHR Framework The main challenge of introducing CHR in XSB is the integration of CHR constraint solvers with the backward chaining fixpoint computation of SLG resolution according to the SLGD semantics of the previous section. A similar integration problem has been solved in (Cui and Warren 2000a), which describes a framework for constraint solvers written with attributed variables for XSB. The name Tabled Constraint Logic Programming (TCLP) is coined in that publication, though it is not formulated in terms of SLGD resolution. Porting CHR to XSB was already there recognized as important future work. CHR is much more convenient for developing constraint solvers than attributed variables, because of its high-level nature. This advantage should be carried over to the tabled context, making tabled CHR a more convenient paradigm than TCLP with attributed variables. Indeed, we will show how the internal details presented in the current section can be hidden from the user. In (Cui and Warren 2000a) the general TCLP framework specifies three operations to control the tabling of constraints: call abstraction, entailment checking of answers and answer projection. These operations correspond with the optimization to Query Projection, the projection in Answer Projection and the compaction of the ans(G; C) set. It is left to the constraint solver programmer to implement these operations for his particular solver. In the following we formulate these operations in terms of CHR. The operations are covered in significant detail as the actual CHR implementation and the encoding of the global CHR constraint store are taken into account. 4.1 General Scheme of the TCHR Implementation The objective of TCHR is to implement SLGD semantics for an arbitrary constraint domain D which is implemented as a CHR constraint solver. For this purpose we have both an SLGH implementation3 , i.e. the SLG implementation of XSB, and an SLDD implementation, i.e. the CHR implementation of XSB, at our disposal. 3 SLG is a special case of SLGD where D is the Herbrand constraint domain H. 14 T. Schrijvers et al. Hence, we aim for the simplest and least intrusive solution. That is: 1. We use the unmodified CHR implementation for constraint solving. 2. We use the unmodified SLG implementation for tabled execution. 3. At the intersection of point 1 and point 2 we transform back and forth between the CHR D constraints and an encoding of these as H constraints. The advantages to this lightweight approach are twofold. Firstly, it is straightforward to realize the full expressivity of SLGD within an existing system. Secondly, it does not affect existing programs or their performance. On the downside we note that TCHR performance and, in particular, constant factors involved are not optimal. However, CHR on its own does not aim towards performance in the first place, but rather towards being a highly expressive formalism for experimenting with new constraint solvers. Similarly, we see the TCHR framework as a highly expressive prototyping system for exploring new applications. It does offer some high-level means to affect performance, and when the resulting performance is simply not good enough, one may decide to reimplement the established high-level approach in a lower-level language. Now we look at our solution in more detail. As points 1 and 2 leave the system untouched, we only have to consider implementing point 3, translating between constraint encodings. First let us consider the different kinds of nodes used in SLGD . Of the tree nodes, only the root and answer nodes are manifestly represented by SLGH implementations like XSB, in respectively call and answer tables. Hence these two nodes require the constraint store to be in H encoding form. The other two nodes, the goal and body nodes, are implicit in the execution mechanism. So here we are free to use the form that suits us best. With these formats for the nodes in mind, we consider one by one the different resolution rules: Clause Resolution The rule is depicted again below with each constraint annotated with its type of encoding: H for Herbrand encoding and CHR for natural CHR encoding. The constraint store C is initially Herbrand encoded in the root node and has to be decoded into its natural CHR form for solving C ∧ θ ∧ Di with the CHR solver. The CHR solver either fails, if the conjunction is not satisfiable, or returns a simplified form of the conjunction. 8 1 ) body(G; B11 , . . . , Bk11 ; CCHR ∧ θ ∧ DCHR > > < .. root(G; CH ) . > > : l l l ) body(G; B1 , . . . , Bkl ; CCHR ∧ θ ∧ DCHR ∀i.0 < i ≤ l such that i G′ → DCHR , B1i , . . . , Bki i and θ ≡ (G = G′ ) i and CCHR ∧ θ ∧ DCHR is satisfiable Optimized Query Projection This rule directly starts with a constraint store in the natural CHR constraint form, and projects it onto the first literal and subsequently generalizes it. A CHR program does not normally come with such a combined projection & generalization operation, so one will have to be supplied by the TCHR framework: the call abstraction. Section 6 discusses what kind of generic projection operation the TCHR framework implements. TCHR: a framework for tabled CLP 15 8 1 goal(G; B1 , CCHR ; B2 . . . , Bk ; CCHR ) > > < ¯ B C → C1 ∨ . . . ∨ Cl .. D |= ∃ 1 body(G; B1 , . . . , Bk ; CCHR ) . > for some C1 , . . . , C l > : l goal(G; B1 , CCHR ; B2 . . . , B k ; CCHR ) Answer Propagation The answers consumed by this rule have to be decoded from Herbrand form for the implication check and the satisfiability check. A CHR program does not normally come with an implication check, so one will have to be supplied here by the TCHR framework. This is covered together with call abstraction in Section 6. i 8 body(G; B2 , . . . , Bk ; CCHR ∧ θ ∧ A1CHR ) > > < .. 1 goal(G; B1 , CCHR ; B2 . . . , Bk ; CCHR ) . > > : body(G; B2 , . . . , Bk ; CCHR ∧ θ ∧ AlCHR ) ′ ∀AH ∈ ans(B ′ , CH ) where θ ≡ (B ′ = B1 ) 1 ′ and CCHR ∧ θ ≤D CCHR i and CCHR ∧ θ ∧ AH is satisfiable Answer Projection Again a projection is performed on the CHR constraint representation. This instance of of projection we call answer projection. Like answer projection, it is to be supplied by the framework. In Section 7 the details of this operation within the framework are elaborated. 8 ans(G; A1H ) > > < .. ¯G C body(G; ; CCHR ) for all AiCHR ∈ ∃ . > > : ans(G; AlH ) Having established what new operations and mappings to include in the framework, we should consider how these are to be incorporated into the existing SLGH system XSB. Recall that we did intend not to modify the system to incorporate our encoding/decoding and projection operations in order to keep the integration light-weight. Neither do we want to encumber the programmer with this tedious and rather low-level task. Instead we propose an automatic source-to-source transformation based on a simple declaration to introduce these operations. The source-to-source transformation maps the SLGD program P onto the SLGH program P ′ . In the mapping every predicate p/n ∈ P is considered independently, and mapped onto three predicates p/n, tabled p/(n+ 2), original p/n ∈ P ′ . T maps the SLGD program P onto the SLGH program P ′ = T(P ). We outline the high-level transformation for a single predicate p/2: :- table p/2. p(X,Y) :- Body. The three resulting predicates are: p(X,Y) :encode_store(CurrentStoreEncoding), call_abstraction([X,Y],CurrentStoreEncoding,AbstractStoreEncoding), empty_store, tabled_p(X,Y,AbstractStoreEncoding,AnswerStoreEncoding), decode_store(CurrentStoreEncoding), decode_store(AnswerStoreEncoding). 16 T. Schrijvers et al. :- table tabled_p/4. tabled_p(X,Y,StoreEncoding,NStoreEncoding) :decode_store(StoreEncoding), original_p(X,Y), encode_store(StoreEncoding1), empty_store, project([X,Y],StoreEncoding1,NStoreEncoding). original_p(X,Y) :- Body. The new predicate p/2 is a front to the actual tabled predicate tabled p/4. This front allows the predicate to be called with the old calling convention where the constraint store is implicit, i.e. in the natural CHR form. Thanks to this front the transformation is modular: we do not have to modify any existing calls to the predicate, either in other predicates’ bodies, its own body Body or in queries. The auxiliary predicate encode store/1 returns a Herbrand encoding of the current (implicit) constraint store and the call abstraction/3 predicate projects the Herbrand encoded store onto the call arguments. Then the implicit constraint store is emptied with empty store/0 so as not to interfere with the tabled call, which has the Herbrand encoded stores as manifest answers. Finally, the predicate decode store/1 decodes the Herbrand encoding and adds the resulting CHR constraint store to the implicit store. In p/2 this predicate is called twice: first to restore the current constraint store and then to add to it the answer constraint store of the tabled call. The tabled p/4 predicate is the tabled predicate. In its body the encoded input store is decoded again, then the original predicate code original p/2 is run, the resulting store is encoded again and projected onto the call arguments. Again the implicit store is emptied so as not to interfere with the caller. Note that this is only a high-level outline of the mapping. In practice the scheme is specialized for the concrete operations. This is discusses later as we discuss each of the operations in detail. The above transformation of both predicates and queries can be fully transparent. All the user has to do is to indicate what predicates have to be tabled, i.e. add a declaration of the form :- table_chr p(_,chr) with Options. p(X,Y) :- ... meaning that the predicate p/2 should be tabled, its first argument is an ordinary Prolog term and its second argument is a CHR constraint variable. An (optional) list of additional options Options may be provided to control the transformation: encoding(EncodingType) 17 TCHR: a framework for tabled CLP Section 5 studies two alternative encodings of the Herbrand constraint store. This option allows the user to choose between them. projection(PredName ) The projection applied in the Answer Projection rule is addressed in Section 7. This projection is realized as a call to a projection predicate that reduces the constraint store to its projected form. canonical form(PredName ) answer combination(PredName ) These two options relate to optimizations of the answer set, based on Definition 3 and a novel generalization of this principle. It is discussed in Section 8. Figure 3 summarizes the different steps in handling a call to a tabled predicate. call abstract call no in table? project answer execute call yes yes store in table yes no entailed? more answers? no combine answer with call Fig. 3. Tabled call flowchart 5 Herbrand Constraint Store Encodings In this section we present two alternative Herbrand constraint store encodings. An encoding must have the following properties: • The encoding has to be suitable for passing it as an argument in a predicate and for storing it in an answer table. • It should be possible to convert from the natural CHR constraint form (see Section 3.3) and back, for insertion into the call table and retrieval from the answer table. The essential aspects of the ordinary CHR constraint store implementation have been covered in Section 3.3. Two different Herbrand constraint store encodings 18 T. Schrijvers et al. that are based on this ordinary form have been explored: the suspension encoding and the goal encoding. The former is based on state copying and the latter on recomputation. A discussion of their respective merits and weaknesses as well as an evaluation follow in Sections 5.1 and 5.2 respectively. One implicit aspect of CHR execution under the refined operational semantics is the order in which constraints are processed. Ordering information is not maintained explicitly. Without any additional support, it is not straightforward to maintain this ordering information for tabled constraints. However, in the spirit of tabling, the declarative meaning of a program rather than its operational behavior is of importance. For that reason we shall not attempt to realize the ordering of the refined operational semantics. From the user’s point of view, the CHR constraints behave according to the theoretical operational semantics and no assumptions should be made about ordering. 5.1 Suspension Encoding This encoding aims at keeping the tabled encoding as close as possible to the ordinary form. The essential issue is to retain the propagation history of the constraints. In that way no unnecessary re-firing of propagation rules occurs after the constraints have been retrieved from the table. However, it is not possible to just store the ordinary constraint suspensions in the table as they are. Fortunately, attributed variables themselves can be stored in tables (see (Cui and Warren 2000b)), but two other aspects have to be taken into account. Firstly, these suspensions are cyclic terms that the tables cannot handle. This can be dealt with by breaking the cycles upon encoding and resetting them during decoding. Secondly, the constraint identifiers have to be replaced by fresh ones during decoding, as multiple calls would otherwise create multiple copies of the same constraints all with identical identifiers. Finally, after decoding, the constraints have to be activated again in order to solve them together with the already present constraints. This is done by simply calling their continuation goals. Example 2 Let us consider the following program: :- constraint a/0, b/0. r1 @ a ==> b. :- chr_table p. p :- a. and the query ?- p. After having fired rule r1, the suspension of an a constraint looks like: Sa = suspension(42,reactivate a(Sa),[r1-[42]]) where 42 is the identifier, reactivate a(Sa) is the continuation goal and [r1-[42]] is the propagation history, which has recorded that rule r1 has fired with only the TCHR: a framework for tabled CLP 19 constraint itself. The other suspension in the store would be for a b constraint: Sb = suspension(43,reactivate b(Sb),[]) The suspension encoding for this store of two constraints would look like: [ Sa / ID1 / suspension(ID1,reactivate_a(Sa),[[r1-[ID1]]]) , Sb / ID2 / suspension(ID2,reactivate_b(Sb),[])] Upon decoding we simply unify ID1 and ID2 with fresh identifiers, and S1 and S2 with their corresponding suspension terms. The resulting well-formed suspension terms are placed in the implicit CHR constraint store and finally the continuation goals of both suspensions are called.  5.2 Goal Encoding The goal encoding aims at keeping the information in the table in as simple a form as possible: for each suspended constraint only the goal to impose this constraint is retained in the table. It is easy to create this goal from a suspension and easy to merge this goal back into another constraint store: it needs only to be called. Whenever it is necessary the goal creates a suspension with a fresh unique identifier and inserts it into the constraint store. The only information that is lost in this encoding is the propagation history. This may lead to multiple propagations for the same combination of head constraints. For this to be sound, a further restriction on the CHR rules is required: they should behave according to set semantics, i.e. the presence of multiple identical constraints should not lead to different answers modulo identical constraints. Example 3 The goal encoding of the above example is: [a, b] and the decoding procedure simply calls a and b.  5.3 Evaluation To measure the relative performance of the two presented encodings, consider the following two programs: prop simp :- constraints a/1. :- constraints a/1, b/1. a(0) <=> true. b(0) <=> true. a(N) ==> N > 0 b(N) <=> N > 0 | M is N - 1, a(M). | a(N), M is N - 1, b(M). p(N) :- a(N). p(N) :- b(N). 20 T. Schrijvers et al. Table 3. Evaluation of the two tabled store encodings. program prop simp no tabling runtime space 10 0 10 0 encoding(suspension) runtime space 150 2,153,100 109 1,829,100 encoding(goal) runtime space 1,739 270,700 89 270,700 For both programs the predicate p(N) puts the constraints a(1)...a(N) in the constraint store. The prop program uses a propagation rule to achieve this while the simp program uses an auxiliary constraint b/1. The non-tabled version of the query p(N) has time complexity O(N ) for both the simp and the prop program. The two possible encodings for the answer constraint store can be specified in the tabling declaration as follows: :- table_chr p(_) with [encoding(suspension)]. and :- table_chr p(_) with [encoding(goal)]. Table 3 gives the results for the query p(400), both untabled and tabled using the two encodings: runtime in milliseconds and space usage of the tables in bytes. For both programs the answer table contains the constraint store with the 400 a/1 constraints. Most of the space overhead is due to the difference in encoding: a suspension contains more information than a simple call. However, the difference is only a constant factor. The only part of a suspension in general that can have a size greater than O(1) is the propagation history. In the prop program every a/1 constraint’s history is limited to remembering that the propagation rule has been used once. For the simp program the propagation history is always empty. The runtime of the prop version with the suspension encoding is considerably better than that of the version with the goal encoding. In fact, there is a complexity difference. When the answer is retrieved from the table for the suspension encoding, the propagation history prevents re-propagation. Hence, answer retrieval takes O(N ) time. However, for the goal encoding every constraint a(I) from the answer will start propagating and the complexity of answer retrieval becomes O(N 2 ). On the other hand, for simp the propagation history plays no role. The runtime overhead is mostly due to the additional overhead of the pre- and post-processing of the suspension encoding as opposed to the simpler form of the goal encoding. In comparison, without tabling the query takes only 10 milliseconds for both programs. 6 Call Abstraction In the call abstraction operation we combine the projection and generalization operations of the Optimized Query Projection rule in the SLGD semantics. The idea of both steps is to reduce the number of distinct SLGD trees, and hence the number of tables. When a predicate is called with many different call patterns, a TCHR: a framework for tabled CLP 21 table is generated for each such call pattern. Thus it is possible that the information for one strongly constrained call is present many times in tables for different less constrained call patterns. This duplication in the tables can be avoided by using call abstraction to obtain a smaller set of call patterns. The projection reduces the context of the predicate call, i.e. the constraint store, to the constraints relevant for the call. In this way, two calls to p(X), respectively with constraint stores {X > 5, Y > 7} and {X > 5, Z < 3} both yield the same projected call store { X > 5 }. The subsequent generalization step goes even further, e.g. by relaxing bounds to the reference value 0 both constraint stores {X > 5} and {X > 10} become {X > 0}. Hence, call abstraction effectively is a means to control the number of tables. At the level of SLGH , call abstraction means not passing certain bindings to the call. For example, p(q,A) can be abstracted to p(Q,A). This goal has then to be followed by Q = q to ensure that only the appropriate bindings for A are retained. For SLGD , call abstraction can be generalized from bindings to constraints: abstraction means removing some of the constraints on the arguments. Consider for example the call p(Q,A) with constraint Q =< N on Q. This call can be abstracted to p(Q’,A), followed by Q’=Q to reintroduce the constraint. Abstraction is particularly useful for those constraint solvers for which the number of constraints on a variable can be much larger than the number of different bindings for that variable. Consider for example a finite domain constraint solver with constraint domain/2, where the first argument is a variable and the second argument the set of its possible values. If the variable has a domain of size n (i.e. it contains n different values), the variable can take as many as 2n different domain/2 constraints, one for each subset of values. Thus many different tables would be needed to cover every possible call pattern. Varying degrees of abstraction are possible, depending on the particular constraint system or application. Full constraint abstraction, i.e. the removal of all constraints from the call, is generally the only option for CHR, for the following reasons: • CHR rules do not require constraints to be on variables. They can be exclusively on ground terms or atoms as well. This is useful for various reasons. By encoding constraint variables as ground terms, particular solving algorithms can be used more conveniently or efficiently, e.g. the equation solving algorithm union-find has optimal time-complexity when using ground elements (Schrijvers and Frühwirth 2006). It is not straightforward to automatically define abstraction for ground terms as these are not necessarily passed in as arguments but can just as well be created inside the call. Hence there is no explicit link with the call environment, while such a link is needed for call abstraction. As such, only “no abstraction” or full constraint abstraction seem suitable for CHR. • Full constraint abstraction is preferable when the previously mentioned table blow-up is likely. • In order to reuse existing answers, existing calls are considered in the Answer 22 T. Schrijvers et al. Propagation rule. These previous calls are compared to the new call using the implication check ≤D . Unfortunately, such an implication check does not come with the CHR solver. A special case of this subsumption-based tabling is where ≤D is taken to be ↔, i.e. equivalence-based, or variant-based in SLGH terminology, tabling. Unfortunately, even establishing the equivalence of constraint stores is not directly supported by CHR solvers. However, if the call constraint store is empty, i.e. true, this problem disappears: true implies true independent of the constraint domain. Moreover, it may be costly to sort out what constraints should be passed in to the call or abstracted away. Hence often full abstraction is cheaper than partial abstraction. For instance, consider a typical propagation-based finite domain constraint solver with binary constraints only. The constraint graph for a number of such finite domain constraints has a node for every variable involved in a constraint and an edge between variables involved in the same constraint. Any additional constraint imposed on a variable in a component of the graph may affect the domain of all other variables in the same component. Hence, call abstraction on a subset of the variables involves a costly transitive closure of reachability in the constraint graph. Let us now revisit the transformation scheme of Section 4.1 for a predicate p/2, and specialize it for full call abstraction: p(X,Y) :encode_store(StoreEncoding), empty_store, tabled_p(X,Y1,NStoreEncoding), decode_store(StoreEncoding), decode_store(NStoreEncoding), Y1 = Y. :- table tabled_p/3. tabled_p(X,Y,NStoreEncoding) :original_p(X,Y), encode_store(StoreEncoding1), empty_store, project([X,Y],StoreEncoding1,NStoreEncoding). original_p(X,Y) :- Body. As we know that the call-abstracted constraint store is empty, we no longer need to pass it as an argument to the tabled p predicate and decode it there. The only effect of the call abstraction is then to replace the constraint variable Y with a fresh variable Y1. This is necessary to prevent any constraints on Y from being reachable through attributes on Y. The unification Y=Y1 at the end of p/2 is then a specialization of the substitution θ ≡ (p(X, Y 1) = p(X, Y )) that appears in the Answer Propagation rule. TCHR: a framework for tabled CLP 23 7 Answer Projection In most constraint domains, the same logical answer can be represented in many different ways. For example, consider the predicate p/1. p(X) :- X > 5. p(X) :- X > 5, Y > 0. Both X > 5 and X > 5/ Y > 0 represent the same answer to the call p(X) concerning X. Constraints that do not relate to the call arguments, like Y > 0, are meaningless outside of the call. The local variable Y is existentially quantified, and cannot be further constrained to introduce unsatisfiability at a later stage. It is the purpose of projection to restrict constraints to a set of variables of interest, and to eliminate other variables as much as possible. In our setting, the variables of interest are the call arguments. For projection to be sound, already present but not yet detected unsatisfiability should not be removed. A sufficient, but not necessary condition is for the constraint system to be complete, i.e. unsatisfiability is detected immediately. Projection is important in the context of tabling, because it may give logically equivalent answers the same syntactical form. When two answers have the same syntactical form, the are recognized as duplicates and only one is retained in the table. A vital application of projection is when a predicate with an infinite number of different answers may be turned into one with just a finite number of answers by discarding the constraints on local variables. Example 4 Consider this program: path(From,To,X) :edge(From,To,X). path(From,To,X) :path(From,Between,X), path(Between,To,X). edge(a,a,X) :leq(X,Y), leq(Y,1). leq(X,X) leq(X,Y) \ leq(Y,X) leq(X,Y) \ leq(X,Y) leq(X,Y) , leq(Y,Z) <=> <=> <=> ==> true. X = Y. true. leq(X,Z). It defines a path/3 predicate that expresses reachability in a graph represented by edge/3 predicates. The first two arguments of both predicates are edges (origin and destination) and the third is a constraint variable. Along every edge in the graph some additional constraints may be imposed on this variable. In our example, the graph consists of a single loop from edge a to itself. This loop imposes two less-thanor-equal-to constraints: leq(X,Y), leq(Y,1). The variable Y is a local variable and the fourth rule for leq/2 derives that leq(X,1) also holds. 24 T. Schrijvers et al. The query ?- path(A,B,X) determines the different paths. There are an infinite number of paths in our simple graph, one for each non-zero integer n. A path for n takes the loop n times. For every time the loop is taken a new variable Yi is created and two more constraints leq(X,Yi) and leq(Yi,1) are added. Through the propagation rule also an leq(X,1) is added for each time the loop is taken. The second simpagation rule however removes all but one copy of this last constraint. Even though there are an infinite number of answers, the constraints involving the local variables Yi are of no interest and only the single leq(X,1) is relevant.  In general constraint projection onto a set of variables transforms a constraint store into another constraint store in which only variables of the given set are involved. The form of the resulting constraint store strongly depends on the particular constraint solver and its computation may involve arbitrary analysis of the original constraint store. We propose what we believe is an elegant CHR-based approach to projection. It consists of a compact and high level notation. The user declares the use of the CHR-based approach to projection as follows: :- table_chr p(_,chr) with [projection(P redN ame)]. and implements the projection as a number of CHR rules that involve the special P redN ame/1 constraint. This constraint has as its argument the set of variables to project on. The source-to-source transformation generates the predicate tabled p based on this declaration: :- table tabled_p/3. tabled_p(X,Y,NStoreEncoding) :original_p(X,Y), P redN ame([X,Y]), encode_store(NStoreEncoding), empty_store. When no projection operation is supplied, the default action is to return the constraint store unmodified. To implement the projection simpagation rules can be used to decide what constraints to remove. A final simplification rule at the end can be used to remove the projection constraint from the store. The following example shows how to project away all leq/2 constraints that involve arguments not contained in a given set Vars: project(Vars) \ leq(X,Y) <=> \+ (member(X,Vars),member(Y,Vars)) | true. project(Vars) <=> true. Besides removal of constraints more sophisticated operations such as weakening are possible. E.g. consider a set solver with two constraints: in/2 that requires an 25 TCHR: a framework for tabled CLP element to be in a set and nonempty/1 that requires a set to be non-empty. The rules for projection could include the following weakening rule: project(Vars) \ in(Elem,Set) <=> member(Set,Vars), \+ member(Elem,Vars) | nonempty(Set). 8 Answer Set Optimization In this section we consider various ways for reducing the size of the answer set. First, in Section 8.1 we consider the subsumption-based technique proposed by Toman. This leads us to a sidetrack in Section 8.2 where we outline a technique for dynamic programming through answer subsumption. Section 8.3 continues with the main story: it is established that answer subsumption is suboptimal for general constraint domains and a generalized approach is proposed instead. In Section 8.4 we relax the soundness condition of answer reduction and speculate on applications to program analysis. Finally, in Section 8.5, we evaluate the two main approaches. 8.1 Answer Subsumption Some of the answers computed for a tabled predicate may be redundant and so need not be saved. The property is exploited by Definition 3, the Optimized Answer Set definition. In terms of SLGH , consider for example that the answer p(a,X) is already in the table of predicate p/2. Now a new answer, p(a,b) is found. This new answer is redundant as it is covered by the more general p(a,X) that is already in the table. Hence it is logically valid to not record this answer in the table, and to simply discard it. This does not affect the soundness or completeness of the procedure. We can extend the idea of answer subsumption to CHR constraints. This path length computation will serve as an illustration: Example 5 dist(A,B,D) :- edge(A,B,D1), leq(D1,D). dist(A,B,D) :- dist(A,C,D1), edge(C,B,D2), leq(D1 + D2, D). Suppose appropriate rules for the leq/2 constraint are in the above program, where leq means less-than-or-equal. The semantics are that dist(A,B,D) holds if there is a path from A to B of length less than or equal to D. In other words, D is an upper bound on the length of a path from A to B. If the answer dist(n1,n2,D) :- leq(d1, D) is already in the table and a new answer dist(n1,n2,D) :- leq(d2, D), where d1 =< d2, is found, then this new answer is redundant. Hence it can be discarded. This does not affect the soundness, since logically the same answers are covered.  A strategy for establishing implication is provided by the following property: ∀i ∈ {0, 1} : C1−i → Ci ⇐⇒ C0 ∧ C1 ↔ Ci (8.1) 26 T. Schrijvers et al. for any logical formulas C0 and C1 . In particular, consider C0 and C1 to be a previous answer constraint store and a newly computed one. The strategy then is as follows. At the end of the tabled predicate’s execution a previous answer store C0 is merged with a new answer store C1 . After merging, the store is simplified and propagated to C by the available rules of the CHR program P. This combines the two answers into a new one. This mechanism can be used to check entailment of one answer by the other: if the combined answer store S is equal to one of the two, then that answer store entails the other. A practical procedure is the following: :- table tabled_p/3. tabled_p(X,Y,NStoreEncoding) :original_p(X,Y), project([X,Y]), encode_store(StoreEncoding), ( previous_answer(p(X,Y,PrevStoreEncoding),AnswerID), decode_store(PrevStoreEncoding), encode_store(Conjunction), ( Conjunction == PrevStoreEncoding -> del_answer(AnswerID), fail ; Conjunction \== StoreEncoding ) -> fail ; NStoreEncoding = StoreEncoding ), empty_store. After computing, projecting and Herbrand encoding a new answer store C1 , we look at previous answer stores C0 . We assume that there is a built-in predicate previous answer/3 for this purpose, that backtracks over previous answers and also provides a handle AnswerID to the returned answer. As the previous answer store is still in Herbrand encoding, we decode it. This has the simultaneous effect of adding it to the new implicit CHR constraint store that is still in place, i.e. it computes C0 ∧ C1 . This resulting conjunction is Herbrand encoded for further comparison. Syntactical equality (≡) is used as a sound approximation of the equivalence check for the first equivalence sign (↔) in the Formula 8.1. If the conjunction equals the previous answer PrevStoreEncoding, then that previous answer is implied by the new answer and hence obsolete. We use the built-in predicate del answer to erase it from the answer table and we backtrack over alternative previous answers. Otherwise, if the conjunction does not equal the new answer, then neither implies the other and we also backtrack over alternative previous answers. However, if the conjunction equals the new answer StoreEncoding, that means it is implied by the TCHR: a framework for tabled CLP 27 previous answer. Hence we fail, ignoring further alternative previous answers. If on the other hand, the resulting answer is not implied by any previous answers, then it is a genuinely new answer and is stored in the answer table. Example 6 Consider again the dist/3 example, and assume that the answer stores {leq(7,D}, {leq(3,D))} and {leq(5,D))} are successively produced for the query ?- dist(a,b,D). When the first answer, {leq(7,D} is produced, there are no previous answers, so it makes its way into the answer table. For the second answer, {leq(3,D))} there is already a previous answer {leq(7,D}, so both are conjoined. The following rule leq/2 rule simplifies the conjunction to retain the more general answer: leq(N1,D) \ leq(N2,D) <=> N1 >= N2 | true. Hence, the resulting solved form of the conjunction is {leq(D,7)}, or in other words the previous answer. In other words, this previous answer is implied by the new answer. So it is deleted from the answer table and the new answer is recorded. Finally, following the same procedure we discover that the third answer is already implied by the second one. So the final answer set contains just the second answer. Note that the dist/3 program would normally generate an infinite number of answers for a cyclic graph, logically correct but not terminating. However, if it is tabled with answer subsumption, it does terminate for non-negative weights. Not only does it terminate, it only produces one answer, namely dist(n1,n2,D) :leq(d,D) with d the length of the shortest path. Indeed, the predicate only returns the optimal answer.  The syntactical equality check on the Herbrand encoding is in general only an approximation of a proper equivalence check. An option for the table chr declarations allows to improve its effectiveness: canonical form(PredName ) specifies the name of the predicate that should compute the (approximate) canonical form of the Herbrand encoded answer constraint store. This canonical form is used to check equivalence of two constraint stores. Example 7 Both [leq(1,X),leq(X,3)] and [leq(X,3),leq(1,X)] are permutations of the same Herbrand constraint store encoding. Obviously, based on a simple syntactic equality check they are different. However, they can both be reduced to the same canonical form, e.g. with the help of the Prolog built-in sort/2.  We refer to (Schrijvers et al. 2006) for a more elaborated discussion of the property 8.1 and an alternative, more elaborate implementation of the implication checking strategy in CHR. In contrast to our generic approach above, the traditional approach in CLP is for the solver to provide a number of predefined ask constraints (Saraswat and Rinard 1990), i.e. subsumption checks for primitive constraints. These primitive ask constraints can then be combined to form more complicated subsumption checks (Duck et al. 2004). We have avoided this approach because it puts a greater burden on the constraint solver implementer, who has to provide the implementation of the primitive ask con- 28 T. Schrijvers et al. straints. In future work, we could incorporate user-defined ask constraints in our generic approach for greater programmer control over performance and accuracy of subsumption tests. 8.2 Dynamic Programming through Answer Subsumption The technique used in the dist/3 program is to replace the computation of the exact distance of a path with the computation of an upper bound on the distance via constraints. Then, by tabling the predicate and performing answer subsumption, the defining predicate has effectively been turned into an optimizing one, computing the length of the shortest path. It is a straightforward yet powerful optimization technique that can be applied to other defining predicates as well, turning them into optimizing (dynamic programming) predicates with a minimum of changes. In comparison, the usual approach consists in explicitly computing the list of all answers, e.g. using Prolog’s findall/3 meta-programming built-in, and in processing this list of answers. Guo and Gupta (Guo and Gupta 2004) have added a specific feature to tabled execution to realize this dynamic programming functionality. In adding support for CHR to tabling, we get this functionality for free. 8.3 General Answer Compaction Definition 3 yields a sound approach for reducing the size of answer tables. However, we have discovered that it is only a special case of what is really possible. Therefore, we propose the following generalized definition of answer sets, compacted answer set, which covers all sound approaches for reducing the answer set size. Definition 4 (Compacted Answer Set ) A compacted answer set of the query (G, C, P ), denoted ans(G, C), is a set such that: • No new fully instantiated (i.e. ground) answers are introduced: ∀A, θ : (A ∈ ans(G, C)) ∧ (D ⊢ Aθ) =⇒ ∃A′ , θ′ : (ans(G; A′ ) ∈ slg(G, C)) ∧ (A′ θ′ ≡ Aθ) (8.2) • All fully instantiated answers are covered: ∀A′ , θ′ : (ans(G; A′ ) ∈ slg(G, C)) ∧ (D ⊢ A′ θ) =⇒ ∃A, θ : (A ∈ ans(G, C)) ∧ (Aθ ≡ A′ θ′ ) (8.3) • The answer set is more compact than the individual answers: #ans(G, C) ≤ #{A′ |ans(G; A′ ) ∈ slg(G, C)} (8.4) where A and A′ are constraint stores and θ and θ′ are valuations. Note that an optimized answer set is a special instance of a compacted answer set and certainly, for Herbrand constraints, it is an optimal strategy, because: H |= ∀H0 , H1 , H : H ↔ H0 ∨ H1 =⇒ ∃i ∈ {0, 1} : H ↔ Hi (8.5) TCHR: a framework for tabled CLP 29 where H0 , H1 , H are conjunctions of Herbrand equality constraints. In other words, for finding a single Herbrand constraint that covers two given ones, it is sufficient to considering those two. Unfortunately, a similar property does not hold for all constraint domains: a single constraint store may be equivalent to the disjunction of two others, while it is not equivalent to either of the two. For example, leq(X , Y ) ∨ leq(Y , X ) ↔ true and yet we have that neither leq(X , Y ) ↔ true nor leq(Y , X ) ↔ true. Nevertheless, checking whether one answer subsumes the other is a rather convenient strategy, since it does not require any knowledge on the particularities of the used constraint solver. That makes it a good choice for the default strategy for CHR answer subsumption. Better strategies may be supplied for particular constraint solvers through the option answer combination(PredName ). It specifies the name of the predicate that returns the disjunction of two given answer stores, or fails if it cannot find one. Example 8 Consider a simple interval-based solver, featuring constraints of the form X ∈ [L, U ], where X is a constraint variable and L and U are integers, and the rules: X ∈ [L,U] ==> L =< U. X ∈ [L1,U1], X ∈ [L2,U2] <=> X ∈ ([L1,U1] ∩ [L2,U2]). For this solver, the subsumption approach merges two constraints X ∈ [L1 , U1 ] and X ∈ [L2 , U2 ] iff [L1 , U1 ] ⊆ [L2 , U2 ] or [L2 , U2 ] ⊆ [L1 , U1 ]. However, it fails to work for e.g. X ∈ [1, 3] and X ∈ [2, 4]. Nevertheless there is a single constraint form that covers both: X ∈ [1, 4]. An optimal answer combinator in this case is one that returns the union of two overlapping intervals. This also captures the subsumption approach. If the intervals do not overlap, there is no single constraint that covers both without introducing new answers.  Note that the idea of general answer compaction is not specific implementation of constraints, and, in particular, should apply to non-CHR constraint solvers too. 8.4 Relaxed Answer Compaction Semantics For some applications the soundness condition of answer generalization can be relaxed. An example in regular Prolog would be to have two answers p(a,b) and p(a,c) and to replace the two of them with one answer p(a,X). This guarantees (for positive programs) that no answers are lost, but it may introduce extraneous answers. In other words, property 8.3 is preserved while property 8.2 is not. A similar technique is possible with constrained answers. While this approach is logically unsound, it may be acceptable for some applications if only answer coverage is required. An example is the use of the least upper bound (lub) operator to combine answers in the tabled abstract interpretation setting of (Codish et al. 1998). There is often 30 T. Schrijvers et al. a trade-off between accuracy and efficiency in space and time. By exploiting this trade-off abstract interpretation can remain feasible in many circumstances. Toman has explored in (Toman 1997a) the use of CLP for program analysis and compared it to abstract interpretation. In his proposal constraints serve as the abstractions of concrete values, and bottom-up computation or tabling is necessary to reach a fixpoint over recursive program constructs. He notes that the CLP approach is less flexible than actual abstract interpretation because it lacks flexible control over the accuracy/efficiency trade-off. We believe that our proposal for relaxed answer compaction could function as a lub or widening operator to remedy this issue, making Toman’s program analysis technique more practical. This remains to be explored in future work. 8.5 Evaluation: A Shipment Problem We evaluate the usefulness of the two proposed answer set optimization approaches based on a shipment problem. Problem statement: There are N packages available for shipping using trucks. Each package has a weight and some constraints on the time to be delivered. Each truck has a maximum load and a destination. Determine whether there is a subset of the packages that can fully load a truck destined for a certain place so that all the packages in this subset are delivered on time. (from (Cui 2000)) The problem is solved by the truckload program: The truckload Program :- constraints leq/2. leq(X,X) leq(N1,N2) leq(N1,X) \ leq(X,N1) \ leq(X,Y) \ leq(X,Y) , <=> <=> leq(N2,X) <=> leq(X,N2) <=> leq(X,Y) <=> leq(Y,Z) ==> true. number(N1), number(N2) | N1 =< N2. number(N1), number(N2), N1 > N2 | true. number(N1), number(N2), N1 < N2 | true. true. leq(X,Z). truckload(0,0,_,_). truckload(I,W,D,T) :I > 0, I1 is I - 1, truckload(I1,W,D,T). truckload(I,W,D,T) :I > 0, pack(I,Wi,D,T), W1 is W - Wi, W1 >= 0, I1 is I - 1, truckload(I1,W1,D,T). % do not include pack I % include pack I TCHR: a framework for tabled CLP 31 pack(30,29,chicago,T) :- leq(19,T),leq(T,29). pack(29,82,chicago,T) :- leq(20,T),leq(T,29). pack(28,24,chicago,T) :- leq(8,T),leq(T,12). %... pack(3,60,chicago,T) :- leq(4,T),leq(T,29). pack(2,82,chicago,T) :- leq(28,T),leq(T,29). pack(1,41,chicago,T) :- leq(27,T),leq(T,28). Packages are represented by a constraint database: clauses of pack/4, e.g. pack(3,60,chicago,T) :- leq(4,T),leq(T,29). means that the third package weights 60 pounds, is destined for Chicago and has to be delivered between the 4th and the 29th day. The truckload/4 predicate computes the answer to the problem, e.g. :- truckload(30,100,chicago,T) computes whether a subset of the packages numbered 1 to 30 exists to fill up a truck with a maximum load of 100 pounds destined for Chicago. The time constraints are captured in the bound on the constraint variable T. There may be multiple answers to this query, if multiple subsets exist that satisfy it. We have run the program in four different modes: • No Tabling: the program is run as is without tabling. • Tabling - Plain: to avoid the recomputation of subproblems in recursive calls the truckload/4 predicate is tabled with: :- table_chr truckload(_,_,_,chr) with [encoding(goal)]. • Tabling - Sorted: the answer store is canonicalized by simple sorting such that permutations are detected to be identical answers: :- table_chr truckload(_,_,_,chr) with [encoding(goal), canonical_form(sort)]. • Tabling - Combinator: we apply the custom answer combinator proposed in Example 8: two answers with overlapping time intervals are merged into one answer with the union of the time intervals. This variant is declared as: :- table_chr truckload(_,_,_,chr) with [encoding(goal), answer_combination(interval_union)]. with interval union/3 the custom answer combinator. Table 4 contains the runtime results of running the program in the four different modes for different maximum loads. Runtime is in milliseconds and has been obtained on an Intel Pentium 4 2.00 GHz with 512 MB of RAM, with XSB 6.1 running on Linux 2.6.18. For the modes with tabling the space usage, in kilobytes, 32 T. Schrijvers et al. No Tabling Load 100 200 300 400 500 <1 160 2,461 12,400 > 5 min. Plain 100 461 1,039 1,500 1,541 Tabling Sorted Combinator 100 100 461 451 1,041 971 1,510 1,351 1,541 1,451 Table 4. Runtime results for the truckload program Load 100 200 300 400 500 Plain 286 979 1,799 2,308 2,449 Tabling Sorted Combinator 286 279 956 904 1,723 1,584 2,202 2,054 2,365 2,267 Table 5. Space usage for the truckload program of the tables and number of unique answers have been recorded as well, in Table 5 and Table 6 respectively. It is clear from the results that tabling has an overhead for small loads, but that it scales much better. Both the modes with the canonical form and the answer combination have a slight space advantage over plain tabling which increases with the total number of answers. There is hardly any runtime effect for the canonical form, whereas the answer combination mode is faster with increasing load. In summary, canonicalization of the answer store and answer combination can have a favorable impact on both runtime and table space depending on the particular problem. 9 Related and Future Work The theoretical background for this paper, SLGD resolution, was realized by Toman in (Toman 1997b). Toman establishes soundness, completeness and termination properties for particular classes of constraint domains. While he has implemented a prototype implementation of SLGD resolution for evaluation, no practical and fully-fledged implementation in a Prolog system was done. load 100 200 300 400 500 plain 324 2,082 4,721 5,801 4,972 tabling sorted combinator 324 283 2,069 1,686 4,665 3,543 5,751 4,449 4,935 4,017 Table 6. Number of tabled answers for the truckload program TCHR: a framework for tabled CLP 33 Various ad hoc approaches to using constraints in XSB were used in the past by Ramakrishnan et al., such as a meta-interpreter (Mukund et al. 2000), interfacing with a solver written in C (Du et al. 2000) and explicit constraint store management in Prolog (Pemmasani et al. 2002). However, these approaches are quite cumbersome and lack the ease of use and generality of CHR. The most closely related implementation work that this paper builds on is (Cui and Warren 2000a), which presents a framework for constraint solvers written with attributed variables. Attributed variables are a much cruder tool for writing constraint solvers though. Implementation issues such as constraint store encoding and scheduling strategies that are hidden by CHR become the user’s responsibility when she programs with attributed variables. Also in the tabled setting, the user has to think through all the integration issues of the attributed variables solver. For CHR we have provided generic solutions that work for all CHR constraint solvers and more powerful features can be accessed through parametrized options. Guo and Gupta propose a technique for dynamic programming with tabling (Guo and Gupta 2004) that is somewhat similar to the one proposed here. During entailment checking a particular argument in a new answer is compared with the value in the previous answer. Either one is kept depending on the optimization criterion. Their technique is specified for particular numeric arguments whereas ours is for constraint stores and as such more general. Further investigation of our technique is certainly necessary to establish the extent of its applicability. Part of this work was previously published at the International Conference of Logic Programming (Schrijvers and Warren 2004) and the Colloquium on Implementation of Constraint and Logic Programming Systems (Schrijvers et al. 2003). In (Schrijvers et al. 2003) we briefly discuss two applications of CHR with tabling in the field of model checking. The integration of CHR and XSB has shown to make the implementation of model checking applications with constraints significantly easier. The next step in the search for applications is to explore more expressive models to be checked than are currently viable with traditional approaches. Further applications should also serve to improve the currently limited performance assessment of CHR with tabling. The shipment problem has given us some indication of improved performance behavior in practice, but theoretical reasoning indicates that slow-downs are a possibility as well. The global CHR store has proven to be one of the main complications in tabling CHR constraints. For particular CHR programs it is possible to replace the global data structure with localized, distributed ones. Assessment (Sarna-Starosta and Ramakrishnan 2007) of this approach has shown to be very promising. Partial abstraction and subsumption are closely related. The former transforms a call into a more general call while the latter looks for answers to more general calls, but if none are available still executes the actual call. We still have to look at how to implement partial abstraction and the implications of variant and subsumption based tabling (Rao et al. 1996). Finally, better automatic techniques for entailment testing, such as those of (Schrijvers et al. 2006), and for projection should be investigated in the context of SLGD . 34 T. Schrijvers et al. 10 Conclusion We have presented a high-level framework for tabled CLP, based on a light-weight integration of CHR with a tabled LP system. Tabling-related problems that have to be solved time and again for ad hoc constraint solver integrations are solved once and for all for CHR constraint solvers. Solutions have been formulated for call abstraction, tabling constraint stores, answer projection, answer combination (e.g. for optimization), and answer set optimization. Hence integrating a particular CHR constraint solver requires much less knowledge of implementation intricacies and decisions can be made on a higher level. If performance turns out to be a bottleneck, once the high-level integration is stable and well-understood, then its implementation may be specialized in a lower-level language using the TCHR implementation as its specification. Our novel contribution, generalized answer set compaction, may certainly contribute towards that end. Finally, we would like to mention that an XSB release, number 2.7, with the presented CHR system integrated with tabling is publicly available since December 30, 2004 (see http://xsb.sf.net). Acknowledgements We are grateful to Beata Sarna-Starosta, Giridhar Pemmasani and C.R. Ramakrishnan for the interesting discussions and help on applications of tabled execution and constraints in the field of model checking. We thank the anonymous reviewers for their helpful comments. References Clark, K. L. 1987. Negation as Failure. In Logic and Databases, H. Gallaire and J. Minker, Eds. Plenum Press, New York, 293–322. Codish, M., Demoen, B., and Sagonas, K. 1998. Semantic-based Program Analysis for Logic-based Languages Using XSB. International Journal of Software Tools for Technology Transfer 2, 1 (Jan.), 29–45. Cui, B. 2000. A System for Tabled Constraint Logic Programming. Ph.D. thesis, State University of New York at Stony Brook. Cui, B. and Warren, D. S. 2000a. A System for Tabled Constraint Logic Programming. In CL 2000: Proceedings of the 1st International Conference on Computational Logic, J. W. Lloyd, V. Dahl, U. Furbach, M. Kerber, K.-K. Lau, C. Palamidessi, L. M. Pereira, Y. Sagiv, and P. J. Stuckey, Eds. Lecture Notes in Computer Science, vol. 1861. Springer Verlag, London, UK, 478–492. Cui, B. and Warren, D. S. 2000b. Attributed Variables in XSB. In Electronic Notes in Theoretical Computer Science, I. Dutra et al., Eds. Vol. 30. Elsevier, 67–80. Demoen, B. 2004. hProlog. http://www.cs.kuleuven.be/˜bmd/hProlog/. Du, X., Ramakrishnan, C. R., and Smolka, S. A. 2000. Tabled Resolution + Constraints: A Recipe for Model Checking Real-Time Systems. In IEEE Real Time Systems Symposium. Orlando, Florida, 175–184. TCHR: a framework for tabled CLP 35 Duck, G. J., Garcı́a de la Banda, M., and Stuckey, P. J. 2004. Compiling Ask Constraints. In ICLP’04: Proceedings of the 20th International Conference on Logic Programming. Lecture Notes in Computer Science, vol. 3132. Springer Verlag, St-Malo, France, 105–119. Duck, G. J., Stuckey, P. J., Garcı́a de la Banda, M., and Holzbaur, C. 2004. The Refined Operational Semantics of Constraint Handling Rules. In ICLP’04: Proceedings of the 20th International Conference on Logic Programming. Lecture Notes in Computer Science, vol. 3132. Springer Verlag, St-Malo, France, 90–104. Frühwirth, T. 1998. Theory and practice of constraint handling rules. Journal of Logic Programming 37, 1–3 (October), 95–138. Frühwirth, T. and Abdennadher, S. 2003. Essentials of Constraint Programming. Cognitive Technologies. Springer Verlag. Guo, H.-F. and Gupta, G. 2004. Simplifying Dynamic Programming via Tabling. In Proc. Sixth International Symposium on Practical Aspects of Declarative Languages, P. V. Hentenryck, Ed. Lecture Notes in Computer Science, vol. 3819. Springer Verlag, 163–177. Holzbaur, C. 1992. Metastructures vs. Attributed Variables in the Context of Extensible Unification. Tech. Rep. TR-92-23, Austrian Research Institute for Artificial Intelligence, Vienna, Austria. Holzbaur, C. and Frühwirth, T. 2000. A Prolog Constraint Handling Rules Compiler and Runtime System. Special Issue Journal of Applied Artificial Intelligence on Constraint Handling Rules 14, 4 (April), 369–388. Jaffar, J. and Lassez, J.-L. 1987. Constraint Logic Programming. In POPL ’87: Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages. ACM Press, New York, NY, USA, 111–119. Jaffar, J. and Maher, M. J. 1994. Constraint Logic Programming: A Survey. Journal of Logic Programming 19/20, 503–581. Kanellakis, P. C., Kuper, G. M., and Revesz, P. Z. 1995. Constraint query languages. In Selected papers of the 9th annual ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems. Academic Press, Inc., Orlando, FL, USA, 26–52. Marriott, K. and Stuckey, P. J. 1998. Programming with Constraints: an Introduction. MIT Press. Mukund, M., Ramakrishnan, C. R., Ramakrishnan, I. V., and Verma, R. 2000. Symbolic Bisimulation using Tabled Constraint Logic Programming. In International Workshop on Tabulation in Parsing and Deduction. Vigo, Spain, 1–9. Pemmasani, G., Ramakrishnan, C. R., and Ramakrishnan, I. V. 2002. Efficient Model Checking of Real Time Systems Using Tabled Logic Programming and Constraints. In International Conference on Logic Programming. Lecture Notes in Computer Science. Springer, Copenhagen, Denmark, 405–410. Rao, P., Ramakrishnan, C. R., and Ramakrishnan, I. V. 1996. A Thread in Time Saves Tabling Time. In Joint International Conference and Symposium on Logic Programming. 112–126. Saraswat, V. A. and Rinard, M. 1990. Concurrent constraint programming. In POPL ’90: Proceedings of the 17th ACM SIGPLAN-SIGACT symposium on Principles of programming languages. ACM Press, New York, NY, USA, 232–245. Sarna-Starosta, B. and Ramakrishnan, C. R. 2003. Constraint-Based Model Checking of Data-Independent Systems. In 5th International Conference on Formal Engineering Methods, ICFEM 2003, J. S. Dong and J. Woodcock, Eds. Lecture Notes in Computer Science, vol. 2885. Springer-Verlag, 579–598. Sarna-Starosta, B. and Ramakrishnan, C. R. 2007. Compiling Constraint Handling 36 T. Schrijvers et al. Rules for Efficient Tabled Evaluation. In PADL’07: Ninth International Symposium on Practical Aspects of Declarative Languages, M. Hanus, Ed. Lecture Notes in Computer Science. Springer Verlag, 170–184. Schrijvers, T. 2005. Analyses, Optimizations and Extensions of Constraint Handling Rules. Ph.D. thesis, Department of Computer Science, K.U.Leuven, Leuven, Belgium. Schrijvers, T. and Demoen, B. 2004. The K.U.Leuven CHR system: Implementation and application. In First Workshop on Constraint Handling Rules: Selected Contributions, T. Frühwirth and M. Meister, Eds. Ulm, Germany, 1–5. Schrijvers, T., Demoen, B., Duck, G., Stuckey, P., and Frühwirth, T. 2006. Automatic Implication Checking for CHR Constraints. In Electronic Notes in Theoretical Computer Science. Vol. 147. 93–111. Schrijvers, T. and Frühwirth, T. 2006. Optimal Union-Find in Constraint Handling Rules. Theory and Practice of Logic Programming 6, 1&2, 213–224. Schrijvers, T. and Warren, D. S. 2004. Constraint handling rules and tabled execution. In ICLP’04: Proceedings of the 20th International Conference on Logic Programming, B. Demoen and V. Lifschitz, Eds. Lecture Notes in Computer Science, vol. 3132. Springer Verlag, St-Malo, France, 120–136. Schrijvers, T., Warren, D. S., and Demoen, B. 2003. CHR for XSB. In CICLOPS 2003: Proceedings of the Colloquium on Implementation of Constraint and LOgic Programming Systems, R. Lopes and M. Ferreira, Eds. University of Porto, Mumbai, India, 7–20. Toman, D. 1996. Computing the Well-founded Semantics for Constraint Extensions of Datalog. In Proceedings of CP’96 Workshop on Constraint Databases. Number 1191 in Lecture Notes in Computer Science. Cambridge, MA, USA, 64–79. Toman, D. 1997a. Constraint Databases and Program Analysis Using Abstract Interpretation. In Constraint Databases and Their Applications, Second International Workshop on Constraint Database Systems (CDB ’97), V. Gaede, A. Brodsky, O. Günther, D. Srivastava, V. Vianu, and M. Wallace, Eds. Lecture Notes in Computer Science, vol. 1191. Springer Verlag, 246–262. Toman, D. 1997b. Memoing Evaluation for Constraint Extensions of Datalog. Constraints: An International Journal, Special Issue on Constraints and Databases 2, 3/4 (December), 337–359. Warren, D. S. et al. 2005. The XSB Programmer’s Manual: version 2.7, vols. 1 and 2. http://xsb.sf.net. Wielemaker, J. 2004. SWI-Prolog release 5.4.0. http://www.swi-prolog.org/. Wolper, P. 1986. Expressing interesting properties of programs in propositional temporal logic. In POPL ’86: Proceedings of the 13th ACM SIGACT-SIGPLAN symposium on Principles of programming languages. ACM Press, New York, NY, USA, 184–193.
6cs.PL
arXiv:1501.04010v1 [cs.NE] 16 Jan 2015 Coevolutionary intransitivity in games: A landscape analysis Hendrik Richter HTWK Leipzig University of Applied Sciences Faculty of Electrical Engineering & Information Technology Postfach 301166, D–04251 Leipzig, Germany Email: [email protected] January 19, 2015 Abstract Intransitivity is supposed to be a main reason for deficits in coevolutionary progress and inheritable superiority. Besides, coevolutionary dynamics is characterized by interactions yielding subjective fitness, but aiming at solutions that are superior with respect to an objective measurement. Such an approximation of objective fitness may be, for instance, generalization performance. In the paper a link between rating– and ranking–based measures of intransitivity and fitness landscapes that can address the dichotomy between subjective and objective fitness is explored. The approach is illustrated by numerical experiments involving a simple random game with continuously tunable degree of randomness. 1 Introduction Despite earlier promises and optimism, using coevolutionary algorithms (CEAs) for evolving candidate solutions towards an optimum remains a complicated and almost arcane matter with generally unclear prospects of success [13, 15, 20]. This is prominently caused by a defining feature of coevolution. CEAs are driven by fitness that originates from interaction of candidate solutions with other candidate solutions. In other words, the fitness obtained from these interactions is subjective as it depends on which candidate solutions are actually interacting and when in coevolutionary run–time the interactions take place. The interactions can be understood as to constitute tests, which leads to labeling such kinds of coevolutionary problems as test–based problems [15, 17]. Test–based problems particularly occur in game playing or game–like contexts, for instance in situations where the players’ strategies are subject to (competitive) coevolutionary optimum finding [15, 19]. It has been argued that in games with players and strategies the player space can be understood a phenotypic according to the framework of fitness landscapes [10, 16], while the strategy space is genotypic [1, 14]. This view is adopted in the following discussion. Notwithstanding that coevolutionary dynamics is induced by subjective fitness, the aim of using a CEA is identifying candidate solutions that are superior in a more general sense. Hence, in coevolution next to the fitness resulting from (a limited number of) tests, a second notion of fitness is helpful. Such a fitness generalizing subjective fitness occurs in test–based problems in different forms. For games with players and strategies, there is usually no absolute quality measurement, or an absolute quality measurement would require to evaluate all possible test cases, which is computationally infeasible [4, 5, 19]. To circumvent this problem and enable experimental studies of the relationships between subjective fitness and absolute quality measurements, number games have been proposed, for instance minimal substrates [18, 21]. These artificial problem settings postulate an absolute quality, called objective fitness [7]. In this line of reasoning, coevolutionary dynamics can be understood as aiming at progress in objective fitness by proxy of subjective fitness. Consequently, a main difficulty in designing CEAs stems from the question of how well subjective 1 fitness represents objective fitness. In analogy to the (postulated) objective fitness of number games, for games with players and strategies all general quality measurements of subjective fitness are interpretable as objective fitness. This implies that for game playing there may only be an approximation of objective fitness and different approximations are possible, for instance different instances of generalization performance [4, 5]. Put another way, this interpretation suggests that in game playing there are different degrees of objective fitness. Application examples of CEAs have frequently reported experiments showing mediocre performance, mostly attributed to coevolutionary intransitivity [3, 9, 21]. Generally speaking, intransitivity occurs when superiority relations are cyclic. Such cyclic superiority relations have consequences for coevolutionary dynamics as intransitivity may occurs across subsequent generations. In such a case, it may be that all solutions at generation k + 1 are better than at k, and that the same applies for k + 2 with respect to k + 1. This, however, does not imply that the solutions at k + 2 are strictly better than at k. Cyclic superiority relations that occur across generations are connoted as coevolutionary (dynamic) intransitivity. In this paper, the problem of coevolutionary intransitivity is linked to the dichotomy between subjective and objective fitness. This is done by combining a rating– and ranking–based measuring approach of intransitivity proposed by Samothrakis et al. [19] with a framework of codynamic fitness landscapes recently suggested [18]. Codynamic fitness landscapes enable to analyse the relationship between objective and subjective fitness for all possible solutions of the coevolutionary search process. The landscape approach proposed particularly explores how coevolutionary intransitivity is related to the objective–versus–subjective–fitness issue. The remainder of the paper is structured as follows. In the next section, the concept of codynamic landscapes composed of objective and subjective fitness is briefly recalled. In Sec. 3, intransitivity is discussed. For the discussion, a simple random game is introduced, where the degree of randomness can be continuously tuned. It is shown that intransitivity can be characterized by different types of intransitivity measures. Numerical experiments with the simple random game are presented in Sec. 4, and Sec. 5 concludes the paper with a summary. 2 Coevolution, codynamic landscapes and number games This section focuses attention on an approach recently suggested [18] that is useful for understanding coevolutionary dynamics through codynamic fitness landscapes. Such landscapes allow studying the relationship between objective and subjective fitness which, in turn, mainly determines coevolutionary dynamics. We define objective fitness as the triple of search space S with search space points s ∈ S, neighborhood structure n(s) and fitness function fobj (s). The objective fitness landscape can be considered as to describe the optimization problem to be solved by the CEA. This problem solving is based on coevolutionary interactions between potential solutions which yields subjective fitness. Hence, subjective fitness can be viewed as the way the CEA perceives the problem posed by the objective fitness. From this, it appears to be sensible to assume that the subjective landscape possesses the same search space and neighborhood structure, but has a fitness function fsub that more or less strongly deviates from the objective fitness fobj . This can be seen as the subjective fitness usually overestimating or underestimating objective fitness. Moreover, for a coevolutionary run, the deviation between objective and subjective fitness is dynamic. In other word, the coevolutionary dynamics dynamically deforms the subjective fitness landscape. In the following, the link between subjective and objective fitness is exemplified for a number game, which is also called a coevolutionary minimal substrate [18, 21]. In this number game a population P of players is considered that inhabits the search spaces S. The search space is one–dimensional and real–valued. At each instance of the game k = 0, 1, 2, . . ., the players of P (k) may have possible values s ∈ S. An objective fitness function is defined over the search space, that is fobj (s), which consequently casts an objective fitness landscape. The subjective fitness of P (k) is the result of an interactive number game. Therefore, for each calculation of the subjective fitness fsub (s) for a player from P , a sample σ(E) of evaluators from E ⊆ P is randomly selected. This sample is statistically independent from the sample for the next calculation. Denote µ the size of the sample σ(E) out of λ evaluators, with µ ≤ λ. The number game further defines that the fitness fsub (s) with respect to the sample 2 σ(E) is calculated by counting the (averaged) number of members in σ(E) that have a smaller objective fitness fobj (σi (E)), i = 1, 2, . . . , µ, than the objective fitness fobj (s) [18]: µ 1X eval(s, σi (E)) fsub (s) = µ  with eval(s, σi ) = i=1 1 0 if fobj (s) > fobj (σi ) . otherwise (1) Note that the number game considered postulates objective fitness and defines by Eq. (1) how subjective fitness is obtained by a coevolutionary interaction. In the next section, this perspective of subjective and objective fitness is applied to games with players and strategies. A population of players is engaged to evaluate their subjective fitness by interaction with other players. 3 Static and coevolutionary intransitivity in games A relation R is called intransitive over a set S if for three elements {s1 , s2 , s3 } ∈ S the relation (s1 Rs2 ) ∧ (s2 Rs3 ) does not always imply s1 Rs3 . An instance of intransitivity is superiority relations that are cyclic, which in its most obvious and purest form appears in game playing. Cyclic superiority relations here mean that for three players and three strategies s1 , s2 and s3 , the player using s1 wins against s2 , and s2 wins against s3 , but s1 loses against s3 . A simple example is a rock–paper–scissor game, where “paper” wins over “rock”, “scissor” wins over “paper”, but “scissor” loses against “rock”. Thus, “paper”, “rock” and “scissor” are possible strategies a player can adopt in this game. Note that this kind of intransitivity is a feature of the preference in a single round of the game. Hence, such an intransitivity is static (and actually game– induced) and has no immediate link to (co-)evolutionary dynamics. Consequently, the next question is how these superiority relations resemble situations with coevolutionary intransitivity and can be understood by the dichotomy between subjective and objective fitness. To obtain (co-)evolutionary dynamics, the players need to adjust their strategies, and the game needs to be played for more than one round. In other words, studying iterated games is also interesting as it serves to juxtapose static (game–induced) intransitivity with coevolutionary (dynamic and search–induced) intransitivity. One way to build a relationship between game results and fitness is to apply a rating system. Examples of rating systems are the Elo system to evaluate chess players [8, 11], or the Bradley–Terry–Luce model of paired comparison [2, 12]. Recently, it has been shown that this methodology is also useful for analyzing coevolutionary intransitivity [19]. A rating system creates a probabilistic model based on past game results that can be seen as a predictor of future results. Most significantly, the rating system also imposes a (temporal) ranking of the players. In the following, these ideas are applied to a simple random game where the degree of randomness can be tuned. The game consists of players using a strategy to perform against all other players once, called a round robin tournament. The game outcome, which can be interpreted as payoff, is subject to the players’ ratings and random. Given that the game has N players, there are N (N2−1) games in a single round robin. Define a percentage prand of games that have a random result to obtain prand · N (N2−1) games whose outcome is chance with a predefined distribution. The remaining games end deterministically according to the rating difference between the players. Thus, such a game falls into the category of perfect and incomplete information. Viewed over a series of round robin tournaments, this interaction between rating–based determinism and random chance creates temporal “rating triangles”, where a player scores high results (and has a high rating) over a certain time, but may also lose against a nominal weaker (low– rating) player, which over time may or may not show the same characteristics towards a third player. Such a behavior complies with coevolutionary (dynamic and actually search–induced) intransitivity. In addition, the game can also reproduce rock–paper–scissor–like intransitivities. For N players the maximal number of static intransitivities is   (N − 2)(N − 1)N N #intra max = = , (2) 3 6 see [6, 19]. Any three players form a triangle of cyclic superiority relations if they each win one game against the other two. Thus, for N not very large, the (average) number of actual static intransitivities 3 # 1 2 3 4 5 rt(0) 1600 1600 1600 1600 1600 Table 1: Results of the simple random game for three instance #1 #2 # 3 #4 #5 sc(0) rt(1) #1 #2 # 3 #4 x 1 1 1 1 4 1630 x 0 1 1 0 x 1 0 1 2 1600 1 x 1 1 0 0 x 1 1 2 1600 0 0 x 0 0 1 0 x 1 2 1600 0 0 1 x 0 0 0 0 x 0 1570 0 1 1 0 of the game #5 sc(1) 1 3 0 3 0 0 1 2 x 2 rt(2) 1642 1615 1570 1600 1573 gp 3.5 2.5 1 2 1 rank 1 2 4.5 3 4.5 can be determined by enumeration and gives a static intransitivity measure called the intransitivity index (itx) [6, 19]. As an alternative, Samothrakis et al. [19] suggested to use a difference measure based on Kullback–Leibler divergence (kld) between the prediction made by the rating system and the actual outcome to measure static intransitivity. Both quantities itx and kld are subjects of the numerical experiments reported in the next section. A game in a coevolutionary setting involves finding the strategy a player should adopt to score best according to a given understanding of performance. This clearly implies that the performance measurement should generalize a single round robin tournament. Thus, if there are several instances of round robin tournaments, the overall results can also be accounted for by generalization performance [4, 5]. Each instance of a round robin can be scaled to a generation of coevolutionary run–time. Generalization performance is defined as mean score of a solution in all possible test cases. Because considering all possible test cases may be computationally infeasible, Chong et al. [4, 5] used a statistical approach involving confidence bounds to estimate the amount of needed test cases for a given error margin. Given this understanding, and assuming that all strategies are equally likely to be selected as test strategies, the generalization performance of strategy i is: K 1 X gpi = sci (k), (3) K k=1 where sci (k) is the score the i-th strategy yields in the k–th instance of a round robin tournament. The needed number of instances K depends on the bounds given by Chong et al. [4, 5]. Generalization performance also builds a relationship between actual game results and fitness and therefore can be seen as an alternative to a rating system. As an example of the simple random game assume that there are five players (N = 5), denoted as #1 to #5, which each act upon a unknown, but internally adjusting strategy. Further assume that as an a–priori evaluation all players are considered equal and have the same rating, say rt(0) = 1600. These players are now engaged in a round robin tournament, where a win scores 1 and a loss counts 0. The results achieved depend on the pre–game rating and random. Assume that these results were scored, see Tab. 1, column 3–7. While player #1 wins all games and #5 loses all games, the players #2–#4 build a rock–paper–scissor triangle of cyclic superiority relations. These results somehow violate the expectations established by the initial (pre–game) rating, which could have been met by all players winning 2 out of 4 games. Furthermore, the results show clearly that the game cannot be completely deterministic with respect to the a–priori evaluation. In other words, a rating and ranking approach subsumes the game history and can only be a predictor of future game results. The quality of prediction depends on the percentage of random game results. Also, from the results of the round robin, it is not evident whether player #1 was as successful as it was because its strategy was (objectively) good, or because the strategies of the other players were (objectively) poor. All, the round robin gives is a comparison. The a–priori rating were indicating that all players have the same rank (and hence there is no ranking difference between them), but the results were showing otherwise. Hence, the round robin tournament updates the rating, producing an after–game rating. According to the Elo system [8, 11], which is adopted 4 sc( 1 4 0 2 3 here, this is done via first calculating the expected outcome exi (k) = 1 X j 1+ 10(rtj (k)−rti (k))/400 . (4) The quantity exi (k) summarizes winning probabilities of player #i with respect to all other players in round k. For a single game, that is j = 1, the quantity exi is the expected winning probability for the player #i winning against player #j. For the example with all players having the same rating, the expected outcome is also the same, namely exi = 2. The rating of the players is updated according to the difference between expectation and actual score: rti (k + 1) = rti (k) + K(sci (k) − exi (k)). (5) The K is called the K–factor, which tunes the sensitivity between the rating and the results of a single round robin tournament. Using K = 15, the new rating rt(1) gives differences between the players, see Tab. 1, column 9. The best player #1 is now ranked highest, the poorest player #5 is ranked lowest. Also note that the players #2–#4 engaged in the game–induced intransitivity triangle still share the same rating as before. Now assume the next round of the game. The strategies of the players have been adjusted, supposedly by a (competitive) coevolutionary search process. See the results in Tab. 1, column 10–14. The outcome generally confirms the impression of the first round with player #1 still being strong. Violating the expectations are the good scores of the players #2 and #5, and the poor score of player #3. Note that in this round the players #1, #2, and #5 as well as the players #2, #4, and #5 form a rock–paper–scissor triangle of game–induced intransitivity. Contrary to the first round, these players now neither have the same score, nor the same pre–game or after–game rating. This after–game rating rt(2) is calculated according to Eq. (5) and given in Tab. 1, column 16. As there are now two instances of the round robin tournament, an first estimation of the generalized performance gp can be obtained by averaging the scores according to Eq. (3). The results are given in Tab. 1, column 17. Conforming with this account of quality evaluation, player #1 is best, and can be ranked first, followed by players #2 and #4. The ranking with respect to generalization performance is given in Tab. 1, column 18. Note that the ranking gives average ranks for tied ranks as for player #3 and #5 (gp = 1 leads to rank = 4.5), which preserves the sum over all ranks. Further note that this ranking is almost equal to the ranking according to ratings, with the exception of players #3 and #5 which have a very similar but not equal rating. Now, the simple random game is interpreted according to the landscape view of subjective and objective fitness. Recall that subjective fitness is associated with fitness gained by individuals through interaction with others. According to this view, a round robin tournament yields subjective fitness: fsub = sc(k). Objective fitness, in turn, generalizes subjective fitness in terms of an absolute quality measurement. Possible candidates are the rating fobj = rt(k) or generalization performance fobj = gp(k). Defining subjective and objective fitness in such a way also gives raise to reformulating coevolutionary intransitivity. Generally speaking, coevolutionary intransitivity involves cycling of (objective) solution quality. This cycling may be caused by subjective fitness not adequately representing objective fitness. Hence, subjective fitness may drive evolution into search space regions visited before but evaluated differently, or generally into directions not favorable. Hence, coevolutionary (dynamic) intransitivity can be understood as temporal mismatches in order between subjective and objective fitness. Consider again the example of the game whose results are given in Tab. 1. Suppose another instance of the round robin is played, and (omitting the specific results) the scores are in Tab. 1, column 19. The rating rt(k) is considered to be objective, while sc(k) is subjective. For player #1, the rating is rt1 = 1600 ≤ 1630 ≤ 1642, while its score is sc1 = 4 > 3 > 1, which is a temporal mismatch between objective and subjective fitness. If we were to suppose for a moment that the rating declared as objective fitness is indeed the quantity to achieve in coevolutionary search, and if a CEA were to use score for guiding this search, then player #1 would likely be misguided. On the other hand, for player #2, the rating rt2 = 1600 ≤ 1630 ≤ 1642, and the score sc2 = 2 < 3 < 4 show a match between 5 6 2000 6 1900 5 5 1800 4 3 1700 gp(k) rat(k) sc(k) 4 3 1600 2 2 1500 1 0 0 1 1400 2 4 6 8 10 12 14 16 18 1300 0 20 2 4 6 8 10 k 12 14 16 18 0 0 20 2 4 6 8 k (a) 14 16 18 20 12 14 16 18 20 (c) 2000 6 1900 5 12 k (b) 6 10 5 1800 4 3 1700 gp(k) rat(k) sc(k) 4 3 1600 2 2 1500 1 0 0 1 1400 2 4 6 8 10 12 14 16 18 20 1300 0 2 4 6 8 10 k (d) 12 14 16 k (e) 18 20 0 0 2 4 6 8 10 k (f) Fig. 1. Scores, ratings, and generalization performance for two percentages of random games: (a)–(c), prand = 0.01; (d)–(f), prand = 0.75. subjective and objective fitness. These conditions can be reformulated employing a ranking function with tied ranks and gives a measure of coevolutionary intransitivity. Hence, the player–wise temporal mismatch (ptm) can be defined as the average number of rank mismatches: rank(fobj (k), fobj (k + 1)), fobj (k + 2)) 6= rank(fsub (k), fsub (k + 1)), fsub (k + 2)) for each player for a given number of instances of round robins. An alternative measure of coevolutionary intransitivity that is related to the ptm just discussed stems from the fact that coevolutionary selection is based on comparing subjective fitness values. Hence, the fitness ranking within one instance of the game (or one generation) gives indication as to what direction is preferred. If difficulties in the search process are caused by how well subjective fitness represents objective fitness, then the difference in the ranking according to subjective fitness and the ranking according to objective fitness for each instance is also a suitable measure of coevolutionary intransitivity. Therefore, the quantity |rank(fsub (k)) − rank(fobj (k))| over all players for each instance k is another measure of coevolutionary intransitivity and is called collective ranking difference (crd). The observations discussed so far suggest some relationships, namely that game–induced, static intransitivity has ambiguous effect on coevolutionary progress, and that coevolutionary, dynamic intransitivity can be expressed as ranking differences between objective and subjective fitness. In other words, the quantities ptm and crd may be useful as measures of coevolutionary intransitivity. All these relationships can be studied by numerical experiments, which are the topic of next section. 6 0.018 0.018 0.018 prand prand 0.016 prand 0.016 0.016 0.85 0.85 0.014 0.85 0.014 0.50 0.012 0.014 0.50 0.012 0.008 itx 0.01 itx 0.01 itx 0.01 0.008 0.20 0.006 0.008 0.20 0.006 0.004 0.004 0.10 0.002 0.002 0.01 4 6 8 10 12 14 0.01 0 0 16 500 1000 1500 2000 sc 2500 3000 0.01 0 0 3500 (b) 0.2 0.2 N = 32 0.1 <itx> 0.2 <itx> 0.25 0.15 0.15 0.2 0.25 0.3 0.35 N = 24 0.15 N = 16 0.05 N=8 0.4 0.45 0.5 0 0 kld (d) N = 32 0.1 N = 16 N=8 0.15 1 N = 24 0.05 N = 16 0.1 0.8 N=8 N = 32 0.1 N = 24 0.05 0.6 (c) 0.25 0.05 0.4 gp 0.25 0 0 0.2 rt (a) <itx> 0.10 0.002 2 0.20 0.006 0.004 0.10 0 0 0.50 0.012 0.01 0.02 0.03 0.04 0.05 0.06 ptm(sc,rt) (e) 0.07 0.08 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 ptm(sc,gp) (f) Fig. 2. Intransitivity measure itx versus score = sc(k), rating rt(k) and generalization performance gp(k) (a–c) as scatter plots; relationships between the intransitivity measure itx, kld, and ptm (d–f) 4 Numerical experiments The report of experimental results starts with the time evolution of the simple random game introduced in the last section. Fig. 1 shows the scores, ratings and generalization performances for two different percentages of random results (prand = 0.01 and prand = 0.75) and N = 6 players and 20 instances of a round robin. The experiments are initialized with ratings rt(0) being slightly spread around the value rt(0) = 1600. The randomly determined chance to win or to lose is evenly distributed. The figures show curves for a single instance of the randomly determined part of the game outcomes. Hence, the curves are not meant to be statistically significant, but for illustrating typical behaviour only. It can be seen that for a low number of random outcome (Fig. 1a,b,c) the scores each player achieves are mainly defined by the initial rating. Small differences in the initial rating are amplified and lead to well–sorted long–term rankings of both the rating and generalization performance. For a large number of random game results (Fig. 1d,e,f) the scores are almost purely chance which is evenly distributed. Consistently, ratings and generalization performances tend to approach the expected value implied by the underlying distribution for all players alike. The next experiments address the relationships between static (game–induced) intransitivity expressed by the measure itx and quantities representing subjective as well as objective fitness. The scatter plots given in Fig. 2a,b,c are for N = 16 players and five levels of prand . The experimental setup includes a repetition of each run for 100 times for 1000 instances of the round robin, where the first 200 instances are discarded to omit transients. Note that this gives a sufficient number of instance according to the bounds of generalization 7 2 prand 1.6 0.20 0.05 0.10 1.2 0.50 1 0.8 0.20 0.6 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 0.50 1 0.8 0.20 0.4 0.10 0.10 0.2 0.01 0.01 0.4 1.2 0.6 0.2 0.2 0.85 1.4 crd(sc,gp) crd(sc,gp) 0.15 0.1 1.6 0.85 1.4 0.50 0.2 0 0 prand 1.8 0.85 0.25 <itx> 2 prand 1.8 0 0.4 2 0.5 0.6 0.7 crd(sc,gp) 0.8 0.9 1 0.01 0 0.4 1.1 0.5 0.6 0.7 max sc (a) 0.8 0.9 1 1.1 max gp (b) (c) 2.5 0.07 0.06 0.25 2 0.05 0.15 1.5 N = 32 1 N = 32 0.1 ptm(sc,rt) crd(sc,gp) <itx> 0.2 0.04 0.03 N = 24 N = 32 0.02 N = 16 N = 24 N = 24 0.5 0.05 N=8 N = 16 N = 16 0.01 N=8 N=8 0 0 0.5 1 1.5 2 2.5 0 0 crd(sc,gp) (d) 0.2 0.4 0.6 0.8 1 1.2 1.4 crd(sc,rt) (e) 1.6 1.8 0 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 crd(sc,rt) (f) Fig. 3. Intransitivity measure crd versus time average itx, max sc, and max pg (a–c) as scatter plots; relationships between the intransitivity measure crd, itx, and ptm (d–f) performance [4, 5]. Hence, the results can be seen as statistically significant. In fact, the 99% confidence intervals are so small that they are not depicted in the figures. It can be seen that for each level of randomness in the game, we obtain a distinct level of static intransitiviy measured by itx, where rising prand also increases itx. What is interesting is that there is almost no variation in score, rating or generalization performance for a given level of intransitivity itx. This indicates that static intransitivity seems to have little influence on neither subjective nor objective fitness. This is particularly visible for low levels of prand where these is a clear sorting according to the range of fitness a given player achieved but this is not connected to differences in the itx. A next experiment explores the relations between the index based measure itx and the probabilistically motivated measure kld, see Fig. 2d. Here as well as in the following figure the results are for four different number of players N (N = 8, 16, 24, 32) and five levels of random results prand ; the time– average itx, denoted hitxi, is given, the quantities are normalized according to the number of players. It can be seen that between both quantities there is a proportional relationship, which on the one hand generally confirms the result in [19], but does not show that itx is more brittle that kld. For the studied game it can be concluded that both quantities are interchangeable. Next, the relationship between the static intransitivity and the dynamic intransitivity measure player–wise temporal mismatch (ptm) is studied, Fig. 2e,f. For the mismatch ptm based on rating as objective fitness (Fig. 2e) there is a linear relationship, at least for small values of prand , for the mismatch ptm based on generalization performance (Fig. 2f), no sensible conclusions about relations can be drawn. Finally, we focus on the rank–based dynamic intransitivity measure collective ranking difference (crd), see Fig. 3. The Fig. 3a,b,c again shows scatter plots, now for the crd based on 8 score as subjective fitness and generalization performance as objective fitness for N = 16 players and five levels of prand . It can be seen that although different prand give different itx, there is no difference in the crd, Fig. 3a. However, there is a almost linear relation between the measure crd and max sc and max gp, at least for lower levels of prand . This can be interpreted as the crd scaling with the time evolution of the subjective and objective fitness, but not with the time evolution of static intansitivity, compare to Fig. 2a,b,c, which does not show such a characteristics. For the time–averages, there is a scaling for different number of players and different levels of randomness prand , see Fig. 3d. In Fig. 3e, the relation between the crd based on rating as objective fitness (crd(sc,rt)) and the crd based on generalization performance as objective fitness (crd(sc,gp)) is shown. It can be seen that both quantities scale piece-wise linear for prand not very large, which allows to conclude that both quantities account for the same intransitivity properties. Finally, the relation between the crd and ptm is shown, Fig. 3f. It can be seen that the ptm scales weaker than the crd, particularly for a small number of players and high randomness, and it can be conjectured that the crd is a more meaningful coevolutionary intransitivity measure than the ptm. 5 Conclusions This paper is a contribution to the ongoing discussion about the effect of intransitivities on coevolutionary progress. An approach was presented that allowed to link a rating– and ranking–based measuring approach of intransitivity [19] with a framework of fitness landscapes to enable analyzing the relationship between objective and subjective fitness. For experimentally illustrating the approach a simple random game with continuously tunable degree of randomness was proposed. Apart from the random, the game results depend on the ratings of the players, which reflect the past success of each player. Thus, the game proposed characterizes many real–world games as their outcome is also a function of chance as well as of predictions based on game history. For studying the effect of intransitivity, measures were explored. In extension of existing static intransitivity measures, dynamic measures that can account for coevolutionary intransitivity were proposed. These measure are based on rankings between subjective and objective fitness and it was shown that coevolutionary intransitivity can be understood as a ranking problem, and hence be accounted for by ranking statistics. To enlarge the scope of the presented approach, as a next step the intransitivity measures could be studied for other types of game for instance social games as the iterated prisoner’s dilemma or board game such as Othello. References [1] T. Antal, H. Ohtsuki, J. Wakeley, P. Taylor, M. A. Nowak, Evolutionary game dynamics in phenotype space. Proc. Nat. Acad. Sci. 106: 8597–8600, 2009. [2] R. A. Bradley, M. E. Terry, Rank analysis of incomplete block designs, I. the method of paired comparisons. Biometrika 39: 324–345, 1952. [3] E. D. de Jong, Intransitivity in coevolution. In: X. Yao et al. (eds.), Parallel Problem Solving from Nature–PPSN VIII, Springer–Verlag, Berlin Heidelberg New York, 843–851, 2004. [4] S. Y. Chong, P. Tino, X. Yao, Measuring generalization performance in coevolutionary learning. IEEE Trans. Evolut. Comp. 12: 479–505, 2008. [5] S. Y. Chong, P. Tino, D. C. Ku, X. Yao, Improving generalization performance in coevolutionary learning. IEEE Trans. Evolut. Comp. 16: 70–85, 2012. [6] O. Frank, F. Harary, Cluster inference by using transitivity indices in empirical graphs. Jour. Am. Statist. Assoc. 77: 835–840, 1982. 9 [7] E. D. de Jong, Objective fitness correlation. In: H. Lipson (ed.), Proc. Genetic and Evolutionary Computation Conference, GECCO 2007, ACM, New York, 440–447, 2007. [8] A. E. Elo, The Rating of Chess Players, Past and Present. Batsford, London, 1978. [9] P. Funes, E. Pujals, Intransitivity revisited coevolutionary dynamics of numbers games. In: H. G. Beyer, U. M. O’Reilly (eds.), Proc. Genetic and Evolutionary Computation Conference, GECCO 2005, Morgan Kaufmann, San Francisco, CA, 515–521, 2005. [10] L. Kallel, B. Naudts, C. R. Reeves, Properties of fitness functions and search landscapes. In: L. Kallel, B. Naudts, A. Rogers (eds.), Theoretical Aspects of Evolutionary Computing, Springer–Verlag, Berlin, Heidelberg, New York, 177–208, 2001. [11] A. N. Langville, C. D. Meyer, Who’s #1? The Science of Rating and Ranking. Princeton University Press, Princeton, NJ, 2012. [12] R. D. Luce, Individual Choice Behaviours: A Theoretical Analysis. John Wiley, New York, 1959. [13] T. Miconi, Why coevolution doesn’t “work”: Superiority and progress in coevolution. In: L. Vanneschi, et al. (eds.), EuroGP 2009, Springer–Verlag, Berlin Heidelberg New York, 49–60, 2009. [14] M. A. Nowak, C. E. Tarnita, T. Antal, Evolutionary dynamics in structured populations. Phil. Trans. R. Soc. B 365: 19–30, 2010. [15] E. Popovici, A. Bucci, R. P. Wiegand, E. D. de Jong, Coevolutionary principles. In: G. Rozenberg, T. Bäck, J. N. Kok (eds.), Handbook of Natural Computing, Springer–Verlag, Berlin Heidelberg New York, 987–1033, 2010. [16] H. Richter, A. P. Engelbrecht, Recent Advances in the Theory and Application of Fitness Landscapes, Springer–Verlag, Berlin Heidelberg New York, 2014. [17] H. Richter, Fitness landscapes that depend on time. In: H. Richter, A. P. Engelbrecht (eds.), Recent Advances in the Theory and Application of Fitness Landscapes, Springer–Verlag, Berlin Heidelberg New York, 265–299, 2014. [18] H. Richter, Codynamic fitness landscapes of coevolutionary minimal substrates. In: C. A. Coello Coello (ed.) Proc. IEEE Congress on Evolutionary Computation, IEEE CEC 2014, IEEE Press, Piscataway, NJ, 2692–2699, 2014. [19] S. Samothrakis, S. M. Lucas, T. P. Runarsson, D. Robles, Coevolving game–playing agents: Measuring performance and intransitivities. IEEE Trans. Evolut. Comp. 17: 213–226, 2013. [20] R. P. T. van Wijngaarden, E. D. de Jong, Evaluation and diversity in co-evolution. In: G. Rudolph et al. (eds.), Parallel Problem Solving from Nature–PPSN X, Springer–Verlag, Berlin Heidelberg New York, 631–640, 2008. [21] R. A. Watson, J. B. Pollack, Coevolutionary dynamics in a minimal substrate. In: L. Spector et al. (eds.), Proc. Genetic and Evolutionary Computation Conference, GECCO 2001, Morgan Kaufmann, San Francisco, CA, 702–709, 2001. 10
9cs.NE
arXiv:1711.10185v1 [cs.AI] 28 Nov 2017 Hyper-dimensional computing for a visual question-answering system that is trainable end-to-end Guglielmo Montone Laboratoire Psychologie de la Perception Université Paris Descartes 75006 Paris, France [email protected] J.Kevin O’Regan Laboratoire Psychologie de la Perception Université Paris Descartes 75006 Paris, France [email protected] Alexander V. Terekhov Laboratoire Psychologie de la Perception Université Paris Descartes 75006 Paris, France [email protected] Abstract In this work we propose a system for visual question answering. Our architecture is composed of two parts, the first part creates the logical knowledge base given the image. The second part evaluates questions against the knowledge base. Differently from previous work, the knowledge base is represented using hyper-dimensional computing. This choice has the advantage that all the operations in the system, namely creating the knowledge base and evaluating the questions against it, are differentiable, thereby making the system easily trainable in an end-to-end fashion. 1 Introduction Visual Question Answering (VQA) or Visual Turing Test are terms that refer to a task in which a machine is provided with a picture and a question about a picture and the machine is asked to return the answer to the question. Such tasks have become popular in the last year thanks to the emergence of several datasets containing images, with associated questions and answers [8, 1]. Classical deep neural network approaches face these tasks by training architectures composed of several parts. In these architectures there are often a RNN (often an LSTM) for encoding the question and for producing the answer, and a CNN for analyzing the image [2, 7]. The main idea behind such architectures is to project the question and the image into a relatively low dimensional space where the two are compared. These approaches give impressive results when the question is about simple properties of the image like "What is the color of the bus?". However the results become worse when the question is more complex and involves verifying one or more relations among objects in the picture ("Is the fruit in the plate different from the one in the basket?"). Another group of approaches builds architectures with a perceiver and an evaluator [5]. The perceiver receives the image as input and has to build the knowledge base relative to the input. The evaluator, executes the question against the knowledge base to produce an answer. The disadvantage of such approaches is that the computations performed by the different parts of the system are of very different nature, leading to cumbersome architectures that are complex to train in an end-to-end fashion. The main contribution of this work is to show that, at least in the simple case we propose, it is possible to build an architecture where the evaluator performs computations of the same kind as the perceiver. It is for this reason that the architecture can be easily trained in an end-to-end fashion. In particular 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. Figure 1: Some images in the dataset in our architecture we will exploit the properties of hyper-dimensional computing (HD-computing) [4]. It is well known in fact that, by defining vectors in a high-dimensional space (HD-vectors), it is possible to store and then retrieve information from these vectors with very simple operations [4]. We will use HD-vectors to store the values of logical constants, and also the values of relations among these constants that will constitute the knowledge base of the system. In our architecture a FFW network will be asked to associate to each image in the input the HD-vector describing the image. The HD-vector returned as output can then be queried to extract answers to given questions, with such questions consisting in sets of differentiable operations on the HD-vectors. The parameters of the network will be updated with a gradient descent procedure in order to minimize the number of wrong answers. In the present paper we prove that this architecture can be successfully trained on a simple VQA task. The paper is organized as follows, in section 2 we present the dataset, in 3 we show how it is possible to encode the knowledge base in an HD-vector and then to retrieve information from it. Finally in section 4 we describe the training procedure and comment on the results of the tests. 2 Dataset The dataset is composed of 28x28 RGB images. In each image there are two geometrical figures of four possible colors. The geometrical figures can be in four different positions in the image, namely top-left, top-right, bottom-left, bottom-right. The colors and shapes used are the following: • colors: red, green, magenta, orange; • shapes: circle, square, triangle, cross. All possible images containing two figures were created. A sample of the images in the dataset is presented in Figure 1. The number of total images was 3072. 30% of these images were used as test set, and the rest of the images were used as training set. 3 HD representation of the knowledge base Each picture in the dataset can be described in terms of the following set of natural language concepts: "position", "color", "shape", "top-left", "top-right", "bottom-left", "bottom-right", "red", "green", "magenta", "orange", "circle", "square", "triangle", "cross". For example the first picture of Figure 1 can be described by the following sentence: "In position top-left there is a shape of type square and color magenta; and in position top-right there is a shape of type square and color green". In the following we show how by using a method known as HD-computing, it is possible to store and retrieve the information contained in this sentence in one vector [3, 6]. We will take the HD-vectors to be 1000 dimensional vectors where each component is randomly 2 chosen to be 1 or -1. We will label HD-vectors using letters in italics, like k, m, n. Let’s define two operations over the HD-vectors: entangle and grouping. Entangle is defined as follows: ⊗: k =m⊗n ⇔ ki = XOR(mi , ni ) ∀i ∈ {1, . . . , 1000} (1) −1 Please notice that XOR = (XOR) , so we will sometimes refer to the previous operation also as dis-entangle. Grouping is defined as follows: ⊕: k =m⊕n ⇔ ki = m i + ni ∀i ∈ {1, . . . , 1000} (2) Also it will be useful to define a distance between two vectors. We choose as distance the following function: P (mi · ni ) (3) cos(m, n) = p P i 2 P ( i mi ) · ( i n2i ) We associate each of the concepts listed in the previous paragraph with a random HD-vector. The HD-vector representing a concept will have the same name as the concept but it will be written in italics. So for example to the concept "color" will correspond the HD-vector color. To each image in the dataset we can associate an HD-vector in the following way that we will illustrate with an example. Consider the first picture in Figure 1. The natural language description of the picture is the following: "In the position top-left there is a shape of type square and color magenta. And in the position top-right there is a shape of type square and color green". To such a description we will associate the following HD-vector: m = top−lef t ⊗ (shape ⊗ square ⊕ color ⊗ magenta) ⊕ top−right ⊗ (shape ⊗ square ⊕ color ⊗ green) (4) It can be shown that the information stored in the vector m can be retrieved. For example to retrieve the information about the shape in position "top-left" we can dis-entangle the vector m with the vector top−lef t and then with the vector shape. The resulting vector will be much closer to the vector square than to any of the other three vectors: triangle, circle and cross. Following the previous example we associated to each image I j in the dataset an HD-vector mj , building the following dataset: D = {I j , mj }3072 (5) j=1 3.1 Querying the knowledge base The vectors mj just defined contain information about the pictures and can be queried to retrieve some of the properties of the picture. Querying an HD-vector consists in applying a set of operations in a specific sequence. In the following we will present the queries we used to train our architecture. The queries will be presented at first in natural language followed by the corresponding set of operations in the space of HD-vectors. To do so let’s first define the set Positions: P ositions = {top−lef t, top−right, bottom−lef t, bottom−right} In the following the questions. Question 1: "Is there a circle in the picture?" X cos(circle , shape ⊗ pos ⊗ m) > 0.5, (6) pos ∈ P ositions. (7) pos ∈ P ositions. (8) pos Question 2: "Is there the color green?" X cos(green , color ⊗ pos ⊗ m) > 0.5, pos Question 3: "Is there a magenta triangle?" X cos(magenta , color⊗pos⊗m)·cos(triangle , shape⊗pos⊗m) > 0.25, pos ∈ P ositions. pos (9) Question 4: "Is there a square in the bottom-left?": cos(square , shape ⊗ bottom−lef t ⊗ m) > 0.5. 3 (10) Question 5: "Is the shape in position top-left the same as the one in top-right?": cos( shape ⊗ top−lef t ⊗ m, shape ⊗ top−right ⊗ m) > 0.5. (11) Each of the previous questions has a positive or a negative answer for each of the pictures in the dataset. So to each picture I j we will associate five numbers, namely q1j , q2j , q3j , q4j , q5j . The number q1j will be equal to 1 if the answer of Question 1 for the j−th picture is true, otherwise qj1 will be 0. We will use these values during the training of the network as target values. So let’s add these values to the dataset D previously defined: D = {I j , mj , q1j , q2j , q3j , q4j , q5j }3072 (12) j=1 4 Training and Testing We trained a FFW network with two hidden layers of 200 rectified linear units each. The network was asked to return as output the HD-vector describing the picture. For this reason the output of the network was a layer of 1000 nodes with hyperbolic tangent as activation function. The network was trained in order to associate to each input image an HD-vector such that when the vector was queried, it returned the correct information about the image. For this reason the error function that we minimized during the training was composed of a term for each of the questions. In particular for each equation ( 7, 8, 9, 10, 11 ) we took the left side of the equation and computed its value for each image in the dataset by substituting in the equation the term m with the output of the network net(I j ) (here net is the function implemented by the network). The result of the computation was forced to be closer to 1 if the answer to the question for the picture I j was true, otherwise the result of the computation was forced to be closer to 0. Let’s consider for example Question 1 and its equation (eq. 7). Here we defined the error term E1 as: !2 X X  j j E1 = cos circle , shape ⊗ pos ⊗ net(I ) − q1 (13) j pos In the same way we defined an error term for each of the questions in the previous paragraph. We called E2 , E3 , E4 , E5 the error terms relative to Question 2, Question 3, Question 4 and Question 5. The error function that we minimized during the training was the following sum: 5 X E= Ei (14) i=1 We developed two kinds of test for the network. In a first test the network was asked to answer the questions used during the training, but on new data. In the second test the network was asked to answer new questions that were not used in the training. In the first test the network was tested on 30% of the dataset, on data that were not used during the training. For each example in the test set we evaluated the answer to each of the questions by substituting the output of the net net(I j ) with the vector m in the equation representing the question, assuming the answer to be true if the inequality was respected, false otherwise. The network reached an accuracy of 100% on all the questions. On the second experiment we tested the network on new questions. In particular we asked questions similar to question 7, but relative to the three other shapes: "square", "triangle" and "cross". In these cases we obtained accuracy values of 72%, 69% and 60%. Interestingly the worst performance was obtained on the "cross" shape, which was the shape that was never used in any of the questions in the training. 5 Conclusions In this paper we presented an architecture for VQA that uses HD-computing to encode the knowledge base and evaluating a query against it. This choice makes the system easy to train in an end-to-end fashion. The system proved to work very well and to generalize well on a simple task. Further experiments are needed to test the architecture on more challenging and natural benchmarks. Acknowledgments This work was funded by ERC Advanced Grant Number 323674 “FEEL” and ERC Proof of Concept Grant Number 692765 "FeelSpeech". 4 References [1] Stanislaw Antol, Aishwarya Agrawal, Jiasen Lu, Margaret Mitchell, Dhruv Batra, C Lawrence Zitnick, and Devi Parikh. Vqa: Visual question answering. In Proceedings of the IEEE International Conference on Computer Vision, pages 2425–2433, 2015. [2] Haoyuan Gao, Junhua Mao, Jie Zhou, Zhiheng Huang, Lei Wang, and Wei Xu. Are you talking to a machine? dataset and methods for multilingual image question. In Advances in Neural Information Processing Systems, pages 2296–2304, 2015. [3] Aditya Joshi, Johan Halseth, and Pentti Kanerva. Language recognition using random indexing. arXiv preprint arXiv:1412.7026, 2014. [4] Pentti Kanerva. Hyperdimensional computing: An introduction to computing in distributed representation with high-dimensional random vectors. Cognitive Computation, 1(2):139–159, 2009. [5] Jayant Krishnamurthy and Thomas Kollar. Jointly learning to parse and perceive: Connecting natural language to the physical world. Transactions of the Association for Computational Linguistics, 1:193–206, 2013. [6] Abbas Rahimi, Pentti Kanerva, and Jan M. Rabaey. A robust and energy-efficient classifier using brain-inspired hyperdimensional computing. In Proceedings of the 2016 International Symposium on Low Power Electronics and Design. ACM, 2016. [7] Mengye Ren, Ryan Kiros, and Richard Zemel. Image question answering: A visual semantic embedding model and a new dataset. Proc. Advances in Neural Inf. Process. Syst, 1(2):5, 2015. [8] Licheng Yu, Eunbyung Park, Alexander C Berg, and Tamara L Berg. Visual madlibs: Fill in the blank description generation and question answering. In Proceedings of the IEEE International Conference on Computer Vision, pages 2461–2469, 2015. 5
9cs.NE
Imperial College London arXiv:1502.06096v1 [cs.NE] 21 Feb 2015 Department of Computing Reinforcement Learning in a Neurally Controlled Robot Using Dopamine Modulated STDP by Richard Evans Submitted in partial fulfilment of the requirements for the MSc Degree in Advanced Computing of Imperial College London September 2012 Contents 1 Introduction 1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2 Project Aims . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 Thesis Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Background 2.1 Neurons . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Biological Neurons . . . . . . . . . . . . . . . . . 2.1.2 Hodgkin-Huxley Model . . . . . . . . . . . . . . 2.1.3 Izhikevich Model . . . . . . . . . . . . . . . . . . 2.2 Models of Neural Networks . . . . . . . . . . . . . . . . 2.2.1 Artificial Neural Networks . . . . . . . . . . . . . 2.2.2 Spiking Neural Networks . . . . . . . . . . . . . 2.3 Reinforcement Learning in Machine Learning . . . . . . 2.3.1 Markov Algorithm’s . . . . . . . . . . . . . . . . 2.3.2 Eligibility Traces . . . . . . . . . . . . . . . . . . 2.3.3 Continuous Parameter Spaces . . . . . . . . . . . 2.4 Reinforcement Learning in the Brain . . . . . . . . . . . 2.4.1 BCM Theory . . . . . . . . . . . . . . . . . . . . 2.4.2 Spike-timing Dependent Plasticity . . . . . . . . 2.4.3 Dopamine Modulated STDP . . . . . . . . . . . 2.4.4 Time-Based DA-modulated STDP . . . . . . . . 2.4.5 Plasticity and Stability . . . . . . . . . . . . . . 2.5 Neural encoding . . . . . . . . . . . . . . . . . . . . . . 2.6 Taxis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.7 Spiking Neural Network Controlled Robots . . . . . . . 2.7.1 Robot Training using Genetic Algorithm’s . . . . 2.7.2 Robot Training using STDP . . . . . . . . . . . . 2.7.3 Robot Training using Reward Modulated STDP . . . . . . . . . . . . . . . . . . . . . . . 3 Methodology 3.1 Environment . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Robot and Sensors . . . . . . . . . . . . . . . . . . . . . . 3.3 Neural Model . . . . . . . . . . . . . . . . . . . . . . . . . 3.3.1 Numerical Approximation . . . . . . . . . . . . . . 3.4 Phasic Activity . . . . . . . . . . . . . . . . . . . . . . . . 3.5 Sensorimotor Encoding . . . . . . . . . . . . . . . . . . . . 3.5.1 Sensor to Neuron Encoding . . . . . . . . . . . . . 3.5.2 Motor Velocity Calculation . . . . . . . . . . . . . 3.6 Network Architecture . . . . . . . . . . . . . . . . . . . . 3.7 Plasticity . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.8 Moving Dopamine Response from Unconditioned-Stimulus 3.9 Network Stability . . . . . . . . . . . . . . . . . . . . . . . 3.10 Taxis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.11 Exploration . . . . . . . . . . . . . . . . . . . . . . . . . . i . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . to Conditioned . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2 2 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4 4 5 5 6 6 7 7 7 9 9 10 10 10 11 14 14 15 15 16 16 16 16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Stimulus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 18 20 22 22 22 23 23 23 23 25 27 29 30 32 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Results and Discussion 4.1 Orbiting Behaviour . . . . . . . . . . . . . . 4.1.1 Experimental Set-up . . . . . . . . . 4.1.2 Results and Discussion . . . . . . . . 4.2 Food Attraction Learning . . . . . . . . . . 4.2.1 Experimental Set-up . . . . . . . . . 4.2.2 Results and Discussion . . . . . . . . 4.3 Food-Poison Plasticity Learning . . . . . . . 4.3.1 Experimental Set-up . . . . . . . . . 4.3.2 Results and Discussion . . . . . . . . 4.4 Dopamine Response to Secondary Stimulus. 4.4.1 Experimental Set-up . . . . . . . . . 4.4.2 Results and Discussion . . . . . . . . 4.5 Secondary Behaviour Learning . . . . . . . 4.5.1 Experimental Set-up . . . . . . . . . 4.5.2 Results and Discussion . . . . . . . . 4.6 Dual Behaviour Learning . . . . . . . . . . 4.6.1 Experimental Set-up . . . . . . . . . 4.6.2 Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 33 33 34 38 38 38 42 42 42 45 45 46 48 48 49 52 52 52 5 Conclusions 55 5.1 Reinforcement Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 5.2 Biological Plausibility and Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55 6 Future Work 57 ii Abstract Recent work has shown that dopamine-modulated STDP can solve many of the issues associated with reinforcement learning, such as the distal reward problem. Spiking neural networks provide a useful technique in implementing reinforcement learning in an embodied context as they can deal with continuous parameter spaces and as such are better at generalizing the correct behaviour to perform in a given context. In this project we implement a version of DA-modulated STDP in an embodied robot on a food foraging task. Through simulated dopaminergic neurons we show how the robot is able to learn a sequence of behaviours in order to achieve a food reward. In tests the robot was able to learn food-attraction behaviour, and subsequently unlearn this behaviour when the environment changed, in all 50 trials. Moreover we show that the robot is able to operate in an environment whereby the optimal behaviour changes rapidly and so the agent must constantly relearn. In a more complex environment, consisting of food-containers, the robot was able to learn food-container attraction in 95% of trials, despite the large temporal distance between the correct behaviour and the reward. This is achieved by shifting the dopamine response from the primary stimulus (food) to the secondary stimulus (food-container). Our work provides insights into the reasons behind some observed biological phenomena, such as the bursting behaviour observed in dopaminergic neurons. As well as demonstrating how spiking neural network controlled robots are able to solve a range of reinforcement learning tasks. Acknowledgements I would like to thank my supervisor Prof. Murray Shanahan. Whose support and guidance helped greatly in allowing me to conduct research into neural robotics. 1 Chapter 1 Introduction 1.1 Motivation The ability of a robot to operate autonomously is a highly desirable characteristic and has applications in a wide range of areas, such as space exploration, self-driving cars, cleaning robot and assistive robotics. Looking at the animal kingdom, a key property that a large variety of animals possess is that they are able to learn which behaviours to perform in order to receive a reward or avoid unpleasant situations, for example in foraging for food or avoiding prey. This is also a useful property for robots to have, where we want the robots to achieve some goal but the exact sequence of behaviours needed to achieve this goal may be highly complex or change over time. This learning paradigm is known as reinforcement learning and has been researched in the context of machine learning for many years. Despite this, even simple animals are able to outperform robots in the vast majority of real world reinforcement learning problems. In recent times some of the underlying neural processes by which the brain can solve these reinforcement learning tasks has started to be revealed. Changes in connection strength between neurons has long been thought to be the key process by which animals are able to learn. A key process that is believed to control how the connection weights are modified is that of dopamine-modulated spike timing dependent plasticity (DA-modulated STDP) [1]. Using spiking neural networks, that implement these models of learning and plasticity, to control robots has two main advantages. Firstly, it is hoped that these neurally inspired control algorithms will, at least in some domains, be able to outperform their classical machine learning counterparts. This is due to the vast arrays of problems that real brains can deal with and their implicit ability to deal with continuous environmental domains. Secondly, by implementing the current models of neurological learning in an embodied context we can gain greater insight into the range of behaviour that can be explained by these models, and also where these models fail. 1.2 Project Aims In this project we will attempt to solve a reinforcement learning task of food foraging and poison avoidance using a robot controlled with a spiking neural network. By incorporating several aspects of the brain that have been observed we aim to show how a robot can learn attraction and avoidance behaviours in a dynamic environment. By designing an environment that requires a sequence of behaviours before food is reached we aim to show that the robot can learn by propagating the reward signal (dopamine) to reward-predicting stimulus. In this way we aim to show how a robot is able to learn sequences of behaviour over larger time-scales than have previously been demonstrated. This work builds on the models of Izhikevich [1] and others in providing the neurological models that will be used to control the robot. The use of these models to control a robot in a foraging/avoidance task is based on the work of Chorley & Seth [2]. We aim to show that through several key extensions, such as incorporating the dopamine signal into the network directly, as well as using a more generic network architecture, our robot is able to deal with a much wider variety of problems, learn over longer time-scales and learn sequences of behaviour that previous implementations wouldn’t have been able to learn. These are vital properties for an agent interacting in the real world and a key step towards a fully autonomous agent that can deal with the wide variety of problems scenarios that the real world provides. The mechanisms of plasticity and stability play a key role in many properties of the brain, such as learning, memory and attention. Through implementing a neurally inspired system that incorporates many of the current neural models we aim to show how well these models are able to explain some of the learning behaviours that are seen in the animal world. 2 1.3 Thesis Outline The remainder of this report is structured into five chapters. In chapter 2 we review current research and relevant literature in the context of reinforcement learning in neurally controlled robots. Chapter 3 presents the techniques, models and methodology that was used in this project. The architecture of the robot, set-up of the environment and the spiking neural network control architecture is discussed. The results of evaluating our robot in a wide range of scenarios is discussed in chapter 4, along with a discussion of which properties of the robot allow it to achieve these results. In chapter 5 we relate the results to the wider context of reinforcement learning and neurological models and discuss their implications. Finally in chapter 6 we present possible future work, based on the results of this paper. 3 Chapter 2 Background 2.1 Neurons The underlying biological structure of neurons, and models that have been used to simulate them, are discussed in this section. 2.1.1 Biological Neurons The brain consists of a vast connected network of neurons. These neurons can be further subdivided into different types, however the general architecture is the same in almost all neurons. Figure 2.1 shows the basic structure of a typical neuron. Within the neuron communication takes place via the electrical properties of Dendrites Cell Body (Soma) Axon Myelin Sheath Axon Hillock Axon Terminal Synapse Nucleus Figure 2.1: The structure of a neuron. the cell, figure 2.2 shows the membrane potential of a neuron plotted over time whilst receiving a constant input current. In its resting state the membrane potential of the interior of a neuron sits at approximately -70mV. Each neuron receives inputs from several other neurons via its dendrites. When one of these presynaptic neurons fires it has the effect of raising or lowering the membrane potential of the post-synaptic neuron. Once the membrane potential at the axon hillock (see figure 2.1) reaches a critical threshold, voltage gated ion channels open along the axon which causes the neuron to rapidly depolarize. This is referred to as the neuron spiking or firing. After this wave of depolarization reaches the axon terminal it is converted to a chemical signal that is passed across the synapse to the next neuron. Once this depolarization reaches a critical threshold a second voltage gated ion channel is opened which causes the neuron to rapidly repolarize before returning to its resting potential. This repolarization overshoots the resting potential causing hyperpolarization. After firing the neuron enters a refractory period during which it cannot fire. The two main types of neurons that will be used in this paper are excitatory and inhibitory neurons. Excitatory neurons have the effect of raising the membrane potential of the post-synaptic neuron, as such increasing its likelihood of firing. Whereas inhibitory neurons have the effect of decreasing the membrane potential of the post-synaptic neuron, decreasing its likelihood of firing. 4 Membrane Potential of a Single Neuron Over Time 30 20 Membrane Potential (mV) 10 0 −10 −20 −30 −40 −50 Firing Threshold −60 Resting Potential −70 Hyperpolarization 80 90 100 110 120 130 140 150 160 170 180 Time (ms) Figure 2.2: The membrane potential of a neuron receiving constant input current plotted over time. The synapse between neurons has an associated weight or strength. This is the degree to which the post-synaptic membrane potential is raised or lowered following a pre-synaptic spike. The mechanisms by which neurons communicate have several useful properties. Firstly, communication within the cell is fast, via the use of voltage gated ion channels. Secondly, by communicating in an all or nothing fashion to the post-synaptic cell, the network of neurons is able to represent highly complex non-linear functions. Research has shown that spiking neural networks can represent any real-valued function to within a specified degree of accuracy [3]. 2.1.2 Hodgkin-Huxley Model In 1952 Hodgkin and Huxley developed an accurate model of the membrane potential of a neuron [4] based on modelling the ion channels within the neuron. The equation is defined as: C X dv =− Ik + I dt (2.1) k where C = The capacitance of the neuron, v = The membrane potential of the neuron, Ik = The various ionic currents that pass through the cell, I = The external current coming from pre-synaptic neurons, t = Time. The ionic currents are modelled using further differential equations, the details of which are not included here but a full definition can be found in Hodgkin & Huxley [4]. The Hodgkin-Huxley equation is very biologically accurate, however it incurs a heavy computational cost and as such is infeasible in most practical situations. 2.1.3 Izhikevich Model Several attempts [5, 6, 7] have been made to formulate a model that provides a good compromise between biological accuracy and computational feasibility. One of the best models in terms of computational efficiency and biological accuracy was formulated by Izhikevich [8]. In the Izhikevich model the membrane potential 5 is modelled as: dv = 0.04v 2 + 5v + 140 − u + I (2.2) dt Where v is the membrane potential and u is the recovery variable that determines the refractory period of the neuron and is modelled as: du = a(bv − u) (2.3) dt Where a and b are parameters of the model. When a spike occurs the membrane potential is reset and the recovery variable is incremented, formally:  v←c if v ≥ 30 then (2.4) u←u+d The four variables a,b,c and d have been shown to be able to create neurons that have a wide variety of behaviours. Figure 2.3 summarizes some of the neuronal types that can be modelled by varying these parameters. peak 30 mV cay with r ate a FS RS,IB,CH 0.2 8 parameter d reset d de parameter b reset c v(t) RZ LTS,TC 0.25 sensitivity b regular spiking (RS) 0 0.02 0.1 IB 4 2 0.05 u(t) RS FS,LTS,RZ -65 parameter a CH TC -55 -50 parameter c intrinsically bursting (IB) chattering (CH) fast spiking (FS) thalamo-cortical (TC) resonator (RZ) low-threshold spiking (LTS) v(t) I(t) thalamo-cortical (TC) 20 mV 40 ms -63 mV -87 mV Figure 2.3: An overview of some types of neurons that can be modelled with the Izhikevich model1 . 2.2 Models of Neural Networks In this section the different approaches that have been used to model networks of connected neurons are discussed. 2.2.1 Artificial Neural Networks The first computational model of a neural network that was developed was the artificial neural network (ANN). The ANN consists of a set of processing units, or neurons. Each neuron computes the weighted sum of its inbound connections, which may be other neurons or external inputs. This value is then passed through an activation function, the result of which is then passed to the next set of neurons or as an output of the system. The most common activation function that is used is the sigmoid function as this provides a differentiable approximation to the all or nothing processing that is used in real neurons. Figure 2.4 shows the model of a single neuron in an ANN. 1 Electronic version of the figure and reproduction permissions are freely available at www.izhikevich.com 6 inputs x1 weights w1j x2 w2j x3 w3j Σ φ oj output transfer function ... ... xn activation function wnj Figure 2.4: A perceptron that computes the weighted sum over the inputs x with weights w, then passes this value through the activation function to produce a binary output. Initially these ANN’s consisted of a single layer of neurons [9, 10]. These ANN’s, known as perceptrons, are limited in that they can only represent linear functions of their inputs. For example in a classification task, the data must be linearly separable for a single layer network to be able to classify all data correctly. To combat these problems a multilayer perceptron was introduced [11], where outputs from previous layers serve as inputs to the next layer. The development of an efficient training algorithm for the multilayer perceptron, known as back-propagation, which updates the weights of the network to minimize the squared error on a set of training examples has allowed ANN’s to be used in a wide variety of fields. The biggest limiting factor in artificial neural networks, especially as a model of the brain, is that they can’t process information encoded in the time domain. 2.2.2 Spiking Neural Networks A more realistic model of biological neural networks was developed with spiking neural networks (SNN). These have the advantage of being able to process temporally distributed data, as well as having a large memory capacity. Unlike ANN’s, which are commonly directed acyclic graphs, SNN’s are more amenable to networks with cycles in them. These cycles allow spiking neural networks to have a form of working memory. The individual neurons in a spiking neural network can be modelled in a variety of ways, several of these models were outlined in section 2.1. Some methods by which SNN’s can be trained are outlined in section 2.4. 2.3 Reinforcement Learning in Machine Learning Reinforcement learning is the process by which an agent can automatically learn the correct behaviour in order to maximize its performance. Reinforcement learning is an important learning paradigm for a robot that interacts with the real world, in this scenario the robot is often not explicitly told what the correct action is in a given environment state, it must be inferred from rewards or punishments that are received after an action is performed. In the standard reinforcement learning set-up the agent is given a reward when it performs an action or is in a specific state, and it seeks to maximize this reward over time. Sutton & Barto give a good history of reinforcement learning algorithms [12], the key approaches relevant to this paper are outlined below. 2.3.1 Markov Algorithm’s The majority of work on reinforcement learning have modelled the problem as a Markov decision process. The agent can visit a finite number of states, in each state the agent can perform a finite number of actions that transform the environment into a new state. The state that is reached after performing an action only depends on the previous state, and the action. This agent-environment interaction is shown in figure 2.5. An agent’s policy π is defined as the probability of choosing an action in a given state: π(s, a) = p(a|s, π). An important function in reinforcement learning is the Q-function, this gives the expected future reward given a state and action, defined as: Qπ (s, a) = E[ ∞ X γ k rt+k+1 |π, st = s, at = a] k=0 7 (2.5) Agent state st reward rt rt+1 st+1 action at Environment Figure 2.5: The agent-environment interaction. Given a state st and reward rt at time t the agent must decide which action at to perform. This action will update the state st+1 and result in a further reward rt+1 . Figure from Sutton & Barto [12]. Where γ determines the importance we place on rewards that are closer in time than ones that are more distant. If we know the Q-function then the optimal policy becomes trivial, we pick the action with highest expected reward. Most RL algorithms are concerned with finding the value of the Q-function. An underlying feature of most RL algorithms is the concept of temporal difference (TD) learning. Where the difference between the predicted reward and received reward is used to update the agents policy. RL algorithms are divided into off-line and on-line learning. Off-line algorithms assume that a series of states and actions generated as in figure 2.5 will eventually reach a terminating state. Learning is only performed once this terminating state is reached. On-line algorithms, however, aim to continuously update the agents estimate of the Q-function as the agent explores the environment. On-line algorithms provide the advantage of not having to wait until the end of an episode to incorporate new information and, as is the case in this paper, an agent interacting in the real world will not always have a clearly defined termination condition that causes an episode to end. Within the set of on-line RL algorithms there is a further distinction between on-policy and off-policy algorithms. On-policy algorithms attempt to learn the optimal Q-function and policy, whilst simultaneously following their own estimate of the optimal policy. Note that the agents estimate of the optimal policy is likely to be different to the actual optimal policy, as such this method can get stuck in local minima and not converge to the optimum policy. Off-policy algorithms on the other hand attempt to learn the optimal policy whilst not necessarily following it, choosing actions with a probability related to their expected reward. This has the advantage that the agent can further explore the state space, however this comes at the cost of a possible reduced reward compared to the on-policy methods, due to the exploration of sub-optimal states. In this paper we will demonstrate a mechanism by which off-policy learning can be achieved using spiking neural networks. The best known on-line algorithm is Sarsa, the outline of which is given in Algorithm 1. The key step is that the observed reward r and the predicted Q-value at the next time step are used to estimate the correct Q-value: r + γQ(s0 , a0 ). This is compared against the predicted Q-value, Q(s, a), to give a prediction error which can be used to update the estimate of Q(s, a). Algorithm 1 Sarsa Initialize Q(s, a) arbitrarily Repeat (for each episode) Initialize s Choose a from s using policy derived from Q Repeat (for each step of episode): Take action a, observe r, s0 Choose a0 from s0 using policy derived from Q Q(s, a) ← Q(s, a) + α[r + γQ(s0 , a0 ) − Q(s, a)] s ← s0 ; a ← a0 ; until s is terminal The best known algorithm for off-line learning is Q-learning, the pseudocode for which is given in Algorithm 2. The key difference is that the algorithm takes the maximum Q-value in the next state, over all actions. 8 Algorithm 2 Q-Learning Initialize Q(s, a) arbitrarily Repeat (for each episode) Initialize s Choose a from s using policy derived from Q with exploration Repeat (for each step of episode): Take action a, observe r, s0 Q(s, a) ← Q(s, a) + α[r + γmaxa0 Q(s0 , a0 ) − Q(s, a)] s ← s0 until s is terminal 2.3.2 Eligibility Traces Both the Q-Learning and Sarsa algorithm as described only have one state of lookahead. They only look at the reward at the next time step when updating the Q-function. Due to this we often have to revisit a state many times before the algorithm will converge. We encounter further problems if we relax the Markov property, for example if the reward received for an action is not received until several states later. In this case it can be shown that the algorithms above may fail to converge to the correct Q-function. What we would like to be able to do is incorporate the reward from all future states in our update function. This is accomplished by introducing the concept of an eligibility trace. The eligibility trace for a state keeps a weighted track of visits to that state, in this way we can update previously visited states when we receive a new reward, the concept of the eligibility trace becomes important when discussing the dynamics of the reinforcement learning in the brain, and in our implementation of DA-modulated STDP. Figure 2.6 demonstrates how the eligibility trace changes over time, as the state is repeatedly visited. Time Figure 2.6: The eligibility trace for a state over time, as it is repeatedly visited. We can incorporate the eligibility trace into the Sarsa algorithm (referred to as Sarsa(λ)), if we define e(s, a) as the eligibility trace for the state s and action a then the Q-function update becomes: Q(s, a) ← Q(s, a) + αe(s, a)[r + γQ(s0 , a0 ) − Q(s, a)] (2.6) Where α is the step size; the amount that we update the Q values by, at each time step. γ determines the importance we place on more recent rewards over future rewards. Q(s0 , a0 ) is the Q value for the next state and action. Note that this update is applied to all states and actions, unlike in the previous algorithm where it was restricted only to the current state-action pair. The full Sarsa(λ) procedure is outlined in Algorithm 3. 2.3.3 Continuous Parameter Spaces So far our discussion has been limited to reinforcement learning in discrete state and action spaces. The simplest way of applying RL to a continuous state space is simply to divide the continuous space up such that it becomes a discrete one. However there are two main issues with this, firstly we may end up with a very large parameter space, especially if we wish to have a fine grained representation of the continuous parameter space. This will mean that the RL algorithm will take a long time to converge on the optimal solution as the probability of visiting each state will be low. The second issue is that we lose the ability to generalize, it often the case that knowing the expected future reward for a particular state will tell us something about the expected reward for nearby states. In the continuous case the Q-function becomes a continuous valued function over s and a. If we treat each update from the discrete RL algorithm as an example input-output of this function. Then our problem becomes one of generalizing from specific inputs. This is a standard machine learning problem, which can 9 Algorithm 3 Sarsa(λ) Initialize Q(s, a) arbitrarily and e(s, a) = 0, for all s,a Repeat (for each episode) Initialize s, a Repeat (for each step of episode): Take action a, observe r, s0 Choose a0 from s0 using policy derived from Q δ ← r + γQ(s0 , a0 ) − Q(s, a) e(s, a) ← e(s, a) + 1 For all s,a: Q(s, a) ← Q(s, a) + αδe(s, a) e(s, a) ← γλe(s, a) s ← s0 ; a ← a0 until s is terminal be solved through, among other things, neural networks, decision trees, genetic algorithms and gradient descent. Another method of performing reinforcement learning in a continuous parameter space is to use spiking neural networks, a full description of spiking neural networks was given in section 2.2.2. Spiking neural networks offer the advantage that, if constructed correctly, they can generalize to learn the correct action in a previously unseen state. Reinforcement learning was first investigated, and algorithms developed, before it was fully understood how the brain performed similar tasks. As will be shown in the following section the underlying processes used by the brain has many correlates with these reinforcement learning algorithms. In this paper we implement a spiking neural network version of reinforcement learning, how the underlying processes in our implementation compare to standard machine learning algorithms for reinforcement learning are discussed in section 5.1. 2.4 Reinforcement Learning in the Brain In recent times it has been shown that the brain implements a reinforcement learning system similar to the TD-Learning proposed by Sutton & Barto [12]. The mechanisms by which this happens are outlined below. 2.4.1 BCM Theory In 1981 Bienenstock, Cooper and Munro developed a model by which synapses can increase and decrease over time [13]. This slow increasing and decreasing of synaptic weights is known as long term potentiation (LTP) and long term depression (LTD) respectively. In BCM theory the amount that a synaptic weight changes is dependent on the product of the presynaptic firing rate and a non-linear function φ of the postsynaptic activity. For low post-synaptic firing rates φ is negative and for high post-synaptic firing rates φ is positive. The effect of this is that if the pre-synaptic neuron is causing a lot of firing in the post-synaptic neuron then the synapse will be potentiated. Some evidence for the BCM model has been seen in the brain, however it cannot account for synaptic potentiation based on spike timings, which has also been observed in the brain. 2.4.2 Spike-timing Dependent Plasticity The main mechanism through which the connections in the brain are modified over time is believed to be spike-timing dependent plasticity [14, 15]. The core concept is that neuron connection strength is increased when pre-synaptic activity is followed by post-synaptic activity, and weakened when post-synaptic activity is followed by pre-synaptic activity. The synaptic weight update rule under STDP is defined as: ( + A+ e−∆t/τ if ∆t ≥ 0 ∆w = (2.7) − ∆t/τ − −A e if ∆t < 0 Where ∆w is the weight update, ∆t is the time difference between the pre and post synaptic neurons firing and A+ ,A− ,τ + and τ − are constants that define how STDP is applied over time. These constants are normally chosen so that long term depression is favoured over long term potentiation to prevent uncontrollable growth of w. Figure 2.7 shows how ∆w changes with respect to ∆t, this shows the window over which STDP can act. Large values of ∆t will have negligible effect on ∆w. 10 ∆w ∆t Figure 2.7: Graph showing how the weight update ∆w relates to the ∆t = tpost − tpre parameter. There are two main update schemes that are followed when calculating the change in weight ∆w. In the all-to-all scheme all pre-synaptic and post-synaptic spikes within the STDP window are considered when updating the weight. In the nearest-neighbour scheme only the most recent pre or post synaptic spike is considered. In practice these methods are often equivalent, as the probability of multiple firings for a specific neuron within the STDP window is low. STDP can be thought of as an associative learning mechanism. If two inputs to the neural network are often presented together, and in sequence, then the connections from the first input to the second input will become strengthened. Experiments have provided evidence for both STDP and the BCM model in the brain. Therefore any model of synaptic weight modification will need to account for both these processes. Izhikevich [16] has shown that under the nearest-neighbour mechanism it is possible for the observed properties of the BCM model to be generated through STDP. As such it may be that the underlying mechanism for synaptic potentiation/depression in the brain is indeed STDP. 2.4.3 Dopamine Modulated STDP STDP alone cannot account for the ability of an animal to perform reinforcement learning as it has no concept of reward. It has been observed that dopamine can modulate synaptic plasticity when it is received within a 15-25s window [17]. Dopamine in the brain is modulated by way of dopaminergic neurons, these being neurons that use dopamine as their neurotransmitter. The majority (90%) of the dopaminergic neurons are contained in the ventral part of the mesencephalon [18]. Within this region the most important area is the ventral tegmental area (VTA) which is vital in the reward circuitry of the brain. Figure 2.8 shows the main dopamine pathways in the brain. The VTA has connections to the nucleus accumbens, which plays an important role in the perception of pleasure, as well as to the hippocampus which has been associated with planning complex behaviour, decision making and moderating social behaviour [19]. Whenever the VTA is stimulated it produces a burst of spiking activity which in turn raises the level of dopamine in the nucleus accumbens and the hippocampus. Striatum Frontal cortex Substantia nigra Nucleus accumbens VTA Hippocampus Figure 2.8: The main dopamine pathways in the human brain. 11 Dopaminergic neurons are characterized as having two different firing patterns. In the absence of any stimulus they exhibit a slow (1-8Hz) firing rate [20], this is known as background firing. When stimulated the dopaminergic neurons exhibit burst firing [21]. Burst firing is where neurons fire in very rapid bursts, followed by a period of inactivity. This behaviour is illustrated in figure 2.9. One important, especially in the context of this paper, aspect of burst firing is that for many central synapses bursts facilitate neural transmitter release whereas single spikes do not [22]. This means that stimulus induced firing of dopaminergic neurons will result in a spike in the level of dopamine, whereas background firing will not not have a significant effect on the level of dopamine. This is a useful property for Pavlovian learning and its implications are explored further in section 3.8. Membrane Potential Burst Spiking Behaviour of a Neuron Time Figure 2.9: An example of a neuron exhibiting bursting behaviour, the neuron fires in bursts followed by periods of inactivity. Matsumoto & Hikosaka [23] have recently shown, via experiments on monkeys, that the dopaminergic neurons do not function as a homogeneous group as previously thought. Some neurons exhibit a reward predicting behaviour, with increased firing when a reward is received, and a drop in activity for negative stimulus. However, other dopamine neurons have been found to exhibit an increased response for both a negative and a positive stimulus. The spatial location of these two groups is distinct and it is likely that they play different roles in learning in the different ways that they are connected to the rest of the brain, though this mechanism is not yet understood fully. In order for dopamine to be able to modulate synaptic plasticity over relatively large time-scales on the order of seconds it has been shown that synapses must have a form of synaptic tag that remembers the activity of the two neurons over a short time [24, 25]. The precise chemical process that underlies this synaptic tagging is not yet known. Research has shown [26] that this synaptic tag, and long term potentiation are dissociable. That is, the induction of synaptic potentiation creates the potential for a lasting change in synaptic efficacy, but does not commit to this change. This is exactly what is needed for reinforcement learning, in standard machine learning algorithms for reinforcement learning the eligibility trace itself does not modify the value function (estimate of reward for a given environment state), but it is modified through a combination of the eligibility trace and received reward. Izhikevich [1] has shown that dopamine modulated STDP can perform many aspects of reinforcement learning and can accurately model many of the features of learning observed in the brain. One of the key problems in reinforcement learning is that the receipt of a reward is often delayed after the action, or neural pattern, that caused the reward. This is known as the distal reward problem [27]. STDP as described above works over the millisecond time-scale and so another mechanism is needed to account for this distal reward problem. This is solved in DA modulated STDP by the inclusion of a variable that acts as a synaptic tag and has a direct correlation with the eligibility trace used in machine learning. This synaptic tag is incremented in proportion to the amount of STDP that would normally be applied at a synapse and then decays over time, it is defined as: ċ = −c/τc + ST DP (τ )δ(t − tpre/post ) (2.8) Where τc defines the decay rate of the eligibility trace, and hence the time-scale over which DA modulation can work. δ(t) is the Dirac delta function and has the effect of step increasing c when STDP takes place. The value of c over time looks very similar to the eligibility trace of machine learning as shown in figure 2.6. This variable is then used to modify the synaptic weight using: ṡ = cd (2.9) Where s is the synapse strength and d is the current level of dopamine. One important feature of this model is that it can deal with random firings in between the stimulus and the reward, this is due to the low 12 probability of randomly occurring coincident firings between the stimulus and reward. As such the eligibility trace maintains the record of the pre-post firing that we wish to strengthen. Figure 2.10 shows an example of how the network is able to respond to a delayed reward. 500 ms pre post rew ard (de l aye db y1 -3 sec ) extracellular dopamine, d(t) eligibility trace, c(t) synaptic strength, s(t) Figure 2.10: Figure from Izhikevich [1] showing how an eligibility trace can cope with a delayed reward. When the pre then post synaptic neurons coincidentally fire, a delayed reward is received in the form of a spike in dopamine d. This coincident firing increases the eligibility trace c, which slowly decays. It is still positive when the reward is received, and as such the synaptic strength s is increased. Using this model it has been shown that a network of neurons is able to correctly identify a conditioned stimulus embedded in a stream of equally salient stimuli, even when the reward is delayed enough such that several random stimuli occur in between the CS and the reward. After training, the learnt response shows up as an increased firing when the CS is presented compared with the other stimuli, as in figure 2.11. Figure 2.11: The response of a conditioned stimulus S1 after being subject to DA modulated STDP, as compared with several unconditioned stimulus. Figure reproduced from Izhikevich [1]. In Pavlovian conditioning [28] repeated pairing of a conditioned stimulus with a reward-producing unconditioned stimulus can move the response from the US to the CS. By the introduction of a set of dopamine releasing neurons similar to those in the ventral tegmental area in the brain, it was shown [1] that the DA modulated STDP model can exhibit this response shifting behaviour. The US was initially connected with maximum weights to the dopamine neurons, simulating an US. When a CS was repeatedly presented preceding this US there was an increase in the connections between the CS and the dopamine neurons, the dopamine response to the US stimulus was also reduced. This effect is similar to the effect observed in vivo in monkeys and rats [29]. A modified version of this DA-modulated STDP process is used in this paper to control a robot. The ability to move the dopamine response is an important property when multiple, sequential, behaviours need to be learnt before a reward is received. 13 The above model demonstrates the ability to model several features needed for reinforcement learning. However, the dopaminergic response to a stimulus does not correlate directly to the the difference between the expected reward and received reward that is crucial to classical machine learning RL algorithms. This should manifest itself as a negative (drop in neural activity) response when a reward is expected, but not received. This dip in neural activity has been observed in vivo [30]. As the model developed by Izhikevich [1] did not include any sort of working memory it did not produce this dip in activity. 2.4.4 Time-Based DA-modulated STDP Chorley & Seth [31] have incorporated the “dual-path” model [32, 33] into the DA modulated STDP model proposed by Izhikevich [1]. In the dual path model there are two pathways between a stimulus and dopaminergic neurons, an excitatory pathway and a time-dependent inhibitory pathway. The consequence of this is discussed in more depth, in the context of the new hybrid model, below. The new model accounts for several key features of DA responses observed in the brain, as well as being closer to the standard machine learning algorithms. These features, as defined by Chorley & Seth [31], are: • DA neurons display phasic activation in response to unexpected rewards [34, 35]. • These DA neurons display phasic responses to reliably reward-predicting stimuli, yet do not respond to stimuli which are themselves predicted by earlier stimuli [36]. • Reward-related DA responses reappear if a previously predictable reward occurs unexpectedly [36]. • DA neurons display a brief dip in activity at precisely the time of an expected reward, if that reward is omitted [30]. An overview of the network architect that was used is given in figure 2.12. The key feature that allows the network to display a dip in DA firing when a reward is expected, but not received, is that that the PFC has a basic working memory. This is implemented as a sequence of distinct neural firing patterns that occur in sequence after a stimulus is presented. This means that when an untrained stimulus (CS) is followed by a reward producing stimulus (US), the corresponding phasic release of DA will strengthen connections between the current PFC time-dependent firing pattern and the STR. Therefore the next time the CS is presented, and after the same time period, there will be an increase in firing in the STR and hence an increased inhibition of the DA cells. Figure 2.12: The network architecture used by Chorley & Seth [31], red lines represent excitatory connections and blue represent inhibitory connections. When neurons in the DA module fire then dopamine is released which causes STDP of the PFC→STR and SEN→INT pathways. The mean firing rate of the STR module is also modulated by the amount of dopamine. 2.4.5 Plasticity and Stability One of the problems with Hebbian learning through STDP is that it can cause runaway feedback loops. For example, if two neurons fire in sequence then their synaptic weight will be increased. This means that in future they are more likely to fire in sequence, and as such they are more likely to have their synaptic weight further increased. Without any kind of stability mechanism this process will quickly cause the weights to go towards infinity. One simple method that is often used [1, 31] is to restrict the range of values that the synaptic weights can take, for example limiting an excitatory synapse to the range 0-4mV. This prevents the 14 synaptic weight from becoming negative, and hence becoming an inhibitory synapse, whilst also preventing the synaptic weight increasing forever. This synaptic weight capping does not, however, prevent synapses from becoming quickly potentiated to their maximum allowable value. In the brain it has been shown that highly active neurons have their excitability decreased over time, and highly inactive neurons have their excitability level increased [37]. This is achieved by processes that modify the tonic level of Ca2+ within the neurons. This raises or lowers the membrane potential of the neuron, and hence increases or decreases the neurons excitability. It has also been shown that within populations of neurons a global mechanism for maintaining homeostatic plasticity is used [38]. This mechanism has the effect that if the firing rate of a population of neurons is increased then the strength of all synapses within the population is decreased, and equivalently if the firing rate decreases then the strength of all synapses is increased. A consequence of these homeostatic mechanisms is that they can foster competition between competing behaviours. For example, if a group of neurons has the possibility of representing two distinct behaviours and the neurons corresponding to behaviour 1 are highly active, whereas the neurons for behaviour 2 aren’t as active. Then, due to the high firing rate, all the synaptic weights will be reduced, which will have the result of further reducing the activity of behaviour 2. Since connected neurons with high firing rates will tend to increase their synaptic weights faster through STDP, the neurons corresponding to behaviour 1 will have their synaptic weights increased faster than behaviour 2. This process will continue until only the neurons corresponding to behaviour 1 are firing. 2.5 Neural encoding In the brain there needs to be a mechanism to convert external stimulus into a neural firing pattern, and to convert a neural firing pattern into an output of the network. There are three main neural encoding mechanisms that have been observed in the brain, these being rate coding, temporal coding and population coding. In rate coding the strength of the stimulus or output is encoded in the firing rate of a population of neurons. A stronger stimulus emits a faster firing rate, and equivalently a faster firing rate will result in a stronger output of the network, such as joint movement. This encoding mechanism was first observed by Adrian & Zotterman in 1926 [39]. Rate coding is useful when an increase in the value of a stimulus should result in a correlated increase in the response to the stimulus. Population coding involves the stimulation of different neurons for different values of the external stimulus. For example, the direction of movement of the eye could be represented by a network of 180 neurons with each neuron coding for a direction range of 2 degrees. In practice there is usually some overlap between the neural firing with a Gaussian distribution in firings being common, this allows a wider range of values to be represented as well as being more robust to noise. Population coding is used in various parts of the brain, for example in coding the direction of movement of an observed object [40]. Population coding has the advantage of being able to react to changes in the external stimulus faster than rate coding. In temporal coding the external stimulus is represented by the precise spike timings in a population of neurons, in this way a greater range of parameters can be represented by the same group of neurons than could be represented with rate coding [41]. In the context of learning taxis behaviour for a simple robot rate coding of sensor inputs/motor outputs is an appropriate mechanism as it allows the strength of response to an input stimulus to be correlated with the strength of the input stimulus to be learnt more easily. 2.6 Taxis In the animal world, one of the simplest forms of behaviour is that of taxis. Where taxis is defined as motion towards or away from a directed stimulus. Examples include phototaxis, movement directed by light, and chemotaxis, movement directed by a chemical gradient. This behaviour has advantages such as food foraging and poison avoidance. Through a series of thought experiments Braitenberg [42] showed how taxis behaviour, as well as more complex behaviours, could be implemented in a simple robot. The robots were endowed with two sensors and two motors, attraction behaviour can then be achieved through connecting the left sensor the right motor, and the right sensor to the left motor. Avoidance can be achieved through connecting the left sensor to the left motor and the right sensor to the right motor. A version of these simple Braitenberg vehicles will be used in this paper to demonstrate reinforcement learning. 15 2.7 Spiking Neural Network Controlled Robots A variety of research has been conducted into using SNN’s to control robots. Initially this was done by manually setting the weights of the network [43, 44]. For example Lewis et al. [44] used a very small network of 4 neurons to control an artificial leg. The complexity of SNN’s means that manually setting the synaptic weights is only feasible for very small networks. Various mechanisms for training the weights of a SNN have been used, these are outlined below. 2.7.1 Robot Training using Genetic Algorithm’s One such solution to the problem of determining the synaptic weights is to use genetic algorithms to determine the weights. Genetic algorithms learn the best solution to a problem by using a population of possible solutions. These possible solutions are then evaluated to give some measure of the fitness of each solution in solving the given problem. Highly fit solutions are then combined to create new individuals which are replaced with unfit solutions and the process is repeated. Hagras et al. [45] have used genetic algorithms to train a SNN controlled robot such that it exhibits wall following behaviour. Evolving SNN’s for robot control work well when the environment is mostly static and the optimal solution does not change over time. In this case the training can be done off-line in a simulated environment with a large number of robots. However in dynamic environments or where we are restricted to online learning with a single robot then GA’s do not perform as well. 2.7.2 Robot Training using STDP Another solution to determining the synaptic weights is to modify the weights over time using STDP as described in section 2.4.2. Bouganis & Shanahan [46] effectively used STDP to train a robotic arm to associate the direction of movement of the end effector with the corresponding motor commands. This was achieved by a training stage during which the motors were randomly stimulated along with the actual direction of movement of the end effector. STDP was able to modify the connection weights in the network such that if you subsequently stimulated the neurons corresponding to a desired end effector direction of movement, at a given position, then the arm would move in that direction. This is an effective method for learning associations, however it is limited in that it cannot cope with goal oriented tasks where an agent has to maximize some reward. It also requires that the action and response happen simultaneously, in many real world situations this is not the case. For example if we want the robot to reach out and touch an object there will be a delay between the initial movement, and the act of touching the object. 2.7.3 Robot Training using Reward Modulated STDP Several experiments have been conducted into training an SNN controlled robot using reward-modulated STDP. A common learning task used to demonstrate reinforcement learning is that of the Morris water maze. This learning paradigm consists of placing the agent (originally a rat) in a non-transparent liquid, in the environment there is a hidden submerged platform. The agent must find this platform in order to escape the unpleasant experience. When the experiment is run with a rat the platform is initially found by chance. But in subsequent runs the rat learns to navigate directly towards the platform. Vasilaki et al. [47] used a spiking neural network to control a robot in the Morris water maze task. The robot was able to learn to successfully learn to navigate directly towards the hidden platform when placed close to the platform. The level of reward was simulated as an external parameter that was artificially set when the platform was found. The robot only received a reward when it reached the platform, as such the robot was only able to learn the correct behaviour within a small radius around the hidden platform due to the eligibility trace decaying over larger distances. In this paper the level of reward will be embedded within the network and as such allow the robot to learn over a much larger time frame. In the context of learning taxis behaviour using reward modulated STDP Chorley & Seth [2] implemented a simple Braitenberg vehicle [42] that was able to learn to distinguish between two stimuli, one of which would elicit a reward. The experimental set-up of the robot is shown in figure 2.13. It is important to note that in the experimental set-up the robot is already wired for taxis attraction behaviour, with each sensor only being connected to the opposite motor. The learning phase consists of learning the strength of the taxis response to two different stimuli. The robot was able to learn to elicit a stronger taxis response to the reward-giving stimuli, and it was also able to change its behaviour when the reward was switched from one stimuli to another. Once again the level of reward was simulated as an external parameter rather than being embedded in the network itself. In this paper we will extend the work of Chorley in several key ways, these being: 16 Figure 2.13: The experimental set-up used by Chorley & Seth [2]. • In our implementation the robot will not be explicitly wired for attraction behaviour, the robot will have the ability to learn either attraction or avoidance behaviour. • By incorporating the level of dopamine into the network directly, we will aim to show how sequences of behaviour can be learnt. • Through the use of a form of hunger our implementation will be able to deal with situations in which there is no fixed optimal behaviour for an environment, and a dynamic set of behaviours must be learnt. 17 Chapter 3 Methodology In this paper a simple SNN controlled Braitenberg vehicle was simulated in environments consisting of food, poison and containers. The robot was subject to DA-modulated STDP and had to learn the correct behaviour to collect food items. The precise implementation details are outlined in this chapter. Due to the fact that robot and environment are simulated, all distances and sizes are relative and do not have a real world unit associated with them, by convention we will take the default unit to be centimetres. 3.1 Environment The learning task that was used to test reinforcement learning using spiking neural networks was that of food collection and poison avoidance in a simulated environment by a simple robot. There are four types of objects that can exist in the environment, these being: • Food - Food items are discs with a radius of 2.4cm, when a food item is collected it is replaced by another food item in a random location. • Poison - Poison is identical to food, except that it induces a negative dopamine response (see section 3.7). • Food Container - A food container is a disc with radius of 14cm which contains a single food item randomly located within it. Food items cannot be sensed from outside a food container, other containers cannot be sensed from within a container. • Empty Container - This is identical to a food container except that is does not contain any food items, as well as being sensed differently by the robot (see section 3.2). The environment has no walls, and has the characteristic of a torus. That is, if the robot moves over the right edge of the environment it will reappear at the left of the environment and the same for the top and bottom ’edges’ of the environment. In this way the robot does not have to deal with collision avoidance. There are two main variations in the environment. In the simplest case (figure 3.1(a)) the environment consists of randomly located food objects. Whenever the robot reaches an item of food the piece of food is moved to another random location within the environment. This environment set-up will be referred to as the food-only environment. In the second type of environment food is contained within containers (figure 3.1(b)). The food cannot be sensed until the robot is within a container, other containers cannot be sensed when the robot is within a container. This forces the robot to have to learn to turn towards food containers, something that does not directly give it a reward. When food is collected the food and container are moved to a random location in the environment. This environment will be referred to as the food-container environment. An extension to this environment includes empty containers which do not contain food items. 18 Food 100 90 80 70 60 50 40 30 20 10 10 20 30 40 50 60 70 80 90 100 Environment Wraps Around (a) Food-Only Environment 300 250 200 Food Container 150 100 Food 50 50 100 150 200 250 300 (b) Food-Container Environment Figure 3.1: (a) shows a 100cmx100cm environment containing randomly placed food. (b) shows a 300cmx300cm environment with food items that are positioned within containers. Food cannot be sensed from outside the container, other containers cannot be sensed when inside a container. 19 3.2 Robot and Sensors The robot consists of a circular body with two wheels positioned 1cm apart on either side of the robot. To ensure that the robot is always moving, the wheel motor velocities are restricted to the range 25cm/s 31.2cm/s. This gives the robot a minimum turning circle of radius 4.5cm. The robot is equipped with two types of sensor, range-sensors and touch-sensors. The range-sensors come in pairs, one left and one right, each covers a range of π/2 from directly in front of the robot to the left and right as in figure 3.2. Sensor Range Sensors 1cm Wheels Figure 3.2: Structure of the robot. The touch-sensors elicit an instantaneous response that lasts for 1ms whenever the robot comes into contact with the object for which they are sensitive. The response of the range-sensors is linear with the distance to the object. So an object directly in front of the robot will elicit a sensor response of one, whereas an object at the edge of the sensor’s range will produce a response of zero in the sensor. If there is more than one object in a sensor’s range then only the closest object is sensed. This prevents the robot being distracted by objects further away before responding to closer ones. A winner-takes-all mechanism was implemented between the two range-sensors. Such that if both sensors detect an object at any given time, then only the sensor with the strongest value elicits a response. This winner-takes-all mechanism is useful in situations where two food items are located at equal distances to the left and right of the robot, as illustrated in figure 3.3. Without a winner-takes-all mechanism both sensors will sense food items and as such the robot will increase its left motor velocity to turn right, it will also increase its right motor velocity to turn left. The effect of which will be that the robot drives straight between the two food items. It has been shown that a winner-takes-all mechanism is biologically plausible [48]. For simplicity this winner-takes-all mechanism was implemented in the sensors, an alternative implementation would be to implement it directly in the wiring of the robot’s neural network. Table 3.1 gives an overview of all the sensors that the robot can have. In the food-only environment the robot has two food range-sensors and a food touch-sensor. In some environments the food items are replaced with poison, to demonstrate the ability of the robot to modify its behaviour. In this case the same food range and touch sensors are used for sensing poison. In the environment with food containers the robot has an additional container range-sensor, this sensor reacts to both food-containers and empty-containers. It also has a food-container touch-sensor, this sensor only elicits a response when a food-container is entered (no response is elicited whilst the robot is inside the container). Equivalently it has an empty-container sensor, which only reacts to entering containers which don’t contain food items. This set-up is useful in demonstrating that the robot can differentiate between the reward predicting stimulus of the food-container touch-sensor, and the non-reward predicting stimulus of the empty-container touch-sensor. 20 Direction of Motion Food Figure 3.3: Without a winner-takes-all mechanism both sensors will respond equally and the robot will increase both left and right motor speeds, ultimately driving straight between the food items. Object Sensed Type Range Food/Poison Containers Food Food-Containers Empty-Containers Range Range Touch Touch Touch 30cm 60cm 0cm 0cm 0cm Available in FoodOnly Environment Yes No Yes No No Available in FoodContainer Environment Yes Yes Yes Yes Yes Table 3.1: The different types of sensor that the robot can have, and in which environment the robot is equipped with these sensors. 21 3.3 Neural Model The Izhikevich model was used to simulate the individual neurons. An overview of this model is given in section 2.1.3. The dynamics of the neuron are modelled by two differential equations: dv = 0.04v 2 + 5v + 140 − u + I dt (3.1) Where I is the inbound current from pre-synaptic spikes (weighted by the strength of the synapse), v is the membrane potential and u is the recovery variable that determines the refractory period of the neuron and is modelled as: du = a(bv − u) (3.2) dt The parameters of the model were set for excitatory neurons as: a = 0.2, b = 0.02, c = −65 + 15r2 , d = 8 − 6r2 (3.3) Where r is a random variable in the range [0,1]. This produces neurons with a regular spiking pattern (see figure 2.3). For inhibitory neurons the parameters were set to: a = 0.1, b = 0.2, c = −65 + 15r2 , d = 8 − 6r2 (3.4) Which results in neurons which exhibit fast spiking behaviour. These neural spiking patterns are consistent with observed behaviour in the brain, and previous neural models [8]. 3.3.1 Numerical Approximation The differential equations given by the Izhikevich model were simulated using the Euler method of numerical approximation. Given a differential equation such that y 0 (t) = f (t, y(t)), if we know the value of y(t) for some time t then, by the Euler method, we can approximate the value of y(t + δt) for some small time step δt as: y(t + δt) = y(t) + δt.f (t, y(t)) (3.5) This formula can be applied repeatedly to approximate y(t) over time. In our simulations we used δt =0.5ms for approximating v(t) and δt =1ms for approximating u(t). This is consistent with Izhikevich’s original paper [8]. 3.4 Phasic Activity The properties of individual neurons mean that if a group of neurons is interconnected and then stimulated with a low baseline current then the group of neurons will tend to fire in phase; synchronous firing followed by synchronous inactivity. The frequency with which the neurons oscillate depends on various parameters of the neurons and network, phasic activity has been observed in the brain over a wide range of frequencies ranging from 0.02Hz to >100Hz [49]. In our model the inputs and outputs to the network are updated every 70ms (corresponding to an update frequency of 14Hz), in the following sections we will describe the exact method by which the sensors and motors are encoded/decoded. For simplicity this 14Hz update frequency was explicitly implemented outside of the neural network. One possible way in which this oscillatory property could be embedded in the network directly would be to have a separate group of interconnected inhibitory neurons with a baseline level of firing such that the firing rate of the group oscillates at 14Hz. If this inhibitory population is connected to the relevant sensor and motor neurons then it would force them to fire with 14Hz frequency as well, and as such simulate the update model that was used in this paper. The dynamics of STDP mean that, without phasic activity, two populations of connected neurons will have their synaptic weights depressed over time. There is just as much probability of a pre-synaptic neuron firing before or after a post-synaptic neuron. As the parameters of STDP were set to favour long term depression, the synapses would be depressed. Through the use of phasic activity the network exhibits clear sense-respond behaviour. For example, if the left sensor is stimulated and, for the rest of the active phase of the neurons, the right motor neurons are active, then we can say the right motor action was a response to the left sensor stimulus. The eligibility trace for left sensor to right motor synapses would be high at this point, as the left sensor neurons fired before the motor neurons. As such, if a reward was subsequently received then the robot would learn attraction behaviour. 22 3.5 Sensorimotor Encoding 3.5.1 Sensor to Neuron Encoding Neuron Index Both the food and container range-sensors return results in the range [0,1]. Every 70ms the corresponding sensor neurons are stimulated for 1ms with a current taken from a Poisson distribution with mean of sensor value ∗ 30mA. The effect this stimulus current has on the firing rate of a population of sensor neurons is shown in figure 3.4. Neuron Firings Over Time 20 10 500 1000 1500 2000 Time (ms) 2500 3000 3500 4000 Figure 3.4: The firings in a group of 20 sensor neurons as the sensor value is linearly increased from zero to one. The neurons are stimulated every 70ms. The food touch-sensor and the container touch-sensor elicit an instantaneous response in the corresponding neurons. This is achieved by stimulating them for 1ms with a current taken from a Poisson distribution with a mean of 12mA. 3.5.2 Motor Velocity Calculation The simulation is updated every 70ms, the total firings during this 70ms for the left and right motor neurons (fleft and fright respectively) are first calculated. The motor velocities are then calculated, for example for the left motor, using the following formula:  if fleft > fright  vmax vmin if fleft < fright (3.6) vleft =  vmax +vmin otherwise. 2 Where vleft is the output velocity of the left motor and vmax and vmin are the maximum and minimum allowable velocities of the motors, which are set to 31.2cm/s and 25cm/s respectively. The equation for the right motor is equivalent, with left and right terms switched. Note that this formula implements a winnertakes-all mechanism between the motors. If one group of motor neurons has a greater firing rate then the corresponding motor will be set to maximum velocity, and the other motor set to its minimum velocity. This helps with robot exploration as it reduces the probability of the robot driving in a straight line. Also this winner-takes-all mechanism helps with learning attraction/avoidance behaviours as it amplifies the result of any slight difference in synaptic weights between the sensors and motors. The robot was restricted to run at half-speed whilst in food-containers or empty-containers, such that its maximum and minimum velocities were set to 15.6cm/s and 12.5cm/s. This was to increase the time between the reward predicting stimulus and the reward, as discussed in section 3.8. 3.6 Network Architecture The robot was controlled via a spiking neural network consisting of connected groups of neurons. Figure 3.5 shows the connections in the neural network for the robot in the food-only environment. This is a subset of the connections for the robot in the food-container environment which is shown in figure 3.6. All rangesensor neurons are connected to motor neurons with 85% probability, that is, there is an 85% chance that any individual range-sensor neuron is connected to any individual motor neuron. All touch-sensor neurons are connected to dopaminergic neurons with 10% probability. The synaptic weights between food touchsensor neurons and dopaminergic neurons is fixed and set to 3mV. This high synaptic weight forces a strong response in the dopaminergic neurons whenever food is eaten. Unless otherwise specified all other synapses are plastic and have their initial weights set to zero. In addition to the neurons specified in these architectural diagrams there is also a group of inhibitory neurons, this group is connected to all other neurons with 10% probability and its synaptic connections are initialized to random values in the range [0,-3] mV. This has the effect of slightly dampening the activity of the network. All of the neuron groups, with the exception of the dopaminergic neurons, consist of 20 neurons. The dopaminergic group consists of 40 neurons. The reason that the dopaminergic neuron group is larger is that 23 Left Food Sensor Right Food Sensor Food Touch Sensor External Inputs Connection subject to plasticity. Connection with fixed weights. Left Food Sensor Neurons Right Food Sensor Neurons Food Touch Sensor Neurons Spiking Neural Network Left Motor Neurons Right Motor Neurons Left Motor Right Motor Dopamine Neurons External Outputs Figure 3.5: The architecture of the robot’s neural network for the food-only environment. Connection subject to plasticity. Range Sensors Touch Sensors Connection with fixed weights. Left Food Sensor Right Food Sensor Left Container Sensor Right Container Sensor Food Touch Sensor Food-Container Touch Sensor Empty-Container Touch Sensor Left Food Sensor Neurons Right Food Sensor Neurons Left Container Neurons Right Container Neurons Food Touch Sensor Neurons Food-Container Touch Sensor Neurons Empty-Container Touch Sensor Neurons Left Motor Neurons Right Motor Neurons Left Motor Right Motor Dopamine Neurons External Inputs Spiking Neural Network External Outputs Figure 3.6: The architecture of the robot’s neural network for the food-container environment. 24 learning to elicit a dopamine response when a reward predicting stimulus (food-container touch-sensor) is received relies heavily on random firings in the dopaminergic neuron group. A larger number of neurons was found to increase the learning speed. The conductance delay for all synapses was set to 1ms, meaning that it would take 1ms for a pre-synaptic spike to propagate into a change in membrane potential of a post-synaptic neuron. The spiking neural network for the food-only robot consists of 160 neurons, the distribution of these neurons across the different neural groups is shown in table 3.2. The network for the food-container robot consists of 240 neurons in total, the distribution of the neurons for this robot is shown in figure 3.3. Neuron Range 1-20 21-40 41-60 61-80 81-100 101-140 141-160 Neuron Group Left Food Sensor Right Food Sensor Left Motor Right Motor Food Touch-Sensor Dopamine Neurons Inhibitory Neurons Table 3.2: The organization of the neurons for the robot in the food-only environment. Neuron Range 1-20 21-40 41-60 61-80 81-100 101-120 121-140 141-160 161-180 181-220 221-240 Neuron Group Left Food Sensor Right Food Sensor Left Container Sensor Right Container Sensor Left Motor Right Motor Food Touch-Sensor Food-Container Touch-Sensor Empty-Container Touch-Sensor Dopamine Neurons Inhibitory Neurons Table 3.3: The organization of the neurons for the robot in the food-container environment. 3.7 Plasticity Synaptic plasticity was implemented using dopamine modulated STDP, an outline of which is given in section 2.4.3. The value of the function STDP (t) at time t is calculated as: ( + A+ e−∆t/τ if ∆t ≥ 0 STDP (t) = (3.7) − −A− e∆t/τ if ∆t < 0 Where ∆t is the time difference between the pre and post synaptic neurons firing. The nearest-neighbour update scheme was used, such that only the most recent pre/post synaptic spike was considered when calculating STDP (t) for a specific synapse. The optimal parameters for the model were found by running the robot in the food-only environment for 1000 seconds, 15 times. This was repeated for a large range of parameters and the value that achieved the best score (as measures by number of food items collected) was used. These parameters were: • A+ = 0.1 • A− = 0.15 • τ + = 0.02s • τ − = 0.11s The strength of STDP is plotted against the difference in pre and post synaptic firing, ∆t, in figure 3.7. There is a stronger response when the post-synaptic neuron fires before the pre-synaptic neuron (∆t 25 is negative) and as such long term depression is preferred over long term potentiation. This means that uncorrelated firing between two populations of neurons will tend to decay the synaptic weights to zero and only correlated firings will have the effect of increasing the associated synaptic weights over time. This is useful in helping the robot learn the correct behaviour and ignore any noise in the neuron firings. STDP Strength vs Spike Timing 0.1 STDP (mV) 0.05 0 −0.05 −0.1 −0.15 −500 −400 −300 −200 −100 0 100 Δ t (ms) 200 300 400 500 Figure 3.7: The Strength of STDP is shown against the difference in spike timings, where ∆t = tpost − tpre . Each synapse maintains an eligibility trace, c. The value of which is updated according to: ˙ = −c(t)/τc + STDP (t)δ(t − t c(t) pre/post ) (3.8) Where τc is the decay rate of the eligibility trace and is set to 0.476s, δ is the Dirac delta function and ensures that the STDP only effects the eligibility trace when either the pre or post synaptic neuron fires. Figure 3.8 demonstrates the eligibility trace of a single synapse after simultaneous pre-synaptic then post-synaptic firing. The eligibility trace becomes negligible after a maximum of about one second after coincident firing. This means that any action the robot is currently performing will be forgotten after this time. See section 3.8 for details of how this memory is extended further by moving the dopamine response. Eligibility Trace Over Time 0.09 0.08 0.07 Eligibility Trace 0.06 0.05 0.04 0.03 0.02 0.01 0 −0.01 0 500 1000 1500 Time (ms) 2000 2500 3000 3500 Figure 3.8: The eligibility trace for a synapse. The pre-synaptic neuron fires after 30ms, the post-synaptic neuron fires after 32ms. No more firing occurs and the eligibility trace decays. Every millisecond the synaptic weights are then updated according to: ṡ = cd 26 (3.9) Where s is the synapse strength and d is the current level of dopamine. The level of dopamine is increased by 0.0035µM for every dopaminergic neuron that fires. This has the effect of increasing the level of dopamine by approximately 0.12µM every time a food item is reached and the majority of the dopaminergic neurons fire. During experiments which contain poison, the poison has the effect of reducing the level of dopamine by 0.0035µM for every dopaminergic neuron that fires. The consequence of this is that synapses that were highly active in the lead up to the poison, and as such have a high eligibility trace, will have their synaptic weight reduced. A delay of 5ms between a dopaminergic neuron firing and the corresponding increase in dopamine was used. This gives enough time for the eligibility trace of synapses projecting to dopaminergic neurons to be updated, before the corresponding spike in dopamine. The baseline level of dopamine in the system was set to -0.0004µM, meaning that in the absence of any firing by the dopaminergic neurons the level of dopamine would decay to this negative value. This has the effect of working like hunger, if the robot does not collect any food for a long time then strong synaptic weights will become weaker and very weak synaptic weights will become stronger. This allows the robot to change its behaviour when its current strategy isn’t being effective in collecting food. A constant current of 3.65mV was supplied to the dopaminergic neurons, this induced a background firing rate of 0.4Hz. For values higher than this the robot was not able to learn correctly, this is talked about in more depth in section 3.8. As described in section 2.4.3 dopaminergic neurons have two patterns of activity, background firing and stimulus induced burst firing. The result of which is that that background firing does not have any significant effect on the level of dopamine. To simulate this the level of dopamine was only increased if more than five dopaminergic neurons fired in a 1ms window. The effect this has is discussed more in section 3.8. 3.8 Moving Dopamine Response from Unconditioned-Stimulus to Conditioned Stimulus In many scenarios an agent will need to perform a sequence of behaviours in order to get a reward. If dopamine is only released when the reward is achieved then plasticity will only occur at this time. The efficacy of DA-modulated STDP drops off exponentially and is negligible after about 1000ms, therefore if the reward predicting behaviour takes place more than 1000ms before the reward is received then this behaviour will not be learnt. For example, in the food-container environment, with the robot run at halfspeed, the average time between entering a food-container and the food being collected is about 800ms. Therefore food-container attraction behaviour would take a long time to learn, if at all, if dopamine was only released when the food was collected. If the robot needed to learn a third behaviour, such as picking up a key to open the container, then it is likely that the temporal difference between this behaviour and the actual reward would be too great for it to ever be learnt. A simple method to deal with this problem is for the agent to learn to elicit a dopamine response when it receives a reward predicting stimulus. For example, the food-container touch-sensor is often stimulated prior to a food item being collected and hence a spike in dopamine being received. If the robot learnt to produce a dopamine spike when the food-container touch-sensor is stimulated then the robot should be able to learn food-container attraction behaviour much faster, as there wouldn’t be a long delay between performing the behaviour and receiving a dopamine response. It can be seen how this process could be repeated such that a long chain of behaviours could be learnt. This moving of dopamine response is achieved by connecting the container touch-sensor neurons to the dopaminergic neurons and allowing these synapses to be plastic. Figure 3.9 shows an example of how the robot is able to strengthen food-container touch-sensor to dopaminergic neuron connections. The firings of just two neurons are plotted, one from the food-container touch-sensor group (index 141) and one from the dopaminergic group (index 181). At 1000ms the robot enters a food container and the food-container touch-sensor neuron fires. Purely by chance the dopaminergic neuron fires 20ms later due to background firing. This causes the eligibility trace between these two neurons to jump up. 800ms later the robot reaches the food item and all the dopaminergic neurons fire, causing a spike in the level of dopamine. This spike in dopamine, combined with the still positive eligibility trace, increase the weight of the synapse. Since the synaptic weight is higher this increases the probability that the dopaminergic neuron will fire after the food-container touch-sensor neuron in future, and have its weight further increased. The ability of the robot to learn this dopamine response relies on a combination of the background firing rate of the dopaminergic neurons and on the strength of long term potentiation as compared with long term depression. If the background firing is too low then the chance of a dopaminergic neuron firing soon after a food-container touch-sensor neuron will be small and as such the robot will take a long time to learn, if at all. If the background firing rate is too high, and the level of long term depression is also high then random uncorrelated firings between the food-container sensor neurons and the dopaminergic neurons will, 27 Eligibility Trace (mV) Shift of Dopamine Example Eligibility Trace 0.08 0.06 0.04 0.02 0 0 500 1000 1500 Time (ms) Firings 2000 2500 3000 0 500 1000 1500 Time (seconds) Dopamine 2000 2500 3000 0 500 1000 1500 Time (seconds) Synaptic Strength 2000 2500 3000 0 500 1000 1500 Time (seconds) 2000 2500 3000 Neuron Index 200 150 100 50 0 Dopamine (µM) 0.15 0.1 0.05 0 Synaptic Weight (mV) −0.05 0.08 0.06 0.04 0.02 0 Figure 3.9: The activity of two neurons is plotted, one (index 141) from the food-container sensor group, and one (index 181) from the dopaminergic neuron group. At 1000ms the robot enters the food container and the food-container touch-sensor neuron spikes, by chance the dopaminergic neuron fires soon after which raises the eligibility trace. At 1800ms the robot collects the food item and the level of dopamine spikes. This dopamine spike, combined with the positive eligibility trace, increase the weight of the synapse from the food-container touch-sensor neuron and the dopaminergic neuron. 28 on average, cause the synapses’ eligibility traces to become negative and cancel out any potentiation of the synapses. If we consider what would happen if we did not threshold the number of neurons required for the level of dopamine to be raised (or equivalently if dopaminergic neurons in the brain produced bursting activity during background firing) then we can see that non-reward predicting stimulus can also have their synaptic weights, for synapses projecting to dopaminergic neurons, potentiated. This is due to the feedback loop that can be created. For example, if by chance an empty-container touch-sensor neuron fires before a dopaminergic neuron. The eligibility trace will increase, and the robot will immediately receive an increase in dopamine (due to the dopaminergic neuron firing), this will increase the probability that the next time the empty-container sensor neuron is triggered, the dopaminergic neuron fires afterwards, resulting in its synaptic weight increasing even further. If the parameters of the model were altered such that plasticity happened at a much slower rate then this feedback loop could be avoided, the small increase in synaptic weight in the previous example would not alter the probability of the neurons firing in a correlated manner much. Therefore it would be likely that the dopaminergic neuron would at some point fire before the sensor neuron and cause the synaptic weight to decrease again. However the advantage of the above method of thresholding the dopaminergic firing rate needed to increase the level of dopamine is that the robot is more robust in its learning, as well as being able to learn much faster. 3.9 Network Stability STDP is an inherently unstable mechanism, once a synaptic weight has been increased then the probability of the pre-synaptic neuron firing before the post-synaptic neuron becomes increased and as such the probability of the synaptic weight potentiating further is increased. This feedback mechanism can lead to synapses quickly becoming potentiated to their maximum value. To combat this two mechanisms were used. The synaptic weights of excitatory synapses was restricted to the range [0,4] mV. In addition, a local dampening mechanism was used based on the observation that, in the brain, a highly active group of neurons have their excitability decreased over time, which was discussed in section 2.4.5. The synapses were divided into three distinct groups, the synapses belonging to these three groups being: • Food Taxis Group - Food range-sensor neuron to motor neuron synapses. • Container Taxis Group - Container range-sensor neuron to motor neuron synapses. • Container Dopamine Group - Container touch-sensor neuron to dopaminergic neuron synapses. For each of these groups, if the mean synaptic weight becomes potentiated by more than 2mV (half the maximum value) then all synapses within the group have their weights reduced by 0.1mV. This prevents a feedback loop such that all the synaptic weights become potentiated to their maximum value. The other benefit of this approach is that it can lead to competition between behaviours within the synaptic group, figure 3.10 demonstrates how this competition can occur between the food attraction and food avoidance behaviours. 29 Synaptic Competition Example Synaptic Weight (mV) 3.5 3 Food attraction synapses Food avoidance synapses 2.5 2 1.5 2 3 4 5 6 Time (seconds) 7 8 9 Figure 3.10: An example of how synaptic weight dampening can lead to competition between behaviours. Both the synaptic weights for food attraction and for food avoidance behaviour are being potentiated, but the food attraction synaptic weights are potentiating faster. At 6 seconds the average synaptic weight over both groups reaches the maximal allowable value, and all weights are reduced by 0.1mV. The food attraction synaptic weights then increase at a faster rate, and as such the next time the maximal average synaptic weight is reached the food attraction behaviour has increased by more than 0.1mV and the food avoidance behaviour has increased by less than 0.1. In this way the strength of the food avoidance behaviour becomes reduced over time, whilst the strength of the food attraction behaviour is increased. 3.10 Taxis The robot’s architecture is constructed such that it has the potential for taxis behaviour, for example food attraction or poison avoidance. This is achieved through having two sensors at the front (left and right) of the robot, which are wired to two motors. The wiring of the robot does not predispose it to prefer attraction or avoidance behaviour, there is an equal number of connections from each sensor to each motor. The acquisition of attraction/avoidance behaviour is left up to DA-modulated STDP to strengthen the synaptic connections corresponding to the behaviour to be learnt. Figure 3.11 shows how strong connections between opposite sensors and motors can cause food attraction taxis behaviour. 30 (a) Left Sensor Active, Right Motor Active (b) Right Sensor Active, Left Motor Active (c) Left Sensor Active, Right Motor Active Figure 3.11: Demonstration of how wiring the left sensor to right motor, and right sensor to left motor can cause food attraction taxis. In (a) the left sensor is active, so the robot turns forward and left, in (b) the right sensor is active so the robot turns forward and right. Finally in (c) the robot turns and collects the food item. 31 3.11 Exploration To ensure that the robot explores the environment the robot needs to have some kind of exploratory behaviour. This was implemented by, every 70ms, randomly choosing either the right or left motor. Then for the remaining 70ms this motor’s neurons were stimulated with a current taken from a Poisson distribution with a mean of 2.35mA. One possible way in which this exploration could be implemented directly in the network, would be to have the motor neurons connected such that they are oscillating at 14Hz (see section 3.4 for details of how oscillating behaviour can occur). If a winner-takes-all mechanism was then implemented between the left and right motors, this would have the effect that one population of neurons would be active whilst the motor neurons are phasically active. When the motor neurons become phasically inactive then it would be easier for the winner-takes-all mechanism to switch the active group. This network would display the same properties as the implemented exploration motor stimulation. Once the synaptic weights between the sensors and the motors have increased enough then the current to the motors from the sensors will override the exploration current. The effect of this is that before the robot learns anything it will perform a random walk. After learning the robot will only perform a random walk whenever it can’t sense anything. Also, if the environment changes, causing the synaptic weights between sensors and motors to drop, then the robot will go back to performing a random walk. The path of the robot in an environment with no food, after having run for 30 seconds is shown in figure 3.12. As can be seen the robot is able to effectively explore the environment. 100 Path of the robot performing a random walk. 90 80 y position (cm) 70 60 50 40 30 20 10 20 40 60 x position (cm) 80 100 Figure 3.12: The path taken by the robot for 30 seconds in an environment with no food. The random motor stimulation causes the environment to be explored effectively. 32 Chapter 4 Results and Discussion 4.1 Orbiting Behaviour An interesting property of the robot and environment is that there is no such thing as a fixed set of optimal synaptic weights. In almost all scenarios in the environment the best set of synaptic weights would be to have all left sensor to right motor and right sensor to left motor synapses set to their maximum weight and all other sensor to motor synapses set to zero. This will cause the robot to turn the quickest towards food. However, because the robot has a non-zero turning circle, in some situations the robot can orbit a food item indefinitely. Figure 4.1 shows the path of a robot using these synaptic weights when it approaches a food item at 90 degrees. At each time step the robot senses food with its left sensor and so turns to the left, however it never reaches the food. The optimal robot needs to determine when it is orbiting food, and modify its behaviour accordingly. 100 Path of Robot When Orbiting Food 90 80 y position(cm) 70 60 50 Food 40 Robot Path Orbits Food 30 20 10 Start Position 20 40 60 x position(cm) 80 100 Figure 4.1: The path of the robot is shown in blue, with the robot’s position being plotted every 70ms. Once the robot can sense the food with its left sensor then it turns left, it continues to sense the food with its left sensor and so continues turning left. However it cannot turn fast enough to reach the food and ends up orbiting it. 4.1.1 Experimental Set-up To demonstrate the ability of the robot to learn to modify its behaviour when it gets stuck in one of these orbits the robot was placed in an environment with one food item. The synaptic weights between opposite sensors/motors were set to their maximum allowable value, and all other sensor to motor synapses were set to zero. This forces the robot to initially perform food attraction behaviour. The robot was positioned in such a way that it would start out orbiting the food item as shown in figure 4.2. In the first scenario none of the robot’s synapses are plastic, it does not learn. The robot was simulated for 40 seconds, this was repeated 20 times. In the second scenario the robot’s synapses were modified using 33 Starting Setup for Orbiting Environment 100 90 80 y position(cm) 70 60 50 Food 40 30 20 Robot Start Position and orientation 10 20 40 60 x position(cm) 80 100 Figure 4.2: The starting position and set-up of the environment to force the robot to start orbiting. DA-modulated STDP, as such the robot was allowed to learn. The robot was again simulated for 40 seconds, for 20 trials. 4.1.2 Results and Discussion In none of the trials with learning disabled did the robot manage to break out of its orbiting behaviour. With learning enabled the robot managed to learn to stop orbiting the food, and was able to collect the food item, in all 20 trials. On average it took the robot 5.1 seconds to stop orbiting the food. The distance to the food for the first 10 seconds of one such trial is plotted in figure 4.3. This figure shows the robot was able to modify its behaviour to stop orbiting after less than 6 seconds, the food item is then collected at 8 seconds. Once the food is collected it is replaced at a random location, and the robot collects the food one more time. Distance From Robot to Food Over Time 50 45 40 Distance(cm) 35 30 25 20 Robot Stops Orbiting Food 15 10 Food Items Collected 5 0 0 1 2 3 4 5 Time (seconds) 6 7 8 9 10 Figure 4.3: The distance between the robot and the food item is plotted over time, the synaptic weights are initially set to force food attraction behaviour and plasticity is turned on. The robot starts out orbiting the food, but after 5.8 seconds is able to unlearn the orbiting behaviour and stops orbiting the food. To see how this relearning is achieved the mean synaptic weights between both sensors and both motors over time are plotted in figure 4.4. There are several interesting properties that are shown. Firstly the synaptic weights between the left sensor and the right motor are slowly decaying whilst the robot is orbiting 34 the food. This is because the baseline level of dopamine in the system is a small negative value, therefore highly active synapses with strong weights will have their synaptic weight reduced due to their high eligibility trace. This has the effect of reducing the strength of any behaviour that the robot is currently performing, in this case turning left when the left food sensor is activated. The negative dopamine can be thought of as analogous to hunger, if whatever the robot is currently doing isn’t giving it food then it has an incentive to change its behaviour. Notice that the right sensor to left motor synaptic weights remain strong. This is due to the fact that the right sensor neurons are not being stimulated and as such the eligibility trace remains small. Whilst the robot is orbiting the synaptic weights between the left sensor and the left motor are also increased. This is because the left motor neurons are still being randomly stimulated by the exploration method described in section 3.11. This causes some random firings in the left motor population that are uncorrelated with the left sensor neuron firings. The parameters of STDP used favour long term depression over long term potentiation and as such the eligibility trace for these synapses will be negative. Given a negative eligibility trace, a negative dopamine value will increase the synaptic weights. Mean Sensor to Motor Synaptic Weights for Orbiting Environment Mean Synaptic Weight Mean Synaptic Weight Mean Synaptic Weight Mean Synaptic Weight Left Sensor −> Left Motor 3 2 1 0 0 1 2 3 4 5 6 Time(seconds) Left Sensor −> Right Motor 7 8 9 10 3 2 1 0 Food Collected Orbiting Stopped 0 1 2 3 0 1 2 3 0 1 2 3 4 5 6 Time(seconds) Right Sensor −> Left Motor 7 8 9 10 4 7 8 9 10 7 8 9 10 3 2 1 0 5 6 Time(seconds) Right Sensor −> Right Motor 3 2 1 0 4 5 Time(seconds) 6 Figure 4.4: The mean synaptic weights between the left and right sensor/motor groups is shown for a robot in an environment with one food item. The robot is initially orbiting the food, at 14 seconds this orbiting is unlearned. At 35,37 and 39 seconds the robot collects a food item. Figure 4.5 shows the neural firing rate of both the sensor neuron groups and the motor neuron groups for the same trial. This shows that as the synaptic weights between the left sensor and right motor are decreased, the firing rate of the right motor also decreases. Equivalently, as the synaptic weights between the left sensor and the left motor are increased, so is the firing rate of the left motor neurons. After 5.8 seconds the combination of increased synaptic weights to the left motor and the random exploration stimulus of the motors means that the firing rate in the left motor is greater than the firing rate in the right motor 35 and the robot turns away from the food item. The robot then performs a random walk until it can again sense the food. Once the food is collected notice that the left sensor to right motor synaptic weights are increased (figure 4.4), and the left sensor to left motor synaptic weights are decreased as the robot starts to relearn food attraction behaviour. Neuron Firing Rate in Orbiting Environment −4 x 10 Mean Firing Rate (Hz) Left Sensor Right Sensor Left Motor Right Motor 2 1 0 0 1 2 3 4 5 Time (seconds) 6 7 8 9 10 Figure 4.5: The mean firing rate of neurons in the sensor and motor groups over a single trial in the orbiting environment. After 5.8 seconds the left motor firing has increased enough, and the right motor firing has decreased enough, that the robot stops orbiting the food. To confirm that the ability to relearn, when the current behaviour isn’t working, relies on the baseline level of dopamine being negative, the experiment was re-run with the baseline level of dopamine set to 0.0004µM. In none of these 20 trials did the robot manage to escape from orbiting the food. Figure 4.6 shows the synaptic weights for one of these trials. As this figure shows, a positive level of background dopamine has the effect of reinforcing any behaviour that the robot is currently performing, as shown by the increase in weights between the left sensor and the right motor. 36 Synaptic Weights in Orbiting Environment (positive baseline dopamine) Mean Synaptic Weight Mean Synaptic Weight Mean Synaptic Weight Mean Synaptic Weight Left Sensor −> Left Motor 3 2 1 0 0 2 4 6 0 2 4 6 0 2 4 6 0 2 4 6 8 10 12 Time(seconds) Left Sensor −> Right Motor 14 16 18 20 8 14 16 18 20 8 14 16 18 20 14 16 18 20 3 2 1 0 10 12 Time(seconds) Right Sensor −> Left Motor 3 2 1 0 10 12 Time(seconds) Right Sensor −> Right Motor 3 2 1 0 8 10 12 Time(seconds) Figure 4.6: The synaptic weights between sensors and motors when the baseline level of dopamine is positive, and set to 0.0004µM in the orbiting environment. This positive dopamine acts to reinforce the current behaviour, and the left sensor to right motor synaptic weights increase. 37 4.2 Food Attraction Learning In this section we test the ability of the robot to learn food-attraction behaviour by modifying it’s synaptic weights. 4.2.1 Experimental Set-up A 100cmx100cm environment consisting of 20 randomly placed food items was constructed. When a food item is collected it is moved to a random position in the environment. The robot was placed in the environment and simulated for 1000 seconds with plasticity taking place between the sensor neurons and the motor neurons. This process was repeated for 50 trials, each time resetting the sensor to motor synaptic weights to zero. For comparison a robot with no connections between sensor neurons and motor neurons and no plasticity was run for 50 trials of 1000 seconds each in the environment. The effect of this is that the robot performs a random walk, and only collects food by randomly driving into it. 4.2.2 Results and Discussion The mean food collection rate over time for the robot with learning enabled and the random walk robot is shown in figure 4.7. The robot with learning enabled was able to rapidly learn to turn towards and collect food items, and this high collection rate remained stable for the rest of the trial. On average the robot took about 200 seconds for the full food attraction behaviour to be learnt and stabilized. Food Collection Rate in Food−Only Environment Collection Rate (collections per second) 1.8 1.6 1.4 1.2 Robot With Learning Disabled Robot With Learning Enabled 1 0.8 0.6 0.4 0.2 0 0 100 200 300 400 500 600 Time (seconds) 700 800 900 1000 Figure 4.7: The food collection rate over time for a robot in a 100cmx100cm environment with 20 randomly placed food items. Table 4.1 shows the mean food collected over the 50 trials and whether the robot was able to correctly learn food attraction behaviour. The robot was deemed to have learnt attraction behaviour if at the end of the trial the synapses for food attraction (left sensor to right motor, and right sensor to left motor) were on average more than 0.5mV, as well as being on average more than 10% higher than the synapses for food avoidance. These values being high enough that exploration behaviour was overridden, and different enough that food attraction was preferred. The robot was able to learn this behaviour in all of the trials with learning enabled. Robot Type Learning Disabled Learning Enabled Mean Food Collected 269 1418 Std. Deviation Food Collected 16.1 77.1 % Correct 0 100 Table 4.1: This table shows the total amount of food collected for the robots, averaged over the 50 trials as well as what percentage of robots that were able to correctly learn food attraction behaviour. Figure 4.8 shows the mean weights between the sensors and motors, averaged over the 50 trials. The synaptic weights between opposite sensors/motors are rapidly increased and reach the maximum weight after 38 about 100 seconds on average. This causes the robot to perform food attraction behaviour, as reflected by the increase in food collection in figure 4.7. Robot Sensor to Motor Connection in Food-Only Enviroment Mean Synaptic Weight Mean Synaptic Weight Mean Synaptic Weight Mean Synaptic Weight Left Sensor −> Left Motor 2 1 0 0 100 200 300 0 100 200 300 0 100 200 300 0 100 200 300 400 500 600 Time(seconds) Left Sensor −> Right Motor 700 800 900 1000 400 700 800 900 1000 400 700 800 900 1000 700 800 900 1000 2 1 0 500 600 Time(seconds) Right Sensor −> Left Motor 2 1 0 500 600 Time(seconds) Right Sensor −> Right Motor 2 1 0 400 500 600 Time(seconds) Figure 4.8: These graphs show the mean synaptic weights between the sensor and motor neurons averaged over 50 trials in the food-only environment. The left to right, and right to left connection weights are rapidly increased to their maximum value, causing food-attraction behaviour. To demonstrate how the robot is able to learn to perform food attraction behaviour, the mean eligibility trace for synapses between the left sensor and both motors, for the first 30 seconds in one of the trials, has been plotted in figure 4.9. At the start the synaptic weights are set to zero and the robot performs a random walk, notice that the eligibility traces fluctuate up and down, but neither is consistently higher. When the robot collects a food item it is more likely that it was recently turning towards the food item, and as such the left sensor and right motor neurons will have been active and correlated (left sensor stimulated, followed by right motor neurons being active). This means that the eligibility trace is likely to be higher for the left sensor to right motor when a food item is collected. This can start to be seen at 16 seconds, but is most noticeable after 21 seconds. The synaptic weights are only significantly modified when the dopamine level is high (when food is collected), so the left sensor to right motor connections will become strengthened. This in turn means that the robot is more likely to turn towards food items and as such the left sensor to right motor connection strength is even more likely to be increased. This action reinforcement is why the food attraction synaptic connections quickly become saturated to their maximum value. 39 Sensor to Motor Eligibility Traces in Food−Only Environment 0.15 Left Sensor−>Left Motor Left Sensor−>Right Motor Food Collected 0.1 Eligibility Trace 0.05 0 −0.05 −0.1 −0.15 −0.2 0 5 10 15 Time (seconds) 20 25 30 Figure 4.9: The mean synaptic eligibility trace for the left sensor to left motor neurons, and the left sensor to right sensor neurons. The vertical lines display when food is collected. Initially the weights are zero and the robot performs a random walk. The probability that the eligibility trace will be higher for the left sensor to left motor connections when food is achieved acts to increase these connections. This acts as a feedback loop as the robot is more likely to turn towards the food and so the left sensor to left motor eligibility trace is even more likely to be positive. Notice that, from figure 4.8, the left sensor to left motor and right sensor to right motor synaptic weights also increase, but they level off at a lower value. The reason for this is the negative baseline level of dopamine. Figure 4.10 shows the eligibility trace for the left sensor to motor synapses for a single trial, as well as the synaptic weights for these synapses. Initially the synaptic weights between the left sensor and the left motor are small, as such the firing of the left sensor neurons and the left motor neurons are uncorrelated, causing a negative eligibility trace. The negative baseline level of dopamine acts to increase the synaptic weights of synapses with negative eligibility trace. As the synaptic weights between the left sensor and left motor increase, the neurons start to fire in a more correlated manner (stimulating the left motor causes some firings in the left motor). This in turn causes the eligibility trace to rise. Eventually, at around 200 seconds, the eligibility trace rises to a point where the positive dopamine spikes caused by food act to cancel out the negative baseline level of dopamine. At this point the left sensor to left motor synaptic weights stabilize. The left sensor to right motor synapses are also subject to this process. However, the main cause of potentiation in these synapses comes from the large spikes in dopamine when food is collected. These large spikes in dopamine, which occur when the left sensor to right motor eligibility traces are highest, override any effects the small negative baseline dopamine has. The final synaptic weights for all sensor neuron to motor neuron synapses for a single trial is shown in figure 4.11. There are a couple of interesting properties to note about these weights. Firstly, a lot of synapses are either fully potentiated (and have their weight set to 4mV) or are fully depressed (and have a weight of 0mV). This is due to the feedback mechanism inherent in STDP, if a synaptic weight starts to become potentiated then it has a greater chance of being further potentiated in future. The second interesting property is that individual motor neurons have differentiated themselves to either only respond to the left sensor, or only respond to the right sensor. This occurs because all the sensor neurons are stimulated at once, so if a synapse from a left sensor neuron to a left motor neuron becomes potentiated then it is likely that the left motor neuron will fire after all the left sensor neurons are stimulated, and as such all synapses from the left sensor to that left motor neuron will become potentiated. Once the robot has learnt attraction behaviour, then a common sequence of neural firings is: Left Sensor->Right Motor->Right Sensor->Left Motor->Left Sensor->Right Motor... As can be seen, once a motor neuron is reacting strongly to the left sensor it is more likely to fire just before the right sensor is stimulated. This acts to depress any connections from the right motor, and keep the neuron differentiated. 40 Sensor to Motor Eligibility Trace for Food−Only Environment Left Sensor−>Left Motor Left Sensor−>Right Motor 0.2 Eligibility Trace (mV) 0.15 0.1 0.05 0 −0.05 −0.1 −0.15 0 50 100 150 200 250 300 Time (seconds) 350 400 450 500 (a) Eligibility Trace for Single Trial Robot Sensor to Motor Connections in the Food−Only Environment (Single Trial) Mean Synaptic Weight (mV) 2.5 2 Left Sensor −> Left Motor Left Sensor −> Right Motor 1.5 1 0.5 0 0 50 100 150 200 250 300 Time(seconds) 350 400 450 500 (b) Synaptic Weights for Single Trial Figure 4.10: These graphs show the eligibility trace and synaptic weights between the left sensor neurons and both groups of motor neurons for the first 500 seconds in a single trial in the food-only environment. Initially the left sensor to left motor eligibility traces are highly negative, this drives up their synaptic weights. After 200 milliseconds the left sensor to left motor eligibility traces have risen enough that their synaptic weights are stable and do not increase. 41 Post−Synaptic Neuron Index Sensor to Motor Synaptic Weights after Training (Single Trial) No Connection Exists Between Neurons 45 3.5 50 3 55 2.5 60 2 65 1.5 70 1 75 0.5 80 5 10 15 20 25 30 Pre−Synaptic Neuron Index 35 40 0 Figure 4.11: The synaptic weights between sensors and motors, after training in the food-only environment, is plotted. Motor neuron indices are on the left axis and range from 41-60 (left motor) and 61-80 (right motor). Sensor neuron indices are on the bottom axis and range from 1-21 (left sensor) and 21-40 (right sensor). Most neurons are either fully potentiated (black) or fully depressed (white). Motor neurons have differentiated themselves to either respond to left sensor neurons or right sensor neurons, as evident by the horizontal banding. 4.3 Food-Poison Plasticity Learning Once the robot has learnt a behaviour, it should be able to modify its behaviour if the environment changes. This is demonstrated by replacing food items with poison once the robot has learnt food attraction behaviour. 4.3.1 Experimental Set-up The robot was placed in a 100cmx100cm environment consisting of 20 food items for 1000 seconds, giving the robot enough time to learn food attraction behaviour. The food items were then replaced with poison, which produces a negative dopamine response, and the robot was run for a further 1000 seconds. Each trial was run 50 times. As a comparison a robot with learning disabled was also run in this environmental set-up for 50 trials. 4.3.2 Results and Discussion The collection rate over time for the dynamic food-poison environment is shown in figure 4.12. The robot is able to unlearn the food attraction behaviour almost immediately. To see how such a rapid relearning takes place it is useful to examine the eligibility trace at the point that poison is introduced, the mean eligibility trace for connections from the left sensor to the left and right motors, over the period where food is switched with poison, is shown in figure 4.13. Due to the fact that the robot has learnt food attraction behaviour there are strong connections between the left sensor and the right motor. This means that the eligibility trace between these two sets of neurons is very high, as a stimulation of the left sensor always causes a response in activity in the right motor. This high eligibility trace means that when poison is introduced, and a negative spike in dopamine is received, there is a rapid decrease in the weights between the left sensor and right motor. This is shown in figure 4.14(a) where the mean synaptic weights between sensors and motors are plotted, averaged over all 50 trials. There is also some reduction in synaptic weights for the left sensor to left motor and right sensor to right motor synapses. This is because a few of these synaptic connections have become potentiated to their maximum value and as such have a high eligibility trace, the drop in weights from these saturated connections is greater than the increase in synaptic weight from uncorrelated connections. The other thing to note about the food collection rate in this environment is that after poison is introduced the rate of food collection is only marginally less than for the robot performing a random walk, this is reflected in the synaptic weights for avoidance only being marginally higher, as can be seen in figure 4.14(b). This 42 Food Collection Rate in Food−Poison Environment 1.6 Robot With Learning Disabled Robot With Learning Enabled Collection Rate (collections per second) 1.4 1.2 1 0.8 0.6 0.4 0.2 0 0 200 400 600 800 1000 1200 Time (seconds) 1400 1600 1800 2000 Figure 4.12: The collection rate over time for robots in a 100cmx100cm environment with 20 food items. After 1000 seconds these food items are replaced with poison. The learning robot quickly unlearns food attraction behaviour once poison is introduced. Sensor to Motor Eligibility Trace for Food−Poison Environment (Single Trial) Food Collected Poison Collected Left Sensor−>Left Motor Left Sensor−>Right Motor 0.35 0.3 Eligibility Trace (mV) 0.25 0.2 0.15 0.1 0.05 0 −0.05 −0.1 −0.15 990 995 1000 Time (seconds) 1005 1010 1015 Figure 4.13: The mean eligibility trace for synapses from the left sensor to the left and right motors is shown. Food items are replaced with poison at 1000ms. Before the poison is introduced the eligibility trace for the left sensor to right motor is very high. Poison is collected at exactly the point at which the left sensor to right motor eligibility traces are highest. After poison has been collected, and food attraction unlearnt, the eligibility trace fluctuates around zero. 43 Robot Sensor to Motor Connections in the Food−Poison Environment 2.5 Left Sensor −> Left Motor Left Sensor −> Right Motor Right Sensor −> Left Motor Right Sensor −> Right Motor Mean Synaptic Weight 2 1.5 1 0.5 0 0 200 400 600 800 1000 1200 Time(seconds) 1400 1600 1800 2000 (a) Synaptic Weights in the Food-Poison Environment Robot Sensor to Motor Connections in the Food−Poison Environment (Close−Up) Left Sensor −> Left Motor Left Sensor −> Right Motor Right Sensor −> Left Motor Right Sensor −> Right Motor Mean Synaptic Weight 0.7 0.65 0.6 0.55 0.5 1000 1100 1200 1300 1400 1500 1600 Time(seconds) 1700 1800 1900 2000 (b) Synaptic Weights in the Food-Poison Environment (Close-Up) Figure 4.14: The mean synaptic weights between sensors and motors, averaged over the 50 trials in the foodpoison environment is shown. (a) shows that after poison is introduced the synaptic weights are rapidly reduced. (b) shows a close-up of the last 1000 seconds, this shows that on average the food avoidance synaptic weights are very slightly higher than those for food attraction. 44 is due to the fact that the robot is not rewarded for avoiding poison (in terms of an increase in dopamine), therefore the synapses corresponding to poison avoidance will not be potentiated. As such all the sensor to motor synapses end up with their weights at very low values. In this situation the exploration stimulus will override any current provided by the sensor to motor connections. One possible way to get the robot to learn food avoidance behaviour would be to have a positive baseline level of dopamine. Though, as has been shown in section 4.1, this would prevent the robot escaping orbiting behaviour, so more research would be needed to find a solution that works for both problems. 4.4 Dopamine Response to Secondary Stimulus. In this section the ability of the robot to learn to elicit a positive dopamine response to a new stimulus that is repeatedly paired with a dopamine inducing stimulus is tested. 4.4.1 Experimental Set-up To demonstrate this reward predicting dopamine response, an environment consisting of food items in containers was used, see section 3.6 for detail in how the architecture of the robot was changed for this environment. The environment is 300cmx300cm and consists of 12 containers which contain food, and 12 containers which contain no food, this environment is visualized in figure 4.15. The robot has a different sensor for detecting if it is entering a food containing container, or an empty container. However, the left and right container sensors cannot distinguish between the two container types. At the start of the experiment the sensor to motor connections were set for food and container attraction behaviour. Figure 4.16 shows how the synaptic weights were set to force attraction behaviour. The result of this attraction behaviour is that the robot will visit both empty and food containing containers equally often, when inside a food container the robot will turn towards and consume the food item. 300 Environment with Food Containers and Empty Containers 250 Food-Container Food y location (cm) 200 Empty-Container 150 100 50 50 100 150 200 x location (cm) 250 300 Figure 4.15: The environmental set-up to demonstrate secondary stimulus dopamine learning, consisting of food items, food-containers, and empty-containers. The synaptic weights between the two container touch-sensor neurons and the dopaminergic neurons were initially set to zero and plasticity was turned on for these connections. The robot was placed in the environment and run for a 3000 second trial. This trial was repeated 50 times. 45 Left Food Sensor Neurons Right Food Sensor Neurons Left Container Neurons Synapses Set to Maximum Right Container Neurons Synapses Set to Zero Left Motor Neurons Right Motor Neurons Figure 4.16: The starting weights for the robot to force attraction behaviour. 4.4.2 Results and Discussion In all 50 trials the food-container touch-sensor to dopaminergic neuron synapses were potentiated by more than four times that of the empty-container touch-sensor to dopaminergic neuron synapses by the end of the trial. Figure 4.17 shows the mean synaptic weight over time for the food container to dopaminergic neuron synapses and for the empty container to dopaminergic neuron synapses. As can be seen, the synapses between the reward predicting stimulus and the dopaminergic neurons are potentiated until levelling off at a maximum value. The non-reward predicting stimulus, by contrast, has very little potentiation in its synaptic connections to the dopaminergic neurons. These remaining stable at just above zero. Connection Strength Between Container Sensors and Dopamine Neurons 0.35 Food Container −> Dopamine Empty Container −> Dopamine Mean Synaptic Weight 0.3 0.25 0.2 0.15 0.1 0.05 0 0 500 1000 1500 Time (seconds) 2000 2500 3000 Figure 4.17: The mean synaptic weight over time between food-container touch-sensor neurons and dopaminergic neurons, as well as between empty-container touch-sensor neurons and dopaminergic neurons over 50 trials. To see the effect that dopamine thresholding (described in section 3.8) has on the dynamics of the system, the experiment was re-run without requiring five dopaminergic neurons to fire in order to raise the level of dopamine. The effect of this is that background firing in the dopaminergic neurons can raise the level of dopamine. With dopamine thresholding switched off the food-container touch-sensor to dopaminergic neuron synaptic weights at the end of the trial were higher than the empty-container touch-sensor to dopaminergic neuron synaptic weights in only 80% of the trials, as compared with 100% with thresholding enabled. The synaptic weights for the experiment without thresholding are plotted in figure 4.18. Note that there is in essence two processes that are happening. For the first 400 seconds both sets of synapses are increased. To see why both sets of synaptic weights are increased, and why the reward predicting set is increased more, it is useful to plot the eligibility trace for a single synapse. In figure 4.19 the eligibility trace, firing rate, and synaptic strength is plotted for a single synapse from an empty-container neuron to a single dopaminergic neuron. At 1300ms the container neuron happens to fire just before the dopaminergic neuron purely by chance, due to the background firing rate. This causes the eligibility trace to jump up, as the second neuron is a dopaminergic neuron its firing immediately causes a spike in the level of dopamine 46 Connection Strength Between Container Sensors and Dopamine Neurons (No Threshold) 0.25 Mean Synaptic Weight 0.2 Food Container −> Dopamine Empty Container −> Dopamine 0.15 0.1 0.05 0 0 500 1000 1500 Time (seconds) 2000 2500 3000 Figure 4.18: The synaptic weights between the empty-container sensor and dopaminergic neurons, and between the food-container sensor and dopaminergic neurons is shown. In this experiment there was no dopamine threshold, such that a single dopaminergic neuron spiking could raise the level of dopamine. (which would not happen with dopamine thresholding). The higher dopamine level combined with the high eligibility trace cause the synaptic weight to increase. This could be described as a double feedback loop, the increase in synaptic weight means that the two neurons are more likely to fire in sequence in future, meaning that their eligibility trace is more likely to increase. While an increase in synaptic strength means that the dopaminergic neuron is more likely to fire, and hence increase the level of dopamine, at exactly the point that will raise the strength of the synapse the most. If we consider what happens when a reward predicting stimulus (food-container touch-sensor) neuron coincidentally fires before a dopaminergic neuron, then not only do we have the same increase in dopamine and synaptic weight as described above. It is also likely that there is a very large spike in dopamine within 1000ms (due to a food item being collected), which will have the effect of raising the synaptic weight even more since the eligibility trace will still be positive. This explains why the rate of increase of synaptic weights from the reward predicting stimulus to dopaminergic neurons is faster than for the non-reward predicting stimulus. The second thing to note about figure 4.18 is that after about 400 seconds the synaptic weights of the empty-container touch-sensor to dopaminergic synapses start to decrease. This is due to the homeostatic mechanism described in section 3.9, the combined synaptic weights for all synapses leading to dopaminergic neurons is limited. Once this limit is reached then all synapses leading to dopaminergic neurons have their weight reduced. The food container to dopaminergic synapses will then increase their weight faster than the empty container to dopaminergic synapses, so the next time the weights are reduced the empty container synapses will be reduced by more than they increased in this time interval. Without dopamine thresholding and synaptic weight dampening there would be nothing to stop the empty-container touch-sensor to dopaminergic neuron synapses potentiating to their maximum value. By using both of these techniques the robot is more robust and able to correctly learn to produce a spike in dopamine for a reward-predicting stimulus, but not for a non reward-predicting stimulus. 47 Eligibility Trace 0.05 0 Neuron Index Dopamine (µM) Synaptic Weight Eligibility Trace 0.1 0 500 1000 1500 2000 Time (ms) Firings 2500 3000 3500 4000 0 500 1000 1500 2000 Time (seconds) Dopamine 2500 3000 3500 4000 0 500 1000 1500 2000 Time (seconds) Synaptic Strength 2500 3000 3500 4000 0 500 1000 1500 2000 Time (seconds) 2500 3000 3500 4000 3 2 1 0 0.02 0.01 0 0.06 0.04 0.02 0 Figure 4.19: An example of how empty-container to dopaminergic neuron synapses can become potentiated. Neuron 1 is a empty-container sensor neuron, and neuron 2 is a dopaminergic neuron. At 1300ms they coincidentally fire, the corresponding spike in dopamine causes the synaptic weight to increase. 4.5 Secondary Behaviour Learning In this section we explore the ability of the robot to learn a secondary behaviour. This being a behaviour that, in and of itself, does not give a direct reward, but when succeeded by another behaviour can lead to a reward. The behaviour to be learnt is that of food-container attraction, driving towards food-containers is an advantageous behaviour, as entering a food-container often leads to food being collected if the robot subsequently performs food-attraction behaviour. 4.5.1 Experimental Set-up An environment consisting of 17 food-containers, each containing a single item of food, was created. The food-containers are positioned randomly and are moved to a random location whenever their associated food item is collected. Five different robots were run in this environment for 50 trials of 2000 seconds each. All robots, except the benchmark robot, have their initial sensor to motor synaptic weights set for food attraction behaviour, no preference for container attraction/avoidance is set. The result is that initially all the robots wander randomly whilst outside containers. Whilst inside containers the robots will turn towards and collect food items. Note that unlike in the food-only environment, this environment has a fixed optimal robot. This is because the size of the food-containers means that the robot cannot get stuck orbiting them. Also, whilst in the food-container, if the robot starts orbiting a food item then its orbit will take it out of the container. As such orbiting isn’t a problem in this environment and we can set up a fixed optimal robot as a benchmark. The dynamics of the five robots is: • Learning Disabled - Plasticity is switched off for all synapses. The result is that the robot wanders randomly whilst outside containers. Whilst inside containers the robot turns and collects food items. • No Container Dopamine - Connections between container touch-sensors and dopaminergic neurons are set to zero, and plasticity is switched off for these synapses. As such no dopamine response is received when the container touch-sensor is stimulated. Plasticity is enabled for container range-sensor to motor synapses. 48 • Container Dopamine Learning Enabled - Connections between container touch-sensors and dopaminergic neurons are initially set to zero. Plasticity is enabled for these connections, allowing them to become potentiated and for the robot to learn a dopamine response to entering a food-container. Container range-sensor to motor synapses are plastic. • Fixed High Container Dopamine - Connections between container touch-sensors and dopaminergic neurons are set to their maximum value and plasticity is switched off for these synapses. This forces a spike in dopamine whenever the robot enters a food-container. Container range-sensor to motor synapses are plastic. • Benchmark - This robot has plasticity switched off. Food attraction synapses are set to their maximal value as well as food-container attraction synapses. All other sensor to motor synapses are set to zero. 4.5.2 Results and Discussion In figure 4.20 the average score over time for each of the five robots is plotted. Correspondingly, the total food collected as well as the percentage of robots that had learnt food-container attraction behaviour by the end of the trial is shown in table 4.2. A robot was deemed to have learnt container-attraction behaviour if, at the end of the trial, the left container range-sensor to right motor neuron synapses where stronger than 0.5mV on average, as well as being more than 10% stronger on average than the left container range-sensor to left motor neuron synapses. The equivalent also had to be true for the right container range-sensor synapses for the robot to be deemed correct. Food Collection Rate in Food−Container Environment Benchmark Fixed High Container−Dopamine Container−Dopamine Learning Enabled No Container Dopamine Learning Disabled Collection Rate (collections per second) 0.5 0.4 0.3 0.2 0.1 0 0 200 400 600 800 1000 Time (seconds) 1200 1400 1600 1800 2000 Figure 4.20: The averaged score over time for five different robots run in a 300cmx300cm environment with 20 food-items contained in containers. There are several interesting properties shown in these figures. Firstly, note that all the robots managed to perform better than the robot with learning disabled that performed a random walk whilst outside the containers. This means that even the robot which did not receive any dopamine when the container touch-sensors were stimulated (No Container Dopamine) was able to learn some food-container attraction behaviour, from table 4.2 we can see that it managed to learn container attraction in 50% of cases. This is due to the fact that there is on average 800ms between entering a container and food being collected. This is small enough that DA-modulated STDP can still have a small effect on potentiating the synapses that cause container attraction behaviour. The next thing to notice is that both the robot with fixed strong weights between food-container sensors and dopaminergic neurons (Fixed High Container Dopamine), and the robot that has to learn to poten49 Robot Type Learning Disabled No Container-Dopamine Container-Dopamine Learning Enabled Fixed High ContainerDopamine Benchmark Mean Food Collected 224 348.5 446.7 Std. Deviation Food Collected 32.8 87.5 103.4 % Correct 0 50 96 529.7 152.5 94 808.4 21.5 100 Table 4.2: This table shows the total amount of food collected for the three robots, averaged over the 50 trials. tiate these synapses (Container Dopamine Learning Enabled ), perform better than the robot without any dopamine response to the food-container touch-sensor. They are both able to learn food-container attraction behaviour in about 95% of cases. This shows that by being able to learn to elicit a dopamine response to a reward-predicting stimulus helps in being able to learn a sequence of behaviours needed for the agent to get a reward. As expected, the robot which starts with its food-container touch-sensor to dopaminergic neurons already fully potentiated is able to learn food-container attraction behaviour faster than the robot which has to learn to potentiate these neurons before stimulating the food-container touch-sensor will elicit a dopamine response. Figure 4.21 shows the mean synaptic weight between the food-container touch-sensor and dopaminergic neurons for the robot with container to dopamine plasticity enabled. As can be seen the robot is able to correctly potentiate these synaptic weights. As these synapses potentiate the robot is able to learn foodcontainer attraction behaviour, this is shown by the fact that food collection rate for this robot slowly rises until it is equal to the robot that had its container touch-sensor to dopaminergic synapses strong from the start. Food−Container to Dopaminergic Neurons Synaptic Weight Mean Synaptic Weight (mV) 0.2 0.15 0.1 0.05 0 0 200 400 600 800 1000 1200 Time (seconds) 1400 1600 1800 2000 Figure 4.21: The average synaptic weight between the food-container touch-sensor neurons and the dopaminergic neurons, over the 50 trials, is shown for the Container Dopamine Learning Enabled robot. The last thing to note about the food collection rate in figure 4.20 is that none of the robots with learning enabled are able to match the food collection rate of a hard-coded optimal robot. To see why this is the case, the synaptic weights for container range-sensor to motor synapses have been plotted in figure 4.22 for the robot with a fixed high container touch-sensor dopamine response (Fixed High Container-Dopamine). The mean synaptic weights for container attraction plateau at a value less than the maximum possible. With 85% connection probability and a maximum single synapse weight of 4mV, the maximum mean synaptic weight between a group of sensor neurons and a group of motor neurons is 3.4mV. The reason that they level off at a lower value is due to the motor neuron differentiation that was discussed in section 4.2.2 (figure 4.11). Some motor neurons have differentiated to only respond to container-avoidance behaviour and as such will not become potentiated. In addition the synapses for container avoidance have also had their synaptic weights increased, though to a lesser extent, this is due to the negative baseline level of dopamine. This mechanism was discussed in more depth in section 4.2.2. These two mechanisms are needed for the robot to be able to modify its behaviour if the environment changes. As a direct consequence of this ability to cope with a dynamic environment, the 50 robot does not perform as well as a robot with a fixed, optimal, set of weights for this environment. The greater difference in synaptic weights allows the benchmark robot to respond to very weak sensory input, from the edge of the sensors range, and as such perform taxis from further away. Container Range Sensor to Motor Synaptic Weights for Fixed High Container−Dopamine Robot 1.6 Mean Synaptic Weight (mV) 1.4 Left Sensor −> Left Motor Left Sensor −> Right Motor Right Sensor −> Left Motor Right Sensor −> Right Motor 1.2 1 0.8 0.6 0.4 0.2 0 0 200 400 600 800 1000 1200 Time(seconds) 1400 1600 1800 2000 Figure 4.22: Mean synaptic weights between container sensor neurons and motor neurons for the Fixed High Container-Dopamine robot in the food-container environment. It is interesting to look at what happens in the case where the robot does not learn the correct behaviour. Figure 4.23 shows the mean synaptic weights over time from the left container sensor to both motors, for a single trial of the Fixed High Container Dopamine robot, in which the robot failed to learn correctly. What can be seen from this figure is that if the synaptic weights from sensor neurons to both motors are close in value and both strong then the synaptic weights are increased and decreased in a synchronous fashion. The reason for this is that if the left sensor is connected strongly to both motors, then stimulating the left sensor will have the same effect on all motor neurons, they will fire in response. This means that the eligibility traces between the sensor and the two motors will all increase together and as such the synaptic weights will increase or decrease together. In this way, once the synapses for avoidance and attraction have both become potentiated, it is hard for the robot to learn to only increase the synaptic weights needed for attraction behaviour. Left Container Sensor Synaptic Weights for Failed Learning Mean Synaptic Weight 3 2.5 2 1.5 Left Sensor −> Left Motor Left Sensor −> Right Motor 1 0.5 0 0 200 400 600 800 1000 Time(seconds) 1200 1400 1600 1800 2000 Figure 4.23: The synaptic weights between the left container sensor and the left and right motor neurons is shown for an example where the robot was unable to learn container attraction behaviour. The weights have become synchronized and rise and fall together. The cause for both sets of synaptic weights to become high in the first place is that it is still possible 51 for the robot to collect food items even if it isn’t performing container attraction behaviour. For example, if the robot was just to constantly drive straight then purely by chance it will run into a food container and as such have the synaptic weights between all sensors and all motors increased. Due to random exploration it may happen that this will occur a few times in a row, at which point the robot will get ’stuck’ performing this sub-optimal behaviour. 4.6 Dual Behaviour Learning Finally, we demonstrate the ability of the robot to learn two different, sequential, behaviours at the same time. These behaviours being food-attraction and container-attraction. 4.6.1 Experimental Set-up The same environmental set-up as in section 4.5 was used; 20 food containers randomly positioned in a 300cmx300cm environment. Three different robots were run in this environment for 50 trials, with 5000 seconds for each trial. The three robots were: • Random Walk - This robot had all sensor to motor connections set to zero and plasticity switched off, food is only collected by randomly driving into it. • Benchmark - This robot has all synaptic weights for food-attraction and container-attraction behaviour set to their maximum value. All other sensor to motor synaptic weights were set to zero, and plasticity was switched off. • Learning Enabled - Initially all sensor to motor synapses are set to zero, plasticity is enabled for these synapses. In addition food-container touch-sensor to dopaminergic neuron synapses were initially set to zero, and plasticity was enabled for these synapses. 4.6.2 Results and Discussion The average food collection rate over time for the three robots is shown in figure 4.24. The collection rate for the learning robot, after 5000 seconds, is comparable to the robots with food-taxis behaviour hard-coded in the previous section (see figure 4.20). The learning robot was able to learn both food-attraction and container-attraction behaviour (the same definition of correctness as in sections 4.2.2 and 4.5 was used) in 82% of the trials. This is slightly worse than the 94% figure achieved when food-attraction behaviour was hard-coded. This is to be expected, as there will be longer periods between food collection and as such there is more chance that random fluctuations in synaptic weight cause two sensor to motor groups to become synchronized, as described in section 4.5. In figure 4.25 the mean synaptic weights for the learning robot, averaged over the 50 trials, is shown. The first behaviour to be learnt is food-attraction, as shown by the quick potentiation of the corresponding synapses. After this, the container-dopamine response and container-attraction behaviour are learnt in parallel. With the container-attraction behaviour being reinforced by the corresponding increase in release of dopamine. 52 Food Collection Rate in Food−Container Environment (Dual Behaviour Learning) 0.5 0.45 Collection Rate (collections per second) 0.4 0.35 0.3 0.25 0.2 Benchmark Learning Enabled Random Walk 0.15 0.1 0.05 0 0 500 1000 1500 2000 2500 3000 Time (seconds) 3500 4000 4500 5000 Figure 4.24: The collection rate over time, averaged over all trials, for each of the robots is shown. The robot with learning enabled increases its collection rate over time. 53 Food Sensor to Motor Connections in the Food−Container Environment (Dual Learning) Mean Synaptic Weight (mV) 2.5 Left Food Sensor −> Left Motor Left Food Sensor −> Right Motor Right Food Sensor −> Left Motor Right Food Sensor −> Right Motor 2 1.5 1 0.5 0 0 500 1000 1500 2000 2500 Time(seconds) 3000 3500 4000 4500 5000 4500 5000 (a) Food Sensor to Motor Synaptic Weights Container Sensor to Motor Connections in the Food−Container Environment (Dual Learning) Mean Synaptic Weight (mV) 2.5 Left Container Sensor −> Left Motor Left Container Sensor −> Right Motor Right Container Sensor −> Left Motor Right Container Sensor −> Right Motor 2 1.5 1 0.5 0 0 500 1000 1500 2000 2500 3000 Time(seconds) 3500 4000 (b) Container Sensor to Motor Synaptic Weights Food−Container to Dopaminergic Synaptic Weights in the Food−Container Environment (Dual Learning) Mean Synaptic Weight (mV) 0.25 0.2 0.15 0.1 0.05 0 0 500 1000 1500 2000 2500 3000 Time (seconds) 3500 4000 4500 5000 (c) Food-Container Touch-Sensor to Dopaminergic Neurons Synaptic Weights Figure 4.25: Synaptic weights for the dual learning robot in the food-container environment. (a) shows the mean synaptic weights between the food range-sensors and the motors. The synapses for food-attraction behaviour are quickly potentiated. (b) shows the mean synaptic weights between the food-container rangesensors and the motors. The synapses for container-attraction behaviour are potentiated, but at a slower rate. (c) shows the mean synaptic weight between the food-container touch-sensor and the dopaminergic neurons. Once food-attraction behaviour is learnt, these synapses are slows potentiated. 54 Chapter 5 Conclusions 5.1 Reinforcement Learning Comparing the properties of our implementation with classical reinforcement learning algorithms (an outline of which is given in section 2.3) we can see that several properties of our model have correlates with the TD-Error reinforcement learning algorithms. The most obvious of which is the eligibility trace that is stored within the synapses. This directly correlates with the eligibility trace as it is defined in standard reinforcement learning algorithms such as Sarsa(λ). The role of this eligibility trace in both situations is to allow the agent to learn much faster, and over a greater time frame. If the case of our novel exploration strategy whereby we randomly stimulate the motors with a small current, this can be considered as analogous to off-policy reinforcement learning algorithms. Whereby the probability of choosing an action is related to the expected reward. In our implementation, as the strength of a behaviour increases, and as such the confidence that it will produce the best reward increases, the probability of performing exploratory behaviour decreases. In reinforcement learning algorithms the value function is propagated through the state space. For example, initially only the goal state will have a positive value associated with it. After repeated exploration of the environment then the states close to the goal state will have positive value function. This is similar to the way in which our network is able to learn a dopaminergic neural response for stimulus that often precede food collection. The key difference between our implementation and reinforcement learning algorithms is that in standard reinforcement learning algorithms the value function is updated based on the difference between expected and received reward. For example if the value function predicts a reward of 0.8 and the agent subsequently receives a reward of 0.4, then the value function is decremented. The value function can be thought of as analogous to the strength of connections to dopaminergic neurons. The model used in this paper is not able to produce this negative response when a trained reward-predicting stimulus is subsequently stimulated but not paired with a reward. For example, if a robot is trained in the food-container environment and then we remove the food items from the food-containers. The network will still elicit a dopamine response when the food-container touch-sensor is stimulated and as such food-container attraction behaviour will not become unlearnt. This is the main limitation of our implementation and possible solutions are discussed in section 6. Our implementation provides a method of reinforcement learning in continuous parameter spaces. Standard reinforcement learning algorithms are designed for state and actions spaces that have been discretized. Being able to operate with continuous spaces directly allows an agent to generalize much more easily when a previously unseen environmental state is encountered. 5.2 Biological Plausibility and Conclusions In this paper we have shown that by allowing the baseline level of dopamine to be negative the robot is able to relearn when its current behaviour is not producing a reward. In the brain the level of dopamine cannot become negative, though it may be that there is another type of pain neurotransmitter that acts in the reverse way to dopamine and as such has the effect of reducing highly active synapses, though whether or not one exists is currently unknown. One consequence of our model was that over time motor neurons tended to differentiate themselves to only respond to a single sensor. This is an interesting property as it provides a mechanism as to how a group of neurons in the brain can self organize into functionally different subgroups. 55 In the brain it has been shown that dopaminergic neurons have two different states of activity, these being background firing and bursting activity when stimulated, such that background firing does not result in a significant level of dopamine increase [22]. In our model we have shown that by separating dopaminergic neuron activity into these two distinct groups the robot is able to learn a dopamine response for a rewardpredicting stimulus much more reliably. This provides one possible explanation for why dopaminergic neurons have these two different firing states. 56 Chapter 6 Future Work Several mechanisms that our robot used were explicitly programmed, separate to the neural network itself. It would be advantageous to provide an implementation of these within the spiking neural network. Such that they can be subject to plasticity and modified in response to environmental changes along with the rest of the network. These mechanisms, and a possible SNN implementation are given below: • Phasic Activity - The sensor neurons were stimulated at a rate of 14Hz, rather than being given a constant input current. EEG recordings show that the brain also exhibits neural oscillatory behaviour. A group of interconnected inhibitory neurons when provided constant input current will generate oscillatory firing. This group of neurons could be used a control group and connected to the sensory neurons, forcing them to fire in an oscillatory manner. • Winner-Takes-All - We explicitly implemented a winner takes all mechanism between sensors and between motors. One way in which this could possibly be implemented directly in the SNN is shown in figure 6.1. • Exploration - We explicitly stimulated the motors to provide exploratory behaviour. However, if the phasic activity and winner-takes-all mechanisms were implemented directly in the network as described above then no explicit exploration behaviour would be needed. The combination of background firing and winner-takes-all would ensure that only one set of motor neurons was active at any one time, whilst the phasic activity would allow the active motor to optionally switch during the inactive phase of the neurons. Simulus 1 Stimulus 2 Stimulus 1 Neurons Stimulus 2 Neurons Inhibitory Group 1 Inhibitory Group 2 External Inputs Excitatory Neurons Inhibitory Neurons Figure 6.1: An example of how a winner-takes-all mechanism can be implemented in a SNN. Each set of stimulus neurons acts to inhibit the other until the network reaches a stable state where only one group is active. The main limitation in the approach taken in this paper is that the robot cannot unlearn an already learnt dopamine response. To be able to do this a fuller SNN implementation of the TD-error algorithm would need to be implemented, whereby the dopamine response would correspond to the difference between expected reward and perceived reward. To be able to do this requires the SNN to have a short-term memory. Chorley & Seth [31] have shown a network architecture where the level of dopamine corresponds to the difference between perceived and expected reward through the use of a model of short-term memory. Future work would incorporate this network architecture into the robot to allow sequential behaviours to be unlearnt. Another obvious extension to the work in this paper would be to implement the control architecture in a real, rather than simulated, robot. In this case the robot would need to be able to deal with collision 57 avoidance, which could possibly be solved through a similar reinforcement learning mechanism as described in this paper. 58 Bibliography [1] Izhikevich, E. (2007) Solving the distal reward problem through linkage of stdp and dopamine signaling. Cerebral Cortex , 17, 2443–2452. [2] Chorley, P. and Seth, A. (2008) Closing the sensory-motor loop on dopamine signalled reinforcement learning. Proceedings of the 10th international conference on Simulation of Adaptive Behavior: From Animals to Animats, Berlin, Heidelberg, pp. 280–290, SAB ’08, Springer-Verlag. [3] Iannella, N. and Back, A. (2001) A spiking neural network architecture for nonlinear function approximation. Neural Networks, 14, 933 – 939. [4] Hodgkin, A. and Huxley, A. (1952) A quantitative description of membrane current and its application to conduction and excitation in nerve. The Journal of Physiology, 117, 500–544. [5] Brunel, N. and van Rossum, M. (2007) Lapicques 1907 paper: from frogs to integrate-and-fire. Biological Cybernetics, 97, 337–339. [6] FitzHugh, R. (1961) Impulses and physiological states in theoretical models of nerve membrane. Biophysical J., 1, 445–466. [7] Hindmarsh, J. and Rose, R. (1984) A model of neuronal bursting using three coupled first order differential equations. Proceedings of the Royal Society of London. Series B. Biological Sciences, 221, 87–102. [8] Izhikevich, E. (2003) Simple model of spiking neurons. Neural Networks, IEEE Transactions on, 14, 1569 – 1572. [9] Rosenblatt, F. (1962) Principles in neurodynamics. Spartan Books. [10] Widrow, B., Stearns, S., and Burgess, J. (1986) Adaptive signal processing edited by bernard widrow and samuel d. stearns. The Journal of the Acoustical Society of America, 80, 991–992. [11] Werbos, P. (1974) Beyond Regression: New Tools for Prediction and Analysis in the Behavioral Sciences. Ph.D. thesis, Harvard University, Cambridge, MA. [12] Sutton, R. and Barto, A. (1998) Reinforcement Learning: An Introduction (Adaptive Computation and Machine Learning). The MIT Press. [13] Bienenstock, E., L., C., and P., M. (1982) Theory for the development of neuron selectivity: orientation specificity and binocular interaction in visual cortex. The Journal of Neuroscience, 2, 32–48. [14] Markram, H., Lbke, J., Frotscher, M., and Sakmann, B. (1997) Regulation of synaptic efficacy by coincidence of postsynaptic aps and epsps. Science, 275, pp. 213–215. [15] Song, S. and Abbott, L. (2001) Cortical development and remapping through spike timing-dependent plasticity. Neuron, 32, 339 – 350. [16] Izhikevich, E. and Desai, N. (2003) Relating stdp to bcm. Neural Computation, 15, 1511–1523. [17] Otmakhova, N. and Lisman, J. (1996) D1/d5 dopamine receptor activation increases the magnitude of early long-term potentiation at ca1 hippocampal synapses. The Journal of Neuroscience, 16, 7478–7486. [18] Chinta, S. and Andersen, J. (2005) Dopaminergic neurons. The International Journal of Biochemistry & Cell Biology, 37, 942 – 946. [19] Miller, E., Freedman, D., and Wallis, J. (2002) The prefrontal cortex: categories, concepts and cognition. Philos.Trans.R.Soc.B-Biol.Sci., 357, 1123–1136. 59 [20] Ping, H. and Shepard, P. (1996) Apamin-sensitive ca2+-activated k+ channels regulate pacemaker activity in nigral dopamine neurons. Neuroreport, 7, 809–814. [21] Overton, P. and Clark, D. (1997) Burst firing in midbrain dopaminergic neurons. Brain Research Reviews, 25, 312 – 334. [22] Lisman, J. (1997) Bursts as a unit of neural information: making unreliable synapses reliable. Trends in Neurosciences, 20, 38 – 43. [23] Matsumoto, M. and Hikosaka, O. (2009) Two types of dopamine neuron distinctly convey positive and negative motivational signals. Nature, 459, 837–841. [24] Frey, U. and Morris, R. (1997) Synaptic tagging and long-term potentiation. Nature; Nature, 385, 533–536. [25] Ppper, M., Kempter, R., and Leibold, C. (2011) Synaptic tagging, evaluation of memories, and the distal reward problem. Learning & Memory, 18, 58–70. [26] Redondo, R. and Morris, R. (2011) Making memories last: the synaptic tagging and capture hypothesis. Nature reviews.Neuroscience, 12, 17. [27] Hull, C. (1943) Principles of behavor: an introduction to behavior theory. Appleton-Century. [28] Pavlov, I. (1927) Conditioned reflexes. Oxford University Press. [29] Pan, W., Schmidt, R., Wickens, J., and Hyland, B. (2005) Dopamine cells respond to predicted events during classical conditioning: Evidence for eligibility traces in the reward-learning network. The Journal of Neuroscience, 25, 6235–6242. [30] Ljungberg, T., Apicella, P., and Schultz, W. (1991) Responses of monkey midbrain dopamine neurons during delayed alternation performance. Brain Research, 567, 337 – 341. [31] Chorley, P. and Seth, A. (2011) Dopamine-signalled reward predictions generated by competitive excitation and inhibition in a spiking neural network model. Frontiers in Computational Neuroscience, 5. [32] Brown, J., Bullock, D., and Grossberg, S. (1999) How the basal ganglia use parallel excitatory and inhibitory learning pathways to selectively respond to unexpected rewarding cues. The Journal of Neuroscience, 19, 10502–10511. [33] Tan, C. and Bullock, D. (2008) A local circuit model of learned striatal and dopamine cell responses under probabilistic schedules of reward. The Journal of Neuroscience, 28, 10062–10074. [34] Schultz, W. and Romo, R. (1990) Dopamine neurons of the monkey midbrain: contingencies of responses to stimuli eliciting immediate behavioral reactions. Journal of Neurophysiology, 63, 607–624. [35] Schultz, W. (1998) Predictive reward signal of dopamine neurons. Journal of Neurophysiology, 80, 1–27. [36] Ljungberg, T., Apicella, P., and Schultz, W. (1992) Responses of monkey dopamine neurons during learning of behavioral reactions. Journal of Neurophysiology, 67, 145–163. [37] Turrigiano, G. (1999) Homeostatic plasticity in neuronal networks: the more things change, the more they stay the same. Trends in Neurosciences, 22, 280 –. [38] Turrigiano, G., Leslie, K., Desai, N., Rutherford, L., and S.B., N. (1998) Activity-dependent scaling of quantal amplitude in neocortical neurons. Nature, 391, 892. [39] Adrian, E. and Zotterman, Y. (1926) The impulses produced by sensory nerve endings: Part ii: The response of a single end organ. Journal of Physiology, 61, 151–171. [40] Maunsell, J. and Van Essen, D. (1983) Functional properties of neurons in middle temporal visual area of the macaque monkey. i. selectivity for stimulus direction, speed, and orientation. Journal of Neurophysiology, 49, 1127–1147. [41] Zador, S. and Charles, A. (1995) The enigma of the brain. Current Biology, 5. [42] Braitenberg, V. (1984) Vehicles : experiments in synthetic psychology. MIT Press. 60 [43] Indiveri, G. (1999) Neuromorphic analog vlsi sensor for visual tracking: circuits and application examples. Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions on, 46, 1337 –1347. [44] Lewis, M., Etienne-Cummings, R., Cohen, A., and Hartmann, M. (2000) Toward biomorphic control using custom avlsi cpg chips. Robotics and Automation, 2000. Proceedings. ICRA ’00. IEEE International Conference on, vol. 1, pp. 494 –500 vol.1. [45] Hagras, H., Pounds-Cornish, A., Colley, M., Callaghan, V., and Clarke, G. (2004) Evolving spiking neural network controllers for autonomous robots. Robotics and Automation, 2004. Proceedings. ICRA ’04. 2004 IEEE International Conference on, april-1 may, vol. 5, pp. 4620 – 4626 Vol.5. [46] Bouganis, A. and Shanahan, M. (2010) Training a spiking neural network to control a 4-dof robotic arm based on spike timing-dependent plasticity. Neural Networks (IJCNN), The 2010 International Joint Conference on, july, pp. 1 –8. [47] Vasilaki, E., Fremaux, N., Urbanczik, R., Senn, W., and Gerstner, W. (2009) Spike-based reinforcement learning in continuous state and action space: when policy gradient methods fail. PLoS computational biology, 5, 1000586. [48] Gupta, A. and Long, L. (2009) Hebbian learning with winner take all for spiking neural networks. Neural Networks, 2009. IJCNN 2009. International Joint Conference on, june, pp. 1054 –1060. [49] Timofeev, M. and Bazhenov, I. (2006) Thalamocortical oscillations. Scholarpedia, 1, 1319. 61
9cs.NE
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 A COMPARATIVE STUDY ON REMOTE TRACKING OF PARKINSON’S DISEASE PROGRESSION USING DATA MINING METHODS Peyman Mohammadi1, Abdolreza Hatamlou 2 and Mohammad Masdari3 1 Department of Computer Engineering, Science and Research Branch, Islamic Azad University, West Azerbaijan, Iran 2 Islamic Azad University, Khoy Branch, Iran 3 Department of Computer Engineering, Urmia Branch, Islamic Azad University, Urmia, Iran ABSTRACT In recent years, applications of data mining methods are become more popular in many fields of medical diagnosis and evaluations. The data mining methods are appropriate tools for discovering and extracting of available knowledge in medical databases. In this study, we divided 11 data mining algorithms into five groups which are applied to a dataset of patient’s clinical variables data with Parkinson’s Disease (PD) to study the disease progression. The dataset includes 22 properties of 42 people that all of our algorithms are applied to this dataset. The Decision Table with 0.9985 correlation coefficients has the best accuracy and Decision Stump with 0.7919 correlation coefficients has the lowest accuracy. KEYWORDS Data Mining, Knowledge Discovery, Pattern Recognition, Parkinson’s disease 1. INTRODUCTION The Parkinson’s Disease (PD) is a chronic neurological disorder with an unknown etiology, which usually affects people over 50 years old [1]. It was reported that the Parkinson, beyond many unknown cases, has affected one million people [2]. It is expected that as the age of earth’s population increases, the number of patients with PD also increases. The number of Parkinson’s disease (PD) patients is estimated to be 120–180 out of every 100,000 people, although the percentage (and hence the number of affected people) is increasing as the life expectancies increase. The causes of Parkinson’s disease (PD) are unknown; however, researches have shown that the degradation of the dopaminergic neurons affects the dopamine production [3].The PD symptoms include limb tremor (especially at rest), muscles stiffness and movement slowness, difficulty in walking, balance and coordination (especially when beginning of motion), difficulty in eating and swallowing, and vocal disorder and mood disorders [4, 5, 6]. This disease causes voice disorder in 90% of patients [7]. Dysarthria is a motor speech disorder that indicates inability in expression properly. It’s observable in patients with PD to have hypokinetic dysarthria, and its classical symptoms include reduced vocal loudness (hypophonia), monopitch, disruption of voice quality, and abnormally fast rate of speech [8]. For decades, researchers have strived to understand more 71 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 about this disease and therefore to find some methods for successfully limiting its symptoms which are most commonly periodic muscle tremor and/or rigidity. Other symptoms such as akinesia, bradykinesia, and dysarthria may occur in later stages of PD [9]. In recent years, development and innovation in fusion data equipment such as sensors in scientific and medicine areas has led to production of massive data values. The modern medicine produces massive amounts of data stored in databases whose use of these large values of data is timeconsuming and in some cases it is impossible. In this regard, we can use some data mining methods to perform this difficult task. Of course, all data mining methods have their own limitations and constraints and are our task to compare methods and algorithms to choose the best and most useful method. The term used as “Data Mining”, was introduced in the 1990s; however data mining is the progress and improvement of a field with a long history [10]. As datasets are growing in size, applications and complexity, Direct hands-on data analysis has increasingly been augmented with indirect, automatic data processing. This has been achieved by other discoveries in computer science such as artificial neural networks (ANNs), classification and clustering algorithms plans. Data mining techniques and algorithms has been accomplished for genetic algorithm (GA) in the 1950s, and for decision trees (DTs) in the 1960s. Also it’s a supported vector machine (SVM) in 1990s methods [11]. The first use of data mining techniques in health information systems (HIS) and clinical application was fulfilled with the expert systems developed since the 1970s [12]. Given to knowledge, experience and the sense of physicians, medicine decisions and reviews are done, and because of massive amount of medicine data which are kept in medical clinics and health centers, the data mining methods can be appropriate tools for discovering available knowledge in this database to help the physicians with diagnosis, treatment and tracking process. The rest of this paper is organized as follows. First explained data mining techniques and algorithms used in this study in the next section; and data mining application in healthcare field are described in Section 3. Then the data mining algorithms are categorized and applied to a special dataset in Section 4. The results are analysed and discussed in Section 5. Finally, some concluding remarks and proofs outcome as well as future research lines are presented in Section 6. 2. D ATA MINING Database pertaining to trade, agriculture, cyberspace, details of phone calls, medical data and etc. are collected and stored very rapidly with the development of information technology, data collection and production methods. So, since three decades ago, the human was thinking about a new method to access hidden data in this huge and large database because the traditional systems were not able to do so. Competition in economic, scientific, political, military fields and the importance of access to useful information among a high amount of data without human intervention caused the data analysis science or data mining to be established. The concept of data mining has been developed in the late 1980s, which went further during 10 years later [13]. Data mining is the process of discovering meaningful new correlations, patterns and trends by sifting and investigating through large amounts of data stored in repositories, using pattern recognition technologies as well as statistical and mathematical techniques (Gartner Group). As like as mining gold through huge rocks and large amount of soils, data mining is extracting beneficial knowledge from bulky data sets. But they aren’t entirely the same; there is a fine point which is data mining but it isn’t just searching and gaining knowledge, it is to obtain knowledge by analysing and reconsidering [14]. 72 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 Many people consider data mining as equivalent of another commonly used term, Knowledge Discovery from Data, or the KDD. Alternatively, others view data mining as simply an indispensable step in the process of knowledge discovery [12]. Typically, the steps of knowledge discovery (KD) are divided into 7 phases. Four primary steps are pre-processing data and different forms of data preparation for data mining. As mentioned above, data mining as a fifth steps, is one of the necessary steps of this process. Finally, two last steps have the task of identifying useful patterns and displaying it to user. Below there is a brief description of these steps:        Data cleaning: clean incompatible data and noises. Data integration: integrate multiple sources, if any. Data selection: restore data related to analysis and evaluate database. Data transformation: transform or modulate data into searchable forms by summarizing or aggregating. Data mining: process of applying intelligent algorithms to exploiting data patterns. Pattern evaluation: identify related patterns. Knowledge presentation: present extracted knowledge to users using presentation techniques and visual modeling. Therefore data mining is a step in the KDD process consisting of a particular enumeration of patterns over the data, subjected to some computational limitations. The term pattern goes beyond its traditional concept and notion to include structures or models in the data warehouses. Historical data are used to discover regularities and improve future decisions [15]. The goals of data mining are to divide it into two general types as predictive and descriptive [12]. By application of the predictive type, we understand that application of the model which attempts to ‘predict’ the value that a certain variable may take ,given what we know at present [16]. Descriptive data mining characterizes the generic attributes of the data in the database [12]. 3. D ATA MINING IN H EALTHCARE Today, in medical areas, data collection about different diseases is very important. Medical centers with different purposes are to collect these data. To survey these data and to obtain useful results and patterns in relation to disease is one of the objectives of the use of these data. Collected data volume is very high and we must use data mining techniques to obtain desired patterns and results among massive volume of data. Medical and health areas are one of the most important sections in industrial societies. The extraction of knowledge among massive volume of data related to diseases and people medical records using data mining process can be lead to identifying the laws governing the creation, development and epidemic diseases. We can allow expertise and health area staffs to access these valuable data according to the environmental factors in order to identify diseases causes, anticipate and treat the diseases. Finally, this means extending the life and comforting people in the community. For example some medicine applications of data mining are:    Predicting health care costs. Determination of disease treatment. Analyzing and processing medical images. 73 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013     Analyzing health information system (HIS). Effect of drugs on the disease and its side effects. Predicting the success rate of medicine operations like surgeries. Diagnosing and predicting of most kind of diseases such as cancer. In a study published in 2011, Cheng-Ding Chang et al. used data mining techniques for predicting the incidental multi-disease (hypertension and hyperlipidemia). They presented a two-phase analysis procedure to simultaneously predict both hypertension and hyperlipidemia. Firstly they chose six data mining approaches, and then they used these algorithms to select the individual risk factors of these two diseases, afterward determined the common risk factors using the voting principle. Next, they used the Multivariate Adaptive Regression Splines (MARS) method to construct a multiple predictive model for hypertension and hyperlipidemia. This study used data from a physical examination center database in Taiwan that included 2048 subjects. The proposed multi-disease predictor method in this study has a classification accuracy rate of 93.07% [17]. Also Ömer Eskidere and two other colleagues studied the performance of Support Vector Machines (SVM), Least Square Support Vector Machines (LS-SVM), Multilayer Perceptron Neural Network (MLPNN), and General Regression Neural Network (GRNN) regression methods in application to remote tracking of Parkinson’s disease progression. It is found that using LS-SVM regression with log-transformation, the estimated motor-UPDRS is within 4.87 points (out of 108) for log-FS-4 feature set and total-UPDRS is within 6.18 points (out of 176) for Log-FS-4 feature set of the clinicians’ estimation [18]. In one of the last-mentioned ascertainments in current year (2013), Daniel Ansari et al. enquired about Artificial Neural Networks (ANNs) as nonlinear pattern recognition techniques that can be used as a tool in medical decision making. Based on ANNs, by using clinical and histopathological data from 84 patients a flexible nonlinear survival model was designed. After the use of ANNs for predicting survival in pancreatic cancer, the C-index was 0.79 for the ANN and 0.67 for Cox regression [19]. 4. P ROPOSED METHODS AND IMPLEMENTATION Data mining has wide and common uses in classification and recognition of the problems of health systems. In this section, we describe the materials and methods which are used in current research. Depending on the situation and desired outcome, there are various types of data mining algorithms that you can use. All experiments described in this paper were performed using libraries from Weka 3.7.9 machine learning environment. Before building models, the data set were randomly split into two subsets: 75% (n=4406) of the data for training set and 25% (n=1469) of the data for test set and all of data mining methods apply to total-UPDRS property. 4.1. Data Set Parkinson’s telemonitoring dataset was created by Athanasios Tsanas and Max Little of the University of Oxford, in collaboration with 10 medical centers in the US and Intel Corporation which developed the AHTD telemonitoring device to record the speech signals [6]. Dataset has been made available online at UCI machine learning archive very recently in October 2009. This dataset consists of around 200 recordings per patient from 42 people (28 men and 14 women) with early-stage PD which makes a total of 5875 voice recordings. Each patient is recorded with phonations of the sustained vowel /a/. The dataset contains 22 attributes including subject number, subject age, subject gender, time interval from baseline recruitment data, motor-UPDRS, total-UPDRS, and 16 biomedical voice measures (vocal features).The vocal features in the dataset 74 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 are diverse, some of them based on traditional measures (Jitter, shimmer, HNR and NHR), and some (RPDE, DFA, PPE) are based on nonlinear dynamical systems theory. In the dataset, Motor-UPDRS and total-UPDRS were assessed at baseline (onset of trial), three-and-six-month Table 1. Description of the features and UPDRS scores of the Parkinson’s telemonitoring dataset. trial periods, but the voice recordings were obtained at weekly intervals. Hence both MotorUPDRS and total-UPDRS linearly interpolated [6]. Table.1 represents baseline, after three and six months, UPDRS scores with the feature labels and short explanations for the measurement along with some basic statistics of the dataset. 4.2. Functions 4.2.1. Simple Linear Regression (SLR) The simple linear regression model y = α + βx + e, with measurement error (errors-in-variables model) has been subject to extensive research in the statistical literature for over a century. It is well known that the simple linear regression model with error in the predictor x is not identifiable without any extra information in the normal case. In statistics, simple linear regression is the least squares estimator of a linear regression model with a single explanatory variable. In other words, simple linear regression fits a straight line through the set of n points in such a way that makes the sum of squared residuals of the model (that is, vertical distances between the points of the data set and the fitted line) as small as possible [20]. So in the simple linear regression model, the observations yi are generated according to: yi    xi  ei , i=1, …, n. 75 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 where α is the intercept parameter, β the slope parameter, xi the explanatory variables and finally ei the error terms. If α=0 we obtain the simple linear regression model without intercept. yi   xi  ei , i=1, …, n. You can see a simple linear regression model in Figure.1 that shows this model’s parameters. Figure 1. Simple Linear Regression Model. 4.2.2. Multi-Layer Perceptron (MLP) An MLP is based on single perceptron that was introduced by Rosenblatt [21].The network contains an input layer, a hidden layer and an output layer. Each neuron at one layer receives a weighted sum from all neurons in the previous layer and provides an input to all neurons of the later layer [22]. Figure 2. MLP structure that used. However there is merely a single neuron in the output layer. The architecture of the Neural Network, used in this research, is the multilayer perceptron network architecture with 22input nodes, 13 hidden nodes in our approach. We showed the MLP structure used in this study in. The number of input nodes is determined by the ultimate data; the number of hidden nodes is determined through trial and error; and the number of output nodes is represented as a rage, demonstrating the disease classification. Each neuron at one layer receives a weighted sum from all neurons in the previous layer and provides an input to all neurons of the later layer. 76 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 4.2.3. SMOreg The Sequential Minimal Optimization (SMO) algorithm on classification tasks defined on sparse data sets has been shown to be an effective method for training SVM. SMOreg implements a sequential minimal optimization algorithm for training a support vector regression model. This implementation globally replaces all missing values and transforms nominal attributes into binary ones [23]. It also normalizes all attributes by default. We ‘normalized’ training dataset used the ‘polynomial’ kernel: K(x, y) = <x, y>^p or K(x, y) = (<x, y>+1) ^p for kernel and used ‘RegSMO’ to optimizing. 4.3. Rules 4.3.1. M5Rules Generate a decision list for regression problems used to divide and to conquer. It builds a model tree using M5 and makes the “best” leaf into a rule in each iteration of progress. The method for generating rules from model trees, called M5-Rules, is straightforward and works as follows; a tree learner is applied to the full training dataset and a pruned tree is learned. Then, the best branch is made into a rule and the tree is discarded. All instances covered by the rule are removed from the dataset. The process is applied recursively to the remaining instances and terminates when all instances are covered by one or more rules. This is a basic divide-and-conquer strategy for learning rules; however, instead of building a single rule, as it is usually done, we built a full model tree at each stage, and make its “best” branch into a rule. In contrast to PART (partial decision trees), which employs the same strategy for categorical prediction, M5-Rules builds full trees instead of partially explored trees. Building partial trees leads to a greater computational efficiency, and does not affect the size and accuracy of the resulting rules [24, 25, 26, 27 and 28]. In simulating this mode we set the minimum number of instances to allow at a leaf node to 4.0. 4.3.2. Decision Table The Decision Table (DT) is a symbolic way to express the test experts or design experts knowledge in a compact form [29].A decision table includes a hierarchical table. These tables consider that each entry in a higher level table gets broken down by the values of a pair of additional attributes to form another table. The structure is similar to dimensional stacking [30]. For DT implementation we used “Best First” method to find good attribute combinations for the decision table. For example in Table.2, the final row tells us to classify the applicant as Heart Failure (HF) if gender is Female, age is more than 42 and blood pressure isn’t important. 77 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 4.4. Trees 4.4.1. M5P This is an algorithm for generating M5 model trees [31]. M5 builds a tree for a given instance, to predict numeric values. When the input attributes can be either discrete or continuous the algorithm requires the output attribute to be numeric. For a given instance the tree is traversed from top to bottom until a leaf node is reached. At each node of the tree a decision is made to follow a particular branch based on a test condition on the attribute associated with that node. Each leaf node has a linear regression model associated with the form: w0  w1 a1  ...  wk a k Based on some of the input attributes a1 , a 2 ,..., a k in the instance and whose respective weights w0 , w1 ,..., wk are calculated using standard regression. The tree is called a model tree as the leaf nodes contain a linear regression model to generate the predicted output [32]. We start with a set of training instances to build a model tree, using the M5 algorithm. The tree is built using a divide-and-conquer method. The M5P Model Tree algorithm in WEKA is available in the Java class ‘‘weka.classifiers.trees.M5P”. The minimum number of instances to allow at a leaf node was 2.0 and after simulation number of rules was 170. 4.4.2. REPTree This algorithm is a fast decision tree learner. It is also based on C4.5 algorithm and can cause classification (discrete outcome) or regression trees (continuous outcome). It uses information gain/variance to building a regression/decision tree using and prunes it using reduced-error pruning (with back-fitting). Only sorts values for numeric attributes once. Missing values are dividing by splitting the corresponding instances into pieces [33]. In implement of REPTree we set the maximum tree depth to -1, it means there was no restriction. The minimum proportion of the variance on all the data that needs to be presented at a node was 0.001, which is used for splitting, to be performed in regression trees. After implementation we have a tree whose size is 675. 4.4.3. Decision Stump The decision stump is the simplest special case of a decision tree. Each decision stump consists of a single decision node and two prediction leaves. Each decision node is a rule that checks the presence or absence of specified n-gram of command sequence. The boosted decision stumps are created using a weighted voting of the decision stumps [34]. It’s usually used in conjunction with a boosting algorithm, does regression or classification. Missing is treated as a separate value. 4.5. Lazy 4.5.1. IBk This is the K-nearest neighbour classifier. We used IB1 which is the simplest instance-based learning algorithm. It gives a test instance, and to find the training instance closest to the given test instance uses a simple distance measure, and predicts the same class as this training instance. If more than one instance is the same smallest distance (multiple) to the test instance, the first one found is used. 78 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 The similarity function used here is: n Similarity ( x, y )    f (x , y ) i i i 1 Where the instances are described by n attributes and it’s 22 in our case. We define f ( xi , yi )  ( xi  yi ) 2 for numeric-valued attributes and f ( xi , y i )  ( xi  y i ) for Boolean and symbolic-valued attributes. The difference of IBI and nearest neighbour algorithm is that IBI normalizes its attributes ranges, processes instances incrementally, and unlike nearest neighbour algorithm has a simple policy for tolerating missing values [35]. In this model we used “Linear NN Search” algorithm for searching nearest neighbour which is implementing the brute force to search algorithm for nearest neighbour search in 1 nearest neighbour(s) for classification. 4.5.1. LWL Lazy learning methods defer training data process until a query needs to be answered. This algorithm to assign instance weights uses an instance-based. A good choice for classification is Naive Bayes. This implementation surveys a form of lazy learning, locally weighted learning, that uses locally weighted training to average, interpolate between, extrapolate from, or otherwise combine training data [36]. In implementation of LWL model we used all of the neighbours in weighting function which is linear function and “Linear NN Search” algorithm for searching nearest neighbour which is implementing the brute force to search algorithm with Euclidean distance (or similarity) function. 4.6. Meta 4.6.1. Regression by Discretization A class for a regression scheme that utilizes any distribution classifier on a version of the data that has the class attribute discretized. The predicted value based on the predicted probabilities for each interval is the expected value of the mean class value for each discretized interval. This class now also supports conditional density estimation by building a univariate density estimator from the target values in the training data, weighted by the class probabilities. To implement this model, J48 with C4.5 algorithm was adopted due to it abilities to apply negotiation strategies; and set Number of bins for discretization to 10 and estimator type for density estimating was histogram estimator. Our created J48 pruned tree size is 315 and it has 158 leaves node. 5. R ESULTS AND D ISCUSSION We report the results from eleven methods used to study the usefulness of the data mining algorithms for remote tracking of Parkinson’s disease progression. The data set, used in the detection of PD progression with eleven data mining methods, was divided into two subsets as Training and Test data. There were a total of 4406 pieces of data, exclusively used for training and 1469 pieces of data exclusively used for testing. The classification accuracies obtained by this study for PD dataset are presented in Table.3 You can compare and assimilate results of the algorithms in correlation coefficient, Mean absolute error, Root mean squared error, relative absolute error (in percentage) and root relative squared error (in percentage). In statistics, the Mean Absolute Error (MAE) is a quantity used to measure how close forecasts or predictions are to the eventual outcomes and the Root Mean Square Error (RMSE) is a frequently used measure of the differences between values predicted by a model or an estimator and the values actually observed. 79 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 Table 3. Experiential results of classification models. Figure.3 summarized correlation coefficient of each algorithm in categories. We notice Decision Table gave higher accuracy of correlation coefficient on our dataset (99.85%) in Rules category and M5Rules algorithm has comparatively a good accuracy equivalent to 99.67%. Figure 3. Correlation coefficient of classification models. The relative absolute error is very similar to the relative squared error in the sense that it is also relative to a simple predictor, which is just the average of the actual values. In this case, though, the error is just the total absolute error instead of the total squared error. Thus, the relative absolute error takes the total absolute error and normalizes it by dividing by the total absolute error of the simple predictor and the root relative squared error is relative to what it would have been if a simple predictor had been used. More specifically, this simple predictor is just the average of the actual values. Thus, the relative squared error takes the total squared error and normalizes it by dividing by the total squared error of the simple predictor. By taking the square root of the relative squared error one reduces the error to the same dimensions as the quantity being predicted. In Figure.4 we show these two parameters in a chart. 80 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 Figure 4. Relative absolute error and Root relative squared error of classification models. 5. C ONCLUSION AND F UTURE WORKS This experimental study compares classification performance of different eleven data mining algorithms via using of a Parkinson’s Telemonitoring dataset. This dataset comprises of 22 attributes with various ranges of values. Early detection of any kind of disease is an important factor and for PD, remote tracking of UPDRS using voice measurements would facilitate clinical monitoring of elderly people and increase the chances of its early diagnosis. Used data mining techniques are Simple Linear Regression (SLR), Multi-Layer Perceptron (MLP), SMOreg, M5Rules, Decision Table, M5P, REPTree, Decision Stump, IBk, LWL and Regression by Discretization models. The best approach for remote Parkinson’s Telemonitoring is Decision Table model also M5Rules in Rules category has a good result with correlation coefficient of 0.9967. Mathematical equations from different data mining techniques for calculating experimental results were derived. REFERENCES [1] [2] [3] [4] [5] [6] [7] Tsanas, A., Little, M. A., McSharry, P. E., & Ramig, L. O. (2010). Enhanced classical dysphonia measures and sparse regression for telemonitoring of Parkinson’s disease progression. International Conference on Acoustics, Speech and Signal Processing, 594–597. Lang, A. E., & Lozano, A. M. (1998). Parkinson’s disease – First of two parts. New England Journal Medicine, 339, 1044–1053. Höglinger GU, Rizk P,MurielMP, Duyckaerts C, OertelWH, Caille I, et al. Dopamine depletion impairs precursor cell proliferation in Parkinson disease. Nat Neurosci 2004; 7:726–35. Sakar, C. O., & Kursun, O. (2009). Telediagnosis of Parkinson’s disease using measurements of dysphonia.Journal of Medical Systems., 34(4), 591–599. Skodda, S., & Schlegel, U. (2008). Speech rate and rhythm in Parkinson’s Disease. Movement Disorders, 23, 985–992. Tsanas, A., Little, M. A., McSharry, P. E., & Ramig, L. O. (2010). Accurate telemonitoring of Parkinson’s disease progression by non-invasive speech tests. IEEE Transactions on Biomedical Engineering, 57, 884–893. Little, M. A., McSharry, P. E., Hunter, E. J., & Ramig, L. O. (2009). Suitability of dysphonia measurements for telemonitoring of Parkinson’s disease. IEEE Transactions on Biomedical Engineering, 56(4), 1015–1022. 81 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] Skodda, S., Rinsche, H., & Schlegel, U. (2009). Progression of dysprosody in Parkinson’s disease over time – A longitudinal study. Movement Disorders, 24(5), 716–722. Aziz, T. Z., Peggs, D., Sambrook, M. A., & Crossman, A. R., Lesion of the subthalamic nucleus for the alleviation of 1-methyl-4-phenyl-1,2,3,6-tetrahydropyridine (MPTP)-induced parkinsonism in the primate. Movement Disorders, 6(4), 228–292, 1992. A.A. Walter, “Data Mining Industry: Emerging Trends and New Opportunities”, Massachusetts Institute of Technology, pp. 13-15, 2000. Kantardzic, Mehmed. Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons, 2003. H. Jiawei and K. Micheline, Data Mining: Concepts and Techniques, vol. 2, Morgan Kaufmann Publishers, 2006. Zafarani,R, Jashki, M.A, Baghi,H.R , Ghorbani,A., 2008, A Novel Approach for Social Behavior Analysis of the Blogosphere, springer-Verlag Berlin Heidelberg, S. Bergler (Ed.): Canadian AI, 356–367. F. S. Gharehchopogh, Peyman Mohammadi and Parvin Hakimi. Application of Decision Tree Algorithm for Data Mining in Healthcare Operations: A Case Study. International Journal of Computer Applications 52(6):21-26, August 2012. T. M. Mitchell, "Machine learning and data mining," Communications of the ACM, vol.42, pp.30-36, 1999. Florin Gorunescu, Data Mining: Concepts, Models and Techniques, Intelligent Systems Reference Library, Vol. 12, Springer Publication, 2011. Cheng-Ding Chang, Chien-Chih Wang, Bernard C. Jiang, Using data mining techniques for multidiseases prediction modeling of hypertension and hyperlipidemia by common risk factors, Expert Systems with Applications, Volume 38, Issue 5, May 2011, Pages 5507-5513, ISSN 0957-4174. Ömer Eskidere, Figen Ertaş, Cemal Hanilçi, A comparison of regression methods for remote tracking of Parkinson’s disease progression, Expert Systems with Applications, Volume 39, Issue 5, April 2012, Pages 5523-5528, ISSN 0957-4174. Daniel Ansari, Johan Nilsson, Roland Andersson, Sara Regnér, Bobby Tingstedt, Bodil Andersson, Artificial neural networks predict survival from pancreatic cancer after radical surgery, The American Journal of Surgery, Volume 205, Issue 1, January 2013, Pages 1-7, ISSN 0002-9610, 10.1016/j.amjsurg.2012.05.032. Magne Thoresen, Petter Laake, On the simple linear regression model with correlated measurement errors, Journal of Statistical Planning and Inference, Volume 137, Issue 1, 1 January 2007, Pages 6878, ISSN 0378-3758. K., Warwick, Artificial intelligence: The basics. Taylor & Francis, 2011. F. S. Gharehchopogh and Peyman Mohammadi. A Case Study of Parkinson’s Disease Diagnosis using Artificial Neural Networks. International Journal of Computer Applications 73(19):1-6, July 2013. Alex J. Smola, Bernhard Scholkopf (1998). A Tutorial on Support Vector Regression. NeuroCOLT2 Technical Report Series - NC2-TR-1998-030. Goodwin L, VanDyne M, Lin S, Talbert S. Data mining Issues and opportunities for building nursing knowledge. J Biomed Inform 2003;36:379–88. Braha D, Shmilovici A. Data mining for improving a cleaning process in the semiconductor industry. IEEE Trans Semiconductor Manuf 2002;15. Fayyad UM, Uthurusamy R. Evolving data mining into solutions for insights. Commun ACM 2002;45:28–31. Zhou ZH. Three perspectives of data mining. Artif Intell 2003;143:139–46. Mattison R. Data warehousing: strategies, technologies and techniques statistical analysis, SPSS Inc. WhitePapers; 1997. R. Welland, Decision Tables and Computer Programming, Heyden & Son Inc., 1981. Kohavi, R. The power of decision tables, in: Lavrac, N., Wrobel, S., (Eds.), Machine Learning: Proceedings of the Eighth European Conference on Machine Learning ECML95, Lecture Notes in Artificial Intelligence, Springer Verlag, 914, Berlin, Heidelberg, NY, pp. 174–189, 1995. Qinlan, J. R. (1992). Learning with continuous classes. InProceedings of the Australian joint conference on artificial intelligence (pp. 343–348). Polumetla, A. (2006).Machine learning methods for the detection of RWIS sensor malfunctions. Master Thesis. University of Minnesota (p. 30). 82 International Journal in Foundations of Computer Science & Technology (IJFCST), Vol. 3, No.6, November 2013 [33] Mohmad Badr Al Snousy, Hesham Mohamed El-Deeb, Khaled Badran, Ibrahim Ali Al Khlil, Suite of decision tree-based classification algorithms on cancer gene expression data, Egyptian Informatics Journal, Volume 12, Issue 2, July 2011, Pages 73-82, ISSN 1110-8665. [34] Yoav F., Robert ES. A decision theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences 1997; 55(1):119–39. [35] Aha, D., and D. Kibler (1991) "Instance-based learning algorithms", Machine Learning, vol.6, pp. 3766. [36] Vapnik, V. & Bottou, L. (1993). Local algorithms for pattern recognition and dependencies estimation. Neural Computation5 (6): 893–909. Authors Peyman Mohammadi is an M.Sc. student in Computer Engineering Department, Science and Research Branch, Islamic Azad University, West Azerbaijan, Iran. His interested research areas are in the Artificial Neural Networks, Data Mining and Machine Learning techniques. 83
5cs.CE
arXiv:1705.10998v1 [cs.AI] 31 May 2017 The Atari Grand Challenge Dataset Vitaly Kurin Visual Computing Institute RWTH Aachen University Aachen, Germany [email protected] Sebastian Nowozin, Katja Hofmann Machine Intelligence and Perception Group Microsoft Research Cambridge, UK {Sebastian.Nowozin, Katja.Hofmann}@microsoft.com Lucas Beyer, Bastian Leibe Visual Computing Institute RWTH Aachen University Aachen, Germany {beyer, leibe}@vision.rwth-aachen.de Abstract Recent progress in Reinforcement Learning (RL), fueled by its combination, with Deep Learning has enabled impressive results in learning to interact with complex virtual environments, yet real-world applications of RL are still scarce. A key limitation is data efficiency, with current state-of-the-art approaches requiring millions of training samples. A promising way to tackle this problem is to augment RL with learning from human demonstrations. However, human demonstration data is not yet readily available. This hinders progress in this direction. The present work addresses this problem as follows. We (i) collect and describe a large dataset of human Atari 2600 replays – the largest and most diverse such data set publicly released to date (ii) illustrate an example use of this dataset by analyzing the relation between demonstration quality and imitation learning performance, and (iii) outline possible research directions that are opened up by our work. 1 Introduction In Reinforcement Learning (RL), an agent learns, by trial and error, to perform a task in an initially unknown environment. Recently, this research area has seen dramatic progress in complex interactive tasks in virtual environments Mnih et al. [2015, 2016], Silver et al. [2016], Schulman et al. [2015], largely driven by combinations of RL with deep learning. Yet, despite this recent progress, real-world applications are still largely lacking. In the RL setup, agents learn to solve a task completely from scratch. This causes one of the key limitations of state-of-the-art deep RL approaches — data inefficiency. In comparison to autonomous agents, humans have a lot of prior information about the world. Every day, we base our decisions on knowledge about culture and social relationships, our own experience, and information we get from experience of others. As a result, when learning a new task, people are more effective and need less actions to master it. During training, the agent executes a lot of actions that a human never would. This is ineffective and renders the application of RL in complex or potentially dangerous environments infeasible. A possible solution to the problem is to learn from human demonstrations Schaal [1997], Ng and Russell [2000], Abbeel and Ng [2004], Monfort et al. [2017], Hester et al. [2017]. Up until now, the RL community has been focused on building environments — test beds for RL models. Today, RL approaches can be trained and compared on diverse tasks in environments such as ALE Bellemare et al. [2013], OpenAI Gym Brockman et al. [2016] or Microsoft’s Project Malmo Johnson et al. [2016]. But there are few publicly available datasets of human demonstrations of tasks in these environments. This lack hampers the progress of research on learning from human demonstration. Examples such as ImageNet Deng et al. [2009] in Computer Vision and Switchboard Godfrey et al. [1992] in Speech Recognition have shown that datasets can catalyze research progress. In order to accelerate research in learning from demonstration, we release, describe, and illustrate the use of the Atari Grand Challenge dataset1 — a dataset of human Atari 2600 replays. Our contributions are: (i) We collect, analyze, and release to the research community the largest and most diverse dataset of human Atari 2600 replays to date. The dataset comprises ∼9.7 million frames (∼45 hours) of game play for five games - an order of magnitude larger than previous datasets. (ii) We illustrate one use of this dataset by analyzing the relation between demonstration quality and imitation learning performance. (iii) We discuss research directions that are opened up by our work. 2 Background This section outlines key concepts and notation used throughout the paper. We operate in a usual Reinforcement Learning (RL) setup: an agent acts in an environment in response to state observations, and learns from a reward signal that reflects an abstract notion of consequences of the actions taken. This setup can be formulated as Markov Decision Process (MDP), defined by a tuple hS, A, R, T i, where S is the set of states, A is the set of actions, R(s, a) is the reward function, and T (s, a, s0 ) is the transition function that returns a probability over states, given a state and an action: p(s0 |s, a), s, s0 ∈ S, a ∈ A. In each iteration of its interaction with the environment, the agent observes the state, takes an action and gets some reward for the transition. An agent’s behavior is characterized by a policy π(s), a function that returns an action given a state. The policy can be stochastic. Our experimental analysis (section 5), is based on a recently proposed imitation algorithm suggested in Hester et al. [2017], in turn based on Q-learning Watkins and Dayan [1992] and in particular DDQN Van Hasselt et al. [2016]. We next give an overview of the relevant approaches. Q-learning Watkins and Dayan [1992] is a “model-free” RL algorithm. It centers on learning to approximate the so-called action-value function Q(s, a). The Q-function reflects the expected discounted cumulative value of taking a particular action a in state s, and following the particular policy thereafter. The optimal action-value function Q∗ (s, a) should satisfy the Bellman equation:   Q∗ (s, a) = Es0 R(s, a) + γ max Q∗ (s0 , a0 )|s, a , 0 a ∈A (1) where γ is a discount factor that trades off immediate versus longer term rewards. The optimal policy π ∗ (s) is the policy which takes the best possible decision on each time step: π ∗ (s) = argmax Q∗ (s, a). (2) a∈A DQN Mnih et al. [2015] is a variant of Q-learning that uses a neural network (called Deep Q-Network) to approximate Q-values. The network Q(s, ·; θ) returns action values for all the actions available given the current state. A separate target network is used to compute Q-values in training updates, as well as a so-called replay memory of past experience for minibatch sampling. Both were shown to improve training stability and resulted in breakthrough results when learning to play Atari games. Double DQN Van Hasselt et al. [2016] is an extension of DQN which decouples the selection and value estimate of actions in the max operator, which was shown to result in more accurate Q-value approximations both theoretically and in practice. The learning objective looks as follows:  2 JDQ (Q) = R(s, a) + γQ(s0 , a0max ; θ0 ) − Q(s, a; θ) , where a0max = argmaxa0 ∈A Q(s0 , a0 ; θ). 1 http://atarigrandchallenge.com/data 2 (3) Recent work Hester et al. [2017] suggests an approach to imitation learning that combines the Double DQN objective and a large margin classification loss aimed at keeping a learned policy close to demonstrated behavior: J(Q) = JDQ (Q) + λ1 JE (Q) + λ2 JL2 (Q), (4) where JL2 (Q) is the L2 regularization, JE (Q) is the supervised learning loss:   JE (Q) = max Q(s, a) + l(s, aE , a) − Q(s, aE ), a∈A (5) and l(s, aE , a) is the large margin classification loss that returns some positive number if the expert’s action aE 6= a and zero otherwise. The large margin classification loss prevents the learner from over-estimating Q-values for previously unseen states. The Q-values for actions taken by an expert are forced to be a margin higher than those of the unseen ones. All the methods described above can also be applied completely off-line on data collected in the process of a human’s interaction with the environment. 3 Constructing the Atari Grand Challenge dataset This section details our approach to collecting the Atari Grand Challenge dataset. All described tools are made public with the data set. 3.1 Collecting the dataset We collected our dataset using a web application built around Javatari2 , an Atari 2600 emulator written in JavaScript. Given an initial state and the full sequence of human inputs, the emulator is completely deterministic, and we can avoid the excessive burden of saving screenshots of the game at every single time step while it is being played. Instead, we can only record the initial state and player inputs, and generate the dataset of images offline by playback. This makes data collection at large scale feasible with limited resources. After processing, for each time step we have a screenshot of the game, the action taken at that time step, the reward, the current score, and the information about the time step being terminal or not. Since incomplete (non-terminal) episodes still carry useful information, we save the episode each time a player closes the application tab or browser window as well as when the game ends. All the Atari-related functionality is entirely processed on the client side — within a browser. We support all the major web browsers: Google Chrome, Mozilla Firefox, Microsoft Edge, Safari. The server is built using Flask3 . It is only responsible for saving the data and, later, for loading the data when replaying. All the data is saved in a PostgreSQL database. The replay process is automated with Selenium4 . Our case is a good example of gamified crowdsoursing — using people’s desire to play to do useful things. In order to engage people more, we added two progress bars: one compares players’ performance with the best human player result, the other shows the same comparison with DQN performance taken from Mnih et al. [2015]. 3.2 Dataset post-processing There are two steps of dataset post-processing. First, we try to eliminate the differences between the Javatari emulator and the ALE. The only difference we have found is that the states we get in Javatari are vertically shifted by several pixels in comparison to ALE states. We eliminate this difference by shifting the states as in ALE and padding them with zeroes at the bottom and top borders. 2 http://javatari.org/ http://flask.pocoo.org/ 4 https://github.com/SeleniumHQ 3 3 Table 1: Atari Grand Challenge per-game statistics episodes frames gameplay, hrs worst score best score Space Invaders Q*bert Ms.Pacman Video Pinball Montezuma’s revenge 445 2,056,741 9.52 5 3,355 659 1,599,453 7.40 25 41,425 384 1,779,771 8.23 10 29,311 211 1,526,215 7.05 100 67,150 668 2,717,676 12.57 100 27,900 During the first frames that we record, the emulated Atari memory is not fully initialized and we might get an excessively large score, which is not correct. We therefore fix the first several frames’ rewards to zero. We are not also interested in games where the person did not interact with the application more than just opening and closing it. We filter these cases by simply removing games with a final score of zero. The post-processing is fully automated, and new data can be processed with the code provided. 4 Properties of the Atari Grand Challenge dataset 4.1 Description of the dataset In this section we briefly describe what the Atari Grand Challenge dataset consists of and we show some of its properties that we deem particularly relevant to research on learning from human demonstrations. 4.1.1 Scale The dataset consists of human replays for five popular Atari 2600 games: Video Pinball, Q*bert, Space Invaders, Ms.Pacman and Montezuma’s Revenge. The choice of the games is not random: we want to vary the level of difficulty according to the results in Mnih et al. [2015]. The DQN was able to play the first game significantly better than human players, the results for the second and the third were comparable to human performance and the latter two were very hard for DQN. The Atari Grand Challenge dataset consists of 2367 game episodes with positive final score, that is ∼9.7 million frames or ∼45 hours of playing time at 60 frames per second. Table 1 shows per-game statistics of the dataset and Fig. 1 shows sample screenshots. Figure 1: Sample screenshots from the dataset (from left to right, the games shown are: Space Invaders, Q*bert, Ms. Pacman, Video Pinball, Montezuma’s Revenge) 4.1.2 Diversity Since the data is collected in the wild, some of the players were good, some of them were bad. As a result, Fig. 2 shows that the Atari Grand Challenge dataset is quite diverse in terms of the final score distribution. From the episode final score and the time played, we can already make some assumptions about the different players’ level of expertise. What else can we do to show the player diversity quantitatively? It is natural to assume that the more experienced a player is, the more effective he will be. A new player cannot achieve a challenging reward when an experienced player can. Fig. 3 shows that all the players have equal access to the rewards (at least for the games in question). From the comparison of “advanced” and “expert” groups we can see, that “expert” players are faster in achieving the rewards: the rightmost column data points look more shifted to the left. Given that the final score for the “advanced” group is higher, they achieve more in shorter periods of time. 4 Figure 2: Atari Grand Challenge dataset human demonstrators score dependency on time. 4.1.3 Extensibility Currently the dataset comprises five Atari 2600 games, but it can be easily extended by adding a new game. We do not only publish the dataset, but the code for data collection as well5 . Any of the Atari 2600 non-paddle games available in ALE Bellemare et al. [2013] can be added within few hours of work. We do not support paddle games like Breakout or Pong since it is almost impossible to exactly repeat the noisy controller to collect the states off-line. 5 5.1 Influence of data quality on the imitation learning performance Experiments description As shown in Section 4, we have replays of good players as well as replays of bad players. In this section we show how the dataset can be used to study how the demonstrator expertise can influence the performance of imitation learning. In this experiment, we filter the training data by a minimum score. We train our model on the frames of the episodes with final score above a threshold: 50 percentile, 75 percentile (top 25% of the data) and 95 percentile (top 5%). We also train the model on the whole dataset. We train the model completely off-line as in Eq. 5, but we do not use the regularization term from Hester et al. [2017] since we have more data to train on. We use λ1 = 1.0 and l = 0.8 for non-expert actions as suggested in the same paper. We use the same network architecture as in Mnih et al. [2015] and train over 106 iterations. We use the Adam Kingma and Ba [2014] optimizer with learning rate  = 0.00025 and β1 = β2 = 0.95. The target network update interval is 10, 000, mini-batch size is 32, and training is run for one million updates. The code is written in Chainer Tokui et al. [2015] within the Malmopy6 framework. Since we do not have any frameskip during data collection, we use frameskip coefficient k = 1. We normalize reward values by dividing the raw rewards by the largest reward value observed in our data. There were no negative rewards in our case. The experimentation code can be found on our github page7 . 5 Figure 3: Reward and the frame when the reward was obtained show that all the players have equal access to rewards, but more experienced players are more efficient. All the game episodes are divided as follows: “novice” (below 50 percentile of all the scores), “average” (between 50 and 75), “advanced” (between 75 and 95) and “expert” (above 95 percentile). 5.2 Results During training we evaluate the performance of the model on 100 episodes every 100,000 mini-batch updates. After training we take the model with the best average results and re-evaluate it on 100 games and report the average score and standard error of the mean. Table 2 is in line with our hypothesis: the higher the filter value for the data, the better the performance. The sub-par performance of the imitation model on our dataset in three out of five games can be explained by looking at Table 3: our data has lower and more diverse human demonstrator scores than those of Hester et al. [2017]. At the same time, in Video Pinball, where our data has better human scores, the model performs better. 5 https://github.com/yobibyte/atarigrandchallenge/ https://github.com/Microsoft/malmo-challenge 7 https://github.com/yobibyte/atarigrandchallenge/ 6 6 Table 2: Average score ± standard error of the mean (out of 100 games) for models trained on subsets of the data filtered by a score. The first four rows use the offline part of the imitation algorithm (without regularization) from Hester et al. [2017] to train on our data. Top 5% means that the training data consists of the episodes with a final score higher or equal than the 95 percentile score. Evaluation is performed with the -greedy policy,  = 0.05. Mnih et al. [2015] reports the standard deviation of the scores, but we do not have information about the number of the episodes and thus we cannot report their SEM. Space Invaders Q*bert Ms.Pacman Video Pinball Montezuma’s revenge Imitation All data Imitation top 50% Imitation top 25% Imitation top 5% Imitation Hester et al. [2017] 125 ± 9.94 90 ± 8.64 127 ± 9.69 144 ± 12.40 n/a 146 ± 14.87 127 ± 13.80 179 ± 17.01 545 ± 107.19 5,133.8 250 ± 18.09 308 ± 20.66 271 ± 22.15 418 ± 19.98 692.4 8,823±745.26 11,216±801.53 24,351±2,084.38 17,775±16.10 10,655.5 7 ± 4.32 4 ± 1.97 22 ± 8.11 36 ± 7.98 576.3 DQN Mnih et al. [2015] DDQN Van Hasselt et al. [2016] Random uniform 1,976 2,628.7 156±9.46 10,596 11,020.8 162±17.6 2,311 1,241.3 211±11.35 42,684 367,823.7 30,368±3,723.87 0 42 0±0 Table 3: Comparison of human scores in Hester et al. [2017] and the Atari Grand Challenge dataset. Hester et al. [2017] Space Invaders Q*bert Ms. Pacman Video Pinball Montezuma’s revenge 6 Worst score Best score 80700 31781 8409 32300 n/a 99450 55021 32420 34900 Atari Grand Challenge dataset #transitions Worst score Best score #transitions 75472 21896 10051 17949 5 25 10 100 100 3355 41425 29311 67150 27900 2,056,741 1,599,453 1,779,771 1,526,215 2,717,676 Related work There are two directions of RL research which are working on leveraging demonstration data for training an autonomous agent: Inverse Reinforcement Learning (IRL) and Imitation Learning. The former group addresses scenarios where there is no access to the reward function. It is true that in RL tasks the goal is often underspecified, and sometimes it is hard to provide a reward that represents all the useful information from expert’s demonstration. The general idea is to approximate the reward function and learn a policy using this approximation Ng and Russell [2000], Abbeel and Ng [2004]. Whilst IRL can benefit from the Atari Grand Challenge dataset by ignoring the reward information, Imitation Learning is the direct benefactor of our dataset. Imitation learning exploits the reward information to learn an action-value function, or directly a policy. Schaal [1997] uses a pre-trained model to speed up training, and has an interesting comparison of pre-training influence on modelfree and model-based RL. The paper notes that model-based learning benefits more from using demonstration data. The latest work on Learning from Demonstration shows that model-free RL can also greatly benefit from using human player data Hester et al. [2017], Subramanian et al. [2016], Hosu and Rebedea [2016]. The datasets collected for the learning from demonstration research described above are either small, or not available for public use. The Atari Grand Challenge dataset is the largest and the most diverse in terms of the types of the games as well as amount and types of human players release so far. Up until now, the RL community has been mostly focusing on building the environments for training autonomous agents: ALE Bellemare et al. [2013], OpenAI’s gym Brockman et al. [2016] and Universe8 , Microsoft’s Malmo project Johnson et al. [2016]. The final goal of operating in these environments is in maximizing the final score. Even if we train our models off-line, it sounds reasonable to evaluate the performance within such an environment. That is why, in Table 4 below we describe the datasets coupled with interactive environments. 8 https://github.com/openai/universe 7 Table 4: Learning from demonstration datasets comparison. The replay data for Hosu and Rebedea [2016] has not been published, but there are Montezuma’s Revenge and Private Eye checkpoints — saved states of the environment that can be used for continuing the episode. Atari Grand Challenge Udacity self-driving dataset9 Hosu and Rebedea [2016] Hester et al. [2017] Domain Tasks Size (transitions) Atari 2600 Driving simulator Atari 2600 Atari 2600 5 1 1 42 ∼9.7 mil. 8086 (x3 cameras) ∼1.2 mil. ∼1 mil. Open Diverse in player expertise 3 3 (7) 7 3 7 7 7 Atari 2600 games have recently begun to take a similar role as experimentation ground for RL research as MNIST has taken for computer vision and many implementations of RL algorithms have been evaluated on such games. Therefore, it is much easier to compare leveraging the human behavior data with pure RL implementations or even combining them. 7 Discussion and Future work Our work opens up a wide range of follow-up work on benefits and uses of human demonstrations for effectively and efficiently learning to interact with complex environments. 7.1 Extending the Atari Grand Challenge dataset The Atari Grand Challenge website is still on-line and people keep playing. We plan to update the dataset in the future as more data becomes available. The most important development of the dataset is to collect more data of “professional players” who achieve higher scores. As we have shown, the data quality affects the final performance dramatically, it will be a good improvement, when we do that. 7.2 Exploiting the Atari Grand Challenge dataset Video games are a perfect testing ground for evaluating hypotheses and learning how we can use human data to achieve higher sample efficiency and make the RL training process faster. So, our future research will focus on improving sample efficiency of RL algorithms by leveraging the data of diverse quality. In this paper we have shown just one of the possible dataset applications: how data quality influences the final performance of imitation learning Hester et al. [2017]. We hope that researchers in machine learning, game AI and maybe even cognitive science, can find something useful for their own research purposes. We find the following applications particularly appealing. Recently, Inverse Reinforcement Learning and Imitation Learning have regained popularity Ho and Ermon [2016], Baram et al. [2016], Hester et al. [2017]. Our dataset has a direct impact on this kind of research. It is interesting to check if can we take something useful out of bad players data. Even experienced players make mistakes. But throwing out this data can waste potentially important information. Shiarlis et al. [2016] investigates this topic in the Inverse Reinforcement Learning domain. It might be interesting to see a similar approach for Atari 2600 in Learning from Demonstration domain. The frameskip coefficient has been shown to be very important in RL Braylan et al. [2015], Sharma et al. [2017], Lakshminarayanan et al. [2016]. It would be interesting to investigate frameskip, using the human data that we can extract from the Atari Grand Challenge dataset. Curriculum learning has proven useful in RL Leibfried et al. [2016]. Having data of players with different expertise, we can investigate curriculum learning with respect to this. We have also seen attempts to investigate how humans learn to play Atari Tsividis et al. [2017]. Our dataset might be interesting for this kind of research. 9 https://github.com/udacity/self-driving-car-sim 8 In conclusion, we release a dataset of human Atari 2600 replays of five games, that is ∼9.7 Million frames or ∼45 hours of game play time. We are describing its main properties, i.e. scale and diversity. We show that in order to achieve high performance, it is more important to collect data of players with a high level of expertise, than to collect a lot of low-skilled data. We plan to update the dataset in the future by adding “professional” Atari 2600 players data. We release the code for data collection as well, which gives the opportunity for everybody to extend the dataset. We also show some of the possible research directions the Atari Grand Challenge dataset could be used in. We hope that our release will catalyze the research in sample-efficiency of RL and learning from human demonstration. Acknowledgments Vitaly Kurin would like to thank Microsoft Research Cambridge for hosting him during the project and for the Microsoft Azure for Research grant. The authors would also like to thank Paulo Peccin, Javatari creator, for the emulator and useful discussions. References P. Abbeel and A. Y. Ng. Apprenticeship learning via inverse reinforcement learning. In Proceedings of the twenty-first international conference on Machine learning, page 1. ACM, 2004. N. Baram, O. Anschel, and S. Mannor. Model-based adversarial imitation learning. arXiv preprint arXiv:1612.02179, 2016. M. G. Bellemare, Y. Naddaf, J. Veness, and M. Bowling. The arcade learning environment: An evaluation platform for general agents. Journal of Artificial Intelligence Research, 47:253–279, jun 2013. A. Braylan, M. Hollenbeck, E. Meyerson, and R. Miikkulainen. Frame skip is a powerful parameter for learning to play atari. In Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. G. Brockman, V. Cheung, L. Pettersson, J. Schneider, J. Schulman, J. Tang, and W. Zaremba. Openai gym, 2016. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei. Imagenet: A large-scale hierarchical image database. In IEEE Conference on Computer Vision and Pattern Recognition, pages 248–255. IEEE, 2009. J. J. Godfrey, E. C. Holliman, and J. McDaniel. Switchboard: Telephone speech corpus for research and development. In Acoustics, Speech, and Signal Processing, 1992. ICASSP-92., 1992 IEEE International Conference on, volume 1, pages 517–520. IEEE, 1992. T. Hester, M. Vecerik, O. Pietquin, M. Lanctot, T. Schaul, B. Piot, A. Sendonaris, G. Dulac-Arnold, I. Osband, J. Agapiou, J. Z. Leibo, and A. Gruslys. Learning from demonstrations for real world reinforcement learning. arXiv preprint arXiv:1704.03732, 2017. J. Ho and S. Ermon. Generative adversarial imitation learning. In Neural Information Processing Systems, pages 4565–4573, 2016. I.-A. Hosu and T. Rebedea. Playing atari games with deep reinforcement learning and human checkpoint replay. arXiv preprint arXiv:1607.05077, 2016. M. Johnson, K. Hofmann, T. Hutton, and D. Bignell. The malmo platform for artificial intelligence experimentation. In International Joint Conference on Artificial Intelligence (IJCAI), page 4246, 2016. D. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014. A. S. Lakshminarayanan, S. Sharma, and B. Ravindran. Dynamic frame skip deep Q network. CoRR, abs/1605.05365, 2016. URL http://arxiv.org/abs/1605.05365. 9 F. Leibfried, N. Kushman, and K. Hofmann. A deep learning approach for joint video frame and reward prediction in atari games. arXiv preprint arXiv:1611.07078, 2016. V. Mnih, K. Kavukcuoglu, D. Silver, A. A. Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller, A. K. Fidjeland, G. Ostrovski, S. Petersen, C. Beattie, A. Sadik, I. Antonoglou, H. King, D. Kumaran, D. Wierstra, S. Legg, and D. Hassabis. Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015. V. Mnih, A. P. Badia, M. Mirza, A. Graves, T. P. Lillicrap, T. Harley, D. Silver, and K. Kavukcuoglu. Asynchronous methods for deep reinforcement learning. CoRR, abs/1602.01783, 2016. URL http://arxiv.org/abs/1602.01783. M. Monfort, M. Johnson, A. Oliva, and K. Hofmann. Asynchronous data aggregation for training end to end visual control networks. In International Conference on Autonomous Agents & Multiagent Systems, pages 530–537. International Foundation for Autonomous Agents and Multiagent Systems, 2017. A. Y. Ng and S. J. Russell. Algorithms for inverse reinforcement learning. In International Conference on Machine Learning, pages 663–670, 2000. S. Schaal. Learning from demonstration. Neural Information Processing Systems, pages 1040–1046, 1997. J. Schulman, S. Levine, P. Moritz, M. I. Jordan, and P. Abbeel. Trust region policy optimization. CoRR, abs/1502.05477, 2015. URL http://arxiv.org/abs/1502.05477. S. Sharma, A. S. Lakshminarayanan, and B. Ravindran. Learning to repeat: Fine grained action repetition for deep reinforcement learning. CoRR, abs/1702.06054, 2017. URL http://arxiv. org/abs/1702.06054. K. Shiarlis, J. Messias, and S. Whiteson. Inverse reinforcement learning from failure. In International Conference on Autonomous Agents & Multiagent Systems, pages 1060–1068. International Foundation for Autonomous Agents and Multiagent Systems, 2016. D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. Van Den Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M. Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever, T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and D. Hassabis. Mastering the game of go with deep neural networks and tree search. Nature, 529(7587):484–489, 2016. K. Subramanian, C. L. Isbell Jr, and A. L. Thomaz. Exploration from demonstration for interactive reinforcement learning. In International Conference on Autonomous Agents & Multiagent Systems, pages 447–456. International Foundation for Autonomous Agents and Multiagent Systems, 2016. S. Tokui, K. Oono, S. Hido, and J. Clayton. Chainer: a next-generation open source framework for deep learning. In Proceedings of Workshop on Machine Learning Systems (LearningSys) in The Twenty-Ninth Annual Conference on Neural Information Processing Systems, 2015. URL http://learningsys.org/papers/LearningSys_2015_paper_33.pdf. P. A. Tsividis, T. Pouncy, J. L. Xu, J. B. Tenenbaum, and S. J. Gershman. Human learning in atari. "The AAAI 2017 Spring Symposium on Science of Intelligence: Computational Principles of Natural and Artificial Intelligence", 2017. H. Van Hasselt, A. Guez, and D. Silver. Deep reinforcement learning with double q-learning. In Association for the Advancement of Artificial Intelligence, pages 2094–2100, 2016. C. J. Watkins and P. Dayan. Q-learning. Machine learning, 8(3-4):279–292, 1992. 10
2cs.AI
Sparse Maximum-Entropy Random Graphs with a Given Power-Law Degree Distribution Pim van der Hoorn1 , Gabor Lippner2 , and Dmitri Krioukov1,2,3 1 Northeastern University, Department of Physics Northeastern University, Department of Mathematics 3 Northeastern University, Departments of Electrical&Computer Engineering arXiv:1705.10261v3 [math.PR] 10 Oct 2017 2 October 12, 2017 Abstract Even though power-law or close-to-power-law degree distributions are ubiquitously observed in a great variety of large real networks, the mathematically satisfactory treatment of random power-law graphs satisfying basic statistical requirements of realism is still lacking. These requirements are: sparsity, exchangeability, projectivity, and unbiasedness. The last requirement states that entropy of the graph ensemble must be maximized under the degree distribution constraints. Here we prove that the hypersoft configuration model (HSCM), belonging to the class of random graphs with latent hyperparameters, also known as inhomogeneous random graphs or W -random graphs, is an ensemble of random power-law graphs that are sparse, unbiased, and either exchangeable or projective. The proof of their unbiasedness relies on generalized graphons, and on mapping the problem of maximization of the normalized Gibbs entropy of a random graph ensemble, to the graphon entropy maximization problem, showing that the two entropies converge to each other in the large-graph limit. Keywords: Sparse random graphs, Power-law degree distributions, Maximum-entropy graphs PACS: 89.75.Hc, 89.75.Fb, 89.70.Cf MSC: 05C80, 05C82, 54C70 1 Contents 1 Introduction 1.1 Hypersoft configuration model (HSCM) 1.2 Properties of the HSCM . . . . . . . . . 1.3 Unbiasedness and the maximum-entropy 1.4 Main results . . . . . . . . . . . . . . . . 1.5 Exchangeability and projectivity . . . . 1.6 Other remarks . . . . . . . . . . . . . . 1.7 Paper organization . . . . . . . . . . . . . . . . . . . . . . . . . . requirement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 3 4 5 7 8 9 10 2 Background information and definitions 2.1 Graph ensembles and their entropy . . . . . . . . . . . . . . . . . . . . . . . . 2.1.1 Maximum-entropy graphs with a given degree sequence (CM) . . . . . 2.1.2 Maximum-entropy graphs with a given expected degree sequence (SCM) 2.2 Sparse graphs with a given degree distribution . . . . . . . . . . . . . . . . . 2.3 Maximum-entropy graphs with hypersoft constraints . . . . . . . . . . . . . . 2.3.1 Graphon-based graph ensembles . . . . . . . . . . . . . . . . . . . . . 2.3.2 Bernoulli and graphon entropies . . . . . . . . . . . . . . . . . . . . . 2.3.3 Dense maximum-entropy graphs with a given degree distribution . . . 2.3.4 Rescaled graphon entropy of sparse graphs . . . . . . . . . . . . . . . 2.3.5 Sparse maximum-entropy graphs with a given degree distribution . . . 2.3.6 Sparse power-law hypersoft configuration model (sparse HSCM) . . . 10 10 11 11 11 12 12 13 13 15 15 16 3 Results 3.1 Main result . . . . . . . . . . . . . . . . . . . . . . . 3.2 The limit of the degree distribution in the HSCM . . . 3.3 The limit of the expected average degree in the HSCM 3.4 HSCM maximizes graphon entropy . . . . . . . . . . . 3.5 Graphon entropy scaling and convergence . . . . . . 3.6 Gibbs entropy scaling and convergence . . . . . . . . . . . . . . 16 16 17 18 18 19 20 . . . . . . . . . . . 21 21 26 27 29 31 32 32 34 36 36 37 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Proofs 4.1 The classical limit approximation of the Fermi-Dirac graphon . . 4.2 Proofs for node degrees in the HSCM . . . . . . . . . . . . . . . . . 4.2.1 Technical results on Poisson couplings and concentrations 4.2.2 Proof of Theorem 3.2 . . . . . . . . . . . . . . . . . . . . 4.2.3 Proof of Theorem 3.3 . . . . . . . . . . . . . . . . . . . . 4.3 Proofs for graphon entropy . . . . . . . . . . . . . . . . . . . . . 4.3.1 Proof of Proposition 3.4 . . . . . . . . . . . . . . . . . . . 4.3.2 Proof of Theorem 3.5 . . . . . . . . . . . . . . . . . . . . 4.4 Proof of Theorem 3.6 . . . . . . . . . . . . . . . . . . . . . . . . . 4.4.1 Averaging W by a partition of An . . . . . . . . . . . . . 4.4.2 Constructing the partition . . . . . . . . . . . . . . . . . . 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Introduction Random graphs have been used extensively to model a variety of real networks. Many of these networks, ranging from the Internet and social networks to the brain and the universe, have broad degree distributions, often following closely power laws [1–3], that the simplest random graph model, the Erdős-Rényi random graphs [4–6] with Poisson degree distributions, does not reproduce. To resolve this disconnect, several alternative models have been proposed and studied. The first one is the configuration model (CM), random graphs with a given degree sequence [7, 8]. This model is a microcanonical ensemble of random graphs. Every graph in the ensemble has the same fixed degree sequence, e.g., the one observed in a snapshot of a real network, and every such graph is equiprobable in the ensemble. The ensemble thus maximizes Gibbs entropy subject to the constraint that the degree sequence is fixed. Yet given a real network snapshot, one cannot usually trust its degree sequence as some “ultimate truth” for a variety of reasons, including measurement imperfections, inaccuracies, and incompleteness, noise and stochasticity, and most importantly, the fact that most real networks are dynamic both at short and long time scales, growing often by orders of magnitude over years [9, 10, 1–3]. These factors partly motivated the development of the soft configuration model (SCM), random graphs with a given expected degree sequence, first considered in [11, 12], and later corrected in [13–16], where it was shown that this correction yields a canonical ensemble of random graphs that maximize Gibbs entropy under the constraint that the expected degree sequence is fixed. In statistics, canonical ensembles of random graphs are known as exponential random graphs (ERGs) [17]. In [18, 19] it was shown that the sparse CM and SCM are not equivalent, but they are equivalent in the case of dense graphs [20]. Yet the SCM still treats a given degree sequence as a fixed constraint, albeit not as a sharp but soft constraint. This constraint is in stark contrast with reality of many growing real networks, in which the degree of all nodes constantly change, yet the shape of the degree distribution and the average degree do not change, staying essentially constant in networks that grow in size even by orders of magnitude [9, 10, 1–3]. These observations motivated the development of the hypersoft configuration model [21–24]. 1.1 Hypersoft configuration model (HSCM) In the HSCM neither degrees nor even their expected values are fixed. Instead the fixed properties are the degree distribution and average degree. The HSCM with a given average degree and power-law degree distribution is defined by the exponential measure µ on the real line R µ = eαx , x ∈ R, where α > 1 is a constant, and by the Fermi-Dirac graphon W : R2 → [0, 1] W (x, y) = 1 ex+y +1 . The volume-form measure µ establishes then probability measures µn = µ|An = α eα(x−Rn ) µ(An ) 3 (1) on intervals An = (−∞, Rn ], where Rn = 1 n log 2 , 2 β ν β =1− 1 , α (2) and ν > 0 is another constant. The constants α > 1 and ν > 0 are the only two parameters of the model. The HSCM random graphs of size n are defined by (W, An , µn ) via sampling n i.i.d. points x1 , . . . , xn on An according to measure µn , and then connecting pairs of points i and j at sampled locations xi and xj by an edge with probability W (xi , xj ). An alternative equivalent definition is obtained by mapping (W, An , µn ) to (WI,n , I, µI ), where I = [0, 1], µI = 1, and WI,n (x, y) = 1 n β2ν 1 , x, y ∈ I, (3) (xy) α + 1 In this definition, xi s are n i.i.d. random variables uniformly distributed on the unit interval [0, 1], and vertices i and j are connected with probability WI,n (xi , xj ). Yet another equivalent definition, perhaps the most familiar and most frequently used one, is given by (WP,n , P, µP ), where interval P = [βν, ∞), and measure µP on P is the Pareto distribution µP = α (βν)α x−γ , x ∈ P, 1 WP,n (x, y) = νn , x, y ∈ P. xy + 1 In this Pareto representation, the expected degree of a vertex at coordinate x is proportional to x [15, 16]. Compared to the SCM where only edges are random variables while the expected degrees are fixed, the HSCM introduces another source of randomness—and hence entropy—coming from expected degrees that are also random variables. One obtains a particular realization of an SCM from the HSCM by sampling xi s from their fixed distribution and then freezing them. Therefore the HSCM is a probabilistic mixture of canonical ensembles, SCM ERGs, so that one may call the HSCM a hypercanonical ensemble given that latent variables x in the HSCM are called hyperparameters in statistics [25]. 1.2 Properties of the HSCM We prove in Theorem 3.2 that the distribution of degrees D in the power-law HSCM ensemble defined above converges—henceforth convergence always means the n → ∞ limit, unless mentioned otherwise—to P (D = k) = α(βν)α Γ(k − α, βν) Γ(k − α) = α(βν)α (1 − P (k − α, βν)) , k! Γ(k + 1) (4) where Γ(a, x) is the upper incomplete Gamma function, and P (a, x) is the regularized lower incomplete Gamma function. Since P (a, x) ∼ (ex/a)a for a  ex, while Γ(k − α)/Γ(k + 1) ∼ k −(α+1) for k  α, we get P (D = k) ∼ α(βν)α k −γ , 4 γ = α + 1. (5) 4 Pim van der Hoorn, Gabor Lippner, Dmitri Krioukov 10 10 0 10 10 -10 10 -15 10 Theory HSCM n=104 HSCM n=104 HSCM n=105 HSCM n=105 HSCM n=106 Internet -5 0 10 2 10 4 0 Theory 10 10 6 HSCM n=106 -5 10 -10 10 -15 10 0 10 1 10 2 10 3 10 4 10 5 Fig. 1 Degree distribution in the HSCM, theory vs. simulations, and in the Internet. The theory curve Figure 1:panel Degree distribution the theory vs.data simulations, and in the in the left is Eq. (5) with α = 1.1 (γ in = 2.1) andHSCM, ν = 4.92. The simulation shown by symbols is averaged over 100 random graphs for each graph size n. All the graphs are generated according to the HSCM with the Internet. The theory curve in the left panel is Eq. (4) with α = 1.1 (γ = 2.1) and4 ν =5 same 4.92. α = 1.1 and ν = 4.92. The average degrees, averaged over 100 random graphs, in the graphs of size 10 , 10 , and 6 The simulation data shown by symbols is averaged over 100 random graphs for each graph 10 , are 1.73, 2.16, and 2.51, respectively. The Internet data comes from CAIDA’s Archipelago measurements of the Internet at the are Autonomous System level [34]. to Thethe number of nodes the same averageαdegree in and the size n. Alltopology the graphs generated according HSCM withandthe = 1.1 Internet graph are 23, 752 and 4.92. The right panel shows the theoretical degree distribution curve in Eq. (5) with4 να= average degrees, averaged overHSCM 100 graphs random graphs, in with the the graphs size 10 , = 4.92. 2.0 and The ν = 10.0 versus simulations of 100 random of different sizes same αofand ν. The 5 , and 106 , are 1.73, 2.16, and4 2.51, 10 respectively. Internet data comes from CAIDA’s average degrees in the graphs of size 10 , 105 , and 106 , are 9.96, The 9.98, and 10.0, respectively. Archipelago measurements of the Internet topology at the Autonomous System level [26]. The number of nodes and the average degree in the Internet graph are 23, 752 and 4.92. The right the limit, is constant δ = ν/2 if α = 2. In this case, the HSCM can be equivalently defined as a panel shows the theoretical degree distribution curve in Eq. (4) with α = 2.0 and ν = 10.0 growing model of labeled graphs, converging to soft preferential attachment [22]—for n = 1, 2, . . ., versus simulations of 100 random HSCM graphs of different sizes with the same α and ν. The the location xn of node n belongs to A4n ’s increment, xn ∈ Bn = An \ An−1 (A0 = ∅), and 5 , and 106 , are average degrees in the graphs of size 10 , 10 9.96, andµ̃10.0, respectively. sampled from µ restricted to this increment, i.e., from the probability9.98, measure n = µ|B /µ(Bn ) = n α eα(x−Rn +Rn−1 ) ; node n is then connected to existing nodes i = 1 . . . n − 1 with probability given by also (2). For theinexact equivalence, forthe each n, between the original equilibrium HSCM definitionto We prove Theorem 3.3 that expected average degree in the ensemble converges with ordered xi s, xi < xi+1 , and this growing definition, slightly more care, ensuring that the joint distribution of xi s is exactly the sameEin[D] both cases, must be taken using basics properties = ν. (6) of Poisson point processes [33]. Specifically, in the equilibrium formulation with a given Rn , the number of nodes cannot be fixed in to the n, but must behas sampled from Poisson distribution with That is, the degree distribution ensemble a power tailthe with exponent γ, while the mean n. Alternatively, for a given fixed n, the right boundary Rn of interval An cannot be fixed, expected average degree is fixed to constant ν that does not depend on n, Fig. 1. but must be a random variable Rn = (1/2) log(2Vn ), where Vn is a random variable sampled from the Gamma distribution with shape n and rate δ = ν/2. Node n is then placed at xn = Rn , 1.3 theofmaximum-entropy requirement while Unbiasedness the coordinates ofand the rest n − 1 nodes are sampled from µn defined by this random Rn , and then labeled in the increasing order. In the growing graph formulation, the coordinate While thethe average degree HSCM by converges distribution 2xi xn+1 of n + 1’th node in is the determined vn+1 = to vn a+ constant, V , where and v0 =the 0, vdegree , and i = (1/2)e converges to a power law, the power-law HSCM is certainly just one of an infinite number V is a random variable sampled from the exponential distribution with rate δ = ν/2. All theof other possess these two properties. OnePoisson example is random graphs [27] three models options that are equivalent realizations of the same point processhyperbolic on R with measure µ that have constanttoaverage degree and power-law larger and also rate δ, converging the binomial sampling with bothdegree n and distribution, Rn fixed [33]. but Thehave projective map πn7→of the projectivity definition above, mapslimit. graphsIsGthe their subgraphs induced by numbers triangles, non-zero clustering in the an unbiased model n0 in n to HSCM 0 nodes i = 1 . . . n . We note that even though the growing version of the model is not exchangeable of random power-law graphs with constant average degree? That is, are the HSCM random since itcharacterized relies on labeling of nodes theproperties increasingand order their coordinates, it is is nevertheless graphs by only these in two no of others? Or colloquially, the HSCM equivalent to the equilibrium HSCM with this ordered labeling, because the joint distribution of the model of “maximally random” power-law graphs with a constant average degree. This node coordinates, and the linking probability as a function of these coordinates are the same in question can be formally answered by checking whether the HSCM satisfies the maximumthe two formulations [33]. This observation suggests that there might exist a less trivial projective entropy requirement. map such that the model is both projective and exchangeable if α = 2. If α 6= 2, then the HSCM, A discrete distribution i =equivalent 1, 2, . . ., istosaid satisfy the maximum-entropy requirement even with ordered labeling, soft to preferential attachment, but it is equivalent to P pisi ,not ¯ subject to constraints = (dis)appearance 1, 2, . . ., where fofr sedges are some realexisting functions of states i fir = frate r , r of its adjusted version with iapcertain between vertices [22].i, Here we note that the HSCM is the zero-clustering limit [38] of random hyperbolic graphs [39], where the α = 2 case corresponds to the uniform density of points in the hyperbolic space Hd , and 5 and f¯r sPare a collection of real numbers, if the Gibbs/Shannon entropy of the distribution S = − i pi log pi is maximized subject to these constraints [28]. This entropy-maximizing distribution is known to be always unique, belonging to the exponential family of distributions, and it can be derived from the basic consistency axioms: uniqueness and invariance with respect to a change of coordinates, system independence and subset independence [29– 31]. Since entropy is the unique measure of information satisfying the basic requirements of continuity, monotonicity, and system/subset independence [32], the maximum-entropy requirement formalizes the notion of encoding into the probability distribution pi describing a stochastic system, all the available information about the system given to us in the form of the constraints above, and not encoding any other information not given to us. Since the entropy-maximizing distribution is unique, any other distribution necessarily but possibly implicitly introduces biases by encoding some additional ad-hoc information, and constraining some other system properties, concerning which we are not given any information, to some ad-hoc values. Clearly, such uncontrolled information injection into a model of a system may affect the predictions one may wish to make about the system using the model, and indeed it is known that given all the available information about a system, the predictive power of a model that describes the system is maximized by the maximum-entropy model [29–31]. Perhaps the best illustration of this predictive power is the predictive power of equilibrium statistical mechanics, which can be formulated almost fully in terms of the maximum-entropy principle [28]. To illustrate the maximum-entropy requirement in application to random graphs, suppose we are to define a random graph ensemble, and the only available information is that these random graphs must have n nodes and m edges. From the purely probabilistic perspective, any random graph ensemble satisfying these constraints—random m-stars or m-cycles, for instance, if m < n—would be an equally good one. Yet there is only one unique ensemble that satisfies not only these constraints but also the maximum-entropy requirement. This ensemble is Gn,m because in Gn,m any graph with n nodes and m edges is equally likely, so that the probability distribution on the set of all graphs with n nodes and m edges is uninform, and without further constraints, the uniform distribution is the maximum-entropy n  2 ) , the number of such distribution on the state space, which in this case is i = 1, . . . , (m graphs. Random m-stars or m-cycles, while satisfying the constraints, inject into the model, in this case explicitly, additional information about the graph structure that was not given to us. Clearly, predictions based on random m-stars versus Gn,m may be very different, as the first model trivially predicts that m-stars occur with probability 1, while they appear with a nearly zero probability in Gn,m if n and m are large. A slightly less trivial example is the SCM. In this case the given information is that the n expected degrees of nodes i = 1, . . . , n must be ki ∈ R+ , and the state space is all the 2( 2 ) graphs on n nodes. As shown in [13–16], the unique entropy-maximizing ensemble satisfying these constraints is given by random graphs in P which nodes i and j are connected with probabilities pij = 1/ (kn/κ κ + 1), where k = i ki , and κi s are the unique solution of Pi j the system of n equations j pij = ki . The popular Chung-Lu model [11, 12] is different in that the connection probability there is pCL ij = min (ki kj /kn, 1), which can be thought of as a classical-limit approximation to the entropy-maximizing Fermi-Dirac pij above. While the CL P ensemble also satisfies the desired constraints j pCL = ki (albeit only for sequences ki s.t. ij ki kj /kn ≤ 1), it does not satisfy the maximum-entropy requirement, so that it injects, in this case implicitly, some additional information into the ensemble, constraining some undesired 6 properties of graphs in the ensemble to some ad-hoc values. Since the undesired information injection is implicit in this case, it may be quite difficult to detect and quantify all the biases introduced into the ensemble. 1.4 Main results The main result of this paper is the proof in Theorem 3.1 that the HSCM is unbiased, that is, that the HSCM random graphs maximize the Gibbs entropy of random graphs whose degree distribution and average degree converge to (4,6). The first difficulty that we face in proving this result is how to properly formulate the entropy-maximization problem under these constraints. Indeed, we are to show that the probability distributions Pn that the HSCM defines on the set of n-sized graphs Gn maximizes the graph entropy X S[Pn0 ] = − Pn0 (Gn ) log Pn0 (Gn ) Gn across all the distributions Pn0 that define random graph ensembles with the degree distributions and average degrees converging to (4,6). These constraints are quite different than the SCM constraints, for example, because for any fixed n, we do not have a fixed set of constraints or sufficient statistics. Instead of introducing such sufficient statistics, e.g., expected degrees converging to a desired Pareto distribution, and proceeding from there, we show in Section 2 that the problem of graph entropy maximization under these constraints is equivalent to a graphon entropy maximization problem [33], i.e., to the problem of finding a graphon W that maximizes graphon entropy ZZ  0 σn [W ] = H W 0 (x, y) dµn (x) dµn (y), A2n where H(p) = −p log p − (1 − p) log(1 − p) is the entropy of a Bernoulli random variable with success probability p, across all the graphons W 0 that satisfy the constraint Z W 0 (x, y) dµn (y) = κn (x), (n − 1) An √ where κn (x) ≈ νn e−x is the expected degree of a node at coordinate x in the power-law HSCM. We then prove in Proposition 3.4 that the unique solution to this graphon entropy maximization problem is given by the Fermi-Dirac graphon W in (1). The fact that the Fermi-Dirac graphon is the unique solution to this graphon entropy maximization problem is a reflection of the basic fact in statistical physics that the grand canonical ensemble of Fermi particles, which are edges of energy x + y in our case, is the unique maximum-entropy ensemble with fixed expected values of energy and number of particles [34], in which the probability to find a particle at a state with energy x + y is given by (1). Yet the solutions to the graph and graphon entropy maximization problems yield  equivan ∗ lent random graph ensembles only if the rescaled graph entropy S [Pn ] = S[Pn ]/ 2 converges to the graphon entropy σn [W ]. Here we face another difficulty that since our ensembles are sparse, both S ∗ [Pn ] and σn [W ] converge to zero, so that we are actually to prove that the two entropies converge to each other faster than either of them converges to zero. To this end we prove in Theorems 3.5 and 3.6 that both the graphon and graph entropies converges to zero 7 as σn [W ], S ∗ [Pn ] ∼ ν log(n)/n. The key result then, also in Theorem 3.6, is the proof that if divided by the scaling factor of log(n)/n, the difference between the graphon and graph entropies vanishes in the limit, limn→∞ (n/ log n)|S ∗ [Pn ] − σn [W ]| → 0, meaning that the two entropies do indeed converge to each other faster than to zero. The combination of graphon (1) being the entropy maximizer, and the convergence of the rescaled graph entropy to the entropy of this graphon, implies the main result in Theorem 3.1 that the power-law HSCM is a graph entropy maximizer subject to the degree distribution and average degree constraints (4,6). 1.5 Exchangeability and projectivity In addition to the natural, dictated by real-world network data, requirements of constant, i.e., independent of graphs size n, average degree and power-law degree distribution, as well as the maximum-entropy requirement, dictated by the basic statistical considerations, a reasonable model of real networks must also satisfy two more requirements: exchangeability and projectivity. Exchangeability takes care of the fact that node labels in random graph models are usually meaningless. Even though node labels in real networks often have some network-specific meaning, such as autonomous system numbers in the Internet [9], node labels in random graph models can be, and usually are, random integer indices i = 1, 2, . . .. A random graph model is exchangeable if for any permutation σ of node indices i, the probabilities of any two graphs G and Gσ given by adjacency matrices Gi,j and Gσ(i),σ(j) are the same, P (G) = P (Gσ ) [35, 36]. A random graph model is projective if there exists a map πn7→n0 from graphs of size n to graphs of size n0 < n such that the probability of graphs in the model satisfies P (Gn0 ) = P (πn7→n0 (Gn )) [37, 38]. If this condition is satisfied, then it is easy to see that the same model admits a dual formulation as an equilibrium model of graphs of a fixed size, or as a growing graph model [39]. If this requirement is not satisfied, then as soon as one node is added to a graph, e.g., due to the growth of a real network that this graph represents, then the resulting bigger graph is effectively sampled from a different distribution corresponding to the model with different parameters, necessarily affecting the structure of its existing subgraphs, a clearly unrealistic scenario. As the simplest examples, Gn,p is projective (the map πn7→n0 simply selects any subset of n nodes consisting of n0 nodes), but Gn,k/n with constant k is not. In the first case, one can realize Gn,p by growing graphs adding nodes one at a time, and connecting each new node to all existing nodes with probability p, while in the second case such growth is impossible since the existing edges in the growing graphs must be removed with probability 1/n for the resulting graphs to be samples from Gn,k/n for each n. The HSCM random graphs are manifestly exchangeable as any graphon-based ensemble [40, 41]. Here we note that the fact that these graphs are both sparse and exchangeable is not by any means in conflict with the Aldous-Hoover theorem [35, 42] that states that the limit graphon, mapped to the unit square, of any exchangeable sparse graph family is necessarily zero. Indeed, if mapped to unit square, the limit HSCM graphon WI,n (3) is zero as well. We also note that the convergence of WI,n to zero does not mean that the ensemble converges to infinite empty graphs. In fact, the expected degree distribution and average degree in the ensemble converge to (4,6) in the limit, as stated above. If α = 2, the HSCM ensemble is also projective, but only with a specific labeling of nodes breaking exchangeability. This can be seen by observing that the density of points on α/2 1−α/2 intervals An , δn = n/µ(An ) = α β 2 ν n , and consequently on the whole real line R 8 in the limit, is constant δ = ν/2 if α = 2. In this case, the HSCM can be equivalently defined as a model of growing labeled graphs as follows: for n = 1, 2, . . ., the location xn of new node n belongs to An ’s increment, xn ∈ Bn = An \ An−1 (A0 = ∅), and sampled from µ restricted to this increment, i.e., from the probability measure µ̃n = µ|Bn /µ(Bn ) = α eα(x−Rn +Rn−1 ) . Having its location sampled, new node n then connects to all existing nodes i = 1 . . . n − 1 with probability given by (1). This growing model is equivalent to the original equilibrium HSCM definition in Section 1.1 only asymptotically. However, the exact equivalence, for each n, between the equilibrium HSCM with ordered xi s, xi < xi+1 , and its growing counterpart can be also achieved by ensuring that the joint distribution of xi s is exactly the same in both cases, using basic properties of Poisson point processes [39]. Specifically, the equilibrium definition in Section 1.1 must be adjusted by making the right boundary Rn of interval An not a fixed function of n (2), but a random variable Rn = (1/2) log(2Vn ), where Vn is a random variable sampled from the Gamma distribution with shape n and rate δ = ν/2. Node n is then placed at random coordinate xn = Rn , while the coordinates of the rest of n − 1 nodes are sampled from probability measure µn —measure µ restricted to the random interval An = (−∞, Rn ]—and then labeled in the increasing order of their coordinates. The growing model definition must be also adjusted: the coordinate xn+1 of the n+1’th node is determined by vn+1 = vn +V , where v0 = 0, vi = (1/2)e2xi , and V is a random variable sampled from the exponential distribution with rate δ = ν/2. One can show that coordinates xi , both for finite and infinite n, in both the equilibrium and growing HSCM models defined this way, are equivalent realizations of the same Poisson point process on R with measure µ and rate δ, converging to the binomial sampling with Rn fixed to (2) [39]. The projective map πn7→n0 in the projectivity definition above, simply maps graphs Gn to their subgraphs induced by nodes i = 1 . . . n0 . We note that even though the growing HSCM is not exchangeable since it relies on labeling of nodes in the increasing order of their coordinates, it is nevertheless equivalent to the equilibrium HSCM with this ordered labeling, because the joint distribution of node coordinates, and the linking probability as a function of these coordinates are the same in both the equilibrium and growing HSCM definitions [39]. This observation suggests that there might exist a less trivial projective map such that the HSCM is both projective and exchangeable at the same time. 1.6 Other remarks We note that thanks to its projectiveness, the power-law HSCM was shown in [24] to be equivalent to a soft version of preferential attachment, a model of growing graphs in which new nodes connect to existing nodes with probabilities proportional to the expected degrees of existing nodes. It is well-known that similar to the HSCM, the degree distribution and average degree in graphs grown according to preferential attachment do not essentially change either as graphs grow [43, 44]. If α = 2, then the equivalence between the HSCM and soft preferential attachment is exact. If α 6= 2, then the HSCM, even with ordered labeling, is not equivalent to soft preferential attachment, but it is equivalent to its adjusted version with a certain rate of (dis)appearance of edges between existing vertices [24]. We also note that the HSCM is the zero-clustering limit [45] of random hyperbolic graphs [27], where the α = 2 case corresponds to the uniform density of points in the hyperbolic space Hd , and where xi s are the radial coordinates of nodes i in the spherical coordinate system of the hyperboloid model of Hd . These coordinates can certainly not be negative, 9 but the expected fraction of nodes with negative coordinates in the HSCM is negligible: α/2 µn (R− ) = β 2 ν/n → 0. In the zero-clustering limit, the angular coordinates of nodes in d H are ignored in the hyperbolic graphon [27], which becomes equivalent to (1). As a final introductory remark we note that among the rigorous approaches to sparse exchangeable graphs, the HSCM definition is perhaps closest to graphon processes and graphexes in [46–48]. In particular in [48], where the focus is on graph convergence to well-defined limits, two ensembles are considered. One ensemble, also appearing in [47], is defined by any graphon W : R2+ → [0, 1] and any measure µ on R+ (R+ can be replaced with any measure space). Graphs of a certain expected size, which is a growing function of time t > 0, are defined by sampling points as the Poisson point process on R+ with intensity tµ, then connecting pairs of points with the probability given by W , and finally removing isolated vertices. The other ensemble is even more similar to the HSCM. It is still defined by W and µ on R+ , but the location of vertex n on R+ is sampled from µn = µ|An /µ(An ), where An s are finite-size intervals growing with n whose infinite union covers the whole R+ . The latter ensemble is not exchangeable, but both ensembles are shown to converge to properly stretched graphons defined by W , yet only if the expected average degree grows to infinity in the limit. The HSCM definition is different—in particular all n vertices of n-sized graphs are sampled from the same µn —ensuring exchangeability, and allowing for an explicit control of the degree distribution and average degree, which can be constant, but making the problem of graph convergence difficult. We do not further discuss graph convergence here, leaving it, as well as the generalization of the results to arbitrary degree distributions, for future publications. 1.7 Paper organization In the next Section 2 we first review in more detail the necessary background information and provide all the required definitions. In Section 3 we formally state all the results in the paper, while Section 4 contains all the proofs of these results. 2 2.1 Background information and definitions Graph ensembles and their entropy A graph ensemble is a set of graphs G with probability measure P on G. The Gibbs entropy of the ensemble is X S[P ] = − P (G) log P (G) (7) G∈G Note that this is just the entropy of the random variable G with respect to the probability measure P . When Gn is a graph of size n, sampled from G according to measure P , we write S[Gn ] instead of S[P ]. Given a set of constraints, e.g., in the form of graph properties fixed to given values, the maximum-entropy ensemble is given by P ∗ that maximizes S[P ] across all measures P that satisfy the constraints. These constraints can be either sharp (microcanonical) or soft (canonical), satisfied either exactly or on average, respectively. The simplest example of the constrained graph property is the number of edges, fixed to m, in graphs of size n. The corresponding microcanonical and canonical maximum-entropy ensem bles are Gn,m and Gn,p with p = m/ n2 , respectively. The P ∗ is respectively the uniform and exponential Boltzmann distribution P (G) = e−H(G) /Z with Hamiltonian H(G) = λm(G), 10 where m(G) is the number of edges in graph G, and the Lagrange multiplier λ is given by p = 1/ eλ + 1 [13]. When the constraints are given by the degrees of nodes, instead of the number of edges, we have the following characterization of the microcanonical and canonical ensemble. 2.1.1 Maximum-entropy graphs with a given degree sequence (CM) Given a degree sequence dn = d1 . . . dn , the microcanonical ensemble of graphs that have this degree sequence is the configuration model (CM) [7, 8]. The entropy-maximizing P ∗ is uniform on the set of all graphs that have degree sequence dn . 2.1.2 Maximum-entropy graphs with a given expected degree sequence (SCM) If the sharp CM constraints are relaxed to soft constraints, the result is the canonical ensemble of the soft configuration model (SCM) [14, 15]. Given an expected degree sequence kn , which in contrast to CM’s dn , does not have to be a graphical sequence of non-negative integers, but can be any sequence of non-negative real numbers, the SCM is defined by connecting nodes i and j with probabilities pij = ki = 1 , where Lagrange multipliers λi are the solution of +1 pij , i = 1 . . . n. (8) eλi +λj X (9) i<j The entropy-maximizing P ∗ is the Boltzmann distribution with Hamiltonian H(G) = where di (G) is the degree of node i in graph G [14, 15]. 2.2 P i λi di (G), Sparse graphs with a given degree distribution Let p(k), k = 0, 1, 2, . . ., be a probability density function with finite mean. Denote by D the corresponding random variable, and consider a sequence of graph ensembles that maximize Gibbs entropy under the constraint that for all k lim P (Dn = k) = P (D = k) , n→∞ (C1) where Dn is the degree of a uniformly chosen node in the ensemble of graphs of size n. In other words, this is a maximum-entropy ensemble of graphs whose degree distribution converges to p(k). In addition to the degree distribution constraint, we also want our graphs to be sparse. The most common definition of sparseness seems to be that the number of edges is o(n2 ), so that the expected average degree can be unbounded. In contrast, here we use the term sparse to mean that the expected degree converges to the expected value of D: lim E [Dn ] = E [D] := ν. n→∞ (C2) Constraint (C2) implies that the number of edges is O(n). We note that, in general, (C2) does not follow from (C1), since convergence in distribution does not necessarily imply convergence in expectation. 11 We also note that constraints (C1,C2) are neither sharp nor soft, since they deal only with the n → ∞ limits of the degree distribution and expected degree. We call these constraints hypersoft, since as we will see below, random graphs satisfying these constraints can be realized as random graphs with Lagrange multipliers that are not parameters but hyperparameters in the statistics terminology [25]. 2.3 Maximum-entropy graphs with hypersoft constraints Similar to the case of random graphs with a given (expected) degree sequence, we are to determine the distribution P that satisfies (C1) and (C2), and maximizes the Gibbs entropy. However, this task poses the question of what it means to maximize entropy under these limit constraints. In particular, unlike an ensemble of graphs with a given (expected) degree sequence, we are no longer dealing with a set of graphs of fixed size, but with a sequence of graphs (Gn )n≥1 of varying sizes. To answer this question, and to give a proper definition of entropy maximization under hypersoft constraints, we consider graphon-based ensembles of graphs. 2.3.1 Graphon-based graph ensembles In the simplest case, a graphon is a symmetric integrable function W : [0, 1]2 → [0, 1]. Graphons, or more precisely graphon equivalence classes, consisting of all functions Wσ such that W (x, y) = Wσ (σ(x), σ(y)) under all measure preserving transformations σ : [0, 1] → [0, 1], are well-defined limits of dense graph families [49, 41]. One can think of the interval [0, 1] as the continuum limit of node indices i, and of W as the limit of graphs’ adjacency matrices. Equivalently, W (x, y) is the probability that there exists the edge between “nodes” x and y. Graphons are an application to graphs of a class of earlier results on exchangeable arrays in statistics [35, 50], and are better known as the connection probability in random graphs with latent parameters in sociology [51–54] and network science [21, 22], also known in graph theory as inhomogeneous random graphs [55]. Here we use the term graphon to refer to any symmetric function W : A × A → [0, 1], for some A ⊆ R. Let µ be a probability measure on A ⊆ R and W a graphon. Then the standard graphonbased ensemble GW,µ,A known as W -random graphs [40] is the ensemble of random n-sized graphs Gn defined by first i.i.d. sampling n node coordinates xn = x1 , . . . , xn ∈ A according to µ, and then connecting every node pair (i, j), independently, with probability W (xi , xj ). To be able to satisfy the hypersoft constraints we generalize this ensemble as follows. Let µ be a measure on R, W a graphon, and letS A = (A1 , A2 , . . .), An ⊆ An+1 , be an infinite sequence of growing subsets of R such that n≥1 An = R and µ(An ) < ∞. We then define the graphon ensemble GW,µ,A = (GW,µn ,n )n≥1 to be random graphs (Gn )n≥1 defined by the graphon W and measures µn = µ|An , µ(An ) which are the probability measures on An associated with µ. To sample a graph Gn from this ensemble, n i.i.d. points xi ∈ An are first sampled according to measure µn , and then pairs of nodes i and j are connected by an edge with probability W (xi , xj ). We remark that if An = A = [0, 1] and µ is the uniform measure, we are in the most classical settings of W -random graphs [40]. In the case of an arbitrary A and measure µ, our 12 random graph ensemble is similar to a model considered recently in [48], Section 2.4. There, a growing graph construction is considered where Gn is created from Gn−1 by sampling the coordinate xn of node n according to measure µn , and then connecting it to all existing nodes i, independently with probability W (xn , xi ). The main difference between such sampling and the one above is that in the former case, the coordinates xi of different nodes i = 1 . . . n are sampled from different measures µi , thus breaking exchangeability, while in the latter case, all xi s are sampled from the same measure µn . 2.3.2 Bernoulli and graphon entropies Given the coordinates xn , edges in our random graphs are independent Bernoulli random variables, albeit with different success probabilities W (xi , xj ). The conditional Bernoulli entropy of random graphs with fixed coordinates xn is thus X S[Gn |xn ] = H (W (xi , xj )) , i<j where H is the Bernoulli entropy, H(p) = −p log p − (1 − p) log(1 − p), 0 ≤ p ≤ 1. The graphon entropy [50, 41, 56–59] of W with respect to µ on A is defined as ZZ σ[W, µ, A] = H (W (x, y)) dµ(x) dµ(y), (10) (11) A2 which we write as σ[W, µ], when µ has support A and no confusion arises. In addition, if Gn is a graph in the graphon ensemble GW,µn ,n , we write σ[Gn ] for σ[W, µn , An ]. Since for any two discrete random variables X and Y , the expectation of the conditional entropy of X given Y is a lower bound for X’s entropy, S[X] ≥ E [S[X|Y ]], the graphon entropy definition implies     n n S[Gn ] ≥ E [S[Gn |xn ]] = E [H(W (x, y))] = σ[Gn ], (12) 2 2 The graphon entropy is thus a lower bound for the rescaled Gibbs entropy defined as S ∗ [Gn ] = S[Gn ]  . n (13) 2 Before we give our definition of the maximum-entropy ensemble of sparse graphs, it is instructive to consider the case of dense graphs. 2.3.3 Dense maximum-entropy graphs with a given degree distribution Consider a sequence (dn )n≥1 of degree sequences dn = (d1 . . . dn )n , (di )n ≥ (di+1 )n , for which there exist constants 0 < c1 ≤ c2 such that c1 n ≤ (di )n ≤ c2 n for any (di )n ∈ dn . Now let (Gn )n≥1 be a sequence of microcanonical ensembles of random graphs, that is, CMs, defined by dn . If there exists a function f : [0, 1] → (0, 1) such that for any c ∈ (0, 1)   Dn lim P ≤ c = P (f (U ) ≤ c) , (14) n→∞ n 13 where Dn is the degree of a random node in random graph Gn ∈ Gn or equivalently, a uniformly sampled (di )n ∈ dn , and U is a uniform random variable on [0, 1], then it was proven in [20] that the limit of the CM sequence (Gn )n≥1 is given by the graphon W (x, y) = 1 eg(x)+g(y) +1 , (15) where g(x) is such that Z Z Z 1 WA (x, y) dµ(y) = W (x, y) dy = f (x) = A A 0 1 dµ(y), ex+y + 1 (16) where A is the image of g and µ = g −1 (functions f and g are continuous and strictly increasing almost everywhere on [0, 1] [20]). Some important observations are in order here. First, we note that (14) is very similar to (C1), with the exception that (14) implies that the degrees of all nodes are O(n), so that the graphs are dense. In particular, in our graphs we have that Dn = o(n) so that Dn /n → 0. Second, consider the problem of maximizing the graphon entropy under the constraint given by (16). We will show in Proposition 3.4 that the solution to this problem is given by (15), where g is defined by (16). Hence the graphon (15) obtained in [20] maximizes the graphon entropy under the constraint (16) imposed by the limit f of the sequence of rescaled degree sequences (dn /n)n≥1 . Third, Theorem D.5 in [41] states that in dense W -random graph ensembles GW,µ,A lim S ∗ [Gn ] = σ[W, µ, A], n→∞ (17) meaning that the rescaled Gibbs entropy of W -random graphs converges to the graphon entropy of W . Given f , this result suggests to consider the family of W -random graph ensembles G̃n defined by the Fermi-Dirac graphon (15) with g given by (16), which we call the dense hypersoft configuration model (HSCM). The distribution of rescaled degrees Dn /n in these HSCM graphs converges to f , cf. (14), while the limit of these graphs is also W since the limit of any dense W -random graphs is W [60]. That is, the limit of HSCM ensembles G̃n and the limit of CM ensembles Gn with any (dn /n)n≥1 converging to f , are the same Fermi-Dirac graphon W (15). Since the two ensembles have the same graphon limit, their rescaled Gibbs entropies converge to the same value, equal, thanks to (17), to the graphon entropy, even though for any finite n the two ensembles are quite different. Fourth, if we replace the sequence of degree sequences (dn )n≥1 with a sequence of expected degree sequences (kn )n≥1 converging upon rescaling to f , and then replace the sequence of CMs with the corresponding sequence of SCMs, then the limit of this SCM sequence is the same graphon W (15) [20], so that the rescaled SCM Gibbs entropy also converges to the same graphon entropy, squeezed, for any finite n, between the CM entropy [7, 61, 62] and the HSCM entropy (12). In other words, dense CM, SCM, and HSCM are all equivalent in the limit, versus the sparse case where the equivalence is broken [18, 19] since the graphon is zero in the limit. The key point here however is that the rescaled degree distribution in the dense HSCM converges to a well-defined limit, i.e., satisfies the hypersoft constraints (14), and that the HSCM Gibbs entropy converges to the graphon entropy. Therefore if we define a maximumentropy ensemble under given hypersoft constraints f to be an ensemble that: 1) satisfies these 14 constraints, i.e., has a degree distribution converging to f in the limit, 2) maximizes graphon entropy under these constraints given by (16), and 3) has rescaled Gibbs entropy converging to the graphon entropy, then the dense HSCM ensemble is trivially such an ensemble. In addition, this ensemble is the unique maximum-entropy hypersoft ensemble in the dense case [20]. These observations instruct us to extend this definition of maximum-entropy hypersoft dense graphs to sparse graphs, where we naturally replace the dense hypersoft constraints (14) with sparse hypersoft constraints (C1,C2). However, things become immediately less trivial in this case. In particular, we face the difficulty that since the limit graphon of any sparse exchangeable graph ensemble is zero according to the Aldous-Hoover theorem [35, 42], the entropy of this graphon is zero as well. Since this entropy is zero, |S ∗ [Gn ]−σ[Gn ]| → 0 in (17) does not necessarily imply that the rescaled Gibbs entropy converges to the graphon entropy. We address this difficulty next. 2.3.4 Rescaled graphon entropy of sparse graphs Consider again the generalized graphon ensemble GW,µn ,n of random graphs defined in Section 2.3.1, and their graphon entropy defined as ZZ σ[Gn ] = H (W (x, y)) dµn (x) dµn (y). (18) A2n If W 6= {0, 1} everywhere, then for any finite n, σ[Gn ] is positive, but if the ensemble is sparse, then limn→∞ σ[Gn ] = 0. To address this problem we rescale the graphon entropy σ[Gn ] such that upon rescaling it converges to a positive constant. That is, let an be a sequence such that lim an σ[Gn ] = a ∈ (0, ∞). n→∞ (19) This rescaling does not affect the graphon entropy maximization problem, because maximizing σ[Gn ] for every n as a functional of W under a given constraint is equivalent to maximizing an σ[Gn ] under the same constraint. Upon this rescaling, we see that the rescaled Gibbs entropy converges to the graphon entropy, generalizing (17), if lim an |S ∗ [Gn ] − σ[Gn ]| = 0, n→∞ (20) in which case an S ∗ [Gn ] converges to a. This condition implies that the rescaled Gibbs entropy S ∗ [Gn ] converges to the graphon entropy σ[Gn ] faster than either of them converge to zero. 2.3.5 Sparse maximum-entropy graphs with a given degree distribution With the graphon rescaling in the previous section, we can now define a graphon ensemble GW,µn ,n to be a maximum-entropy ensemble under the sparse hypersoft constraints (C1,C2) if: 1) the degree distribution and expected degree in GW,µn ,n converge to (C1,C2); 2) graphon entropy σ[Gn ] of GW,µn ,n is maximized for every n under the constraint imposed by (C1,C2); and 15 3) (20) holds, with an given by (19). Our main result (Theorem 3.1) is that the sparse power-law hypersoft configuration model, defined next, is a maximum-entropy model under hypersoft constraints. 2.3.6 Sparse power-law hypersoft configuration model (sparse HSCM) The sparse power-law HSCM(α, ν) is defined as the graphon ensemble GW,µn ,n = GW,µ,A , Section 2.3.1, with W (x, y) = 1 , +1 µ = eαx , α > 1, (21) ex+y (22) An = (−∞, Rn ], 1 n 1 Rn = log 2 , ν > 0, β = 1 − , 2 νβ α µ|An = α eα(x−Rn ) . µn = µ(An ) (23) (24) (25) The dense power-law HSCM is recovered from the above definition by setting ν = ν̃n, where ν̃ is a constant, in which case Rn = R = −(1/2) log ν̃β 2 , An = A = (−∞, R], and µn = µ = α eα(x−R) . 3 Results In this section we formally state our results, and provide brief overviews of their proofs appearing in subsequent sections. The main result is Theorem 3.1, stating that the HSCM(α, ν) defined in Section 2.3.6 is a maximum-entropy model under hypersoft power-law degree distribution constraints, according to the definition in Section 2.3.5. This result follows from Theorems 3.2-3.6 and Proposition 3.4. Theorems 3.2,3.3 establish the limits of the degree distribution and expected average degree in the HSCM(α, ν). Proposition 3.4 states that HSCM’s graphon uniquely maximizes the graphon entropy under the constraints imposed by the degree distribution. Theorem 3.5 establishes proper graphon rescaling and the limit of the rescaled graphon. Finally, the most critical and involved Theorem 3.6 proves that the rescaled Gibbs entropy of the HSCM converges to its rescaled graphon entropy. 3.1 Main result Let Y be a Pareto random variable with shape α > 1, scale νβ > 0, β = 1 − 1/α, so that Y ’s probability density function is PY (y) = α (νβ)α y −γ , y ≥ νβ, γ = α + 1, ( (νβ)α y −α if y ≥ νβ P (Y > y) = 1 otherwise. and Let D be a discrete random variable with probability density function  k  Y −Y P (D = k) = E e , k = 0, 1, 2, . . . , k! 16 (26) (27) (28) which is the mixed Poisson distribution with mixing parameter Y [63]. Then it follows that E [D] = E [Y ] = ν, (29) and since Y is a power law with exponent γ, the tail of D’s distribution is also a power law with the same exponent [63]. In particular, P (D = k) is given by (4). Therefore if D is the degree of a random node in a random graph ensemble, then graphs in this ensemble are sparse and have a power-law degree distribution. Our main result is: Theorem 3.1. For any α > 1 and ν > 0, HSCM(α, ν) is a maximum entropy ensemble of random graphs under the hypersoft constraints (C1,C2) with P (D = k) and ν defined by (2629). 3.2 The limit of the degree distribution in the HSCM The degree Dn of a random node i in a random HSCM(α, ν) graph of size n, conditioned on the node coordinates xn = x1 . . . xn , is the sum of n − 1 independent Bernoulli random variables with success probabilities W (xi , xj ), j 6= i. The distribution ofPthis sum can be approximated by the mixed Poisson distribution with the mixing parameter j6=i W (xi , xj ). Therefore after first integrating over xj with j 6= i and then over xi , the distribution of Dn is approximately the mixed Poisson distribution   (κn (X))k −κn (X) P (Dn = k) = E e , so that E [Dn ] = E [κn (X)], k! where the random variable X has density µn (25), and the mixing parameter κn (x) is the expected degree of a node at coordinate x: κn (x) = (n − 1)wn (x), Z wn (x) = W (x, y) dµn (y), (30) (31) An where An is given by (23). In the n → ∞ limit, the distribution of the expected degree κn (X) of X converges to the Pareto distribution with shape α and scale νβ. To prove this, we use the observation that the mass of measure µn is concentrated towards the right end of the interval An = (−∞, Rn ], where Rn  1 for large n. Therefore, not only the contributions coming from negative x, y are negligible, but we can also approximate the Fermi-Dirac graphon W (x, y) in (21) with its classical limit approximation c (x, y) = e−(x+y) W (32) on R2+ . In addition, the expected degree function wn (x) can be approximated with w bn (x) defined by ( ωn e−x if 0 ≤ x ≤ Rn w bn (x) = , where (33) 0 otherwise Z Rn ν 1  1 1 − e−(α−1)Rn 2 ωn = e−x dµn (x) = = + o n− 2 , (34) βeRn n 0 17 so that the expected degree of a node at coordinate x can be approximated by   1  1 κ bn (x) = nw bn (x) = e−x (νn) 2 + o n 2 . To see that κ bn (X) converges to a Pareto random variable, note that since X has density µn , it follows that for all t > νβ   nω α nωn  n P (b κn (X) > t) = P X < log = e−αRn t t = (νβ)α t−α (1 + o(1)) = P (Y > t) (1 + o(1)), where Y is a Pareto-distributed random variable (27). We therefore have the following result, the full proof of which can be found in Section 4.2.2: Theorem 3.2 (HSCM(α, ν) satisfies (C1)). Let α > 1, ν > 0, and Dn be the degree of a uniformly chosen vertex in the HSCM(α, ν) graphs of size n. Then, for each k = 0, 1, 2, . . ., lim P (Dn = k) = P (D = k) , n→∞ where P (D = k) is given by (28). 3.3 The limit of the expected average degree in the HSCM The expected degree of a random node in n-sized HSCM graphs is, for any fixed i, X E [Dn ] = E [W (Xi , Xj )] = (n − 1)E [W (X, Y )] , (35) j6=i where X and Y are independent random variables with distribution µn . Approximating c (x, y) on R2 , and using e2Rn = n/νβ 2 , we have W (x, y) with W + Rn ZZ Rn Z n 0 −x e c (x, y) dµn (x) dµn (y) = n W 2 dµn (x) = 0 2 n  −(α−1)Rn 1 − e = ν + o(1). β 2 e2Rn All other contributions are shown to also vanish in the n → ∞ limit in Section 4.2.3, where the following theorem is proved: Theorem 3.3 (HSCM satisfies (C2)). Let α > 1, ν > 0, and Dn be the degree of a uniformly chosen vertex in the HSCM(α, ν) graphs of size n. Then lim E [Dn ] = ν. n→∞ 3.4 HSCM maximizes graphon entropy Let A ⊆ R be some interval, µ a measure on A with µ(A) < ∞, and suppose some µ-integrable function w : A → R is given. Consider the graphon entropy maximization problem under the constraint Z w(x) = W (x, y) dµ(y). (36) A That is, the problem is to find a symmetric function W ∗ that maximizes graphon entropy σ[W, µ, A] in (11) and satisfies the constraint above, for fixed A and µ. 18 We note that this problem is a “continuous version” of the Gibbs entropy maximization problem in the SCM ensemble in Section 2.1.2. The following proposition, which we prove in Section 4.3.1, states that the solution to this problem is a “continuous version” of the SCM solution (8): Proposition 3.4 (HSCM Maximizes Graphon Entropy). Suppose there exists a solution W ∗ to the graphon entropy maximization problem defined above. Then this solution has the following form: 1 W ∗ (x, y) = λ(x)+λ(y) , (37) e +1 where function λ is µ-almost-everywhere uniquely defined on A by (36). This proposition proves that for each n, the HSCM(α, ν)’s Fermi-Dirac graphon (21) maximizes the graphon entropy under constraint (31), because A and µ in the HSCM(α, ν) are chosen such that λ(x) = x. This is always possible as soon as λ(x) is invertible, cf. Section 2.3.3. For each n, interval An (23) and measure µn (25) in the HSCM(α, ν) can be mapped to [0, 1] and 1, respectively, in which case λn (x) = Rn + (1/α) log x, leading to (3). In other words, node coordinates x in the original HSCM(α, ν) definition in Section 2.3.6, and their coordinates x̃ in its equivalent definition with An = [0, 1] and µn = 1 are related by x̃ = eα(x−Rn ) . 3.5 Graphon entropy scaling and convergence To derive the rate of convergence of HSCM’s graphon entropy to zero, it suffices to consider c (32) to W (21) on R2 . Its Bernoulli entropy (10) is the classical limit approximation W +   c (x, y) = (x + y)W c (x, y) − (1 − W c (x, y)) log(1 − W c (x, y)). H W c (Rn , Rn ) → 0, the second Since the most of the mass of µn is concentrated near Rn and W term is negligible. Integrating the first term over [0, Rn ], we get Rn ZZ c (x, y) dµn (x) dµn (y) = α2 e−2αRn (x + y)W Rn ZZ (x + y)e(α−1)(x+y) dx dy 0 0 2Rn ν n log n = 2 2Rn + O(n−1 ) = log 2 + O(n−1 ) = ν + O(n−1 ), β e n νβ n (38) from which we obtain the proper scaling as log(n)/n. All further details behind the proof of the following theorem are in Section 4.3.2. Theorem 3.5 (Graphon Entropy Convergence). Let σ[Gn ] be the graphon entropy (18) in the HSCM(α, ν) ensemble with any α > 1 and ν > 0. Then, as n → ∞, n σ[Gn ] − ν = O (1/ log n) . log n This theorem implies that σ[Gn ] goes to zero as log(n)/n, while n σ[Gn ]/ log n goes to ν as 1/ log n. 19 3.6 Gibbs entropy scaling and convergence The last part of Theorem 3.1 is to prove that the rescaled Gibbs entropy (13) of the HSCM converges to its graphon entropy (18) faster than the latter converges to zero. The graphon entropy is a trivial lower bound for the rescaled Gibbs entropy, Section 2.3.2, so the problem is to find an appropriate upper bound for the latter converging to the graphon entropy. To identify such an upper bound, we rely on an argument similar to [41]. Specifically, we first partition An into m intervals It that induce a partition of A2n into rectangles Ist = Is ×It , s, t = 1 . . . m. We then approximate the graphon by its average value on each rectangle. Such approximation brings in an error term on each rectangle. We then show that the Gibbs entropy is upper-bounded by the entropy of the averaged graphon, plus the sum of entropies of indicator random variables Mi which take value t if the coordinate xi of node i happens to fall within interval It . The smaller the number of intervals m, the smaller the total entropy of these random variables Mi , but the larger the sum of the error terms coming from graphon averaging, because rectangles Ist are large. The smaller they are, the smaller the total error term, but the larger the total entropy of the Mi ’s. The crux of the proof is to find a “sweet spot”—the right number of intervals guaranteeing the proper balance between these two types of contributions to the upper bound, which we want to be tighter than the rate of the convergence of the graphon entropy to zero. This program is executed in Section 4.4, where we prove the following theorem: Theorem 3.6 (Gibbs Entropy Convergence). Let σ[Gn ] be the graphon entropy (18) and S ∗ [Gn ] be the rescaled Gibbs entropy (13) in the HSCM(α, ν) ensemble with any α > 1 and ν > 0. Then n lim |S ∗ [Gn ] − σ[Gn ]| = 0, and n→∞ log n 2 S[Gn ] lim = ν. n→∞ n log n We remark that this theorem implies that S[Gn ] ∼ ν n log n, 2 which is the leading term of the (S)CM Gibbs entropy obtained in [23]. It is also instructive to compare this scaling of Gibbs entropy with its scaling in dense ensembles with limn→∞ σ[Gn ] = σ[W, µ, A] = σ ∈ (0, ∞) [41]: S[Gn ] ∼ σ 2 n . 2 Finally, it is worth mentioning that even though we use the Fermi-Dirac graphon W (21) to define our W -random graphs, the same convergence results could be obtained for W -random graphs defined by any other graphon W 0 such that   lim n E W (X, Y ) − W 0 (X, Y ) = 0, n→∞ with X and Y having density µn . In fact, to establish the required limits, we use the classic instead of W . Therefore there exists a vast equivalence cal limit approximation graphon W class of W -random graphs defined by graphons W 0 that all have the same limit degree distribution (C1) and average degree (C2), and whose rescaled Gibbs entropy converges to 20 the graphon entropy of the Fermi-Dirac W . However, it follows from Proposition 3.4 that among all these ensembles, only the W -random graph ensemble defined by the Fermi-Dirac graphon (21) uniquely maximizes the graphon entropy (11) for each n, which, by our definition of maximum-entropy ensembles under hypersoft constraints, is a necessary condition for graph entropy maximization. 4 Proofs In this section we provide the proofs of all the results stated in the previous section. In Section 4.1 we begin with some preliminary results on the accuracy of the approximation of c . In the same section the Fermi-Dirac graphon W (21) by the classical limit approximation W we also establish results showing that the main contribution of the integration with respect to µn is on the positive part [0, Rn ] of the interval An as defined by (23). In particular, we show that all contributions coming from the negative part of this interval, i.e., R− , are o(n−1 ), which means that for all our results the negative part of the support of our measure µn is negligible. We then proceed with proving Theorems 3.2 and 3.3 in Section 4.2. The proofs of Proposition 3.4 and Theorem 3.5 can be found in Section 4.3. Finally, the convergence of the rescaled Gibbs entropy to the graphon entropy (Theorem 3.6) is given in Section 4.4. 4.1 The classical limit approximation of the Fermi-Dirac graphon We will use e−(x+y) as an approximation to the graphon W to compute all necessary limits. To be precise we define c (x, y) = min{e−(x+y) , 1} W (39) c converge to zero as n tends to and show that differences between the integrals of W and W c , we could have also worked with the integral expressions infinity. Note that, instead of W involving W , which might have led to better bounds. However, these integrals tend to evaluate c are much easier to to combinations of hypergeometric functions, while the integrals of W evaluate and are sufficient for our purposes. c (x, y) we need to consider separately, the intervals (−∞, 0] and By the definition of W (0, Rn ]. Since graphons are symmetric functions, this leads to the following three different cases: I) − ∞ < x, y ≤ 0 II) − ∞ < y ≤ Rn and 0 < x ≤ Rn , III) 0 < x, y ≤ Rn . (40) c ≤ 1 and For case I) we note that W, W ZZ 0  dµn (y) dµn (x) = O n−α . (41) −∞ c , only the With this we obtain the following result, which shows that for both W and W 2 integration over (0, Rn ] , i.e. case III, matters. Lemma 4.1. Z Z Rn ZZ c (x, y) dµn (y) dµn (x) − W −∞ Rn   c (x, y) dµn (y) dµn (x) = O n− α+1 2 W 0 c with W . and the same result holds if we replace W 21 Proof. First note that −Rn Z Rn Z Z −Rn c (x, y) dµn (y) dµn (x) ≤ W −∞ −∞ We show that (42) −∞ 0 Z  dµn (y) = O n−α . Z −Rn Rn   c (x, y) dµn (y) dµn (x) = O n− α+1 2 W , (43) 0 which together with (41) and (42) implies the first result. The result for W follows by noting c. that W ≤ W We split the integral (43) as follows Z 0 Z Rn c (x, y) dµn (y) dµn (x) W −Rn 0 Z 0 Z = −x 0 Z Rn dµn (y) dµn (x) + −Rn −Rn 0 For the first integral we compute Z Z 0 Z −x dµn (y) dµn (x) = αe−2αRn −Rn Z 0 = e−2αRn e−(x+y) dµn (y) dµn (x). −x 0  e−αx − 1 eαx dx −Rn   αRn + e−αRn − 1 = O log(n)n−α Finally, the second integral evaluates to Z  α −2αRn 0  (α−1)Rn e e − e−(α−1)x e(α−1)x dx β −Rn !  α+1  α −2αRn e(α−1)Rn − 1 = e − Rn = O n− 2 , β α−1 from which the result follows since α > (α + 1)/2. c ). We can show a similar result for H(W ) and H(W Lemma 4.2. Z Z Rn ZZ  c H W (x, y) dµn (y) dµn (x) −  −∞ Rn   c (x, y) dµn (y) dµn (x) = n , H W 0 where  −α   O (log(n)n ) n = O log(n)2n−2   O n− 2+α 2 if 1 < α < 2, if α = 2, if α > 2, c with W . Moreover, the same result holds if we replace W 22 c . For this we split the interval An into three parts Proof. We will first prove the result for W (−∞, −Rn ], [−Rn , 0] and (0, Rn ] and show that the integrals on all ranges other than [0, Rn ]2 are bounded by a term that scales as n . Since H(p) ≤ log(2) for all 0 ≤ p ≤ 1 it follows from (41) and (42) that, for all α > 1, 0 ZZ    c (x, y) dµn (y) dµn (x) = O n−α = o(n ), H W −∞ Rn Z −Rn Z −∞    c (x, y) dµn (y) dµn (x) = O n−α = o(n ). H W −∞ c , we only need to consider the integration over (0, Rn ] × Hence, using the symmetry of W (−Rn , 0]. First we compute     c (x, y) = e−(x+y) (x + y) − (1 − e−(x+y) ) log 1 − e−(x+y) H W and observe that  − (1 − e−z ) log 1 − e−z ≤ e−2z for all large enough z. (44) Now let δ > 0 be such that (44) holds for all z ≥ δ. Then δ < Rn for sufficiently large n and we split the integration as follows Z 0 Rn Z 0   c (x, y) dµn (y) dµn (x) H W −Rn δ Z Z 0 −Rn 0 Rn Z   c (x, y) dµn (y) dµn (x) + H W = 0 Z   c (x, y) dµn (y) dµn (x). H W −Rn δ The first integral is O(n−α ). For the second we note that x + y > δ for all y > δ − x and hence Z Rn Z 0   c (x, y) dµn (y) dµn (x) H W −Rn δ Z Rn Z δ−x ≤ Z Rn Z 0 log(2) dµn (y) dµn (x) + −Rn δ δ e−2(x+y) dµn (y) dµn (x). δ−x For the second integral we obtain,  −α   Z Rn Z 0 O (log(n)n ) if 1 < α < 2, if α = 2, e−2(x+y) dµn (y) dµn (x) = O log(n)2n−2  2+α δ δ−x  − O n 2 if α > 2, while for the first integral we have Z Rn Z δ−x −2αRn Z log(2) dµn (y)dµn (x) ≤ αe δ −Rn δ 23 Rn  eαδ dx = O log(n)n−α . Therefore we conclude that Z  −α   O (log(n)n ) if 1 < α < 2,   0 c (x, y) dµn (y)dµn (x) = O log(n)n−2 if α = 2, H W    −∞  O n− 4+α 2 if α > 2, Rn Z 0 c. which yields the result for W For W we first compute that  (x + y)ex+y H(W (x, y)) = log 1 + ex+y − 1 + ex+y   x+y = log 1 + e − (x + y) + (x + y) 1 −  ex+y 1 + ex+y     (x + y) −(x+y) = log 1 + e−(x+y) + ≤ log 1 + e + (x + y)e−(x+y) . 1 + ex+y c (x, y)) and noting that log (1 + e−z ) ≤ e−2z for large Comparing this upper bound to H(W c. enough z, the result follows from the computation done for W With these two lemmas we now establish two important results on the approximations of c (X, Y ) W . The first shows that if X and Y are independent with distribution µn , then W −1 converges in expectation to W (X, Y ), faster than n . Proposition 4.3. Let X, Y be independent with density µn and α > 1. Then, as n → ∞, h  i  c (X, Y ) = O n− α+1 2 E W (X, Y ) − W Proof. Since h i ZZ c (X, Y ) = E W (X, Y ) − W Rn c (x, y) dµn (y) dµn (x), W (x, y) − W −∞ c (x, y) ≤ 1 it follows from Lemma 4.1 that it is enough to consider the and W (x, y) − W integral Z Z Rn c (x, y) dµn (y) dµn (x). W (x, y) − W 0 For this we note that c (x, y) ≤ e−2(x+y) . W (x, y) − W Hence we obtain Z Z Rn 0 c (x, y) dµn (y) dµn (x) W (x, y) − W  −α Z Rn 2  O (n )  ≤ e−2x dµn (x) = O log(n)2 n−2   0  O n−2 Since all these terms are o(n−(α+1)/2 ), the result follows. 24 if 1 < α < 2 if α = 2 if α > 2. c (X, Y )) converges in expectation to H(W (X, Y )), faster than Next we show that also H(W n−1 . Proposition 4.4. Let X, Y be independent with density µn and α > 1. Then, as n → ∞,  −α O (log(n)n ) if 1 < α < 2 i   h c (X, Y ) = O log(n)3 n−2 E H (W (X, Y )) − H W if α = 2    −2 O log(n)n if α > 2. Proof. Similar to the previous proof we now use Lemma 4.2 to show that it is enough to consider the integral Z Z Rn   c (x, y) dµn (y)dµn (x). H (W (x, y)) − H W 0 Define δW (x, y) = 1 , + ex+y e2(x+y) c (x, y) = W (x, y) + δW (x, y). Now fix x, y. Then, by the Taylor-Lagrange and note that W c (x, y) such that theorem, there exists a W (x, y) ≤ cW (x, y) ≤ W   c (x, y) = H 0 (cW (x, y)) δW (x, y) H (W (x, y)) − H W    c (x, y) ≤ H 0 (W (x, y)) + H 0 W δW (x, y). Next we compute that H 0 (W (x, y)) = (x + y),    c (x, y) = log ex+y − 1 , H0 W and where log(ex+y − 1) ≤ (x + y) for all x + y ≥ 1. We now split the integral and bound it as follows Z Z Rn   c (x, y) dµn (y) dµn (x) H (W (x, y)) − H W 0 Z 1 Z 1−x   c (x, y) dµn (y) dµn (x) = H (W (x, y)) − H W 0 0 Z 1 Z Rn   c (x, y) δW (x, y) dµn (y) dµn (x) + H (W (x, y)) − H W 0 Rn Z 1−x Z Rn   c (x, y) δW (x, y) dµn (y) dµn (x) H (W (x, y)) − H W + 1 Z 0 1 Z 1−x ≤ log(2) 0 Z 1Z +2 0 Z dµn (y) dµn (x) 0 Rn (x + y)δW (x, y) dµn (y) dµn (x) 1−x Rn Z Rn +2 (x + y)δW (x, y) dµn (y) dµn (x) 1 0 25 Z 1 Z 1−x ≤ log(2) ZZ 0 Rn (x + y)δW (x, y) dµn (y) dµn (x). dµn (y) dµn (x) + 4 0 0 The first integral is O(log(n)n−α ), while for the second we have Z Z Rn 4 (x + y)δW (x, y) dµn (y) dµn (x) 0  −α  Z Rn 2  O (log(n)n ) if 1 < α < 2 e−2x dµn (x) = O log(n)3 n−2 ≤ 8Rn if α = 2   0  −2 O log(n)n if α > 2. Comparing these scaling to the ones from Lemma 4.2 we see that the former are dominating, which finishes the proof. 4.2 Proofs for node degrees in the HSCM In this section we give the proofs of Theorem 3.2 and Theorem 3.3. Denote by Di the degree of node i and recall that Dn is the degree of a node, sampled uniformly at random. Since the node labels are interchangeable we can, without loss of generality, consider D1 for Dn . For Theorem 3.3 we h i use (35). We show that if X and Y are independent with distribution c µn , then E W (X, Y ) → ν. The final result will then follow from Proposition 4.3. PnThe proof of Theorem 3.2 is more involved. Given the coordinates X1 , . . . Xn we have Dn = j=2 W (X1 , Xj ). We follow the strategy from [64, Theorem 6.7] and construct a coupling between Dn and a mixed Poisson random variable Pn , with mixing parameter nw bn (X), where w bn (x) is given by (33) and X has distribution µn . In general, a coupling between two random variables X and Y consists of a pair of new b Yb ), with some joint probability distribution, such that X b and Yb have random variables (X, the same marginal probabilities as, respectively X and Y . The advantage of a coupling is that we can tune the joint distribution to fit our needs. For our proof we construct a coupling b n , Pbn ), such that (D   b n 6= Pbn = 0. lim P D n→∞ b n and Pbn have the same distribution as, respectively Dn and Pn we have Hence, since D   b n = k, D b n 6= Pbn , P (Dn = k) = P (Pn = k) + P D from which it follows that |P (Dn = k) − P (Pn = k) | → 0. Finally, we show that lim P (nw bn (X) > k) = P (Y > k) , n→∞ where Y is a Pareto random variable with shape νβ and scale α, i.e. it has probability density PY (y) given by (26). This implies that the mixed Poisson random variable Pn with mixing parameter nw bn (X) converges to a mixed Poisson D with mixing parameter Y , which proves the result. Before we give the proofs of the two theorems we first establish some technical results needed to construct the coupling, required for Theorem 3.2, the proof of which is given in Section 4.2.2. 26 4.2.1 Technical results on Poisson couplings and concentrations We first establish a general result for couplings between mixed Poisson random variables, where the mixing parameters converge in expectation. Lemma 4.5. Let Xn and Yn be random variables such that, lim E [|Xn − Yn |] = 0. n→∞ Then, if Pn and Qn are mixed Poisson random variables with, respectively, parameters Xn and Yn , P (Pn 6= Qn ) = O (E [|Xn − Yn |]) , and in particular lim P (Pn 6= Qn ) = 0. n→∞ Proof. Let an = E [|Xn − Yn |] and define the event An = {|Xn − Yn | ≤ lim P (|Xn − Yn | > n→∞ √ √ an }. Then, since E [|Xn − Yn |] = 0, √ n→∞ an an ) ≤ lim it is enough to show that lim P (Pn 6= Qn , An ) = 0. n→∞ √ Take P̂n to be mixed Poisson with parameter Xn + an . In addition, let Vn and Zn be mixed √ √ Poisson with parameter min{Xn + an − Yn , 0} and an , respectively. Then, since on An we √ have Xn + an > Yn we get, using Markov’s inequality,     P (Pn 6= Qn , An ) ≤ P Pn 6= Qn , Pn = P̂n , An + P P̂n 6= Pn , An   = P P̂n 6= Qn , An + P (Zn 6= 0, An ) = P (Vn 6= 0, An ) + P (Zn 6= 0, An ) √ √ ≤ P (Vn ≥ 1, An ) + P (Zn ≥ 1, An ) ≤ E [|Xn + an − Yn |] + an √ √ ≤ E [|Xn − Yn |] + 2 an = O( an ). Since an → 0 by assumption, this finishes the proof. c (X, Y ) converges in expectation to w Next we show that W bn (X) when X, Y have distribution µn . We also establish an upper bound on the rate of convergence, showing that it converges faster than n−1 . Lemma 4.6. Let X, Y be independent random variables with density µn . Then, as n → ∞, h i   1+α c (X, Y ) − w E W bn (X) = O log(n)n−α + n− 2 27 Proof. Recall that ( ωn e−x if 0 ≤ x ≤ Rn , where w bn (x) = 0 otherwise Z Rn 1 − e−(α−1)Rn ωn = e−x dµn (x) = . βeRn 0 Hence, it follows that h Z i c (X, Y ) − w E W bn (X) 0 Z Rn = c (x, y) dµn (y) dµn (x) W −∞ −∞ Z Rn Z Rn + −∞ 0 c (x, y) − w W bn (x) dµn (y) dµn (x), where the first integral is O(n−(α+1)/2 ) by Lemma 4.1. To deal with the second integral we first compute Rn Z Z −x  dµn (y) dµn (x) = αRn e−2αRn = O log(n)n−α . −∞ 0 Therefore we have Z Rn Z Rn c (x, y) − w W bn (x) dµn (y)dµn (x) −∞ 0 Rn Z Z −x = Z Rn Z Rn dµn (y)dµn (x) + 0 −∞ ≤ O log(n)n −α  Rn Z Z Rn + 0  = O log(n)n−α + ωn Z 0 Rn e−(x+y) − ωn e−x dµn (y)dµn (x) −x 0 e−x e−y − ωn dµn (y)dµn (x) e−y − ωn dµn (y) 0 We proceed to compute the last integral and show that it is O(n−(α+1)/2 ). For this we note that since e−y ≤ ωn ⇐⇒ y ≤ − log(ωn ), we have Z Rn e−y − ωn dµn (y) = 0 Z − log(ωn ) (ωn − e−y ) dµn (y) + Z Rn (e−y − ωn ) dµn (y) − log(ωn ) 0 For the first integral we compute Z − log(ωn ) (ωn − e −y  ωn1−α ωn1−α ωn 1 − − + α α−1 α α−1 −αR n ωn e e−αRn ωn e−αRn − − ωn e−αRn = − . α−1 β β −αRn ) dµn (y) = αe 0 = e−αRn β  28 Similar calculations yield Z Rn (e−y − ωn ) dµn (y) = − log(ωn ) and hence, Z Rn e−Rn ω 1−α e−αRn − ωn − n , β α−1  ωn e−αRn ω 1−α e−αRn 1 −Rn e + e−αRn − ωn − − n β β α−1  1 −Rn ≤ e + e−αRn − ωn . β e−y − ωn dµn (y) = 0 We now use this last upper bound, together with ωn =  1 − e−(α−1)Rn 1 −Rn = e − e−αRn , R n βe β to obtain Z ωn Rn  ωn −Rn + e−αRn − ωn2 e β  2 1 1 = 2 e−2Rn + e−α2Rn − 2 e−Rn − e−αRn β β  1+α  2 −(α+1)Rn = 2e = O n− 2 , β e−y − ωn dµn (y) ≤ 0 from which the result follows. 4.2.2 Proof of Theorem 3.2 b n , Pbn ), between Dn and Pn such that We start with constructing the coupling (D   b n 6= Pbn = 0. lim P D n→∞ (45) First, let Ij be the indicator that the edge (1, j) is present in Gn . Let Xn = X1 , . . . , Xn denote the coordinates of the nodes. Then, conditioned on these, we have that PnIj are independent Bernoulli random variables with probability W (X1 , Xj ), while D1 = j=2 Ij . Now, let Qn P be a mixed Poisson with parameter nj=2 W (X1 , Xj ). Then, see for instance [64, Theorem b 1, Q b n ) of D1 and Qn , such that 2.10], there exists a coupling (D n   X b 1 6= Q b n Xn ≤ P D W (X1 , Xj )2 . j=2 Therefore, we get that ZZ  b b P D1 6= Qn ≤ (n − 1)  Rn W (x, y)2 dµn (y) dµn (x)   −(α−1) Z Rn 2  O n  ≤n e−2x dµn (x) = O log(n)n−1   −∞  O n−1 −∞ 29 if 1 < α < 2 . if α = 2 if α > 2 Next, since X1 and Xj are independent for all 2 ≤ j ≤ n we use Proposition 4.3 together with Lemma 4.6 to obtain   n X E W (X1 , Xj ) − nw bn (X1 )  j=2 ≤ (n − 1)E [|W (X1 , X2 ) − w bn (X1 )|] + E [w bn (X1 )] h i h i c (X1 , X2 ) + (n − 1)E W c (X1 , X2 ) − w bn (X1 ) + E [w ≤ (n − 1)E W (X1 , X2 ) − W bn (X1 )]  α−1  = O n− 2 . from which it follows that  lim E  n→∞ n X  W (X1 , Xj ) − nw bn (X1 )  = 0. (46) j=2 Now let Pbn be a mixed Poisson random variable with mixing parameter nw bn (X1 ). Then by (46) and Lemma 4.5   bn = 0 lim P Pbn 6= Q n→∞ and (45) follows from       bn = b n 6= Q b n + P Pbn 6= Q bn . P D 6 Pbn ≤ P D As a result we have that     b n = k − P Pbn = k lim |P (Dn = k) − P (Pn = k)| = lim P D n→∞ n→∞     b n = k, D b n 6= Pbn ≤ lim P D b n 6= Pbn = 0, = lim P D n→∞ n→∞ (47) We will now prove that if X has density µn , then for any t > 0 lim |P (nw bn (X) > t) − P (Y > t)| = 0. n→∞ (48) A sequence {Pn }n≥1 of mixed Poisson random variables, with mixing parameters Zn converges to a mixed Poisson random variable P with mixing parameter Z, if Zn converge to Z in distribution, see for instance [63]. Therefore, since D is mixed Poisson with mixing parameter Y , (48) implies lim P (Pn = k) = P (D = k) n→∞ which, combined with (47), yields lim P (Dn = k) = P (D = k) . n→∞ 30 To establish (48), first define n = e−(α−1)Rn − e−2αRn so that nw bn (x) =  √ n  −(α−1)Rn 1 − e = νn e−x (1 − n ) . βeRn Next, for all 0 ≤ x ≤ Rn we have that νβ (1 − n ) ≤ nw bn (x) ≤ √ νn (1 − n ) and hence   P X < log P (nŵn (X) > t) = 1   0 Moreover, for any νβ (1 − n ) ≤ t ≤ √ nωn t  if νβ (1 − n ) ≤ t ≤ if t < νβ (1 − n ) else. √ νn (1 − n ) νn (1 − n )   nω  Z log( nωt n ) n P (nw bn (X) > t) = P X < log = dµn (x) t −∞  α  α  νβ −αRn nωn −Rn α −α (1 − n )α . =e = nωn e t = t t (49) Now, fix t < νβ. Then, for large enough n it holds that t < νβ(1 − n ) in which case (48) holds trivially, since both probabilities are 1. Hence we can assume, without loss of generality √ that t ≥ νβ. Then for n large enough such t ≤ νn (1 − n ), it follows from (49) and (27) that  α  α νβ νβ |P (nw bn (X) > t) − P (Y > t)| = (1 − n )α − t t  α νβ = (1 − (1 − n )α ) ≤ 1 − (1 − n )α , t which converges to zero as n → ∞ and hence proves (48). 4.2.3 Proof of Theorem 3.3 First using Lemma 4.1, we compute that Z Z Rn h i c (X, Y ) = (n − 1) c (x, y) dµn (y) dµn (x) (n − 1)E W W ZZ −∞ Rn = (n − 1)  α−1  e−(x+y) dµn (y) dµn (x) + O n− 2 0  α−1   (n − 1) −2Rn −αRn 2 = e 1 − e + O n− 2 β2    α−1   α−1  2 1 =ν 1− 2 1 − e−αRn + O n− 2 = ν + O n− 2 , β n 31 where the last line follows since −1 < −α/2 < −(α − 1)/2. Next recall (35) E [Dn ] = n X E [W (X1 , Xj )] = (n − 1)E [W (X, Y )] . j=2 Therefore, using Lemma 4.6 we have |E [Dn ] − ν| = |(n − 1)E [W (X, Y )] − ν| h i h i c (X, Y ) + (n − 1) E W c (X, Y ) − ν ≤ (n − 1)E W (X, Y ) − W    α−1  ≤ O log(n)n−(α−1) + O n− 2 , which yields the result. 4.3 Proofs for graphon entropy Here we derive the properties of the graphon entropy σ of our graphon W given by (21). We first give the proof of Proposition 3.4, and then that of Theorem 3.5. 4.3.1 Proof of Proposition 3.4 Recall that, given a measure µ on some interval A ⊆ R with µ(A) < ∞ and a µ-integrable function w(x), we consider the problem of maximizing σ[W, µ] under the constraint (36), Z w(x) = W (x, y) dµ(y). A In particular we need to show that if a solution exists, it is given by (37). Therefore, suppose there exists at least one graphon W which satisfies the constraint. For this we use the technique of Lagrange multipliers from variation calculus [65, 66]. To set up the framework, let W denote the space of symmetric functions W : A×A → [0, 1] which satisfy ZZ W (x, y) dµ(y) dµ(x) < ∞. A2 Observe that W is a convex subset of the Banach space WR , of all symmetric, µ-integrable, functions W : A × A → R and that the function w is an element of L1 (−∞, R) with respect to the measure µ, which is also Banach. Denote the latter space by L1A,µ . We slightly abuse notation and write σ for the functional ZZ H(W (x, y)) dµ(y) dµ(x) = σ[W, µ], W 7→ A2 and define the functional F : WR → L1A,µ by Z F(W )(x) = w(x) − W (x, y) dµ(y). A 32 Then we need to solve the following Euler-Lagrange equation for some Lagrange multiplier functional λ : L1A,µ → R, ∂ (σ(W ) − Λ ◦ F(W )) = 0, ∂W with respect to the Fréchet derivative. By Riesz Representation Theorem, we have that for any functional Λ : L1A,µ → R, there exists a λ ∈ L∞ , uniquely defined on A, such that Z Λ(f ) = λ(x)f (x) dµ(x). A Hence our Euler-Lagrange equation becomes     Z Z ∂ W (x, y) dµ(y) dµ(x) = 0. λ(x) w(x) − σ(W ) − ∂W A A (50) In addition, since W is symmetric we have ZZ ZZ 1 λ(x)W (x, y) dµ(y)dµ(x) = (λ(x) + λ(y))W (x, y) dµ(y) dµ(x) 2 A2 A2 and hence, by absorbing the factor 1/2 into λ we can rewrite our Euler-Lagrange equation as   Z ZZ ∂ σ(W ) − λ(x)w(x) dµ(x) + (λ(x) + λ(y))W (x, y) dµ(y) dµ(x) = 0. (51) ∂W A A2 For the two derivatives we have   W (x, y) ∂σ(W ) = log(1 − W (x, y)) − log(W (x, y)) = − log , ∂W 1 − W (x, y) Z  ZZ ∂ λ(x)w(x) dµ(x) + (λ(x) + λ(y))W (x, y) dµ(y) dµ(x) = λ(x) + λ(y). ∂W A A2 (52) Hence, we need to solve the equation   W (x, y) − log = λ(x) + λ(y), 1 − W (x, y) which gives (37). There is, however, a small technicality related to the computation of the derivative (52). This is caused by the fact that H is only defined on [0, 1]. In particular, for W1 , W2 ∈ W, it could be that W1 + W2 > 1 on some subset C ⊆ A × A and hence H(W1 + W2 ) is not well defined. To compute the Fréchet derivative we need H(W1 + εW2 ) to be well defined for any W1 , W2 ∈ W and some, small enough, ε > 0. To this end we fix a 0 < δ < 1 and define   δ , Hδ (x) = H (1 − δ)x + 2 which is just H, stretched out to the interval (−δ/2(1 − δ), 1 + δ/2(1 − δ)). Similarly we define σδ , using Hδ and consider the corresponding graphon entropy maximization problem. Then 33 we can compute ∂σδ /∂W , by taking a W 0 ∈ W and ε > 0 such that W +εW 0 < 1+δ/2(1−δ)). Then Hδ (W + εW 0 ) is well-defined and using the chain rule we obtain   ∂Hδ (W + εW 0 ) (1 − δ)(W + εW 0 ) + δ/2 0 , = −(1 − δ)W log ∂ε 1 − (1 − δ)(W + εW 0 ) − δ/2 from which it follows that ∂σδ (W ) = −(1 − δ) log ∂W  (1 − δ)W + δ/2 1 − (1 − δ)W − δ/2  . Therefore we have the following equation   (1 − δ)(W + δ/2 = λ(x) + λ(y), −(1 − δ) log 1 − (1 − δ)W − δ/2 which leads to a solution Wδ of the form  λ(x)+λ(y) 1 + e (1−δ) .  Wδ (x, y) = λ(x)+λ(y) (1−δ) (1 − δ) 1 + e 1− δ 2  Since δ < 1 it follows, using elementary algebra, that Wδ (x, y) ∈ [0, 1] for all x, y ∈ [0, 1]. From this we conclude that Wδ ∈ W. Moreover Wδ converges to (37) as δ → 0. Since σδ → σ as δ → 0, we obtain the graphon that maximizes the entropy σ, where the function λ is determined by the constraint (36). For uniqueness, suppose there exist two solutions, λ1 and λ2 in L1A,µ , to (36) and for which the graphon entropy is maximized. Let f (x) = λ1 (x) − λ2 (x) ∈ L1A,µ , so that λ1 = λ2 + f . Since λ1 satisfies (50) it follows that, due to linearity of the derivative, Z ∂ f (x)W (x, y) dµ(y) dµ(x) = 0. ∂W A Now since ∂ ∂W Z f (x)W (x, y) dµ(y) dµ(x) = f (x), A it follows that f = 0, µ almost everywhere on A and hence λ1 = λ2 , µ almost everywhere on A. 4.3.2 Proof of Theorem 3.5 First note that Proposition 4.4 implies that the difference in expectation between H(W ) c ) converges to zero faster than log(n)/n, so that for the purpose of Theorem and H(W c . Hence we are left to show that the rescaled entropy 3.5 we can approximate W with W c nσ[W , µn ]/ log(n) converges to ν. By Lemma 4.2 the integration over all regimes except [0, Rn ]2 goes to zero faster than log(n)/n and therefore we only need to consider integration over [0, Rn ]2 . The main idea for the rest of the proof is that in this range   c (x, y) ≈ (x + y)W c (x, y). H W 34 Let us first compute the integral over [0, Rn ]2 of the right hand side in the above equation. Z Z Rn c (x, y) dµn (y) dµn (x) (x + y)W 0 Z Z Rn 2 −2αRn (x + y)e(α−1)(x+y) dy dx =α e 0 = 2e−2(1+α)Rn     (α − 1)Rn e2αRn + e(α+1)Rn − e2Rn − e2αRn β 2 (α − 1)   2Rn  2 = 2 e−2Rn + e−(α+1)Rn − 2 e−2αRn + e−2Rn β β (α − 1) −2R n 2Rn e + O(n−1 ) = νn−1 log(n) + O(n−1 ) = β2 which implies that n lim n→∞ log(n) Rn ZZ c (x, y) dµn (y) dµn (x) = ν. (x + y)W (53) 0 Next we show that Z Z Rn      n c (x, y) − (x + y)W c (x, y) dµn (y) dµn (x) = O log(n)−1 , H W log(n) 0 (54) which, together with (53), gives n lim n→∞ log(n) Rn ZZ   c (x, y) dµn (y) dµn (x) = ν. H W (55) 0 We compute that  x+y   e −1 −(x+y) −(x+y) c H W (x, y) = e (x + y) − (1 − e ) log ex+y   c (x, y) − (1 − e−(x+y) ) log 1 − e−(x+y) . = (x + y)W  (56) Note that −(1 − e−z ) log (1 − e−z ) ≤ e−z for all z ≥ 0. Hence, it follows from (56) that, on [0, Rn ]2 ,       c (x, y) − (x + y)W c (x, y) = − 1 − e−(x+y) log 1 − e−(x+y) ≤ e−(x+y) = W c (x, y), H W so that by Theorem 3.3, Z Z Rn     n c (x, y) − (x + y)W c (x, y) dµn (y) dµn (x) H W log(n) 0 Z Z Rn  n c (x, y) dµn (y) dµn (x) = O log(n)−1 . ≤ W log(n) 0 To conclude, we have Z Z Rn   c c (x, y) dµn (y)dµn (x) σ[W , µn ] = H W −∞ 35 Rn ZZ =     c (x, y) dµn (y)dµn (x) + O n−α + log(n)n− α+1 2 H W 0 and hence, using (55), c , µn ] nσ[W = ν. n→∞ log(n) lim 4.4 Proof of Theorem 3.6 In this section we first formalize the strategy behind the proof of Theorem 3.6, briefly discussed in Section 3.6. This strategy relies on partitioning the interval An into non-overlapping subintervals. We then construct a specific partition satisfying certain requirements, and finish the proof of the theorem. 4.4.1 Averaging W by a partition of An We follow the strategy from [41]. First recall that for a graph Gn generated by the HSCM,     n n S[Gn ] ≥ E [S[Gn |xn ]] = E [H(W (x1 , x2 ))] = σ[Gn ], 2 2 and hence S ∗ [Gn ] ≥ σ[Gn ],  where S ∗ [Gn ] = S[Gn ]/ n2 denotes the normalized Gibbs entropy. Therefore, the key ingredient is to find a matching upper bound. For this we partition the range An = (−∞, Rn ] of our probability measure µn (x) into intervals and approximate W (x, y) by its average over the box in which x and y lie. To be more precise, let mn be any increasing sequence of positive integers, {ρt }0≤t≤mn be such that ρ0 = −∞, and ρmn = Rn , and consider the partition of (−∞, Rn ] given by It = (ρt−1 , ρt ] for 1 ≤ t ≤ mn . Now define Jn (x) = t ⇐⇒ x ∈ It , and let Mi be the random variable Jn (Xi ), where Xi has density function µn for any vertex i. The value of Mi equal to t indicates that vertex i happens to lie within interval It . Denoting the vector of these random variable by Mn = M1 , . . . , Mn , and their entropy by S[Mn ], we have that S[Gn ] ≤ S[Mn ] + S[Gn |Mn ]   Z Z Rn n f (x, y)) dµn (y) dµn (x), ≤ nS[M ] + H(W 2 −∞ f (x, y) is the average of W over the square IJ (x) × IJ (y) . That is, where W n n Z Z fn (x, y) = 1 W W (u, v) dµn (v) dµn (u), µx,y IJn (x) IJn (y) 36 (57) with Z Z µx,y = dµn (v) dµn (u), IJn (x) IJn (y) the measure of the box to which (x, y) belongs. fn approximates W . More specifically, The first step in our proof is to investigate how well W fn , µn ]| scales, depending on the we want to understand how the difference |σ[W, µn ] − σ[W specific partition. Note that for any partition ρt of An into mn intervals we have that S[M ] = − mn X P (M = t) log (P (M = t)) ≤ log(mn ), t=1 where the upper bound is achieved on the partition which is uniform according to measure µn . Since n nS[M ] 2S[M ]  = , n log(n) 2 log(n)(1 − 1/n) it is enough to find a partition ρt , with log(mn ) = o(log(n)), such that n fn , µn ]| = 0, |σ[W, µn ] − σ[W lim n→∞ log(n) (58) This then proves Theorem 3.6, since n n lim |S ∗ [Gn ] − σ[Gn ]| = lim (S ∗ [Gn ] − σ[Gn ]) n→∞ log(n) n→∞ log(n) n n nS[M ] fn , µn ]|  + |σ[W, µn ] − σ[W log(n) n2 log(n) ≤ lim n→∞  ≤ lim n→∞ 4.4.2 ! 2 log(mn ) n fn , µn ]| + |σ[W, µn ] − σ[W log(n)(1 − 1/n) log(n)  = 0. Constructing the partition We will take I1 = (−∞, −Rn ] and partition the remaining interval [−Rn , Rn ] into log(n)2 equal parts. To this end, let n be sufficiently large so that n ≥ νβ 2 , take mn = dlog(n)2 e + 1, and define the partition ρt by ρ0 = −∞, ρ1 = −Rn , and ρt = ρt−1 + 2Rn mn − 1 for all t = 2, . . . , mn . Note that log(mn ) = O(log log n) = o(log(n) so that all that is left, is to prove (58). In addition, Z −Rn Z Rn  n f (x, y)) dµn (y) dµn (x) = O log(n)−1 n1−α , H(W log(n) −∞ −∞ f with W . Hence it follows that in order to establish (58) and the same holds if we replace W we only need to consider the integral over the square [−Rn , Rn ] × [−Rn , Rn ]. That is, we need to show Z Z Rn    n f (x, y) H (W (x, y)) − H W dµn (y) dµn (x) = 0, (59) lim n→∞ log(n) −Rn 37 f , µn ], based on the mean value theorem which states For this we compare σ[W, µn ] and σ[W that for any a ≤ b, ∃ c ∈ [a, b], such that H(b) − H(a) = H 0 (c) (a − b). Here |H 0 (c)| = | log(c) − log(1 − c)|, and due to the symmetry of H we get, for any 0 < a ≤ c ≤ b < 1, min{H(a), H(b)} |H 0 (c)| ≤ . (60) min{a, b, 1 − a, 1 − b} Note that 0< min u∈IMn (x) , v∈IMn (y) fn (x, y) ≤ W (u, v) ≤ W max u∈IMn (x) , v∈IMn (y) W (u, v) < 1, (61) for all x, y ∈ [−Rn , Rn ]. In addition, for all x, y ∈ [−Rn , Rn ] and (u, v) ∈ IMn (x) × IMn (y) we have |x + y − u − v| ≤ 2Rn /mn ≤ 2/ log(n) and thus |1 − exp(x + y − u − v)| ≤ 3|x + y − u − v| by the mean value theorem. Therefore we have  u+v−x−y  |e − 1| |1 − ex+y−u−v | |eu+v − ex+y | ≤ min , |W (x, y) − W (u, v)| = (1 + ex+y )(1 + eu+v ) 1 + eu+v 1 + eu+v ≤ 3|u + v − x − y| min{W (u, v), 1 − W (u, v)}, By symmetry we obtain a similar upper bound with W (x, y) instead of W (u, v) and hence we conclude |W (x, y) − W (u, v)| ≤ 3|u + v − x − y| min{W (x, y), 1 − W (x, y), W (u, v), 1 − W (u, v)}. (62) Then, for any x + y ≤ u + v there are c, d such that x + y ≤ c + d ≤ u + v, so by (60) and (62) we get |H(W (x, y)) − H(W (u, v))| = |H 0 (W (c, d))(W (x, y) − W (u, v))| min{H(W (x, y)), H(W (u, v))} |W (x, y) − W (u, v)| ≤ min{W (x, y), 1 − W (x, y), W (u, v), 1 − W (u, v)} ≤ 3|x + y − u − v| · min{H(W (x, y)), H(W (u, v))}. (63) Next, for the partition ρt we have |It | = 2Rn 2Rn log(n) − log(νβ 2 ) 1 ≤ = ≤ , 2 2 mn − 1 log(n) log(n) log(n) for t ≥ 2. In addition, (61) implies that for (x, y) ∈ It × Is , with t, s ≥ 2, fn (x, y), W (x, y) ≤ W (ρt , ρs ), W (ρt−1 , ρs−1 ) ≤ W fn (x, y) = W (xs,t , ys,t ) on Is × It . and thus there is a pair xs,t , ys,t ∈ Is × It such that W Therefore, using (63), we get fn (x, y))| = |H(W (x, y)) − H(W (xs,t , ys,t ))| |H(W (x, y)) − H(W ≤ 3|x + y − xs,t − ys,t |H(W (x, y)) 38 ≤ 3(|It | + |Is |)H(W (x, y)) ≤ 6 H(W (x, y)) log(n) Finally, integrating the above equation over the whole square [−Rn , Rn ] × [−Rn , Rn ] we obtain Z Z Rn    6 f (x, y) H (W (x, y)) − H W dµn (y) dµn (x) ≤ σ[W, µn ], log(n) −Rn which proves (59) since lim n→∞ n 6n fn , µn ]| ≤ lim |σ[W, µn ] − σ[W σ[W, µn ] = 0 n→∞ (log n)2 log(n) thanks to Theorem 3.5. Acknowledgments This work was supported by the ARO grant No. W911NF-16-1-0391 and by the NSF grant No. CNS-1442999. References [1] S Boccaletti, V Latora, Y Moreno, M Chavez, and D.-U. Hwanga. Complex Networks: Structure and Dynamics. Phys Rep, 424:175–308, 2006. doi:10.1016/j.physrep.2005. 10.009. [2] M E J Newman. Networks: An Introduction. Oxford University Press, Oxford, 2010. [3] Albert-László Barabási. Network science. Cambridge University Press, Cambridge, UK, 2016. [4] Ray Solomonoff and Anatol Rapoport. Connectivity of random nets. B Math Biophys, 13(2):107–117, 1951. doi:10.1007/BF02478357. [5] E. N. Gilbert. Random Graphs. Ann Math Stat, 30(4):1141–1144, 1959. doi:10.1214/ aoms/1177706098. [6] P Erdős and A Rényi. On Random Graphs. Publ Math, 6:290–297, 1959. [7] Edward A Bender and E Rodney Canfield. The asymptotic number of labeled graphs with given degree sequences. J Comb Theory, Ser A, 24(3):296–307, 1978. doi:10.1016/ 0097-3165(78)90059-6. [8] M Molloy and B Reed. A Critical Point for Random Graphs With a Given Degree Sequence. Random Struct Algor, 6:161–179, 1995. [9] Amogh Dhamdhere and Constantine Dovrolis. Twelve Years in the Evolution of the Internet Ecosystem. IEEE/ACM Trans Netw, 19(5):1420–1433, 2011. doi:10.1109/ TNET.2011.2119327. [10] M. E. J. Newman. Clustering and preferential attachment in growing networks. Phys Rev E, 64(2):025102, 2001. doi:10.1103/PhysRevE.64.025102. 39 [11] Fan Chung and Linyuan Lu. Connected Components in Random Graphs with Given Expected Degree Sequences. Ann Comb, 6(2):125–145, 2002. doi:10.1007/PL00012580. [12] Fan Chung and Linyuan Lu. The average distances in random graphs with given expected degrees. Proc Natl Acad Sci USA, 99(25):15879–82, 2002. doi:10.1073/pnas. 252631999. [13] J Park and M E J Newman. Statistical Mechanics of Networks. Phys Rev E, 70:66117, 2004. doi:10.1103/PhysRevE.70.066117. [14] Ginestra Bianconi. The entropy of randomized network ensembles. EPL, 81(2):28005, 2008. doi:10.1209/0295-5075/81/28005. [15] Diego Garlaschelli and Maria Loffredo. Maximum likelihood: Extracting unbiased information from complex networks. Phys Rev E, 78(1):015101, 2008. doi:10.1103/ PhysRevE.78.015101. [16] Tiziano Squartini and Diego Garlaschelli. Analytical maximum-likelihood method to detect patterns in real networks. New J Phys, 13(8):083001, 2011. doi:10.1088/ 1367-2630/13/8/083001. [17] Paul W Holland and Samuel Leinhardt. An Exponential Family of Probability Distributions for Directed Graphs. J Am Stat Assoc, 76(373):33–50, 1981. doi:10.1080/ 01621459.1981.10477598. [18] Kartik Anand and Ginestra Bianconi. Entropy Measures for Networks: Toward an Information Theory of Complex Topologies. Phys Rev E, 80:045102(R), 2009. doi: 10.1103/PhysRevE.80.045102. [19] Tiziano Squartini, Joey de Mol, Frank den Hollander, and Diego Garlaschelli. Breaking of Ensemble Equivalence in Networks. Phys Rev Lett, 115(26):268701, 2015. doi:10. 1103/PhysRevLett.115.268701. [20] Sourav Chatterjee, Persi Diaconis, and Allan Sly. Random graphs with a given degree sequence. Ann Appl Probab, 21(4):1400–1435, 2011. doi:10.1214/10-AAP728. [21] Guido Caldarelli, Andrea Capocci, P. De Los Rios, and Miguel Angel Muñoz. Scale-Free Networks from Varying Vertex Intrinsic Fitness. Phys Rev Lett, 89(25):258702, 2002. doi:10.1103/PhysRevLett.89.258702. [22] Marián Boguñá and Romualdo Pastor-Satorras. Class of Correlated Random Networks with Hidden Variables. Phys Rev E, 68:36112, 2003. doi:10.1103/PhysRevE.68.036112. [23] Kartik Anand, Dmitri Krioukov, and Ginestra Bianconi. Entropy distribution and condensation in random networks with a given degree distribution. Phys Rev E, 89(6):062807, 2014. doi:10.1103/PhysRevE.89.062807. [24] Konstantin Zuev, Fragkiskos Papadopoulos, and Dmitri Krioukov. Hamiltonian dynamics of preferential attachment. J Phys A Math Theor, 49(10):105001, 2016. doi: 10.1088/1751-8113/49/10/105001. 40 [25] Michael Evans and Jeffrey S. Rosenthal. Probability and statistics: The science of uncertainty. W.H. Freeman and Co, New York, 2009. [26] Kimberly Claffy, Young Hyun, Ken Keys, Marina Fomenkov, and Dmitri Krioukov. Internet Mapping: From Art to Science. In 2009 Cybersecurity Appl Technol Conf Homel Secur, 2009. doi:10.1109/CATCH.2009.38. [27] Dmitri Krioukov, Fragkiskos Papadopoulos, Maksim Kitsak, Amin Vahdat, and Marián Boguñá. Hyperbolic Geometry of Complex Networks. Phys Rev E, 82:36106, 2010. doi:10.1103/PhysRevE.82.036106. [28] E T Jaynes. Information Theory and Statistical Mechanics. Phys Rev, 106(4):620–630, 1957. doi:10.1103/PhysRev.106.620. [29] J. Shore and R. Johnson. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Trans Inf Theory, 26(1):26–37, 1980. doi:10.1109/TIT.1980.1056144. [30] Y. Tikochinsky, N. Z. Tishby, and R. D. Levine. Consistent Inference of Probabilities for Reproducible Experiments. Phys Rev Lett, 52(16):1357–1360, 1984. doi:10.1103/ PhysRevLett.52.1357. [31] John Skilling. The Axioms of Maximum Entropy, In Maximum-Entropy and Bayesian Methods in Science and Engineering, pages 173–187. Springer Netherlands, Dordrecht, 1988. doi:10.1007/978-94-009-3049-0_8. [32] Claude Edmund Shannon. A Mathematical Theory of Communication. Bell Syst Tech J, 27(3):379–423, 1948. doi:10.1002/j.1538-7305.1948.tb01338.x. [33] Dmitri Krioukov. Clustering Implies Geometry in Networks. 116(20):208302, 2016. doi:10.1103/PhysRevLett.116.208302. Phys Rev Lett, [34] Jagat Narain Kapur. Maximum-entropy models in science and engineering. Wiley, New Delhi, 1989. [35] David J Aldous. Representations for partially exchangeable arrays of random variables. J Multivar Anal, 11(4):581–598, 1981. doi:10.1016/0047-259X(81)90099-3. [36] Persi Diaconis and Svante Janson. Graph Limits and Exhcangeable Random Graphs. Rend di Matemtica, 28:33–61, 2008. [37] Olav Kallenberg. Foundations of modern probability. Springer, New York, 2002. [38] Cosma Rohilla Shalizi and Alessandro Rinaldo. Consistency under sampling of exponential random graph models. Ann Stat, 41(2):508–535, 2013. doi:10.1214/12-AOS1044. [39] Dmitri Krioukov and Massimo Ostilli. Duality between equilibrium and growing networks. Phys Rev E, 88(2):022808, 2013. doi:10.1103/PhysRevE.88.022808. [40] László Lovász and Balázs Szegedy. Limits of dense graph sequences. J Comb Theory, Ser B, 96(6):933–957, 2006. doi:10.1016/j.jctb.2006.05.002. 41 [41] Svante Janson. Graphons, cut norm and distance, couplings and rearrangements. NYJM Monogr, 4, 2013. [42] Douglas N. Hoover. Relations on Probability Spaces and Arrays of Random Variables. Technical report, Institute for Adanced Study, Princeton, NJ, 1979. [43] S N Dorogovtsev, J F F Mendes, and A N Samukhin. Structure of Growing Networks with Preferential Linking. Phys Rev Lett, 85(21):4633–4636, 2000. doi:10.1103/ PhysRevLett.85.4633. [44] P L Krapivsky, S Redner, and F Leyvraz. Connectivity of Growing Random Networks. Phys Rev Lett, 85(21):4629–4632, 2000. doi:10.1103/PhysRevLett.85.4629. [45] Rodrigo Aldecoa, Chiara Orsini, and Dmitri Krioukov. Hyperbolic graph generator. Comput Phys Commun, 196:492–496, 2015. doi:10.1016/j.cpc.2015.05.028. [46] François Caron and Emily B. Fox. Sparse graphs using exchangeable random measures. 2014. arXiv:1401.1137. [47] Victor Veitch and Daniel M. Roy. The Class of Random Graphs Arising from Exchangeable Random Measures. 2015. arXiv:1512.03099. [48] Christian Borgs, Jennifer T Chayes, Henry Cohn, and Nina Holden. Sparse exchangeable graphs and their limits via graphon processes. 2016. arXiv:1601.07134. [49] László Lovász. Large Networks and Graph Limits. American Mathematical Society, Providence, RI, 2012. [50] David J Aldous. Exchangeability and related topics, In Ecole d’Ete de Probabilites de Saint-Flour XIII, pages 1–198. Springer, Berlin, Heidelberg, 1983. doi:10.1007/ BFb0099421. [51] David D McFarland and Daniel J Brown. Social distance as a metric: A systematic introduction to smallest space analysis, In Bonds of Pluralism: The Form and Substance of Urban Social Networks, pages 213–252. John Wiley, New York, 1973. [52] Katherine Faust. Comparison of methods for positional analysis: Structural and general equivalences. Soc Networks, 10(4):313–341, 1988. doi:10.1016/0378-8733(88) 90002-0. [53] J. M. McPherson and J. R. Ranger-Moore. Evolution on a Dancing Landscape: Organizations and Networks in Dynamic Blau Space. Soc Forces, 70(1):19–42, 1991. doi:10.1093/sf/70.1.19. [54] Peter D Hoff, Adrian E Raftery, and Mark S Handcock. Latent Space Approaches to Social Network Analysis. J Am Stat Assoc, 97(460):1090–1098, 2002. doi:10.1198/ 016214502388618906. [55] Béla Bollobás, Svante Janson, and Oliver Riordan. The phase transition in inhomogeneous random graphs. Random Struct Algor, 31(1):3–122, 2007. doi:10.1002/rsa. 20168. 42 [56] Hamed Hatami, Svante Janson, and Balázs Szegedy. Graph properties, graph limits and entropy. 2013. arXiv:1312.5626. [57] Sourav Chatterjee and S.R.S. Varadhan. The large deviation principle for the Erds-Rényi random graph. Eur J Comb, 32(7):1000–1017, 2011. doi:10.1016/j.ejc.2011.03.014. [58] Sourav Chatterjee and Persi Diaconis. Estimating and understanding exponential random graph models. Ann Stat, 41(5):2428–2461, 2013. doi:10.1214/13-AOS1155. [59] Charles Radin and Lorenzo Sadun. Singularities in the Entropy of Asymptotically Large Simple Graphs. J Stat Phys, 158(4):853–865, 2015. doi:10.1007/s10955-014-1151-3. [60] Christian Borgs, Jennifer T Chayes, László Lovász, Vera T. Sós, and Katalin Vesztergombi. Convergent sequences of dense graphs I: Subgraph frequencies, metric properties and testing. Adv Math, 219(6):1801–1851, 2008. doi:10.1016/j.aim.2008.07.008. [61] Ginestra Bianconi. Entropy of Network Ensembles. Phys Rev E, 79:36114, 2009. [62] A Barvinok and J A Hartigan. The number of graphs and a random graph with a given degree sequence. Random Struct Algor, 42(3):301–348, 2013. doi:10.1002/rsa.20409. [63] Jan Grandell. Mixed Poisson processes. Chapman & Hall/CRC, London, UK, 1997. [64] Remco van der Hofstad. Random graphs and complex networks. Cambridge University Press, Cambridge, UK, 2016. [65] Jean Pierre Aubin. Applied functional analysis. John Wiley & Sons, Inc, New York, 2000. [66] I. M. Gelfand and S. V. Fomin. Calculus of variations. Dover Publications, New York, 2000. 43
10math.ST
arXiv:1208.4035v1 [cs.PL] 16 Aug 2012 QIRAL: A High Level Language for Lattice QCD Code Generation Denis Barthou Gilbert Grosdidier University of Bordeaux, Bordeaux, France [email protected] Laboratoire de l’Accélerateur Linéaire, Orsay, France [email protected] Michael Kruse Olivier Pene INRIA Saclay / ALCHEMY, Orsay, France [email protected] Laboratoire de Physique Théorique, Orsay, France [email protected] Claude Tadonki Mines ParisTech/CRI - Centre de Recherche en Informatique, Fontainebleau, France [email protected] Abstract Quantum chromodynamics (QCD) is the theory of subnuclear physics, aiming at modeling the strong nuclear force, which is responsible for the interactions of nuclear particles. Lattice QCD (LQCD) is the corresponding discrete formulation, widely used for simulations. The computational demand for the LQCD is tremendous. It has played a role in the history of supercomputers, and has also helped defining their future. Designing efficient LQCD codes that scale well on large (probably hybrid) supercomputers requires to express many levels of parallelism, and then to explore different algorithmic solutions. While algorithmic exploration is the key for efficient parallel codes, the process is hampered by the necessary coding effort. We present in this paper a domain-specific language, QIRAL, for a high level expression of parallel algorithms in LQCD. Parallelism is expressed through the mathematical structure of the sparse matrices defining the problem. We show that from these expressions and from algorithmic and preconditioning formulations, a parallel code can be automatically generated. This separates algorithms and mathematical formulations for LQCD (that belong to the field of physics) from the effective orchestration of parallelism, mainly related to compilation and optimization for parallel architectures. 1 Introduction Quantum Chromodynamics (QCD) is the theory of strong subnuclear interactions[13]. Lattice QCD (LQCD) is the numerical approach to solve QCD equations. LQCD simulations are extremely demanding in terms of computing power, and require large parallel and distributed machines. At the heart of the simulation, there is an inversion problem: Ax = b, (1) where A is a large sparse (also sparse and implicit) matrix, called Dirac matrix, b is a known vector and x is the unknown. To model reality accurately, A should be of size around 232 × 232 elements at least. Current simulations on supercomputers handle sizes up to 224 × 224 elements. High performance LQCD codes on multicores, multinode and hybrid (using GPUs) architectures are quite complex to design: performance results from the interplay between the algorithms chosen to solve the inversion and the parallelism orchestration on the target architecture. Exploring the space of algorithms able to solve the inversion, such as mixed precision or communication-avoiding algorithms, aggressive preconditioning, deflation techniques or any 1 QIRAL: A High-Level Language for LQCD Code Generation Barthou et al. combination of these is essential in order to reach higher levels of performance. Many handtuned, parallel libraries dedicated to LQCD, such as Chroma [5] or QUDA [2] propose building blocks for these algorithms, so as to ease their development. Parallelism does not stem from the algorithm themselves but from the structure of the sparse matrices involved in the computation. However, there are a number of shortcomings to the library approach: First, any significant evolution of the hardware requires to tune the library to the new architecture. This can lead to change the grain of parallelism (as an adaptation to cache sizes for instance) or change the data layout. Then, sparse matrices for LQCD, in particular the matrix A, have a very regular structure and library functions take advantage of it. Combining different algorithms, such as preconditioners, leads to structural changes in matrices that are not supported by these libraries. These two limitations hinder considerably the time necessary to develop a parallel/distributed code. We propose in this paper a high-level Domain-Specific Language, QIRAL, to model LQCD problems and enable automatic parallel code generation. This novel approach makes possible the exploration and test of new algorithms for LQCD. Sparse matrices in LQCD can be structured using algebra operators on dense matrices and the key idea is to use this structure to express parallelism. This extends ideas proposed in SPIRAL [8], the library generator for DSP algorithms to more complex codes and matrices. The problem formulation is first presented in Section 2, then the language is described in Section 3 and its implementation in Section 4. 2 Lattice QCD Description The principle of LQCD is to discretize space-time and describe the theory on the resulting lattice. The lattice has to contain a very large number of sites since it has to be fine grained and describe large enough volumes. LQCD exists since 1974. Huge progress in hardware, software and algorithms have been achieved, but it is not enough to really sit on the parameters of nature. The light quarks, “u” and “d” are still described by quarks heavier than in nature while the heavy “b” quark is described as lighter. This implies systematic errors in our results. To break this limitation, several orders of magnitudes will be needed in the computing power and related resources. It will demand new hardware with several level of parallelism, and make coding more and more complicated. Our goal is to provide tools helping to face this new situation. The heaviest part in the LQCD calculation is to generate a large Monte-Carlo sample of very large files (field configurations) according to an algorithm named “Hybrid Monte-Carlo”. It is a Markovian process, every step of which takes several hours on the most powerful computers. The algorithm is complex but it spends most of its time in inverting very large linear systems which depend on the field configuration. Typically one will deal with matrices with billions of lines and columns. The second heaviest part in the calculation is to compute ”quark propagators” which again boils down to solving large linear systems of the same type[7]. Therefore we will concentre on this task. The matrices involved in these computation represent 4D stencil computations, where each vertex is updated by the value of its 8 neighbours. Their structure is therefore very regular, statically known, and it is used in the following section. 3 A High-Level Domain-Specific Language QIRAL is a high level language for the description of algorithms and for the definition of matrices, vectors and equations specific to LQCD. The objective of the algorithmic part is to define algorithms independently of the expression of sparse matrices used in LQCD. The 2 QIRAL: A High-Level Language for LQCD Code Generation Barthou et al. Dirac = IL⊗C⊗S + 2 ∗ i ∗ κ ∗ µ ∗ IL⊗C ⊗ γ5 M −d ((J ⊗ IC ) ∗ U (d)[s]) ⊗ (IS + γ[d]) L s∈L M d +κ∗ ((JL ⊗ IC ) ∗ U (−d)[s]) ⊗ (IS − γ[d]) d∈D s∈L +κ∗ X d∈D X Figure 1: Definition of Dirac matrix on a Lattice L in QIRAL. objective of the system of definitions and equations is to define properties and structure sparse matrices in order to be able to find parallelism. While the algorithmic part uses straightforward operational semantics, the equational part defines a rewriting system. For the sake of simplicity, QIRAL is a subset of LATEX, meaning that the QIRAL input can be either compiled into a pdf file, for rendering purposes, or compiled into executable codes. Algorithms and definitions correspond to different predefined LATEX environments. Variables, Types: Variables and constants used in QIRAL are vectors (denoted by the type V) of any length, matrices of any size (M), complex (C) or real numbers (R). Besides, counted loops are indexed by variables of type index, iterating over a domain (denoted indexset). Index variables are potentially multidimensional, and integers are a particular case of index value. Functions of any number of argument of these types can be also defined. The size of a vector is defined through the size of its index set. The size of an index set can be left undefined. If V1 is the vector and IS is an index set, V1[IS] denotes the subvector indexed only by IS. Matrices and vectors cannot be manipulated or defined element-wise. Instead, matrices and vectors are built using either constant, predefined values such as identity IIS (for the identity on an index set IS), or operators such as +, −, ∗ and the transposition, conjugate, direct sum and tensor product. The tensor product ⊗ and direct sum ⊕ are defined by: A ⊗ B = [aij B]ij , A⊕B =  A 0 0 B  . These two operators define parallel operations and help defining the sparse matrices of LQCD. Definition and Equations: All LQCD knowledge is given as a system of definition (for matrices and vectors) and a system of equations on these values. In particular, the structure of sparse matrices, explicitly defining where non-zero elements are located, is given in these definitions. This structure is then propagated in the algorithms. Figure 1 defines the sparse Dirac matrix. Declarations of index sets L, C, S, D are not shown here, as well as the declaration of the constant matrices used here. The direct sums indexed by the vertices of the lattice (L) define block-diagonal matrices. These diagonals are then shifted by d or −d columns by a permutation matrix JLd (predefined). Algorithms, Preconditioners: Many algorithms proposed for solving Equation 1 are Krylov methods. Figure 2 presents two algorithms in QIRAL. The first is a variant of the conjugate gradient and is representative of iterative methods. The second one, Schur complement method, is a preconditioner: Computing x, solution of Equation 1 is achieved by computing two solutions to smaller problems. The keyword Match helps to define the algorithm as a rewriting rule: Whenever the statement in the Match condition is found, it can be rewritten by the algorithm. For the SCHUR 3 QIRAL: A High-Level Language for LQCD Code Generation Barthou et al. preconditioner, this rewriting can be performed at the condition that the requirement is fulfilled: P1 AP1t has to be invertible. Using identities defined through the equation system, the rewriting system proves here that indeed, the requirement is valid, when matrix A is Dirac matrix and P1 is a projection matrix keeping only vertices of the lattice with even coordinates (even-odd preconditioning). QIRAL is expressive enough to represent different variants of conAlgo 1: Conjugate Gradient, Normal Resolution [CGNR] Input : A ∈ M, b ∈ V, ǫ ∈ R Output : x ∈ V Match : x = A−1 ∗ b Var : r, p, Ap, z ∈ V, α, β, nr , nz , nz1 ∈ R r = b ; z = A† ∗ r; p =z ; x =0 ; nz = (z | z) ; nr = (r | r) ; while (nr > ǫ) do Ap = A ∗ p; α = nz /(Ap | Ap) ; x =x+α∗p ; r = r − α ∗ Ap ; z = A† ∗ r ; nz1 = (z | z) ; β = nz1 /(nz ) ; p= z+β∗p ; nz = nz1 ; nr = (r | r) ; Algo 2: Definition of Schur complement method [SCHUR] Input Output Match Var : : : : A, P1 , P2 ∈ M, b ∈ V x ∈ V x = A−1 ∗ b v1 , v2 , x1 , x2 ∈ V, D11 , D12 , D21 , D22 ∈ M Require : invertible(P1 ∗ A ∗ P1t ) D21 = P2 ∗ A ∗ P1t ; D11 = P1 ∗ A ∗ P1t ; D22 = P2 ∗ A ∗ P2t ; D12 = P1 ∗ A ∗ P2t ; v1 = P1 ∗ b ; v2 = P2 ∗ b ; −1 −1 x2 = (D22 − D21 ∗ D11 ∗ D12 )−1 ∗ (v2 − D21 ∗ D11 ∗ v1 ) ; −1 x1 = D11 ∗ (v1 − D12 ∗ x2 ) ; t ∗ x + Pt ∗ x ; x = P1 1 2 2 Figure 2: Two algorithms. On the left: A variant of the conjugate gradient method; on the right: A preconditioner, the Schur complement method. jugate gradient, BiCGSTAB, methods with restart (such as GCR), and other methods proposed by physicists. 4 From QIRAL to parallel code The QIRAL compiler takes as input a file describing algorithms and equations and generates parallel code. The phases are described in 3 and presented in detail in the following. Figure 3: Overview of QIRAL compilation chain Rewriting System Generation: From its current LATEX implementation, the QIRAL input is translated into a set of rewriting rules and equations, using Maude framework [3]. Maude is a multi-purpose rewriting system, handling equational rewriting rules and reflection. More 4 QIRAL: A High-Level Language for LQCD Code Generation Barthou et al. precisely, definitions are translated by a first phase, tex2maude into equations (or conditional equations) and algorithms into rewriting rules. The output file contains domain specific definitions (e.g. the Dirac operator from Figure 1), the desired program (in our case x = Dirac−1 b), and all algorithms and preconditioners we want to apply. Definitions have a semantic similar to a rewriting rule: the left hand side is rewritten into the right hand side. To ensure the existence of a normal form, the system of equation has to be convergent and confluent. So far, our implementation does not use a tool such as an automatic Church-Rosser Checker [4] . Algorithms are translated into conditional rules, applied is their prerequisite are checked. The left hand side of the rule correspond to the Match clause and the algorithm itself is the right hand side. This rewriting system is merged with another one defining general algebraic properties, code generation rewriting rules and code optimizations. The main phase of the QIRAL compiler is therefore described through rewriting system, following works such as Stratego [11]. QIRAL is a static strongly type language, vectors and matrices are defined by their index sets. Type checking is the first analysis achieved by this main phase. Applying Algorithms and Simplifications: The user provides the list of algorithms to compose and the initial program (here, we focused on the equation x = Dirac−1 b). Exploring different algorithms and sequences of algorithms boils down to change the list given to the QIRAL compiler. Checking that algorithm requirements is automatically achieved by the rewriting system, using the equational theory provided through the system of definitions. The equational system, using both equations coming from LQCD definitions and algebraic properties involving the different operators, simplifies terms that are equal to zero. The result is a program where the matrix A of the algorithms has been replaced either by the Dirac matrix, or by a matrix obtained through transformation by preconditioners. Loop generation and parallelization: At this step, the initial statement has been replaced by the algorithm statements, directly using the Dirac matrix or a preconditioned version. Assignment statements are vector assignments: Values for all vertices of the lattice can be modified in one statement. Matrices are still described using tensor products and direct sums. Loops are obtained by transforming all indexed sums, products into loops or sequences. For instance, the direct sum operator indexed by the lattice L in the definition of Dirac matrix, in Figure 1 is transformed into a parallel loop over all elements of the lattice. This loop is parallel, due to the meaning of ⊕. As the lattice is 4D, either 4 nested loops are created, or one single, linearized loop is created. The choice depends on a parameter in the QIRAL compiler. Some usual compiler transformations are then used, computing dependences, fusioning loops, applying scalar promotion and other optimizations. At the end of this phase, an OpenMP code is produced, essentially by identifying for parallel loops the set of private variables. These transformations are driven by rewriting strategies, using reflection in Maude. Matching Library Calls: The resulting code still uses some high level operators on dense matrices, such as tensor products on dense matrices, matrix-vector product. These operators are then replaced by library calls. For this step, it is sufficient to define for each library the expression it computes, as a rewriting rule. We defined LION, a set of hand-written library functions used for validation purposes. Finally, post-processing phase, mostly syntactic rewriting, transforms this output into a C function. This function is compiled with a program skeleton and a runtime that initializes data, calls the generated code and stores the result. Custom functions can also be defined here 5 QIRAL: A High-Level Language for LQCD Code Generation Barthou et al. ... while(nr > epsilon) { #pragma omp parallel for private(ID30,ID31,ID43,ID44,ID56) for(iL = 0; iL < L; iL ++) { ID31 = spnaddspn(matmulspn(tensor(U[uup(iL, dt)], gmsubgm(gmdiag(c1), G(dt))), p[sup(IDX, dt)]), spnaddspn(matmulspn(tensor(U[uup(iL, dz)], gmsubgm(gmdiag(c1), G(dz))), p[sup(IDX, dz)]), spnaddspn(matmulspn(tensor(U[uup(iL, dy)], gmsubgm(gmdiag(c1), G(dy))), p[sup(IDX, dy)]), matmulspn(tensor(U[uup(iL, dx)], gmsubgm(gmdiag(c1), G(dx))), p[sup(IDX, dx)])))) ; ID30 = cplmulspn(kappa, ID31) ; ID44 = spnaddspn(matmulspn(tensor(U[udn(iL, dt)], gmaddgm(gmdiag(c1), G(dt))), p[sdn(IDX, dt)]), spnaddspn(matmulspn(tensor(U[udn(iL, dz)], gmaddgm(gmdiag(c1), G(dz))), p[sdn(IDX, dz)]), spnaddspn(matmulspn(tensor(U[udn(iL, dy)], gmaddgm(gmdiag(c1), G(dy))), p[sdn(IDX, dy)]), matmulspn(tensor(U[udn(iL, dx)], gmaddgm(gmdiag(c1), G(dx))), p[sdn(IDX, dx)])))) ; ID43 = cplmulspn(kappa, ID44) ; ... Figure 4: Sample output C code produced for CGNR algorithm since undefined operations from the QIRAL input appear as functions calls. One application is to call BLAS routines instead of letting QIRAL implement them. For instance one defines a rule that says (C = A ∗ B) = dgemm(A, B, C). At this stage, we are more concerned about the correctness of the output rather than the efficiency of the code, which will be the purpose of further steps. Automatically generated codes for different algorithms and preconditionings show different convergence speed, as shown in Figure 5. Figure 5: Convergence speed for a lattice of size 44 for different methods: Conjugate Gradient Normal Error (CGNE), Normal Resolution (CGNR), Biconjugate Gradient (BiCGSTAB), Modified conjugate gradient with preconditioning (MCR1). 5 Conclusion This paper has presented an overview of QIRAL, a high level language for automatic parallel code generation of Lattice QCD codes. The language is based on algorithmic specifications and on mathematical definitions of mathematical objects used in the computation. 6 QIRAL: A High-Level Language for LQCD Code Generation Barthou et al. The contribution of this short paper is to show that a high-level representation makes possible the automatic generation of complex LQCD parallel code. Parallelism directly stems from the structure of sparse, regular matrices used in LQCD. While the initial matrix represents a stencil computation, QIRAL is able to manipulate more complex structures obtained through preconditioning for instance, unlike Pochoir [10]. The approach, similar to the one proposed by Ashby et al. [1] enables the user to define new equations and domain-specific definitions. The QIRAL compiler is able to keep such information through transformations resulting from preconditioners or algorithms. The tensor product and direct sum operators are translated into parallel loops and lead to OpenMP code generation. This way, algorithmic exploration, the key for higher levels of performance, can be freed from the constraints and costs of parallel tuning. Besides generation of distributed codes with communications is within reach. For heterogeneous architectures, such as Cell or GPUs, further work for automatic data-layout optimization is required, in order to reach levels of performance of previous works (such as [12, 6, 9] for the CELL BE and [2] for the GPU). References [1] T. Ashby, A. Kennedy, and M. O’Boyle. Cross Component Optimisation in a High Level CategoryBased Language. In Marco Danelutto, Marco Vanneschi, and Domenico Laforenza, editors, EuroPar Parallel Processing, volume 3149 of LNCS, pages 654–661. Springer, 2004. [2] M.A. Clark, R. Babich, K. Barros, R.C. Brower, and C. Rebbi. Solving lattice QCD systems of equations using mixed precision solvers on GPUs. Computer Physics Communications, 181(9):1517 – 1528, 2010. [3] Manuel Clavel, Fransisco Durán, Steven Eker, Patrick Lincoln, Narciso Martı́-Oliet, José Meseguer, and Jose F. Quesada. The Maude System. In Intl. Conf. on Rewriting Techniques and Applications, pages 240–243, London, UK, 1999. Springer-Verlag. [4] Francisco Durán and José Meseguer. A church-rosser checker tool for conditional order-sorted equational maude specifications. In Rewriting Logic and Its Applications, volume 6381 of LNCS, pages 69–85. Springer, 2010. [5] Robert G. Edwards and Balint Joo. The Chroma Software System for Lattice QCD. NUCL.PHYS.PROC., 140:832, 2005. [6] Khaled Z. Ibrahim and Francois Bodin. Implementing Wilson-Dirac operator on the cell broadband engine. In Intl. Conf. on Supercomputing, pages 4–14, New York, NY, USA, 2008. ACM. [7] Martin Lüscher. Local coherence and deflation of the low quark modes in lattice qcd. J. of High Energy Physics, 2007(07):081, 2007. [8] Markus Püschel, Franz Franchetti, and Yevgen Voronenko. Encyclopedia of Parallel Computing, chapter Spiral. Springer, 2011. [9] Claude Tadonki, Gilbert Grodidier, and Olivier Pene. An efficient CELL library for lattice quantum chromodynamics. SIGARCH Comput. Archit. News, 38:60–65, January 2011. [10] Yuan Tang, Rezaul Alam Chowdhury, Bradley C Kuszmaul, Chi-Keung Luk, and Charles E Leiserson. The pochoir stencil compiler. Symp. on Parallelism in algorithms and architectures, page 117, 2011. [11] Eelco Visser and Zine el Abidine Benaissa. A core language for rewriting. Electronic Notes in Theoretical Computer Science, 15(0):422 – 441, 1998. Rewriting Logic and its Applications. [12] Pavlos Vranas, Matthias A. Blumrich, Dong Chen, Alan Gara, Mark Giampapa, Philip Heidelberger, Valentina Salapura, James C. Sexton, Ron Soltz, and Gyan Bhanot. Massively parallel quantum chromodynamics. IBM J. of Research and Development, pages 189–198, 2008. [13] Frank Wilczek. What QCD Tells Us About Nature – and Why We Should Listen. NUCL.PHYS.A, 663:3, 2000. 7
6cs.PL
Forward Stochastic Reachability Analysis for Uncontrolled Linear Systems using Fourier Transforms Abraham P. Vinod Electrical & Comp. Eng. University of New Mexico Albuquerque, NM 87131, USA arXiv:1610.04550v3 [cs.SY] 13 Feb 2017 [email protected] Baisravan HomChaudhuri Electrical & Comp. Eng. University of New Mexico Albuquerque, NM 87131, USA [email protected] ABSTRACT We propose a scalable method for forward stochastic reachability analysis for uncontrolled linear systems with affine disturbance. Our method uses Fourier transforms to efficiently compute the forward stochastic reach probability measure (density) and the forward stochastic reach set. This method is applicable to systems with bounded or unbounded disturbance sets. We also examine the convexity properties of the forward stochastic reach set and its probability density. Motivated by the problem of a robot attempting to capture a stochastically moving, non-adversarial target, we demonstrate our method on two simple examples. Where traditional approaches provide approximations, our method provides exact analytical expressions for the densities and probability of capture. CCS Concepts •Theory of computation → Stochastic control and optimization; Convex optimization; •Computing methodologies → Control methods; Computational control theory; Keywords Stochastic reachability; Fourier transform; Convex optimization 1. INTRODUCTION Reachability analysis of discrete-time dynamical systems with stochastic disturbance input is an established tool to provide probabilistic assurances of safety or performance and has been applied in several domains, including motion planning in robotics [1, 2], spacecraft docking [3], fishery management and mathematical finance [4], and autonomous survelliance [5]. The computation of stochastic reachable and viable sets has been formulated within a dynamic programming framework [4, 6] that generalizes to discrete-time stochastic hybrid systems, and suffers from the well-known Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. HSCC ’17, April 18–20, 2017, Pittsburgh, PA, USA c 2017 ACM. ISBN 978-1-4503-4590-3/17/04. . . $15.00 DOI: http://dx.doi.org/10.1145/3049797.3049818 Meeko M. K. Oishi Electrical & Comp. Eng. University of New Mexico Albuquerque, NM 87131, USA [email protected] curse of dimensionality [7]. Recent work in computing stochastic reachable and viable sets aims to circumvent these computational challenges, through approximate dynamic programming [8–10], Gaussian mixtures [9], particle filters [3, 10], and convex chance-constrained optimization [3,5]. These methods have been applied to systems that are at most 6dimensional [8] – far beyond the scope of what is possible with dynamic programming, but are not scalable to larger and more realistic scenarios. We focus in particular on the forward stochastic reachable set, defined as the smallest closed set that covers all the reachable states. For LTI systems with bounded disturbances, established verification methods [11–13] can be adapted to overapproximate the forward stochastic reachable set. However, these methods return a trivial result with unbounded disturbances and do not address the forward stochastic reach probability measure, which provides the likelihood of reaching a given set of states. We present a scalable method to perform forward stochastic reachability analysis of LTI systems with stochastic dynamics, that is, a method to compute the forward stochastic reachable set as well as its probability measure. We show that Fourier transforms can be used to provide exact reachability analysis, for systems with bounded or unbounded disturbances. We provide both iterative and analytical expressions for the probability density, and show that explicit expressions can be derived in some cases. We are motivated by a particular application: pursuit of a dynamic, non-adversarial target [14]. Such a scenario may arise in e.g., the rescue of a lost first responder in a building on fire [15], capture of a non-aggressive UAV in an urban environment [16], or other non-antagonistic situations. Solutions for an adversarial target, based in a two-person, zero-sum differential game, can accommodate bounded disturbances with unknown stochasticity [17–21], but will be conservative for a non-adversarial target. We seek scalable solutions that synthesize an optimal controller for the nonadversarial scenario, by exploiting the forward reachable set and probability measure for the target. We analyze the convexity properties of the forward stochastic reach probability density and sets, and propose a convex optimization problem to provide the exact probabilistic guarantee of success and the corresponding optimal controller. The main contributions of this paper are: 1) a method to efficiently compute the forward stochastic reach sets and the corresponding probability measure for linear systems with uncertainty using Fourier transforms, 2) the convexity prop- erties of the forward stochastic reach probability measure and sets, and 3) a convex formulation to maximize the probability of capture of a non-adversarial target with stochastic dynamics using the forward stochastic reachability analysis. The paper is organized as follows: We define the forward stochastic reachability problem and review some properties from probability theory and Fourier analysis in Section 2. Section 3 formulates the forward stochastic reachability analysis for linear systems using Fourier transforms and provides convexity results for the probability measure and the stochastic reachable set. We apply the proposed method to solve the controller synthesis problem in Section 4, and provide conclusions and directions for future work in Section 5. 2. PRELIMINARIES AND PROBLEM FORMULATION In this section, we review some properties from probability theory and Fourier analysis relevant for our discussion and setup the problems. For detailed discussions on probability theory, see [22–25], and on Fourier analysis, see [26]. We denote random vectors with bold case and non-random vectors with an overline. 2.1 Preliminaries A random vector w ∈ Rp is defined in a probability space (W, σ(W), Pw ). Given a sample space W, the sigma-algebra σ(W) provides a collection of measurable sets defined over W. The sample space can be either countable (discrete random vector w) or uncountable (continuous random vector w). In this paper, we focus only on absolutely continuous random variables. For an absolutely continuous random vector, the probability measure defines a probability density function ψw : Rp → R such that given a (Borel) set R B ∈ σ(W), we have Pw {w ∈ B} = B ψw (z̄)dz̄. Here, dz̄ is short for dz1 dz2 . . . dzp . We will use the concept of support to define the forward stochastic reach set. The support of a random vector is the smallest closed set that will occur almost surely. Formally, the support of a random vector w is a unique minimal closed set supp(w) ∈ σ(W) such that 1) Pw {w ∈ supp(w)} = 1, and 2) if D ∈ σ(W) such that Pw {w ∈ D} = 1, then supp(w) ⊆ D [22, Section 10, Ex. 12.9]. Alternatively, denoting the Euclidean ball of radius δ centered at z̄ as Ball(z̄, δ), we have (1) which is equivalent to (2) via [27, Proposition 19.3.2], ( ) Z supp(w) = z̄ ∈ W|∀δ > 0, ψw (z̄)dz̄ > 0 (1) Ball(z̄,δ) = W \ {z̄ ∈ W|∃δ > 0, ψw (z̄) = 0 a.e. in Ball(z̄, δ)} (2) For a continuous ψw , (2) is the support of the density [28, Section 8.8]. Denoting the closure of a set using cl(·), supp(w) = support(ψw ) = cl({z̄ ∈ W|ψw (z̄) > 0}). (3) The characteristic function (CF) of a random vector w ∈ Rp with probability density function ψw (z̄) is h  i Ψw (ᾱ) , Ew exp j ᾱ> w Z > = ej ᾱ z̄ ψw (z̄)dz̄ = F {ψw (·)} (−ᾱ) (4) Rp where F {·} denotes the Fourier transformation operator and ᾱ ∈ Rp . Given a CF Ψw (ᾱ), the density function can be computed as ψw (z̄) = F −1 {Ψw (·)} (−z̄)  p Z > 1 e−j ᾱ z̄ Ψw (ᾱ)dᾱ = 2π p R (5) where F −1 {·} denotes the inverse Fourier transformation operator and dᾱ is short for dα1 dα2 . . . dαp . We define the Ld (Rp ) spaces, 1 ≤ d < ∞, of measurable real-valued functions with finite Ld norm. The Ld 1/d R norm of a density ψw is kψw kd , Rd |ψw (z̄)|d dz̄ where | · | denotes the absolute value. Here, L1 (Rp ) is the space of absolutely integrable functions, and L2 (Rp ) is the space of square-integrable functions. The Fourier transformation is defined for all functions in L1 (Rp ) and all functions in L2 (Rp ). Since probability densities are, by definition, in L1 (Rp ), CFs exist for every probability density [26, Section 1]. Let w1 , w2 ∈ Rp be random vectors with densities ψw1 and ψw2 and CFs Ψw1 and Ψw2 respectively. By definition, ψw1 , ψw2 ∈ L1 (Rp ). Let z̄, z̄1 , z̄2 , ᾱ, ᾱ1 , ᾱ2 ∈ Rp , β̄ ∈ Rn .  P1) If x = w1 + w2 , then ψx (z̄) = ψw1 (·) ∗ ψw2 (·) (z̄) and Ψx (ᾱ) = Ψw1 (ᾱ)Ψw2 (ᾱ) [24, Section 21.11]. Also, supp(x) ⊆ cl(supp(w1 )⊕supp(w2 )) [28, Lemma 8.15]. Here, ∗ denotes convolution and ⊕ Minkowski sum. P2) If x = F w1 + G where F ∈ Rp×n , G ∈ Rn are matrices, Ψx (β̄) = exp j β̄ > G Ψw1 (F > β̄) (from [24, Section 22.6] and [26, Equation 1.5]). > P3) If w1 and w2 are independent vectors, then x = [w> 1 w2 ] has probability density ψx (ȳ) = ψw1 (z̄1 )ψw2 (z̄2 ), ȳ = > [z̄1> z̄2> ] ∈ R2p and CF Ψx (γ̄) = Ψw1 (ᾱ1 )Ψw2 (ᾱ2 ), γ̄ = > [ᾱ1> ᾱ2> ] ∈ R2p [24, Section 22.4]. > P4) The marginal probability density of any group of k components selected from the random vector w1 is obtained by setting the remaining p − k Fourier variables in the CF to zero [24, Section 22.4]. An additional assumption of square-integrability of the probability density of the random variable w3 ∈ Rp results in ψw3 ∈ L1 (Rp ) ∩ L2 (Rp ). Along with Properties P1-P4, ψw3 satisfies the following property: P5) The Fourier transform preserves the inner product in L2 (Rp ) [26, Theorem 2.3]. Given a square-integrable function h(z̄) with Fourier transform H(ᾱ) = F {h(·)} (ᾱ) and a square-integrable probability density ψw3 ,  p Z Z † 1 F {ψw3 (·)} (ᾱ) ψw3 (z̄)† h(z̄)dz̄ = 2π p p R R × H(ᾱ)dᾱ Here, † denotes complex conjugation. Lemma 1. For square-integrable ψw3 and h,  p Z Z 1 ψw3 (z̄)h(z̄)dz̄ = Ψw3 (ᾱ)H(ᾱ)dᾱ. 2π Rp Rp (6) Proof: Follows from Property P5, (5), and [24, Section 10.6]. Since probability densities are real functions, † † ψw3 (z̄) = ψw3 (z̄) and F {ψw3 (·)} (ᾱ) = Ψw3 (ᾱ). 2.2 Problem formulation Consider the discrete-time linear time-invariant system, x[t + 1] = Ax[t] + Bw[t] (7) n with state x[t] ∈ X ⊆ R , disturbance w[t] ∈ W ⊆ Rp , and matrices A, B of appropriate dimensions. Let x̄0 ∈ X be the given initial state and T be the finite time horizon. The disturbance set W is an uncountable set which can be either bounded or unbounded, and the random vector w[t] is defined in a probability space (W, σ(W), Pw ). The random vector w[t] is assumed to be absolutely continuous with a known density function ψw . The disturbance process w[·] is assumed to be a random process with an independent and identical distribution (IID). The dynamics in (7) are quite general and includes affine noise perturbed LTI discrete-time systems with known statefeedback based inputs. An additional affine term in (7) can include affine noise perturbed LTI discrete-time systems with known open-loop controllers. For time τ ∈ [1, T ], x[τ ] = Aτ x̄0 + Cn×(τ p) W with Cn×(τ p) = [B AB A B . . . A τ −1 2 > > > (8) B] ∈ R n×(τ p) and > W = [w [τ − 1] w [τ − 2] . . . w [0]] as a random vect=τ −1 tor defined by the sequence of random vectors {w[t]}t=0 . For any given τ , the random vector W is defined in the τ product space (W τ , σ(W τ ), PW ) where W τ = t=0 W and Qτ Qτ PW = t=0 Pw , ψW = t=0 ψw by the IID assumption of the random process w[·]. From (8), the state x[·] is a random process with the random vector at each instant x[t] defined 0 in the probability space (X , σ(X ), Pt,x̄ x ) where the probat,x̄0 bility measure Px is induced from PW . We denote the random process originating from x̄0 as ξ[·; x̄0 ] where for all t, > ξ[t; x̄0 ] = x[t], and let Z̄ = [z̄ > [τ − 1] z̄ > [τ − 2] . . . z̄ > [0]] ∈ τp R denote a realization of the random vector W . An iterative method for the forward stochastic reachability analysis (FSR analysis) is given in [1] [29, Section 10.5]. However, for systems perturbed by continuous random variables, the numerical implementation of the iterative approach becomes erroneous for larger time instants due to the iterative numerical evaluation of improper integrals, motivating the need for an alternative implementable approach. × Problem 1. Given the dynamics (7) with initial state x̄0 , construct analytical expressions at time instant τ for 1. the smallest closed set that covers all the reachable states (i.e., the forward stochastic reach set), and 2. the probability measure over the forward stochastic reach set (i.e., the forward stochastic reach probability measure) that do not require an iterative approach. We are additionally interested in applying the forward stochastic reachable set (FSR set) and probability measure (FSRPM) to the problem of capturing a non-adversarial target. Specifically, we seek a convex formulation to the problem of capturing a non-adversarial target. This requires convexity of the FSR set and concavity of the objective function defined on the probability of successful capture. Problem 2. For a finite time horizon, find a) a convex formulation for the maximization of the probability of capture of a non-adversarial target with known stochastic dynamics and initial state, and b) the resulting optimal controller that a deterministic robot must employ when there is a non-zero probability of capture. Problem 2.a. Characterize the sufficient conditions for logconcavity of the FSRPM and convexity of the FSR set. 3. FORWARD STOCHASTIC REACHABILITY ANALYSIS The existence of forward stochastic reach probability density (FSRPD) for systems of the form (7) has been demonstrated in [29, Section 10.5]. For any τ ∈ [1, T ], the probability of the state reaching a set S ∈ σ(X ) at time τ starting 0 at x̄0 is defined using the FSRPM Pτ,x̄ , x Z 0 Pτ,x̄ {x[τ ] ∈ S} = ψx (ȳ; τ, x̄0 )dȳ, ȳ ∈ Rn . (9) x S Since the disturbance set W is uncountable, we focus on the computation of the FSRPD ψx , and use (9) to link it to the FSRPM. We have discussed the countable case in [1]. We define the forward stochastic reach set (FSR set) as the support of the random vector ξ[τ ; x̄0 ] = x[τ ] at τ ∈ [1, T ] when the initial condition is x̄0 ∈ X . From (3), for a continuous FSRPD, FSReach(τ, x̄0 ) = cl({ȳ ∈ X |ψx (ȳ; τ, x̄0 ) > 0}) ⊆ X . (10) 0 Lemma 2. S ∩ FSReach(τ, x̄0 ) = ∅ ⇒ Pτ,x̄ {x[τ ] ∈ S} = 0. x Proof: Follows from (2). Note that when the disturbance set W is unbounded, the definition of the FSR set (10) might trivially become Rn . Also, for uncountable W, the probability of the state taking a particular value is zero, and therefore, the superlevel sets of the FSRPD do not have the same interpretation as in the countable case [1]. However, given the FSRPD, we can obtain the likelihood that the state of (7) will reach a particular set of interest via (9) and the FSR set via (10). 3.1 Iterative method for reachability analysis We extend the iterative approach for the FSR analysis proposed in [1] for a nonlinear discrete-time systems with discrete random variables to a linear discrete-time system with continuous random variables. This discussion, inspired in part by [29, Section 10.5], helps to develop proofs presented later. Assume that the system matrix A of (7) is invertible. This assumption holds for continuous-time systems which have been discretized via Euler method. For τ ∈ [0, T − 1], we have from (7) and Property P1,  ψx (ȳ; τ + 1, x̄0 ) = ψAx (·; τ, x̄0 ) ∗ ψBw (·) (ȳ) (11) with ψAx (ȳ; τ, x̄0 ) = |A|−1 ψx (A−1 ȳ; τ, x̄0 ) −1 (12) ψAx (ȳ; τ, x̄0 ) = (det A) ψx (A−1 ȳ; τ, x̄0 ) from [23, Example 8.9] for τ ≥ 1, ψAx (ȳ; 0, x̄0 ) = δ(ȳ − Ax̄0 ) where δ(·) is the Dirac-delta function [30, Chapter 5], and ψBw as the probability density of the random vector Bw. We use Property P2 and (5) to obtain ψBw [26, Corollary 1]. Equation (11) is a special case of the result in [29, Section 10.5]. We extend the FSR set computation presented in [1] in the following lemma. Lemma 3. For τ ∈ [1, T ], closed disturbance set W, and the system in (7) with initial condition x̄0 , FSReach(τ, x̄0 ) ⊆ A(FSReach(τ − 1, x̄0 )) ⊕ BW = {Aτ x̄0 } ⊕ Cn×(τ p) W τ . Proof: Follows from (7), (8), and Property P1. Lemma 3 allows the use of existing reachability analysis schemes designed for bounded non-stochastic disturbance models [11–13] for overapproximating FSR sets. Also, (10) and (11) provide an iterative method for exact FSR analysis. Note that (11) is an improper integral which must be solved iteratively. For densities whose convolution integrals are difficult to obtain analytically, we would need to rely on numerical integration (quadrature) techniques. Numerical evaluation of multi-dimensional improper integrals is computationally expensive [31, Section 4.8]. Moreover, the quadratures in this method will become increasingly erroneous for larger values of τ ∈ [1, T ] due to the iterative definition. These disadvantages motivate the need to solve Problem 1 — an approach that provides analytical expressions of the FSRPD, and thereby reduce the number of quadratures required. The iterative method performs well with discrete random vectors as in [1] because discretization for computation can be exact, however, this is clearly not true when the disturbance set is uncountable. 3.2 Efficient reachability analysis via characteristic functions We employ Fourier transformation to provide analytical expressions of the FSRPD at any instant τ ∈ [1, T ]. This method involves computing a single integral for the time instant of interest τ as opposed to the iterative approach in Subsection 3.1. We also show that for certain disturbance distributions like the Gaussian distribution, an explicit expression for the FSRPD can be obtained. By Property P3 and the IID assumption on the random process w[·], the CF of the random vector W is ΨW (ᾱ) = t=τ Y−1 Ψw (ᾱt ) (13) t=0 > where ᾱ = [ᾱ0> ᾱ1> . . . ᾱτ>−1 ] ∈ R(τ p) , ᾱt ∈ Rp for all τ ∈ [0, τ −1]. As seen in (8), the random vector W concatenates the disturbance random process w[t] over t ∈ [0, τ − 1]. Theorem 1. For any time instant τ ∈ [1, T ] and an initial state x̄0 ∈ X , the FSRPD ψx (·; τ, x̄0 ) of (7) is given by   > Ψx (ᾱ; τ, x̄0 ) = exp j ᾱ> (Aτ x̄0 ) ΨW (Cn×(τ (14) p) ᾱ) ψx (ȳ; τ, x̄0 ) = F −1 {Ψx (ᾱ; τ, x̄0 )} (−ȳ) (15) where ȳ ∈ X , ᾱ ∈ Rn×1 . Proof: Follows from Property P2, (5), and (8). Theorem 1 provides an analytical expression for the FSRPD. Theorem 1 holds even if we relax the identical distribution assumption on the random process w[t] to a timevarying independent disturbance process, provided Ψw[t] (·) is known for all t ∈ [0, τ − 1]. Using Property P2, Theorem 1 can also be easily extended to include affine noise perturbed LTI discrete-time systems with known open-loop controllers. Note that the computation of the FSRPD via Theorem 1 does not require gridding of the state space, hence mitigating the curse of dimensionality associated with the traditional gridding-based approaches. When the CF Ψx (ᾱ; τ, x̄0 ) has the structure of known Fourier transforms, Theorem 1 can be used to provide explicit expressions for the FSRPD (see Proposition 1). In systems where the inverse Fourier transform is not known, the evaluation of (15) can be done via any quadrature techniques that can handle improper integrals. Alternatively, the improper integral can be approximated by the quadrature of an appropriately defined proper integral [31, Chapter 4]. For high-dimensional systems, performance is affected by the scalability of quadrature schemes with dimension. However, Theorem 1 still requires only a single n-dimensional quadrature for any time instant of interest τ ∈ [1, T ]. On the other hand, the iterative method proposed in Subsection 3.1 requires τ quadratures, each ndimensional, resulting in higher computational costs and degradation in accuracy as τ increases. One example of a CF with known Fourier transforms arises in Gaussian distributions. We use Theorem 1 to derive an explicit expression for the FSRPD of (7) when perturbed by a Gaussian random vector. Note that the FSRPD in this case can also be computed using the well-known properties on linear combination of Gaussian random vectors [23, Section 9] or the theory of Kalman-Bucy filter [32]. Proposition 1. The system trajectory of (7) with initial condition x̄0 and noise process w ∼ N (µ̄w , Σw ) ∈ Rp is ξ[τ ; x̄0 ] ∼ N (µ̄[τ ], Σ[τ ]) (16) where τ ∈ [1, T ] and µ̄[τ ] = Aτ x̄0 + Cn×(τ p) (1̄τ ×1 ⊗ µ̄w ), Σ[τ ] = Cn×(τ p) (Iτ ⊗ > Σw )Cn×(τ p) . (17) (18) Proof: For ᾱ ∈ Rp , the CF of a multivariate Gaussian random vector w is [23, Section 9.3]   ᾱ> Σw ᾱ . (19) Ψw (ᾱ) = exp j ᾱ> µ̄w − 2 From the IID assumption of w[·], Property P3, and (19), the CF of W is   t=τ Y−1 ᾱ> Σw ᾱt ΨW (ᾱ) = exp j ᾱt> µ̄w − t 2 t=0   ᾱ> (Iτ ⊗ Σw )ᾱ = exp j ᾱ> (1̄τ ×1 ⊗ µ̄w ) − 2 where ᾱ = (ᾱ0 , ᾱ1 , . . . , ᾱτ −1 ) ∈ R(τ p) with ᾱt ∈ Rp . Here, 1̄p×q ∈ Rp×q is a matrix with all entries as 1, and In is the identity matrix of dimension n. By (15) and (19), W ∼ N (1̄τ ×1 ⊗ µ̄w , Iτ ⊗ Σw ) [26, Corollary 1.22]. From (14), we see that for β̄ ∈ Rn ,   > Ψx (β̄; τ, x̄0 ) = exp j β̄ > (Aτ x̄0 ) ΨW (Cn×(τ p) β̄))   = exp j β̄ > (Aτ x̄0 + Cn×(τ p) (1̄τ ×1 ⊗ µ̄w )) × ! > β̄ > Cn×(τ p) (Iτ ⊗ Σw )Cn×(τ p) β̄ exp − . (20) 2 Equation (20) is the CF of a multivariate Gaussian random vector [26, Corollary 1.22], and we obtain µG [τ ] and ΣG [τ ] using (19). Depending on the system dynamics and time instant of interest τ , we can have rank(Cn×(τ p) ) < n. In such cases, the support of the random vector x[τ ] will be restricted to sets of lower dimension than n [33, Section 8.5], and certain marginal densities can be Dirac-delta functions. For example, we see that turning off the effect of disturbance in (7) (setting B = 0 ⇒ Cn×(τ p) = 0 in Theorem 1) yields ψx (ȳ; τ, x̄0 ) = δ(ȳ − Aτ x̄0 ), the trajectory of the corresponding deterministic system. We have used the relation  F δ(ȳ − ȳ0 ) (ᾱ) = exp (j ᾱ> y¯0 ) [30, Chapters 5,6]. Theorem 1 and (10) provide an analytical expression for the FSRPD and the FSR set respectively, and thereby solve Problem 1 for any density function describing the stochastics of the perturbation w[t] in (7). 3.3 Convexity results for reachability analysis For computational tractability, it is useful to study the convexity properties of the FSRPD and the FSR sets. We define the random vector wB = Bw with density ψwB . Lemma 4. [25, Lemma 2.1] If ψw is a log-concave distribution, then ψwB is a log-concave distribution. Theorem 2. If ψw is a log-concave distribution, and A in (7) is invertible, then the FSRPD ψx (ȳ; τ, x̄0 ) of (7) is logconcave in ȳ for every τ ∈ [1, T ]. Proof: We prove this theorem via induction. First, we need to show that the base case is true, i.e, we need to show that ψx (ȳ; 1, x̄0 ) is log-concave in ȳ. From (7) and Lemma 4, we have a log-concave density ψx (ȳ; 1, x̄0 ) = ψwB (ȳ − Ax̄0 ) since affine transformations preserve log-concavity [34, Section 3.2.4]. Assume for induction, ψx (ȳ; τ, x̄0 ) is log-concave in ȳ for some τ ∈ [1, T ]. We have log-concave ψAx (ȳ; τ, x̄0 ) from (12). Since convolution preserves log-concavity [34, Section 3.5.2], Lemma 4 and (11) complete the proof. Corollary 1. If ψw is a log-concave distribution, FSReach(τ, x̄0 ) of the system (7) is convex for every τ ∈ [1, T ], x̄0 ∈ X . Proof: Follows from (10) and [25, Theorem 2.5]. Theorem 2 and Corollary 1 solve Problem 2.a. 4. REACHING A NON-ADVERSARIAL TARGET WITH STOCHASTIC DYNAMICS In this section, we will leverage the theory developed in this paper to solve Problem 2 efficiently. We consider the problem of a controlled robot (R) having to capture a stochastically moving non-adversarial target, denoted here by a goal robot (G). The robot R has controllable linear dynamics while the robot G has uncontrollable linear dynamics, perturbed by an absolutely continuous random vector. The robot R is said to capture robot G if the robot G is inside a pre-determined set defined around the current position of robot R. We seek an open-loop controller (independent of the current state of robot G) for the robot R which maximizes the probability of capturing robot G within the time horizon T . The information available to solve this problem are the position of the robots R and G at t = 0, the deterministic dynamics of the robot R, the perturbed dynamics of the robot G, and the density of the perturbation. We consider a 2-D environment, but our approach can be easily extended to higher dimensions. We perform the FSR analysis in the inertial coordinate frame. We model the robot R as a point mass system discretized in time, x̄R [t + 1] = x̄R [t] + BR ūR [t] (21) with state (position) x̄R [t] ∈ R2 , input ūR [t] ∈ U ⊆ R2 , input matrix BR = Ts I2 and sampling time Ts . We define an open-loop control policy ūR [t] = πopen,x̄R [0] [t] where πopen,x̄R [0] [t] depends on the initial condition, that is, πopen,x̄R [0] : [0, T − 1] → U is a sequence of control actions for a given initial condition x̄R [0]. Let M denote the set of all feasible control policies πopen,x̄R [0] . From (8), x̄R [τ + 1] = x̄R [0] + (1̄1×τ ⊗ BR )π̄τ , τ ∈ [0, T − 1] (22) > > > with the input vector π̄τ = [ū> R [τ − 1] ūR [τ − 2] . . . ūR [0]] , (2τ ) , and ūR [t] = πopen,x̄R [0] [t]. π̄τ ∈ Mτ ⊆ R We consider two cases for the dynamics of the robot G: 1) point mass dynamics, and 2) double integrator dynamics, both discretized in time and perturbed by an absolutely continuous random vector. In the former case, we presume that the velocity is drawn from a bivariate Gaussian distribution, xG [t + 1] = xG [t] + BG,PM v G [t] v G [t] ∼ N (µ̄vG , ΣG ). (23a) (23b) The state (position) is the random vector xG [t] in the probt,x̄ [0] ability space (X , σ(X ), PxGG ) with X = R2 , disturbance matrix BG,PM = BR , and x̄G [0] as the known initial state of the robot G. The stochastic velocity v G [t] ∈ R2 has mean vector µ̄vG , covariance matrix ΣG and the CF with ᾱ ∈ R2 is given in (19). In the latter case, acceleration in each direction is an independent exponential random variable, xG [t + 1] = AG,DI xG [t] + BG,DI a[t] (24a) (a[t])x ∼ Exp(λax ), (a[t])y ∼ Exp(λay ) (24b) " 2 #   Ts 1 Ts 2 , BG,DI = I2 ⊗ AG,DI = I2 ⊗ . 0 1 Ts The state (position and velocity) is the random vector xG [t] t,x̄ [0] in the probability space (XDI , σ(XDI ), PxGG ) with XDI = R4 and x̄G [0] as the known initial state of the robot G. The stochastic acceleration a[t] = [(a[t])x (a[t])y ]> ∈ R2+ = [0, ∞) × [0, ∞) has the following probability density and CF (z̄ = [z1 z2 ]> ∈ R2+ = [0, ∞) × [0, ∞), ᾱ = [α1 α2 ]> ∈ R2 ), ψa (z̄) = λax λay exp (−λax z1 − λay z2 ) λax λay . Ψa (ᾱ) = (λax − jα1 )(λay − jα2 ) (25) (26) The CF Ψa (ᾱ) is defined using Property P3 and the CF of the exponential given in [22, Section 26]. Formally, the robot R captures robot G at time τ if xG [τ ] ∈ CaptureSet(x̄R [τ ]). In other words, the capture region of the robot R is the CaptureSet(ȳ) ⊆ R2 when robot R is at ȳ ∈ R2 . The optimization problem to solve Problem 2 is ProbA : maximize subject to CapturePrπ̄ (τ, π̄τ ; x̄R [0], x̄G [0]) (τ, π̄τ ) ∈ [1, T ] × Mτ where the decision variables are the time of capture τ and the control policy π̄, and the objective function CapturePrπ̄ (·) gives the probability of robot R capturing robot G. By (22), an initial state x̄R [0] and the control policy π̄t determines a unique x̄R [τ ] for every τ . Using this observation, we define the objective function CapturePrπ̄ (·) in (27). We obtain ψxG in (27) using our solution to Problem 1, Theorem 1. G [0] CapturePrπ̄ (τ, π̄τ ; x̄R [0], x̄G [0]) = CapturePrx̄R (τ, x̄R [τ ]; x̄G [0]) = Pτ,x̄ {xG [τ ] ∈ CaptureSet(x̄R [τ ])} xG Z ψxG (ȳ; τ, x̄G [0])dȳ. = (27) CaptureSet(x̄R [τ ]) Problem ProbA is equivalent (see [34, Section 4.1.3]) to maximize ProbB : subject to CapturePrx̄R (τ, x̄R [τ ]; x̄G [0])  τ ∈ [1, T ] x̄R [τ ] ∈ ReachR (τ ; x̄R [0]) where the decision variables are the time of capture τ and the position of the robot R x̄R [τ ] at time τ . From (22), we define the reach set for the robot R at time τ as  ReachR (τ ; x̄R [0]) = ȳ ∈ X |∃π̄τ ∈ Mτ s.t. x̄R [τ ] = ȳ . Several deterministic reachability computation tools are available for the computation of ReachR (τ ; x̄R [0]), like MPT [35] and ET [12]. We will now formulate Problem ProbB as a convex optimization problem based on the results developed in Subsection 3.3. Lemma 5. [11] If the input space U is convex, the forward reach set ReachR (τ ; x̄R [0]) is convex. Proposition 2. If ψw is a log-concave distributions and CaptureSet(ȳ) is convex for all ȳ ∈ X , then CapturePrx̄R (τ, ȳ; x̄G [0]) is log-concave in ȳ for all τ . Proof: From Theorem 2, we know that ψx (ȳ; τ, x̄R [0]) is log-concave in ȳ for every τ . The proof follows from (27) since the integration of a log-concave function over a convex set is log-concave [34, Section 3.5.2]. Remark 1. The densities ψv and ψa are log-concave since multivariate Gaussian density and exponential distribution (gamma distribution with shape parameter p = 1) are logconcave, and log-concavity is preserved for products [25, Sections 1.4, 2.3] [34, Section 3.5.2]. For any τ ∈ [1, T ], Proposition 2 and Lemma 5 ensure ProbC : minimize subject to − log(CapturePrx̄R (τ, x̄R [τ ]; x̄G [0])) x̄R [τ ] ∈ ReachR (τ ; x̄R [0]) is convex with the decision variable x̄R [τ ]. Problem ProbC is an equivalent convex optimization problem of the partial maximization with respect to x̄R [τ ] of Problem ProbB since we have transformed the original objective function with a monotone function to yield a convex objective and the constraint sets are identical [34, Section 4.1.3]. We solve Problem ProbB by solving Problem ProbC for each time instant τ ∈ [1, T ] to obtain x̄∗R [τ ] and compute the maximum of the resulting finite set to get (τ ∗ , x̄∗R [τ ∗ ]). Since Problem ProbB could be non-convex, this approach ensures a global optimum is found. Note that in order to prevent taking the logarithm of zero, we add an additional constraint to Problem ProbC CapturePrx̄R (τ, ·; x̄G [0]) ≥ . (28) The constraint (28) does not affect its convexity ( is a small positive number) from Proposition 2 and the fact that logconcave functions are quasiconcave. Quasiconcave functions have convex superlevel sets [34, Sections 3.4, 3.5]. Using the optimal solution of Problem ProbB, we can compute the open-loop controller to drive the robot R from x̄R [0] to x̄∗R [τ ∗ ] by solving Problem ProbD. Defining CR = (1̄1×(τ ∗ −1) ⊗ BR ) from (22), minimize ProbD : subject to Jπ (π̄τ ∗ )  π̄τ ∗ CR π̄τ ∗ ∈ Mτ ∗ = x̄R [τ ∗ ] − x̄R [0] where the decision variable is π̄τ ∗ . The objective function Jπ (π̄τ ∗ ) = 0 provides a feasible open-loop controller, and ∗ ∗ Jπ (π̄τ ∗ ) = π̄τ>∗ R̄π̄τ ∗ , R̄ ∈ R(2τ )×(2τ ) provides an open-loop controller policy that minimizes the control effort while ensuring that maximum probability of robot R capturing robot G is achieved. Solving the optimization problems ProbB and ProbD answers Problem 2. Our approach to solving Problem 2 is based on our solution to Problem 1, the Fourier transform based FSR analysis, and Problem 2.a, the convexity results of the FSRPD and the FSR sets presented in this paper. In contrast, the iterative approach for the FSR analysis, presented in Subsection 3.1, would yield erroneous CapturePrx̄R (τ, ·; x̄G [0]) for larger values of τ due to the heavy reliance on quadrature techniques. Additionally, the traditional approach of dynamic programming based computations [4] would be prohibitively costly for the large FSR sets encountered in this problem due to unbounded disturbances. The numerical implementation of this work is discussed in Subsection 4.3. 4.1 Robot G with point mass dynamics We solve Problem ProbB for the system given by (23). Here, the disturbance set is W = R2 . Lemma 6. For the system given in (23) and initial state of the robot G as x̄G [0] ∈ R2 , FSReachG (τ, x̄G [0]) = R2 for every τ ∈ [1, T ]. Proof: Follows from Proposition 1 and (10). Proposition 1 provides the FSRPD and Lemma 6 provides the FSR set for the system (23). The probability of successful capture of the robot G can be computed using (27) since the FSRPD ψxG (·; τ, x̄G [0]) is available. We implement the problem with the following parameters:  0.5 0.8 Ts = 0.2, T = 20, µ̄vG = [1.3 0.3]> , ΣG = , 0.8 2 > > 2 x̄G [0] = [−3 0] , x̄R [0] = [−3 − 2] and U = [1, 2] . The capture region of the robot R is a box centered about the position of the robot ȳ with edge length 2a (a = 0.25) and edges parallel to the axes — CaptureSet(ȳ) = Box(ȳ, a), a convex set. We use Jπ (π̄) = 0 in Problem ProbD. Figure 1 shows the evolution of the mean position of the robot G and the optimal capture position for the robot R at time instants 4, 5, 8, 14, and 20. The contour plots of ψxG (·; τ, x̄G [0]) are rotated ellipses since ΣE is not a diagonal matrix. From (17), the mean position of the robot G moves in a straight line µG [τ ], as it is the trajectory of (23a) when the input is always µ̄vG . The optimal time of capture is τ ∗ = 5, the optimal capture position is x̄∗R [τ ∗ ] = [−1.8 0]> , and Time = 4 CapturePr∗x̄R = 0.1571 Time = 5 CapturePr∗x̄R = 0.219 Time = 6 CapturePr∗x̄R = 0.2124 Figure 2: Solution to Problem ProbC for robot G dynamics in (23), and validation of CapturePrx̄R (τ, x̄∗R [τ ]; x̄G [0]) via Monte-Carlo simulations. The optimal capture time is τ ∗ = 5 and the likelihood of capture is CapturePrx̄R (τ ∗ , x̄∗R [τ ∗ ]; x̄G [0]) = 0.219. the corresponding probability of robot R capturing robot G is 0.219. Note that at this instant, the reach set of the robot R does not cover the current mean position of the robot G, µ̄[τ ∗ ] = [−1.7 0.3]> (Figure 1b). While the reach set covers the mean position of robot G at the next time instant t = 6, the uncertainty in (23) causes the probability of successful capture to further reduce (Figure 1c). Counterintuitively, attempting to reach the mean µG [τ ] is not always best. Figure 2 shows the optimal capture probabilities obtained when solving Problem ProbC for the dynamics (23). 4.2 Time = 14 CapturePr∗x̄R = 0.1049 Time = 20 CapturePr∗x̄R = 0.0624 Robot G with double integrator dynamics We now consider a more complicated capture problem, in which the disturbance is exponential (hence tracking the mean has little relevance because it is not the mode, the global maxima of the density), and the robot dynamics are more realistic. We solve Problem ProbB for the system given by (24). Here, the disturbance set is W = R2+ . Based on the mean of the stochastic acceleration a[t], the mean position of robot G has a parabolic trajectory due to the double integrator dynamics, as opposed to the linear trajectory seen in Subsection 4.1. Also, in this case, we do not have an explicit expression for the FSRPD like Proposition 1. Using Theorem 1, we obtain an explicit expression for the CF of the FSRPD. We utilize Lemma 1 to evaluate CapturePr(·). Analogous to Lemma 6 and Proposition 1, we characterize the FSR set in Lemma 7 and the FSRPD in Proposition 3. We use Lemma 3 to obtain an overapproximation of the FSR set due to the unavailability of FSRPD to use (10). Lemma 7. For the system given in (24) with initial state x̄G [0] ∈ R4 of the robot G, we have FSReachG (τ, x̄G [0]) ⊆ {AτG,DI x̄G [0]} ⊕ R4+ for every 2 ≤ τ ≤ T , and FSReachG (1, x̄G [0]) ⊆ {AG,DI x̄G [0]} ⊕ BG,DI R2+ . Figure 1: Snapshots of optimal capture positions of the robots G and R when G has point mass dynamics (23). The blue line shows the mean position trajectory of robot G µG [τ ], the contour plot characterizes ψxG (·; τ, x̄G [0]), the blue box shows the reach set of the robot R at time τ ReachR (τ, x̄R [0]), and the red box shows the capture region centered at x̄∗R [τ ] CaptureSet(x̄∗R [τ ]). > 2τ 4 Proof: For the dynamics in (24), C4×(2τ ) R+ = R+ > since the rank of C4×(2τ ) is 4 for every τ ≥ 2, and elements > > of C4×(2τ ) are nonnegative. For τ = 1, C4×(2τ ) = BG,DI . Lemma 3 completes the proof. Time = 1 CapturePr∗x̄R = 0 (Infeasible) Time = 2 CapturePr∗x̄R = 0.6044 Figure 4: Solution to Problem ProbC for robot G dynamics in (24), and validation of CapturePrx̄R (τ, x̄∗R [τ ]; x̄G [0]) via Monte-Carlo simulations. The optimal capture time is τ ∗ = 2 and the capture probability is CapturePrx̄R (τ ∗ , x̄∗R [τ ∗ ]; x̄G [0]) = 0.6044. Proposition 3. The CF of the FSRPD of the robot G for dynamics (24) is ΨxG (β̄; τ, x̄G [0]) = exp(j β̄ > (AτG,DI x̄G [0]))× Time = 3 CapturePr∗x̄R = 0.3885 τY −1 t=0 λax λay (λax − j ᾱ2t )(λay − j ᾱ2t+1 ) (29) > (2τ ) where ᾱ = C4×(2τ and β̄ ∈ R4 . The FSRPD of the ) β̄ ∈ R  robot G is ψxG (x̄; τ, x̄G [0]) = F −1 ΨxG (·; τ, x̄G [0]) (−x̄). Time = 6 CapturePr∗x̄R = 0.0495 Proof: Apply Theorem 1 to the dynamics (24). To solve Problem ProbB, we define CapturePrx̄R (·) as in (27). Since we are interested in just the position of robot G, we require only the marginal density of the FSRPD over the position subspace of robot G, ψxpos . By Property P4, we G have for γ̄ = [γ1 γ2 ] ∈ R2 , > Ψpos xG (γ̄; τ, x̄G [0]) = ΨxG ([γ1 0 γ2 0] ; τ, x̄G [0]). (30) Unlike the case with Gaussian disturbance, explicit expressions for the FSRPD ψxG or its marginal density ψxpos are G unavailable since the Fourier transform (29) is not standard. Lemma 8. ψBG,DI a , ψxG ∈ L1 (R4 ) ∩ L2 (R4 ). Time = 9 CapturePr∗x̄R = 0.0091 Figure 3: Snapshots of optimal capture positions of the robots G and R when G has double integrator dynamics (24). The blue line shows the mean position trajectory of robot G µG [τ ], the contour plot characterizes ψxpos (·; τ, x̄G [0]) G via Monte-Carlo simulation, the blue box shows the reach set of the robot R at time τ , ReachR (τ, x̄R [0]), and the red box shows the capture region centered at x̄∗R [τ ], CaptureSet(x̄∗R [τ ]). Proof: (For ψBG,DI a ) By Hölder’s inequality [22, Section 19], ψa ∈ L1 (R2 ) ∩ L2 (R2 ). We also have ψBG,DI a (z1 , z2 , z3 , z4 ) = δ(z3 − Ts2z4 )δ(z1 − Ts2z2 )ψz24 (z2 , z4 ) where z 24 = [z2 z4 ]> = Ts a ∈ R2 and ψz24 (z2 , z4 ) = Ts−2 ψa ( Tz2s , Tz4s ) from (12). For i = {1, 2}, kψBG,DI a ki = kψz24 ki = Ts2−2i kψa ki < ∞ completing the proof. (For ψxG ) Via induction using (11) (similar to the proof of Theorem 2). Note that functions in L1 (R4 ) ∩ L2 (R4 ) are closed under convolution [26, Theorem 1.3]. Lemma 9. ψxpos (x̄; τ, x̄G [0]) ∈ L1 (R2 ) ∩ L2 (R2 ). G Proof: For i = {1, 2}, we have from (30), kψxpos k = G i kψxG ki , and from Lemma 8, kψxG ki < ∞. Similar to Subsection 4.1, we define a convex capture region CaptureSet(ȳR ) = Box(ȳR , a) ⊆ R2 where ȳR ∈ R2 is the state of the robot R. We define h(ȳ; ȳR , a) = 1Box(ȳR ,a) (ȳ) as the indicator function corresponding to a 2D box centered at ȳR with edge length 2a > 0 with h(ȳ) = 1 if ȳ ∈ CaptureSet(ȳR ) and zero otherwise. The Fourier transform of h is a product of sinc functions shifted by ȳR (follows from Property P2 and [30, Chapter 13]) H(γ̄; ȳR , a) = F {h(·; ȳR , a)}(γ̄) > = 4a2 exp (−j ȳR γ̄) sin(aγ1 ) sin(aγ2 ) . γ1 γ2 (31) Clearly, h is square-integrable, and from Lemmas 1 and 9, we define CapturePrx̄R (·) in (33). Equation (33) is evaluated using (29), (30), and (31). We use (33) as opposed (32) due to the unavailability of an explicit expression for ψxpos . G The numerical evaluation of the inverse Fourier transform of Ψpos xG to compute (32) will require two quadratures, resulting in a higher approximation error as compared to (33). We implement the problem with the following parameters: Ts = 0.2, T = 9, a = 0.25, λax = 0.25, λay = 0.45, x̄G [0] = [1.5 0 − 0.5 2]> , x̄R [0] = [2.5 0]> , and U = [−1.5, 1.5] × [1, 4]. We use Jπ (π̄) = 0 in Problem ProbD. Figure 3 shows the evolution of the mean position of the robot G and the optimal capture position for the robot R at time instants 1, 2, 3, 6, and 9. For every τ ∈ [1, T ], the contour plots of ψxpos (·; τ, x̄G [0]) were estimated via MonteG Carlo simulation since evaluating ψxpos (·; τ, x̄G [0]) via (5) G over a grid is computationally expensive. Note that the mean position of the robot G does not coincide with the (·; τ, x̄G [0]) in contrast to the problem discussed mode of ψxpos G in Subsection 4.1. The optimal time of capture is at τ ∗ = 2, the optimal capture position is x̄∗R [τ ∗ ] = [1.9 0.55]> , and the corresponding probability of robot R capturing robot G is 0.6044 (Figure 3b). Figure 4 shows the optimal capture probabilities obtained when solving Problem ProbC for the dynamics (24), and the validation of the results. 4.3 Numerical implementation and analysis All computations in this paper were performed using MATLAB on an Intel Core i7 CPU with 3.4GHz clock rate and 16 GB RAM. The MATLAB code for this work is available at http://hscl.unm.edu/files/code/HSCC17.zip. We solved Problem ProbC using MATLAB’s built-in functions — fmincon for the optimization, mvncdf to compute the objective (27) for the case in Subsection 4.1, integral to compute the objective (33) for the case in Subsection 4.2, and max to compute the global optimum of Problem ProbB. In both the sections, we used MPT for the reachable set calculation and solved Problem ProbD using CVX [36]. Using Lemma 2, the FSR sets restrict the search while solving Problem ProbC. All geometric computations were done in the facet representation. We computed the initial guess for the optimization of Problem ProbC by performing Euclidean projection of the mean to the feasible set using CVX [34, Section 8.1.1]. Since computing the objective was costly, this operation saved significant computational time. The MonteCarlo simulation used 500, 000 particles. No offline computations were done in either of the cases. The overall computation of Problem ProbB and ProbD for the case in Subsection 4.1 took 5.32 seconds for T = 20. Since Proposition 1 provides explicit expressions for the FSRPD, the evaluation of the FSRPD for any given point ȳ ∈ X takes 1.6 millseconds on average. For the case in Subsection 4.2, the overall computation took 488.55 seconds (∼ 8 minutes) for T = 9. The numerical evaluation of the improper integral (33) is the major cause of increase in runtime. The evaluation of the FSRPD for any given point ȳ ∈ X using (5) takes about 10.5 seconds, and the runtime and the accuracy depend heavily on the point ȳ as well as the bounds used for the integral approximation. However, the evaluation of CapturePrx̄R (·) using (33) is much faster (0.81 seconds) because H(γ̄; ȳR , a) is a decaying, 2-D sinc function (decaying much faster than the CF). The decaying properties of the integrand in (33) and CFs in general permits approximating the improper integrals in (5) and (33) by as a proper integral with suitably defined finite bounds. The tradeoff between accuracy and computational speed, common in quadrature techniques, dictates the choice of the bound. A detailed analysis of various quadrature techniques, their computational complexity, and their error analysis can be found in [31, Chapter 4]. 5. CONCLUSIONS AND FUTURE WORK This paper provides a method for forward stochastic reachability analysis using Fourier transforms. The method is applicable to uncontrolled stochastic linear systems. Fourier transforms simplify the computation and mitigate the curse of dimensionality associated with gridding the state space. We also analyze several convexity results associated with the FSRPD and FSR sets. We demonstrate our method on the problem of controller synthesis for a controlled robot pursuing a stochastically moving non-adversarial target. Future work includes exploration of various quadrature techniques like particle filters for high-dimensional quadratures, and extension to a model predictive control framework and to discrete random vectors (countable disturbance sets). Multiple pursuer applications will also be investigated. 6. ACKNOWLEDGEMENTS The authors thank Prof. M. Hayat for discussions on Fourier transforms in probability theory and the reviewers for their insightful comments. This material is based upon work supported by the National Science Foundation, under Grant Numbers CMMI1254990, CNS-1329878, and IIS-1528047. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. 7. REFERENCES [1] Baisravan HomChaudhuri, Abraham P. Vinod, and Meeko M. K. Oishi. Computation of forward stochastic reach sets: Application to stochastic, dynamic obstacle avoidance. In Proc. American Control Conf., 2017. (accepted). [2] Nick Malone, Kendra Lesser, Meeko Oishi, and Lydia Tapia. Stochastic reachability based motion planning for multiple moving obstacle avoidance. In Proc. Hybrid Syst.: Comput. and Control, pages 51–60, 2014. [3] Kendra Lesser, Meeko Oishi, and R. Scott Erwin. Stochastic reachability for control of spacecraft relative motion. In Proc. IEEE Conf. on Decision and Control, pages 4705–4712, 2013. [4] Sean Summers and John Lygeros. Verification of discrete time stochastic hybrid systems: A stochastic reach-avoid decision problem. Automatica, 46(12):1951–1961, 2010. [5] Nikolaos Kariotoglou, Davide M Raimondo, Sean Summers, and John Lygeros. A stochastic reachability Z CapturePrx̄R (τ, x̄R [τ ]; x̄G [0]) = R2  = [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] ψxpos (x̄; τ, x̄G [0])h(x̄; x̄R [τ ], a)dx̄ G 1 2π framework for autonomous surveillance with pan-tilt-zoom cameras. In European Control Conf., pages 1411–1416, 2011. Alessandro Abate, Maria Prandini, John Lygeros, and Shankar Sastry. Probabilistic reachability and safety for controlled discrete time stochastic hybrid systems. Automatica, 44(11):2724–2734, 2008. Alessandro Abate, Saurabh Amin, Maria Prandini, John Lygeros, and Shankar Sastry. Computational approaches to reachability analysis of stochastic hybrid systems. In Proc. Hybrid Syst.: Comput. and Control, pages 4–17, 2007. Nikolaos Kariotoglou, Sean Summers, Tyler Summers, Maryam Kamgarpour, and John Lygeros. Approximate dynamic programming for stochastic reachability. In European Control Conf., pages 584–589, 2013. Nikolaos Kariotoglou, Kostas Margellos, and John Lygeros. On the computational complexity and generalization properties of multi-stage and stage-wise coupled scenario programs. Syst. and Control Lett., 94:63–69, 2016. Giorgio Manganini, Matteo Pirotta, Marcello Restelli, Luigi Piroddi, and Maria Prandini. Policy search for the optimal control of Markov Decision Processes: A novel particle-based iterative scheme. IEEE Trans. Cybern., pages 1–13, 2015. Michal Kvasnica, Bálint Takács, Juraj Holaza, and Deepak Ingole. Reachability analysis and control synthesis for uncertain linear systems in MPT. IFAC Symp. on Robust Control D., 48(14):302–307, 2015. Alex A. Kurzhanskiy and Pravin Varaiya. Ellipsoidal toolbox. Technical Report UCB/EECS-2006-46, EECS Department, University of California, Berkeley, 2006. Antoine Girard. Reachability of uncertain linear systems using zonotopes. In Proc. Hybrid Syst.: Comput. and Control, pages 291–305, 2005. Geoffrey Hollinger, Sanjiv Singh, Joseph Djugash, and Athanasios Kehagias. Efficient multi-robot search for a moving target. Int’l J. Robotics and Research, 28(2):201–219, 2009. Vijay Kumar, Daniela Rus, and Sanjiv Singh. Robot and sensor networks for first responders. IEEE Pervasive computing, 3(4):24–33, 2004. Christopher Geyer. Active target search from UAVs in urban environments. In Proc. IEEE Int’l Conf. Robotics and Autom., pages 2366–2371, 2008. Ian Mitchell and Claire J. Tomlin. Level set methods for computation in hybrid systems. In Proc. Hybrid Syst.: Comput. and Control, pages 310–323, 2000. Claire J. Tomlin, John Lygeros, and Shankar Sastry. A game theoretic approach to controller design for hybrid systems. Proc. IEEE, 88(7):949–970, 2000. Claire J. Tomlin, Ian Mitchell, Alexandre M. Bayen, 2 Z R2 Ψpos xG (γ̄; τ, x̄G [0])H(γ̄; x̄R [τ ], a)dγ̄. [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] (32) (33) and Meeko Oishi. Computational techniques for the verification of hybrid systems. Proc. IEEE, 91(7):986–1001, 2003. Olivier Bokanowski, Nicolas Forcadel, and Hasnaa Zidani. Reachability and Minimal Times for State Constrained Nonlinear Problems without Any Controllability Assumption. SIAM J. of Control and Optimization, 48(7):4292–4316, 2010. Haomiao Huang, Jerry Ding, Wei Zhang, and Claire J. Tomlin. Automation-assisted capture-the-flag: A differential game approach. IEEE Trans. Control Syst. Technol., 23:1014–1028, 2015. Patrick Billingsley. Probability and measure. Wiley, New York, 3 edition, 1995. John A Gubner. Probability and random processes for electrical and computer engineers. Cambridge University Press, New York; Cambridge, 2006. Harald Cramér. Mathematical methods of statistics (PMS-9). Princeton university press, 9 edition, 1961. Sudhakar Dharmadhikari and Kumar Joag-Dev. Unimodality, convexity, and applications. Elsevier, 1988. Elias M Stein and Guido L Weiss. Introduction to Fourier analysis on Euclidean spaces, volume 1. Princeton University Press, 1971. Terence Tao. Analysis II. Hindustan Book Agency, 2 edition, 2009. Jean-Paul Penot. Analysis: From Concepts to Applications. Springer, 1 edition, 2016. Andrzej Lasota and Michael C Mackey. Chaos, fractals, and noise: stochastic aspects of dynamics, volume 97. Springer Science & Business Media, 2013. Ron Bracewell. The Fourier transform and its applications. McGraw-Hill, Inc., 1986. William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Numerical recipes: The art of scientific computing. Cambridge University Press, New York, NY, USA, 3 edition, 2007. Peter Dorato, Vito Cerone, and Chaouki Abdallah. Linear-quadratic control: An introduction. Simon & Schuster, 1994. Y.S. Chow and H. Teicher. Probability Theory: Independence, Interchangeability, Martingales. Springer Texts in Statistics. Springer New York, 1997. Stephen P. Boyd and Lieven Vandenberghe. Convex optimization. Cambridge University Press, Cambridge, UK ; New York, 2004. Martin Herceg, Michal Kvasnica, Colin N. Jones, and Manfred Morari. Multi-Parametric Toolbox 3.0. In European Control Conf., pages 502–510, 2013. http://control.ee.ethz.ch/˜mpt. Michael Grant and Stephen Boyd. CVX: MATLAB software for disciplined convex programming, version 2.1. http://cvxr.com/cvx, 2014.
3cs.SY
1 Stochastic Geometry Modeling and Analysis of Single- and Multi-Cluster Wireless Networks Seyed Mohammad Azimi-Abarghouyi, Behrooz Makki, Martin Haenggi, Fellow, IEEE, Masoumeh Nasiri-Kenari, Senior Member, IEEE, arXiv:1712.08784v1 [cs.IT] 23 Dec 2017 and Tommy Svensson, Senior Member, IEEE Abstract This paper develops a stochastic geometry-based approach for the modeling and analysis of singleand multi-cluster wireless networks. We first define finite homogeneous Poisson point processes to model the number and locations of the transmitters in a confined region as a single-cluster wireless network. We study the coverage probability for a reference receiver for two strategies; closest-selection, where the receiver is served by the closest transmitter among all transmitters, and uniform-selection, where the serving transmitter is selected randomly with uniform distribution. Second, using Matern cluster processes, we extend our model and analysis to multi-cluster wireless networks. Here, the receivers are modeled in two types, namely, closed- and open-access. Closed-access receivers are distributed around the cluster centers of the transmitters according to a symmetric normal distribution and can be served only by the transmitters of their corresponding clusters. Open-access receivers, on the other hand, are placed independently of the transmitters and can be served by all transmitters. In all cases, the link distance distribution and the Laplace transform (LT) of the interference are derived. We also derive closed-form lower bounds on the LT of the interference for single-cluster wireless networks. The impact of different parameters on the performance is also investigated. Index Terms Stochastic geometry, coverage probability, clustered wireless networks, Poisson point process, Matern cluster process. S.M. Azimi-Abarghouyi and M. Nasiri-Kenari are with the Dep. of Electrical Engineering, Sharif University of Technology, Tehran 11365-9363, Iran. (e-mail: [email protected]; [email protected]). B. Makki and T. Svensson are with the Dep. of Signals and Systems, Chalmers University of Technology, 412 96 Gothenburg, Sweden. (e-mail: {behrooz.makki, tommy.svensson}@chalmers.se). M. Haenggi is with the Dept. of Electrical Engineering, University of Notre Dame, IN 46556, USA. (e-mail: [email protected]). This work has been supported in part by the Research Office of Sharif University of Technology under grant QB960605 and by the VR Research Link Project "Green Communications" and by the U.S. National Science Foundation under grant CCF 1525904. 2 I. I NTRODUCTION Single-cluster wireless networks are composed of a number of nodes distributed inside a finite region. This spatial setup is an appropriate model for, e.g., various millimeter wave communications use-case scenarios, indoor and ad hoc networks, as promising candidate technologies for the next generation of wireless networks [1]-[2]. This setup is also useful in situations where there is a range limit for backhaul links in connecting transmitters to a core network, e.g., cloud radio access networks [3]. On the other hand, the ever-growing randomness and irregularity in the locations of nodes in a wireless network has led to a growing interest in the use of stochastic geometry and Poisson point processes (PPPs) for accurate, flexible, and tractable spatial modeling and analysis [4]-[9]. In comparison to wireless networks on infinite regions that are mostly modeled by the infinite homogeneous PPP (HPPP) [10, Def. 2.8], the modeling and performance analysis of single-cluster wireless networks is more challenging and requires different approaches. The main challenge is that a finite point process is not statistically similar from different locations, and therefore, the system performance depends on the receiver location even after averaging over the point process. The stochastic geometry-based modeling and analysis of single-cluster wireless networks modeled as a binomial point process (BPP) [10, Def. 2.11] has been well studied [11]-[21]. In the BPP model, a fixed and finite number of nodes are distributed independently and uniformly inside a finite region. Most prior works focus on a setup where the reference receiver is placed at the center of a circular network region [11]-[15]. Also, considering a circular region, [16] has recently developed a comprehensive framework for performance characterizations of an arbitrarily-located reference receiver inside the region under different transmitter selection strategies. Considering transmitters at a non-zero fixed altitude, disk-shaped networks of unmanned aerial vehicles are analyzed in [17]. There are also a few studies that present outage probability characterizations of a fixed link inside an arbitrarily-shaped finite region [18]-[21]. In spite of the usefulness of HPPP for modeling and analysis of coverage-centric and uniform deployments of nodes [4]-[10], it cannot accurately model user-centric and content-centric deployments, where the nodes may be deployed at the places with high user density [22]-[24]. In such deployments, it is important to take into account non-uniformity as well as the correlation that may exist between the locations of the transmitters and receivers. Accordingly, third gener- 3 ation partnership project (3GPP) has considered clustered models in [24]-[25]. Models based on Poisson cluster processes (PCPs) [10, Sec. 3.4] have recently been studied for heterogeneous [22] and device-to-device (D2D) networks [23]. In these works, the network follows a Thomas cluster process (TCP) [10, Def. 3.5]. A PCP model is also proposed and analyzed for heterogeneous networks in [26]. In [27], clustered ad hoc networks are modeled using the Matern cluster process (MCP) [10, Def. 3.6] and the TCP, and the performance of a fixed link is analyzed. Nearest-neighbor and contact distance distributions for the MCP are derived in [28]. In this paper, we develop tractable models for single- and multi-cluster wireless networks. We define a finite homogeneous Poisson point process (FHPPP) to model nodes in a finite region and then develop a framework for the analysis of single-cluster wireless networks under two different strategies. The first approach is referred to as closest-selection where a reference receiver is served by the closest transmitter in the network. In the second approach, which we refer to as uniform-selection, a uniformly randomly selected transmitter is connected to the receiver. These strategies cover a broad range of requirements of wireless networks. For instance, the closest-selection approach is suitable for cellular networks, while the uniform-selection scheme is relevant to ad hoc networks. To model multi-cluster wireless networks consisting of different single-cluster wireless networks, we consider an MCP of transmitters. For the receivers, we consider two types, i) closedaccess receivers, which are located around the cluster centers of transmitters with a symmetric normal distribution and are allowed to be served only by the transmitters of their corresponding clusters according to the closest- or uniform-selection strategy, and ii) open-access receivers, which can be served by all transmitters according to the closest-selection strategy. We derive exact expressions for the coverage probability of a reference receiver in singleand multi-cluster wireless networks for the different selection strategies and types of receivers. For each selection strategy and type of receiver in single- and multi-cluster wireless networks, we characterize the Laplace transform (LT) of the interference. Moreover, as a key step for the coverage probability analysis, the distributions of the distance from the reference receiver to its serving transmitter are derived. We also derive tight closed-form lower bounds on the LT of the interference in the case of single-cluster wireless networks, which are convenient for the coverage probability analysis. We investigate the impact of different parameters of the system models on the performance in terms of the coverage probability and spectral efficiency. In most cases, a higher path loss 4 exponent improves the performance. However, at relatively high distances of the reference receiver to the center of single-cluster wireless networks, a higher path loss has a degrading effect on the performance. Also, an increase in the distance of the reference receiver to the center of the network decreases the chance for coverage. Our analysis reveals that there exists an optimal distance for the location of the reference receiver from the center of the network that maximizes the coverage probability. An optimal distance is also observed for the spectral efficiency. Our evaluation also shows that, for a broad range of parameter settings, our proposed lower bounds tightly mimic the exact results on the coverage probability. Our work is different from the state-of-the-art literature, e.g., [10]-[23], [26]-[28], from three perspectives. First, different from the BPP, which models a fixed number of nodes in a region, we consider a point process that is suitable for finite regions with a random number of nodes and allow for arbitrary receiver locations. Second, we comprehensively study multi-cluster wireless networks using the MCP. In our analysis, we also derive the contact distribution function of the MCP in a form that is significantly simpler than the one in [28, Thm. 1]. Third, we propose open-access and closed-access receivers and different transmitter selection strategies. The rest of the paper is organized as follows. Section II describes the system models. Secion III proposes the transmitter selection strategies and presents the analytical results for the coverage probability of single-cluster wireless networks, including characterizations for the serving distance distributions, and the LT of the interference and its corresponding lower bounds. Section IV presents the analytical results for the coverage probability of multi-cluster wireless networks, and derives the related serving distance distributions and the LT of the interferences. Section V presents the numerical results. Finally, Section VI concludes the paper. II. S YSTEM M ODEL In this section, we provide a mathematical model of the system, including the spatial distribution of the nodes for single- and multi-cluster wireless networks and the channel model. A. Spatial Model for Single-Cluster Wireless Networks Let us define an FHPPP as follows. Definition 1: We define the FHPPP as Φ = P ∩ A, where P is an HPPP of intensity λ and A ⊂ R2 . We consider a single-cluster wireless network as shown in Fig. 1, where the locations of active transmitters are modeled as an FHPPP. The transmitters are assumed to transmit at the 5 Fig. 1: An illustration of the system model for single-cluster wireless networks. same power. For simplicity and in harmony with, e.g., [11]-[17], we let A = b(xo , D), where b(xo , D) represents a disk centered at xo with radius D. However, our theoretical results can be extended to arbitrary regions A. Receivers can be located everywhere in R2 . With no loss of generality, we conduct the analysis at a reference receiver located at the origin o. We further define d = kxo k. The proposed setup well models a wireless network confined in a finite region, such as indoor and ad hoc networks. B. Spatial Model for Multi-Cluster Wireless Networks An MCP is defined as follows [10, Def. 3.6]. Definition 2: An MCP Φ is a union of offspring points that are located around parent points. The parent point process is an HPPP Φp with intensity λp , and the offspring point processes (one per parent) are conditionally independent. Conditioned on x ∈ Φp , the offsprings form an FHPPP Φx with intensity λ over the disk b(x, D). We consider a multi-cluster wireless network as shown in Fig. 2, where the locations of active transmitters are modeled as an MCP. We consider two types of receivers. The first type, referred to as closed-access receivers, can be served by only a single cluster of transmitters. This closed-access receiver is distributed according to a symmetric normal distribution with variance σc2 around the parent point of its corresponding cluster. Therefore, assuming a closed-access receiver at y and its parent point at x, kx − yk is Rayleigh distributed with probability density function (PDF)   v v2 fkx−yk (v) = 2 exp − 2 . σc 2σc (1) The second type, referred to as open-access receivers, considers receivers that are placed independently of the transmitters and can be served by all transmitters. 6 Fig. 2: An illustration of the system model for a finite piece of multi-cluster wireless networks. The proposed setup well models various use-case scenarios as follows: 1) Clustered Small-Cell Base Stations (BSs): The trend in cellular networks is to deploy small-cell BSs at the places with high user density, referred to as user-centric networks [22], [29], as also proposed in 3GPP [24]-[25]. In this way, according to our setup, users who are likely to be close to a cluster of small-cell BSs can be modeled as closed-access receivers, such as users at a stadium or a mall. The open-access receivers can model users who are distributed homogeneously and independently of the small-cell BS locations, such as pedestrians or cars. 2) Cloud BSs: A cloud BS is a distributed multiple-antenna system formed by a number of simple antenna terminals [30]. In this application, the closed-access receivers can be modeled as the users who have a license to use a certain BS, while the open-access receivers can model users with flexibility to access all BSs. 3) Clustered Access Networks: A large building may have a number of WiFi access points as an access network to meet its users’ demands. The closed-access receivers model the users who are in a building and use its access network. On the other hand, the open-access receivers are users who can handoff between access networks of different buildings. 4) Clustered D2D Networks: A device typically has nearby devices in a finite region as a cluster in a content-centric network, which can have direct communications with each other. The closest- or uniform-selection strategy can be considered for cellular or ad hoc access to contents distributed over the devices, respectively. C. Channel Model We assume distance-dependent power-law path loss and small-scale Rayleigh fading. Thus, the received power at the reference receiver from a transmitter located at y is hy kyk−α , where 7 the (common) transmit power is set to 1 with no loss of generality and α > 2 is the path loss exponent. The sequence {hy } consists of i.i.d. exponential random variables with mean 1. III. S INGLE -C LUSTER W IRELESS N ETWORKS In this section, we concentrate on single-cluster wireless networks. To allocate a transmitter to a reference receiver, we propose selection strategies in Subsection III.A. Then, distance distributions and coverage probabilities for the selection strategies are derived in Subsections III.B and III.C, respectively. However, the resulting expressions for the coverage probabilities are not very easy to use. Hence, we derive a closed-form lower bound for the coverage probability of each strategy in Subsection III.D. A. Selection Strategies 1) Closest-selection. Here, a reference receiver is served by the transmitter that provides the maximum received power averaged over the fading. In our model, this leads to the closestselection strategy, i.e., xc = arg min kyk, y∈{Φ|n(Φ)>0} (2) where n(·) denotes the number of elements in a set. Suitable for networks with infrastructure such as downlink cellular networks, this strategy implies that a receiver is served by the transmitter whose Voronoi cell it resides in [4]-[23]. 2) Uniform-selection. Here, the serving transmitter is selected randomly with uniform distribution among all transmitters. This leads to xu = Unif {Φ | n(Φ) > 0} , (3) where Unif {·} denotes the uniform-selection operation. Uniform-selection models random allocation of receivers to transmitters, which may be the case in networks without infrastructure, e.g., ad hoc networks and D2D networks [16], [23]. It is also suitable for applications where the content of interest for a receiver can be available at each transmitter among all transmitters with equal probability, such as caching networks. The signal-to-interference-and-noise ratio (SINR) of a reference receiver at the origin can be expressed as hxq kxq k−α , q = {c, u} , SINRq = σ 2 + Iq (4) 8 where xq is the location of the serving transmitter, Iq = P y∈Φ\{xq } hy kyk−α denotes the interference, and σ 2 is the noise power. To distinguish between the strategies, q = c and u represent the case of closest- and uniform-selection strategies, respectively. For notational simplicity, let us also define Rq = kxq k. B. Serving Distance Distribution Considering the closest- and uniform-selection strategies, in this subsection, we derive the distributions of the distance from the reference receiver to its serving transmitter. These distance distributions will be used later in the coverage probability analysis.  2 2 2  Let us first define ϕ0 = sin−1 Dd , ϕ1 (r) = cos−1 r +d2dr−D , R1 (θ) = d cos (θ) + p p D2 − d2 sin2 (θ) and R̂1 (θ) = d cos (θ) − D2 − d2 sin2 (θ), and present a lemma on the intersection area of two circles. Lemma 1: Consider two circles with radii D and r with centers separated by distance d. The area of their intersection is given by [31, Eq. (12.76)]   2 q   1  D + d2 − r 2 2 2 −1 + r ϕ1 (r) − (r + d)2 − D2 D2 − (r − d)2 . Bd (r) = D cos 2dD 2 (5) Considering the closest-selection strategy, the distance from the reference receiver to its nearest transmitter Rc is larger than r if and only if at least one transmitter exists inside A and there is no transmitter located within b(o, r) ∩ A. Letting Cr denote the intersection, we have P(n(Φ ∩ Cr ) = 0 and n(Φ) > 0) P(n(Φ) > 0) (a) P(n(Φ ∩ Cr ) = 0)P(n(Φ \ Cr ) > 0) = P(n(Φ) > 0) 2 exp (−λ |Cr |) − exp(−λπD2 ) (b) exp (−λ |Cr |) (1 − exp(−λ(πD − |Cr |))) = = ,(6) 1 − exp(−λπD2 ) 1 − exp(−λπD2 ) P (Rc > r) = where | · | denotes the area of a region. Also, (a) follows from the fact that the numbers of points of a PPP in disjoint regions are independent, and (b) is because Rc ≤ D + d. Note when the intersection is the whole of A, i.e., |Cr | = πD2 , (6) is zero. According to Fig. 3, which shows illustrations of the intersection, there are two different cases as follows. 9 Fig. 3: An illustration of the intersection in the case d ≤ D for Subplot (a): D − d ≤ Rc < D + d and Subplot (b): 0 ≤ Rc < D − d, and in the case d > D for Subplot (c): d − D ≤ Rc < d + D. Case 1: If d ≤ D, then   2  0 ≤ r < D − d,   πr |Cr | = Bd (r) D − d ≤ r < D + d,     πD2 r ≥ D + d, (7) where Bd (r) is given in (5). Case 2: If d > D, then    0 ≤ r < d − D,   0 |Cr | = Bd (r) d − D ≤ r < D + d,     πD2 r ≥ D + d. (8) Considering the uniform-selection strategy, on the other hand, the distance from the reference receiver to a randomly chosen transmitter, i.e., Ru , is less than r if and only if, there is a transmitter and the transmitter is located within b(o, r) ∩ A. Thus, as each transmitter is distributed independently and uniformly within A, we have the following cases. Case 1: If d ≤ D, then P (Ru ≤ r) =      r2 D2 Bd (r) πD2 0 ≤ r < D − d, D − d ≤ r < D + d,     1 r ≥ D + d.      0 0 ≤ r < d − D, (9) Case 2: If d > D, then P (Ru ≤ r) = Bd (r) πD2     1 d − D ≤ r < D + d, r ≥ D + d. (10) 10 C. Coverage Probability In this subsection, the distance distribution results obtained in (6)-(8) and (9)-(10) are used to derive the coverage probability of the reference receiver for the two transmitter selection strategies. As a key step in the coverage probability derivation of each strategy, we obtain the LT of the interference (Theorems 1 and 2). For notational simplicity, we define F(s, x) =  x2 2 F1 1, α2 ; 1 + α2 ; − 1s xα where 2 F1 (a, b; c; t) denotes the Gauss hypergeometric function [32]. 1) Closest-Selection Strategy: Theorem 1: Conditioned on Rc , the LT of the interference under the closest-selection strategy is LdIc (s|Rc ) =   Ad (s)     B d (s)       if d ≤ D and 0 ≤ Rc < D − d, if d ≤ D and D − d ≤ Rc < D + d √ or d > D and d2 − D2 ≤ Rc < d + D, √ if d > D and d − D ≤ Rc < d2 − D2 , C d (s) where Ad (s), B d (s) and C d (s) are defined as   Z π d F(s, R1 (θ))dθ , A (s) = exp πλF(s, Rc ) − λ (11) (12) 0  Z B (s) = exp ϕ1 (Rc )λF(s, Rc ) − λ ϕ1 (Rc ) d  F(s, R1 (θ))dθ , (13) 0  Z C (s) = B (s) exp −λ d ϕ0 d n o  F(s, R1 (θ)) − F(s, R̂1 (θ)) dθ , (14) ϕ1 (Rc ) and ϕ0 , ϕ1 , R1 and R̂1 are defined in Subsection III.B. Proof: See Appendix A. Using the conditional LT of the interference derived in Theorem 1, we can express the coverage probability of the reference receiver for the closest-selection strategy as PCc (β) = P(n(Φ) > 0)P(SINRc > β | n(Φ) > 0), (15) where β is the minimum required SINR for a coverage. Note that the coverage probability is zero when there is no transmitter, and the SINRc is only meaningfully defined when there is a transmitter. Then, from (4) and averaging over the serving distance Rc , we have  Z ∞  hxc r−α c 2 PC (β) = (1 − exp(−λπD )) P > β fRd c (r) dr. 2+I σ c 0 (16) 11 where fRd c is the PDF of Rc obtained from (6). The conditional coverage probability given a link distance r can be expressed as   o  (a) n hxc r−α 2 2 α α σ + I P σ + I = E exp −βr > β = P h > βr c c x c σ 2 + Ic  = exp −βσ 2 rα LdIc (βrα |r) , (17) where (a) follows from hxc ∼ exp(1). Finally, according to the cases considered in Subsection III.B and with LdIc given in (11), the coverage probability is obtained as  R D−d  2 2 α d α    0 R 2πλr exp(−λπr ) exp (−βσ r ) LIc (βr |r) dr D+d ∂Bd (r) PCc (β) = + D−d λ ∂r exp(−λBd (r)) exp (−βσ 2 rα ) LdIc (βrα |r) dr if d ≤ D,   R   D+d λ ∂Bd (r) exp(−λBd (r)) exp (−βσ 2 rα ) Ld (βrα |r) dr if d > D. Ic ∂r d−D (18) In the special case of infinite wireless networks, i.e., D → ∞, the coverage probability (18) simplifies to the result in [8, Thm. 2]. 2) Uniform-Selection Strategy: Theorem 2: The LT of the interference under the uniform-selection strategy is  E d (s) if d ≤ D, d LIu (s) = F d (s) if d > D, where E d (s) and F d (s) are defined as R R D+d λ ∂Bd (x)  D−d 2πλx dx + dx − 1 2 2 exp 1+sx−α 0 D−d 1+sx−α ∂x πD exp(−λπD ) E d (s) = , R R D−d 2πx D+d ∂Bd (x) 1 1 − exp(−λπD2 ) dx −α dx + −α 0 R D+d exp d−D πD exp(−λπD ) d F (s) = R D+d 1 − exp(−λπD2 ) 2 2 1+sx ∂B (x) d λ ∂x dx 1+sx−α D−d 1+sx  (19) (20) ∂x −1 ∂Bd (x) 1 dx d−D 1+sx−α ∂x . (21) Proof: See Appendix B. Here the LT of the interference is independent of the serving distance Ru . Using Theorem 2 and following the same approach as in (16)-(18), the coverage probability for the uniform-selection strategy can be expressed as  nR D−d 2r −λπD2  (1 − e ) exp (−βσ 2 rα ) LdIu (βrα ) dr   D2 0  R o D+d 1 ∂Bd (r) 2 α d α PCu (β) = + D−d πD2 ∂r exp (−βσ r ) LIu (βr ) dr    (1 − e−λπD2 ) R D+d 1 ∂Bd (r) exp (−βσ 2 rα ) Ld (βrα ) dr Iu d−D πD2 ∂r if d ≤ D, if d > D. (22) 12 (a) d ≤ D (b) d > D Fig. 4: Outer bounds of A in the two cases d ≤ D and d > D. D. Lower Bounds on Coverage Probability Since the results derived for the LT of the interference in Theorems 1 and 2 require intensive numerical computations, we derive tight lower bounds on the LT of the interference that lead to more tractable and useful analytical results. Then, using the bounds in (18) and (22), lower bounds on coverage probability can be also provided. The tightness of the bounds will be verified with numerical results (Fig. 7). To obtain the lower bounds, we outer bound the region A by a region that permits closed-form bounds on the LT of the interference. Note that using a larger region leads to an upper bound on the interference and, in turn, a lower bound on its LT. The outer region for the cases with d ≤ D and d > D is shown in Fig. 4. Placing the center of the sectors at the reference receiver in case d ≤ D, two covering half-circles with radii √ d + D and D2 − d2 are considered. Also, in the case d > D, we consider the sector with radii d + D and d − D and the front angle 2ϕ0 entangled between the two tangent lines. However, for the closest-selection strategy in the case d > D, we can achieve a tighter bound by the following regions for A\b(o, Rc ), which is the region including interfering transmitters. In the √ case Rc > d2 − D2 , the sector with the front angle equal to twice the intersection angle, i.e., √ 2ϕ1 (Rc ), and radii Rc and D + d is considered. In the case Rc < d2 − D2 , we consider two sectors with the front angle 2ϕ0 and radii Rc and R1 (ϕ1 (Rc )) and with the front angle 2ϕ1 (Rc ) and radii R1 (ϕ1 (Rc )) and D + d. In the following corollaries, we present the lower bounds on the LT of the interference for both strategies. Corollary 1: With closest-selection, the LT of the interference given the serving distance Rc 13 is lower bounded by   Âd (s) if d ≤ D     B̂ d (s) if d ≤ D d LIcb (s|Rc ) =   Ĉ d (s) if d > D     d D̂ (s) if d > D √ and 0 < Rc ≤ D2 − d2 , √ and D2 − d2 ≤ Rc < D + d, √ and d − D ≤ Rc < d2 − D2 , √ and d2 − D2 ≤ Rc < D + d. where Âd (s), B̂ d (s), Ĉ d (s), and D̂d (s) are defined as    √ 1 1 d 2 2 Â (s) = exp πλ F(s, Rc ) − F(s, d + D) − F(s, D − d ) , 2 2 (23) (24) π n o λ F(s, Rc ) − F(s, d + D) , (25) 2  n o Ĉ d (s) = exp λ ϕ0 F(s, Rc ) + (ϕ1 (Rc ) − ϕ0 ) F(s, R1 (ϕ1 (Rc ))) − ϕ1 (Rc )F(s, d + D) , (26) B̂ d (s) = exp  n o D̂d (s) = exp λϕ1 (Rc ) F(s, Rc ) − F(s, d + D) . (27) Proof: The proof follows the same approach as in Appendix A, except that the disk is replaced with the regions given in Fig. 4. Corollary 2: With uniform-selection, the LT of the interference is lower bounded by  Ê d (s) if d ≤ D, d LIub (s) = F̂ d (s) if d > D. (28) where Ê d (s) and F̂ d (s) are defined as  n o √ 2 − d2 ) + F(s, D + d) exp − λπ F(s, D − exp(−λπD(D + d)) 2 d n  o , (29) Ê (s) = √ 1 2 2 (1 − exp(−λπD(D + d))) 1 − 2D(D+d) F(s, D − d ) + F(s, D + d)  n o exp −λϕ0 F(s, d + D) − F(s, d − D) − exp(−4λdDϕ0 )  n o . F̂ d (s) = 1 (1 − exp(−4λdDϕ0 )) 1 − 4dD F(s, d + D) − F(s, d − D) (30) Proof: The proof follows the same approach as in Appendix B, except that the disk is replaced with the regions given in Fig. 4. IV. M ULTI -C LUSTER W IRELESS N ETWORKS In this section, we extend our analysis to multi-cluster wireless networks. Closed-access and open-access receivers are investigated in Subsections IV.A and IV.B, respectively. 14 A. Closed-Access Receivers For the analysis, we consider the reference closed-access receiver at the origin and add a cluster Φxo with intensity λ over the disk b(xo , D), where kxo k has PDF given in (1), to the network. Thanks to Slivnyak’s theorem [10, Thm. 8.10], this additional cluster and its receiver become the representative cluster and receiver under expectation over Φ. This means this link’s performance corresponds to the average performance of all links in any realization of the network. Therefore, the serving transmitter under the closest-selection strategy is xc = arg min y∈{Φxo |n(Φxo )>0} kyk, (31) while with the uniform-selection strategy, the serving transmitter is found by xu = Unif {Φxo | n(Φxo ) > 0} . (32) Then, the SINR at the origin with distance kxk relative to the serving transmitter is SINR = hx kxk−α , σ 2 + Iintra + Iinter (33) hy kyk−α denotes the intra-cluster interference caused by the transmitters y∈Φxo \{x} P inside the representative cluster, and Iinter = hy kyk−α represents the inter-cluster interference where Iintra = P y∈Φ caused by the transmitters outside the representative cluster. Given the distance between the receiver and the center of the representative cluster, i.e., kxo k, the distributions of the distances Rc = kxc k and Ru = kxu k are derived in Subsection III.B for the closest- and uniform-selection strategies, respectively. Also, the LT of the intra-cluster kx k o interference conditioned on kxo k, defined as the function LIintra , is given by Theorems 1 and 2 for the closest-selection and uniform-selection strategies, relatively. The LT of the inter-cluster interference is also characterized in the following theorem. Theorem 3: The LT of the inter-cluster interference Iinter is   ZDn  Z∞n o o LIinter (s) = exp −2πλp 1 − exp (−λf (s, u)) udu + 1 − exp (−λg(s, u)) udu , (34) 0 D where f (s, u) and g(s, u) are defined as Z π f (s, u) = F(s, R2 (u, θ))dθ, (35) 0 Z g(s, u) = 0 ϕ2 (u) n o F(s, R2 (u, θ)) − F(s, R̂2 (u, θ)) dθ, (36) 15 where ϕ2 (u) = sin−1 p D2 − u2 sin2 (θ). D u  , R2 (u, θ) = u cos (θ) + p D2 − u2 sin2 (θ) and R̂2 (u, θ) = u cos (θ) − Proof: See Appendix C. Using the expressions derived for the intra- and inter-cluster interferences, the coverage probability under the closest-selection strategy is calculated by deconditioning as PCca-c (β) = P(n(Φxo ) > 0)P(SINRc > β | n(Φxo ) > 0) = (1 − exp(−λπD2 )) ×  Z ∞Z ∞  hx r−α P > β fRv c (r) fkxo k (v) drdv, σ 2 + Iintra + Iinter 0 0 where the conditional coverage probability is expressed as    v hx r−α 2 α P > β = exp −βσ r LIc (βrα |r) LIinter (βrα ) . 2 σ + Iintra + Iinter (37) (38) Then, according to the cases in Subsections III.B and C, (37) is given by Z D Z D−v  2 ca-c 2πλre−λπr exp −βσ 2 rα LvIc (βrα |r) LIinter (βrα ) fkxo k (v) drdv PC (β) = Z D Z 0 0 D+v  ∂Bv (r) −λBv (r) e exp −βσ 2 rα LvIc (βrα |r) LIinter (βrα ) fkxo k (v) drdv ∂r 0 D−v Z ∞ Z D+v  ∂Bv (r) −λBv (r) e exp −βσ 2 rα LvIc (βrα |r) LIinter (βrα ) fkxo k (v) drdv. λ + ∂r D v−D + λ (39) Finally, the coverage probability with the uniform-selection strategy can be derived with the same procedure as in (37)-(39). It is given by Z D Z D−v  2r ca-u −λπD2 exp −βσ 2 rα LvIu (βrα ) LIinter (βrα ) fkxo k (v) drdv PC (β) = (1 − e ) 2 D 0 0 Z D Z D+v  1 ∂Bv (r) + exp −βσ 2 rα LvIu (βrα ) LIinter (βrα ) fkxo k (v) drdv 2 ∂r 0 D−v πD  Z ∞ Z D+v  v 1 ∂Bv (r) 2 α α α exp −βσ r LIu (βr ) LIinter (βr ) fkxo k (v) drdv . (40) + 2 ∂r D v−D πD B. Open-Access Receivers Here, we only consider the closest-selection strategy. Note that there is no uniform-selection strategy in this case, since the number of transmitters is infinite. Therefore, the serving transmitter is xt = arg min kyk. y∈Φ (41) The distribution of the distance from the reference open-access receiver at the origin, i.e., Rt = kxt k, is given in the following theorem. 16 Theorem 4: The cumulative distribution function (CDF) of Rt is    2   1 − exp −2πλp (1 − exp (−λπr2 )) (D−r)  2       R D+r   if 0 ≤ r < D,  + D−r (1 − exp (−λBu (r))) udu   FRt (r) = 2   1 − exp −2πλp (1 − exp (−λπD2 )) (r−D)  2       R D+r   if r ≥ D.  + r−D (1 − exp (−λBu (r))) udu (42) Proof: See Appendix D. Note that the contact distribution function of MCP is also derived in [28] using the probability generating functional (PGFL) of PCPs in [10, Cor. 4.13]. However, our approach is more tractable and leads to the result (42), which is much easier to numerically evaluate than [28, Thm. 1]. By taking the derivative of FRt (r), using Leibniz integral rule, and some simplifications, the PDF of Rt can be obtained as    R 2  D+r ∂B (r) u  2πλp πλre−λπr (D − r)2 + D−r λ ∂r e−λBu (r) udu         2   × exp −2πλp (1 − exp (−λπr2 )) (D−r)  2       R D+r    + D−r (1 − exp (−λBu (r))) udu   fRt (r) = R D+r ∂Bu (r) −λB (r)  u  2πλp r−D λ ∂r e udu          (r−D)2   × exp −2πλp (1 − exp (−λπD2 )) 2       R D+r    + r−D (1 − exp (−λBu (r))) udu if 0 ≤ r < D, (43) if r ≥ D. The SINR at the reference open-access receiver located at the origin is hxt Rt −α SINRt = 2 , σ + It where It = P (44) hy kyk−α denotes the total interference caused by all transmitters except for y∈Φ\{xt } the serving transmitter. The LT of the total interference It conditioned on the serving distance Rt is characterized in the following theorem. 17 Theorem 5: Conditioned on Rt , the LT of the total interference It is    R D−Rt   exp −2πλp 0 {1 − Au (s)} udu      R √D2 +Rt2 R D+Rt  u  √ 2 2 {1 − C u (s)} udu + {1 − B (s)} udu +  D−R t  D +Rt     R  ∞   + D+Rt {1 − exp (−λg(s, u))} udu if 0 ≤ Rt < D,   √ (45) LIt (s|Rt ) = R D2 +Rt2  u   exp −2πλp Rt −D {1 − B (s)} udu      D+Rt  + R√  {1 − C u (s)} udu  D2 +Rt2     R∞    if Rt ≥ D,  + D+Rt {1 − exp (−λg(s, u))} udu where Au (s), B u (s) and C u (s) are defined for a u in (12), (13) and (14), respectively. Also, g(s, u) is given in (36). Proof: See Appendix E. Using Theorem 5 and (43) and the same procedure as in Subsection III.C, the coverage probability of the reference open-access receiver in multi-cluster wireless networks is found as Z ∞  oa exp −βσ 2 rα LIt (βrα |r) fRt (r)dr. PC (β) = (46) 0 V. N UMERICAL R ESULTS AND D ISCUSSION In this section, we provide analytical results for specific scenarios of single- and multi-cluster wireless networks. In addition, we discuss the results and provide key design insights. A. Single-Cluster Wireless Networks We consider a scenario of single-cluster wireless networks in which the transmitters are distributed according to an FHPPP with intensity λ = 0.01 m−2 in a disk with radius D = 15 m and evaluate the coverage probability results derived in Subsection III.C. Also, we evaluate the spectral efficiency, defined as τ = E {log(1 + SINR)}. The variance of the additive white Gaussian noise is set to σ 2 = 0.0001. We further define the normalized (relative) distance δ = d . D In the following, we study the impact of the path loss exponent and the distance of the receiver from the center of the disk on the coverage probability and the spectral efficiency. We also investigate the tightness of the bounds derived in Subsection III.D. Effect of path loss exponent: The coverage probability as a function of the minimum required SINR β is plotted in Fig. 5 for the closest- and uniform-selection strategies, considering δ = 2 3 18 and 4 3 and α = 3 and 4. It is observed that the coverage probability is improved by increasing the path loss exponent. However, with the uniform-selection, a higher path loss exponent has a degrading effect when β is lower than −5 dB. That is because the SINR exhibits a tradeoff as α increases. The power of both the desired and the interfering signals decrease, which can lead to an increase or decrease in the SINR, depending on β and the other parameters. At a target coverage probability of 0.8, the (horizontal) gap between uniform- and closest-selection is about 20 dB for α = 3 and 25 dB for α = 4 in the case δ = 2 3 and 12 dB for α = 3 and 18 dB for α = 4 in the case δ = 43 . Effect of receiver distance from the center: The coverage probability as a function of the normalized distance δ is studied in Fig. 6 for both selection strategies, α = 4 and β = −5 and 0 dB. It is observed that, depending on β, there is an optimal value for the distance of the receiver, about 2D for uniform-selection at β = −5 dB and 0.8D for other cases, in terms of the coverage probability. This is due to the fact that the SINR has a tradeoff since the power of both the desired and the interfering signals decrease as the distance of the receiver to the center of the disk increases. Tightness of the bounds: The tightness of the bounds on coverage probability derived in Subsection III.D is evaluated in Fig. 7 in the cases with different selection strategies and α = 4 and δ = 2 3 and 43 . As observed, the bounds tightly approximate the performance in a broad range of SINR thresholds β and for different positions of the receiver inside or outside the disk. Spectral efficiency: The spectral efficiency as a function of δ is shown in Fig. 8 for both selection strategies and α = 3 and 4. We analytically obtain the spectral efficiency from the coverage probability as, e.g., [8, Thm. 3]1 Z ∞ Z q P(log (1 + SINRq ) > t) dt = τ = 0 0 ∞ 1 PCq (t) dt bits/channel use, q = {c, u} . ln2 t + 1 (47) As observed, closest-selection achieves a much higher spectral efficiency than uniform-selection for different receiver distances. Also, there is a crossing point, whereby the spectral efficiency improves as α increases before reaching a distance for the receiver location outside the disk. Then, at higher distances, the reverse happens. This is intuitive because, at lower distances, the power of the interfering signals, which decreases with a higher path loss exponent, is the 1 Note that this is an upper bound on the actual spectral efficiency, since this formulation assumes that the transmitter knows all the fading coefficients between all other transmitters and the receiver, which would be a very generous assumption. A tighter lower bound could be found using the approach described in [33]. 19 1 c, δ = 2/3, α = 4 c, δ = 2/3, α = 3 u, δ = 2/3, α = 4 u, δ = 2/3, α = 3 c, δ = 4/3, α = 4 c, δ = 4/3, α = 3 u, δ = 4/3, α = 4 u, δ = 4/3, α = 3 0.9 Coverage Probability 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 −50 −30 −10 β (dB) 10 30 50 Fig. 5: Coverage probability as a function of the SINR threshold β with δ = 2 3 and 43 . c and u denote closest- and uniform-selection, respectively. 1 c, β = −5 dB c, β = 0 dB u, β = −5 dB u, β = 0 dB 0.9 Coverage Probability 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 1 2 δ 3 4 5 Fig. 6: Coverage probability as a function of normalized distance δ with α = 4. dominant factor on the SINR. On the other hand, at higher distances, the power of the desired signal, which increases with a smaller path loss exponent, dominates. Also, there may be an optimal value for the distance of the receiver in terms of the spectral efficiency. This is the result of the coverage probability behavior with the distance. B. Multi-Cluster Wireless Networks Here, we consider a multi-cluster wireless network where transmitters form an MCP with intensity λ = 0.01 m−2 inside disks, all with equal radius D = 15 m, whose centers follow an HPPP with intensity λp = 0.0004 m−2 . Closed-access receivers are distributed with normal distribution with variance σc2 around the cluster centers of transmitters. We further define normalized standard deviation δc = σc . D In the following, the effects of the path loss exponent and variance of the normal distribution of closed-access receivers are assessed on the theoretical results derived in Subsections IV.A and IV.B. 20 1 c, Ex, δ = 2/3 c, LB, δ = 2/3 c, Ex, δ = 4/3 c, LB, δ = 4/3 u, Ex, δ = 2/3 u, LB, δ = 2/3 u, Ex, δ = 4/3 u, LB, δ = 4/3 0.9 Coverage Probability 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 −50 −30 −10 β (dB) 10 30 50 Fig. 7: On the tightness of the coverage probability lower bounds, α = 4. Ex and LB denote the exact result and Spectral Efficiency (bits/channel use) the lower bound, respectively. 4 c, α = 4 c, α = 3 u, α = 4 u, α = 3 3.5 3 2.5 2 1.5 1 0.5 0 0 1 2 δ 3 4 5 Fig. 8: Spectral efficiency as a function of normalized distance δ. 1 CA, c, α = 4 CA, c, α = 3 CA, u, α = 4 CA, u, α = 3 OA, c, α = 4 OA, c, α = 3 Coverage Probability 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 −50 −30 −10 β (dB) 10 30 50 Fig. 9: Coverage probability of the closed-access (CA) and open-access (OA) receiver as a function of threshold β with δc = 23 . Effect of path loss exponent: In Fig. 9, the coverage probability as a function of β is plotted for the closest- and uniform-selection strategies in the case of closed-access receivers with δc = 32 . In this figure, the case of open-access receivers with the closest-selection strategy is also considered. Here, the results are presented for α = 3 and 4. As observed, a higher path loss exponent improves 21 1 c, β = −5 dB c, β = 0 dB u, β = −5 dB u, β = 0 dB Coverage Probability 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 1 2 δc 3 4 5 Fig. 10: Coverage probability of the closed-access receiver as a function of normalized standard deviation δc with α = 4. the coverage probability in practical minimum required SINRs. Effect of variance of the normal distribution: The coverage probability as a function of the normalized standard deviation δc is shown in Fig. 10. Here, the results are presented for the closed-access receivers, considering α = 4 and β = −5 and 0 dB. It is observed that the coverage probability decreases as the standard deviation (or variance) of the normal distribution increases. It is intuitive because the probability of the event that the receiver is located farther from the representative transmitters increases with σc . VI. C ONCLUSION In this paper, we developed a comprehensive tractable framework for the modeling and analysis of single- and multi-cluster wireless networks. Suitable for different wireless applications, we considered two strategies for a reference receiver to select a serving transmitter over a single-cluster wireless network: closest-selection and uniform-selection. Considering two types of receivers—closed-access receivers and open-access receivers—we then extended our modeling to multi-cluster wireless networks that are composed of distributed single-cluster wireless networks. Using tools from stochastic geometry, we derived exact expressions for the coverage probability in the cases with different transmitter selection strategies and types of receivers in single- and multi-cluster wireless networks. We also proposed tight closed-form expressions bounding the coverage probability in the case of single-cluster wireless networks. Our analysis revealed that a higher path loss exponent improves the performance except when the receiver is outside and relatively far from its cluster of transmitters. In addition, although an increase in the distance of the receiver to the center of the cluster typically degrades the performance, there 22 exists a location with optimal performance for the receiver. Also, the closest-selection strategy significantly outperforms the uniform-selection strategy. A PPENDIX A P ROOF OF T HEOREM 1 The LT of the interference, given the serving distance Rc , is calculated as   X   −α d LIc (s|Rc ) = E exp −s hy kyk | n(Φ) > 0 y∈Φ\{xc } ( ) ) ( Y Y  1 (a) =E exp −shy kyk−α | n(Φ) > 0 = E −α | n(Φ) > 0 1 + skyk y∈Φ\{xc } y∈Φ\{xc }     Z 1 (b) dy , (48) = exp −λ 1− 1 + skyk−α A\b(o,Rc ) where (a) is obtained by hy ∼ exp(1) and (b) follows from the PGFL of the PPP [10, Thm. 4.9] and the fact that interfering nodes are farther away than Rc . Having a non-empty intersection between A and b(o, Rc ), to compute (48), there are two types for d < D (Case 1) and two types for d > D (Case 2) to convert from Cartesian to polar coordinates. In fact, each type denotes a special form of A\b(o, Rc ) that can be represented by polar coordinates uniquely. Case 1: We have two different types for the case d < D as follows. Type 1: If A ∩ b(o, Rc ) = b(o, Rc ) as given in Fig. 2(b), i.e., 0 ≤ Rc < D − d, then Z2π RZ1 (θ) LdIc (s|Rc ) = exp −λ 1−  0 1 1 + sx−α  Z2π ZRc  xdxdθ + λ 1− 0 0 1 1 + sx−α   xdxdθ .(49) 0 This can be simplified to ! Z 2π Z R1 (θ) x x LdIc (s|Rc ) = exp 2πλ α dx − λ α dxdθ 1 + xs 1 + xs 0 0 0   Z π (c) = exp πλF(s, Rc ) − λ F(s, R1 (θ))dθ , Z Rc (50) 0 where (c) follows from replacing xα with u and calculating the corresponding integral based on the formula [32, (3.194.1)] which uses the Gauss hypergeometric function 2 F1 . Type 2: If A ∩ b(o, Rc ) 6= b(o, Rc ) as given in Fig. 2(a), i.e., D − d ≤ Rc < D + d, then !  Z ϕ1 (Rc ) Z R1 (θ)  1 1− LdIc (s|Rc ) = exp −λ xdxdθ 1 + sx−α −ϕ1 (Rc ) Rc  Z ϕ1 (Rc ) n o  = exp −λ F(s, R1 (θ)) − F(s, Rc ) dθ . (51) 0 23 Case 2: As observed from Fig. 2(c) for the case d > D, we have two different types of the LT of the interference depending on whether or not, at an angle, the lower boundary of A within the two tangent lines crossing the origin is included in the boundary of A\b(o, Rc ). √ Type 1: Since the intersection angle ϕ1 (r) at r = d2 − D2 is equal to the angle of the √ tangent lines ϕ0 , if d − D < Rc < d2 − D2 , we have  Z −ϕ1 (Rc ) Z R1 (θ)   1 d 1− LIc (s|Rc ) = exp −λ xdxdθ 1 + sx−α R̂1 (θ) −ϕ0    Z ϕ1 (Rc ) Z R1 (θ)  Z ϕ0 Z R1 (θ)  1 1 1− 1− + xdxdθ + xdxdθ 1 + sx−α 1 + sx−α −ϕ1 (Rc ) Rc ϕ1 (Rc ) R̂1 (θ) ϕZ 1 (Rc )  Zϕ0 n o n o  = exp −λ F(s, R1 (θ)) − F(s, R̂1 (θ)) dθ − λ F(s, R1 (θ)) − F(s, Rc ) dθ .(52) 0 ϕ1 (Rc ) √ Type 2: If d2 − D2 < Rc < d + D, then Z ϕ1 (Rc ) Z d LIc (s|Rc ) = exp −λ −ϕ1 (Rc ) R1 (θ)  1− Rc 1 1 + sx−α !  xdxdθ ϕ1 (Rc ) n  Z = exp −λ o  F(s, R1 (θ)) − F(s, Rc ) dθ . (53) 0 A PPENDIX B P ROOF OF T HEOREM 2 The LT of the interference is   X   −α d LIu (s) = E exp −s hy kyk | n(Φ) > 0 y∈Φ\{xu } ( ) ( Y Y (a) −α  =E exp −shy kyk | n(Φ) > 0 = E ) 1 | n(Φ) > 0 1 + skyk−α y∈Φ\{x } y∈Φ\{xu } (Z (b) =E u ) n(Φ)−1 ∞ 1 fR (x)dx | n(Φ) > 0 1 + sx−α u 0 Z ∞ k−1 ∞ 2 2 k 1 (c) X exp(−λπD )(λπD ) = fR (x)dx k!(1 − exp(−λπD2 )) 1 + sx−α u 0 k=1 = (1 − 1 R∞ exp(−λπD2 )) 0 1 f (x)dx 1+sx−α Ru Z ∞ X exp(−λπD2 )(λπD2 )k k=0 k! 0 ∞ × 1 fR (x)dx 1 + sx−α u k ! 2 − exp(−λπD ) 24 exp(−λπD2 ) = exp λπD2 R∞ 1 (1 − exp(−λπD2 )) 1+sx−α fRu (x)dx (d) Z∞ 1 fR (x)dx 1 + sx−α u ! ! −1 , (54) 0 0 where fRd u is the PDF of Ru obtained from the distributions in (9)-(10) and (a) is found by hy ∼ exp(1). Also, (b) follows from the fact that conditioned on n(Φ), Φ is a BPP where the distance kyk of each point is i.i.d. with distribution fRd u , (c) follows from P(n(Φ) = k | n(Φ) > 0) = exp(−λπD2 )(λπD2 )k , k!(1−exp(−λπD2 )) and (d) is found by the moment-generating function (MGF) of a Poisson random variable with mean λπD2 and some simplifications. According to (9)-(10), there are two cases to compute the integral: Case 1: If d ≤ D, then Z D−d Z D+d Z ∞ 1 1 1 2x 1 ∂Bd (x) fRu (x)dx = dx + dx. −α −α 2 −α 1 + sx 1 + sx D πD2 ∂x 0 D−d 1 + sx 0 Case 2: If d > D, then Z ∞ Z D+d 1 1 1 ∂Bd (x) fRu (x)dx = dx. −α −α 1 + sx πD2 ∂x 0 d−D 1 + sx (55) (56) A PPENDIX C P ROOF OF T HEOREM 3 The LT of the inter-cluster interference is !) ( ) ( X X Y Y  hy kyk−α =E exp −shy kyk−α LIinter (s) = E exp −s x∈Φp y∈Φx ( 1 1 + skyk−α x∈Φp y∈Φx )  Y Y   1  1 + skz + xk−α  x∈Φp y∈Φx x∈Φp z∈Φo       Z Y 1 (c) =E dz exp −λ 1−   1 + skz + xk−α b(o,D) (a) =E Y Y (b) =E x∈Φp (d)  Z = exp −λp R2   Z 1 − exp −λ  1− b(o,D) 1 1 + skz + xk−α    dz dx , (57) where (a) follows from hy ∼ exp(1), and (b) comes from the fact that y ∈ Φx can be written as y = z + x, where z is taken from the FHPPP Φo with intensity λ over b(o, D) and x ∈ Φp . Also, both (c) and (d) follow from the PGFL of the PPP. In order to convert the inner integral from Cartesian to polar coordinates, there are two cases: 25 Case 1: If kxk ≤ D, then    Z Z 2π Z R2 (kxk,θ)  1 1 1− f (s, kxk) = 1− dz = xdxdθ 1 + sx−α 1 + skz + xk−α 0 0 b(o,D) Z π F(s, R2 (kxk, θ))dθ, (58) = 0 p where R2 (kxk, θ) = D2 − kxk2 sin2 (θ) + kxk cos (θ). Case 2: If kxk > D, then  1− Z g(s, kxk) = b(o,D) 1 1 + skz + xk−α ϕ2Z(kxk) R2Z (kxk,θ)  1 1− 1 + sx−α dz =  xdxdθ −ϕ2 (kxk) R̂2 (kxk,θ) ϕ2 (kxk) n Z o F(s, R2 (kxk, θ)) − F(s, R̂2 (kxk, θ)) dθ, = (59) 0 where ϕ2 (kxk) = sin−1  D kxk  and R̂2 (kxk, θ) = kxk cos (θ) − p D2 − kxk2 sin2 (θ). Therefore, converting the outer integral from Cartesian to polar coordinates, the final result can be written as   ZDn Z∞n o o LIinter (s) = exp −2πλc 1 − exp (−λf (s, u)) udu + 1 − exp (−λg(s, u)) udu .(60) 0 D A PPENDIX D P ROOF OF T HEOREM 4 Let us define Rx = min kyk, which is the distance from the reference receiver to its closest y∈Φx transmitter in the cluster with parent point x ∈ Φp . Then, the CDF of Rt = min Rx is x∈Φp      (a) = 1 − lim E P min Rx > r | n(Ψρ ) ρ→∞ x∈Ψρ )) FRt (r) = P (Rt < r) = 1 − P min Rx > r x∈Φp ( ( Y (b) = 1 − lim E E P (Rx > r) | n(Ψρ ) ρ→∞ x∈Ψρ ( ( (c) = 1 − lim E E ρ→∞ Y P (n(Φx ) = 0) P (Rx > r | n(Φx ) = 0) x∈Ψρ ))  +P (n(Φx ) > 0) P (Rx > r | n(Φx ) > 0) | n(Ψρ ) 26 ( ( )) (d) Y = 1 − lim E E ρ→∞ exp(−λπD2 ) + (1 − exp(−λπD2 ))E(x) | n(Ψρ ) x∈Ψρ ( n(Ψρ ) ) Z 1 (e) = 1 − lim E exp(−λπD2 ) + (1 − exp(−λπD2 ))E(x)dx ρ→∞ πρ2 b(o,ρ) !! Z   1 (f ) = 1 − lim exp −λp πρ2 1 − 2 exp −λπD2 + 1 − exp −λπD2 E(x)dx ρ→∞ πρ b(o,ρ)  Z = 1 − exp −λp 1 − exp −λπD 2   (1 − E(x))dx , (61) R2 where Ψρ = Φp ∩ b(o, ρ) and (a) follows from lim Ψρ = Φp . Then, (b) is due to the facts that ρ→∞ Rx is a function of x ∈ Ψρ and Ψρ conditioned on n(Ψρ ) is a BPP. Also, (c) is obtained by conditioning on the existence of a transmitter inside each cluster, and (d) comes from Subsection III.B, whereby E(x) is defined as E(x) = exp (−λ |Cx |) − exp(−λπD2 ) 1 − exp(−λπD2 ) (62) where |Cx | is the area of the intersection between b(o, r) and b(x, D). Also, note that P (Rx > r | n(Φx ) = 0) = 1, for 0 < r < ∞. In addition, (e) follows from the fact that the points x are i.i.d. uniformly distributed on b(o, ρ), and (f ) is found by the MGF of the number of points of Ψρ , which is Poisson with mean λp πρ2 . According to Fig. 3, there are two cases for |Cx |: Case 1: If kxk ≤ D, then   2    πr |Cx | = Bkxk (r)     πD2 Case 2: If kxk > D, then      0 |Cx | = Bkxk (r)     πD2 kxk < D − r, kxk > r − D and kxk ≥ D − r, (63) kxk ≤ r − D, kxk > r + D, kxk > r − D and kxk ≤ r + D, (64) kxk ≤ r − D, where Bkxk (r) is given in (5). Therefore, converting (61) from Cartesian to polar coordinates according to (62)-(64), the CDF of Rt is found as  Z D−r Z  2 FRt (r) = 1 − exp −2πλp 1 − exp(−λπr ) udu + 0 Z D+r D (1 − exp (−λBu (r))) udu D−r Z ∞ (1 − exp (−λBu (r))) udu + + D D+r  (1 − exp (0)) udu , (65) 27 if 0 ≤ r < D,  Z FRt (r) = 1 − exp −2πλp r−D (1 − exp(−λπD2 )) (1 − 0) udu 0 D Z Z (1 − exp (−λBu (r))) udu + r−D  Z ∞ (1 − exp (0)) udu , + D+r (1 − exp (−λBu (r))) udu + D (66) D+r if D ≤ r < 2D, and  Z FRt (r) = 1 − exp −2πλp D (1 − exp(−λπD2 )) (1 − 0) udu 0 Z r−D Z 2 + D Z ∞ + (1 − exp(−λπD )) (1 − 0) udu +  (1 − exp (0)) udu , D+r (1 − exp (−λBu (r))) udu r−D (67) D+r if r ≥ 2D. Here, though derived differently, (66) and (67) leads to the same expression. The final result can be obtained by some simplifications. A PPENDIX E P ROOF OF T HEOREM 5 The LT of the total interference, conditioned on the serving distance Rt , is ( !) X (a) LIt (s|Rt ) = E exp −s hy kyk−α y∈Φ\b(o,Rt ) ( ) ( Y  (b) exp −shy kyk−α =E ) 1 =E 1 + skyk−α x∈Φp y∈Φx \b(o,Rt ) x∈Φp y∈Φx \b(o,Rt )       Z Y 1 (c) =E exp −λ 1− dy   1 + skyk−α b(x,D)\b(o,Rt ) x∈Φp       Z  Z 1 (d) = exp −λp 1 − exp −λ 1− dy dx , (68) 1 + skyk−α R2 b(x,D)\b(o,Rt ) Y Y Y where (a) follows from the fact that all transmitters with distance more than Rt are interferers, (b) comes from hy ∼ exp(1), and both of (c) and (d) follow from the PGFL. According to Theorems 1 and 3, there are the following cases for the inner integral. Case 1: If kxk ≤ D and kxk < D − Rt , then     Z 1 exp −λ 1− dy = Akxk (s). −α 1 + skyk b(x,D)\b(o,Rt ) (69) 28 Case 2: If kxk ≤ D and kxk > Rt − D and kxk ≥ D − Rt , then     Z 1 dy = B kxk (s). exp −λ 1− −α 1 + skyk b(x,D)\b(o,Rt ) p Case 3: If kxk > D and kxk > Rt2 + D2 and kxk ≤ Rt + D, then     Z 1 dy = C kxk (s). exp −λ 1− −α 1 + s||y|| b(x,D)\b(o,Rt ) p Case 4: If kxk > D and kxk > Rt − D and kxk ≤ Rt2 + D2 , then     Z 1 1− exp −λ dy = B kxk (s). −α 1 + skyk b(x,D)\b(o,Rt ) Case 5: If kxk > Rt + D, then     Z 1 1− exp −λ dy = exp (−λg(s, kxk)) . 1 + skyk−α b(x,D)\b(o,Rt ) Case 6: If kxk < Rt − D, then     Z 1 dy = 0. exp −λ 1− 1 + skyk−α b(x,D)\b(o,Rt ) Therefore, converting the outer integral from Cartesian to polar coordinates according to (74), the LT can be given by  Z LIt (s|Rt ) = exp −2πλp {1 − Au (s)} udu Z √ 2 2 D D +Rt {1 − B u (s)} udu + + D−Rt D+Rt (72) (73) (74) (69)- {1 − B u (s)} udu D Z + √ (71) D−Rt 0 Z (70) Z u ∞  {1 − exp (−λg(s, u))} udu , {1 − C (s)} udu + D2 +Rt2 (75) D+Rt if 0 ≤ Rt < D,  Z Rt −D LIt (s|Rt ) = exp −2πλp {1 − exp(0)} udu Z √ 2 2 0 Z D Z D +Rt {1 − B u (s)} udu + + Rt −D D+Rt + √ {1 − B u (s)} udu D Z u ∞  {1 − C (s)} udu + D2 +Rt2 {1 − exp (−λg(s, u))} udu if D ≤ Rt < 2D, and  Z LIt (s|Rt ) = exp −2πλp Z √D2 +Rt2 Rt −D {1 − exp(0)} udu + D+Rt + √ u Z ∞ {1 − C (s)} udu + D2 +Rt2 (76) {1 − B u (s)} udu Rt −D 0 Z , D+Rt  {1 − exp (−λg(s, u))} udu , D+Rt if Rt ≥ 2D. The final result can be obtained by some simplifications. (77) 29 R EFERENCES [1] J. G. Andrews, S. Buzzi, W. Choi, S. Hanly, A. Lozano, A. C. K. Soong, and J. C. Zhang, "What will 5G be?," IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065-1082, Jun. 2014. [2] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, "Five disruptive technology directions for 5G," IEEE Commun. Mag., vol. 52, no. 2, pp. 74-80, Feb. 2014. [3] M. Peng, C. Wang, V. Lau, and H. V. Poor, "Fronthaul-constrained cloud radio access networks: insights and challenges," IEEE Wireless Commun., vol. 22, no. 2, pp. 152-160, April 2015. [4] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, "Stochastic geometry and random graphs for the analysis and design of wireless networks," IEEE J. Sel. Areas Commun., vol. 27, no. 7, pp. 1029-1046, Sep. 2009. [5] H. Elsawy, E. Hossain, and M. Haenggi, "Stochastic geometry for modeling, analysis, and design of multi-tier and cognitive cellular wireless networks: A survey," IEEE Commun. Surveys Tuts., vol. 15, no. 3, pp. 996-1019, 3rd quarter 2013. [6] H. ElSawy, A. K. Sultan-Salem, M. S. Alouini, and M. Z. Win, "Modeling and Analysis of Cellular Networks Using Stochastic Geometry: A Tutorial," IEEE Commun. Surveys Tuts., vol. 19, no. 1, pp. 167-203, 1st quarter 2017. [7] J. G. Andrews, R. K. Ganti, M. Haenggi, N. Jindal, and S. Weber, "A primer on spatial modeling and analysis in wireless networks," IEEE Commun. Mag., vol. 48, no. 11, pp. 156-163, Nov. 2010. [8] J. G. Andrews, F. Baccelli, and R. K. Ganti, "A tractable approach to coverage and rate in cellular networks," IEEE Trans. Commun., vol. 59, no. 11, pp. 3122-3134, Nov. 2011. [9] J. G. Andrews, A. K. Gupta, and H. S. Dhillon, "A primer on cellular network analysis using stochastic geometry," arXiv preprint, Apr. 2016, available online: arxiv.org/abs/1604.03183. [10] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge University Press, 2012. [11] D. Torrieri and M. C. Valenti, "The outage probability of a finite ad hoc network in Nakagami fading," IEEE Trans. Commun., vol. 60, no. 11, pp. 3509-3518, Nov. 2012. [12] K. Venugopal, M. C. Valenti, and R. W. Heath, "Interference in finite-sized highly dense millimeter wave networks," IEEE ITA’2015, San Diego, USA, Feb. 2015. [13] M. Afshang and H. S. Dhillon, "Optimal geographic caching in finite wireless networks," Proc. IEEE SPAWC’2016, Edinburgh, Scotland, July 2016. [14] V. V. Chetlur and H. S. Dhillon, "Downlink coverage probability in a finite network of unmanned aerial vehicle (UAV) base stations," Proc. IEEE SPAWC’2016, Edinburgh, Scotland, July 2016. [15] S. Srinivasa and M. Haenggi, "Distance Distributions in Finite Uniformly Random Networks: Theory and Applications," IEEE Trans. Veh. Technol., vol. 59, no. 2, pp. 940-949, Feb. 2010. [16] M. Afshang and H. S. Dhillon, "Fundamentals of Modeling Finite Wireless Networks using Binomial Point Process", IEEE Trans. Wireless Commun., vol. 16, no. 5, pp. 3355-3370, May 2017. [17] V. V. Chetlur and H. S. Dhillon, "Downlink Coverage Analysis for a Finite 3D Wireless Network of Unmanned Aerial Vehicles", IEEE Trans. Commun., vol. 65, no. 10, pp. 4543-4558, July 2017. [18] J. Guo, S. Durrani, and X. Zhou, "Outage probability in arbitrarily-shaped finite wireless networks," IEEE Trans. Commun., vol. 62, no. 2, pp. 699-712, Feb. 2014. [19] J. Guo, S. Durrani, and X. Zhou, "Performance analysis of arbitrarily-shaped underlay cognitive networks: Effects of secondary user activity protocols," IEEE Trans. Commun., vol. 63, no. 2, pp. 376-389, Feb. 2015. [20] Z. Khalid and S. Durrani, "Distance Distributions in Regular Polygons," IEEE Trans. Veh. Technol., vol. 62, no. 5, pp. 2363-2368, June 2013. 30 [21] M. C. Valenti, D. Torrieri, and S. Talarico, "A direct approach to computing spatially averaged outage probability," IEEE Commun. Lett., vol. 18, no. 7, pp. 1103-1106, July 2014. [22] M. Afshang and H. S. Dhillon, "Poisson cluster process based analysis of HetNets with correlated user and base station locations," arXiv preprint, Dec. 2016, available online: https://arxiv.org/abs/1612.07285. [23] M. Afshang, H. S. Dhillon, and P. H. J. Chong, "Modeling and performance analysis of clustered device-to-device networks," IEEE Trans. Wireless Commun., vol. 15, no. 7, pp. 4957-4972, July 2016. [24] "3rd generation partnership project; technical specification group radio access network; scenarios and requirements for small cell enhancements for E-UTRA and E-UTRAN (release 13)," 3GPP TR 36.932 V13.0.0, 2015. [25] "Further advancements for E-UTRA physical layer aspects," 3GPP TR 36.814, 2010. [26] V. Suryaprakash, J. Møller, and G. Fettweis, "On the Modeling and Analysis of Heterogeneous Radio Access Networks Using a Poisson Cluster Process," IEEE Trans. Wireless Commun., vol. 14, no. 2, pp. 1035-1047, Feb. 2015. [27] R. K. Ganti and M. Haenggi, "Interference and Outage in Clustered Wireless Ad Hoc Networks," IEEE Trans. Wireless Commun., vol. 55, no. 9, pp. 4067-4086, Sept. 2009. [28] M. Afshang, C. Saha, and H. S. Dhillon, "Nearest-Neighbor and Contact Distance Distributions for Matern Cluster Process," IEEE Commun. Lett., vol. 21, no. 12, pp. 2686-2689, Dec. 2017. [29] N. Deng, W. Zhou, and M. Haenggi, "Heterogeneous Cellular Network Models with Dependence", IEEE J. Sel. Areas Commun., vol. 33, no. 10, pp. 2167-2181, Oct. 2015. [30] T. Flanagan, Creating cloud base stations with TI’s KeyStone multicore architecture, Texas Instruments White Paper, TX, USA, Oct., 2011, available online: http://www.ti.com/lit/wp/spry183/spry183.pdf. [31] Z. Han and K. Liu, Resource Allocation for Wireless Networks: Basics, Techniques, and Applications. Cambridge University Press, 2008. [32] I. S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. Academic Press, 2007. [33] G. George, R. K. Mungara, A. Lozano, and M. Haenggi, "Ergodic Spectral Efficiency in MIMO Cellular Networks", IEEE Trans. Wireless Commun., vol. 16, pp. 2835-2849, May 2017.
7cs.IT
arXiv:1211.7306v6 [math.AC] 23 Jun 2016 ON POLYNOMIALS WITH GIVEN HILBERT FUNCTION AND APPLICATIONS ALESSANDRA BERNARDI, JOACHIM JELISIEJEW, PEDRO MACIAS MARQUES, KRISTIAN RANESTAD Abstract. Using Macaulay’s correspondence we study the family of Artinian Gorenstein local algebras with fixed symmetric Hilbert function decomposition. As an application we give a new lower bound for cactus varieties of the third Veronese embedding. We discuss the case of cubic surfaces, where interesting phenomena occur. Introduction Macaulay established a correspondence between polynomials and Artinian local Gorenstein algebras. In particular, any polynomial is a dual socle generator of an Artinian local Gorenstein algebra. In this paper we interpret the Hilbert function of the algebra as a Hilbert function of the corresponding polynomial, and give a description of the set of polynomials with given symmetric Hilbert function decomposition, in a fixed polynomial ring. We consider polynomials f in a divided power ring S = Kdp [x1 , . . . , xn ], and a polynomial ring T = K[y1 , . . . , yn ] acting on S by contraction (see Section 0.1). The Artinian local Gorenstein algebra A associated to f ∈ S is the quotient T /f ⊥ where f ⊥ is the annihilator ideal of f . Thus Spec(T /f ⊥ ) ⊂ Spec(T ) is a local Gorenstein scheme supported at the origin of the affine space Spec(T ). The application we have in mind is that of apolarity and the dimension of cactus varieties of cubic forms. Cactus varieties are generalizations of secant varieties. Definition 1. Let X ⊂ PN be a projective variety. The r-th cactus variety Cactusr (X) of X is the closure of the union of the linear spaces spanned by length r subschemes on X. Here we abuse slightly the notation of variety, since the cactus variety is often a reducible n+3 algebraic set. We are interested in the case when X ≃ Pn is embedded into P( 3 )−1 by the third Veronese embedding. Consider, like above, a divided power ring S̄ = Kdp [x0 , . . . , xn ], and a polynomial ring T̄ = K[y0 , . . . , yn ] acting on S̄ by contraction. A cubic form F ∈ S̄3 up to multiplication by scalars is a point in P(S̄3 ). The pure cubes form a n-dimensional subvariety V3,n ⊂ P(S̄3 ). The least length of a subscheme Z ⊂ V3,n whose linear span contains F is called the cactus rank of F . The closure of the set of cubic forms with cactus rank r is the r-th cactus variety of V3,n , denoted Cactusr (V3,n ). Via the contraction action, T̄ is the natural homogeneous coordinate ring on P(S̄1 ), and a Z ⊂ V3,n contains F in its span, if and only if its homogeneous ideal IZ ⊂ T̄ is contained in F ⊥ . This classical fact is called the apolarity lemma and is the motivation for defining a subscheme Z ⊂ P(S̄1 ) apolar to F if IZ ⊂ F ⊥ . 2010 Mathematics Subject Classification. Primary 13H10, Secondary 14Q15, 14C05. Key words and phrases. cactus rank, Artinian Gorenstein local algebra. 1 2 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD We apply Macaulay’s correspondence to investigate local Gorenstein schemes that are apolar to F . Our main result is the following lower bound on the dimension of cactus varieties of cubic forms. Theorem 2 (Corollary 44). Let n ≥ 8 and 18 ≤ r ≤ 2n + 2 and let V3,n be the third Veronese embedding of Pn in PN , with N = n+3 3 . Then ( −1 if r ≥ 18 even, (rn + r − 1) + r(r−2)(r−16) 48 dim Cactusr (V3,n ) ≥ − 2 if r ≥ 19 odd. (rn + r − 1) + (r−1)(r−3)(r−17) 48 Hence, under these assumptions the r-th secant variety of V3,n is strictly contained in the r-th cactus variety of V3,n . S The r-th secant variety of V3,n is σr (V3,n ) = P1 ,...,Pr ∈V3,n hP1 , . . . , Pr i. The fact that the inclusion of σr (V3,n ) in Cactusr (V3,n ) is strict is a consequence of the inequality dim σr (V3,n ) ≤ rn + r − 1. The righ-hand side is the expected dimension of the secant variety, and it is an easy parameter count that gives an upper bound. The actual dimension of of the secant variety is known thanks to the Alexander and Hirschowitz Theorem [Alexander, Hirschowitz 1995]. For r ≥ 2n+2 the variety Cactusr (V3,n ) fills the ambient space, see [Bernardi, Ranestad 2012]. Observe that σr (V3,n ) = Cactusr (V3,n ), for r ≤ 13, see [Casnati, Notari 2011] for the cases r ≤ 11, and [Casnati, Jelisiejew, Notari 2015] for the remaining cases. The link between the Artinian local Gorenstein algebras and apolar schemes to a homogeneous form F ∈ S̄ is provided by the fact that if f = F (1, x1 , . . . , xn ), then Spec(K[y1 , . . . , yn ]/f ⊥ ) ⊂ P(S̄1 ) is a local scheme supported at [1 : 0 : · · · : 0] that is apolar to F . We define Definition 3. The minimal length of a local apolar scheme to F is called the local cactus rank of F . That link is strengthened by the following result, where we call the sum of the homogeneous terms of a polynomial g of degree at most d the degree-d tail of g. Proposition 4. Let F be a homogeneous polynomial of degree d, and let f = F (1, x1 , . . . , xn ). Let Γ be a zero-dimensional scheme of minimal length among local schemes supported at [l] = [1 : 0 : · · · : 0] that are apolar to F . Then Γ is the affine apolar scheme of a polynomial g whose degree-d tail equals f . A particularly important problem is to find the cactus rank of a general form in S̄d , i.e. the minimal r such that Cactusr (Vd,n ) = P(S̄d ). Our results do not improve previous known bounds, so this remains a major open problem in this theory. We refer the interested reader to [Iarrobino, Kanev 1999], [Bernardi, Ranestad 2012], [Buczyńska, Buczyński 2014], and [Bernardi, Brachat, Mourrain 2014]. Now, the first step in order to be able to compute the cactus rank, is to describe the structure of minimal apolar schemes. If we start by considering a minimal zero-dimensional scheme Γ apolar to a form F and decompose it as Γ = Γ1 ∪ · · · ∪ Γk , where each Γi is a scheme supported on one point, then we take the corresponding decomposition F = F1 + · · · + Fk , where Γi is a minimal local scheme apolar to Fi for i = 1, . . . , k. According to Proposition 4, one would like to find invariants for local apolar Gorenstein schemes, parameterizing the degreed tails of all polynomials that define a scheme with given invariant. Iarrobino’s analysis 3 ([Iarrobino 1994]), that we recall in the first section, provides one such discrete invariant: the symmetric Hilbert function decomposition. Then, if one wants to estimate the dimension of the sets of polynomials with the same local cactus rank, one needs to understand the structure of the polynomials with the same symmetric Hilbert function decomposition. This is what we do in Section 2 by the use of standard and exotic forms, that explain the unlucky behavior that the number of variables involved in each homogeneous summand of a given polynomial f may be larger than what is expected from the Hilbert function and its symmetric decomposition. Motivated by this, we describe the family Ffm of polynomials g whose linear partials and Hilbert function coincide with those of f , and such that g − f is part of an exotic summand for g. In Proposition 21 we show that the polynomials in Ffm define isomorphic apolar algebras and compute in Corollary 23 its dimension. In Proposition 24 we give a decomposition of any polynomial as a sum of a polynomial in standard form and an exotic summand. In Section 3 we focus on the local cactus rank by proving Proposition 4 and computing the local cactus rank of a general cubic surface. Finally in Section 4 we use this description in order to estimate the dimension of the set of all the polynomials with the same symmetric Hilbert function decomposition, which allows us to estimate the dimension of the Cactus variety. In particular, we prove our lower bound for this dimension in Corollary 44. 0.1. Notations. For main applications we consider homogeneous forms in S̄ = Kdp [x0 , . . . , xn ] and their dehomogenization in S = Kdp [x1 , . . . , xn ]: πx0 : S̄ → S; F (x0 , x1 , ..., xn ) 7→ F (1, x1 , ..., xn ). We consider the action of the polynomial ring T̄ := K[y0 , . . . , yn ] on S̄ by contraction: if α = (α0 , . . . , αn ) and β = (β0 , . . . , βn ) are multi-indices, then (  xβ−α if β ≥ α, α β y x = 0 otherwise. Similarly, we consider the action of the polynomial ring T := K[y1 , . . . , yn ] on S: T × S → S; α (ψ, f ) 7→ ψ(f ) β defined by this contraction restricted to y , x , when α0 = β0 = 0. Note that we are using the same notation for ordinary powers in T and divided powers in S, unlike what is usually done in the literature (for properties of divided power rings see for instance [Iarrobino, Kanev 1999, Appendix A], where the divided power xβ would be written as x[β] ). In characteristic 0 we could have used ordinary differentiation, and therefore, by abuse of language, we call ψ(f ) ∈ S a partial of a polynomial f ∈ S for any ψ ∈ T . 1. Preliminaries We begin this section by presenting the Macaulay correspondence between polynomials and Artinian Gorenstein local rings, which is the starting point of our theory. 1.1. Macaulay correspondence. Let K be an algebraically closed field of characteristic other than 2, 3 and consider the divided power ring S := Kdp [x1 , . . . , xn ]. Consider the action of the polynomial ring T := K[y1 , . . . , yn ] on S defined in Subsection 0.1. Let S1 and T1 be the degree-one parts of S and T respectively. With respect to the action above (classically known as apolarity), S1 and T1 are natural dual spaces and hx1 , . . . , xn i and hy1 , . . . , yn i are dual bases. The annihilator of a polynomial f of degree d is an ideal in T which we denote by f ⊥ ⊂ T . The quotient Tf := T /f ⊥ is a local Artinian Gorenstein ring (see 4 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD e.g. [Iarrobino, Kanev 1999, Lemma 2.14]). In fact, Tf is finitely generated as a K-module so it is Artinian. The image of T1 in Tf generates the unique maximal ideal m, so Tf is local. Furthermore Tf has a 1-dimensional socle, the annihilator of the maximal ideal, namely md , so Tf is Gorenstein. In addition, if f is a form, f ⊥ is a homogeneous ideal and therefore Tf is an Artinian Gorenstein graded local ring. 1.2. Symmetric decomposition of the Hilbert function of a polynomial. We consider now a polynomial f ∈ S = Kdp [x1 , . . . , xn ] and let f ⊥ ⊂ T = K[y1 , . . . , yn ] be its annihilator with respect to contraction. We shall interpret a Hilbert function for the local Artinian Gorenstein quotient Tf = T /f ⊥ in terms of a filtration of the space of partials of the polynomial f . In particular we recall and interpret Iarrobino’s analysis of Hilbert functions on associated graded algebras of Tf and their symmetric decomposition. We will apply this analysis in the next section to characterize the polynomials with a given Hilbert function. The local Artinian Gorenstein quotient ring Tf = T /f ⊥ is naturally isomorphic to Diff(f ) = {ψ(f ) | ψ ∈ T } the space of all partials of f , as a T -module. Following [Iarrobino 1994], we consider Hilbert functions on graded rings associated to two filtrations of Tf . Let m be the maximal ideal of Tf . The m-adic filtration Tf = m0 ⊃ m ⊃ m2 ⊃ · · · ⊃ md ⊃ md+1 = 0 where d = deg f , defines an associated graded ring Tf∗ = ⊕di=0 mi /mi+1 whose Hilbert function we denote by Hf . The Löewy filtration Tf = (0 : md+1 ) ⊃ (0 : md ) ⊃ · · · ⊃ (0 : m2 ) ⊃ (0 : m) ⊃ 0 induces the following sequence of ideals of Tf∗ : For each a = 0, 1, 2, . . . let   d−a d+1−a−i Ca = ⊕d−a ) ∩ mi / (0 : md+1−a−i ) ∩ mi+1 ⊂ Tf∗ , i=0 Ca,i = ⊕i=0 (0 : m and consider the Tf∗ -modules Qa = Ca /Ca+1 , a = 0, 1, 2, . . . and their respective Hilbert functions  ∆Q,a = H Qa . Each Qa decomposes as a sum Qa = ⊕di=0 Qa,i , where Qa,i = Ca,i /Ca+1,i . We can check from the definitions that for d ≥ 2 and any a > d − 2, we have Ca = Qa = 0. The following is an important result on the structure of these modules. Proposition 5. [Iarrobino 1994, Theorem 1.5] The Tf∗ -modules Qa , a = 0, 1, 2, . . . , satisfy the following reflexivity condition ∼ Q∨ a,i = Qa,d−a−i .  In particular, the Hilbert function ∆Q,a = H Qa is symmetric about (d − a)/2, and thus the Hilbert function H(Tf∗ ) of Tf∗ has a symmetric decomposition X H(Tf∗ ) = ∆Q,a . a The possible symmetric decompositions of the Hilbert function is restricted by the fact that the partial sums of the symmetric decomposition are Hilbert functions of suitable quotients of Tf∗ . 5 Corollary 6. [Iarrobino 1994, Section 5B, p. 69] The Hilbert function of Tf∗ /Cα+1 satisfies H(Tf∗ /Cα+1 ) = α X ∆Q,a . a=0 In particular every partial sum degree 1. Pα ∆Q,a is the Hilbert function of a K-algebra generated in a=0 Iarrobino has listed all possible symmetric decompositions of Hilbert functions of rings Tf∗ with dim Tf∗ ≤ 16, see [Iarrobino 1994, Section 5]. We now interpret the ideal Ca and the module Qa in terms of the space Diff(f ) of partials of f . This interpretation depends on the isomorphism τ : T /f ⊥ → Diff(f ), ψ 7→ ψ(f ), of T -modules and thus K-vector spaces. Let Diff(f )i be the subspace of Diff(f ) of partials of degree at most i. The image of (0 : mi ) under the map τ is precisely Diff(f )i−1 , so the Löewy filtration (0 : m) ⊂ (0 : m2 ) ⊂ (0 : m3 ) ⊂ · · · ⊂ (0 : md ) ⊂ (0 : md+1 ) = Tf of Tf is mapped to the degree filtration K = Diff(f )0 ⊂ Diff(f )1 ⊂ Diff(f )2 ⊂ · · · ⊂ Diff(f )d = Diff(f ) of Diff(f ). Now (0 : mi )/(0 : mi−1 ) ∼ = (mi−1 /mi )∨ , so the integral function Hf (0) = 1, Hf (i) = dimK Diff(f )i − dimK Diff(f )i−1 , coincides with the Hilbert function of i = 1, . . . , d, Tf∗ : Hf (i) = H(Tf∗ )(i). On the other hand, the m-adic filtration Tf ⊃ m ⊃ m2 ⊃ · · · ⊃ md ⊃ md+1 = 0 corresponds to an order filtration on Diff(f ). We call the order of ψ ∈ T the smallest degree of a non-zero homogeneous term of ψ, and denote it by ord(ψ). We call the order of a partial f ′ of f the largest order of a ψ ∈ T such that f ′ = ψ(f ). Thus the image τ (mi ) ⊆ Diff(f )d−i is simply the space of partials of order at least i of f . ∨ ∼ The isomorphism Q∨ a,i = Qa,d−a−i allows us to interpret the vector space Qa,i as parameterizing partials of f of degree i and order d − a − i, modulo partials of lower degree and larger order. More precisely, let Diff(f )ai ⊂ Diff(f ) be the subspace of partials of degree at most i and order at least d − i − a, then  Q∨ ∼ = Diff(f )a / Diff(f )a + Diff(f )a−1 . a,i i i−1 i So   a−1 a a ) . ∆f,a (i) = dimK Q∨ a,i = dimK Diff(f )i /(Diff(f )i−1 + Diff(f )i P Notation 7. We denote by ∆f the symmetric decomposition Hf = a ∆f,a of the Hilbert function Hf . (1) 6 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD Consider the space of linear forms that are partials of f , Lin(f ) := Diff(f )1 ∩ S1 , and the linear subspaces Lin(f )a = {l ∈ S1 | l is a partial of f of order at least d − a − 1} = Diff(f )a1 ∩ S1 . We easily see that for each a ≥ 0, we have an isomorphism Lin(f )a ≃ Diff(f )a1 /Diff(f )0 , so ∆f,a (1) = dimK Lin(f )a − dimK Lin(f )a−1 . We obtain a canonical flag of subspaces of S1 : Lin(f )0 ⊆ Lin(f )1 ⊆ · · · ⊆ Lin(f )d−2 = Lin(f ) ⊆ S1 . Example 8. Let f = x13 x2 + x33 + x42 . Its space of partials is generated by the elements in the following table, where the generators of each Q∨ a are arranged by degree; next to it, we have the symmetric decomposition of its Hilbert function: Generators of the space of partials degree 0 1 ∨ Q0 1 x1 , x2 ∨ Q1 x3 Q∨ x4 2 2 x1 x2 x32 x12 , x13 , 3 x12 x2 Hilbert function decomposition 4 f degree ∆f,0 ∆f,1 ∆f,2 Hf = = = = 0 1 0 0 1 1 2 1 1 4 2 2 1 0 3 3 2 0 0 2 4 1 0 0 1 For instance x32 is a partial of order 1, since it is obtained as y3 (f ) = x32 and cannot be attained 0 by a higher order element of T , so it is a generator of Q∨ 1,2 . Here we have Lin(f ) = hx1 , x2 i, 1 2 Lin(f ) = hx1 , x2 , x3 i, and Lin(f ) = hx1 , x2 , x3 , x4 i. In the next section we shall enumerate polynomials f with a given Hilbert function Hf using this symmetric decomposition ∆f . For this purpose we denote a Hilbert function H by its values  H = H(0), H(1), . . . , H(d) and the decomposition ∆f , X H= ∆a , a by its summands ∆ = (∆0 , . . . , ∆d−2 ), where each ∆a is symmetric around (d − a)/2, i.e. ∆a (i) = ∆a (d − a − i). By Corollary 6, both H and each partial sum α X ∆≤α = ∆a a=0 are Hilbert functions of K-algebras generated in degree 1, so there are some immediate restrictions on these functions. First, Hilbert functions H and ∆≤α have positive values and satisfy the Macaulay growth condition (cf. [Macaulay 1927]): If the i-binomial expansion of ∆≤α (i) is       mj mi−1 mi ; mi > mi−1 > · · · > mj ≥ j ≥ 1, + ··· + + ∆≤α (i) = j i−1 i then       mi + 1 mi−1 + 1 mj + 1 (2) ∆≤α (i + 1) ≤ + + ···+ . i+1 i j+1 7 Example 9. For H(1) = 8, H(2) ≥ 5 and 1 + H(1)P+ · · · + H(d − 1) + 1 = 17 the possible Hilbert functions H and their decompositions H = i ∆i that satisfy the Macaulay growth conditions are the following: H ∆0 ∆1 = = = 1 8 1 7 0 1 H ∆0 ∆1 ∆2 7 1 7 1 , 0 H ∆0 ∆1 ∆2 = = = = 1 1 0 0 8 2 2 4 = = = = 5 3 2 0 1 1 0 0 8 1 5 2 6 1 1 1 5 0 0 2 1 2 1 , 0 H ∆0 ∆1 ∆2 1 1 = = = = , 1 1 0 0 H ∆0 ∆1 ∆2 ∆3 = = = = = 8 2 3 3 5 2 2 2 3 0 0 1 1 0 0 0 8 1 0 4 3 1 1 5 1 0 4 0 1 1 0 0 1 1 1 1 0 . 2. Standard forms and exotic forms At this point of the analysis we would like to find a precise description of all the polynomials having the same symmetric Hilbert function decomposition. To this purpose we have firstly to deal with the fact that the number of variables involved in each homogeneous summand of a given polynomial f may be larger than what is expected from the Hilbert function. This will be explained by the appearance of what we will call exotic summands of f . We will analyze their role in a description of all polynomials that have a given Hilbert function. Let us start with some examples clarifying the kind of phenomena that we have to treat. 2.1. Standard and “ Exotic ” examples. Let A be a local Artinian Gorenstein algebra. As explained before it can be represented as a quotient A ≃ T /I where I = f ⊥ for a polynomial f ∈ S. If the ideal I is fixed, then f is unique up to action by a unit of T , but clearly the choice of I such that A ≃ T /I is not unique. In this section we wish to shed some light on how this choice can be made. Example 10. Consider the ring A = K[ε]/(ε4 ) and polynomials g = x13 and h = x13 + x1 x2 in Kdp [x1 , x2 ]. Then K[y1 , y2 ] K[y1 , y2 ] , = A≃ (y14 , y2 ) g⊥ but also K[y1 , y2 ] K[y1 , y2 ] . = A≃ 4 2 (y1 , y2 − y1 ) h⊥ Note that both x1 and x2 occur in h, but while x1 is a partial of this polynomial, x2 is not, since its space of partials is Diff(h) = hh, x12 + x2 , x1 , 1i. Now consider the ring B = K[y1 , y2 ]/(y14 − y22 , y1 y2 ) and polynomials p = x14 + x22 and q = x14 + x12 x2 in Kdp [x1 , x2 ]. Then B= and K[y1 , y2 ] , p⊥ K[y1 , y2 ] K[y1 , y2 ] . = (y13 − y1 y2 , y22 ) q⊥ In this case, x2 is an order-one partial of both p and q, since y2 (p) = x2 and (−y2 + y12 )(q) = x2 . However, x2 occurs in q in degree 3, which may be surprising for a linear form that is a partial of order one. B≃ 8 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD As we will see in the remainder of this section, the most common behaviour is the one we can observe in Example 8: both x1 and x2 are partials of order 3 and they occur in f4 ; x3 and x4 are partials of orders 2 and 1, and they occur in f3 and f2 , respectively. 2.2. Description of the standard and the “ exotic ” phenomena. Referring the notation of Example 10, we want to distinguish polynomials like g and p that have a “standard” behavior from the ones like h and q where either one finds a variable that does not occur in the partials or a partial whose order does not “match” with the degree of the corresponding variable. To this end, in Definition 11 we will define standard forms of polynomials. Intuitively, they correspond to minimal embeddings of algebras, in terms of variables appearing in the related polynomials f . Let f ∈ S and A = T /f ⊥ . Moreover let (3) f = fd + fd−1 + · · · + f0 be the decomposition in homogeneous summands. In Section 1 we defined the Hilbert function of A and its symmetric decomposition ∆. In particular, we saw that ∆a (1) = dimK (Lin(f )a / Lin(f )a−1 ), which is space of linear partials of f of order exactly d − a − 1. Let ni = i X ∆j (1) = dimK Lin(f )i , j=0 i.e. the dimension of the space of linear partials of f of order at least d − i − 1. By degree reasons this space is contained in the space of linear partials of fd−i + fd−i−1 + · · · + fd . But, as we have seen in Example 10, a linear form may occur in fd−i and be a partial of f of order less than d − i − 1 or not be a partial of f at all. First of all let us fix here a basis of linear forms x1 , . . . , xn in S1 that agrees with the filtration by Lin(f )i : (4) Lin(f )0 = hx1 , . . . , xn0 i ⊆ Lin(f )1 = hx1 , . . . , xn1 i ⊆ · · · · · · ⊆ Lin(f )d−2 = hx1 , . . . , xnd−2 i ⊆ S1 = hx1 , . . . , xn i. Definition 11. Let f ∈ S be a polynomial with homogeneous decomposition f = fd + · · · + f0 . Let ∆ be the symmetric decomposition of the Hilbert function of T /f ⊥ . We say that f ∈ S is in standard form if   fd−i ∈ Kdp Lin(f )i = Kdp [x1 , . . . , xni ] , for all i, where x1 , . . . , xn is any choice of basis for S1 as in (4). We define the linear space of standard forms.       StandardForms = f ∈ P≤d | ∀i fd−i ∈ Kdp Lin(f )i = f ∈ P≤d | ∀i fi ∈ Kdp Lin(f )d−i . A first important property of standard forms is the following: Proposition 12. The leading summand of a partial of f of degree d − i and order j lies in Kdp [Lin(f )i−j ]. Proof. Let g be the leading summand of a partial of f of degree d − i and order j, then any partial x of degree one of g is a partial of order at least d − i + j − 1 of f and therefore lies in Lin(f )i−j . Therefore g ∈ Kdp [Lin(f )i−j ].  There may be variables appearing in f that do not show up in the leading summands of partials of f . It is tempting to call them exotic variables, but we reserve exotic for the non-standard part of f . 9 Definition 13. Let f = fd + · · · + f0 ∈ S be the homogeneous decomposition of f , and choose a basis for S1 as in (4). The exotic summand of degree d − i of f is the form fd−i,∞ ∈ hxni +1 , . . . , xn iKdp [x1 , . . . , xn ] such that the degree d − i homogeneous summand of f can be written as fd−i = fd−i,i + fd−i,∞ , with fd−i,i ∈ Kdp [x1 , . . . , xni ]. Thus f is in standard form if and only if all its exotic summands are zero. Example 14. Let us see how the above definitions work in the cases of Example 10. We have HA = (1, 1, 1, 1) and ∆0 = (1, 1, 1, 1), ∆i = 0 for i > 0. Therefore ni = 1 for all i. Now we have g = x13 ∈ Kdp [x1 ] so that x13 is in standard form. On the other hand, x1 x2 ∈ / Kdp [x1 ] so that h = x13 + x1 x2 is not in standard form. In fact x1 x2 is an exotic summand for h. For the ring B, we get HB = (1, 2, 1, 1, 1), with symmetric decomposition ∆0 = (1, 1, 1, 1, 1), ∆1 = (0, 0, 0, 0, 0), ∆2 = (0, 1, 0, 0, 0), ∆i = 0 for i > 2. Therefore n0 = n1 = 1, and ni = 2 for all i ≥ 2. As above we can check that p is in standard form, but q is not, having x12 x2 as an exotic summand. 2.3. Existence of standard forms and their presentation. Let A = T /f ⊥ be an Artinian Gorenstein algebra. One could ask: (1) if there exists a presentation A ≃ T /g ⊥ with g in standard form. (2) in case such a presentation exists, whether there are any relations between g and f . Fortunately, these questions have quite satisfactory answers, as we explain below. We need some notation. Notation 15. Let T̂ denote the power series ring obtained by completing T at the ideal of the origin. In coordinates, T̂ := K[[y1 , . . . , yn ]]. We may interpret S as subset of functionals on T̂ via the pairing defined by ( 1 if α = β α β y ,x = 0 otherwise. Note that (5) hσ, f i = h1, σ(f )i , as seen by decomposing σ and f into monomials. In particular if σ(f ) = 0, then hσ, f i = 0. Let ϕ : T̂ → T̂ be an automorphism of T̂ . It induces a dual map ϕ∨ : S → S defined by the condition (6) hϕ(σ), f i = hσ, ϕ∨ (f )i , for all σ ∈ T, f ∈ P. Let I be a finite colength ideal of T supported at the origin. Then T /I = T̂ /I. Clearly, the ⊥ quotients T̂ /I and T̂ /ϕ(I) are isomorphic. Moreover if I = f ⊥ , then ϕ(I) = (ϕ−1 )∨ (f ) . The fundamental result is that for every f we may find ϕ so that ϕ∨ (f ) is in standard form. It fact we prove that ϕ may be chosen “ with no linear part ”. We now make this precise. 10 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD Definition 16. Let M be the unique maximal ideal of T̂ . Let ϕ : T̂ → T̂ be an automorphism. We say that ϕ is of order (at least) two if ϕ(yi ) = yi mod (y1 , . . . , yn )2 for all i. Remark 17. Every automorphism of T̂ induces a linear action on M/M 2 . The order two automorphisms are precisely those which act trivially. Thus they form a normal subgroup. In particular an inverse of an order two automorphism is also of order two. Theorem 18 (Existence of standard forms). Let f ∈ S be a polynomial with symmetric Hilbert function decomposition ∆. Then there is an automorphism ϕ : T̂ → T̂ such that ϕ∨ (f ) is in standard form. Consequently, f = ψ ∨ (g) for an element g ∈ StandardForms and an automorphism ψ = ϕ−1 . Moreover one can choose ϕ and ψ of order two. Proof. For the existence of ϕ see [Iarrobino 1994, Theorem 5.3AB]. Take one such ϕ. We will compose ϕ with a linear P map to obtain the required order two automorphism. We have ϕ(yi ) = λij yj + si , where si ∈ (y1 , . . . , yn )2 . Let τ be the linear automorphism P of T̂ defined by τ (yi ) = λij yj . Then (ϕ ◦ τ −1 )(yi ) ≡ yi mod M 2 so ϕ ◦ τ −1 is an automorphism of order two. Let g = ϕ∨ (f ). By definition g is in standard form. Since τ is a linear automorphism of T̂ , the map (τ −1 )∨ is simply a linear transformation of S, i.e. a change of variables. The definition of being in standard form is coordinate free, so that (τ −1 )∨ preserves being in standard form. In particular h = (τ −1 )∨ (g) is in standard form. But h = (ϕ ◦ τ −1 )∨ (f ), so that ϕ ◦ τ −1 is a required automorphism of order two.  It is also important and interesting to see an explicit description of the action ϕ∨ : S → S α β of an automorphism ϕ : T̂ Q → T̂ . For  this, recall that S is a divided power ring: x · x = α+β α+β αi +βi α+β , where α = . α x αi Proposition 19. Let ϕ : T̂ → T̂ be an automorphism. Let Di = ϕ(yi ) − yi ∈ T̂ . For a multi-index α denote Dα = D1α1 · · · Dnαn . Let f ∈ S. Then ∨ ϕ (f ) = X α∈Nn 0 n X   xi · Di (f ) + · · · . x · D (f ) = f + α α i=1 Proof. See [Jelisiejew 2015, Proposition 1.8].  Example 20. Let us illustrate Theorem 18 in the setup of Example 14. We should find an f in standard form and an automorphism ϕ of K[y1 , y2 ] such that ϕ∨ (f ) = h = x13 + x1 x2 . We see that the linear partials of h are spanned by x1 , so if we wish ϕ to  Pbe of order at least two, we must have f ∈ Kdp [x1 ]. According to Proposition 19, ϕ∨ (f ) = α∈Nn xα · Dα (f ) , 0 for some elements of order at least two D1 , D2 ∈ K[[y1 , y2 ]]. Since f must have degree three, (Di Dj )(f ) = 0, for any i and j, so x13 + x1 x2 = f + x1 D1 (f ) + x2 D2 (f ). This implies that D1 (f ) = 0 and D2 (f ) = x1 , so we must have D1 = 0 mod (y1 , y2 )4 and D2 = y12 mod (y1 , y2 )4 . Therefore we can choose ϕ : T̂ → T̂ to be the automorphism defined by ϕ(y1 ) = y1 and ϕ(y2 ) = y2 + y12 . 11 2.4. Description of exotic summands. For parameterization purposes and dimension counts, it is interesting to consider families of polynomials yielding isomorphic algebras, or at least sharing the same Hilbert and symmetric decomposition. Given a polynomial f ∈ Kdp [x1 , . . . , xk ] such that Lin(f ) = hx1 , . . . , xk i, we consider the family  Ffm := g ∈ Kdp [x1 , . . . , xk+m ] | g − f ∈ (xk+1 , . . . , xk+m ), (7) Hg = Hf , Lin(g) = Lin(f ) = hx1 , . . . , xk i . The next result gives a characterisation of the elements in this family. We will use the notation ls(f ) for the leading summand of a polynomial f , i.e. if f = fd + · · · + f0 is its decomposition into homogeneous summands, ls(f ) = fd . Proposition 21. Let f ∈ Kdp [x1 , . . . , xk ] and assume Lin(f ) = hx1 , . . . , xk i. Let g ∈ Kdp [x1 , . . . , xk+m ] be any polynomial. Then g ∈ Ffm if and only if there are elements φ1 , . . . , φm ∈ K[y1 , . . . , yk ] of order at least two such that X  i1 im (8) g= xk+1 · · · xk+m · φ1i1 · · · φmim (f ). i1 ,...,im ≥0 In particular, for each g ∈ Ffm , the algebras K[y1 , . . . , yk+m ]/g ⊥ and K[y1 , . . . , yk ]/f ⊥ are isomorphic. Proof. Let l be the dimension of Diff(f ) and choose a basis h1 , . . . , hl for this vector space such that ls(h1 ), . . . , ls(hl ) are linearly independent. Choose elements ψ1 , . . . , ψl ∈ K[y1 , . . . , yk ] such that for each i, ψi (f ) = hi . Let g ∈ Ffm and write g = f + xk+1 g1 + · · · + xk+m gm in such a way that for each j, we have gj ∈ Kdp [x1 , . . . , xk+j ]. Then for each i, ψi (g) = ψi (f ) + xk+1 ψi (g1 ) + · · · + xk+m ψi (gm ).  Now Proposition 12 tells us that ls ψi (g) ∈ Kdp [x1 , . . . , xk ] and since ψi (f ) cannot be cancelled by the terms in xk+1 ψi (g1 ) + · · · + xk+m ψi (gm ), we must have   ls ψi (g) = ls ψi (f ) = ls(hi ). But this implies that ψ1 (g), . . . , ψl (g) form a linearly independent set, and since the dimension of Diff(g) is also l (since g and f yield algebras with the same Hilbert function), we get Diff(g) = hψ1 (g), . . . , ψl (g)i. In addition, we know that the variables xk+1 , . . . , xk+m cannot occur in the leading summand of g, also by Proposition 12, so the polynomials g1 , . . . , gm have degree at most d − 2. Now yk+m (g) = gm , so gm is a partial of g, which means that there is some φm ∈ hψ1 , . . . , ψl i such d+1 that gm = φm (g). Moreover φm has order at least one, because deg gm ≤ d − 2, so φm (g) = 0. Denote ĝj = xk+1 g1 + · · · + xk+j gj , and observe that yk+s (ĝj ) = gs , if s ≤ j, and yk+s (ĝj ) = 0, otherwise. So, g = f + ĝm−1 + xk+m · φm (g)  = f + ĝm−1 + xk+m · φm f + ĝm−1 + xk+m · φm (g) 2 2 = f + ĝm−1 + xk+m · φm (f + ĝm−1 ) + xk+m · φm (g) 12 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD and iterating this further we get X i i g= xk+m · φm (f + ĝm−1 ). i≥0 Applying yk+m−1 to both sides of this equality, we get X  X i i i i yk+m−1 (f + ĝm−1 ) = yk+m−1 (g) = xk+m · φm (gm−1 ). xk+m · φm i≥0 i≥0 i i Again there must be some φm−1 ∈ hψ1 , . . . , ψl i such that i≥0 xk+m · φm (gm−1 ) = φm−1 (g). So, X i i g= xk+m · φm (f + ĝm−2 + xk+m−1 gm−1 ) P i≥0 = X i i xk+m · φm (f + ĝm−2 ) + xk+m−1 i≥0 = X X i i xk+m · φm (gm−1 ) i≥0 i xk+m · i φm (f + ĝm−2 ) + xk+m−1 · φm−1 (g). i≥0 Iterating we get g= X i i im m−1 m−1 im xk+m xk+m−1 · φm−1 (f + ĝm−2 ). φm im−1 ,im ≥0 Applying the remaining operators yk+m−2 , . . . , yk+1 the same way, we obtain (8). It remains to show that φ1 , . . . , φm have order at least two. Without loss of generality, suppose that φ1 has order one, and write φ1 = φ′ + φ′′ , where φ′ ∈ hy1 , . . . , yk i and ord φ′′ ≥ 2. Let t ∈ hx1 , . . . , xk i be such that φ′ (t) = 1. Since t is a partial of f , there exists η ∈ K[y1 , . . . , yk ] such that η(f ) = t. Note that (φu η)(f ) = φu (t) is a constant, for all u > 1. So X X i1 im η(g) = xk+1 · · · xk+m · φ1i1 · · · φmim η(f ) = t + xk+1 + xk+u φu (t), i1 ,...,im ≥0 u>1 and therefore η(g) is a partial of g of degree one that does not belong to h1, x1 , . . . , xk i, a contradiction. For the converse, suppose that g admits a presentation as in (8). Then clearly we have g − f ∈ (xk+1 , . . . , xk+m ). Let ϕ be the automorphism of K[y1 , . . . , yk+m ] defined by ϕ(yi ) = yi for 1 ≤ i ≤ k and ϕ(yk+i ) = yk+i + φi , for 1 ≤ i ≤ m. Then by Proposition 19, we see that g = ϕ∨ (f ). So ϕ induces an isomorphism between K[y1 , . . . , yk+m ]/g ⊥ and K[y1 , . . . , yk ]/f ⊥ , which proves the last statement, and shows that Hg = Hf . Finally, if t ∈ Lin(f ) and we take η ∈ K[y1 , . . . , yk ] such that η(f ) = t, we may apply η to both sides of (8) to get η(g) = t. So Lin(g) ⊆ Lin(f ) and since they have the same dimension, equality must hold, and g ∈ Ffm .  Remark 22. We can get an alternative proof of Proposition 21 if we take g ∈ Ffm and use Proposition 12 to see that since the linear partials of g lie in hx1 , . . . , xk i, the leading terms of partials of g only involve these variables, like we did in the proof. Now if we denote (g ⊥ )∗ the ideal generated by the initial forms of elements of g ⊥ , we know that (g ⊥ )∗ is the annihilator of the set of leading summands of all partials of g (see a discussion on this at the beginning of Section 2 in [Casnati, Notari 2013], but also Proposition 3 in [Emsalem 1978]). Therefore for each j > k, yj ∈ (g ⊥ )∗ , which means that there is an element Dj ∈ T of order at least two such that yj − Dj ∈ g ⊥ . If a variable yj1 occurs in a Dj2 , with j1 , j2 > k then we may replace yj1 by Dj1 in Dj2 . Each time we do this, the minimal degree of yj1 in Dj2 grows. When this degree exceeds deg g, we may discard the remaining part, so the process eventually ends 13 and we may assume that each Dj ∈ k[y1 , . . . , yk ]. We can then consider the automorphism ϕ : T̂ → T̂ which sends yj to itself for j ≤ k and yj to yj − Dj for j > k. We can now show that ϕ∨ (g) = f by showing that for any element φ ∈ T , φ, ϕ∨ (g) = hφ, f i. Note that in the definition of the family Ffm and the hypotheses of Proposition 21, the polynomial f need not be in standard form. This result gives us a way of adding exotic summands to a polynomial without changing the Hilbert function of the algebra it yields. It also gives us the following result: Corollary 23. Let f ∈ Kdp [x1 , . . . , xk ] ⊂ Kdp [x1 , . . . , xk+m ] be a polynomial of degree d and assume Lin(f ) = hx1 , . . . , xk i. Then the family Ffm ⊂ Kdp [x1 , . . . , xk+m ]≤d has dimension X dim Ffm = m · ∆f,a (i) a≥0 i≤d−a−2 The next result shows that all exotic summands may be obtained in a similar description. Proposition 24. Let f ∈ S be a polynomial of degree d and choose a basis x1 , . . . , xn for S1 that agrees with the filtration in (4). Then we can write f = fst + fex such that fst is in standard form and X  (9) fex = xα · Dα (fst ) . α>0 α1 =···=αn1 =0 where Dn1 +1 , . . . , Dn ∈ T have order at least two and (1) d − a ≤ deg Dk (fst ) ≤ d − 2, if Dk (fst ) 6= 0 and na−1 < k ≤ na , for any a ≥ 2; (2) deg Dk (fst ) ≤ d − 2, if k > nd−2 . Proof. Applying Theorem 18 and Proposition 19 to f , we know that there exists a polynomial g in standard form such that X (10) f = ϕ∨ (g) = xα · Dα (g), α∈Nn 0 with D1 , . . . , Dn ∈ T of order at least two. Claim. The basis x1 , . . . , xn also satisfies the filtration in (4) for the polynomial g. To see this, let t ∈ hx1 , . . . , xn i be a linear partial of g of order j, and η ∈ T an element of order j such that η(g) = t. If h , i : T × S is the usual pairing, using the rule in (6), we have   φ, ϕ−1 (η) (f ) = ϕ−1 (η) · φ, f = hϕ(φ), ti,  for any φ ∈ T . Since ϕ is of order at least two, this implies ϕ−1 (η) (f ) = t. We also know that ord ϕ−1 (η) = ord η, so t is also a linear partial of f of order j. So f and g have the same linear partials and those partials have the same order, which proves the claim. Now we wish to show that g can be replaced by a polynomial g ′ , also in standard form, so that we do not need the first operators D1 , . . . , Dn1 . We consider expression (10) , and we start by factoring the power of any variable, say x1α1 , and the power of the corresponding operator, D1α1 . Note that D1α1 obviously commutes with the remaining operators D2α2 · · · Dnαn . In order to move also the term x1α1 to the right side of D2α2 · · · Dnαn , we can apply the rule  xi φ(h) = φ(xi h) − φ(i) (h), for any φ ∈ T and h ∈ S, 14 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD ∂ φ. We obtain where φ(i) = ∂y i X α  (x2 2 · · · xnαn )x1α1 · (D2α2 · · · Dnαn )D1α1 (g) , f= α∈Nn 0 = X X (x2α2 · · · xnαn ) · i≥0 α2 ,...,αn = X α2 ,...,αn  (1) D2 − D2 D1  α2 · · · Dn − Dn(1) D1  (x2α2 · · · xnαn ) · (D2′ ) α2 · · · (Dn′ ) αn (g ′ ),  αn   x1i · D1i (g) , P (1) where g ′ = i≥0 x1α1 · D1α1 (g) and Di′ = Di − Di D1 . The equality between the first and the second lines can be checked by hand in a straightforward, even if cumbersome, computation. (1) Observe that in this way we get an extra piece Di , but this does not change the fact that the ′ ′ new elements D1 , . . . , Dn have order at least two. Repeating this procedure, we can rewrite X X   xα · (D′′ )α (g) , xα · D′′α (g ′′ ) , where g ′′ = f= α∈Nn 0 α1 =···=αn1 =0 n α∈N0 1 with some modified D1′′ , . . . , Dn′′ ∈ T of order at least two. Since any terms of f and any terms of g involving only the variables x1 , . . . , xn1 are not exotic (because the choice of basis x1 , . . . , xn agrees with the filtration in (4) for both f and g) we have that g ′′ is in standard form. Now we know that for any k > n1 , Dk′′ (g ′′ ) is a partial of degree at most d − 2, otherwise xk would occur in the leading summand of f , and all such linear partials belong to hx1 , . . . , xn0 i. Finally, suppose that for some k we have na−1 < k ≤ na but deg Dk′′ (g ′′ ) < d − a. Then the term xk Dk′′ (g ′′ ) has degree at most d − a and belongs to Kdp [x1 , . . . , xna ], so it is not part of an 2 d−1 ′′ (g ) have lower degree so are also not exotic summand. The terms xk2 Dk′′ (g ′′ ), . . . , xkd−1 Dk′′ part of exotic summands. Therefore we can perform another modification as above, with the variable xk and the corresponding operator Dk′′ . Doing this for every such k, we may replace g ′′ by some g ′′′ also in standard form, and f will be written as in (9), with fst = g ′′′ .  Example 25. Let f be a polynomial of degree five such that Hf = (1, 1, 1, 1, 1, 1); this is the minimal possible Hilbert function. Then Hf is symmetric, so that the only possible symmetric decomposition is ∆f,0 = Hf = (1, 1, 1, 1, 1, 1) and all other ∆f,i equal to zero vectors. By Theorem 18 we see that f = ϕ∨ (g), where g is in standard form and ϕ is of order at least two. We have ∆g,i = ∆f,i for all i, so dimK Lin(g)i = 1 for all i. Choose a generator x for this space. Let g = g5 + · · · + g0 be the decomposition into homogeneous summands. From the definition of standard form we see that gi ∈ K[x] for all i, i.e. g ∈ K[x]. So we may write g = a5 x5 + a4 x4 + · · · + a0 for constants ai . Since g has degree five, we have a5 6= 0 and by changing x we Pmay assume that a5 = 1. Now f = α∈Nn xα · Dα (g) , where Di = ϕ(yi ) − yi ∈ M 2 . Then Di Dj Dk (g) = 0 for all 0 P P i, j, k and the sum becomes shorter: f = g + i xi · Di (g) + i,j xi xj · Di Dj (g). We see that  deg Di (g) ≤ 3 so that f = x5 + n X i=1 λi xi · x3 + n X i=1 µi xi x2 + X λi λj xi xj x + Q, i,j where λi , µi are constants and Q is a polynomial of degree at most two, partially depending on λi and µi . What is the dimension of possible f obtained this way? Each Di may be chosen as an element of the square of the maximal ideal of T /(x5 )⊥ , therefore we have (5−2)-dimensional 15 choice. Together with the choice of x, we obtain at most a 4(dim Spec(T )) = 4n-dimensional family. 3. Apolarity and local cactus rank We shall now apply our analysis of Hilbert functions of polynomials to apolar subschemes of a homogeneous form. Recall from 0.1 that we denote by S̄ = Kdp [x0 , . . . , xn ] and T̄ = K[y0 , . . . , yn ]. Definition 26. A subscheme Z ⊂ P(S̄1 ) is apolar to a form F ∈ S̄ if its homogeneous ideal IZ ⊂ T̄ is contained in F ⊥ . Apolarity for a subscheme Z ⊂ P(S̄1 ) to a form F of degree d may be given the following natural interpretation in terms of the d-uple embedding of Z, the image νd (Z) ⊂ P(S̄d ) where νd : P(S̄1 ) → P(S̄d ), [l] 7→ [ld ]. Lemma 27. (Apolarity Lemma). A scheme Z ⊂ P(S̄1 ) is apolar to F ∈ S̄d if and only if [F ] ∈ hνd (Z)i ⊂ P(S̄d ).  Proof. If Z is apolar to F , then (IZ )d ⊆ (F ⊥ )d and we get [F ] ∈ V (IZ )d = hνd (Z)i ⊂ P(S̄d ), so the “ only if ” part follows. For the “ if ” part, (IZ )e ⊂ (F ⊥ )e = T̄e when e > d, so it remains to consider Ψ ∈ (IZ )e , for some e ≤ d. In this case, T̄d−e Ψ ⊂ (IZ )d . So if [F ] ∈ hνd (Z)i, then T̄d−e Ψ ⊂ (F ⊥ )d . But T̄d−e Ψ(F ) = 0 only if Ψ(F ) = 0, so the “ if” part follows also.  We are particularly interested in minimal apolar zero-dimensional subschemes to a form, their length is called the cactus rank of the form. The closure of the set of forms with a given cactus rank is called a cactus variety of forms, although it may be reducible. Minimal apolar zero-dimensional schemes are locally Gorenstein, so our first aim is to describe the forms that have a given minimal length local Gorenstein scheme. For any form F a minimal apolar zero-dimensional scheme decomposes into local Artinian Gorenstein schemes. This decomposition corresponds to an additive decomposition of the form F . In particular, the cactus variety is the join of varieties of forms whose minimal apolar scheme is local.  Let F be a form of degree d in S̄ and [l] ∈ P(S̄1 ). Consider the family Z ⊂ Hilb P(S̄1 ) of subschemes apolar to F and supported at [l]. We construct a particular subscheme ZF,l ∈ Z that we will call the natural apolar subscheme of F at [l]. The element [l] ∈ P(S̄1 ) defines a hyperplane V (l) ⊂ P(T̄1 ). The complement U of this hyperplane is isomorphic to an affine space Spec(S̄l ). Moreover, we get a homomorphism π = π[l] : S̄ → S̄l corresponding to passing from the homogeneous coordinate ring S of P(T̄1 ) to the coordinate ring of U . Choose dual bases hl, l1 , . . . , ln i and hl′ , l1′ , . . . , ln′ i for S̄1 and T̄1 , respectively. Let S̄l = K[l1 , . . . , ln ] and let T̄l = K[l1′ , . . . , ln′ ]. Then (S̄l )1 and (T̄l )1 are natural dual spaces like S̄1 and T̄1 above, and T̄l is the coordinate ring of the affine space U ′ that contains the point [l] and is the complement of the hyperplane V (l′ ) ⊂ P(S̄1 ). Given any polynomial g ∈ S̄l we denote by Zg the subscheme V (g ⊥ ) ⊆ U ′ ⊂ P(S̄1 ). Definition 28. Let F ∈ S be any form and l ∈ S̄1 a linear form. Take f := π[l] (F ) and f ⊥ ⊆ T̄l . We define ZF,l to be the subscheme Zf = V (f ⊥ ) ⊆ U ′ ⊂ P(S̄1 ). Since ZF,l is finite, it is a closed subset of P(S̄1 ). By construction, the support of ZF,l is [l] ∈ P(S̄1 ). In the definition of ZF,l we have not used any particular coordinate system. However, to simplify the following proofs we fix coordinates. First, note that for every lifting l ∈ S̄1 of [l] we have a canonical isomorphism S̄l ≃ S̄/(l − 1). Changing x0 , . . . , xn if necessary we 16 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD may assume that l = x0 . Then S̄l may be identified with S = Kdp [x1 , . . . , xn ] and T̄l with T = K[y1 , . . . , yn ]. The homomorphism π := πx0 : S̄ → S sends x0 to 1 and xi to itself for i > 0. Note that π induces an isomorphism between the space S̄d of homogeneous polynomials of degree d and the space (S)≤d of polynomials of degree d. Furthermore we fix a “dual” homomorphism π ∗ : T̄ → T sending y0 to 1 and yi to itself for i > 0. Let G ∈ S̄ be a homogeneous polynomial, let Ψ ∈ T̄ be a homogeneous differential operator, and denote g = π(G) and ψ = π ∗ (Ψ). In general, π Ψ(G) and ψ(g) are different polynomials, but the following lemma gives the basic relation between them. Lemma 29. Let G ∈ S̄ be a homogeneous polynomial, let Ψ ∈ T̄ be a homogeneous operator, with deg G ≥ deg Ψ, and let d = deg G − deg Ψ. Let g = π(G) and ψ = π ∗ (Ψ), then the degree-d tails of π Ψ(G) and ψ(g) are equal. Moreover, if G is divisible by x0 deg Ψ , then π Ψ(G) = ψ(g).  Proof. The first statement is equivalent to saying that the images of π Ψ(G) and ψ(g) are equal in the linear space S/(S)>d . Therefore, both statements are linear with respect to Ψ and αn 0 G and it is enough to prove them in the case when G and Ψ are monomials. Let G = xα 0 . . . xn β0 βn and Ψ = y0 . . . yn . By definition ( 0 −β0 α1 −β1 xα x1 · · · xnαn −βn if αi ≥ βi for all i ≥ 0, 0 Ψ(G) = 0 otherwise, ( 1 −β1 n −βn xα · · · xα if αi ≥ βi for all i ≥ 1, n 1 ψ(g) = 0 otherwise. We consider two cases. First, suppose α0 ≥ β0 . Then the conditions ∀i ≥ 0, αi − βi ≥ 0  and ∀i ≥ 1, αi − βi ≥ 0 are equivalent. Thus π Ψ(G) = ψ(g) and so their images in S/(S)>d agree. Next, suppose that α0 < β0 . Then Ψ(G) = 0. Suppose ψ(g) 6= 0 in S. Then ψ(g) = P 1 −β1 xα . . . xnαn −βn is a monomial of degree i≥1 αi − βi = d − (α0 − β0 ) > d, thus its image in 1 S/(S)>d is zero, i.e. equal to the image of Ψ(G). This finishes the proof of the first claim. For the second claim, note that by assumption α0 ≥ deg Ψ ≥ β0 , thus the proof of the first case above applies, giving π(Ψ(G)) = ψ(g).  Corollary 30. Let G ∈ S̄ and Ψ ∈ T̄ be homogeneous polynomials. ψ = π ∗ (Ψ). If ψ(g) = 0, then Ψ(G) = 0. Let g = π(G) and Proof. Let b = deg(Ψ) and G′ := xb0 G. Then g = π(G′ ) and G′ , Ψ, g, ψ satisfy assumptions of Lemma 29, therefore π Ψ(G′ ) = ψ(g) = 0. Since π is an isomorphism between S̄d and (S)≤d we have Ψ(G′ ) = 0. But G = y0b (G′ ), so that  Ψ(G) = Ψ y0b (G′ ) = y0b Ψ(G′ ) = 0.  Corollary 31. Let F ∈ S be a homogeneous polynomial and l ∈ S̄1 any linear form. Then the scheme ZF,l (see Definition 28) is apolar to F . Proof. Take any homogeneous form Ψ ∈ I(ZF,l ). Then ψ = π ∗ (Ψ) is an element annihilating f = π(F ). By Corollary 30 we have Ψ(F ) = 0, i.e. Ψ ∈ F ⊥ .  17 Remark 32. It is easy to characterize the d-uple embedding νd (ZF,l ) in a manner similar to the proof of the Apolarity Lemma 27. For l ∈ S̄1 , let l⊥ ∩ T̄1 be the subspace of linear forms in T̄1 that annihilate l, and let (l⊥ )e be its e-th symmetric product. Then (l⊥ )e (F ) ⊂ S̄d−e for e ≤ d is a subspace of partials of F or degree d − e, and the linear span of νd (ZF,l ) is given by  hνd (ZF,l )i = P ld ⊕ ld−1 · (l⊥ )d−1 (F ) ⊕ · · · ⊕ l · (l⊥ )1 (F ) ⊕ F . Furthermore νd (ZF,l ) = hνd (ZF,l )i ∩ Vd,n ⊂ P(S̄d ). The following lemma is a private communication from Jaroslaw Buczyński. Lemma 33 (Buczyński). If Z is any local scheme in P(S̄1 ) apolar to a homogeneous polynomial F ∈ S and supported at [l] = [1 : 0 : · · · : 0], then there exists a closed subscheme Z ′ ⊆ Z, apolar to F , such that Z ′ = ZG,l , for some G ∈ S̄. Moreover, F = Ψ(G) for some Ψ ∈ T̄ . Proof. By [Buczyńska, Buczyński 2014, Proposition 2.2, Lemma 2.3], the scheme Z contains a closed Gorenstein subscheme Z ′ apolar to F . Let g ∈ S be a polynomial such that Z ′ = V (g ⊥ ) and let G ∈ S̄ be a homogenization of g such that G is divisible by xd0 , where d = deg(F ). Then g = π(G) and Z ′ = ZG,l . Lemma 29 asserts that (G⊥ )s = (IZG,l )s for any s ≤ d, and therefore (G⊥ )s = (IZG,l )s ⊆ (F ⊥ )s . Since F is of degree d, it follows that G⊥ ⊆ F ⊥ , so F is a partial of G.  We may now prove Proposition 4. Proof (Proposition 4). By Lemma 33, we may assume that Γ = ZG,l and that F = Ψ(G) for some homogeneous Ψ ∈ K[y0 , . . . , yn ]. Let g = π(G) and ψ = π ∗ (Ψ). By Lemma 29 the polynomial f is the degree-d tail of ψ(g). Clearly Diff ψ(g) ⊆ Diff(g), thus Zψ(g) is a closed subscheme of Zg = Γ. By minimality  of Γ it is enough to prove that Zψ(g) is a scheme apolar to F . Let ψ ′ be such that ψ ′ ψ(g) = 0 and let Ψ′ ∈ T̄ be a homogeneous polynomial such that ψ ′ = π ∗ (Ψ′ ). Then π ∗ (Ψ′ Ψ) = ψ ′ ψ. By Corollary 30 we have Ψ′ Ψ(G) = 0. Since F = Ψ(G) we get that Ψ′ (F ) = 0, thus Zψ(g) is apolar to F .  3.1. The local cactus rank of a general cubic surface. In this subsection we restrict to characteristic 0. First we present an example of a quartic polynomial whose cubic tail has more partials than the polynomial itself. Similar examples play a role in our computation of the local cactus rank of a general cubic surface, the main issue in this section. Example 34. Let f = x12 x2 + x22 and g = x14 + f . Then Diff(f ) has a basis f, x12 + x2 , x1 x2 , x1 , x2 , 1, thus dimK Diff(f ) = 6. On the other hand, Diff(g) is spanned by g, x13 + x1 x2 , x12 + x2 , x1 , 1, so that dimK Diff(g) = 5. Notice that y2 − y12 ∈ g ⊥ , so that x2 does not appear in the leading summand of any partial of g (cf. Proposition 12). For our computation of the local cactus rank of a general cubic surface V (F ), we need to translate the generality assumptions on F into properties of its partials. First note the following algebraic–geometric correspondences for Ψ ∈ T̄1 : (1) Ψ3 (F ) = 0 if and only if [Ψ] ∈ V (F ) ⊆ P(T̄1 ), (2) Ψ2 (F ) = 0 if and only if [Ψ] is a singular point of the (hyper)surface V (F ), (3) Ψ(F ) = 0 if and only if [Ψ] is a cone point of V (F ). 18 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD Lemma 35. Let F ∈ S be a general cubic form in four variables. Then (1) The set of [Ψ] ∈ P(T̄1 ) such that the quadric Ψ(F ) has rank less than 4 is an irreducible surface of degree 4. Furthermore, the quadric Ψ(F ) has rank less than 4 if and only if there exist a Ψ′ ∈ T̄1 such that (ΨΨ′ )(F ) = 0. (2) There are no points [Ψ] ∈ V (F ) ⊂ P(T̄1 ), such that Ψ(F ) is a quadric of rank less than 3 i.e. if Ψ33 (F ) = 0 and (Ψ2 Ψ3 )(F ) = 0, then Ψ23 (F ) 6= 0. (3) The cubic surface V (F ) is smooth, i.e. Ψ2 (F ) 6= 0 for every nonzero Ψ ∈ T̄1 . (4) The cubic surface V (F ) has no Eckhardt points, i.e. no plane section is a cone. Proof. These facts are classical. For a good recent reference see [Dolgachev 2012, 9.4].  Proposition 36. Let F ∈ S̄3 be a general smooth cubic form in four variables. Then the local cactus rank of F is 7. For every linear form l ∈ S̄1 , the apolar scheme of the dehomogenization π[l] (F ) has length 8, while if {l = 0} defines a singular curve section of V (F ) ⊂ P(T̄1 ) whose tangent cone at the singular point is a square, then there is a length 7 scheme supported at [l] ∈ P(S̄1 ) that is apolar to F . Proof. Let F ∈ S̄ = Kdp [x0 , x1 , x2 , x3 ] be a general cubic form in the sense of Lemma 35. We claim that for all non-zero l ∈ S̄1 , the Hilbert function (11) HFl = (1, 3, 3, 1). Indeed, suppose it is not so, then HFl ≤ (1, 3, 2, 1) for some non-zero l ∈ S̄1 and there exists a non-zero linear form Ψ ∈ l⊥ , such that ψ(Fl ) has degree at most one, where ψ = π ∗ (Ψ). Let Fl = f3 + f2 + f1 + f0 be the decomposition into homogeneous components, then F = f3 + lf2 + l2 f1 + l3 f0 . Since deg ψ(Fl ) ≤ 1 we have Ψ(f3 ) = 0. But then Ψ(F  ) is divisible by l, so it is a quadric of rank at most 2. On the other hand Ψ(l) = 0, so Ψ2 Ψ(F ) = Ψ3 (F ) = 0, so [Ψ] ∈ V (F ) ⊂ P(T̄1 ). This contradicts the generality assumption Lemma 35.2 of F . The cubic surface V (F ) has a one dimensional family of plane cuspidal cubic sections, and finitely many reducible plane sections that are unions of a smooth conic and a tangent line. In either case, the tangent cone at the singular point is a square. We pick one such plane section. After a linear change of coordinates, we may assume that this plane section is V (F, x0 ), that it is singular at V (x0 , x1 , x2 ) and that V (x0 , x12 ) is the tangent cone, so that the dehomogenization π[x0 ] (F ) has the form π[x0 ] (F ) = f + x12 x3 + x32 + x3 l where f and l are polynomials in Kdp [x1 , x2 ] of degree three and one respectively. The plane section V (F, x0 ) = V (f3 + x12 x3 , x0 ) where f3 is the cubic summand of f . By Lemma 35.4, the linear partials of f3 + x21 x3 fill hx1 , x2 , x3 i. For later use we note that y12 is the only monomial quadric such that y12 (f3 +x21 x3 ) contains x3 . Hence we have (y2 , y3 ) · (y1 , y2 , y3 )(f ) = h1, x1 , x2 i. Since l − y12 (f ) ∈ Kdp [x1 , x2 ] we can find σ0 ∈ (y2 , y3 )(y1 , y2 , y3 ) such that σ0 (f ) = l − y12 (f ) mod hx1 i. Then there also exists σ = σ0 + ay13 ∈ (y1 , y2 , y3 )2 such that σ(x41 + f ) = l − y12 (f ). Clearly σ0 x41 = 0. Let G = x14 + x0 F . Then y0 (G) = F , hence G⊥ ⊆ F ⊥ . By Lemma 31 we have I(ZG,x0 ) ⊆ ⊥ G , so we conclude that I(ZG,x0 ) ⊆ F ⊥ , i.e. that the local Gorenstein scheme ZG,x0 is apolar to F . We claim that length(ZG,x0 ) ≤ 7, and hence that the local cactus rank of F is at most 7. We prove the claim, by showing that x12 x3 + x32 + x3 l is an exotic summand for Gx0 := π[x0 ] (G) = x14 + f + x12 x3 + x32 + x3 l. For this we consider the partials y3 (Gx0 ) = x12 + x3 + l, y12 (Gx0 ) = x12 + x3 + y12 (f ). 19 We have (y3 − y12 )(Gx0 ) = l − y12 (f ) = σ(Gx0 ), so y3 − y12 − σ annihilates Gx0 . If we take ψ = y12 + σ, then ψ 2 Gx0 = y14 (Gx0 ) = 1 and we may write Gx0 = x14 + f + x3 ψ(x14 + f ) + x32 ψ 2 (x14 + f ) which shows, by Proposition 19, that x12 x3 + x32 + x3 l is an exotic summand for Gx0 . Thus Gx0 has the Hilbert function of the binary polynomial x14 + f . The maximal values of this function is clearly (1, 2, 2, 1, 1), so this proves the claim that length(ZG,x0 ) ≤ 7. Finally, suppose that there exists a local Gorenstein scheme of length at most 6 apolar to F . It must be defined by some polynomial g whose cubic tail coincides with Fl for some l. Thus g has degree at least four, and its Hilbert function is Hg = (1, 2, 1, 1, 1), Hg = (1, 1, 1, 1, 1) or Hg = (1, 1, 1, 1, 1, 1). In the first two cases, g has degree 4 and the leading summand of g is a pure power l 4 . Each order-one partial of the cubic summand Fl,3 of Fl is therefore proportional to l 2 . In particular π ∗ (Ψ)(Fl,3 ) = 0 for some Ψ ∈ l⊥ ⊂ T̄1 , so Ψ(F ) is divisible by l contradicting, as above, the generality assumption on F . In the case Hg = (1, 1, 1, 1, 1, 1) we see that Fl is the degree-at-most-three part of g and the standard form of g is x5 . By Example 25, we have a 4 · 3-dimensional choice of Fl . Together with the choice of l, we obtain a 16-dimensional variety of possible F , thus such F is not general.  4. On the dimension of the cactus varieties of cubic forms In this section we consider polynomials with Hilbert function (1, m − 1, m − 1, 1) and (1, m − 1, m − 1, 1, 1) and derive lower bounds on the dimension of the Cactus variety of cubic forms Cactus2m (V3,n ) and Cactus2m+1 (V3,n ), respectively. The cactus variety Cactusr (V3,n ) of the third Veronese embedding V3,n ⊂ P(S̄3 ) is, according to Proposition 4, the closure of the family of cubic forms [F ] admitting a decomposition F = F1 + · · · + Fs and distinct linear forms l1 , . . . , ls ∈ S̄1 and forms G1 , . . . , Gs ∈ S, such that ZG1 ,l1 ∪ · · · ∪ ZGs ,ls has length at most r, and the dehomogenization fi = π[li ] (F ) of F at li is the cubic tail of the dehomogenization of Gi at li (see Definition 28). To get a lower bound on the dimension of the cactus variety, we consider the extreme opposite to the higher secants, namely linear spaces that intersect V3,n in a local scheme. In particular we consider the closure W2m (V3,n ) ⊂ Cactusr (V3,n ) ⊂ P(S̄3 ) of the family of cubic forms [F ], for which there exist a linear form l ∈ S̄1 and a form G ∈ S, such that f = π[l] (F ) is the cubic tail of g = π[l] (G) and the polynomial g has Hilbert function (1, m − 1, m − 1, 1). We define W2m+1 (V3,n ) analogously, using the Hilbert function (1, m − 1, m − 1, 1, 1). In the first case g is itself a cubic polynomial, i.e. its own cubic tail, while in the second case, g is a quartic polynomial. To find the dimension of Wr (V3,n ) when r = 2m, we note that it is the union over l ∈ S̄1 of varieties isomorphic to the projectivisation of Vr (n), the family of cubic polynomials f ∈ K[x1 , . . . , xn ] with Hilbert function (1, m−1, m−1, 1). When r = 2m+1, the variety Wr (V3,n ) is union over l of varieties isomorphic to the projectivisation of Vr (n) of Tailsr (3, n), the family of cubic polynomials f ∈ K[x1 , . . . , xn ], that are tails of polynomials g ∈ K[x1 , . . . , xn ] with Hilbert function (1, m − 1, m − 1, 1, 1). Example 37. If f ∈ Kdp [x1 , . . . , xn ] has Hilbert function Hf = (1, m − 1, m − 1, 1), its only possible symmetric decomposition is Hf = ∆ = ∆0 = (1, m − 1, m − 1, 1), 20 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD and therefore deg f = 3, ∆0 (1) = m − 1 and (n0 , n1 ) = (m − 1, m − 1). If fα is a general cubic polynomial in Kdp [x1 , . . . , xm−1 ], and fβ is any quadratic polynomial in hxm , . . . , xn ihx1 , . . . , xm−1 , 1i, then fα is in standard form and fβ is an exotic summand for fα + fβ (cf. Definition 13). Furthermore Hfα +fβ = ∆ and so fα + fβ ∈ V2m (n). The subspace hx1 , . . . , xm−1 i = Lin(f )0 is determined by f , and the variety of subspaces hx1 , . . . , xm−1 i ⊂ hx1 , . . . , xn i has dimension (n − m + 1)(m − 1), so we get   m+2 dim V2m (n) = + (2m − 1)(n − m + 1). 3 Notice furthermore that the affine variety V2m (n) is a cone, so that its projectivisation has dimension one less. Example 38. If g ∈ Kdp [x1 , . . . , xn ] has Hilbert function Hf = (1, m − 1, m − 1, 1, 1), its only possible symmetric decomposition is  ∆ = (∆0 , ∆1 ) = (1, 1, 1, 1, 1), (0, m − 2, m − 2, 0) , and therefore deg g = 4, ∆0 (1) = 1, ∆1 (1) = m − 2 and (n0 , n1 , n2 ) = (1, m − 1, m − 1). If fα is a general cubic polynomial in Kdp [x1 , . . . , xm−1 ], and fβ is a cubic polynomial of the form l0 x12 + l02 + f∞ , where l0 ∈ hxm , . . . , xn i and f∞ ∈ hxm , . . . , xn ihx1 , . . . , xm−1 , 1i, then x14 + fα is in standard form and fβ is an exotic summand for g = x14 + fα + fβ = x14 + fα + l0 x12 + l02 + f∞ . Furthermore Hg = ∆0 + ∆1 = (1, m − 1, m − 1, 1, 1), and so fα + fβ ∈ Tails2m+1 (3, n). The flag of subspaces hx1 i = Lin(g)0 ⊂ hx1 , . . . , xm−1 i = Lin(g)1 ⊂ hx1 , . . . , xn i is determined by g, and the variety of such flags has dimension m − 2 + (n − m + 1)(m − 1), so we get   m+2 + (2m − 1)(n − m + 1) + n − 1. dim Tails2m+1 (3, n) = 3 Notice that, since the summand l0 x21 + l02 is quadratic in the form l0 , the affine variety Tails2m+1 (3, n) is not a cone, so its projectivisation has the same dimension. We use the Examples 37 and 38 to give a lower bound on the dimension of the union of linear spaces that intersect V3,n in a local subscheme. ( Proposition 39. Let 3 ≤ m ≤ n. The union CactusL 2m (V3,n ) of linear spans in P local subschemes in V3,n of length 2m has dimension   m+2 L dim Cactus2m (V3,n ) ≥ + 2m(n − m) + 3m − 2. 3 n+3 3 )−1 of 21 (n+3 3 )−1 of local subschemes Let 4 ≤ m ≤ n. The union CactusL 2m+1 (V3,n ) of linear spans in P in V3,n of length 2m + 1 has dimension   m+2 (V ) ≥ + 2m(n − m) + 3m + n − 2. dim CactusL 3,n 2m+1 3 L Proof. Clearly W2m (V3,n ) ⊂ CactusL 2m (V3,n ) and W2m+1 (V3,n ) ⊂ Cactus2m+1 (V3,n ), so we get the inequality by computing the dimension of these subvarieties. Let m > 2. W2m (V3,n ) is the union as l varies, of projective varieties whose affine cones are isomorphic to V2m (n), so W2m (V3,n ) has dimension dim W2m (V3,n ) ≤ dim V2m (n) − 1 + n equal to the right hand side in the lemma. Similarly, W2m+1 (V3,n ) is the union, as l varies, of varieties isomorphic to Tails2m+1 (3, n), so dim W2m+1 (V3,n ) ≤ dim Tails2m+1 (3, n) + n. In both cases the right hand side is the dimension of the given parametrization of the variety Wr (V3,n ). To get equality, we show that the parameterization is generically one to one. When r is even, we show that for a general [F ] ∈ Wr (V3,n ) there is a unique l such that ZF,l has length r. When r is odd, we show that there is a unique l such that f = πl (F ) is the tail of a quartic polynomial gl whose apolar scheme Zgl has length r. Let r = 2m ≤ 2n, and assume that [F ] ∈ Wr (V3,n ) is general. Let l ∈ S̄1 and f = πl (F ) be the local polynomial of F at l such that f has Hilbert function (1, m − 1, m − 1, 1). Then F = F3 + lF2 where F3 depends on m − 1 variables. Therefore V (F, l) is a cone inside the hyperplane V (l). Let [y] be a point in the n − m dimensional linear vertex of V (F, l). Then y(F3 ) = y(l) = 0. Furthermore, since all partials of Fl of degree 1 are partials of F3 , we have y 2 (F2 ) = 0. In particular, y 2 (F ) = 0 and y(F ) = l · l′ , so V (F ) is singular at [y] with a tangent cone of rank 2. On the other hand, if V (F ) is singular at [y] with a tangent cone of rank 2, then F = F3 + lF2 + l · l′ x, where y(x) = 1, y(F3 ) = y(F2 ) = y(l) = y(l′ ) = 0 and F3 has Hilbert function (1, m−1, m−1, 1) for some m ≤ n. If r = 2m + 1, and assume that [F ] ∈ Wr (V3,n ) is general. Let l ∈ S̄1 and f = πl (F ) be the local polynomial of F at l such that f has Hilbert function (1, m, m, 1), but is the cubic tail of a quartic polynomial g with Hilbert function (1, m − 1, m − 1, 1, 1). When m ≤ n, then g = α0 l04 + g3 + α1 l02 l′ + α2 (l′ )2 + g2 where g3 and l0 depends on m variables and l′ is a hidden variable for g. Thus f3 = g3 + α1 l02 l′ , F = g3 + α1 l02 l′ + α2 l(l′ )2 + lg2 and V (F, l) is a singular cubic hypersurface with a double point whose tangent cone is a square. In fact, if m < n, then V (F, l) is a cone with linear vertex of dimension n − m − 1 over such a singular hypersurface. In both cases, if m < n, let l1 , . . . , ln−m are general linear forms. If r = 2m, then the linear section V (F, l1 , . . . , ln−m ) still has a singular point whose tangent cone has rank 2. If r = 2m + 1, then the linear section V (F3 , l, l1 , . . . , ln−m ) is still a singular cubic hypersurface inside a (m − 1)-dimensional linear subspace with a non reduced tangent cone at the singular point. The proof of uniqueness of l may therefore in both cases be reduced to the case, when n = m. The following is a classical result. 22 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD Lemma 40. The set of singular cubic hypersurfaces in Pn , n > 2 whose tangent cone at the  n+3 singular point has rank at most 2, form a subvariety of codimension n−1 + 1 in P( 3 )−1 , 2 and the general member in the set has exactly one singular point. Proof. It suffices to note that the set of singular cubic hypersurfaces in Pn form a hypersurface n+3 in P( 3 )−1 . The general point in this hypersurface, the discriminant, corresponds to a cubic hypersurface with a quadratic singularity, i.e. the tangent cone is a quadric of rank n. In the space of quadrics of rank at most n, the quadrics of rank 2 form a subvariety of codimension n−1 2 . The two codimensions add up to the codimension in the lemma. For uniqueness it suffices to fix a quadric q of rank 2 and a point p in its vertex,and notice, by Bertini’s theorem, that the general cubic hypersurface through for which q is the tangent cone at p is smooth elsewhere.  Remark 41. Notice that the codimension in lemma is consistent with the dimensions of W2n (V3,n ). When n = m in the proposition, we get     n+3 n−1 dim W2n,n (V3,n ) = −1− − 1. 3 2 For the case r is odd, we show that Lemma 42. The set of cubic hypersurfaces in Pn , n > 3 with a singular hyperplane section  whose tangent cone at the singular point is a square, form a subvariety of codimension n−2 −1 2 n+3 −1 ) ( 3 , and when n > 4, the general member in the set has exactly one such hyperplane in P section. Proof. Assume V (F ) is a general cubic of dimension n − 1 > 2 with a singular hyperplane section V (F, l) whose tangent cone at the singular point is a square. Let p ∈ V (F, l) be a singular point and V (l, (l′ )2 ) the tangent cone in V (l). We may choose coordinates x0 , . . . , xn , so that l = x0 , l′ = x1 and p = [0 : . . . : 0 : 1]. Then F = F3 + x21 xn + x0 F2 , where F3 ∈ Kdp [x1 , . . . , xn−1 ] and F3 + x21 xn is the cubic form defining  the singular  hyperplane n+2 section V (F, x0 ) and F2 ∈ Kdp [x0 , . . . , xn ]. Thus F depends on n+1 + 1 + coefficients. 3 2 Now, p, l and l′ varies in a (n + (n − 1) + (n − 2)) dimensional variety, so we get that cubics with a singular hyperplane section whose tangent cone at the singular point is a square form a variety of codimension           n+3 n+1 n+2 n+1 n−2 − +1+ − 3(n − 1) = − 1 − 3(n − 1) = −1 3 3 2 2 2 When n > 4, this codimension is positive. The forms F , when F3 and F2 vary, define a linear system of cubic hypersurfaces with base locus supported at p = [0 : . . . : 0 : 1]. The general member is smooth, and the tangent hyperplane section at p is singular only at p, and the tangent cone at p is a square. If this hyperplane section is not unique with this property, there is another point q distinct from p such that the tangent hyperplane section at q also has this property. To count dimensions, we fix two flags p ∈ Lp ⊂ Hp and q ∈ Lq ⊂ Hq , and consider the space of smooth cubic hypersurfaces through p and q, whose tangent hyperplanes are Hp and Hq and whose tangent cones at p and q are squares with support along Lp and Lq respectively. Notice that Hp and Hq are distinct, while Lp ∩ Hq may equal Lq ∩ Hp . This gives two cases for the dimension count. These are both similar to the dimension count above and show that the variety of cubic hypersurfaces with two special points as above, has positive codimension in the variety 23 of cubics with only one such point when n > 4. Therefore the last statement of the lemma follows.  Remark 43. Notice that codimension in the lemma is consistent with the dimension of W2n+1 (V3,n ). When n = m in the proposition, we get     n+3 n−2 dim W2n+1,n (V3,n ) = −1− + 1. 3 2 We conclude that the parameterization of Wr (V3,n ) is birational for any even r with 5 < r < 2n + 1, and any odd r with 8 < r ≤ 2n + 1, and hence that the dimension formulas of Proposition 39 are the dimensions of W2m (V3,n ) and W2m+1 (V3,n ) respectively.  We rewrite the formulas for the dimensions of W2m (V3,n ) and W2m+1 (V3,n ) in terms of the lengths r = 2m (resp. r = 2m + 1): ( −1 if 5 < r < 2n + 1, r even, (rn + r − 1) + r(r−2)(r−16) 48 dim Wr (V3,n ) = − 2 if 8 < r < 2n + 2, r odd. (rn + r − 1) + (r−1)(r−3)(r−17) 48 Corollary 44. When 18 ≤ r ≤ 2n + 2, then ( (rn + r − 1) + dim Cactusr (V3,n ) ≥ (rn + r − 1) + r(r−2)(r−16) −1 48 (r−1)(r−3)(r−17) − 48 2 if r ≥ 18 even, if r ≥ 19 odd. For each possible Hilbert function for local schemes of length r, one may define a variety analogous to Wr (V3,n ). The dimensions of these varieties are in general not known, and this remains an obstacle to finding a precise dimension for the cactus variety Cactusr (V3,n ). Finally we leave an open question: we know that the cactus rank of a general cubic surface equals the rank, which is 5, while the local cactus rank is 7 (see Proposition 36), but we do not know whether for a larger number of variables the local cactus rank and the cactus rank agree. Question 45. Is the cactus rank of a cubic form in Kdp [x0 , . . . , xn ] always computed locally, when n ≥ 8 and the cactus rank is at least 18? Acknowledgements JJ and KR thank Jaroslaw Buczyński for fruitful discussions and the Homing Plus programme of Foundation for Polish Science, co-financed from European Union, Regional Development Fund for partial support of their mutual visits. PMM thanks Anthony Iarrobino and Jerzy Weyman for the invitation and hospitality at Northeastern University, and is grateful to Anthony Iarrobino for having introduced him to this subject and for very fruitful discussions. He also thanks James Adler for help with language. AB was partially supported by Project Galaad of INRIA Sophia Antipolis Méditerranée, France, Marie Curie Intra-European Fellowships for Carrer Development (FP7-PEOPLE-2009-IEF): “DECONSTRUCT”, GNSAGA of INDAM, Mathematical Department Giuseppe Peano of Turin, Italy, and Politecnico of Turin, Italy. JJ is a doctoral fellow at the Warsaw Center of Mathematics and Computer Science financed by the Polish program KNOW and by Polish National Science Center, project 2014/13/N/ST1/02640 and a member of “Computational complexity, generalised Waring type problems and tensor decompositions” project within “Canaletto”, the executive program for scientific and technological cooperation between Italy and Poland, 2013-2015. PMM was partially supported by Fundação para a Ciência e Tecnologia, projects “Geometria Algébrica em Portugal”, PTDC/MAT/099275/2008, “Comunidade Portuguesa de Geometria Algébrica”, 24 A. BERNARDI, J. JELISIEJEW, P. MACIAS MARQUES, K. RANESTAD PTDC/MAT-GEO/0675/2012, and sabbatical leave grant SFRH/BSAB/1392/2013, by CIMA – Centro de Investigação em Matemática e Aplicações, Universidade de Évora, projects PEstOE/MAT/UI0117/2011 and PEst-OE/MAT/UI0117/2014, and by Fundação de Amparo à Pesquisa do Estado de São Paulo, grant 2014/12558–9. KR was supported by the RCN project no 239015 “Special Geometries”. References [Alexander, Hirschowitz 1995] Alexander, James, Hirschowitz, André: Polynomial interpolation in several variables. J. of Alg. Geom., 4 (1995), no. 2, pp. 201–222. [Bernardi, Brachat, Mourrain 2014] Bernardi, Alessandra, Brachat, Jérôme, Mourrain, Bernard: A comparison of different notions of ranks of symmetric tensors, Linear Algebra and its Applications, 460, 2014, pp. 205–230. [Bernardi, Ranestad 2012] Bernardi, Alessandra, Ranestad, Kristian: On the cactus rank of cubics forms, J. Symbolic Comput. 50 (2012), pp. 291–297. [Buczyńska, Buczyński 2014] Buczyńska, Weronika, Buczyński, Jaroslaw: Secant varieties to high degree Veronese reembeddings, catalecticant matrices and smoothable Gorenstein schemes, J. Algebraic Geom. 23 (2014), no. 1, pp. 63–90. [Casnati, Notari 2011] Casnati, Gianfranco, Notari, Roberto: On the irreducibility and the singularities of the Gorenstain locus of the punctual Hilbert scheme of degree 10, J. Pure Appl. Algebra 215 (2011), no. 6, pp. 1243–1254. [Casnati, Notari 2013] Casnati, Gianfranco, Notari, Roberto: A structure theorem for 2-stretched Gorenstein algebras, arXiv:1312.2191, to apear in J. Commut. Algebra. [Casnati, Jelisiejew, Notari 2015] Casnati, Gianfranco, Jelisiejew, Joachim, Notari, Roberto: Irreducibility of the Gorenstein loci of Hilbert schemes via ray families, Algebra Number Theory 9 (2015), no. 7, pp. 1525–1570. [Dolgachev 2012] Dolgachev, Igor V.: Classical algebraic geometry: a modern view. Cambridge University Press, (2012). [Emsalem 1978] Emsalem, Jacques: Géométrie des points épais, Bull. Soc. Math. France 106, (1978), no. 4, pp. 399–416. [Iarrobino 1994] Iarrobino, Anthony: Associated graded algebra of a Gorenstein Artin Algebra, Mem. Amer. Math. Soc. 107, (1994), no. 514, Amer. Math. Soc. Providence. [Iarrobino, Kanev 1999] Iarrobino, Anthony, Kanev, Vassil: Power Sums, Gorentein Algebras and Determinantal Loci, Lecture Notes in Mathematics 1721, Springer-Verlag, Berlin Heidelberg New York (1999). [Jelisiejew 2015] Jelisiejew, Joachim: Classifying local Artinian Gorenstein algebras, arXiv:1511.08007. [Macaulay 1927] Macaulay, Francis Sowerby: Some properties of enumeration in the theory of modular systems, Proc. London Math. Soc. S2-26 (1927), no. 1, pp. 531–555. Dipartimento di Matematica, Università di Trento, via Sommarive 14, I-38123 Povo (Trento), Italy. E-mail address: [email protected] Faculty of Mathematics, Informatics, and Mechanics, University of Warsaw, Banacha 2, 02-097 Warszawa, Poland E-mail address: [email protected] Departamento de Matemática, Escola de Ciências e Tecnologia, Centro de Investigação em Matemática e Aplicações, Instituto de Investigação e Formação Avançada, Universidade de Évora, Rua Romão Ramalho, 59, P–7000–671 Évora, Portugal E-mail address: [email protected] Matematisk institutt, Universitetet i Oslo, PO Box 1053, Blindern, NO-0316 Oslo, Norway E-mail address: [email protected]
0math.AC
1 arXiv:1511.05625v1 [cs.NE] 18 Nov 2015 MOEA/D-GM: Using probabilistic graphical models in MOEA/D for solving combinatorial optimization problems Murilo Zangari de Souza1, Roberto Santana2, Aurora Trinidad Ramirez Pozo1, Alexander Mendiburu2 1 DInf - Federal University of Paraná, CP: 19081, CEP 19031-970, Curitiba, Brazil 2 Intelligent Systems Group, University of the Basque Country UPV/EHU, San Sebastián, Spain Email: {murilo.zangari, auroratrinidad}@gmail.com, {roberto.santana, alexander.mendiburu}@ehu.eus (PF). Popular strategies include:1 (i) Pareto dominance based; (ii) Indicator based and (iii) Decomposition based (also called, scalarization function based) [3], [5]. Zhang and Li [2] proposed a decomposition based algorithm called MOEA/D (multi-objective Evolutionary Algorithm Based on Decomposition) framework, which decomposes a MOP into a number of single-objective scalar optimization subproblems and optimizes them simultaneously in a collaborative manner using the concept of neighborhood between the subproblems. Current research on MOEA/D are various and include the extension of these algorithms to continuous MOPs with complicated Pareto sets [6], many-objective optimization problems [5], [7], [8], methods to parallelize the algorithm [9], incorporation of preferences to the search [10], automatic adaptation of weight vectors [11], new strategies of selection and replacement to balance convergence and diversity [3], hybridization with local searches procedures [12], [13], etc. However, it has been shown that traditional EA operators fail to properly solve some problems when certain characterIndex Terms—multi-objective optimization, MOEA/D, proba- istics are present in the problem such as deception [14]. A main reason for this shortcoming is that, these algorithms do bilistic graphical models, deceptive functions, EDAs not consider the dependencies between the variables of the problem [14]. To address this issue, evolutionary algorithms I. I NTRODUCTION that (instead of using classical genetic operators) incorporate Several real-world problems can be stated as multi-objective machine learning methods have been proposed. These algooptimization problems (MOPs) which have two or more ob- rithms are usually referred to as Estimation of Distribution jectives to be optimized. Very often these objectives conflict Algorithms (EDAs). In EDAs, the collected information is repwith each other. Therefore, no single solution can optimize resented using a probabilistic model which is later employed these objectives at the same time. Pareto optimal solutions are to generate (sample) new solutions [14]–[16]. of very practical interest to decision makers for selecting a EDAs based on modeling the statistical dependencies befinal preferred solution. Most MOPs may have many or even tween the variables of the problem have been proposed as infinite optimal solutions and it is very time consuming (if not a way to encode and exploit the regularities of complex impossible) to obtain the complete set of optimal solutions [1]. problems. Those EDAs use more expressive probabilistic Since early nineties, much effort has been devoted to models that, in general, are called probabilistic graphical develop evolutionary algorithms for solving MOPs. Multi- models (PGMs) [14]. A PGM comprises a graphical compoobjective evolutionary algorithms (MOEAs) aim at finding a nent representing the conditional dependencies between the set of representative Pareto optimal solutions in a single run variables, and a set of parameters, usually tables of marginal [1]–[3]. and conditional probabilities. Additionally, the analysis of the Different strategies have been used as criteria to maintain a population of optimal non-dominated solutions, or Pareto set 1 There exist algorithms, such as NSGAIII [4], that combine the ideas from (PS), and consequently finding an approximated Pareto front both decomposition based and Pareto dominance based. Abstract—Evolutionary algorithms based on modeling the statistical dependencies (interactions) between the variables have been proposed to solve a wide range of complex problems. These algorithms learn and sample probabilistic graphical models able to encode and exploit the regularities of the problem. This paper investigates the effect of using probabilistic modeling techniques as a way to enhance the behavior of MOEA/D framework. MOEA/D is a decomposition based evolutionary algorithm that decomposes an multi-objective optimization problem (MOP) in a number of scalar single-objective subproblems and optimizes them in a collaborative manner. MOEA/D framework has been widely used to solve several MOPs. The proposed algorithm, MOEA/D using probabilistic Graphical Models (MOEA/D-GM) is able to instantiate both univariate and multi-variate probabilistic models for each subproblem. To validate the introduced framework algorithm, an experimental study is conducted on a multi-objective version of the deceptive function Trap5. The results show that the variant of the framework (MOEA/DTree), where tree models are learned from the matrices of the mutual information between the variables, is able to capture the structure of the problem. MOEA/D-Tree is able to achieve significantly better results than both MOEA/D using genetic operators and MOEA/D using univariate probability models in terms of approximation to the true Pareto front. 2 graphical components of the PGMs learned during the search can provide information about the problem structure. MOEDAs using PGMs have been also applied for solving different MOPs [17]–[19]. In the specified literature of MO-EDAs, a number of algorithms that integrate to different extents the idea of probabilistic modeling into MOEA/D have been previously proposed [20]–[24]. Usually, these algorithms learn and sample a probabilistic model for each subproblem. Most of them use only univariate models, which are not able to represent dependencies between the variables. In this paper, we investigate the effect of using probabilistic modeling techniques as a way to enhance the behavior of MOEA/D. We propose a MOEA/D framework able to instantiate different PGMs. The general framework is called MOEA/D Graphical Models (MOEA/D-GM). The goals of this paper are: (i) Introduce MOEA/D-GM as a class of MOEA/D algorithms that learn and sample probabilistic graphical models defined on discrete domain; (ii) To empirically show that MOEA/D-GM can improve the results of traditional MOEA/D for deceptive functions; (iii) To investigate the influence of modeling variables dependencies in different metrics used to estimate the quality of the Pareto front approximations and (iv) to show, for the first time, evidence of how the problem structure is captured in the models learned by MOEA/D-GM. The paper is organized as follows. In the next section some relevant concepts used in the paper are introduced. Sections III and IV respectively explain the basis of MOEA/D and the EDAs used in the paper. Section V introduces the MOEA/DGM and explains the enhancements required by EDAs in order to efficiently work within the MOEA/D context. In Section VI we discuss the class of functions which are the focus of this paper, multi-objective deceptive functions. We explain the rationale of applying probabilistic modeling for these functions. Related work is discussed in detail in Section VII. The experiments that empirically show the behavior of MOEA/DGM are described in Section VIII. The conclusions of our paper and some possible trends for future work are presented in Section IX. II. P RELIMINARIES Let X = (X1 , . . . , Xn ) denote a vector of discrete random variables. x = (x1 , . . . , xn ) is used to denote an assignment to the variables and x ∈ {0, 1}n. A population is represented as a set of vectors x1 , . . . , xN where N is the size of the population. Similarly, xij represents the assignment to the jth variable of the ith solution in the population. A general MOP can be defined as follows [1]: minimize (or maximize) F (x) = (f1 (x), ..., fm (x)) (1) subject to x ∈ Ω where x = (x1 , x2 , . . . xn )T is the decision variable vector of size n, Ω is the decision space, F : Ω → Rm consists of m objective functions and Rm is the objective space. Pareto optimality is used to define the set of optimal solutions. Pareto optimality2 [1]: Let x, y ∈ Ω, x is said to dominate y if and only if fl (x) ≤ fl (y) for all l ∈ {1, .., m} and fl (x) < fl (y) for at least one l. A solution x∗ ∈ Ω is called Pareto optimal if there is no other x ∈ Ω which dominates x∗ . The set of all the Pareto optimal solutions is called the Pareto set (PS) and the solutions mapped in the objective space are called Pareto front (PF), i.e., P F = {F (x)|x ∈ P S}. In many real life applications, the PF is of great interest to decision makers for understanding the trade-off nature of the different objectives and selecting their preferred final solution. III. MOEA/D MOEA/D [2] decomposes a MOP into a number (N ) of scalar single objective optimization subproblems and optimizes them simultaneously in a collaborative manner using the concept of neighborhood between the subproblems. Each subproblem i is associated to a weight vector λi = (λi1 , ..., λim )T and the set of all weight vectors is {λ1 , ..., λN }. Several decomposition approaches have been used in the MOEA/D [25]. The Weighted Sum and Tchebycheff are two of the most common approaches used, mainly in combinatorial problems [2], [25]. P Let λ = (λ1 , ..., λm )T be a weight vector, where m l=1 λl = 1 and λl ≥ 0 for all l = 1, ..., m. Weighted Sum Approach: The optimal solution to the following scalar single-optimization problem is defined as: minimize (or maximize) g ws (x|λ) = m X λl fl (x) l=1 subject to x ∈ Ω (2) where we use g ws (x|λ) to emphasize that λ is a weight vector in this objective function. x is a Pareto optimal solution to (1) if the PF of (1) is convex (or concave). Tchebycheff approach: The optimal solution to the following scalar single-optimization problems is defined as: minimize g te (x|λ, z ∗ ) = max {λl |fl (x) − zl∗ |}; 1≤l≤m (3) subject to x ∈ Ω ∗ T ) is the reference point, i.e., zl∗ = where z ∗ = (z1∗ , ..., zm max{fl (x)|x ∈ Ω} for each l = 1, ..., m. For each Pareto optimal solution x∗ there exists a weight vector λ such that x∗ is the optimal solution of (3) and each optimal solution of (3) is Pareto optimal of (1). The neighborhood relation among the subproblems is defined in MOEA/D. The neighborhood for each subproblem i, B(i) = {i1 , ..., iT }, is defined according to the Euclidean distance between its weight vector and the other weight vectors. The relationship of the neighbor subproblems is used for the selection of parent solutions and the replacement of old solutions (also called update mechanism). The size of the neighborhood used for selection and replacement plays a vital role in MOEA/D to exchange information among the subproblems [3], [5]. Moreover, optionally, an external population EP is used to maintain all Pareto optimal solutions found during 2 This definition of domination is for minimization. For maximization, the inequalities should be reversed. 3 the search. Algorithm 1 (adapted from [3]) presents the pseudocode of the general MOEA/D which serves as a basis for this paper. Algorithm 1: General MOEA/D framework [P op, Ts , Tr , EP ] ← Initialization() // P op is the initial population of size N . Set B(i) = Ts and R(i) = Tr , where B(i) and R(i) are, respectively, the neighborhood size for selection and replacement. EP is the external population. 2 While a termination condition not met 3 For each subproblem i ∈ 1, ..., N at each generation 4 y ← Variation(B(i)) 5 Evaluate F (y) using the fitness function 6 Update_Population(P op, y, R(i)) 7 Update_EP (F (y),EP) 8 Return P op, EP 1 1) Initialization: The N weight vectors λ1 , .., λN are set. The Euclidean distance between any two weight vectors is computed. For each subproblem i, the set of neighbors for the selection step B(i) and the update step R(i) are initialized with the Ts and Tr closest neighbors respectively according to the Euclidean distance. The initial population P op = x1 , ..., xN is generated in a random way and their corresponding fitness function F (x1 ), ..., F (xN ) are computed. The external Pareto EP is initialized with the non-dominated solutions from the initial population P op. 2) Variation: The reproduction is performed using B(i) = {i1 , ..., iTs } to generate a new solution y. The conventional algorithm selects two parent solutions from B(i) and applies crossover and mutation to generate y. 3) Update Population: This step decides which subproblems should be updated from R(i) = {i1 , ..., iTr }. The current solutions of these subproblems are replaced by y if y has a better aggregation function value g te (y|λr ) than g te (xr |λr ), xr ∈ R(i) 4) Update EP: This step removes from EP the solutions dominated by y and adds y if no solution dominates it. A. Improvements on MOEA/D framework Wang et. al [3] have reported that different problems need different trade-offs between diversity and convergence, which can be controlled by the different mechanisms and parameters of the algorithm. As so far, most proposed MOEA/D versions adopted the (µ + 1)-selection/variation scheme, which selects µ individuals from a population and generates 1 offspring [3]. Different strategies for selection and replacement have been proposed [3], [5]. In this paper, the replacement proposed by [6] is used. In this strategy, the maximal number of solutions replaced by a new solution y is bounded by nr , which should be set to be much smaller than Tr . This replacement mechanism prevents one solution having many copies in the population. IV. E STIMATION OF DISTRIBUTION ALGORITHMS EDAs [14]–[16] are stochastic population-based optimization algorithms that explore the space of candidate solutions by sampling a probabilistic model constructed from a set of selected solutions found so far. Usually, in EDAs, the population is ranked according to the fitness function. From this ranked population, a subset of the most promising solutions are selected by a selection operator (such as: Truncation selection with truncation threshold t = 50%). The algorithm then constructs a probabilistic model which attempts to estimate the probability distribution of the selected solutions. Then, according to the probabilistic model, new solutions are sampled and incorporated into the population, which can be entirely replaced [26]. The algorithm stops when a termination condition is met such as the number of generations. We work with positive distributions denoted by p. p(xI ) denotes the marginal probability for XI = xI . p(xj | xk ) denotes the conditional probability distribution of Xj = xj given Xk = xk . The set of selected promising solutions is represented as S. Algorithm 2 presents the general EDA procedure. Algorithm 2: General EDA 1 2 3 4 5 6 P op ← Generate N solutions randomly While a termination condition not met For each solution xi compute its fitness function F (xi ) Select the most promising solutions S from P op Build a probabilistic model M of solutions in S Generate new candidate solutions sampling from M and add them to P op The way in which the learning and sampling components of the algorithm are implemented are also critical for their performance and computational cost [14]. In the next section, the univariate and tree-based probabilistic models are introduced. A. Univariate probabilistic models In the univariate marginal distribution (or univariate probabilistic model), the variables are considered to be independent, and the probability of a solution is the product of the univariate probabilities for all the variables: pu (x) = n Y p(xj ) (4) j=1 One of the simplest EDAs that use the univariate model is the univariate marginal distribution algorithm (UMDA) [27]. UMDA uses a probability vector pu (x) as the probabilistic model, where p(xj ) denotes the univariate probability associated to the corresponding discrete value. In this paper we focus on binary problems. To learn the probability vector for these problems, each p(xj ) is set to the proportion of "1s" in the selected population S. To generate new solutions, each variable is independently sampled. Random values are assigned to the variables and following the corresponding univariate distribution. The population-based incremental learning (PBIL) [28], like UMDA, uses the probabilistic model in the form of a probability vector pu (x). The initial probability of a "1" in each position p(xj ) is set to 0.5. The probability vector is 4 updated using each selected solution x in S. For each variable, the corresponding entry in the probability vector is updated by: p(xj ) = (1.0 − α)p(xj ) + (α ∗ xj ) (5) where α is the learning rate specified by the user. To prevent premature convergence, each position of the probability vector is slightly varied at each generation based on a mutation rate parameter [26], [28]. Recently, it has been acknowledged [29] that implementations of the probabilistic vector update mechanism in PBIL are in fact different, and produce an important variability in the behavior of PBIL. Univariate approximations are expected to work well for functions that can be additively decomposed into functions of P order one (e.g. g(x) = j xj ). Also, other non additively decomposable functions can beQsolved P with EDAs that use univariate models (e.g. g(x) = j xj + j xj ) [30]. will be able to capture the most relevant bivariate dependencies between the problem variables. Details on EDAs that use the tree models can be obtained from [31], [33]. More details on the use of PGMs for probabilistic modeling in EDAs can be obtained from [14]. C. Optimal Mutation Rate for EDAs Most of EDAs do not use any kind of stochastic mutation. However, for certain problems, lack of diversity in the population is a critical issue that can cause EDAs to produce poor results due to premature convergence. As a remedy to this problem, in [34], the authors propose the use of Bayesian priors as an effective way to introduce a mutation operator into UMDA. Bayesian priors are used for the computation of the univariate probabilities in such a way that the computed probabilities will include a mutation-like effect. In this paper we use the Bayesian prior as a natural way to introduce B. Tree-based models mutation in the MOEA/D-GM. In the following this strategy Different from the EDAs that use univariate models, some is described. There are two possibilities to estimate the probability of EDAs can assume dependencies between the decision vari"head" of a biased coin. The maximum-likelihood estimate ables. In this case, the probability distribution is represented counts the number of occurrences of each case. With m times by a PGM. "head" in l throws, the probability is estimated as p = ml . Tree-based models [31] are PGMs capable to capture some pairwise interactions between variables. In a tree model, the The Bayesian approach assumes that the probability of "head" conditional probability of a variable may only depend on at of a biased coin is determined by an unknown parameter θ. Starting from an a priori distribution of this parameter. Using most one other variable, its parent in the tree. rule the univariate probability is computed as The probability distribution pT (x) that is conformal with a the Bayesian m+r , and the so called hyperparameter r has to be chosen p = l+2r tree model is defined as: in advance. n Y To relate the Bayesian prior to the mutation, the authors p(xj |pa(xj )), (6) pT (x) = used the following theorem: For binary variables, the exj=1 pectation value for the probability using a Bayesian prior where pa(Xj ) is the parent of Xj in the tree, and with parameter r is the same as mutation with mutation rate p(xj |pa(xj )) = p(xj ) when pa(Xj ) = ∅, i.e. Xj is a root µ = r and using the maximum likelihood estimate [34]. l+2r of the tree. The bivariate marginal distribution algorithm (BMDA) proV. MOEA/D-GM: A N MOEA/D ALGORITHM WITH posed in [31] uses a model based on a set of mutually GRAPHICAL MODELS 3 independent trees (a forest) . In each iteration of the algorithm, Algorithm 3 shows the steps of the proposed MOEA/Da tree model is created and sampled to generate new candidate solutions based on the conditional probabilities learned from GM framework. First, the initialization procedure generates N initial solutions and the external Pareto (EP) is initialized with the population. The algorithm Tree-EDA proposed in [32] combines fea- the non-dominated solutions. Within the main while-loop, in tures from algorithms introduced in [33] and [31]. In Tree- case the termination criteria are not met, for each subproblem i, a probabilistic model is learned using as base population EDA, the learning procedure works as follows: • Step 1: Compute the univariate and bivariate marginal fre- all solutions in the neighborhood B(i). Then, the sampling quencies pj (xj ) and pjk (xj |xk ) using the set of selected procedure is used to generate a new solution from the model. The new solutions is used to update the parent population promising solutions S; according to an elite-preserving mechanism. Finally, the new • Step 2: Calculate the matrix of mutual information using solution is used to update EP as described in Algorithm 1. the univariate and bivariate frequencies; A simple way to use probabilistic models into MOEA/D • Step 3: Calculate the maximum weight spanning tree is learning and sampling a probabilistic model for each scalar from the mutual information. Compute the parameters of subproblem i using the set of closest neighbors as the selected the model. population. Therefore, at each generation, the MOEA/D-GM The idea is that by computing the maximum weight spankeeps N probabilistic models. ning tree from the matrix of mutual information the algorithm The EDAs presented in the previous section: (i) UMDA [27], (ii) PBIL [28] and (iii) Tree-EDA [32] can be instantiated 3 For convenience of notation, this set of mutually independent trees is in the framework. Also, the genetic operators (crossover and refereed as Tree. 5 Algorithm 3: MOEA/D-GM 1 [P op, Ts , Tr , EP ] ← Initialization() // P op is the initial population of size N that is randomly generated. Set B(i) = Ts and R(i) = Tr , where B(i) and R(i) are, respectively, the neighborhood size for selection and replacement. EP is the external population. 2 While a termination condition not met 3 For each subproblem i ∈ 1, ..., N at each generation 4 Learning() 5 Case GA: Choose two parent solutions x1 x2 from B(i) 6 Case UMDA: Learn a probabilistic vector pi using the solutions from B(i) 7 Case PBIL: Learn an incremental probabilistic vector pi using the solutions from B(i) 8 Case Tree-EDA: Learn a tree model piT using the solutions from B(i) Sampling() // Try up to Ts times to sample a new solution y that is different from any solution from B(i) Case GA: Apply the crossover and mutation to generate y 9 10 11 Case PBIL or UMDA: Sample y using the probability vector pi 12 Case Tree-EDA: Sample y using the tree model piT 13 Compute the fitness function F (y) 14 Update_Population(P op, y, R(i)) 15 Update_EP (F (y),EP) 16 Return P op, EP mutation), that are used in the standard MOEA/D, can be applied using the learning and sampling procedures. The general MOEA/D-GM allows the introduction of other types of probabilistic graphical models (PGMs) like Bayesian networks [35] and Markov networks [36]. Different classes of PGMs can be also used for each scalar subproblem but we do not consider this particular scenario in the analysis presented here. Moreover, the MOEA/D-GM introduces some particular features that are explained in the next section. 1) Learning models from the complete neighborhood: Usually in EDAs, population sizes are large and the size of the selected population can be as high as the population size. In MOEA/D, each subproblem has a set of neighbors that plays a similar role to the selected population4. Therefore, the main difference between the MOEA/D-GM and the EDAs presented in section IV is that, in the former, instead of selecting a subset of individuals based on their fitness to keep a unique probabilistic model, a probabilistic model is computed over the neighborhood solutions of each scalar subproblem. 2) Diversity preserving sampling: In preliminary experiments we detected that one cause for early convergence of the algorithm was that solutions that were already in the population were newly sampled. Sampling solutions already present in the population is also detrimental in terms of efficiency since these solutions have to be evaluated. As a way to avoid this situation, we added a simple procedure in which each new sampled solution is tested for presence in the neighborhood B(i) of each subproblem i. If a new sampled solution y is equal to a parent solution from B(i) then the algorithm discards the solution and samples a new one until a different solution has been found or a 4 Usually, the size of the neighborhood is N × 0.1. Although, as in [6], the propose MOEA/D has a low probability to select two parent solutions from the complete population. maximum number of trials is reached. This procedure is specially suitable to deal with expensive fitness functions. The maximum number of tries can be specified by the user. We call the sampling that incorporates this verification procedure as diversity preserving sampling (ds). When it is applied on MOEA/D-GM, to emphasize it, the algorithm is called MOEA/D-GM-ds. VI. M ULTI - OBJECTIVE D ECEPTIVE O PTIMIZATION P ROBLEM There exists a class of scalable problems where the difficulty is given by the interactions that arise among subsets of decision variables. Thus, some problems should require the algorithm to be capable of linkage learning, i.e., identifying and exploring interactions between the decision variables to provide effective exploration. Decomposable deceptive problems [37] have played a fundamental role in the analysis of EAs. As mentioned before, one of the advantages of EDAs that use probabilistic graphical models is their capacity to capture the structure of deceptive functions. Different works in the literature have proposed EDAs [38]–[41] and MO-EDAs [42], [43] for solving decomposable deceptive problems. One example of this class of decomposable deceptive functions is the Trap-k, where k is the fixed number of variables in the subsets (also called, partitions or building blocks) [38]. Traps deceive the algorithm away from the optimum if interactions between the variables in each partition are not considered. According to [42], that is why standard crossover operators of genetic algorithms fail to solve traps unless the bits in each partition are located close to each other in the chosen representation. Pelikan et al [42] used a bi-objective version of Trap-k for analyzing the behavior of multi-objective hierarchical BOA (hBOA). The functions ftrap5 (Equation (7)) and finv_trap5 (Equation (8)) consist in evaluating a vector of decision variables x ∈ {0, 1}n, in which the positions of x are divided into disjoint subsets or partitions of 5 bits each (n is assumed to be a multiple of 5). The partition is fixed during the entire optimization run, but the algorithm is not given information about the partitioning in advance. Bits in each partition contribute to trap of order 5 using the following functions: ftrap5 (x) = l−1 X 5 X trap5(x5∗k+i ) (7) k=0 i=1 ( 5 trap5(u) = 4−u finv_trap5 (x) = l−1 X 5 X if u = 5 if u < 5 inv_trap5(x5∗k+i ) (8) k=0 i=1 ( 5 inv_trap5(u) = u−1 if u = 0 if u > 0 where l is the number of building blocks, i.e., n = 5l, and u is the number of ones in the input string of 5 bits. 6 In the bi-objective problem, ftrap5 and finv_trap5 are conflicting. Thus, there is not one single global optimum solution but a set of Pareto optimal solutions. Moreover, the amount of possible solutions grows exponentially with the problem size [39]. Multi-objective Trap-k has been previously investigated for Pareto based multi-objective EDAs [42]–[44]. VII. R ELATED WORK In this section we review a number of related works emphasizing the differences to the work presented in this paper. Besides, we did not find any previous report of multi-objective decomposition approaches that incorporate PGMs for solving combinatorial MOPs. A. MOEA/D using univariate EDAs In [21], the multi-objective estimation of distribution algorithm based on decomposition (MEDA/D) is proposed for solving the multi-objective Traveling Salesman Problem (mTSP). For each subproblem i, MEDA/D uses a matrix Qi to represent the connection "strength" between cities in the best solutions found so far. Matrix Qi is combined with a priori information about the distances between cities of problem i, in a new matrix P i that represents the probability that the sth and tth cities are connected in the route of the ith sub-problem. Although each matrix P i encodes a set of probabilities relevant for each corresponding TSP subproblem, these matrices can not be considered PGMs since they do not comprise a graphical component representing the dependencies of the problem. The type of updates applied to the matrices is more related to parametric learning than to structural learning as done in PGMs. Furthermore, this type of "models" resemble more the class of structures traditionally used for ACO and they heavily depend on the use of prior information (in the case of MEDA/D, the incorporation of information about the distances between cities). Therefore, we do not consider MEDA/D as a member of the MOEA/D-GM class of algorithms. Another approach combining the use of probabilistic models and MOEAD for mTSP is presented in [20]. In that paper, a univariate model is used to encode the probabilities of each city of the TSP being assigned to each of the possible positions of the permutation. Therefore, the model is represented as a matrix of dimension n × n comprising the univariate probabilities of the city configurations for each position. One main difference of this hybrid MEDA/D with our approach, and with the proposal of Zhou et al [21], is that a single matrix is learned using all the solutions. Therefore, the information contained in the univariate model combines information from all the subproblems, disregarding the potential regularities contained in the local neighborhoods. Furthermore, since the sampling process from the matrix does not take into account the constraints related to the permutations, repair mechanisms and penalty functions are used to "correct" the infeasible solutions. As a consequence, much of the information sampled from the model to the solution can be modified by the application of the repair mechanism. These previous MEDA/Ds were applied for solving permutation-based MOPs. The application of EDAs for solving permutation problems is increasing in interest. A number of EDAs have been also specifically designed to deal with permutation-based problems [45], [46]. The framework proposed in this paper is only investigated for binary problems. However, EDAs that deal with the permutation space can be incorporated into the framework in the future. In [22], the authors proposed a univariate MEDA/D for solving the (binary) multi-objective knapsack problem (MOKP) that uses an adaptive operator at the sampling step to preserve diversity, i.e., prevents the learned probability vector from premature convergence. Therefore, the sampling step depends on both the univariate probabilistic vector and an extra parameter "r". B. MOEA/D using multivariate EDAs In [23], a decomposition-based algorithm is proposed to solve many-objective optimization problems. The proposed framework (MACE-gD) involves two ingredients: (i) a concept called generalized decomposition, in which the decision maker can guide the underlying search algorithm toward specific regions of interest, or the entire Pareto front and (ii) an EDA based on low-order statistics, namely the cross-entropy method [47]. MACE-gD is applied on a set of many-objective continuous functions. The obtained results showed that the proposed algorithm is competitive with the standard MOEA/D and RM-MEDA [48]. The class of low-order statistics used by MACE-gD (Normal univariate models) limit the ability of the algorithm to capture and represent interactions between the variables. The univariate densities are updated using an updating rule as the one originally proposed for the PBIL algorithm [28]. In [24], the covariance matrix adaptation evolution strategy (CMA-ES) [49] is used as the probabilistic model of MOEA/D. Although CMA-ES was introduced and has been developed in the context of evolutionary strategies, it learns a Gaussian model of the search. The covariance matrix learned by CMAES is able to capture dependencies between the variables. However, the nature of probabilistic modeling in the continuous domain is different to the one in the discrete domain. The methods used for learning and sampling the models are different. Furthermore, the stated main purpose of the work presented in [24] was to investigate to what extent the CMAES could be appropriately integrated in MOEA/D and what are the benefits one could obtain. Therefore, emphasis was put on the particular adaptations needed by CMA-ES to efficiently learn and sample its model in this different context. Since these adaptations are essentially different that the ones required by the discrete EDAs used in this paper, the contributions are different. C. Other MO-EDAs Pelikan et al. [17] discussed the multi-objective decomposable problems and their difficulty. The authors attempted to review a number of MO-EDAs, such as: multi-objective mixturebased iterated density estimation algorithm (mMIDEA) [50], multi-objective mixed Bayesian optimization algorithm (mmBOA) [51] and multi-objective hierarchical BOA (mohBOA) [52]. Moreover, the authors introduced an improvement to 7 mohBOA. The algorithm combines three ingredients: (i) the VIII. E XPERIMENTS hierarchical Bayesian optimization algorithm (hBOA) [52], The proposed MOEA/D-GM framework has been imple(ii) the multi-objective concepts from NSGAII [53] and (iii) mented in C++. In the comparison study, four different instanclustering in the objective space. The experimental study tiations are used. For convenience, we called each algorithm showed that the mohBOA efficiently solved multi-objective instantiated as: MOEA/D-GA, MOEA/D-UMDA, MOEA/Ddecomposable problems with a large number of competing PBIL and MOEA/D-Tree. building blocks. The algorithm was capable of effective reTo evaluate the algorithms, the deceptive functions ftrap5 combination by building and sampling Bayesian networks with and f inv_trap5 (Section VI) are used to compose the bidecision trees, and significantly outperformed algorithms with objective Trap problem with different number of variables standard variation operators on problems that require effective n ∈ {30, 50, 100}. Equation (9) defines the notation of the linkage learning. bi-Trap function. All MO-EDAs covered in [17] are Pareto-based and they use concepts from algorithms such as NSGAII and SPEA2 [51]. Since, in the past few years, the MOEA/D framework bi-T rap(x) = (ftrap5 (x), finv_trap5 (x)) (9) has been one of the major frameworks to design MOEAs [5], subject to x ∈ {0, 1}n incorporating probabilistic graphical models into MOEA/D seems to be a promising technique to solve scalable deceptive A. Performance metrics multi-objective problems. Martins et al. [43] proposed a new approach for solvThe true PF from bi-Trap is known. Therefore, two perforing decomposable deceptive multi-objective problems. The mance metrics are used to evaluate the algorithms performance: MO-EDA, called moφGA, uses a probabilistic model based (i) inverted generational distance metric (IGD) [54], and (ii) on a phylogenetic tree. The moφGA was tested on the the number of true Pareto optimal solutions found by the multi-objective deceptive functions ftrap5 and finv_trap5 . The algorithm through the generations. The stop condition for all moφGA outperformed mohBOA in terms of number of func- the algorithms is 5n generations. tion evaluations to achieve the exact PF, specially when the Let P ∗ be a set of uniformly distributed Pareto optimal problem in question increased in size. solutions along the true P F in the objectives. P be an A question discussed in [43] is: if such probabilistic model approximated set to the true P F obtained by an algorithm. can identify the correct correlation between the variables of IGD-metric [54]: The inverted generational distance from a problem, the combination of improbable values of variables P ∗ to P is defined as can be avoided. However, as the model becomes more exPv∈P ∗ d(v, P ) ∗ pressive, the computational cost of incurred by the algorithm (10) IGD(P , P ) = |P ∗ | to build the model also grows. Thus, there is a trade-off between the efficiency of the algorithm for building models where d(v, P ) is the minimum Euclidean distance between v and its accuracy. In our proposal, at each generation, N and the solutions in P . If |P ∗ | is large enough IGD(P ∗ , P ) probabilistic graphical models are kept. Therefore, a higher could measure both convergence and diversity of P in a sense. number of subproblems N can be a drawback for the proposal The lower the IGD(P ∗ , P ), the better the approximation of in terms of efficiency (time consuming). However, if the P ∗ to the true PF. proposed MOEA/D-GM has an adequate commitment between Number of true Pareto optimal solutions: The number of the efficiency and accuracy (approximated PF) then it is Pareto solutions that composes P that belongs to the P ∗ is expected to behave satisfactorily. defined as |P + | = |P ∗ ∩ P | (11) D. Contributions with respect to previous work We summarize some of the main contributions of our work where |P + | is the cardinality of P + . with respect to the related research. Also, we use the statistical test Kruskall-Wallis [55] to rank • We use, for the first time, a probabilistic graphical model the algorithms according to the results obtained by the metrics. within MOEA/D to solve combinatorial MOPs. In this If two or more algorithms achieve the same rank, it means that case, the previous MOEA/Ds that incorporate probabilis- there is no significant difference between them. tic models cover only univariate models. • We investigate a particular class of problems (deceptive B. Parameters Settings MOPs) for which there exist extensive evidence about the The following parameters settings were used in the expericonvenience of using probabilistic graphical models. mental study: • We introduced in MOEA/D the class of probabilistic models where the structure of the model is learned from 1) Number of subproblems (N ): As in most of MOEA/D the neighborhood of each solution. algorithms proposed in the literature [2], [6], [5], the • We investigate the question of how the problem innumber of subproblems N and their correspondent weight vectors λ1 , . . . , λN are controlled by a parameter teractions are kept in the scalarized subproblems and how these interactions are translated to the probabilistic H, which makes a wide spread distribution of the weight m−1 models. vectors according to N = CH+m−1 . Thus, for the 8 TABLE I: Results from the average IGD and average number of true Pareto optimal solutions |P + | computed form the 30 runs for each combination (problem size n× Algorithm × preserving sampling). The column |P ∗ | is the total number of true Pareto solutions for each problem n. |P ∗ | n 30 50 100 7 11 21 MOEA/D-GA Average number of true Pareto optimal solutions |P + | diversity preserving sampling (ds) standard sampling MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree MOEA/D-GA MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree 4.167 3.867 3.3 3.034 2.567 2.534 2.767 3.034 3.5 6.067 5.134 2.967 6.267 6.634 5.334 4.034 2.867 2.8 4.134 3.2 3.433 6.9 9.5 9.367 1.258 3.4 7.473 1.246 3.158 6.726 0.053 0.501 3.359 average IGD measure IGD(P ∗ , P ) 30 50 100 7 11 21 1.076 2.174 4.757 1.764 3.585 7.663 1.853 3.229 6.38 0.418 1.657 4.815 0.371 1.308 4.142 TABLE II: Kruskall Wallis statistical ranking test according to the IGD and |P + | for each combination (problem size n× Algorithm × preserving sampling). The first value is the average rank over the 240 runs (i.e., 30 runs × 8 algorithms). The second value (in brackets) is the final ranking from 8 to 1. If two or more ranks are the same, it means that there is no significant difference between them. Kruskall-Wallis ranking - number of true Pareto optimal solutions |P + | n MOEA/D-GA standard sampling MOEA/D-PBIL MOEA/D-UMDA 30 50 100 139.37 (5.50) 126.48 (5.00) 136.43 (5.50) 184.88 (6.00) 188.30 (6.50) 178.67 (6.00) 195.72 (6.50) 165.55 (6.00) 120.37 (5.00) 30 50 100 134.13 (5.50) 106.88 (3.50) 80.30 (2.50) 187.05 (6.00) 194.43 (6.50) 204.03 (7.00) 195.22 (6.50) 169.37 (6.50) 145.72 (6.00) MOEA/D-Tree MOEA/D-GA 66.25 (2.00) 88.15 (3.00) 151.77 (5.50) 59.43 (2.00) 52.65 (2.00) 61.58 (2.00) diversity preserving sampling (ds) MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree 146.68 (6.00) 171.40 (6.00) 162.40 (5.50) 141.87 (6.00) 153.43 (6.00) 128.37 (5.50) 29.80 (2.00) 18.03 (1.50) 24.42 (1.50) 148.67 (6.00) 179.35 (6.50) 195.37 (6.50) 144.38 (6.00) 160.17 (6.00) 162.12 (6.50) 29.80 (2.00) 21.00 (2.00) 38.93 (2.50) Kruskall-Wallis ranking - IGD measure 65.32 (2.00) 74.47 (2.50) 82.08 (2.50) 59.43 (2.00) 58.33 (2.50) 55.45 (2.50) 10 6 8 Average true Pareto solutions Average true Pareto solutions 9 7 6 5 4 3 2 1 MOEA/D-Tree standard sampling MOEA/D-Tree diversity preserving sampling 0 0 50 100 150 200 250 300 350 400 5 4 3 2 1 MOEA/D-GA standard sampling MOEA/D-GA diversity preserving sampling 0 450 500 Generations 0 50 100 150 200 250 300 350 400 450 500 Generations (a) MOEA/D-Tree (b) MOEA/D-GA + Fig. 1: Average true Pareto optimal solutions |P | over the generations. Each chart shows a comparison between the standard sampling and the diversity preserving sampling using the same algorithm. 2) 3) 4) 5) bi-objective problem, we set H = 200, consequently N = 201. Neighborhood size (Ts ): As the number of selected solutions is crucial for EDAs, we test a range of neighborhood size values Ts = (1, 5, 10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 150). Also, as in [3], Ts = Tr . Maximal number of replacements by a new solution (nr ): As in [6], nr = 2. Scalarization function: We have applied both Weighted Sum and Tchebycheff approaches. As both achieve very similar results, only the results with Tchebycheff are presented in this paper. Maximum number of tries in diversity preserving sam- pling procedure: We set this parameter with the same value of the neighborhood size Ts . 6) Genetic operators from MOEA/D-GA: uniform crossover and mutation rate= n1 . 7) PBIL learning rate: α = 0.05. Each combination of (algorithm × parameters setting) is independently run 30 times for each problem size n. C. Comparison of the different variants of MOEA/D-GM for the bi-Trap5 First, the algorithms are evaluated using a fixed neighborhood size value (Ts = 20). Table I presents the average values of the IGD and the number of true Pareto solutions |P + | computed using the approximated PF found by the algorithms. 10 10 9 9 8 8 Average true Pareto solutions Average true Pareto solutions 9 7 6 5 4 3 2 MOEA/D-GA MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree 1 0 0 50 100 150 200 7 6 5 4 3 2 MOEA/D-GA MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree 1 0 250 0 50 100 150 200 Generations 250 300 350 400 450 500 Generations (a) n = 50 (b) n = 100 + Fig. 2: Average true Pareto solutions |P | through the generations for problem size 50 and 100 with Ts = 20 MOEA/D-GA MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree MOEA/D-GA MOEA/D-PBIL MOEA/D-UMDA MOEA/D-Tree 5 14 4.5 12 3.5 Average IGD Average IGD 4 3 2.5 2 1.5 10 8 6 4 1 2 0.5 0 0 1 5 10 20 30 40 50 60 70 80 90 100 150 1 5 10 20 30 40 50 60 70 Neighborhood Size Neighborhood Size (a) n = 50 (b) n = 100 80 90 100 150 Fig. 3: Average IGD with different neighborhood sizes for selection Ts ∈ {1, 5, 10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 150} Table II presents the results of the Kruskall-Wallis test (at explanation for this behavior is a potential advantageous effect 5% significance level) applied to the results obtained by the introduced by the clustering of the solutions determined by the algorithms (the same results summarized in Table I). The MOEA/D framework. This benefit would be independent of best rank algorithm(s) is(are) shown in bold. Figure 1 and 2 the type of models used to represent the solutions. Grouping show the behavior of the algorithms throughout the generations similar solutions in a neighborhood may allow the univariate according to the average |P + | obtained. algorithm to produce some global optima, even if the functions From the analysis of the results, we can extract the following are deceptive. conclusions: According to Table II, the MOEA/D-Tree that uses the D. Influence of the neighborhood size selection Ts for the diversity preserving mechanism (MOEA/D-Tree-ds) is the learning only algorithm that has achieved the best rank in all the The neighborhood size has a direct impact in the search cases according to both indicators. Moreover, the diversity ability of the MOEA/Ds, which can balance convergence and preserving sampling has improved the behavior of all the diversity for the target problem. Figure 3 presents the IGD algorithms (mainly the MOEA/D-GA and MOEA/D-Tree) in values obtained with different neighborhood sizes (Ts ). terms of the quality of the approximation to the true PF. Figure As we mentioned before, the number of selected solutions 1 confirms these results. Therefore, the diversity preserving has an impact for most of the EDAs. A multi-variate EDA sampling has a positive effect in the algorithms for the bi- needs a large set of selected solutions to be able to learn Trap5 problem, i.e., the algorithms are able to achieve a dependencies between the decision variables [30]. This fact more diverse set of solutions. Additionally, Figure 2 shows may explain (see Figure 3) that the differences between the that MOEA/D-Tree-ds achieves better results than the other algorithms are lower as the neighborhood size becomes smaller algorithms from the first generations. (e.g., Ts = 5). A remarkable point in these results is that, a Moreover, all the algorithms can find, at least, one global small Ts is better to solve bi-Trap5 for the algorithms except optimal solution, i.e., a true Pareto solution. One possible for MOEA/D-Tree-ds. MOEA/D-Tree-ds achieves good results 10 50 3000 ’extreme0d70.dat.txt’ matrix 2500 40 50 3000 "extreme0d70.dat.txt" matrix 2500 40 2000 30 2000 30 1500 20 1500 20 1000 10 500 0 0 0 10 20 30 40 1000 10 500 0 50 0 0 (a) Ts = 20, subproblem i = 1 10 20 30 40 50 (b) Ts = 70, subproblem i = 1 50 1800 50 4000 1600 "extreme200d20.dat.txt" matrix 40 1400 "extreme200d70.dat.txt" matrix 3500 40 3000 1200 30 1000 800 20 2500 30 2000 20 1500 600 400 10 1000 10 500 200 0 0 0 10 20 30 40 0 50 0 0 (c) Ts = 20, subproblem i = 201 10 20 30 40 50 (d) Ts = 70, subproblem i = 201 50 3000 "extreme100d20.dat.txt" matrix 2500 40 50 3000 "extreme100d70.dat.txt" matrix 2500 40 2000 30 2000 30 1500 20 1500 20 1000 10 500 0 0 0 10 20 30 40 50 (e) Ts = 20, subproblem i = 100 1000 10 500 0 0 0 10 20 30 40 50 (f) Ts = 70, subproblem i = 100 Fig. 4: Frequency matrices (heat maps) learned by the subproblems i = (1, 100, 201) from the MOEA/D-Tree-ds for problem size n = 50. with a large neighborhood size (e.g., 60, 70 and 80). Even if the neighborhood size has an important influence in the behavior of the algorithm, this parameter can not be seen in isolation of other parameters that also influence the behavior of the algorithm. E. Analyzing the structure of problems as captured by the tree model One of the main benefits of EDAs is their capacity to reveal a priori unknown information about the problem structure. Although this question has been extensively studied [40], [56], [57] in the single-objective domain, the analysis in the multiobjective domain are still few [19], [58], [59]. Therefore, a relevant question was to determine to what extent is the structure of the problem captured by the probabilistic models used in MOEA/D-GM. This is a relevant question since there is no clue about the types of interactions that could be captured from models learned for scalarized functions. In this section, the structures learned from MOEA/D-Tree-ds while solving different subproblems are investigated. In each generation, for each subproblem, a tree model is built according to the bi-variate probabilities obtained from its selected population. We can represent the tree model as a matrix Mn×n , where each position Mjk represents a relationship (pairwise) between two variables j, k. Mjk = 1 if j is the parent of k in tree model learned, otherwise Mjk = 0. Figure 4 represents the merge frequency matrices obtained by the 30 runs. The frequencies are represented using heat 11 maps, where lighter colors indicate a higher frequency. We the structure of the objective functions. The analysis has have plotted the merge matrices learned from the extreme been conducted for MOEA/D-Tree-ds considering the strucsubproblems and the middle subproblem i.e., i = (1, 100, 201) tures learned with different neighborhood sizes and different using the problem size n = 50. Because of the results of the subproblems. We have found that even if relatively small previous section, the frequency matrices for two neighborhood neighborhoods are used (in comparison with the standard sizes are presented, Ts = (20, 70). population sizes used in EDAs), the models are able to capture The matrices clearly show a strong relationship between the the interactions of the functions. One potential application of subsets of variables "building blocks" of size 5, which shows this finding, is that, we could reuse or transfer models between that the algorithm is able to learn the structure of the Trap5 subproblems, in a similar way to the application of structural functions. Notice that, for neighborhood size 70, the MOEA/D- transfer between related problems [60]. Tree-ds was able to capture more accurate structures, which The scalability of MOEA/D-Tree-ds for the bi-Trap5 probexalts the good results found in accordance with the IGD lem and other multi-objective deceptive functions should metric. This can be explained by the fact that a higher be investigated. The "most appropriate" model for bi-Trap5 population size reduces the number of spurious correlations should be able to learn higher order interactions (of order learned from the data. 4). Therefore, PGMs based on Bayesian or Markov networks Moreover, analyzing the different scalar subproblems, we could be of application in this case. can see that, the algorithm is able to learn a structure even for The directions for future work are: (i) Conceive strategies the middle scalar subproblem i = 100, where the two conflict to avoid learning a model for each subproblem. This would objectives functions ftrap5 and finv_trap5 compete in every improve the results in terms of computational cost; (ii) Use partition (building block) of the decomposable problem. of the most probable configurations of the model to speed up convergence; (iii) Consider the application of hybrid schemes IX. C ONCLUSIONS AND FUTURE WORK incorporating local search that take advantage of the informaIn this paper, a novel and general MOEA/D framework able tion learned by the models; (iv) Evaluate MOEA/D-GM on to instantiate probabilistic graphical models named MOEA/D- other benchmarks of deceptive MOPs. GM has been introduced. PGMs are used to obtain a more comprehensible representation of a search space. Consequently, ACKNOWLEDGMENTS the algorithms that incorporate PGMs can provide a model This work has received support by CNPq (Productivity expressing the regularities of the problem structure as well Grant Nos. 305986/2012-0 and Program Science Without Boras the final solutions. The PGM investigated in this paper ders Nos.: 400125/2014-5), by CAPES (Brazil Government), takes into account the interactions between the variables by by IT-609-13 program (Basque Government) and TIN2013learning a maximum weight spanning tree from the bi-variate 41272P (Spanish Ministry of Science and Innovation). probabilities distributions. An experimental study on a biobjective version of a well known deceptive function (biR EFERENCES Trap5) was conducted. In terms of accuracy (approximating [1] C. C. Coello, G. Lamont, and D. van Veldhuizen, Evolutionary Algoof the true PF), the results have shown that the instantiation rithms for Solving Multi-Objective Problems., 2nd ed., ser. Genetic and from MOEA/D-GM, called MOEA/D-Tree, is significantly Evolutionary Computation. Berlin, Heidelberg: Springer, 2007. [2] Q. Zhang and H. Li, “MOEA/D: A multiobjective evolutionary algorithm better than MOEA/D that uses univariate EDAs and traditional based on decomposition,” IEEE Transactions on Evolutionary Compugenetic operators. tation, vol. 11, no. 6, pp. 712–731, 2007. Moreover, other enhancement has been introduced in [3] Z. Wang, Q. Zhang, G. Maoguo, and Z. Aimin, “A Replacement Strategy for Balalancing Convergence and Diversity in MOEA/D,” in Proceedings MOEA/D. A new simple but effective mechanism of sampling of the Congress on Evolutionay Computation (CEC). IEEE, 2014, pp. has been proposed, called diversity preserving sampling. Since 2132–2139. sampling solutions already present in the neighbor solutions [4] K. Deb and H. Jain, “An evolutionary many-objective optimization algorithm using reference-point-based nondominated sorting approach, part I: can have a detrimental effect in terms of convergence, the solving problems with box constraints,” IEEE Transaction Evolutionary diversity preserving sampling procedure tries generating those Computation, vol. 18, no. 4, pp. 577–601, 2014. solutions that are different from the parent solutions. Accord- [5] K. Li, K. Deb, Q. Zhang, and S. Kwong, “An evolutionary manyobjective optimization algorithm based on dominance and decomposiing to both performance indicators, all the algorithms in the tion.” IEEE Trans. Evolutionary Computation, no. 5, pp. 694–716, 2015. comparison have improved their results in terms of diversity [6] H. Li and Q. Zhang, “Multiobjective Optimization Problems with to the approximation PF. Complicated Pareto Sets, MOEA/D and NSGA-II,” IEEE Transaction on Evolutionary Computation, pp. 284–302, 2008. An analysis of the influence of the neighborhood size on the behavior of the algorithms were conducted. In general, [7] H. Ishibuchi, N. Akedo, and Y. Nojima, “A Study on the Specification of a Scalarizing Function in MOEA/D for Many-Objective Knapsack increasing the neighborhood size has a detrimental effect. Problems.” in Proceedings of the 7th International Learning and Intelligent Optimization Conference (LION), ser. Lecture Notes in Computer Although, this is not always the case for MOEA/D-Tree. Science, vol. 7997. Springer, 2013, pp. 231–246. Also, independent of the type of models used to represent [8] Y.-y. Tan, Y.-c. Jiao, H. Li, and X.-k. Wang, “MOEA/D+ uniform the solutions, grouping similar solutions in a neighborhood design: A new version of MOEA/D for optimization problems with many objectives,” Computers & Operations Research, vol. 40, no. 6, may allow to produce some global optima, even if the funcpp. 1648–1660, 2013. tions are deceptive. [9] A. J. Nebro and J. J. Durillo, “A study of the parallelization of the Finally, we have also investigated for the first time to what multi-objective metaheuristic MOEA/D,” in Learning and Intelligent Optimization. Springer, 2010, pp. 303–317. extent the models learned by MOEA/D-GMs can capture 12 [10] M. Pilat and R. Neruda, “Incorporating user preferences in MOEA/D through the coevolution of weights,” in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO). ACM, 2015, pp. 727– 734. [11] Y. Qi, X. Ma, F. Liu, L. Jiao, J. Sun, and J. Wu, “MOEA/D with adaptive weight adjustment,” Evolutionary computation, vol. 22, no. 2, pp. 231– 264, 2014. [12] A. Alhindi and Q. Zhang, “MOEA/D with tabu search for multiobjective permutation flow shop scheduling problems,” in Proceedings of the IEEE Congress on Evolutionary Computation, CEC 2014, Beijing, China, July 6-11, 2014. IEEE, 2014, pp. 1155–1164. [13] L. Ke, Q. Zhang, and R. Battiti, “Hybridization of decomposition and local search for multiobjective optimization,” IEEE T. Cybernetics, vol. 44, no. 10, pp. 1808–1820, 2014. [14] P. Larrañaga, H. Karshenas, C. Bielza, and R. Santana, “A review on probabilistic graphical models in evolutionary computation,” Journal of Heuristics, vol. 18, no. 5, pp. 795–819, 2012. [15] J. A. Lozano, P. Larrañaga, I. Inza, and E. Bengoetxea, Eds., Towards a New Evolutionary Computation: Advances on Estimation of Distribution Algorithms. Springer, 2006. [16] H. Mühlenbein and G. Paaß, “From recombination of genes to the estimation of distributions I. Binary parameters,” in Parallel Problem Solving from Nature - PPSN IV, ser. Lectures Notes in Computer Science, H.-M. Voigt, W. Ebeling, I. Rechenberg, and H.-P. Schwefel, Eds., vol. 1141. Berlin: Springer, 1996, pp. 178–187. [17] M. Pelikan, K. Sastry, and D. E. Goldberg, “Multiobjective estimation of distribution algorithms,” in Scalable Optimization via Probabilistic Modeling: From Algorithms to Applications, ser. Studies in Computational Intelligence, M. Pelikan, K. Sastry, and E. Cantú-Paz, Eds. Springer, 2006, pp. 223–248. [18] L. Martí, J. García, A. Berlanga, and J. M. Molina, “Multi-objective optimization with an adaptive resonance theory-based estimation of distribution algorithm: A comparative study.” in LION, ser. Lecture Notes in Computer Science, C. A. C. Coello, Ed., vol. 6683. Springer, 2011, pp. 458–472. [19] H. Karshenas, R. Santana, C. Bielza, and P. Larrañaga, “Multi-objective optimization based on joint probabilistic modeling of objectives and variables,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 4, pp. 519–542, 2014. [20] V. A. Shim, K. C. Tan, and K. K. Tan, “A Hybrid Estimation of Distribution Algorithm for Solving the Multi-objective Multiple Traveling Salesman Problem.” in Proceedings of the Congress on Evolutionary Computation (CEC). IEEE, 2012, pp. 1–8. [21] A. Zhou, F. Gao, and G. Zhang, “A decomposition based estimation of distribution algorithm for multiobjective traveling salesman problems.” Computers and Mathematics with Applications, vol. 66, no. 10, pp. 1857– 1868, 2013. [22] B. Wang, X. Hua, and Y. Yuan, “Scale Adaptive Reproduction Operator for Decomposition based Estimation of Distribution Algorithm,” in Proceedings of the Congress on Evolutionary Computation (CEC). IEEE, 2015, pp. 1–8. [23] I. Giagkiozis, R. C. Purshouse, and P. J. Fleming, “Generalized decomposition and cross entropy methods for many-objective optimization.” Inf. Sci., vol. 282, pp. 363–387, 2014. [24] S. Zapotecas-Martínez, B. Derbel, A. Liefooghe, D. Brockhoff, H. Aguirre, and K. Tanaka, “Injecting CMA-ES into MOEA/D,” in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO). ACM, 2015, pp. 783–790. [25] I. Giagkiozis, R. C. Purshouse, and P. J. Fleming, “Generalized decomposition,” in 7th International ConferenceEvolutionary on Multi-Criterion Optimization EMO, ser. Lecture Notes in Computer Science, vol. 7811. Springer, 2013, pp. 428–442. [26] M. Pelikan, “Analysis of epistasis correlation on NK landscapes with nearest neighbor interactions,” in Proceedings of the 13th conference on Genetic and evolutionary computation (GECCO). ACM, 2011, pp. 1013–1020. [27] H. Mühlenbein, “The equation for response to selection and its use for prediction,” Evolutionary Computation, vol. 5, no. 3, pp. 303–346, 1998. [28] S. Baluja, “Population-based incremental learning: A method for integrating genetic search based function optimization and competitive learning,” Carnegie Mellon University, Pittsburgh, PA, Tech. Rep. CMUCS-94-163, 1994. [29] M. Zangari, R. Santana, A. Pozo, and A. Mendiburu, “Not all PBILs are the same: Unveiling the different learning mechanisms of PBIL variants,” 2015, submmitted to publication. [30] H. Mühlenbein, T. Mahnig, and A. Ochoa, “Schemata, distributions and graphical models in evolutionary optimization,” Journal of Heuristics, vol. 5, no. 2, pp. 213–247, 1999. [31] M. Pelikan and H. Mühlenbein, “The bivariate marginal distribution algorithm,” in Advances in Soft Computing - Engineering Design and Manufacturing, R. Roy, T. Furuhashi, and P. Chawdhry, Eds. London: Springer, 1999, pp. 521–535. [32] R. Santana, A. Ochoa, and M. R. Soto, “The mixture of trees factorized distribution algorithm,” in Proceedings of the Genetic and Evolutionary Computation Conference GECCO. San Francisco, CA: Morgan Kaufmann Publishers, 2001, pp. 543–550. [33] S. Baluja and S. Davies, “Using optimal dependency-trees for combinatorial optimization: Learning the structure of the search space,” in Proceedings of the 14th International Conference on Machine Learning, D. H. Fisher, Ed., 1997, pp. 30–38. [34] T. Mahnig and H. Muhlenbein, “Optimal mutation rate using bayesian priors for estimation of distribution algorithms.” in SAGA, ser. Lecture Notes in Computer Science, K. Steinhofel, Ed., vol. 2264. Springer, 2001, pp. 33–48. [35] M. Pelikan, D. E. Goldberg, and E. Cantú-Paz, “BOA: The Bayesian optimization algorithm,” in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), vol. I. Orlando, FL: Morgan Kaufmann Publishers, San Francisco, CA, 1999, pp. 525–532. [36] S. Shakya and R. Santana, Eds., Markov Networks in Evolutionary Computation. Springer, 2012. [37] D. E. Goldberg, “Simple genetic algorithms and the minimal, deceptive problem,” in Genetic Algorithms and Simulated Annealing, L. Davis, Ed. London, UK: Pitman Publishing, 1987, pp. 74–88. [38] K. Deb and D. E. Goldberg, “Analyzing deception in trap functions,” University of Illinois at Urbana-Champaign, Illinois Genetic Algorithms Laboratory, Urbana, IL, IlliGAL Report 91009, 1991. [39] K. Sastry, H. A. Abbass, D. E. Goldberg, and D. Johnson, “Substructural niching in estimation of distribution algorithms,” in Proceedings of the Conference on Genetic and Evolutionary Computation (GECCO). ACM, 2005, pp. 671–678. [40] C. Echegoyen, J. A. Lozano, R. Santana, and P. Larrañaga, “Exact Bayesian network learning in estimation of distribution algorithms,” in Proceedings of the Congress on Evolutionary Computation CEC. IEEE Press, 2007, pp. 1051–1058. [41] C. Echegoyen, A. Mendiburu, R. Santana, and J. A. Lozano, “Toward understanding EDAs based on Bayesian networks through a quantitative analysis,” IEEE Transactions on Evolutionary Computation, vol. 16, no. 2, pp. 173–189, 2012. [42] M. Pelikan, K. Sastry, and D. E. Goldberg, “Multiobjective hBOA, clustering and scalability,” University of Illinois at Urbana-Champaign, Illinois Genetic Algorithms Laboratory, Urbana, IL, IlliGAL Report No. 2005005, February 2005. [43] J. P. Martins, A. H. M. Soares, D. V. Vargas, and A. C. B. Delbem, “Multi-objective phylogenetic algorithm: Solving multi-objective decomposable deceptive problems,” in Evolutionary Multi-Criterion Optimization. Springer, 2011, pp. 285–297. [44] M. Pelikan, Hierarchical Bayesian Optimization Algorithm. Toward a New Generation of Evolutionary Algorithms, ser. Studies in Fuzziness and Soft Computing. Springer, 2005, vol. 170. [45] J. Ceberio, E. Irurozki, A. Mendiburu, and J. A. Lozano, “A review on estimation of distribution algorithms in permutation-based combinatorial optimization problems,” Progress in Artificial Intelligence, vol. 1, no. 1, pp. 103–117, 2012. [46] J. Ceberio, A. Mendiburu, and J. A. Lozano, “The Plackett-Luce ranking model on permutation-based optimization problems,” in Proceedings of the Congress on Evolutionary Computation (CEC), IEEE. IEEE press, 2013, pp. 494–501. [47] Z. Botev, D. P. Kroese, R. Y. Rubinstein, P. L’Ecuyer et al., The Cross Entropy Method: A Unified Approach To Combinatorial Optimization, Monte-carlo Simulation. North-Holland Mathematical Library-Elsevier, 2013. [48] Q. Zhang, A. Zhou, and Y. Jin, “RM-MEDA: A regularity model based multiobjective estimation of distribution algorithm,” IEEE Transactions on Evolutionary Computation, vol. 12, no. 1, pp. 41–63, 2008. [49] N. Hansen and A. Ostermeier, “Adapting arbitrary normal mutation distributions in evolution strategies: The covariance matrix adaptation,” in Proceedings of the IEEE International Conference on Evolutionary Computation, 1996, pp. 312–317. [50] D. Thierens and P. A. Bosman, “Multi-objective optimization with iterated density estimation evolutionary algorithms using mixture models,” in Evolutionary Computation and Probabilistic Graphical Models. 13 [51] [52] [53] [54] [55] [56] [57] [58] [59] [60] Proceedings of the Third Symposium on Adaptive Systems (ISAS-2001), Cuba, Havana, Cuba, March 2001, pp. 129–136. M. Laumanns and J. Ocenasek, “Bayesian optimization algorithm for multi-objective optimization,” in Proceedings of the 7th Parallel Problem Solving from Nature Conference (PPSN), ser. Lecture Notes in Computer Science, vol. 2439. Springer, 2002, pp. 298–307. N. Khan, “Bayesian optimization algorithms for multi-objective and hierarchically difficult problems,” Master’s thesis, University of Illinois at Urbana-Champaign, Illinois Genetic Algorithms Laboratory, Urbana, IL, 2003. K. Deb, L. Thiele, M. Laumanns, and E. Zitzler, “Scalable multiobjective optimization test problems,” in Proceedings of the Congress on Evolutionary Computation (CEC), vol. 2. IEEE press, 2002, pp. 825–830. E. Zitzler and L. Thiele, “Multiobjective evolutionary algorithms: A comparative case study and the strength pareto approach,” IEEE Transactions on Evolutionary Computation, vol. 3, no. 4, pp. 257–271, 1999. J. Derrac and S. Garcia, “A Practical Tutorial on the use of Nonparametric Statistical Tests as a Methodology for Comparing Evolutionary and Swarm Intelligence Algorithms.” Swarm and Evolutionary Computation, vol. 1, no. 1, pp. 3–18, 2011. A. E. I. Brownlee, J. McCall, and M. Pelikan, “Influence of selection on structure learning in Markov network EDAs: An empirical study,” in Proceedings of the Genetic and Evolutionary Computation Conference GECCO. ACM, 2012, pp. 249–256. R. Santana, P. Larrañaga, and J. A. Lozano, “Protein folding in simplified models with estimation of distribution algorithms,” IEEE Transactions on Evolutionary Computation, vol. 12, no. 4, pp. 418–438, 2008. G. Fritsche, A. Strickler, A. Pozo, and R. Santana, “Capturing relationships in multi-objective optimization,” in Proceedings of the Brazilian Conference on Intelligent Systems (BRACIS 2015), Natal Brazil, 2015, accepted for publication. R. Santana, C. Bielza, J. A. Lozano, and P. Larrañaga, “Mining probabilistic models learned by EDAs in the optimization of multi-objective problems,” in Proceedings of the Genetic and Evolutionary Computation Conference GECCO. ACM, 2009, pp. 445–452. R. Santana, A. Mendiburu, and J. A. Lozano, “Structural transfer using EDAs: An application to multi-marker tagging SNP selection,” in Proceedings of the 2012 Congress on Evolutionary Computation (CEC). IEEE Press, 2012, pp. 3484–3491, best Paper Award of 2012 Congress on Evolutionary Computation.
9cs.NE
Towards Automatic Resource Bound Analysis for OCaml Jan Hoffmann Ankush Das Carnegie Mellon University Shu-Chun Weng Yale University November 2, 2016 Abstract This article presents a resource analysis system for OCaml programs. This system automatically derives worst-case resource bounds for higher-order polymorphic programs with user-defined inductive types. The technique is parametric in the resource and can derive bounds for time, memory allocations and energy usage. The derived bounds are multivariate resource polynomials which are functions of different size parameters that depend on the standard OCaml types. Bound inference is fully automatic and reduced to a linear optimization problem that is passed to an off-the-shelf LP solver. Technically, the analysis system is based on a novel multivariate automatic amortized resource analysis (AARA). It builds on existing work on linear AARA for higher-order programs with user-defined inductive types and on multivariate AARA for first-order programs with built-in lists and binary trees. For the first time, it is possible to automatically derive polynomial bounds for higher-order functions and polynomial bounds that depend on user-defined inductive types. Moreover, the analysis handles programs with side effects and even outperforms the linear bound inference of previous systems. At the same time, it preserves the expressivity and efficiency of existing AARA techniques. The practicality of the analysis system is demonstrated with an implementation and integration with Inria’s OCaml compiler. The implementation is used to automatically derive resource bounds for 411 functions and 6018 lines of code derived from OCaml libraries, the CompCert compiler, and implementations of textbook algorithms. In a case study, the system infers bounds on the number of queries that are sent by OCaml programs to DynamoDB, a commercial NoSQL cloud database service. 1 Introduction The quality of software crucially depends on the amount of resources —such as time, memory, and energy—that are required for its execution. Statically understanding and controlling the resource usage of software continues to be a pressing issue in software development. Performance bugs are very common and among the bugs that are most difficult to detect [41, 50] and large software systems are plagued by performance problems. Moreover, many security vulnerabilities exploit the space and time usage of software [43, 21]. Developers would greatly profit from high-level resource-usage information in the specifications of software libraries and other interfaces, and from automatic warnings about potentially high-resource usage during code review. Such information is particularly relevant in contexts of mobile applications and cloud services, where resources are limited or resource usage is a major cost factor. 1 2 Towards Automatic Resource Bound Analysis for OCaml Recent years have seen fast progress in developing frameworks for statically reasoning about the resource usage of programs. Many advanced techniques for imperative integer programs apply abstract interpretation to generate numerical invariants. The obtained sizechange information forms the basis for the computation of actual bounds on loop iterations and recursion depths; using counter instrumentation [27], ranking functions [6, 2, 15, 52], recurrence relations [4, 1], and abstract interpretation itself [58, 18]. Automatic resource analysis techniques for functional programs are based on sized types [54], recurrence relations [23], term-rewriting [9], and amortized resource analysis [35, 42, 30, 51]. Despite major steps forward, there are still many obstacles to overcome to make resource analysis technologies available to developers. On the one hand, typed functional programs are particularly well-suited for automatic resource-bound analysis since the use of pattern matching and recursion often results in a relatively regular code structure. Moreover, types provide detailed information about the shape of data structures. On the other hand, existing automatic techniques for higher-order programs can only infer linear bounds [54, 42]. Furthermore, techniques that can derive polynomial bounds are limited to bounds that depend on predefined lists and binary trees [33, 30] or integers [15, 52]. Finally, resource analyses for functional programs have been implemented for custom languages that are not supported by mature tools for compilation and development [35, 54, 42, 30, 51]. The goal of a long term research effort is to overcome these obstacles by developing Resource Aware ML (RAML), a resource-aware version of the functional programming language OCaml. RAML is based on an automatic amortized resource analysis (AARA) that derives multivariate polynomials that are functions of the sizes of the inputs. In this paper, we report on three main contributions that are part of this effort. 1. We present the first implementation of an AARA that is integrated with an industrialstrength compiler. 2. We develop the first automatic resource analysis system that infers multivariate polynomial bounds that depend on size parameters of complex user-defined data structures. 3. We present the first AARA that infers polynomial bounds for higher-order functions. The techniques we develop are not tied to a particular resource but are parametric in the resource of interest. RAML infers tight bounds for many complex example programs such as sorting algorithms with complex comparison functions, Dijkstra’s single-source shortest-path algorithm, and the most common higher-order functions such as (sequences) of nested maps, and folds. The technique is naturally compositional, tracks size changes of data across function boundaries, and can deal with amortization effects that arise, for instance, from the use of a functional queue. Local inference rules generate linear constraints and reduce bound inference to off-the-shelf linear program (LP) solving, despite deriving polynomial bounds. To ensure compatibility with OCaml’s syntax, we reuse the parser and type inference engine from Inria’s OCaml compiler [47]. We extract a type-annotated syntax tree to perform (resource preserving) code transformations and the actual resource-bound analysis. To precisely model the evaluation of OCaml, we introduce a novel operational semantics that makes the efficient handling of function closures in Inria’s compiler explicit. The semantics is complemented by a new type system that refines function types. To express a wide range of bounds, we introduce a novel class of multivariate resource polynomials that map data of a given type to a non-negative number. The set of multivariate resource polynomials that is available for bound inference depends on the types of input data. It can be parametric in integers, lengths of lists, or number of particular nodes in an inductive 2 Overview 3 data type. As a special case, a resource polynomial can contain conditional additive factors. These novel multivariate resource polynomials are a substantial generalization of the resource polynomials that have been previously defined for lists and binary trees [30]. To deal with realistic OCaml code, we develop a novel multivariate AARA that handles higher-order functions. To this end, we draw inspirations from multivariate AARA for first-order programs [30] and linear AARA for higher-order programs [42]. However, our new solution is more than the combination of existing techniques. For instance, we infer linear bounds for the curried append function for lists, which has not been possible previously [42]. Moreover, we address specifics of Inria’s OCaml compiler such as the evaluation order of function arguments to efficiently avoid function-closure creation. We performed experiments on more than 6018 lines of OCaml code. We still do not support all language features of OCaml and it is thus not straightforward to automatically analyze complete existing applications. However, the automatic analysis performs well on code that only uses supported language features. For instance, we applied RAML to OCaml’s standard list library list.ml: RAML automatically derives evaluation-step bounds for 47 of the 51 top-level functions. All derived bounds are asymptotically tight. It is also easy to develop and analyze real OCaml applications if we keep the current capabilities of the system in mind. In Section 9, we present a case study in which we automatically bound the number of queries that an OCaml program issues to Amazon’s DynamoDB NoSQL cloud database service. Such bounds are interesting since Amazon charges DynamoDB users based on the number of queries made to a database. Our experiments are easily reproducible: The source code of RAML, the OCaml code for the experiments, and an easy-to-use interactive web interface are available online [29]. 2 Overview Before we describe the technical development, we give a short overview of the challenges and achievements of our work. Example Bound Analysis (Running Example). To demonstrate user interaction with RAML, Figure 1 contains an example bound analysis. The OCaml code in Figure 1 will serve as a running example in this article. The function abmap is a polymorphic map function for a user-defined list that contains Acons and Bcons nodes. It takes two functions f and g as arguments and applies f to data stored in the A-nodes and g to data stored in the B-nodes. The function asort takes a comparison function and an A-B-list in which the A-nodes contain lists. It then uses quicksort (the code of quicksort is also automatically analyzed and available online [29]) to sort the lists in the A-nodes. The B-nodes are left unchanged. The function asort’ is a variation of asort that raises an exception if it encounters a B-node in the list. To derive a worst-case resource bound with RAML, the user needs to pick a maximal degree of the search space of polynomials and a resource metric. In the example analysis in Figure 1 we picked degree 4 and the steps metric which counts the number of evaluation steps in the big-step semantics. After 0.23 seconds, RAML reports a bound for each of the top-level functions. The shown output is only an excerpt. In this case, all derived bounds are tight in the sense that there are inputs for every size that exactly result in the reported number of evaluation steps. In the derived bound, for abmap RAML assumes that the resource cost of f and g is 0. So we get a linear bound. In the case of asort we derive a bound which is quadratic in the maximal length of the lists that are stored in the A-nodes (22K + 13K 2 ) for every A-node in the 4 Towards Automatic Resource Bound Analysis for OCaml type (’a,’b) ablist = let | | | Acons of ’a * (’a,’b) ablist | Bcons of ’b * (’a,’b) ablist | Nil rec abmap f g abs = match abs with Acons (a,abs’) → Acons(f a, abmap f g abs’) Bcons (b,abs’) → Bcons(g b, abmap f g abs’) Nil → Nil let asort gt abs = abmap (quicksort gt) (fun x → x) abs let asort’ gt abs = abmap (quicksort gt) (fun _ → raise Inv_arg) abs let btick = abmap (fun a → a) (fun b → Raml.tick 2.5; b) Excerpt of the RAML output for analyzing evaluation steps (0.23s run time): Simplified bound for abmap: 3.00 + 12.00*L + 12.00*N Simplified bound for asort: 11.00 + 22.00*K*N + 13.00*K^2*N + 13.00*L + 15.00*N Simplified bound asort’: 13.00 + 22.00*K*N + 13.00*K^2*N + 15.00*N where L is the number of Bcons-nodes of the 2nd (3rd) component of the argument N is the number of Acons-nodes of the 2nd (3rd) component of the argument K is the maximal number of ::-nodes in the Acons-nodes of the 2nd component of the argument Figure 1: The function abmap will serve as a running example in this article. When deriving the linear bound for abmap, we assume that the higher-order arguments f and g have no resource consumption. If abmap is applied to concrete functions, like in asort and asort’ then the cost of the concrete application is bounded. Only the Acons node contribute to the cubic cost in the bound of asort. Moreover, the number of Bcons nodes do not contribute to the linear factor in asort’. list ((22K +13K 2 )N ) plus an additional linear factor that also depends on the number of B-nodes that are simply traversed (13L + 15N ). For asort’ this linear factor only depends on the number of A-nodes: RAML automatically deduces that the traversal is aborted in case we encounter a B-node. The tick metric can be used to derive bounds on user defined metrics. An instructive example is the function btick. With the tick metric, RAML derives the bound 2.5L where L is the number of B-nodes in the argument list. This is a tight bound on the sum of “ticks” that are executed in an evaluation of btick. Ticks can also be negative to express that resources become available. Note that RAML does not make guarantees about the precision of the derived bounds. Since an evaluation-step bound proves termination, bound analysis is an undecidable problem. So there are many functions for which RAML cannot derive a bound either because no (polynomial) bound exists or the analysis is not able to find a bound. In these cases, RAML terminates with a message like “A bound for abmap could not be derived.” 2 Overview 5 Currying and Function Closures. Currying and function closures pose a challenge to automatic resource analysis systems that has not been addressed in the past. To see why, assume that we want to design a type system to verify resource usage. Now consider for example the curried append function which has the type append : α list → α list → α list in OCaml. At first glance, we might say that the time complexity of append is O(n) if n is the length of the first argument. But a closer inspection of the definition of append reveals that this is a gross simplification. In fact, the complexity of the partial function call app_par = append ` is constant. Moreover, the complexity of the function app_par is linear—not in the length of the argument but in the length of the list ` that is captured in the function closure. We are not aware of any existing approach that can automatically derive a worst-case time bound for the curried append function. For example, previous AARA systems would fail without deriving a bound [42, 30]. In general, we have to describe the resource consumption of a curried function f : A 1 → · · · → A n → A with n expressions c i (a 1 , . . . , a i ) such that c i describes the complexity of the computation that takes place after f is applied to i arguments a 1 , . . . , a i . In Inria’s OCaml implementation, the situation is even more complex since the resource usage (time and space) depends on how a function is used at its call sites. If append is partially applied to one argument then a function closure is created as expected. However—and this is one of the reasons for OCaml’s great performance—if append is applied to both of its arguments at the same time then the intermediate closure is not created and the performance of the function is even better than that of the curried version since we do not have to create a pair before the application. To model the resource usage of curried functions accurately we refine function types to capture how functions are used at their call sites. For example, append can have both of the following types α list → α list → α list and [α list, α list] → α list . The first type implies that the function is partially applied and the second type implies that the function is applied to both arguments at the same time. Of course, it is possible that the function has both types (technically we achieve this using let polymorphism). For the second type, our system automatically derives tight time and space bounds that are linear in the first argument. However, our system fails to derive a bound for the first type. The reason is that we made the design decision to not derive bounds that asymptotically depend on data captured in function closures to keep the complexity of the system at a manageable level. Fortunately, append belongs to a large set of OCaml functions in the standard library that are defined in the form let rec f x y z = e. If such a function is partially applied, the only computation that happens is the creation of a closure. As a result, eta expansion does not change the resource behavior of programs. This means for example that we can safely replace the expression let app_par = append ` in e with the expression let app_par x = append ` x in e prior to the analysis. Consequently, we can always use the type [α list, α list] → α list of append that we can successfully analyze. The conditions under which functions can be analyzed might look complex at first but they can be boiled down to a simple principle: The worst-case resource usage of a function must be expressible as a function of the sizes of its arguments. Higher-Order Arguments. The other main challenge with higher-order resource analysis is functions with higher-order arguments. To a large extent, this problem has been successfully solved for linear resource bounds in previous work [42]. Basically, the higher-order case is 6 Towards Automatic Resource Bound Analysis for OCaml reduced to the first-order case if the higher-order arguments are available. It is not necessary to reanalyze such higher-order functions for every call site since we can abstract the resource usage with a constraint system that has holes for the constraints of the function arguments. However, a presentation of the system in such a way mixes type checking with the constraint-based type inference. Therefore, we chose to present the analysis system in a more declarative way in which the bound of a function with higher-order arguments is derived with respect to a given set of resource behaviors of the argument functions. A concrete advantage of our declarative view is that we can derive a meaningful type for a function like map for lists even when the higher-order argument is not available. The function map can have the following types. (α → β) → α list → β list [α → β, α list] → β list Unlike append, the resource usage of map does not depend on the size of the first argument. So both types are equivalent in our system except for the cost of creating an intermediate closure. If the higher-order argument is not available then previous systems [42] produce a constraint system that is not meaningful to a user. An innovation in this work is that we are also able to report a meaningful resource bound for map if the arguments are not available. To this end, we assume that the argument function does not consume resources. For example, we report in the case of map that the number of evaluation steps needed is 11n + 3 and the number of heap cells needed is 4n + 2 where n is the length of the input list. Such bounds are useful for two purposes. First, a developer can see the cost that map itself contributes to the total cost of a program. Second, the time bound for map proves that map is guaranteed to terminate if the higher-order argument terminates for every input. In contrast, consider the function rec_scheme : (α list → α list) → α list → β list that is defined as follows. let rec rec_scheme f l = match l with | [] → [] | x::xs → rec_scheme f (f l) let g = rec_scheme tail Here, RAML is not able to derive an evaluation-step bound for rec_scheme since the number of evaluation steps (and even termination) depends on the argument f . However, RAML derives the tight evaluation-step bound 12n + 7 for the function g . Polynomial Bounds and Inductive Types. Existing AARA systems are either limited to linear bounds [35, 42] or to polynomial bounds that are functions of the sizes of simple predefined lists and binary-tree data structures [30]. In contrast, this work presents the first analysis that can derive polynomial bounds that depend on size parameters of complex user-defined data structures. The bounds we derive are multivariate resource polynomials that can take into account individual sizes of inner data structures. While it is possible to simplify the resource polynomials in the user output, it is essential to have this more precise information for intermediate results to derive tight whole-program bounds. In general, the resource bounds are built of functions that count the number of specific tuples that one can form from the nodes in a tree-like data structure. In their simplest form (i.e., without considering the data stored inside the nodes), they have the form λa.|{~ a | a i is an A ki -node in a and if i < j then a i <apr e a j }| 3 Setting the Stage 7 where a is an inductive data structure with constructors A 1 , . . . , A m , ~ a = (a 1 , . . . , a n ), and <apr e denotes the pre-order (tree traversal) on the tree a. We are able to keep track of changes of these quantities in pattern matches and data construction fully automatically by generating linear constraints. At the same time, they allow us to accurately describe the resource usage of many common functions in the same way it has been done previously for simple types [28]. As an interesting special case, we can also derive conditional bounds that describe the resource usage as a conditional statement. For instance, for an expression such as match x with | True → quicksort y | False → y we derive a bound that is quadratic in the length of y if x is True and constant if x is False. Effects. Our analysis handles references and arrays by ensuring that resource cost does not asymptotically depend on values that have been stored in mutable cells. While it has been shown that it is possible to extend AARA to handle mutable state [17], we decided not to add the feature in the current system to focus on the presentation of the main contributions. There are still a lot of possible interactions with mutable state, such as storing functions in references. 3 Setting the Stage We describe and formalize the new resource analysis using Core RAML, a subset of the intermediate language that we use to perform the analysis. Expressions in Core RAML are in share-let-normal form, which means that syntactic forms allow only variables instead of arbitrary terms whenever possible without restricting expressivity. We automatically transform user-level OCaml programs to Core RAML without changing their resource behavior before the analysis. Syntax. For the purpose of this article, the syntax of Core RAML expressions is defined by the following grammar. The actual core expressions also contain constants and operators for primitive data types such as integer, float, and boolean; arrays and built-in operations for arrays; conditionals; and free versions of syntactic forms. These free versions are semantically identical to the standard versions but do not contribute to the resource cost. This is needed for the resource preserving translation of user-level code to share-let-normal form. e ::= x | x x 1 · · · x n | C x | λx.e | ref x | ! x | x 1 := x 2 | fail | tick (q) | match x with C y → e 1 | e 2 | (x 1 , . . . , x n ) | match x with (x 1 , . . . , x n ) → e | share x as (x 1 , x 2 ) in e | let x = e 1 in e 2 | let rec F in e F ::= f = λx.e | F 1 and F 2 The syntax contains forms for variables, function application, data constructors, lambda abstraction, references, tuples, pattern matching, and (recursive) binding. For simplicity, we only allow recursive definitions of functions. In the function application we allow the application of several arguments at once. This is useful to statically determine the cost of closure creation but also introduces ambiguity. The type system will determine if an expression like f x 1 x 2 is parsed as ( f x 1 x 2 ) or ( f x 1 ) x 2 . The sharing expressions share x as (x 1 , x 2 ) in e is not standard and used to explicitly introduce multiple occurrences of a variable. It binds the free variables x 1 and x 2 in e. The expression fail is used to model exceptions. The expression tick(q) contains 8 Towards Automatic Resource Bound Analysis for OCaml a floating point constant q. It can be used with the tick metric to specify a constant cost. A negative floating point number q means that resources become available. We focus on this set of language features since it is sufficient to present the main contributions of our work. We sometimes take the liberty to describe examples in user level syntax and to use features such as built-in data types that are not described in this article. Big-Step Operational Cost Semantics. The resource usage of RAML programs is defined by a big-step operational cost semantics. The semantics has three interesting non-standard features. First, it measures (or defines) the resource consumption of the evaluation of a RAML expression by using a resource metric that defines a constant cost for each evaluation step. If this cost is negative then resources are returned. Second, it models terminating and diverging executions by inductively describing finite subtrees of infinite execution trees. Third, it models OCaml’s stack-based mechanism for function application, which avoids creation of intermediate function closures. The semantics of Core RAML is formulated with respect to a stack (to store arguments for function application), an environment, and a heap. Let Loc be an infinite set of locations modeling memory addresses. A heap is a finite partial mapping H : Loc * Val that maps locations to values. An environment is a finite partial mapping V : Var * Loc from variable identifiers to locations. An argument stack S ::= · | `::S is a finite list of locations. We assume every heap H contains a distinguished location Null ∈ dom(H ) such that H (Null) = Null. The set of RAML values Val is given by v ::= ` | (`1 , . . . , `k ) | (λx.e,V ) | (C , `) A value v ∈ Val is either a location ` ∈ Loc, a tuple of locations (`1 , . . . , `k ), a function closure (λx.e,V ), or a node of a data structure (C , `) where C is a constructor and ` is a location. In a function closure (λx.e,V ), V is an environment, e is an expression, and x is a variable. Since we also consider resources like memory that can become available during an evaluation, we have to track the watermark of the resource usage, that is, the maximal number of resource units that are simultaneously used during an evaluation. To derive a watermark of a sequence of evaluations from the watermarks of the sub evaluations one has to also take into account the number of resource units that are available after each sub evaluation. The big-step operational evaluation rules Figure 2 and Figure 3 are formulated with respect to a resource metric M . They define an evaluation judgment of the form S,V, H M ` e ⇓ (`, H 0 ) | (q, q 0 ) . It expresses the following. If the argument stack S, the environment V , and the initial heap H are given then the expression e evaluates to the location ` and the new heap H 0 . The evaluation 0 + of e needs q ∈ Q+ 0 resource units (watermark) and after the evaluation there are q ∈ Q0 resource 0 units available. The actual resource consumption is then δ = q − q . The quantity δ is negative if resources become available during the execution of e. There are two other behaviors that we have to express in the semantics: failure (i.e., array access outside array bounds) and divergence. To this end, our semantic judgement not only evaluates expressions to values but also to an error ⊥ and to incomplete computations expressed by ◦. The judgement has the general form S,V, H M ` e ⇓ w | (q, q 0 ) where w ::= (`, H ) | ⊥ | ◦ . Intuitively, this evaluation statement expresses that the watermark of the resource consumption after some number of evaluation steps is q and there are currently q 0 resource units left. A 3 Setting the Stage S 6= · 9 H (V (x)) = (λx.e,V 0 ) S,V 0 , H M ` λx.e ⇓ w | (q, q 0 ) S,V, H M ` x ⇓ w | M var ·(q, q 0 ) V (x) = ` ·,V, H M ` x ⇓ (`, H ) | M var (E:VAR ) (E:VAR A PP ) S,V, H M ` e ⇓ ◦ | 0 V (x 1 ):: · · · ::V (x n ),V, H M ` x ⇓ w | (q, q 0 ) app S,V, H M ` x x 1 · · · x n ⇓ w | M n S = · ∨ w ∈ {⊥, ◦} ·(q, q 0 ) (E:A BORT ) (E:A PP ) S 6= · H (`) = (λx.e,V 0 ) V (x 1 ):: · · · ::V (x n ),V, H M ` x ⇓ ` | (q, q 0 ) S,V 0 , H M ` λx.e ⇓ w | (p, p 0 ) app S,V, H M ` x x 1 · · · x n ⇓ w | M n ·(q, q 0 )·(p, p 0 ) S,V [x 7→ `], H M ` e ⇓ w | (q, q 0 ) `::S,V, H M ` λx.e ⇓ w | M bind ·(q, q 0 ) H 0 = H , ` 7→ (λx.e,V ) ·,V, H M ` λx.e ⇓ (`, H 0 ) | M abs ·,V, H M ` e 1 ⇓ w | (q, q 0 ) (E:A BS B IND ) (E:A BS C LOS ) w ∈ {⊥, ◦} S,V, H M ` let x = e 1 in e 2 ⇓ w | M 1let ·(q, q 0 ) ·,V, H M ` e 1 ⇓ (`, H 0 ) | (q, q 0 ) (E:A PPA PP ) (E:L ET 1) S,V [x 7→ `], H 0 M ` e 2 ⇓ w | (p, p 0 ) S,V, H M ` let x = e 1 in e 2 ⇓ w | M 1let ·(q, q 0 )·M 2let ·(p, p 0 ) (E:L ET 2) F , f 1 = λx 1 .e 1 and · · · and f n = λx n .e n V 0 = V [ f 1 7→ `1 , . . . , f n 7→ `n ] 0 0 H = H , `1 7→ (λx 1 .e 1 ,V ), . . . , `n 7→ (λx n .e n ,V ) S,V 0 , H 0 M ` e 0 ⇓ w | (q, q 0 ) 0 S,V, H M ` let rec F in e 0 ⇓ w | M rec ·(q, q 0 ) H 0 = H , ` 7→ (C ,V (x)) ·,V, H M `C x ⇓ (`, H 0 ) | M cons H (V (x)) = (C , `) (E:C ONS ) S,V [y 7→ `], H M ` e 1 ⇓ w | (q, q 0 ) S,V, H M ` match x with C y → e 1 | e 2 ⇓ w | M 1mat ·(q, q 0 ) H (V (x)) 6= (C , `) S,V, H M ` e 2 ⇓ w | (q, q 0 ) S,V, H M ` match x with C y → e 1 | e 2 ⇓ w | M 2mat ·(q, q 0 ) (E:M AT 1) (E:M AT 2) Figure 2: Rules of the operational big-step semantics (part 1 of 2). (E:L ET R EC ) 10 Towards Automatic Resource Bound Analysis for OCaml H 0 = H , ` 7→ (V (x 1 ), . . . ,V (x n )) ·,V, H M ` (x 1 , . . . , x n ) ⇓ (`, H 0 ) | M tuple H (V (x)) = (`1 , . . . , `n ) (E:T UPLE ) S,V [x 1 7→ `1 , . . . , x n 7→ `n ], H M ` ⇓ w | (q, q 0 ) S,V, H M ` match x with (x 1 , . . . , x n ) → e ⇓ w | M matT ·(q, q 0 ) V (x) = ` S,V [x 1 7→ `, x 2 7→ `], H M ` e ⇓ w | (q, q 0 ) S,V, H M ` share x as (x 1 , x 2 ) in e ⇓ w | M share ·(q, q 0 ) H 0 = H , ` 7→ V (x) ·,V, H M ` ref x ⇓ (`, H 0 ) | M ref (E:R EF ) H 0 = H [V (x 1 ) 7→ V (x 2 )] ·,V, H M ` x 1 := x 2 ⇓ (Null, H 0 ) | M assign (E:A SSIGN ) (E:M AT T ) (E:S HARE ) ` = H (V (x)) S,V, H M ` ! x ⇓ (`, H ) | M dref (E:DR EF ) S,V, H M ` fail ⇓ ⊥ | M fail ·,V, H M ` tick (q) ⇓ (Null, H ) | M tick (q) (E:U NDEF ) (E:T ICK ) Figure 3: Rules of the operational big-step semantics (part 2 of 2). resource metric M : K × N → Q defines the resource consumption in each evaluation step of the big-step semantics where K is a set of constants. We write M nk for M (k, n) and M k for M (k, 0). It is handy to view the pairs (q, q 0 ) in the evaluation judgments as elements of a monoid Q = (Q+0 × Q+0 , ·). The neutral element is (0, 0), which means that resources are neither needed before the evaluation nor returned after the evaluation. The operation (q, q 0 ) · (p, p 0 ) defines how to account for an evaluation consisting of evaluations whose resource consumptions are defined by (q, q 0 ) and (p, p 0 ), respectively. We define ½ (q + p − q 0 , p 0 ) if q 0 ≤ p (q, q 0 ) · (p, p 0 ) = (q, p 0 + q 0 − p) if q 0 > p If resources are never returned (as with time) then we only have elements of the form (q, 0) and (q, 0) · (p, 0) is just (q + p, 0). We identify a rational number q with an element of Q as follows: q ≥ 0 denotes (q, 0) and q < 0 denotes (0, −q). This notation avoids case distinctions in the evaluation rules since the constants K that appear in the rules can be negative. In the semantic rules we use the notation H 0 = H , ` 7→ v to indicate that ` 6∈ dom(H ), dom(H 0 ) = dom(H ) ∪ {`}, H 0 (`) = v, and H 0 (x) = H (x) for all x 6= `. For efficiency reasons, Inria’s OCaml compiler evaluates function applications e e 1 · · · e n from right to left, that is, it starts with evaluating e n . In this way, one can avoid the expensive creation of intermediate function closures. A naive implementation would create n function closures when evaluating the aforementioned expression: one for e, one for the application to the first argument, etc. By starting with the last argument, we are able to put the results of the evaluation on an argument stack and access them when we encounter a function abstraction during the evaluation. In this case, we do not create a closure but simply bind the value on the stack to the name in the abstraction. 4 Stack-Based Type System 11 To model the treatment of function application in the OCaml compiler, we use a stack S on which we store the locations of function arguments. The only rules that push locations to S are E:A PP and E:A PPA PP. To pop locations from the stack we modify the leaf rules that can return a function closure, namely, the rules E:VAR and E:A BS for variables and lambda abstractions: Whenever we would return a function closure (λx.e,V ) we inspect the argument stack S. If S contains a location ` then we pop it from the stack S, bind it to the argument x, and evaluate the function body e in the new environment V [x 7→ `]. This is defined by the rule E:A BS B IND and indirectly by the rule E:VAR A PP. Another rule that modifies the argument stack is E:L ET 2. Here, we evaluate the subexpression e 1 with an empty argument stack because the arguments on the stack when evaluating the let expressions are consumed by the result of the evaluation of e 2 . The argument stack accurately captures Inria’s OCaml compiler’s behavior to avoid the creation of intermediate function closures. It also extends naturally to the evaluation of expressions that are not in share-let-normal form. As we will see in Section 6, the argument stack is also necessary to prove the soundness of the multivariate resource bound analysis. Another important feature of the big-step semantics, is that it can model failing and diverging evaluations by allowing partial derivation judgments that can be used to derive the resource usage after n steps. Technically, this is realized by the rule E:A BORT which can be applied at any point to abort the current evaluation without additional resource cost. The mechanism of aborting an evaluation is most visible in the rules E:L ET 1 and E:L ET 2: During the evaluation of a let expression we have two possibilties. The first possibility is that the evaluation of the subexpression e 1 is aborted using E:A BORT at some point. We can then apply the rule E:L ET 1 to pass on the resource usage before the abort. The second possibility is that e 1 evaluates to a location `. We can then apply the E:L ET 2 to bind ` to the variable x and evaluate the expression e2. Example Evaluation (Running Example). We use the running example defined in Figure 1 to illustrate how the operational cost semantics works. To this end, we use the metric steps which assigns cost 1 to every evaluation step and the metric tick which assigns cost 0 to every evaluation step but Raml.tick(q). Let abs ≡ Acons ([1;2],Bcons (3, Bcons (4, Nil))) is a A-B-list and let e 1 the expression that arises by concatenating appending the expression asort (>) abs to the code in Figure 1. Then for every H and V there exists H 0 and ` such that ·,V, H tick` e 1 ⇓ (`, H 0 ) | (0, 0) and ·,V, H steps` e 1 ⇓ (`, H 0 ) | (186, 0). Moreover, ·,V, H steps` e 1 ⇓ ◦ | (n, 0) for every n < 186. Let e 2 be the expression that results from appending btick abs to the code in Figure 1. Then for every H and V there exists H 0 and ` such that ·,V, H tick` e 2 ⇓ (`, H 0 ) | (5, 0) and ·,V, H tick` e 2 ⇓ ◦ | (n, 0) for every n ∈ {2.5, 0}. 4 Stack-Based Type System In this section, we introduce a type system that is a refinement of OCaml’s type system. In this type system, we mirror the resource-aware type system and introduce some particularities that explain features of the resource-aware types. For the purpose of this article, we define simple types as follows. T ::= unit | X | T ref | T1 ∗ · · · ∗ Tn | [T1 , . . . , Tn ] → T | µX . 〈C 1 : T1 ∗X n1 , . . . ,C k : Tk ∗X nk 〉 12 Towards Automatic Resource Bound Analysis for OCaml A (simple) type T is the unit type, an uninterpreted type variable X ∈ X , a type T ref of references of type T , a tuple type T1 ∗ · · · ∗ Tn , a function type [T1 , . . . , Tn ] → T , or an inductive data type µX . 〈C 1 : T1 ∗X n1 , . . . ,C k : Tk ∗X nk 〉. Two parts of this definition are non-standard and deserve further explanation. First, bracket function types [T1 , . . . , Tn ] → T correspond to the standard function type T1 → · · · → Tn → T . The meaning of [T1 , . . . , Tn ] → T is that the function is applied to its first n arguments at the same time. The type T1 → · · · → Tn → T indicates that the function is applied to its first n arguments one after another. These two uses of a function can result in a very different resource behavior. For instance, in the latter case we have to create n − 1 function closures. Also we have n different costs to account for: the evaluation cost after the first argument is present, the cost of the closure when the second argument is present, etc. Of course, it is possible that a function is used in different ways in program. We account for that with let polymorphism (see the following subsection). Also note that [T1 , . . . , Tn ] → T still describes a higher-order function while T1 ∗ · · · ∗ Tn → T describes a first-order function with n arguments. Second, inductive types are required to have a particular tree-like form. This makes it possible to track costs that depend on size parameters of values of such types. It is of course possible to allow arbritary inductive types and not to track such cost. Such an extension is straighforward and we do not present it in this article. We assume that each constructor C ∈ C is part of at most one recursive type. Furthermore we assume that each recursive type has at least one constructor. For an inductive type T = µX . 〈C 1 : T1 ∗X n1 , . . . ,C k : Tk ∗X nk 〉 we sometimes write T = 〈C 1 : (T1 , n 1 ), . . . ,C k : (Tk , n k )〉. We say that Ti is the node type and n i is the branching number of the constructor C i . The maximal branching number n = max{n 1 , . . . , n k } of the constructors is the branching number of T . Let Polymorphism and Sharing. Following the design of the resource-aware type system, our stack-based type system is affine. That means that a variable in a context can be used at most once in an expression. However, we enable multiple uses of a variable with the sharing expression share x as (x 1 , x 2 ) in e that denotes that x can be used twice in e using the (different) names x 1 and x 2 . For input programs we allow multiple uses of a variable x in an expression e in RAML. We then introduce sharing constructs, and replace the occurrences of x in e with the new names before the analysis. Interestingly, this mechanism is closely related to let polymorphism. To see this relation, first note that our type system is polymorphic but that a value can only be used with a single type in an expression. In practice, that would mean for instance that we have to define a different map function for every list type. A simple and well-known solution to this problem that is often applied in practice is let polymorphism. In principle, let polymorphism replaces variables with their definitions before type checking. For our map function it would mean to type the expression [map 7→ e map ]e instead of typing the expression let map = e map in e. In principle, it would be possible to treat sharing of variables in a similar way as let polymorphism. But if we start from an expression let x = e 1 in e 2 and replace the occurrences of x in the expression e 2 with e 1 then we also change the resource consumption of the evaluation of e 2 because we evaluate e 1 multiple times. Interestingly, this problem coincides with the treatment of let polymorphism for expressions with side effects (the so called value restriction). In RAML, we support let polymorphism for function closures only. Assume we have a function definition let f = λx.e f in e that is used twice in e. Then the usual approach to enable the analysis in our system would be to use sharing let f = λx.e f in share f as ( f 1 , f 2 ) in e 0 . 4 Stack-Based Type System 13 To enable let polymorphism, we will however define f twice and ensure that we only pay once for the creation of the closure and the let binding: let f 1 = λx.e f in let f 2 = λx.e f in e 0 The functions f 1 and f 2 can now have different types. This method can cause an exponential blow up of the size of the expression. It is nevertheless appealing because it enables us to treat resource polymorphism in the same way as let polymorphism. Type Judgements. Type judgements have the form Σ; Γ ` e : T where Σ = T1 , . . . , Tn is a list of types, Γ : Var * T is a type context that maps variables to types, e is a core expression, and T is a (simple) type. The intuitive meaning (which is formalized later in this section) is as follows. Given an evaluation environment that matches the type context Γ and an argument stack that matches the type stack Σ then e evaluates to a value of type T (or does not terminate). The most interesting feature of the type judgements is the handling of bracket function types [T1 , . . . , Tn ] → T . Even though function types can have multiple forms, a well-typed expression often has a unique type (in a given type context). This type is derived from the way a function is used. For instance, we have λ f .λx.λy. f x y : ([T1 , T2 ] → T ) → T1 → T2 → T and λ f .λx.λy.( f x) y : (T1 → T2 → T ) → T1 → T2 → T , and the two function types are both unique. A type T of an expression e has a unique type derivation that produces a type judgement ·, Γ ` e : T with an empty type stack. We call this canonical type derivation for e and a closed type judgement. If T is a function type Σ → T 0 then there is a second type derivation for e that we call an open type derivation. It derives the open type judgement Σ; Γ ` e : T 0 where |Σ| > 0. The following lemma can be proved by induction on the type derivations. Lemma 1. ·; Γ ` e : Σ → T if and only if Σ; Γ ` e : T . Open and canonical type judgements are not interchangeable. An open type judgement Σ; Γ ` e : T can only appear in a derivation with an open root of the form Σ0 , Σ; Γ ` e : T , or in a subtree of a derivation whose root is a closed judgement of the form ·; Γ ` e : Σ00 , Σ → T where |Σ00 | > 0. In other words, in an open derivation Σ; Γ ` e : T , the expression e is a function that has to be applied to n > |Σ| arguments at the same time. In a given type context and for a fixed function type, a well-typed expression has as most one open type derivation. Type Rules. Figure 4 presents selected type rules of the type system. As usual Γ1 , Γ2 denotes the union of the type contexts Γ1 and Γ2 provided that dom(Γ1 ) ∩ dom(Γ2 ) = ;. We thus have the implicit side condition dom(Γ1 ) ∩ dom(Γ2 ) = ; whenever Γ1 , Γ2 occurs in a typing rule. Especially, writing Γ = x 1 :T1 , . . . , x k :Tk means that the variables x i are pairwise distinct. There is a close correspondence between the evaluation rules and the type rules in the sense that every evaluation rule corresponds to exactly one type rule. (We view the two rules for pattern match and let binding as one rule, respectively.) The type stack is modified by the rules T:VAR P USH, T:A PP P USH, T:A BS P USH, and T:A BS P OP. For every leaf rule that can return a function type, such as T:VAR, T:A PP, and T:A PP P USH, we add a second rule that derives the equivalent open type. The reason becomes clear in the resource-aware type system in Section 6. The rules that directly control the shape of the function types are T:A BS P USH and T:A BS P OP for lambda abstraction. While the other rules are (deterministically) syntax driven, the rules for 14 Towards Automatic Resource Bound Analysis for OCaml ·; x : T ` x : T ( T:VAR ) Σ; x : Σ → T ` x : T ( T:VAR P USH ) Σ; Γ, x:T1 ` e : T2 T1 ::Σ; Γ ` λx.e : T2 Σ; x : [T1 , . . . , Tn ]→Σ→T, x 1 : T1 , . . . , x n : Tn ` x x 1 · · · x n : T ·; x : [T1 , . . . , Tn ]→T, x 1 :T1 , . . . , x n :Tn ` x x 1 · · · x n : T T = µX . 〈. . .C : U ∗X n . . .〉 Σ; Γ, y : U ∗T n , ` e 1 : T 0 ( T:A PP P USH ) Σ; Γ ` λx.e : T ( T:A PP ) ·; Γ ` λx.e : Σ → T Σ; Γ, x : T ` e 2 : T 0 Σ; Γ, x : T ` match x with C y → e 1 | e 2 : T 0 T = µX . 〈. . .C : U ∗X n . . .〉 n ·; x : U ∗T ` C x : T ( T:C ONS ) ·; x 1 : T1 , . . . , x n : Tn ` (x 1 , . . . , x n ) : T Σ; Γ, x : T ` match x with (x 1 , . . . , x n ) → e : T 0 Σ; Γ, x 1 : T, x 2 : T ` e : T 0 Σ; Γ, x : T ` share x as (x 1 , x 2 ) in e : T 0 ·; Γ1 ` e 1 : T1 Σ; Γ2 , x : T1 ` e 2 : T2 Σ; Γ1 , Γ2 ` let x = e 1 in e 2 : T2 ( T:S HARE ) Σ; Γ, x:A ` e : B F , f 1 = λx 1 .e 1 and · · · and f n = λx n .e n ∆ = f 1 : T1 , . . . , f n : Tn ∀i : ·; Γi , ∆ ` λx i .e i : Ti Σ; Γ0 , ∆ ` e : T Σ; Γ0 , . . . , Γn ` let rec F in e : T ·; x : T ` ref x : T ref Σ; x : (Σ → T ) ref ` ! x : T ( T:R EF ) ( T:DR EF P USH ) Σ; · ` fail : B ( T:FAIL ) ( T:T UPLE ) ( T:M AT T ) Σ; Γ ` e : B ( T:L ET ) ( T:A BS P OP ) ( T:M AT ) T = T1 ∗ · · · ∗ Tn Σ; Γ, x 1 : T1 , . . . , x n : Tn ` e : T 0 T = T1 ∗ · · · ∗ Tn ( T:A BS P USH ) ·; x : T ref ` ! x : T ( T:W EAK ) ( T:L ET R EC ) ( T:DR EF ) ·; x 1 : T ref, x 2 : T ` x 1 := x 2 : unit ·; · ` tick (q) : unit ( T:T ICK ) Figure 4: Rules of the stack-based affine type system. ( T:A SSIGN ) 4 Stack-Based Type System X ∈X 15 ` ∈ dom(H ) H Í ` 7→ ` : X H (`) = `0 H Í `0 7→ a : T H Í ` 7→ R(a) : T ref ( V:R EF ) ( V:TVAR ) H Í Null 7→ () : unit H (`) = (λx.e,V ) ∃ Γ : H Í V : Γ ∧ ·; Γ ` λx.e : Σ → T H Í ` 7→ (λx.e,V ) : Σ → T H (`) = (`1 , . . . , `n ) ∀i : H Í `i 7→ a i : Ti H Í ` 7→ (a 1 , . . . , a n ) : T1 ∗ · · · ∗ Tn B = µX . 〈. . . ,C : T ∗X n , . . .〉 ( V:U NIT ) H (`) = (C , `0 ) ( V:F UN ) ( V:T UPLE ) H Í `0 7→ (a, b 1 , . . . , b n ) : T ∗B n H Í ` 7→ C (a, b 1 , . . . , b n ) : B ( V:C ONS ) Figure 5: Coinductively relating heap cells to semantic values. lambda abstraction introduce a choice that shapes functions types. However, there is often only one possible choice depending on how the abstracted function is used. As mentioned, the type system is affine and every variable in a context can at most be used once in the typed expression. Multiple uses have to be introduced explicitly using the rule T:S HARE. The only exception is the rule T:L ET R EC. Here we allow the use of the context ∆ in the body of all defined functions. The reason for this is apparent in the resource aware version: sharing of function types is always possible without any restrictions. Well-Formed Environments. For each simple type T we inductively define a set ‚T ƒ of values of type T . Our goal here is not to advance the state of the art in denotational semantics but rather to capture the tree structure of data structures stored on the heap. To this end, we distinguish mainly inductive types (possible inner nodes of the trees) and other types (leaves). For the formulation of type soundness, we also require that function closures are well-formed. We simply interpret polymorphic data with the set of locations Loc. ‚X ƒ = Loc ‚unitƒ = {()} ‚T refƒ = {R(a) | a ∈ ‚T ƒ} ‚Σ → T ƒ = {(λx.e,V ) | ∃ Γ : H Í V :Γ ∧ ·; Γ ` λx.e : Σ→T } ‚T1 ∗· · ·∗ Tn ƒ = ‚T1 ƒ × · · · × ‚Tn ƒ ‚B ƒ = Tr(B ) if B = 〈C 1 :(T1 , n 1 ), . . . ,C n :(Tk , n k )〉 Here, T = Tr(〈C 1 :(T1 , n 1 ), . . . ,C n :(Tk , n k )〉) is the set of trees τ with node labels C 1 , . . . ,C k which are inductively defined as follows. If i ∈ {1, . . . , k}, a i ∈ ‚Ti ƒ, and τ j ∈ T for all 1 ≤ j ≤ n i then C i (a i , τ1 , . . . , τni ) ∈ T . If H is a heap, ` is a location, A is a type, and a ∈ ‚Aƒ then we write H Í ` 7→ a : A to mean that ` defines the semantic value a ∈ ‚Aƒ when pointers are followed in H in the obvious way. The judgment is formally defined in Figure 5. For a heap H there may exist different semantic values a and simple types A such that H Í ` 7→ a : A . However, if we fix a simple type A and a heap H then there exists at most one value a such that H Í ` 7→ a : A . Proposition 1. Let H be a heap, ` ∈ Loc, and let A be a simple type. If H Í ` 7→ a : A and H Í ` 7→ a 0 : A then a = a 0 . 16 Towards Automatic Resource Bound Analysis for OCaml We write H Í ` : A to indicate that there exists a, necessarily unique, semantic value a ∈ ‚Aƒ so that H Í ` 7→ a : A . An environment V and a heap H are well-formed with respect to a context Γ if H Í V (x) : Γ(x) holds for every x ∈ dom(Γ). We then write H Í V : Γ. Similarly, an argument stack S = `1 , . . . , `n is well-formed with respect to a type stack Σ = T1 , . . . , Tn in heap H , written H Í S : Σ, if H Í `i : Ti for all 1 ≤ i ≤ n. Note that the rules in Figure 5 are interpreted coinductively. The reason is that in the rule V:F UN, the location ` can be part of the closure environment V if the closure has been created with the rule E:L ET R EC. The influence of the coinductive definition on the proofs is minimal since all proofs in this article are by induction. Type Preservation. Theorem 1 shows that the evaluation of a well-typed expression in a wellformed environment results in a well-formed environment. Theorem 1. If Σ; Γ ` e : T , H Í V : Γ, H Í S : Σ, and S,V, H M ` e ⇓ (`, H 0 ) | (q, q 0 ) then H 0 Í V : Γ, H 0 Í S : Σ, and H 0 Í ` : T . Theorem 1 is proved by induction on the evaluation judgement. 5 Multivariate Resource Polynomials In this section we define the set of resource polynomials which is the search space of our automatic resource bound analysis. A resource polynomial p : ‚T ƒ → Q+ 0 maps a semantic value of some simple type T to a non-negative rational number. An analysis of typical polynomial computations operating on a list [a 1 , . . . , a n ] shows that they often consist of operations that are executed for every k-tuple (a i 1 , . . . , a i k ) with 1 ≤ i 1 < · · · < i k ≤ n. The simplest examples are linear map operations that perform some operation for every a i . Other common examples are sorting algorithms that perform comparisons for every pair (a i , a j ) with 1 ≤ i < j ≤ n in the worst case. In this article, we generalize this observation to user-defined tree-like data structures. In lists of different node types with constructors C 1 ,C 2 and C 3 , a linear computation is for instance often carried out for all C 1 -nodes, all C 2 -nodes, or all C 1 and C 3 nodes. In general, a typical polynomial computation is carried out for all tuples (a 1 , . . . , a k ) such that a i is a list element with constructor C j for some j and a i appears in the list before a i +1 for all i . As in previous work, which considered binary trees, we will essentially interpret all treelike data structures as lists with different nodes by flattening them in pre-order. As a result, our resource polynomials only depend on the number of nodes of a certain kind in the tree but not on structural measures like the height of the tree. To include the height into resource polynomials in a general way, we would need a way to express a maximum (or a choice) in the resource polynomials. We leave this for future research in favor of compositionality and modularity. For compositionality, it is useful that the potential of a data structure is invariant under changes in the structure of the tree. Base Polynomials and Indices. In Figure 6, we define for each simple type T a set P(T ) of functions p : ‚T ƒ → N that map values of type T to natural numbers. The resource polynomials for type T are then given as non-negative rational linear combinations of these base polynomials. Let B = 〈C 1 : (T1 , n 1 ), . . . ,C m : (Tm , n m )〉 be an inductive type. Let C = [C j 1 , . . . ,C j k ] be a list of B -constructors and b ∈ ‚B ƒ. We inductively define a set τB (C , b) of k-tuples as follow: τB (C , b) is 5 Multivariate Resource Polynomials 17 ∀i : p i ∈ P(Ti ) λ a. 1 ∈ P(T ) λ~ a. Y p i (a i ) ∈ P(T1 ∗ · · · ∗ Tk ) i =1,...,k B = 〈C 1 : (T1 , n 1 ), . . . ,C m : (Tm , n m )〉 C = [C j 1 , . . . ,C j k ] X Y p i (a i ) ∈ P(B ) λ b. ∀i : p i ∈ P(T j i ) ~ a ∈τB (C ,b) i =1,...,k Figure 6: Defining the set P(T ) of base polynomials for type T . ∀ j : I j ∈ I (T j ) ? ∈ I (T ) (I 1 , . . . , I k ) ∈ I (T1 ∗ · · · ∗ Tk ) B = 〈C 1 : (T1 , n 1 ), . . . ,C m : (Tm , n m )〉 ∀i : I j i ∈ I (T j i ) [〈I 1 ,C j 1 〉 , . . . , 〈I k ,C j k 〉] ∈ I (B ) Figure 7: Defining the set I (T ) of indices for type T . the set of k-tuples (a 1 , . . . , a k ) such that C j 1 (a 1 ,~ b 1 ), . . . ,C j k (a k ,~ b k ) are nodes in the tree b ∈ ‚B ƒ ~ ~ and C j 1 (a 1 , b 1 ) <pre · · · <pre C j k (a k , b k ) for the pre-order <pre on b. Like in the lambda calculus, we use the notation λ a. e(a) for the anonymous function that maps an argument a to the natural number that is defined by the expression e(a). Every set P(T ) contains the constant function λ a. 1. In the case of an inductive data type B this constant function arises also for C = [] (one element sum, empty product). In Figure 7, we inductively define for each simple type T a set of indices I (T ). For tuple types T1 ∗ · · · ∗ Tk we identify the index ? with the index (?, . . . , ?). Similarly, we identify the index ? with the index [] for inductive types. Let T be a base type. For each index i ∈ I (T ), we define a base polynomial p i : ‚T ƒ → N as follows. p ? (a) = 1 p (I 1 ,...,I k ) (a 1 , . . . , a k ) = Y p I j (a j ) j =1,...,k p [〈I 1 ,C 1 〉,...,〈I k ,C k 〉] (b) = X Y ~ a ∈τB ([C 1 ,...,C k ],b) j =1,...,k p I j (a j ) Examples. To illustrate the definitions, we construct the set of base polynomials for different data types. • We first consider the inductive type singleton that has only one constructor without arguments. singleton = µX 〈 Nil : unit〉 Then we have 18 Towards Automatic Resource Bound Analysis for OCaml ‚singletonƒ = { Nil (())} P(singleton) = {λ a. 1, λ a. 0} . and To see why, we first examine the set of tuples T (C ) = τsingleton (C , Nil (())) for different list of constructors C . If |C | > 1 then T (C ) = ; because the tree Nil (()) does not contain any tuples of size 2. Thus we have p [〈I 1 ,C 1 〉,...,〈I k ,C k 〉] ( Nil (())) = 0 in this case (empty sum). The only remaining constructor lists C are [] and [〈?, Nil 〉]. As always p [] ( Nil (())) = 1 (singleton sum). Furthermore p [〈?, Nil 〉] ( Nil (())) = 1 because τsingleton ([〈?, Nil 〉], Nil (())) = { Nil (())} and P(unit) = {λ a. 1}. • Let us now consider the usual sum type sum(T1 , T2 ) = µX 〈 Left : T1 , Right : T2 〉 ; . Then ‚sum(T1 , T2 )ƒ = { Left (a) | a ∈ ‚T1 ƒ} ∪ { Right (b) | b ∈ ‚T2 ƒ}. If we define σC (p)(C 0 (a)) ½ p(a) 0 if C = C 0 otherwise then P(sum(T1 , T2 )) = {x 7→ 1, x 7→ 0} ∪ {σ Left (p) | p ∈ P(T1 )} ∪ {σ Right (p) | p ∈ P(T2 )}. • The next example is the list type list(T ) = µX 〈 Cons : T ∗X , Nil : unit〉 . Then ‚list(T )ƒ = { Nil (()), Cons (a 1 , Nil (())), . . .} and we write ‚list(T )ƒ = {[], [a 1 ], [a 1 , a 2 ], . . . | a i ∈ ‚T ƒ} . We have τlist ([〈?, Cons 〉], [a 1 , . . . , a n ]) = {a 1 , . . . , a n } and furthermore τlist ([〈?, Cons 〉 , 〈?, Cons 〉], [a 1 , . . . , a n ]) = {(a i , a j ) | 1 ≤ i < j ≤ n} . More generally, let C = [〈?, Cons 〉 , . . . , 〈?, Cons 〉] or C = [〈?, Cons 〉 , . . . , 〈?, Cons 〉 , 〈?, Nil 〉] for lists of length k and k + 1, respectively. Then τlist (C , [a 1 , . . . , a n ]) = {(a i 1 , . . . , a i k ) | 1 ≤ 0 i 1 < · · · < i k ≤ n}. On the other hand, ¡ ¢ τlist (D, [a 1 , . . . , a n ]) = ; if D = 〈?, Nil 〉 ::D for some P D 0 6= []. Since ~a ∈τ (C ,[a1 ,...,an ]) 1 = nk and λ a. 1 ∈ P(T ) we have list à ! |b| {λ b. | n ∈ N} ⊆ P(list(T )) . n • Finally consider a list type with two different Cons -nodes (as in the running example in Figure 1) list2(T1 , T2 ) = µX 〈 C1 : T1 ∗X , C2 : T2 ∗ X , Nil : unit〉 . Then we write (similarly as for list(T)) ‚list2(T1 , T2 )ƒ = {[], [a 1 ], [a 1 , a 2 ], . . . | a i ∈ ({C 1 } × ‚T1 ƒ) ∪ ({C 2 } × ‚T2 ƒ)} . Let b = [b 1 , . . . , b n ]. We have for example τlist2 ([〈?, C1 〉], b) = {b 1 , . . . , b n | ∀i ∃a : b i = ( C1 , a)} and τlist2 ([〈?, C1 〉 , 〈?, C2 〉], [b 1 , . . . , b n ]) = {(b i , b j ) | ∀i , j ∃a, a 0 : b i = ( C1 , a)∧b j = ( C2 , a 0 ) ∧ 1 ≤ i < j ≤ n}. 5 Multivariate Resource Polynomials 19 ¡|b| ¢ P If C = [〈?,C 1 〉 , . . . , 〈?,C 1 〉] and |C | = k then ~a ∈τ (C ,b) 1 = kC1 where |b| C1 denotes the list2 number of C1 -nodes in the list b. Therefore we have à ! à ! |b|C 1 |b|C 2 {λ b. | n ∈ N} ⊆ P(list2(T )) and {λ b. | n ∈ N} ⊆ P(list2(T )) . n n Now consider the set D of constructor lists D such that D contains exactly k 1 elements S of the form 〈?,C 1 〉 and k 2 elements of the form 〈?,C 2 〉. If S = D∈D τlist2 (D, b) then ¡|b| C ¢¡|b| C ¢ P 1 2 . This means that such products of binomial coefficients are sums of ~ a ∈S 1 = k k2 1 base polynomials. • Coinductive types like stream(T ) = µX 〈 St : T ∗X 〉 are not inhabited in our language since we interpret them inductively. A data structure of such a type cannot be created since we allow recursive definitions only for functions. Spurious Indices. The previous examples illustrate that for some inductive data structures, different indices encode the same resource polynomial. For example, for the type list(T ) we have p [〈?, Nil 〉] (a) = p [] (a) = 1 for all lists a. Additionally, some indices encode a polynomial that is constantly zero. For the type list(T ) this is for example the case for p 〈?, Nil 〉 ::C if |C | > 0. We call such indices spurious. In practice, it is not beneficial to have spurious indices in the index sets since they slow down the analysis without being useful components of bounds. It is straightforward to identify spurious indices from the data type definition. The index [〈I 1 ,C 1 〉 , . . . , 〈I k ,C k 〉] is for example spurious if k > 1 and the branching number of C i is 0 for an i ∈ {1, . . . , k − 1}. Resource Polynomials. A resource polynomial p : ‚T ƒ → Q+ 0 for a simple type T is a nonnegative linear combination of base polynomials, i.e., X p= qi · p i i =1,...,m for m ∈ N, q i ∈ Q+ 0 and p i ∈ P(T ). We write R(T ) for the set of resource polynomials for the base type T . Running Example. Consider again our running example from Figure 1. For the function abmap, we derived the evaluation-step bound 3 + 12L + 12N . It corresponds to the following resource polynomial. 12p (?,?,[〈?, Acons 〉]) + 12p (?,?,[〈?, Bcons 〉]) + 3p (?,?,[]) . For the function asort’, we derived the evaluation-step bound 13 + 22K N + 13K 2 N + 15N , which corresponds to the resource polynomial 26p (?,[〈[〈?,::〉,〈?,::〉], Acons 〉]) + 35p (?,[〈[〈?,::〉], Acons 〉]) + 15p (?,[〈[], Acons 〉]) + 13p (?,[]) . Selecting a Finite Index Set. Every resource polynomial is defined by a finite number of base polynomials. In an implementation, we also have to fix a finite set of indices to make possible an effective analysis. The selection of the indices to track can be customized for each inductive data type and for every program. However, we currently allow the user only to select a maximal degree of the bounds and then track all indices that correspond to polynomials of the same or a smaller degree. 20 Towards Automatic Resource Bound Analysis for OCaml 6 Resource-Aware Type System In this section, we describe the resource-aware type system. Essentially, we annotate the simple type system from Section 4 with resource annotations so that type derivations correspond to proofs of resource bounds. Type Annotations. We use the indices and base polynomials to define type annotations and resource polynomials. A type annotation for a simple type T is defined to be a family Q T = (q I )I ∈I (T ) with q I ∈ Q+ 0 We write Q(T ) for the set of type annotations for the type T . An annotated type is a pair (A,Q) where Q is a type annotation for the simple type |A| where A and |A| are defined as follows. A ::= unit | X | A ref | A 1 ∗ · · · ∗ A n | 〈[A 1 , . . . , A n ] → B, Θ〉 | µX . 〈C 1 : A 1 ∗X n1 , . . . ,C k : A k ∗X nk 〉 We define |A| to be the simple type T that can be obtained from A by removing all type annotations from function types. A function type 〈[A 1 , . . . , A n ] → B, Θ〉 is annotated with a set Θ ⊆ {(Q A ,Q B ) | Q A ∈ Q(|A 1 ∗ · · · ∗ A n |) ∧Q B ∈ Q(|B |)} . The set Θ can contain multiple valid resource annotations for arguments and the result of the function. Potential of Annotated Types and Contexts. Let (A,Q) be an annotated type. Let H be a heap and let v be a value with H Í ` 7→ a : |A|. Then the type annotation Q defines the potential X ΦH (v : (A,Q)) = q I · p I (a) I ∈I (T ) where only finitely many q I ’s are non-zero. Usually, we define type annotations Q by only stating the values of the non-zero coefficients q I . P If a ∈ ‚|A|ƒ and Q ∈ Q(|A|) is a type annotation then we also write Φ(a : (A,Q)) for I q I ·p I (a). For use in the type system we need to extend the definition of resource polynomials to type contexts and stacks. We treat them like tuple types. Let Γ = x 1 :A 1 , . . . , x n :A n be a type context and let Σ = B 1 , . . . , B m be a list of types. The index set I (Σ; Γ) is defined through I (Σ; Γ)={(I 1 , . . . , I m , J 1 , . . . , J n ) | I j ∈I (|B j |), J i ∈I (|A i |} . A type annotation Q for Σ; Γ is a family Q = (q I )I ∈I (Σ;Γ) with q I ∈ Q+ 0. We denote a resource-annotated context with Σ; Γ;Q. Let H be a heap and V be an environment with H Í V : Γ where H Í V (x j ) 7→ a x j : |Γ(x j )| . Let furthermore S = `1 , . . . , `m be an argument stack with H Í S : Σ where H Í `i 7→ b i : |B i | for all i . The potential of Σ; Γ;Q with respect to H and V is m+n m X Y Y ΦS,V,H (Σ; Γ;Q) = q~I p I j (b j ) p I j (a x j ) ~ I ∈I (Σ;Γ) j =1 j =m+1 Here, ~ I = (I 1 , · · · , I m+n ). In particular, if Σ = Γ = · then I (Σ; Γ) = {()} and ΦV,H (Σ; Γ; q () ) = q () . We sometimes also write q ? for q () . 6 Resource-Aware Type System 21 Folding of Potential Annotations. A key notion in the type system is the folding for potential annotations that is used to assign potential to typing contexts that result from a pattern match (unfolding) or from the application of a constructor of an inductive data type (folding). Folding of potential annotations is conceptually similar to folding and unfolding of inductive data types in type theory. Let B = µX . 〈. . . ,C : A∗X n , . . .〉 be an inductive data type. Let Σ be a type stack, Γ, b:B be a context and let Q = (q I )I ∈I (Σ;Γ,y:B ) be a context annotation. The C -unfolding CCB (Q) of Q with respect to B is an annotation CCB (Q) = (q I0 )I ∈I (Σ;Γ0 ) for a context Γ0 = Γ, x:A∗B n that is defined by 0 q (I ,(J ,L 1 ,...,L n )) ½ = q (I ,〈J ,C 〉 :: L 1 ···L n ) + q (I ,L 1 ···L n ) q (I ,〈J ,C 〉 :: L 1 ···L n ) J =0 J 6= 0 Here, L 1 · · · L n is the concatenation of the lists L 1 , . . . , L n . Lemma 2. Let B = µX . 〈. . . ,C : A∗X n , . . .〉 be an inductive data type. Let Σ; Γ, x:B ;Q be an annotated context, H Í V : Γ, x:B , H Í S : Σ, H (V (x)) = (C , `), and V 0 = V [y 7→ `]. Then H Í V 0 : Γ, y:A∗B n and ΦS,V,H (Σ; Γ, x:B ;Q) = ΦS,V 0 ,H (Σ; Γ, y:A∗B n ; CCB (Q)). Sharing. Let Σ; Γ, x 1 :A, x 2 :A;Q be an annotated context. The sharing operation . Q defines an annotation for a context of the form Σ; Γ, x:A. It is used when the potential is split between multiple occurrences of a variable. Lemma 3 shows that sharing is a linear operation that does not lead to any loss of potential. (i , j ) Lemma 3. Let A be a data type. Then there are natural numbers c k for i , j , k ∈ I (|A|) such that the following holds. For every context Σ; Γ, x 1 :A, x 2 :A;Q and every H ,V with H Í V : Γ, x:A and H Í S : Σ it holds that ΦS,V,H (Σ, Γ, x:A;Q 0 ) = ΦS,V 0 ,H (Σ; Γ, x 1 :A, x 2 :A;Q) where V 0 = V [x 1 , x 2 7→ P (i , j ) 0 V (x)] and q (`,k) = i , j ∈I (A) c k q (`,i , j ) . (i , j ) The coefficients c k can be computed effectively. We were however not able to derive a closed formula for the coefficients. The proof is similar as in previous work [31]. For a context Σ; Γ, x 1 :A, x 2 :A;Q we define . Q to be Q 0 from Lemma 3. Type Judgements. A resource-aware type judgement has the form Σ; Γ;Q M ` e : (A,Q 0 ) where Σ; Γ;Q is an annotated context, M is a resource metric, A is an annotated type, and Q 0 is a type annotation for |A|. The intended meaning of this judgment is that if there are more than Φ(Σ; Γ;Q) resource units available then this is sufficient to cover the evaluation cost of e under metric M . In addition, there are at least Φ(v:(A,Q 0 )) resource units left if e evaluates to a value v. Notations. Families that describe type and context annotations are denoted with upper case letters Q, P, R, . . . with optional superscripts. We use the convention that the elements of the families are the corresponding lower case letters with corresponding superscripts, i.e., Q = (q I )I ∈I and Q 0 = (q I0 )I ∈I . If Q, P and R are annotations with the same index set I then we extend operations on Q pointwise to Q, P and R. For example, we write Q ≤ P + R if q I ≤ p I + r I for every I ∈ I . For K ∈ Q we write Q = Q 0 + K to state that q ? = q ?0 + K ≥ 0 and q I = q I0 for I 6= ? ∈ I . Let Γ = Γ1 , Γ2 be a context, let I = (I 1 , . . . , I k ) ∈ I (Γ1 ) and J = (J 1 , . . . , J ` ) ∈ I (Γ2 ) . We write (I , J ) for the index 22 Towards Automatic Resource Bound Analysis for OCaml (I 1 , . . . , I k , J 1 , . . . , J ` ) ∈ I (Γ). Let Q be an annotation for a context Σ; Γ1 , Γ2 . For J ∈ I (Γ2 ) we define Γ the projection π(J1,J 0 ) (Q) of Q to Γ1 to be the annotation Q 0 for ·; Γ1 with q I0 = q (J ,I ,J 0 ) . In the same Σ;Γ1 way, we define the annotations πΣJ (Q) for Σ; · and π J (Q) for Σ; Γ1 . Cost Free Types. We write Σ; Γ;Q cf ` e : (A,Q 0 ) to refer to cost-free type judgments where cf is the cost-free metric with cf (K ) = 0 for constants K . We use it to assign potential to an extended context in the let rule. More info is available in previous work [32]. Subtyping. As usual, subtyping is defined inductively so that types have to be structurally identical. The most interesting rule is the one for function types: Θ0 ⊆ Θ ∀i : A 0i <: A i B <: B 0 〈[A 1 , . . . , A n ] → B, Θ〉 <: 〈[A 01 , . . . , A 0n ] → B 0 , Θ0 〉 (S:F UN ) A function type is a subtype of another function type if it allows more resource behaviors (Θ0 ⊆ Θ). Result types are treated covariant and arguments are treated contravariant. Unsurprisingly, our type system does not have principle types. This is to allow the typing of examples such as rec_scheme from Section 2. In a principle type, we would have to assume the weakest type for the arguments, that is, function types that are annotated with empty sets of type annotations. This would mean that we cannot use functions in the arguments. However, it is possible to derive a principle type 〈Σ → B, Θ〉 for fixed argument types Σ. Here, we would derive all possible annotations (Q,Q 0 ) ∈ Θ in the function annotation and all possible annotations (Q,Q 0 ) that appear in function annotations of the result type. If we take the more algorithmic view of previous work [42] then we can express a principle type for a function with a set of constraints that has holes for the constraint sets of the higherorder arguments. It is however unclear what such a type means for a user and we prefer a more declarative view that clearly separates type checking and type inference. An open problem with constraint based principle types is polymorphism. Type Rules. Figure 8 and Figure 9 contain the type rules for annotated types. We integrated the new concepts so that the rules look similar to the rules in previous papers [42, 31, 34]. The rule A:VAR can only be applied if the type stack Σ is empty. It then simply accounts for the cost M var and passes the potential that is assigned to the variable by the type context to the result type. If the type stack is not empty then the rule A:VAR P USH has to be applied. In this case, the variable x must have a function type. We then look up a possible type annotation for the arguments and the result (P, P 0 ) ∈ Θ in the type context, account for the cost of variable look-up (M var ) and behave as specified by (P, P 0 ). We do not account for the cost of the “function application” because is cost is handled in the rules A:A PP and A:A PP P USH. The rules A:A PP and A:A PP P USH correspond to the simple type rules T:A PP and T:A PP P USH. app In A:A PP we assume that the type stack is empty. We account for the cost M n of applying a function to n arguments and look up valid potential annotations (P, P 0 ) for the function body in the function annotation Θ. We then require that we have the potential specified by P available and return potential as specified by P 0 . In the rule A:A PP P USH we account for two applications: We first account for the function application as in the rule A:A PP. We then assume that the return type is a function type and apply the arguments that are stored on the type stack Σ as we do in the rule A:VAR P USH. The rules A:A BS P USH and A:A BS P OP for lambda abstraction correspond the rules T:A BS P USH and T:A BS P OP. As in the simple type system we can use them to non-deterministically pop 6 Resource-Aware Type System Q = Q 0 + M var (A:VAR ) ·; x:B ;Q M ` x : (B,Q 0 ) Γ = x 1 :A 1 , . . . , x n :A n 23 (P, P 0 ) ∈ Θ Σ;· π? (Q) = P + M var P 0 = Q0 Σ; x: 〈Σ → B, Θ〉 ;Q M ` x : (B,Q 0 ) πΓ? (Q) = P + M n app (P, P 0 ) ∈ Θ Q0 = P 0 ·; x: 〈[A 1 , . . . , A n ]→B, Θ〉 , Γ;Q M ` x x 1 · · · x n : (B,Q 0 ) (P, P 0 ) ∈ Θ Γ = x 1 :A 1 , . . . , x n :A n app 0 πΣ πΓ? (Q) = P + M n ? (Q)−q ? +p ? = R (R, R 0 ) ∈ Θ0 (A:VAR P USH ) (A:A PP ) R0 = Q0 Σ; x: 〈[A 1 , . . . , A n ]→ 〈Σ→B, Θ0 〉 , Θ〉 , Γ;Q M ` x x 1 · · · x n : (B,Q 0 ) Σ; Γ, x:A; P M ` e : (B,Q 0 ) ∀ I ,~ J : r (I ,~J ) = p (~J ,I ) Q = R + M bind (A:A BS P USH ) A::Σ; Γ;Q M ` λx.e : (B,Q 0 ) Q = Q 0 + M abs ∀(P, P 0 ) ∈ Θ : Σ; Γ; R M ` λx.e : (B, P 0 ) ∧ r (~I ,~J ) = ½ p~I 0 (A:A PP P USH ) if ~ J =~ ? otherwise ·; Γ;Q M ` λx.e : (〈Σ → B, Θ〉 ,Q 0 ) B = µX . 〈. . .C : A∗X n . . .〉 Σ; Γ, y:A∗B ; P M ` e 1 : (A 0 , P 0 ) Σ; Γ, x:B ; R M ` e 2 : (A 0 , R 0 ) C mat 0 0 CB (Q) = P +M1 P =Q Q = R+M 2mat R0 = Q0 (A:A BS P OP ) n Σ; Γ, x:B ;Q M ` match x with C y → e 1 | e 2 : (A 0 ,Q 0 ) (A:M AT ) Q = CCB (Q 0 )+M cons B = µX . 〈. . .C : A∗X n . . .〉 ·; x:A∗B n ;Q M `C x : (B,Q 0 ) Σ; Γ, x 1 :A, x 2 :A; P M ` e : (B,Q 0 ) (A:C ONS ) Q = M share + . (P ) Σ; Γ, x:A;Q M ` share x as (x 1 , x 2 ) in e : (B,Q 0 ) (A:S HARE ) Σ; Γ2 , Γ1 ; P M ` e 1 Σ; Γ2 , x:A; P 0 0 Σ; Γ2 , x:A; R M ` e 2 : (B,Q ) Q = P + M 1let P 0 = R + M 2let Σ; Γ2 , Γ1 ;Q M ` let x = e 1 in e 2 : (B,Q 0 ) F , f 1 = λx 1 .e 1 and · · · and f n = λx n .e n ∆ = f 1 :A 1 , . . . , f n :A n ∀i : ·; Γi , ∆; P i M ` λx i .e i : (A i , P i0 ) Σ;Γ0 Σ;Γ0 rec π~? (Q) = π~? (P ) + M + n·M abs Σ; Γ0 , ∆; P M ` e : (B,Q 0 ) Σ; Γ0 , . . . , Γn ;Q M ` let rec F in e : (B,Q 0 ) (A:L ET ) (A:L ET R EC ) ¦ ¦ ¦ ∀ j ∈ I (Σ; ∆): 0 0 j =~ ? =⇒ ·; Γ; πΓj (Q) M ` e : (A, πx:A (Q )) j 6=~ ? =⇒ ·; Γ; πΓj (Q) cf ` e : (A, πx:A j j (Q )) Σ; ∆, Γ;Q M ` e Σ; ∆, x:A;Q 0 Figure 8: Type rules for annotated types (part 1 of 2). (B:B IND ) 24 Towards Automatic Resource Bound Analysis for OCaml Q = Q 0 + M tuple B = A1 ∗ · · · ∗ An ·; x 1 :A 1 , . . . , x n :A n ;Q M `(x 1 , . . . , x n ) : (B,Q 0 ) A = A1 ∗ · · · ∗ An (A:T UPLE ) Q = P + M matT Σ; Γ, x 1 :A 1 , . . . , x n :A n ; P M ` e : (B,Q 0 ) Σ; Γ, x:A;Q M ` match x with (x 1 , . . . , x n ) → e : (B,Q 0 ) q ? = q ?0 + M fail Σ; ·;Q ` fail : (B,Q)’ ·; ·;Q ` tick (q) : (unit,Q 0 ) q I0 q ? = q ?0 + M ref ·; x : A;Q M ` ref x : (A ref,Q 0 ) (P, P 0 ) ∈ Θ q () = q ?0 + M tick (q) (A:FAIL ) (A:R EF ) ½ = q ? − M dref 0 P 0 = Q0 Σ; x : 〈Σ → A, Θ〉 ref;Q M ` ! x : (A,Q 0 ) q ? = q ?0 + M assign ·; x 1 : A ref, x 2 : A;Q M ` x 1 := x 2 : (unit,Q 0 ) Σ; Γ; P ` e : (B, P 0 ) 0 Σ; Γ, x:A;Q M ` e : (B,Q ) (A:W EAK -C) if I = ? otherwise (A:A SSIGN ) (A:W EAK -A) Σ; Γ;Q M ` e : (B 0 ,Q 0 ) Σ; Γ, x:A 0 ;Q M ` e : (B,Q 0 ) B 0 <: B 0 Σ; Γ;Q M ` e : (B,Q ) A <: A 0 Σ; Γ, x:A;Q M ` e : (B,Q 0 ) (A:DR EF ) (A:DR EF P USH ) Q0 ≤ P 0 + c Q ≥ P +c Σ; Γ;Q ` e : (B,Q 0 ) Σ; Γ; πΓ? (Q) M ` e : (B,Q 0 ) (A:T ICK ) ·; x : A ref;Q M ` ! x : (A,Q 0 ) dref πΣ;· ? (Q) = P + M (A:M AT T ) (A:S UBTYPE -C) Figure 9: Type rules for annotated types (part 2 of 2). (A:S UBTYPE -R) 6 Resource-Aware Type System 25 the type stack Σ. When we do so in the rule A:A BS P OP, we create the function annotation Θ by essentially deriving Σ; Γ; P M ` λx.e : (B, P 0 ) for every (P, P 0 ) ∈ Θ. However, we throw away all potential that depends on the context Γ and only use the potential that is assigned the arguments Σ (annotation R). The rule A:C ONS assigns potential to a new node of an inductive data structure. The additive shift CCB (Q 0 ) transforms the annotation Q 0 to an annotation Q for the context ·; x:A∗B n . Lemma 2 shows that potential is neither gained nor lost by this operation. The potential Q of the context has to pay for both the potential Q 0 of the resulting list and the resource cost M cons of the construction of the new node. The rule A:M AT shows how to treat pattern matching. The initial potential defined by the annotation Q of the context Σ; Γ, x:B has to be sufficient to pay the costs of the evaluation of e 1 or e 2 (depending on whether the matched succeeds) and the potential defined by the annotation Q 0 of the result type. To type the expression e 2 we basically just use the annotation Q (after paying for the constant match cost). To type the expression e 1 we rely on the additive shift CCB (Q) that results in an annotation for the context Σ; Γ, y:A∗B n . Again there is no loss of potential (see Lemma 2). The equalities relate the potential before and after the evaluation of e 1 or e 2 , to the potential before and after the evaluation of the match operation by incorporating the respective resource cost for the matching. The rule A:S HARE uses the sharing operation . P to related the potentials defined by Σ; Γ, x:A;Q and Σ; Γ, x 1 :A, x 2 :A; P . As with matching, there is no loss of potential (see Lemma 3). In the rule A:L ET the result of the evaluation of an expression e 1 is bound to a variable x. The problem that arises is that the resulting annotated context Σ; Γ2 , x:A; R features potential functions whose domain consists of data that is referenced by x as well as data that is referenced in the type context Γ2 . This potential has to be related to data that is referenced by Γ2 and the free variables in e 1 (i.e., the variables in the type context Γ1 ). To express the relations between mixed potentials before and after the evaluation of e 1 , we introduce a new auxiliary binding judgement of the from Σ; ∆, Γ;Q M ` e Σ; ∆, x:A;Q 0 in the rule B:B IND. The intuitive meaning of the judgement is the following. Assume that e is evaluated in the context ∆, Γ, FV(e) ∈ dom(Γ), and that e evaluates to a value that is bound to the variable x. Then the initial potential Φ(Σ; ∆, Γ;Q) is larger than the cost of evaluating e in the metric M plus the potential of the resulting context Φ(Σ, ∆, x:A;Q 0 ). Lemma 4 formalizes this intuition. Lemma 4. Let H Í V :∆, Γ, H Í S : Σ, and Σ; ∆, Γ;Q M ` e Σ; ∆, x:A;Q 0 . 1. If S,V, H M ` e ⇓ (`, H 0 ) | (p, p 0 ) then ΦS,V,H (∆, Γ;Q) ≥ p + ΦS,V 0 ,H 0 (∆, x:A;Q 0 ) where V 0 = V [x 7→ `]. 2. If S,V, H M ` e ⇓ ρ | (p, p 0 ) then p ≤ ΦS,V,H (Γ;Q). Formally, Lemma 4 is a consequence of the soundness of the type system (Theorem 2). In the inductive proof of Theorem 2, we use a weaker version of Lemma 4 in which the soundness of the type judgements in Lemma 4 is an additional precondition. The rule A:L ET R EC is similar the rule T:L ET R EC for standard type systems. The cost of the creation of the n closures is accounted for by n·M abs . It is not difficult to relate this cost to the number of captured variables in the closure but we refrain from doing so in favor of simplicity. The initial potential, defined by Σ; Γ0 , . . . , Γn ;Q, only flows into the potential Σ; Γ0 , ∆; P that is 26 Towards Automatic Resource Bound Analysis for OCaml used to pay for the cost of evaluating the expression e. The potential annotation P i and P i0 that are used in the typing of the recursive functions are unconstrained. This is not a bug but uses the fact that P i can only be used to pay for the cost of the closure creation in the rule A:A BS P OP. In the rule A:FAIL, we only require that the constant potential M fail is available. In contrast to the other rules we do not relate the initial potential Q with the resulting potential Q 0 . Intuitively, this is sound because the program is aborted when evaluating the expression fail. A consequence of the rule T: FAIL is that we can type the expression let x = fail in e with constant initial potential M fail regardless of the resource cost of the expression e. In the rule A:T ICK we simply require that M tick (q) constant potential is available. In the rule A:R EF, we only require the availability of the constant potential M ref . We discard the remaining potential that is assigned to x by Q. Since references do not carry potential in our system, q ?0 is the only coefficient in Q 0 . In the rule A:A SSIGN we simply pay for the cost of the operation (M assign ) and discard the potential that is assigned to the arguments. Since the return value is (), q ?0 is the only coefficient in Q 0 . In the rule T:AD REF, we again discard the potential of the arguments and also require that the non-linear coefficients of the annotation of the result are zero. Again, this is because references do not carry potential. The structural rules A:W EAK -A, A:W EAK -C, A:S UBTYPE -R, and A:S UBTYPE -C apply to every expression. In the implementation, they are integrated into the syntax directed rules to enable automatic type inference. As expected, they are used at the exact same places at which you would use corresponding rules in a standard type system; for instance, when combining branches (weakening and subtyping) of match expressions or when constructing inductive data structures (subtyping). The rule A:W EAK -A relies on the fact that an annotated type remains sound if we add more potential to the context and remove potential from the result. Similarly, the rule A:W EAK -C states that we can add variables with arbritary to the type context. The rules A:S UBTYPE -R and A:S UBTYPE -C are similar to the standard rules of subtyping. Soundness. Our goal is to prove the following soundness statement for type judgements. Intuitively, it says that the initial potential is an upper bound on the watermark resource usage, no matter how long we execute the program. If Σ; Γ;Q M ` e : (A,Q 0 ) and S,V, H M ` e ⇓ w | (p, p 0 ) then p ≤ ΦS,V,H (Σ; Γ;Q). To prove this statement by induction, we need to prove a stronger statement that takes into account the return value and the annotated type (A,Q 0 ) of e. Moreover, the previous statement is only true if the values in S, V and H respect the types required by Σ and Γ. Therefore, we adapt our definition of well-formed environments to annotated types. We simply replace the rule V:F UN in Figure 5 with the following rule. Of course, H Í V : Γ refers to the newly defined judgment. H (`) = (λx.e,V ) ∃ Γ,Q,Q 0 : H Í V : Γ ∧ ·; Γ;Q M ` λx.e : (〈Σ → B, Θ〉 ,Q 0 ) H Í ` 7→ (λx.e,V ) : 〈Σ → B, Θ〉 ( V:F UN ) In addition to the aforementioned soundness, Theorem 2 states a stronger property for terminating evaluations. If an expression e evaluates to a value v in a well-formed environment then the difference between initial and final potential is an upper bound on the resource usage of the evaluation. Theorem 2 (Soundness). Let H Í V : Γ, H Í S : Σ, and Σ; Γ;Q M ` e : (B,Q 0 ). 1. If S,V, H M ` e ⇓ (`, H 0 ) | (p, p 0 ) then p ≤ ΦS,V,H (Σ; Γ;Q) and p − p 0 ≤ ΦS,V,H (Σ; Γ;Q) − ΦH 0 (`:(B,Q 0 )) and H Í ` : B . 7 Implementation and Bound Inference Input Program Parser Type Inference OCaml Bytecode Typed OCaml Syntax Tree 27 RAML Compiler RAML Analyzer Explicit Let Polymorphism Multivariate AARA Bracket-Type Inference Stack-Based Type Checking Typed RAML Syntax Tree LP Solver Frontend Resource Type Interpretation Share-Let Normal Form Resource Metrics OCaml - C Bindings CLP Resource Bounds Figure 10: Implementation of RAML. 2. If S,V, H M ` e ⇓ ◦ | (p, p 0 ) then p ≤ ΦS,V,H (Σ; Γ;Q). Theorem 2 is proved by a nested induction on the derivation of the evaluation judgment and the type judgment Σ; Γ;Q ` e:(B,Q 0 ). The inner induction on the type judgment is needed because of the structural rules. There is one proof for all possible instantiations of the resource constants. An sole induction on the type judgement fails because the size of the type derivation can increase in the case of the function application in which we retrieve a type derivation for the function body from the well-formed judgement as defined by the (updated) rule V:F UN. The structure of the proof matches the structure of the previous soundness proofs for type systems based on AARA [35, 42, 31, 34]. The induction case of many rules is similar to the induction cases of the corresponding rules for multivariate AARA for first-order programs [31] and linear AARA for higher-order programs [42]. For one thing, additional complexity is introduced by the new resource polynomials for user-defined data types. We designed the system so that this additional complexity is dealt with locally in the rules A:M AT, A:C ONS, and A:S HARE. The soundness of these rules follows directly from an application of Lemma 2 and Lemma 3, respectively. As in previous work [35] the well-formed judgement that captures type derivations enables us to treat function abstraction and application in a very similar fashion as in the first-order case [31]. The coinductive definition of the well-formedness judgement does not cause any difficulties. A major novel aspect in the proof is the typed argument stack S : Σ that also carries potential. Surprisingly, this typed stack is simply treated like a typed environment V : Γ in the proof. It is already incorporated in the shift and share operations (Lemma 2 and Lemma 3). We deal with the mutable heap by requiring that array elements do not influence the potential of an array. As a result, we can prove the following lemma, which is used in the proof of Theorem 2. Lemma 5. If H Í V :Γ, H Í S : Σ, Σ; Γ;Q M ` e : (B,Q 0 ) and S,V, H M ` e ⇓ (`, H 0 ) | (p, p 0 ) then ΦS,V,H (Γ;Q) = ΦS,V,H 0 (Γ;Q). 7 Implementation and Bound Inference Figure 10 shows an overview of the implementation of RAML. It consists of about 12000 lines of OCaml code, excluding the parts that we reused from Inria’s OCaml implementation. The development took around 8 person months. We found it very helpful to develop the implementation and the theory in parallel, and many theoretical ideas have been inspired by implementation challenges. 28 Towards Automatic Resource Bound Analysis for OCaml We reuse the parser and type inference algorithm from OCaml 4.01 to derive a typed OCaml syntax tree from the source program. We then analyze the function applications to introduce bracket function types. To this end, we copy a lambda abstraction for every call site. We still have to implement a unification algorithm since functions, such as let g = f x, that are defined by partial application may be used at different call sites. Moreover, we have to deal with functions that are stored in references. In the next step, we convert the typed OCaml syntax tree into a typed RAML syntax tree. Furthermore, we transform the program into share-let-normal form without changing the resource behavior. For this purpose, each syntactic form has a free flag that specifies whether it contributes to the cost of the original program. For example, all share forms that are introduced are free. We also insert eta expansions whenever they do not influence resource usage. After this compilation phase, we perform the actual multivariate AARA on the program in share-let-normal form. Resource metrics can be easily specified by a user. We include a metric for heap cells, evaluation steps, and ticks. Ticks allows the user to flexibly specify the resource cost of programs by inserting tick commands Raml.tick(q) where q is a (possibly negative) floating-point number. In principle, the actual bound inference works similarly as in previous AARA systems [35, 30]: First, we fix a maximal degree of the bounds and annotate all types in the derivation of the simple types with variables that correspond to type annotations for resource polynomials of that degree. Second, we generate a set of linear inequalities, which express the relationships between the added annotation variables as specified by the type rules. Third, we solve the inequalities with Coin-Or’s fantastic LP solver CLP. A solution of the linear program corresponds to a type derivation in which the variables in the type annotations are instantiated according to the solution. The objective function contains the coefficients of the resource annotation of the program inputs to minimize the initial potential. Modern LP solvers provide support for iterative solving that allows us to express that minimization of higher-degree annotations should take priority. The type system we use in the implementation significantly differs from the declarative version we describe in this article. For one thing, we have to use algorithmic versions of the type rules in the inference in which the non-syntax-directed rules are integrated into the syntaxdirected ones [31]. For another thing, we annotate function types not with a set of type annotations but with a function that returns an annotation for the result type if presented with an annotation of the return type. The annotations here are symbolic and the actual numbers are yet to be determined by the LP solver. Function annotations have the side effect of sending constraints to the LP solver. It would be possible to keep a constraint set for the respective function in memory and to send a copy with fresh variables to the LP solver at every call. However, it is more efficient to lazily trigger the constraint generation from the function body at every call site when the function is provided with a return annotation. To make the resource analysis more expressive, we also allow resource-polymorphic recursion. This means that we need a type annotation in the recursive call that differs from the annotations in the argument and result types of the function. To infer such types we successively infer type annotations of higher degree. Details can be found in previous work [32]. For the most part, our constraints have the form of a so-called network (or network-flow) problem [53]. LP solvers can handle network problems very efficiently and in practice CLP solves the constraints RAML generates in linear time. Because our problem sizes are large, we can save memory and time by reducing the number of constraints that are generated during typing. A representative example of an optimization is that we try to reuse constraint names instead of producing constraints like p = q. 8 Experimental Evaluation 29 RAML provides two ways of analyzing a program. In main mode RAML derives a bound for evaluation cost of the main expression of the program, that is, the last expression in the top-level list of let bindings. In module mode, RAML derives a bound for every top-level let binding that has a function type. Apart from the analysis itself, we also implemented the conversion of the derived resource polynomials into easily-understood polynomial bounds and a pretty printer for RAML types and expressions. Additionally, we implemented an efficient RAML interpreter that we use for debugging and to determine the quality of the bounds. 8 Experimental Evaluation The development of RAML was driven by an ongoing experimental evaluation with OCaml code. Our goal has been to ensure that the derived bounds are precise, that different programming styles are supported, that the analysis is efficient, and that existing code can be analyzed. In an experimental evaluation, we applied our automatic resource bound analysis to 411 functions and 6018 lines of code. The source code of RAML as well as all OCaml files used in the experiments are available online [29]. The website also provides an easy-to-use interactive web interface that can be used to experiment with RAML. Analyzed Code and Limitations. The experiments have been performed with four sets of source code, extracted OCaml code from Coq specifications in CompCert [46], an OCaml tutorial [48], code from the OCaml standard library, and handwritten code. For the handwritten part, we mostly implemented classical textbook algorithms and use cases inspired from real-word applications. The textbook algorithms include algorithms for matrices, graph algorithms, search algorithms, and classic examples from amortized analysis such as functional queues and binary counters. The use cases include energy management in an autonomous mobile device and calling Amazon’s Dynamo DB from OCaml (see Section 9). OCaml is a complex programming language and RAML does not yet support all language features of OCaml. This includes modules, object-oriented features, record types, built-in equality, strings, nested patterns, and calls to native C functions. Therefore it is currently hard to apply RAML directly to existing OCaml code. However, the support of many of these additional features is not a theoretical limitation of the analysis. but rather caused by a lack of resources on the implementation side. If RAML can be applied to existing code then the results are very satisfactory. For instance, we applied RAML to OCaml’s standard list library list.ml: RAML automatically derives evaluation-step bounds for 47 of the 51 top-level functions. All derived bounds are asymptotically tight. The 4 functions that cannot be bounded by RAML all use a variation of merge sort whose termination (and thus resource usage) depends on an arithmetic shift which is currently unsupported. The file list.ml consists of 428 lines of code and the analysis takes 3.2 s on a MacBook Pro. Also note that our technique extends all previous works on AARA for strict, sequential evaluation. Thus we can handle all examples that have been previously evaluated. The quality of the derived bounds is identical to the previous ones and the efficiency of the analysis is improved. RAML fails if the resource usage can only be bounded by a measure that depends on a semantic property of the program or a measure that depends on the difference of the sizes of two data structures. Loose bounds are often the result of inter-procedural dependencies. For instance, the worst-case behaviors of two functions f and g might be triggered by different 30 Towards Automatic Resource Bound Analysis for OCaml let comp f x g = fun z → f x (g z) let rec walk f xs = match xs with | [] → (fun z → z) | x::ys → match x with | Left _ → fun y → comp (walk f) ys (fun z → x::z) y | Right l → let x’ = Right (quicksort f l) in fun y → comp (walk f) ys (fun z → x’::z) y let rev_sort f l = walk f l [] RAML output for rev_sort (after 0.68s run time): 10 + 23*K*M + 32*L*M + 20*L*M*Y + 13*L*M*Y^2 where M is the num. of ::-nodes of the 2nd comp. of the argument L is the fraction of Right-nodes in the ::-nodes of the 2nd component of the arg. Y is the maximal number of ::-nodes in the Right-nodes in the ::-nodes of the 2nd component of the argument K is the fraction of Left-nodes in the ::-nodes of the 2nd component of the arg. Figure 11: Modified challenge example from Avanzini et al. [9] and shortened output of the automatic bound analysis performed by RAML for the function rev_sort. The derived bound is a tight bound on the number of evaluation steps in the big-step semantics if we do not take into account the cost of the higher-order argument f. inputs. However, the analysis would add up the worst-case behaviors of both functions in a program such as f(a);g(a). Another reason for loose bounds is that a tight bound cannot be represented by a multivariate resource polynomial. Example Experiment. To give an impression of the experiments we performed, Figure 11 contains the output of an analysis of a challenging function in RAML. The code is an adoption of an example that has been recently presented by Avanzini et al. [9] as a function that can not be handled by existing tools. To illustrate the challenges of resource analysis for higher-order programs, Avanzini et al. implemented a (somewhat contrived) reverse function rev for lists using higher-order functions. RAML automatically derives a tight linear bound on the number of evaluation steps used by rev. To show more features of our analysis, we modified Avanzini et al.’s rev in Figure 11 by adding an additional argument f and a pattern match to the definition of the function walk. The resulting type of walk is (α → α → bool) → [(β ∗ α list) either list; (β ∗ α list) either list] → (β ∗ α list) either list Like before the modification, walk is essentially the append_reverse function for lists. However, we assume that the input lists contain nodes of the form Left a or Right b so that b is a list. During the reverse process of the first list in the argument, we sort each list that is contained in a Right-node using the standard implementation of quick sort (not given here). RAML derives the tight evaluation-step bound that is shown in Figure 11. Since the comparison function for 8 Experimental Evaluation CompCert 31 Metric #Funs LOC Time #Const #Lin #Quad #Cubic #Poly #Fail steps heap tick steps 243 243 174 164 3218 3218 2144 2740 72.10s 70.36s 64.68s 1300.91s 16 41 19 32 130 112 79 99 60 60 53 7 28 22 19 0 239 239 174 138 4 4 0 26 Asym. Tight 225 225 160 137 Table 1: Overview of experimental results. quicksort (argument f) is not available, RAML assumes that it does not consume any resources during the analysis. If rev_sort is applied to a concrete argument f then the analysis is repeated to derive a bound for this instance. CompCert Evaluation. We also performed an evaluation with the OCaml code that is created by Coq’s code extraction mechanism during the compilation of the verified CompCert compilers [46]. We sorted the files topologically from their dependency requirements, and analyzed 13 files from the top. 1 We could not process the files further down the dependency graph because they heavily relied on modules which we do not currently support. Using the evaluation-step metric, we analyzed 164 functions, 2740 LOC in 1300 seconds. Figure 12 shows example functions from the CompCert code base. As an artifact from the Coq code extraction, CompCert uses two implementations of the reverse function for lists. The function rev is a naive quadratic implementation that uses append and the function rev’ is an efficient tail-recursive linear implementation. RAML automatically derives precise evaluation step bounds for both functions. As a result, a Coq user who is inspecting the derived bounds for the extracted OCaml code is likely to spot performance problems resulting from the use of rev. Summary of Results. Table 1 contains a compilation of the experimental results. The first 3 rows show the results for OCaml libraries, handwritten code, and the OCaml tutorial [48]. The last column shows the results for CompCert [46]. The column LOC contains the total number of lines of OCaml code that has been analyzed with the respective metric. Similarly, the column Time contains the total time of all analyses with this metric. The column #Poly contains the number of functions for which RAML automatically derived a bound. The columns #Const, #Lin, #Quad, and #Cubic show the number of derived bounds that are constant, linear, quadratic, and cubic. Finally, columns #Fail and Asym.Tight contain the number of examples for which RAML is unable to derive a bound and the number of bounds that are asymptotically tight, respectively. We also experimented with example inputs to determine the precision of the constant factors in the bounds. In general, the bounds are very precise and often match the actual worse-case behavior. However, we did not yet perform a systematic evaluation with automatically generated example inputs. The reported numbers result from the analysis of 140 non-trivial functions that are (with a few exceptions) recursive and higher order. Appendix A contains a short description of every function that is part of the evaluation, along with its type, the run time of the analysis, and the derived bounds. The functions have been automatically analyzed using the steps metric that counts the number of evaluation steps and the heap metric that counts the number of allocated heap cells. Moreover, we have used the tick metric to add custom cost measures to some of the functions. These measures vary from program to program and include number of function calls, 1 A list of analyzed files and functions is included in the TR. 32 Towards Automatic Resource Bound Analysis for OCaml let rec app l m = match l with | [] → m | a :: l1 → a :: (app l1 m) let rec rev = function → | [] → [] | x :: l’ → app (rev l’) (x :: []) let rec rev_append l l’ = match l with | [] → l’ | a :: l0 → rev_append l0 (a :: l’) let rev’ l = rev_append l [] RAML output for rev (0.1s run time; steps metric): 3 + 9.5*M + 4.5*M^2 RAML output for rev’ (0.05s run time; steps metric): 7 + 9*M Figure 12: Two implementations of rev from CompCert [46]. Both the derived bounds are tight, one is linear and the other is quadratic. energy consumption, and amount of data sent to the cloud. Details can be found in the source code [29]. There are two main reasons for the difference between the runtime of the analysis per function for the CompCert code (7.9s) and the other evaluated code (0.29s). First, the CompCert code contains more complex data structures and we thus track more coefficients. Second, there is a larger percentage of functions for which we cannot derive a bound (15.8% vs. 1.6%). As a result, RAML looks for bounds of higher degree before giving up. Both leads to a larger number of constraints to solve for the LP solver. Finally, there are a few outlier functions that cause an unusually long analysis time. This is possibly due to a performance bug. In general, the analysis is very efficient. RAML is slowing down if the analyzed program contains many variables or functions with many arguments. Another source of complexity is the maximal degree of polynomials in the search space. Depending on the complexity of the program, the analysis becomes unusable when searching for bounds with maximal degree 7 − 9. The efficiency could be improved by combining amortized resource analysis with data-flow analyses and heuristics that predict the parts of the input that cause higher-degree resource usage. 9 Case Study: Bounds for DynamoDB Queries Having integrated the analysis with Inria’s OCaml compiler enables us to analyze and compile real programs. An interesting use case of our resource bound analysis is to infer worst-case bounds on DynamoDB queries. DynamoDB is a commercial NoSQL cloud database service, which is part of Amazon Web Services (AWS). Amazon charges DynamoDB users on a combination of number of queries, transmitted fields, and throughput. Since DynamoDB is a NoSQL 9 Case Study: Bounds for DynamoDB Queries 33 service, it is often only possible to retrieve the whole table—which can be expensive for large data sets—or single entries that are identified by a key value. The DynamoDB API is available through the Opam package aws. We make the API available to the analysis by using tick functions that specify resource usage. Since the query cost for different tables can be different, we provide one function per action and table. let db_query student_id course_id = Raml.tick(1.0); Awslib.get_item ... In the following, we describe the analysis of a specific OCaml application that uses a database that contains a large table that stores grades of students for different courses. Our first function computes the average grade of a student for a given list of courses. let avge_grade student_id course_ids = let f acc cid = let (length,sum) = acc in let grade = match db_query student_id cid with | Some q → q | None → raise (Not_found (student_id,cid)) in (length +. 1.0, sum +. grade) in let (length,sum) = foldl f (0.0,0.0) course_ids in sum /. length In 0.03s RAML computes the tight bound 1·m where m is the length of the argument course_ids. We omit the standard definitions of functions like foldl and map. However, they are not built-in into our systems but the bounds are derived form first principles. Next, we sort a given list of students based on the average grades in a given list of classes using quick sort. As a first approximation we use a comparison function that is based on average_grade. let geq sid1 sid2 cour_ids = avge_grade sid1 cour_ids >= avge_grade sid2 cour_ids This results in O(n 2 m) database queries where n is the number of students and m is the number of courses. The reason is that there are O(n 2 ) comparisons during a run of quick sort. Since the resource usage of quick sort depends on the number of courses, we have to make the list of courses an explicit argument and cannot store it in the closure of the comparison function. let rec partition gt acc l = match l with | [] → let (cs,bs,_) = acc in (cs,bs) | x::xs → let (cs,bs,aux) = acc in let acc’ = if gt x aux then (cs,x::bs,aux) else (x::cs,bs,aux) in partition gt acc’ xs let rec qsort gt aux l = match l with | [] → [] | x::xs → let ys,zs = partition (gt x) ([],[],aux) xs in append (qsort gt aux ys) (x::(qsort gt aux zs)) let sort_students s_ids c_ids = qsort geq c_ids s_ids 34 Towards Automatic Resource Bound Analysis for OCaml In 0.31s RAML computes the tight bound n 2 m − nm for sort_students where n is the length of the argument s_ids and m is the length of the argument c_ids. The negative factor arises from the translation of the resource polynomials to the standard basis. Given the alarming cubic bound, we reimplement our sorting function using memoization. To this end we create a table that looks up and stores for each student and course the grade in the DynamoDB. We then replace the function db_query with the function lookup. let lookup sid cid table = let cid_map = find (fun id → id = sid) table in find (fun id → id = cid) cid_map For the resulting sorting function, RAML computes the tight bound nm in 0.87s. 10 Related Work Our work builds on past research on automatic amortized resource analysis (AARA). AARA has been introduced by Hofmann and Jost for a strict first-order functional language with built-in data types [35]. The technique has been applied to higher-order functional programs and user defined types [42], to derive stack-space bounds [16], to programs with lazy evaluation [51, 56], to object-oriented programs [36, 39], and to low-level code by integrating it with separation logic [8]. All the aforementioned amortized-analysis–based systems are limited to linear bounds. Hoffmann et al. [33, 30, 31] presented a multivariate AARA for a first-order language with built-in lists and binary trees. Hofmann and Moser [38] have proposed a generalization of this system in the context of (first-order) term rewrite systems. However, it is unclear how to automate this system. In this article, we introduce the first AARA that is able to automatically derive (multivariate) polynomial bounds that depend on user-defined inductive data structures. Our system is the only one that can derive polynomial bounds for higher-order functions. Even for linear bounds, our analysis is more expressive than existing systems for strict languages [42]. For instance, we can for the first time derive an evaluation-step bound for the curried append function for lists. Moreover, we integrated AARA for the first time with an existing industrialstrength compiler. Type systems for inferring and verifying resource bounds have been extensively studied. Vasconcelos et al. [55, 54] described an automatic analysis system that is based on sized-types [40] and derives linear bounds for higher-order functional programs. Here we derive polynomial bounds. Dal Lago et al. [44, 45] introduced linear dependent types to obtain a complete analysis system for the time complexity of the call-by-name and call-by-value lambda calculus. Crary and Weirich [20] presented a type system for specifying and certifying resource consumption. Danielsson [22] developed a library, based on dependent types and manual cost annotations, that can be used for complexity analyses of functional programs. The advantage of our technique is that it is fully automatic. Classically, cost analyses are often based on deriving and solving recurrence relations. This approach was pioneered by Wegbreit [57] and is actively studied for imperative languages [3, 7, 25, 5]. These works are not concerned with higher-order functions and bounds do not depend on user-defined data structures. Benzinger [11] has applied Wegbreit’s method in an automatic complexity analysis for Nuprl terms. However, complexity information for higher-order functions has to be provided explicitly. Grobauer [26] reported a mechanism to automatically derive cost recurrences from DML programs using dependent types. Danner et al. [24, 23] propose an interesting technique to References 35 derive higher-order recurrence relations from higher-order functional programs. Solving the recurrences is not discussed in these works and in contrast to our work they are not able to automatically infer closed-form bounds. Abstract interpretation based approaches to resource analysis [27, 12, 58, 52, 18] focus on first-order integer programs with loops. Cicek et al. [19] study a type system for incremental complexity. In an active area of research, techniques from term rewriting are applied to complexity analysis [10, 49, 15]; sometimes in combination with amortized analysis [37]. These techniques are usually restricted to first-order programs and time complexity. Recently, Avanzini et al. [9] proposed a complexity preserving defunctionaliztion to deal with higher-order programs. While the transformation is asymptotically complexity preserving, it is unclear whether this technique can derive bounds with precise constant factors. Finally, there exists research that studies cost models to formally analyze parallel programs. Blelloch and Greiner [13] pioneered the cost measures work and depth. There are more advanced cost models that take into account caches and IO (see, e.g., Blelloch and Harper [14]), However, these works do not provide machine support for deriving static cost bounds. 11 Conclusion We have presented important first steps towards a practical automatic resource bound analysis system for OCaml. Our three main contributions are (1) a novel automatic resource analysis system that infers multivariate polynomial bounds that depend on size parameters of userdefined data structures, and (2) the first AARA that infers polynomial bounds for higher-order functions, and (3) the integration of automatic amortized resource analysis with the OCaml compiler. As the title of this article indicates, there are many open problems left on the way to a resource analysis system for OCaml that can be used in every-day development. In the future, we plan to improve the bound analysis for programs with side-effects and exceptions. We will also work on mechanisms that allow user interaction for manually deriving bounds if the automation fails. Furthermore, we will work on taking into account garbage collection and the runtime system when deriving time and space bounds. Finally, we will investigate techniques to link the high-level bounds with hardware and the low-level code that is produced by the compiler. These open questions are certainly challenging but we now have the tools to further push the boundaries of practical quantitative software verification. References [1] E. Albert, P. Arenas, S. Genaim, M. Gómez-Zamalloa, and G. Puebla. Automatic Inference of Resource Consumption Bounds. In Logic for Programming, Artificial Intelligence, and Reasoning, 18th Conference (LPAR’12), pages 1–11, 2012. [2] E. Albert, P. Arenas, S. Genaim, and G. Puebla. Closed-Form Upper Bounds in Static Cost Analysis. Journal of Automated Reasoning, pages 161–203, 2011. [3] E. Albert, P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. Cost Analysis of Java Bytecode. In 16th Euro. Symp. on Prog. (ESOP’07), pages 157–172, 2007. 36 Towards Automatic Resource Bound Analysis for OCaml [4] E. Albert, P. Arenas, S. Genaim, G. Puebla, and D. Zanardini. Cost Analysis of ObjectOriented Bytecode Programs. Theor. Comput. Sci., 413(1):142 – 159, 2012. [5] E. Albert, J. C. Fernández, and G. Román-Díez. Non-cumulative Resource Analysis. In Tools and Algorithms for the Construction and Analysis of Systems - 21st International Conference, (TACAS’15), pages 85–100, 2015. [6] C. Alias, A. Darte, P. Feautrier, and L. Gonnord. Multi-dimensional Rankings, Program Termination, and Complexity Bounds of Flowchart Programs. In 17th Int. Static Analysis Symposium (SAS’10), pages 117–133, 2010. [7] D. E. Alonso-Blas and S. Genaim. On the limits of the classical approach to cost analysis. In 19th Int. Static Analysis Symp. (SAS’12), pages 405–421, 2012. [8] R. Atkey. Amortised Resource Analysis with Separation Logic. In 19th Euro. Symp. on Prog. (ESOP’10), pages 85–103, 2010. [9] M. Avanzini, U. D. Lago, and G. Moser. Analysing the Complexity of Functional Programs: Higher-Order Meets First-Order. In 29th Int. Conf. on Functional Programming (ICFP’15), 2012. [10] M. Avanzini and G. Moser. A Combination Framework for Complexity. In 24th International Conference on Rewriting Techniques and Applications (RTA’13), pages 55–70, 2013. [11] R. Benzinger. Automated Higher-Order Complexity Analysis. Theor. Comput. Sci., 318(12):79–103, 2004. [12] R. Blanc, T. A. Henzinger, T. Hottelier, and L. Kovács. ABC: Algebraic Bound Computation for Loops. In Logic for Prog., AI., and Reasoning - 16th Int. Conf. (LPAR’10), pages 103–118, 2010. [13] G. E. Blelloch and J. Greiner. A Provable Time and Space Efficient Implementation of NESL. In 1st Int. Conf. on Funct. Prog. (ICFP’96), pages 213–225, 1996. [14] G. E. Blelloch and R. Harper. Cache and I/O Efficent Functional Algorithms. In 40th ACM Symp. on Principles Prog. Langs. (POPL’13), pages 39–50, 2013. [15] M. Brockschmidt, F. Emmes, S. Falke, C. Fuhs, and J. Giesl. Alternating Runtime and Size Complexity Analysis of Integer Programs. In Tools and Alg. for the Constr. and Anal. of Systems - 20th Int. Conf. (TACAS’14), pages 140–155, 2014. [16] B. Campbell. Amortised Memory Analysis using the Depth of Data Structures. In 18th Euro. Symp. on Prog. (ESOP’09), pages 190–204, 2009. [17] Q. Carbonneaux, J. Hoffmann, and Z. Shao. Compositional Certified Resource Bounds. In 36th Conf. on Prog. Lang. Design and Impl. (PLDI’15), 2015. [18] P. Cerný, T. A. Henzinger, L. Kovács, A. Radhakrishna, and J. Zwirchmayr. Segment Abstraction for Worst-Case Execution Time Analysis. In 24th European Symposium on Programming (ESOP’15), pages 105–131, 2015. [19] E. Çiçek, D. Garg, and U. A. Acar. Refinement Types for Incremental Computational Complexity. In 24th European Symposium on Programming (ESOP’15), pages 406–431, 2015. References 37 [20] K. Crary and S. Weirich. Resource Bound Certification. In 27th ACM Symp. on Principles of Prog. Langs. (POPL’00), pages 184–198, 2000. [21] S. A. Crosby and D. S. Wallach. Denial of service via algorithmic complexity attacks. In 12th USENIX Security Symposium (USENIX’12), 2003. [22] N. A. Danielsson. Lightweight Semiformal Time Complexity Analysis for Purely Functional Data Structures. In 35th ACM Symp. on Principles Prog. Langs. (POPL’08), pages 133–144, 2008. [23] N. Danner, D. R. Licata, and R. Ramyaa. Denotational Cost Semantics for Functional Languages with Inductive Types. In 29th Int. Conf. on Functional Programming (ICFP’15), 2012. [24] N. Danner, J. Paykin, and J. S. Royer. A Static Cost Analysis for a Higher-Order Language. In 7th Workshop on Prog. Languages Meets Prog. Verification (PLPV’13), pages 25–34, 2013. [25] A. Flores-Montoya and R. Hähnle. Resource Analysis of Complex Programs with Cost Equations. In Programming Languages and Systems - 12th Asian Symposiu (APLAS’14), pages 275–295, 2014. [26] B. Grobauer. Cost Recurrences for DML Programs. In 6th Int. Conf. on Funct. Prog. (ICFP’01), pages 253–264, 2001. [27] S. Gulwani, K. K. Mehra, and T. M. Chilimbi. SPEED: Precise and Efficient Static Estimation of Program Computational Complexity. In 36th ACM Symp. on Principles of Prog. Langs. (POPL’09), pages 127–139, 2009. [28] J. Hoffmann. Types with Potential: Polynomial Resource Bounds via Automatic Amortized Analysis. PhD thesis, Ludwig-Maximilians-Universität München, 2011. [29] J. Hoffmann. RAML Web Site. http://raml.co, 2015. [30] J. Hoffmann, K. Aehlig, and M. Hofmann. Multivariate Amortized Resource Analysis. In 38th ACM Symp. on Principles of Prog. Langs. (POPL’11), 2011. [31] J. Hoffmann, K. Aehlig, and M. Hofmann. Multivariate Amortized Resource Analysis. ACM Trans. Program. Lang. Syst., 2012. [32] J. Hoffmann and M. Hofmann. Amortized Resource Analysis with Polymorphic Recursion and Partial Big-Step Operational Semantics. In Prog. Langs. and Systems - 8th Asian Symposium (APLAS’10), 2010. [33] J. Hoffmann and M. Hofmann. Amortized Resource Analysis with Polynomial Potential. In 19th Euro. Symp. on Prog. (ESOP’10), 2010. [34] J. Hoffmann and Z. Shao. Type-Based Amortized Resource Analysis with Integers and Arrays. In 12th International Symposium on Functional and Logic Programming (FLOPS’14), 2014. [35] M. Hofmann and S. Jost. Static Prediction of Heap Space Usage for First-Order Functional Programs. In 30th ACM Symp. on Principles of Prog. Langs. (POPL’03), pages 185–197, 2003. 38 Towards Automatic Resource Bound Analysis for OCaml [36] M. Hofmann and S. Jost. Type-Based Amortised Heap-Space Analysis. In 15th Euro. Symp. on Prog. (ESOP’06), pages 22–37, 2006. [37] M. Hofmann and G. Moser. Amortised Resource Analysis and Typed Polynomial Interpretations. In Rewriting and Typed Lambda Calculi (RTA-TLCA;14), pages 272–286, 2014. [38] M. Hofmann and G. Moser. Multivariate Amortised Resource Analysis for Term Rewrite Systems. In 13th International Conference on Typed Lambda Calculi and Applications (TLCA’15), pages 241–256, 2015. [39] M. Hofmann and D. Rodriguez. Automatic Type Inference for Amortised Heap-Space Analysis. In 22nd Euro. Symp. on Prog. (ESOP’13), pages 593–613, 2013. [40] J. Hughes, L. Pareto, and A. Sabry. Proving the Correctness of Reactive Systems Using Sized Types. In 23th ACM Symp. on Principles of Prog. Langs. (POPL’96), pages 410–423, 1996. [41] G. Jin, L. Song, X. Shi, J. Scherpelz, and S. Lu. Understanding and Detecting Real-World Performance Bugs. In Conference on Programming Language Design and Implementation PLDI’12, pages 77–88, 2012. [42] S. Jost, K. Hammond, H.-W. Loidl, and M. Hofmann. Static Determination of Quantitative Resource Usage for Higher-Order Programs. In 37th ACM Symp. on Principles of Prog. Langs. (POPL’10), pages 223–236, 2010. [43] P. C. Kocher. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. In Advances in Cryptology - 16th Annual International Cryptology Conference (CRYPTO’96), pages 104–113, 1996. [44] U. D. Lago and M. Gaboardi. Linear Dependent Types and Relative Completeness. In 26th IEEE Symp. on Logic in Computer Science (LICS’11), pages 133–142, 2011. [45] U. D. Lago and B. Petit. The Geometry of Types. In 40th ACM Symp. on Principles Prog. Langs. (POPL’13), pages 167–178, 2013. [46] X. Leroy. Formal Verification of a Realistic Compiler. Communications of the ACM, 52(7):107– 115, 2009. [47] X. Leroy, D. Doligez, A. Frisch, J. Garrigue, D. Rémy, and J. Vouillon. The OCaml system release 4.02. Technical report, Institut National de Recherche en Informatique et en Automatique, 2014. http://caml.inria.fr/distrib/ocaml-4.02/ocaml-4.02-refman.pdf. [48] V. Nicollet. 99 problems (solved) in ocaml. https://ocaml.org/learn/tutorials/ 99problems.html. [49] L. Noschinski, F. Emmes, and J. Giesl. Analyzing Innermost Runtime Complexity of Term Rewriting by Dependency Pairs. J. Autom. Reasoning, 51(1):27–56, 2013. [50] O. Olivo, I. Dillig, and C. Lin. Static Detection of Asymptotic Performance Bugs in Collection Traversals. In Conference on Programming Language Design and Implementation (PLDI’15), pages 369–378, 2015. [51] H. R. Simões, P. B. Vasconcelos, M. Florido, S. Jost, and K. Hammond. Automatic Amortised Analysis of Dynamic Memory Allocation for Lazy Functional Programs. In 17th Int. Conf. on Funct. Prog. (ICFP’12), pages 165–176, 2012. References 39 [52] M. Sinn, F. Zuleger, and H. Veith. A Simple and Scalable Approach to Bound Analysis and Amortized Complexity Analysis. In Computer Aided Verification - 26th Int. Conf. (CAV’14), page 743–759, 2014. [53] R. J. Vanderbei. Linear Programming: Foundations and Extensions. Springer US, 2001. [54] P. Vasconcelos. Space Cost Analysis Using Sized Types. PhD thesis, School of Computer Science, University of St Andrews, 2008. [55] P. B. Vasconcelos and K. Hammond. Inferring Costs for Recursive, Polymorphic and HigherOrder Functional Programs. In Int. Workshop on Impl. of Funct. Langs. (IFL’03), pages 86–101. Springer-Verlag LNCS, 2003. [56] P. B. Vasconcelos, S. Jost, M. Florido, and K. Hammond. Type-Based Allocation Analysis for Co-recursion in Lazy Functional Languages. In 24th European Symposium on Programming (ESOP’15), pages 787–811, 2015. [57] B. Wegbreit. Mechanical Program Analysis. Commun. ACM, 18(9):528–539, 1975. [58] F. Zuleger, M. Sinn, S. Gulwani, and H. Veith. Bound Analysis of Imperative Programs with the Size-change Abstraction. In 18th Int. Static Analysis Symp. (SAS’11), pages 280–297, 2011. 40 Towards Automatic Resource Bound Analysis for OCaml A Experimental Results A.1 Analyzed Functions Name Type File: WorkingWithLists.raml (99 Problems in OCaml) last a list -> ’a option lastTwo a list -> (’a * ’a) option at int -> ’a list -> ’a option natAt nat -> ’a list -> ’a option LOC Description 8 10 7 5 length rev eqList isPalindrome flatten compress pack a list -> int a list -> ’a list a list -> ’a list -> bool a list -> bool a node list -> ’a list a list -> ’a list a list -> ’a list list 5 6 13 2 8 10 16 encode decode duplicate replicate drop split slice concat rotate removeAt insertAt constructList random min randSelect lottoSelect a list -> (int * ’a) list (int * ’a) list -> ’a list a list -> ’a list a list -> int -> ’a list a list -> int -> ’a list a list -> int -> ’a list * ’a list a list -> int -> int -> ’a list a list -> ’a list -> ’a list a list -> int -> ’a list a list -> int -> ’a list a list -> int -> ’a -> ’a list int -> int -> ’a list int -> int int -> int -> int a list -> int -> ’a list int -> int -> int list 15 17 4 15 7 10 15 4 8 4 4 7 1 4 21 1 snd fst map insert sort compare lengthSort File: LogicAndCodes.raml eval2 table2 a * ’b -> ’b a * ’b -> ’a (’a -> ’b) -> ’a list -> ’b list (’a -> ’a -> int) -> ’a -> ’a list -> ’a list (’a -> ’a -> int) -> ’a list -> ’a list int -> int -> int a list list -> ’a list list 4 4 4 4 4 5 4 returns the last element of list returns last two elements of list outputs element at a particular location at implemented using natural numbers defined inductively returns length of list reverses the list checks equality of two lists checks if list is a palindrome flattens a tree into a list deletes successive duplicates packs successive duplicates into an inner list run-length encoding of list decodes a run-length encoding of list duplicates each element of list replicates each element of list n times drops every n-th element splits list into two lists extracts a slice from list concatenates two lists rotates a list by n positions removes a list at n-th position inserts an element at n-th position constructs a list from 1st to 2nd element generates a random number returns min of two integers generates a random permutation of list composes randSelect with constructList returns second element of a product returns first element of a product applies f to every element of list sort helper sorts list according to compare function compares two integers sorts list of lists according to size of list int -> bool -> int -> bool -> boolExpr int -> int -> boolExpr -> (bool * bool * bool) list int -> (int * ’a) list -> ’a 7 12 table2 helper constructs truth table of expression 8 (int * bool) list -> boolExpr -> bool (int * bool) list -> int list -> boolExpr -> ((int * bool) list * bool) list 13 20 returns element of list corresponding to key evaluates a boolean expression a list -> int a list -> int -> ’a a list -> ’b list -> int -> ’a * ’b float list -> float list -> float -> float list float list -> float list -> int -> float list 4 6 9 8 4 assoc eval tableMake File: echelon_form.raml size getElem get2Elems subtract_row_helper subtract_row returns size of list returns i-th element of list returns i-th element of 2 lists echelon helper echelon helper A Experimental Results subtract_helper 41 4 echelon helper concat tail float list list -> float list -> int -> float list list a list -> ’a list -> ’a list a list -> int -> ’a list 4 6 hd_helper reverse_helper reverse head split_helper split a list -> int -> ’a list -> ’a list a list -> ’a list -> ’a list a list -> ’a list a list -> int -> ’a list a list -> int -> int -> ’a list * ’a list a list -> int -> ’a list * ’a list 6 4 6 14 6 8 subtract echelon_helper float list list -> int -> float list list float list list -> int -> ’a list -> float list list float list list -> float list list 3 3 concatenates two lists returns the list excluding the first i elements echelon helper echelon helper reverses a list returns the first i elements of list echelon helper splits the list at i-th position and returns the two lists subtract a row echelon helper 102 takes a matrix with m rows and n columns and reduces it to an upper triangular matrix a list list -> int -> bool int -> int -> ’a list list -> bool int * int * ’a list list -> bool int -> int -> ’a list list -> int * int * ’a list list a * ’b * ’c list list -> int -> int -> ’c int -> int -> int -> int int list -> int list -> int -> int list int list list -> int list list -> int -> int list list int * int * ’a list list -> int * int * ’b list list -> bool int * int * int list list -> int * int * int list list -> int * int * int list list int * int * int list list -> int * int * int list list -> int * int * int list list a list -> ’a -> ’a list a list list -> ’a list -> ’a list list a list list -> ’a list list -> ’a list list a list list -> ’a list list int list -> int list -> int int list -> int list list -> int list list int list list -> int list list -> int list list 7 4 3 5 matrix helper matrix helper matrix helper matrix helper 4 4 7 7 returns (i,j)-th element of matrix mat matrix helper matrix helper matrix helper 5 matrix helper 49 adds two matrices m1 and m2 49 subtracts two matrices m1 and m2 4 11 4 17 7 4 33 7 7 4 5 matrix helper matrix helper 50 delete submat int -> int list -> int list -> int list int list -> int list list -> int list -> int list list int list list -> int list list -> int list list int * int * ’a list list -> int * int * ’b list list -> bool int * int * int list list -> int * int * int list list -> int * int * int list list a list -> int -> ’a list a list list -> int -> int -> ’a list list appends x to the end of list l appends column col to matrix m matrix helper takes transpose of matrix m matrix helper matrix helper multiplies matrices m1 and m2 (naive implementation) matrix helper matrix helper multiplies matrices m1 and m2 after performing dimensional sanity checks deletes the i-th element of list deletes the i-th row and j-th column of matrix m File: power_radio.raml sendmsg msg main1_events int list -> unit event list -> unit 13 15 main2_events event list -> unit 15 echelon_form File: matrix.raml check_lists check_mat check_matrix construct_matrix getElemMatrix op rec_list rec_mat check_sanity plus minus append append_col transpose_helper transpose prod prod_mat mult_slow lineMult computeLine mat_mult_jan check_mult_sanity mult 7 14 sends a list of integers sends sensor data as soon as it is produced stores sensor data in buffer and sends only at specific events 42 Towards Automatic Resource Bound Analysis for OCaml main3_events main4_events event list -> unit event list -> unit 15 15 main5_events event list -> unit 36 File: avanzini.raml partition (’a -> bool) -> ’a list -> ’a list * ’a list 9 quicksort (’a -> ’a -> bool) -> ’a list -> ’a list 18 rev_sort a -> ’a -> bool -> (’b * ’a list) either list -> (’b * ’a list) either list 17 a list list -> ’a list a list list list -> ’a list a list list list list -to ’a list 8 12 16 concatenates inner lists concatenates innermost lists concatenates innermost lists btree -> int -> btree option btree -> int -> btree option 15 34 depth-first search for binary trees breadth-first search for binary trees a list -> (’a * ’a) list 12 generate ordered pairs from a list bin list -> bin list bin list -> Rnat.t -> bin list bin list -> ’a list -> bin list 15 24 28 increment a binary counter n increments to a binary counter n increments to a binary counter (Rnat.t -> unit) -> Rnat.t -> unit (’a -> Rnat.t -> ’a) -> ’a -> Rnat.t -> ’a (’a -> ’a) array -> ’a -> ’a 3 5 12 calls a function f (i) for 0<=i<n fold for natural numbers successively apply all functions stored in an array File: calculator.raml add sub mult eval_simpl nat -> nat -> nat nat -> nat -> nat nat -> nat -> nat expr -> nat 4 8 9 26 eval expr -> nat 35 recursively add two natural numbers recursively subtract two nats recursively multiply two nats a simple evaluater for arithmetic expressions a evaluater for arithmetic expressions without aux. funs a list -> ’a list * ’a list (’a -> ’a -> bool) -> ’a list -> ’a list -> ’a list (’a -> ’a -> bool) -> Rnat.t -> ’a list -> ’a list Rnat.t -> int list list -> int list list 8 11 splits a list in the middle merges two sorted lists 32 merge sort 45 merge sort for lists of lists (’a -> bool) -> ’a list -> ’a list * ’a list (’a -> ’a -> bool) -> ’a list -> ’a list (int * int) list -> (int * int) list int list list -> int list list 10 19 28 32 partition for quick sort quick sort quick sort for integer pairs quick sort for lists of lists int -> binary list -> int 30 exponentiation via squaring int list -> int list -> int 45 longest common subsequence with dynamic programming (’a -> ’b) -> (’c -> ’d) -> (’a * ’c) ablist -> (’b * ’d) ablist (’a -> ’a -> bool) -> (’a list * ’b) ablist -> (’a list * ’b) ablist 5 map for AB-lists 29 sort inner lists in A-nodes File: append_all.raml append_all append_all2 append_all3 File: bfs.raml dfs bfs File: rev_pairs.raml pairs File: binary_counter.raml add_one add_many add_list File: array_fun.raml nat_iterate nat_fold apply_all File: mergesort.raml split merge mergesort mergesort_list File: quicksort.raml partition quicksort quicksort_pairs quicksort_list File: square_mult.raml square_mult File: subsequence.raml lcs File: running.raml abmap asort same as main2 with debugging mode same as main3 with function application same as main4 but data is sent only after specific time intervals partitions list l into two depending on whether the elements satisfy function f performs quick sort on list l using comp as comparator A Experimental Results asort’ btick abfoldr cons_all File: ocaml_sort.raml merge list File: ocaml_list.raml length cons hd tl nth append rev_append rev flatten concat map mapi rev_map iter iteri fold_left fold_right map2 rev_map2 iter2 fold_left2 fold_right2 for_all exists for_all2 exists2 mem memq assoc assq mem_assoc mem_assq remove_assoc remove_assq find find_all filter partition split combine merge chop stable_sort sort fast_sort 43 (’a -> ’a -> bool) -> (’a list * ’b) ablist -> (’a list * ’c) ablist (int list * int) ablist -> (int list * int) ablist (’a -> ’b -> ’b) -> (’c -> ’b -> ’b) -> ’b -> (’a * ’c) ablist -> ’b (int * int) ablist -> (’a * int) ablist 29 6 10 sort inner lists in A-nodes; raise exception on B-node use map to tick 2.5 at every B-node fold for AB-lists 18 two nested folds (’a -> ’a -> bool) -> ’a list -> ’a list -> ’a list (’a -> ’a -> bool) -> ’a list -> ’a list 9 merge two lists 31 interesting variant of merge sort a list -> int a -> ’a list -> ’a list a list -> ’a a list -> ’a list a list -> int -> ’a a list -> ’a list -> ’a list a list -> ’a list -> ’a list a list -> ’a list a list list -> ’a list a list list -> ’a list (’a -> ’b) -> ’a list -> ’b list (int -> ’a -> ’b) -> ’a list -> ’b list (’a -> ’b) -> ’a list -> ’b list (’a -> ’b) -> ’a list -> unit (int -> ’a -> ’b) -> ’a list -> unit (’a -> ’b -> ’a) -> ’a -> ’b list -> ’a (’a -> ’b -> ’b) -> ’a list -> ’b -> ’b (’a -> ’b -> ’c) -> ’a list -> ’b list -> ’c list (’a -> ’b -> ’c) -> ’a list -> ’b list -> ’c list (’a -> ’b -> ’c) -> ’a list -> ’b list -> unit (’a -> ’b -> ’c -> ’a) -> ’a -> ’b list -> ’c list -> ’a (’a -> ’b -> ’c -> ’c) -> ’a list -> ’b list -> ’c -> ’c (’a -> bool) -> ’a list -> bool (’a -> bool) -> ’a list -> bool (’a -> ’b -> bool) -> ’a list -> ’b list -> bool (’a -> ’b -> bool) -> ’a list -> ’b list -> bool a -> ’b list -> bool a -> ’b list -> bool a -> (’b * ’c) list -> ’c a -> (’b * ’c) list -> ’c a -> (’b * ’c) list -> bool a -> (’b * ’c) list -> bool a -> (’b * ’c) list -> (’b * ’c) list a -> (’b * ’c) list -> (’b * ’c) list (’a -> bool) -> ’a list -> ’a (’a -> bool) -> ’a list -> ’a list (’a -> bool) -> ’a list -> ’a list (’a -> bool) -> ’a list -> ’a list * ’a list (’a * ’b) list -> ’a list * ’b list a list -> ’b list -> (’a * ’b) list (’a -> ’a -> int) -> ’a list -> ’a list -> ’a list int -> ’a list -> ’a list (’a -> ’a -> int) -> ’a list -> ’a list (’a -> ’a -> int) -> ’a list -> ’a list (’a -> ’a -> int) -> ’a list -> ’a list 5 1 3 3 7 4 4 6 7 8 3 5 6 3 5 4 4 12 15 12 12 length of a list list cons head of a list tail of a list nth element of a list list append 12 right fold with two lists 3 3 12 check condition for all list elems check condition for one list elem as for_all but for two lists 12 as exists but for two lists 3 3 5 5 5 5 5 5 3 7 8 5 5 12 10 6 106 107 107 checks if elem is in list same as mem but uses equality lookup for key-value pairs as assoc but uses equality like mem but for pairs like memq but for pairs filter varient using compare filter varient using equality list find list find that returns all matches list filter list partition split a list of pairs zip two lists merge for merge sort take the first an elements merge sort merge sort merge sort reverses a list flattens a list flattens a list list map list map with index reverse and map iterate over a list iterate with index list fold list fold list map with two lists reverse and map with two lists iterate over two lists left fold with two lists 44 Towards Automatic Resource Bound Analysis for OCaml File: aws.raml average_grade int -> int list -> float 17 greater_eq int -> int -> int list -> bool * int list 19 sort_students int list -> int list -> int list 52 make_table int list -> int list -> (int * (int * float) list) list (’a -> bool) -> (’a * ’b) list -> ’b int -> int -> (int * (int * ’a) list) list -> ’a int -> int list -> (int * (int * float) list) list -> float * (int * (int * float) list) list int list -> int -> int -> (int * (int * float) list) list] -> bool * (int * (int * float) list) list int list -> int list -> int list 22 9 12 24 avarage by looking up all grades in DynanmoDB compare students by looking up grades at DynamoDB sort students based on avarage grade using greater_eq look up grades in DynamoDB and memoize all the grades in a tables find a value by looking up the key look up a grade in a table avarage grade using a look-up table 28 greater_eq using a look-up table 76 sorting using a look-up table a list list -> ’a list 9 appendAll2 a list list list -> ’a list 14 appendAll3 a list list list list -> ’a list 18 collapses all elements of a 2D matrix into a list collapses all elements of a 3D matrix into a list collapses all elements of a 4D matrix into a list File: duplicates.raml eq remove nub int list -> int list -> bool int list -> int list list -> int list list int list list -> int list list 15 5 27 checks if two lists are equal duplicates helper removes duplicate lists from a list of lists File: dyade.raml multList int -> int list -> int list 4 dyade int list -> int list -> int list list 8 multiplies all elements of a list with a constant multiplies all elements of two lists to form a 2D matrix File: eratosthenes.raml filter int -> int list -> int list 8 eratos int list -> int list 3 int list -> int -> int int list -> int int -> int -> int -> int * int int list -> int list -> int -> int list int list -> int list -> int list int -> int -> int -> int * int int list -> int list -> int -> int list * int int list -> int list -> int list int list -> int list -> int list int list -> int list -> int int list -> int list -> bool 4 6 7 9 26 2 11 17 8 14 16 bitvector helper converts bit vector to integer bitvector helper bitvector helper adds two bitvectors bitvector helper tree -> int list int -> int list -> int list int list -> int list tree -> int list 8 7 12 20 collapses tree into a list inserts element in a sorted list performs insertion sort on list performs insertion sort after flattening the tree find lookup average_grade’ greater_eq’ sort_students_efficient File: PROTOTYPE File: appendAll.raml appendAll File: bitvectors.raml bitToInt’ bitToInt sum add’ add diff sub’ sub mult compare leq File: flatten.raml flatten insert insertionsort flattensort File: listsort.raml deletes all elements in list divisible by the first argument runs the sieve of Eratosthenes algorithm on the list subtracts two bitvectors multiplies two bitvectors bitvector helper compares two bitvectors A Experimental Results isortlist int list list -> int list list 21 performs an insertion sort on list of lists, where lists are compared lexicographically 4 4 2 15 8 47 returns first line of zeros lcs helper computes max of two integers computes new line recursively computes length of table computes longest common subsequence of two lists a list -> ’a list * ’a list int list -> int list -> int list int list -> int list int list -> int list 9 10 15 19 splits list into two merges two sorted lists buggy version of mergesort correct version of mergesort int list -> int list int list -> int list 10 14 helper for selection sort performs selection sort on list a -> ’b list * ’c list a -> ’a list * ’b -> ’a list * ’b a list -> ’a list * ’b -> ’a list * ’b 2 3 4 5 10 17 returns an empty list enqueues element into list enqueues a list of trees into a queue of trees dequeue helper dequeues element from queue constructs a node of tree 7 bfs helper 4 13 4 performs breadth first search on tree dfs helper performs depth first search on tree 6 10 partitions the list for performing quick sort performs a mutually recursive implementation of quicksort as presented by Hongwei Xi 10 10 zips 3 lists together groups list into list of triples 4 2 6 4 7 8 7 4 4 reverse helper reverses a list mutual recursion with g mutual recursion with f function in the size change paper re-implementation of f2 f2 reimplemented helper late starting descending parameters 12 split helper 4 11 7 6 splits values according to keys quicksort helper performs quicksort on list sorts all value lists with minSort File: longestCommonSubsequence.raml firstline a list -> int list right int list -> int max int -> int -> int newline int -> int list -> int list lcstable int list -> int list -> int list list lcs int list -> int list -> int File: mergesort.raml msplit merge mergesortBuggy mergesort File: minsort.raml findMin minSort File: queue.raml empty enqueue enqueues 45 copyover dequeue children a list * ’a list -> ’b list * ’a list a list * ’a list -> (’a list * ’a list) * ’a list a * ’b * ’b list * ’b list -> (’a * ’b) * (’b * ’b * ’b list * ’b list) list breadth (’a * ’a * ’a list * ’a list) list * (’a * ’a * ’a list * ’a list) list -> (’a * ’a) list startBreadth a list -> (’a * ’a) list depth a * ’a * ’a list * ’a list -> (’a * ’a) list startDepth a list -> (’a * ’a) list File: quicksort_mutual.raml part int -> int list -> int list -> int list -> int list quicksortMutual int list -> int list File: rationalPotential.raml zip3 a list -> ’b list -> ’c list -> (’a * ’b * ’c) list group3 a list -> (’a * ’a * ’a) list File: sizechange.raml r1 a list -> ’a list -> ’a list rev a list -> ’a list f a list -> ’a list -> ’a list g a list -> ’a list -> ’a list -> ’a list f2 a list -> ’a list -> ’a list last a list -> ’a list f2’ a list -> ’a list -> ’a list g3 a list -> ’a list -> ’a list f3 a list -> ’a list -> ’a list File: splitandsort.raml insert a * int -> (’a list * int) list -> (’a list * int) list split (’a * int) list -> (’a list * int) list splitqs int * int list -> int list * int list quicksort int list -> int list sortAll (int list * ’a) list -> (int list * ’a) list 46 splitAndSort File: subtrees.raml subtrees File: tuples.raml attach pairs pairsAux pairsSlow triples quadruples File: array_dijkstra.raml makeGraph dijkstra File: CompCert File: String0.ml string_dec prefix File: Tuples.ml uncurry File: Specif.ml projT1 projT2 value File: EquivDec.ml equiv_dec File: Datatypes.ml implb xorb negb fst snd length app coq_CompOpp coq_CompareSpec2Type coq_CompSpec2Type File: Bool.ml bool_dec eqb iff_reflect File: Ring.ml bool_eq File: Peano.ml plus max min nat_iter File: List0.ml hd tl in_dec nth_error remove rev rev_append rev’ Towards Automatic Resource Bound Analysis for OCaml (int * int) list -> (int list * int) list 3 splits list according to keys, then sorts the inner lists tree -> tree list 16 generates a list of all subtrees of a tree a -> ’b list -> (’a * ’b) list 4 a list -> (’a * ’a) list a list -> (’a * ’a) list -> (’a * ’a) list a list -> (’a * ’a) list a list -> (’a * ’a * ’a) list a list -> (’a * ’a * ’a * ’a) list 4 4 4 4 4 attaches the first argument to every element of the list generates all distinct pairs in list helper for pairsSlow slow implementation of pairs generates all distinct triples in list generates all distinct quadruples in list Rnat.t -> (Rnat.t * Rnat.t * int) list -> int array array int array array -> Rnat.t -> int array 35 int list -> int list -> bool int list -> int list -> bool 10 7 a list -> ’b -> ’c -> ’d 4 (’a * ’b) sigT -> ’a (’a * ’b) sigT -> ’b a -> ’a option 3 3 3 a -> ’a 3 bool -> bool -> bool bool -> bool -> bool bool -> bool a * ’b -> ’a a * ’b -> ’b a list -> nat a list -> ’a list -> ’a list comparison -> comparison comparison -> coq_CompareSpecT a -> ’b -> comparison -> coq_CompareSpecT 2 2 2 2 2 4 4 3 3 2 bool -> bool -> bool bool -> bool -> bool bool -> reflect 2 2 2 bool -> bool -> bool 2 nat -> nat -> nat nat -> nat -> nat nat -> nat -> nat nat -> (’a -> ’a) -> ’a -> ’a 4 7 7 4 a -> ’a list -> ’a a list -> ’a (’a -> ’b -> bool) -> ’b -> ’a list -> bool a list -> nat -> ’a option (’a -> ’b -> bool) -> ’a -> ’b list -> ’b list a list -> ’a list a list -> ’a list -> ’a list a list -> ’a list 3 3 3 7 4 3 4 6 64 creates an array based weighted graph from a list Dijkstra’s shortest-path algorithm A Experimental Results list_eq_dec map fold_left fold_right existsb forallb filter File: EqNat.ml beq_nat File: Compare_dec.ml le_lt_dec le_gt_dec nat_compare File: BinPosDef.ml succ add add_carry pred_double pred pred_N mask_rect mask_rec succ_double_mask double_mask double_pred_mask pred_mask sub_mask sub_mask_carry sub mul iter pow square div2 div2_up size_nat size compare_cont compare min max eqb leb ltb sqrtrem_step sqrtrem sqrt gcdn gcd ggcdn ggcd coq_Nsucc_double coq_Ndouble coq_lor coq_land 47 ((’a -> ’b) -> bool) -> ’a list -> ’b list -> bool (’a -> ’b) -> ’a list -> ’b list ((’a -> ’b) -> ’a) -> ’b list -> ’a -> ’a ((’a -> ’b) -> ’b) -> ’b -> ’a list -> ’b (’a -> bool) -> ’a list -> bool (’a -> bool) -> ’a list -> bool (’a list -> bool) -> ’a list -> ’a list 10 nat -> nat -> bool 10 nat -> nat -> bool nat -> nat -> bool nat -> nat -> comparison 7 7 10 positive -> positive positive -> positive -> positive positive -> positive -> positive positive -> positive positive -> positive positive -> coq_N a -> (positive -> ’a) -> ’a -> mask -> ’a a -> (positive -> ’a) -> ’a -> mask -> ’a mask -> mask mask -> mask positive -> mask mask -> mask positive -> positive -> mask positive -> positive -> mask positive -> positive -> positive positive -> positive -> positive positive -> (’a -> ’a) -> ’a -> ’a positive -> positive -> positive positive -> positive positive -> positive positive -> positive positive -> nat positive -> positive positive -> positive -> comparison -> comparison positive -> positive -> comparison positive -> positive -> positive positive -> positive -> positive positive -> positive -> bool positive -> positive -> bool positive -> positive -> bool (positive -> ’a) -> (’a -> positive) -> positive * mask -> positive * mask positive -> positive * mask positive -> positive nat -> positive -> positive -> positive positive -> positive -> positive nat -> positive -> positive -> positive * (positive * positive) positive -> positive -> positive * (positive * positive) coq_N -> coq_N coq_N -> coq_N positive -> positive -> positive positive -> positive -> coq_N 5 17 17 5 10 10 5 5 5 5 10 19 32 38 43 22 5 29 22 5 10 5 10 17 3 4 3 3 3 2 19 24 24 17 24 24 67 85 87 39 50 66 68 4 4 17 25 48 ldiff coq_lxor shiftl_nat shiftr_nat shiftl shiftr testbit_nat testbit iter_op to_nat of_nat of_succ_nat digits2_pos coq_Zdigits2 File: BinNat.ml succ_double_n double_n succ_n pred_n succ_pos_n add_n sub_n mul_n compare_n eqb_n leb_n ltb_n min_n max_n div2_n even_n odd_n pow_n square_n log2_n size_n size_nat_n pos_div_eucl div_eucl div modulo gcd_n ggcd_n coq_lor_n coq_land_n ldiff_n coq_lxor_n shiftl_nat shiftr_nat shiftl_n shiftr_n testbit_nat_n testbit_n to_nat_n of_nat_n iter_n discr binary_rect Towards Automatic Resource Bound Analysis for OCaml positive -> positive -> coq_N positive -> positive -> coq_N positive -> nat -> positive positive -> nat -> positive positive -> coq_N -> positive positive -> coq_N -> positive positive -> nat -> bool positive -> coq_N -> bool ((’a -> ’a) -> ’a) -> positive -> ’a -> ’a positive -> nat nat -> positive nat -> positive positive -> positive coq_Z -> coq_Z 25 25 6 7 9 9 14 14 5 14 7 4 10 15 coq_N -> coq_N coq_N -> coq_N coq_N -> coq_N coq_N -> coq_N coq_N -> positive coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> comparison coq_N -> coq_N -> bool coq_N -> coq_N -> bool coq_N -> coq_N -> bool coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N coq_N -> bool coq_N -> bool coq_N -> coq_N -> coq_N coq_N -> coq_N coq_N -> coq_N coq_N -> coq_N coq_N -> nat positive -> coq_N -> coq_N * coq_N coq_N -> coq_N -> coq_N * coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N -> coq_N * coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> nat -> coq_N coq_N -> nat -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> nat -> bool coq_N -> coq_N -> bool coq_N -> nat nat -> coq_N coq_N -> (’a -> ’a) -> ’a -> ’a coq_N -> positive option a -> (coq_N -> ’a -> ’a) -> (coq_N -> ’a -> ’a) -> ’a 4 4 4 4 4 7 11 29 10 10 5 5 5 5 8 8 10 7 26 18 14 9 37 44 46 46 57 75 24 32 32 32 10 14 13 13 18 18 18 8 9 4 12 A Experimental Results binary_rec leb_spec0 ltb_spec0 log2_up lcm eqb_spec b2n setbit clearbit ones lnot max_case_strong max_case max_dec min_case_strong min_case min_dec max_case_strong_pd max_case max_dec_pd min_case_strong_pd min_case min_dec_pd a -> (coq_N -> ’a -> ’a) -> (coq_N -> ’a -> ’a) -> ’a coq_N -> coq_N -> reflect coq_N -> coq_N -> reflect coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> reflect bool -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N coq_N -> coq_N -> coq_N coq_N -> coq_N -> ((coq_N -> coq_N -> unit -> ’a) -> ’b) -> (unit -> ’a) -> (unit -> ’a) -> ’b coq_N -> coq_N -> ((coq_N -> coq_N -> unit -> ’a) -> ’b) -> ’a -> ’a -> ’b coq_N -> coq_N -> bool coq_N -> coq_N -> ((coq_N -> coq_N -> unit -> ’a) -> ’b) -> (unit -> ’a) -> (unit -> ’a) -> ’b coq_N -> coq_N -> ((coq_N -> coq_N -> unit -> ’a) -> ’b) -> ’a -> ’a -> ’b coq_N -> coq_N -> bool coq_N -> coq_N -> (unit -> ’a) -> (unit -> ’a) -> ’a coq_N -> coq_N -> ((coq_N -> coq_N -> unit -> ’a) -> ’b) -> ’a -> ’a -> ’b coq_N -> coq_N -> bool coq_N -> coq_N -> (unit -> ’a) -> (unit -> ’a) -> ’a coq_N -> coq_N -> ((coq_N -> coq_N -> unit -> ’a) -> ’b) -> ’a -> ’a -> ’b coq_N -> coq_N -> bool 49 14 9 9 41 134 16 2 39 47 19 53 23 25 27 23 25 27 25 27 29 25 27 29 50 Towards Automatic Resource Bound Analysis for OCaml A.2 Evaluation-Step Bounds Name Step Bound File: WorkingWithLists.raml (99 Problems in OCaml) last 3 + 9M lastTwo 3 + 11M at 3 + 18M natAt 3 + 6K + 4N length 9 + 12M rev 9 + 11M eqList 5 + L + 17M isPalindrome 20 + 29M flatten − compress 3 + 18M pack 21 + 34M encode 21 + 37M decode − duplicate 3 + 13M replicate − drop 9 + 19M split 23 + 31M slice 35 + 19M concat 3 + 9M rotate 74 + 43M removeAt 3 + 19M insertAt 3 + 22M constructList − random 5 min 9 randSelect 61 + 56.5M + 16.5M 2 lottoSelect − snd 5 fst 5 map 3 + 13M insert 6 + 21M sort 3 + 7.5M + 10.5M 2 compare 15 lengthSort 23 + 12LM + 36M + 27M 2 File: LogicAndCodes.raml eval2 17 + 38K + 38L + 14M table2 117 + 152K + 152L + 56M assoc 2 + 16M eval 10 + 11L + 16M + 16M X + 16M Y + 20X + 20Y tableMake − File: echelon_form.raml size 3 + 11n getElem 2 + 18n get2Elems 2 + 19L + 2M subtract_row_helper 3 + 20L + 2M subtract_row 12 + 39L + 4M subtract_helper 3 + 19LM + 28M + 24M Y concat 3 + 11n_1 tail 8 + 18n hd_helper 8 + 22M reverse_helper 3 + 11M reverse 7 + 11n head 21 + 33n split_helper 18 + 11L + 34M split 24 + 34n subtract 45 + 43LM + 63M Analysis Time #Constraints 0.01 0.01 0.01 0.02 0.01 0.02 0.02 0.02 − 0.03 0.05 0.07 − 0.06 − 0.08 0.12 0.13 0.12 0.19 0.18 0.21 − 0.21 0.21 0.46 − 0.46 0.45 0.46 0.52 0.51 0.45 0.67 41 58 49 48 37 42 62 115 f ai l 64 154 151 f ai l 33 f ai l 61 158 119 33 290 47 105 f ai l 8 15 607 f ai l 6 6 73 116 203 26 1000 0.29 1.62 0.06 0.33 − 1044 5899 66 1864 f ai l 0.01 0.01 0.02 0.02 0.03 0.16 0.03 0.03 0.03 0.03 0.03 0.05 0.06 0.06 0.34 29 41 59 58 147 850 35 44 53 35 41 103 102 110 1632 A Experimental Results echelon_helper echelon_form File: matrix.raml check_lists check_mat check_matrix construct_matrix getElemMatrix op rec_list rec_mat check_sanity plus minus append append_col transpose_helper transpose prod prod_mat mult_slow lineMult computeLine mat_mult_jan check_mult_sanity mult delete submat File: power_radio.raml sendmsg msg main1_events main2_events main3_events main4_events main5_events File: avanzini.raml partition quicksort rev_sort File: append_all.raml append_all append_all2 append_all3 File: bfs.raml dfs bfs File: rev_pairs.raml pairs File: binary_counter.raml add_one add_many add_list File: array_fun.raml nat_iterate nat_fold apply_all File: calculator.raml add 51 3 + 43LM Y + 63M Y + 59Y 8 + 43m 2 n + 59m + 63m 2 1.75 1.81 8563 8838 3 + 11LM + 19M 18 + 11LM + 30M 25 + 11LM + 30M 28 + 11LM + 30M 9 + 18mn + 18m 13 3 + 29L + 2M 3 + 31LM + 2M + 19Y 79 + 11LM + 30M + 11RY + 30Y 130 + 53m 1 n 1 + 32m 1 + 11m 2 n 2 + 79m 2 130 + 53m 1 n 1 + 32m 1 + 11m 2 n 2 + 79m 2 6 + 11n 3 + 11mn + 8m + 14l 3 + 16.5LM + 5.5LM 2 + 14M + 11M RY 7 + 16.5mn + 5.5m 2 n + 14m 3 + 16L + 2M 3 + 17L + 2LM + 16LY 14+28m 1 +47.5m 1 m 2 n 2 +5.5m 1 m 22 n 2 +14m 1 m 2 + 0.03 0.05 0.05 0.08 0.05 0.03 0.05 0.15 0.15 0.41 0.52 0.26 0.34 0.55 0.55 0.31 0.37 6.81 161 262 271 349 182 27 78 526 681 1916 1916 34 396 1814 1820 51 380 42274 0.37 0.48 1.11 0.6 1.97 78 476 3901 665 7534 1.71 1.85 48 412 12 + 10n 10 + 9K 0 + 23.00L 0 + 10L 0 Y + 9R 0 + 9Z 0 11 + 10K 0 + 16L 0 + 19L 0 Y + 10R 0 + 26Z 0 11 + 13K 0 + 25L 0 + 23L 0 Y + 5L 0 M Y + 29R 0 + 29Z 0 11 + 13K 0 + 25L 0 + 28L 0 Y + 17R 0 + 29Z 0 18 + 13K 0 + 44.6L 0 + 19L 0 Y + 13R 0 + 13Z 0 0.01 0.09 0.2 1.31 0.42 0.44 38 338 1230 7351 2397 2339 5 + 17n 3 + 20n + 13n 2 10 + 23K M + 32L 0 + 20L 0 Y + 13L 0 Y 2 0.01 0.1 0.71 57 587 17704 7 + 9LM + 15M 7 + 15LM + 18LM Y + 21M 7 + 21LM + 27LM RY + 15LM Y + 21M 0.09 0.16 0.39 1011 4869 13435 18 + 26M 24 + 92M 0.04 0.07 488 1723 3 + 7M + 10M 2 0.03 317 8 + 12L 0 3 + 12L 0 + 30X 5 + 12L 0 + 34Y 0.03 0.03 0.03 155 313 341 3 + 10N 3 + 12N 15 + 21N 0.03 0.02 0.03 55 76 135 3 + 8M 0.05 117 47.5m 2 n 2 + 5.5m 22 n 2 + 14m 2 3 + 6L + 16M 3 + 22LY + 18M 3 + 2LM + 18M + 22M RY + 16M Y 71 + 11LM + 30M + 11RY + 30Y 121 + 13m 1 n 1 + 78m 1 + 27m 1 m 2 n 2 + 16m 1 m 2 + 11m 2 n 2 + 30m 2 2 + 21n 9 + 21mn + 19m 52 sub mult eval_simpl eval File: mergesort.raml split merge mergesort mergesort_list File: quicksort.raml partition quicksort quicksort_pairs quicksort_list File: square_mult.raml square_mult File: subsequence.raml lcs File: running.raml abmap asort asort’ btick abfoldr cons_all File: ocaml_sort.raml merge list File: ocaml_list.raml length cons hd tl nth append rev_append rev flatten concat map mapi rev_map iter iteri fold_left fold_right map2 rev_map2 iter2 fold_left2 fold_right2 for_all exists for_all2 exists2 mem memq assoc assq mem_assoc Towards Automatic Resource Bound Analysis for OCaml 5 + 2K + 8M 3 + 8M + 4M 2 8 + 8K LN + 5K N + 20L + 22X 3 + 20K LN + 14K N + 14L + 14X 0.03 0.06 0.21 0.22 156 427 9548 10723 5 + 8.5M 3 + 17L + 17M 4 − 6K + 32.5K N + 6K 2 4 − 7.5K + 33.5K N − 7K X + 7.5K 2 + 7K 2 X 0.04 0.04 0.17 0.39 159 407 4654 15055 5 + 19M 3 + 19M + 14M 2 3 + 13M + 23M 2 3 − 7.5LM + 7.5LM 2 + 19.5M + 16.5M 2 0.04 0.08 0.09 0.27 197 1747 2131 8712 9 + 21K 0 + 30L 0 0.08 243 21 + 8L + 50LM + 27M 0.04 900 3 + 12M + 12N 11 + 22K N + 13K 2 N + 13L + 15N 14 + 22K N + 13K 2 N + 7L + 15N 3 + 16L + 14N 3 + 13M + 13N 13 + 17M + 21M N + 26N 0.03 0.14 0.16 0.05 0.05 0.08 477 5656 5655 904 267 1844 3 + 17L + 17M 43 + 30.5M + 8.5M 2 0.05 0.11 404 3066 7 + 10M 4 3 3 14 + 16M 3 + 9M 3 + 9M 7 + 9M 3 + 9LM + 11M 3 + 9LM + 11M 3 + 13M 8 + 19M 9 + 11M 3 + 10M 8 + 16M 3 + 10M 3 + 10M 5 + 17L 12 + 15L 5 + 14M 5 + 14L 5 + 14M 3 + 12M 3 + 12M 5 + 16M 5 + 16L 3 + 18M 3 + 22M 2 + 18M 2 + 22M 3 + 20M 0.02 0.01 0.02 0.02 0.02 0.03 0.02 0.02 0.03 0.04 0.02 0.02 0.02 0.02 0.02 0.02 0.03 0.03 0.03 0.03 0.03 0.03 0.03 0.03 0.03 0.04 0.04 0.04 0.03 0.03 0.04 59 9 14 16 93 77 78 84 201 201 73 92 103 55 74 59 55 142 196 120 128 120 61 61 126 205 67 75 74 84 69 A Experimental Results mem_assq 3 + 24M remove_assoc 3 + 21M remove_assq 3 + 25M find 2 + 10M find_all 18 + 22M filter 18 + 22M partition 30 + 23M split 5 + 17M combine 5 + 13M merge 3 + 21L + 21M chop 8 + 16M stable_sort f ai l sort f ai l fast_sort f ai l File: aws.raml average_grade 18 + 34M greater_eq 49 + 68M sort_students 12 − 34LM + 34LM 2 + 15M make_table 9 + 25LM + 21M find 2 + 12M lookup 8 + 17LM + 17M average_grade’ 21 + 17LM + 17LM Y + 33M greater_eq’ 61 + 34LM + 34LM Y + 66M sort_students_efficient f ai l File: PROTOTYPE File: appendAll.raml appendAll 3 + 9n 1 n 2 + 13n 1 appendAll2 3 + 13n 1 n 2 + 18n 1 n 2 n 3 + 18n 1 appendAll3 3 + 18n 1 n 2 + 27n 1 n 2 n 3 n 4 + 13n 1 n 2 n 3 + 18n 1 File: duplicates.raml eq 5 + 17n 1 + n 2 remove 3 + 21L + 18LY nub 3 − 9N n + 9N 2 n + 5.5N + 10.5N 2 File: dyade.raml multList 3 + 15n dyade 3 + 15n 1 n 2 + 17n 1 File: eratosthenes.raml filter 3 + 23n eratos 3 + 4.5n + 11.5n 2 File: bitvectors.raml bitToInt’ 3 + 20M bitToInt 7 + 20n sum 33 add’ 3 + 51L + 2M add 8 + 2n 1 + 51n 2 diff 31 sub’ 5 + 59L + 2M sub 14 + 61n 1 mult 3 + 53n 1 n 2 + 30n 1 compare 3 + 28L + 2M leq 13 + 2n 1 + 28n 2 File: flatten.raml flatten 3 + 5.5nl + 5.5n 2 l + 24n insert 6 + 17n insertionsort 3 + 7.5n + 8.5n 2 flattensort 11 + 13nl + 5.5n 2 l + 8.5n 2 l 2 + 24n File: listsort.raml isortlist 3 − 9nl + 9n 2 l + 6.5n + 9.5n 2 File: longestCommonSubsequence.raml firstline 3 + 10M 53 0.04 0.04 0.04 0.04 0.04 0.05 0.06 0.06 0.06 0.08 0.06 0.32 0.45 0.68 77 92 102 66 312 312 580 83 122 253 83 6606 6606 6606 0.04 0.05 0.32 0.08 0.05 0.08 0.09 0.18 0.64 185 721 8933 949 88 269 1094 2572 19377 0.05 0.2 1.57 203 1565 12785 0.01 0.1 0.51 62 625 3919 0.01 0.05 36 246 0.01 0.04 51 180 0.02 0.02 0.01 0.03 0.03 0.03 0.06 0.06 0.12 0.07 0.07 42 48 59 112 119 47 127 138 477 80 94 0.42 0.02 0.05 2.34 3388 55 181 19153 0.41 2676 0.01 29 54 right max newline lcstable lcs File: mergesort.raml msplit merge mergesortBuggy mergesort File: minsort.raml findMin minSort File: queue.raml empty enqueue enqueues copyover dequeue children breadth Towards Automatic Resource Bound Analysis for OCaml 5 7 3 + 2L + 50M 11 + 10L + 52LM + 25M 23 + 10L + 52LM + 25M 0.01 0.01 0.03 0.15 0.16 14 13 128 865 901 5 + 9.5M 3 + 22L + 22M − 3 − 38.67M + 47.33M 2 0.03 0.06 − 0.14 112 239 f ai l 869 3 + 21M 8 + 25.5M + 10.5M 2 0.03 0.04 125 219 0.01 0.03 0.09 0.08 0.18 0.26 3.99 4 19 203 226 678 333 10540 4.34 4.33 4.29 10818 18711 18747 0.15 896 0.15 896 0.02 0.02 68 52 0.04 0.04 0.12 0.12 − 0.05 0.09 0.04 0.08 124 130 574 574 f ai l 108 331 124 291 0.13 0.18 0.06 0.26 0.51 0.69 437 623 184 1607 3165 3793 0.12 680 0.06 0.27 0.23 0.29 0.95 2.52 95 1428 1041 1428 5804 15613 3 10 3 + 21M 7 + 14M 14 + 39M 27 18+118B R +116B RT −LM +116LM Y +L 2 M +88M + 118M Y + 49R − RT + RT 2 startBreadth 19 + 57M + 59M 2 depth 27 + 42L + 53LM startDepth 3 + 15.5M + 26.5M 2 File: quicksort_mutual.raml part 24+16L+30LY +15L 2 +27M +30M Y +15M 2 +46Y + 15Y 2 quicksortMutual 3 + 16M + 15M 2 File: rationalPotential.raml zip3 3 + 17L + 2M group3 3 + 5.67M File: sizechange.raml r1 3 + 11M rev 7 + 11M f 3 + 11LM + 17.33M + 3.67M 3 g 15 + 11L + 11LM + 17.33M + 11M Y + 3.67M 3 f2 − last 3 + 14M f2’ 12 + 14L + 14M g3 3 + 11M f3 11 + 22L + 11M File: splitandsort.raml insert 13 + 23M split 3 + 11.5M + 11.5M 2 splitqs 7 + 24M quicksort 3 + 16.5M + 17.5M 2 sortAll 3 + 16.5LM + 17.5L 2 M + 19M splitAndSort 11 + 47M + 29M 2 File: subtrees.raml subtrees 3 + 23.5M + 5.5M 2 File: tuples.raml attach 3 + 13M pairs 3 + 7M + 12M 2 pairsAux 3 + 8M + 12M 2 pairsSlow 3 + 16.17M + M 2 + 1.83M 3 triples 3 + 30.5M − 14.5M 2 + 8M 3 quadruples 3 + 0.33M + 35.5M 2 − 14.83M 3 + 3M 4 File: array_dijkstra.raml A Experimental Results makeGraph dijkstra File: CompCert File: String0.ml string_dec prefix File: Tuples.ml uncurry File: Specif.ml projT1 projT2 value File: EquivDec.ml equiv_dec File: Datatypes.ml implb xorb negb fst snd length app coq_CompOpp coq_CompareSpec2Type coq_CompSpec2Type File: Bool.ml bool_dec eqb iff_reflect File: Ring.ml bool_eq File: Peano.ml plus max min nat_iter File: List0.ml hd tl in_dec nth_error remove rev rev_append rev’ list_eq_dec map fold_left fold_right existsb forallb filter File: EqNat.ml beq_nat File: Compare_dec.ml le_lt_dec le_gt_dec nat_compare File: BinPosDef.ml succ 55 35 + 36K + 21N + 1N 2 46 + 33M + 111M 2 0.03 0.11 519 2808 5 + 14L 3 + 14M 0.06 0.05 205 170 − 0.02 106 3 3 2 0.01 0.01 0.01 6 6 4 1 0.01 2 3 5 7 3 3 3 + 7M 3 + 9M 3 3 6 0.01 0.01 0.01 0.01 0.01 0.04 0.05 0.01 0.01 0.01 7 12 13 4 4 72 118 25 25 30 5 5 7 0.01 0.01 0.01 17 12 15 12 0.01 23 3 + 8M 3 + 8L + 2M 3 + 10M 3 + 9M 0.04 0.06 0.05 0.06 117 180 147 64 3 3 3 + 14M 5 + 8M 3 + 15M 3 + 9.5M + 4.5M 2 3 + 9M 7 + 9M 5 + 14L 3 + 11M 3 + 10M 3 + 10M 3 + 12M 3 + 12M 3 + 13M 0.03 0.03 0.04 0.08 0.05 0.1 0.05 0.05 0.08 0.05 0.05 0.07 0.06 0.06 0.07 18 21 91 326 179 423 122 128 223 96 77 65 71 71 176 5 + 8L 0.08 162 3 + 6L + 2M 7 + 8M 5 + 8M 0.07 0.07 0.08 127 133 183 5 + 7N 0.04 124 56 add add_carry pred_double pred pred_N mask_rect mask_rec succ_double_mask double_mask double_pred_mask pred_mask sub_mask sub_mask_carry sub mul iter pow square div2 div2_up size_nat size compare_cont compare min max eqb leb ltb sqrtrem_step sqrtrem sqrt gcdn gcd ggcdn ggcd coq_Nsucc_double coq_Ndouble coq_lor coq_land ldiff coq_lxor shiftl_nat shiftr_nat shiftl shiftr testbit_nat testbit iter_op to_nat of_nat of_succ_nat digits2_pos coq_Zdigits2 File: BinNat.ml succ_double_n double_n succ_n pred_n succ_pos_n Towards Automatic Resource Bound Analysis for OCaml 7 + 7L + 5M + 7N + 5X 9 + 7L + 5M + 7N + 5X 7 + 7M 5 + 7M 6 + 7M 5 5 6 6 8 + 7M 13 + 7L 5 + 9L + 7M + 7N + 9X 3 + 8L + 8M + 8N + 8X 11 + 9L + 7M + 7N + 9X 3 + 7L + 17LN + 8M + 25N + 10N X − − 3 + 9M + 10M N + 24.5N + 8.5N 2 3 3 + 7N 5 + 7M + 7N 3 + 19M + 19N 5 + 9L + 9X 10 + 9L + 9X 16 + 9L + 9X 16 + 9L + 9X 5 + 8L + 8X 16 + 9L + 9X 16 + 9L + 9X − 5 + 66M + 16M N + 4M 2 + 59N + 4N 2 13 + 66M + 16M N + 4M 2 + 59N + 4N 2 − − − − 6 6 5 + 8L + 2M + 2N + 8X 6 + 16L + 16X 5 + 13L + 3M + 3N + 13X 5 + 13L + 3M + 3N + 13X 8 + 12X 8 + 12X − − 5 + 8X 5 + L + 23M + 23N + 7Z 3 + 10M + 13N − 3 + 21M 3 + 19M 3 + 19M + 19N 2 + 19K + 19L + 7 + 1 + 19R + 7 + 19Z 0.64 0.67 0.05 0.06 0.06 0.04 0.04 0.04 0.04 0.06 0.09 0.74 0.73 0.72 1.03 0.59 32.47 0.98 0.17 0.19 0.2 0.23 0.38 0.33 0.45 0.48 0.27 0.41 0.43 5438 5438 124 174 187 41 41 53 48 197 446 6368 6368 6405 7722 2849 139223 7592 44 169 156 542 1248 1258 2071 2071 454 1283 1283 17.54 18.25 19.67 29.64 29.04 29.79 4.81 4.86 5.12 4.97 5.08 5.09 4.85 5.08 6.42 6.58 5.15 5.3 5.2 5.86 5.44 5.27 0.47 0.54 135517 135529 97408 100787 179760 183139 42 37 1032 1355 1435 1509 136 186 5453 7323 291 1219 187 2652 244 221 542 1146 6 6 11 + 7K 11 + 7L 10 + 7K 1.72 1.75 1.79 1.77 1.75 42 37 162 214 150 A Experimental Results add_n sub_n mul_n compare_n eqb_n leb_n ltb_n min_n max_n div2_n even_n odd_n pow_n square_n log2_n size_n size_nat_n pos_div_eucl div_eucl div modulo gcd_n ggcd_n coq_lor_n coq_land_n ldiff_n coq_lxor_n shiftl_nat shiftr_nat shiftl_n shiftr_n testbit_nat_n testbit_n to_nat_n of_nat_n iter_n discr binary_rect binary_rec leb_spec0 ltb_spec0 log2_up lcm eqb_spec b2n setbit clearbit ones lnot max_case_strong max_case max_dec min_case_strong min_case min_dec max_case_strong_pd max_case max_dec_pd min_case_strong_pd 18 + 7K + 5L + 7R + 5S 17 + 8K + 8L + 8R + 8S 2 + 17K R + 10K S + 25K + 8L + 2 + 7R + 8 18 + 9K + 9L 13 + 8R + 8S 27 + 9K + 9L 27 + 9K + 9L 27 + 9K + 9L 27 + 9K + 9L 6 5 17 − − 5 + 19K + 19L 9 + 19K + 19L 10 + 7K + 7L − 2 + 50K L − 12.5K + 99K + 12.5K 2 − 12.5L + 99L + 12.5L 2 + 2 + 15 − − − − 14 + 8K + 8L + 2R + 2S 14 + 16R + 16S 13 + 3K + 3L + 13R + 13S 13 + 3K + 3L + 13R + 13S 12 + 15Z 12 + 15Z − − 10 + 9Z 11 + 23K + 23L + 7S − 3 + 19M − 4 17 + 11K + 11L 17 + 11K + 11L 33 + 9K + 9L 33 + 9K + 9L 51 + 19K + 26L − 22 + 8R + 8S 8 − − − − 70 + 18K + 18L 78 + 18K + 18L 86 + 18K + 18L 70 + 18K + 18L 78 + 18K + 18L 86 + 9K + 9L + 9R + 9S 78 + 9K + 9L + 9R + 9S 14 + 18K + 18L + 2 + 62 86 + 18K + 18L 78 + 9K + 9L + 9R + 9S 57 2.48 2.65 14.04 2.36 2.4 2.47 2.47 2.71 2.71 2.39 2.29 2.45 7.98 3.4 2.55 2.49 2.52 38.2 38.13 5562 6514 89507 1373 580 1398 1398 2352 2352 79 53 74 25024 7622 1165 575 182 183270 183578 34.64 40.36 29.84 41.02 7.51 7.53 7.75 7.63 7.59 7.58 16.82 16.99 7.79 7.88 16.25 7.91 16.49 7.77 7.99 8.22 8.35 8.45 8.87 169.2 11.12 11.02 20.78 22.03 23.56 22.39 15.23 15.24 16.73 17.72 18.31 20.11 21.86 32.11 23.53 25.48 183586 183588 101067 183702 1156 1442 1560 1627 164 225 5551 8953 387 1261 2694 246 2893 32 593 593 1416 1416 3417 403044 598 20 10128 10672 5992 11681 12294 12264 12270 12294 12264 12270 12300 52970 12270 12300 58 min_case min_dec_pd Towards Automatic Resource Bound Analysis for OCaml 14 + 18K + 18L + 2 + 62 86 + 18K + 18L 35.89 27.49 52970 12270 A Experimental Results 59 A.3 Heap-Allocation Bounds Name Heap Bound File: WorkingWithLists.raml (99 Problems in OCaml) last 2 lastTwo 4 at 2 + 2M natAt 2 length 4+M rev 5 + 4M eqList 1 isPalindrome 6 + 4M flatten − compress 2 + 4M pack 14 + 14M encode 13 + 12M decode − duplicate 2 + 8M replicate − drop 7 + 5M split 16 + 10M slice 12 + 6M concat 4M rotate 23 + 11M removeAt 2 + 6M insertAt 3 + 6M constructList − random 1 min 0 randSelect 21 + 9M + 5M 2 lottoSelect − snd 0 fst 0 map 2 + 4M insert 6 + 5M sort 2 + 3.5M + 2.5M 2 compare 1 lengthSort 12 + LM + 17M + 3M 2 File: LogicAndCodes.raml eval2 0 table2 46 assoc 0 eval 0 tableMake − File: echelon_form.raml size 1+n getElem 2n get2Elems 1 + 2L subtract_row_helper 2 + 4M subtract_row 3 + 2L + 4M subtract_helper 2 + 2LM + 7M + 4M Y concat 4n_1 tail 1 + 2n hd_helper 1 + 6M reverse_helper 4M reverse 2 + 4n head 5 + 10n split_helper 4 + 4L + 9M split 7 + 9n subtract 9 + 6LM + 15M Analysis Time #Constraints 0.01 0.02 0.01 0.02 0.01 0.01 0.02 0.02 − 0.03 0.05 0.06 − 0.05 − 0.08 0.11 0.13 0.12 0.21 0.18 0.21 − 0.2 0.2 0.48 − 0.44 0.42 0.46 0.46 0.51 0.46 0.66 31 45 32 36 22 29 42 76 f ai l 44 109 98 f ai l 24 f ai l 39 105 72 25 176 31 84 f ai l 4 5 500 f ai l 1 1 62 94 169 12 876 0.29 1.54 0.05 0.31 − 976 5607 49 1804 f ai l 0.01 0.01 0.02 0.02 0.03 0.16 0.03 0.03 0.03 0.03 0.03 0.04 0.06 0.06 0.31 19 24 38 38 89 778 25 27 34 25 28 65 65 69 1469 60 echelon_helper echelon_form File: matrix.raml check_lists check_mat check_matrix construct_matrix getElemMatrix op rec_list rec_mat check_sanity plus minus append append_col transpose_helper transpose prod prod_mat mult_slow lineMult computeLine mat_mult_jan check_mult_sanity mult delete submat File: power_radio.raml sendmsg msg main1_events main2_events main3_events main4_events main5_events File: avanzini.raml partition quicksort rev_sort File: append_all.raml append_all append_all2 append_all3 File: bfs.raml dfs bfs File: rev_pairs.raml pairs File: binary_counter.raml add_one add_many add_list File: array_fun.raml nat_iterate nat_fold apply_all File: calculator.raml add sub mult Towards Automatic Resource Bound Analysis for OCaml 6LM Y + 15M Y + 10Y 1 + 6m 2 n + 10m + 15m 2 1.74 1.88 8386 8657 1 + LM + M 2 + LM + 2M 2 + LM + 2M 5 + LM + 2M 2mn + 2m 1 2 + 5L 2 + 5LM + 6Y 4 + LM + 2M + RY + 2Y 12 + 7m 1 n 1 + 2m 1 + m 2 n 2 + 10m 2 12 + 7m 1 n 1 + 2m 1 + m 2 n 2 + 10m 2 6 + 4n 4mn + 12l 10LM + 2LM 2 + 4M RY 2 + 10mn + 2m 2 n 1 2 + 5L 4+8m 1 +15m 1 m 2 n 2 +2m 1 m 22 n 2 +15m 2 n 2 +2m 22 n 2 2 + 6M 6LY + 2M 2 + 2LM + 6M + 6M RY 4 + LM + 2M + RY + 2Y 11 + 3m 1 n 1 + 10m 1 + 7m 1 m 2 n 2 + m 2 n 2 + 2m 2 6n 2 + 6mn + 2m 0.03 0.05 0.05 0.07 0.05 0.03 0.04 0.15 0.15 0.4 0.51 0.26 0.36 0.56 0.57 0.31 0.35 6.78 0.39 0.5 1.17 0.64 2.16 1.88 1.81 135 214 216 292 137 10 45 477 542 1652 1652 24 367 1773 1776 33 63 42184 49 431 3844 534 7270 30 365 6 5 + 6M 8 + 4L 0 Y + 8Z 0 11 + 2K 0 + 2L 0 + 8L 0 Y + 8R 0 + 10Z 0 11 + 2K 0 + 2L 0 + 8L 0 Y + 2R 0 + 10Z 0 12 + 2K 0 + 5.2L 0 + 4L 0 Y + 2R 0 + 2Z 0 0.01 0.01 0.2 0.42 0.43 0.4 22 73 1184 2508 2331 2226 6 + 6n 2 + 7n + 5n 2 7 + 12K M + 16L 0 + 7L 0 Y + 5L 0 Y 2 0.01 0.09 0.7 40 542 17616 3 + 4LM 2 + 8LM Y + 3M 2 + 3LM + 12LM RY + 2M 0.07 0.16 0.36 988 4823 13366 12 + 8M 12 + 24M 0.04 0.08 466 1669 2 − 3M + 5M 2 0.03 290 8 + 6L 0 6L 0 + 14X 1 + 6L 0 + 17Y 0.04 0.04 0.03 145 292 316 1 0 2 0.02 0.02 0.02 45 36 102 4M 2 2 − 2M + 2M 2 0.04 0.04 0.04 110 145 411 A Experimental Results eval_simpl eval File: mergesort.raml split merge mergesort mergesort_list File: quicksort.raml partition quicksort quicksort_pairs quicksort_list File: square_mult.raml square_mult File: subsequence.raml lcs File: running.raml abmap asort asort’ btick abfoldr cons_all File: ocaml_sort.raml merge list File: ocaml_list.raml length cons hd tl nth append rev_append rev flatten concat map mapi rev_map iter iteri fold_left fold_right map2 rev_map2 iter2 fold_left2 fold_right2 for_all exists for_all2 exists2 mem memq assoc assq mem_assoc mem_assq remove_assoc 61 5 + 4K LN + 2X 11K LN + 4.5K N 0.19 0.22 9500 10688 6 + 5M 4L + 4M 2 + 13K N 2 − 0.5K + 17K N + 0.5K 2 0.04 0.05 0.17 0.37 146 383 4589 14973 6+6∗M 2 + 7M + 5M 2 2 + 17M + 5M 2 2 − LM + LM 2 + 17.5M + 5.5M 2 0.04 0.07 0.09 0.25 178 1700 2063 8649 7+K0 0.08 201 9 + 5L + 9LM + 12M 0.04 815 2 + 4M + 4N 8 + 15K N + 5K 2 N + 4L + 6N 8 + 15K N + 5K 2 N + 6N 2 + 7L + 7N 0 5 + 4M + 4M N + 5N 0.04 0.13 0.13 0.05 0.03 0.08 459 5588 5588 884 242 1772 4L + 4M 32 + 17M + 2M 2 0.04 0.11 381 2997 1+M 4 0 0 4 + 2M 4M 4M 2 + 4M 2 + 4LM 2 + 4LM 2 + 4M 3 + 5M 6 + 4M 1 2 + 1M 0 0 2 + 4L 6 + 4M 1 0 0 1 1 1 1 1 + 2M 1 + 2M 2M 2M 1 + 2M 1 + 2M 2 + 6M 0.02 0.02 0.01 0.01 0.02 0.02 0.02 0.02 0.02 0.03 0.02 0.02 0.02 0.02 0.02 0.03 0.02 0.03 0.03 0.02 0.03 0.03 0.03 0.03 0.03 0.03 0.04 0.04 0.04 0.04 0.04 0.04 0.04 46 7 11 13 69 69 70 73 185 185 62 72 90 45 55 48 44 125 176 104 111 103 49 49 108 169 51 55 57 63 51 55 74 62 Towards Automatic Resource Bound Analysis for OCaml remove_assq 2 + 6M find 0 find_all 9 + 8M filter 9 + 8M partition 16 + 8M split 6 + 10M combine 2 + 6M merge 5L + 5M chop 1 + 2M stable_sort f ai l sort f ai l fast_sort f ai l File: aws.raml average_grade 7 + 6M greater_eq 16 + 12M sort_students 4 − 6LM + 6LM 2 + 11.5M + 13.5M 2 make_table 7 + 9LM + 11M find 0 lookup 4 average_grade’ 10 + 8M greater_eq’ 22 + 16M sort_students_efficient f ai l File: PROTOTYPE File: appendAll.raml appendAll 2 + 4n 1 n 2 appendAll2 2 + 8n 1 n 2 n 3 + 2n 1 appendAll3 2 + 2n 1 n 2 + 12n 1 n 2 n 3 n 4 + 2n 1 File: duplicates.raml eq 1 remove 2 + 5L nub 2 + 3.5N + 2.5N 2 File: dyade.raml multList 2 + 4n dyade 2 + 4n 1 n 2 + 6n 1 File: eratosthenes.raml filter 2 + 5n eratos 2 + 3.5n + 2.5n 2 File: bitvectors.raml bitToInt’ 1 bitToInt 2 sum 7 add’ 2 + 11M add 3 + 11n 1 diff 5 sub’ 4 + 13M sub 5 + 13n 1 mult 2 + 11n 1 n 2 + 9n 1 compare 1 + 3M leq 2 + 3n 1 File: flatten.raml flatten 2 + 2nl + 2n 2 l + 2n insert 6 + 4n insertionsort 2 + 4n + 2n 2 flattensort 4 + 6nl + 2n 2 l + 2n 2 l 2 + 2n File: listsort.raml isortlist 2 + 3.5n + 2.5n 2 File: longestCommonSubsequence.raml firstline 2 + 5M right 1 max 1 0.04 0.05 0.05 0.05 0.07 0.06 0.06 0.07 0.06 0.33 0.44 0.66 80 55 280 280 531 71 110 227 68 6204 6204 6204 0.04 0.06 0.36 0.08 0.06 0.07 0.11 0.22 0.64 143 625 8765 911 75 226 1009 2384 19074 0.04 0.21 1.57 185 1527 12727 0.01 0.02 0.12 42 90 938 0.01 0.06 23 221 0.01 0.04 30 148 0.01 0.01 0.01 0.03 0.03 0.03 0.06 0.06 0.12 0.06 0.07 22 25 32 67 70 20 70 73 409 48 53 0.42 0.02 0.05 2.43 3353 36 152 19084 0.11 704 0.02 0.01 0.01 51 12 5 A Experimental Results newline 2 + 7M lcstable 8 + 5L + 7LM + 10M lcs 9 + 5L + 7LM + 10M File: mergesort.raml msplit 6 + 5M merge 8L + 8M mergesortBuggy − mergesort 2 − 18.67M + 23.33M 2 File: minsort.raml findMin 2 + 8M minSort 4 + 10M + 4M 2 File: queue.raml empty 6 enqueue 6 enqueues 6M copyover 4 + 6M dequeue 10 + 18M children 24 breadth 12 + 54B R + 54B RT + 54LM Y + 38M + 54M Y + 20R startBreadth 15 + 25M + 27M 2 depth 16 + 24L + 28LM startDepth 2 + 10M + 14M 2 File: quicksort_mutual.raml part 8 + 6L + 8LY + 4L 2 + 10M + 8M Y + 4M 2 + 14Y + 4Y 2 quicksortMutual 2 + 6M + 4M 2 File: rationalPotential.raml zip3 2 + 7L group3 2 + 2.33M File: sizechange.raml r1 4M rev 2 + 4M f 4LM − 1.33M + 1.33M 3 g 4L + 4LM + 1.33M + 4M Y + 1.33M 3 f2 − last 2 + 6M f2’ 2 + 6L + 6M g3 4M f3 2 + 8L + 4M File: splitandsort.raml insert 14 + 6M split 2 + 11M + 3M 2 splitqs 6 + 8M quicksort 2 + 8M + 6M 2 sortAll 2 + 8LM + 6L 2 M + 8M splitAndSort 4 + 27M + 9M 2 File: subtrees.raml subtrees 2 + 9M + 2M 2 File: tuples.raml attach 2 + 6M pairs 2 − 3M + 5M 2 pairsAux −3M + 5M 2 pairsSlow 2 + 0.33M + M 2 + 0.67M 3 triples 2 + 9.67M − 9M 2 + 3.33M 3 quadruples 2 − 4.83M + 14.75M 2 − 7.17M 3 + 1.25M 4 File: array_dijkstra.raml makeGraph 4 + 2N + N 2 dijkstra 6 + 8.5M + 9.5M 2 File: CompCert File: String0.ml 63 0.08 0.14 0.15 276 782 806 0.03 0.05 − 0.14 97 212 f ai l 805 0.03 0.04 104 188 0.01 0.03 0.1 0.08 0.15 0.23 3.76 3.99 4.13 4.39 4 12 184 214 647 309 10447 10704 18650 18676 0.15 0.15 843 843 0.02 0.02 52 38 0.05 0.04 0.12 0.12 − 0.04 0.08 0.05 0.08 114 117 545 545 f ai l 96 303 114 267 0.13 0.18 0.05 0.26 0.49 0.66 411 587 161 1556 3101 3688 0.12 651 0.07 0.28 0.25 0.27 1.04 2.95 85 1395 1006 1395 5736 15510 0.03 0.1 437 2607 64 string_dec prefix File: Tuples.ml uncurry File: Specif.ml projT1 projT2 value File: EquivDec.ml equiv_dec File: Datatypes.ml implb xorb negb fst snd length app coq_CompOpp coq_CompareSpec2Type coq_CompSpec2Type File: Bool.ml bool_dec eqb iff_reflect File: Ring.ml bool_eq File: Peano.ml plus max min nat_iter File: List0.ml hd tl in_dec nth_error remove rev rev_append rev’ list_eq_dec map fold_left fold_right existsb forallb filter File: EqNat.ml beq_nat File: Compare_dec.ml le_lt_dec le_gt_dec nat_compare File: BinPosDef.ml succ add add_carry pred_double pred Towards Automatic Resource Bound Analysis for OCaml A Experimental Results pred_N mask_rect mask_rec succ_double_mask double_mask double_pred_mask pred_mask sub_mask sub_mask_carry sub mul iter pow square div2 div2_up size_nat size compare_cont compare min max eqb leb ltb sqrtrem_step sqrtrem sqrt gcdn gcd ggcdn ggcd coq_Nsucc_double coq_Ndouble coq_lor coq_land ldiff coq_lxor shiftl_nat shiftr_nat shiftl shiftr testbit_nat testbit iter_op to_nat of_nat of_succ_nat digits2_pos coq_Zdigits2 File: BinNat.ml succ_double_n double_n succ_n pred_n succ_pos_n add_n sub_n mul_n compare_n 65 66 eqb_n leb_n ltb_n min_n max_n div2_n even_n odd_n pow_n square_n log2_n size_n size_nat_n pos_div_eucl div_eucl div modulo gcd_n ggcd_n coq_lor_n coq_land_n ldiff_n coq_lxor_n shiftl_nat shiftr_nat shiftl_n shiftr_n testbit_nat_n testbit_n to_nat_n of_nat_n iter_n discr binary_rect binary_rec leb_spec0 ltb_spec0 log2_up lcm eqb_spec b2n setbit clearbit ones lnot max_case_strong max_case max_dec min_case_strong min_case min_dec max_case_strong_pd max_case max_dec_pd min_case_strong_pd min_case min_dec_pd Towards Automatic Resource Bound Analysis for OCaml A Experimental Results 67 A.4 Tick Bounds Name Tick Bound File: WorkingWithLists.raml (99 Problems in OCaml) last M lastTwo M at M natAt K length M rev M eqList L isPalindrome 2M flatten − compress M pack 2M encode 2M decode − duplicate M replicate − drop M split 2M slice 1+M concat M rotate 3M removeAt M insertAt M constructList − random 1 min 1 randSelect 1 + 2M + M 2 lottoSelect − snd 1 fst 1 map M insert M sort 0.5M + 0.5M 2 compare 1 lengthSort LM + 2M + 2M 2 File: LogicAndCodes.raml eval2 1 + 2K + 2L + M table2 4 + 8K + 8L + 4M assoc M eval 1 + L + M + M X + M Y + 2X + 2Y tableMake − File: echelon_form.raml size n getElem n get2Elems L subtract_row_helper L subtract_row L+M subtract_helper M + 2M Y concat n_1 tail n hd_helper M reverse_helper M reverse n head 2n split_helper L + 2M split 2n subtract 2LM + M Analysis Time #Constraints 0.01 0.01 0.01 0.01 0.01 0.01 0.02 0.02 − 0.03 0.05 0.07 − 0.06 − 0.08 0.12 0.13 0.12 0.2 0.18 0.25 − 0.24 0.25 0.52 − 0.48 0.45 0.43 0.45 0.48 0.48 0.69 30 42 29 35 20 26 40 71 f ai l 39 92 82 f ai l 20 f ai l 33 91 61 24 156 27 76 − 3 6 484 − 2 2 60 85 160 10 859 0.29 1.53 0.05 0.32 − 980 5594 50 1809 f ai l 0.01 0.01 0.01 0.02 0.03 0.16 0.03 0.03 0.03 0.03 0.03 0.04 0.06 0.06 0.3 18 23 36 35 84 771 24 26 31 24 26 59 60 62 1453 68 echelon_helper echelon_form File: matrix.raml check_lists check_mat check_matrix construct_matrix getElemMatrix op rec_list rec_mat check_sanity plus minus append append_col transpose_helper transpose prod prod_mat mult_slow lineMult computeLine mat_mult_jan check_mult_sanity mult delete submat File: power_radio.raml sendmsg msg main1_events main2_events main3_events main4_events main5_events File: avanzini.raml partition quicksort rev_sort File: append_all.raml append_all append_all2 append_all3 File: bfs.raml dfs bfs File: rev_pairs.raml pairs File: binary_counter.raml add_one add_many add_list File: array_fun.raml nat_iterate nat_fold apply_all File: calculator.raml add sub Towards Automatic Resource Bound Analysis for OCaml 2LM Y + 4M Y 2m 2 n + 4m 2 1.82 1.81 8369 8639 LM + M LM + 2M LM + 2M LM + 2M mn + m 1 2M 2LM + Y LM + 2M + RY + 2Y 4m 1 n 1 + 2m 1 + m 2 n 2 + 5m 2 4m 1 n 1 + 2m 1 + m 2 n 2 + 5m 2 n mn + l 0.5LM + 0.5LM 2 + M + M RY 0.5mn + 0.5m 2 n + m M L + LY m 1 +2.5m 1 m 2 n 2 +0.5m 1 m 22 n 2 +m 1 m 2 +2.5m 2 n 2 + 0.04 0.05 0.06 0.07 0.05 0.03 0.05 0.14 0.15 0.42 0.51 0.25 0.33 0.63 0.58 0.32 0.37 6.57 133 210 212 287 135 10 42 471 534 1632 1632 20 357 1764 1766 32 347 42169 0.5m 22 n 2 + m 2 M LY + M M + M RY + M Y LM + 2M + RY + 2Y m 1 n 1 + 5m 1 + m 1 m 2 n 2 + m 1 m 2 + m 2 n 2 + 2m 2 n mn + m 0.41 0.48 1.09 0.69 1.93 1.76 1.86 44 426 3836 526 7249 27 357 200 + 32n 200L 0 + 32L 0 Y 32L 0 Y + 200Z 0 16L 0 Y + 16L 0 M Y + 200R 0 + 200Z 0 32L 0 Y + 200Z 0 40L 0 + 32L 0 Y 0.01 0.1 0.21 0.31 0.43 0.41 21 302 1177 7254 2317 2207 −0.50M + 0.5 ∗ M 2 0.02 284 1+M 1+M 0.04 0.03 109 145 A Experimental Results mult eval_simpl eval File: mergesort.raml split merge mergesort mergesort_list File: quicksort.raml partition quicksort quicksort_pairs quicksort_list File: square_mult.raml square_mult File: subsequence.raml lcs File: running.raml abmap asort asort’ btick abfoldr cons_all File: ocaml_sort.raml merge list File: ocaml_list.raml length cons hd tl nth append rev_append rev flatten concat map mapi rev_map iter iteri fold_left fold_right map2 rev_map2 iter2 fold_left2 fold_right2 for_all exists for_all2 exists2 mem memq assoc assq mem_assoc mem_assq 69 0.5M + 0.5M 2 K LN + 0.5K N + L + X 0 0.06 0.23 0.2 409 9498 10678 0 L+M −0.5K + 0.5K 2 −0.5K + 0.5K 2 0.05 0.05 0.16 0.42 133 378 4567 14946 M −0.5M + 0.5M 2 −0.5M + 0.5M 2 −0.5M + 0.5M 2 0.05 0.07 0.09 0.26 170 1687 2046 8628 K 0 + 2L 0 0.07 199 2.5L 0.05 877 70 Towards Automatic Resource Bound Analysis for OCaml remove_assoc remove_assq find find_all filter partition split combine merge chop stable_sort sort fast_sort File: aws.raml average_grade M greater_eq 2M sort_students LM + LM 2 make_table LM find 0 lookup 0 average_grade’ 0 greater_eq’ 0 sort_students_efficient LM File: PROTOTYPE File: appendAll.raml appendAll n1 n2 + n1 appendAll2 n 1 n 2 + 2n 1 n 2 n 3 + n 1 appendAll3 n 1 n 2 + 3n 1 n 2 n 3 n 4 + n 1 n 2 n 3 + n 1 File: duplicates.raml eq n2 remove L + LY nub −0.5N n + 0.5N 2 n + 0.5N + 0.5N 2 File: dyade.raml multList n dyade n1 n2 + n1 File: eratosthenes.raml filter n eratos 0.5n + 0.5n 2 File: bitvectors.raml bitToInt’ M bitToInt n sum 1 add’ 2M add 2n 1 diff 1 sub’ 2M sub 1 + 2n 1 mult 2n 1 n 2 + n 1 compare M leq 1 + n1 File: flatten.raml flatten 0.5nl + 0.5n 2 l + n insert n insertionsort 0.5n + 0.5n 2 flattensort nl + 0.5n 2 l + 0.5n 2 l 2 + n File: listsort.raml isortlist −0.5nl + 0.5n 2 l + 0.5n + 0.5n 2 File: longestCommonSubsequence.raml firstline M right 1 0.04 0.05 0.31 0.07 0.06 0.05 0.09 0.13 0.72 136 610 8733 900 75 224 1000 2365 19030 0.04 0.2 1.57 184 1525 12724 0.01 0.1 0.52 40 583 3864 0.01 0.05 21 217 0.01 0.03 27 143 0.02 0.01 0.01 0.03 0.03 0.03 0.06 0.06 0.11 0.06 0.07 22 24 18 50 52 16 55 58 387 42 47 0.41 0.01 0.04 2.32 3351 24 144 19074 0.39 2621 0.02 0.02 48 12 A Experimental Results max 1 newline 3M lcstable L + 3LM + M lcs 1 + L + 3LM + M File: mergesort.raml msplit 0.5M merge L+M mergesortBuggy − mergesort −1.5M + 1.5M 2 File: minsort.raml findMin M minSort 1.5M + 0.5M 2 File: queue.raml empty 1 enqueue 1 enqueues 2M copyover M dequeue 1 + 2M children 1 breadth 7B R + 7B RT + 7LM Y + 4M + 7M Y + 2R startBreadth 2.5M + 3.5M 2 depth 2L + 3LM startDepth 1 − 1.5M + 1.5M 2 File: quicksort_mutual.raml part 1 + L + 2LY + L 2 + 2M + 2M Y + M 2 + 3Y + Y 2 quicksortMutual M + M2 File: rationalPotential.raml zip3 L group3 0.33M File: sizechange.raml r1 M rev M f LM + 1.67M + 0.33M 3 g 1 + L + LM + 1.67M + M Y + 0.33M 3 f2 − last M f2’ 1+L +M g3 M f3 1 + 2L + M File: splitandsort.raml insert M split 0.5M + 0.5M 2 splitqs M quicksort M2 sortAll L2 M + M splitAndSort 1.5M + 1.5M 2 File: subtrees.raml subtrees 0.5M + 0.5M 2 File: tuples.raml attach M pairs M2 pairsAux M2 pairsSlow 0.83M + 0.17M 3 triples 1.83M − 1.5M 2 + 0.67M 3 quadruples −0.67M + 2.75M 2 − 1.33M 3 + 0.25M 4 File: array_dijkstra.raml makeGraph dijkstra File: CompCert 71 0.01 0.08 0.15 0.15 5 272 768 791 0.04 0.05 − 0.14 85 203 f ai l 778 0.04 0.04 93 175 0.01 0.03 0.09 0.07 0.16 0.22 3.54 3.83 4.02 4.33 1 10 183 210 631 294 10413 10663 18631 18656 0.14 0.14 836 836 0.02 0.01 47 33 0.05 0.04 0.12 0.12 − 0.04 0.09 0.04 0.08 113 115 546 546 f ai l 93 302 113 265 0.13 0.17 0.05 0.27 0.49 0.61 397 573 152 1543 3085 3658 0.12 646 0.06 0.24 0.25 0.3 1.05 2.79 82 1391 1003 1391 5728 15498 72 File: String0.ml string_dec prefix File: Tuples.ml uncurry File: Specif.ml projT1 projT2 value File: EquivDec.ml equiv_dec File: Datatypes.ml implb xorb negb fst snd length app coq_CompOpp coq_CompareSpec2Type coq_CompSpec2Type File: Bool.ml bool_dec eqb iff_reflect File: Ring.ml bool_eq File: Peano.ml plus max min nat_iter File: List0.ml hd tl in_dec nth_error remove rev rev_append rev’ list_eq_dec map fold_left fold_right existsb forallb filter File: EqNat.ml beq_nat File: Compare_dec.ml le_lt_dec le_gt_dec nat_compare File: BinPosDef.ml succ add add_carry pred_double Towards Automatic Resource Bound Analysis for OCaml A Experimental Results pred pred_N mask_rect mask_rec succ_double_mask double_mask double_pred_mask pred_mask sub_mask sub_mask_carry sub mul iter pow square div2 div2_up size_nat size compare_cont compare min max eqb leb ltb sqrtrem_step sqrtrem sqrt gcdn gcd ggcdn ggcd coq_Nsucc_double coq_Ndouble coq_lor coq_land ldiff coq_lxor shiftl_nat shiftr_nat shiftl shiftr testbit_nat testbit iter_op to_nat of_nat of_succ_nat digits2_pos coq_Zdigits2 File: BinNat.ml succ_double_n double_n succ_n pred_n succ_pos_n add_n sub_n mul_n 73 74 compare_n eqb_n leb_n ltb_n min_n max_n div2_n even_n odd_n pow_n square_n log2_n size_n size_nat_n pos_div_eucl div_eucl div modulo gcd_n ggcd_n coq_lor_n coq_land_n ldiff_n coq_lxor_n shiftl_nat shiftr_nat shiftl_n shiftr_n testbit_nat_n testbit_n to_nat_n of_nat_n iter_n discr binary_rect binary_rec leb_spec0 ltb_spec0 log2_up lcm eqb_spec b2n setbit clearbit ones lnot max_case_strong max_case max_dec min_case_strong min_case min_dec max_case_strong_pd max_case max_dec_pd min_case_strong_pd min_case min_dec_pd Towards Automatic Resource Bound Analysis for OCaml
6cs.PL
Fast Exact k-Means, k-Medians and Bregman Divergence Clustering in 1D arXiv:1701.07204v3 [cs.DS] 30 Jun 2017 Allan Grønlund∗ Kasper Green Larsen† Jesper Sindahl Nielsen § Stefan Schneider Alexander Mathiasen‡ ¶ Mingzhou Song k Abstract The k-Means clustering problem on n points is NP-Hard for any dimension d ≥ 2, however, for the 1D case there exist exact polynomial time algorithms. Previous literature reported an O(kn2 ) time dynamic programming algorithm that uses O(kn) space. We present a new algorithm computing the optimal√clustering in only O(kn) time using linear space. For k = Ω(lg n), we improve this even further to n2O( lg lg n lg k) time. We generalize the new algorithm(s) to work for the absolute distance instead of squared distance and to work for any Bregman Divergence as well. ∗ Aarhus University. Email: [email protected]. Supported by MADALGO - Center for Massive Data Algorithmics, a Center of the Danish National Research Foundation. † Aarhus University. Email: [email protected]. Supported by MADALGO, a Villum Young Investigator Grant and an AUFF Starting Grant. ‡ Aarhus University. Email: [email protected]. Supported by MADALGO and an AUFF Starting Grant. § Aarhus University. Email: [email protected]. Supported by MADALGO. ¶ University of California, San Diego. Email: [email protected]. Supported by NSF grant CCF-1213151 from the Division of Computing and Communication Foundations. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. k New Mexico State University. Email: [email protected] 1 Introduction Clustering is the problem of grouping elements into clusters such that each element is similar to the elements in the cluster assigned to it and not similar to elements in any other cluster. It is one of, if not the, primary problem in the area of machine learning known as Unsupervised Learning and no clustering problem is as famous and widely considered as the k-MeansPproblem: Given a multiset X = {x1 , ..., xn } ⊂ Rd find k centroids M = {µ1 , ..., µk } ⊂ Rd minimizing x∈X minµ∈M ||x − µ||2 . Several NP-Hardness results exist for finding the optimal k-Means clustering in general, forcing one to turn towards heuristics. k-Means is NP-hard even for k = 2 and general dimension [4] and it is also NP-hard for d = 2 and general k [16]. Even hardness of approximation results exist [15, 8]. In [8] the authors show there exists a ε > 0 such that it is NP-hard to approximate k-Means to within a factor 1 + ε of optimal, and in [15] it is proved that ε ≥ 0.0013. On the upper bound side the best known polynomial time approximation algorithm for k-Means has an approximation factor of 6.357 [3]. In practice, Lloyd’s algorithm is a popular iterative local search heuristic that starts from some random or arbitrary clustering. The running time of Lloyd’s algorithm is O(tknd) where t is the number of rounds of the local search procedure. In theory, if Lloyd’s algorithm is run to convergence to a local minimum, t could be exponential and there is no guarantee on how well the solution found approximates the optimal solution [6, 20]. Lloyd’s algorithm is often combined with the effective seeding technique for selecting initial centroids due to [7] that gives an expected O(lg k) approximation ratio for the initial clustering, which can then improved further by Lloyd’s algorithm. For the one-dimensional case, the k-Means problem is not NP-hard. In particular, there is an O(kn2 ) time and O(kn) space dynamic programming solution for the 1D case, due to work by [22]. The 1D kMeans problem is encountered surprisingly often in practice, some examples being in data analysis in social networks, bioinformatics and retail market [5, 13, 18]. It is only natural to try other reasonable distance measures for the data considered and define different clustering problems. There are many other choices than the sum of squares of the Euclidian distances that define k-Means. For instance, one could use any Lp norm instead. The special case of p = 1 is known as k-Medians clustering and has also received considerable attention. The k-Medians problems is also NP-hard and the best polynomial time approximation algorithms has an approximation factor of 2.633 [8]. In [9] the authors consider and define clustering with Bregman Divergences. Bregman Divergence generalize squared Euclidian distance and thus Bregman Clusterings include the k-Means problem, as well as a wide range of other clustering problems that can be defined from Bregman Divergences like e.g. clustering with KullbackLeibler divergence as the cost. Interestingly, the heuristic local search algorithm for Bregman Clustering [9] is basically the same approach as Lloyd’s algorithm for k-Means. Clustering with Bregman Divergences is clearly NP-Hard as well since it includes k-Means clustering. We refer the reader to [9] for more about the general problem. For the 1D version of the problem, [17] generalized the algorithm from [22] to the k-Medians problems and Bregman Divergences achieving the same O(kn2 ) time and O(kn) space bounds. 1.1 Our Results In this paper we give theoretically and practically efficient algorithm for 1D clustering problems, in particular k-Means. The k-Means clustering problem in 1D is defined as follows. Given X = {x1 , ..., xn } ⊂ R and k, find centroids M = {µ1 , ..., µk } ⊂ R minimizing the cost X min (x − µ)2 x∈X µ∈M The main results of this paper are new fast algorithms for 1D k-Means. First we give an algorithm that computes the optimal k-Means clustering that runs in O(n lg n + kn) time using optimal O(n) space, or O(kn) time if the input is already sorted. The algorithm also computes the cost of the optimal clustering using k ′ clusters for all k ′ ≤ k. This is relevant for instance for model selection of the right k. This is an 1 improvement by a factor of n in time and k in space compared to the existing solution (which also supports computing the cost for all k ′ ≤ k. The constant factors hidden by the O-notation are small and we expect this algorithm to be very efficient in practice. Second, we show how to compute an optimal k-Means clustering in √ n2O( lg lg n lg k) time using O(n) space. This algorithm is mainly of theoretical interest as we expect constants to be rather large. As opposed to the O(kn) time algorithm, this algorithm does not compute the optimal ′ ′ costs for using √ k clusters for all k ≤ k. O( lg lg n lg k) time algorithm relates to a natural regularized version of k-Means clustering where The n2 instead of specifying the number of clusters beforehand, we instead specify a cost of using an extra cluster and then minimize the cost of the clustering plus the cost of the number of clusters used. Formally, the problem is as follows: Given X = {x1 , ..., xn } ⊂ R and λ, compute the optimal regularized clustering: X min (x − µ)2 + λk arg min k,M={µ1 ,...,µk } x∈X µ∈M We show that this problem is solvable in O(n) time if the input is sorted. In 1D, Lloyd’s algorithm can be implemented to run in O(n lg n + tk lg n) time where t is the number of rounds, and we expect that our algorithm can compute the optimal clustering for reasonable k in essentially the same time as Lloyd’s algorithm can approximate it. The k-Medians problem is to compute a clustering that minimize the sum of absolute distances to the centroid, i.e. compute M = {µ1 , ..., µk } ⊂ R that minimize X min |x − µ| x∈X µ∈M Our algorithms generalize naturally to solve this problem in the same time bounds as for the k-means problem. Let f be a differentiable real-valued strictly convex function. The Bregman Divergence Df induced by f is defined as Df (x, y) = f (x) − f (y) − ∇f (y)(x − y) Notice that the Bregman Divergence induced from f (x) = x2 , gives squared Euclidian Distance (k-Means). Bregman divergences are not metrics since they are not symmetric in general and the triangle inequality is not necessarily satisfied. They do however have many redeeming qualities, for instance Bregman Divergences are convex in the first argument, albeit not the second, see [9, 10] for a more comprenhensive treatment. The Bregman Clustering problem as defined in [9] is to find k centroids M = {µ1 , ..., µk } that minimize X min Df (x, µ) x∈X µ∈M where Df is a Bregman Divergence. For our case, where the inputs x, y ∈ R, we assume that computing a Bregman Divergence, i.e. evaluating f and its derivative, takes constant time. We show that our algorithms naturally generalize to 1D clustering using any Bregman Divergence to define the cluster cost while still maintaing the same running time as for k-Means. Implementation. An independent implementation of the O(n lg n + kn) time algorithm is available in the R package Ckmeans.1d.dp [21]. The implementation is for k-Means clustering, and uses O(kn) space. 1.2 Outline In Section 2 we describe the existing O(kn2 ) time algorithm for 1D k-Means clustering that uses O(kn) space. In Section 3 we show how to compute the same output as the old algorithm using only O(kn) time √ and O(n) space. Then we show how to improve the running time to O(n2O( lg lg n lg k) ). Finally, in Section 4 we show how our new algorithms generalizes to different cluster costs than squared Euclidian distance. 2 2 The O(kn2 ) Dynamic Programming Algorithm In this section, we describe the previous O(kn2 ) time and O(kn) space algorithm presented in [22]. We also introduce the definitions and notation we use in our new algorithm. We will always assume sorted input x1 ≤ ... ≤ xn ∈ R. If the input is not sorted, we start by sorting it in O(n lg n) time. We also remark that there could be many ways of partitioning the point set and computing centroids that achieve the same cost. This is for instance the case if the input is n identical points. The task at hand is to find any optimal solution. P Let CC(i, j) = jℓ=i (xℓ − µi,j )2 be the cost of grouping xi , ..., xj into one cluster with the optimal choice Pj 1 of centroid, µi,j = j−i+1 ℓ=i xℓ , the arithmetic mean of the points. Lemma 1. There is an O(n) space data structure that can compute CC(i, j) in O(1) time for any i ≤ j using O(n) time preprocessing. Proof. This is a standard application of prefix sums and works as follows. By definition, CC(i, j) = j X (xℓ − µi,j )2 = ℓ=i j X x2ℓ + µ2i,j − 2xℓ µi,j = (j − i + 1)µ2i,j + µi,j ℓ=i j X ℓ=i xℓ + j X x2ℓ . ℓ=i With access to prefix sum arrays of x1 , . . . , xn and x21 , . . . , x2n both the centroid µi,j and the cost is easily computed in constant time . 2.1 Algorithm Sketch The algorithm computes the optimal clustering using i clusters for all prefixes of input points x1 , . . . , xm , for m = 1, . . . , n, and for all i = 1, . . . , k using Dynamic Programming as follows. Let D[i][m] be the cost of optimally clustering x1 , ..., xm into i clusters. For i = 1 the cost of optimally clustering x1 , ..., xm into one cluster is the cluster cost CC(1, m). That is, D[1][m] = CC(1, m) for all m. This can be computed in O(n) time by Lemma 1. For i > 1 m D[i][m] = min D[i − 1][j − 1] + CC(j, m) (1) j=1 Notice that D[i − 1][j − 1] is the cost of optimally clustering x1 , ..., xj−1 into i − 1 clusters and CC(j, m) is the cost of clustering xj , ..., xm into one cluster. This makes xj the first point in the last and rightmost cluster. Let T [i][m] be the argument that minimizes (1) m T [i][m] := arg min D[i − 1][j − 1] + CC(j, m) j=1 (2) It is possible there exists multiple j obtaining same minimal value for (1). To make the optimal clustering C˜(m) unique, such ties are broken in favour of smaller j. Notice xT [i][m] is the first point in the rightmost cluster of the optimal clustering. Thus, given T one can find the optimal solution by standard backtracking: X̃k = {xT [k][n] , ..., xn }, X̃k−1 = {xT [k−1][T [k][n]−1] , ..., xT [k][n]−1 } .. . Here X̃i is the i’th cluster in the optimal clustering. One can naively compute each entry of D and T using (1) and (2). This takes O(n) time for each cell, thus D and T can be computed in O(kn2 ) time using O(kn) space. This is exactly what is described in [22]. 3 3 New Algorithms The idea of the first new algorithm is simply to compute the tables D and T faster, by reducing the time to compute each row of D and T to O(n) time instead of O(n2 ) time. This improvement exploits a monotonicity property of the values stored in a row of T . This is explained in Section 3.1, resulting in an O(kn) time and O(kn) space solution, assuming sorted inputs. Section 3.2 then shows how to reduce the space usage to just O(n) while retaining O(kn) running time. In Section 3.3 we show that the same property allows us to solve √ O( lg lg n lg k) 1D k-Means for k = Ω(lg n) in, n2 time and linear space, and solve the regularized version of 1D k-Means in O(n) time. 3.1 Faster Algorithm From Monotone Matrices In this section we reduce the problem of computing a row of D and T to searching an implicitly defined n × n matrix of a special form, which allows us to compute each row of D and T in linear time. Define Ci [m][j] as the cost of the optimal clustering of x1 , . . . , xm using i clusters, restricted to having the rightmost cluster (largest cluster center) contain the elements xj , . . . , xm . For convenience, we define Ci [m][j] for j > m as the cost of clustering x1 , . . . , xm into i − 1 clusters, i.e. the last cluster is empty. This means that Ci satisfies: Ci [m][j] = D[i − 1][min{j − 1, m}] + CC(j, m) where by definition CC(j, m) = 0 when j > m (which is consistent with the definition in Section 2). We have that D[i][m] relates to Ci as follows: D[i][m] = min Ci [m][j] j where ties are broken in favor of smaller j (as defined in Section 2.1). This means that when we compute a row of D and T , we are actually computing minj Ci [m][j] for all m = 1, . . . , n. We think of Ci as an n × n matrix with rows indexed by m and columns indexed by j. With this interpretation, computing the i’th row of D and T corresponds to computing for each row r in Ci , the column index c that corresponds to the smallest value in row r. In particular, the entries D[i][m] and T [i][m] correpond to the value and the index of the minimum entry in the m’th row of Ci respectively. The problem of finding the minimum value in every row of a matrix has been studied before [1]. First we need the definition of a monotone matrix. Definition 1. [1] Let A be a matrix with real entries and let arg min(i) be the index of the leftmost column containing the minimum value in row i of A. A is said to be monotone if a < b implies that arg min(a) ≤ arg min(b). A is totally monotone if all of its submatrices are monotone.1 In [1], the authors showed the following: Theorem 1. [1] Finding arg min(i) for each row i of an arbitrary n× m monotone matrix requires Θ(m lg n) time, whereas if the matrix is totally monotone, the time is O(m) when m > n and is O(m(1 + lg(n/m))) when m < n. The fast algorithm for totally monotone matrices is known as the SMAWK algorithm and we will refer to it by that (cool) name. Let’s relate this to the 1D k-Means clustering problem. That Ci is monotone means that if we consider the optimal clustering of the points x1 , . . . , xa with i clusters, then if we start adding more points xa+1 ≤ · · · ≤ xb after xa , then the first (smallest) point in the last of the i clusters can only increase (move right) in the new optimal clustering of x1 , . . . , xb . This sounds like it should be true for 1D k-Means and it turns out it is. Thus, applying the algorithm for monotone matrices, we can fill a row of D and T in O(n lg n) time leading to an O(kn lg n) time algorithm for 1D k-Means, which is already a great improvement. 1 In [1] the authors use the maximum instead of the minimum 4 However, as we show below, the matrix Ci induced by the 1D k-Means problem is in fact totally monotone: Lemma 2. The matrix Ci is totally monotone. Proof. As [1] remarks, a matrix A is totally monotone if all its 2 × 2 submatrices are monotone. To prove that Ci is totally monotone, we thus need to prove that for any two row indices a, b with a < b and two column indices u, v with u < v, it holds that if Ci [a][v] < Ci [a][u] then Ci [b][v] < Ci [b][u]. Notice that these values correspond to the costs of clustering elements x1 , . . . , xa and x1 , . . . , xb , starting the rightmost cluster with element xv and xu respectively. Since Ci [m][j] = D[i−1][min{j−1, m}]+CC(j, m), this is the same as proving that D[i − 1][min{v − 1, m}] + CC(v, a) < D[i − 1][min{u − 1, m}] + CC(u, a) ⇒ D[i − 1][min{v − 1, m}] + CC(v, b) < D[i − 1][min{u − 1, m}] + CC(u, b) which is true if we can prove that CC(v, b) − CC(v, a) ≤ CC(u, b) − CC(u, a). Rearranging terms, what we need to prove is that for any a < b and u < v, it holds that: CC(v, b) + CC(u, a) ≤ CC(u, b) + CC(v, a). (3) This is the property known as the concave (concave for short) property [24, 12, 23] and has been used to significantly speed up algorithms, including Dynamic Programming algorithms, for for other problems. We start by handling the special case where v > a. In this case, we have by definition that CC(v, a) = 0, thus we need to show that CC(v, b) + CC(u, a) ≤ CC(u, b). This is the case since any point amongst xu , . . . , xb is included in at most one of xv , . . . , xb and xu , . . . , xa (since a < v). Thus CC(v, b) + CC(u, a) is the cost of taking two disjoint and consecutive subsets of the points xu , . . . , xb and clustering the two sets using the optimal choice of centroid in each. Clearly this cost is less than clustering all the points using one centroid. We now turn to the general case where u < v ≤ a < b. Let µv,a be the mean of xv , . . . , xa and µu,b be the mean P of xu , . . . , xb and assume that µv,a ≤ µu,b (the other case is symmetric). Finally, let CC(w, z)µ = zℓ=w (xℓ − µ)2 denote the cost of grouping the elements xw , . . . , xz in a cluster with centroid µ. Split the cost CC(u, b) into the cost of the elements xu , . . . , xv−1 and the cost of the elements xv , . . . , xb as CC(u, b) = b X (xℓ − µu,b )2 = ℓ=u v−1 X (xℓ − µu,b )2 + ℓ=u b X (xℓ − µu,b )2 = CC(u, v − 1)µu,b + CC(v, b)µu,b . ℓ=v We trivially get CC(v, b)µu,b ≥ CC(v, b) since CC(v, b) is the cost using the optimal centroid. Secondly, CC(u, v − 1)µu,b + CC(v, a) ≥ CC(u, v − 1)µv,a + CC(v, a) = CC(u, a)µv,a ≥ CC(u, a) since µv,a ≤ µu,b and all elements xu , . . . , xv−1 are less than or equal to µv,a (since µv,a is the mean of points xv , . . . , xa that all are greater than xu , . . . , xv−1 ). Combining the results, we see that: CC(v, b) + CC(u, a) ≤ CC(v, b)µu,b + CC(u, v − 1)µu,b + CC(v, a) = CC(u, b) + CC(v, a). This completes the proof. Theorem 2. Computing an optimal k-Means clustering of a sorted input of size n for takes O(kn) time. By construction the cost of the optimal clustering is computed for all k ′ ≤ k. If we store the T table the cluster centers for any k ′ ≤ k can be extracted in O(k ′ ) time. 5 3.2 Reducing Space Usage In the following, we show how to reduce the space usage to just O(n) while maintaining O(kn) running time using a space reduction technique of Hirschberg [11]. First observe that each row of T and D only refers to the previous row. Thus one can clearly “forget”row i − 1 when we are done computing row i. The problem is that if we don’t store all of T , we cannot backtrack and find the optimal solution. In the following, we present an algorithm that avoids the table T entirely. Our key observation is the following: Assume k > 1 and that for every prefix x1 , . . . , xm , we have computed the optimal cost of clustering x1 , . . . , xm into ⌊k/2⌋ clusters. Note that this is precisely the set of values stored in the ⌊k/2⌋’th row of D. Assume furthermore that we have computed the optimal cost of clustering every suffix xm , . . . , xn into k − ⌊k/2⌋ clusters. Let us denote these costs by D̃[k − ⌊k/2⌋][m] for m = 1, . . . , n. Then clearly the optimal cost of clustering x1 , . . . , xn into k clusters is given by: n D[k][n] = min D[⌊k/2⌋][j] + D̃[k − ⌊k/2⌋][j + 1]. j=1 (4) Our main idea is to first compute row ⌊k/2⌋ of D and row k − ⌊k/2⌋ of D̃ using linear space. From these two, we can compute the argument j minimizing (4). We can then split the reporting of the optimal clustering into two recursive calls, one reporting the optimal clustering of points x1 , . . . , xj into ⌊k/2⌋ clusters, and one call reporting the optimal clustering of xj+1 , . . . , xn into k − ⌊k/2⌋ clusters. When the recursion bottoms out with k = 1, we can clearly report the optimal clustering using linear space and time as this is just the full set of points. From Section 3.1 we already know how to compute row ⌊k/2⌋ of D using linear space: Simply call SMAWK to compute row i of D for i = 1, . . . , ⌊k/2⌋, where we throw away row i − 1 of D (and don’t even store T ) when we are done computing row i. Now observe that table D̃ can be computed by taking our points x1 , . . . , xn and reversing their order by negating the values. This way we obtain a new ordered sequence of points X̃ = x̃1 ≤ x̃2 ≤ · · · ≤ x̃n where x̃i = −xn−i+1 . Running SMAWK repeatedly for i = 1, . . . , k − ⌊k/2⌋ on the point set X̃ produces a table D̂ such that D̂[i][m] is the optimal cost of clustering x̃1 , . . . , x̃m = −xn , . . . , −xn−m+1 into i clusters. Since this cost is the same as clustering xn−m+1 , . . . , xn into i clusters, we get that the (k − ⌊k/2⌋)’th row of D̂ is identical to the i’th row of D̃ if we reverse the order of the entries. To summarize our algorithm for reporting the optimal clustering, do as follows: Let L be an initially empty output list of clusters. If k = 1, append to L a cluster containing all points. Otherwise (k > 1), use SMAWK on x1 , . . . , xn and −xn , . . . , −x1 to compute row ⌊k/2⌋ of D and row k − ⌊k/2⌋ of D̃ using linear space (by evicting row i − 1 from memory when we have finished computing row i) and O(kn) time. Compute the argument j minimizing (4) in O(n) time. Evict row ⌊k/2⌋ of D and row k − ⌊k/2⌋ of D̃ from memory. Recursively report the optimal clustering of points x1 , . . . , xj into ⌊k/2⌋ clusters (which appends the output to L). When this terminates, recursively report the optimal clustering of points xj+1 , . . . , xn into k − ⌊k/2⌋ clusters. When the algorithm terminates, L contains the optimal clustering of x1 , . . . , xn into k clusters. At any given time, our algorithm uses only O(n) space. To see this, first note that we evict all memory used to compute the value j minimizing (4) before recursing. Furthermore, we complete the first recursive call (and evict all memory used) before starting the second. Finally, for the recursion, we don’t need to make a copy of points x1 , . . . , xj . It suffices to remember that we are only working on the subset of inputs x1 , . . . , xj . Now let F (n, k) denote the time used by the above algorithm to compute the optimal clustering of n sorted points into k clusters. Then there is some constant C > 0 such that F (n, k) satisfies the recurrence: F (n, 1) ≤ Cn, and for k > 1: n F (n, k) ≤ max F (j, ⌊k/2⌋) + F (n − j, k − ⌊k/2⌋) + Cnk. j=1 6 We claim that F (n, k) satisfies F (n, k) ≤ 3Ckn. We prove the claim by induction in k. The base case k = 1 follows trivially by inspection of the formula for F (n, 1). For the inductive step k > 1, we use the induction hypothesis to conclude: F (n, k) ≤ n max 3Cj⌊k/2⌋ + 3C(n − j)(k − ⌊k/2⌋) + Cnk j=1 n ≤ max 3Cj⌈k/2⌉ + 3C(n − j)⌈k/2⌉ + Cnk = 3Cn⌈k/2⌉ + Ckn. j=1 For k > 1, we have that ⌈k/2⌉ ≤ (2/3)k, therefore: F (n, k) ≤ 3Cn(2/3)k + Ckn = 3Ckn. Which is what we needed to prove. Theorem 3. Computing an optimal k-Means clustering of a sorted input of size n takes O(kn) time and uses O(n) space. Note to compute the cost of the optimal clustering for all k ′ ≤ k we ensure that we never delete the last column of the cost matrix D which requires an additional O(k) = O(n) space. 3.3 Even Faster Algorithm In this section we show that the concave property we proved for the cluster costs yields and algorithm for √ computing the optimal k-Means clustering for one given k = Ω(lg n) in n2O( lg lg n lg k) time. The result follows almost directly from [19]. In [19] Schieber gives an algorithm with the aforementioned running time for the problem of finding the shortest path of fixed length k in a directed acyclic graph with nodes 1, . . . , n where the weights, w(i, j), satisfy the concave property and are represented as a function that returns the weight of a given edge in constant time. Theorem 4 ([19]). Computing a minimum weight path of length k between any two nodes in a directed √ acyclic graph of size n where the weights satisfy the concave property takes n2O( lg lg n lg k) time using O(n) space. We reduce the 1D k-Means problem to a directed graph problem as follows. Sort the input in O(n lg n) time and let x1 ≤ x2 ≤ . . . xn denote the sorted input sequence. For each input xi we associate a node vi and add an extra node vn+1 . Now define the weight of the edge from vi to vj as the cost of clustering xi , . . . , xj−1 in one cluster, which is CC(i, j − 1). Each edge weight is computed in constant time and by the proof of Lemma 2, particularly Equation 3, the edge weights satisfy the monge concave property. Finally, to compute the optimal clustering we use Schiebers algorithm to compute the lowest weight path with k edges from v1 to vn+1 . Theorem 5. Computing an optimal k-Means clustering of an input of size n for given k = Ω(lg n) takes √ O( lg lg n lg k) time using O(n) space. n2 It is relevant to briefly consider parts of Schiebers algorithm and how it relates to k-Means clustering, in particular a regularized version of the problem. Schiebers algorithm relies crucially on algorithms that given a directed acyclic graph where the weights satisfy the concave property computes a minimum weight path in O(n) time [23, 14]. Note the only difference in this problem compared to above, is that the search is not restricted to paths of k edges only. 7 3.3.1 Regularized Clustering Consider a regularized version of the k-Means clustering problem where we instad of providing the number of clusters k specify the cost of a cluster and ask to minimize the cost of the clustering plus the penalty λ for each cluster used. For simplicity, assume all the input points are distinct. If we set λ = 0 the optimal clustering has cost zero and use a cluster for each input point. If we let λ increase towards infinity, the optimal number of clusters used in the optimal solution monotonically decrease towards one (zero clusters is not well defined). Let dmin be the smallest distance between points in the input. The optimal cost of using n − 1 clusters is then d2min /2. When λ > λn = d2min /2 it is less costly to use only n − 1 clusters since the added clustering of using one less cluster is smaller than the cost of a cluster. Letting λ increase again will inevitably lead to a miminum value λn−1 < λn such that for λ > λn−1 only n − 2 clusters is used in the optimal solution. Following the same pattern λn−1 is the difference between the optimal cost using n − 2 clusters and n − 1 clusters. Continuing this yields the very interesting event sequence 0 < λn < · · · < λ1 that encodes the only relevant choices for the regularization parameter. Note that the O(nk) algorithm actually yields λ1 , . . . , λk since it computes the optimal cost for all k ′ ≤ k. In the reduction to the directed graph problem, adding a cost of λ for each cluster used corresponds to adding λ to the weight of each edge. Note that the edge weights clearly still satisfy the concave property. Thus, solving the regularized version of k-Means clustering correpoonds to finding the shortest path (of any length) in a directed acyclic graph where the weights satisfy the concave property. By the algorithms in [23, 14] this takes O(n) time. Theorem 6. Computing an optimal regularized 1D k-Means clustering of a sorted input of size n takes O(n) time. Now notice if we actually use λk−1 as the cost per cluster, or any λ ∈ [λk−1 , λk [ there is an optimal solution using k clusters which is an optimal k-Means clustering. This means that if the inputs are integers, we can solve the 1D k-Means problem by a simple application of binary search in O(n lg U ) time where U is the universe size [2]. 4 Extending to More Distance Measures In the following we show how to generalize our algorithm to Bregman Divergences and sum of absolute distances while retaining the same running time and space usage. 4.1 Bregman Divergence and Bregman Clustering In this section we show how our algorithm generalizes to any Bregman Divergence. First, let us remind ourselves what a Bregman Divergence and a Bregman Clustering is. Let f be a differentiable real-valued strictly convex function. The Bregman Divergence Df defined by f is defined as Df (x, y) = f (x) − f (y) − ∇f (y)(x − y) Bregman Clustering. The Bregman Clustering problem as defined in [9], is to find a clustering, M = {µ1 , ..., µk }, that minimize X min Df (x, µ) x∈X µ∈M Notice that the cluster center is the second argument of the Bregman Divergence. This is important since Bregman Divergences are not in general symmetric. For the purpose of 1D clustering, we mention two important properties of Bregman Divergences. For any Bregman Divergence, the unique element that minimizes the summed distance to a multiset of elements is 8 the mean of the elements, exactly as it was for squared Euclidian distance. This is in one sense the defining property of Bregman Divergences [9]. The second important is the linear separator property, which is very important for clustering with Bregman Divergences but also very relevavant to Bregman Voronoi Diagrams [9, 10]. Linear Separators For Bregman Divergences. For all Bregman divergences, the locus of points that are equidistant to two fixed points µ1 , µ2 in terms of a Bregman divergence is given by {x ∈ X | Df (x, p) = Df (x, q)} = {x ∈ X | x(∇f (µ1 ) − ∇f (µ2 )) = f (µ1 ) − µ1 ∇f (µ1 ) − f (µ2 ) + µ2 ∇f (µ2 )} which corresponds to a hyperplane. Also, the points µ1 , µ2 sits on either side of the hyperplane and the Voronoi cells defined using Bregman divergences are connected. This means, in particular, that between any two points in 1D, µ1 < µ2 , there is a hyperplane (point) h with µ1 < h < µ2 and all points smaller than h are closer to µ1 and all points larger than h are closer to µ2 . We capture what we need from this observation in a simple “distance” lemma: Lemma 3. Given two fixed real numbers µ1 < µ2 , then for any point xr ≥ µ2 , we have Df (xr , µ1 ) > Df (xr , µ2 ), and for any point xl ≤ µ1 we have Df (xl , µ1 ) < Df (xl , µ2 ) Computing Cluster Costs for Bregman Divergences. Since the mean minizes Bregman Divergences, the centroids used in optimal clusterings are unchanged compared to the k-Means case. The prefix sums idea used to implement the data structure used for Lemma 1 generalizes to Bregman Divergences as observed in [17] (under the name Summed Area Tables). The formula for computing the cost of grouping the points Pj 1 xi , . . . , xj in one cluster is as follows. Let µi,j = j−i+1 ℓ=i xℓ be the arithmetic mean of the points xi , . . . , xj , then CC(i, j) = j X Df (xℓ , µi,j ) = = ℓ=i f (xℓ ) − f (µi,j ) − ∇f (µi,j )(xℓ − µi,j ) ℓ=i ℓ=i j X j X ! f (xℓ ) − (j − i + 1)f (µi,j ) − ∇f (µi,j ) j X ℓ=i xℓ ! − (j − i + 1)µi,j ! It follows that the Bregman Divergence cost of a consecutive subset of input points and the centroid can be computed in in constant time with stored prefix sums for x1 , . . . , xn and f (x1 ), . . . , f (xn ). Monge Concave - Totally Monotone Matrix. The only properties we used in Section 3.1 to prove the monge concave property and that the matrix Ci is totally monotone, is that the mean is the minimizer of the sum of distances to a multiset of points, and that CC(u, v − 1)µu,b + CC(v, a) ≥ CC(u, v − 1)µv,a + CC(v, a) = CC(u, a)µv,a when µv,a ≤ µu,b and all elements in xu , . . . , xv−1 ≤ µv,a . This is clearly still true by Lemma 3. It follows that the algorithms we specified for 1D k-Means generalize to any Bregman Divergence. 4.2 k-Medians - Clustering with sum of absolute values For the k-Medians problem we replace the the sum of squared Euclidian distances with the sum of absolute distances. Formally, the k-Medians problem is to compute a clustering, M = {µ1 , ..., µk }, minimizing X min |x − µ| x∈X µ∈M Note that in 1D, all Lp norms are the same and reduce to this case. Also note that the minimizing centroid for a cluster is no longer the mean of the points in that cluster, but the median. To solve this problem, we 9 change the centroid to be the median, and if there an even number of points, we fix the median to be the exact middle point between the two middle elements, making the choice of centroid unique. As for Bregman Divergences, we need to show that we can compute the cost CC(i, j) with this new cost in constant time. Also, we need to compute the centroid in constant time and argue that the cost is monge moncave which implies the implicit matrix Ci is totally monotone. The arguments are essentially the same, but for completeness we briefly cover them below. Computing Cluster Costs for Absolute Distances. Not surprisingly, using prefix sums still allow x⌊mi,j ⌋ +x⌈mi,j ⌉ constant time computation of CC(i, j). Let mi,j = j+i 2 , and compute the centroid as µi,j = 2 CC(i, j) = j X ℓ=i |xℓ − µi,j | = ⌊mi,j ⌋ X ℓ=i µi,j − xℓ + j X xℓ − µi,j ℓ=1+⌊mi,j ⌋ which can be computed in constant time with access to a prefix sum table of x1 , . . . , xn . This was also observed in [17]. Monge Concave - Totally Monotone Matrix. The monge concave and totally monotone matrix argument above for Bregman Divergences (and for squared Euclidian distance) remain valid since first of all, we still have xu , . . . , xv−1 ≤ µv,a as µv,a is the median of points all greater than xu , . . . , xv−1 . Furthermore, it still holds that when µv,a ≤ µu,b and all elements xu , . . . , xv−1 are less than or equal to µv,a , then: CC(u, v − 1)µu,b + CC(v, a) ≥ CC(u, v − 1)µv,a + CC(v, a) = CC(u, a)µv,a It follows that the algorithms we specified for 1D k-Means generalize to the 1D k-Median problem. Acknowledgements We wish to thank Pawel Gawrychowski for pointing out important earlier work on concave property. References [1] A. Aggarwal, M. M. Klawe, S. Moran, P. Shor, and R. Wilber. Geometric applications of a matrixsearching algorithm. Algorithmica, 2(1):195–208, 1987. [2] A. Aggarwal, B. Schieber, and T. Tokuyama. Finding a minimum-weightk-link path in graphs with the concave monge property and applications. Discrete & Computational Geometry, 12(3):263–280, 1994. [3] S. Ahmadian, A. Norouzi-Fard, O. Svensson, and J. Ward. Better guarantees for k-means and euclidean k-median by primal-dual algorithms. CoRR, abs/1612.07925, 2016. [4] D. Aloise, A. Deshpande, P. Hansen, and P. Popat. Np-hardness of euclidean sum-of-squares clustering. Machine Learning, 75(2):245–248, 2009. [5] V. Arnaboldi, M. Conti, A. Passarella, and F. Pezzoni. Analysis of ego network structure in online social networks. In Privacy, security, risk and trust (PASSAT), 2012 international conference on and 2012 international confernece on social computing (SocialCom), pages 31–40. IEEE, 2012. [6] D. Arthur and S. Vassilvitskii. How slow is the k-means method? In Proceedings of the Twenty-second Annual Symposium on Computational Geometry, SCG ’06, pages 144–153, New York, NY, USA, 2006. ACM. 10 [7] D. Arthur and S. Vassilvitskii. k-means++: The advantages of careful seeding. In Proceedings of the eighteenth annual ACM-SIAM symposium on Discrete algorithms, pages 1027–1035. Society for Industrial and Applied Mathematics, 2007. [8] P. Awasthi, M. Charikar, R. Krishnaswamy, and A. K. Sinop. The hardness of approximation of euclidean k-means. In L. Arge and J. Pach, editors, 31st International Symposium on Computational Geometry, SoCG 2015, June 22-25, 2015, Eindhoven, The Netherlands, volume 34 of LIPIcs, pages 754–767. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2015. [9] A. Banerjee, S. Merugu, I. S. Dhillon, and J. Ghosh. Clustering with bregman divergences. J. Mach. Learn. Res., 6:1705–1749, Dec. 2005. [10] J.-D. Boissonnat, F. Nielsen, and R. Nock. Bregman voronoi diagrams. Discrete & Computational Geometry, 44(2):281–307, 2010. [11] D. S. Hirschberg. A linear space algorithm for computing maximal common subsequences. Commun. ACM, 18(6):341–343, June 1975. [12] D. S. Hirschberg and L. L. Larmore. The least weight subsequence problem. SIAM Journal on Computing, 16(4):628–638, 1987. [13] O. Jeske, M. Jogler, J. Petersen, J. Sikorski, and C. Jogler. From genome mining to phenotypic microarrays: Planctomycetes as source for novel bioactive molecules. Antonie Van Leeuwenhoek, 104(4):551–567, 2013. [14] M. M. Klawe. A simple linear time algorithm for concave one-dimensional dynamic programming. Technical report, Vancouver, BC, Canada, Canada, 1989. [15] E. Lee, M. Schmidt, and J. Wright. Improved and simplified inapproximability for k-means. Information Processing Letters, 120:40–43, 2017. [16] M. Mahajan, P. Nimbhorkar, and K. Varadarajan. The Planar k-Means Problem is NP-Hard, pages 274–285. Springer Berlin Heidelberg, Berlin, Heidelberg, 2009. [17] F. Nielsen and R. Nock. Optimal interval clustering: Application to bregman clustering and statistical mixture learning. IEEE Signal Process. Lett., 21:1289–1292, 2014. [18] D. Pennacchioli, M. Coscia, S. Rinzivillo, F. Giannotti, and D. Pedreschi. The retail market as a complex system. EPJ Data Science, 3(1):1, 2014. [19] B. Schieber. Computing a minimum weightk-link path in graphs with the concave monge property. Journal of Algorithms, 29(2):204 – 222, 1998. [20] A. Vattani. k-means requires exponentially many iterations even in the plane. Discrete & Computational Geometry, 45(4):596–616, 2011. [21] H. Wang and J. Song. Ckmeans.1d.dp: Optimal and fast univariate clustering; R package version 4.0.0., 2017. [22] H. Wang and M. Song. Ckmeans. 1d. dp: optimal k-means clustering in one dimension by dynamic programming. The R Journal, 3(2):29–33, 2011. [23] R. Wilber. The concave least-weight subsequence problem revisited. Journal of Algorithms, 9(3):418 – 425, 1988. [24] F. F. Yao. Efficient dynamic programming using quadrangle inequalities. In Proceedings of the Twelfth Annual ACM Symposium on Theory of Computing, STOC ’80, pages 429–435, New York, NY, USA, 1980. ACM. 11
8cs.DS
c Copyright notice. 1 Maximum Persistency via Iterative Relaxed Inference in Graphical Models arXiv:1508.07902v3 [cs.CV] 3 Feb 2017 Alexander Shekhovtsov, Paul Swoboda, and Bogdan Savchynskyy Abstract—We consider the NP-hard problem of MAP-inference for undirected discrete graphical models. We propose a polynomial time and practically efficient algorithm for finding a part of its optimal solution. Specifically, our algorithm marks some labels of the considered graphical model either as (i) optimal, meaning that they belong to all optimal solutions of the inference problem; (ii) non-optimal if they provably do not belong to any solution. With access to an exact solver of a linear programming relaxation to the MAP-inference problem, our algorithm marks the maximal possible (in a specified sense) number of labels. We also present a version of the algorithm, which has access to a suboptimal dual solver only and still can ensure the (non-)optimality for the marked labels, although the overall number of the marked labels may decrease. We propose an efficient implementation, which runs in time comparable to a single run of a suboptimal dual solver. Our method is well-scalable and shows state-of-the-art results on computational benchmarks from machine learning and computer vision. Index Terms—Persistency, partial optimality, LP relaxation, discrete optimization, WCSP, graphical models, energy minimization F 1 I NTRODUCTION W E consider the energy minimization or maximum a posteriori (MAP) inference problem for discrete graphical models. In the most common pairwise case it has the form X X fuv (xu , xv ) , (1) fv (xv ) + min Ef (x) := f∅ + x∈X v∈V uv∈E where minimization is performed over vectors x, containing the discrete-valued components xv . Further notation is to be detailed in § 2. The problem has numerous applications in computer vision, machine learning, communication theory, signal processing, information retrieval and statistical physics, see [18, 47, 29] for an overview of applications. Even in the binary case, when each coordinate of x can be assigned two values only, the problem is known to be NP-hard and is also hard to approximate [27]. Hardness of the problem justifies a number of existing approximate methods addressing it [18]. Among them, solvers addressing its linear programming (LP) relaxations and in particular, the LP dual [41, 49, 20], count among the most versatile and efficient ones. However, apart from some notable exceptions (see the overview of related work below), approximate methods can not guarantee neither optimality of their solutions as a whole, nor even optimality of any individual solution coordinates. That is, if x is a solution returned by an approximate method and x∗ is an optimal one, there is no guarantee that x∗v = xv for any coordinate v . In contrast, our method provides such guarantees for some coordinates. More precisely, for each component xv it eliminates • • • Alexander Shekhovtsov is with the Institute for Computer Graphics and Vision (ICG), Graz University of Technology, Inffeldgasse 16, Graz 8010, Austria. E-mail: [email protected]. Paul Swoboda is with the Discrete Optimization Group, Institute of Science and Technology Austria, Am Campus 1, 3400 Klosterneuburg, Austria. E-mail: [email protected]. Bogdan Savchynskyy is with Computer Vision Lab, Faculty of Computer Science, Institute for Artificial Intelligence, Dresden University of Technology, 01062 Dresden, Germany. E-mail: [email protected]. those of its values (henceforth called labels), which provably can not belong to any optimal solution. We call these eliminated labels persistent non-optimal. Should a single label a remain non-eliminated, it implies that for all optimal solutions x∗ it holds x∗v = a and the label a is called persistent optimal. Our elimination method is polynomial and is applicable with any (approximate) solver for a dual of a linear programming relaxation of the problem, employed as a subroutine. 1.1 Related Work A trivial but essential observation is that any method identifying persistency has to be based on tractable sufficient conditions in order to avoid solving the NP-hard problem (1). Dead-end elimination methods (DEE) [10] verify local sufficient conditions by inspecting a given node and its immediate neighbors at a time. When a label in the node can be substituted with another one such that the energy for all configurations of the neighbors does not increase, this label can be eliminated without loss of optimality. A similar principle for eliminating interchangeable labels was proposed in constraint programming [11]. It’s generalization to a related problem of Weighted Constraint Satisfaction (WCS) is known as dominance rules or soft neighborhood substitutability. However, because the WCS in general considers a bounded “+” operation, the condition appears to be intractable and therefore weaker sufficient local conditions were introduced, e.g., [26, 9]. The way [9] selects a local substitute label using equivalence preserving transforms is related to our method, in which we use an approximate solution based on the dual of the LP relaxation as a tentative substitute (or test) labeling. Although the local character of the DEE methods allows for an efficient implementation, it also significantly limits their quality, i.e., the number of found persistencies. As shown in [35, 43, 48], considering more global criteria may significantly increase the algorithm’s quality. The roof dual relaxation in quadratic pseudo-Boolean Optimization (QPBO) [5, 30] (equivalent to pairwise energy minimiza- 2 LP - based Truncated Model wuv min(2, |xu − xv |) Potts Model λ min(1, |xu − xv |) Graph cut - based Courtesy of Kovtun [24] 93.6% (instance not available) Instance used by Alahari et al. [4] Kovtun’s method: 1s, 87.6% Shekhovtsov [35] LP-windowing: 1.5h, 94% Ours: 22s, 96.7% Kovtun’s method: 1s, 0.2% Kohli et al. [19] (MQPBO) 41s, 0.2% Swoboda et al. [44] 27min, 89.8% Ours: 16s, 99.94% Fig. 1: Progress of partial optimality methods. The top row corresponds to a stereo model with Potts interactions and large aggregating windows for unary costs used in [24, 4] (instance published by [4]). The bottom row is a more refined stereo model with truncated linear terms [45] (instance from [1]). The hashed red area indicates that the optimal persistent label in the pixel is not found (but some non-optimal labels might have been eliminated). Solution completeness is given by the percentage of persistent labels. Graph cut based methods are fast but only efficient for strong unary terms. LP-based methods are able to determine larger persistent assignments but are extremely slow prior to this work. tion with binary variables) has the property that all variables that are integer in the relaxed solution are persistent. Several generalizations of roof duality to higher-order energies were proposed (e.g., [2, 21]). The MQPBO method [19] and the generalized roof duality [50] extend roof duality to the multi-label case by reducing the problem to binary variables and generalizing the concept of submodular relaxation [21], respectively. Although for binary pairwise energies these methods provide a very good trade-off between computational efficiency and a number of found persistencies, their efficacy drops as the number of label grows. Auxiliary submodular problems were proposed in [24, 25] as a sufficient persistency condition for multilabel energy minimization. In the case of Potts model, the method has a very efficient specialized algorithm [14]. Although these methods have shown very good efficacy for certain problem classes appearing in computer vision, the number of persistencies they find drastically decreases when the energy does not have strong unary terms (see Fig. 1). In contrast to the above methods that technically rely either on local conditions or on computing a maximum flow (min-cut), the works [42, 43, 44] and [35] proposed persistency approaches relying on a general linear programming relaxation. Authors of [42, 43, 44] demonstrated applicability of their approach to large-scale problems by utilizing existing efficient approximate MAP-inference algorithms, while in [35] the large-scale problems are addressed using a windowing technique. Despite the superior persistency results, the running time of the approximate-LP-based methods remained prohibitively slow for practical applications as illustrated by an example in Fig. 1. Not only LP-based methods can achieve superior results in practice, but they are even theoretically guaranteed to do so, as proven for the method [35, 37]. In this method, the problem of determining the maximum number of persistencies is formulated as a polynomially solvable linear program. It is guaranteed to find a provably larger persistency assignment than most of the above mentioned approaches. However, solving this linear program for large scale instances is numerically unstable/intractable and applying it to multiple local windows is prohibitively slow. This poses a challenge of designing an LP-based method that would be indeed practical. 1.2 Contribution In this work we propose a method which solves the same maximum persistency problem as in [35] and therefore delivers provably better results than other methods. Similar to [44], our method requires to iteratively (approximately) solve the linear programming relaxation of (1) as a subroutine. However, our method is significantly faster than [35, 44] due to a substantial theoretical and algorithmic elaboration of this subroutine. We demonstrate the efficiency of our approach on benchmark problems from machine learning and computer vision. We outperform all competing methods in terms of the number of persistent labels and method [35] in speed and scalability. On randomly generated small problems, we show that the set of persistent labels found using approximate LP solver is close to the maximal one as established by the (costly and not scalable) method [35]. The present paper is a revised version of [39]. Besides reworked explanations, shortened and clarified proofs, one new technical extension is a more general dual algorithm, with termination guarantees for a larger class of approximate solvers. 2 W ORK OVERVIEW This section serves as an overview of our method, where we give the most general definitions, formulate the maximum persistency problem and briefly describe a generic method to solve it. This description, equipped with references to subsequent sections, should serve as a road map for the rest of the paper. 3 autarky property [5]. When applied to the whole search space X we obtain its image p(X ) – a potentially smaller search space containing all optimal labelings. In what follows we will restrict ourselves to node-wise substitutions, i.e., those defined locally for each node: p(x)u = pu (xu ), where pu : Xu → Xu . Indeed, already this class of substitutions covers most existing persistency methods. xu 1 2 N (u) v0 3 u Fig. 2: Dead end elimination / dominance. Variables are shown as boxes and their possible labels as circles. Label xu = 1 is substituted with label xu = 3. If for any configuration of neighbors xN (u) the energy does not increase (only the terms inside {u}∪N (u) contribute to the difference), label xu = 1 can be eliminated without loss of optimality. p u : X u ! Xu pv A general substitution we consider is applied to labels in all nodes simultaneously, as illustrated in Fig. 3 for two variables. We obtain the following principle for identifying persistencies. 1 2 Proposition 2.2. If p is a strictly improving substitution, then any optimal solution x∗ of (1) must satisfy (∀v ∈ V) pv (x∗v ) = x∗v . 3 Fig. 3: Simultaneous substitution of labels in two variables. Xu = Xv = {1, 2, 3}, labels at arrow tails are substituted with labels at arrow heads. So the joint configuration (1, 2) (dashed) is substituted with the configuration (3, 3) (solid). 2.1 Notation In the MAP-Inference Problem (1) we assume (V, E) to be a directed graph with the set of nodes V and the set of edges E ⊆ V × V . Let uv denote an ordered pair (u, v) and N (u) = {v | uv ∈ E ∨ vu ∈ E} stands for the set of neighbors of u. Each node v ∈ V is associated with a variable xv taking its values in a finite set of labels Xv . Cost functions or potentials fv : Xv → R, fuv : Xu × Xv → R are associated with nodes and edges respectively. Let f∅ ∈ R be a constant term, which we introduce for the Q sake of notation. Finally, X stands for the Cartesian product v∈V Xv and its elements x ∈ X are called labelings. We represent all potentials of energy (1) by a single cost vector f ∈ RI , where the set I enumerates all components of all terms: I = {∅} ∪ {(u, i) | u ∈ V, i ∈ Xu } ∪ {(uv, ij) | uv ∈ E, i ∈ Xu , j ∈ Xv }. 2.2 Improving Substitutions We formulate our persistency method in the framework of (strictly) improving substitutions, called improving mappings in our previous works [35, 37]. It was shown in [35] that most existing persistency techniques can be expressed as improving substitutions. A mapping p : X → X is called a substitution, if it is idempotent, i.e., p(x) = p(p(x)). Definition 2.1. A substitution p : X → X is called strictly improving for the cost vector f if (∀x | p(x) 6= x) Ef (p(x)) < Ef (x). Example 2.1. Let us consider the dead-end elimination (DEE) [10, 13]. It is a test whether a given label in a single node, e.g., xu = 1 in Fig. 2 can be substituted with another one, e.g., xu = 3 in Fig. 2. The change of the energy under this substitution depends only on the configuration of neighbors xN (u) , and the value of the change is additive in neighbors, so that it can be verified for all xN (u) whether the substitution always improves the energy. If it is so, the label xu = 1 can be eliminated and the test is repeated for a different label in the reduced problem. (2) When a strictly improving substitution is applied to any labeling x, it is guaranteed that p(x) has equal or better energy. In particular, strictly improving substitutions generalize the strong Indeed, otherwise Ef (p(x∗ )) < Ef (x∗ ), which is a contradiction. If pv (i) 6= i, then idempotency implies that label (v, i) is non-optimal persistent and can be excluded from consideration. 2.3 Verification Problem Verifying whether a given substitution is strictly improving is an NP hard decision problem [35]. In order to obtain a polynomial sufficient condition we will first rewrite (2) as an energy minimization problem and then relax it. To this end we reformulate Definition 2.1 in an optimization form: Proposition 2.3. Substitution p is strictly improving iff  min Ef (x) − Ef (p(x)) ≥ 0, x∈X p(x) = x for all minimizers. (3a) (3b) Proof. Indeed, condition (3a) is equivalent to (∀x) Ef (x) ≥ Ef (p(x)). Sufficiency: if x 6= p(x), then x is not a minimizer and Ef (x) > Ef (p(x)). Necessity: for x = p(x) we have that Ef (x) = Ef (p(x)), therefore from Definition 2.1 it follows that condition (3a) holds and any x = p(x) is a minimizer, moreover, for any minimizer x it must be Ef (x) − Ef (p(x)) = 0 and from Definition 2.1 it follows x = p(x). In § 3 we will show that the difference of the energies in (3a) can be represented as a pairwise energy with an appropriately constructed cost vector g so that there holds Ef (x) − Ef (p(x)) = Eg (x). (4) Therefore, according to Proposition 2.3 the verification of the strictly improving property reduces to minimizing the energy (4) and checking that (3b) is fulfilled. To make the verification problem tractable, we relax it as min Eg (µ) ≥ 0, (5a) p(µ) = µ for all minimizers, (5b) µ∈Λ where Λ is a tractable polytope such that its integer vertices correspond to labelings (the standard LP relaxation that we use 4 will be defined in § 5), µ is a relaxed labeling and Eg (µ) and p(µ) are appropriately defined extensions of discrete functions Eg (x) and p(x), defined in § 3. By construction, the objective value (5) matches exactly to that of (2) for all integer labelings µ ∈ Λ ∩ {0, 1}I , which is sufficient for (2) to hold. The sufficient condition (5) (made precise in Definition 3.2) means that p strictly improves not only integer labelings but also all relaxed labelings and therefore such substitutions will be called strictly relaxedimproving for a cost vector f . Assuming Λ is fixed by the context, let Sf denotes the set of all substitutions p satisfying (5). (a) p∈P v∈V where P is a class of substitutions. While maximizing over all substitutions is not tractable, maximizing over the following restricted class is [35]. Assume we are given a test labeling y , which in our case will be an approximate solution of the MAP inference (1). We then consider substituting in each node v a subset of labels with yv . Definition 2.4 ([35]). A substitution p is in the class of subsetto-one substitutions P 2,y , where y ∈ X , if there exist subsets Yv ⊆ Xv \{yv } for all v such that  yv , if i ∈ Yv ; pv (i) = (7) i, if i ∈ / Yv . See Figs. 3 and 4 for examples. Note, this class is rather large: there are 2|Xv |−1 possible choices for pv and most of the existing methods for partial optimality still can be represented using it [35] (in particular, methods [25, 14] can be represented using a constant test labeling, yv = α for all v ). The restriction to the class P 2,y allows to represent the search of the substitution that eliminates the maximum number of labels as the one with the largest (by inclusion) sets Yv of substituted labels. This allows to propose a relatively simple algorithm. 2.5 Cutting Plane Algorithm The algorithm is a cutting plane method in a general sense: we maintain a substitution pt which is in all iterations better or equal than the solution to (6) and achieve feasibility by iteratively constraining it. Initialization: Define the substitution p0 by the sets Yv0 = Xv \{yv }. It substitutes everything with y and clearly maximizes the objective (6). Verification: Check whether current pt is strictly relaxedimproving for f by solving relaxed problem (5). If yes, return pt . If not, the optimal relaxed solution µ∗ corresponds to the most violated constraint. Cutting plane: Assign pt+1 to the substitution defined by the largest sets Yvt+1 such that Yvt+1 ⊆ Yvt and the constraints Eg (µ∗ ) ≥ 0, p(µ∗ ) = µ∗ , are satisfied. Repeat the verification step. The steps of this meta-algorithm are illustrated in Fig. 4. It is clear that when the algorithm stops the substitution pt is strictly improving, although it could be the identity map that does not 0.5 0.5 (b) 2.4 Maximum Persistency and Subset-to-One Substitutions The maximum persistency approach [35] consists of finding a relaxed-improving substitution p ∈ Sf that eliminates the maximal number of labels: X max {i ∈ Xv | p(i) 6= i} , s.t. p ∈ Sf , (6) y µ⇤ 1 y (c) y Fig. 4: Steps of the discrete cutting-plane algorithm. (a) Starting from substitution that maps everything to the test labeling y (red), crossed labels would be eliminated if p passes the sufficient condition. (b) A relaxed solution µ∗ violating the sufficient condition is found (black). (c) Substitution p is pruned. eliminate any labels. The exact specification of the cutting plane step will be derived in § 4 and it will be shown that this algorithm solves the maximum persistency problem (6) over P 2,y optimally. 2.6 Work Outline In § 3 we give a precise formulation of the relaxed condition (5) and its components. In § 4 we specify details of the algorithm and prove its optimality. These results hold for a general relaxation Λ ⊇ M but require to solve linear programs (5a) precisely. The rest of the paper is devoted to an approximate solution of the problem (6), i.e. finding a relaxed improving mapping, which is almost maximum. We consider specifically the standard LP relaxation and reformulate the algorithm to use a dual solver for the problem (5a), § 5. We then gradually relax requirements on the optimality of the dual solver while keeping persistency guarantees, §§ 5 to 7, and propose several theoretical and algorithmic tools to solve the series of verification problems incrementally and overall efficiently, § 8. Finally, we provide an exhaustive experimental evaluation in § 9, which clearly demonstrates efficacy of the developed method. 3 3.1 R ELAXED -I MPROVING S UBSTITUTIONS Overcomplete Representation In this section we formally derive the strictly relaxed-improving sufficient condition (5). To obtain the relaxation we use the standard lifting approach (a.k.a. overcomplete representation [47]), in which a labeling is represented using the 1-hot encoding. This lifting allows to linearize the energy function, the substitution and consequently both the non-relaxed (3) and relaxed (5) improving substitution criteria. The lifting is defined by the mapping δ : X → RI : δ(x)∅ = 1, δ(x)u (i) = [[xu =i]], δ(x)uv (i, j) = [[xu =i]][[xv =j]], (8a) (8b) (8c) where [[·]] is the Iverson bracket, i.e., [[A]] equals 1 if A is true and 0 otherwise. Using this lifting, we can linearize unary 5 P P terms as fv (xv ) = k fv (k)[[xv =k]] = k fv (k)δ(x)v (k) and similarly for the pairwise terms. This allows to linearize the energy function Ef and write it as a scalar product Ef (x) = hf, δ(x)i in RI . The energy minimization problem (1) can then be written as min Ef (x) = min hf, δ(x)i = min hf, µi , (9) x∈X µ ∈M x∈X where M = conv δ(X ) is the convex hull of all labelings in the lifted space, also known as marginal polytope [47]. The last equality in (9) uses the fact that the minimum of a linear function on a finite set equals the minimum on its convex hull. Expression (9) is an equivalent reformulation of the energy minimization problem as a linear program, however over a generally intractable polytope M. i.e. all relaxed labels are mapped to the indicator of the label xu = 3. And the adjoint operator P T acts as follows (cf. (10b)): Pu> ( fu (1) fu (2) fu (3) )> = ( fu (3) fu (3) fu (3) )> , (15) Pv> ( fu (1) fu (2) fu (3) )> (16) = ( fu (1) fu (3) fu (3) )> > Similarly, due to (10c) we have, e.g., (Puv fuv )(1, 2) > (Puv fuv )(1, 1) = fuv (3, 1) and so on. 3.3 . = fuv (3, 3), Strictly improving substitutions Let I denote the identity mapping RI → RI . Using Proposition 2.3 and the linear extension [p], we obtain that substitution p is strictly improving iff the value of min hf, δ(x) − δ(p(x))i = min hf, (I − [p])δ(x)i x∈X 3.2 Lifting of Substitutions Next we show how a substitution p : X → X can be represented as a linear map in the lifted space RI . This will allow to express the term Ef (p(x)) as a linear function of δ(x) and hence also to represent the non-relaxed criterion (3). Proposition 3.1. Given a substitution p, let P T : RI → RI be defined by its action on a cost vector f ∈ RI as follows: (P T f )∅ = f∅ , (10a) (P T f )u (i) = fu (pu (i)), (10b) (P T f )uv (i, j) = fuv (pu (i), pv (j)) (10c) x∈X (∀x ∈ X ) δ(p(x)) = P δ(x). Definition 3.2 ([35]). Substitution p is strictly Λ-improving for the cost vector f ∈ RI (shortly, strictly relaxed-improving, or p ∈ Sf ) if minµ∈Λ h(I − [p])> f, µi = 0, [p]µ∗ = µ∗ for all minimizers. (11) Proof. Let x ∈ X . From (10) it follows that EP T f (x) = Ef (p(x)), which can be expressed as a scalar product hP T f, δ(x)i = hf, P δ(x)i = hf, δ(p(x))i. Since this equality holds for all f ∈ RI it follows that P δ(x) = δ(p(x)). The expression (11) allows to write the energy of the substituted labeling p(x) as Ef (p(x)) = hf, δ(p(x))i = hf, P δ(x)i = EP T f (x). (12) For this reason, the mapping P is called the linear extension of p and will be denoted with the symbol [p]. The following example illustrates how [p] looks in coordinates. Example 3.1. Consider the substitution p depicted in Fig. 3 and defined by pu : 1, 2, 3 7→ 3, 3, 3; pv : 1, 2, 3 7→ 1, 3, 3. The relaxed labeling µ ∈ RI has the structure (µ∅ , µu , µv , µuv ). The linear extension [p] : RI → RI can be written as a block-diagonal matrix ! 1 0 0 0 1 0 0 Pu , where Pu = 0 0 0 , Pv = 0 0 0 (13) Pv 111 011 and Puv is defined by Puv µuv = Pu µuv Pv , where µuv is shaped as a 3 × 3 matrix. The action of the block Pu expresses as  µ (1)    u 0 Pu µu (2) = 0 , (14) µu (3) 1 µ∈M is zero and [p]µ = µ for all minimizers. Note that problem (17) is of the same form as the energy minimization (9) with the cost vector g = (I − [p]T )f , as introduced in (4). The sufficient condition for persistency (5) is obtained by relaxing the intractable marginal polytope M in (17) to a tractable outer approximation Λ ⊇ M. ∀ u ∈ V , uv ∈ E , ij ∈ Xuv . Then P satisfies Puv x∈X = minh(I − [p])> f, δ(x)i = min h(I − [p])> f, µi (17) (18a) (18b) In § 5, Λ will be defined as the polytope of the standard LP relaxation but until then the arguments are general and require only that Λ ⊇ M. Since Λ includes all integer labelings, it is a sufficient condition for improving substitution and hence persistency. Corollary 3.3. If substitution p is strictly Λ-improving for f and Λ ⊇ M, then p is strictly improving for f . The problem (18a) will be called the verification LP and the decision problem to test for p ∈ Sf , i.e. to verify conditions (18), will be called the verification problem. 4 4.1 G ENERIC P ERSISTENCE A LGORITHM Structure of P 2,y In [35] it was shown that the maximum persistency problem (6) over the class of substitutions P 2,y can be formulated as a single linear program, where the substitution is represented using auxiliary (continuous) variables. Here we take a different approach based on observing a lattice-like structure of improving substitutions. Throughout this section we will assume that the test labeling y ∈ X is fixed. Let us compare two substitutions p and q by the sets of the labels they eliminate. A substitution p ∈ P 2,y eliminates all labels in Yv , or equivalently all labels not in pv (Xv ). Definition 4.1. A substitution p ∈ P 2,y is better equal than a substitution q ∈ P 2,y , denoted by p ≥ q , if (∀v ∈ V) it holds pv (Xv ) ⊆ qv (Xv ). 6 Proposition 4.2. Let the partially ordered set (Sf ∩ P 2,y , ≥) of subset-to-one strictly relaxed-improving substitutions has the maximum and let it be denoted r. Then r is the unique solution of (6) with P = P 2,y . Proof. Since r is the maximum, it holds r ≥ q for all q . From Definition 4.1 we P have rv (Xv ) ⊆ qv (Xv ) for all v and thus P |r (X )| ≤ r is optimal to (6). v v v v |qv (Xv )|. Therefore P P Additionally, if r 6= q , then it holds v |rv (Xv )| < v |qv (Xv )| and therefore r is the unique solution to (6). The existence of the maximum will formally follow from the correctness proof of the algorithm, Theorem 4.6. A stronger claim, which is not necessary for our analysis, but which may provide a better insight is that (Sf ∩ P 2,y , ≥) is a lattice isomorphic to the lattice of sets with union and intersection operations. This is seen as follows. If both p and q are strictly-improving then so is their composition r(x) = p(q(x)), as can be verified by chaining inequalities (2). In P 2,y the composition satisfies the property ru (Xu ) = pu (Xu ) ∩ qu (Xu ), and can be identified with the join of p and q (the least r such that r ≥ p and r ≥ q ). This can be shown to hold also for Sf ∩ P 2,y . It is this structure that allows to find the maximum in Sf ∩ P 2,y by a relatively simple algorithm. 4.2 Generic Algorithm Our generic primal algorithm, displayed in Algorithm 1, represents a substitution p ∈ P 2,y by the sets Yv of labels to be substituted with y , via (7). Line 1 initializes these sets to all labels but y . Line 1 constructs the cost vector of the verification LP in condition (18). Lines 1 and 1 solve the verification LP and test whether sufficient conditions (18) are satisfied via the following reformulation. Proposition 4.3. For a given substitution p, let O∗ ⊆ Λ denote the set of minimizers of the verification LP (18) and Ov∗ := {i ∈ Xv | (∃µ ∈ O∗ ) µv (i) > 0}, (19) which is the support set of all optimal solutions in node v . Then p ∈ Sf iff (∀v ∈ V ∀i ∈ Ov∗ ) pv (i) = i. Proof in § A. Corollary 4.4. For substitution p ∈ P 2,y defined by (7) it holds p ∈ Sf iff (∀v ∈ V) Ov∗ ∩ Yv = ∅. In the remainder of the paper we will relate the notation Ov∗ to O∗ as in (19). The set of optimal solutions O∗ can, in general, be a d-dimensional face of Λ. We need to determine in (19) whether an optimal solution µ ∈ O∗ exists such that the coordinate µv (i) is strictly positive. From the theory of linear programming [46], it is known that if one takes an optimal solution µ in the relative interior of O∗ (i.e., if O∗ is a 2D face the relative interior excludes vertices and edges of O∗ ) then its support set {i | µv (i) > 0} is the same for all such points and it matches Ov∗ (19). Therefore, it is practically feasible to find the support sets Ov∗ by using a single solution found by an interior point/barrier method (which are known to converge to a “central” point of the optimal face) or methods based on smoothing [31, 32]. Obtaining an exact solution by these methods may become computationally expensive as the size of the inference problem (1) grows. Despite that, Algorithm 1 is implementable and defines the baseline for its practically efficient variants solving (6) approximately. These are developed further in the paper. Since Line 1 of Algorithm 1 verifies precisely the condition of Corollary 4.4, the algorithm terminates as soon as p ∈ Sf and Algorithm 1: Iterative Pruning LP-Primal 1 2 3 4 5 6 7 8 Input: Cost vector f ∈ RI , test labeling y ∈ X ; Output: Maximum strictly improving substitution p; (∀v ∈ V) Yv := Xv \{yv }; while true Construct the verification problem potentials g := (I − [p])> f with p defined by (7); O∗ = argminµ∈Λ hg, µi; (∀v ∈ V) Ov∗ = {i ∈ Xv | (∃µ ∈ O∗ ) µv (i) > 0}; if (∀v ∈ V) Ov∗ ∩ Yv = ∅ then return p; for v ∈ V do Pruning of substitutions: Yv := Yv \Ov∗ ; hence p is strictly improving. In the opposite case, Line 1 prunes the sets Yv by removing labels corresponding to the support set Ov∗ of all optimal solutions of the verification LP, which have been identified now to violate the sufficient condition. These labels may be a part of some optimal solution to (1) and will not be eliminated. To complete the analysis of Algorithm 1 it remains to answer two questions: i) does it terminate and ii) is it optimal for the maximum persistency problem (6)? Proposition 4.5. Algorithm 1 runs in polynomial time and returns a substitution p ∈ Sf ∩ P 2,y . Proof. As we discussed above, sets Ov∗ in Line 1 can be found in polynomial time. At every iteration, if the algorithm has not terminated yet, at least one of the sets Yv strictly shrinks, as can be seen by comparing termination condition in Line 1 with pruning P in Line 1. Therefore the algorithm terminates in at most v (|Xv | − 1) iterations. On termination, p ∈ Sf by Corollary 4.4. Theorem 4.6. Substitution p returned by Algorithm 1 is the maximum of Sf ∩ P 2,y and thus it solves (6). Proof in ?? . It is noteworthy that Algorithm 1 can be used to solve problem (6) with any polytope Λ satisfying M ⊆ Λ, i.e., with any LP relaxation of (1) that can be expressed in the lifted space RI . Moreover, in order to use the algorithm with higher order models one needs merely to (straightforwardly) generalize the linear extension (10) as done in [37]. The test labeling y can itself be chosen using the approximate solution of the LP-relaxation, e.g., via the zeroth iteration of the algorithm with g = f and picking yv from Ov∗ . This choice is motivated by the fact that a strict relaxed-improving substitution cannot eliminate the labels from the support set of optimal solutions of the LP relaxation [35], and thus these labels may not be substituted with anything else. 4.3 Comparison to Previous Work Substitutions in P 2,y are related to the expansion move algorithm [6] in the following sense. While [6] seeks to improve a single current labeling x by calculating an optimized crossover (fusion) with a candidate labeling y , we seek which labels can be moved with a guaranteed improvement to y for all possible labelings x. Algorithm 1 is similar in structure to [43]. The later finds an improving substitution in a small class P 1,y by incrementally shrinking the set of potentially persistent variables. More 7 specifically, given a test labeling y ∈ X , the all-to-one class of substitutions P 1,y contains substitutions p, which in every node v either replace all labels with yv or leaves all labels unchanged. There are only two possible choices for pv : either i 7→ yv for all i ∈ Xv or the identity i 7→ i. Methods [24, 42, 43] can be explained as finding an improving mapping in this class [35]. We generalize the method [43] to substitutions in P 2,y . The original sufficient condition for persistency in [43] does not extend to such substitutions. Even for substitutions in P 1,y it is generally weaker than condition (18) unless a special reparametrization is applied [44]. Criterion (18) extends to general substitutions and does not depend on reparametrization. Similarly to [43], we will use approximate dual solvers in this more general setting. In [35, (ε-L1)] problem (6) is formulated as one big linear program. We solve problem (6), and hence also the LP problem [35] in a more combinatorial fashion w.r.t. to the variables defining the substitution. It may seem that solving a series of linear programs rather than a single one is a disadvantage of the proposed approach. However, as we show further, the proposed iterative algorithm can be implemented using a dual, possibly suboptimal, solver for the relaxed verification problem (18). This turns out to be much more beneficitial in practice since the verification problems can be incrementally updated from iteration to iteration and solved overall very efficiently. This approach achieves scalability by exploiting available specialized approximate solvers for the relaxed MAP inference. Essentially, any dual (approximate) solver can be used as a black box in our method. the mode 3 relies on the persistency problem reduction introduced in § 6. Intermediate steps 1 and 2 are considered right after defining the standard LP relaxation and its dual. 5.1 LP Relaxation We consider the standard local polytope relaxation [41, 49, 47] of the energy minimization problem (1) given by the following primal-dual pair: (primal) minhf, µi P µ (i, j) = µu (i), uv j P µ (i, j) = µv (j), uv i P i µu (i) = µ∅ , µu (i) ≥ 0, µuv (i, j) ≥ 0, µ∅ = 1 = (dual) max f∅ϕ ϕuv (i) ∈ R, ϕvu (j) ∈ R, ϕ u ∈ R, fuϕ (i) ≥ 0, ϕ fuv (i, j) ≥ 0, where f ϕ abbreviates fuϕ (i) = fu (i) + P v∈N (u) ϕuv (i) − ϕu , ϕ fuv (i, j) = fuv (i, j) − ϕuv (i) − ϕvu (j), P f∅ϕ = f∅ + u ϕu . P ERSISTENCY WITH D UAL S OLVERS Though Algorithm 1 is quite general, its practical use is limited by the strict requirements on the solver, which must be able to determine the exact support set of all optimal solutions. However, finding even a single solution of the relaxed problem with standard methods like simplex or interior point can be practically infeasible and one has to switch to specialized solvers developed for this problem. Although there are scalable algorithms based on smoothing techniques [31, 32], which converge to an optimal solution, waiting until convergence in each iteration of Algorithm 1 can make the whole procedure impractical. In general, we would like to avoid restricting ourselves to certain selected solvers to be able to choose the most efficient one for a given problem. In the standard LP relaxation (introduced below in (20)), the number of primal variables grows quadratically with the number of labels, while the number of dual variables grows only linearly. It is therefore desirable to use solvers working in the dual domain, including suboptimal ones, (e.g. [20, 32, 12, 33], performing block-coordinate descent) as they offer the most performance for a limited time budget. Furthermore, fast parallel versions of such methods have been developed to run on GPU/FPGA [38, 7, 16], making the LP approach feasible for more vision applications. We will switch to the dual verification LP and gradually relax our requirements on the solution returned by a dual solver. This is done in the following steps: 1. an optimal dual solution; 2. an arc consistent dual point; 3. any dual point. Our main objective is to ensure in each of these cases that the found substitution p is strictly improving, while possibly compromising its maximality. The final practical algorithm operating in (21a) (21b) (21c) The constraints of the primal problem (20) define the local polytope Λ. The cost vector f ϕ is called a reparametrization of f . There holds cost equivalence: hf ϕ , µi = hf, µi for all µ ∈ Λ (as well as Ef = Ef ϕ ), see [49]. Using the reparametrization, the dual problem (20) can be briefly expressed as max f∅ϕ s.t. (∀ω ∈ V ∪ E) fωϕ ≥ 0. 5 (20) ϕ (22) ϕ Note that for a feasible ϕ the value f∅ is a lower bound on the primal problem (20). In what follows we will assume that ϕ in (22) additionally satisfies the following normalization: mini fuϕ (i) = ϕ (i, j) = 0 for all u, v , which is automatically 0 and minij fuv satisfied for any optimal solution. 5.2 Expressing Ov∗ in the Dual Domain Let (µ, ϕ) be a pair of primal and dual optimal solutions to (20). From complementary slackness we know that if µv (i) > 0 then the respective dual constraint holds with equality: µv (i) > 0 ⇒ fvϕ (i) = 0, (23) in this case we say that fvϕ (i) is active. The set of such active dual constraints matches the sets of local minimizers of the reparametrized problem,  Ov (ϕ) := i ∈ Xv | fvϕ (i) = 0 = argmin fvϕ (i). (24) i From complementary slackness (23) we obtain that Ov∗ ⊆ Ov (ϕ). (25) This inclusion is insufficient for an exact reformulation of Algorithm 1, however it is sufficient for correctness if we make sure that Yv ∩ Ov (ϕ) = ∅ on termination, i.e., that the substitution p does not displace labels in Ov (ϕ). Then, by Corollary 4.4, p ∈ Sf follows. There always exists an optimal primal solution µ and dual ϕ satisfying strict complementarity [46], in which case relation (23) becomes an equivalence: µv (i) > 0 ⇔ fvϕ (i) = 0. (26) 8 Algorithm 2: Iterative Pruning Arc Consistency Xu \Yu I 1 2 3 4 5 6 7 8 Input: Cost vector f ∈ R , test labeling y ∈ X ; Output: Strictly improving substitution p; (∀v ∈ V) Yv := Xv \{yv }; while true Construct verification problem g := (I − [p])> f with p defined by (7); Use dual solver to find ϕ such that g ϕ is arc consistent; Ov (ϕ) := {i ∈ Xv | gvϕ (i) = 0}; if (∀v ∈ V) Ov (ϕ) ∩ Yv = ∅ then return p; for v ∈ V do Pruning of substitutions: Yv := Yv \Ov (ϕ); It is the case when both µ and ϕ are relative interior points of the optimal primal, resp. optimal dual, faces [46]. For a relative interior optimal ϕ, the set of constraints that are satisfied as equalities f ϕ (i) = 0 is the smallest and does not depend on the specific choice of such ϕ. Under strict complementarity, (25) turns into equality Ov∗ = Ov (ϕ), which allows to compute the exact maximum persistency using a dual algorithm without reconstructing a primal solution. However finding such ϕ appears more difficult: e.g. the most efficient dual block-coordinate ascent solvers [20, 12, 8, 33] only have convergence guarantees (see [20, 33]) allowing to find a sub-optimal solution, satisfying arc consistency. Definition 5.1 ([49]). A reparametrized problem f ϕ is called arc ϕ consistent if: (i) for all uv ∈ E from fuv (i, j) being active follows that fuϕ (i) and fvϕ (j) are active; (ii) for all u ∈ V from fuϕ (i) active follows that for all v ∈ N (u) there exists a j ∈ Xv such ϕ that fuv (i, j) is active. An optimal dual solution need not be arc consistent, but it can be reparametrized without loss of optimality to enforce arc consistency [49]. Labels that become inactive during this procedure are not in the support set of primal solutions. In general the following holds. Proposition 5.2. Arc consistency is a necessary condition for relative interior optimality: if Ov (ϕ) = Ov∗ for all v ∈ V then f ϕ is arc consistent. Proof in (38). This property is in our favor, since we are ideally interested in the equality Ov (ϕ) = Ov∗ . Next, we propose an algorithm utilizing an arc consistent solver and prove that it is guaranteed to output p ∈ Sf . 5.3 Persistency with an Arc Consistency Solver We propose Algorithm 2 which is based on a dual solver attaining the arc consistency condition (differences to Algorithm 1 underlined). If the dual solver (in line 4) finds a relative interior optimal solution, Algorithm 2 solves (6) exactly. Otherwise it is suboptimal and we need to reestablish its correctness and termination. Lemma 5.3 (Termination of Algorithm 2). Algorithm 2 termiP nates in at most v (|Xv | − 1) iterations. Proof. In case the return condition in line 6 is not satisfied, Ov ∩ Yv 6= ∅ for some v and the pruning in line 8 excludes at least one label from Yv . Xu \Yu j j j Xv \Yv i Xv \Yv ∆uv (i ) i ∆vu (j) j i v u ∆uv (i) = minj ∈Xu \Yu guv (i, j ) (a) u v min{guv (i, j ), ∆uv (i) + ∆vu (j )} (b) Fig. 5: Illustration for the reduction. Labels Xu \Yu are not displaced by p hence their associated unary and pairwise costs are zero in g = (I − [p]T )f . In case (a) the indicated pairwise costs are replaced with their minimum. In case (b) the value of guv (i, j) can be decreased, assuming all reductions of type (a) and their symmetric counterparts are already performed. The amount of decrease matches the value of the mixed derivative (non-submodularity) associated to i, i0 paired with j, j 0 . Lemma 5.4 (Correctness of Algorithm 2). If (∀v ∈ V) Ov (ϕ) ∩ Yv = ∅ holds for an arc consistent dual vector ϕ, then ϕ is optimal. Proof in (57). It follows that when Algorithm 2 terminates, the found arc consistent solution ϕ is optimal, in which case inclusion (25) is satisfied and the found substitution p is guaranteed to be in Sf . 5.4 Solvers Converging to Arc Consistency One can see that arc consistency is only required on termination of Algorithm 2. In the intermediate iterations we may as well perform the pruning step, line 8, without waiting for the solver to converge. This motivates the following practical strategy: • Perform a number of iteration towards finding an arcconsistent dual point ϕ; • Check whether there are some labels to prune, i.e., (∃u)Ou (ϕ) ∩ Yu 6= ∅; • Terminate if ϕ is arc consistent and there is nothing to prune; otherwise, perform more iterations towards arc consistency. If the solver is guaranteed to eventually find an arc consistent solution, the overall algorithm will either terminate with an arc consistent and (by Lemma 5.4) optimal ϕ or there will be some labels to prune. However, we have to face the question what happens if the dual solver does not find an arc consistent solution in finite time. In this case the algorithm can be iterating infinitely with no pruning available. At the same time there is no guarantee that a pruning step will not occur at some point and thus if we simply terminate the algorithm we get no persistency guarantees. Even if the dual solver was guaranteed to converge in a finite number of iterations, it is in principle possible that the time needed for a pruning to succeed would be proportional to the time of convergence, making the whole algorithm very slow. Instead, it is desirable to guarantee a valid result while allowing only a fixed time budget for the dual solver. We will overcome this difficulty with the help of the reduced verification LP presented next. 6 V ERIFICATION P ROBLEM R EDUCTION Algorithms 1 and 2 iteratively solve verification problems. We can replace the verification LP solved in step 4 by a simpler, reduced one, without loss of optimality of the algorithms. 9 Definition 6.1. Let g := (I − [p])> f be the cost vector of the verification LP. The reduced cost vector ḡ is defined as ḡv (i) := gv (i), v ∈ V; ḡ∅ = 0; g uv (i, j) :=  0,    0 ∆vu (j) := mini0 ∈Y / u guv (i , j), 0  / v guv (i, j ), ∆uv (i) := minj 0 ∈Y  min{∆vu (j) + ∆uv (i), guv (i, j)}, (27a) (27b) i∈ / Yu , j i∈ / Yu , j i ∈ Yu , j i ∈ Yu , j ∈ / Yv , ∈ Yv , ∈ / Yv , ∈ Yv . The reduction is illustrated in Fig. 5. Taking into account that guv (i0 , j 0 ) = 0 for i0 ∈ Xu \Yu , j 0 ∈ Xv \Yv , the reduction can be interpreted as forcing the inequality guv (i, j 0 ) + guv (i0 , j) − guv (i, j) − guv (i0 , j 0 ) ≥ 0, (28) i.e., the non-negativity of mixed discrete derivatives, for all fourtuples i ∈ Yu , j ∈ Yv , i0 ∈ / Yv , j 0 ∈ / Yu . The cost vector ḡ is therefore a partial submodular truncation of g . Recall that Algorithm 1 on each iterations prunes all substitutions q ≤ p that do not belong to Sf based on the solutions of the verification LP. The following theorem reestablishes optimality of this step with the above reduction. Theorem 6.2 (Reduction). Let p ∈ P 2,y and ḡ be the corresponding reduced cost vector constructed as in Def. 6.1. Let also q ∈ P 2,y , q ≤ p. Then q ∈ Sf iff q ∈ Sḡ . Proof in (55). Procedure 3: dual correct(ϕ,ḡ ) 1 2 3 4 5 6 for uv ∈ E do ϕ (∀i ∈ Xu ) ϕuv (i) := ϕuv (i) + minij ḡuv (i, j); ϕ (∀i ∈ Xu ) ϕuv (i) := ϕuv (i) + minj ḡuv (i, j); ϕ (∀j ∈ Xv ) ϕvu (j) := ϕvu (j) + mini ḡuv (i, j); (∀u ∈ V) ϕu := ϕu + mini guϕ (i); return ϕ; /* Normalize */ terminate (lines 11-13). If neither occurs in a certain number of iterations (stopping condition in line 14), the pruning based on the currently active labels is executed (line 15). After that the cost vector ḡ is rebuilt, but the dual solver continues from the last found dual point (warm start). The speed-ups will be explained in the next section, they are not critical for the overall correctness. Now we focus on the new termination conditions (lines 11-13). A correction step (line 11) is introduced whose purpose is to move the slacks from pairwise terms to unary terms so that active labels become more decisive. This procedure is defined in Procedure 3. The correction is not intermixed with dual updates but serves as a proxy between the solver and the termination conditions. It has the following property. Lemma 7.1. Output ϕ of Procedure 3 is feasible and satisfies (∀u ∈ V) min guϕ (i) = 0, (30) i∈Xu From Theorem 6.2 and Corollary 4.4 it follows that q ∈ Sf iff ϕ ϕ 0 qu (Ou∗ ) = Ou∗ , where Ou∗ are the support sets of optimal solutions (∀uv ∈ E, ij ∈ Xuv ) min ḡuv ḡuv (i, j 0 ) = 0. (31) (i , j) = min j 0 ∈Xv i0 ∈Xu to the reduced verification LP, ϕ Moreover, if the input ϕ is feasible, the lower bound f∅ does not argminµ∈Λ hḡ, µi. (29) decrease. Therefore it is valid for algorithms 1 and 2 to consider this Proof. Line 2 of Procedure 3 moves a constant from an edge reduced LP and prune all substitutions q that do not satisfy ϕ (i, j) to zero. to node. This turns the minimum of terms guv ∗ ∗ the property qv (Ov ) = Ov . The optimal relaxed solutions and Lines 3 and 4 turn to zero the minimal pairwise value attached their support sets can in general differ from those of the original to each label, which provides (31). Line 5 provides (30). In case verification LP, however for the purpose of the algorithm it is of feasibility of the initial ϕ, which implies g ϕ ≥ 0, all values of ϕ an equivalent replacement potentially affecting only the order in can only increase during steps 2-4 and hence the unary potentials which substitutions are pruned. guϕ remain non-negative. Therefore step 5 can not decrease the The reduction has the following advantages: ϕ lower bound value f∅ . • subsets of labels Xv \Yv can be contracted to a single repAccording to Lemma 7.1 Procedure 3 can not worsen the lower resentative label yv , because associated unary and pairwise bound attained by a dual solver. The following theorem guarantees costs are equal; that when no further pruning is possible, the corrected dual point • It will allow (see § 7) to relax the requirements on ap- constitutes an optimal solution, ensuring persistency. proximate dual solvers needed to establish termination and Theorem 7.2. Let ϕ be a dual point for reduced problem ḡ correctness of the algorithm. • It is useful for the speed up heuristics (§ 8). In particular, satisfying (30)-(31). Then either ϕ 1. g∅ = 0, ϕ is dual optimal and δ(y) is primal optimal, or it is easier to find a labeling with a negative cost since we 2. (∃u ∈ V) Ou (ϕ) ∩ Yu 6= ∅. have decreased many edge costs. It will be shown that such a labeling allows for an early stopping of the dual solver and a Proof. Assume (b) does not hold: (∀u ∈ V) Ou (ϕ) ⊆ Xu \Yu . pruning of substitution without loss of maximality. Let us pick in each node u a label zu ∈ Ou (ϕ). As ensured by (31), for each edge uv there is a label j ∈ Xv such that ϕ (zu , j) = 0 and similarly, there exists i ∈ Xu such that 7 P ERSISTENCY WITH A F INITE N UMBER OF D UAL ḡuv ϕ ḡ (i, zv ) = 0. By partial submodularity of ḡ , we have U PDATES uv We assume that a suboptimal dual solver is iterative and can be represented by a procedure dual_update, which given a current dual point ϕ makes a step resulting in a new dual point and a guess of a primal integer solution x. In this setting we propose Algorithm 4. In its inner loop, the algorithm calls dual_update (line 7) checks whether a speedup shortcut is available (line 8) and verifies whether it can already ϕ ϕ ϕ ϕ ḡuv (zu , zv ) + ḡuv (i, j) ≤ ḡuv (zu , j) + ḡuv (i, zv ) = 0. (32) ϕ ϕ ϕ Therefore, ḡuv (zu , zv ) ≤ −ḡuv (i, j) ≤ 0. Hence ḡuv (zu , zv ) = 0 and it is active. Therefore δ(z) and dual point ϕ satisfy complementarity slackness conditions and hence they are primalϕ dual optimal and g∅ = Eḡ (z) = 0 = Eḡ (y). 10 Algorithm 4: Efficient Iterative Pruning I 1 2 3 4 5 6 7 8 9 10 Input: Problem f ∈ R , test labeling y ∈ X ; Output: Improving substitution p ∈ P 2,y ∩ Sf ; (∀u ∈ V) Yu := Xu \{yu }; Set ϕ to the initial dual solution if available; while true Apply single node pruning ; /* speed-up */ Construct reduced verification LP ḡ from f and current sets Yu , according to Definition 6.1; repeat (ϕ, x) := dual_update(ḡ, ϕ); if Eḡ (x) < 0 then /* speed-up */ Apply pruning cut with x; goto step 4 to rebuild ḡ ; /* Verification of Optimality 11 12 13 14 15 16 */ ϕ0 := dual_correct(ḡ, ϕ); 0 Ou := {i | ḡuϕ (i) = 0}; if (∀u ∈ V) Ou ∩ Yu = ∅ then return p by (7); until any stopping condition (e.g., iteration limit); Prune: (∀u ∈ V) Yu := Yu \Ou ; Procedure dual_update (ḡ ,ϕ) Input: Cost vector ḡ , dual point ϕ; Output: New dual point ϕ, approximate primal integer solution x; loss of optimality of the algorithm. Lemma 8.1 below suggests to solve a simpler verification LP, minµ∈Λ0 hḡ, µi over a subset Λ0 of Λ. This does not guarantee to remove all non-improving substitutions (which implies one has to switch to Λ afterwards), but can be much more efficient than the optimization over Λ. After the lemma we provide two examples of such efficient procedures. Lemma 8.1. Let p ∈ P 2,y and ḡ be defined by (27) (depends on p). Let q ∈ Sf ∩ P 2,y , q ≤ p, Q = [q]. Let Λ0 ⊆ Λ, Q(Λ0 ) ⊆ Λ0 and O∗ = argminµ∈Λ0 hḡ, µi. Then (∀v ∈ V) qv (Ov∗ ) = Ov∗ . Proof in ?? . Note, while Theorem 6.2 is necessary and sufficient for pruning, Lemma 8.1 is only sufficient. 8.2 Pruning of Negative Labelings Assume we found an integer labeling x such that Eḡ (x) ≤ 0 and p(x) 6= x. Lemma 8.1 gives an answer, for which nodes v the label xv can be pruned from the set Yv without loss of optimality. Define the following restriction of the polytope Λ: Λx = {µ ∈ Λ | (∀v ∈ V) µ(yv ) + µ(xv ) = 1} ⊆ Λ. Polytope Λx corresponds to the restriction of Λ to the label set {yv , xv } in each node v ∈ V . According to Lemma 8.1 we need to solve the problem O∗ := argminµ∈Λx hḡ, µi Theorem 7.3 (Termination and Correctness of Algorithm 4). For any stopping condition in line 14, Algorithm 4 terminates in at P most v (|Xv | − 1) outer iterations and returns p ∈ Sf . Proof. When the algorithm has not yet terminated some further pruning is guaranteed to be possible (compare conditions in lines 13 and 15). The iteration limit follows. When Algorithm 4 terminates, from Theorem 7.2 it follows that ϕ0 is dual optimal and hence Ou (ϕ0 ) ⊇ Ou∗ . Therefore, (∀u ∈ V) Ou∗ ∩ Yu = ∅, which is sufficient for p to be strictly Λ-improving according to Corollary 4.4. In [40] we prove that a similar result holds for a TRWS iteration without correction by arguing on complete chain subproblems instead of individual nodes. The correction might be needed in case the algorithm does not keep slacks on the nodes, e.g. for SRMP [22]. The stopping condition in line 14 of Algorithm 4 controls the aggressiveness of pruning. Performing fewer iterations may result only in the found p not being the maximum, but in any case it is guaranteed that the Algorithm 4 does not stall and identifies a correct persistency. In the case when the solver does have convergence and optimality guarantees, the time budget controls the degree of approximation to the maximum persistency. 8 8.1 S PEED - UPS Inference Termination Without Loss of Maximality Next, we propose several sufficient conditions to quickly prune some substitutions without worsening the final solution found by the algorithm. As follows from Definition 3.2, existence of a labeling x such that (I − [p])> f, δ(x) ≤ 0 and x 6= p(x) is sufficient to prove that substitution p is not strictly Λ-improving. Hence one could consider updating the current substituttion p without waiting for an exact solution of the inference problem in line 4. The tricky part is to find labels that can be pruned without (33) (34) and exclude xv from Yv if xv ∈ Ov∗ . Due to the partial submodularity of ḡ the problem (34) is submodular and can be solved by min-cut/max-flow algorithms [23]. Because x was found to have non-positive energy, it is necessarily that for some nodes v there will hold xv ∈ Ov∗ ∩ Yv and therefore some pruning will take place. 8.3 Single Node Pruning Let us consider “a single node” polytope Λu,i := {µ ∈ Λ | µu (yu ) + µu (i) = 1; (∀v 6= u) µv (yv ) = 1}. It is a special case of Λx when y and x differ in a single node u only and x Pu = i. In this case problem (34) amounts to calculating ḡu (xu )+ v∈N (u) ḡuv (xu , yv ) . If this value is non-positive, xu must be excluded from Yu . The single node pruning can be applied to all pairs (u, i) exhaustively, but it is more efficient to keep track of the nodes for which sets Yv have changed (either due to a negative labeling pruning, active labels pruning in line 15 or the single node pruning itself) and check their neighbors. 8.4 Efficient Message Passing The main computational element in dual coordinate ascent solvers like TRWS or MPLP is passing a message, i.e., an update of the form mini∈Xu (fuv (i, j) + a(i)). In many practical cases the message passing for f can be computed in time linear in the number of labels [15, 28, 3]. This is the case when fuv is a convex function of i−j (e.g., |i−j|, (i−j)2 ) or a minimum of few such functions (e.g. Potts model is min(1, |i−j|)). However, in Algorithm 1 we need to solve the problem with the cost vector g = (I − P T )f , resp. ḡ (27) if we apply the reduction. It turns out that whenever there is a fast message passing method for f , the same holds for ḡ . 11 Our-CPLEX Our Algorithm 1 (Iterative Relaxed Inference) usOur-TRWS [43]-CPLEX [43]-TRWS ε-L1 [35] Kovtun[24] MQPBO MQPBO-10 ing CPLEX [17]. Our Algorithm 4 using TRW-S [20]. Initial solution uses at most 1000 iterations (or the method has converged). All speedups. Method [43] with CLPEX. Method [43] with TRW-S. Single LP formulation of the maximum strong persistency [35] solved with CPLEX. One-against-all method of Kovtun [25]. Multilabel QPBO [19]. MQPBO with 10 random permutations, accumulating persistency. TABLE 1: List of Evaluated Methods Theorem 8.2 (Fast message passing). Message passing for an edge term ḡuv (27) can be reduced to that for fuv in time O(|Yu |+ |Yv |). Proof in Table 6. This complexity is proportional to the size of the sets Yu . The more labels are pruned from sets Yu in the course of the algorithm, the less work is required. Note, that contrary to limiting the number of iterations of a dual solver, described in § 7, the speedups presented in this section do not sacrifice the persistence maximality (6). In our experiments for some instances, Algorithm 4 finished before ever reaching step 15. In such cases the found substitution p ∈ Sf is the maximum. 9 E XPERIMENTAL E VALUATION1 In the experiments we study how well we approximate the maximum persistency [35], Table 2; illustrate the contribution of different speedups, Table 4; give an overall performance comparison to a larger set of relevant methods, Table 3; and provide a more detailed direct comparison to the most relevant scalable method [43] using exact and approximate LP solvers, Table 5. As a measure of persistency we use the percentage of labels eliminated by the improving substitution p: P v∈V |Xv \pv (Xv )| P v∈V (|Xv |−1) 9.1 = P |Yv | P v∈V . v∈V (|Xv |−1) (35) Random Instances Table 2 gives comparison to [43] and [35] on random instances generated as in [35] (small problems on 4-connected grid with uniformly distributed integer potentials for “full” model and of the Potts type for “Potts” model, all not LP-tight). It can be seen that our exact Algorithm 1 performs identically to the ε-L1 formulation [35]. Although it solves a series of LPs, as opposed to a single LP solved by ε-L1, it scales better to larger instances. Instances of size 20x20 in the ε-L1 formulation are already too difficult for CPLEX: it takes excessive time and sometimes returns a computational error. The performance of the dual Algorithm 4 confirms that we loose very little in terms of persistency but gain significantly in speed. 1 The implementation of our method is available through http://cmp.felk. cvut.cz/∼shekhovt/persistency 9.2 Benchmark Problems Table 3 summarizes average performance on the OpenGM MRF benchmark [18]. The datasets include previous benchmark instances from computer vision [45] and protein structure prediction [29, 51] as well as other models from the literature. Results per instance are given in § B. 9.3 Speedups In this experiment we report how much speed improvement was achieved with each subsequent technique of § 8. The evaluation in Table 4 starts with a basic implementation (using only a warm start). The solver is allowed to run at most 50 iterations in the partial optimality phase until pruning is attempted. We expect that on most datasets the percentage of persistent labels improves when we apply the speedups (since they are without loss of maximality). 9.4 Discussion Tables 2 and 5 demonstrate that Our-TRWS, which is using a suboptimal dual solver, closely approximates the maximum persistency [35]. Our method is also significantly faster and scales much better. The method [43] is the closest contender to ours in terms of algorithm design. Tables 2, 3 and 5 clearly show that our method determines a larger set of persistent variables. This holds true with exact (CPLEX) as well as approximate (TRWS) solvers. There are two reasons for that as discusssed in § 4.3. First, we optimize over a larger set of substitutions than [43], i.e., we identify per-label persistencies while [43] is limited to the whole-variable persistencies. Second, even in the case of the whole-variable persistencies the criterion in [43] is in general weaker than (18) and depends on the initial reparametrization of the problem. This later difference does not matter for Potts models [44], the examples Figs. 6 and 8, but does matter, e.g., in Fig. 9. Although our method searches over a significantly larger space of possible substitutions, it needs fewer TRW-S iterations due to speedup techniques. Details on iteration counts can be found in § B. In the comparison of running time it should be taken into account that different methods are optimized to a different degree. Nevertheless, it is clear that the algorithmic speedups were crucial in making the proposed method much more practical than [43] and [35] while maintaining high persistency recall quality. To provide more insights to the numbers reported, we illustrate in Figs. 1 and 6 to 9 some interesting cases. Fig. 6 shows “the hardest” instance of color-seg-n4 family. Identified persistencies allow to fix a single label in most of the pixels, but for some pixels more than one possible label remains. The remainder of the problem has the reduced search space p(X ), which can be passed to further solvers. The tsukuba image Fig. 1 is interesting because it has appeared in many previous works. The performance of graph-cut based persistency methods relies very much on strong unary costs, while the proposed method is more robust. Fig. 7 shows an easy example from object-seg, where LP relaxation is tight, the dual solver finds the optimal labeling y and our verification LP confirms that this solution is unique. In Fig. 8 we show a hard instance of mrf-stereo. Partial reason for its hardness is integer costs, leading to non-uniqueness of the optimal solution. In Fig. 9, photomontage/pano instance, we report 79% solution completeness, but most of these 79% correspond to trivial forbidden labels in the problem (very big unary costs). At the same time other methods perform even worse. This problem 12 Problem family 10x10 Potts-3 10x10 full-3 20x20 Potts-3 20x20 full-3 20x20 Potts-4 20x20 full-4 [43]-CPLEX 0.18s 58.46% 0.24s 2.64% 3.25s 73.95% 2.81s 0.83% 12.45s 23.62% 3.96s 0.01% [43]-TRWS 0.05s 58.38% 0.09s 1.22% 0.21s 68.49% 0.37s 0.83% 0.39s 18.43% 0.39s 0.01% ε-L1 [35] 0.05s 72.27% 0.06s 62.90% 0.87s 87.38% 0.95s 72.66% 19.40s 74.28% 21.08s 6.58% Our-CPLEX 0.18s 72.27% 0.24s 62.90% 2.43s 87.38% 3.03s 72.66% 8.56s 74.28% 12.41s 6.58% Our-TRWS 0.04s 72.21% 0.05s 62.57% 0.06s 87.38% 0.07s 72.31% 0.08s 73.63% 0.08s 6.58% TABLE 2: Performance evaluation on random instances of [35]. For each problem family (size, type of potentials and number of labels) average performance over 100 samples is given. To allow for precise comparison all methods are initialized with the same test labeling y found by LP relaxation. Our-TRWS closely approximates Our-CPLEX, which matches ε-L1 [35], and scales much better. Problem family #I #L #V MQPBO MQPBO-10 Kovtun[24] mrf-stereo 3 16-60 > 100000 † † 1.0s 0.23% mrf-photomontage 2 5-7 ≤ 514080 93s 22% 866s 16% 0.4s 15.94% color-seg 3 3-4 ≤ 424720 22s 11% 87s 16% 0.3s 98% color-seg-n4 9 3-12 ≤ 86400 22s 8% 398s 14% 0.2s 67% ProteinFolding 21 ≤ 483 ≤ 1972 685s 2% 2705s 2% 0.02s 4.56% object-seg 5 4-8 68160 3.2s 0.01% † 0.1s 93.86% [43]-TRWS Our-TRWS 2.5h 13% 117s 73.56% 3.7h 16% 483s 41.98% 1.3h 99.88% 61.8s 99.95% 321s 90% 4.9s 99.26% 48s 18% 9.2s 55.70% 138s 98.19% 2.2s 100% TABLE 3: Performance on OpenGM benchmarks. Columns #I,#L,#V denote the number of instances, labels and variables respectively. For each method an average over all instances in a family is reported. † – result is not available (memory / implementation limitation). Instance Initialization Extra time for persistency (1000 it.) no speedups +reduction +node pruning +labeling pruning +fast msgs Protein folding 1CKK 8.5s 268s (26.53%) 168s (26.53%) 2.0s (26.53%) 2.0s (26.53%) 2.0s (26.53%) colorseg-n4 pfau-small 9.3s 439s (88.59%) 230s (93.41%) 85s (93.41%) 76s (93.41%) 19s (93.41%) TABLE 4: Evaluation of speedups on selected examples: computational time drops, as from left to right we add techniques described in § 6. 1CKK: an example when the final time for persistency is only a fraction of the initialization time. pfau-small: an example when times for initialization and persistency are comparable; speedups also help to improve the persistency as they are based on exact criteria. Instance 1CKK 1CM1 1SY9 2BBN PDB1B25 PDB1D2E #L #V [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS ≤ 445 38 2503s 0% 46s 0% 2758s 27% 8.5+2s 26.53% ≤ 350 37 2388s 0% 51s 0% 4070s 34% 9+3.9s 29.97% ≤ 425 37 1067s 0% 67s 0% 2629s 51% 11+4.2s 57.98% ≤ 404 37 9777s 0% 5421s 0% 9677s 9% 16+4.3s 14.17% ≤ 81 1972 325s 22% 120s 22% 1599s 84% 4.3+7.3s 87.84% ≤ 81 1328 483s 59% 83s 59% 154s 98% 1.6+1.8s 98.25% TABLE 5: Comparison to [43] using exact and approximate LP solvers. Examples of hard ProteinFolding instances [29, 51]. For Our-TRWS the initialization + persistency time is given. An occasionally better persistency of Our-TRWS vs. Our-CPLEX is explained by different test labelings produced by the CPLEX and TRW-S solvers (unlike in Table 2). The results of ε-L1 [35] wold be identical to Our-CPLEX, as has been proven and verified on random instances. has hard interaction constraints. It seems that hard constraints and ambiguous solutions pose difficulties to all methods including ours. 10 C ONCLUSIONS AND O UTLOOK We presented an approach to find persistencies for an exp-APXcomplete problem employing only solvers for a convex relaxation. Using a suboptimal solver for the relaxed problem, we still correctly identify persistencies while the whole approach becomes scalable. Our method with an exact solver matches the maximum persistency [35] and with a suboptimal solver closely approximates it, outperforming state of the art persistency techniques [43, 19, 25]. The speedups we have developed allow to achieve this at a reasonable computational cost making the method much more practical than the works [35, 43] we build on. In fact, our approach takes an approximate solver, like TRW-S, and turns it into a method with partial optimality guarantees at a reasonable computational overhead. We believe that many of the presented results can be extended to higher order graphical models and tighter relaxations. Practical applicability with other approximate solvers can be explored. A further research direction that seems promising is mixing different optimization strategies such as persistency and cutting plane methods. ACKNOWLEGEMENT Alexander Shekhovtsov was supported by the Austrian Science Fund (FWF) under the START project BIVISION, No. Y729. Paul Swoboda and Bogdan Savchynskyy were supported by the German Research Foundation (DFG) within the program “Spatio-/Temporal Graphical Models and Applications in Image Analysis”, grant GRK 1653. Bogdan Savchynskyy was also supported by European Research Council (ERC) under the European Unions Horizon 2020 research and innovation program (grant agreement No 647769). R EFERENCES [1] OpenGM benchmark. http://hci.iwr.uni-heidelberg.de/opengm2/ ?l0=benchmark. 13 Kovtun[24]: 1s, 5.6% [43]-TRWS: 13 min 10.43% Ours: 10+12s, 93.4% Ours, remainder 12 11 10 9 8 7 6 5 4 3 2 1 0 Fig. 6: Performance on a hard segmentation problem. The remainder of the problem visualizes |pu (Xu )| for all pixels. The result of the improved method [44]-TRWS is the same as [43]-TRWS, because this is a Potts model. object-seg [24]: 0.2s, 80.5% Ours: 1.4s, 100% (LP-tight) Fig. 7: Examples of an easy problem, object-seg. TRWS finds the optimal solution (zero integrality gap) and therefore our method as well as [43]-TRWS, [44]-TRWS report 100%. mrf-stereo [43]-TRWS: 1h, 38% Ours: 62+180s, 75% Ours, remainder Fig. 8: Examples of a hard stereo problem, ted-gm. Method of Kovtun[24] gives 0.42% in 2.5s and is therefore not displayed. The result [44]-TRWS is the same as [43]-TRWS, because this is a Potts model too. [2] Adams, W. P., Lassiter, J. B., and Sherali, H. D. (1998). Persistency in 0-1 polynomial programming. Mathematics of Operations Research, 23(2):359–389. [3] Aggarwal, A., Klawe, M. M., Moran, S., Shor, P., and Wilber, R. (1987). Geometric applications of a matrix-searching algorithm. Algorithmica, 2(1):195–208. [4] Alahari, K., Kohli, P., and Torr, P. H. S. (2008). Reduce, reuse & recycle: Efficiently solving multi-label MRFs. In CVPR. [5] Boros, E. and Hammer, P. L. (2002). Pseudo-Boolean optimization. Discrete Applied Mathematics. [6] Boykov, Y., Veksler, O., and Zabih, R. (2001). Fast approximate energy minimization via graph cuts. IEEE Trans. Pattern Anal. Mach. Intell., 23(11):1222–1239. [7] Choi, J. and Rutenbar, R. A. (2012). Hardware implementation of MRF MAP inference on an FPGA platform. In Field Programmable Logic, pages 209–216. IEEE. [8] Cooper, M., de Givry, S., Sanchez, M., Schiex, T., Zytnicki, M., and Werner, T. (2010). Soft arc consistency revisited. Artificial Intelligence, 174(78):449 – 478. [9] de Givry, S., Prestwich, S. D., and O’Sullivan, B. (2013). Deadend elimination for weighted CSP. In Schulte, C., editor, CP, volume 8124 of Lecture Notes in Computer Science, pages 263– 272. Springer. [10] Desmet, J., Maeyer, M. D., Hazes, B., and Lasters, I. (1992). The dead-end elimination theorem and its use in protein side-chain positioning. Nature, 356. [11] Freuder, E. C. (1991). Eliminating interchangeable values in constraint satisfaction problems. In Proceedings of the Ninth National Conference on Artificial Intelligence - Volume 1, AAAI’91, pages 227–233. AAAI Press. [12] Globerson, A. and Jaakkola, T. (2007). Fixing max-product: Convergent message passing algorithms for MAP LP-relaxations. In NIPS. [13] Goldstein, R. F. (1994). Efficient rotamer elimination applied to protein side-chains and related spin glasses. Biophysical Journal, 66(5):1335–1340. [14] Gridchyn, I. and Kolmogorov, V. (2013). Potts model, parametric maxflow and k-submodular functions. In ICCV. [15] Hirata, T. (1996). A unified linear-time algorithm for computing distance maps. Information Processing Letters, 58(3):129 – 133. [16] Hurkat, S., Choi, J., Nurvitadhi, E., Martınez, J. F., and Rutenbar, R. A. (2012). Fast hierarchical implementation of sequential treereweighted belief propagation for probabilistic inference. In Field Programmable Logic. [17] ILOG, Inc. ILOG CPLEX: High-performance software for mathematical programming and optimization. See http://www.ilog. com/products/cplex/. [18] Kappes, J. H., Andres, B., Hamprecht, F. A., Schnörr, C., Nowozin, S., Batra, D., Kim, S., Kausler, B. X., Kröger, T., Lellmann, J., Komodakis, N., Savchynskyy, B., and Rother, C. (2015). A comparative study of modern inference techniques for structured discrete energy minimization problems. International Journal of Computer Vision, pages 1–30. [19] Kohli, P., Shekhovtsov, A., Rother, C., Kolmogorov, V., and Torr, P. (2008). On partial optimality in multi-label MRFs. In ICML. [20] Kolmogorov, V. (2006). Convergent tree-reweighted message passing for energy minimization. PAMI, 28(10). [21] Kolmogorov, V. (2012). Generalized roof duality and bisubmodular functions. Discrete Applied Mathematics, 160(4-5):416–426. [22] Kolmogorov, V. (2013). Reweighted message passing revisited. ArXiv e-prints. [23] Kolmogorov, V. and Zabin, R. (2004). What energy functions can be minimized via graph cuts? PAMI, 26(2):147–159. [24] Kovtun, I. (2003). Partial optimal labeling search for a NP-hard subclass of (max, +) problems. In DAGM-Symposium, pages 402– 409. [25] Kovtun, I. (2011). Sufficient condition for partial optimality for (max, +) labeling problems and its usage. Control Systems and Computers, 2. Special issue. [26] Lecoutre, C., Roussel, O., and Dehani, D. E. (2012). WCSP integration of soft neighborhood substitutability. In Milano, M., editor, CP, volume 7514 of Lecture Notes in Computer Science, pages 406–421. Springer. [27] Li, M., Shekhovtsov, A., and Huber, D. (2016). Complexity of discrete energy minimization problems. In European Conference on Computer Vision, pages 834–852. [28] Meijster, A., Roerdink, J. B. T. M., and Hesselink, W. H. (2000). A General Algorithm for Computing Distance Transforms in Linear Time, pages 331–340. Springer US, Boston, MA. [29] PIC2011. The probabilistic inference challenge (PIC2011). http: 14 mrf-photomontage 7 Kovtun [24]: 0.5s, 27.5% [44]-TRWS: 3h, 37.75% Ours, remainder: 130+390s, 79.2% 6 5 4 3 2 1 0 Fig. 9: Example of a very hard instance, photomontage. The number of views covering a pixel is usually smaller than the total number of views = number of labels. The 79% by our method mostly originate from the elimination of these redundant labels. The result of [43]-TRWS gives 27.55% (visually same as Kovtun [24]) in 3.9h. [44]-TRWS improves on this due to choosing the optimal reparametrization [44]. Note that our partial labeling (the part with one label remaining) is larger. //www.cs.huji.ac.il/project/PASCAL/. [30] Rother, C., Kolmogorov, V., Lempitsky, V. S., and Szummer, M. (2007). Optimizing binary MRFs via extended roof duality. In CVPR. [31] Savchynskyy, B., Kappes, J., Schmidt, S., and Schnörr, C. (2011). A study of Nesterov’s scheme for Lagrangian decomposition and MAP labeling. In CVPR. [32] Savchynskyy, B., Schmidt, S., Kappes, J. H., and Schnörr, C. (2012). Efficient MRF energy minimization via adaptive diminishing smoothing. In UAI. [33] Schlesinger, M. I. and Antoniuk, K. V. (2011). Diffusion algorithms and structural recognition optimization problems. Cybernetics and Sys. Anal., 47(2):175–192. [34] Shekhovtsov, A. (2013). Exact and Partial Energy Minimization in Computer Vision. PhD Thesis CTU–CMP–2013–24, CMP, Czech Technical University in Prague. [35] Shekhovtsov, A. (2014a). Maximum persistency in energy minimization. In CVPR. [36] Shekhovtsov, A. (2014b). Maximum persistency in energy minimization. Technical report, Graz University of Technology. [37] Shekhovtsov, A. (2015). Higher order maximum persistency and comparison theorems. CVIU. accepted. [38] Shekhovtsov, A., Reinbacher, C., Graber, G., and Pock, T. (2016). Solving dense image matching in real-time using discretecontinuous optimization. In Computer Vision Winter Workshop, page 13. [39] Shekhovtsov, A., Swoboda, P., and Savchynskyy, B. (2015a). Maximum persistency via iterative relaxed inference with graphical models. In CVPR. [40] Shekhovtsov, A., Swoboda, P., and Savchynskyy, B. (2015b). Maximum persistency via iterative relaxed inference with graphical models. CoRR, abs/1508.07902. [41] Shlezinger, M. (1976). Syntactic analysis of two-dimensional visual signals in the presence of noise. Cybernetics and Systems Analysis, 4:113–130. See review [49]. [42] Swoboda, P., Savchynskyy, B., Kappes, J. H., and Schnörr, C. (2013). Partial optimality via iterative pruning for the Potts model. In SSVM. [43] Swoboda, P., Savchynskyy, B., Kappes, J. H., and Schnörr, C. (2014). Partial optimality by pruning for MAP-inference with general graphical models. In CVPR. [44] Swoboda, P., Shekhovtsov, A., Kappes, J. H., Schnorr, C., and Savchynskyy, B. (2016). Partial optimality by pruning for MAPinference with general graphical models. PAMI, 38(7):1370–1382. [45] Szeliski, R., Zabih, R., Scharstein, D., Veksler, O., Kolmogorov, V., Agarwala, A., Tappen, M. F., and Rother, C. (2008). A comparative study of energy minimization methods for Markov random fields with smoothness-based priors. PAMI, 30(6). [46] Vanderbei, R. J. (2001). Linear Programming: Foundations and Extensions. Department of operations and research and financial engineering, Princeton university. [47] Wainwright, M. J. and Jordan, M. I. (2008). Graphical models, exponential families, and variational inference. Found. Trends Mach. Learn., 1(1-2):1–305. [48] Wang, C. and Zabih, R. (2016). Relaxation-based preprocessing techniques for markov random field inference. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR). [49] Werner, T. (2007). A linear programming approach to max-sum problem: A review. PAMI, 29(7). [50] Windheuser, T., Ishikawa, H., and Cremers, D. (2012). Generalized roof duality for multi-label optimization: Optimal lower bounds and persistency. In ECCV. [51] Yanover, C., Schueler-Furman, O., and Weiss, Y. (2008). Minimizing and learning energy functions for side-chain prediction. Jour. of Comp. Biol., 15(7). [52] Zach, C. (2014). A principled approach for coarse-to-fine MAP inference. In CVPR. A PPENDIX A P ROOFS Proposition 5.2. Arc consistency is a necessary condition for relative interior optimality: if Ov (ϕ) = Ov∗ for all v ∈ V then f ϕ is arc consistent. Proofs of the Generic Algorithms Proof. Condition Ov (ϕ) = Ov∗ implies that ϕ satisfies strict complementarity with some primal optimal solution µ. The strict complementarity implies that (∀i ∈ Xv ) (fuϕ (i) = 0 ⇒ µu (i) > 0). By feasibility of µ, there must hold (∀v ∈ N (u)) (∃j ∈ Xv ) µuv (i, j) > 0. And by using complementary slackness again, it must be that ϕ fuv (i, j) = 0. Similarly, the second condition of arc consistency is verified. It follows that f ϕ is arc consistent. Proposition 4.3. For a given substitution p, let O∗ ⊆ Λ denote the set of minimizers of the verification LP (18) and Ov∗ := {i ∈ Xv | (∃µ ∈ O∗ ) µv (i) > 0}, (19) which is the support set of all optimal solutions in node v . Then p ∈ Sf iff (∀v ∈ V ∀i ∈ Ov∗ ) pv (i) = i. Proof. Direction ⇒. Let p ∈ Sf . Assume for contradiction that (∃v ∈ V ∃i ∈ Ov∗ ) pv (i) 6= i. Since i ∈ Ov∗ there exists µ ∈ O∗ such that µv (i) > 0. Its image µ0 = [p]µ has µv (i) = 0 due to pv (i) 6= i by evaluating the extension (10). This contradicts [p]µ = µ. Direction ⇐. Now let (∀v ∈ V ∀i ∈ Ov∗ ) pv (i) = i. Clearly, [p]µ = µ holds for all µ on the support set given by (Ov∗ | v ∈ V), hence for O∗ . It remains to show that the value of the minimum in (18) is zero. For µ ∈ O∗ we have [p]µ = µ and the objective in (18), h(I − [p])T f, µi = hf, µ − [p]µi vanishes. Proofs of the Reduction The proof of the reduction Theorem 6.2 and Lemma 8.1 (used in speed-up heuristics) requires several intermediate results. Recall that a correct pruning can be done when we have a guarantee to preserve all strictly improving substitutions q , assuming q ≤ p. Therefore statements in this section are formulated for such pairs. We will consider adjustments to the cost vector that preserve the set of strictly improving substitutions. These adjustments do not in general preserve optimal solutions to the associated LP relaxation. Theorem 4.6. Substitution p returned by Algorithm 1 is the maximum of Sf ∩ P 2,y and thus it solves (6). Lemma A.4. Let q ≤ p. Then q ∈ Sf iff q ∈ Sg for g = (I − [p])T f . Proof. Let Q = [q], P = [p]. Since q ≤ p there holds P Q = P . It implies (I − P )(I − Q) = (I − Q). Therefore, Proof. The two following lemmas form a basis for the proof. Lemma A.1 ([36], Thm. 3(b)). Let q ∈ Sf ; q ≤ p and let O∗ = argminµ∈Λ h(I − [p])> f, µi, i.e., as in line 4 of Algorithm 1. Then (∀µ ∈ O∗ ) [q]µ = µ. hg, (I − Q)µi = h(I − P )T f, (I − Q)µi = hf, (I − P )(I − Q)µi = hf, (I − Q)µi. In the case of substitutions from the class P 2,y , the statement additionally simplifies as follows. Assume µ ∈ Λ is such that Qµ 6= µ. Equality (39) ensures that hg, (I − Q)µi > 0 iff hf, (I − Q)µi > 0. The theorem follows from definition of Sf , Sg . To reformulate the condition q ∈ Sf we will use the following dual characterization. Corollary A.2. Assume conditions of Lemma A.1 and additionally, let q ∈ P 2,y and Ov∗ := {i ∈ Xv | (∃µ ∈ O∗ ) µv (i) > 0} then (∀v ∈ V, ∀i ∈ Ov∗ ) qv (i) = i. (36) (39) (40) Theorem A.5 (Characterization [36]). Let P = [p]. Then (∀µ ∈ Λ) hf, P µi ≤ hf, µi Proof. It follows similarly to Corollary 4.4. Assume for contradiction that (∃v ∈ V ∃i ∈ Ov∗ ) qv (i) 6= i. Since i ∈ Ov∗ there exists µ ∈ O∗ such that µv (i) > 0. It’s image µ0 = [q]µ has µv (i) = 0 due to qv (i) 6= i by evaluating the extension (10). This contradicts to [q]µ = µ, the statement of Lemma A.1. iff there exists a reparametrization ϕ such that Lemma A.3. Let pt denote the substitution p computed in line 3 of Algorithm 1 on iteration t. The algorithm maintains the invariant that (∀q ∈ Sf ∩ P 2,y ) q ≤ pt . The following lemma assumes an arbitrary substitution q , not necessarily in P 2,y and takes as input sets Uu that are subsets of immovable labels. In the context of Theorem 6.2, we will use Uu = Xu \Yu . Proof. We prove by induction. The statement holds trivially for the first iteration. Assume it is true for the current iteration t. Then for any q ∈ Sf ∩ P 2,y holds q ≤ pt and therefore Corollary A.2 applies. We can show that line 8 only prunes substitutions that are not in Sf ∩ P 2,y as follows. Let pt+1 be the substitution on the next iteration, i.e. computed by line 3 after pruning line 8. Assume for contradiction that ∃q ∈ Sf ∩P 2,y such that q 6≤ pt+1 . By negating the definition and expanding, Lemma A.6 (Reduction 1). For a substitution q let Uu ⊆ {i ∈ Xu | qu (i) = i} for all u ∈ V . Let guv (i, j) = 0 for all (i, j) ∈ Uu × Uv and let ḡ be defined by (∃v ∈ V) pt+1 v (Xv ) 6⊆ qv (Xv ), P Tf ϕ ≤ f ϕ. ḡv = gv , v ∈ V;  min g (i0 , j), i ∈ Uu , j ∈ / Uv ,  i0 ∈Uu uv 0 guv (i, j ), i ∈ / Uu , j ∈ Uv , g uv (i, j) = min  j 0 ∈Uv guv (i, j), otherwise. (37a) ⇔ (∃v ∈ V ∃i ∈ Xv ) i ∈ pt+1 v (Xv ) ∧ i 6∈ qv (Xv ), (37b) ⇔ (∃v ∈ V ∃i ∈ Xv ) pt+1 v (i) = i ∧ qv (i) 6= i. (37c) (42) (43a) (43b) Then q ∈ Sg iff q ∈ Sḡ . Proof. Direction ⇐. Let us verify the following inequality: (∀ij ∈ Xuv ) guv (qu (i), qv (j)) − ḡuv (qu (i), qv (j)) ≤ guv (i, j) − ḡuv (i, j). If i was pruned in line 8, i ∈ Ov∗ , then it must be that qv (i) = i, which contradicts to (37c). Therefore (∃v ∈ V ∃i ∈ Xv \Ov∗ ) pt+1 v (i) = i ∧ qv (i) 6= i. (41) (44) We need to consider only cases where ḡuv (i, j) 6= guv (i, j). Let i ∈ Uu and j ∈ / Uv (the remaining case is symmetric). In this case qu (i) = i. Substituting ḡ we have to prove (38) t t However, in this case pt+1 v (i) = pv (i) = i and q ≤ p fails to hold, which contradicts to the assumption of induction. Therefore q ≤ pt+1 holds by induction on every iteration. By Proposition 4.5 the algorithm terminates and returns a substitution in Sf ∩ P 2,y . By Lemma A.3 the returned substitution p satisfies p ≥ q for all q ∈ Sf ∩ P 2,y . It is the maximum. guv (i, qv (j)) − min guv (i0 , qv (j)) 0 i ∈Uu (45) ≤guv (i, j) − min guv (i0 , j). 0 i ∈Uu The left hand side is zero because all the respective components of g are zero by assumption. At the same time the right hand side is 15 ϕ ϕ b + c − a = d¯. We proved that ḡuv (qu (i), qv (j)) ≤ ḡuv (i, j). In total, ϕ ḡ satisfies all component-wise inequalities, same as g ϕ in (48). By Theorem A.5, it follows that hḡ, (I − Q)µi ≥ 0. The strict inequality in case Qµ 6= µ is considered similarly to Lemma A.6. non-negative since i ∈ Uu . The inequality (44) holds. It implies (by multiplication with pairwise components of µ and using the equality of unary components of g and ḡ ) that (∀µ ∈ Λ) hg, Qµi − hḡ, Qµi ≤ hg, µi − hḡ, µi, (46) Theorem 6.2 (Reduction). Let p ∈ P 2,y and ḡ be the corresponding reduced cost vector constructed as in Def. 6.1. Let also q ∈ P 2,y , q ≤ p. Then q ∈ Sf iff q ∈ Sḡ . where Q = [q]. Note, cost vector ḡ satisfying (46) is called auxiliary for g in [25, 34]. Inequality (46) is equivalent to hḡ, (I − Q)µi ≤ hg, (I − Q)µi. Proof. Let g = (I − P )T f . By Lemma A.4, q ∈ Sf iff q ∈ Sg . We need to consider only pairwise terms. Let uv ∈ E . Since q ≤ p, if pu (i) = i then necessarily qu (i) = i. Let p be defined using sets Yu as in (7). The reduction ḡ in (27) will be composed of reductions by Lemma A.6 and Lemma A.7. From g = (I −P )T f we have that for i ∈ Xu \Yu and j ∈ Xv \Yv guv (i, j) = 0. Conditions of Lemma A.6 are satisfied with Uu = Xu \Yu . We obtain part of the reduction (27) for cases when i ∈ / Yu or j ∈ / Yv . Let us denote the reduced vector ḡ 0 . Applying Lemma A.7 to it, we obtain ḡ as defined in (27). (47) Whenever the left hand side of (47) is strictly positive then so is the right hand side and therefore from q ∈ Sḡ follows q ∈ Sg . Direction ⇒. Assume q ∈ Sg . By Theorem A.5, there exist dual multipliers ϕ such that g ϕ verifies inequality (42), in components: (∀u ∈ V, ∀i ∈ Xu ) guϕ (qu (i)) ≤ guϕ (i); ϕ ϕ (∀uv ∈ E, ∀ij ∈ Xuv ) guv (qu (i), qv (j)) ≤ guv (i, j). (48) Let us expand the pairwise inequality in the case i ∈ Uu , j ∈ / Uv . Let qv (j) = j ∗ . Using qu (i) = i we obtain ∗ Lemma 8.1. Let p ∈ P 2,y and ḡ be defined by (27) (depends on p). Let q ∈ Sf ∩ P 2,y , q ≤ p, Q = [q]. Let Λ0 ⊆ Λ, Q(Λ0 ) ⊆ Λ0 and O∗ = argminµ∈Λ0 hḡ, µi. Then (∀v ∈ V) qv (Ov∗ ) = Ov∗ . ∗ guv (i, j ) − ϕuv (i) − ϕvu (j ) ≤ guv (i, j) − ϕuv (i) − ϕvu (j); guv (i, j ∗ ) − ϕvu (j ∗ ) ≤ guv (i, j) − ϕvu (j). (49) (50) Proof. Let µ ∈ O∗ . Assume for contradiction that Qµ 6= µ. In this case, by Theorem 6.2, we have that hḡ, Qµi < hḡ, µi. Since µ ∈ Λ0 and Q(Λ0 ) ⊆ Λ there holds Qµ ∈ Λ0 . It follows that Qµ is a feasible solution of a better cost than µ which contradicts optimality of µ. It must be therefore that Qµ = µ. The claim q(Ov∗ ) = Ov∗ follows. (51) Termination with arc consistent Solvers We take min over i ∈ Uu of both sides: min guv (i, j ∗ ) − ϕvu (j ∗ ) ≤ min guv (i, j) − ϕvu (j). i∈Uu i∈Uu Finally we subtract ϕuv (i) on both sides and obtain ϕ ϕ ḡuv (i, j ∗ ) ≤ ḡuv (i, j). Theorem A.8. Consider the verification LP defined by g = (I − P T )f . Let g ϕ be an arc-consistent reparametrization and let Yu = {i | p(i) 6= i}. Then at least one of the two conditions is satisfied: ϕ (a) g∅ = 0 and ϕ is dual optimal; (b) (∃u ∈ V) Ou (ϕ) ∩ Yu 6= ∅. The case when i ∈ / Uu , j ∈ Uv is symmetric. In the remaining cases, ϕ ḡuv (i, j) = ḡ(i, j) − ϕuv (i) − ϕvu (j) = g(i, j) − ϕuv (i) − ϕvu (j) = g ϕ (i, j). In total, ḡ ϕ satisfies all component-wise inequalities that does g ϕ in (48). By Theorem A.5, (∀µ ∈ Λ) hḡ, Qµi ≤ hḡ, µi. (52) Proof. Assume (b) does not hold: (∀u ∈ V) Ou (ϕ) ⊆ Xu \Yu . For each node u let us chose a label zu ∈ Ou (ϕ). By arc consistency, for each edge uv there is a label j ∈ Ov (ϕ) ⊆ Xv \Yv such that ϕ guv (zu , j) is active and similarly, there exists i ∈ Ou (ϕ) ⊆ Xu \Yu ϕ such that guv (i, zv ) is active. By construction, guv (i0 , j 0 ) = 0 for all i0 j 0 ∈ Xuv \Yuv and therefore the following modularity equality holds: We have shown that hḡ, (I − Q)µi ≥ 0. It remains to prove that the inequality holds strictly when Qµ 6= µ. Since q ∈ Sg , there holds hg, µi < hQT g, µi. It is necessary that at least one of unary or pairwise inequalities (48) from the support of µ holds strictly in which case inequality (52) is also strict. Lemma A.7 (Reduction 2). For a substitution q and cost vector g let ḡ = g − ∆+ , where ∆+ ∈ RI+ has zero unary components and its pairwise components read:  ∆+ (53) uv (i, j) = max 0, guv (i, j) + guv (qu (i), qv (j)) ϕ ϕ guv (zu , zv ) + guv (i, j) (56) = 0 − ϕuv (zu ) − ϕuv (zv )) + 0 − ϕuv (i) − ϕuv (j) ϕ ϕ =guv (zu , j) + guv (i, zv ).  ϕ From guv (zu , j) being active we have − guv (i, qv (j)) − guv (qu (i), j) . ϕ ϕ guv (zu , j) ≤ guv (i, j). Then q ∈ Sg iff q ∈ Sḡ . ϕ guv (zu , zv ) (57) ϕ guv (i, zv ) Proof. The scheme of the proof is similar to Lemma A.6. The unary components of g and ḡ are equal. If we show inequality (44), the implication q ∈ Sḡ ⇒ q ∈ Sg will follow as in Lemma A.6. For our ḡ , inequality (44) reduces to By adding (56) and (57) we obtain ≤ and hence (zu , zv ) is active. Therefore δ(z) and dual point ϕ satisfy complementarity slackness and hence they are primal-dual optimal ϕ and g∅ = Eg (z) = 0. + ∆+ uv (qu (i), qv (j)) ≤ ∆uv (i, j) Lemma 5.4 (Correctness of Algorithm 2). If (∀v ∈ V) Ov (ϕ) ∩ Yv = ∅ holds for an arc consistent dual vector ϕ, then ϕ is optimal. (54) and due to idempotency of q the left hand side is identically zero. Therefore inequality (44) is verified. Direction ⇒. Assume q ∈ Sg . By Theorem A.5, there exist dual multipliers ϕ satisfying inequalities (48). Consider Proof. Corollary from Theorem A.8. Fast Message Passing (55) Theorem 8.2 (Fast message passing). Message passing for an edge term ḡuv (27) can be reduced to that for fuv in time O(|Yu | + |Yv |). Let us show that component-wise inequalities (48) hold for ḡ ϕ . Clearly they hold for unary components and for pairwise components + 0 where ∆+ uv (i, j) = 0. Let uv ∈ E and ∆uv (i, j) > 0. Let i = qu (i) and j 0 = qu (j). It must be that i0 6= i and j 0 6= j . Let us denote ϕ ϕ ϕ ϕ a = guv (i0 , j 0 ), b = guv (i0 , j), c = guv (i, j 0 ) and d = guv (i, j). ϕ Let d¯ := guv (i, j) − ∆+ (i, j) = d − (a + d − b − c) = b + c − a. uv From (48) we have that a ≤ b, c, d. It follows that 2a ≤ b + c or a ≤ Proof. The components of the reduced problem ḡ (27) can be expressed directly in components of f as in Table 6. Passing a message  on edge uv amounts to calculating ϕvu (j) := mini∈Xu a(i) + Xu ḡuv (i, j) for some vector a ∈ R . For j ∈ / Yv , substituting pairwise terms of ḡ , it expands as   ϕvu (j) := mini∈Xu a(i) + ∆uv (i) . (58) ḡ ϕ = (g − ∆+ )ϕ = g ϕ − ∆+ . 16 i∈ / Yu i ∈ Yu i∈Y / u , j ∈Y / v i∈Y / u , j∈Yv i∈Yu , j ∈Y / v i∈Yu , j∈Yv ḡu (i) = 0; ḡu (i) = fu (i) − fu (yu ); ḡuv (i, j) = 0; ∆uv (i) := ∆vu (j) := 0;   0 0 ∆vu (j) := mini0 ∈Y / u fuv (i , j) − fuv (i , yv ) , ḡuv (i, j) = ∆vu (j);   0 0 ∆uv (i) := minj 0 ∈Y / v fuv (i, j ) − fuv (yu , j ) , ḡuv (i, j) = ∆uv (i);  ḡuv (i, j) = min fuv (i, j) − fuv (yu , yv ), ∆vu (j) + ∆uv (i) . TABLE 6: Components of the Reduced Verification Problem Since the message is equal for all j ∈ / Yv , it is sufficient to represent it by ϕvu (yv ) (recall that yv ∈ / Yv ). For j ∈ Yv , substituting pairwise terms of ḡ and denoting c = fuv (yu , yv ),  ϕvu (j) := min mini∈Y (59) / u a(i) + ∆vu (j),    mini∈Yu a(i) + min fuv (i, j) − c, ∆uv (i) + ∆vu (j)  = min mini∈Y (60a) / u a(i) + ∆uv (j),   mini∈Yu a(i)+fuv (i, j) − c, (60b)   mini∈Yu a(i) + ∆uv (i) + ∆vu (j) (60c) Adding ∆uv (i) inside (60a) (it is zero for i ∈ / Yu ) and grouping (60a) and (60c) together, we obtain for j ∈ Yv , ϕvu (j) =    min min a(i)+fuv (i, j) − c, ϕuv (yv )+∆vu (j) . (61) i∈Yu Expression (60b) is a message passing for f , but the minimum is only over Yu and the result is needed only for j ∈ Yv . This message can be computed in time O(|Yu |+|Yv |) using the same algorithms [15, 28, 3] (see also non-uniform min-convolution in [52]). Evaluating (61) takes additional O(|Yv |) time and minimum in (58) takes O(|Yu |) time assuming that components of a(i) are equal for j ∈ / Yv (because it is already true for ḡ and ϕ). 17 A PPENDIX B R ESULTS P ER I NSTANCE Instance Algorithm Time needed overall (s) Time for initial solution (s) 1CKK Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS 2757.62 5.76 5670.00 825.00 2502.69 47.57 4070.00 6.03 5520.00 723.00 2388.46 51.33 2628.72 6.88 7494.00 2112.00 1067.46 66.73 9677.42 10.00 1736.00 2429.00 9776.60 54.21 36222.90 9.14 1008.00 1288.00 11419.60 55.26 1381.60 4.67 3728.00 540.00 1552.95 40.12 3628.90 5.83 5138.00 928.00 4618.78 41.87 7458.75 6.25 4961.00 1054.00 4473.58 61.92 5721.95 6.49 7228.00 1193.00 2163.98 44.07 12085.40 7.74 7516.00 1997.00 6137.07 93.87 3247.11 7.44 6709.00 1291.00 1776.23 44.71 1599.67 5.18 ProteinFolding 1177.62 5 5.00 3 0.00 0 0.00 0 2493.65 1 30.19 2 992.15 7 4.70 4 0.00 0 0.00 0 2198.04 3 21.60 3 416.74 5 5.50 4 0.00 0 0.00 0 910.90 4 46.77 5 5476.81 5 8.60 3 0.00 0 0.00 0 9771.18 1 42.90 2 6998.66 5 7.90 3 0.00 0 0.00 0 11409.90 2 39.60 2 765.84 4 3.91 4 0.00 0 0.00 0 1552.88 1 28.12 2 2546.68 5 5.20 3 0.00 0 0.00 0 4618.76 1 33.03 3 1996.55 5 5.30 4 0.00 0 0.00 0 4440.51 1 44.42 2 1946.20 6 4.80 6 0.00 0 0.00 0 2161.07 1 35.46 2 3007.95 6 6.50 3 0.00 0 0.00 0 6128.14 1 46.42 2 915.86 7 5.90 4 0.00 0 0.00 0 1598.07 2 25.52 2 55.01 28 2.92 18 1CM1 1SY9 2BBN 2BCX 2BE6 2F3Y 2FOT 2HQW 2O60 3BXL pdb1b25 18 #iterations #iterations Algorithm 1,2 TRWS † 1000+15 † † † 288+185 † 1000+65 † † † 242+358 † 1000+15 † † † 400+174 † 1000+10 † † † 242+146 † 1000+55 † † † 252+194 † 1000+60 † † † 363+230 † 1000+10 † † † 321+164 † 1000+25 † † † 398+222 † 1000+160 † † † 382+121 † 1000+55 † † † 352+369 † 1000+60 † † † 227+216 † 530+150 Logarithmic percentage partial optimality Percentage excluded labels 14.24% 13.83% 0.00% 0.00% 0.00% 0.00% 8.38% 8.07% 0.00% 0.00% 0.00% 0.00% 25.34% 28.06% 0.00% 0.00% 0.00% 0.00% 2.12% 2.64% 0.00% 0.00% 0.00% 0.00% 4.81% 4.39% 0.00% 0.00% 0.00% 0.00% 9.14% 8.96% 0.00% 0.00% 0.00% 0.00% 6.22% 8.39% 0.00% 0.00% 0.00% 0.00% 4.10% 4.01% 0.00% 0.00% 0.00% 0.00% 10.30% 8.33% 0.00% 0.00% 0.00% 0.00% 4.22% 4.94% 0.00% 0.00% 0.00% 0.00% 4.97% 4.66% 0.00% 0.00% 0.00% 0.00% 76.76% 83.00% 27.04% 26.53% 0.00% 0.00% 0.00% 0.00% 34.28% 29.98% 0.00% 0.00% 0.00% 0.00% 51.30% 57.98% 0.00% 0.11% 0.00% 0.00% 8.58% 14.17% 0.00% 0.00% 0.00% 0.00% 15.66% 14.21% 0.00% 0.00% 0.00% 0.00% 17.68% 15.12% 0.05% 0.00% 0.00% 0.00% 10.66% 13.74% 0.00% 0.05% 0.00% 0.00% 11.64% 11.01% 0.09% 0.07% 0.00% 0.00% 17.30% 18.08% 0.00% 0.00% 0.00% 0.00% 12.81% 15.55% 0.00% 0.00% 0.00% 0.00% 17.18% 12.35% 0.00% 0.00% 0.00% 0.00% 84.05% 87.84% Instance pdb1d2e pdb1fmj pdb1i24 pdb1iqc pdb1jmx pdb1kgn pdb1kwh pdb1m3y pdb1qks colseg-cow3 colseg-cow4 colseg-garden4 Algorithm Time needed overall (s) Time for initial solution (s) MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS Our-CPLEX Our-TRWS MQPBO-10 MQPBO [43]-CPLEX [43]-TRWS 27.00 2.00 324.64 119.71 154.76 1.67 12.00 0.00 483.55 83.82 99.33 1.05 6.00 0.00 77.30 16.67 0.06 3.00 0.00 5.66 0.82 111.58 0.74 8.00 0.00 229.09 36.03 142.20 0.67 8.00 0.00 121.71 20.02 196.03 1.37 9.00 0.00 161.57 53.49 105.77 0.46 5.00 0.00 51.33 9.15 73.60 0.79 8.00 0.00 120.60 28.19 138.12 0.30 9.00 0.00 96.77 27.99 Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS 66.30 1.00 206.00 24.00 7530.72 91.26 2.00 46.00 40.00 7395.03 0.49 0.00 14.00 1.00 33.68 0.00 0.00 72.11 27.62 25.44 1.13 0.00 0.00 34.59 6.16 12.35 0.60 0.00 0.00 16.97 3.10 0.02 0.00 0.00 5.66 0.82 18.51 0.40 0.00 0.00 24.36 4.06 15.52 0.29 0.00 0.00 16.21 3.59 17.97 0.76 0.00 0.00 24.37 6.45 9.63 0.27 0.00 0.00 12.89 2.43 18.58 0.65 0.00 0.00 25.18 4.82 15.19 0.12 0.00 0.00 15.82 3.24 color-seg 48.10 0.00 0.00 0.00 690.55 48.31 0.00 0.00 0.00 742.58 0.15 0.00 0.00 0.00 6.75 19 0 0 14 14 5 7 0 0 25 47 7 14 0 0 11 11 2 0 0 0 0 5 8 0 0 20 28 9 10 0 0 19 24 10 9 0 0 12 17 10 8 0 0 9 8 3 3 0 0 14 12 8 4 0 0 12 15 † † † 443+1238 † 420+75 † † † 190+2775 † 540+135 † † † 186+677 60+5 † † † 115+0 † 200+35 † † † 169+2058 † 200+75 † † † 188+1098 † 400+170 † † † 268+1824 † 440+50 † † † 208+401 † 340+10 † † † 200+1135 † 80+20 † † † 161+1154 Logarithmic percentage partial optimality 0.00% 0.00% 18.84% 18.92% 97.30% 96.97% 0.00% 0.00% 55.53% 55.69% 92.58% 83.18% 0.00% 0.00% 15.94% 16.18% 99.73% 0.00% 0.00% 100.00% 100.00% 99.10% 96.39% 0.00% 0.00% 35.32% 40.50% 97.24% 93.46% 0.00% 0.00% 35.86% 35.26% 89.22% 88.92% 0.00% 0.00% 39.42% 13.20% 79.09% 76.53% 0.00% 0.00% 25.54% 25.43% 98.54% 97.53% 0.00% 0.00% 31.05% 31.08% 98.30% 98.57% 0.00% 0.00% 28.18% 30.63% 6 0 0 0 14 13 0 0 0 10 5 0 0 0 5 1000+140 † † † 826+6056 1000+310 † † † 848+6349 70+20 † † † 167+488 99.96% 0.00% 0.00% 0.00% 99.95% 99.92% 0.00% 0.00% 0.00% 99.80% 99.91% 0.00% 0.00% 0.00% 99.89% #iterations #iterations Algorithm 1,2 TRWS Percentage excluded labels 2.53% 1.99% 22.32% 22.34% 97.98% 98.25% 4.61% 2.74% 58.94% 58.98% 94.90% 87.09% 2.92% 2.04% 18.83% 18.91% 99.94% 2.85% 3.43% 100.00% 100.00% 99.63% 97.10% 6.06% 4.90% 41.15% 45.56% 98.69% 95.83% 3.76% 3.73% 39.98% 39.12% 93.23% 93.16% 3.24% 2.27% 39.67% 13.36% 85.64% 83.26% 2.99% 3.43% 31.15% 31.13% 99.47% 99.08% 6.38% 5.72% 27.97% 27.98% 98.93% 99.38% 5.09% 3.68% 26.37% 28.46% 99.97% 99.89% 43.55% 32.06% 99.95% 99.93% 99.90% 0.56% 0.37% 99.80% 99.94% 94.96% 4.27% 0.21% 99.89% Instance Algorithm Time needed overall (s) clownfish-small Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS Our-TRWS Kovtun[24] MQPBO-10 MQPBO [43]-TRWS 1.72 1.00 536.00 41.00 151.98 1.87 1.00 577.00 33.00 677.08 0.57 0.00 37.00 3.00 31.28 1.28 1.00 607.00 31.00 13.75 2.48 1.00 510.00 19.00 846.27 1.21 0.00 193.00 13.00 15.67 18.77 1.00 591.00 16.00 799.08 0.79 0.00 7.00 1.00 46.20 1.35 1.00 528.00 39.00 311.54 Our-TRWS MQPBO-10 MQPBO [43]-TRWS Our-TRWS MQPBO-10 MQPBO [43]-TRWS 286.40 1087.00 90.00 12726.45 320.00 646.00 97.00 14360.45 Our-TRWS [43]-TRWS Our-TRWS [43]-TRWS Our-TRWS [43]-TRWS 231.97 3837.51 19.75 9277.99 108.73 14737.47 crops-small fourcolors lake-small palm-small penguin-small pfau-small snail strawberry-glass-2-small family-gm pano-gm ted-gm tsu-gm ven-gm Time for initial solution (s) Logarithmic percentage partial optimality Percentage excluded labels 80+10 † † † 223+610 120+5 † † † 260+3578 20+5 † † † 34+238 50+5 † † † 95+-95 160+10 † † † 291+4582 90+5 † † † 152+-152 950+470 † † † 654+10857 50+5 † † † 83+332 80+5 † † † 259+1721 >99.99% 0.00% 0.00% 0.00% 99.97% 100.00% 0.00% 0.00% 0.00% 99.00% 99.96% 0.00% 0.00% 0.00% 99.92% 100.00% 0.00% 0.00% 0.00% 100.00% >99.99% 0.00% 0.00% 0.00% 98.20% 100.00% 0.00% 0.00% 0.00% 100.00% 89.43% 0.00% 0.00% 0.00% 10.43% 99.99% 0.00% 0.00% 0.00% 99.98% 100.00% 0.00% 0.00% 0.00% 99.31% >99.99% 74.11% 15.83% 4.67% 99.97% 100.00% 64.70% 14.32% 0.71% 99.00% 99.97% 69.52% 0.00% 0.00% 99.92% 100.00% 74.87% 15.31% 6.65% 100.00% >99.99% 68.65% 0.48% 0.00% 98.20% 100.00% 91.99% 1.42% 1.03% 100.00% 93.41% 5.59% 0.70% 0.00% 10.43% 99.99% 97.77% 77.91% 58.35% 99.98% 100.00% 54.99% 2.78% 0.00% 99.31% 1000+1265 † † 1015+22483 1000+1105 † † 911+11193 4.75% 0.00% 0.00% 4.41% 67.73% 0.00% 0.00% 27.55% 4.80% 4.41% 4.34% 4.41% 79.17% 28.06% 40.37% 27.55% 1000+715 689+10383 670+75 377+17421 1000+40 993+16592 67.27% 38.13% 99.91% 0.39% 0.01% 0.00% 72.05% 38.13% 99.94% 0.39% 0.02% 0.00% #iterations #iterations Algorithm 1,2 TRWS color-seg-n4 0.68 3 0.00 0 0.00 0 0.00 0 30.01 6 1.02 2 0.00 0 0.00 0 0.00 0 34.88 40 0.08 2 0.00 0 0.00 0 0.00 0 2.60 8 0.43 2 0.00 0 0.00 0 0.00 0 13.75 0 1.37 3 0.00 0 0.00 0 0.00 0 39.97 19 0.54 2 0.00 0 0.00 0 0.00 0 15.67 0 7.22 48 0.00 0 0.00 0 0.00 0 79.34 44 0.23 2 0.00 0 0.00 0 0.00 0 6.47 5 0.60 2 0.00 0 0.00 0 0.00 0 31.00 11 mrf-photomontage 93.08 77 0.00 0 0.00 0 1291.11 50 112.17 59 0.00 0 0.00 0 1871.14 33 mrf-stereo 72.67 119 436.30 28 14.67 10 267.55 54 94.44 9 1451.83 55 TABLE 7: Detailed experimental evaluation for Algorithm 1 utilising CPLEX [17] as a subsolver, denoted as Our-CPLEX, Algorithm 2 utilising TRW-S [20] as a subsolver, denoted as Our-TRWS, their counterparts from [43] denoted by [43]-CPLEX and [43]-TRWS and MQPBO [19] run for one iteration with predefined label order, denoted by MQPBO, and run 10 iterations in 10 random label orders, denoted by MQPBO-10. 20
8cs.DS
APPROXIMATING GEODESICS VIA RANDOM POINTS arXiv:1711.06952v1 [math.PR] 19 Nov 2017 ERIK DAVIS AND SUNDER SETHURAMAN Abstract. Given a ‘cost’ functional F on paths γ in a domain D ⊂ Rd , in the R form F (γ) = 01 f (γ(t), γ̇(t))dt, it is of interest to approximate its minimum cost and geodesic paths. Let X1 , . . . , Xn be points drawn independently from D according to a distribution with a density. Form a random geometric graph on the points where Xi and Xj are connected when 0 < |Xi − Xj | < , and the length scale  = n vanishes at a suitable rate. For a general class of functionals F , associated to Finsler and other distances on D, using a probabilistic form of Gamma convergence, we show that the minimum costs and geodesic paths, with respect to types of approximating discrete ‘cost’ functionals, built from the random geometric graph, converge almost surely in various senses to those corresponding to the continuum cost F , as the number of sample points diverges. In particular, the geodesic path convergence shown appears to be among the first results of its kind. 1. Introduction Understanding the ‘shortest’ or geodesic paths between points in a medium is an intrinsic concern in diverse applied problems, from ‘optimal routing’ in networks and disordered materials to ‘identifying manifold structure in large data sets’, as well as in studies of probabilistic Zd -percolation models, since the seminal paper of [5] (cf. recent survey [4]). See also [17], [18], [19], [20], [21], [22] which consider percolation in Rd continuum settings. There are sometimes abstract formulas for the geodesics, from the calculus of variations, or other differential equation approaches. For instance, with respect to a patch of a Riemannian manifold (M, g), with M ⊂ Rd and tensor field g(·), it is known that the distance function U (·) = d(x, ·), for fixed x, is a viscosity solution of the Eikonal equation k∇U (y)kg(y)−1 = 1 for y 6= x, with boundary condition p U (x) = 0. Here, kvkA = hv, Avi, where h·, ·i is the standard innerproduct on Rd . Then, a geodesic γ connecting x and z may be recovered from U by solving a ‘descent’ equation, γ̇(t) = −η(t)g −1 (γ(t))∇U (γ(t)), where η(t) is a scalar function controlling the speed. On the other hand, computing numerically the distances and geodesics may be a complicated issue. One of the standard approaches is the ‘fast marching method’ to approximate the distance U , by solving the Eikonal equation on a regular grid of n points. This method has been extended in a variety of ways, including with respect to triangulated domains, as well as irregular samples {x1 , . . . , xn } of an Euclidean submanifold (cf. [30], [24]). See also [28] in the above contexts for a review. 2010 Mathematics Subject Classification. 60D05, 58E10, 62-07, 49J55, 49J45, 53C22, 05C82. Key words and phrases. geodesic, shortest path, distance, consistency, random geometric graph, Gamma convergence, scaling limit, Finsler . 1 2 ERIK DAVIS AND SUNDER SETHURAMAN Alternatively, variants of Dijkstra’s or ‘heat flow’ methods, on graphs approximating the space are sometimes used. In Dijkstra’s algorithm, distances and shortest paths are found by successively computing optimal routes to nearest-neighbor edges. In ‘heat flow’ methods, geodesic distances can be found in terms of the small time asymptotics of a heat kernel on the space. For instance, see [10], [11], [12], [13], [33]. Another idea has been to collect a random sample Xn of n points from a manifold embedded in Rd , put a network structure on these points, say in terms of a -random geometric or k-nearest neighbor graph, and then approximate the ‘continuum’ geodesics lengths by lengths of ‘discrete’ geodesic paths found in this network. Presumably, under assumptions on how the points are sampled and how the random graphs are formed, as the number of points diverge, these ‘discrete’ distances should converge almost surely to the ‘continuum’ shortest path lengths. Such a statistical consistency result is fundamental in ‘manifold learning’ [6]. For instance, the popular ISOMAP procedure [32], [7] is based on these notions to elicit manifold structure in data sets. More specifically, let D be a subset of Rd corresponding to a patch of the manifold, and consider a ‘kernel’ f (x, v) : D × Rd → [0, ∞). Define the f -cost of a R1 path γ(t) : [0, 1] → D from γ(0) = a to γ(1) = b as F (γ) = 0 f (γ(t), γ̇(t))dt. The f -distance from a to b is then the infimum of such costs over paths γ. For example, if f (x, v) = |v|p , the f -distance is |b − a|p , the pth power of the Euclidean distance. With respect to a class of functions f and samples drawn from a distribution on the D with density ρ, papers [7], [29], and [3] address, among other results, how  = n and k = kn should decrease and increase respectively so that various concentration type bounds between types of discrete and continuum optimal distances hold with high probability, leading to consistent estimates. For instance, in [29], for n -random graphs and smooth ρ, certain density dependent estimators of continuum distances were considered, where f (x, v) = h(ρ(x))|v| and h(y) is decreasing, smooth, constant for |y| small, and bounded away from 0. This work extends [7], which considered f (x, v) = |v| and uniformly distributed samples. On the other hand, in [3], among other results, on kn -nearest-neighbor graphs, continuum distances, where f (x, v) = h(ρ(x))|v| and h is increasing, Lipschitz, and bounded away from 0, were approximated (see also [15]). In these contexts, the purpose of this article is twofold. First, we identify a general class of f -distances for which different associated discrete distances, formed from random n -random geometric graphs on a domain D ⊂ Rd , converge almost surely to them. Second, we describe when the associated discrete geodesic paths converge almost surely, in uniform and Hausdorff norms, to continuum f -distance geodesic paths, a type of consistency which appears to be among the first contributions of this kind. The main results are Theorems 2.1, 2.2, 2.4, 2.7, 2.8, and Corollary 2.3. See Section 2 and Subsection 2.3 for precise statements and related remarks. We consider the following three different discrete costs. The first, d1 , optimizes on paths γ, starting and ending at a and b respectively, linearly interpolated between points in Xn ∪ {a, b}, where consecutive points are within n of each other, and the time to traverse each link is the same. The second, d2 , optimizes with respect to ‘quasinormal’ interpolations between the points, using however the f -geodesic paths. The third, d3 , does not interpolate at all, and optimizes a ‘Riemann sum’ APPROXIMATING GEODESICS VIA RANDOM POINTS 3 Pm−1 1 cost m i=0 f (vi , m(vi+1 − vi )) where m is the number of edges in the discrete path {v0 , . . . , vm } ⊂ Xn ∪ {a, b}. We note, discrete distances d2 and d3 , in the setting f (x, v) = |v| were introduced in [7], and density dependent versions were used in the results in [3] and [29]. The discrete distance d1 , although natural, seems not well considered in the literature. The conditions we impose on f include p-homogeneity in v for p ≥ 1, convexity and an ellipticity condition with respect to v, and a smoothness assumption away from v 6= 0. Such conditions include a large class of kernels f associated to Finsler spaces, as well as those kernels considered in [29] and [7], with respect to n -random graphs. The domain D ⊂ Rd is assumed to be bounded and convex. Also, we assume that the rate of decrease of n is such that the graph on Xn is connected for all large n. While a main contribution of the article is to provide a general setting in which the ‘discrete to continuum’ convergences hold, we remark our proof method is quite different from that in the literature, where specific features of f , such as f (x, v) = |v| in [7], are important in estimation of distances, not easily generalized. We give a probabilistic form of ‘Gamma convergence’ to derive the almost sure limits, which may be of interest itself. This method involves showing ‘liminf’, ‘limsup’ and ‘compactness’ elements, as in the analysis context, but here on appropriate probability 1 sets. Part of the output of the technique, beyond giving convergence of the distances, is that it yields convergence of the minimizing discrete paths to continuum geodesics in various senses. The f -costs share different properties depending on if p = 1 or p > 1, and also when d ≥ 2 or d = 1. For instance, the f -cost is invariant to reparametrization of the path exactly when p = 1. Also, when p > 1, the form of the f -cost may be seen to be coercive on the modulus of γ, not the case when p = 1. In fact, the p = 1 case is the most troublesome, and more assumptions on f and n are required in Theorems 2.7 and 2.8 to deal with the ‘linear’ path cost d1 and ‘Riemann’ cost d3 , which are ‘rougher’ than the ‘quasinormal’ cost d2 . At the same time, in d = 1, in contrast to d ≥ 2, all paths lie in the interval [a, b] ⊂ R. When also p = 1, the problem is somewhat degenerate: By invariance to reparametrization, the costs d1 and d2 turn out to be nonrandom and to reduce Rb to the integral a f (s, 1)ds. Also, the cost d3 is a Riemann sum which converges to this integral. Finally, we comment on a difference in viewpoint with respect to results in continuum percolation. The ‘Riemann sum’ cost considered here seems related to but is different than the cost optimized in the works [18], [19]. There, for p > 1, one optimizes the cost of a path {w0 , . . . , wm }, along random points, from the Pm−1 origin 0 to nx, for x ∈ Rd , given by i=0 |wi+1 − wi |p , and infers a scaled distance d(x) = c(d, p)|x|, in law of large numbers scale n, where the proportionality constant c(d, p) is not explicit. In contrast, however, in this article, given already an integral f -distance, the viewpoint is to optimize costs of paths of length order 1 (not n as in [18], [19]), where the length scale between points is being scaled of order n , and then to recover the f -distance in the limit. We note also another difference: When f (x, v) = |v|p , as remarked above, the f -distance from the origin to x is |x|p , instead of ∼ |x| as in the continuum percolation studies. In Section 2, the setting, assumptions and results are given with respect to three types of discrete costs. In Section 3, proofs of Theorems 2.1 and 2.2 and Corollary 4 ERIK DAVIS AND SUNDER SETHURAMAN (a) F -minimizing path, with level sets of w in- (b) n -graph, on n = 400 uniform points with n = (1/400)0.3 dicated. Figure 1. Continuum geodesic and n -graph for f (x, v) = w(x)|v| on the domain D = [−1, 1]×[−1, 1], where w(x) = 1+8 exp(−2(x1 −1/2)2 +xy+2y 2 ), and a = (−0.8, −0.8), b = (0.8, 0.8) 2.3 on the ‘interpolating’ costs are given. In Section 4, proofs of Theorems 2.4, 2.7, and 2.8, with respect to ‘Riemann’ costs, and ‘interpolating’ costs when p = 1, are given. In Section 5, some technical results, used in the course of the main proofs, are collected. 2. Setting and Results We now introduce the setting of the problem, and ‘standing assumptions’, which hold throughout the article. For d ≥ 1, we will be working on a subset D ⊂ Rd , which is the closure of an open, bounded, convex domain. (2.1) Therefore, D is a Lipschitz domain (cf. Corollary 9.1.2 in [2], Section 1.1.8 in [23]). Consider points a, b ∈ D and let Ω(a, b) denote the space of Lipschitz paths γ : [0, 1] → D with γ(0) = a and γ(1) = b. Given f : D × Rd → [0, ∞), we define the cost F : Ω(a, b) → [0, ∞) by Z 1 F (γ) = f (γ(t), γ̇(t)) dt, 0 and associated optimal cost df (a, b) = inf F (γ). (2.2) γ∈Ω(a,b) We will make the following assumptions on the integrand f : (A0) f is continuous on D × Rd , and C 1 on D × (Rd \ {0}), (A1) f (x, v) is convex in v, (A2) there exists p ≥ 1 such that f (x, v) is p-homogenous in v, f (x, λv) = λp f (x, v) for λ > 0, (2.3) APPROXIMATING GEODESICS VIA RANDOM POINTS 5 (A3) there exist constants m1 , m2 > 0 such that m1 |v|p ≤ f (x, v) ≤ m2 |v|p for all x ∈ D. (2.4) We remark, when p > 1 and p-homogenity (A2) holds, that f may be extended to a C 1 function on D × Rd . Part of the reasoning for the assumptions (A0)-(A3) is that they include, for p ≥ 1, the familiar kernel f (x, v) = |v|p , for which, when p = 1, F (γ) is the arclength of the path γ and df (a, b) is the length of the line segment from a to b. Also, under these assumptions on f , it is known that the infimum in (2.2) is attained at a path in Ω(a, b), perhaps nonuniquely (see Proposition 5.2 of the appendix). In addition, we remark, when p = 1, under additional differentiability assumptions, df represents a Finsler distance (cf. [25], [31] and references therein). When p = 1, the cost has an interesting scaling property: By 1-homogeneity of f , the cost F is invariant under smooth reparameterization of paths. That is, given a path γ ∈ Ω(a, b) and smooth, increasing s : [0, 1] → [0, 1], with s(0) = 0 and s(1) = 1, one has F (γ̃) = F (γ) where γ̃(t) = γ(s(t)). This property allows to deduce, when p = 1, that df satisfies the triangle property (not guaranteed when p > 1): Let γ1 be a path from u to w, and γ2 be a path from w to z. Write Z 1 Z 1 f (γ1 (t), γ̇1 (t))dt + f (γ2 (t), γ̇2 (t))dt 0 0 Z 1/2 = Z f (γ1 (2s), 2γ̇1 (2s))ds + 0 Z = 1/2 f (γ2 (2s), 2γ̇2 (2s))ds 0 1 f (γ3 (t), γ̇3 (t))dt, (2.5) 0 where γ3 is a path from u to z, following γ1 (2·) and γ2 (2·) on time intervals [0, 1/2] and [1/2, 1] respectively. Optimizing over γ1 , γ2 and γ3 gives df (u, w) + df (w, z) ≥ df (u, z). We now construct a random geometric graph on D through which approximations of df and its geodesics will be made. Let {Xi , X2 , . . .} ⊂ D be a sequence of independent points, identically distributed according to a distribution ν with probability density ρ. For each n ∈ N, let Xn = {X1 , . . . , Xn } and fix a length scale n > 0. With respect to a realization {Xi }, we define a graph Gn (a, b), on the vertex set Xn ∪ {a, b}, by connecting an edge between u, v in Xn ∪ {a, b} iff 0 < |u − v| < n , where | · | refers to the Euclidean distance in Rd . For u, v ∈ Xn ∪ {a, b}, we say that a finite sequence (v0 , v1 , . . . , vm ) of vertices is a path with m-steps from u to v in Gn (a, b) if v0 = u, vm = v, and there is an edge from vi to vi+1 for 0 ≤ i < m. Let Vn (a, b) denote the set of paths from a to b in Gn (a, b). We will assume a certain decay rate on n , namely that limn↑∞ n = 0 and lim sup n→∞ (log n)1/d 1 = 0. n1/d n (2.6) Under this type of decay rate, almost surely, for all large n and a, b ∈ D, points a, b will be connected by a path in the graph Gn (a, b), in other words, Vn (a, b) will be nonempty. Indeed, under this rate, the degree of a point in the graph will diverge to infinity. See Proposition 5.1 in the appendix, and remarks in Section 2.3. 6 ERIK DAVIS AND SUNDER SETHURAMAN We will also assume that the underlying probability density ρ is uniformly bounded, that is, there exists a constant c > 0 such that c ≤ ρ(x) ≤ c−1 for all x ∈ D. (2.7) See Figure 1, parts (a) and (b), which depict a geodesic path with respect to a cost F , and an n -random graph. ‘Standing assumptions’. To summarize, the assumptions, dimension d ≥ 1, (2.1) on D, items (A0)-(A3) on f when p ≥ 1, decay rate (2.6) on n , and density bound (2.7) on ρ, denoted as the ‘standing assumptions’, will hold throughout the article. In the next two Subsections, we present results on approximation of df (a, b) and its geodesics with respect to two types of schemes, where approximating costs are built (1) in terms of ‘interpolations’ of points in Vn (a, b) and also (2) in terms of ‘Riemann sums’. 2.1. Interpolating costs. We introduce two types of discrete costs based on ‘linear’ and ‘quasinormal’ paths. Linear interpolations. With respect to a realization {Xi }, for u, v ∈ D, let lu,v : [0, 1] → D denote the constant-speed linear path from a to b, given by lu,v (t) = (1 − t)u + tv. Consider now v = (v0 , v1 , . . . , vm ) ∈ Vn (a, b). We define lv ∈ Ω(a, b) to be the concatenation of the linear segments {lvi−1 ,vi }m i=1 , where each segment is traversed in the same time 1/m. More precisely, for i/m ≤ t ≤ (i + 1)/m, define lv (t) = lvi ,vi+1 (mt − i), and note that the resulting piecewise linear path is in Ω(a, b). Define now a subset Ωln (a, b) of Ω(a, b) by Ωln (a, b) = {lv |v ∈ Vn (a, b)} , and define the (random) discrete cost Ln : Ωln (a, b) → [0, ∞] by Ln (γ) = F (γ) for γ ∈ Ωln (a, b). In other words, Ln is the restriction of F to Ωln (a, b), noting the p-homogenity of f , taking form m−1 X Z (i+1)/m Ln (lv ) = f (lvi ,vi+1 (mt − i), m(vi+1 − vi ))dt i=0 = mp−1 i/m m−1 XZ 1 i=0 f (lvi ,vi+1 (t), vi+1 − vi )dt. (2.8) 0 Quasinormal interpolations. Define now a different discrete cost which may nonlinearly interpolate among points in paths of Vn (a, b). We say that a Lipschitz path γ is quasinormal with respect to f if there exists a c > 0 such that f (γ(t), γ̇(t)) = c for a.e. t ∈ [0, 1]. It is known, under the ‘standard assumptions’ on f (see Proposition 5.2) that, for u, v ∈ D, there exists a quasinormal path γ : [0, 1] → D, with γ(0) = u, γ(1) = v, R1 which is optimal, df (u, v) = 0 f (γ(t), γ̇(t)) dt. For what follows, when we refer APPROXIMATING GEODESICS VIA RANDOM POINTS 7 to a ‘quasinormal’ path connecting u and v, we mean such a fixed optimal path denoted by γu,v . Given a path v = (v0 , . . . , vm ) ∈ Vn (a, b), let γv ∈ Ω(a, b) denote the concatenation of {γvi−1 ,vi }m i=1 , where each segment uses the same time 1/m. More precisely, for i/m ≤ t ≤ (i + 1)/m, define γv (t) = γvi ,vi+1 (mt − i). As with piecewise linear functions, define the subset Ωγn (a, b) of Ω(a, b) by Ωγn (a, b) = {γv |v ∈ Vn (a, b)} . Let Gn : Ωγn (a, b) → R denote the restriction of F to Ωγn (a, b). Then, with respect to a path γ = γv ∈ Ωγn (a, b), by the p-homogenity of f , we evaluate that Z 1 Gn (γ) = f (γ(t), γ̇(t)) dt (2.9) 0 = m Z X i=1 i/m f (γvi−1 ,vi (mt − i), mγ̇vi−1 ,vi (mt − i)) dt (i−1)/m = mp−1 m Z X i=1 1 f (γvi−1 ,vi (t), γ̇vi−1 ,vi (t)) dt = mp−1 0 m X df (vi−1 , vi ). i=1 Further, by p-homogeneity of f and optimality of {γvi ,vi+1 }m i=1 , the segments of γ = γv are also optimal, in the sense that Z (i+1)/m Z 1 f (γ(t), γ̇(t)) dt = mp−1 f (γvi ,vi+1 (t), γ̇vi ,vi+1 (t))dt i/m 0 = inf mp−1 γ e Z 0 1 f (e γ (t), γ e˙ (t)) dt = inf γ b Z (i+1)/m i/m f (b γ (t), γ b˙ (t))dt, (2.10) where the infima are over Lipschitz paths γ e : [0, 1] → D and γ b : [i/m, (i+1)/m] → D with γ e(0) = vi , γ e(1) = vi+1 , γ b(i/m) = vi and γ b((i + 1)/m) = vi+1 . Relations between Gn and Ln . At this point, we remark there are kernels f for which Gn = Ln , namely those such that linear segments are in fact quasinormal geodesics. An example is f (x, v) = |v|. Identifying these kernels is a question with a long history, going back to Hilbert, whose 4th problem paraphrased asks for which geometries are the geodesics straight lines (cf. surveys [25], [26]). Hamel’s criterion, namely ∂xi ∂vj f = ∂xj ∂vi f for 1 ≤ i, j ≤ d, is a well-known solution to this question (see [14], [25], [26] and references therein). We also note, as mentioned in the introduction, that the case d = p = 1 is ‘degenerate’ in that min Gn and min Ln are not random. Indeed, let γv ∈ arg min Gn and suppose v = (v0 , . . . , vm ) ∈ Vn (a, b). We observe that γv must be nondecreasing, as otherwise, one could build a smaller cost path, from parts of γv using invariance to reparametrization, violating optimality of γv . In particular, γ̇v ≥ 0 and vi < vi+1 for 0 ≤ i ≤ m − 1. Then, Z b m−1 m−1 X Z (i+1)/m X Z vi+1 Gn (γv ) = f (γv (t), γ̇v (t))dt = f (s, 1)ds = f (s, 1)ds, i=0 i/m i=0 vi a using the 1-homogeneity of f and changing variables. The same argument yields Rb that min Ln = a f (s, 1)ds. We do not consider this ‘degenerate’ case further. 8 ERIK DAVIS AND SUNDER SETHURAMAN The first result is for linearly interpolated paths. Theorem 2.1. Suppose that p > 1. With respect to realizations {Xi } in a probability 1 set, the following holds. The minimum values of the costs Ln converge to the minimum of F , lim min n→∞ γ∈Ωln (a,b) Ln (γ) = min F (γ). γ∈Ω(a,b) Moreover, consider a sequence of optimal paths γn ∈ arg min Ln . Any subsequence of {γn } has a further subsequence that converges uniformly to a limit path γ ∈ arg min F , lim sup |γnk (t) − γ(t)| = 0. k→∞ 0≤t≤1 In addition, if γ is the unique minimizer of F , then the whole sequence γn converges uniformly to γ. The case d ≥ 2 and p = 1 requires further development, and is addressed with a few more assumptions in Theorem 2.8. We now address quasinormal interpolations. Theorem 2.2. Suppose that either (1) p > 1 or (2) d ≥ 2 and p = 1. Then, with respect to realizations {Xi } in a probability 1 set, the following holds. The minimum values of the energies Gn converge to the minimum of F , lim min n→∞ γ∈Ωγ n (a,b) Gn (γ) = min F (γ). γ∈Ω(a,b) Moreover, consider a sequence of optimal paths γn ∈ arg min Gn . Any subsequence of {γn } has a further subsequence that converges uniformly to a limit path γ ∈ arg min F , lim sup |γnk (t) − γ(t)| = 0. k→∞ 0≤t≤1 In addition, if γ is the unique minimzer of F , then the whole sequence γn converges uniformly to γ. We remark, when d ≥ 2 and p = 1, that there is a certain ambiguity in the results of Theorem 2.2, due to the invariance of F under reparametrization of paths. In this case, there is no unique R 1minimizer of F . Consider for example the case where f (x, v) = |v| and F (γ) = 0 |γ̇(t)|dt. Any minimizer of this functional is a parameterization of a line, but of course such minimizers are not unique. One way to address this is to formulate a certain Hausdorff convergence with respect to images of the paths. Given γ ∈ Ω(a, b), we denote the image of γ by Sγ = {γ(t) | 0 ≤ t ≤ 1} . Consider the Hausdorff metric dhaus , defined on compact subsets A, B of D by dhaus (A, B) = max{sup inf d(x, y), sup inf d(x, y)}. x∈A y∈B y∈B x∈A Corollary 2.3. Suppose that either (1) d ≥ 2 and p = 1 or (2) p > 1. Consider paths {γv(n) }, for all large n either in form γv(n) ∈ arg min Gn , or γv(n) ∈ arg min Ln . Then, with respect to realizations {Xi } in a probability 1 set, any subsequence of {v(n) } has a further subsequence which converges in the Hausdorff sense to Sγ , where γ ∈ arg min F is an optimal path. APPROXIMATING GEODESICS VIA RANDOM POINTS 9 Figure 2. H400 -minimizing discrete path in the setting of Figure 1, linearly interpolated for visual clarity. Moreover, if F has a unique (up to reparametrization) minimizer γ, then the whole sequence converges, lim dhaus (v(n) , Sγ ) = 0. n→∞ 2.2. Riemann sum costs and p = 1-linear interpolating costs. We first introduce a cost which requires knowledge of f only on discrete points and, as a consequence, more ‘applicable’. At the end of the subsection, we return to linear interpolated costs when p = 1. Define Hn : Vn (a, b) → R, for v = (v0 , v1 , . . . , vm ), by m 1 X Hn (v) = f (vi , m(vi+1 − vi )). m i=1 (2.11) The functional Hn is, in a sense, a ‘Riemann sum’ approximation to Ln and Gn , and therefore its behavior, and the behavior of its minimizing paths, should be similar to that of Ln and Gn . See Figure 2 for an example of an optimal Hn path. We make this intuition rigorous by establishing variants of Theorems 2.1 and 2.2 with respect to the cost Hn . Given the ‘rougher’ nature of Hn , however, additional assumptions on f and n , beyond those in the ‘standing assumptions’, will be helpful in this regard. As in the previous Subsection, our results differ between the two cases p = 1 and p > 1. Define the following smoothness condition: (Lip) There exists a c such that for all x, y ∈ D and v ∈ Rd we have |f (x, v) − f (y, v)| ≤ c|x − y||v|p . We note when f satisfies the homogeneity condition (2.3), and ∇x f (x, v) is uniformly bounded on D × {y : |y| = 1}, that (Lip) holds. 10 ERIK DAVIS AND SUNDER SETHURAMAN We now consider the behavior of Hn when p > 1. The analogue to Theorem 2.1 and Corollary 2.3 in this setting is the following. Theorem 2.4. Suppose p > 1, and that f in addition satisfies (Lip). With respect to realizations {Xi } in a probability 1 set, the minimum values of the energies Hn converge to the minimum of F , lim min n→∞ v∈Vn (a,b) Hn (v) = min F (γ). γ∈Ω(a,b) Further, consider a sequence of optimal discrete paths w(n) ∈ arg min Hn , and their linear interpolations {lw(n) }. Then, for any subsequence of {lw(n) } and correspondingly of {w(n) }, there is a further subsequence of the linear paths which converges uniformly to a limit path γ ∈ arg min F , and of the discrete paths in the Hausdorff sense to Sγ . If F has a unique minimizer γ, the whole sequence of linear paths converges uniformly to γ, and the whole sequence of discrete paths converges in the Hausdorff sense to Sγ . We will need to impose further assumptions on the integrand f to state results in the case p = 1. See below for examples of f satisfying these conditions, and also Subsection 2.3 for further comments. (Hilb) We say that f satisfies the ‘Hilbert condition’ if, for each x, Z 1 inf f (x, γ̇(t))dt = f (x, b − a), γ∈Ω(a,b) 0 that is, straight lines are geodesics for the kernel f (x, ·). (TrIneq) We say f satisfies the ‘triangle inequality’ if, for each x, f (x, v − w) ≤ f (x, v − u) + f (x, u − w) for all u, v, w ∈ Rd . (Pythag) Let α > 1. Consider points u, v, w where |uw|, |vw|, |uv| < η for an η < 1. Suppose there is a constant c such that, for 0 < r < 1, – dist(w, line(u, v)) ≥ r, and – |uv| ≤ cr1/α . Then, we say f satisfies the ‘Pythagoras α-condition’ if there is a constant C = C(α, f, c) such that, for all x, f (x, w − u) + f (x, v − w) ≥ f (x, v − u) + Crα . Here, line(u, v) is the line segment between u and v. Here, in the statement of (Hilb), the kernel function, for fixed x, is only a function of v. The following lemma is a case of the Hamel’s criterion discussed in the previous Subsection. Lemma 2.5. Given the ‘standing assumptions’, suppose also, for fixed x ∈ D, that v 7→ f (x, v) is C 2 on Rd \ {0} with positive definite Hessian. Then, (Hilb) is satisfied. 2 Proof. Fix an x0 ∈ D. There R 1 is a quasinormal minimizer γ ∈ C where both c = f (x0 , γ̇(t)) = inf γ∈Ω(a,b) 0 f (x0 , γ̇(t))dt and Z 1 2 2 c = f (x0 , γ̇(t)) = inf f 2 (x0 , γ̇(t))dt γ∈Ω(a,b) 0 APPROXIMATING GEODESICS VIA RANDOM POINTS 11 for a.e. 0 ≤ t ≤ 1 (cf. Prop. 5.25 in [8]). Let g(v) = f 2 (x0 , v). Then, γ satisfies the d Euler-Lagrange equation dt ∇v g(γ̇(t)) = ∇x g(γ̇(t)) = 0. In other words, H γ̈(t) = 0, where H denotes the Hessian of g. By assumption, H is positive definite. Hence, γ̈(t) ≡ 0, and so γ is a parametrization of a straight line.  An example of a class of kernels f satisfying the ‘standing assumptions’ and the additional conditions above is given in the following result. Recall h·, ·i denotes the Euclidean inner product on Rd . Lemma 2.6. Let x 7→ M = M (x) be a C 1 , strictly elliptic matrix-valued function on D. The kernel f (x, v) = hv, M (x)vi1/2 satisfies the ‘standing assumptions’, and also (Lip), (Hilb), (TrIneq) and (Pythag) for all α > 1. Proof. The kernel clearly satisfies the ‘standing assumptions’ and (Lip). Next, for fixed x, the map v 7→ f (x, v) satisfies the conditions of Lemma 2.5, and so satisfies (Hilb). Also, v 7→ f (x, v) trivially satisfies (TrIneq). We show (Pythag) in the case f (x, v) = h(x)|v|, that is M (x) = h2 (x)Id, as the notation is easier and all the ideas carry over to the more general case. Consider a right triangle joining u, w, z where z is on the line through u, v (cf. Figure 3). Figure 3. Geometric argument used in proof of Lemma 2.6 with respect to (Pythag). If z is not on the line segment connecting u and v, then either (a) |uw| ≥ |uv| and |wv| ≥ r ≥ rα or (b) |wv| ≥ |uv| and |uw| ≥ r ≥ rα . In either case, h(x)[|uw| + |wv|] ≥ h(x)|uv| + m1 rα and (Pythag) is satisfied. Suppose now z is on the line segment connecting u and v. In the triangle, uw is the hypotenuse, and wz and uz are the legs, such that |uw|2 = |wz|2 + |uz|2 . Hence, as |uw| < 1, all the lengths are less than 1. We are given that |wz| ≥ r and |uz| ≤ |uv| ≤ cr1/α . Then, as r ≤ |wz| < 1 and 2 < min{2α, α + 1/α}, we have |uw|2 = |uz|2 + |wz|2 ≥ |uz|2 + (1/9)r2α + 2(1/3)rα+1/α |uz|2 + (9 max{c, 1}2 )−1 r2α + 2(3 max{c, 1})−1 |uz|rα 2 = |uz| + (3 max{c, 1})−1 rα , ≥ and so |uw| ≥ |uz| + (3 max{c, 1})−1 rα . 12 ERIK DAVIS AND SUNDER SETHURAMAN A similar inequality, |wv| ≥ |vz| + (3 max{c, 1})−1 rα , holds with the same argument. Hence, h(x)|uw| + h(x)|wv| ≥ h(x)|uv| + C(m1 , c)rα .  We will also need to limit the decay properties of n for the next result; see Subsection 2.3 for comments on this limitation. Namely, we will suppose that n is in form n = n−δ where δ > max{[(2 − α2 )η + d]−1 , [(α(d − 1) + 1]−1 }, (2.12) √ for an 0 < η < 1 and 1 < α < 2. We note that condition (2.6), when n is in form n = n−δ , yields that δ < 1/d. However, when d ≥ 2, we have max{[(2 − α2 )η + d]−1 , [(α(d − 1) + 1]−1 } < 1/d, and so (2.12), in conjuction with (2.6), limits δ to an interval. Theorem 2.7. Suppose d ≥ 2 and p = 1, and that f also satisfies (Lip) and (Hilb). With respect to realizations {Xn }n≥1 in a probability 1 set, the minimum values of the cost Hn converge to the minimum of F , lim min n→∞ v∈Vn (a,b) Hn (v) = min F (γ). γ∈Ω(a,b) Moreover, √ suppose now that f in addition satisfies (TrIneq) and (Pythag) for an 1 < α < 2, and that n satisfies (2.12). Consider a sequence of optimal discrete paths v(n) ∈ arg min Hn , and their linear interpolations {lv(n) }. Then, for any subsequence of {lv(n) } and so of {v(n) }, there is a further subsequence of the linear paths which converges uniformly to a limit path γ ∈ arg min F , and of the discrete paths in the Hausdorff sense to Sγ . If F has a unique (up to reparametrization) minimizer γ, the whole sequence of discrete paths converges, limn→∞ dhaus (v(n) , Sγ ) = 0. See Figure 2 for an example of an Hn -cost geodesic path. As noted in the introduction, when d = p = 1, Hn (v) is a certain Riemann sum. Let w ∈ arg min Hn , and observe by optimality that w = (w0 , . . . , wm ) ∈ Vn (a, b) satisfies wi < wi+1 for 0 ≤ i ≤ m − 1. Hence, by 1-homogenity of f , Pm−1 Hn (w) = i=0 f (wi , 1)|wi+1 − wi |, and Hn (w) strongly approximates the integral Rb f (s, 1)ds, given that the partition length max |wi+1 − wi | ≤ n → 0. For this a reason, this case is not included in the above theorem. Linear interpolating costs when p = 1. Having now introduced (Lip), (Hilb), (TrIneq) and (Pythag), we address the case d ≥ 2 and p = 1 with respect to the cost Ln . Theorem 2.8. Suppose d ≥ 2 and p = 1, and that f also satisfies (Lip) and (Hilb). With respect to realizations {Xn }n≥1 in a probability 1 set, the minimum values of the cost Ln converge to the minimum of F , lim min n→∞ γ∈Ωln (a,b) Ln (γ) = min F (γ). γ∈Ω(a,b) Moreover, √ suppose now that f in addition satisfies (TrIneq) and (Pythag) for an 1 < α < 2, and that n satisfies (2.12). Consider a sequence of optimal paths lv(n) ∈ arg min Ln . Then, for any subsequence of {lv(n) } and so of the discrete paths {v(n) }, there is a further subsequence of the linear paths which converges uniformly to a limit path γ ∈ arg min F , and of the discrete paths in the Hausdorff sense to Sγ . APPROXIMATING GEODESICS VIA RANDOM POINTS 13 If F has a unique (up to reparametrization) minimizer γ, the whole sequence of discrete paths converges, limn→∞ dhaus (v(n) , Sγ ) = 0. 2.3. Remarks. We make several comments about the assumptions and related issues. 1. Domain. The requirements that D should be closed and connected are needed for the quasinormal path results in [8] and [16] to hold. Also, the proof of Proposition 5.1, on the maximum distance to a nearest neighbor vertex, requires that the domain boundary should be Lipschitz, true for convex domains. The convexity of the domain also ensures that all the linearly interpolated paths are within the domain, and allows comparison with quasinormal ones, which by definition are constrained in the domain, as in the proof of the ‘limsup’ inequality, Lemma 3.5. In addition, a bound on the domain allows the Arzela-Ascoli equicontinuity criterion to be applied in the compactness property, Lemma 3.7. 2. Ellipticity of ρ. The bound on ρ is useful to compare ν to the uniform distribution in the nearest-neighbor map result, Proposition 5.1, as well as in bounding the number of points in certain sets in Lemma 4.8. We note, as our approximating costs, Ln , Gn , Hn , do not involve density estimators, our results do not depend on the specifics of ρ, unlike for ‘density based distances’ discussed in [29]. 3. Decay of n (2.6). Intuitively, the rate n cannot vanish too quickly, as then the graph may be disconnected with respect to a postive set of realizations {Xi }. However, the estimate in (2.6) ensures that the graph Gn (a, b) is connected for all large n almost surely–see Proposition 5.1. This is a version of the ‘δ-sampling’ condition in [7], and is related to connectivity estimates in continuum percolation [27]. Moreover, we note, the prescribed rate yields in fact that any vertex Xi will have degree tending to infinity as n grows, as long as ρ is elliptic: One calculates that the mean number of points in the n ball around Xi is of order ndn which grows faster than log(n). 4. Assumptions (A0)-(A3) on f . These are somewhat standard assumptions to treat parametric variational integrals such as F (cf. [8] and [16]), which include the basic case f (x, v) = |v|p . 5. Assumption on p. The assumption p ≥ 1 is useful to show existence of quasinormal paths in Proposition 5.2, and compactness of minimizers. The case p < 1 is more problematic in this sense and not discussed here. 6. Extra assumptions in Theorems 2.7 and 2.8. The main difficulty is in showing compactness of optimal Hn and Ln paths when p = 1. With respect to Theorem 2.4, when p > 1, the form of the cost allows a Holder’s inequality argument to deduce equicontinuity of the paths, from which compactness follows using AscoliArzela’s theorem. However, there is no such coercivity when p = 1. Yet, with the additional assumptions, one can approximate a geodesic locally by straight lines. Several geometric estimates on the number of points in small windows around these straight lines are needed to ensure accuracy of the approximation, for which the upperbound on n in (2.12) is useful. 7. Unique minimizers of F . Given that our results achieve their strongest form when arg min F consists of a unique minimizing path, perhaps up to reparametrization, we comment on this possibility. Under suitable smoothness conditions on the 14 ERIK DAVIS AND SUNDER SETHURAMAN integrand f , uniqueness criteria for ordinary differential equations allow to deduce from the Euler-Lagrange equations, d/dt∇v f (γ(t), γ̇(t)) = ∇x f (γ(t), γ̇(t)), that there is a unique geodesic between points a, b sufficiently close together (cf. Proposition 5.25 in [8] and Chapter 5 in [9]). On the other hand, for general a, b, ‘nonuniqueness’ may hold depending on the structure of f . For instance, one may construct an f , satisfying the ‘standing assumptions’, with several F -minimizing paths, by penalizing portions of D so as to induce ‘forks’. 8. k-nearest neighbor graphs. It is not clear if our approximation results, say Theorem 2.7, hold with respect to the k-nearest-neighbor graph with k bounded– that is the graph formed by attaching edges from a vertex to the nearest k points. For instance, when {Xi } is arranged along a fine regular grid, f (x, v) ≡ |v|, d = 2, and k = 4, the optimal Hn route of moving from the origin to (1, 1) is on a ‘staircase’ path √ with length ∼ 2, no matter how refined the grid is, yet the Euclidean distance is 2. In this respect, the random geometric graph setting of Theorem 2.7 allows enough choices among nearby points, as long as ρ is elliptic, for the optimal path to approximate the straight line from (0, 0) to (1, 1). It would be of interest to investigate the extent to which our results extend to k-nearest neighbor graphs. 3. Proof of Theorems 2.1, 2.2, and Corollary 2.3 As mentioned in the introduction, the proof of Theorems 2.1 and 2.2 relies on a probabilistic ‘Gamma Convergence’ argument. After establishing some basic notation and results on quasinormal minimizers, we present three main proof elements, ‘liminf inequality’, ‘limsup inequality’ and ‘compactness’, in the following Subsections. Proofs of Theorems 2.1 and 2.2, and Corollary 2.3 are the end of the Subsection. 3.1. Preliminaries. Define a ‘nearest-neighbor’ map Tn : D → Xn where, for x ∈ D, Tn (x) is the point of Xn closest to x with respect to the Euclidean distance. In the event of a tie, we adopt the convention that Tn (x) is that nearest neighbor in Xn with the smallest subscript. Since Xn is random, we note Tn and the distortion kTn − Idk∞ = sup |Tn (x) − x| = kTn − Idk∞ = sup min |Xi − y| y∈D 1≤i≤n x∈D are also random. In Proposition 5.1 of the appendix, we show for a, b ∈ D that, almost surely, the graph Gn (a, b) is connected for all a, b ∈ D and all large n. (3.13) Moreover, it is shown there that exists a constant C such that almost surely, lim sup n→∞ kTn − Idk∞ n1/d ≤ C. (log n)1/d (3.14) Throughout, we will be working with realizations where both (3.13) and (3.14) are satisfied. Let A1 be the probability 1 event that (3.13) and (3.14) hold. We observe, when the decay rate (2.6) on n holds, on the set of realizations A1 , we have limn→∞ kTn − Idk∞ /n = 0. To rule out certain degenerate configurations of points, in d ≥ 2, let A2 be the event that Xk 6∈ SγXi ,Xj ∀ distinct i, j, k ∈ N. APPROXIMATING GEODESICS VIA RANDOM POINTS 15 Since the {Xi } come from a continuous distribution, and the image of the Lipschitz path γXi ,Xj in D ⊂ Rd , when d ≥ 2, is of lower dimension, A2 has probability 1. Recall the definitions of quasinormal and linear paths γu,v and lu,v . Proposition 3.1. Let m1 and m2 be the constants in (2.4). Then for u, v ∈ D, m1 |u − v|p ≤ df (u, v) ≤ m2 |u − v|p . (3.15) Further, the path γu,v satisfies, for 0 ≤ s, t ≤ 1, that |γu,v (s) − γu,v (t)| ≤ m2 /m1 )1/p |u − v||s − t|, (3.16)  (3.17) and sup |γu,v (t) − lu,v (t)| ≤ m2 /m1 1/p  + 1 |u − v|. 0≤t≤1 Proof. For a Lipschitz path γ between u and v, we have m1 |γ̇(t)|p ≤ f (γ(t), γ̇(t)) ≤ R1 m2 |γ̇(t)|p by (2.4). Also, inf γ∈Ω(a,b) 0 |γ̇(t)|p dt = |b − a|p by a standard calculus of variations argument (see also Proposition 5.2). So, by taking infimum over γ, we obtain (3.15). Suppose now γ = γu,v is quasinormal, so that f (γ(t), γ̇(t)) = c for some constant R1 c and a.e. t. Integrating, and noting (3.15), gives c = 0 f (γ, γ̇) dt = df (u, v) ≤ m2 |u − v|p . On the other hand, by (2.4), m1 |γ̇(t)|p ≤ f (γ(t), γ̇(t)) = c. Hence, |γ̇(t)| ≤ (m2 /m1 )1/p |u − v| and (3.16) follows. Finally, to establish (3.17), suppose that there is a t such that |γu,v (t)−lu,v (t)| >  (m2 /m1 )1/p +1 |u−v|. Then, considering that |lu,v (t)−v| ≤ |u−v|, an application of the triangle inequality gives |γu,v (t)−v| > (m2 /m1 )1/p |u−v|. However, by (3.16), |γu,v (t) − v| = |γu,v (t) − γu,v (1)| ≤ (m2 /m1 )1/p |u − v||t − 1| ≤ (m2 /m1 )1/p |u − v|, a contradiction. Thus, inequality (3.17) holds.  3.2. Liminf Inequality. A first step in getting some control over the limit cost F in terms of the discrete costs is the following bound. Lemma 3.2 (Liminf Inequality). Consider γ ∈ Ω(a, b), and suppose we have a sequence of paths γn ∈ Ω(a, b) such that Z 1 lim sup |γn (t) − γ(t)| = 0 and sup |γ̇n |p dt < ∞. n→∞ 0≤t≤1 n 0 Then, F (γ) ≤ lim inf n→∞ F (γn ). Proof. A sufficient condition for this inequality, a ‘lower semicontinuity’ property of F , to hold is that f (x, v) be jointly continuous and convex in v. See Theorem 3.5 (and the subsequent Remark 2) of [8] for more discussion on this matter.  3.3. Limsup Inequality. To make effective use of the liminf inequality, we need to identify a sufficiently rich set of sequences for which a reverse inequality holds. To this end, we develop certain approximations of Lipschitz paths by piecewise linear or piecewise quasinormal paths. The following result gives a method for recovering an element of Vn (a, b) from a suitable element of Ω(a, b). Proposition 3.3. Suppose, for constants c, C, that γ ∈ Ω(a, b) satisfies c≤ |γ(s) − γ(t)| ≤ C, |s − t| (3.18) 16 ERIK DAVIS AND SUNDER SETHURAMAN for all 0 ≤ s < t ≤ 1. Let N = N (n) = dK/n e, where K = C + 1 say, and define v0 = a, vN = b, and vi = Tn γ(i/N ) for 0 < i < N . Then, with respect to realizations {Xi } in the probability 1 set A1 , we have v = (v0 , . . . , vN ) ∈ Vn (a, b) for all sufficiently large n. Proof. To show that v ∈ Vn (a, b), it is sufficient to verify that consecutive vertices vi−1 and vi are connected by an edge in Gn (a, b), or in other words 0 < |vi − vi−1 | < n , for i = 1, . . . , N. We first show that |vi − vi−1 | < n . Note that |γ(i/N ) − γ((i − 1)/N )| ≤ C/N ≤ (C/K)n and C/K < 1. For 1 < i < N , we have |vi − vi−1 | = |Tn γ(i/N ) − Tn γ((i − 1)/N )| ≤ (C/K)n + 2kTn − Idk∞ . Similarly, for segments incident to an endpoint a or b, we have max(|v1 − v0 |, |vN − vN −1 |) ≤ (C/K)n + kTn − Idk∞ . In either case, assumption (2.6) on the decay of n implies that, for realizations {Xi } in A1 , we have |vi − vi−1 | < n for all 1 ≤ i ≤ N and sufficiently large n. Now, we show that 0 < |vi − vi−1 |. By the Lipschitz lower bound on γ, we have |γ(i/N ) − γ((i − 1)/N )| ≥ c/N > (c/(K + 1))n for 1 ≤ i ≤ N . By a triangle inequality argument, the distance between vi and vi−1 is bounded below by (c/(K + 1))n − 2kTn − Idk∞ , which on the set A1 , as n satisfies (2.6) and therefore vanishes slower than kTn − Idk∞ , is positive for all large n.  We now establish some approximation properties obtained by interpolating paths between points in v = (v0 , . . . , vN ). Proposition 3.4. Fix γ ∈ Ω(a, b) satisfying (3.18), and a realization {Xi } in the probability 1 set A1 . Let γn = γv and ln = lv , where N = N (n) and v = (v0 , . . . , vN ) are defined as in Proposition 3.3. Then, we obtain lim sup |γn (t) − γ(t)| = 0, and lim sup |ln (t) − γ(t)| = 0. n→∞ 0≤t≤1 n→∞ 0≤t≤1 In addition, sup kln0 k∞ < ∞, and n ln0 (t) → γ 0 (t) for a.e. t ∈ [0, 1]. (3.19) Proof. We first argue that limn→∞ sup0≤t≤1 |ln (t)−γ(t)| = 0. Let ui = γ(i/N ), and let ˜ln = lu(n) ∈ Ω(a, b) be the piecewise linear interpolation of u(n) = (u0 , . . . , uN ). As γ is Lipschitz and limn→∞ N (n) = ∞, we have limn→∞ sup0≤t≤1 |˜ln (t) − γ(t)| = 0, and also limn→∞ ˜ln0 (t) = γ 0 (t) for a.e. t ∈ [0, 1]. By construction, ln (i/N ) = vi = Tn γ(i/N ) and ˜ln (i/n) = ui = γ(i/N ) so that max |ln (i/N ) − ˜ln (i/N )| ≤ kId − Tn k∞ . 0≤i≤N Then, as ln and ˜ln are piecewise linear, it follows that sup0≤t≤1 |ln (t)−˜ln (t)| ≤ kId− Tn k∞ and, as kId − Tn k∞ vanishes on A1 , that limn→∞ sup0≤t≤1 |ln (t) − γ(t)| = 0. For i/N < t < (i + 1)/N , we have ln0 (t) = N (vi+1 − vi ). APPROXIMATING GEODESICS VIA RANDOM POINTS 17 As |vi+1 − vi | ≤ n (Proposition 3.3), it follows that |ln0 (t)| ≤ N n ≤ K + n . Hence, supn kln0 k∞ < ∞. Likewise, ˜ln0 (t) = N (ui+1 − ui ), and so |l0 (t) − ˜l0 (t)| ≤ N (|vi+1 − ui+1 | + |vi − ui |) ≤ 2N kTn − Idk∞ . n n For realizations in the probability 1 set A1 , since N = dK/n e and n satisfies (2.6) and therefore vanishes slower than kTn −Idk∞ , we have limn→∞ N kTn −Idk∞ = 0. Hence, ln0 (t) → γ 0 (t) for a.e. t ∈ [0, 1]. Now, considering the bound (3.17), it follows that sup |γn (t) − ln (t)| ≤ max (C|v0 − v1 |, . . . , C|vN −1 − vN |) ≤ Cn , 0≤t≤1 and hence kγn − γk∞ → 0.  With the above work in place, we proceed to the main result of this subsection. Lemma 3.5 (Limsup Inequality). Let γ ∈ Ω(a, b) satisfy inequality (3.18). Then, with respect to realizations {Xi } in the probability 1 set A1 , we may find a sequence of paths {γn } taken either in form for all large n as (1) γn ∈ Ωln (a, b) or (2) γn ∈ Ωγn (a, b) such that limn→∞ sup0≤t≤1 |γn (t) − γ(t)| = 0 and F (γ) ≥ lim sup F (γn ). (3.20) n→∞ We remark that the sequence {γn } in the last lemma is called the ‘recovery sequence’ since the liminf inequality in Lemma 3.2 and the limsup inequality in Lemma 3.5 together imply the limit, limn F (γn ) = F (γ). Proof. Let N = dK/n e, where K = C + 1 say is a constant greater than C in (3.18). Define v0 = a, vN = b, and vi = Tn γ(i/N ) for 0 < i < N . Then, by Proposition 3.3, v = v(n) = (v0 , . . . , vN ) ∈ Vn (a, b). We now consider paths in case (1). By Proposition 3.4, the interpolated paths ln = lv ∈ Ωln (a, b) converge uniformly to γ. Consider the bound Z 1 |F (ln ) − F (γ)| ≤ |f (ln (t), ln0 (t)) − f (γ(t), γ 0 (t))| dt. 0 By Proposition 3.4, ln0 converges almost everywhere to γ 0 , and supn kln0 k∞ < ∞. Hence (ln (t), ln0 (t)) → (γ(t), γ 0 (t)) for almost every t. Also, kγ̇k∞ < C by (3.18). Since, by (2.4), f (x, v) ≤ m2 |v|p , an application of the bounded convergence theorem yields limn→∞ |F (ln )−F (γ)| = 0. Here, {ln } is the desired ‘recovery’ sequence. We now consider case (2). Let γn = γv ∈ Ωγ (a, b). By Proposition 3.4, it follows that limn→∞ sup0≤t≤1 |γn (t) − γ(t)| = 0. To show (3.20) for this sequence, write Z 1 F (γn ) = f (γn (t), γ˙n (t)) dt 0 = N Z X i=1 ≤ f (γn (t), γ˙n (t)) dt (i−1)/N N Z X i=1 i/N i/N f (ln (t), l˙n (t)) dt = F (ln ), (i−1)/N as γn on the time interval [i/N, (i+1)/N ] corresponds to the minimum cost, geodesic path moving from vi to vi+1 (cf. (2.10)), and ln is a possibly more expensive path. 18 ERIK DAVIS AND SUNDER SETHURAMAN But, by case (1), lim sup F (γn ) ≤ lim sup F (ln ) ≤ F (γ).  3.4. Compactness. In this Subsection, we consider circumstances under which a sequence of paths {γn }, in the context of Theorems 2.1 and 2.2, has a limit point with respect to uniform convergence. Here, the arguments when p = 1 differ from those when p > 1. R1 In particular, consider paths γn where 0 f (γn (t), γ˙n (t)) dt is uniformly bounded. One has m1 |v|p ≤ f (x, v) and it follows that {γn } is bounded in the W 1,p Sobolev space. When p > 1, this is sufficient to derive a suitable compactness result. But, when p = 1, this is no longer the case. However, when p = 1, our general outlook is that it is enough to establish a compactness result for sequences of optimal paths, on which certain eccentric possibilities are ruled out. We begin by considering such compactness when p = 1, when the paths lie in Ωγn (a, b). The setting p > 1 is discussed afterwards. Proposition 3.6. Suppose d ≥ 2 and that p = 1. Then, with respect to realizations {Xi } in the probability 1 set A1 ∩ A2 , for all large n, if γ ∈ arg min Gn and 0 ≤ s, t ≤ 1, we have that |γ(s) − γ(t)| ≤ (4m2 /m21 )Gn (γ)|s − t|. Proof. The path γ ∈ Ωγn (a, b) is a piecewise quasinormal path of the form γ = γv where v = (v0 , v1 , . . . , vm ) ∈ Vn (a, b). We now try to relate m, the number of segments in the path, to Gn (γ), the path energy. Recall the formula (2.9). Let Bi denote the (open) Euclidean ball of radius n /2 around vi . We claim that |Bi ∩ {v0 , . . . , vm }| ≤ 2. To see this, suppose that there are at least 3 points of {v0 , . . . , vm } in Bi . Let vj and vl denote the points in Bi with the smallest and largest index, respectively. By minimality of γ, vj 6= vl . Let vk denote a third point in Bi . As vk , vl ∈ Bi , we have |vk − vl | < n , and so these points are connected in the graph. Applying the triangle inequality for df , valid when p = 1 (cf. (2.5)), and noting on the event A2 that vk 6∈ Sγvj ,vl , we have df (vj , vl ) < df (vj , vk ) + df (vk , vl ) ≤ df (vj , vj+1 ) . . . + df (vl−1 , vl ). Thus, the path γ̃ = γw , where w = (v0 , . . . , vj , vl , . . . , vm ), satisfies Gn (γ̃) < Gn (γ). This contradicts the optimality of γ, and therefore |Bi ∩ {v0 , . . . , vm }| ≤ 2. We may thus cover the vertices of γ with balls {Bi }m i=1 , centered on the vertices {vi }m i=1 , and each of these balls contains at most two vertices. It follows that there is a subcover by s ≥ m/2 balls, {B10 , . . . , Bs0 }, no two of them containing a common point in v. A lower bound for Gn (γ) is found by considering that part of the Gn -integral contributed to by the portion of the path γ in Bi0 . Each such portion, if it does not terminate in Bi0 , must visit both the center of Bi0 and the boundary ∂Bi0 , and hence has Euclidean length at least n /2. Summing over these portions, we obtain s X n mn ≤ ≤ L, 4 2 i=1 where L = R1 0 |γ̇(t)| dt is the Euclidean arclength of γ. APPROXIMATING GEODESICS VIA RANDOM POINTS 19 By (2.4), it follows that m1 mn ≤ m1 L ≤ 4 Z t f (γ(t), γ̇(t))dt = Gn (γ). (3.21) 0 To get a Lipschitz bound for γ, recall the bound (3.16). Then, γvi−1 ,vi (m · −i) is Lipschitz with constant (m2 /m1 )m|vi−1 − vi |. It follows that γ, being the concatenation of these segments, satisfies |γ(s) − γ(t)| = q−1 X γ(wr ) − γ(wr+1 ) r=0 ≤ (m2 /m1 )m max (|v0 − v1 |, . . . , |vm−1 − vm |) q−1 X |wr − wr+1 | r=0 ≤ (m2 /m1 )mn |s − t|, m−1 where s = w0 < · · · wq = t, {wr }q−1 r=1 ⊂ {j/m}j=1 so that |wr − wr+1 | ≤ 1/m for 0 ≤ r ≤ q − 1. Then, with (3.21), we obtain |γ(t) − γ(s)| ≤ (m2 /m1 )mn |s − t| ≤ (4/m1 )(m2 /m1 )Gn (γ)|s − t|, finishing the proof.  We now prove our compactness property. Lemma 3.7 (Compactness Property). (I). Suppose for all large n that either γn ∈ arg min Ln or γn ∈ arg min Gn . Then, for realizations {Xi } in the probability 1 set A1 , we have supn F (γn ) < ∞. (II). Consider now the following cases: (i) Suppose paths γn ∈ arg min Gn for all large n. (ii) Suppose p > 1, and paths γn ∈ Ω(a, b) for all large n such that supn F (γn ) < ∞. Then, in case (i) when p > 1, and in case (ii), with respect to realizations {Xi } in the probability 1 set A1 , we have {γn } is relatively compact for the topology of uniform convergence. For case (i) when d ≥ 2 and p = 1, the same conclusion holds with respect to realizations {Xi } in the probability 1 set A1 ∩ A2 . Proof. We first prove the bound supn F (γn ) < ∞ in part (I). Choose a γ̃ ∈ Ω(a, b), where (3.18) holds, and F (γ̃) < ∞. By Lemma 3.5, there is a sequence {γ̃n } of either piecewise linear or quasinormal paths such that lim supn→∞ F (γ̃n ) ≤ F (γ̃). Hence, by minimality of {γn }, with respect to paths in either Ωln or Ωγn , we have sup F (γn ) ≤ sup F (γ̃n ) < ∞. n (3.22) n We now argue the claims for cases (i) and (ii). In both cases, as D is bounded, the paths γn : [0, 1] → D are uniformly bounded. To invoke the Arzela-Ascoli theorem, we must show that {γn } is an equicontinuous family. In case (i), when d ≥ 2 and p = 1, by Lemma 3.6 on realizations in A1 ∩ A2 , we have |γn (s)−γn (t)| ≤ CGn (γn )|s−t|, with C independent of n. As Gn (γn ) = F (γn ), combining with (3.22), it follows that {γn } is equicontinuous. If p > 1, with respect to realizations in A1 , (3.22) implies that, if case (i) holds for the sequence, then case (ii) holds. Without loss of generality, then, we focus our attention now on case (ii). Recall, by (2.4), that m1 |v|p ≤ f (x, v). Let q be the conjugate of p, that is 1/p + 1/q = 1. 20 ERIK DAVIS AND SUNDER SETHURAMAN Then, for 0 ≤ s < t ≤ 1, Z |γn (s) − γn (t)| ≤ t |γn0 (r)| dr s ≤ |t − s| 1/q 1 Z |γn0 (t)|p 1/p dt (3.23) 0 1/p ≤ (|t − s|1/q /m1 ) Z 1 f (γn (t), γn0 (t)) dt 1/p 0 1/p = (|t − s|1/q /m1 )F (γn )1/p Combining (3.23) and the assumption in case (ii) that supn F (γn ) < ∞, we have |γn (s) − γn (t)| ≤ C|t − s|1/q for a constant C independent of n, and hence {γn } is equicontinuous.  3.5. Proof of Theorems 2.1 and 2.2. With the preceding ‘Gamma convergence’ ingredients in place, the proofs of Theorem 2.1 and 2.2 are similar, and will be given together. Proofs of Theorems 2.1 and 2.2. Fix a realization {Xi } in the probability 1 set A1 . Let {γn } be a sequence of paths such that, for all large n, we have either γn ∈ arg min Ln or γn ∈ arg min Gn . Supposing that {γn } has a subsequential limit limk→∞ γnk = γ, with respect to the topology of uniform convergence, we now argue that γ ∈ arg min F . By the ‘liminf’ Lemma 3.2, we have F (γ) ≤ lim inf F (γnk ). k→∞ (3.24) Let γ ∗ ∈ arg min F . Then, by inequality (5.49) of Proposition 5.2, there exist constants c1 , c2 such that c1 |s − t| ≤ |γ ∗ (s) − γ ∗ (t)| ≤ c2 |s − t| for 0 ≤ s, t ≤ 1. Hence, by the ‘limsup’ Lemma 3.5, there exists a sequence {γn∗ }, of either piecewise linear or quasinormal paths, converging uniformly to γ ∗ and lim supn→∞ F (γn∗ ) ≤ F (γ ∗ ). Recall that F (γ) = Ln (γ) or F (γ) = Gn (γ) when γ is piecewise linear or quasinormal respectively. Combining with (3.24) and minimality of γnk , we have F (γ) ≤ lim inf F (γnk ) ≤ lim sup F (γn∗k ) ≤ F (γ ∗ ) = min F, k→∞ (3.25) k→∞ and so γ ∈ arg min F . In the case the paths {γn } are piecewise linear, since F (γn ) = min Ln , it follows from (3.25) that lim min Lnk = min F. k→∞ Similarly, when {γn } are piecewise quasinormal, limk→∞ min Gnk = min F . Therefore, we have shown that, if a subsequential limit of {γn } exists, it is an optimal continuum path γ ∈ arg min F . Consider now Theorem 2.1, where p > 1 and γn ∈ arg min Ln , and part (1) of Theorem 2.2 where p > 1 and γn ∈ arg min Gn . By the ‘compactness’ Lemma 3.7, supn F (γn ) < ∞ and a subsequential limit exists. Consider now part (2) of Theorem 2.2 where d ≥ 2, p = 1 and γn ∈ arg min Gn . Suppose that the realization {Xi } belongs also to the probability 1 set A2 . Then, subsequential limits follow again from the ‘compactness’ Lemma 3.7. APPROXIMATING GEODESICS VIA RANDOM POINTS 21 Now, consider any subsequence {nk } of N. Then, by the work above, applied to the sequence {nk }, there is a further subsequence {nkj }, and a γ ∈ arg min F , with γnkj → γ uniformly, in the settings of Theorems 2.1 and 2.2. Moreover, limj→∞ min Lnkj = min F when the paths {γnkj } are piecewise linear, and limj→∞ min Gnkj = min F when the paths are piecewise quasinormal. Since this argument is valid for any subsequence {nk } of N, we recover that min Ln → min F or min Gn → min F when respectively the paths are piecewise linear or quasinormal. Finally, if F has a unique minimizer γ, by considering subsequences again, the whole sequence {γn } must converges uniformly to γ.  3.6. Proof of Corollary 2.3. Corollary 2.3 is a statement about Hausdorff convergence. In order to adapt the results of Theorems 2.1 and 2.2 to this end, we make the following observation. Proposition 3.8. Fix a realization {Xi } in A1 , and consider a sequence of paths {γn } such that γn for all large n is either in the form (1) γn = γv(n) or (2) γn = lv(n) , where v(n) ∈ Vn (a, b). Suppose that γn converges uniformly to a limit γ ∈ Ω(a, b). Then, lim dhaus (v(n) , Sγ ) = 0. n→∞ (n) (n) (n) Proof. Write v(n) = (v0 , . . . , vm(n) ). Since γn → γ uniformly and vi it follows that (n) lim max inf |vi − x| = 0. i ), = γn ( m(n) n→∞ 1≤i≤m(n) x∈Sγ (3.26) On the other hand, consider t with i/m(n) ≤ t < (i + 1)/m(n). In case (1), (n) |γ(t) − vi | ≤ |γ(t) − γ(i/m(n))| + kγn − γk∞ ≤ C/m(n) + kγn − γk∞ , where C is the Lipschitz constant of γ. In case (2), using linearity of the path, (n) (n) (n) |γ(t) − vi | ≤ |vi+1 − vi | + kγn − γk∞ ≤ n + kγn − γk∞ . Pm(n) (n) (n) Since v(n) is a path in Vn (a, b), one may bound n m(n) ≥ i=0 |vi − vi+1 | ≥ |a − b|, and so m(n) ≥ |a − b|/n diverges. Hence, in both cases, lim sup min n→∞ x∈Sγ 1≤i≤m(n) (n) |x − vi | = 0. Combining (3.26) and (3.27), it follows that limn→∞ dhaus (v(n) , Sγ ) = 0. (3.27)  We now proceed to prove Corollary 2.3. Proof of Corollary 2.3. We give the argument for the case of piecewise linear optimizers, as the the argument is exactly the same for piecewise quasinormal paths, using Theorem 2.2 instead of Theorem 2.1 below. Suppose ln = lv(n) ∈ arg min Ln is a sequence of paths where v(n) ∈ Vn (a, b). By Theorem 2.1, with respect to a probability 1 set of realizations {Xi }, any subsequence of {ln } has a further subsequence {lnk } which converges uniformly to a γ ∈ arg min F . By Proposition 3.8, it follows that limk→∞ dhaus (v(nk ) , Sγ ) = 0. Suppose now that F has a unique (up to reparametrization) minimizer γ. Note that Sγ is invariant under reparametrization of γ. Then, we conclude that all limit points of {v (n) } correspond to Sγ , and hence the whole sequence v (n) converges to Sγ , limn→∞ dhaus (v (n) , Sγ ) = 0.  22 ERIK DAVIS AND SUNDER SETHURAMAN 4. Proof of Theorems 2.4, 2.7 and 2.8 The proofs of Theorems 2.4, 2.7 and 2.8 all make use of Theorems 2.1 and 2.2 in comparing the costs Hn and Ln to Gn . When p = 1, as with respect to Theorem 2.2, the arguments in Theorems 2.7 and 2.8 are more involved, especially with respect to the minimal cost Hn -path convergence, where several geometric estimates are used to show a compactness principle. We begin with the following useful fact. Proposition 4.1. Suppose U, W, C : X → R are functions such that |U (x) − W (x)| ≤ C(x) for all x ∈ X. If U (x1 ) = min U and W (x2 ) = min W then −C(x1 ) ≤ min U − min W ≤ C(x2 ). Proof. For any y ∈ X we have min U = U (x1 ) ≤ U (y) ≤ W (y) + C(y). Taking y = x2 gives min U ≤ min W + C(x2 ). The other inequality follows similarly.  4.1. Proof of Theorem 2.4. Suppose v = (v0 , v1 , . . . , vm ) ∈ Vn (a, b). Then (Lip) implies, for 0 ≤ i ≤ m − 1, that Z 1 f (vi + t(vi+1 − vi ), vi+1 − vi ) dt − f (vi , vi+1 − vi ) ≤ c|vi+1 − vi |p+1 . (4.28) 0 Since vi , vi+1 are neighbors in the n -graph, |vi+1 − vi | ≤ n . Thus, from the homogeneity (2.3) and bounds (2.4) of f , rescaling (4.28) gives Z i+1 m i 1 f (vi + m(s − )(vi+1 − vi ), m(vi+1 − vi )) ds − f (vi , m(vi+1 − vi )) i m m m cn ≤ |vi+1 − vi |p mp . m Recall formulas (2.8) and (2.11). Summing over i gives the following estimate relating Ln and Hn : |Ln (lv ) − Hn (v)| ≤ m−1 cn X |vi+1 − vi |p mp . m i=0 (4.29) Applying (2.4), the right-side of (4.29) can be bounded above in terms of both Ln (lv ) and Hn (v). Hence, with c0 = cm−1 1 , |Ln (lv ) − Hn (v)| ≤ c0 n min(Ln (lv ), Hn (v)). Suppose lv(n) ∈ arg min Ln and w of (4.30) and Proposition 4.1 is −c0 n min Ln (n) (4.30) ∈ arg min Hn . An immediate consequence ≤ −c0 n min(Ln (lv(n) ), Hn (v(n) )) ≤ min Ln − min Hn ≤ c0 n min(Ln (lw(n) ), Hn (w(n) )) ≤ c0 n min Hn . By Theorem 2.1, we have limn→∞ min Ln = min F for almost all realizations {Xi } (those in A1 as the proof shows). Then, min Hn ≤ (1 + c0 n ) min Ln and so lim sup min Hn ≤ min F a.s. In particular, as min F < ∞, we have supn min Hn < ∞ a.s. On the other hand, min Hn ≥ min Ln − c0 n min Hn a.s. As supn min Hn < ∞, we observe that lim inf min Hn ≥ min F a.s. Hence, min Hn → min F a.s. This finishes one part of Theorem 2.4. APPROXIMATING GEODESICS VIA RANDOM POINTS 23 To address the others, consider lw(n) , the piecewise linear interpolation of w(n) . By (4.30), we have Ln (lw(n) ) ≤ (1 + c0 n )Hn (w(n) ) = (1 + c0 n ) min Hn . Moreover, noting the optimality of lv(n) and w(n) gives Ln (lv(n) ) ≤ Ln (lw(n) ) ≤ (c0 n + 1)Hn (v(n) ). (4.31) Another application of (4.30) yields Hn (v(n) ) ≤ c0 n Ln (lv(n) ) + Ln (lv(n) ). Hence, the left-side of (4.31) is bounded as min Ln = Ln (lv(n) ) ≤ = Ln (lw(n) ) ≤ (c0 n + 1)2 Ln (v(n) ) (c0 n + 1)2 min Ln . (4.32) Hence, as min Ln → min F a.s., we have min F = lim Ln (lv(n) ) = lim Ln (lw(n) ) a.s. n→∞ n→∞ (4.33) We also observe, as a consequence, that supn Ln (lw(n) ) < ∞ a.s. Given that p > 1, by the ‘compactness’ Lemma 3.7, with respect to realizations {Xi } in the probability 1 set A1 , any subsequence of {lw(n) } has a further uniformly convergent subsequence to a limit γ̃ ∈ Ω(a, b). By the ‘liminf’ Lemma 3.2, F (γ̃) ≤ lim inf n→∞ Ln (lw(n) ) a.s. Finally, by (4.33), it follows that F (γ̃) = min F and so γ̃ ∈ arg min F . Consequently, if F has a unique minimizer γ, then the whole sequence {lw(n) } converges uniformly almost surely to it. The proofs of statements about Hausdorff convergence follow the same arguments as given for Corollary 2.3, and are omitted.  4.2. Proof of Theorems 2.7 and 2.8. We prove Theorems 2.7 and 2.8 in two parts. Proof of Theorems 2.7 and 2.8. First, we prove in Proposition 4.3 that the minimal costs of Hn and Ln converge to min F , making use of comparisions with quasinormal paths, for which we have control in Theorem 2.2. Second, in Proposition 4.9 in Subsection 4.2.2, we show that the minimizing paths converge in the various senses desired. A main tool in this proof is a compactness property (Proposition 4.4), for minimal Hn and Ln -paths when p = 1, shown in Subsection 4.2.1.  To supply the proofs of the desired propositions, we now obtain an useful estimate between the cost of a quasinormal path and a linear one. Proposition 4.2. Suppose d ≥ 2, p = 1, and that f also satisfies (Lip) and (Hilb). For a, b ∈ D such that |b − a| ≤ 1, there is a constant c1 such that df (a, b) − f (a, b − a) ≤ c1 |b − a|2 . R1 In particular, as df (a, b) = 0 f (γ(t), γ̇(t))dt for the quasinormal path γ = γa,b connecting a and b, we have Z 1 f (γ(t), γ̇(t))dt − f (a, b − a) ≤ c1 |b − a|2 . 0 24 ERIK DAVIS AND SUNDER SETHURAMAN Proof. By (2.4), for a Lipschitz path β from a to b, we have Z 1 Z 1 Z 1 f (β(t), β̇(t))dt ≤ m2 |β̇(t)|dt. |β̇(t)|dt ≤ m1 | 0 0 0 R1 Optimizing over β, we recover that m1 |b − a| ≤ 0 f (γ(t), γ̇(t))dt ≤ m2 |b − a|. By R1 (2.4) again, we have that the arclength of γ satisfies 0 |γ̇(t)|dt ≤ (m2 /m1 )|b − a|. In particular, the path γ is constrained in the Euclidean ball B around a of radius (m2 /m1 )|b − a|. Note also that the minimizing Euclidean path γ e, with constant speed |b − a| on the straight line from a to b in times 0 ≤ t ≤ 1, is also constrained in this ball. Now, for a Lipschitz path β, constrained in the ball B, expand Z 1 Z 1 Z 1 f (β(t), β̇(t))dt = f (a, β̇(t))dt + f (β(t), β̇(t)) − f (a, β̇(t))dt. 0 0 0 As the paths are in B, by (Lip), with respect to a Lipschitz constant C, |f (β(t), β̇(t)) − f (a, β̇(t))| ≤ C|β(t) − a||β̇(t)| ≤ C(m2 /m1 )|b − a||β̇(t)|. Therefore, with respect to Lipschitz paths β constrained in B, Z 1 Z 1 Z f (β(t), β̇(t))dt − f (a, β̇(t))dt ≤ C(m2 /m1 )|b − a| 0 0 1 |β̇(t)|dt. 0 Note, by condition (Hilb) that, for the cost with respect to f (a, ·), straight lines are geodesics, and in particular γ e(t) = (1 − t)a + tb is optimal. Hence, the minimal F -cost, with respect to f (a, ·), of moving from a to b, given invariance to parametrization when p = 1, is f (a, b − a). Then, by Proposition 4.1, applied to the two functionals of β on the left-hand sides, we obtain Z 1 hZ 1 i df (a, b) − f (a, b − a) ≤ C(m2 /m1 )|b − a| max |γ̇(t)|dt, |γ e˙ (t)|dt , 0 ≤ 0 C(m2 /m1 )2 |b − a|2 , noting the arclength bounds of γ = γa,b and γ e above.  Proposition 4.3. Suppose d ≥ 2, p = 1, and that f also satisfies (Lip) and (Hilb). With respect to realizations {Xi } in the probability 1 set A1 ∩ A2 , the minimum values of Hn and Ln converge to the minimum of F , lim min n→∞ v∈Vn (a,b) Hn (v) = lim min n→∞ γ∈Ωln (a,b) Ln (γ) = min F (γ). γ∈Ω(a,b) Proof. Consider the energies Gn and Hn in (2.9) and (2.11). For γ = γv , the piecewise quasinormal path through the vertices v = (v0 , v1 , . . . , vm ) ∈ Vn (a, b), we have, noting p = 1, that m−1 XZ 1 Gn (γ) = f (γi (t), γ̇i (t)) dt, i=0 0 where γi = γvi ,vi+1 is a quasinormal path from vi to vi+1 . APPROXIMATING GEODESICS VIA RANDOM POINTS 25 An application of Proposition 4.2, noting that |vi+1 − vi | ≤ n , gives Z 1 f (γi (t), γ˙i (t)) dt − f (vi , vi+1 − vi ) ≤ c1 n |vi+1 − vi |. 0 Summing this over i gives |Gn (γ) − Hn (v)| ≤ c1 n ≤ m−1 X i=0 c1 m−1 1 n |vi+1 − vi | (4.34) min(Gn (γ), Hn (v)), where the last inequality follows from applying (2.4) to both Gn and Hn . Recall the energy Ln in (2.8). Similarly, and more directly, using (Lip), we have for a linear path l = lv ∈ Ωln (a, b) through vertices v = (v0 , . . . , vm ) ∈ Vn (a, b) that Z 1 f (li (t), l˙i (t)) dt − f (vi , vi+1 − vi ) ≤ c1 n |vi+1 − vi |, 0 where li = lvi ,vi+1 is the linear path from vi to vi+1 with slope vi+1 − vi . Summing over i, using (2.4), we obtain |Ln (l) − Hn (v)| ≤ c1 n m−1 X |vi+1 − vi | ≤ c1 m−1 1 n min(Ln (l), Hn (v)). (4.35) i=0 We now reprise some of the argument for Theorem 2.4. A consequence of (4.34) and Proposition 4.1 is −1 −c1 m−1 1 n min Gn ≤ min Gn − min Hn ≤ c1 m1 n min Hn . Hence, supn min Hn < supn (1 + c1 m−1 1 n ) min Gn . By Theorem 2.2, as seen in its proof, for realizations in the probablility 1 set A1 ∩ A2 , we have limn→∞ min Gn = min F , which is finite. Then, we conclude that also limn→∞ min Hn = min F a.s. Now, we can repeat this same argument with Ln and (4.35) in place of Gn and (4.34), using now min Hn → min F a.s., to conclude that also min Ln converges to min F a.s.  4.2.1. Compactness Property. When d ≥ 2 and p = 1, analogous to Lemma 3.6, we formulate now a compactness property for minimal paths w(n) ∈ arg min Hn and lv(n) ∈ arg min Ln . It will be useful to consider a partition of D by a regular grid. Let z ∈ Zd Qd and let  √n,z be the intersection of the box i=1 [zi τn , (zi + 1)τn ) with D, where τn = n / d. We will refer to these sets as ‘boxes’, with the understanding that the boundary of D results in some of these being irregularly shaped. Regardless, each n,z has diameter at most n , and so points of {Xi }ni=1 in n,z are all connected in the random geometric graph. Proposition 4.4. Consider the assumptions in the second parts of Theorems 2.7 and 2.8. Suppose w(n) ∈ arg min Hn , and consider the piecewise linear interpolations ln = lw(n) . Then, with respect to a realizations {Xi }i≥1 in a probability 1 subset of A1 ∩A2 , the sequence {ln } is relatively compact for the topology of uniform convergence. Suppose now lv(n) ∈ arg min Ln . Then, the same conclusion holds for the optimal linear interpolations {lv(n) }. 26 ERIK DAVIS AND SUNDER SETHURAMAN Proof. We show that the sequence {ln } is equicontinuous for almost all realizations in A1 . As the paths belong to a bounded set D, the proposition would then follow from the Arzela-Ascoli criterion. Partition D by boxes {n,z }z∈Zd . By Lemma 4.5 below, the number of boxes visited by w(n) and v(n) is a.s. bounded by C/n a.s., for all large n, where C = C(f, d). By Lemma 4.8 below, the number of vertices in w(n) and v(n) in a box is a.s. bounded by a constant K = K(d, ρ, α) for all large n. Thus, the maximum number kn of points in w(n) and v(n) is a.s. bounded, kn ≤ KC/n . (n) (n) (n) (n) Since |wi+1 − wi |, |vi+1 − vi | ≤ n , we obtain (n) (n) supi kn |vi+1 − vi | ≤ KC a.s. for all large n. (n) (n) supi kn |wi+1 − wi | ≤ KC and This implies a.s. that the piecewise linear paths ln and lv(n) are Lipschitz, with respect to the fixed constant KC, for all large n, and so in particular equicontinuous. (n) (n) Indeed, for ln = lw(n) , where say w(n) = (w0 , . . . , wkn ), consider the part of the (n) path connecting wi (n) and wi+1 from times i/kn to (i + 1)/kn , namely ln (t) = (n) (n) (n) (n) wi (i + 1 − kn t) + wi+1 (kn t − i). Then, we have |l˙n (t)| = kn |wi+1 − wi | ≤ kn n ≤ KC. The same argument holds for the paths lv(n) .  We now show the lemmas used in the proof Proposition 4.4. We first bound the number of boxes visited by an optimal path. Lemma 4.5. Suppose d ≥ 2, p = 1, and that f also satisfies (Lip) and (Hilb). Suppose w ∈ arg min Hn and lv ∈ arg min Ln are optimal paths. Then, for realizations {Xi } in the probability 1 set A1 ∩ A2 , for all large n, the number of distinct boxes {n,z }z∈Zd visited by w and v is bounded by C/n , where C = C(d, f ). d Proof. Any visit √ of the path w or v to 2 + 1 distinct boxes has an Euclidean length of at least n / d, since not all 2d + 1 boxes can be adjacent. Recalling (2.4), and the formulas (2.8)√and (2.11), such a visitation therefore has a Hn cost or Ln cost of at least m1 n / d. So, we may √ bound the number of boxes visited by w or v by C 0 Hn (w)/n , where C 0 = (2d + 1) d/m1 depends on the dimension and f , but not on the path w or v. Recalling Proposition 4.3, we have with respect to realizations in A1 ∩ A2 that lim min Hn = lim min Ln = min F < ∞. The lemma then follows with say C = 2C 0 min F .  The next result shows that optimal paths w ∈ arg min Hn and lv ∈ arg min Ln cannot have ‘long necks’, and gives a bound on the number of points nearby an edge in the graph. Lemma 4.6. Suppose d ≥ 2 and p = 1. Fix a realization {Xi } in the probability 1 set A1 . Suppose w ∈ arg min Hn is an optimal path. If i < j is such that |wi − wj | < n , then wk ∈ B(wi , Cn ), for i ≤ k ≤ j, (4.36) where C = 2(m2 /m1 ). Further, let Θn = supi,j:|wi −wj |<n |i − j|, and suppose n = n−δ , where δ > 1/(β + d) and β > 0. Then, with respect to realizations in a probability 1 subset of A1 , for all large n, we have Θn ≤ −β (4.37) n . APPROXIMATING GEODESICS VIA RANDOM POINTS 27 Suppose now lv ∈ arg min Ln . The same conclusions (4.36) and (4.37) hold with v in place of w. Proof. We first show (4.36). If one of the points {wk }jk=i is more than an Euclidean distance 2(m2 /m1 )n away from wi , then, recalling (2.4), we have j−1 X f (wk , wk+1 − wk ) ≥ m1 k=i j−1 X |wk+1 − wk | k=i ≥ 2m2 n ≥ 2m2 |wj − wi | ≥ 2f (wi , wj − wi ). But, this implies that the path connecting wi and wj in one step would be less costly, with respect to Hn , than w. Since w was taken to be minimal, all points {wk }jk=i therefore must belong to B(wi , 2(m2 /m1 )n ). Suppose now lv ∈ arg min Ln and recall the form of Ln when p = 1 in (2.8). Similarly, if one of the points {vk }jk=i is away from vi by 2(m2 /m1 )n , we have j−1 Z 1 j−1 X X f (lvk ,vk+1 (t), vk+1 − vk )dt ≥ m1 |vk+1 − vk | k=i 0 k=i 1 Z ≥ 2m2 n ≥ 2m2 |vj − vi | ≥ 2 f (lvi ,vj (t), vj − vi )dt, 0 also a contradiction of minimality of lv . We now consider (4.37). The proof here is a count bound with respect to w. The argument with respect to v is exactly the same with v in place of w. First, |j − i| is bounded by the number Ni,n of points {Xi }ni=1 , distinct from wi , in the ball B(wi , Cn ). Then, Ni,n is Binomial(n − 1, p) where p = ν(B(Xi , Cn )). For k ≥ 1, we have   n−1 k (np)k . P(Ni,n ≥ k) ≤ p ≤ k! k Recalling that ν = ρdx and ρ is bounded, we have p ≤ kρk∞ Vol(B(0, 1))dn , and so P (Ni,n ≥ k) ≤ (C 0 ndn )k /k! for some constant C 0 . Let Nn = max{Ni,n }ni=1 . Then, a union bound gives that n exp{k(log n + d log n + log C 0 )}. P (Nn ≥ k) ≤ k! √ Taking k = d−β 2πe−k k k+1/2 , yields that n e, and noting k! ≥ n 0 P (Nn ≥ −β exp{−β (4.38) n (log n + (β + d) log n + log C + 1)}. n )≤ √ 2π If n is in the form n = n−δ , then the right hand side of (4.38) is summable when (β + d)δ > 1. Hence, by Borel-Cantelli lemma, for realizations in the intersection of a probability 1 set and A1 say, we have Θn ≤ maxi Ni,n ≤ Nn ≤ −β n for all large n, and (4.37) follows.  We now give a lower bound on the cost of certain ‘long necks’, that is the cost of an optimal Hn -path w of moving away from two close by vertices. Lemma 4.7. Suppose d ≥ 2, p = 1 and that f also satisfies (T rIneq), and (P ythag) with α > 1. Fix a realization {Xi } in the probability 1 set A1 . Suppose w ∈ arg min Hn is an optimal path, and let i < j be indices such that |wi −wj | < n . 28 ERIK DAVIS AND SUNDER SETHURAMAN Let ` denote the straight line segment from wi to wj . Consider a neighborhood A = ∪x∈` B(x, r) of `, with r = α n. Then, if there is a point wk 6∈ A for some i < k < j, there is a constant C = C(α, f ) such that j−1 X f (wi , wq+1 − wq ) ≥ f (wi , wj − wi ) + Crα . (4.39) q=i Suppose now lv ∈ arg min Ln . Then, (4.39) holds with v in place of w. Proof. . The argument for v is the same as for w, which we now present. Suppose a point wk is at least an Euclidean distance r from `. By the (TrIneq) condition, Pj−1 q=i f (wi , wq+1 − wq ) ≥ f (wi , wk − wi ) + f (wi , wj − wk ). By Lemma 4.6, as |wi − wj | < n , we have |wk wi | = |wk − wi | ≤ 2(m2 /m1 )n , which is strictly less than an η < 1 for all large n. We also conclude |wj wk |, |wi wj | < η < 1 for all large n. In addition, 2(m2 /m1 )r1/α = 2(m2 /m1 )n ≥ |wi wj |. Thus, by (Pythag) with x = wi , we obtain f (wi , wk − wi ) + f (wi , wj − wk ) ≥ f (wi , wj − wi ) + Crα , where C = C(α, f ). Hence, (4.39) follows by combining the inequalities.  We now bound the number of points of an optimal path in a box, the main estimate used in the proof of Proposition 4.4. The argument is in two steps. In the first step, using a rough count on the number of vertices of the path within a given box, we may approximate the contribution to Hn and Ln from the vertices in the box in terms of a ‘localized’ cost. Then, we use (Pythag), applied to the ‘localized’ cost, to deduce that the optimal path in the box is trapped in a ‘small’ set in the box. The second step then is to show that such ‘small’ sets contain only a constant number of points in {Xi }. Lemma 4.8. Consider the assumptions of the second parts of Theorems 2.7 and 2.8. Suppose w ∈ arg min Hn is an optimal path. Then, with respect to realizations {Xi } in a probability 1 subset of A1 , for all large n, there is a constant K, such that |{wj }nj=1 ∩ n,z | ≤ K for all z ∈ Zd . Suppose now lv ∈ arg min Ln . Then, the same statement above holds with v in place of w. Proof. We will give the main argument for w and indicate modifications with respect to v. Consider a box  := n,z . Boxes with at most one point trivially satisfy the claim in the lemma if say K ≥ 2. Suppose now that there are at least two points in the box . Step 1. Let wi and wj be the first and last points of w in the box, that is, with the smallest and largest indices respectively. By Lemma 4.6, as |wi − wj | < n , we have Pj−1 wk ∈ B(wi , C 0 n ) for i ≤ k ≤ j. Hence, by (Lip), we have | k=i f (wk , wk+1 −wk )− Pj−1 0 2 −1 k=i f (wi , wk+1 −wk )| ≤ C n |j −i|. Now, also by Lemma 4.6, when δ > (β +d) for β > 0, we have |j − i| ≤ n−β . Hence, the following estimate, with respect to a ‘localized’ energy, where x = wi is fixed, is obtained: j−1 X k=i f (wk , wk+1 − wk ) − j−1 X k=i f (wi , wk+1 − wk ) ≤ C 0 2−β . n (4.40) APPROXIMATING GEODESICS VIA RANDOM POINTS 29 Similarly, when v is considered, following the same reasoning using Lemma 4.6 and (Lip), we may obtain (4.40) with v in place of w, and moreover j−1 j−1 Z 1 X X f (lvk ,vk+1 (t), vk+1 − vk )dt − f (vk , vk+1 − vk ) ≤ C 0 2n |j − i| ≤ C 0 2−β . k=i 0 k=i Hence, combining these two estimates, we obtain that j−1 Z 1 j−1 X X f (lvk ,vk+1 (t), vk+1 − vk )dt − f (vi , vk+1 − vk ) ≤ 2C 0 2−β . n k=i 0 (4.41) k=i Returning to the path w, by Lemma 4.7, noting (4.40), any path (wi , . . . , wj ) exiting A, the r = α n -neighborhood of the line segment from wi to wj , is costlier, with respect to Hn , than the Hn -cost f (wi , wj − wi ) of a straight path connecting wi to wj in a single hop, as follows: j−1 X 0 2−β f (wq , wq+1 − wq ) − f (wi , wj − wi ) ≥ Crα − C 0 2−β = C2α . (4.42) n n − C n q=i Let us now consider v. Since |vi − vj | ≤ Cn by Lemma 4.6, using (Lip), we have that Z 1 f (vi , vj − vi ) − f (lvi ,vj (t), vj − vi )dt ≤ C 0 2n . (4.43) 0 Following the same reasoning given with respect to w, we may obtain (4.42) with v in place of w. Then, noting (4.41), a path (vi , . . . , vj ), exiting the r = α nneighborhood of the line segment from vi to vj , has Ln cost more than the one step Hn cost f (vi , vj − vi ) by the amount Crα − 2C 0 2−β . By (4.43), this Hn cost differs n R1 from the one step Ln cost 0 f (lvi ,vj (t), vj − vi )dt of moving from vi to vj by C 0 2n . Therefore, the cost savings of moving in one step, in considering w or v which 2−β ), = O(2α exit the r-neighborhood, is bounded below by Crα − 3C 0 2−β n − n n 2 which is positive, for all large n, when α < 2 − β.√ This is the case when we fix β = (2 − α2 )η > 0, for an 0 < η < 1, since 1 < α < 2. Hence, with this choice of β, such exiting paths are not optimal, and all the points {wi , . . . , wj } or {vi , . . . , vj } in the box must belong to the r = α n -neighborhood of the line segment connecting the ith and jth points. We note, given the value of β, to use Lemma 4.6 above, the exponent δ should satisfy δ > [(2 − α2 )η + d]−1 , afforded by our assumptions. Step 2.. We now focus on w as the following counting argument is the same with respect to v. We will count the points in the small set A. The cardinality |{wk }jk=i | = |j − i| is bounded by |Xn ∩ A| = 2 + Nn,z , where Nn,z is the Binomial(n − 2, ν(A)) count of the number of points in Xn distinct from wi , wj in the set A. Note, as A is nearly a cylinder with length n and radius α n , and ρ is α(d−1)+1 bounded, we have that ν(A) ≤ C(ρ)n . Then, P (Nn,z ≥ K) ≤ (nK /K!)ν(A)K ≤ C(ρ)K nK nKαd+K(1−α) . Hence, by a union of events bound, as the number of boxes intersecting D is bounded by C 0 −d n , we have P (∃z ∈ Zd such that Nn,z ≥ K) ≤ C 0 C(ρ)K nK nKαd+K(1−α)−d . (4.44) 30 ERIK DAVIS AND SUNDER SETHURAMAN Suppose n is of the form n = n−δ for 0 < δ < 1/d. If d < K < ∞ and δ > (K + 1)/[K(α(d − 1) + 1) − d], (4.45) the display (4.44) is summable in n. In particular, when δ > [α(d − 1) + 1]−1 , part of our assumptions, a large but fixed K can be chosen so that (4.45) holds. Hence, by Borel-Cantelli lemma, on the intersection of a probability 1 set and A1 say, we recover the claim for all large n that the path visits at most K points between the first and last visit to a visited box.  4.2.2. Convergence of Optimal Paths. We now consider the behavior of the optimal paths, in analogy to Theorem 2.2, for the energy Hn . Proposition 4.9. Consider the assumptions for the second parts of Theorems 2.7 and 2.8. Consider a discrete path w(n) ∈ arg min Hn and its linear interpolation, lw(n) . Then, with respect to realizations in a probability 1 subset of A1 ∩ A2 , for any subsequence of {lw(n) }, and correspondingly of {w(n) }, there is a further subsequence of the linear paths which converges uniformly to a limit path γ ∈ arg min F , and of the discrete paths in the Hausdorff sense to Sγ . If F has a unique (up to reparametrization) minimizer γ, then the whole sequence {w(n) } converges, limn→∞ dhaus (w(n) , Sγ ) = 0. Consider now a path lv(n) ∈ arg min Ln . The same conclusions holds for {v(n) } in place of {w(n) }. Proof. Consider first w(n) ∈ arg min Hn . By the compactness criterion, Proposition 4.4, almost surely, any subsequence of the paths {lw(n) } has a further subsequence {lw(nk ) } converging uniformly to a limit γ. By the ‘liminf’ Lemma 3.2, F (γ) ≤ lim inf k→∞ F (lw(nk ) ). The same argument and conclusion holds with lv(n) ∈ arg min Ln and v(n) in place of lw(n) and w(n) . We now show that γ ∈ arg min F . With respect to optimal Ln paths, as F (lv(n) ) = min Ln , and min Ln → min F a.s. by Proposition 4.3, we obtain F (γ) ≤ min F , and so the desired conclusion. For Hn optimal paths, we recall an argument in the proof of Theorem 2.4. Using only the ‘standing assumptions’ (allowing p = 1) and (Lip), we derived (4.30), namely, for u ∈ Vn (a, b), that |Ln (lu ) − Hn (u)| ≤ cm−1 1 n min(Ln (lu ), Hn (u)) where c is the constant in (Lip). Then, as a consequence of Proposition 4.1, we saw 2 in (4.32) that min Ln ≤ Ln (lw(n) ) ≤ (cm−1 1 n + 1) min Ln . Since, by Proposition 4.3, min Ln → min F a.s., we conclude that γ ∈ arg min F . Finally, we remark that the Hausdorff convergences are argued as in the proof of Corollary 2.3.  5. Appendix Here we collect some results which we had previously assumed. 5.1. Nearest-Neighbor Rate. Proposition 5.1. Let {Xi } be i.i.d. samples from a probability measure ν = ρ(x) dx on a Lipschitz domain D, and let Rn = sup min |Xi − y|. y∈D 1≤i≤n APPROXIMATING GEODESICS VIA RANDOM POINTS 31 Suppose ρ(x) is uniformly bounded below by a positive constant. Then, there exists a constant C, independent of n, such that, for almost all realizations {Xi }, lim sup n→∞ Rn n1/d ≤ C. (log n)1/d In particular, when n satisfies (2.6), for a, b ∈ D, almost surely for all large n, there is a path in Vn (a, b) connecting a, b via the graph Gn . Proof. We first address the claim with respect to Rn . Let B(y, r) be the Euclidean ball of radius r centered at y ∈ D. Since D is Lipschitz, there is a constant c such that m(B(y, r) ∩ D) ≥ cm(B(y, r)) for all small r > 0, where m denotes Lebesgue measure (cf. the discussion about cone conditions in Section 4.11 of [1]). It follows that there is a constant c such that m(B(y, r) ∩ D)/m(D) ≥ crd for all y ∈ D and all small r > 0. Since ν has density ρ bounded below by a positive constant, there exists a constant c such that ν(B(y, r)) ≥ crd for all y ∈ D and 0 < r < r0 , where r0 is a sufficiently small constant. Therefore, recalling Xn = {X1 , X2 , . . . , Xn }, we have P(|B(y, r) ∩ Xn | = 0) = (1 − ν(B(y, r)))n (5.46) d ≤ (1 − crd )n ≤ e−cnr . Let {y1 , . . . , yk } ⊂ D be a collection of points so that supx∈X min1≤i≤k |x − yi | ≤ r. We may take the number of points k to satisfy k ≤ c/rd for some constant c independent of r, say, by choosing {yi } to be a regular grid, with grid length ∼ r. Let Ei denote the event that |B(yi , r) ∩ Xn | = 0, and consider the event {Rn > 2r} that there exists a y ∈ D with min1≤i≤n |Xi − y| > 2r. Then, by a triangle inequality argument, we have {Rn > 2r} ⊂ ∪ki=1 Ei . Hence, together with (5.46), we have k X d c P(Rn > 2r) ≤ P(Ei ) ≤ d e−cnr . (5.47) r i=1 Let rd = (3 log n)/(cn). Then, (5.47) gives a summable term,  c2 (3 log n)1/d  ≤ . P Rn > 2 3n2 n1/d By Borel-Cantelli lemma, Rn ≤ 2(3 log n)1/d /n1/d for all large n. We now show that Gn (a, b) is connected when n satisfies (2.6). Let v1 , v2 be any vertices in Xn ∪ {a, b}, and consider the line `(t) = v1 (1 − t) + v2 (t) between them for t ∈ [0, 1]. By convexity of D, the path ` is contained in D. Consider points on the path v1 = `(0), `(Rn ), `(2Rn ), . . . , `(kRn ), `(1) = v1 , where k = b|v2 − v1 |/Rn c so that |1 − kRn | ≤ Rn . Each point y = `(jRn ) is within Euclidean distance Rn of a point uj ∈ Xn by the ‘Rn -limit’ a.s. for all large n. By construction, for 1 ≤ j ≤ k − 1, the Euclidean distance between uj and uj+1 is less than sum of the distances, from uj to `(jRn ), from `(jRn ) to `((j + 1)Rn ), and from `((j + 1)Rn ) to uj+1 , which is bounded by 3Rn . Similarly, the endpoints v1 , v2 are within Euclidean distance 2Rn of u1 and uk respectively. Since, by (2.6), 3Rn /n < 1 for all large n, the path along vertices {v1 , u1 , . . . , uk , v2 } belongs to Vn (a, b) and so v1 and v2 are connected in Gn (a, b) a.s. for all large n.  32 ERIK DAVIS AND SUNDER SETHURAMAN 5.2. Existence of Quasinormal Minimizers. We discuss a ‘conservation law’ for F -minimizing paths, and existence of F -minimizing Lipschitz paths, following the treatment in [8]. R1 Proposition 5.2. Consider the integral functional F (γ) = 0 f (γ, γ̇) dt, where f satisfies (A0)-(A3). Then, F attains a minimum on the set Ω(a, b) of Lipschitz paths from a to b. In other words, there exists a γ ∗ ∈ Ω(a, b) with F (γ ∗ ) = inf γ∈Ω(a,b) F (γ). In the case that p = 1, there exists a γ ∈ arg min F and constants c, c1 , c2 such that f (γ(t), γ̇(t)) = c a.e. t ∈ [0, 1], (5.48) and c1 ≤ |γ̇(t)| ≤ c2 a.e. t ∈ [0, 1]. (5.49) If p > 1, then there are constants c, c1 , c2 such that (5.48) and (5.49) hold for any γ ∈ arg min F . Proof. We first give an argument in the case where p > 1. Note, by assumption, the integrand f is continuous and C 1 on D × (Rd \ {0}), convex and p-homogenous in the second argument, and satisfies (2.4). As p > 1, f may be extended continuously to a C 1 function on D × Rd . When the domain of F is extended to all Sobolev paths γ ∈ W 1,p ([0, 1]; D) with γ(0) = a, γ(1) = b, the existence of a minimizer follows from Remark 2 of Section 3.2 in [8]. In particular, the continuity and convexity assumptions (A0) and (A1) imply that F is lower-semicontinuous with respect to weak convergence of Sobolev functions. The existence of a minimizer then follows from a standard compactness argument. Let γ denote such a Sobolev minimizer. Consider now an ‘inner variation’ ω(t, ) = γ(ξ(t, )) of γ, where ξ is C 1 on [0, 1]×(−0 , 0 ) for some 0 > 0 and ξ(·, ) is a C 1 diffeomorphism of the interval [0, 1] to itself, with γ(t, 0) = t. It may be shown (see the discussion on pages 19-21, Proposition 1.16 and Remark 3 in Section 1.1 of d F (ω(·, ))|=0 over the class of inner variations, [8]) that the optimality condition d together with Euler’s identity for homogenous functions, v · ∇v f (x, v) = pf (x, v), together imply that (p − 1)f (γ(t), γ̇(t)) = c a.e. t, (5.50) for some constant c. Finally, by assumption (A3) on f , it follows that c > 0 and there exist constants c1 , c2 > 0 with c1 ≤ |γ̇(t)| ≤ c2 for almost every t. In particular, γ ∈ Ω(a, b), and the proposition is proved for p > 1. The argument for the p = 1 case is complicated by a lack of compactness with respect to weak convergence in the Sobolev space W 1,1 ([0, 1]; D), as well as difficulty in establishing an analogue of (5.50). By a more involved argument, relating R1 optimizers of F to optimizers of the quadratic functional Q(γ) := 0 f 2 (γ, γ̇) dt, the existence of a Lipschitz path γ ∈ arg min F satisfying (5.48) is established in Theorem 1 of [16] (see also Theorem 5.22 of [8] which gives an alternative argument). From this and assumption (A3), inequality (5.49) follows.  Acknowledgement. This work was partially supported by ARO W911NF-14-10179. APPROXIMATING GEODESICS VIA RANDOM POINTS 33 References [1] Adams, R. and Fournier, J. (2003). Sobolev Spaces Academic Press [2] Agronowich, M.S. (2010). Sobolev Spaces, their Generalizations, and Elliptic Problems in Smooth and Lipschitz Domains. Springer Monographs in Mathematics [3] Alamgir, M., von Luxburg, U. (2012). Shortest path distance in random k-nearest neighbor graphs. in Proc. 29th Int. Conf. on Machine Learning; arXiv:1206.6381 [4] Auffinger, A., Damron, M., Hanson, J. (2016). 50 years of first passage percolation. arXiv:1511.03262 [5] Beardwood, J., Halton, J.H., Hammersley, J.M. (1959). The shortest path through many points. Math. Proc. Cambridge Philosophical Soc. 55 299–327. [6] Bern, M. et. al. (1999). Emerging Challenges in Computational Topology. NSF report. arXiv:cs/9909001 [7] Bernstein, M., De Silva, V., Langford, J. and Tenenbaum, J. (2000). Graph approximations to geodesics on embedded manifolds. Technical Report, Department of Psychology, Stanford University [8] Buttazzo, G., Giaquinta, M. and Hildebrandt, S. (1998). One-dimensional variational problems: an introduction. Oxford University Press, Oxford [9] Burago, D., Burago, Y., and Ivanov, S. (2001). A Course in Metric Geometry. American Mathematical Society, Providence, R.I. [10] Cabello, S., Jejcic, M. (2014). Shortest paths in intersection graphs of unit disks. arXiv:1402.4855 [11] Crane, K., Weischedel, C., Wardetzky, M. (2013). Geodesics in heat: A new approach to computing distance based on heat flow. ACM Trans. Graph. 28 106 [12] Giesen, J. and Wagner, U. (2004). Shape dimension and intrinsic metric from samples of manifolds. Discrete & Computational Geometry 32 245–267. [13] von Deylen, S.W., Glickenstein, D., Wardetzky, M. (2016). Distortion estimates for barycentric coordinates on Riemannian simplices. arXiv:1610.01168 [14] Gelfand, I.M., Smirnov, M.M. (1994). Lagrangians satisying Crofton formulas, Radon transforms, and nonlocal differentials. Adv. in Math. 109 188–227. [15] Hashimoto, T.B, Sun, Y., and Jaakkola, T.S. (2015). Metric recovery from directed unweighted graphs. in Proc. 18th Int. Conference on AI and Stat (AISTATS) San Diego, CA. JMLR: W&CP 38. [16] Hildebrandt, S. (2016). Minimizers of one-dimensional parametric variational integrals. St. Petersburg Math. J. 27 569–576. [17] Hirsch, C., Neuhäuser, D., Gloaguen, C., Schmidt, V. (2015). First passage percolation on random geometric graphs and an application to shortest-path trees. Adv. Appl. Probab. 47 328–354. [18] Howard, D., Newman, C.M. (1997). Euclidean models of first-passage percolation. Probab. Theory Relat. Fields 108 153–170. [19] Howard, D., Newman, C.M. (2001). Geodesics and spanning trees for Euclidean first-passage percolation. Ann. Probab. 29 577–623. [20] Hwang, S.J., Damelin, S.B., Hero, A.O. (2016). Shortest path through random points. Ann. Appl. Probab. 26 2791–2823. [21] LaGatta, T., Wehr, J. (2010). A shape theorem for Riemannian first-passage percolation. J. Math. Phys. 51 053502 [22] LaGatta, T., Wehr, J. (2014). Geodesics of random Riemannian metrics. Commun. Math. Phys. 327 181–241. [23] Maz’ya, V. (2011). Sobolev Spaces with Application to Elliptic Partial Differential Equations. 2nd Ed. Springer. Grundlehren der mathematischen Wissenschaften 342 [24] Mémoli, F. and Sapiro, G. (2005). Distance functions and geodesics on submanifolds of Rd and Point Clouds. SIAM Journal on Applied Mathematics 65 1227–1260. [25] Alvarez Paiva, J.C. (2006). Some problems on Finsler Geometry. in Handbook of Differential Geometry Vol. II Ed. Dillen, F.J.E., Verstraelen, L.C.A., Elsevier, Chapter 1, 1–33. [26] Papadopoulos, A. (2013). On Hilbert’s fourth problem. in Handbook of Hilbert geometry Ed. Papadopoulos, A. and Troyanov, M., European Mathematical Society. arXiv:1312.3172 [27] Penrose, M. (2003). Random Geometric Graphs. Oxford University Press, Oxford. 34 ERIK DAVIS AND SUNDER SETHURAMAN [28] Peyré, G., Péchaud, M., Keriven, R., Cohen, L., and others. (2010). Geodesic methods in computer vision and graphics. Foundations and Trends in Computer Graphics and Vision 5 197–397. [29] Sajama, Orlitzky, A. (2005). Estimating and computing density based distance metrics. in Proc. 22nd Int. Cont. on Machine Learning Bonn, Germany. [30] Sethian, J. (1999). Fast marching methods. SIAM Review 41 199–235. [31] Tamassy, L. (2008). Relation between metric spaces and Finsler spaces. Differential Geometry and its Applications 26 483–494. [32] Tenenbaum, J.B., de Silva, V., Langford, J.C. (2000). A global geometric framework for nonlinear dimensionality reduction. Science. 290 2319–2323. [33] Yu, H., Zhang, J.J., Jiao, Z. (2014). Geodesics on point clouds. Mathematical Problems in Engineering 2014 860136 Department of Mathematics, University of Arizona, Tucson, AZ 85721 e-mail: [email protected] Department of Mathematics, University of Arizona, Tucson, AZ 85721 e-mail: [email protected]
10math.ST
An analysis of the SPARSEVA estimate for the finite sample data case ? Huong Ha a , James S. Welsh a , Cristian R. Rojas b , Bo Wahlberg b arXiv:1703.09351v1 [math.ST] 27 Mar 2017 a School b Department of Electrical Engineering and Computer Science, The University of Newcastle, Australia of Automatic Control and ACCESS, School of Electrical Engineering, KTH Royal Institute of Technology, SE-100 44 Stockholm, Sweden Abstract In this paper, we develop an upper bound for the SPARSEVA (SPARSe Estimation based on a VAlidation criterion) estimation error in a general scheme, i.e., when the cost function is strongly convex and the regularized norm is decomposable for a pair of subspaces. We show how this general bound can be applied to a sparse regression problem to obtain an upper bound for the traditional SPARSEVA problem. Numerical results are used to illustrate the effectiveness of the suggested bound. Key words: SPARSEVA estimate; upper bound; finite sample data. 1 Introduction Regularization is a well known technique for estimating model parameters from measured input-output data. Its applications are in any fields that are related to constructing mathematical models from observed data, such as system identification, machine learning and econometrics. The idea of the regularization technique is to solve a convex optimization problem constructed from a cost function and a weighted regularizer (regularized M-estimators). There are various types of regularizers that have been suggested so far, such as the l1 [18], l2 [19] and nuclear norms [5] [6]. During the last few decades, in the system identification community, regularization has been utilised extensively [14]. Most of this work has focused on analysing the asymptotic properties of an estimator, i.e., when the length of the data goes to infinity. The purpose of this type of analysis is to evaluate the performance of the estimation method to determine if the estimate is acceptable. However, in practice, the data sample size for any estimation problem is always finite, hence, it is difficult to judge the performance of the estimated parameters based on asymptotic properties, especially when the data length is short. Recently, a number of authors have published research ([1], ? The material in this paper was not presented at any conference. Email addresses: [email protected] (Huong Ha), [email protected] (James S. Welsh), [email protected] (Cristian R. Rojas), [email protected] (Bo Wahlberg). Preprint submitted to Automatica [4], [12]) aimed at analysing estimation error properties of the regularized M-estimators when the sample size of the data is finite. Specifically, they develop upper bounds on the estimation error for high dimensional problems, i.e., when the number of parameters is comparable to or larger than the sample size of the data. Most of these activities are from the statistics and machine learning communities. Among these works, the paper [12] provides a very elegant and interesting framework for establishing consistency and convergence rates of estimates obtained from a regularized procedure under high dimensional scaling. It determines a general upper bound for regularized M-estimators and then shows how it can be used to derive bounds for some specific scenarios. However, this framework is only applicable for the case when the number of parameters is comparable, or larger, than the sample size of the data whereas in a typical system identification problem, the number of parameters is generally smaller than the sample size of the data. Here in this paper we utilize the framework suggested in [12] to develop an upper bound for the estimation error of the M-estimators used in a system identification problem. Here, the M-estimator problems are implemented using the SPARSEVA (SPARSe Estimation based on a VAlidation criterion) framework [15], [16]. Our aim is to derive an upper bound for the estimation error of the general SPARSEVA estimate. We then apply this bound to a sparse linear regression problem to obtain an upper bound for the traditional SPARSEVA problem. In addition, we also provide numerical simulation results to illustrate the suggested bound of the SPARSEVA estimation error. 2 April 2018 The paper is organized as follows. Section 2 formulates the problem. Section 3 provides definitions and properties required for the later analysis. The general bound for the SPARSEVA estimation error is then developed in Section 4. In Section 5, we apply the general bound to the special case when the model is cast in a linear regression framework. Section 6 illustrates the developed bound by numerical simulation. Finally, Section 7 provides conclusions. 2 based the chosen validation criterion. For example, as suggested in [15] [16], εN can be chosen as 2n/N (Akaike Information Criterion (AIC)), nlog(N)/N (Bayesian Information Criterion (BIC)); or as suggested in [8], n/N (Prediction Error Criterion). For the traditional regularization method described in (1), [12] recently developed an upper bound on the estimation error between the estimate θ̂λN and the unknown parameter vector θ∗ . This bound is a function of some constants related to the nature of the data, the regularization parameter λN , the cost function L and the data length N. The beauty of this bound is that it quantifies the relationship between the estimation error and the finite data length N. Through this relationship, it is easy to confirm most of the properties of the estimate θ̂λN in the asymptotic scenario, i.e. N → ∞, which were developed in the literature some time ago ([9], [11]). Problem Formulation Let Z1N = {Z1 , ..., ZN } denote N identically distributed observations with marginal distribution P. L : Rn × Z N → R denotes a convex and differentiable cost function. Let θ∗ ∈ argminθ∈Rn L (θ) be a minimizer of the population risk L (θ) = EZ N [L (θ; Z1N )]. 1 Inspired by [12], our goal is to derive a similar bound for the SPARSEVA estimate θ̂εN , i.e, we want to know how much the SPARSEVA estimate θ̂εN differs from the true parameter θ∗ when the data sample size N is finite. Note that the notation and techniques used in this paper are similar to [12]; however, in [12], the convex optimization problem is posed in the traditional regularization framework (1), while in this paper, the optimization problem is based on the SPARSEVA regularization (2). The task here is to estimate the unknown parameter θ∗ from the data Z1N . A well known approach to this problem is to use a regularization technique, i.e., to solve the following convex optimization problem, θ̂λN ∈ arg min {L (θ; Z1N ) + λN R (θ)}, (1) θ∈Rn where λN > 0 is a user-defined regularization parameter and R : Rn → R+ is a norm. 3 A difficulty when estimating the parameter θ∗ using the above regularization technique is that one needs to find the regularization parameter λN . The traditional method to choose λN is to use cross validation, i.e., to estimate the parameter θ∗ with different values of λN , then select the value of λN that provides the best fit to the validation data. This cross validation method is quite time consuming and very dependent on the data. Here we are specifically interested in the SPARSEVA (SPARSe Estimation based on a VAlidation criterion) framework, suggested in [15] and [16], which provides automatic tuning of the regularization parameters. Utilizing the SPARSEVA framework, an estimate of θ∗ can be computed using the following convex optimization problem: In this section, we provide descriptions of some definitions and properties of the norm R (θ) and the cost function L (θ; Z1N ), needed to establish an upper bound on the estimation error. Note that we only provide a brief summary such that the research described in this paper can be understood. Readers can find a more detailed discussion in [12]. 3.1 s.t. (2) L (θ; Z1N ) ≤ L (θ̂NR ; Z1N )(1 + εN ), The norm R is said to be decomposable with respect to where εN > 0 is the regularization parameter and θ̂NR is the “non-regularized” estimate obtained from minimizing the cost function L (θ; Z1N ), i.e. θ̂NR ∈ arg min θ∈Rn L (θ; Z1N ). Decomposability of a Norm Let us consider a pair of linear subspaces M ⊆ M of Rn . The orthogonal complement of the space M is then defined as, ⊥ M = {v ∈ Rn |hu, vi = 0 for all u ∈ M }, where h·, ·i is the inner product that maps Rn × Rn → R. θ̂εN ∈ arg min R (θ) θ∈Rn Definitions and Properties of the Norm R (θ) and the Cost Function L (θ) ⊥ (M , M ) if R (θ + γ) = R (θ) + R (γ) (3) (4) ⊥ for all θ ∈ M and γ ∈ M . There are many combinations of norms and vector spaces that satisfy this property (cf. [12]). An example is the l1 norm The advantage of the SPARSEVA framework is that there are some natural choices of the regularization parameter εN 2 to the pair (R , k · k) is defined as, and the sparse vector space defined (5). For any subset S ⊆ {1, 2, . . . , n} with cardinality s, define the model subspace M as, M (S) = {θ ∈ Rn | θ j = 0 for all j 6∈ S}. Ψ(M ) = u∈M \{0} (5) ⊥ M (S) = {γ ∈ Rn |γ j = 0 for all j ∈ S}. 3.5 As shown in [12], the l1 -norm is decomposable with respect to the pair (M (S), M ⊥ (S)). (9) ΠM (u) = arg min ku − vk2 . hu, vi = sup hu, vi, u∈Rn \{0} R (u) R (u)≤1 sup In the sequel, to simplify the notation, we will write uM to denote ΠM (u). (6) 4 A twice differentiable function L (θ) : Rn → R is strongly convex on Rn when there exists an m > 0 such that its Hessian 52 L (θ) satisfies, Theorem 4.1 Assume R is a norm and is decomposable ⊥ with respect to the subspace pair (M , M ) and the cost function L (θ) is differentiable and strongly convex with curvature κL . Consider the SPARSEVA problem in (2), then the following properties hold: (7) for all θ ∈ Rn [3]. This is equivalent to the statement that the minimum eigenvalue of 52 L (θ) is not smaller than m for all θ ∈ Rn . An interesting consequence of the strong convexity property in (7) is that for all θ, ∆ ∈ Rn , we have, m 2 L (θ + ∆) ≥ L (θ) + 5L (θ)T ∆ + k∆k22 . Analysis of the Regularization Technique using the SPARSEVA In this section, we apply the properties described in Section 3 to derive an upper bound on the error between the SPARSEVA estimate θ̂εN and the unknown parameter θ∗ . This upper bound is described in the following theorem. Strong Convexity 52 L (θ)  mI, (10) v∈M where sup is the supremum operator. Based on the above definition, one can easily see that the dual of the l1 norm, with respect to the Euclidean inner product, is the l∞ norm [12]. i. When εN > 0, there exists a Lagrange multiplier, λN = λεN , such that (1) and (2) have the same solution. ii. Any optimal solution θ̂εN 6= 0 of the SPARSEVA problem (2) satisfies the following inequalities: • If εN is chosen such that (8) λεN ≤ 1/R ∗ (∇L (θ∗ )), The inequality in (8) has a geometric interpretation in that the graph of the function L (θ) has a positive curvature at any θ ∈ Rn . The term m/2 for the largest m satisfying (7) is typically known as the curvature of L (θ). 3.4 . Projection Operator For a given inner product h·, ·i, the dual of the norm R is defined by, 3.3 kuk The projection of a vector u onto a space M , with respect to the Euclidean norm, is defined by the following, Dual Norm R ∗ (v) = R (u) This quantity measures how well the norm R is compatible with the error norm k.k over the subspace M . As shown in [12], when M is Rs , the regularized norm R is the l1 norm, and the error norm is the l2 norm, √ then the subspace compatibility constant is Ψ(M ) = s. Notice also that Ψ(M ) is finite, due to the equivalence of finite dimensional norms. Now if we define M (S) = M (S), then the orthogonal complement M (S), with respect to the Euclidean inner product, can be computed as follows, 3.2 sup then 4 4 Ψ2 (M ) + R (θ∗M ⊥ ). κL λεN κ2L λ2εN (11) • If εN is chosen such that kθ̂εN − θ∗ k22 ≤ Subspace Compatibility Constant For a given norm R and an error norm k · k, the subspace compatibility constant of a subspace M ∈ Rn with respect λεN > 1/R ∗ (∇L (θ∗ )), 3 with θ̂NR = (ΦN ΦTN )−1 ΦN YN and εN > 0 being the userdefined regularization parameter. Now εN can be chosen as either 2n/N or log(N)n/N as suggested in [15]; or n/N as suggested in [8]. then kθ̂εN − θ∗ k22 ≤ 2 {R ∗ (∇L (θ∗ ))}2 Ψ2 (M ) κ2L ⊥ 8 + 2 {R ∗ (∇L (θ∗ ))}2 Ψ2 (M ) κL 4 + R (θ∗M ⊥ ). κL λεN (12) Remark 5.1 Note that the sparse regression problem is very common in system identification and is often used to obtain a low order linear model by regularization. 5.1  Proof. See the Appendix (Section A.2). Consider the convex optimization problem in (15), the Hessian matrix of the cost function L (θ) is computed as, Remark 4.1 Note that Theorem 4.1 is intended to provide an upper bound on the estimation error for the general SPARSEVA problem (2). At this stage, it is hard to evaluate, or quantify, the value on the right hand side of the inequalities (11) and (12) as they still contain the term λεN and other abstract terms. However, in the later sections of this paper, from this general upper bound, we will provide bounds on the estimation errors for some specific scenarios. 52 L (θ) = ⊥ (M , M ), there is one bound for the estimation error. Hence, in the usual sense, to apply Theorem 4.1 for any 5 ⊥ 1 ΦN ΦTN . N In order to prove that L (θ) is strongly convex, we need to prove, 1 ΦN ΦTN  2κL I. (16) ∃κL > 0 s.t. N We see that the requirement in (16) coincides with the requirement of persistent excitation of the input signal in a system identification problem. If an experiment is welldesigned, then the input signal u(t) needs to be persistently exciting of order n, i.e., the matrix ΦN ΦTN is a positive definite matrix. This means that the condition in (16) is always satisfied for any linear regression problem derived from a well posed system identification problem. Hence, the cost function L (θ) of the optimization problem in (15) is generally strongly convex. This means that for any choice of the regression matrix ΦN that satisfies the persistent excitation condition, there exists a positive curvature κL of the cost function L (θ). Remark 4.2 The bound in Theorem 4.1 is actually a family of bounds. For each choice of the pair of subspaces specific scenario, the goal is to choose M and M obtain an optimal rate of the bound. An Analysis on the Strong Convexity Property and the Curvature of the l2 norm Cost Function to An Upper Bound for Sparse Regression In this section, we illustrate how to apply Theorem 4.1 to derive an upper bound of the error between the SPARSEVA estimate θ̂εN and the true parameter θ∗ for a linear regression model. where θ∗ ∈ Rn is the unknown parameter that is required to be estimated; e ∈ RN is the disturbance noise; ΦN ∈ Rn×N is the regression matrix and YN ∈ RN is the output vector. We now need to consider whether there exists a “global” curvature κ for any regression matrix ΦN . Consider ΦN ∈ Rn×N to be any random matrix in which each column ΦN, j is independently sampled from a Normal distribution of zero mean and covariance matrix Σ ∈ Rn×n (Σ-Gaussian ensemble), i.e., ΦN, j ∼ N (0, Σ), ∀ j = 1, .., N. The question we then need to address is whether there exists a constant value κ, which only depends on Σ, that gives, Using the SPARSEVA framework in (2) with R chosen as the l1 norm and the cost function L (θ) chosen as, 1 ΦN ΦTN  2κI, N Consider the following linear regression model, YN = ΦTN θ∗ + e, L (θ) = 1 kYN − ΦTN θk22 , 2N (13) for any random matrix ΦN sampled from a Σ-Gaussian ensemble. Notice that, in the case N  n, κ can be chosen as 0.5 times the smallest eigenvalue of N −1 ΦN ΦTN . To answer this question, we investigate the distribution of the smallest eigenvalue of N −1 ΦN ΦTN . (14) then an estimate of θ∗ in (13) can be found by solving the following problem, The distribution of the smallest eigenvalue of N −1 ΦN ΦTN has been discussed frequently in the literature, especially from the principal component analysis (PCA) community. It is θ̂εN ∈ arg min kθk1 θ∈Rn s.t. (17) (15) L (θ) ≤ L (θ̂NR )(1 + εN ), 4 well known that when N  n and the matrix ΦN being ΣGaussian ensemble, there exists a distribution of the smallest eigenvalue of the covariance matrix N −1 ΦN ΦTN whose parameters only depend on the eigenvalues of Σ, N and n [10]. A closed form for this distribution can be found in [10]. 5.3 In this paper, we will use the following notation: • f (x|0, σ2 ) = (2πσ2 )−1/2 exp(−x2 /2σ2 ) denotes the probability density function (pdf) of the Normal distribution N (0, σ2 ). • χ2β (N) denotes the value that P(X < χ2β (N)) = 1 − β, where X is Chi square distributed with N degrees of freedom. The existence of the distribution of the smallest eigenvalue of N −1 ΦN ΦTN , which we denote P(x|Σ, N, n), means that given a probability 1 − α , 0 ≤ α ≤ 1, there exists a value wmin such that N −1 ΦN ΦTN  wmin I, for any random Σ-Gaussian ensemble matrix ΦN . Then κ in (17) can be expressed as (1/2)wmin . In this paper, we will denote by κα lower bound on the global curvature in (17) with probability 1 − α , 0 ≤ α ≤ 1. 5.4 Developing the Upper Bound We now present three propositions that assist in the development of the upper bound on the estimation error kθ̂εN − θ∗ k2 for the optimization problem in (15). Related to the computation of the universal constant κ corresponding to the distribution N (0, Σ), note that, in reality, it is very difficult to compute the exact distribution P(x|Σ, N, n) using the formula in [10]. Here we suggest to use an empirical method to compute the distribution P(x|Σ, N, n) due to inexact knowledge of the formula for the distribution. The idea is to generate a large number of random matrices ΦN , compute the smallest eigenvalue of N −1 ΦN ΦTN , and then build a histogram of these values, which is an approximation of P(x|Σ, N, n). Then one can compute the value of wmin to ensure the inequality N −1 ΦN ΦTN  wmin I occurs with probability 1 − α. Finally, compute κα using the formula κα = (1/2)wmin . 5.2 Notation Proposition 5.1 Consider the optimization problem in (15), and denote by λεN the corresponding Lagrange multiplier of its constraint. Then, if θ̂εN 6= 0, λεN can be computed as 1 . k∇L (θ̂εN )k∞ (19) Proof. See the Appendix (Section A.3).  λεN = Assumptions Proposition 5.2 Suppose Assumptions 5.1 and 5.2 hold. Then, with probability 1 − nβ (0 ≤ β ≤ 1), we have For the linear regression in (13), the following assumptions are made:  Assumption 5.1 The column ΦN, j , j = 1, ..., N of the regressor matrix ΦN are mutually independent, and they are distributed as ΦN, j ∼ N (0, Σ), where Σ ∈ Rn×n is a constant, symmetric, positive definite matrix. ΦN e N P  ≤ t ΦN ∞ " N 2t 2 ≥ 1 − 2 exp − 2 2σe smax χ2β (N) #!n , where smax is the maximum element on the diagonal of the matrix Σ. In particular, Assumption 5.2 The noise vector e ∈ RN is Gaussian with i.i.d. N (0, σ2e ) entries. q ∗ ∇L (θ ) Assumption 5.3 The true parameter θ∗ is “weakly” sparse, i.e. θ∗ ∈ Bq (Rq ), where, ≤ 2σ2e smax χ2β (N) ln(2/β) ∞ N , (20) with probability at least 1 − 2nβ. ( Bq (Rq ) := θ ∈ Rp p ∑ |θi |q ≤ Rq ) , (18) i=1  Proof. See the Appendix (Section A.4). with q ∈ [0, 1] being a constant. Proposition 5.3 Suppose Assumptions 5.1 and 5.2 hold, then with probability at least 1 − nβ (0 ≤ β ≤ 1), we have For Assumption 5.3, note that when q = 0, under the convention that 00 = 0, the set in (18) corresponds to an exact sparsity set, where all the elements belonging to the set have at most R0 non-zero entries. Generally, for q ∈ (0, 1], the set Bq (Rq ) forces the ordered absolute values of θ∗ to decay with a certain rate. P  ∇L (θ̂εN ) ( ≥ 5  ≤t e ∞ N 2t 2 1 − 2 exp − 2 2σe smax χ2β (N − n)(1 + εN ) !)n Using the definition of the subspace compatibility constant described in Section 3, we have, where smax is the maximum element on the diagonal of the matrix Σ. In particular, q ∇L (θ̂εN ) ≤ 2σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) N ∞ Ψ2 (M (Sη )) = |Sη | = nη , Ψ2 (M ⊥ (Sη )) = |Sηc | = n − nη . , (21) where |S| denotes the cardinality of S. with probability at least 1 − 2nβ. Now, for Theorem 4.1 to generate an upper bound for the problem (15), we need to establish an upper bound on kθ∗M ⊥ (S ) k1 . Based on the definition of the subspace  Proof. See the Appendix (Section A.5). (25) η M ⊥ (Sη ), we have, From the three propositions above, we can now state the following theorem that gives an upper bound on the estimation error in the case of weakly sparse estimates. kθ∗M ⊥ (Sη ) k1 = kθ∗[nη +1:n] k1 , Theorem 5.1 Suppose Assumptions 5.1, 5.2 and 5.3 hold, when N is large, then with probability (1 − α)(1 − 4nβ) (0 ≤ α ≤ 1, 0 ≤ β ≤ 1), if θ̂εN 6= 0 we have the following inequality where θ∗[nη +1:n] denotes the vector formed from the n − nη smallest (in magnitude) entries of θ∗ . Define κα as a lower bound on the global curvature of the regression matrix, i.e. half the smallest eigenvalue of ΦTN ΦN , with probability 1 − α, 0 ≤ α ≤ 1. Substituting (19), (20), (21), (25) and (26) into the bound in Theorem 4.1, then with nη being any integer between 1 and n, we have the following bounds: kθ̂εN − θ∗ k22 ≤ max(a1 , a2 ), (22) where a1 = a2 = • If εN is chosen such that 8nη σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) + κ2α N 2 q 32σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) κα N 2 (16n − 12nη )σe smax χ2β (N) ln(2/β) λεN ≤ 1/R ∗ (∇L (θ∗ )) = 1/k∇L (θ∗ )k∞ , then, with probability at least (1 − α)(1 − 2nβ), kθ∗[nη +1:n] k1 , kθ̂εN − θ∗ k22 8nη σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) ≤ κ2α N 2 q 32σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) + kθ∗[nη +1:n] k1 . κα N κ2α N 2 q + (26) 32σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) κα N kθ∗[nη +1:n] k1 , where κα is a lower bound on the curvature of the regression matrix (i.e., half the smallest eigenvalue of N −1 ΦTN ΦN ) with probability 1 − α, nη is any integer between 1 and n, θ∗[nη +1:n] is the vector formed from the n − nη smallest (in magnitude) entries of θ∗ , and smax is the maximum element on the diagonal of the matrix Σ. • If εN is chosen such that λεN > 1/R ∗ (∇L (θ∗ )) = 1/k∇L (θ∗ )k∞ , then, with probability at least (1 − α)(1 − 4nβ), kθ̂εN − θ∗ k22 (16n − 12nη )σ2e smax χ2β (N) ln(2/β) ≤ κ2α N 2 q 32σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) + kθ∗[nη +1:n] k1 . κα N Proof. For an integer nη ∈ {1, . . . , n}, define Sη as the set of the indices of the nη largest (in magnitude) entries of θ∗ , and its complementary set Sηc as Sηc = {1, 2, ..., n} \ Sη ; (23) with the corresponding subspaces M (Sη ) and M ⊥ (Sη ) as, M (Sη ) = {θ ∈ Rn | θ j = 0 ∀ j 6∈ Sη }, M ⊥ (Sη ) = {γ ∈ Rn | γ j = 0 ∀ j ∈ Sη }. Therefore, for nη being any integer between 1 and n, with probability at least (1 − α)(1 − 4nβ), we have (24) kθ̂εN − θ∗ k22 ≤ max(a1 , a2 ), 6 (27) 6 where a1 = 8nη σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) + κ2α N 2 q 32σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) κα N In this section, numerical examples are presented to illustrate the bound kθ̂εN − θ∗ k22 as stated in Theorem 5.1. In Section 6.1, we consider the case when the input is Gaussian white noise whilst in Section 6.2, the input is a correlated signal with zero mean. kθ∗[nη +1:n] k1 , 6.1 a2 = (16n − 12nη )σ2e smax χ2β (N) ln(2/β) + 32σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) κα N kθ∗[nη +1:n] k1 .  Remark 5.2 The bound in Theorem 5.1 is also a family of bounds, one for each value of nη . The FIR model structure is used here in order to construct the SPARSEVA problem (15). The number of parameters n of the FIR model is set to be 35. The regularization parameter εN is chosen as n/N [8]. Remark 5.3 Note that the developed bound in Theorem 5.1 depends on the true parameter θ∗ , which is unknown but constant. Using a similar proof as in Proposition 2.3 of [7], we can derive under Assumption 5.3 an upper bound for the term kθ∗[nη +1:n] k1 . Specifically, we have, kθ∗[nη +1:n] k1 = = n ∑ |θ∗[i] | ∑ |θ∗[i] |1−q |θ∗[i] |q i=nη +1 n We then compute the upper bound of kθ̂εN − θ∗ k2 using (22) with different values of nη , i.e. nη = [10, 15, 25]. The probability parameters α and β are chosen to be 0.02 and 0.001 respectively. With this setting, the probability of the upper bound being correct is (1 − α)(1 − 4nβ) = 0.84. This upper bound will be compared with kθ̂εN − θ∗ k2 . Note that we plot both the upper bound and the true estimation errors on a logarithmic scale. i=nη +1 ≤ |θ∗nη |1−q n ∑ Gaussian White Noise Input In this section, a random discrete time system with a random model order between 1 and 10 is generated using the command drss from Matlab. The system has poles with magnitude less than 0.9. Gaussian white noise is added to the system output to give different levels of SNR, e.g. 30dB, 20dB and 10dB. For each noise level, 50 different input excitation signals (Gaussian white noise with variance 1) and output noise realizations are generated. For each set of input and output data, the system parameters are estimated using a different sample size, i.e., N = [450, 1000, 5000, 10000, 50000, 100000]. κ2α N 2 q Numerical Evaluation |θ∗[i] |q i=nη +1 Plots of the estimation error versus the data length N with different noise levels are displayed in Figures 1 to 3. In Figures 1 to 3, the red lines are the true estimation errors from 50 estimates using the SPARSEVA framework. The magenta, blue and cyan lines are the upper bounds developed in Theorem 5.1, which correspond to nη = [10, 15, 25], respectively. We can see that the plots confirm the bound developed in Theorem 5.1 for all noise levels. When N becomes large, the estimation error and the corresponding upper bound become smaller. When N goes to infinity, the estimation error will tend to 0. Note that the bounds are slightly different for the chosen values of nη , however, not significantly. As can be seen, the bounds are relatively insensitive to the choice of nη . (1−q)/q n  1 nη ∗ q |θ | ≤ ∑ [i] ∑ |θ∗[i] |q nη i=1 i=nη +1 (1−q)/q n 1 n ≤ ∑ |θ∗[i] |q ∑ |θ∗[i] |q nη i=1 i=1  1 1/q−1 ∗ q ≤ kθ∗ k1−q q kθ kq nη ≤ (nη )1−1/q kθ∗ kq ≤ (nη )1−1/q (Rq )1/q . Hence, we can always place an upper bound on the term kθ∗[nη +1:n] k1 by a known constant which depends on the nature of the true parameter θ∗ . In addition, we plot another graph, shown in Fig. 4, to compare the proposed upper bound and the true estimation ern rors corresponding to different value of εN , i.e. (PEC), N 2n log(N)n (AIC) and (BIC). The blue lines are the upN N per bounds developed in Theorem 5.1, which correspond to Therefore, from Theorem 5.1, we can see that the estimation error kθ̂εN − θ∗ k22 = O p (N −1/2 ) [16]. This confirms the result in [16], that in the asymptotic case, when εN > 0, the SPARSEVA estimate θ̂εN converges to the true parameter θ∗ . 7 -0.5 -0.5 n =10 Developed bounds, n =25 2 2 n =15 -1 True estimation errors (BIC) True estimation errors (AIC) True estimation errors (PEC) -1 2 n =25 2 True estimation errors -1.5 ^ 0 k2 ) log(k " N ^ 0 k2 ) log(k " N -1.5 -2 -2.5 -2.5 -3 -3.5 0 -2 -3 1 2 3 4 5 N 6 7 8 9 -3.5 0 10 #10 1 2 3 4 4 Fig. 1. Plot of the estimation error for a SNR=30dB and a Gaussian white input signal. 5 N 6 7 8 9 10 #10 4 Fig. 4. Plot of the proposed bound and the true estimation errors corresponding to different choices of εN , for a SNR=30dB and a white Gaussian input signal (magenta BIC, green AIC and red PEC). 0 n =10 choices of εN . 2 n =15 -0.5 2 n =25 ^ 0 k2 ) log(k " N 2 True estimation errors -1 6.2 In this section, a random discrete time system with a random model order between 1 and 10 is generated using the command drss from Matlab. The system has poles with magnitude less than 0.9. White noise is added to the system output with different levels of SNR, e.g. 30dB, 20dB and 10dB. For each noise level, 50 different input excitation signals and output noise realizations are generated. For each set of input and output data, the system parameters are estimated using different sample sizes, i.e. N = [450, 1000, 5000, 10000, 50000]. -1.5 -2 -2.5 -3 0 1 2 3 4 5 N 6 7 8 9 10 #10 Coloured Noise Input 4 Fig. 2. Plot of the estimation error for a SNR=20dB and a Gaussian white input signal. Here, the input signal is generated by filtering a zero mean Gaussian white noise with unit variance through the filter, 0.5 n =10 2 Fu (q) = n =15 0 2 n =25 2 True estimation errors ^ 0 k2 ) log(k " N -0.5 Due to this filtering, the covariance matrix of the regression matrix distribution will not be of a diagonal form. In addition, to ensure that the columns of the regression matrix are mutually independent, when constructing the regression matrix, we only take the output y(tk ) every nTs seconds, where Ts is the sampling time. -1 -1.5 -2 -2.5 0 0.9798 . 1 − 0.2q−1 1 2 3 4 5 N 6 7 8 9 This set-up allows us to evaluate the tightness of the upper bound in Theorem (5.1). Note that this is a completely different scenario to that in Section 6.1. 10 #10 4 Fig. 3. Plot of the estimation error for a SNR=10dB and a Gaussian white input signal. The FIR model structure is used here in order to construct the linear regression for the SPARSEVA problem (15). The number of parameters n of the FIR model is set to be 35. The regularization parameter, εN , is chosen as n/N [8]. nη = 25, with the three different values of εN . The magenta (BIC), green (AIC) and red (PEC) lines are the true estimation errors from 50 estimates (for each value of εN ) using the SPARSEVA framework. We can see that the plot again confirms the validity of the proposed upper bound for all We then compute the upper bound of kθ̂εN − θ∗ k2 using (22) with different values of nη , i.e. nη = [10, 15, 25]. The 8 probability parameters α and β are chosen to be 0.02 and 0.001 respectively. With this setting, the probability of the upper bound being correct is (1 − α)(1 − 4nβ) = 0.84. This upper bound will be compared with kθ̂εN − θ∗ k2 . Note that here we plot both the upper bound and the true estimation errors in logarithmic scale. 1 n =10 2 2 ^ 0 k2 ) log(k " N 0 -1 -1.5 -2 -2.5 0 1 2 3 N 4 5 #10 4 Fig. 7. Plot of the estimation error for SNR=10dB for a coloured input signal. 7 Conclusion The paper provides an upper bound on the SPARSEVA estimation error in the general case, for any choice of strongly convex cost function and decomposable norm. We also evaluate the bound for a specific scenario, i.e., a sparse regression estimate problem. Numerical results confirm the validity of the developed bound for different input signals with different output noise levels for different choices of the regularization parameters. n =10 2 n =15 2 n =25 2 ^ 0 k2 ) log(k " N True estimation errors -0.5 0 -1 2 n =25 Plots of the upper bound as stated in Theorem 5.1 and the true estimation error kθ̂εN − θ∗ k2 are displayed in Figures 5 to 7. In Figures 5 to 7, the red lines are the true estimation errors from 50 estimates using the SPARSEVA framework. The magenta, blue and cyan lines are the upper bounds developed in Theorem 5.1, which correspond to nη = [10, 15, 25] respectively. We can see that the plots confirmed the bound developed in Theorem 5.1 for all noise levels. When N becomes large, the estimation error and the corresponding upper bound become smaller. When N goes to infinity, the estimation error will tend to 0. Note that the bounds are slightly different for the chosen values of nη , however, not significantly. As can be seen, the bounds are relatively insensitive to the choice of nη . -0.5 n =15 0.5 True estimation errors -1.5 -2 References -2.5 [1] -3 -3.5 0 1 2 3 4 N 5 #10 [2] 4 Fig. 5. Plot of the estimation error for SNR=30dB for a coloured input signal. [3] [4] 0.5 n =10 2 n =15 0 [5] 2 n =25 2 ^ 0 k2 ) log(k " N -0.5 True estimation errors -1 [6] -1.5 -2 [7] -2.5 -3 0 1 2 3 N 4 [8] 5 #10 4 Fig. 6. Plot of the estimation error for SNR=20dB for a coloured input signal. 9 P.J. Bickel, Y. Ritov, and A.B. Tsybakov. Simultaneous analysis of lasso and Dantzig selector. Annals of Statistics, 37:1705–1732, 2009. J.M. Borwein and Q.J. Zhu. A variational approach to lagrange multipliers. Journal of Optimization Theory and Applications, 171(3):727–756, 2016. S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, 2004. E. Candes and T. Tao. The Dantzig selector: Statistical estimation when p is much larger than n. Annals of Statistics, 35:2313–2351, 2007. M. Fazel, H. Hindi, and S. Boyd. A rank minimization heuristic with application to minimum order system approximation. Proceedings 2001 American Control Conference, 2001. M. Fazel, H. Hindi, and S. Boyd. Log-det heuristic for matrix rank minimization with applications to hankel and euclidean distance matrices. Proceedings 2003 American Control Conference, 2003. S. Foucart and H. Rauhut. A Mathematical Introduction to Compressive Sensing. Birkhäuser Basel, 2013. H. Ha, J.S Welsh, N. Blomberg, C.R. Rojas, and B. Wahlberg. Reweighted nuclear norm regularization: A sparseva approach. Proceedings of the 17th IFAC Symposium on System Identification, 48(28):1172 – 1177, 2015. [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] A Proof. See the supplementary material of [12]. J. Huang, J.L. Horowitz, and S. Ma. Asymptotic properties of bridge estimators in sparse high-dimensional regression models. Annals of Statistics, 36(2):587–613, 2008. A.T. James. Distributions of matrix variates and latent roots derived from normal samples. The Annals of Mathematical Statistics, 35(2):475–501, 1964. K. Knight and W. Fu. Asymptotics for Lasso-Type Estimators. Annals of Statistics, 28(5):1356–1378, 2000. S.N. Negahban, P. Ravikumar, M.J. Wainwright, and B. Yu. A Unified Framework for High-Dimensional Analysis of M-Estimators with Decomposable Regularizers. Statistical Science, 27(4):538–557, 2012. M. Osborne, B. Presnell, and B. Turlach. On the LASSO and its dual. Journal of Computational and Graphical Statistics, 9(2):319–337, 2000. G. Pillonetto, F. Dinuzzo, T. Chen, G. De Nicolao, and L. Ljung. Kernel methods in system identification, machine learning and function estimation: A survey. Automatica, 50(3):657–682, 2014. C.R. Rojas and H. Hjalmarsson. Sparse estimation based on a validation criterion. 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC), pages 2825–2830, 2011. C.R. Rojas, R. Tóth, and H. Hjalmarsson. Sparse estimation of polynomial and rational dynamical models. IEEE Transactions on Automatic Control, 59:2962– 2977, 2014. T. Söderström and P. Stoica. System Identification. Prentice Hall, 1989. R. Tibshirani. Regression Shrinkage and Selection Via the Lasso. Journal of the Royal Statistical Society, Series B, 58:267–288, 1996. A.N Tikhonov and V.Y Arsenin. Solutions of Ill-Posed Problems. Winston & Sons, 1977. R. Vershynin. Introduction to the non-asymptotic analysis of random matrices. In Y.C. Eldar and G. Kutyniok, editors, Compressed Sensing: Theory and Applications. Cambridge University Press, 2012. We now quote the following lemma from [2] with modification to fit with the notation used in the SPARSEVA problem (2). This lemma helps us to find some important properties related to the SPARSEVA estimate θ̂λN . Based on these properties, in the next section we can derive the upper bound on the estimation error. Note that for notational simplicity, we will denote L (θ; Z1N ) as L (θ). Lemma A.2 Consider the convex optimization problem in (2). Then the pair (θ̂εN , λεN ), with θ̂εN 6= 0, has the property that θ̂εN is the solution of the problem (2) and λεN is the Lagrange multiplier if and only if all of the following hold: (1) λεN ∈ R+ ; (2) the function R (θ)+λ{L (θ)− L (θ̂NR )(1+εN )} attains its minimum over Rn at θ̂εN ; and (3) L (θ̂εN ) − L (θ̂NR )(1 + εN ) = 0. Proof. See the proof of Theorem 2.2 in [2]. The third condition in the cited theorem is a complementary slackness condition, which reduces to condition (3) here if θ̂εN 6= 0 (cf. [16, Lemma II.2]).  A.2 Background knowledge Now that we have confirmed the existence of the Lagrange multiplier λεN , consider the function F (∆) defined as follows, First, we cite a lemma directly from [12], to enable the proof of Theorem 4.1 to be constructed. Lemma A.1 For any norm R that is decomposable with F (∆) = R (θ∗ + ∆) − R (θ∗ ) + λεN {L (θ∗ + ∆) − L (θ∗ )}. ⊥ respect to (M , M ); and any vectors θ, ∆, we have R (θ + ∆) − R (θ) ≥ R (∆ M Recall that ∆ ⊥ M ⊥ ⊥ Proof of Theorem 4.1 First we need to prove that there exists a Lagrange multiplier for the SPARSEVA problem (2). We can assume without loss of generality that L (θ̂NR ) 6= 0, since otherwise we can take λεN = 0. According to [2], the Lagrange multiplier for a convex optimization problem with constraint exists when the Slater condition is satisfied. Specifically, for the SPARSEVA problem (2), the Lagrange multiplier λεN exists when there exists a θ1 such that L (θ1 ) < L (θ̂NR )(1 + εN ). If εN > 0, and L (θ̂NR ) 6= 0, there always exists a parameter vector θ1 such that L (θ1 ) < L (θ̂NR )(1 + εN ) (just take θ1 = θ̂NR ). Therefore, there exists a Lagrange multiplier λεN for the SPARSEVA problem. Appendix A.1  (A.2) Using the strong convexity condition of L (θ), ) − R (∆M ) − 2R (θM ⊥ ), (A.1) L (θ∗ + ∆) − L (θ∗ ) ≥ h∇L (θ∗ ), ∆i + κL k∆k22 . (A.3) Applying the Cauchy-Schwartz inequality to R and its dual norm R ∗ , we have, is the Euclidean projection of ∆ onto M (see Section 3.5), and similarly for the other terms in |h∇L (θ∗ ), ∆i| ≤ R ∗ (∇L (θ∗ ))R (∆). (A.1). 10 (A.4) By the definition of subspace compatibility, Next, combining the inequality (A.4) and the triangle inequality, i.e., R (∆) ≤ R (∆M ) + R (∆ ⊥ ), we have, M R (∆ˆ εN ,M ) ≤ Ψ(M )k∆ˆ εN ,M k2 . |h∇L (θ∗ ), ∆i| ≤ R ∗ (∇L (θ∗ ))R (∆) ≤ R ∗ (∇L (θ∗ ))(R (∆M ) + R (∆ M ⊥ )), Now since 0 ∈ M , we have, therefore, ∗ ∗ ∗ h∇L (θ ), ∆i ≥ −R (∇L (θ ))(R (∆M ) + R (∆ k∆ˆ ε ,M k2 = kΠM (∆ˆ εN ) − ΠM (0)k2 N ≤ k∆ˆ εN − 0k2 = k∆ˆ εN k2 . )). (A.5) Now, combining (A.2), (A.3), (A.5), and Lemma A.1, M ⊥ Therefore, R (∆ˆ εN ,M ) ≤ Ψ(M )k∆ˆ εN k2 . F (∆) = R (θ∗ + ∆) − R (θ∗ ) + λεN {L (θ∗ + ∆) − L (θ∗ )} ≥ R (∆ ⊥ ) − R (∆M ) − 2R (θ∗M ⊥ ) M n + λεN − R ∗ (∇L (θ∗ ))(R (∆M ) + R (∆ ∗ M ∗ ≥ {1 − λεN R (∇L (θ ))}R (∆ ∗ M ∗ ⊥ ⊥ Substituting this into (A.9) gives, )) + κL k∆k22 o 0 ≥ κL λεN k∆ˆ εN k22 − {1 + λεN R ∗ (∇L (θ∗ ))}Ψ(M )k∆ˆ εN k2 − 2R (θ∗M ⊥ ). (A.11) ) − {1 + λεN R (∇L (θ ))}R (∆M ) + κL λεN k∆k22 − 2R (θ∗M ⊥ ). (A.10) Note that for a quadratic polynomial f (x) = ax2 + bx + c, with a > 0, if there exists x ∈ R+ that makes f (x) ≤ 0, then such x must satisfy (A.6) Notice that, when θ̂εN is the estimate of the SPARSEVA problem, then property 2 in Lemma A.2 states that the function R (θ) + λ{L (θ) − L (θ̂NR )(1 + εN )} attains its minimum over Rn at θ̂εN , which means, √ −b + b2 − 4ac . x≤ 2a Since (A + B)2 ≤ 2A2 + 2B2 for all A, B ∈ R, ∀θ ∈ R n , R (θ̂εN ) + λεN (L (θ̂εN ) − L (θ̂NR )(1 + εN ))  b2 b2 − 4ac b2 − 2ac x ≤2 + = . 4a2 4a2 a2 ≤ R (θ) + λεN (L (θ) − L (θ̂NR )(1 + εN )).  2 (A.12) Hence, Applying this inequality to (A.11), we have, ∀θ ∈ R n , R (θ̂εN ) − R (θ) + λεN {L (θ̂εN ) − L (θ)} ≤ 0, 1 {1 + λεN R ∗ (∇L (θ∗ ))}2 Ψ2 (M ) κ2L λ2εN 4 + R (θ∗M ⊥ ) κL λεN 4 4 ≤ 2 2 Ψ2 (M ) + R (θ∗M ⊥ ). (A.13) κ κL λεN L λεN k∆ˆ εN k22 ≤ or, taking θ = θ∗ and defining ∆ˆ εN := θ̂εN − θ∗ , F (∆ˆ εN ) ≤ 0. (A.7) Combining (A.6) with (A.7), we then have, 0 ≥ κL λεN k∆ˆ εN k22 + {1 − λεN R ∗ (∇L (θ∗ ))}R (∆ˆ ∗ ∗ εN ,M ∗ ⊥ ) Case 2: λεN > 1/R ∗ (∇L (θ∗ )) − {1 + λεN R (∇L (θ ))}R (∆ˆ ε ,M ) − 2R (θM ⊥ ). N (A.8) Using a similar analysis as in Case 1, Now we consider two cases. R (∆ˆ εN ,M Case 1: λεN ≤ 1/R ∗ (∇L (θ∗ )) ⊥ ⊥ ) ≤ Ψ(M )k∆ˆ εN k2 . (A.14) Substituting (A.14) and (A.10) into (A.8), we obtain, From (A.8), we have, ⊥ 0 ≥ κL λεN k∆ˆ εN k22 + {1 − λεN R ∗ (∇L (θ∗ ))}Ψ(M )k∆ˆ εN k2 − {1 + λεN R ∗ (∇L (θ∗ ))}Ψ(M )k∆ˆ εN k2 − 2R (θ∗M ⊥ ). (A.15) 0 ≥ κL λεN k∆ˆ εN k22 − {1 + λεN R ∗ (∇L (θ∗ ))}R (∆ˆ ε ,M ) N − 2R (θ∗M ⊥ ). (A.9) 11 Now using the inequality (A.12), yields, g(θ, λ) = kθk1 + λ(L (θ) − L (θ̂NR )(1 + εN )) λ = kθk1 + (kYN − ΦTN θk22 − kYN − ΦTN θ̂NR k22 (1 + εN )). 2N (A.20)   ⊥ 1  1 ∗ ∗ 2 ˆ − R (∇L (θ )) Ψ(M ) k∆εN k2 ≤ 2 λεN κL   2 1 ∗ ∗ − + R (∇L (θ )) Ψ(M ) λεN 4 + R (θ∗M ⊥ ). κL λεN (A.16) Applying the inequality (A + B)2 ≤ 2A2 + 2B2 to the first term in (A.16) gives, The subdifferential of g(θ, λ) can be computed as ∂g(θ, λ) λ = v − ΦN (YN − ΦTN θ), ∂θ N where v = (v1 , . . . , vm )T is of the form 2 ⊥ 1 ∗ ∗ − R (∇L (θ )) Ψ2 (M ) λεN  2 2 1 + 2 + R ∗ (∇L (θ∗ )) Ψ2 (M ) κL λεN 4 R (θ∗M ⊥ ). + κL λεN 2 k∆ˆ εN k22 ≤ 2 κL   vi v  i vi 2 1 ∗ ∗ − R (∇L (θ )) ≤ {R ∗ (∇L (θ∗ ))}2 . λεN 2 1 ∗ ∗ + R (∇L (θ )) ≤ 4{R ∗ (∇L (θ∗ ))}2 . λεN ∂g(θ, λ) ∂θ θ=θ̂εN ,λ=λεN λεN =− ΦN (YN − ΦTN θ̂εN ) + vθ̂ε , N N λεN = 2 {R ∗ (∇L (θ∗ ))}2 Ψ2 (M ) κ2L ⊥ 8 + 2 {R ∗ (∇L (θ∗ ))}2 Ψ2 (M ) κL 4 + R (θ∗M ⊥ ). κL λεN k∆ˆ εN k22 ≤ N . kΦN (YN − ΦTN θ̂εN )k∞  Note that this proof is similar to the one in [13], where an expression was derived for the Lagrange multiplier in the traditional l1 norm regularization problem (the LASSO). Here we have derived the Lagrange multiplier for the SPARSEVA problem as given in (15). Proof of Proposition 5.1 Let us rewrite the SPARSEVA problem (15), A.4 θ̂εN ∈ arg min kθk1 s.t. (A.23) 1 Since ∇L (θ̂εN ) = ΦN (YN −ΦTN θ̂εN ), we can also write λεN N as 1 λεN = . k∇L (θ̂εN )k∞  θ∈Rn (A.22) for some v of the form in (A.22). Note that when θ̂εN 6= 0, kvk∞ = 1, which means that (A.18) Therefore, combining (A.17) and (A.18), A.3 if θi > 0 if θi < 0 if θi = 0. 0= (A.17) We also have,  =1 = −1 ∈ [−1, 1] Using property 2 of Lemma A.2, when θ̂εN is a solution of the SPARSEVA problem (15) and λεN is a Lagrange multiplier, we have, Note that 0 < 1/λεN < R ∗ (∇L (θ∗ )), therefore,  (A.21) Proof of Proposition 5.2 (A.19) L (θ) − L (θ̂NR )(1 + εN ) ≤ 0, For the linear regression (13) and the choice of L (θ) in (14), in the Lagrangian form (1) using Lemma A.2. The Lagrangian of the optimization problem (A.19) is, ∇L (θ∗ ) = 12 1 1 ΦN (YN − ΦTN θ∗ ) = ΦN e. N N Denote R j as the jth row of the matrix ΦN , then ∇L (θ∗ ) can be computed as, The expression in parentheses on the right hand side is monotonically decreasing in R j RTj , so using (A.26) gives     R1 R1 e        1 R2 e 1 1 R2   ∇L (θ∗ ) = ΦN e =  .  e =  .  N N  ..  N  ..      Rn Rn e  P  ΦN e P N ≤ n Z N  ΦN  ≥ (1 − β)n ≤ q 2σ2e smax χ2β (N) ln(2/β) N ∞ with probability at least 1 − 2nβ. A.5  Proof of Proposition 5.3 When θ̂εN is the solution of the problem in (15), we have, (A.25) ∇L (θ̂εN ) = 1 ΦN (YN − ΦTN θ̂εN ). N (A.29) Denote eεN = YN − ΦTN θ̂εN , and R j as the jth row of the matrix ΦN , then (A.29) becomes, (A.26) ∇L (θ̂εN ) = 1 ΦN eεN N     R1 R1 eεN       1 1 R2  R2 eεN  =  .  eεN =  .  . N  ..  N  ..      Rn Rn eεN From Assumption 5.1, and using the same argument as in Proposition 5.2, we have that each element of R j is distributed as N (0, Σ( j, j)). Now consider the variable Z = N −1 eTεN RTj . Since each element of R j is N (0, Σ( j, j)),    σ2e T P ≤ t ΦN = ∏ f x 0, 2 R j R j dx . N ∞ −t j=1 (A.28) This expression can be bounded from below using the standard result that P(|N (0, σ2 )| > t) ≤ 2 exp(−t 2 /2σ2 ) [20, Eq. (5.5)], to obtain " #!   n ΦN e N 2t 2 P ≤ t ΦN ≥ ∏ 1 − 2 exp − 2 . N ∞ 2σe R j RTj j=1  q 2σ2e smax χ2β (N) ln(2/β) ∇L (θ∗ ) Note that from (A.24), for any t > 0, we have,    Zt  1 σ2e T P R j e ≤ t ΦN = f x 0, 2 R j R j dx, N N −t (A.27) where f (x|0, N −2 σ2e R j RTj ) denotes the pdf of the Normal distribution N (0, N −2 σ2e R j RTj ). This gives, ΦN e N q 2σ2e smax χ2β (N) ln(2/β)/N gives ∞ with probability 1 − β.  , with probability at least 1 − nβ, or equivalently, Hence, the variance of the distribution of the variable N −1 R j e, is, σ2e σ2e T R R ≤ Σ( j, j)χ2β (N), j j N2 N2 #!n ≥ 1 − nβ Now in order to derive a bound for ∇L (θ∗ ), we first derive an upper bound for the variance N −2 σ2e R j RTj of the distribution in (A.24). Since each element of R j ∼ N (0, Σ( j, j)), we have, R j RTj ∼ Σ( j, j)χ2 (N). Hence, with probability 1 − β, 0 ≤ β ≤ 1, we have, ≤ Σ( j, ≤ t ΦN ∞ " N 2t 2 ≥ 1 − 2 exp − 2 2σe smax χ2β (N) In particular, taking t = Now consider the variable Z = N −1 R j e. Using Assumption 5.2 on the disturbance noise e, e ∼ N (0, σ2e ) and the property related to the sum of independent normal random variables, we then have,   σ2 Z|e ∼ N 0, e2 R j RTj . (A.24) N j)χ2β (N).  which holds with probability 1 at least 1 − nβ, where smax denotes the maximum diagonal element of matrix Σ. Note that R j contains the jth element of each column ΦN, j of the matrix ΦN , and following the Assumption 5.1, ΦN, j ∼ N (0, Σ), each element of R j ∼ N (0, Σ( j, j)). R j RTj ΦN e N t Z∼N 1   Σ( j, j) T 0, e e . ε N 2 εN N This bound follows because the events A j that (A.26) holds are not necessarily independent, but their joint probability can be bounded like P(A1 ∩· · ·∩An ) = 1−P(AC1 ∪· · ·∪ACn ) ≥ 1−P(AC1 )− · · · − P(ACn ) = 1 − nβ. 13 with probability at least 1 − nβ, or, equivalently, Note that, eTεN eεN = (YN − ΦTN θ̂εN )T (YN − ΦTN θ̂εN ) = 2N L (θ̂εN ) q ∇L (θ̂εN ) = 2N L (θ̂NR )(1 + εN ). (A.30) From Section 4.4 in [17], we have, L (θ̂NR )|ΦN ∼ σ2e 2 χ (N − n), 2N σ2e 2 χ (N − n), 2N β with probability 1 − β, 0 ≤ β ≤ 1. Combining this inequality with (A.30) gives, with probability 1 − β, Σ2 ( j, j)eTεN eεN σ2 ≤ e2 Σ( j, j)χ2β (N − n)(1 + εN ). 2 N N Hence,  R j eεN ≤t e P N   Z t σ2e 2 ≥ f x 0, Σ( j, j) 2 χβ (N − n)(1 + εN ) dx, (A.31) N −t  with probability 1 − β. This means,   ΦN eεN P (A.32) ≤t e N ∞   n Z t  σ2 =∏ f x 0, e2 Σ( j, j)χ2β (N − n)(1 + εN ) dx N −t j=1 ( !)n N 2t 2 ≥ 1 − 2 exp − 2 2σe smax χ2β (N − n)(1 + εN ) with probability at least 1−nβ, following the same reasoning as in the proof of Proposition 5.2. Therefore,   P ∇L (θ̂εN ) ≤ t e ∞ !)n ( N 2t 2 ≥ 1 − 2 exp − 2 2σe smax χ2β (N − n)(1 + εN ) with probability at least 1 − nβ. Taking t = q 2σ2e smax χ2β (N − n)(1 + εN ) ln(2/β)/N gives  P  ∇L (θ̂εN ) ≤ q 2σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) ∞ 2σ2e smax χ2β (N − n)(1 + εN ) ln(2/β) ∞ with probability at least 1 − 2nβ. which gives, L (θ̂NR ) ≤ ≤ N  e ≥ (1 − β)n ≥ 1 − nβ, 14 N , 
10math.ST
1 Low-Complexity Sub-band Digital Predistortion for Spurious Emission Suppression in Noncontiguous Spectrum Access arXiv:1607.02249v2 [cs.IT] 19 Aug 2016 Mahmoud Abdelaziz, Student Member, IEEE, Lauri Anttila, Member, IEEE, Chance Tarver, Student Member, IEEE, Kaipeng Li, Student Member, IEEE, Joseph R. Cavallaro, Fellow, IEEE, Mikko Valkama, Senior Member, IEEE Abstract—Noncontiguous transmission schemes combined with high power-efficiency requirements pose big challenges for radio transmitter and power amplifier (PA) design and implementation. Due to the nonlinear nature of the PA, severe unwanted emissions can occur, which can potentially interfere with neighboring channel signals or even desensitize the own receiver in frequency division duplexing (FDD) transceivers. In this article, to suppress such unwanted emissions, a low-complexity sub-band DPD solution, specifically tailored for spectrally noncontiguous transmission schemes in low-cost devices, is proposed. The proposed technique aims at mitigating only the selected spurious intermodulation distortion components at the PA output, hence allowing for substantially reduced processing complexity compared to classical linearization solutions. Furthermore, novel decorrelation based parameter learning solutions are also proposed and formulated, which offer reduced computing complexity in parameter estimation as well as the ability to track timevarying features adaptively. Comprehensive simulation and RF measurement results are provided, using a commercial LTEAdvanced mobile PA, to evaluate and validate the effectiveness of the proposed solution in real world scenarios. The obtained results demonstrate that highly efficient spurious component suppression can be obtained using the proposed solutions. Index Terms—Adaptive filters, carrier aggregation, digital predistortion, frequency division duplexing, nonlinear distortion, power amplifier, software defined radio, spectrally agile radio, spurious emission, 3GPP LTE-Advanced. I. I NTRODUCTION Spectrum scarcity and ever-increasing data rate requirements are the two main motivating factors behind introducing carrier aggregation (CA) in modern wireless communication systems, such as 3GPP LTE-Advanced [1], [2]. In CA transmission, multiple component carriers (CCs) at different Mahmoud Abdelaziz, Lauri Anttila, and Mikko Valkama are with the Department of Electronics and Communications Engineering, Tampere University of Technology, Tampere, Finland. Chance Tarver, Kaipeng Li, and Joseph R. Cavallaro are with the Department of Electrical and Computer Engineering, Rice University, Houston, TX. This work was supported by the Finnish Funding Agency for Technology and Innovation (Tekes) under the project “Future Small-Cell Networks using Reconfigurable Antennas (FUNERA)”, and by the Linz Center of Mechatronics (LCM) in the framework of the Austrian COMET-K2 programme. The work was also funded by the Academy of Finland under the projects 288670 “Massive MIMO: Advanced Antennas, Systems and Signal Processing at mmWaves”, 284694 “Fundamentals of Ultra Dense 5G Networks with Application to Machine Type Communication”, and 301820 “Competitive Funding to Strengthen University Research Profiles”. This work was also supported in part by the US National Science Foundation under grants ECCS-1408370, CNS-1265332, and ECCS-1232274. RF frequencies are adopted simultaneously, either within the same RF band (intraband CA), or at different RF bands (interband CA) [3]. While interband CA naturally leads to a non-contiguous transmit spectrum, this can also happen in the intraband CA case when the adopted component carriers are located in a non-contiguous manner. Adopting non-contiguous CA provides lots of flexibility in RF spectrum use, but also poses substantial challenges in the transmitter design, especially in lower-cost devices such as LTE-Advanced user equipment (UE). Moreover, multicarrier type modulations with very large peak-to-average power ratio (PAPR) are used in most state-of-the-art wireless communication systems. When combined with noncontiguous transmission schemes and high power-efficiency requirements, controlling the transmitter unwanted emissions due to power amplifier (PA) nonlinearity becomes a true challenge [4]–[6]. In [3], a comparison of different transmitter architectures for CA based transmission schemes was presented, showing that it is more power efficient to combine the CCs before the PA, and thus use only a single PA, instead of having a separate PA for each CC. This is also technically feasible, especially in the intraband CA case. The power savings can be quite significant since the overall transmitter efficiency is dominated by the PA [3], and is particularly critical in mobile terminals and other lower-cost devices, such as small-cell basestations, with limited computing and cooling capabilities [7], [8]. However, the power efficiency gained from using a single PA for all CCs comes at the expense of more severe unwanted emissions, stemming from the PA nonlinear characteristics, that can occur at adjacent channels or bands, or even at own receiver band in FDD transceiver case [4]–[6], [9]. The levels of different unwanted emissions are, in general, regulated by the standardization bodies and ITU-R [10]. It has been recently demonstrated that in the context of LTE-Advanced mobile transmitter with noncontiguous CA or multicluster type transmission, the PA nonlinearities lead to spurious emissions that can seriously violate the given spectrum and spurious emission limits if not properly controlled [2], [4]–[6]. Furthermore, in FDD devices, in addition to violating the general spurious emission limits, the generated spurious components can also overlap with the device’s own receive band, causing own receiver desensitization [4], [9], [11], [12]. One obvious solution to decrease the levels of unwanted emissions is to back off the transmit power from 2 its saturation region. In 3GPP UE terminology, this is known as Maximum Power Reduction (MPR), and MPR values up to 16 dB are allowed in some use cases for mobile terminals [2]. However, this approach will end up yielding a significantly lower PA efficiency as well as a substantial reduction in the network coverage. There is thus a clear need for alternative PA linearization solutions which do not have such drastic adverse effects. Digital predistortion (DPD) is, in general, one of the most effective solutions for mitigating transmitter nonlinear distortion. There have been substantial research efforts in the past 20 years in developing ever more efficient and elaborate DPD techniques, mostly for high-end macro base-station type of devices. The conventional DPD approaches seek to linearize the full composite transmit signal, and we thus refer to such solutions as full-band DPD in this article. There have also been a handful of recent works on efficient concurrent linearization techniques for multi-band transmitters that employ only a single PA [13]–[15]. These works assume that the component carriers are separated by a large distance such that the spurious emissions are filtered out by the transmit RF filter, and hence linearization of only the main carriers is pursued. Complementary to such methods, the scope of this paper is to introduce a low-complexity DPD solution for suppressing the spurious emissions in non-contiguous transmission cases, while not concentrating specifically on the linearization of the main component carriers. Hereafter, we will refer to such linearization solutions as sub-band DPD. This approach is motivated by the following two factors. First, the emission limits in the spurious region are generally stricter than in the spectral regrowth region around the component carriers, and are thus more easily violated. This has been recognized also in 3GPP recently, in the context of intraband noncontiguous carrier aggregation [2], [4]–[6]. Moreover, even in interband carrier aggregation scenarios in FDD devices, some of the spurious components can be hitting the own RX band causing own receiver desensitization [11]. Second, by concentrating the linearization efforts to the most critical spurious emissions only, the processing and instrumentation requirements can be significantly relaxed, thus potentially facilitating the DPD processing also in mobile terminals and other lower-cost devices. This applies not only to the DPD main path processing complexity but also to the feedback receiver instrumentation complexity which can also be substantially reduced. There have been some recent studies in the literature that consider the mitigation of the spurious emissions explicitly. In [16]–[18], such processing was added to complement a concurrent linearization system while assuming a frequency-flat PA response within the spurious sub-band. In [16], [17], the DPD parameter estimation was done offline, based on extracting the quasi-memoryless PA parameters using large-signal network analyzer (LSNA) measurements, and covering up to fifth-order processing. In [18], a memoryless least-squares fit between the observed intermodulation distortion (IMD) at the considered sub-band and certain basis functions was performed. The basis functions were generated using a wideband composite carrier baseband equivalent signal, followed by sub-band filtering, implying a very high sample rate and processing complex- ity, especially for widely spaced carriers. The estimated and regenerated IMD was then applied at the PA input, oppositely phased, such that it is canceled at the PA output. In [19], [20], on the other hand, third-order nonlinearities at the IM3 sub-bands were specifically targeted, through explicit, lowrate, behavioral modeling of the baseband equivalent IM3 sub-band emissions. Furthermore, the parameter estimation of the DPD was based on a closed-loop feedback with a decorrelation-based learning rule, which was shown to have better linearization performance compared to the third-order inverse solution in [16] in terms of the spurious emission suppression. Moreover, an FPGA implementation of this thirdorder decorrelation-based sub-band DPD was presented in [21], demonstrating fast and reliable performance under real time constraints. A recent overview article [22] highlighted the main principles and advantages of such low complexity subband DPD solutions, while not concentrating on the details of the DPD processing or parameter estimation and adaptation algorithms at technical level. In [23], on the other hand, a flexible full-band DPD solution was also proposed by the authors which can optimize the DPD coefficients to minimize the nonlinear distortion at a particular frequency or sub-band in the out-of-band or spurious regions. However, like other fullband DPD techniques, it requires very high sampling rates in the transmitter and feedback receiver when the carrier spacing between the CCs increases. In this article, we extend the elementary third-order IM3 sub-band DPD solution, proposed by the authors in [19], [20], in two ways. First, the third-order IM3 sub-band DPD is extended to incorporate higher-order processing based on explicit modeling of the higher-order spurious components at the IM3 sub-band. This will enhance the IM3 spurious emission suppression considerably. Furthermore, we also extend the sub-band DPD solution to include higher-order sub-bands, i.e., IM5, IM7, etc., thus offering more flexibility and linearization capabilities beyond the basic IM3 sub-band. All the proposed solutions are derived for wideband nonlinear PAs with memory. Furthermore, we also formulate novel decorrelation-based parameter estimation methods, covering both sample-adaptive and block-adaptive learning rules, to efficiently identify the needed DPD parameters with low complexity. The proposed learning solutions are also shown to offer better performance than the earlier proposed third-order or fifth-order inverse based methods. We also provide comprehensive simulation and RF measurement results, using a commercial LTE-Advanced mobile PA, to evaluate and validate the effectiveness of the proposed solutions in real world scenarios. The rest of this article is organized as follows: Section II presents the mathematical modeling of the different considered spurious components at different sub-bands, produced by a nonlinear PA with memory. Stemming from this modeling, also the corresponding core processing principles of the proposed DPD solutions at different sub-bands are formulated. Then, Section III presents the proposed DPD parameter learning solutions, covering both sample-adaptive and block-adaptive decorrelation solutions at different subbands. Section IV addresses then different implementation alternatives of the proposed sub-band DPD concept, and also 3 6ϑΚΤΦ 1ΤΦΓΤ 0ΘΠΝΚΠΓΧΤΚς[ %ΧΤΤΚΓΤ ∃9 %ΧΤΤΚΓΤ ∃9 (ΚΗςϑ 1ΤΦΓΤ 0ΘΠΝΚΠΓΧΤΚς[ +/ 4 +/ 4 +/ 4 5ΓΞΓΠςϑ 1ΤΦΓΤ 0ΘΠΝΚΠΓΧΤΚς[ 5ΡΩΤ .ΚΟΚς 5ΡΩΤ .ΚΟΚς +/ +/ +/ %% %ΧΤΤΚΓΤ ∃9 &f &f %% /∗∴ &f +/ %ΧΤΤΚΓΤ ∃9 &f +/ f +/ /∗∴ &f &f &f Fig. 1. Illustration of different intermodulation distortion components created by a nonlinear PA when excited with a non-contiguous CA signal with two component carriers. Here, nonlinear distortion components up to order 7 are shown. analyzes the computing complexity of the sub-band DPD in terms of the number of floating point operations together with some hardware complexity aspects. Finally, Sections V and VI report comprehensive simulation and RF measurement results, evidencing excellent spurious emission suppression in different realistic scenarios. II. S PURIOUS C OMPONENT M ODELING AND P ROPOSED S UB - BAND DPD P ROCESSING In this manuscript, we assume a practical case of noncontiguous carrier aggregation with two component carriers. When such noncontiguous dual-carrier signal is applied at the PA input, the PA nonlinearity leads to intermodulation distortion at different sub-bands, as shown in Fig. 1. Assuming a CC separation of ∆f , in addition to the spectral regrowth around the main carriers, intermodulation between the two CCs yields strong IMD at integer multiples of ∆f from the main CCs. In this article, we refer to the intermodulation (IM) sub-bands located at ±∆f from the main CCs as the IM3 sub-bands. Similarly, the IM5 sub-bands are located at ±2∆f from the main CCs, and so on. In general, each IM sub-band includes nonlinear distortion components of different orders as shown in Fig. 1. For example, in the case of a seventh-order PA nonlinearity, the IM3 sub-band contains third, fifth and seventh-order nonlinearities, while the IM5 sub-band contains fifth and seventh-order components. In this section, we start with the fundamental modeling of the nonlinear distortion at the IM3 sub-band as a concrete example. Stemming from that modeling, we then formulate the basic processing of the proposed IM3 sub-band DPD. After that, the modeling is extended to cover the nonlinear distortion components at the higher-order IM sub-bands, followed by the corresponding higher-order sub-band DPD processing. The actual parameter estimation and learning algorithms for the proposed sub-band DPD structures are then presented in details in Section III. In all the modeling and developments, we adopt the widely-used wideband Parallel Hammerstein (PH) PA model [24] to describe the fundamental nonlinear behavior of the PA, as it has been shown to model accurately the measured nonlinear behavior of different classes of true PAs. A. Spurious Component Modeling at IM3 Sub-bands The modeling is carried out at composite baseband equivalent level, where the two component carriers are assumed to be separated by 2fIF . The composite baseband equivalent input and output signals of the P th order Parallel Hammerstein PA model, with monomial nonlinearities and FIR branch filters, respectively, read f j2π fIF n x(n) = x1 (n)e y(n) = P X s f −j2π fIF n + x2 (n)e s fp,n ? |x(n)|p−1 x(n), , (1) (2) p=1 p odd where x1 (n) and x2 (n) are the baseband component carrier signals, fp,n denotes the PH branch filter impulse responses of order p, and ? is the convolution operator. Intermodulation between the two component carriers leads to the appearance of IMD components at ±3fIF , ±5fIF , etc., as shown in Fig. 1 for the corresponding RF spectrum. As a concrete example, let us analyze the IMD at ±3fIF . Direct substitution of (1) in (2) allows extracting the baseband equivalent distortion terms at the IM3 sub-bands, which, through straight-forward manipulations, yields yIM 3± (n) = P X f3±,p,n ? u3±,p (n). (3) p=3 p odd Here, f3±,p,n denote the baseband equivalent impulse responses corresponding to the wideband PH PA model filters fp,n , evaluated at the IM3± sub-bands, formally defined as 3f ∓j2π fIF n s fp,n }, f3±,p,n = LP F {e (4) with LP F {.} denoting an ideal low pass filtering operation with a passband width P times the bandwidth of the wider CC. Furthermore, u3+,p (n) and u3−,p (n) in (3) are the corresponding pth order static nonlinear (SNL) basis functions, related to the nonlinear distortion at the IM3+ and IM3- subbands, respectively. Assuming then an 11th order PA model (i.e., P = 11), as a concrete high-order example, the IM3+ sub-band basis functions read 4 2# 1ΩςΡΩς 9Κςϑ +/ f IF Ω f +/ +/ Ζ Ω +/ fRF %% %% + 3 /1& &#% +/ +/ &2& +/  f f IF 2# 3 f IF f 5Ω∆ ∃ΧΠΦ &2& (ΚΝςΓΤ &52 f &#% Ξ(, Ζ f RF #&% f (10) p=3 p odd Ζ Ω  Q X   j2π 3ffIF n s x̃(n) = x(n) +  α3+,p,n ? u3+,p (n) e 3 f IF .2( Fig. 2. The proposed sub-band DPD processing principle focusing on the IM3+ sub-band. Thick lines are used to indicate complex I/Q processing. For presentation simplicity, TX filtering between the feedback coupler and the antenna is not shown. ˜ variables to indicate Here, and in the continuation, we use (.) sub-band DPD processing and the corresponding predistorted signals. This DPD processing principle is illustrated in Fig. 2 at a conceptual level, where the TX/RX duplexer filters are omitted for simplicity of the presentation since they do not directly impact the sub-band DPD processing or learning. Similar convention is followed also in other figures. Different implementation alternatives as well as the parameter learning and feedback receiver aspects are addressed in more details in Sections III and IV. C. Generalization to Higher-Order IM Sub-bands u3+,3 (n) = x∗2 (n)x21 (n) (5) u3+,5 (n) = u3+,3 (n) × (2|x1 (n)|2 + 3|x2 (n)|2 ) (6) u3+,7 (n) = u3+,3 (n) × (3|x1 (n)|4 + 6|x2 (n)|4 + 12|x1 (n)|2 |x2 (n)|2 ) (7) u3+,9 (n) = u3+,3 (n) × (4|x1 (n)|6 + 10|x2 (n)|6 + 30|x1 (n)|4 |x2 (n)|2 + 40|x1 (n)|2 |x2 (n)|4 ) (8) u3+,11 (n) = u3+,3 (n) × (5|x1 (n)|8 + 15|x2 (n)|8 + 60|x1 (n)|6 |x2 (n)|2 + 100|x1 (n)|2 |x2 (n)|6 + 150|x1 (n)|4 |x2 (n)|4 ). (9) The corresponding basis functions for the IM3- sub-band, i.e., u3−,p (n), can be obtained by simply interchanging x1 (n) and x2 (n) in the above expressions. Next, these behavioral modeling results are utilized to formulate the proposed IM3 sub-band DPD concept, specifically tailored to suppress the distortion at the IM3 sub-band. The direct substitution of (1) in (2) leads to the appearance of spurious intermodulation terms also at higher-order IM subbands, in addition to the previously considered IM3 sub-bands, as illustrated already in Fig. 1. These higher-order sub-band emissions can also be harmful, since they can violate the emission limits, cause own receiver desensitization, or both. Thus, developing a sub-band DPD solution that can tackle also the distortion at these higher-order IM sub-bands with feasible complexity is important. Similar to the above IM3+ sub-band developments, we next extract the IMD terms at the higherorder IM sub-bands. The baseband equivalent IMD terms at the IM5+, IM7+, IM9+, and IM11+ sub-bands, as concrete examples, can be extracted using (1) and (2), interpreted at proper sub-bands, yielding yIM 5+ (n) = f5+,p,n ? u5+,p (n) (11) f7+,p,n ? u7+,p (n) (12) f9+,p,n ? u9+,p (n) (13) f11+,p,n ? u11+,p (n). (14) p=5 p odd yIM 7+ (n) = P X p=7 p odd B. Proposed IM3 Sub-band DPD Principle For presentation purposes, we focus here on suppressing the spurious emissions at the IM3+ sub-band, while the corresponding emissions at the IM3- sub-band can also be easily mitigated using a very similar structure with minor changes as will be elaborated later in Section II-C. The key idea of the sub-band DPD concept is to inject a proper additional lowpower cancellation signal, with structural similarity to (3) and located at +3fIF , into the PA input, such that the level of the IM3+ term at the PA output is reduced. Now, stemming from the IMD structure in (3), an appropriate digital injection signal can be obtained by adopting the IM3+ basis functions u3+,p (n) in (5)-(9), combined with proper filtering using a bank of sub-band DPD filters α3+,p,n . Incorporating such subband DPD processing with polynomial order Q, the composite baseband equivalent PA input signal reads P X yIM 9+ (n) = P X p=9 p odd yIM 11+ (n) = P X p=11 p odd In the above models, f5+,p,n , f7+,p,n , f9+,p,n , and f11+,p,n denote the baseband equivalent impulse responses corresponding to the wideband PA model filters fp,n in (2), evaluated at the IM5+, IM7+, IM9+, and IM11+ sub-bands, respectively. These are formally obtained similar to (4) but replacing 3fIF with either 5fIF , 7fIF , 9fIF , or 11fIF , respectively. The pth order basis functions at the these higher-order IM sub-bands, denoted by u5+,p (n), u7+,p (n), u9+,p (n), and u11+,p (n), and assuming again an 11th order PH PA model, read 5 ∗ 2 u5+,5 (n) = (x2 (n) ) x1 (n) 3 (15) 2 2 u5+,7 (n) = u5+,5 (n)(4|x2 (n)| + 3|x1 (n)| ) (16) u5+,9 (n) = u5+,5 (n)(10|x2 (n)|4 + 6|x1 (n)|4 + 20|x1 (n)|2 |x2 (n)|2 ) (17) u5+,11 (n) = u5+,5 (n)(20|x2 (n)|6 + 10|x1 (n)|6 + 75|x2 (n)|4 |x1 (n)|2 + 60|x2 (n)|2 |x1 (n)|4 ) u7+,7 (n) = (x2 (n)∗ )3 x1 (n)4 (18) (19) 2 2 u7+,9 (n) = u7+,7 (n)(5|x2 (n)| + 4|x1 (n)| ) (20) u7+,11 (n) = u7+,7 (n)(15|x2 (n)|4 + 10|x1 (n)|4 + 30|x2 (n)|2 |x1 (n)|2 ) (21) u9+,9 (n) = (x2 (n)∗ )4 x1 (n)5 (22) 2 2 u9+,11 (n) = u9+,9 (n)(6|x2 (n)| + 5|x1 (n| ) ∗ 5 6 u11+,11 (n) = (x2 (n) ) x1 (n) . (23) (24) The corresponding baseband equivalent IMD terms at the negative IM sub-bands can be obtained by simply interchanging x1 (n) and x2 (n) in (15)-(24). Then, stemming from the distortion structure in (11)-(14), and adopting similar ideology as in the previous IM3 subband DPD case, a natural injection signal for suppressing the spur components at higher-order IM sub-bands can be obtained by properly filtering and combining the above higher-order sub-band basis functions. The sub-band specific filters for the pth order basis functions are denoted with α5+,p,n , α7+,p,n , α9+,p,n , and α11+,p,n . Incorporating such DPD processing with DPD polynomial order Q, and aggregating at the same time parallel sub-band DPDs simultaneously for the IM3+, IM5+, and IM7+ sub-bands, as a concrete example, the composite baseband equivalent PA input signal now reads  Q X   j2π 3ffIF n s x̃(n) = x(n) +  α3+,p,n ? u3+,p (n) e  X  j2π 5ffIF n s + α5+,p,n ? u5+,p (n) e p=5 p odd  Q X   j2π 7ffIF n s + α7+,p,n ? u7+,p (n) e In this subsection, we derive three analytical reference solutions for calculating the IM3 sub-band DPD coefficients. The considered approaches are the third-order inverse solution, also adopted in [16], the IM3 power minimization solution, and the analytical IM3 decorrelation-based solution. To keep the analytical developments simple and tractable, we consider a simplified case with a third-order memoryless IM3+ sub-band DPD and a third-order memoryless PA. The actual sample-adaptive and block-adaptive decorrelation based learning solutions, devised later in this section, are formulated for the general cases of higher-order processing with memory. Now, starting with the dual carrier signal in (1), and limiting the study to the simplified case of a third-order memoryless IM3+ sub-band DPD and a third-order memoryless PA, the basic signal models are given by (26)-(30). y(n) = f1 x(n) + f3 |x(n)|2 x(n), x∗2 (n)x21 (n), u(n) = yIM 3+ (n) = f3 u(n), (26) (27) (28) 3f j2π fIF n s , x̃(n) = x(n) + αu(n)e + f3 |α|2 α|x1 (n)|4 |x2 (n)|2 u(n). p=3 p odd Q A. Analytical Reference Solutions (29) ỹIM 3+ (n) = (f3 + f1 α)u(n) + 2f3 α(|x1 (n)|2 + |x2 (n)|2 )u(n)   analytical reference solutions, taking the third-order IM3 subband DPD as a simple and tractable example, in order to demonstrate that minimizing the IM3 power is essentially identical to decorrelating the IM3 observation against the corresponding sub-band DPD basis functions. Then, both sample-adaptive and block-adaptive decorrelation based learning rules are devised, covering the general cases of higherorder processing with memory at IM3 and higher-order IM sub-bands.  (25) p=7 p odd In general, the achievable suppression of the distortion at different IM sub-bands depends directly on the selection and optimization of the different filters α3+,p,n , α5+,p,n , α7+,p,n , and so on. This is addressed in detail in the next section. Here, f1 and f3 are the memoryless PA model parameters, α denotes the memoryless sub-band DPD parameter to be optimized, while yIM 3+ (n) and ỹIM 3+ (n) refer to the baseband equivalent PA output at the positive IM3 sub-band without and with sub-band DPD, respectively. Now, as (30) clearly shows, the IM3 sub-band distortion at the PA output, with DPD adopted, depends directly on, and can thus be controlled by, the DPD coefficient α. In the wellknown third-order inverse solution, the DPD parameter α is selected such that the third-order term in (30) is canceled, i.e., f3 + f1 α = 0. The corresponding solution, denoted by αinv , thus reads αinv = −f3 /f1 . III. S UB - BAND DPD PARAMETER L EARNING U SING THE D ECORRELATION P RINCIPLE In this section, based on the previous spurious component modeling and the proposed sub-band DPD principle, we formulate computing feasible and highly efficient estimation algorithms for learning and optimizing the sub-band DPD filter coefficients such that the spurious emissions are minimized at the considered IM sub-bands. We start by deriving some (30) (31) However, this will not remove all the distortion, because higher-order terms will be created due to the predistortion, as shown in (30). A more elaborate method for selecting the DPD parameter α is the one that minimizes the power of the total IM3 sub-band signal, ỹIM 3+ (n), referred to as the minimum IM3 power or minimum mean-squared error (MMSE) solution in the continuation. For notational convenience, we define the 6 so-called error signal as e(n) = ỹIM 3+ (n), as with ideal predistortion the IM3 sub-band signal would be zero, and thus the optimization means minimizing the power of this error signal. The detailed derivation of the optimum DPD parameter which minimizes the mean squared error IE[|e(n)|2 ] is given in Appendix A, yielding B. Sample-Adaptive Decorrelation-based Learning In this subsection, we provide the actual sample-adaptive learning rules for both IM3 and higher-order IM sub-band DPD structures with memory, whose basic operating principles were described in Section II. To facilitate the learning, we assume a feedback or observation receiver measuring the particular IM sub-band whose sub-band DPD filter coefficients are currently under learning. Notice that opposed to classical wideαM M SE =  ∗ ∗ 2 band DPD principles, where a wideband observation receiver − f1 f3 IE42 + 2|f3 | (IE62 + IE44 ) ∗ , is typically needed, a more narrowband receiver is sufficient ∗ 2 2 [|f1 | IE42 + 4R(f1 f3 )(IE62 + IE44 ) + 4|f3 | (IE46 + 2IE64 + IE82 )] (32) here since only the particular IM sub-band is observed. As both the IM3 and the higher-order IM sub-band DPDs are based where IEij refers to the products of the CC signals’ higher- on multiple strongly correlated basis functions, given in (5)order moments of the form IE[|x1 |i ]IE[|x2 |j ], while IE[.] de- (9) and (15)-(24), respectively, we start by introducing a basis notes the statistical expectation operator. function orthogonalization procedure, after which the actual As will be shown with concrete examples in Section V, proposed adaptive decorrelation algorithms are described. this MMSE solution provides better linearization performance 1) Basis Function Orthogonalization: When a nonlinearcompared to the third-order inverse solution. However, as ity order higher than the IM sub-band order is considered, shown in (32), the analytical MMSE solution requires the multiple basis functions are adopted in the sub-band DPD knowledge of various higher-order moments of the CC signals. processing, as described in Section II. Taking as an example Furthermore, the above solution is valid only in the case case the IM3+ sub-band, the SNL basis functions u 3+,p (n), of a memoryless third-order nonlinear system, beyond which p = 1, 3, ..., Q, given in (5)-(9), are highly correlated. This obtaining an analytical expression for the DPD coefficients can negatively impact the convergence and stability of the becomes overly tedious. Thus, to relax these constraints, an adaptive decorrelation-based learning. Therefore, the SNL alternative solution, based on minimizing the correlation be- basis functions are first orthogonalized [25], which yields a tween the IM3 sub-band observation and the third-order basis new set of DPD basis functions s 3+,p (n), p = 1, 3, ..., Q, function u(n) = x∗2 (n)x21 (n) was initially discussed in [19], written formally at sample level as and will be extended to higher nonlinearity orders and higherorder IM sub-bands in this paper. The analytical reference s3+ (n) = Wu3+ (n), (35) solution for the decorrelation-based sub-band DPD structure is obtained by setting the correlation between the error signal, where e(n), and the third-order basis function, u(n) = x∗2 (n)x21 (n), to zero, i.e., IE[e(n)u∗ (n)] = 0. Then, through straightu3+ (n) = [u3+,3 (n) u3+,5 (n) ... u3+,Q (n)]T , (36) forward algebraic manipulations, the decorrelation-based DPD T coefficient, denoted by αo , can be shown to read s3+ (n) = [s3+,3 (n) s3+,5 (n) ... s3+,Q (n)] , (37) 1  w5,3  w7,3 W=  .  . .  αo = −f3 I 60 + f1 + 2f3 ( E E I 40 E I 04 ) E I 02 . (33) Assuming then, for simplicity, that the CC baseband equivalents are complex Gaussians, (33) simplifies to αo = −f3 , 2 2 f1 + 2f3 (3σx,1 + 2σx,2 ) (34) 2 2 = IE[|x1 |2 ] and σx,2 = IE[|x2 |]2 are the variances where σx,1 of the two CCs [19]. A clear advantage of the decorrelation-based approach compared to the earlier MMSE solution lies in the simple and straightforward adaptive filtering based practical computing solutions, sketched initially in [19] for simple thirdorder processing at IM3, which do not require any prior knowledge about signal moments or any other parameters. Furthermore, opposed to the MMSE solution, the decorrelation based approach can be easily extended to include higher-order nonlinearities and memory effects, at both the IM3 sub-band as well as the other higher-order IM sub-bands, as will be described in details in the next subsection. wQ,3 0 w5,5 w7,5 .. . wQ,5 0 0 w7,7 .. . wQ,7 0 0 ... .. . ... 0 0 0 .. .    .   (38) wQ,Q The lower triangular matrix W can be obtained, e.g., through Gram-Schmidt orthogonalization, QR or singular value decomposition, or using a lower complexity iterative orthogonalization algorithm [26]. Similarly, the SNL basis functions in (15)-(24) corresponding to the higher-order IM sub-bands are also orthogonalized, to obtain new sets of orthogonal basis functions s5+ (n), s7+ (n), etc. 2) Adaptive Learning for IM3+ Sub-band: We now present the actual sample-adaptive decorrelation based learning algorithm for the IM3+ sub-band DPD coefficients. For notational convenience, we introduce the following vectors α3+,l (n) = [α3+,3,l (n) α3+,5,l (n) ... α3+,Q,l (n)]T , ᾱ3+ (n) = [α3+,0 (n) T α3+,1 (n) T T T ... α3+,N (n) ] , s̄3+ (n) = [s3+ (n)T s3+ (n − 1)T ... s3+ (n − N )T ]T , (39) (40) (41) 7 x1 x∃ x Upsampling and IF upconversion x2 S/P Adaptive Higher Order IM3+ Sub-band DPD x1 x1 I1 Q1 x2 SNL3 u3 s3 f RF , 3 fIF Third Order IM3 Decorrelator Z-1 Z-1 I Z-1 Upsampling and 3xIF upconversion 1*  N* Q Z-D f RF ∗ 3 f IF PA I/Q LO f  0* f RF , f IF f RF ∗ f IF D/A LPF D/A LPF f RF ∗ 3 f IF yIM 3 ∗ Adaptive Algorithm I2 x2 Q 2 f x1 x2 x1 x2 SNL5 u5 s5 DSP Fifth Order IM3 Decorrelator Baseband SNLQ uQ sQ LPF A/D f Qth Order IM3 Decorrelator Fig. 3. Detailed block diagram of the sample-adaptive decorrelation-based IM3+ sub-band DPD with higher-order nonlinearities and memory. where now α3+,p,l (n) denotes the lth adaptive filter coefficient of the pth order orthogonalized IM3+ basis function s3+,p (n) at time index n, and N denotes the adaptive filter memory depth. Furthermore, the vectors ᾱ3+ (n) and s̄3+ (n) incorporate all the coefficients and basis function samples up to polynomial order Q. Adopting this notation, the instantaneous sample of the composite baseband equivalent PA input signal x̃(n) now reads objective function J(ᾱ3+ ) = IE[x̃3+ (n)e∗3+ (n)], where the target is to search for the DPD coefficients ᾱ3+ that minimize the ensemble correlation between e3+ (n) and the baseband equivalent of the IM3+ injection signal x̃3+ (n) in (43). The overall processing flow is graphically illustrated in Fig. 3. 3) Adaptive Learning for Higher-Order IM Sub-bands: We now extend the decorrelation based learning to higher-order IM sub-bands. First, adopting vector-based notations again, we introduce the following vectors for notational convenience 3f j2π fIF n s , x̃(n) = x(n) + x̃3+ (n)e (42) where the instantaneous sample of the baseband equivalent IM3+ injection signal x̃3+ (n) reads x̃3+ (n) = ᾱ3+ (n)H s̄3+ (n). (43) α5+,l (n) = [α5+,5,l (n) α5+,7,l (n) ... α5+,Q,l (n)]T , (46) T T ... α5+,N (n) ] , (47) ᾱ7+ (n) = [α7+,0 (n)T α7+,1 (n)T ... α7+,N (n)T ]T , (48) α7+,l (n) = [α7+,7,l (n) α7+,9,l (n) ... α7+,Q,l (n)] , ᾱ5+ (n) = [α5+,0 (n) T α5+,1 (n) T T s5+ (n) = [s5+,5 (n) s5+,7 (n) ... s5+,Q (n)] , Then, in order to adaptively update the filter coefficients ᾱ3+ (n), the IM3+ sub-band is observed with the feedback receiver, and the coefficient is updated as µ ᾱ3+ (n + 1) = ᾱ3+ (n) − s̄3+ (n)e∗3+ (n), ||s̄3+ (n)||2 + C (44) where e3+ (n) = ỹIM 3+ (n) denotes the baseband equivalent observation of the PA output at the IM3+ sub-band with the current DPD coefficients. The scaling factor ||s̄3+ (n)||2 + C normalizing the learning step-size µ in (44) is philosophically similar to that of the Normalized Least Mean Square (NLMS) algorithm, in effect making the learning characteristics more robust against the input data dynamics. The proposed coefficient update in (44) is seeking to decorrelate the IM3+ observation and the adopted orthogonalized basis functions. This type of learning algorithm can also be interpreted as a stochastic Newton root search in the (45) T (49) s7+ (n) = [s7+,7 (n) s7+,9 (n) ... s7+,Q (n)]T , T s̄5+ (n) = [s5+ (n) T s̄7+ (n) = [s7+ (n) s5+ (n − 1) T s7+ (n − 1) T (50) T T (51) T T (52) ... s5+ (n − N ) ] , ... s7+ (n − N ) ] . Then, similar to x̃3+ (n) in (43), the baseband equivalents of the IM5+ and IM7+ sub-band DPD injection signals, denoted by x̃5+ (n) and x̃7+ (n), respectively, read x̃5+ (n) = ᾱ5+ (n)H s̄5+ (n), x̃7+ (n) = ᾱ7+ (n)H s̄7+ (n). (53) Thus, the composite baseband equivalent PA input signal when the IM3+, IM5+, and IM7+ sub-band DPDs are all included, reads 5f 3f j2π fIF n s x̃(n) = x(n) + x̃3+ (n)e + x̃5+ (n)e j2π fIF n s 7f + x̃7+ (n)e j2π fIF n s . (54) 8 x1 M Samples L Samples É M is the estimation block size in samples É L is the DPD update interval in samples Estimation Block m Estimation Block m+1 Update DPD Paramters Update DPD Paramters Upsampling and IF upconversion x2 x1 Fig. 4. Block-adaptive DPD learning concept. The DPD parameters estimated in the current estimation block m are applied in the sub-band DPD main path processing during the next block. x2 Then, similar to the IM3+ coefficient update in (44), the higher-order IM5+ and IM7+ coefficient updates read x IM3 + DPD Upsampling and +3xIF upconversion IM3 - DPD Upsampling and -3xIF upconversion IM5 + DPD Upsampling and +5xIF upconversion IM5 - DPD Upsampling and -5xIF upconversion IMP + DPD Upsampling and +PxIF upconversion IMP - DPD Upsampling and -PxIF upconversion x x ”RF” I/Q MOD DAC Error Signal PA Feedback Receiver Sub-band Decorrelating DPD µ ᾱ5+ (n + 1) = ᾱ5+ (n) − s̄5+ (n)e∗5+ (n), ||s̄5+ (n)||2 + C µ s̄7+ (n)e∗7+ (n), ᾱ7+ (n + 1) = ᾱ7+ (n) − ||s̄7+ (n)||2 + C (55) (a) Sub-band DPD Architecture I: Digital IF injection (56) where e5+ (n) = ỹIM 5+ (n) and e7+ (n) = ỹIM 7+ (n) denote the baseband equivalents of the PA output at the IM5+ and IM7+ sub-bands, with the corresponding sub-band DPDs included adopting the current coefficients, ᾱ5+ (n) and ᾱ7+ (n), respectively. From the learning perspective, observing a single IM sub-band at a time is the most obvious alternative, which means that the learning for multiple sub-band DPDs happens one at a time. Furthermore, extending the decorrelation-based learning for the negative IM sub-bands is straight-forward. This can be obtained by interchanging x1 (n) and x2 (n) in the SNL basis functions expressions, and observing the PA output at the corresponding negative IM sub-bands. x1 x2 x1 x2 Upsampling and IF upconversion x x DAC 1 IM3 + DPD DAC 2 Analog +3xIF upconversion IM3 - DPD DAC 3 Analog -3xIF upconversion IM5 + DPD DAC 4 Analog +5xIF upconversion IM5 - DPD DAC 5 Analog -5xIF upconversion IMP + DPD DAC M-1 Analog +PxIF upconversion IMP - DPD DAC M Analog -PxIF upconversion ”RF” I/Q MOD PA Error Signal Feedback Receiver Sub-band Decorrelating DPD C. Block-Adaptive Decorrelation-based Learning As Fig. 3 illustrates, the previous sample-adaptive decorrelation-based learning concept is in principle a closedloop feedback system with nonlinear adaptive processing inside the loop. During the DPD learning phase, and under the potential hardware processing and latency constraints, the DPD parameter convergence and consequently the DPD linearization performance can be affected, especially if the learning loop delay becomes large. Stemming from this, an alternative and new block-adaptive decorrelation-based learning solution is developed next. The proposed block-adaptive learning rule implies defining two distinct blocks in the processing, as illustrated in Fig. 4. A single update cycle of the learning algorithm will utilize M samples whereas the DPD parameter update interval is L samples, with M ≤ L. Thus, by proper choice of M and L, arbitrarily long loop delays can in principle be tolerated, facilitating stable operation under various hardware and software processing latency constraints. Notice that proper timing synchronization between the observation receiver output and the basis functions is, in general, needed, which can be accomplished prior to executing the actual coefficient learning procedure. Now, assuming an estimation block size of M samples and DPD filter memory depth of N per each of the IM3+ orthogonalized basis functions, the following vectors and matrices, (b) Sub-band DPD Architecture II: Analog IF injection Fig. 5. Overall sub-band DPD architecture with multiple IM sub-bands included. Thick lines indicate complex I/Q processing. which stack all the samples and the corresponding DPD filter coefficients within block m, can be defined: s3+ (nm ) = [s3+,3 (nm ) s3+,5 (nm ) ... s3+,Q (nm )]T , T T T s̄3+ (nm ) = [s3+ (nm ) ... s3+ (nm − N ) ] , S3+ (m) = [s̄3+ (nm ) ... s̄3+ (nm + M − 1)], α3+,l (m) = [α3+,3,l (m) α3+,5,l (m) ... α3+,Q,l (m)]T , ᾱ3+ (m) = [α3+,0 (m)T α3+,1 (m)T ... α3+,N (m)T ]T . (57) (58) (59) (60) (61) Here, the index of the first sample of block m is denoted by nm . The block-adaptive IM3+ sub-band DPD coefficient update then reads e3+ (m) = [ỹIM 3+ (nm ) ... ỹIM 3+ (nm + M − 1)]T , (62) µ ᾱ3+ (m + 1) = ᾱ3+ (m) − S3+ (m)e∗3+ (m), ||S3+ (m)||2 + C (63) where e∗3+ (m) refers to the element-wise conjugated error signal vector, while S3+ (m) denotes the filter input data matrix, all within the processing block m. The obtained new 9 TABLE I C OMPARISON OF RUNNING COMPLEXITIES OF NINTH ORDER SUB - BAND AND FULL - BAND DPD S . T WO 1 MH Z CC S WITH 20 MH Z CARRIER SPACING IS ASSUMED . DPD SAMPLE RATE IS 189 MSPS FOR THE FULL - BAND AND 9 MSPS FOR THE SUB - BAND DPD. Basis Function Generation FLOPs DPD Filtering FLOPs Total Number of FLOPs GFLOPS (N1 = 1, N2 = 3) IM3+/- Sub-band 37 32(N1 +1) - 2 32(N1 +1) + 35 0.891 Sub-band DPD IM5+/- Sub-band IM7+/- Sub-band 40 45 24(N1 +1) - 2 16(N1 +1) - 2 24(N1 +1) + 38 16(N1 +1) + 43 0.774 0.675 DPD coefficients ᾱ3+ (m + 1) are then applied on the next block of L samples as illustrated in Fig. 4. While the above presentation describes the block-adaptive learning only at the IM3+ sub-band, extending the principle to higher-order IM sub-bands is straightforward, and thus not explicitly shown. IV. I MPLEMENTATION A SPECTS AND C OMPLEXITY A NALYSIS One of the main advantages of the proposed decorrelationbased sub-band DPD technique is its reduced complexity compared to the classical full-band DPD processing, especially in scenarios where the CCs are widely spaced and thus very high speed ADCs and DACs are required in the classical solutions. In this section, we first address some implementation aspects of the proposed sub-band DPD concept. We then provide a thorough comparison of the computing and hardware complexity perspectives between the full-band and the proposed sub-band DPDs. Finally, some system power efficiency considerations are also presented, with particular focus on low-cost mobile devices. A. Sub-band DPD Implementation Alternatives Fig. 5 shows two alternative architectures of the overall sub-band DPD processing with multiple IM sub-bands. The first architecture shown in Fig. 5(a) adds an upsampling and digital IF upconversion block after each sub-band DPD stage in order to digitally place the generated injection signals at proper intermediate frequencies. After adding the sub-band DPD outputs in the digital domain, a single wideband DAC per I and Q branch is used after which the signal is upconverted to RF and amplified by the PA. The second architecture in Fig. 5(b) adds the outputs of the sub-band DPDs in the analog domain, implying that each sub-band DPD is followed by a narrow-band DAC per I and Q branch, together with an analog complex IF upconversion. A common I/Q RF modulator is then used for all sub-bands prior to the PA module. Both of these two architectures have their own advantages and disadvantages. In particular, if the carrier spacing between the component carriers is not very large, architecture I is likely to be more suitable. On the other hand, when the carrier spacing starts to increase, using a single wideband DAC may not be efficient from cost and power consumption perspectives, so in this case architecture II is likely to be more attractive. However, some extra processing may be required in this architecture in order to achieve proper synchronization between the DACs. This forms an interesting topic for future research. IM9+/- Sub-band 48 8(N1 +1) - 2 8(N1 +1) + 46 0.558 Full-band DPD Full-band 11 40(N2 +1) - 2 40(N2 +1) + 9 31.941 A common advantage of both architectures is that each subband DPD block can be switched on or off according to the prevailing emission levels and limits at the considered subbands. Such flexibility is not available in the classical fullband DPD solutions since, by design, a full-band predistorter always tries to linearize the full composite transmit band. With the sub-band DPD concept, the linearization can be flexibly tailored and optimized to those frequencies which are the most critical from the emission limits perspective. B. Sub-band versus Full-band DPD Running Complexity In general, the computational complexity of any DPD can be classified into three main parts [24]: identification complexity, adaptation complexity and running complexity. The identification part is basically the estimation complexity of the DPD parameters, while the adaptation complexity includes the required processing in order to adapt to new operating conditions or device aging. Finally, the running complexity, which is the most critical especially for mobile-type devices, involves the number of computations done per second while the DPD is operating. In this subsection, we will focus on the DPD running complexity in details, while the DPD parameter identification and feedback receiver complexity perspectives are shortly discussed in section IV-C. For a quantitative comparison of the running complexities, we shall use the number of floating point operations (FLOPs) per sample, the number of DPD coefficients, and the required sample rate in the predistortion path as the main quantitative metrics. In general, the running complexity is divided into two main parts: the first is the basis function generation, and the second is the actual predistortion filtering using the basis functions [24]. The number of FLOPs required to perform these two operations is shown in Table I for ninth-order sub-band and full-band DPDs, respectively, where N1 and N2 are the corresponding memory depths per adopted basis function. The full-band DPD architecture that we use also in our comparative performance simulations in Section V, and which is also widely applied otherwise, is based on the PH architecture with ninth order nonlinearity, while the sub-band DPD is based on architecture II shown in Fig. 5(b). Frequency selectivity of the nonlinear PA is another important factor to be considered when comparing the two DPD architectures. This implies that when memory effects of the PA are considered, substantially longer filters are needed for the full-band DPD compared to the sub-band DPD for a certain performance requirement. In the complexity analysis, in the sub-band DPD case, we thus assume a memory depth of 1 per basis function, 10 while a memory depth of 3 is assumed for the full-band PH DPD per basis function. A substantial reduction in the needed sample rates can be achieved when adopting the sub-band DPD. As a concrete example, if we consider a challenging LTE-A UL scenario of two 1 MHz CCs with 20 MHz carrier spacing, the required sample rate by the full-band DPD is 9×(20+1) = 189M SP S, while for the sub-band DPD it becomes 9 × 1 = 9M SP S. Consequently, as shown in Table I, a huge reduction in the number of FLOPs per second (FLOPS) can be achieved using the sub-band DPD. Furthermore, the processing complexity of the sub-band DPD solution is clearly feasible for modern mobile device processing platforms, in terms of the GFLOPS count, while that of the classical fullband DPD is clearly infeasible. However, in some scenarios, when the carrier spacing between the CCs is decreased and/or the CC bandwidth increases, the benefit from using the sub-band DPD approach is reduced since the sample rates of the sub-band and fullband DPD will become more comparable. Notice also that, e.g., in interband CA cases, one can adopt a concurrent 2DDPD [13], [14] to linearize the main carriers, which can then be easily complemented with the sub-band DPD processing to protect the own receiver if TX filtering does not offer sufficient isolation. Such a scenario could take place, e.g., in uplink Band 1 (1920-1980 MHz) + Band 3 (1710-1785 MHz) interband CA where it is technologically feasible to adopt a single multiband/multimode PA module for amplification. In such scenario, the IM3 sub-band is then directly at the own RX frequencies of Band 1 (2110-2170 MHz). C. Feedback Receiver and Parameter Estimation Complexity In addition to the complexity reduction in the DPD main processing path, the complexity of the feedback or observation receiver, used for DPD parameter estimation and adaptation, is also greatly reduced. In order to estimate, e.g., the parameters of the IM3+ sub-band DPD, we only need to observe the IM3+ sub-band at the PA output, instead of observing the fullband (including all the IM sub-bands) which is the case in the full-band DPD. This reduces the cost, complexity and power consumption in the feedback path allowing use of simpler instrumentation, in particular the ADC. Moreover, only a single observation receiver is required, even if linearizing multiple sub-bands, since the parameter learning and corresponding observation of the PA output can be done sequentially, in a per sub-band manner. Finally, in terms of the parameter estimation algorithmic complexity, the proposed decorrelation based solutions are extremely simple, when compared to any classical full-band DPD related method, such as least-squares based parameter fitting and indirect learning architecture [8] that are commonly adopted. D. Overall Transmitter Power Efficiency Perspectives When a DPD is adopted, a less linear but more efficient PA, that can operate near its saturation region, can generally be used. However, the overall power efficiency of the device is only improved if the extra power consumed by the DPD stage is less than the power savings due to increased PA efficiency. Here, we address this aspect from a mobile device perspective. We consider a practical scenario where the transmit power at the output of the mobile PA is +26 dBm (i.e., 400 mW), stemming from 3GPP LTE-Advanced requirements [2], [5], and assuming that the Tx duplexer filter and connector insertion losses are 3 dB. Then, good examples of practical PA power efficiency figures when operating in highly nonlinear or linear modes are around 35% and 20% (or even less), respectively. This means that the power consumed by the highly nonlinear PA is roughly 1150 mwatt, while the corresponding linear PA consumes roughly 2000 mwatt. In other words, adopting a highly power-efficient nonlinear PA saves 850 mwatt of power in this particular example. Then, in order to suppress the spurious emissions at the PA output, in the nonlinear PA case, we adopt the sub-band DPD solution. In [27], a state of the art 28 nm implementation of the Qualcomm Hexagon DSP capable of supporting up to 4.8 GFLOPS at 1.2 GHz is reported, which is more than enough for carrying out the needed sub-band DPD processing for the IM3 and IM5 sub-bands in our example. In the fullband DPD case, on the other hand, which requires 31.9 GFLOPS as shown in Table I, this is clearly insufficient. The power consumption of the DSP platform in [27] is shown to be approximately 100 mwatt, when running at 840 MHz (i.e., 3.36 GFLOPS assuming 4 FLOPS per cycle), which is again sufficient for linearizing the IM3 and IM5 sub-bands in our example. Thus, adopting the nonlinear PA already saves 850 milliwatt, when it comes to the PA interface, as explained above, while when complemented with the sub-band DPD processing for enhanced linearity, only 100 milliwatt of additional power is consumed. Thus, the overall power budget and power-efficiency are clearly in favor of using a highly nonlinear PA, complemented with the sub-band DPD structure, even in a mobile device with non-contiguous uplink carrier aggregation. Furthermore, if the sub-band DPD processing is implemented using a dedicated hardware solution (e.g., a digital ASIC), an even more power-efficient DPD stage can most likely be realized. V. S IMULATION R ESULTS In this section, a quantitative performance analysis of the proposed sub-band DPD solution is presented using Matlab simulations with practical models for mobile-like PAs designed for low-cost devices. In general, we quantify the suppression of intermodulation power at the IM3 and IM5 sub-bands through the power ratios relative to the component carrier wanted signal power as shown in Fig. 1, which are defined as Pwanted Pwanted , IM 5R = 10 log10 . IM 3R = 10 log10 PIM 3 PIM 5 (64) The inband transmit waveform purity is measured through the error vector magnitude (EVM), which is defined as s Perror EV M% = × 100%. (65) Pref 11 TABLE II C OMPARISON OF IM3+ SUPPRESSION AND EVM OF THIRD - ORDER INVERSE , MMSE AND DECORRELATION - BASED ANALYTICAL SUB - BAND DPD SOLUTIONS AT +23 D B M PA OUTPUT POWER No DPD Third-order Inverse Analytical Decorrelation-based Analytical MMSE Positive IM3R [dBc] 28.8342 41.9230 51.8248 51.8468 EVM [%] 1.9711 1.8912 1.8914 1.8917 20 10 0 -10 -20 Here, Perror is the power of the error signal, while Pref is the reference power of the ideal symbol constellation. The error signal is defined as the difference between the ideal symbol values and the corresponding synchronized and equalized samples at the PA output, both normalized to have identical linear gains. -30 -40 -50 -20 -10 0 10 20 A. Comparison of Analytical IM3 Sub-band DPD Solutions In Section III-A, analytical reference expressions for the third-order inverse, minimum MSE, and decorrelation-based sub-band DPD solutions were presented. In this subsection, we shortly evaluate and compare the performance of these analytical solutions, assuming a third-order memoryless PA and known parameters, and focus only on the positive IM3 sub-band for simplicity. The memoryless PA model has been identified using a true mobile PA, with transmit power of +23dBm. The main objective is to compare the performance of the three analytical solutions in terms of linearization performance, and thereon to verify that the decorrelation based solution is essentially identifcal to the minimum MSE solution. The signal used in this performance evaluation is composed of two 1MHz LTE-A UL SC-FDMA CCs with QPSK data modulation, and the CC spacing is 10MHz. The obtained results shown in Table II demonstrate that the decorrelationbased solution is giving almost the same performance as the minimum MSE solution, and also that both of them are substantially better than the classical third-order inverse solution [16] in terms of the IMD suppression at the considered sub-band. It can also be seen from Table II that the EVM is essentially not affected by the sub-band DPD processing. B. P th -order Inverse vs. Decorrelation-based IM3 Sub-band DPD Solutions Next we evaluate and compare the performance of 5th-order inverse and decorrelation-based IM3 sub-band DPD solutions. The 5th-order inverse reference solution for IM3+ sub-band is derived in Appendix B. In these simulations, the transmit waveform is again composed of two 1 MHz LTE-A UL SCFDMA component carriers with QPSK data modulation, and the CC spacing is 10 MHz. The PA model, in turn, is a memoryless 5th-order model whose parameters have been identified using a true mobile PA transmitting at +23 dBm. The 5th-order inverse DPD is using known parameters, while the decorrelation-based one is adopting the proposed sampleadaptive learning described in detail in Section IV. The PA output spectra with different solutions are illustrated in Fig. 6. It can clearly be seen that the decorrelation-based Fig. 6. Baseband equivalent PA output spectrum at +23 dBm with two 1 MHz LTE-A UL carriers and 10 MHz CC separation using a fifth-order memoryless PA. P th -order inverse and decorrelation-based IM3+ sub-band DPD solutions are compared, with both third-order and fifth-order nonlinear processing. sub-band DPD substantially outperforms the P th -order inverse based sub-band DPD, in both third and fifth-order cases, despite the fact that the P th -order inverse solutions are using known parameters. The reason is that the inverse solutions cancel only the third and fifth order terms, as described in Appendix B, but do not suppress the other induced higher-order terms, which have structural similarity and correlation with the third and fifth-order basis functions. On the other hand, the proposed decorrelation-based solution takes this explicitly into account, and thus achieves clearly better spurious emission suppression. The figure also illustrates that the performance of the fifth-order decorrelation-based sub-band DPD is clearly better than that of the third-order one. In the remaining parts of this section, we shall focus on more detailed performance evaluations of the proposed decorrelation-based sub-band DPD solution, incorporating memory both in the PA and in the predistortion processing. From now on, we refer to the decorrelation-based sub-band DPD simply as ’sub-band DPD’, to simplify the presentation. C. Performance of Proposed Higher-Order Sub-band DPD at IM3, IM5 and IM7 In this subsection, we evaluate the performance of the proposed sub-band DPD in the more realistic case of having memory in the PA. The PA model is a 9th-order parallel Hammerstein model, with four memory taps per branch, and the parameters have been identified using measurements with a true mobile PA transmitting at +24 dBm. The sub-band DPD structure contains now also memory, with two taps (N = 1) per basis function. Block-adaptive learning principle is adopted, with 200 blocks each containing 1000 samples. The transmit waveform is otherwise identical to earlier cases, but the CC separation is now 12 MHz. Fig. 7 shows the effectiveness of the proposed higherorder sub-band DPDs, here processing the IM3+ sub-band, 12 TABLE III C OMPARISON OF QUANTITATIVE RUNNING COMPLEXITY AND LINEARIZATION PERFORMANCE OF FULL - BAND VERSUS SUB - BAND DPD. T WO 1 MH Z LTE-A UL CARRIERS WITH QPSK DATA MODULATION AND 20 MH Z CARRIER SPACING ARE USED . No DPD Full-Band ILA DPD IM3+ Sub-Band DPD IM5+ Sub-Band DPD DPD Coeffs N/A 20 8 6 Running Complexity Fs [MSPS] GFLOPS N/A N/A 189 31.941 9 0.891 9 0.774 EVM [%] 1.2527 0.1058 1.2489 1.2529 Transmitter Performance Positive IM3R [dBc] Positive IM5R [dBc] 35.5744 56.4272 61.9428 63.9842 68.3291 N/A N/A 71.9823 20 20 10 10 0 0 -10 -10 -20 -20 -30 -30 -40 -40 -50 -50 -60 -60 -70 -60 -40 -20 0 20 40 60 Fig. 7. Baseband equivalent PA output spectrum at +24 dBm with two 1 MHz LTE-A UL carriers and 12 MHz CC separation using a ninth-order PA with memory. Different orders of the IM3+ sub-band DPD are compared, with memory depth equal to 1 per DPD SNL basis function. -10 -15 -20 -25 -30 -35 -40 -45 -50 -55 -60 8 10 12 14 16 18 20 22 Fig. 8. IM3 spurious emissions vs. TX power using different orders of the IM3+ sub-band DPD processing, with memory depth equal to 1 per DPD SNL basis function. A ninth-order PA with memory is used, and 2 dB Tx filter insertion loss is assumed. compared to the basic third-order solution presented earlier in [20]. Up to 40 dB suppression for the IM3 spurious emissions is shown when adopting ninth-order processing, something -70 -60 -40 -20 0 Output Power [dBm] +20 +19 +20 +20 20 40 60 Fig. 9. Baseband equivalent of two 1 MHz LTE-A UL carriers with 12 MHz separation using a ninth order PH PA extracted from a real mobile PA at +24 dBm. Ninth order negative IM3, IM5, and IM7 sub-band DPD solutions are shown, with memory depth equal to 1 per DPD SNL basis function. that has not been reported before in any prior works using a practical PA model with memory effects. Fig. 8 shows then how the IM3 spurious emission level changes with varying the TX power and using different sub-band DPD orders. The IM3 spurious emissions are clearly below the general spurious emission limit (-30 dBm/MHz) even at very high TX powers up to +23 dBm, when using a seventh-order, or higher, subband DPD. Another main contribution in this paper is the extension of the IM3 sub-band DPD solution to include also higher-order IM sub-bands. Fig. 9 shows the performance of the negative IM5 and IM7 sub-band DPDs, in addition to the negative IM3 sub-band DPD, when ninth-order nonlinear processing is adopted in the sub-band DPDs. Up to 40 dB, 35 dB, and 18 dB of suppression is achieved at the negative IM3, IM5, and IM7 sub-bands, respectively. This shows the effectiveness of the proposed solutions in processing and suppressing also the spurious emissions at higher IM sub-bands. D. Full-Band versus Sub-band DPD Complexity and Performance Analysis In this subsection, we compare the performance of our proposed sub-band DPD technique against that of a classical full-band DPD adopting parallel Hammerstein based wideband linearization and indirect learning architecture (ILA). The 13 (a) Host-processor based processing: · Generate baseband I/Q samples. · Transfer block of samples to VST for I/Q modulation and RF upconversion. · Extract received block of samples from VST after RF downconversion and I/Q demodulation. · Estimate sub-band DPD parameters using blockadaptive estimation processing and transmit predistorted signal to VST. NI Vector Signal Transceiver VST RF Out Mobile PA Attenuator VST RF In (b) Fig. 10. Hardware setup used in the RF measurements for testing and evaluating the proposed sub-band DPD. evaluation considers the linearization performance, complexity, and transmitter efficiency utilizing our earlier complexity analysis results reported in Section IV. The ninth-order fullband PH ILA DPD uses 100k samples for parameter learning, per ILA iteration, with a total of 2 ILA iterations, and the number of memory taps per PH branch is 4. The ninth-order block-adpative sub-band DPD, in turn, uses also a total of 200k samples with block size M = 1000, and adopts two memory taps per DPD SNL basis function. The results are collected in Table III, which shows that in addition to the significantly lower complexity measured by the number of GFLOPS, the sub-band DPD achieves better linearization performance in terms of spurious IMD suppression at the considered IM3 and IM5 sub-bands. On the other hand, the full-band DPD outperforms the sub-band DPD in terms of the inband distortion mitigation (i.e., EVM). This is expected, since the full-band DPD linearizes the whole transmit band, including the main CCs and the IMD spurious emissions. However, the EVM with the sub-band DPD is only around 1.25% which is by far sufficient for modulations at least up to 64-QAM. Additionally, the full-band DPD based on the ILA structure requires an additional 1 to 2 dB back off to guarantee stable operation, which is not required in the sub-band DPD. Thus the transmitter becomes more power efficient when using the sub-band DPD as shown in Table III. For fairness, it is to be acknowledged that a full-band DPD can typically enhance the EVM and ACLR, while the subband DPD concept is specifically targeting only the spurious emissions. VI. RF M EASUREMENT R ESULTS In order to further demonstrate the operation of the proposed sub-band DPD solution, we next report results of comprehensive RF measurements using a commercial LTEAdvanced mobile terminal PA together with a vector signal transceiver (VST), which is implementing the RF modulation and demodulation. The actual sub-band DPD processing and parameter learning algorithms are running on a host processor. The ACPM-5002-TR1 mobile power amplifier used in our measurements is designed for LTE-A UL band 25 (18501915 MHz), with 29 dB gain. The National Instruments (NI) PXIe-5645R VST includes both a vector signal generator (VSG), and a vector signal analyzer (VSA) with 80 MHz instantaneous bandwidth. In these experiments, the digital baseband waveform is divided into 50 blocks of size M = 10k samples which are first generated locally on the host processor, and then transferred to the VSG to perform RF I/Q modulation at the desired power level at the PA input. The VST RF output is then connected to the input port of the external power amplifier, whose output port is connected to the VST RF input through a 40 dB attenuator, implementing the observation receiver as illustrated also in Fig. 10. The VSA performs RF I/Q demodulation to bring the signal back to baseband. The baseband I/Q observation block is then filtered to select the IM3 sub-band which is used for block-based sub-band DPD learning, after proper alignment with the locally generated basis functions, as explained in Section III-C. The sub-band DPD block size M used in these experiments is 10k, and the DPD memory depth N is 1. In general, two different intra-band LTE-A CA RF measurement examples are demonstrated in this subsection. The first experiment demonstrates the violation of the spurious emission limit due to the inband emission of the IM3+ spur, thus not being attenuated by the TX filter. The second experiment demonstrates an own RX desensitization example, in FDD transceiver context, where the IM3+ spur is located at the own RX band (1930-1995 MHz) and is not sufficiently attenuated by the duplexer TX filter. Notice that in principle, when tackling specifically the own RX desensitization problem with the proposed sub-band DPD solution, the main receiver of 14 A. Spurious Emission Limit Violation 20 10 0 Tx Band -10 -20 Spur Limit -30 -40 -50 1810 1830 1850 1870 1890 1910 Fig. 11. An LTE-A band 25 RF measurement example at the UE PA output showing the gain from using an IM3+ sub-band DPD. IM3 spur reduction with third, fifth, seventh, and ninth-order sub-band DPDs are demonstrated, using a real commercial mobile PA operating at +25 dBm. An LTE-A UL CA signal with two 3 MHz CCs and 20 MHz carrier spacing is used. 20 10 0 Tx Band -10 Rx Band -20 -30 -40 -50 1835 1855 1875 1895 1915 1935 Fig. 12. An LTE-A band 25 RF measurement example at the UE PA output showing the gain from using a ninth-order IM3+ sub-band DPD when the IM3+ is falling at own RX band. An LTE-A UL CA signal with two 5 MHz CCs and 40 MHz carrier spacing is used with a real commercial mobile PA operating at +25 dBm. the FDD device could potentially be used as the observation receiver (i.e., learning the sub-band DPD coefficients without an extra auxiliary/observation receiver). However, such an approach would indeed be applicable only in the own RX desensitization case, while when mitigating other harmful emissions, an auxiliary observation receiver would anyway have to be adopted. Thus, in these RF measurements, we adopt the auxiliary receiver based approach, while consider further developments of the main receiver based parameter learning as an important topic for our future work. Fig. 11 shows the measured power spectral density at the PA output using the IM3 sub-band DPD with different orders. The adopted waveform is an intra-band CA LTE-A UL signal with 3 MHz per CC and 20 MHz carrier spacing. The power level at the PA output in this example is +25 dBm. The intermodulation distortion at the IM3+ sub-band is emitted inband, since the total TX band covers 1850-1915 MHz, and is clearly violating the spurious emission limit (-30 dBm/MHz) when no DPD is used. When using the sub-band DPD, the spurious emission level is well below the emission limit, given that at least 5th-order processing is deployed. In general, more than 20 dB of measured spurious emission suppression is achieved with the ninth order IM3 sub-band DPD, thus giving more than 10 dB additional gain compared to the basic thirdorder sub-band DPD as shown in Fig. 11. Notice that there is no need for predistorting the IM3- sub-band in this example, since those emissions will be filtered out by the TX filter. B. Own Receiver Desensitization Fig. 12 illustrates another LTE-A intra-band CA UL band 25 example, now with 5 MHz CC bandwidths and 40 MHz carrier spacing. The duplexing distance at LTE-A band 25 is only 80 MHz, thus the IM3+ spur at 1935 MHz in this example is falling on the own RX band, and therefore potentially desensitizing the own receiver. The power level at the PA output in this example is +25 dBm. Then, by adopting a ninth-order IM3+ sub-band DPD, more than 20 dB of spurious emission suppression is achieved, as can be seen in Fig. 12. Again, two taps (N = 1) per basis function are used, and block-adaptive parameter learning is deployed. Fig. 13 shows the real-time convergence of the sub-band DPD coefficients for the third, fifth, seventh, and ninth-order basis functions, respectively. It can be seen that the coefficients converge in a stable manner in a real RF environment due to the orthogonalization of the SNL basis functions, as explained in Section III-B. In general, assuming a UE duplexer TX filter with 65 dB attenuation at the own RX band (e.g., ACMD-6125 Band 25 LTE-A UE Duplexer), the integrated power of the IM3+ spur at the RX band without DPD will be approximately -73 dBm/5MHz. This is 25 dB above the effective RX noise floor when assuming 9 dB UE RX noise figure (NF) [28]. This would thus cause significant own receiver desensitization that could lead to a complete blocking of the desired RX signal. On the other hand, when the proposed IM3+ sub-band DPD is deployed, the integrated power of the IM3+ spur at the RX band will be approximately -95 dBm/5MHz, which is only 3 dB above the effective RX noise floor, as shown also in Fig. 14. Though the residual spur is still slightly above the effective RX noise floor, the sensitivity degradation is substantially relaxed, despite operating at a maximum PA output power of +25 dBm. We elaborate on this further in Fig. 14, showing the integrated power of the IM3+ spur at the RX LNA input while changing the PA output power level. With a ninth order subband DPD, we can transmit up to +18 dBm PA output power with an effectively perfectly linear TX, in terms of IM3+ spur 15 15 10 5 0 1 2 3 4 5 Fig. 13. Convergence of the ninth-order sub-band DPD coefficients, with memory depth N = 1 per basis function, when the positive IM3 sub-band is considered and block-adaptive learning is deployed. An RF measurement example with two 5 MHz LTE-A UL CCs and 40 MHz carrier spacing is used with a real commercial mobile PA operating at +25 dBm. methods were also formulated, allowing efficient estimation and tracking with low computational complexity. All algorithm derivations and modeling were carried out in the general case of having memory in the PA as well as in the sub-band DPD processing. Different nonlinear distortion and processing orders, beyond classical third-order cases, were also reported. The proposed technique can find application in suppressing inband spurs which would violate the spurious emission limit, suppressing out-of-band spurs falling, e.g., on the own receiver band, or in protecting primary user transmissions in cognitive radio systems. A quantitative complexity analysis was presented, comparing the proposed solution to conventional full-band DPD solutions available in the literature. The performance was evaluated in a comprehensive manner, showing excellent linearization performance despite the considerably reduced complexity compared to classical full-band solutions. Finally, extensive RF measurement results using a commercial LTE-Advanced mobile power amplifier were reported, evidencing up to 22 dB suppression of the most problematic third-order spurious emissions. A PPENDIX A: A NALYTICAL MMSE S OLUTION FOR T HIRD -O RDER IM3 S UB - BAND DPD Here, we derive the analytical minimum mean-square error solution shown in (32), which is used as a reference solution in simulations in Section V-A. We first define the so-called error signal as e(n) = ỹIM 3+ (n), since with ideal predistortion the IM3+ sub-band signal would be zero, and thus the optimization means minimizing the power of this error signal. From (30), the error signal reads e(n) = (f3 + f1 α)u(n) + 2f3 α(|x1 (n)|2 + |x2 (n)|2 )u(n) + f3 |α|2 α|x1 (n)|4 |x2 (n)|2 u(n), Fig. 14. Integrated IM3+ sub-band power at own RX LNA input over 5 MHz vs. PA output power using ninth order IM3+ sub-band DPD processing, with memory depth equal to 1 per DPD SNL basis function. A commercial mobile PA operating at LTE band 25 is used in the RF measurements, and 65 dB duplexer TX filter attenuation [?] is assumed at the RX band. level, compared to +10 dBm PA output power without DPD. Additionally, with DPD, the integrated IM3+ power is less than the effective RX noise floor up to +23 dBm PA output power, while without DPD it is already 20 dB above the noise floor at the same power level. VII. C ONCLUSIONS In this article, a novel low-complexity sub-band digital predistortion (DPD) solution was proposed for suppressing unwanted spurious emissions in non-contiguous spectrum access. Novel decorrelation based adaptive parameter learning (66) where f1 and f3 are the third-order memoryless PA model parameters, α denotes the DPD coefficient to be optimized, and x1 (n) and x2 (n) are the baseband equivalents of the two component carriers. The statistical expectation IE[|e(n)|2 ] = IE[e(n)e∗ (n)], assuming that the component carrier signals x1 (n) and x2 (n) are statistically independent, and ignoring some high-order vanishingly small terms, then reads   IE[e(n)e∗ (n)] = IE42 |f3 |2 + |f1 |2 |α|2 + αf1 f3∗ + α∗ f1∗ f3   + (2IE62 + 2IE44 ) |f3 |2 (α + α∗ ) + |α|2 (f1 f3∗ + f1∗ f3 ) + (4IE46 + 8IE64 + 4IE82 )|f3 |2 |α|2 , (67) where IEij is used as a shorthand notation for IE[|x1 |i ]IE[|x2 |j ]. Now, differentiating (67) with respect to α, yields   ∂ IE[e(n)e∗ (n)] = IE42 α∗ |f1 |2 + f1 f3∗ ∂α   + (2IE62 + 2IE44 ) |f3 |2 + α∗ (f1 f3∗ + f1∗ f3 ) + (4IE46 + 8IE64 + 4IE82 )|f3 |2 α∗ . (68) Then, setting (68) to zero and solving for α yields the optimal MMSE DPD parameter, given by 16 α3,inv = − αM M SE = ∗ − f1 f3∗ IE42 + 2|f3 |2 (IE62 + IE44 ) , [|f1 |2 IE42 + 4R(f1 f3∗ )(IE62 + IE44 ) + 4|f3 |2 (IE46 + 2IE64 + IE82 )]∗ (69)  where R(.) denotes the real-part operator. This concludes the proof. A PPENDIX B: A NALYTICAL F IFTH -O RDER I NVERSE BASED IM3 S UB - BAND DPD S OLUTION Here, we derive the 5th order inverse solution for the IM3+ sub-band DPD, to be used as a reference solution in the simulations in Section V-B. The output of a memoryless 5th order polynomial PA model is y(n) = f1 x(n) + f3 |x(n)|2 x(n) + f5 |x(n)|4 x(n), (70) where f1 , f3 and f5 are the polynomial coefficients, and x(n) is the composite baseband equivalent input signal, as given in (1). Through direct substitution of (1) in (70), the baseband equivalent IM3+ distortion term, located at three times the IF frequency, can be extracted and reads yIM 3+ (n) = f3 (x∗2 (n)x21 (n)) + 2f5 |x1 (n)|2 (x∗2 (n)x21 (n)) + 3f5 |x2 (n)|2 (x∗2 (n)x21 (n)). (71) Stemming from the signal structure in (71), the sub-band DPD injection signal is composed of three basis functions of the form x∗2 (n)x21 (n), |x1 (n)|2 x∗2 (n)x21 (n) and |x2 (n)|2 x∗2 (n)x21 (n). In case of fifth-order inverse based subband DPD, these basis functions are multiplied by proper coefficients such that all the distortion terms at the IM3+ subband at the PA output, up to order five, are cancelled. Thus, incorporating such DPD processing, yet with arbitrary coefficients, the composite baseband equivalent PA input signal reads f j2π fIF n x̃(n) = x1 (n)e s f −j2π fIF n + x2 (n)e 3f j2π fIF s + α3,inv (x∗2 (n)x21 (n))e s n 3f + α51,inv |x1 (n)|2 (x∗2 (n)x21 (n))e j2π fIF n s + α52,inv |x2 (n)|2 (x∗2 (n)x21 (n))e j2π fIF n s , (72) 3f where the subscript inv in the coefficients is emphasizing the P th -order inverse based solution. Substituting (72) in (70), and extracting the third and fifth order IM3+ terms, yields ỹ IM 3+ (n) = (f1 α3,inv + f3 )x∗2 (n)x21 (n) + (f1 α51,inv + 2f3 α3,inv + 2f5 )|x1 (n)|2 (x∗2 (n)x21 (n)) (73) + (f1 α52,inv + 2f3 α3,inv + 3f5 )|x2 (n)|2 (x∗2 (n)x21 (n)). From (73), we now can easily obtain the fifth-order inverse coefficients that null the third and fifth-order terms, yielding α51,inv = 2 f3 , f1 f5 f5 f32 f2 − 2 , α52,inv = 2 32 − 3 . 2 f1 f1 f1 f1 This concludes the derivation. R EFERENCES [1] S. Parkvall, A. Furuskar, and E. Dahlman, “Evolution of LTE toward IMT-advanced,” IEEE Commun. Mag., vol. 49, no. 2, pp. 84–91, February 2011. [2] LTE Evolved Universal Terrestrial Radio Access (E-UTRA) User Equipment (UE) radio transmission and reception, 3GPP TS 36.101 V12.4.0 (Release 12), June 2014. [3] S.A. Bassam, W. Chen, M. Helaoui, and F.M. Ghannouchi, “Transmitter architecture for CA: Carrier Aggregation in LTE-Advanced systems,” IEEE Microw. Mag., vol. 14, no. 5, pp. 78–86, July 2013. [4] C. Park, L. Sundström, A. Wallen, and A. Khayrallah, “Carrier aggregation for LTE-advanced: Design challenges of terminals,” IEEE Commun. Mag., vol. 51, no. 12, pp. 76–84, Dec. 2013. [5] R4-121205, “Way forward for non-contiguous intraband transmitter aspects.”, 3GPP Tech. Rep., Feb. 2013. [6] R4-124353, “Non-contiguous intraband unwanted emission.”, 3GPP Tech. Rep., Feb. 2013. [7] H. Gandhi, D. Greenstreet, and J. Quintal, “Digital Radio Front-End strategies provide game-changing benefits for small cell base stations,” Tech. Rep., Texas Instruments, May 2013. [8] L. Guan and A. Zhu, “Green communications: Digital predistortion for wideband RF power amplifiers,” IEEE Microw. Mag., vol. 15, no. 7, pp. 84–89, Dec. 2014. [9] R4-123797, “UE reference sensitivity requirements with two UL carriers.,” 3GPP Tech. Rep., Feb. 2013. [10] International Telecommunication Union Radio Communication Sector, Recommendation ITU-R SM.329-12 Unwanted emissions in the spurious domain.. [11] Chao Yu, Wenhui Cao, Yan Guo, and A. Zhu, “Digital Compensation for Transmitter Leakage in Non-Contiguous Carrier Aggregation Applications With FPGA Implementation,” IEEE Trans. Microw. Theory Techn., vol. 63, no. 12, pp. 4306–4318, Dec 2015. [12] A. Kiayani, M. Abdelaziz, L. Anttila, V. Lehtinen, and M. Valkama, “Digital Mitigation of Transmitter-Induced Receiver Desensitization in Carrier Aggregation FDD Transceivers,” IEEE Trans. Microw. Theory Techn., vol. 63, no. 11, pp. 3608–3623, Nov 2015. [13] S.A. Bassam, F.M. Ghannouchi, and M. Helaoui, “2-D Digital Predistortion (2-D-DPD) architecture for concurrent dual-band transmitters,” IEEE Trans. Microw. Theory Techn., vol. 59, no. 10, pp. 2547–2553, Oct. 2011. [14] P. Roblin, C. Quindroit, N. Naraharisetti, S. Gheitanchi, and M. Fitton, “Concurrent linearization,” IEEE Microw. Mag., vol. 14, no. 7, pp. 75– 91, Nov. 2013. [15] Y. Liu, J. Yan, and P. Asbeck, “Concurrent dual-band digital predistortion with a single feedback loop,” IEEE Trans. Microw. Theory Techn., vol. 63, no. 5, pp. 1556–1568, May 2015. [16] P. Roblin, S. K. Myoung, D. Chaillot, Y. G. Kim, A. Fathimulla, J. Strahler, and S. Bibyk, “Frequency-selective predistortion linearization of RF power amplifiers,” IEEE Trans. Microw. Theory Techn., vol. 56, no. 1, pp. 65–76, Jan. 2008. [17] J. Kim, P. Roblin, D. Chaillot, and Z. Xie, “A generalized architecture for the frequency-selective digital predistortion linearization technique,” IEEE Trans. Microw. Theory Techn., vol. 61, no. 1, pp. 596–605, Jan. 2013. [18] S.A. Bassam, M. Helaoui, and F.M. Ghannouchi, “Channel-selective multi-cell digital predistorter for multi-carrier transmitters,” IEEE Trans. Microw. Theory Techn., vol. 60, no. 8, pp. 2344–2352, Aug. 2012. [19] M. Abdelaziz, L. Anttila, A. Mohammadi, F. Ghannouchi, and M. Valkama, “Reduced-complexity power amplifier linearization for carrier aggregation mobile transceivers,” in IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 3908–3912, May 2014. [20] M. Abdelaziz, L. Anttila, J.R. Cavallaro, S. Bhattacharyya, A. Mohammadi, F.M. Ghannouchi, M. Juntti, and M. Valkama, “Low-complexity digital predistortion for reducing power amplifier spurious emissions in spectrally-agile flexible radio,” in 9th International Conference on Cognitive Radio Oriented Wireless Networks, pp. 323–328, June 2014. 17 [21] M. Abdelaziz, C. Tarver, K. Li, L. Anttila, R. Martinez, M. Valkama, J. R. Cavallaro, “Sub-band digital predistortion for noncontiguous transmissions: Algorithm development and real-time prototype implementation,” in 49th Asilomar Conference on Signals, Systems and Computers, pp. 1180–1186, Nov. 2015. [22] M. Abdelaziz, Z. Fu, L. Anttila, A. M. Wyglinski and M. Valkama, “Digital predistortion for mitigating spurious emissions in spectrally agile radios,” IEEE Commun. Mag., vol. 54, no. 3, pp. 60–69, March 2016. [23] Z. Fu, L. Anttila, M. Abdelaziz, M. Valkama, and A. M. Wyglinski, “Frequency-Selective Digital Predistortion for Unwanted Emission Reduction,” IEEE Trans. Commun., vol. 63, no. 1, pp. 254–267, Jan. 2015. [24] A.S. Tehrani, H. Cao, S. Afsardoost, T. Eriksson, M. Isaksson, and C. Fager, “A comparative analysis of the complexity/accuracy tradeoff in power amplifier behavioral models,” IEEE Trans. Microw. Theory Techn., vol. 58, no. 6, pp. 1510–1520, June 2010. [25] H. Qian, S. Yao, H. Huang, and W. Feng, “A low-complexity digital predistortion algorithm for power amplier linearization,” IEEE Trans. Broadcast., vol. 60, no. 4, pp. 670–678, Dec. 2014. [26] W. Hoffmann, “Iterative algorithms for Gram Schmidt orthogonalization,” Computing, vol. 41, no. 4, pp. 335–348, 1989. [27] M. Saint-Laurent et al., “A 28 nm DSP powered by an on-chip LDO for high-performance and energy-efficient mobile applications,” IEEE J. Solid-State Circuits, vol. 50, no. 1, pp. 81–91, Jan 2015. [28] LTE Evolved Universal Terrestrial Radio Access (E-UTRA) RF system scenarios, 3GPP TR 36.942 V10.2.0 (Release 10), May 2011. Mahmoud Abdelaziz (S’13) received the B.Sc. degree (with honors) and M.Sc. degree in Electronics and Electrical Communications Engineering from Cairo University, Egypt, in 2006 and 2011. He is currently pursuing the Doctoral degree at Tampere University of Technology, Finland where he works as a researcher with the Department of Electronics and Communications. From 2007 to 2012 he has been working as a communication systems and signal processing engineer at Newport Media, as well as other companies in the wireless industry. His research interests include statistical and adaptive signal processing in flexible radio transceivers, wideband digital pre-distortion, and cognitive radio systems. Lauri Anttila (S’06, M’11) received the M.Sc. degree and D.Sc. (Tech) degree (with honors) in electrical engineering from Tampere University of Technology (TUT), Tampere, Finland, in 2004 and 2011. Currently, he is a Senior Research Fellow at the Department of Electronics and Communications Engineering at TUT. His research interests are in signal processing for wireless communications, in particular radio implementation challenges in 5G cellular radio and full-duplex radio, flexible duplexing techniques, and transmitter and receiver linearization. He has co-authored over 60 peer reviewed articles in these areas, as well as two book chapters. Chance Tarver received a B.S. degree in electrical engineering from Louisiana Tech University, Ruston, LA, in 2014, and his M.S. degree in electrical and computer engineering in 2016 from Rice University, Houston, TX. He is currently a Ph.D. student in the Department of Electrical and Computer Engineering at Rice University. His research interests include software defined radio and signal processing for wireless communications. Kaipeng Li (S’14) received his B.S. degree in physics from Nanjing University, Nanjing, China, in 2013, and his M.S. degree in electrical and computer engineering from Rice University in 2015. He is currently a Ph.D. candidate in the Department of Electrical and Computer Engineering at Rice University, Houston, Texas. His research interests include digital signal processing, parallel computing on GPGPU and multicore CPU, software-defined radios and massive MIMO systems. Joseph R. Cavallaro (S’78, M’82, SM’05, F’15) received the B.S. degree from the University of Pennsylvania, Philadelphia, PA, in 1981, the M.S. degree from Princeton University, Princeton, NJ, in 1982, and the Ph.D. degree from Cornell University, Ithaca, NY, in 1988, all in electrical engineering. From 1981 to 1983, he was with AT&T Bell Laboratories, Holmdel, NJ. In 1988, he joined the faculty of Rice University, Houston, TX, where he is currently a Professor of electrical and computer engineering. His research interests include computer arithmetic, and DSP, GPU, FPGA, and VLSI architectures for applications in wireless communications. During the 1996-1997 academic year, he served at the National Science Foundation as Director of the Prototyping Tools and Methodology Program. He was a Nokia Foundation Fellow and a Visiting Professor at the University of Oulu, Finland in 2005 and continues his affiliation there as an Adjunct Professor. He is currently the Director of the Center for Multimedia Communication at Rice University. He is a Fellow of the IEEE and a Member of the IEEE SPS TC on Design and Implementation of Signal Processing Systems and the Chair-Elect of the IEEE CAS TC on Circuits and Systems for Communications. He is currently an Associate Editor of the IEEE Transactions on Signal Processing, the IEEE Signal Processing Letters, and the Journal of Signal Processing Systems. He was Co-chair of the 2004 Signal Processing for Communications Symposium at the IEEE Global Communications Conference and General/Program Co-chair of the 2003, 2004, and 2011 IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP), General/Program Co-chair for the 2012, 2014 ACM/IEEE GLSVLSI, Finance Chair for the 2013 IEEE GlobalSIP conference, and TPC Co-Chair of the 2016 IEEE SiPS workshop. He was a member of the IEEE CAS Society Board of Governors during 2014. Mikko Valkama (S’00, M’01, SM’15) was born in Pirkkala, Finland, on November 27, 1975. He received the M.Sc. and Ph.D. Degrees (both with honors) in electrical engineering (EE) from Tampere University of Technology (TUT), Finland, in 2000 and 2001, respectively. In 2002, he received the Best Ph.D. Thesis -award by the Finnish Academy of Science and Letters for his dissertation entitled ”Advanced I/Q signal processing for wideband receivers: Models and algorithms”. In 2003, he was working as a visiting researcher with the Communications Systems and Signal Processing Institute at SDSU, San Diego, CA. Currently, he is a Full Professor and Department Vice-Head at the Department of Electronics and Communications Engineering at TUT, Finland. His general research interests include communications signal processing, estimation and detection techniques, signal processing algorithms for software defined flexible radios, cognitive radio, full-duplex radio, radio localization, 5G mobile cellular radio, digital transmission techniques such as different variants of multicarrier modulation methods and OFDM, and radio resource management for ad-hoc and mobile networks.
3cs.SY
Characteristic Matrices and Trellis Reduction for Tail-Biting Convolutional Codes Masato Tajima, Senior Member, IEEE arXiv:1705.03982v2 [cs.IT] 23 May 2017 Abstract Basic properties of a characteristic matrix for a tail-biting convolutional code are investigated. A tail-biting convolutional code can be regarded as a linear block code. Since the corresponding scalar generator matrix Gtb has a kind of cyclic structure, an associated characteristic matrix also has a cyclic structure, from which basic properties of a characteristic matrix are obtained. Next, using the derived results, we discuss the possibility of trellis reduction for a given tail-biting convolutional code. There are cases where we can find a scalar generator matrix G′ equivalent to Gtb based on a characteristic matrix. In this case, if the polynomial generator matrix corresponding to G′ has been reduced, or can be reduced by using appropriate transformations, then trellis reduction for the original tail-biting convolutional code is realized. In many cases, the polynomial generator matrix corresponding to G′ has a monomial factor in some column and is reduced by dividing the column by the factor. Note that this transformation corresponds to cyclically shifting the associated code subsequence (a tail-biting path is regarded as a code sequence) to the left. Thus if we allow partial cyclic shifts of a tail-biting path, then trellis reduction is accomplished. Index Terms Tail-biting convolutional codes, tail-biting trellis, characteristic matrix, cyclic shift, trellis reduction. M. Tajima was with the graduate School of Science and Engineering, University of Toyama, 3190 Gofuku, Toyama 930-8555, Japan (e-mail: [email protected]). Manuscript received April 19, 2005; revised August 26, 2015. This paper was presented in part at the IEICE Technical Committee IT Conference in March 2017. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Characteristic Matrices and Trellis Reduction for Tail-Biting Convolutional Codes I. I NTRODUCTION From the 1980s to 1990s, trellis representations of linear block codes were studied with a great interest [2], [7], [8], [14], [17], [18], [19]. Subsequently, tail-biting trellises of linear block codes have received much attention. Given a linear block code, there exists a unique minimal conventional trellis. This trellis simultaneously minimizes all measures of trellis complexity. However, tail-biting trellises do not have such a property. That is, minimality of tail-biting trellises depends on the measure being used [13]. In general, the complexity of a tail-biting trellis may be much lower than that of the minimal conventional trellis. There have been many contributions to the subject, including [3], [4], [9], [10], [11], [13], [15], [20], [22], [32]. The works [3], [13] had a strong influence on the subsequent studies. A remarkable progress has been made by Koetter and Vardy in their paper [13]. They showed that for a k-dimensional linear block code of length n with full support, there exists a list of n characteristic generators (i.e., a characteristic matrix [13]) from which all minimal tail-biting minimal trellises can be obtained. A different method of producing tail-biting trellises was proposed by Nori and Shankar [20]. They used the Bahl-CockeJelinek-Raviv (BCJR) construction [2]. These works were further investigated by Gluesing-Luerssen and Weaver [9], [10]. In particular, noting that a characteristic matrix for a given code is not necessarily unique, they have refined and generalized the previous works. More recent works [4], [11] provide further research on the subject. On the other hand, tail-biting convolutional codes were proposed by Ma and Wolf in 1986 [16] (tail-biting representations of block codes were introduced by Solomon and van Tilborg [24]). Tail-biting (abbreviated TB) is a technique by which a convolutional code can be used to construct a block code without any loss of rate. In connection with the subject, there have been also many works, including [1], [16], [23], [25], [28], [33]. Since a TB convolutional code is identified with a linear block code, the results on TB trellises for linear block codes can be used. In particular, we can think of a characteristic matrix of a given TB convolutional code. In this paper, we first investigate a characteristic matrix for a TB convolutional code. And then, based on the derived results, we discuss the possibility of trellis reduction for a given TB convolutional code. An outline of the rest of the paper is as follows: In Section II, we review the basic notions needed for this paper. In Section III, we investigate the basic properties of a characteristic matrix for a TB convolutional code. When a TB convolutional code with generator matrix G(D) is regarded as a linear block code C, a (scalar) generator matrix (denoted by Gtb ) for C is constructed using the coefficients which appear in the polynomial expansion of G(D). We see that Gtb has a kind of cyclic structure. Then it is shown that the (characteristic) span list associated with a characteristic matrix for C consists of some basic spans and their right cyclic shifts, from which basic properties of a characteristic matrix are derived. In Section IV, we deal with transformations of G(D) and discuss the relationship between these transformations and the corresponding scalar generator matrices Gtb ’s. We see that dividing a column of G(D) by a monomial factor corresponds to cyclically shifting a column subsequence of Gtb to the left, whereas multiplying a column of G(D) by a monomial corresponds to cyclically shifting a column subsequence of Gtb to the right. These properties are essentially used for trellis reduction to be discussed in Section V. In Section V, we discuss the possibility of trellis reduction for a given TB convolutional code (we identify the code with an (n, k) block code C). As is stated above, we can think of a characteristic matrix for C. Consider the case where some k characteristic generators, which consist of some basic generators and their right cyclic shifts, can generate the same code C. We see that these characteristic generators form a (scalar) generator matrix associated with a (polynomial) generator matrix of another convolutional code. In this case, if the constraint length of the obtained generator matrix is smaller than that of the original one, then trellis reduction is realized. Even if this kind of reduction is not possible, there are cases where a newly obtained generator matrix contains a monomial factor in some column. Then there is a possibility that the generator matrix is reduced by sweeping the monomial factor out of the column. Note that this operation corresponds to cyclically shifting the corresponding code subsequence to the left. In this way, trellis reduction can be accomplished. We also present a trellis reduction method for high rate codes which uses a reciprocal dual encoder. We remark that the (trellis) section length is an important parameter and the proposed method is restricted to TB convolutional codes with short to moderate section length. We give an upper bound for the section length by evaluating the span lengths of characteristic generators. Finally, conclusions are provided in Section VI. II. P RELIMINARIES We begin with the basic notions needed in this paper, where the underlying field is assumed to be F = GF(2). Let C be an △ (n, k) linear block code, where the set of indices for a codeword in C is denoted by I = {0, 1, · · · , n − 1}. Then a codeword x ∈ C is expressed as x = (x0 , x1 , · · · , xn−1 ). I is also regarded as the time axis for TB trellises for C. Since TB trellises JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2 for C are considered in this paper, it is convenient to identify I with Zn , the ring of integers modulo n. Hence, when dealing with TB trellises, all index arithmetic will be implicitly performed modulo n [13]. The notion of span is fundamental in trellis theory. Given a codeword x ∈ C, a span of x, denoted by [x], is a semiopen interval (a, b] ∈ I such that the corresponding closed interval [a, b] contains all the nonzero positions of x [13]. Due to the cyclic structure of the time axis I, we adopt the following interpretation of intervals [9], [10], [13]. For a, b ∈ I, we define  △ {a, a + 1, · · · , b}, if a ≤ b [a, b] = (1) {a, a + 1, · · · , n − 1, 0, 1, · · · , b}, if a > b △ and (a, b] = [a, b]\{a}. We call the intervals (a, b] and [a, b] conventional if a ≤ b and circular otherwise. In connection with the construction of minimal TB trellises for C, Koetter and Vardy [13] introduced the notion of characteristic generator for C. Denote by σj (·) a cyclic shift to the left by j positions [13]. Similarly, denote by ρj (·) a △ cyclic shift to the right by j positions. Let Xj∗ be a basis in minimal-span form [17] for the code Cj = σj (C). A characteristic generator for C is a pair consisting of a codeword x = (x0 , x1 , · · · , xn−1 ) ∈ C and a span [x] = (a, b] such that xa , xb are nonzero. The set of all the characteristic generators for C is given by △ ∗ ). X = X0∗ ∪ ρ1 (X1∗ ) ∪ · · · ∪ ρn−1 (Xn−1 (2) Here we have an understanding that if x∗ ∈ Xj∗ , then [ρj (x∗ )] = (a + j, b + j], where [x∗ ] = (a, b]. Assume that C has a full support. Then a characteristic matrix for C is the n × n matrix having the elements of X as its rows. The above definition implies that when we refer to a characteristic matrix, the associated spans are taken into account. Here note that a basis in minimal-span form is not necessarily unique. Hence, X may not be uniquely determined. On the other hand, the set of spans (denoted by T ) accompanied by X is, up to ordering, uniquely determined by the code C [9], [10], [13]. T is called the characteristic span list of C (an element∈ T is called a characteristic span of C) [9], [10]. In order to clarify this fact, Gluesing-Luerssen and Weaver introduced the notion of characteristic pair (X, T ) of C [9, Definition III.8], where X is a generating set of C and T represents the associated spans. In this paper, we basically follow the definition of Gluesing-Luerssen and Weaver, but in order to emphasize the fact that a characteristic matrix inherently assumes the associated spans, we leave the term characteristic matrix for the definition. Thus we define as follows (cf. [9, Definition III.8]). Definition 2.1: Let C be an (n, k) linear block code with support I. A characteristic matrix for C with (characteristic) span list T is defined to be a pair (X, T ), where   x1  x2   (3) X =  ···  xn T = {(al , bl ] : l = 1, 2, · · · , n} (4) have the properties: 1) {x1 , · · · , xn } generates C. 2) (al , bl ] is a span of xl , l = 1, · · · , n. 3) a1 , · · · , an are distinct and b1 , · · · , bn are distinct. 4) For all j ∈ I, there exist exactly n − k row indices, l1 , · · · , ln−k , such that j ∈ (ali , bli ] for i = 1, · · · , n − k. Remark: Property 3) is derived from [13, Lemma 5.7] and the related remarks. Also, Property 4) is derived from the proof of [13, Theorem 5.10]. In the following, when there is no danger of confusion, we shall use the terms characteristic matrix X and characteristic matrix X with span list T interchangeably. III. C HARACTERISTIC M ATRICES FOR A TAIL -B ITING C ONVOLUTIONAL C ODE Let G(D) be a polynomial generator matrix of size k0 × n0 . Denote by H(D) a corresponding polynomial check matrix. Both G(D) and H(D) are assumed to be canonical [18]. Consider a standard trellis of N sections for a convolutional code defined by G(D). Here max(L, M ) + 1 ≤ N is assumed, where L and M are the memory lengths of G(D) and H(D), respectively. The TB condition is a restriction that the encoder starts and ends in the same state. That is, only those paths in the trellis that start and end in the same state are admissible. We call such paths TB paths. Let C be the set of all TB paths. In the following, we call C a TB convolutional code of section length N defined by G(D) (cf. Fig.1 in Section V). When there is no danger of confusion, we will omit the phrase of section length N . C can be regarded as a linear block code B tb of length n = n0 N . To simplify the notations, B tb is identified with C and is denoted simply by C. Let G(D) = G0 + G1 D + · · · + GL DL (5) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 3 be the polynomial expansion of G(D), where Gi (0 ≤ i ≤ L) are k0 × n0 matrices. Then the scalar generator matrix for C (= B tb ) is given by   G0 G1 ... GL−1 GL   G0 ... ... GL−1 GL     ... ... ... ... ...     △ G G ... ... G 0 1 L  tb  (6) GN =   G G G ... G 0 1 L−1   L  GL−1 GL G0 ... ...     ... ... ... ... G1  G1 G2 ... GL G0 with size k × n = k0 N × n0 N [12]. Hence, we can say that a TB convolutional code C is generated by Gtb N . In the following, we call Gtb the tail-biting generator matrix (abbreviated TBGM) associated with a TB convolutional code C defined by G(D), N or simply the TBGM associated with G(D). A. Computation of Characteristic Matrices Koetter and Vardy [13] have given an algorithm which can compute a characteristic matrix for a linear block code. Consider tb tb tb a TB convolutional code C generated by Gtb N . Note that σn0 (GN ) is equivalent to GN . That is, GN has a periodic structure of period n0 . Using this property, a characteristic matrix X for C can be computed efficiently. △ ∗ Let Cj = σj (C). Cj is the code generated by σj (Gtb N ). Let Xj be a basis in minimal-span form for the code Cj . Then a characteristic matrix X for C is defined as follows [13]: X △ = X0∗ ∪ ρ1 (X1∗ ) ∪ · · · ∪ ρn0 −1 (Xn∗0 −1 ) ∗ ) ∪ρn0 (Xn∗0 ) ∪ ρn0 +1 (Xn∗0 +1 ) ∪ · · · ∪ ρ2n0 −1 (X2n 0 −1 ··· ∗ ∗ ∗ ∪ρ(N −1)n0 (X(N −1)n0 ) ∪ ρ(N −1)n0 +1 (X(N −1)n0 +1 ) ∪ · · · ∪ ρN n0 −1 (XN n0 −1 ). (7) tb Since σn0 (Gtb N ) is equivalent to GN , we have ρn0 (Xn∗0 ) = ρn0 +1 (Xn∗0 +1 ) = ∗ ρ2n0 −1 (X2n ) = 0 −1 where ρn0 (X0∗ ) ρn0 (ρ1 (X1∗ )) = ρn0 (X̃1∗ ) ··· ρn0 (ρn0 −1 (Xn∗0 −1 )) = ρn0 (X̃n∗0 −1 ),  △  X̃1∗ = ρ1 (X1∗ )    ∗△ X̃2 = ρ2 (X2∗ )  ···    ∗ △ X̃n0 −1 = ρn0 −1 (Xn∗0 −1 ). Similarly, we have ∗ ) ρ2n0 (X2n 0 = ρ2n0 (X0∗ ) ∗ ρ2n0 +1 (X2n ) 0 +1 = ρ2n0 (ρ1 (X1∗ )) = ρ2n0 (X̃1∗ ) ∗ ρ3n0 −1 (X3n ) 0 −1 ··· = ρ2n0 (ρn0 −1 (Xn∗0 −1 )) = ρ2n0 (X̃n∗0 −1 ). In general, for i = 1, · · · , N − 1, we have ∗ ) ρin0 (Xin 0 ∗ ρin0 +1 (Xin ) 0 +1 ∗ ρ(i+1)n0 −1 (X(i+1)n ) 0 −1 = ρin0 (X0∗ ) = ρin0 (X̃1∗ ) ··· = ρin0 (X̃n∗0 −1 ). (8) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 4 Hence, X = X0∗ ∪ ρ1 (X1∗ ) ∪ · · · ∪ ρn0 −1 (Xn∗0 −1 ) ∪ρn0 (X0∗ ) ∪ ρn0 (X̃1∗ ) ∪ · · · ∪ ρn0 (X̃n∗0 −1 ) ··· ∪ρ(N −1)n0 (X0∗ ) ∪ ρ(N −1)n0 (X̃1∗ ) ∪ · · · ∪ ρ(N −1)n0 (X̃n∗0 −1 ) is obtained. Thus we have shown the following. Proposition 3.1: A characteristic matrix X for a TB convolutional code C generated by Gtb N is given by X = X0∗ ∪ ρ1 (X1∗ ) ∪ · · · ∪ ρn0 −1 (Xn∗0 −1 ) ∪ρn0 (X0∗ ) ∪ ρn0 (X̃1∗ ) ∪ · · · ∪ ρn0 (X̃n∗0 −1 ) ··· ∪ρ(N −1)n0 (X0∗ ) ∪ ρ(N −1)n0 (X̃1∗ ) ∪ · · · ∪ ρ(N −1)n0 (X̃n∗0 −1 ). (9) Corollary 3.1: If the relation X0∗ ∪ ρ1 (X1∗ ) ∪ · · · ∪ ρn0 −1 (Xn∗0 −1 ) ⊆ X0∗ ∪ ρn0 (X0∗ ) (10) holds, then a characteristic matrix X is given by X = X0∗ ∪ ρn0 (X0∗ ) ∪ ρ2n0 (X0∗ ) ∪ · · · ∪ ρ(N −1)n0 (X0∗ ). (11) Proof: From the assumption, we have ρn0 (X0∗ ) ∪ ρn0 (X̃1∗ ) ∪ · · · ∪ ρn0 (X̃n∗0 −1 ) ⊆ ρn0 (X0∗ ) ∪ ρ2n0 (X0∗ ). Similarly, we have ⊆ ρ2n0 (X0∗ ) ∪ ρ3n0 (X0∗ ) ··· ρ2n0 (X0∗ ) ∪ ρ2n0 (X̃1∗ ) ∪ · · · ∪ ρ2n0 (X̃n∗0 −1 ) ρ(N −1)n0 (X0∗ ) ∪ ρ(N −1)n0 (X̃1∗ ) ∪ · · · ∪ ρ(N −1)n0 (X̃n∗0 −1 ) ⊆ = ρ(N −1)n0 (X0∗ ) ∪ ρN n0 (X0∗ ) ρ(N −1)n0 (X0∗ ) ∪ X0∗ . Then, from Proposition 3.1, it follows that X = X0∗ ∪ ρn0 (X0∗ ) ∪ ρ2n0 (X0∗ ) ∪ · · · ∪ ρ(N −1)n0 (X0∗ ). We remark that in many practical applications, a characteristic matrix for a TB convolutional code is obtained based on the above corollary. Example 1: Consider the TB convolutional code of section length N = 3 defined by G(D) = = △ = (1 + D, D, 1 + D) (1, 0, 1) + (1, 1, 1)D (12) G0 + G1 D. (13) The associated TBGM is given by Gtb 3 = = In this case, we have   G0 G1  0 G0 G1 0  1 0 1  0 0 0 1 1 1 1 0 X0∗ =  0 0 0 1  1 0 X̃1∗ =  0 0 0 1  0 G1  G0 1 1 0 1 1 0 1 0 0 0 1 1 1 0 0 1 1 0 1 1 0 1 1 0 0 1 0 0 1 1 1 0 0 1 1 0 1 1 0 1 1 0 0 1 0 0 1 1  0 0 1 1 . 0 1  0 (0, 5] 1  (3, 8] 0 (1, 7]  0 (2, 0] 1  (3, 8] 0 (1, 7] (14) (15) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015  1 X̃2∗ =  0 0 0 0 1 5 1 1 0 1 0 0 1 0 1 1 1 0 By applying ρ3 and ρ6 to these matrices, a characteristic matrix X  1 0 1 1 1 1  0 1 0 0 1 0   1 0 1 1 1 1   0 0 0 1 0 1  X=  0 1 0 0 1 0  0 0 0 1 0 1   1 1 1 0 0 0   0 1 0 0 1 0 1 1 1 0 0 0 0 0 1 1 0 1  0 (2, 0] 1  (3, 8] 0 (4, 1]. is obtained as follows:  (0, 5] 0 0 0 0 1 0   (1, 7] 0 0 0   (2, 0] 1 1 1   (3, 8] 0 1 0   (4, 1] 1 1 1   (5, 3] 1 0 1   (6, 2] 0 1 0  (7, 4] (8, 6]. 1 0 1 (16) (17) Note that the spans (0, 5], (1, 7], (2, 0], (3, 8], (4, 1] are connected with X0∗ ∪ ρ1 (X1∗ ) ∪ ρ2 (X2∗ ), whereas the spans (0, 5], (1, 7], (3, 8], (4, 1], (6, 2] are connected with X0∗ ∪ ρ3 (X0∗ ). Hence, X0∗ ∪ ρ1 (X1∗ ) ∪ ρ2 (X2∗ ) * X0∗ ∪ ρ3 (X0∗ ). We see that a characteristic matrix X cannot be obtained simply by applying ρ3 and ρ6 to X0∗ . B. Structure of the Characteristic Span List Let (X, T ), where  x1  x2   X =  ···  xn   (a1 , b1 ]  (a2 , b2 ]  , T =   ··· (an , bn ]  be a characteristic matrix for C with span list T , then (σ1 (X), σ1 (T )) is a characteristic matrix for σ1 (C) with span list σ1 (T ) [9, Remark III.9 (b)], where   σ1 (x1 ) △  σ1 (x2 )   (18) σ1 (X) =   ···  σ1 (xn )   (a1 − 1, b1 − 1] △  (a2 − 1, b2 − 1]  . (19) σ1 (T ) =    ··· (an − 1, bn − 1] Using repeatedly this relation, we see that (σj (X), σj (T )) is a characteristic matrix for σj (C) with span list σj (T ). Consider tb tb a TB convolutional code C generated by Gtb N and set j to n0 . Since σn0 (GN ) is equivalent to GN , σn0 (C) = C holds. Thus we have the following. Lemma 3.1: Let C be a TB convolutional code generated by Gtb N . If (X, T ) is a characteristic matrix for C with span list T , then (σn0 (X), σn0 (T )) is also a characteristic matrix for C with span list σn0 (T ). Let T = {(al , bl ] : l = 1, 2, · · · , n}. (20) σn0 (T ) = {(al − n0 , bl − n0 ] : l = 1, 2, · · · , n}. (21) Then σn0 (T ) is given by Since the characteristic span list is uniquely determined, T and σn0 (T ) coincide up to ordering. Proposition 3.2: The characteristic span list T of a TB convolutional code C generated by Gtb N consists of the set of basic spans    (0, b0 ]  △ (1, b1 ] (22) T0 = ···    (n0 − 1, bn0 −1 ] JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 6 and ρin0 (T0 ) (i = 1, 2, · · · , N − 1). Proof: Suppose that the spans in T are sorted such that T = {(l, bl ] : l = 0, 1, · · · , n − 1}. Then we have σn0 (T ) = {(l − n0 , bl − n0 ] : l = 0, 1, · · · , n − 1}. Here take notice of the following set of spans in T :  (n0 , bn0 ]    (n0 + 1, bn0 +1 ] ···    (2n0 − 1, b2n0 −1 ]. In σn0 (T ), it is transformed to  (0, bn0 − n0 ]    (1, bn0 +1 − n0 ] ···    (n0 − 1, b2n0 −1 − n0 ]. Since T and σn0 (T ) coincide up to ordering,    (0, bn0 − n0 ] = (0, b0 ]  (1, bn0 +1 − n0 ] = (1, b1 ] · ··    (n0 − 1, b2n0 −1 − n0 ] = (n0 − 1, bn0 −1 ] holds. Hence, we have  b n = b 0 + n0    0 bn0 +1 = b1 + n0  ···   b2n0 −1 = bn0 −1 + n0 . Similarly, the set of spans  (2n0 , b2n0 ]    (2n0 + 1, b2n0 +1 ]  ···   (3n0 − 1, b3n0 −1 ] is transformed to Then for the same reason, holds. Hence, we have  (n0 , b2n0 − n0 ] = (n0 , bn0 ]    (n0 + 1, b2n0 +1 − n0 ] = (n0 + 1, bn0 +1 ]  ···   (2n0 − 1, b3n0 −1 − n0 ] = (2n0 − 1, b2n0 −1 ] Continuing the same argument, we have for i = 1, · · · , N − 1.  (n0 , b2n0 − n0 ]    (n0 + 1, b2n0 +1 − n0 ] · ··    (2n0 − 1, b3n0 −1 − n0 ].  b2n0 = bn0 + n0 = b0 + 2n0    b2n0 +1 = bn0 +1 + n0 = b1 + 2n0 ···    b3n0 −1 = b2n0 −1 + n0 = bn0 −1 + 2n0 .  bin0 = b0 + in0    bin0 +1 = b1 + in0 ···    b(i+1)n0 −1 = bn0 −1 + in0 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 7 Example 2: Consider the TB convolutional code of section length N = 3 defined by the rate R = 2/3 encoder   1+D D 1+D G(D) = D 1 1     1 0 1 1 1 1 = + D 0 1 1 1 0 0 △ = G0 + G1 D. Using the associated TBGM, i.e.,  G0  0 Gtb 3 = G1 a charactreristic matrix X is computed as follows:  1 0  0 1   0 0   0 0  X=  0 0  0 0   1 1   1 0 0 0 0 1 1 0 0 0 0 0 1 1 1 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 0 (23) (24)  0 G1  , G0 G1 G0 0 0 0 1 0 1 1 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 1 0 1 1 We see that the characteristic span list T consists of the set of basic spans   (0, 4] T0 = (1, 3]  (2, 5]               (0, (1, (2, (3, (4, (5, (6, (7, (8, 4] 3] 5] 7] 6] 8] 1] 0] 2]. (25) (26) and its right cyclic shifts by 3 and 6 positions. C. Counting Characteristic Matrices Recall the definition of a characteristic matrix X for a given code C, i.e., △ ∗ X = X0∗ ∪ ρ1 (X1∗ ) ∪ · · · ∪ ρn−1 (Xn−1 ), where Xj∗ is a basis in minimal-span form for the code Cj = σj (C). Note that Xj∗ is not necessarily unique. Hence, X is not uniquely determined [9]. With respect to this subject, Weaver [32] discussed the relationship between the characteristic span list of C and the number of characteristic matrices for C. Let T = {(al , bl ] : l = 1, 2, · · · , n} be the characteristic span list of C. Define the set Θl as follows [32]: △ Θl = {r : (ar , br ] ( (al , bl ]}. (27) |Θl | represents the number of spans (in T ) included in a specified span (al , bl ]. Weaver [32] proved the following. Lemma 3.2 (Weaver [32]): Let (al , bl ] be a characteristic span of C. Then there exist 2|Θl | characteristic generators for C having this span. This fact is derived from the next observation: Let (ar , br ] ( (al , bl ] and consider two characteristic generators xr and xl with spans (ar , br ] and (al , bl ], respectively. Then xl + xr is also a characteristic generator with span (al , bl ]. Consider a TB convolutional code C generated by Gtb N . We have already shown that the characteristic span list T of C consists of the set of basic spans  (0, b0 ]    (1, b1 ] T0 = ···    (n0 − 1, bn0 −1 ] and ρin0 (T0 ) (i = 1, 2, · · · , N − 1). Hence, it suffices to consider the spans in T0 for the purpose of counting the number of characteristic matrices. Define Θi (1 ≤ i ≤ n0 ) as follows:  △  Θ1 = {r : (ar , br ] ( (0, b0 ]}    △ Θ2 = {r : (ar , br ] ( (1, b1 ]} (28)  ···    △ Θn0 = {r : (ar , br ] ( (n0 − 1, bn0 −1 ]}. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 Also, let 8 △ θi = |Θi | (i = 1, 2, · · · , n0 ) △ θ = θ1 + θ2 + · · · + θn0 . (29) (30) Then we have the following: θ • There exist 2 1 characteristic generators having span (0, b0 ]. θ • There exist 2 2 characteristic generators having span (1, b1 ]. ··· θ • There exist 2 n0 characteristic generators having span (n0 − 1, bn0 −1 ]. As a result, the degree of freedom related to the spans in T0 is given by 2θ1 × 2θ2 × · · · × 2θn0 = 2θ1 +θ2 +···+θn0 = 2θ . (31) Since this degree of freedom is common to other (N − 1) blocks of spans in T , the overall degree of freedom related to T becomes (2θ )N = 2θN . (32) Thus we have shown the following. Proposition 3.3: Let C be a TB convolutional code generated by Gtb N . Let θi (1 ≤ i ≤ n0 ) and θ be as above. Then there exist 2θN characteristic matrices for C. Example 2 (Continued): Take notice of the first three rows of the characteristic matrix X. We have   Θ1 = {2} Θ2 = φ  Θ3 = φ. Hence, θ = 1 + 0 + 0 = 1 and there exist 21×3 = 8 characteristic matrices. D. Span Lengths of Characteristic Generators Let [x] = (a, b] be a span of a codeword x. Then the span length of x is defined by |[a, b]|, i.e., the number of elements in the closed interval [a, b]. When a span alone is referred to without specifying the accompanied codeword, we use the term the span length of a span (a, b]. Let T be the characteristic span list of a TB convolutional code C generated by Gtb N . Suppose that the spans in T are sorted such that T = {(l, bl ] : l = 0, 1, · · · , n − 1}. Then by [13, Theorem 5.10], |(0, b0 ]| + |(1, b1 ]| + · · · + |(n − 1, bn−1 ]| = n(n − k) (33) holds. Due to the structure of T (see Proposition 3.2), the left-hand side of the above equality becomes N (|(0, b0 ]| + |(1, b1 ]| + · · · + |(n0 − 1, bn0 −1 ]|) = N ((ℓ1 − 1) + (ℓ2 − 1) + · · · + (ℓn0 − 1)) = N ((ℓ1 + ℓ2 + · · · + ℓn0 ) − n0 ) = N (ℓ − n0 ), where  △  ℓ1 = |[0, b0 ]|    △ ℓ2 = |[1, b1 ]|  ···    △ ℓn0 = |[n0 − 1, bn0 −1 ]| △ ℓ = ℓ1 + ℓ2 + · · · + ℓn0 . In the derivation, we also used the relation ℓi = |[i − 1, bi−1 ]| = |(i − 1, bi−1 ]| + 1 (i = 1, 2, · · · , n0 ). (34) (35) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 9 Replacing n and k by n0 N and k0 N , respectively, the above equality reduces to N (ℓ − n0 ) = ℓ − n0 = ℓ = n0 N (n0 N − k0 N ) n0 ((n0 − k0 )N ) n0 ((n0 − k0 )N + 1). Thus we have shown the following. Proposition 3.4: Let T be the characteristic span list of a TB convolutional code C generated by Gtb N . Denote by T0 the set of basic spans in T . Then the sum ℓ of span lengths of spans in T0 is given by ℓ = n0 ((n0 − k0 )N + 1). Example 2 (Continued): We have (36)   ℓ1 = |[0, 4]| = 5 ℓ2 = |[1, 3]| = 3  ℓ3 = |[2, 5]| = 4 ℓ = ℓ1 + ℓ2 + ℓ3 = 5 + 3 + 4 = 12. Also, we have n0 ((n0 − k0 )N + 1) = 3((3 − 2) × 3 + 1) = 12. IV. T RANSFORMATIONS OF G(D) AND THE C ORRESPONDING TBGM’ S In this section, we discuss the relationship between transformations of a generator matrix G(D) and the corresponding TBGM’s (Gtb N ’s). We consider the following transformations of G(D): a) Dividing the jth column by Dp . b) Multiplying the jth column by Dq . c) Adding the ith row multiplied by Dq to the jth row. d) Implicit transformations. In the next section, we will see that these transformations play an essential role in trellis reduction for TB convolutional codes. A. Dividing a Column of G(D) by Dp Suppose that the jth column of G(D) has a monomial factor Dp (1 ≤ p ≤ L). We that j = 1 and p = 1. Hence, G(D) has the form  ′ g1,1 (D)D g1,2 (D) . . . g1,n0 (D) ′  g2,1 (D)D g2,2 (D) . . . g2,n0 (D) G(D) =   ... ... ... ... gk′ 0 ,1 (D)D gk0 ,2 (D) . . . gk0 ,n0 (D) can assume without loss of generality   .  (37) Let G(D)   (1) (1) (0) (0) (0) g1,1 g1,2 g1,1 g1,2 . . . g1,n0   (1)  (0) (1) (0) (0) g2,2 . . . g2,n0   g2,1 g2,2  g =  2,1 +  ... ... ... ... ...   ... (1) (1) (0) (0) (0) gk0 ,1 gk0 ,2 gk0 ,1 gk0 ,2 . . . gk0 ,n0   (2) (2) (2) g1,1 g1,2 . . . g1,n0   (2) (2) (2) g2,2 . . . g2,n0  2  g +  2,1 D + ···  ... ... ... ...  (2) (2) (2) gk0 ,1 gk0 ,2 . . . gk0 ,n0   (L) (L) (L) g1,1 g1,2 . . . g1,n0  (L) (L) (L)  g2,2 . . . g2,n0  L  g +  2,1 D ... ... ...   ... (L) (L) (L) gk0 ,1 gk0 ,2 . . . gk0 ,n0  △ = G0 + G1 D + · · · + GL−1 DL−1 + GL DL (1) . . . g1,n0 (1) . . . g2,n0 ... ... (1) . . . gk0 ,n0    D  (38) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 10 be the polynomial expansion of G(D). Comparing the (i, 1) (1 ≤ i ≤ k0 ) entries, we have  (L) (2) (1) (0) ′  g1,1 (D)D = g1,1 + g1,1 D + g1,1 D2 + · · · + g1,1 DL    ′ (0) (1) (2) (L) g2,1 (D)D = g2,1 + g2,1 D + g2,1 D2 + · · · + g2,1 DL  ···    ′ (0) (1) (2) (L) gk0 ,1 (D)D = gk0 ,1 + gk0 ,1 D + gk0 ,1 D2 + · · · + gk0 ,1 DL . By these equations, we have  (0)  g1,1 = 0    (0) g2,1 = 0  · ··    (0) gk0 ,1 = 0  (1) (2) (L) ′  g1,1 (D) = g1,1 + g1,1 D + · · · + g1,1 DL−1 + 0 · DL    ′ (1) (2) (L) g2,1 (D) = g2,1 + g2,1 D + · · · + g2,1 DL−1 + 0 · DL  ···    ′ (1) (2) (L) gk0 ,1 (D) = gk0 ,1 + gk0 ,1 D + · · · + gk0 ,1 DL−1 + 0 · DL . (39) (40) Dividing the first column of G(D) by D, let the resulting matrix be G′ (D). Then G′ (D) has the polynomial expansion:   ′ g1,1 (D) g1,2 (D) . . . g1,n0 (D) ′  g2,1 (D) g2,2 (D) . . . g2,n0 (D)   (41) G′ (D) =    ... ... ... ... ′ gk0 ,1 (D) gk0 ,2 (D) . . . gk0 ,n0 (D)    (2)  (1) (1) (1) (0) (0) g1,1 g1,2 . . . g1,n0 g1,1 g1,2 . . . g1,n0    (2)  (1) (1) (1) (0) (0) g2,2 . . . g2,n0   g2,1 g2,2 . . . g2,n0   g =  2,1 D + ... ... ...  ... ... ...   ...  ... (2) (1) (1) (1) (0) (0) gk0 ,1 gk0 ,2 . . . gk0 ,n0 gk ,1 gk ,2 . . . gk0 ,n0   0 (3) 0 (2) (2) g1,1 g1,2 . . . g1,n0   (3) (2) (2)  g g2,2 . . . g2,n0  2 +  2,1 D + ···  ... ... ... ...  (3) (2) (2) gk0 ,1 gk0 ,2 . . . gk0 ,n0     (L) (L) (L) (L−1) (L−1) 0 g1,2 . . . g1,n0 g1,1 g1,2 . . . g1,n0    (L) (L) (L) (L−1) (L−1)   g g2,2 . . . g2,n0  L−1  0 g2,2 . . . g2,n0  L + +  2,1 D D  ... ... ...  ... ...  ... ... ...  (L) (L) (L) (L−1) (L−1) 0 gk0 ,2 . . . gk0 ,n0 gk0 ,1 gk0 ,2 . . . gk0 ,n0 △ = G′0 + G′1 D + · · · + G′L−1 DL−1 + G′L DL . Consider the TBGM associated with G′ (D), denoted by G′tb N , where  ′  ′ G0 G1 ... G′L−1 G′L   G′0 ... ... G′L−1 G′L     ... ... ... ... ...   ′ ′ ′   G0 G1 ... ... GL  ′tb  GN =  ′ . G′0 G′1 ... G′L−1  L  G  ′ ′  G′  G0 ... ...   L−1 GL ′  ... ... ... ... G1  ′ ′ ′ G′0 G1 G2 ... GL (42) (43) ′tb Note that both Gtb N and GN can be regarded as matrices having N blocks of n0 columns. Then in view of the entries of ′ Gi (0 ≤ i ≤ L) and the relation  (0)   g1,1 = 0   (0) g2,1 = 0  ···    (0) gk0 ,1 = 0, JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 11 tb G′tb N is obtained from GN by cyclically shifting the first column of each block to the left by n0 positions. Thus we have the following. Proposition 4.1: Regard Gtb N as a matrix having N blocks of n0 columns. Suppose that the jth column of G(D) has a monomial factor Dp (1 ≤ p ≤ L). Then dividing the jth column of G(D) by Dp is equivalent to cyclically shifting the jth column of each block of Gtb N to the left by pn0 positions. Let C be a TB convolutional code of section length N defined by G(D). Note that each codeword in C consists of N blocks of n0 components. Here let us cyclically shift the jth component of each block to the left by pn0 positions. Denote tb by C ′ the set of resulting (modified) codewords. We have already shown that G′tb N is obtained from GN by cyclically shifting ′ ′tb the jth column of each block to the left by pn0 positions. Hence, C is generated by GN . In words, C ′ is represented as a TB convolutional code defined by G′ (D). B. Multiplying a Column of G(D) by Dq Consider multiplication of the jth column of G(D) by Dq , where q + L + 1 ≤ N . In the following, we assume without loss of generality that j = 1Cq = 1 (L + 2 ≤ N ). Hence, the resulting matrix G′ (D) has the form   g1,1 (D)D g1,2 (D) . . . g1,n0 (D)  g2,1 (D)D g2,2 (D) . . . g2,n0 (D)   (44) G′ (D) =    ... ... ... ... gk0 ,1 (D)D gk0 ,2 (D) . . . gk0 ,n0 (D)   ′ g1,1 (D) g1,2 (D) . . . g1,n0 (D) ′ g2,2 (D) . . . g2,n0 (D)  △  g2,1 (D) . (45) =    ... ... ... ... ′ gk0 ,1 (D) gk0 ,2 (D) . . . gk0 ,n0 (D) Then we have ′ g1,1 (D) = g1,1 (D)D = (g1,1 + g1,1 D + · · · + g1,1 DL )D (0) (0) (1) (1) (L) (L−1) = g1,1 D + g1,1 D2 + · · · + g1,1 ··· gk′ 0 ,1 (D) (L) DL + g1,1 DL+1 = gk0 ,1 (D)D = (gk0 ,1 + gk0 ,1 D + · · · + gk0 ,1 DL )D = gk0 ,1 D + gk0 ,1 D2 + · · · + gk0 ,1 DL + gk0 ,1 DL+1 . (0) (0) (1) (L) (1) (L−1) (L) Accordingly, the polynomial expansion of G′ (D) becomes   (0)  (1) (1) (0) (0) g1,1 g1,2 . . . g1,n0 0 g1,2 . . . g1,n0   (0)  (1) (1) (0) (0)  0 g2,2 . . . g2,n0   g2,1 g2,2 . . . g2,n0 G′ (D) =  +  ... ... ... ... ... ... ...   ... (0) (1) (1) (0) (0) gk0 ,1 gk0 ,2 . . . gk0 ,n0 0 gk0 ,2 . . . gk0 ,n0   (1) (2) (2) g1,1 g1,2 . . . g1,n0   (1) (2) (2)  g g2,2 . . . g2,n0  2 +  2,1 D + ···  ... ... ... ...  (1) (2) (2) gk0 ,1 gk0 ,2 . . . gk0 ,n0   (L)  (L−1) (L) (L) 0 ... g1,1 g1,2 . . . g1,n0 g1,1   (L)  (L−1) (L) (L) 0 ... g2,2 . . . g2,n0  L  g2,1  g +  2,1 D +   ... ... ...  ... ... ... ...  (L) (L−1) (L) (L) gk0 ,1 0 . . . gk0 ,1 gk0 ,2 . . . gk0 ,n0 △ = (46) G′0 + G′1 D + · · · + G′L DL + G′L+1 DL+1 . (47)    D  0 0 ... 0    L+1 D  (48) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 12 Consider the TBGM associated with G′ (D), denoted by G′tb N , where  ′  ′ ′ ′ ′ G0 G1 ... GL−1 GL GL+1 ′ ′ ′   G′0 ... ... GL−1 GL GL+1     ... ... ... ... ... ...   ′ ′ ′ ′  G0 G1 ... ... GL GL+1    ′  ′ G′0 G′1 ... ... GL  . G′tb N =  GL+1   G′ G′ G′0 G′1 ... G′L−1  L+1  ′L  ′ ′ G G′0 ... ...   L−1 GL GL+1   ... ... ... ... ... G′1  G′1 G′2 ... G′L G′L+1 G′0 (49) ′tb ′ Note that Gtb N and GN consist of N blocks of n0 columns as above. In view of the entries of Gi (0 ≤ i ≤ L + 1), we see ′tb tb that GN is obtained from GN by cyclically shifting the first column of each block to the right by n0 positions. Thus we have the following. Proposition 4.2: Regard Gtb N as a matrix having N blocks of n0 columns. Suppose that q + L + 1 ≤ N . Then multiplying the jth column of G(D) by Dq is equivalent to cyclically shifting the jth column of each block of Gtb N to the right by qn0 positions. Remark: In order for G′tb N to be defined, the condition q + L + 1 ≤ N is required. Let C be a TB convolutional code of section length N with generator matrix G(D). Let C ′ be as in the previous section. In this case, however, the jth component of each block is cyclically shifted to the right by qn0 positions. We have shown ′ tb that G′tb N is obtained from GN by cyclically shifting the jth column of each block to the right by qn0 positions. Hence, C is ′tb ′ ′ generated by GN . In words, C is represented as a TB convolutional code defined by G (D). C. gj (D) ← gj (D) + Dq gi (D) Consider addition of the ith row gi (D) multiplied by Dq to the jth row gj (D), denoted by gj (D) ← gj (D) + Dq gi (D), where q + L + 1 ≤ N . In the following, we assume without loss of generality that i = 1 and j = 2. Let the first row of G(D) be g1 (D) = (g1,1 (D), g1,2 (D), · · · , g1,n0 (D)). Also, let g1 (D) = (0) (0) (L−1) +(g1,1 △ = (1) (0) (1) (1) (g1,1 , g1,2 , · · · , g1,n0 ) + (g1,1 , g1,2 , · · · , g1,n0 )D + · · · (L−1) , g1,2 (L−1) (L) (L) (L) , · · · , g1,n0 )DL−1 + (g1,1 , g1,2 , · · · , g1,n0 )DL g0 + g1 D + · · · + gL−1 DL−1 + gL DL be the polynomial expansion, where the size of gi (0 ≤ i ≤ L) is 1 × n0 . Then the polynomial expansion of g1 (D)Dq becomes g1 (D)Dq = g0 Dq + g1 Dq+1 + · · · + gL−1 DL+q−1 + gL DL+q . Note that the first row of Gtb N is expressed as   g0 , g1 , · · · , gL−1 , gL , 0, · · · , 0 . | {z } N Hence, its right cyclic shift by qn0 positions, i.e.,  q  L+1 z }| { z }| { 0, · · · , 0, g0 , g1 , · · · , gL−1 , gL , 0, · · · , 0 | {z } N q coincides with the (qk0 + 1)th row of Gtb N . That is, g2 (D) ← g2 (D) + D g1 (D) tb row to the second row within the matrix GN . Note that this is an elementary row corresponds to addition of the (qk0 + 1)th operation. Thus we have the following. Proposition 4.3: Suppose that q + L + 1 ≤ N . Consider the operation gj (D) ← gj (D) + Dq gi (D). Let the resulting matrix ′tb tb be G′ (D) and the associated TBGM be G′tb N . Then GN is equivalent to GN . Taking into consideration Proposition 4.3, let us introduce a useful notion. Let C and C ′ be TB convolutional codes of section length N defined by G(D) and G′ (D), respectively. Denote by L and L′ the memory lengths of G(D) and G′ (D), ′tb ′ respectively, where max(L, L′ ) + 1 ≤ N . Let Gtb N and GN be the TBGM’s associated with C and C , respectively. We see tb ′tb ′ that if GN and GN are equivalent, then C = C . All of this leads to the following definition. ′tb ′ Definition 4.1: When Gtb N and GN are equivalent, we say that G(D) and G (D) are “TB-equivalent”. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 13 Thus we have the following. Proposition 4.4: If G(D) and G′ (D) are TB-equivalent, then a TB convolutional code defined by G(D) is represented as a TB convolutional code defined by G′ (D), and vice versa. Proof: A direct consequence of the definition of TB-equivalent. V. T RELLIS R EDUCTION FOR TB C ONVOLUTIONAL C ODES In this section, we will show that for a TB convolutional code of short to moderate section length, the associated TB trellis can be reduced. We begin with an example. A. An Example of Trellis Reduction (00) t=0 00 t=1 00 11 t=2 00 11 t=3 00 11 t=4 00 11 t=5 11 (01) 10 10 01 11 11 11 00 01 10 01 11 00 01 10 10 01 11 00 01 (11) 10 01 00 (10) 10 01 00 01 10 01 10 10 Fig. 1. The tail-biting convolutional code defined by G(D) = (1 + D + D 2 , 1 + D 2 ) (N = 5). Consider the TB convolutional code C defined by G(D) = (1 + D + D2 , 1 + D2 ), where the section length N is set to 5. The corresponding TB trellis is shown in Fig.1, where the paths which start and end in the same state are TB paths (i.e., valid codewords). Then C is the set of all TB paths. Since G(D) has the polynomial expansion G(D) = (1, 1) + (1, 0)D + (1, 1)D2 (50) △ G0 + G1 D + G2 D2 , (51) = the TBGM associated with C is given by Gtb 5    =       =    Based on Gtb 5 , a characteristic matrix X for C is  1 1  0 1   0 0   0 0   0 0 X=  1 0   1 1   0 0   1 0 0 1 G0 0 0 G2 G1 1 0 0 1 1 G1 G0 0 0 G2 1 1 0 1 0 0 1 0 0 1 G2 G1 G0 0 0 0 1 0 0 1  0 0 G2 0   G1 G2   G0 G1  0 G0  1 1 0 0 0 0 1 0 1 1 0 0   1 1 1 0 1 1  . 0 0 1 1 1 0  0 0 0 0 1 1 (52) (53) computed as follows: 1 0 1 0 0 0 0 1 1 0 0 1 1 1 0 0 0 0 1 0 1 0 1 0 1 0 0 0 0 1 1 0 0 1 1 1 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 0 1 0 0 1 1 1 0 0 0 0 0 1 1 0 1 0 1 0 0 0 0 0 1 0 0 1 1 1                 (0, (1, (2, (3, (4, (5, (6, (7, (8, (9, 5] 6] 7] 8] 9] 0] 1] 2] 3] 4]. (54) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 14 Choosing 5 rows from X, let    ′ G =   0 0 1 0 0 1 0 0 0 1 0 0 0 1 0 1 0 1 0 0 0 0 0 0 1 0 1 1 0 0 0 0 0 1 1 0 1 0 0 0 1 0 0 0 0 0 0 0 1 1  (1, 6]  (3, 8]   (5, 0]   (7, 2] (9, 4]. (55) We see that the rows of G′ are linearly independent and thus generate C, i.e., G′ is equivalent to Gtb 5 . Here note that G′ consists of the first row and its right cyclic shifts by i × 2 (1 ≤ i ≤ 4) positions. Accordingly, G′ can be regarded as the TBGM associated with G′ (D) = = (D3 , 1 + D) (0, 1) + (0, 1)D + (1, 0)D3 . (56) (57) Hence, C is equally represented as a TB convolutional code defined by G′ (D) = (D3 , 1 + D). We remark that the constraint length of G′ (D) is ν ′ = 3 and is greater than that of G(D). On the other hand, observe that the first column of G′ (D) has a factor D2 . Then dividing the first column by D2 , we have G′ (D) = (D3 , 1 + D) → G′′ (D) = (D, 1 + D). (58) Note that this transformation corresponds to cyclically shifting the first component of each branch (of a TB path) to the left by two branches (cf. Proposition 4.1). By this transformation, the original TB convolutional code is represented using a trellis associated with G′′ (D) as well. The trellis for G′′ (D) = (D, 1 + D) is shown in Fig.2. For example, take notice of the TB path in Fig.1 which starts and ends in state (00): w = 11 01 10 01 11. Cyclically shifting the first component of each branch to the left by two branches, it becomes wm = 11 01 10 11 01. We see that the modified path is represented as a path which starts and ends in state (1) in Fig.2. This example shows that there are cases where a given TB convolutional code is represented using a reduced trellis with less state complexity, if we allow partial cyclic shifts of a TB path. (0) (1) t=0 00 t=1 00 t=2 00 t=3 00 t=4 00 01 01 01 01 01 11 11 11 11 11 10 10 10 10 t=5 10 Fig. 2. The tail-biting convolutional code defined by G′′ (D) = (D, 1 + D) (N = 5). B. Trellis Reduction for TB Convolutional Codes The argument in the previous section, though it was presented in terms of a specific example, is entirely general. Then the method can be directly extended to a general case. Let G(D) be as in Section III. Denote by ν the constraint length of G(D). Consider a TB convolutional code C of section length N defined by G(D). The trellis reduction procedure becomes as follows. Procedure for trellis reduction: i) Compute a characteristic matrix X for C based on the TBGM Gtb N , where X consists of n0 rows and their right cyclic shifts by integer multiple of n0 . ii) Choosing k rows from X, form G′ , where G′ has the properties: 1) The rows of G′ are linearly independent and thus generate C. 2) G′ consists of k0 rows and their right cyclic shifts by integer multiple of n0 . iii) (Direct reduction) G′ is regarded as the TBGM associated with another generator matrix G′ (D). Let ν ′ be the constraint length of G′ (D). If ν ′ < ν, then trellis reduction for C is realized. iv) (Indirect reduction) Even if ν ′ ≥ ν, there are cases where G′ (D) has a monomial factor Dp in some (jth) column. Then there is a possibility that ν ′ is reduced by dividing the jth column of G′ (D) by Dp (the resulting matrix is denoted by G′′ (D)). Let ν ′′ be the constraint length of G′′ (D). If ν ′′ < ν, then the original TB trellis can be reduced. That is, by JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 15 cyclically shifting the jth component of each branch of a TB path (∈ C) to the left by p branches, the set of modified paths are equally represented as a TB convolutional code defined by G′′ (D) (this is justified by Proposition 4.1). Thus trellis reduction is accomplished. v) X is not necessarily unique [9]. Hence, if necessary, try i) ∼ iv) using another characteristic matrix X ′ for C. Remark: For row rate codes, it is rather easy to find G′ which is equivalent to Gtb N . Also, row rate codes make it easy to determine whether G′ (D) can be reduced or not. As is stated above, there are some restrictions on the selection of X and G′ . We have the following. Proposition 5.1: The number of characteristic matrices X’s in i) is given by 2θ , where θ is defined in Section III-C. For a fixed X, the number of G′ ’s which satisfy the condition 2) in ii) is given by n0 Ck0 . Proof: G′ is a candidate for a TBGM associated with an encoder. Hence, the above is a consequence of the structure of TBGM. Example 3: Consider the TB convolutional code C of section lengh N = 6 defined by G(D) = (1 + D + D2 + D3 , 1 + D2 + D3 ). Using the associated TBGM, i.e., Gtb 6 ,           X=          (59) a characteristic matrix X for C is computed as follows:  1 0 0 0 1 0 0 1 0 0 0 0 (0, 7] 0 1 1 0 0 1 1 0 0 0 0 0   (1, 6] 0 0 1 0 0 0 1 0 0 1 0 0   (2, 9] 0 0 0 1 1 0 0 1 1 0 0 0   (3, 8] 0 0 0 0 1 0 0 0 1 0 0 1   (4, 11] 0 0 0 0 0 1 1 0 0 1 1 0   (5, 10] 0 1 0 0 0 0 1 0 0 0 1 0   (6, 1] 1 0 0 0 0 0 0 1 1 0 0 1   (7, 0] 1 0 0 1 0 0 0 0 1 0 0 0   (8, 3] 0 1 1 0 0 0 0 0 0 1 1 0   (9, 2] 0 0 1 0 0 1 0 0 0 0 1 0  (10, 5] 1 0 0 1 1 0 0 0 0 0 0 1 (11, 4]. Choosing 6 rows from X, define G′ as  1  0   0 G′ =   0   1 0 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 1 0 1 0 1 0 0 1 0 0 0 0 0 0 0 1 0 1 0 0 1 0 0 0 0 0 0 0 1 0 1 0 0 1 0 0 0         (0, 7] (2, 9] (4, 11] (6, 1] (8, 3] (10, 5]. (60) (61) ′ We see that G′ is equivalent to Gtb 6 . Also, we see that G is the TBGM associated with G′ (D) = (1 + D2 , D3 ). (62) Note that the constraint length ν ′ = 3 of G′ (D) is not reduced compared to that of G(D). On the other hand, observe that the second column of G′ (D) has a factor D. Then dividing the column by D, we have G′ (D) = (1 + D2 , D3 ) → G′′ (D) = (1 + D2 , D2 ). (63) This transformation corresponds to cyclically shifting the second component of each branch of a TB path to the left by one branch (cf. Proposition 4.1). As a result, the modified paths are represented using the trellis for G′′ (D). Thus trellis reduction for C is accomplished. Remark: As is stated above, X is not necessarily unique. For example, if a characteristic matrix   1 1 1 0 1 1 1 1 0 0 0 0 (0, 7]  0 1 1 0 0 1 1 0 0 0 0 0  (1, 6]    0 0 1 1 1 0 1 1 1 1 0 0  (2, 9]    0 0 0 1 1 0 0 1 1 0 0 0  (3, 8]    0 0 0 0 1 1 1 0 1 1 1 1  (4, 11]    0 0 0 0 0 1 1 0 0 1 1 0  (5, 10]  X′ =  (64)  1 1 0 0 0 0 1 1 1 0 1 1  (6, 1]    1 0 0 0 0 0 0 1 1 0 0 1  (7, 0]    1 1 1 1 0 0 0 0 1 1 1 0  (8, 3]    0 1 1 0 0 0 0 0 0 1 1 0  (9, 2]    1 0 1 1 1 1 0 0 0 0 1 1  (10, 5] 1 0 0 1 1 0 0 0 0 0 0 1 (11, 4] JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 16 is used, then trellis reduction cannot be realized using the above procedure. Using appropriate characteristic matrices, the above reduction method can also be applied to the following cases: (1) R = 1/2, ν = 4, N = 6 : G(D) = (1 + D + D4 , 1 + D2 + D3 + D4 ) → G′ (D) = (D2 , 1 + D) → G′′ (D) = (D, 1 + D). (2) R = 1/2, ν = 5, N = 10 : G(D) = (1 + D + D2 + D3 + D4 + D5 , 1 + D3 + D5 ) → G′ (D) = (D4 + D5 , 1 + D + D4 ) → G′′ (D) = (D3 + D4 , 1 + D + D4 ). (3) R = 1/2, ν = 6, N = 8 : G(D) = (1 + D + D4 + D5 + D6 , 1 + D2 + D3 + D4 + D6 ) → G′ (D) = (D + D2 + D3 , 1 + D2 + D3 ). G(D) = (4) R = 1/2, ν = 6, N = 8 : (1 + D + D2 + D3 + D6 , 1 + D2 + D3 + D5 + D6 ) → G′ (D) = (1 + D2 + D3 , D2 + D3 + D4 ) → G′′ (D) = (1 + D2 + D3 , D + D2 + D3 ). (5) R = 1/3, ν = 3, N = 5 : G(D) = (1 + D + D2 + D3 , 1 + D + D3 , 1 + D2 + D3 ) → G′ (D) = (D + D2 , D3 , 1) → G′′ (D) = (1 + D, D, 1). (6) R = 2/3, ν = 4, N = 6 : G(D)   D + D2 1 + D 1 + D + D2 = 1 1 + D2 1 + D2  2  D 1+D D ′ → G (D) = D 0 1 + D2   D 1+D D → G′′ (D) = . 1 0 1 + D2 C. Trellis Reduction Using a Reciprocal Dual Encoder For high rate codes, G′ (D) may not have a monomial factor in any columns. Then it is not easily determined whether G′ (D) can be reduced or not. In such cases, it is useful to consider a reciprocal dual encoder H̃ ′ (D) associated with G′ (D). A reciprocal dual encoder [21] is defined as follows: Let G(D) be as in Section III. Also, let H(D) be a corresponding check matrix with size (n0 − k0 ) × n0 . A reciprocal dual encoder H̃(D) is obtained by substituting D−1 for D in H(D) and by ⊥ multiplying the ith (1 ≤ i ≤ n0 − k0 ) row of the resulting matrix by Dνi , where νi⊥ is the degree of the ith row of H(D). Definition 5.1 (McEliece and Lin [18]): Let Gscalar be a scalar generator matrix for a terminated convolutional code defined by G(D) [18], [21]. Gscalar is given by   G0 G1 ... GL   G0 ... GL−1 GL     ... ... ... ...    . G0 G1 ... GL Gscalar =  (65)    G ... GL−1 GL 0     ... ... ... ... G0 G1 ... GL The (L + 1)k0 × n0 matrix  GL △  GL−1   Ĝ =   ··· , G0  (66) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 17 which repeatedly appears as a vertical slice in Gscalar except initial and final transient sections, is called the matrix module. Then the trellis module T0 for the trellis associated with Gscalar corresponds to Ĝ. If Gscalar is in minimal-span form, then T0 is minimal. The state complexity profile of T0 is an n0 -tuple consisting of the dimensions of state spaces Vi (0 ≤ i ≤ n0 − 1) of T0 . The meaning of obtaining a reciprocal dual encoder is based on the following result [26], [30], [31]. Proposition 5.2 (Tang and Lin [30]): Consider a minimal trellis module of G(D) and that of an associated reciprocal dual encoder H̃(D). Then their state complex profiles are identical. Hence, in order to determine whether G′ (D) is reduced or not, we can compute a reciprocal dual encoder H̃ ′ (D) associated with G′ (D). In connection with an encoder G(D) and an associated reciprocal dual encoder H̃(D), we have the following. tb Proposition 5.3: Let Gtb N be the TBGM associated with G(D). Then a check matrix corresponding to GN is obtained as tb the TBGM (denoted by H̃N ) associated with a reciprocal dual encoder H̃(D). Proof: Let the polynomial expansion of H(D) be H(D) = H0 + H1 D + · · · + HM−1 DM−1 + HM DM , (67) where M is the memory length of H(D) and Hi (0 ≤ i ≤ M ) are (n0 − k0 ) × n0 matrices. It is known (e.g., [28]) that a check matrix corresponding to Gtb N is given by   H0 HM ... H2 H1  H1 H0 ... ... H2     ... H ... HM ...  1    HM−1 ... ... H0 HM  tb   H = (68)  H0  HM HM−1 ... H1    HM ... ... H1 ...     ... HM−1 ... ... H0 HM HM−1 ... H1 H0 with size (n0 − k0 )N × n0 N . On the other hand, let the polynomial expansion of H̃(D) be H̃(D) = H̃0 + H̃1 D + · · · + H̃M−1 DM−1 + H̃M DM . tb H̃N ) Then the TBGM associated with H̃(D) (denoted by  H̃0 H̃1  H̃0      tb H̃N =   H̃M   H̃M−1 H̃M   ... ... H̃1 H̃2 (69) is defined by ... H̃M−1 ... ... ... ... ... H̃0 H̃1 H̃0 ... ... H̃M H̃M−1 H̃M H̃M     ... ...   ... ... H̃M   H̃1 ... H̃M−1   H̃0 ... ...   ... H̃1  H̃0 (70) with size (n0 − k0 )N × n0 N . Here take notice of the ith (1 ≤ i ≤ n0 − k0 ) row of   tb H̃0 , H̃1 , · · · , H̃M−1 , H̃M , 0, · · · , 0 ⊂ H̃N . We see that the row is identical to the ith row of   Hνi⊥ , · · · , H1 , H0 , 0, · · · , 0, HM , · · · , Hνi⊥ +1 ⊂ H tb . Similarly, the ith (1 ≤ i ≤ n0 − k0 ) row of   tb 0, H̃0 , H̃1 , · · · , H̃M−1 , H̃M , 0, · · · , 0 ⊂ H̃N is identical to the ith row of   Hνi⊥ +1 , · · · , H1 , H0 , 0, · · · , 0, HM , · · · , Hνi⊥ +2 ⊂ H tb . tb tb Due to the cyclic structures of H tb and H̃N , similar correspondences hold successively. Hence, H̃N is given as a row permutation tb of H . A procedure for computing H̃ ′ (D) is obtained based on the above proposition. Procedure for computing H̃ ′ (D): JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 18 tb i) Compute a characteristic matrix Y for the dual code C ⊥ based on H̃N , where Y consists of n0 rows and their right cyclic shifts by integer multiple of n0 . ii) Choosing (n − k) rows from Y , form H̃ ′ , where H̃ ′ has the properties: 1) The rows of H̃ ′ are linearly independent and thus generate C ⊥ . 2) H̃ ′ consists of (n0 − k0 ) rows and their right cyclic shifts by integer multiple of n0 . iii) Let H̃ ′ (D) be the polynomial matrix whose TBGM is H̃ ′ . tb ′ ′ iv) Note that G′ and H̃ ′ are equivalent to Gtb N and H̃N , respectively. Hence, H̃ is a check matrix corresponding to G . Then ′ ′ it follows from Proposition 5.3 that H̃ (D) is a reciprocal dual encoder associated with G (D). v) Y is not necessarily unique. Hence, if necessary, try i) ∼ iv) using another characteristic matrix Y ′ for C ⊥ . The following is an example where trellis reduction is realized using a reciprocal dual encoder. Example 4: Consider the rate R = 2/3 TB convolutional code C of section length N = 5 with generator matrix   1+D D 1 G(D) = (71) D2 1 1 + D + D2       1 0 1 1 1 0 0 0 0 = + D+ D2 0 1 1 0 0 1 1 0 1 △ = G0 + G1 D + G2 D2 . Based on the associated TBGM, i.e., Gtb 5    =   a characteristic matrix X for C is computed as  1 0 1  0 1 1   0 0 1   0 0 0   0 0 0   0 0 0   0 0 0  X =  0 0 0  0 0 0   0 0 0   1 0 1   1 0 0   1 1 0   0 0 1 0 0 1 G0 0 0 G2 G1 G1 G0 0 0 G2 (72) G2 G1 G0 0 0 0 G2 G1 G0 0 0 0 G2 G1 G0  0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 1 1 1 1 0 0 0   ,   (73) follows: 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 1 0 0 0 0 0 0 0 1 0 0 1 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 1 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 1 1 1 1 1              .             (74) The span list for X is given by T = {(0, 4], (1, 8], (2, 6], (3, 7], (4, 11], (5, 9], (6, 10], (7, 14], (8, 12], (9, 13], (10, 2], (11, 0], (12, 1], (13, 5], (14, 3]}. (75) Choosing 10 rows from X, let         G′ =         1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 1 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 1         .        (76) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 19 The span list for G′ is given by S = {(0, 4], (2, 6], (3, 7], (5, 9], (6, 10], (8, 12], (9, 13], (11, 0], (12, 1], (14, 3]}. (77) ′ We see that the rows of G′ are linearly independent and thus generate C, i.e., G′ is equivalent to Gtb 5 . Also, note that G is the TBGM associated with   1+D D 1 ′ G (D) = (78) D2 0 1+D       1 0 1 1 1 0 0 0 0 = + D+ D2 0 0 1 0 0 1 1 0 0 △ = G′0 + G′1 D + G′2 D2 . (79) Hence, the original TB convolutional code is equally represented as a TB convolutional code defined by G′ (D). Observe that the constraint length of G′ (D) is ν ′ = 3 and is equal to that of G(D). Also, notice that the second column of ′ G (D) has a factor D. However, ν ′ is not reduced by dividing the column by D. In general, it is difficult to tell a possibility of reduction of G′ (D) just by looking at its entries. So, we will compute a reciprocal dual encoder H̃ ′ (D) associated with G′ (D). We begin with a reciprocal dual encoder H̃(D) associated with G(D). H̃(D) is given by H̃(D) = (1 + D + D2 + D3 , 1 + D + D3 , 1 + D2 + D3 ). Based on H̃5tb , a characteristic matrix Y  1  0   0   0   1   0   1  Y =  1  0   1   0   1   1   0 1 for C ⊥ is computed as follows: 1 1 0 0 0 0 1 0 1 0 0 0 1 0 0 1 0 1 0 0 0 1 0 0 1 1 0 0 0 0 1 0 1 1 0 0 0 1 0 1 1 0 1 0 1 1 0 0 1 1 0 0 0 0 1 0 1 0 0 0 0 0 0 1 0 1 0 0 0 1 0 0 1 1 0 1 0 1 1 0 1 1 0 0 0 1 0 1 1 0 0 0 0 1 0 0 1 1 0 0 0 0 1 0 1 1 1 0 0 0 0 1 0 1 0 0 0 1 0 0 1 1 0 1 0 1 1 0 1 1 0 0 0 1 0 1 0 1 0 0 0 1 0 0 1 1 0 0 0 0 1 0 0 1 1 0 0 0 0 1 0 1 0 0 0 0 1 0 1 1 0 1 0 1 1 0 1 1 0 0 0 0 0 1 0 1 0 0 0 1 0 0 1 1 0 0 0 0 1 0 0 1 1 0 0 0 0 1 0 1 The span list for Y is given by T̂ (80)              .             (81) = {(0, 11], (1, 12], (2, 10], (3, 14], (4, 0], (5, 13], (6, 2], (7, 3], (8, 1], (9, 5], (10, 6], (11, 4], (12, 8], (13, 9], (14, 7]}. Note that if the span list for X is T = 1, · · · , 15} [10], [13]. Next, choosing 5 rows from Y , let  0  0  H̃ ′ =   0  1 1 (82) {(al , bl ], l = 1, · · · , 15}, then the span list for Y is given by T̂ = {(bl , al ], l = 0 0 1 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 1 0 0 1 0 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 1 0 0 0 1 0 0 0 0 0 0 0 1    .   (83) The span list for H̃ ′ is given by Ŝ = {(2, 10], (5, 13], (8, 1], (11, 4], (14, 7]}. (84) We see that H̃ ′ is equivalent to H̃5tb . Thus H̃ ′ is a scalar check matrix corresponding to G′ . Also, note that H̃ ′ is the TBGM associated with H̃ ′ (D) = (D + D2 , D3 , 1). We already know that G′ is the TBGM associated with G′ (D). Hence, by Proposition 5.3, a reciprocal dual encoder associated with G′ (D) is given by H̃ ′ (D) = (D + D2 , D3 , 1). (85) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 20 Observe that H̃ ′ (D) = (D + D2 , D3 , 1) has a factor D in the first column and a factor D2 in the second column. Then sweeping these factors out of the corresponding columns, the constraint length of H̃ ′ (D) is reduced to one. This fact implies that the constraint length of G′ (D) can also be reduced. In the following, we will show that reduction of G′ (D) is actually realized. For the purpose, a check matrix corresponding to G′ (D), i.e., H ′ (D) = (D−1 + D−2 , D−3 , 1) × D3 = (D + D2 , 1, D3 ) (86) is used. Let G(D) and H(D) be a generator matrix and a corresponding check matrix for a convolutional code, respectively. In the following, this relation is denoted by G(D) ⇔ H(D). It is shown [27] that G(D) and H(D) can be reduced simultaneously, if reduction is possible, where the relation ⇔ is retained in the whole reduction process. We apply the method to our case under consideration. Step 1: For G′ (D), add the first row multiplied by D to the second row. By Proposition 4.3, this is a TB-equivalent transformation. As a result, we have   1+D D 1 G′′ (D) = ⇔ H ′ (D) = (D + D2 , 1, D3 ). D D2 1 Step 2: Divide the second column of G′′ (D) by D, while divide the first and third columns of H ′ (D) by D. Then we have   1+D 1 1 G′′′ (D) = ⇔ H ′′′ (D) = (1 + D, 1, D2 ). D D 1 Step 3: Multiply the third column of G′′′ (D) by D, while divide the third column of H ′′′ (D) by D. Then we have   1+D 1 D (4) G (D) = ⇔ H (4) (D) = (1 + D, 1, D). D D D   1+D 1 D (4) Step 4: Note that G (D) = is not basic [5]. Using an invariant-factor decomposition [5] of G(4) (D), D D D an equivalent basic matrix   1+D 1 D G(5) (D) = (87) 1 1 1 is obtained. Note that G(4) (D) and G(5) (D) are TB-equivalent (cf. Proposition 4.4). In the above reduction process for G′ (D), except for TB-equivalent transformations, the second column is divided by D, whereas the third column is multiplied by D. Accordingly, for each TB path, let us cyclically shift the second component of each branch to the left by one branch and cyclically shift the third component of each branch to the right by one branch. Then the modified TB paths are represented as a TB convolutional code defined by G(5) (D) (see Propositions 4.1 and 4.2). The trellis for G(5) (D) is shown in Fig.3. For example, take an information sequence u = 01 00 01 00 00 and the corresponding TB path w = uGtb 5 = 011 001 110 001 101. By cyclically shifting the second component of each branch to the left by one branch, and by cyclically shifting the third component of each branch to the right by one branch, we have w m = 001 011 101 000 111. We see that w m is a TB path which starts and ends in state (0) in Fig.3. (0) (1) t=0 111 000 001 110 t=1 111 000 001 110 t=2 111 000 001 110 t=3 111 000 001 110 t=4 111 000 001 110 010 010 010 010 010 101 101 101 101 101 011 100 011 100 011 100 011 100 011 100 t=5 Fig. 3. The tail-biting convolutional code defined by G(5) (D) (N = 5). Remark: We remark that in the above argument, it is assumed that G′ is equivalent to Gtb 5 (i.e., the equivalence has been checked beforehand). In general, however, k = k0 N is relatively large for high rate codes. Hence, it is preferable that the ′ tb equivalence of G′ and Gtb 5 is derived without checking it beforehand. Actually, the equivalence of G and G5 is derived from ′ tb the equivalence of H̃ and H̃5 using the result of Gluesing-Luerssen and Weaver [10, Theorem IV.3] (see Appendix A). JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 21 D. Relation Between Trellis Reduction and Section Length In the proposed trellis reduction method, the section length N is an important parameter. Actually, the method is effective for TB convolutional codes of short to moderate section length. This is because the span lengths of characteristic generators increase as N grows (see Section III-D). We have already shown that a TB trellis with generator matrix G(D) = (1 + D + D2 , 1 + D2 ) can be reduced for the case of N = 5. Consider the same trellis. This time, however, N is set to 6. Then Gtb 6 is given by   G0 G1 G2 0 0 0  0 G0 G1 G2 0 0     0 0 G0 G1 G2 0    Gtb = (88) 6  0 0 0 G0 G1 G2     G2 0 0 0 G0 G1  G1 G2 0 0 0 G0   1 1 1 0 1 1 0 0 0 0 0 0 (0, 5]  0 0 1 1 1 0 1 1 0 0 0 0  (2, 7]    0 0 0 0 1 1 1 0 1 1 0 0  (4, 9]   =  (89)   0 0 0 0 0 0 1 1 1 0 1 1  (6, 11]  1 1 0 0 0 0 0 0 1 1 1 0  (8, 1] 1 0 1 1 0 0 0 0 0 0 1 1 (10, 3]. Note that to each generator in Gtb 6 , its span is assigned in the natural are the same, i.e., 6. A characteristic matrix is computed as follows:  1 1 1 0 1 1 0 0 0  0 1 0 1 1 1 1 1 1   0 0 1 1 1 0 1 1 0   0 0 0 1 0 1 1 1 1   0 0 0 0 1 1 1 0 1   1 0 0 0 0 1 0 1 1 X =  0 0 0 0 0 0 1 1 1   1 1 1 0 0 0 0 1 0   1 1 0 0 0 0 0 0 1   1 1 1 1 1 0 0 0 0   1 0 1 1 0 0 0 0 0 0 1 1 1 1 1 1 0 0 Thus the set of basic spans is given by T0 =  manner. Observe that the span lengths of these spans 0 0 0 1 1 1 0 1 1 1 0 0 0 0 0 1 0 1 1 1 1 0 1 0 0 0 0 0 0 1 1 1 0 1 1 1                     (0, 5] (1, 8] (2, 7] (3, 10] (4, 9] (5, 0] (6, 11] (7, 2] (8, 1] (9, 4] (10, 3] (11, 6]. (0, 5] (1, 8]. (90) (91) With respect to G′ , there are two cases. When the first row of X is used as a basic generator of G′ , G′ is identical to Gtb 6 . When the second row of X is used as a basic generator of G′ , the span lengths of rows of G′ are 8 and are greater than 6. These facts mean that in either case, trellis reduction is not realized using the proposed method. On the other hand, this example implies that the upper bound for N can be estimated by comparing the span lengths of generators in G′ with those of generators in Gtb N. Let X be a characteristic matrix for a TB convolutional code of section length N . We already know that the associated span list T consists of the set of basic spans  (0, b0 ]    (1, b1 ] T0 = ···    (n0 − 1, bn0 −1 ] and ρin0 (T0 ) (i = 1, 2, · · · , N − 1). Also, the sum of span lengths of spans in T0 is given by ℓ = n0 ((n0 − k0 )N + 1). In the proposed method, G′ consists of k generators in X. From a span viewpoint, this corresponds to choosing k0 spans from T0 . Accordingly, the sum of span lengths of these k0 spans, denoted by ℓ′ , is approximated by ℓ′ ; (k0 /n0 ) × n0 ((n0 − k0 )N + 1) = k0 ((n0 − k0 )N + 1). (92) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 22 On the other hand, consider Gtb N , where to each generator, its span is assigned in the natural manner. Then the span list consists of the set of basic spans T̂0 and ρin0 (T̂0 ) (i = 1, 2, · · · , N − 1). We evaluate the sum of span lengths of spans in T̂0 , denoted by ℓ̂. Let νi be the degree of the ith row of G(D). Here take notice of the first block of k0 rows in Gtb N , i.e., (G0 , G1 , · · · , GL−1 , GL , 0, · · · , 0) . The span length of the ith (1 ≤ i ≤ k0 ) row is approximated by n0 (νi + 1). Hence, we have ℓ̂ ; n0 (ν1 + 1) + n0 (ν2 + 1) + · · · + n0 (νk0 + 1) = n0 (ν1 + ν2 + · · · + νk0 ) + n0 k0 = n0 (ν + k0 ), (93) △ where ν = ν1 + ν2 + · · · + νk0 is the constraint length of G(D). Since trellis reduction is realized in the case where G′ consists of generators with short span length, we can take the inequality ℓ′ ≤ ℓ̂ as a criterion for trellis reduction. That is, we can estimate the upper bound for N using the inequality (♯) k0 ((n0 − k0 )N + 1) ≤ n0 (ν + k0 ). (94) For several concrete cases, we will show the condition (♯). (1) R = 1/2:  ′ ℓ ;N +1 ℓ̂ ; 2ν + 2 (♯) N ≤ 2ν + 1. (2) R = 1/3:  ℓ′ ; 2N + 1 ℓ̂ ; 3ν + 3 (♯) N ≤ ⌊(3/2)ν⌋ + 1. (3) R = 2/3:  ℓ′ ; 2N + 2 ℓ̂ ; 3ν + 6 (♯) N ≤ ⌊(3/2)ν⌋ + 2. We observe that the TB convolutional codes presented in Section V-B all satisfy the condition (♯). Also, the rate R = 2/3 TB convolutional code discussed in the previous section satisfies the condition (♯). VI. C ONCLUSION In this paper, we have derived several basic properties of a characteristic matrix for a TB convolutional code. We have shown that the characteristic span list consists of some basic spans and their right cyclic shifts. Using the derived results, we have shown that a trellis associated with a given TB convolutional code can be reduced in some cases. As candidates for trellis reduction, we have taken the generator matrices from the tables in [12, Chapter 8] in principle. For example, the rate R = 1/2 encoders in Section V-B were chosen from [12, TABLE 8.1]. On the other hand, good TB convolutional encoders have been obtained [12], [25]. Here, for a given rate R = k0 /n0 , the optimal encoder of memory length L produces the largest minimum distance d for each section length N . We have applied the proposed reduction method to some of such encoders (see [12, TABLE 8.19]). As a result, for example, we have obtained G = (6, 7) (ν = 2, N = 5) from G = (50, 64) (ν = 3, N = 5), where the octal notation for generator matrices is used. Similarly, we have obtained G = (54, 60) (ν = 3, N = 6) from G = (46, 60) (ν = 4, N = 6). Note that both G = (6, 7) (ν = 2, N = 5) and G = (54, 60) (ν = 3, N = 6) are listed in the same table. Finally, we remark that the proposed trellis reduction method depends on the choice of a characteristic matrix for a given convolutional code. Though the number of characteristic matrices to be examined is rather restricted (cf. Proposition 5.1), the method is not fully constructive. Also, a detailed condition that trellis reduction is realized has to be clarified. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 23 A PPENDIX A P ROOF OF THE EQUIVALENCE OF G′ AND Gtb 5 We first prove the following. Proposition A.1: Let G(D) be as in Section III. Consider a TB convolutional code C generated by Gtb N and the corresponding dual code C ⊥ . Let X be a characteristic matrix for C with span list T . Also, let Y be a characteristic matrix for C ⊥ with span list T̂ . Let X̃ and Ỹ be submatrices of X and Y , respectively, where X̃ consists of k rows in X, whereas Ỹ consists of (n − k) rows in Y . Denote by S and Ŝ the span lists for X̃ and Ỹ , respectively. Here assume the following: i) X̃ consists of k0 rows and their right cyclic shifts by integer multiple of n0 . ii) Each span in S does not include any spans in T except itself. iii) The rows of Ỹ are linearly independent and thus generate C ⊥ . iv) Ỹ consists of (n0 − k0 ) rows and their right cyclic shifts by integer multiple of n0 . v) Each span in Ŝ does not include any spans in T̂ except itself. vi) S and Ŝ satisfy (b, a] ∈ Ŝ ↔ (a, b] ∈ / S (that is, Ŝ consists of the spans in T̂ whose reverse is not in S). Then the rows of X̃ are linearly independent, thus generate C, i.e., X̃ is equivalent to Gtb N. Remark: When X̃ consists of generators in X with short span length, it is probable that the condition ii) holds. Similarly, when Ỹ consists of generators in Y with short span length, it is probable that the condition v) holds. Proof: From ii), it follows that X̃ is common to all the characteristic matrices for C. Similarly, from v), it follows that Ỹ is common to all the characteristic matrices for C ⊥ . Also, by vi), (X̃, Ỹ ) is a dual selection of (X, Y ) [10, Definition IV.2]. As a result [10, Theorem IV.3], we have 1) rank X̃ = k ↔ rank Ỹ = n − k 2) Let rank X̃ = k. Then the KV trellises [10] based on (X̃, S) and (Ỹ , Ŝ) are dual to each other. By iii), rank Ỹ = n − k. Hence, by 1), rank X̃ = k. ⊥ Let us go back to Example 4. In this example, the code C generated by Gtb generated by H̃5tb are 5 and the dual code C ⊥ considered. X is a characteristic matrix for C, whereas Y is a characteristic matrix for C . Note that neither X nor Y are unique. These are observed from the relation of inclusion in the associated span lists T and T̂ , where T = {(0, 4], (1, 8], (2, 6], (3, 7], (4, 11], (5, 9], (6, 10], (7, 14], T̂ = {(0, 11], (1, 12], (2, 10], (3, 14], (4, 0], (5, 13], (6, 2], (7, 3], (8, 1], (9, 5], (10, 6], (11, 4], (12, 8], (13, 9], (14, 7]}. (8, 12], (9, 13], (10, 2], (11, 0], (12, 1], (13, 5], (14, 3]} Next, take notice of the matrices G′ and H̃ ′ , which are submatrices of X and Y , respectively. The corresponding span lists are given by S = {(0, 4], (2, 6], (3, 7], (5, 9], (6, 10], Ŝ (8, 12], (9, 13], (11, 0], (12, 1], (14, 3]} = {(2, 10], (5, 13], (8, 1], (11, 4], (14, 7]}. Here note the following: • Each span in S does not include any spans in T except itself. • Each span in Ŝ does not include any spans in T̂ except itself. Moreover, Ŝ consists of the spans in T̂ whose reverse is not in S. Actually, by reversing the spans in Ŝ, we have (10, 2], (13, 5], (1, 8], (4, 11], (7, 14]. We see that these spans are not in S. All these facts show that the conditions in Proposition A.1 are satisfied, when X̃ and Ỹ are replaced by G′ and H̃ ′ , respectively. Hence, the equivalence of G′ and Gtb 5 is derived. Remark: [10, Theorem IV.3] holds only for a pair (X, Y ), where X is a characteristic matrix for C and Y is the corresponding dual one for C ⊥ (see [10]). On the other hand, the pair (X, Y ) computed above may not be in the duality relation. However, G′ is common to all the characteristic matrices for C, and H̃ ′ is common to all the characteristic matrices for C ⊥ as well. Hence, the theorem can be applied to our case. ACKNOWLEDGMENT The author would like to thank Prof. Heide Gluesing-Luerssen for valuable comments on the duality of Koetter-Vardy (KV) trellises. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 24 R EFERENCES [1] J. B. Anderson and S. M. Hladik, “An optimal circular Viterbi decoder for the bounbed distance criterion,” IEEE Trans. Commun., vol. 50, no. 11, pp. 1736–1742, Nov. 2002. [2] L. R. Bahl, J. Cocke, F. Jelinek, and J. Raviv, “Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Trans. Inform. Theory, vol. IT-20, no. 2, pp. 284–287, March 1974. [3] A. R. Calderbank, G. D. Forney. Jr., and A. Vardy, “Minimal tail-biting trellises: The Golay code and more,” IEEE Trans. Inform. Theory, vol. 45, no. 5, pp. 1435–1455, July 1999. [4] D. Conti and N. Boston, “On the algebraic structure of linear tail-biting trellises,” IEEE Trans. Inform. Theory, vol. 61, no. 5, pp. 2283–2299, May 2015. [5] G. D. Forney, Jr., “Convolutional codes I: Algebraic structure,” IEEE Trans. Inform. Theory, vol. IT-16, no. 6, pp. 720–738, Nov. 1970. , “Structural analysis of convolutional codes via dual codes,” IEEE Trans. Inform. Theory, vol. IT-19, no. 4, pp. 512–518, July 1973. [6] [7] , “Coset codes–Part II: Binary lattices and related codes,” IEEE Trans. Inform. Theory, vol. 34, no. 5, pp. 1152–1187 (Appendix A), Sept. 1988. [8] , “Dimension/length profiles and trellis complexity of linear block codes,” IEEE Trans. Inform. Theory, vol. 40, no. 6, pp. 1741–1752, Nov. 1994. [9] H. Gluesing-Luerssen and E. A. Weaver, “Linear tail-biting trellises: Characteristic generators and the BCJR-construction,” IEEE Trans. Inform. Theory, vol. 57, no. 2, pp. 738–751, Feb. 2011. , “Characteristic generators and dualization for tail-biting trellises,” IEEE Trans. Inform. Theory, vol. 57, no. 11, pp. 7418–7430, Nov. 2011. [10] [11] H. Gluesing-Luerssen and G. D. Forney, Jr., “Local irreducibility of tail-biting trellises,” IEEE Trans. Inform. Theory, vol. 59, no. 10, pp. 6597–6610, Oct. 2013. [12] R. Johannesson and K. S. Zigangirov, Fundamentals of Convolutional Coding. New York: IEEE Press, 1999. [13] R. Koetter and A. Vardy, “The structure of tail-biting trellises: Minimality and basic principles,” IEEE Trans. Inform. Theory, vol. 49, no. 9, pp. 2081–2105, Sep. 2003. [14] F. R. Kschischang and V. Sorokine, “On the trellis structure of block codes,” IEEE Trans. Inform. Theory, vol. 41, no. 6, pp. 1924–1937, Nov. 1995. [15] S. Lin and R. Y. Shao, “General structure and construction of tail biting trellises for linear block codes,” in Proc. ISIT2000, p. 117, June 2000. [16] H. H. Ma and J. K. Wolf, “On tail biting convolutional codes,” IEEE Trans. Commun., vol. COM-34, no. 2, pp. 104–111, Feb. 1986. [17] R. J. McEliece, “On the BCJR trellis for linear block codes,” IEEE Trans. Inform. Theory, vol. 42, no. 4, pp. 1072–1092, July 1996. [18] R. J. McEliece and W. Lin, “The trellis complexity of convolutional codes,” IEEE Trans. Inform. Theory, vol. 42, no. 6, pp. 1855–1864, Nov. 1996. [19] D. J. Muder, “Minimal trellises for block codes,” IEEE Trans. Inform. Theory, vol. 34, no. 5, pp. 1049–1053, Sept. 1988. [20] A. V. Nori and P. Shankar, “Unifying views of tail-biting trellis constructions for linear block codes,” IEEE Trans. Inform. Theory, vol. 52, no. 10, pp. 4431–4443, Oct. 2006. [21] S. Riedel, “Symbol-by-symbol MAP decoding algorithm for high-rate convolutional codes that use reciprocal dual codes,” IEEE J. Select. Areas Commun., vol. 16, no. 2, pp. 175–185, Feb. 1998. [22] Y. Shany and Y. Be’ery, “Linear tail-biting trellises, the square-root bound, and applications for Reed-Muller codes,” IEEE Trans. Inform. Theory, vol. 46, no. 4, pp. 1514–1523, July 2000. [23] R. Y. Shao, S. Lin, and M. P. C. Fossorier, “Two decoding algorithms for tailbiting codes,” IEEE Trans. Commun., vol. 51, no. 10, pp. 1658–1665, Oct. 2003. [24] G. Solomon and H. C. A. van Tilborg, “A connection between block and convolutional codes,” SIAM J. Appl. Math., vol. 37, no. 2, pp. 358–369, 1979. [25] P. Ståhl, J. B. Anderson, and R. Johannesson, “Optimal and near-optimal encoders for short and moderate-length tail-biting trellises,” IEEE Trans. Inform. Theory, vol. 45, no. 7, pp. 2562–2571, Nov. 1999. [26] M. Tajima, K. Okino, and T. Miyagoshi, “Trellis complexity analysis of convolutional codes using reciprocal dual codes,” in Proc. SITA2004 (Japanese Ed.), pp. 91–94, Dec. 2004. [27] , “Simultaneous code/error-trellis reduction for convolutional codes using shifted code/error-subsequences,” in Proc. ISIT2011, pp. 2409–2413, Aug. 2011. [28] M. Tajima and K. Okino, “Error-trellises for tailbiting convolutional codes,” in Proc. ISITA2012, pp. 648–652, Oct. 2012. [29] M. Tajima, “Trellis reduction for tail-biting convolutional codes using characteristic matrices and cyclically shifted code-subsequences,” IEICE Technical Report (Japanese Ed.), IT2016-108, pp. 61–66, March 2017. [30] H.-H. Tang and M.-C. Lin, “On (n, n-1) convolutional codes with low trellis complexity,” IEEE Trans. Commun., vol. 50, no. 1, pp. 37–47, Jan. 2002. [31] H.-H. Tang, M.-C. Lin, and B. F. U. Filho, “Minimal trellis modules and equivalent convolutional codes,” IEEE Trans. Inform. Theory, vol. 52, no. 8, pp. 3738–3746, Aug. 2006. [32] E. A. Weaver, “Minimality and duality of tail-biting trellises for linear codes,” Ph.D. dissertation, submitted to the University of Kentucky, Lexington, Kentucky, USA, April 2012. [33] C. Weiss, C. Bettstetter, and S. Riedel, “Code construction and decoding of parallel concatenated tail-biting codes,” IEEE Trans. Inform. Theory, vol. 47, no. 1, pp. 366–386, Jan. 2001. Masato Tajima (M’86–SM’13) was born in Toyama, Japan, on August 13, 1949. He received the B.E., M.E., and Dr. of Eng. degrees all in electrical engineering from Waseda University, Tokyo, Japan, in 1972, 1974, and 1979, respectively. He joined the Electronics Equipment Laboratory of Toshiba R&D Center in 1979, where he engaged in research and development of channel coding techniques with applications to satellite communication systems. From 1993 to 2006, he was with the Department of Intellectual Information Systems Engineering, Toyama University, first as an Associate Professor, next as a Professor. From 2006 to 2015, he was with the Graduate School of Science and Engineering, University of Toyama, as a Professor. He is currently a Professor Emeritus at University of Toyama. His research interests are in coding theory and its applications.
7cs.IT
arXiv:1705.00985v1 [cs.DS] 2 May 2017 Determinant-Preserving Sparsification of SDDM Matrices with Applications to Counting and Sampling Spanning Trees David Durfee∗ John Peebles† Richard Peng‡ Anup B. Rao§ May 3, 2017 Abstract We show variants of spectral sparsification routines can preserve the total spanning tree counts of graphs, which by Kirchhoff’s matrix-tree theorem, is equivalent to determinant of a graph Laplacian minor, or equivalently, of any SDDM matrix. Our analyses utilizes this combinatorial connection to bridge between statistical leverage scores / effective resistances and the analysis of random graphs by [Janson, Combinatorics, Probability and Computing ‘94]. This leads to a routine that in quadratic time, sparsifies a graph down to about n1.5 edges in ways that preserve both the determinant and the distribution of spanning trees (provided the sparsified graph is viewed as a random object). Extending this algorithm to work with Schur complements and approximate Choleksy factorizations leads to algorithms for counting and sampling spanning trees which are nearly optimal for dense graphs. We give an algorithm that computes a (1 ± δ) approximation to the determinant of any SDDM matrix with constant probability in about n2 δ −2 time. This is the first routine for graphs that outperforms general-purpose routines for computing determinants of arbitrary matrices. We also give an algorithm that generates in about n2 δ −2 time a spanning tree of a weighted undirected graph from a distribution with total variation distance of δ from the w -uniform distribution . 1 Introduction The determinant of a matrix is a fundamental quantity in numerical algorithms due to its connection to the rank of the matrix and its interpretation as the volume of the ellipsoid corresponding of the matrix. For graph Laplacians, which are at the core of spectral graph theory and spectral algorithms, the matrix-tree theorem gives that the determinant of the minor obtained by removing one row and the corresponding column equals to the total weight of all the spanning trees in the graph [Kir47] . Formally on a weighted graph G with n vertices we have:  det LG 1:n−1,1:n−1 = TG , where LG is the graph Laplacian of G and and TG is the total weight of all the spanning trees of G. As the all-ones vector is in the null space of LG , we need to drop its last row ∗ Georgia Institute of Technology. email:[email protected] Massachusetts Institute of Technology. email:[email protected] ‡ Georgia Institute of Technology. email:[email protected] § Georgia Institute of Technology. email:[email protected] † 1 and column and work with LG 1:n−1,1:n−1 , which is precisely the definition of SDDM matrices in numerical analysis [ST14]. The study of random spanning trees builds directly upon this connection between tree counts and determinants, and also plays an important role in graph theory [GRV09, AGM+ 10, FHHP11]. While there has been much progress in the development of faster spectral algorithms, the estimation of determinants encapsulates many shortcomings of existing techniques. Many of the nearly linear time algorithms rely on sparsification procedures that remove edges from a graph while provably preserving the Laplacian matrix as an operator, and in turn, crucial algorithmic quantities such as cut sizes, Rayleigh quotients, and eigenvalues. The determinant of a matrix on the other hand is the product of all of its eigenvalues. As a result, a worst case guarantee of 1 ± (ǫ/n) per eigenvalue is needed to obtain a good overall approximation, and this in turn leads to additional factors of n in the number of edges needed in the sparse approximate. Due to this amplification of error by a factor of n, previous works on numerically approximating determinants without dense-matrix multiplications [BDKZ15a, HAB14a, HMS15] usually focus on the log-determinant, and (under a nearly-linear running time) give errors of additive ǫn in the log determinant estimate, or a multiplicative error of exp(ǫn) for the determinant. The lack of a sparsification procedure also led to the running time of random spanning tree sampling algorithms to be limited by the sizes of the dense graphs generated in intermediate steps [KM09, MST15, DKP+ 16]. In this paper, we show that a slight variant of spectral sparsification preserves determinant approximations to a much higher accuracy than applying the guarantees to individual edges. Specifically, we show that sampling ω(n1.5 ) edges from a distribution given by leverage scores, or weight times effective resistances, produces a sparser graph whose determinant approximates that of the original graph. Furthermore, by treating the sparsifier itself as a random object, we can show that the spanning tree distribution produced by sampling a random tree from a random sparsifier is close to the spanning tree distribution in the original graph in total variation distance. Combining extensions of these algorithms with sparsification based algorithms for graph Laplacians then leads to quadratic time algorithms for counting and sampling random spanning trees, which are nearly optimal for dense graphs with m = Θ(n2 ). This determinant-preserving sparsification phenomenon is surprising in several aspects: because we can also show—both experimentally and mathematically—that on the complete graph, about n1.5 edges are necessary to preserve the determinant, this is one of the first graph sparsification phenomenons that requires the number of edges to be between >> n. The proof of correctness of this procedure also hinges upon combinatorial arguments based on the matrix-tree theorem in ways motivated by a result for Janson for complete graphs [Jan94], instead of the more common matrix-concentration bound based proofs [SS11, Tro12, CP15, Coh16]. Furthermore, this algorithm appears far more delicate than spectral sparsification: it requires global control on the number of samples, high quality estimates of resistances (which is the running time bottleneck in Theorem 4.1 below), and only holds with constant probability. Nonetheless, the use of this procedure into our determinant estimation and spanning tree generation algorithms still demonstrates that it can serve as a useful algorithmic tool. 2 1.1 Our Results def P We will use G = (V, E, w ) to denote weighted multigraphs, and d u = e:e∋u w e to denote the weighted degree of vertex u. The weight of a spanning tree in a weighed undirected multigraph is: Y def w (T ) = w e. e∈T def We will use TG to denote the total weight of trees, TG = result can be described by the following theorem: P T ∈T w (T ). Our key sparsification Theorem 1.1. Given any graph G and any parameter δ, we can compute in O(n2 δ−2 ) time a graph H with O(n1.5 δ−2 ) edges such that with constant probability we have (1 − δ) TG ≤ TH ≤ (1 + δ) TG . This implies that graphs can be sparsified in a manner that preserves the determinant, albeit to a density that is not nearly-linear in n. We show how to make our sparsification routine to errors in estimating leverage scores, and how our scheme can be adapted to implicitly sparsify dense objects that we do not have explicit access to. In particular, we utilize tools such as rejection sampling and high quality effective resistance estimation via projections to extend this routine to give determinant-preserving sparsification algorithms for Schur complements, which are intermediate states of Gaussian elimination on graphs, using ideas from the sparsification of random walk polynomials. We use these extensions of our routine to obtain a variety of algorithms built around our graph sparsifiers. Our two main algorithmic applications are as follows. We achieve the first algorithm for estimating the determinant of an SDDM matrix that is faster than general purpose algorithms for the matrix determinant problem. Since the determinant of an SDDM m corresponds to the determinant of a graph Laplacian with one row/column removed.  e n2 δ−2 Theorem 1.2. Given an SDDM matrix M , there is a routine DetApprox which in O time outputs D such that D = (1 ± δ) det(M ) with high probability A crucial thing to note which distinguishes the above guarantee from most other similar results is that we give a multiplicative approximation of the det(M ). This is much stronger than giving a multiplicative approximation of log det(M ), which is what other work typically tries to achieve. The sparsifiers we construct will also approximately preserve the spanning tree distribution, which we leverage to yield a faster algorithm for sampling random spanning trees. Our new algorithm improves upon the current fastest algorithm for general weighted graphs when one wishes to achieve constant—or slightly sub-constant—total variation distance. Theorem 1.3. Given an undirected,  weighted graph G = (V, E, w ), there is a routine ApproxTree 2 −2 e outputs a random spanning tree from a distribution that has which in expected time O n δ total variation distance ≤ δ from the w -uniform distribution on G. 3 1.2 1.2.1 Prior Work Graph Sparsification In the most general sense, a graph sparsification procedure is a method for taking a potentially dense graph and returning a sparse graph called a sparsifier that approximately still has many of the same properties of the original graph. It was introduced in [EGIN97] for preserving properties related to minimum spanning trees, edge connectivity, and related problems. [BK96] defined the notion of cut sparsification in which one produces a graph whose cut sizes approximate those in the original graph. [ST11] defined the more general notion of spectral sparsification which requires that the two graphs’ Laplacian matrices approximate each other as quadratic forms.1 2 ) edges from the original graph, yielding e In particular, this spectral sparsification samples O(n/ǫ 2 e a graph with O(n/ǫ ) whose quadratic forms—and hence, eigenvalues—approximate each other within a factor of (1 ± ǫ). This implies that their determinants approximate each other within (1 ± ǫ)n . This is not useful from the perspective of preserving the determinant: since one would need to samples Ω(n3 ) edges to get a constant factor approximation, one could instead exactly compute the determinant or sample spanning trees using exact algorithms with this runtime. All of the above results on sparsification are for undirected graphs. Recently, [CKP+ 17] has defined a useful notion of sparsification for directed graphs along with a nearly linear time algorithm for constructing sparsifiers under this notion of sparsification. 1.2.2 Determinant Estimation Exactly calculating the the determinant of an arbitrary matrix is known to be equivalent to matrix multiplication [BS83]. For approximately computing the log of the determinant, [IL11] uses the identity log(det(A)) = tr(log(B)) + tr(log(B −1 A)) to do this whenever one can find a matrix B such that the tr(log(B)) = log(det(B)) and tr(log(B −1 A)) = log(det(B −1 A) can both be quickly approximated.2 For the special case of approximating the log determinant of an SDD matrix, [HAB14b] applies this same identity recursively where the B matrices are a sequence of ultrasparsifiers that are inspired by the recursive preconditioning framework of [ST14]. They obtain a running time of O(m(n−1 ǫ−2 + ǫ−1 )polylog(nκ/ǫ)) for estimating the log determinant to additive error ǫ. [BDKZ15b] estimates the log determinant of arbitrary positive definite matrices, but has runtime that depends linearly on the condition number of the matrix. In contrast, our work is the first we know of that gives a multiplicative approximation of the determinant itself, rather than its log. Despite achieving a much stronger approximation guarantee, our algorithm has essentially the same runtime as that of [HAB14b] when the graph is dense. Note also that if one wishes to conduct an “apples to apples” comparison by setting their value of ǫ small enough in order to match our approximation guarantee, their algorithm would only achieve a runtime bound of O(mnδ−2 polylog(nκ/ǫ)), which is never better than our runtime and can be as bad as a factor of n worse.3 1 If two graphs Laplacian matrices approximate each other as quadratic forms then their cut sizes also approximate each other. 2 Specifically, they take B as the diagonal of A and prove sufficient conditions for when the log determinant of −1 B A can be quickly approximated with this choice of B. 3 This simplification of their runtime is using the substitution ǫ = δ/n which gives roughly (1±δ) multiplicative 4 1.2.3 Sampling Spanning Trees Previous works on sampling random spanning trees are a combination of two ideas: that they could be generated using random walks, and that they could be mapped from a random integer via Kirchoff’s matrix tree theorem. The former leads to running times of the form O(nm) [Bro89, Ald90], while the latter approach[Gue83, Kul90, CMN96, HX16] led to routines that run in O(nω ) time, where ω ≈ 2.373 is the matrix multiplication exponent [Wil12]. These approaches have been combined in algorithms by Kelner and Madry [KM09] and Madry, Straszak and Tarnawski [MST15]. These algorithms are based on simulating the walk more efficiently on parts of the graphs, and combining this with graph decompositions to handle the more expensive portions of the walks globally. Due to the connection with random-walk based spanning tree sampling algorithms, these routines often have inherent dependencies on the edge weights. Furthermore, on dense graphs their running times are still worse than the matrix-multiplication time routines. The previous best running time  for generating a random spanning tree from a weighted e n5/3 m1/3 log2 (1/δ) achieved by [DKP+ 16]. It works by combining a recursive graph was O procedure similar to those used in the more recent O(nω ) time algorithms [HX16] with spectral  5/3 13 2 e sparsification ideas, achieving a runtime of O(n m ). When m = Θ n , the algorithm in  e n7/3 time to produce a tree from a distribution that is o(1) away from the [DKP+ 16] takes O w -uniform distribution, which is slower by nearly a n1/3 factor than the algorithm given in this paper. Our algorithm can be viewed as a natural extension of the sparsification0-based approach from [DKP+ 16]: instead of preserving the probability of a single edge being chosen in a random spanning tree, we instead aim to preserve the entire distribution over spanning trees, with the sparsifier itself also considered as a random variable. This allow us to significantly reduce the sizes of intermediate graphs, but at the cost of a higher total variation distance in the spanning tree distributions. This characterization of a random spanning tree is not present in any of the previous works, and we believe it is an interesting direction to combine our sparsification procedure with the other algorithms. 1.3 Organization Section 2 will introduce the necessary notation and some of the previously known fundamental results regarding the mathematical objects that we work with throughout the paper. Section 3 will give a high-level sketch of our primary results and concentration bounds for total tree weight under specific sampling schemes. Section 4 leverages these concentration bounds to give a quadratic time sparsification procedure (down to Ω(n1.5 ) edges) for general graphs. Section 5 uses random walk connections to extend our sparsification procedure to the Schur complement of a graph. Section 6 utilizes the previous routines to achieve a quadratic time algorithm for computing the determinant of SDDM matrices. Section 7 combines our results and modifies previously known routines to give a quadratic time algorithm for sampling random spanning trees with low total variation distance. Section 8 extends our concentration bounds to random samplings where an arbitrary tree is fixed, and is necessary for the error accounting of our error in estimating the determinant for their algorithm. This simplification is also assuming δ ≤ 1, which is the only regime we analyze our algorithm in and thus the only regime in which we can compare the two. 5 random spanning tree sampling algorithm. Section 9 proves the total variation distance bounds given for our random sampling tree algorithm. 2 Background 2.1 Graphs, Matrices, and Random Spanning Trees The goal of generating a random spanning tree is to pick tree T with probability proportional to its weight, which we formalize in the following definition. Definition 2.1 (w -uniform distribution on trees). Let P rG T (·) be a probability distribution on TG such that Πe∈T0 w e P rG . T (T = T0 ) = TG We refer to P rG T (·) as the w -uniform distribution on the trees of G. When the graph G is unweighted, this corresponds to the uniform distribution on TG . We refer to P r G T (·) as the w -uniform distribution on TG . When the graph G is unweighted, this corresponds to the uniform distribution on TG . Furthermore, as we will manipulate the probability of a particular tree being chosen extensively, we will denote such probabilities with P rG (Tb), aka:     def P rG Tb = P rG T = Tb . T The Laplacian of a graph G = (V, E, w ) is an n × n matrix specified by: ( du if u = v def Luv = −w uv if u 6= v We will write LG when we wish to indicate which graph G that the Laplacian corresponds to and L when the context is clear. When the graph has multi-edges, we define w uv as the sum of weights of all the edges e that go between vertices u, v. Laplacians are natural objects to consider when dealing with random spanning trees due to the matrix tree theorem, which states that the determinant of L with any row/column corresponding to some vertex removed is the total weight of spanning trees. We denote this removal of a vertex u as L−u . As the index of vertex removed does not affect the result, we will usually work with L−n . Furthermore, we will use det (M ) to denote the determinant of a matrix. As we will work mostly with graph Laplacians, it is also useful for us to define the ‘positive determinant’ det+ , where we remove the last row and column. Using this notation, the matrix tree theorem can be stated as:  G . TG = det(LG −n ) = det+ L We measure the distance between two probability distributions by total variation distance. Definition 2.2. Given two probability distributions p and q on the same index set Ω, the total variation distance between p and q is given by X def 1 |p(x) − q(x)| . dT V (p, q) = 2 x∈Ω 6 Let G = (V, E, w ) be a graph and e ∈ E an edge. We write G/e to denote the graph obtained by contracting the edge e, i.e., identifying the two endpoints of e and deleting any self loops formed in the resulting graph. We write G\e to denote the graph obtained by deleting the edge e from G. We extend these definitions to G/F and G\F for F ⊆ E to refer to the graph obtained by contracting all the edges in F and deleting all the edges in F , respectively. Also, for a subset of vertices V1 , we use G[V1 ] to denote the graph induced on the vertex of V1 . letting G(V1 ) be the edges associated with L[V1 ,V1 ] in the Schur complement. 2.2 Effective Resistances and Leverage Scores The matrix tree theorem also gives connections to another important algebraic quantity: the def effective resistance between two vertices. This quantity is formally given as Ref f (u, v) = ⊺ χuv L−1 χuv where χuv is the indicator vector with 1 at u, −1 at v, and 0 everywhere else. Via the adjugate matrix, it can be shown that the effective resistance of an edge is precisely the ratio of the number of spanning trees in G/e over the number in G: Ref f (u, v) = TG/e . TG As w e · TG/e is the total weight of all trees in G that contain edge e, the fraction4 of spanning trees that contain e = uv is given by w e Ref f (u, v). This quantity is called the statistical leverage score of an edge, and we denote it by τ e . It is fundamental component of many randomized algorithms for sampling / sparsifying graphs and matrices [SS11, Vis12, Tro12]. The fact that τ e is the fraction of trees containing e also gives one way of deriving the sum of these quantities: Fact 2.3. (Foster’s Theorem) On any graph G we have X τ e = n − 1. e The resistance Ref f (u, v), and in turn the statistical leverage scores τ e can be estimated using linear system solves and random projections [SS11]. For simplicity, we follow the abstraction utilized by Madry, Straszak, and Tarnawski [MST15], except we also allow the intermediate linear system solves to utilize a sparsifier instead of the original graph. Lemma 2.4. (Theorem 2.1. of [MST15]) Let G = (V, E) be a graph with m edges. For every ǫ > 0 we can find in Õ(min{mǫ−2 , m + −2 log m ) nǫ−4 }) time an embedding of the effective resistance metric into ℜO(ǫ such that with high e ef f (u, v) of any effective resistance satisfying probability allows one to compute an estimate R ∀u, v ∈ V e ef f (u, v) ≤ Ref f (u, v) ≤ (1 + ǫ) R e ef f (u, v) . (1 − ǫ) R Specifically, each vertex u in this embedding is associated with an (explicitly stored) z u ∈ −2 log m ) e ef f (u, v) is given by: ℜO(ǫ , and for any pair of vertices, the estimate R e ef f (u, v) = kz u − z v k2 , R 2 which takes O(ǫ−2 log m) time to compute once we have the embedding. 4 provided one thinks of an edge with weight w as representing w parallel edges, or equivalently, counts spanning trees with multiplicity according to their weight 7 2.3 Schur Complements For our applications, we will utilize our determinant-preserving sparsification algorithms in recursions based on Schur complements. A partition of the vertices, which we will denote using V = V1 ⊔ V2 , partitions the corresponding graph Laplacian into blocks which we will denote using indices in the subscripts:   L[V1 ,V1 ] L[V1 ,V2 ] . L= L[V2 ,V1 ] L[V2 ,V2 ] The Schur complement of G, or L, onto V1 is then: −1   def G G LG Sc (G, V1 ) = Sc LG , V1 = LG [V2 ,V1 ] , [V1 ,V1 ] − L[V1 ,V2 ] L[V2 ,V2 ]  and we will use Sc (G, V1 ) and Sc LG , V1 interchangeably. We further note that we will always consider V1 to be the vertex set we Schur complement onto, and V2 to be the vertex set we eliminate, except for instances in which we need to consider both Sc (G, V1 ) and Sc (G, V2 ). Schur complements behave nicely with respect to determinants determinants, which suggests the general structure of the recursion we will use for estimating the determinant. Fact 2.5. For any matrix M where M [V2 ,V2 ] is invertible,  det (M −n ) = det M [V2 ,V2 ] · det+ (Sc (M , V1 )). This relationship also suggests that there should exist a bijection between spanning tree distribution in G and the product distribution given by sampling spanning trees independently from Sc (L, V1 ) and the graph Laplacian formed by adding one row/column to L[V2 ,V2 ] . Finally, our algorithms for approximating Schur complements rely on the fact that they preserve certain marginal probabilities. The algorithms of [CDN89, CMN96, HX16, DKP+ 16] also use variants of some of these facts, which are closely related to the preservation of the spanning tree distribution on Sc (L, V1 ). (See Section 7 for details.) Fact 2.6. Let V1 be a subset of vertices of a graph G, then for any vertices u, v ∈ V1 , we have: Sc(G,V1 ) RG ef f (u, v) = Ref f (u, v) . Theorem 2.7 (Burton and Premantle [BP93]). For any set of edges F ⊆ E in a graph G = (V, E, w ), the probability F is contained in a w -uniform random spanning tree is P rG T (F ⊆ T ) = det(M (L,F ) ), where M (L,F ) is a |F |×|F | matrix whose (e, f )’th entry, for e, f ∈ F, is given by By a standard property of Schur complements (see [HJ12]), we have  L−1 [V1 , V1 ] = Sc (G, V1 )† . p w (e)w (f )χTe L† χf . Here (L† )[V1 , V1 ] is the minor of L† with row and column indices in V1 . This immediately implies that when F is incident only on vertices in V1 , we have M (L,F ) = M (Sc(G,V1 ),F ). Putting these together, we have 8 Fact 2.8. Given a partition of the vertices V = V1 ⊔ V2 . For any set of edges F contained in G[V1 ], we have Sc(G,V1 ) (F ⊆ T ). P rG T (F ⊆ T ) = P r T 3 Sketch of the Results The starting point for us is the paper by Janson [Jan94] which gives (among other things) the limiting distribution of the number of spanning trees in the Gn,m model of random graphs. Our concentration result for the number of spanning trees in the sparsified graph is inspired by this paper, and our algorithmic use of this sparsification routine is motivated by sparsification based algorithms for matrices related to graphs [PS14, CCL+ 15, KLP+ 16]. The key result we will prove is a concentration bound on the number of spanning trees when the graph is sparsified by sampling edges with probability approximately proportional to effective resistance. 3.1 Concentration Bound Let G be a weighted graph with n vertices and m edges, and H be a random subgraph obtained by choosing a subset of edges of size s uniformly randomly. The probability of a subset of edges, which could either be a single tree, or the union of several trees, being kept in H can be bounded precisely. Since we will eventually choose s > n1.5 , we will treat the quantity n3 /s2 as negligible. The probability of H containing a fixed tree was shown by Janson to be: Lemma 3.1. If m ≥ s2 n, then for any tree T , the probability of it being included in H is  2  3  n n (s)n−1 n−1 =p · exp − − O . PrH [T ∈ H] = (m)n−1 2s s2 where (a)b denotes the product a · (a − 1) · · · (a − (b − 1)). By linearity of expectation, the expected total weight of spanning trees in H is:  2  3  n n EH [TH ] = TG · pn−1 · exp − − O . (1) 2s s2 hP i   As in [Jan94], the second moment, EH TH2 = EH w (T )w (T )P r (T , T ∈ H) , can 1 2 1 2 (T1 ,T2 ) be written as a sum over all pairs of trees (T1 , T2 ) . Due to symmetry, the probability of a particular pair of trees T1 , T2 both being subgraphs of H depends only on the size of their intersection. The following bound is shown in Appendix A. Lemma 3.2. Let G be a graph with n vertices and m edges, and H be a uniformly random 2 subset of s > 10n edges chosen from G, where m ≥ sn . Then for any two spanning trees T1 and T2 of G with |T1 ∩ T2 | = k, we have: PrH [T1 , T2 ∈ H] ≤ p 2n−2  2n2 exp − s where p = s/m. 9   k 1 2n , 1+ p s The crux of the bound on the second moment in Janson’s proof is getting a handle on the number of tree pairs (T1 , T2 ) with |T1 ∩ T2 | = k in the complete graph where all edges are symmetric. An alternate way to obtain a bound on the number of spanning trees can also be obtained using leverage scores, which describe the fraction of spanning trees that utilize a single edge. A well known fact about random spanning tree distributions [BP93] is that the edges are negatively correlated: Fact 3.3 (Negative Correlation). Suppose F is subset of edges in a graph G, then G P rG T (F ⊆ T ) ≤ Πe∈F P r T (e ∈ T ) . An easy consequence of Fact 3.3 is Lemma 3.4. For any subset of edges F we have that the total weight of all spanning trees containing F is given by X Y τ e. w (T ) ≤ TG e∈F T is a spanning tree of G F ⊆T The combinatorial view of all edges being interchangable in the complete graph can therefore be replaced with an algebraic view in terms of the leverage scores. Specifically, invoking n gives the following lemma Lemma 3.4 in the case where all edges have leverage score at most m which is proven in Appendix A. Lemma 3.5. In a graph G where all edges have leverage scores at most X T1 ,T2 |T1 ∩T2 |=k w (T1 ) · w (T2 ) ≤ TG2 1 · k!  n2 m n m, we have k With Lemma 3.5, we can finally prove the following bound on the second moment which gives our concentration result. Lemma 3.6. Let G be a graph on n vertices and m edges such that all edges have statistical 2 n leverage scores ≤ m . For a random subset of s > 10n edges, H, where m ≥ sn we have:  3    3   2   n n n 2 = E [T ] exp O . EH TH2 ≤ TG2 p2n−2 exp − + O H H s s2 s2 Proof. By definition of the second moment, we have: X   w (T1 ) · w (T2 ) · PrH [T1 ∪ T2 ⊆ H] . EH TH2 = T1 ,T2 Re-writing the above sum in terms of the size of the intersection k, and invoking Lemma 3.2 gives:  EH TH2  ≤ n−1 X k=0 X T1 ,T2 |T1 ∩T2 |=k w (T1 ) · w (T2 ) · p 10 2n−2  2n2 exp − s   k 1 2n . 1+ p s Note that the trailing term only depends on k and can be pulled outside the summation of T1 , T2 , so we then use Lemma 3.5 to bound this by:  EH TH2  ≤ n−1 X k=0 TG2 1 · k!  n2 m k ·p 2n−2  2n2 exp − s   k 1 2n . 1+ p s Which upon pulling out the terms that are independent of k, and substituting in p = s/m gives:  EH TH2  ≤ TG2 ·p 2n−2  2n2 · exp − s  n−1 k X 1  n2  2n · . · 1+ k! s s k=0 From the Taylor expansion of exp(·), we have:   2     n 2n 2n2 · exp 1+ EH TH2 ≤ TG2 · p2n−2 · exp − s s s  2   3  n n = TG2 · p2n−2 · exp − . · exp O s s2 This bound implies that once we set s2 > n3 , the variance becomes less than the square of the expectation. It forms the basis of our key concentration results, which we show in Section 4, and also leads to Theorem 1.1. In particular, we demonstrate that this sampling scheme extends to importance sampling, where edges are picked with probabilities proportional to (approximations of) of their leverage scores. A somewhat surprising aspect of this concentration result is that there is a difference between models Gn,m and the Erdos-Renyi model Gn,p when the quantity of interest is the number of spanning trees. In particular, the number of spanning trees of a graph G ∼ Gn,m is approximately normally distributed when m = ω n1.5 , whereas it has approximate log-normal distribution when G ∼ Gn,p and p < 1. An immediate consequence of this is that we can now approximate det+ (LG ) by computing det+ (LH ). It also becomes natural to consider speedups of random spanning tree sampling algorithms that generate a spanning tree from a sparsifier. Note however that we cannot hope to preserve the distribution over all spanning trees via a single sparsifier, as some of the edges are no longer present. To account for this change in support, we instead consider the randomness used in generating the sparsifier as also part of the randomness needed to produce spanning trees. In Section 9.1, we show that just bounds on the variance of TH suffices for a bound on the TV distances of the trees. Lemma 3.7. Suppose H is a distribution over rescaled subgraphs of G such that for some parameter some 0 < δ < 1 we have   EH∼H TH2 ≤ 1 + δ, EH∼H [TH ]2 11 and for any tree T̂ and any graph from the distribution that contain it, H we have:     h i−1 E ′ H ∼H [TH ′ ] , w H Tb = w G Tb · PrH ′ ∼H Tb ⊆ H ′ · TG   then the distribution given by P rG (T ), p, and the distribution induced by EH∼H P rH (T ) , p̃ satisfies √ dT V (p, p̃) ≤ δ. Note that uniform sampling meets the property about w H (T ) because of linearity of expectation. We can also check that the importance sampling based routine that we will discuss in Section 4.2 also meets this criteria. Combining this with the running time bounds from Theorem 1.1, as well as the Õ(m1/3 n5/3 ) time random spanning tree sampling algorithm from [DKP+ 16] then leads to a faster algorithm. Corollary 3.8. For any graph G on n vertices and any δ > 0, there is an algorithm that generates a tree from a distribution whose total variation is at most δ from the random tree 13 distribution of G in time Õ(n 6 =2.1666... δ−2/3 + n2 δ−2 ). 3.2 Integration Into Recursive Algorithms As a one-step invocation of our concentration bound leads to speedups over previous routines, we investigate tighter integrations of the sparsification routine into algorithms. In particular, the sparsified Schur complement algorithms [KLP+ 16] provide a natural place to substitute spectral sparsifiers with determinant-preserving ones. In particular, the identity of det+ (L) = det (L[V2 ,V2 ] ) · det+ (Sc (L, V1 )). where det+ is the determinant of the matrix minor, suggests that we can approximate det (L−n ) by approximating det (L[V2 ,V2 ] ) and det+ (Sc (L, V1 )) instead. Both of these subproblems are smaller by a constant factor, and we also have |V1 | + |V2 | = n. So this leads to a recursive scheme where the total number of vertices involved at all layers is O(n log n). This type of recursion underlies both our determinant estimation and spanning tree sampling algorithms. The main difficulty remaining for the determinant estimation algorithm is then sparsifying Sc (G, V1 ) while preserving its determinant. For this, we note that some V1 are significantly easier than others: in particular, when V2 = V \ V1 is an independent set, the Schur complement of each of the vertices in V2 can be computed independently. Furthermore, it is well understood how to sample these complements, which are weighted cliques, by a distribution that exceeds their true leverage scores. Lemma 3.9. There is a procedure that takes a graph G with n vertices, a parameter δ, and produces in Õ(n2 δ−1 ) time a subset of vertices V1 with |V1 | = Θ(n), along with a graph H V1 such that TSc(G,V1 ) exp (−δ) ≤ EH V1 [TH V1 ] ≤ TSc(G,V1 ) exp (δ) , and   EH V1 TH2 V1 EH V1 [TH V1 ]2 12 ≤ exp (δ) . Lemma 2.4 holds w.h.p., and we condition on this event. In our algorithmic applications we will be able to add the polynomially small failure probability of Lemma 2.4 to the error bounds. The bound on variance implies that the number of spanning trees is concentrated close to its expectation, TSc(G,V1 ) , and that a random spanning tree drawn from the generated graph H V1 is —over the randomness of the sparsification procedure—close in total variation distance to a random spanning tree of the true Schur complement. As a result, we can design schemes that: 1. Finds an O(1)-DD subset V2 , and set V1 ← V \ V2 . 2. Produce a determinant-preserving sparsifier H V1 for Sc (G, V1 ). 3. Recurse on both L[V2 ,V2 ] and H V1 . However, in this case, the accumulation of error is too rapid for yielding a good approximation of determinants. Instead, it becomes necesary to track the accumulation of variance during all recursive calls. Formally, the cost of sparsifying so that the variance is at most δ is about n2 δ−1 , where δ is the size of the problem. This means that for a problem on Gi of size βi n for 0 ≤ βi ≤ 1, we can afford an error of βi δ when working with it, since: 1. The sum of βi on any layer is at most 2, 5 so the sum of variance per layer is O(δ). 2. The cost of each sparsification step is now βi n2 δ−1 , which sums to about n2 δ−1 per layer. Our random spanning tree sampling algorithm in Section 7 is similarly based on this careful accounting of variance. We first modify the recursive Schur complement algorithm introduced by Coulburn et al. [CDN89] to give a simpler algorithm that only braches two ways at each step in Section 7.1, leading to a high level scheme fairly similar to the recursive determinant algorithm. Despite these similarities, the accumulation of errors becomes far more involved here due to the choice of trees in earlier recursive calls affecting the graph in later steps. More specifically, the recursive structure of our determinant algorithm can be considered analogous to a breadth-first-search, which allows us to consider all subgraphs at each layer to be independent. In contrast, the recursive structure of our random spanning tree algorithm, which we show in Section 7.2 is more analogous to a depth-first traversal of the tree, where the output solution of one subproblem will affect the input of all subsequent subproblems. These dependency issues will be the key difficulty in considering variance across levels. The total variation distance tracks the discrepancy over all trees of G between their probability of being returned by the overall recursive algorithm, and their probability in the w -uniform distribution. Accounting for this over all trees leads us to bounding variances in the probabilities of individual trees being picked. As this is, in turn, is equivalent to the weight of the tree divided by the determinant of the graph, the inverse of the probability of a tree being picked can play a simliar role to the determinant in the determinant sparsification algorithm described above. However, tracking this value requires analyzing extending our concentration bounds to the case where an arbitrary tree is fixed in the graph and we sample from the remaining edges. We study this Section 8, prove bounds analogous to the concentration bounds from Section 4, and incorporate the guarantees back into the recursive algorithm in Section 7.2. 5 each recursive call may introduce one new vertex 13 4 Determinant Preserving Sparsification In this section we will ultimately prove Theorem 1.1, our primary result regarding determinantpreserving sparsification. However, most of this section will be devoted to proving the following general determinant-preserving sparsification routine that also forms the core of subsequent algorithms: Theorem 4.1. Given an undirected, weighted graph G = (V, E, w ), an error threshold ǫ > 0, parameter ρ along with routines: P 1. SampleEdgeG () that samples an edge e from a probability distribution p ( e p e = 1), as well as returning the corresponding value of p e . Here p e must satisfy: τe ≤ ρ · pe n−1 where τ e is the true leverage score of e in G. 2. ApproxLeverageG (u, v, ǫ) that returns the leverage score of an edge u, v in G to an error of ǫ. Specifically, given an edge e, it returns a value τee such that: (1 − ǫ) τ e ≤ τee ≤ (1 + ǫ) τ e . There is a routine DetSparsify(G, s, ǫ) that computes a graph H with s edges such that its tree count, TH , satisfies:   3  n , EH [TH ] = TG 1 ± O s2 and:   EH TH2 EH [TH ]2 ≤ exp  ǫ2 n 2 +O s  n3 s2  Furthermore, the expected running time is bounded by: 1. O(s · ρ) calls to SampleEdgeG (e) and ApproxLeverage(e) with constant error, 2. O(s) calls to ApproxLeverage(e) with ǫ error. We establish guarantees for this algorithm using the following steps: 1. Showing that the concentration bounds as sketched in Section 3 holds for approximate leverage scores in Section 4.1. 2. Show via taking the limit of probabilistic processes that the analog of this process works for sampling a general graph where edges can have varying leverage scores. This proof is in Section 4.2. 3. Show via rejection sampling that (high error) one sided bounds on statistical leverage scores, such as those that suffice for spectral sparsification, can also be to do the initial round of sampling instead of two-sided approximations of leverage scores. This, as well as pseudocode and guarantees of the overall algorithm are given in Section 4.3. 14 4.1 Concentration Bound with Approximately Uniform Leverage Scores Similar to the simplified proof as outlined in Section 3, our proofs relied on uniformly sampling 2 s edges from a multi-graph with m ≥ sn edges, such that all edges have leverage score within multiplicative 1 ± ǫ of n−1 s , aka. approximately uniform. The bound that we prove is an analog of Lemma 3.6 2 Lemma 4.2. Given a weighted multi-graph G such that m ≥ sn , s ≥ n, and all edges e ∈ E ≤ τ e ≤ (1+ǫ)(n−1) , with 0 ≤ ǫ < 1, then have (1−ǫ)(n−1) m m    3   2 2 EH TH2 n n ǫ +O 2 ≤ exp s s2 EH [TH ] Similar to the proof of Lemma 3.6 in Section 3, we can utilize the bounds on the probability of k edges being chosen using Lemma 3.2. The only assumption that changed was the bounds on τ e , which does not affect EH [TH ]2 . The only term that changes is our upper bound the total weight of trees that contain some subset of k edges that was the produce of k leverage scores. At a glance, this product can change by a factor of up to (1 + ǫ)k , which when substituted naively into the proof of Lemma 3.2 directly would yield an additional term of  2  n ǫ , exp s and in turn necessitating ǫ < n−1/2 for a sample count of s ≈ n1.5 . However, note that this is the worst case distortion over a subset F . The upper bound that we use, Lemma 3.5 sums over these bounds over all subsets, and over all edges we still have X e ∈ Gτ e = n − 1. Incorporating this allows us to show a tighter bound that depends on ǫ2 .  m Similar to the proof of Lemma 3.5, we can regroup the summation over all subsets of k P Q E(G), and bound the fraction of trees containing each subset F via T :F ⊆T w (T ) ≤ TG e∈F τ e via Lemma 3.4. Y X X τ 2e w (T1 ) · w (T2 ) ≤ TG2 F ⊆E |F |=k T1 ,T2 |T1 ∩T2 |=k e∈F P The proof will heavily utilize the fact that e∈E τ e = n − 1. We bound this in first two steps: first treat it as a symmetric product over τ 2e , and bound the total as a function of X τ 2e , e P then we bound this sum using the fact that e τ e = n − 1. The first step utilizes the concavity of the product function, and bound the total by the sum: P Lemma 4.3. For any set of non-negative values x 1 . . . x m with i x i ≤ z, we have    X Y m z k . xi ≤ m k F ⊆[1...m] i∈F |F |=k 15  z Proof. We claim that this sum is maximized when x i = m for all e. Consider fixing all variables other than some x i and x j , which we assume to be x 1 ≤ x 2 without loss of generality as the function is symmetric on all variables:     X Y F ⊆[1...m] i∈F |F |=k  X x i = x 1x 2   Y F ⊆[3...m] i∈F |F |=k−2  X   x i  + (x 1 + x 2 ) ·  Y F ⊆[3...m] i∈F |F |=k−1  x i + X Y x i. F ⊆[3...m] i∈F |F |=k Then if x 1 < x 2 , locally changing their values to x 1 + ǫ and x 2 − ǫ keeps the second term the same. While the first term becomes (x 1 + ǫ) (x 2 − ǫ) = x 1 x 2 + ǫ (x 2 − x 1 ) − ǫ2 , which is greater than x 1 x 2 when 0 < ǫ < (x 2 − x 1 ). This shows that the overall summation is maximized when all x i are equal, aka z , m xi = which upon substitution gives the result. The second step is in fact the k = 1 case of Lemma 3.5. Lemma 4.4. For any set of values y e such that X y = n − 1, e and (1 + ǫ) n (1 − ǫ) n ≤ ye ≤ , m m we have X e y 2e ≤ (1 + ǫ2 )(n − 1)2 . m Proof. Note that for any a ≤ b, and any ǫ, we have (a − ǫ)2 + (b + ǫ)2 = a2 + b2 + 2ǫ2 + 2ǫ (b − a) , and this transformation must increase the sum for ǫ > 0. This means the sum is maximized and the other half are (1+ǫ)(n−1) . This then gives when half of the leverage scores are (1−ǫ)(n−1) m m X e∈E y 2e m ≤ 2  (1 + ǫ)(n − 1) m 2 m + 2  (1 − ǫ)(n − 1) m 16 2 = (1 + ǫ2 )(n − 1)2 . m Proof. (of Lemma 4.2) We first derive an analog of Lemma 3.5 for bounding the total weights of pairs of trees containing subsets of size k, where we again start with the bounds X T1 ,T2 |T1 ∩T2 |=k X w (T1 ) · w (T2 ) ≤ X F ⊆E T1 ,T2 |F |=k F ⊆T1 ∩T2 w (T1 ) · w (T2 ) = X F ⊆E |F |=k   X T :F ⊆T 2 w (T ) Applying Lemma 3.4 to the inner term of the summation then gives X X Y w (T1 ) · w (T2 ) ≤ TG2 · τ 2e F ⊆E |F |=k T1 ,T2 |T1 ∩T2 |=k The bounds on τ e and P e τe e∈F = n − 1 gives, via Lemma 4.4 X e τ 2e ≤ (1 + ǫ2 )(n − 1)2 . m Substituting this into Lemma 4.3 with x i = τ 2e then gives X Y τ 2e F ⊆E e∈F |F |=k k k   k   mk (1 + ǫ2 )n2 1 (1 + ǫ2 )n2 m (1 + ǫ2 )n2 ≤ = . ≤ m2 k! m2 k! m k which implies our analog of Lemma 3.5 X T1 ,T2 |T1 ∩T2 |=k w (T1 ) · w (T2 ) ≤ TG2 1 · k!  (1 + ǫ2 )n2 m k . We can then duplicate the proof of Lemma 3.6. Similar to that proof, we can regroup the summation by k = |T1 ∩ T2 | and invoking Lemma 3.2 to get:  EH TH2  ≤ n−1 X k=0 X T1 ,T2 |T1 ∩T2 |=k w (T1 ) · w (T2 ) · p 2n−2  2n2 exp − s   k 1 2n . 1+ p s where p = s/m. When incorporated with our analog of Lemma 3.5 gives:  EH TH2  ≤ n−1 X k=0 p 2n−2    k  k 1 (1 + ǫ2 )n2 2n 2 1 · TG 1+ p s k! m  n−1 k  X 1  (1 + ǫ2 )n2  2n 2n2 2 2n−2 . · · 1+ = TG p · exp − s k! s s 2n2 exp − s k=0 17 P zk k k! ≤ exp(z) then leaves us with:  3   2  2 n n 2 ǫ2 n 2 2n−2 +O EH TH ≤ TG · p · exp − + s s s2 Substituting in the Taylor expansion of and finishes the proof. 4.2 Generalization to Graphs with Arbitrary Leverage Score Distributions 2 The first condition of m ≥ sn will be easily achieved by splitting each edge a sufficient number of times, which does not need to be done explicitly in the sparsification algorithm. Furthermore, from the definition of statistical leverage score splitting an edge into k copies will give each copy a kth fraction of the edge’s leverage score. Careful splitting can then ensure the second condition, but will require ǫ-approximate leverage score estimates on the edges. The simple approach would compute this for all edges, then split each edge according to this estimate and draw from the resulting edge set. Instead, we only utilize this algorithm as a proof technique, and give a sampling scheme that’s equivalent to this algorithm’s limiting behavior as m → ∞. Pseudocode of this routine is in Algorithm 1. Algorithm 1: IdealSparsify(G, τe, s): Sample s (multi) edges of G to produce H such that TG ≈ TH . Input: Graph G, approximate leverage scores τe, sample count s 1 Initialize H as the empty graph, H ← ∅; 2 for i = 1 . . . s do 3 Pick edge e with probability proportional to τee ; 4 Add e to H with new weight: 5 Output H w e (n − 1) exp τee s  n2 2 (n − 1) s  . Note that this sampling scheme is with replacement: the probability of a ‘collision’ as the number of copies tend to ∞ is sufficiently small that it can be covered by the proof as well. The guarantee that we will show for Algorithm 1 is: Lemma 4.5. For any graph G and any set of approximate leverage scores τe such that (1 − ǫ) τ e ≤ τee ≤ (1 + ǫ) τ e for all edges e. The graph H = IdealSparsify(G, τe, s) satisfies:   3  n TG ≤ EH [TH ] ≤ TG , 1−O s2 and   EH TH2   2 2  ǫ n n3 ≤ exp O + 2 . s s EH [TH ]2 18 Our proof strategy is simple: claim that this algorithm is statistically close to simulating splitting each edge into a very large number of copies. Note that these proofs are purely for showing the convergence of statistical processes, so all that’s needed is for the numbers that arise in this proof (in particular, m) to be finite. We first show that G and τe can be perturbed to become rational numbers. (G) (G) Lemma 4.6. For any graph G and any set of τe such that (1 − ǫ)τ e ≤ τee ≤ (1 + ǫ)τ e for all edges e for some constant ǫ > 0, and any perturbation threshold δ, we can find graph G′ with all edge weights rationals, and τe′ with all entries rational numbers such that: 1. TG ≤ TG′ ≤ (1 + δ)TG , and (G′ ) 2. (1 − 2ǫ)τ e (G′ ) ≤ τe′e ≤ (1 + 2ǫ)τ e for all edges e. Proof. This is a direct consequence of the rational numbers being everywhere dense, and that perturbing edge weights by a factor of 1±α perturbs leverage scores by a factor of up to 1±O(α), and total weights of trees by a factor of (1 ± α)n−1 . Having all leverage scores as integers means that we can do an exact splitting by setting m, the total number of split edges, to a multiple of the common denominator of all the τe′e values times n − 1. Specifically, an edge with approximate leverage score τe′e becomes τe′e · copies, each with weight m n−1 w e (n − 1) , τe′e m and ‘true’ leverage score τ e (n − 1) . τe′e m In particular, since (1 − 2ǫ) ≤ τe ≤ (1 + 2ǫ) , τee this splitted graph satisfies the condition of Lemma 4.2. This then enables us to obtain the guarantees of Lemma 4.5 by once again letting m tend to ∞. Proof. (of Lemma 4.5) We first show that Algorithm 1 works for the graph with rational weights and approximate leverage scores as generated by Lemma 4.6. The condition established above means that we can apply Lemma 4.2 to the output of picking s random edges among these m split copies. This graph H ′ satisfies  2  3   s n−1 n n exp − − O EH ′ [TH ′ ] = TG′ , m 2s s2 and   EH ′ TH2 ′ EH ′ [TH ′ ]2 ≤ exp  n 2 ǫ2 +O s 19  n3 s2  . The ratio of the second moment is not affected by rescaling, so the graph   m n2 H ′′ ← exp s 2s (n − 1) meets the requirements on both the expectation and variances. Furthermore, the rescaled weight of an single edge being picked is:     n2 w e (n − 1) m n2 w e (n − 1) · exp exp = , s 2s (n − 1) 2s (n − 1) τe′e m τe′e s which is exactly what Algorithm 1 assigns. It remains to resolve the discrepancy between sampling with and without replacement: the probability of the same edge being picked twice in two different steps is at most 1/m, so the total probability of a duplicate sample is bounded by s2 /m. We then give a finite bound on the size of m for which this probability becomes negligible in our routine. The rescaling factor of a single edge is (very crudely) bounded by    1 n2 (n − 1) , ≤ exp n3 exp ′ 2s (n − 1) mine τe′e τee s which means that any of the H ′′ returned must satisfy  n  1 4 TH ′′ ≤ exp n T G′ , mine τe′e which is finite. As a result, as m → ∞, the difference that this causes to both the first and second moments become negligible. The result for H ← IdealSparsify(G, τe, s) then follows from the infinitesimal perturbation made to G, as the rational numbers are dense everywhere. 4.3 Incorporating Crude Edge Sampler Using Rejection Sampling Under Lemma 4.5 we assumed access to ǫ-approximate leverage scores, which could be computed with m calls to our assumed subroutine ApproxLeverageG , where m here is the number of edges of G. However, we roughly associate ApproxLeverageG with Lemma 2.4 that requires Õ(ǫ−2 ) time per call (and we deal with the w.h.p. aspect in the proof of Theorem 1.1), and to achieve our desired sparsification of O(n1.5 ) edges, we will need ǫ = n−1/4 for the necessary concentration bounds. Instead, we will show that we can use rejection sampling to take s edges drawn from approximate leverage scores using a cruder distribution p e , which will only require application of ApproxLeverageG with error ǫ for an expected O(s) number of edges. Rejection sampling is a known technique that allows us to sample from some distribution f by instead sampling from a distribution g that approximates f and accept the sample with a specific probability based on the probability of drawing that sample from f and g. More specifically, suppose we are given two probability distributions f and g over the same state space X, such that for all x ∈ X we have Cg(x) ≥ f (x) for some constant C. Then we f (x) . can draw from f by instead drawing x ∼ g, and accepting the draw with probability Cg(x) 20 This procedure only requires a lower bound on g with respect to f , but in order to accept a draw with constant probability, there need to be weaker upper bound guarantees. Our guarantees on τee will fulfill these requirements, and the rejection sampling will accept a constant fraction of the draws. By splitting into a sufficient number of edges, we ensure that drawing the same multi-edge from any split edge will occur with at most constant probability. Specifically, each sample is drawn via. the following steps: 1. Draw a sample according the distribution g, e. 2. Evaluate the values of f (e) and g(e). 3. Keep the sample with probability f (e)/g(e). As the running time of ApproxLeverageG (e, ǫ) will ultimately depend on the value of ǫ apply this algorithmic framework, we also need to perform rejection sampling twice, once with constant error, and once with leverage scores extracted from the true approximate distribution. Pseudocode of this routine is shown in Algorithm 2. Algorithm 2: DetSparsify(G, s, SampleEdgeG ()), ρ, ApproxLeverageG (u, v, ǫ)): Sample s (multi) edges of G to produce H such that TG ≈ TH . Input: Graph G. Sample count s, leverage score approximation error 0 < ǫ < 1/2, P SampleEdgeG () that samples an edge e from a probability distribution p ( e p e = 1), and returning the corresponding value of p e . ρ that bounds the under-sampling rate of SampleEdgeG (). ApproxLeverageG (u, v, ǫ) that returns the approximate leverage score of an edge u, v in G to an error of ǫ. 1 Initialize H as the empty graph, H ← ∅; 2 while H has fewer than s edges do 3 e, p e ← SampleEdgeG (). 2 ApproxLeverageG (u, v, 0.1) 4 Let p ′e ← n−1 5 Reject e with probability 1 − p ′e /(4ρ · p e ). 1 ApproxLeverageG (u, v, ǫ) 6 Let p ′′e ← n−1 7 Reject e with probability 1 − p ′′e /p ′e . 8 Add e to H with new weight we exp p ′′e s 9  n2 2(n − 1)s  . Output H We first show that this routine will in fact sample edges according to ǫ-approximate leverage scores, as was assumed in IdealSparsify Lemma 4.7. The edges are being sampled with probability proportional to τe(G,ǫ) , the leverage score estimates given by ApproxLeverageG (·, ǫ). 21 Note that this algorithm does not, at any time, have access to the full distribution τe(G,ǫ) . Proof. Our proof will assume the known guarantees of rejection sampling, which is to say that the following are true: 1. Given distributions p and p ′ , sampling an edge e from p and accepting with probability p ′e /(4ρ · p e ) is equivalent to drawing an edge from p ′ as long as p ′e /(4ρ · p e ) ∈ [0, 1] for all e. 2. Given distributions p ′ and p ′′ , sampling an edge e from p ′ and accepting with probability p ′′e /p ′e is equivalent to drawing an edge from p ′′ as long as p ′′e /p ′e ∈ [0, 1] for all e. As a result, we only need to check that p ′e /(4ρp e ) and p ′′e /p ′e are at most 1. The guarantees of SampleEdgeG () gives τe ≤ ρp e . n−1 As p ′e was generated with error 1.1, we have p ′e ≤ 2.2τ e ≤ 2.2ρp e , (n − 1) so p ′e /(4ρp e ) ≤ 1. To show p ′′e /p ′e ≤ 1, once again the guarantees of SampleEdgeG () gives: p ′′e ≤ (1 + ǫ) τe τe ≤ 2 · 0.9 ≤ p ′e . n−1 n−1 It remains to show that this rejection sampling process still makes sufficiently progress, yet also does not call ApproxLeverageG (e, ǫ) (the more accurate leverage score estimator) too many times. Lemma 4.8. At each step, the probability of DetSparsify calling ApproxLeverageG (e, ǫ) 1 is at most ρ1 , while the probability of it adding an edge to H is at least 8ρ . P Proof. The proof utilizes the fact e τ e = n − 1 (Fact 2.3) extensively. If the edge e is picked, ApproxLeverageG (e, ǫ) is called with probability 2.2τ e p ′e ≤ 4ρ · p e 4ρ · p e · (n − 1) Summing over this over all edge e by the probability of picking them gives: P X 2.2 e τ e 2.2τ e 1 pe = ≤ . 4ρ · p e · (n − 1) 4ρ · (n − 1) ρ e On the other hand, the probability of picking edge e, and not rejecting it is: pe · p ′′ τe(G,ǫ) p ′e · e′ = . 4ρ · p e p e 4ρ(n − 1) 22 where this follows by cancellation and how we set p ′′e in our algorithm. Summing over all edges then gives the probability of not rejecting an edge to be X e P X (1 − ǫ)τ e (1 − ǫ) e τ e τe(G,ǫ) 1 ≥ = ≥ 4ρ(n − 1) 4ρ(n − 1) 4ρ(n − 1) 8ρ e Proof. (of Theorem 4.1) Lemma 4.7 implies that edges are sampled in DetSparsify with probability proportional to ǫ-approximate leverage scores guaranteed by ApproxLeverageG (·, ǫ). Therefore, we can apply Lemma 4.5 to achieve the desired expectation and concentration bounds. Finally, Lemma 4.8 implies that we expect to sample at most O(s · ρ) edges, each of which require a call to SampleEdgeG (e) and ApproxLeverageG with constant error. It additionally implies that we expect to make O(s) calls to ApproxLeverageG with ǫ error. Directly invoking this theorem leads to the sparsification algorithm. Proof. (of Theorem 1.1) Consider invoking Theorem 4.1 with parameters  s ← O n1.5 δ−2 , ǫ ← n−1/4 . This gives: ǫ2 n 2 n 3 , ≤ δ, s s2 which then implies 1 − O δ2 and  TG ≤ EH [TH ] ≤ 1 + O δ2  TG ,    EH TH2 ≤ 1 + O δ2 EH [TH ]2 . The second condition is equivalent to VarH [TH ] ≤ δ2 EH [TH ], which by Chebyshev inequality gives that with constant probability we have (1 − O (δ)) TG ≤ TH ≤ (1 + O (δ)) TG . Combining this with the bounds on EH [TH ], and adjusting constants gives the overall bound. Constructing the probability distribution p for sampling edges only requires computing constant approximate leverage scores for all edges, and then sampling proportionally for each edge, giving a constant value for ρ. By Lemma 2.4, this requires Õ(m) time. The running time then is dominated by the O(s) calls made to the effective resistance oracle with error ǫ = n−1/4 . Invoking Lemma 2.4 gives that this cost is bounded by   O nǫ−4 + sǫ−2 = O n2 δ−2 . Furthermore, because Lemma 2.4 holds w.h.p. we can absorb the probability of failure into our constant probability bound 23 Another immediate consequence of our sparsification routine in Theorem 4.1, along with bounds on total variation distance that we prove in Section 9, is that we can give a faster spanning tree sampling algorithm for dense graphs by plugging the sparsified graph into previous algorithms for generating random spanning trees. Proof. (of Corollary 3.8) As in the proof of Theorem 1.1, we invoke Theorem 4.1 with parameters  s ← O n1.5 δ−2 , ǫ ← n−1/4 . giving   EH TH2 EH [TH ]2 ≤ 1 + δ2 . Applying Lemma 3.7, which is proven in Section 9.1, we then have that drawing a tree from H according to the w -uniform distribution gives a total variation distance of δ from drawing a tree according to the w -uniform distribution of G. The running time of drawing H is dominated by the O(s) calls made to the effective resistance oracle with error ǫ = n−1/4 . Invoking Lemma 2.4 gives that this cost is bounded by   O nǫ−4 + sǫ−2 = O n2 δ−2 . Furthermore, because Lemma 2.4 holds w.h.p. we can absorb the probability of failure into our total variation distance bound (where we implicitly assume that δ is at most polynomially small). We then use the Õ(m1/3 n5/3 ) time algorithm in [DKP+ 16] with m = O(n1.5 δ−2 ) to draw a tree from H. This then achieves our desired running time and total variation distance bound. 5 Implicit Sparsification of the Schur Complement Note that the determinant sparsification routine in Theorem 4.1 only requires an oracle that samples edges by an approximate distribution to resistance, as well as access to approximate leverage scores on the graph. This suggests that a variety of naturally dense objects, such as random walk matrices [CCL+ 15, JKPS17] and Schur complements [KLP+ 16, DKP+ 16] can also be sparsified in ways that preserve the determinant (of the minor with one vertex removed) or the spanning tree distributions. The latter objects, Schur complements, have already been shown to lead to speedups in random spanning tree generation algorithms recently [DKP+ 16]. Furthermore the fact that Schur complements preserve effective resistances exactly (2.6) means that we can directly invoke the effective resistances data structure as constructed in Lemma 2.4 to produce effective resistance estimates on any of its Schur complements. As a result, the main focus of this section is an efficient way of producing samples from a distribution that approximates drawing a multi-edge from the Schur complement with probabilities proportional to its leverage score. Here we follow the template introduced in [KLP+ 16] of only eliminating (1 + α)-diagonally-dominant subsets of vertices, as it in turn allows the use of walk sampling based implicit sparsification similar to those in [CCL+ 15, JKPS17]. 24 (1 + α)-diagonally-dominant subsets have been used in Schur complement based linear system solvers to facilitate the convergence of iterative methods in the L[V2 ,V2 ] block [KLP+ 16]. Formally, the condition that we require is: Definition 5.1. In a weighted graph G = (V, E, w ), a subset of vertices V2 ⊆ V is (1 + α)diagonally-dominant, or (1 + α)-DD if for every u ∈ V2 with weighted degree d u we have: X 1 1 X w uv ≥ w uv . du = 1+α 1 + α v∼u v∼u,v∈V / 2 It was shown in [KLP+ 16] that large sets of such vertices can be found by trimming a uniformly random sample. Lemma 5.2. (Lemma 3.5. of [KLP+ 16] instantiated on graphs) There is a routine AlmostIndependent(G, α) that for a graph G with n vertices, and a parameter α ≥ 0, returns in O(m) expected time a subset V2 with |V2 | ≥ n/(8(1 + α)) such that LG,[V2 ,V2 ] is (1 + α)-DD. Given such a subset V2 , we then proceed to sample edges in Sc (G, V1 ) via the following simple random walk sampling algorithm: 1. Pick a random edge in G. 2. Extend both of its endpoints in random walks until they first reach somewhere in V1 . Incorporating this scheme into the determinant preserving sparsification schemes then leads these guarantees: Theorem 5.3. Conditioned on Lemma 2.4 holding, there is a procedure SchurSparse that takes a graph G, and an 1.1-DD subset of vertices V2 , returns a graph H V1 in Õ(n2 δ−1 ) expected time such that the distribution over H V1 satisfies: TSc(G,V1 ) exp (−δ) ≤ EH V1 [TH V1 ] ≤ TSc(G,V1 ) exp (δ) , and   EH V1 TH2 V1 EH V1 [TH V1 ]2 ≤ exp (δ) . Furthermore, the number of edges of H V1 can be set to anywhere between O(n1.5 δ−1 ) and O(n2 δ−1 ) without affecting the final bound. We let this subset of vertices produced to be V2 , and let its complement be V1 . Our key idea is to view Sc (G, V1 ) as a multi-graph where each multi-edge corresponds to a walk in G that starts and ends in V1 , but has all intermediate vertices in V2 . Specifically a length k walk u0 , u1 , . . . uk , with u0 , uk ∈ V1 and ui ∈ V2 for all 0 < i < k, corresponds to a multi-edge between u0 and uk in Sc (G, V1 ) with weight given by Q G 0≤i<k w ui ui+1 Sc(G,V1 ) def . (2) w u0 ,u1 ,...uk = Q G 0<i<k d ui 25 We check formally that this multi-graph defined on V1 is exactly the same as Sc (G, V1 ) via the Taylor expansion of L−1 [V2 ,V2 ] based Jacobi iteration. Lemma 5.4. Given a graph G and a partition of its vertices into V1 and V2 , the graph GV1 formed by all the multi-edges corresponding to walks starting and ending at V1 , but stays entirely within V2 with weights given by Equation 2 is exactly Sc (G, V1 ). Proof. Consider the Schur complement: Sc (G, V1 ) = L[V1 ,V1 ] − L[V2 ,V1 ] L†[V2 ,V2 ] L[V1 ,V2 ] . If there are no edges leaving V2 , then the result holds trivially. Otherwise, L[V2 ,V2 ] is a strictly diagonally dominant matrix, and is therefore full rank. We can write it as L[V2 ,V2 ] = D − A where D is the diagonal of L[V2 ,V2 ] and A is the negation of the off-diagonal entries, and then expand L−1 [V2 ,V2 ] via the Jacobi series: −1  −1 −1/2 −1/2 −1/2 I − D AD D −1/2 = (D − A) = D L−1 [V2 ,V2 ] "∞ # ∞ k X X k D −1/2 = = D −1/2 D −1 A D −1 . (3) D −1/2 AD −1/2 k=0 k=0 Note that this series converges because the strict diagonal dominance of L[V2 ,V2 ] implies (AD −1 )k tends to zero as k → ∞. Substituting this in place of L−1 [V2 ,V2 ] gives: Sc (G, V1 ) = L[V1 ,V1 ] − ∞ X k=0 k L[V1 ,V2 ] D −1 A D −1 L[V2 ,V1 ] . As all the off-diagonal entries in L are non-positive, we can replace L[V1 ,V2 ] with −L[V1 ,V2 ] to make all the terms in the trailing summation positive. As these are the only ways to form new off-diagonal entries, the identity based on matrix multiplication of Q G h X  k −1 i 0≤i<k w ui ui+1 −1 −L[V1 ,V2 ] D A D −L[V2 ,V1 ] = Q G u0 ,uk 0<i<k d ui u1 ...uk−1 gives the required identity. This characterization of Sc (G, V1 ), coupled with the (1 + α)-diagonal-dominance of V2 , allows us to sample the multi-edges in Sc (G, V1 ) in the same way as the (short) random walk sparsification algorithms from [CCL+ 15, JKPS17]. Lemma 5.5. Given any graph G = (V, E, w ), an (1 + α)-DD subset V2 , and access to 2approximations of statistical leverage scores on G, τeG , SampleEdgeSchur returns edges in G according to the distribution p e in O(α) expected time per sample. Furthermore, the distribution that it samples edges in Sc (G, V1 ) from, p, satisfies Sc(G,V ) τ u0 ,...uk1 . n−1 for every edge in Sc (G, V1 ) corresponding to the walk u0 , . . . uk . O (1) · p u0 ,...uk ≥ 26 Algorithm 3: SampleEdgeSchur(G = (V, E, w ), V1 ): samples an edge from Sc (G, V1 ) Input: Graph G, vertices V1 to complement onto, and (implicit) access to a 2-approximation of the leverage scores of G, τeG . Output: A multi-edge e in Sc (G, V1 ) corresponding to a walk u0 , u1 , . . . uk , and the probability of it being picked in this distribution p u0 ,u1 ,...uk eG 1 Sample an edge e from G randomly with probability drawn from τ e; 2 Perform two independent random walks from the endpoints of e until they both reach some vertex in V1 , let the walk be u0 . . . uk ; 3 Output edge u0 uk (corresponding to the path u0 , u1 , . . . uk ) with w u0 ...uk ← Q 0≤i<k Q p u0 ...uk ← P wG ui ui+1 0<i<k 1 eG e′ e′ τ dG ui X 0≤i<k , (same as Equation 2)   τeG ui ui+1 · Y wG uj uj+1 0≤j<i d uj+1 · Y i+1≤j<k wG uj uj+1 d uj  . The guarantees of this procedure are analogous to the random walk sampling sparsification scheme from [CCL+ 15, JKPS17], with the main difference being the terminating condition for the walks leads to the removal of an overhead related to the number of steps in the walk. The modification of the initial step to picking the initial edge from G by resistance is necessary to get ρ to a constant, as the about n1.5 samples limits the amount of overhead that we can have per sample. Proof. We first verify that p is indeed a probability on the multi-edges of Sc (G, V1 ), partitioned by the walks that they correspond to in G, or formally X p u0 ,u1 ...uk = 1. u0 ,u1 ,...uk : u0 ,uk ∈V1 , ui ∈V2 ∀1≤i<k To obtain this equality, note that for any random walk starting at vertex i, the total probabilities of walks starting at i and ending in V1 is upper bounded by 1. Algebraically this becomes: Y w ui ui+1 X = 1, d u i u ,u ,...u 1 2 k 0≤i<k so applying this to both terms of each edge e gives that the total probability mass over any G starting edge is PτeeeG , and in turn the total. e′ τ e′ For the running time, since V2 is (1 + α)-almost independent, each step of the walk takes expected time O(α). Also, the value of p u0 ,u1 ,...uk can be computed in O(k) time by computing prefix/suffix products of the transition probabilities along the path (instead of evaluating each summand in O(k) time for a total of O(k 2 )). Finally, we need to bound the approximation of p compared P G to the true leverage scores τ . ee is within a constant factor of n. As τeG is a 2-approximation of the true leverage scores, e eτ 27 So it suffices to show O (1) · X 0≤i<k   τeG ui ui+1 Y wG uj uj+1 0≤j<i d uj+1 · wG uj uj+1 Y i+1≤j<k d uj   ≥ RSc(G,V1 ) (u0 , uk ) · w u0 ,u1 ,...uk . ef f Here we invoke the equivalence of effective resistances in G and Sc (G, V1 ) given by Fact 2.6 in the reverse direction. Then by Rayleigh’s monotonicity principle, we have Sc(G,V1 ) Ref f (u0 , uk ) = RG ef f (u0 , uk ) ≤ X 2e τG ui ui+1 0≤i<k w ui ui+1 , which when substituted into the expression for w u0 ,u1 ,...uk from Equation 2 gives     G G G X Y Y X 2e w uj uj+1 w uj uj+1 τ ui ui+1  w u0 ,u1 ,...uk = .   · 2e τG ui ui+1 w ui ui+1 d uj+1 d uj 0≤i<k 0≤j<i 0≤i<k i+1≤j<k This sampling procedure can be immediately combined with Theorem 4.1 to give algorithms for generating approximate Schur complements. Pseudocode of this routine is in Algorithm 4. Algorithm 4: SchurSparse(G, V1 , δ) Input: Graph G, 1.1-DD subset of vertices V2 and error parameter δ Output: Sparse Schur complement of Sc (G, V1 ) 1 Set ǫ ← 0.1; 2 Set s ← n2 δ −1 ; 3 Build leverage score data structure on G with errors 0.1 (via Lemma 2.4); 4 Let H V1 ← DetSparsify(Sc (G, V1 ) , s, SampleEdgeSchur(G, V1 ), LeverageApproxG , ǫ); 5 Output H V1 ; Proof. (Of Theorem 5.3) Note that the choices of ǫ and s must ensure that n 2 ǫ2 =δ s n3 ≤δ s2 This is then equivalent to s ≥ n1.5 δ−1 and ǫs2 = n2 δ−1 . This further implies that ǫ ≥ n1/4 . Our ǫ and s in SchurSparse meet these conditions (and the ones specifically chosen in the algorithm will also be necessary for one of our applications). The guarantees then follow from putting the quality of the sampler from Lemma 5.5 into the requirements of the determinant preserving sampling procedure from Theorem 4.1. Additionally, Lemma 5.5 only requires access to 2-approximate leverage scores, which can be computed by Lemma 2.4 in Õ(m) time. Furthermore, Lemma 5.5 gives that our ρ value is constant, and our assumption in Theorem 5.3 that we 28 are given an 1.1-DD subset V2 implies that our expected O(s · ρ) calls to SampleEdgeSchur will require O(1) time. The only other overheads are the computation and invocations of the various copies of approximate resistance data structures. Since m ≤ n2 and ǫ ≥ n1/4 , Lemma 2.4 gives that this cost is bounded by Õ(m + n2 + ǫs2 ) = Õ(n2 δ−1 ). 6 Approximate Determinant of SDDM Matrices In this section, we provide an algorithm for computing an approximate determinant of SDDM matrices, which are minors of graph Laplacians formed by removing one row/column. Theorem 1.1 allows us to sparsify a dense graph while still approximately preserving the determinant of the graph minor. If there were some existing algorithm for computing the determinant that had good dependence on sparsity, we could achieve an improved runtime for determinant computation by simply invoking such an algorithm on a minor of the sparsified graph.6 Unfortunately, current determinant computation algorithms (that achieve high-accuracy) are only dependent on n, so simply reducing the edge count does not directly improve the runtime for determinant computation. Instead the algorithm we give will utilize Fact 2.5  det+ (L) = det L[V2 ,V2 ] · det+ (Sc (L, V1 )). (where we recall that det+ is the determinant of the matrix minor) to recursively split the matrix. Specifically, we partition the vertex set based upon the routine AlmostIndependent from Lemma 5.2, then compute Schur complements according to SchurSparse in Theorem 5.3. Our algorithm will take as input a Laplacian matrix. However, this recursion naturally produces two matrices, the second of which is a Laplacian and the first of which is a submatrix of a Laplacian. Therefore, we need to convert L[V2 ,V2 ] into a Laplacian. We do this by adding one vertex with appropriate edge weights such that each row and column sums to 0. Pseudocode of this routine is in Algorithm 5, and we call it with the parameters LV2 ← AddRowColumn(L[V2 ,V2 ] ). Algorithm 5: AddRowColumn(M ) : complete M into a graph Laplacian by adding one more row/column Input: SDDM Matrix M Output: Laplacian matrix L with one extra row / column than M 1 Let n be the dimension of M ; 2 for i = 1 to n do 3 Sum non-zero entries of row i, call s i ; 4 Set L(n + 1, i), L(i, n + 1) ← −s i ; Pn 5 Let L(n + 1, n + 1) ← i=1 s i ; 6 Output L; The procedure AddRowColumn outputs a Laplacian LV2 such that L[V2 ,V2 ] can be obtained if one removes this added row/column. This immediately gives det+ (LV2 ) = det(L[V2 ,V2 ] ) by definition, and we can now give our determinant computation algorithm of the minor of a graph Laplacian. 6 To get with high probability one could use standard boosting tricks involving taking the median of several estimates of the determinant obtained in this fashion. 29 Algorithm 6: DetApprox(L, δ, n) : Compute det+ (L) with error parameter δ Input: Laplacian matrix L, top level error threshold δ, and top level graph size n Output: Approximate det+ (L) 1 if this is the top-level invocation of this function in the recursion tree then 2 δ′ ← Θ(δ2 / log3 n) 3 else 4 δ′ ← δ if L is 2 × 2 then return the weight on the (unique) edge in the graph 5 6 1 ) {Via Lemma 5.2} V2 ← AlmostIndependent(L, 10 V1 ← V \ V2 ; LV1 ← SchurSparse(L, V1 , δ′ ); {|V1 | /n is the value of β in Lemma 6.1.} LV2 ← AddRowColumn(L[V2 ,V2 ] ); Output DetApprox(LV1 , δ′ |V1 | /n, n) · DetApprox(LV2 , δ′ |V2 | /n, n); 7 8 9 10 11 Our analysis of this recursive routine consists of bounding the distortions incurred at each level of the recursion tree. This in turn uses the fact that the number of vertices across all calls within a level and the total “amount” of δ across all calls within a level both remain unchanged from one level to the next. This can be summarized by the following Lemma which bounds the error accumulated within one level of recursion in our algorithm. Lemma 6.1. Suppose we are given some small δ ≥ 0 and non-negative β1 , ..., βk such that Pk i=1 βi = O(1), along with Laplacian matrices L(1), . . . , L(k) and each having a corresponding vertex partition V1 (i), V2 (i), where # " L (i)[V1 (i),V1 (i)] L (i)[V1 (i),V2 (i)] . L(i) = L (i)[V2 (i),V1 (i)] L (i)[V2 (i),V2 (i)] Let LV1 (i) denote the result of running SchurSparse to remove the V2 (i) block in each of these matrices:7 def LV1 (i) = SchurSparse (L(i), V1 (i), βi δ) . Then conditioning upon a with high probability event8 in each of these calls to SchurSparse, for any p we have with probability at least 1 − p: k Y i=1 7 k    p  Y  δ/p det L[V2 (i),V2 (i)] (i) · det+ LV1 (i) . det+ (L (i)) = 1 ± O i=1 This Lemma only applies when the matrices are fixed with respect to the randomness used in the invocations of SchurSparse mentioned in the Lemma. In other words, it only applies when the result of running SchurSparse on each of these L(i) matrices is independent of the result of running it on the other matrices. This is why the Lemma only immediately bounds error within a level of the recursion—where this independence holds—rather than for the entire algorithm. 8 namely, the event that all the leverage score estimation calls to Lemma 2.4 from SchurSparse succeed 30 Here the βi corresponds to the |V1 | /n and |V2 | /n values that δ is multiplied against in each call parameter to SchurSparse. An example of the main steps in this determinant approximation algorithm, as well as the graphs corresponding to applying Lemma 6.1 to one of the layers is in Figure 1. G on n vertices with Laplacian L SchurSparse(LG , V1 , βδ) AddRowColumn(LG [V2 ,V2 ] ) L(1) L(2) SchurSparse(L(1), V1 (1), β1 δ) LV1 (1) , |V1 (1)| = β1 n SchurSparse(L(2), V1 (2), β2 δ) LV1 (2) , |V1 (2)| = β2 n LV2 (1) LV2 (2) Figure 1: Two layers of the call Structure of the determinant approximation algorithm DetApprox (algorithm 6), with the transition from the first to the second layer labeled as in Lemma 6.1. Applying Lemma 6.1 to all the layers of the recursion tree gives the overall guarantees. Proof of Theorem 1.2. Running Time: Let the number of vertices and edges in the current graph corresponding to L be n and m respectively. Calling AlmostIndependent takes expected time O(m) and guarantees n n ≤ |V2 | ≤ , 16 8 which means the total recursion terminates in O(log n) steps. For the running time, note that as there are at most O(n) recursive calls, the total number of vertices per level of the recursion is O(n). The running time on each level are also dominated by the calls to SchurSparse, which comes out to    n 2 Õ |V1 (i)| ′ = Õ |V1 (i)| nδ−2 , δ |V1 (i)| and once again sums to Õ(n2 δ−2 ). We note that this running time can also be obtained from more standard analyses of recursive algorithms, specifically applying guess-and-check to a running time recurrence of the form of: T (n, δ) = T (θn, θδ) + T ((1 − θ) n + 1, (1 − θ) δ) + Õ(n2 δ−1 ). 31 Correctness. As shown in the running time analysis, our recursion tree has depth at most O(log n), and there are at most O(n) total vertices at any given level. We associate each level of the recursion in our algorithm with the list of matrices which are given as input to the calls making up that level of recursion. For any level in our recursion, consider the product of det+ applied to each of these matrices. We refer to this quantity for level j as qj . Notice that q0 is the determinant we wish to compute and q# levels−1 is what our algorithm actually outputs. As δ such, it suffices to prove that for any j, qj = (1 ± # levels )qj−1 with probability of failure at most 3 1 ′ 2 10·# levels . However, by the fact that we set δ = Θ(δ / log n) in the top level of recursion with sufficiently small constants, this immediately follows from Lemma 6.1. A minor technical issue is that Lemma 6.1 only gives guarantees conditioned on a WHP event. However, we only need to invoke this Lemma a logarithmic number of times, so we can absorb this polynomially small failure probability into the our total failure probability without issue. Standard boosting techniques—such as running O(log n) independent instances and taking the medians of the estimates— give our desired with high probability statement. It remains to bound the variances per level of the recursion. Proof. (Of Lemma 6.1) As a result of Fact 2.5 k Y det+ (L(i)) = k Y i=1 i=1   det L (i)[V2 (i),V2 (i)] det+ (Sc (L (i) , V1 (i))) . Consequently, it suffices to show that with probability at least 1 − p k Y i=1 k  p  Y   det+ (Sc (L (i) , V1 (i))) = 1 ± O δ/p det+ LV1 (i) . i=1 Recall that LV1 (i) denotes the random variable that is the approximate Schur complement generated through the call to SchurSparse(L(i), V1 (i), βi δ). Using the fact that our calls to SchurSparse are independent along with the assumption P of ki=1 βi = O(1), we can apply the guarantees of Theorem 5.3 to obtain # " k k i  h  Y Y V1 (1) ELV1 (i) det+ LV1 (i) = ELV1 (1) ...LV1 (k) det+ L i=1 i=1 = (1 ± O (δ)) and k Y det+ (Sc (L(i), V1 (i))) , i=1  2   2   V1 (i) V1 (i) ELV1 (1) ...LV1 (k) k ELV1 (i) det+ L i=1 det+ L Y   = i2  h 2  Qk V (i) V1 (i) i=1 ELV1 (i) det+ L 1 L ELV1 (1) ...LV1 (k) det + i=1  Qk ≤ 32 k Y i=1 exp (O (βi δ)) ≤ exp (O (δ)). By assumption δ is small, so we can approximate exp (O(δ)) with 1+O(δ), which with bound above gives # # " k " k  2    Y Y V1 (i) V1 (i) det+ L ≤ O (δ) ELV1 (1) ...LV1 (k) , det+ L VarLV1 (1) ...LV1 (k) i=1 Then applying the approximation on E VarLV1 (1) ...LV1 (k) " k Y i=1  hQ det+ LV1 (i) i=1 k i=1 det+ (SchurSparse(L(i), V1 (i), βi δ)) #  ≤ O (δ) k Y i=1 i !2 det+ (Sc (L(i), V1 (i))) gives . At which point we can apply Chebyshev’s inequality to obtain our desired result. 7 Random Spanning Tree Sampling In this section we will give an algorithm for generating a random spanning tree from a weighted graph, that uses SchurSparse as a subroutine, and ultimately prove Theorem 1.3. In order to do so, we will first give an O(nω ) time recursive algorithm using Schur complement that exactly generates a random tree from the w -uniform distribution. The given algorithm is inspired by the one introduced in [CDN89], and its variants utilized in [CMN96, HX16, DKP+ 16]. However, we will (out of necessity for our further extensions) reduce the number of branches in the recursion to two, by giving an efficient algorithmic implementation of a bijective mapping between spanning trees in G and spanning trees in Sc (G, V2 ) when V1 , the set of vertices removed, is an independent set. We note that this also yields an alternative algorithm for generating random spanning trees from the w -uniform distribution in O(nω ) time. The runtime of this recursion will then be achieved similar to our determinant algorithm. We reduce δ proportional to the decrease in the number of vertices for every successive recursive call in exactly the same was as the determinant approximation algorithm from Section 6. As has been previously stated and which is proven in Section 9.1, drawing a random spanning tree from e 2 −1 a graph after √ running our sparsification routine which takes O(n δ ), will have total variation distance δ from the w -uniform distribution. Similar to our analysis of the determinant algorithm, we cannot directly apply this bound to each tree because the lower levels of the recursion will contribute far too much error when δ is not decreasing at a proportional rate to the total variation distance. Thus we will again need to give better bounds on the variance across each level, allowing stronger bounds on the contribution to total variation distance of the entire level. This accounting for total variance is more difficult here due to the stronger dependence between the recursive calls. Specifically, the input to the graph on V2 depends on the set of edges chosen in the first recursive call on V1 , specifically Sc (G, V1 ), or a sparsified version of it. Accounting for this dependency will require proving additional concentration bounds shown in Section 8, which we specifically achieve by sampling s = O(n2 δ−1 ) edges in each call to SchurSparse. While this might seem contradictory to the notion of “sampling”, we instead consider this to be sampling from the graph in which all the edges generated from the Schur complement are kept separate and could be far more than n2 edges. 33 7.1 Exact O(nω ) Time Recursive Algorithm We start by showing an algorithm that samples trees from the exact w -uniform distribution via the computation of Schur complements. Its pseudocode is in Algorithm 7, and it forms the basis of our approximate algorithm: the faster routine in Section 7.2 is essentially the same as inserting sparsification steps between recursive calls. Algorithm 7: ExactTree(G) : Take a graph and output a tree randomly from the w -uniform distribution Input: Graph G Output: A tree randomly generated from the w -uniform distribution of G 1 If there is only one edge e in G, return G ; 2 Partition V evenly into V1 and V2 ; 3 T1 = ExactTree(Sc(G, V1 )); 4 for each e ∈ T1 do w e (G) , G ← G/e, T ← T ∪ e ; 5 with probability w e (Sc(G,V 1 )) 6 7 8 9 Delete the remaining edges, i.e., G ← G \ E(V1 ); T2 = ExactTree(Sc(G, V2 )); T ← T ∪ ProlongateTree(G, V1 ⊔ V2 , T2 ); Output T ; The procedure ProlongateTree is invoked when V1 = V \ V2 maps a tree T2 from the Schur complement Sc (G, V2 ) to a tree back in G. It crucially uses the property that V1 is an independent set, and its pseudocode is given in Algorithm 8. Lemma 7.1. The procedure ExactTree(G) will generate a random tree of G from the w uniform distribution in O(nω ) time. The algorithm we give is similar to the divide and conquer approaches of [CDN89, CMN96, HX16, DKP+ 16]. The two main facts used by these approaches can be summarized as follows: 1. Schur complements preserves the leverage score of original edges, and 2. The operation of taking Schur complements, and the operation of deleting or contracting an edge are associative. We too will make use of these two facts. But unlike all previous approaches, at every stage we need to recurse on only two sub-problems. All previous approaches have a branching factor of at least four. We can do this by exploiting the structure of the Schur complement when one eliminates an independent set of vertices. We formalize this in Lemma 7.5. Before we can prove the lemma, we need to state an important property of Schur complements that follows from Fact 2.8. Recall the notation from Section 2 that for a weighted graph G = (V, E, w ), P rG T (·) denotes the probability of · over trees T picked from the w -uniform distribution on spanning trees of G. 34 Algorithm 8: ProlongateTree(G, V1 ⊔ V2 , T2 ): prolongating a tree on Sc (G, V2 ) to a tree on G. Input: A graph G, a splitting of vertices V1 ⊔ V2 such that V1 is an independent set, tree T2 of Sc (G, V2 ). Output: A tree in G 1 T ← ∅; 2 for each e = xy ∈ T2 do 3 Create distribution λe , set λe (∅) = w e (G); 4 for each v ∈ V1 such that (v, x), (v, y) ∈ E(G) do 5 Set λe (v) = w (v,x) (G)w (v,y) (G)d v (G)−1 ; 6 7 8 9 10 11 12 13 14 Randomly assign f (e) to {∅ ∪ V1 } with probability proportional to λ; for each v ∈ V1 do for each e = (x, y) ∈ T2 such that (v, x), (v, y) ∈ E(G) do if f (e) 6= v then Contract x and y ; for each contracted vertex X in the neighborhood of v do Connect X to v with edge (v, u) ∈ G with probability proportional to wG ((v, u)) ; T ← T ∪ (v, u); Output T ; Lemma 7.2. Let G be a graph with a partition of vertices V = V1 ⊔ V2 . Then for any set of edges F contained in G[V1 ], the induced subgraph on V1 , we have: Sc(G,V1 ) P rG T (T ∩ E (G [V1 ]) = F ) = P r T (T ∩ E (G [V1 ]) = F ) , where the edges in Sc (G, V1 ) are treated as the sum of G[V1 ] and Gsc [V1 ], the new edges added to the Schur complement. Sc(G,V ) 1 (T ∩ E (G [V1 ]) = Proof. If F contains a cycle, then P r G T (T ∩ E (G [V1 ]) = F ) = 0 = P r T F ). Therefore, we will assume F does not contain any cycle, and we will prove by induction on the size of F . If |F | > |V1 | − 1, then F will have to contain a cycle. When |F | = |V1 | − 1, then F will have to be the edge set of a tree in Sc(G, V1 ). Then by Fact 2.8, the corollary holds. Now suppose that the corollary holds for all F with |F | = |V1 | − 1 − k. Now consider some F with |F | = |V1 | − 1 − (k + 1). We know X  G ′ P rG P rG T (F ⊆ T ) = P r T (F = (T ∩ E (G [V1 ]))) + T F = (T ∩ E (G [V1 ])) . F ′ ⊃F Since |F ′ | > |F |, by assumption X X   Sc(G,V1 ) ′ P rG F ′ = (T ∩ E (G [V1 ])) , P rT T F = (T ∩ E (G [V1 ])) = F ′ ⊃F F ′ ⊃F Sc(G,V1 ) then by Fact 2.8 we have P rG T (F ⊆ T ) = P r T (F ⊆ T ), which implies Sc(G,V1 ) P rG T (F = (T ∩ E (G [V1 ]))) = P r T 35 (F = (T ∩ E (G [V1 ]))) . The tracking of edges from various layers of the Schur complement leads to another layer of overhead in recursive algorithms. They can be circumvented by merging the edges, generating a random spanning tree, and the ‘unsplit’ the edge by random spanning. The following is a direct consequence of the definition of w (T ): b be a multi-graph, and G be the simple graph formed by summing the weights Lemma 7.3. Let G of overlapping edges. Then the procedure of: 1. Sampling a random spanning tree from G, T . b eb with probability 2. For each edge e ∈ T , assign it to an original edge from G,   b w eb G . w e (G) b the original multi-graph. Produces a w -uniform spanning tree from G, This then leads to the following proto-algorithm: 1. Partition the vertices (roughly evenly) into V = V1 ⊔ V2 . 2. Generate a w -uniform tree of Sc (G, V1 ), and create F1 = T ∩ E(G[V1 ]) by re-sampling edges in G[V1 ] using Lemma 7.3. By Lemma 7.2, this subset is precisely the intersection of a random spanning tree with G[V1 ]. 3. This means we have ‘decided’ on all edges in G[V1 ]. So we can proceed by contracting all the edges of F1 , and deleting all the edges corresponding to E(G[V1 ])\F . Let the resulting graph be G′ and let V1′ be the remaining vertices in V1 after this contraction. 4. Observe that V1′ is an independent set, and its complement is V2 . We can use another recursive call to generate a w -uniform tree in Sc(G′ , V2 ). Then we utilize the fact that V1′ is an independent set to lift this to a tree in G′ efficiently via Lemma 7.5. Our key idea for reducing the number of recursive calls of the algorithm, that when V1 (from the partition of vertices V = V1 ⊔ V2 ) is an independent set, we can directly lift a tree from Sc(G, V2 ) to a tree in G. This will require viewing GSc [V2 ] as a sum of cliques, one per vertex of V1 , plus the original edges in G[V2 ]. Fact 7.4. Given a graph G and a vertex v, the graph Sc(G, V \v) is the induced graph G[V \{v}] plus a weighted complete graph K(v) on the neighbors of v. This graph K(v) is formed by adding one edge xy for every pair of x and y incident to v with weight w (v,x) w (v,y) , degv def where d v = P x w (v,x) is the weighted degree of v in G. 36 Lemma 7.5. Let G be a graph on n vertices and V1 an independent set. If T is drawn from the w -uniform distribution of Sc(G, V2 ), then in O(n2 ) time ProlongateTree(G, V1 ⊔ V2 , T2 ) returns a tree from the w -uniform distribution of G. Proof. The running time of ProlongateTree is O(n2 ) as T2 has ≤ n − 1 edges and |V1 | ≤ n. Now we will show the correctness. Let V1 = {v1 , ..., vk }. We will represent Sc(G, V2 ) as a multi-graph arising by Schur complementing out the vertices in V1 one by one and keeping the new edges created in the process separate from each other as a multi-graph. We represent this multi-graph as Sc(G, V2 ) = G [V2 ] + K (v1 ) + ... + K (vk ) , where G[V2 ] is the induced subgraph on V2 and K(vi ) is the weighted complete graph on the neighbors of vi . Then • By the unsplitting procedure from Lemma 7.3, the function f maps T2 to a tree in the multi-graph G[V2 ] + K(v1 ) + ... + K(vk ), and • the rest of the sampling steps maps this tree to one in G. We will now prove correctness by induction on the size of the independent set V1 . The case of |V1 | = 0 follows from Sc (G, V2 ) = G. If |V1 | = 1, i.e, V1 = {v} for some vertex v, then Sc(G, V2 ) is G[V2 ] + K(v). Given a tree T2 of Sc(G, V2 ), the creation of f will first map T2 to a tree in the multigraph G[V2 ] + K(v) by randomly deciding for each edge e ∈ T to be in G(V1 ) or K(v) depending on it’s weight. If we let T ′ (V2 ) = T ′ ∩ G[V2 ], then by Lemma 7.2,   G[V2 ]+K(v) ′ P rG T ∩ E(G [V2 ]) = T ′ (V2 ) . T T ∩ E(G [V2 ]) = T (V2 ) = P r T Therefore, we can contract all the edges of T ′ (V2 ) ∩ G [V2 ] and delete all other edges of G [V2 ]. This results in a multi-graph star with v at the center. Now, ProlongateTree does the following to decide on the remaining edges. For every multi-edge of the star graph obtained by contracting or deleting edges in G[V2 ], we choose exactly one edge, randomly according to its weight. This process generates a random tree of multi-graph star. Now we assume that the lemma holds for all V1′ with |V1′ | < k. Let V1 = {v1 , ..., vk }. The key thing to note is that when V1 is an independent set, we can write Sc (G, V2 ) = G [V2 ] + K (v1 ) + . . . + K (vk ) , and Sc (G, V2 ∪ vk ) = G [V2 ∪ vk ] + K (v1 ) + . . . + K (vk−1 ) . Therefore, by the same reasoning as above, we can take a random tree T ′ of the multi-graph G[V2 ] + K(v1 ) + ... + K(vk ) and map it to a tree on G[V2 ∪ vk ] + K(v1 ) + ... + K(vk−1 ) = Sc (G, V2 ∪ vk ) by our procedure ProlongateTree. We then apply our inductive hypothesis on the set V1 \ {vk } to map Sc(G, V2 ∪ vk ) to a tree of G by ProlongateTree, which implies the lemma. We also remark that the running time of ProlongateTree can be reduced to O(m log n) using dynamic trees, which can be abstracted as a data structure supporting operations on rooted forests [ST85, AHLT05]. We omit the details here as this does not bottleneck the running time. With this procedure fixed, we can now show the overall guarantees of the exact algorithm. 37 Proof. of Lemma 7.1 Correctness follows immediately from Lemmas 7.2 and 7.5. The running time of ProlongateTree is O(n2 ) and contracting or deleting all edges contained in G[V1 ] takes O(m) time. Note that in this new contracted graph, the vertex set containing V1 is an independent set. Furthermore, computing the Schur complement takes O(nω ) time, giving the running time recurrence T (n) = 2T (n/2) + O (nω ) = O (nω ) . 7.2 Fast Random Spanning Tree Sampling using Determinant Sparsification of Schur complement Next, we note that the most expensive operation from the exact sampling algorithm from Section 7.1 was the Schur complement procedure. Accordingly, we will substitute in our sparse Schur complement procedure to speed up the running time. However, this will add some complication in applying Line 5 of ExactTree. To address this, we need the observation that the SchurSparse procedure can be extended to distinguish edges from the original graph, and the Schur complement in the multi-graph that it produces. Lemma 7.6. The procedure SchurSparse(G, V1 , δ) given in Algorithm 4 can be modified to record whether an edge in its output, H V1 is a rescaled copy of an edge from the original induced subgraph on V1 , G[V1 ], or one of the new edges generated from the Schur complement, GSC (V1 ). Proof. The edges for H V1 are generated by the random walks via SampleEdgeSchur(G, V1 ), whose pseudocode is given in Algorithm 3. Each of these produces a walk between two vertices in V1 , and such a walk belongs to G[V1 ] if it is length 1, and GSC (V1 ) otherwise. We can now give our algorithm for generating random spanning trees and prove the guarantees that lead to the main result from Theorem 1.3. Note that the splitting on Line 7 is mapping T1 first back to a tree on a the sparsified multigraph of Sc (G, V1 ): where the rescaled edges that originated from G[V1 ] are tracked separately from the edges that arise from new edges involving random walks that go through vertices in V2 . The desired runtime will follow equivalently to the analysis of the determinant algorithm in Section 6 as we are decreasing δ proportionally to the number of vertices. It remains to bound the distortion to the spanning tree distribution caused by the calls to SchurSparse. Bounds on this distortion will not follow equivalently to that of the determinant algorithm, which also substitutes SchurSparse for exact Schur complements, due to the dependencies in our recursive structure. In particular, while the calls to SchurSparse are independent, the graphs that they are called upon depend on the randomness in Line 6 and ProlongateTree, which more specifically, are simply the resulting edge contractions/deletions in previously visited vertex partitions within the recursion. Each subgraph SchurSparse is called upon is additionally dependent on the vertex partitioning from AlmostIndependent. The key idea to our proof will then be a layer-by-layer analysis of distortion incurred by SchurSparse at each layer to the probability of sampling a fixed tree. By considering an alternate procedure where we consider exactly sampling a random spanning tree after some layer, along with the fact that our consideration is restricted to a fixed tree, this will allow 38 Algorithm 9: ApproxTree(G, δ, n) Take a graph and output a tree randomly from a distribution δ-close to the w -uniform distribution Input: Graph G, error parameter δ, and initial number of vertices n Output: A tree randomly generated from a distribution δ-close to the w -uniform distribution of G 1 {Via Lemma 5.2} 1 V2 ← AlmostIndependent(G, 10 ); 2 H1 ← SchurSparse(G, V1 , δ · |V1 |/n)), while tracking whether the edge is from G[V1 ] via the modifications from Lemma 7.6 ; 3 T1 = ApproxTree(H1 , δ, n); 4 G′ ← G ; 5 for each e ∈ T1 do 6 if RAND[0, 1] ≤ w ori e (G1 )/w e (G1 ) then {w ori (G 1 ) is calculated using the weights tracked from Line 2); e 7 G′ ← G′ /{e} ; 8 T ← T ∪ {e}; 9 10 11 12 13 Delete all edges between (remaining) vertices in V1 in G′ , G′ ← G′ \ E(G′ [V1 ]) ; H2 ← SchurSparse(G′ , V2 , δ · |V2 |/n) ; T2 = ApproxTree(H2 , δ, n); T ← T ∪ ProlongateTree(G, V1 ⊔ V2 , T2 ) ; Output T ; us to separate the randomness incurred by calls to SchurSparse from the other sources of randomness mentioned above. Accordingly, we will provide the following definition. Definition 7.7. For any L ≥ 0, the level-L truncated algorithm is the algorithm given by modifying ApproxTree(G, δ, n) so that all computations of sparsified Schur complements are replaced by exact calls to Schur complements (aka. Sc (G, V1 ) or Sc (G′ , V2 ))) after level l. The tree distribution T (L) is defined as the output of the level-L truncated algorithm. Note that in particular, T (0) is the tree distribution produced by ExactTree(G), or the w -uniform distribution; while T (O(log n)) is the distribution outputted by ApproxTree(G, δ). The primary motivation of this definition is that we can separate the randomness between (l) T and T (l+1) by only the calls to SchurSparse at level l + 1, which will ultimately give the following lemma that we prove at the end of this section Lemma 7.8. For an invocation of ApproxTree on a graph G with variance bound δ, for any layer L > 0, we have   √ dT V T (L−1) , T (L) ≤ O( δ). To begin, we consider the differences between T (0) and T (1) and the probability of sampling a fixed tree Tb on a recursive call on G. The most crucial observation is that the two recursive calls to ApproxTree(G1 , δ, n) and ApproxTree(G2 , δ, n) can be viewed as independent: Claim 7.9. For a call to ApproxTree(G, δ, n) (Algorithm 9) to return Tb, there is only one possible choice of G′ as generated via Lines 4 to 9. 39 Proof. Note that the edges removed from Line 7 are precisely the edges in T with both endpoints contained in V1 , E(T [V1 ]). For a fixed Tb, this set is unique, so G′ is unique as well. This allows us to analyze a truncated algorithm by splitting the probabilities into those that occur at level l or above. Specifically, at the first level, this can be viewed as pairs of graphs Sc (G, V1 ) and Sc (G, V2 ) along with the ‘intended’ trees from them: Definition 7.10. We define the level-one probabilities of returning a pair of trees T1 and T2 that belong a pair of graphs G1 , G2 ,   p(≤1) (G, G1 , G2 ) , (T1 , T2 ) , Tb . as the product of: 1. The probability (from running AlmostIndependent) that G is partitioned into V1 ⊔ V2 so that Sc (G, V1 ) = G1 and Sc (G′ , V2 ) = G2 , where G′ is G with the edges T ∩ G[V1 ] contracted and all other edges in G[V1 ] are deleted. 2. The probability that T1 is mapped to Tb[V1 ] in Line 6. 3. The probability that T2 is mapped to Tb/Tb[V1 ] by the call to ProlongateTree on Line 12. This definition then allows us to formalize the splitting of probabilities above and below level 1. More importantly, we note that if we instead call SchurSparse to generate G1 and G2 , this will not affect the level-one probability because (1) both the calls to AlmostIndependent and ProlongateTree do not depend on G1 and G2 , and (2) we can consider T1 to be drawn from the multi-graph of G1 where we track which edges are from the original graph and which were generated by the Schur complement. Consequently, the only difference between the distributions T (0) and T (1) will be the distortion of drawing T1 and T2 from G1 and G2 vs the sparsified version of G1 and G2 . This handling of sparsifiers of the Schur complements is further simplified with by the following observation: Claim 7.11. The output of SchurSparse(G, V ′ , δ) is identical to the output of   IdealSparsify Sc G, V ′ , τe, n2 δ−1 , for some set of 1.1-approximate statistical leverage scores of Sc (G, V ′ ), τe. This can be seen by revisiting the Schur complement sparsification and rejection sampling algorithms from Section 5 and 4.3 which show that this statement also extends to the approximate Schur complements produced on lines 2 and 10 of Algorithm 9. This means we can let H1 and H2 denote the distribution produced by IdealSparsify on G1 and G2 respectively. ~ T~ )≤1 such that for any tree Lemma 7.12. There exists a collection of graphs and tree pairs (G, b T , with the probabilities given above in Definition 7.10 we have:     X (0) P rT Tb = p(≤1) (G, G1 , G2 ) , (T1 , T2 ) , Tb · P rG1 (T1 ) · P rG2 (T2 ) . ((G,G1 ,G2 ),(T1 ,T2 ))∈(G,T )(≤1) 40 and P rT (1)   Tb = X ((G,G1 ,G2 ),(T1 ,T2 ))∈(G,T )(≤1)   p(≤1) (G, G1 , G2 ) , (T1 , T2 ) , Tb     · EH1 ∈H1 P r H1 (T1 ) · EH2 ∈H2 P r G2 (T2 ) . We can then in turn extend this via induction to multiple levels. It is important to note that in comparing the distributions T (L−1) and T (L) for L ≥ 1 both will make calls to IdealSparsify through level L. We will then need to additionally consider the possible graphs generated by sparsification through level L, then restrict to the corresponding exact graphs at level L + 1. Definition 7.13. We will use G~ (≤L) , T~ (L) to denote a sequence of graphs on levels up to L − 1, plus the peripheral exact Schur complements on level L, along with the spanning trees generated on these peripheral graphs. ~ T~ )(≤L) to denote As these graphs and trees can exist on different vertex sets, we will use (G, ~ ≤L the set of graph/tree pairs that are on the same set of vertices. For a sequence of graphs G and a sequence of trees on their peripherals, T~ L , we will use   ~ (≤L) , T~ (L) , Tb p(≤L) G to denote the product of the probabilities of the level-by-level vertex split and resulting trees mapping back correctly as defined in Definition 7.10, times the probabilities that the subsequent graphs are generated as sparsifiers of the ones above ~ (L) to denote just the peripheral graphs, and H( ~ G ~ (L) ) to denote Furthermore, we will use G ~ (L) to denote one particular the product distribution over sparsifiers of these graphs, and H sequence of such sparsifiers on this level. We can also define the probabilities of trees being picked in a vector-wise sense:         ~ (L) ~ (L) ~ (L) ~ (L) def Y ~ (L) ~ (L) def Y (L) (L) . P r Hj = , P rH T T~j P r Gj = P rG T T~j j j Applying Lemma 7.12 inductively then allows us to extend this to multiple levels. ~ T~ )(≤L) such that for any Corollary 7.14. There exists a collection of graphs and tree pairs (G, b tree T we have:       X (L−1) ~ (≤L) , T~ (L) , Tb · P r G~ (L) T~ (L) , p(≤L) G P rT Tb = (G~ (≤L) ,T~ (L) )∈(G,T )(≤L) and P rT (L)   Tb = X (G~ (≤L) ,T~ (L) )∈(G,T )(≤L)  i h   ~ (≤L) , T~ (L) , Tb · E ~ (L) ~ (L) P rH~ (L) T~ (L) . p(≤L) G H ∼H(G ) This reduces our necessary proof of bounding the total variation distance between T (L−1) and T (L) to examining the difference between  i h   ~ (L) ~ (L) ~ (L) ~ (L) . T and EH~ (L) ∼H~ (G(L) ) P rH P rG T 41 ~ (L) Recalling the definition of P rH expectation is ~ (L) P r Hj (T~ (L) ): we have that the inverse of each probability in the   (L) −1 = T~j TH~ (L) j ,  ~ (L) (L) H ~ j w Tj ~ (L) . However, it is critical to note that and we have concentration bounds for the total trees in H j (L) ~ ~ (L) for some j. this probability is 0 (and cannot be inverted) when Tj is not contained in H j This necessitates extending our concentration bounds to random graphs where we condition upon a certain tree remaining in the graph. This will be done in the following Lemma, proven 2 in Section 8, and we recall that we set s such that δ = O( ns ) in SchurSparse. Lemma 7.15. Let G be a graph on n vertices and m edges, τe be an 1.1-approximate estimates of 2 leverage scores, s be a sample count such that s ≥ 4n2 and m ≥ sn . Let H denote the distribution over the outputs of IdealSparsify(G, τe, s), and for a any fixed spanning Tb, let H|T denote the distribution formed by conditioning on the graph containing Tb. Then we have:   2   −1 h i−1  −1   n H|Tb b b P rG Tb , PrH∼H T ⊆ H · EH|Tb ∼H| P r T = 1±O b s T and   2  −2 h i−2  −1  n P rG Tb . · VarH|Tb ∼H| P rH|Tb Tb PrH∼H Tb ⊆ H ≤O b s T Due to the independence of each call to IdealSparsify, we can apply these concentration bounds across the product     Y ~ (L) ~ (L) ~ (L) (L) T~j T = P r Hj P rH j and use the fact that δ decreases proportionally to vertex size in our algorithm: ~ (l) , with associated sparsifier distribuCorollary 7.16. For any sequence of peripheral graphs G ~ (L) tion HS , and any sequence of trees T~ (L) as defined in Definition 7.13 such that P r G (T~ (L) ) > 0, we have       i−1 h ~ (L) ~ (L) −1 ~ (L) ~ (L) H H Pr T >0 · E ~ (L) ~ (L) T PrH~ (L) ∼H~ (G(L) ) P r ~ (L) ~ (L) H ∼H(G ) P r H (T )>0   ~ (L) ~ (L) −1 = (1 ± δ) P rG T , and h PrH~ (L) ∼H~ (G(L) ) P r ~ (L) H   i−2 T~ (L) > 0 · E ~ (L) H ~ (L) ~ (G(L) ) P r H ∼H 42 (T~ (L) )>0  Pr ~ (L) H  −2  (L) ~ T ~ (L) ≤ (1 + δ) P rG  −2 . T~ (L) Proof. The independence of the calls to IdealSparsify, and the definition of         ~ (L) ~ (L) ~ (L) ~ (L) def Y ~ (L) ~ (L) def Y (L) (L) . , P rH T = P r Hj T~j P rG T = P r Gj T~j j j Applying Lemma 7.15 to each call of IdealSparsify, where s was set such that δ/n = gives that the total error bounded by    X V G(L) , exp  n n2 s gives j and the bound then follows form the total size of each level of the recursion being O(n̄). It then remains to use concentration bounds on the inverse of the desired probability to bound the total variation distance, which can be done by the following lemma which can be viewed as an extension of Lemma 3.7, and is also proven in Section 9. Lemma 7.17. Let U be a distribution over a universe of elements, u, each associated with random variable Pu such that Eu∼U [E [Pu ]] = 1, and for each Pu we have 1. Pu ≥ 0, and   2. Pr [Pu > 0]−1 · Ep∼Pu |p>0 p−1 = 1 ± δ, and   3. Pr [Pu > 0]−2 Ep∼Pu|p>0 p−2 ≤ 1 + δ, then Eu∼U [|1 − E [Pu ]|] ≤ O √  δ . To utilize this lemma, we observe that the values     ~ (≤L) , T~ (L) , Tb · P r G~ (L) T~ (L) p(≤L) G ~ (≤L) , T~ (L) , Tb, while the distribution H(G ~ (L) ), once forms a probability distribution over tuples G rescaled, can play the role of Pu . Decoupling the total variation distance per tree into the ~ (≤L) , T~ (L) then allows us to bound the overall total variation corresponding terms on pairs of G distance between T (L−1) and T (L) . Proof of Lemma 7.8. By the definition of total variation distance   X     (L−1) (L) P rT Tb − P rT Tb . dT V T (L−1) , T (L) = Tb 43 By Corollary 7.14 and triangle inequality we can then upper bound this probability by  X  dT V T (L−1) , T (L) ≤ Tb X (G~ (≤L) ,T~ (L) )∈(G,T )(≤L)   ~ (≤L) , T~ (L) , Tb p(≤L) G ~ (L) · P rG   i h  ~ (L) ~ (L) . T T~ (L) − EH~ (L) ∼H~ (G(L) ) P rH ~ (≤L) , T~ (L) , Tb) is crucially the same for each, and the inner term in the The scalar p(≤L) (G summation is equivalent to  i  h      ~ (L) ~ (L) ~ (≤L) , T~ (L) , Tb · E ~ (L) ~ (L) P r H ~ (≤L) , T~ (L) , Tb · P rG~ (L) T~ (L) − p(≤L) G T p(≤L) G H ∼H(G ) ~ (L) , T~ (L) , Tb) Our goal is to use Lemma 7.17 where U here is the distribution over tuples (G with density equaling:     ~ (≤L) , T~ (L) , Tb · P rG~ (L) T~ (L) , p(≤L) G ~ (L) ), with the same density, and and Pu is the distribution over the corresponding value of H(G values equaling to:     ~ (L) ~ (L) ~ (L) ~ (L) −1 . P rH T P rG T Note that the fact that each T~ L maps back to some tree T̂ imply that U is a distribution, as well as Eu∼U [E [Pu ]] = 1. A rescaled version of Corollary 7.16 then gives the required conditions for Lemma 7.17, which in turn gives the overall bound. Proof of Theorem 1.3. The running time follows the same way as the analysis of the determinant estimation algorithm in the Proof of Theorem 1.2 at the end of Section 6. For correctness, the total variation distance bound is implied by appropriately setting δ, and then invoking the per-layer bound from Lemma 7.8. Note that factors of log n are absorbed by e notation. the O Finally, note that for simplicity our analysis of total variation distance does not account for the failure probability of Lemma 2.4. To account for these, we can simply use the fact that only O(n log n) calls to SchurSparse are made. Hence, the probability of any call failing is polynomially small, which can be absorbed into the total variation distance. 8 Conditional Concentration Bounds In this section, we extend our concentration bounds to conditioning on a certain tree being in the sampled graph, specifically with the goal of proving Lemma 7.15. By edge splitting arguments similar to those in Section 4.2, it suffices to analyze the case where all edges have about the same leverage score. Lemma 8.1. Let G be a graph on n vertices and m edges such that all edges have statistical s2 2 leverage scores τ e ≤ 2n m , and s be a sample count such that s ≥ 4n and m ≥ n . Let H be a subgraph containing s edges picked at random without replacement, and let H denote this 44 distribution over subgraphs on s edges. Furthermore for any fixed spanning tree, Tb, let H|T denote the distribution induced by those in H that contain Tb, and use H|Tb to denote such a graph, then   2   −1 h i−1  −1   n H|Tb b b P rG Tb , PrH∼H T ⊆ H · EH|Tb ∼H| P r T = 1±O b s T and   2  −1   −2 n b PrH∼H T · VarH|Tb ∼H| P r ≤O P rG Tb . b s T Note that the ‘uniform leverage score’ requirement here is not as strict as the analysis from Lemma 4.2. This is because we’re eventually aiming for a bound of s ≈ n2 samples. This also means that constant factor leverage score approximations suffices for this routine. The starting point of this proof is the observation that because we’re doing uniform sampling, the only term in       w H|Tb Tb w G Tb = P rH|Tb Tb = TH|Tb TH|Tb h Tb ⊆ H i−2 H|Tb that is dependent on H|Tb is TH|Tb . The proof will then follow by showing concentration of this variable which will be done similarly to the concentration of TH that was done in Section 3 and 4. The primary difficulty of extending the proof will come from the fact that trees will have different probabilities of being in the sampled graph depending on how many edges they share with Tb. Much of this will be dealt with by the assumption that s ≥ 4n2 , which makes the exponential terms in the probabilities associated with a tree being in a sampled graph negligible. Additionally, this assumption implies that for any fixed tree Tb the expected number of edges it shares with a random tree is close to 0. As a result, trees that intersect with Tb will have negligible contributions, and our analysis can follow similarly to that in Section 3 and 4. We further note that due to the larger sample count of s ≥ 4n2 , the concentration bounds in this section will also hold, and would in fact be slightly simpler to prove, if the edges were sampled independently with probability s/m. We keep our assumption of sampling s edges globally without replacement though in order to avoid changing our algorithm, and the analysis will not require much additional work. The section will be organized as follows: In Section 8.1 we give upper and lower bounds on the expectation of TH|Tb . In Section 8.2 we give an upper bound on the variance of TH|Tb . In Section 8.3 we combine the bounds from the previous two sections to prove Lemma 8.1. 8.1 Upper and Lower Bounds on Conditional Expectation i h In order to prove upper and lower bounds on EH|Tb TH|Tb , we will first give several helpful h i definitions, corollaries, and lemmas to assist in the proof. Our examination of EH|Tb TH|Tb will   require approximations of PrH|Tb T ⊆ H|Tb , and, as we are now fixing n − 1 edges and drawing s−n+1 s − n + 1 edges from the remaining m − n + 1 edges, each edge will now have probability m−n+1 of being in the sampled graph. We will denote this probability with def s − n + 1 . pb = m−n+1 45 It will often be easier to exchange pb for def p = s , m the probability of a single edge being picked without the conditioning on Tb. The errors of doing so is governed by:  s−n s−n+1 s n p= ≤ = p̂ ≤ = p. (4) 1− s m m−n+1 m We remark that these errors turn out to be acceptable even when pb is raised to the O(n) power. Furthermore, our assumption of s ≥ 4n2 implies that we expect a randomly chosen tree not to intersect with Tb. This will often implicitly show up in the form of the geometric series below, for which a bound is immediately implied by our assumption. Lemma 8.2. If s ≥ 4n2 , then k ∞  X 2n2 k=1 s =O  n2 s  .   The change in our sampling procedure will alter the formulation of PrH|Tb T ⊆ H|Tb , so we i h first want to write EH|Tb TH|Tb in terms of values that we are familiar with while only losing small errors. Additionally, many of the exponential terms in the previous analysis will immediately be absorbed into approximation error by our assumption that s ≥ 4n2 . 2 Lemma 8.3. Let G be a graph on n vertices and m edges and s a value such that m ≥ sn , Fix some tree Tb ∈ G. For a random subset of s ≥ 4n2 edges containing Tb, H|Tb ⊇ Tb, we have h i EH|Tb TH|Tb =  1−O  n2 s  n−1 X X pn−1−k k=0 w (T ), T : |T ∩Tb|=k where p = s/m is the probability of each edge being picked in the sample. Proof. Given that all edges of Tb are in H|Tb , the remaining s − n + 1 edges are chosen uniformly from all m − n + 1 edges not in Tb. Accordingly, for any tree T ∈ G, the probability PrH|Tb T ⊆ H|Tb is obtained by dividing the number of subsets of s − n + 1 edges that contain all edges in T \ Tb, against the number of subsets of s − n + 1 edges from m − n + 1:  PrH|Tb T ⊆ H|Tb   m − n + 1 − T \ Tb   (s − n + 1)|T \Tb| m−n+1 . / = = (m − n + 1)|T \Tb| s−n+1 s − n + 1 − T \ Tb Following the proof Lemma 3.1, this reduces to  b   b  T \T PrH|Tb T ⊆ H|Tb = pb|T \T | exp − 2s 46 2 −O   3  n  , s2 which we can further reduce using the assumption of s ≥ 4n2 to:   2    n b PrH|Tb T ⊆ H|Tb = 1 − O pb|T \T | , s and in turn obtain via linearity of expectation:  2  X i  h n b w (T )b p|T \T | . EH|Tb TH|Tb = 1 − O s T We then subdivide the summation based on the amount of edges in the intersection of T and Tb and move our pb term inside the summation h i EH|Tb TH|Tb =  1−O  n2 s  n−1 X k=0 pbn−1−k X w (T ). T : T ∩Tb=k Finally, we can use Equation 4 to replace pb by p because    2n2 n n ≥ 1− 1 ≥ 1− s s where n2 s < 0.1. We will also require a strong lower bound of the expectation. The following lemma shows that most of the trees do not intersect with Tb. Restricting ourh consideration to such trees will i be much easier to work in obtaining the lower bound on EH|Tb TH|Tb . Lemma 8.4. Let G be a graph on n vertices and m edges such that m ≥ 4n2 and all edges have b statistical leverage scores ≤ 2n m . For any tree T ∈ G. X T : |T ∩Tb|=0 w (T ) ≥  1−O  n2 s  TG . Proof. By definition, we can classify the trees by their intersection with Tb: TG = n−1 X X w (T ). k=0 T : |T ∩Tb|=k Consider each inner summation and further separating into each possible forest of Tb with k edges gives: X X X X X w (T ) ≤ w (T ). w (T ) = T : F ⊆T T b b b F ⊆T T : |T ∩T |=k F ⊆T b |F |=k F =T ∩T 47 |F |=k Invoking Lemma 3.4 on the inner summation and the fact that there are with k edges, gives an upper bound of X T : |T ∩Tb|=k w (T ) ≤    k  2 k n−1 2n 2n ≤ TG . TG m m k n−1 k forests of Tb We will utilize this upper bound for all k > 0 and achieve a lower bound from rearranging our initial summation ! n−1 n−1 X  2n2 k X X X w (T ) ≥ TG 1 − w (T ) = TG − . m k=1 k=1 b b T : |T ∩T |=k T : |T ∩T |=0 Applying the assumption of m ≥ 4n2 and Lemma 8.2 gives our desired result. With the necessary tools in place, we will now give upper and lower bounds on the expectation in terms of TG pn−1 , which we note is also a close approximation of EH [TH ] by our assumption that s ≥ 4n2 . Lemma 8.5. Let G be a graph on n vertices and m edges such that all edges have statistical s2 b leverage scores ≤ 2n m , and let s be such that m ≥ n . Fix some tree T ∈ G. For a random subset 2 of s ≥ 4n edges that contain Tb, H|Tb ⊆ Tb we have:  2  h i  n TG pn−1 . EH|Tb TH|Tb = 1 ± O s Proof. We will first prove the upper bound. From Lemma 8.3 we have h i n−1 X EH|Tb TH|Tb ≤ pn−1−k k=0 X w (T ) , T : |T ∩Tb|=k while a proof similar to Lemma 8.4 gives X T : |T ∩Tb|=k w (T ) ≤ TG  2n2 m Moving pn−1 outside the summation and substituting h i EH|Tb TH|Tb ≤ TG p n−1 n−1 X k=0 k s m . for p gives 2n2 s k , and applying Corollary 8.2 to upper bound the summation gives  2  i  h n TG pn−1 . EH|Tb TH|Tb ≤ 1 + O s 48 For the lower bound, we again first using Lemma 8.3 and then restrict to trees that do not intersect Tb using Lemma 8.4. Formally we have:  2  n−1 h i  X n EH|Tb TH|Tb = 1 − O pn−1−k s k=0 ≥ 8.2  1−O  w (T ) T : |T ∩Tb|=k  2 n s X p n−1 X T : |T ∩Tb|=0 w (T ) ≥  1−O  n2 s  pn−1 TG . Upper Bound on Conditional Variance i h 2 The bound on variance is by upper bounding EH|Tb TH| b in a way similar to Lemma 3.6. Once T again, the assumption of s > 4n2 means the situation is simpler because the exponential term is negligible. As with the proof of Lemma 3.6, we will often separate summations of pairs of trees based upon the number of edges in their intersection, then frequently invoke Lemma 3.4. However there will be more moving pieces in each summation due to intersections with Tb, so Lemma 8.7 proven later in this section, which is analogous to Lemma 3.5, will be much more involved. Lemma 8.6. Let G be a graph on n vertices and m edges such that all edges have statistical s2 b leverage scores ≤ 2n m , and s a sample count such that m ≥ n . For some tree T ∈ G, let H|Tb denote a random subset of s edges such that Tb ⊆ H|Tb , then: i h   2  2 EH|Tb TH| n b T . h i2 ≤ 1 + O s EH|Tb TH|Tb Proof. By analogous reasoning to the proof in Lemma 8.3, for any pair of trees T1 , T2 ∈ G we have  PrH|Tb T1 , T2 ⊆ H|Tb   m − n + 1 − (T ∪ T ) \ Tb   (s − n + 1)|(T1 ∪T2 )\Tb| 1 2 m−n+1 / = = . s−n+1 (m − n + 1)|(T1 ∪T2 )\Tb| s − n + 1 − (T ∪ T ) \ Tb 1 2 s−k ≤ As a consequence of Equation 4, specifically the bound m−k the upper bound   b PrH|Tb T1 , T2 ⊆ H|Tb ≤ p|(T1 ∪T2 )\T | , s m when k ≥ 0, we can obtain and in turn summing over all pairs of trees: i h X b 2 w (T1 ) w (T2 ) p|(T1 ∪T2 )\T | . ≤ EH|Tb TH| b T T1 ,T2 49 We note that |(T1 ∪ T2 ) \ Tb| = |T1 \ Tb| + |T2 \ Tb| − |(T1 ∩ T2 ) \ Tb|. Furthermore, |T1 \ Tb| = n − 1 − |T1 ∩ Tb, so we separate the summation as per usual by each possible size of |T1 ∩ Tb| and |T2 ∩ Tb|, and bring the terms outside of the summation that only depend on these values. i h X X b 2n−2 2 −k1 −k2 ≤ p w (T1 ) w (T2 ) p−(T1 ∩T2 )\T . EH|Tb TH| p b T T1 ,T2 k1 ,k2 |T1 ∩Tb|=k1 |T2 ∩Tb|=k2 In order to deal with the inner most summation we will need to again separate based on the size of |(T1 ∪ T2 ) \ Tb|, and we further note that |(T1 ∩ T2 ) \ Tb| = |(T1 \ Tb) ∩ (T2 \ Tb)|: n−1 i h X X 2n−2 2 −k1 −k2 ≤ p EH|Tb TH| p p−k b T k1 ,k2 X w (T1 ) w (T2 ) . T1 ,T2 k=0 |T1 ∩Tb|=k1 |T2 ∩Tb|=k2 |(T1 \Tb)∩(T2 \Tb)|=k The last term is bounded in Lemma 8.7, which is stated and proven immediately after this. Incorporating the resulting bound, and grouping the terms by the summations over k1 , k2 , and k respectively gives:      2k+k1 +k2 m n n 2n p p TG2 ≤p EH|Tb m k k1 k2 k=0 k1 ,k2        k2    2k !    n−1 n−1 n−1 k1 X X X n 2n m 2n n 2n   . p−k2 p−k = TG2 p2n−2  p−k1 m m m k2 k k1 h 2 TH| b T i 2n−2 X −k1 −k2 n−1 X −k k2 =0 k1 =0 k=0  for p in each summation and use the very crude upper bound ab ≤ ab :    ! n−1 n−1 n−1 i h X  2n2 k2 X  2n2 k1 X  2n2 k 2 2n−2  2   . EH|Tb TH| b ≤ TG p T s s s We then plug in s m k2 =0 k1 =0 k=0 Lemma 8.2 then upper bounds each summation by 1 + O(n2 /s), giving  2  i  h n 2 EH|Tb TH| b ≤ 1 + O TG2 p2n−2 . T s It remains to prove the following bound on the number of of pairs of trees with a certain intersection size with Tb, and each other. The following Lemma is a generalization to Lemma 3.5, and is proven analogously using the negative correlation of edges in spanning trees from Fact 3.3 and Lemma 3.4. 50 Lemma 8.7. Let G be graph with m edges and n vertices such that every edges has leverage b score ≤ 2n m . For any tree T ∈ G and any integers k, k1 , k2 ∈ [0, n − 1], X T1 ,T2 |T1 ∩Tb|=k1 |T2 ∩Tb|=k2      2k+k1 +k2 m n n 2n TG2 . w (T1 ) w (T2 ) ≤ m k k1 k2 |(T1 \Tb)∩(T2 \Tb)|=k Proof. We will first separate the summation over all possible forests F of size k that could be the intersection of T1 \ Tb and T2 \ Tb: X X X w (T1 ) w (T2 ) = w (T1 ) w (T2 ) . F ⊆E |F |=k T1 ,T2 |T1 ∩Tb|=k1 |T2 ∩Tb|=k2 |(T1 \Tb)∩(T2 \Tb)|=k T1 ,T2 |T1 ∩Tb|=k1 |T2 ∩Tb|=k2 F =(T1 \Tb)∩(T2 \Tb) We first consider the inner summation, and will relax the requirement to only needing F ⊆ (T1 \ Tb) ∩ (T2 \ Tb), which we note is equivalent to F ⊆ (T1 \ Tb) and F ⊆ (T2 \ Tb). This then allows us to separate the summation again for a particular F into terms involving just T1 and T2 :    X T1 ,T2 |T1 ∩Tb|=k1 |T2 ∩Tb|=k2 F =(T1 \Tb)∩(T2 \Tb)   w (T1 ) w (T2 ) ≤   T 1: X |T1 ∩Tb|=k1 F ⊆(T1 \Tb)    w (T1 )   T 2: X |T2 ∩Tb|=k2 F ⊆(T2 \Tb)   w (T2 ) .  We further examine the first term in the product, and the second will follow equivalently. Once again, we will split the summation by all possible forests Fb of Tb with size k1 that T1 \ Tb could intersect in, and further relax to them only having to contain Fb. X X X w (T1 ) . w (T1 ) ≤ T 1 T1 : |T1 ∩Tb|=k1 Fb⊆Tb |Fb|=k1 Fb⊆(T1 ∩Tb) F ⊆(T1 \Tb) F ⊆(T1 \Tb) Since T1 ∩ Tb and T1 \ Tb are disjoint, we can restrict to Fb that are disjoint from F , as well as relaxing to requiring (Fb ∪ F ) ⊆ T1 (instead of Fb ⊆ (T1 ∩ Tb) and F ⊆ (T1 \ Tb)): X X X w (T ) . w (T1 ) ≤ b b b b T1 : |T1 ∩T |=k1 F ⊆T (F ∪F )⊆T |Fb|=k1 F ⊆(T1 \Tb) (Fb∩F )=∅ 51 The assumption of Fb and F being disjoint means their union must have exactly k + k1 edges. We can then apply Lemma 3.4 to the inner summation and use the fact that there are at most n−1 sets Fb to achieve the upper bound k1 X    k+k1 n 2n w (T1 ) ≤ TG . k1 m X    k+k2 n 2n TG , w (T2 ) ≤ k2 m T1 : |T1 ∩Tb|=k1 F ⊆(T1 \Tb) Similarly, we can also obtain T2 : |T2 ∩Tb|=k2 F ⊆(T2 \Tb) m k which, along with the fact that there are 8.3 edge sets F of size k, gives our desired bound. Concentration of Inverse Probabilities We now complete a proof of Lemma 8.1 using the concentration results on the number of trees in a sampled graph, conditioned upon a certain tree being contained in the graph. Proof of Lemma 8.1. The definition of  −1 TH|Tb P rH|Tb Tb = w (Tb) and Lemma 3.1 give h PrH∼H Tb ⊆ H i−1 ·EH|Tb ∼H| b T  i h  2  3  E  −1   1 n−1 T H| ∼H H| b b | n n T T Tb  P rH|Tb Tb = . exp +O p 2s s2 w Tb Our condition of s ≥ 4n2 allows us to bound the term hexp(ni2 /(2s) + O(n3 /s2 )) by (1 + O(n2 /s)), and incorporating our approximation of EH|Tb ∼H| TH|Tb from Lemma 8.5 gives b T h PrH∼H Tb ⊆ H i−1 · EH|Tb ∼H| b T   2   −1   n TG H|Tb b Pr T = 1±O ·  , s w Tb  −1 and the definition of P rG Tb implies the bounds on expectation. For the variance bound, we use the identity    −1   −2  VarH| ∼H P rH|Tb Tb = EH| ∼H P rH|Tb Tb − EH| ∼H b T |b T which by the definition b T |b T b T  −1 TH|Tb = P rH|Tb Tb w (Tb) 52 |b T   −1 2 P rH|Tb Tb , reduces to VarH|Tb ∼H| b T  i h i2 h 2  2  −1  EH| b ∼H| TH| − E T H| ∼H H| b b |b T 2 p2n−2 n T T T b b T H|Tb b T T Pr , T = ≤O · G  2 s w (Tb)2 w Tb where the last inequality is from incorporating Lemmas 8.5 and 8.6. Applying Lemma 3.1, and once again using the condition of s ≥ 4n2 to bound  2    2  n n n3 exp + O( 2 ≤ 1 + O ≤ O (1) 2s s s gives:   2  −1  TG2 n H|Tb b PrH∼H · VarH|Tb ∼H| P r T ≤O · , b s T w (Tb)2  −1 and the variance bound follows from the definition of P r G Tb . 9 h Tb ⊆ H i−2 Bounding Total Variation Distance In this section we will first bound the total variation distance between drawing a tree from the w -uniform distribution of G, and uniformly sampling s edges, H, from G, then drawing a tree from the w -uniform distribution of H. The first bound will only be based on a concentration for the number of trees in H, and will give the Õ(n13/6 ) time algorithm for sampling spanning trees from Corollary 3.8. Next we will give a more general bound on the total variation distance between two distributions based on concentration of inverse probabilities. The resulting Lemma 7.17 is used for proving the bound on total variation distance in the recursive algorithm given in Section 7. However, as this bound requires a higher sample count of about n2 , the direct derivation of TV distances from concentration bounds is still necessary for uses of the Õ(n1.5 ) edge sparsifier in Corollary 3.8. 9.1 Simple Total Variation Distance Bound from Concentration Bounds We give here a proof of total variation distance being bounded based on the concentration of spanning trees in the sampled graph. Proof. (of Lemma 3.7) Substituting the definition of p and p̃ into the definition of total variation distance gives:  i   h X dT V (p, p̃) = P rG Tb − EH∼H P rH Tb . Tb Substituting in the conditions of:   w H (T ) , (by definition of P rH (Tb)) P rH Tb = TH     h i−1 E ′ H ∼H [TH ′ ] w H Tb = w G Tb · PrH ′ ∼H Tb ⊆ H ′ · , TG 53 (by given condition) Using the fact that h  i h i EH∼H 1 Tb ⊆ H = PrH ′ ∼H Tb ⊆ H ′ , we can distribute the first term into:    h i−1     X ′ G H EH∼H 1 Tb ⊆ H · PrH ′ ∼H Tb ⊆ H dT V (p, p̃) = · P r Tb − P r Tb , T̂ which by the condition on w H (Tb) simplifies to: X dT V (p, p̃) = T̂    EH∼H 1 Tb ⊆ H ·   w H Tb EH ′ ∼H [TH ′ ] As 1(Tb ⊆ H) = 1 iff P rH (Tb) > 0, this further simplifies into dT V (p, p̃) = X T̂ h i h i PrH ′ ∼H′ Tb ⊆ H ′ which by triangle inequality gives: dT V (p, p̃) = X T̂  EH∼H|T   PrH ′ ∼H′ Tb ⊆ H ′ · EH∼H|T     − P r H Tb  .   w H Tb    − P rH Tb  ,   w H Tb    − P rH Tb  , EH ′ ∼H [TH ′ ] EH ′ ∼H [TH ′ ] at which point we can rearrange the summation to obtain:           w H Tb X X 1 1  = EH  . − dT V (p, p̃) ≤ EH  w H Tb · P rH Tb − EH ′ [TH ′ ] TH EH ′ [TH ′ ] Tb⊆H Tb⊆H which by definition of TH simplifies to: dT V (p, p̃) ≤ EH  TH 1− EH ′ [TH ′ ]  . By the Cauchy-Schwarz inequality, which for distributions can be instantiated as EX [f (X)] ≤ p EX [f (X)2 ] for any random variable X and function f (X), we then get: v v " " u 2 # u 2 # u u √ T T H H dT V (p, p̃) ≤ tEH = tE H − 1 = δ. 1− EH ′ [TH ′ ] EH ′ [TH ′ ] 54 9.2 Total Variation Distance Bound from Inverse Probability Concentration We give here our proof of Lemma 7.17, that is a more general bound on total variation distance based upon concentration results of the inverse probabilities. Lemma 9.1. Let X be a random variable such that X > 0 over its entire support, and given some δ ≥ 0, such that E [X] = (1 ± δ)µ and Var [X] ≤ δµ2 , then h i √ 1 Pr |X −1 − µ−1 | > 4k δµ−1 ≤ 2 k if 1 < k < δ−1/2 /4 Proof. Chebyshev’s inequality gives h √ i 1 Pr |X − (1 ± δ)µ| > k δµ ≤ 2 . k Furthermore, if we assume X such that √ |X − (1 ± δ)µ| ≤ k δµ which reduces to   √  √  1 − 2k δ µ ≤ X ≤ 1 + 2k δ µ. Inverting and reversing the inequalities gives µ−1 µ−1 √ ≤ X −1 ≤ √ . 1 + 2k δ 1 − 2k δ Using the fact that we can then conclude, 1 1+ǫ = 1− ǫ 1+ǫ ≤ 1 − ǫ for ǫ > 0, and 1 1+ǫ = 1+ ǫ 1−ǫ ≤ 1 + 2ǫ for ǫ ≤ 1/2,   √  √  1 − 4k δ µ−1 ≤ X −1 ≤ 1 + 4k δ µ−1 , which implies Pr h X and proves the lemma. −1 −µ −1 √ > 4k δµ −1 i h √ i ≤ Pr |X − (1 ± δ) µ| > k δµ This bound does not allow us to bound EX [|X − µ] because when X close to 0, the value of X −1 can be arbitrarily large, while this bound only bounds the probability of such events by O(δ−1 ). We handle this by treating the case of X small separately, and account for the total probability of such cases via summations over I and xb. First we show that once these distributions are truncated to avoid the small X case, its variance is bounded. Lemma 9.2. Let Y be a random variable such µY > 0 we have 0 < Y ≤  δ,  −1  that for parameters −1 −1 ≤ δµ−2 2µY over its entire support, and that E Y = (1 ± δ)µY , Var Y Y , then √  δ µY . E [|Y − µY |] ≤ O 55 Proof. Since |Y − µY | ≤ µY , we can decompose this expected value into buckets of 2 via: log(δ−1/2 /4) X E [|Y − µY |] ≤ i=0 h i  √  √ PrY |Y − µY | ≥ 2i δµY · 2i δµY , where the last term is from the guarantee of Y ≤ 1. Lemma 9.1 gives that each of the intermediate probability terms is bounded by O(2−2i ), while the last one is bounded by 1δ , so this gives a total of log(δ−1/2 )   X √  √ 2i δµY O 2−2i ≤ δµY E [|Y − µ|] ≤ i=0 We can now complete the proof via an argument similar to the proof of Lemma 3.7 in Section 9.1. The only additional step is the definition of BAD u , which represents the portion of the random variable Pu with high deviation. Proof of Lemma 7.17. For each u, we define a scaling factor corresponding to the probability that Pu is non-zero: def pu+ = Prp∼Pu [p > 0] . By triangle inequality, we have for each Pu |1 − E [Pu ]| ≤ pu+ · Ep∼Pu |p>0   p−1 u+ − p . We will handle the case where p is close and far from p−1 u+ separately. This requires defining the portion of Pu with non-zero values, but large variance as   1 −1 def −1 BAD u = p ∈ supp (Pu ) : pu+ − p > pu+ . 2 Lemma 9.1 gives that for each u, Prp∼Pu |p>0 [p ∈ BAD u ] ≤ O √  δ , which with the outer distribution and factoring the value of p−1 u+ gives gives: √     Eu∼U pu+ · Ep∼Pu|p>0 1 (p ∈ BAD u ) · p−1 δ , ≤O u+ √     Eu∼U pu+ · Ep∼Pu|p>0 1 (p ∈ / BAD u ) · p−1 δ . ≥1−O u+ (5) (6) We then define the ‘fixed’ distributions Peu with the same distribution over p as Pu , but whose values are set to p−1 u+ whenever p ∈ BADu . Lemma 9.2 then gives:  √   −1 δp − p ≤ O Ep∼Peu|p>0 p−1 u+ , u+ 56 or taken over the support of U , and written with indicator variables: √     / BAD u ) · p−1 − p ≤ O Eu∼U pu+ · Ep∼Pu |p>0 1 (p ∈ δ . u+ Combining this with the lower bound on the mass of p−1 u+ on the complements of the bad sets −1 from Equation 6 via the triangle inequality p ≥ p u+ − |p −1 u+ − p| gives: √    δ , / BAD u ) · p] ≥ 1 − O Eu∼U pu+ · Ep∼Pu |p>0 [1 (p ∈ or upon taking complement again:  Eu∼U pu+ · Ep∼Pu |p>0 √   δ , [1 (p ∈ BAD u ) · p] ≤ O which together with Equation 5 and the non-negativity of p−1 u+ and p gives √     − p ≤ O Eu∼U pu+ · Ep∼Pu |p>0 1 (p ∈ BAD u ) · p−1 δ . u+ Combining these two summations, and invoking the triangle inequality at the start then gives the bound. References [AGM+ 10] Arash Asadpour, Michel X. Goemans, Aleksander Madry, Shayan Oveis Gharan, and Amin Saberi. An o(log n/ log log n)-approximation algorithm for the asymmetric traveling salesman problem. In Proceedings of the Twenty-first Annual ACMSIAM Symposium on Discrete Algorithms, SODA ’10, pages 379–389, Philadelphia, PA, USA, 2010. Society for Industrial and Applied Mathematics. [AHLT05] Stephen Alstrup, Jacob Holm, Kristian De Lichtenberg, and Mikkel Thorup. Maintaining information in fully dynamic trees with top trees. Acm Transactions on Algorithms (talg), 1(2):243–264, 2005. [Ald90] David Aldous. The random walk construction of uniform spanning trees and uniform labelled trees. In SIAM Journal on Discrete Mathematics, pages 450–465, 1990. [BDKZ15a] Christos Boutsidis, Petros Drineas, Prabhanjan Kambadur, and Anastasios Zouzias. A randomized algorithm for approximating the log determinant of a symmetric positive definite matrix. CoRR, abs/1503.00374, 2015. Available at: http://arxiv.org/abs/1503.00374. [BDKZ15b] Christos Boutsidis, Petros Drineas, Prabhanjan Kambadur, and Anastasios Zouzias. A randomized algorithm for approximating the log determinant of a symmetric positive definite matrix. CoRR, abs/1503.00374, 2015. [BK96] András A. Benczúr and David R. Karger. Approximating s-t minimum cuts in Õ(n2) time. In Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, STOC ’96, pages 47–55, New York, NY, USA, 1996. ACM. 57 [BP93] Robert Burton and Robin Pemantle. Local characteristics, entropy and limit theorems for spanning trees and domino tilings via transfer-impedances. The Annals of Probability, pages 1329–1371, 1993. [Bro89] Andrei Broder. Generating random spanning trees. In Proceedings of the 30th annual Symposium on Foundations of Computer Science, FOCS 1989, pages 442– 447, 1989. [BS83] Walter Baur and Volker Strassen. The complexity of partial derivatives. Theoretical Computer Science, 22(3):317 – 330, 1983. [CCL+ 15] Dehua Cheng, Yu Cheng, Yan Liu, Richard Peng, and Shang-Hua Teng. Efficient sampling for Gaussian graphical models via spectral sparsification. Proceedings of The 28th Conference on Learning Theory, pages 364–390, 2015. Available at http://jmlr.org/proceedings/papers/v40/Cheng15.pdf. [CDN89] Charles J Colbourn, Robert PJ Day, and Louis D Nel. Unranking and ranking spanning trees of a graph. Journal of Algorithms, 10(2):271–286, 1989. [CKP+ 17] Michael B. Cohen, Jonathan A. Kelner, John Peebles, Richard Peng, Anup Rao, Aaron Sidford, and Adrian Vladu. Almost-linear-time algorithms for markov chains and new spectral primitives for directed graphs. Accepted to STOC 2017. Preprint available at https://arxiv.org/abs/1611.00755., 2017. [CMN96] Charles J Colbourn, Wendy J Myrvold, and Eugene Neufeld. Two algorithms for unranking arborescences. Journal of Algorithms, 20(2):268–281, 1996. [Coh16] Michael B Cohen. Nearly tight oblivious subspace embeddings by trace inequalities. In Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, pages 278–287. SIAM, 2016. [CP15] Michael B. Cohen and Richard Peng. ℓp row sampling by Lewis weights. In Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC ’15, pages 183–192, New York, NY, USA, 2015. ACM. Available at http://arxiv.org/abs/1412.0588. [DKP+ 16] David Durfee, Rasmus Kyng, John Peebles, Anup B. Rao, and Sushant Sachdeva. Sampling random spanning trees faster than matrix multiplication. CoRR, abs/1611.07451, 2016. [EGIN97] David Eppstein, Zvi Galil, Giuseppe F. Italiano, and Amnon Nissenzweig. Sparsification&mdash;a technique for speeding up dynamic graph algorithms. J. ACM, 44(5):669–696, September 1997. [FHHP11] Wai Shing Fung, Ramesh Hariharan, Nicholas JA Harvey, and Debmalya Panigrahi. A general framework for graph sparsification. In Proceedings of the fortythird annual ACM symposium on Theory of computing, pages 71–80. ACM, 2011. https://arxiv.org/abs/1004.4080. 58 [GRV09] Navin Goyal, Luis Rademacher, and Santosh Vempala. Expanders via random spanning trees. In Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’09, pages 576–585, Philadelphia, PA, USA, 2009. Society for Industrial and Applied Mathematics. [Gue83] Alain Guenoche. Random spanning tree. Journal of Algorithms, 4(3):214–220, 1983. [HAB14a] Timothy Hunter, Ahmed El Alaoui, and Alexandre M. Bayen. Computing the log-determinant of symmetric, diagonally dominant matrices in near-linear time. CoRR, abs/1408.1693, 2014. Available at: http://arxiv.org/abs/1408.1693. [HAB14b] Timothy Hunter, Ahmed El Alaoui, and Alexandre M. Bayen. Computing the log-determinant of symmetric, diagonally dominant matrices in near-linear time. CoRR, abs/1408.1693, 2014. [HJ12] Roger A Horn and Charles R Johnson. Matrix analysis. Cambridge university press, 2012. [HMS15] Insu Han, Dmitry Malioutov, and Jinwoo Shin. Large-scale log-determinant computation through stochastic chebyshev expansions. In ICML, pages 908–917, 2015. Available at: https://arxiv.org/abs/1606.00942. [HX16] Nicholas J. A. Harvey and Keyulu Xu. Generating random spanning trees via fast matrix multiplication. In LATIN 2016: Theoretical Informatics, volume 9644, pages 522–535, 2016. [IL11] Ilse C. F. Ipsen and Dean J. Lee. Determinant approximations, 2011. [Jan94] Svante Janson. The numbers of spanning trees, hamilton cycles and perfect matchings in a random graph. Combinatorics, Probability and Computing, 3(01):97–126, 1994. [JKPS17] Gorav Jindal, Pavel Kolev, Richard Peng, and Saurabh Sawlani. Density independent algorithms for sparsifying k-step random walks. CoRR, abs/1702.06110, 2017. [Kir47] Gustav Kirchhoff. Ü ber die auflösung der gliechungen, auf welche man bei der untersuchung der linearen vertheilung galvanischer ströme geführt wird. In Poggendorgs Ann. Phys. Chem., pages 497–508, 1847. [KLP+ 16] Rasmus Kyng, Yin Tat Lee, Richard Peng, Sushant Sachdeva, and Daniel A Spielman. Sparsified cholesky and multigrid solvers for connection laplacians. In Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, pages 842–850. ACM, 2016. Available at http://arxiv.org/abs/1512.01892. [KM09] Jonathan Kelner and Aleksander Madry. Faster generation of random spanning trees. In Proceedings of the 50th annual Symposium on Foundations of Computer Science, FOCS 2009, pages 13–21, 2009. Available at https://arxiv.org/abs/0908.1448. 59 [Kul90] Vidyadhar G. Kulkarni. Generating random combinatorial objects. Journal of Algorithms, 11(2):185–207, 1990. [MST15] Aleksander Madry, Damian Straszak, and Jakub Tarnawski. Fast generation of random spanning trees and the effective resistance metric. In Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2015, pages 2019–2036, 2015. Available at http://arxiv.org/pdf/1501.00267v1.pdf. [PS14] Richard Peng and Daniel A. Spielman. An efficient parallel solver for SDD linear systems. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, STOC ’14, pages 333–342, New York, NY, USA, 2014. ACM. Available at http://arxiv.org/abs/1311.3286. [SS11] Daniel A. Spielman and Nikhil Srivastava. Graph sparsification by effective resistances. SIAM Journal on Computing, 40(6):1913–1926, 2011. [ST85] Daniel Dominic Sleator and Robert Endre Tarjan. Self-adjusting binary search trees. Journal of the ACM (JACM), 32(3):652–686, 1985. [ST11] Daniel A. Spielman and Shang-Hua Teng. Spectral sparsification of graphs. SIAM J. Comput., 40(4):981–1025, July 2011. [ST14] Daniel A. Spielman and Shang-Hua Teng. Nearly linear time algorithms for preconditioning and solving symmetric, diagonally dominant linear systems. SIAM Journal on Matrix Analysis and Applications, 35(3):835–885, 2014. Available at http://arxiv.org/abs/cs/0607105. [Tro12] Joel A. Tropp. User-friendly tail bounds for sums of random matrices. Found. Comput. Math., 12(4):389–434, August 2012. Available at http://arxiv.org/abs/1004.4389. [Vis12] N. K. Vishnoi. Lx = b laplacian solvers and their algorithmic applications, 2012. [Wil12] Virginia Vassilevska Williams. Multiplying matrices faster than coppersmith-winograd. In Proceedings of the Forty-fourth Annual ACM Symposium on Theory of Computing, STOC ’12, pages 887–898, New York, NY, USA, 2012. ACM. Available at: https://pdfs.semanticscholar.org/3030/fa2aecda339d593b86a260bfab9988b42df7.pdf. A Deferred Proofs We now provide detailed proofs of the combinatorial facts about random subsets of edges that are discussed briefly in Section 3. Proof. (of Lemma 3.1) 60 This probability is obtained by dividing the number of subsets of s edges that the  contain b n − 1 edges in T , against the number of subsets of s edges from m, which using ab = (a) , gives: (b)b     (m − n + 1)s−n+1 (s)s m−n+1 m / = , s−n+1 s (m)s (s − n + 1)s−n+1 (7) and the two terms can be simplified by the rule (a)b /(a − k)b−k = (a)k . Furthermore, (a)b = a b  1 1− a   b−1 ··· 1 − a  = a exp We then use the Taylor expansion of ln(1 − x) = − = ab exp − Pb−1 i=1 i − a Pb−1 2 i=1 i − 2a2 b b−1 X i=1 P∞ xi i=1 i  i ln 1 − a ! to obtain !  2  3  3 b b i b i=1 − .... = a exp − − O 3 3a 2a a2 Pb−1 (s)n−1 Substituting into (m) gives n−1  3  3   3   2  2 n n n n2 n n n−1 n−1 −O +O =p exp − − O p exp − + 2s 2m s2 m2 2s s2   3 2 n2 is absorbed by O ns2 because m ≥ sn was assumed. where 2m Proof. (Of Lemma 3.2) As before, we have |T1 ∪ T2 |2 −O PrH [T1 , T2 ∈ H] = p|T1 ∪T2 | exp − 2s  n3 s2 ! Invoking the identity: |T1 ∪ T2 | = 2n − 2 − |T1 ∩ T2 | gives PrH [T1 , T2 ∈ H] = p Using the algebraic identity 2n−2 −k p  3   n (2n − 2 − k)2 −O . exp − 2s s2 (2n − 2 − k)2 ≥ 4n2 + 4nk and dropping the trailing (negative) lower order term gives:   4n2 4nk 2n−2 −k + , PrH [T1 , T2 ∈ H] ≤ p · p exp − 2s 2s 2 upon which we can pull out the 4n 2s term in the exponential to get a term that only depends k. k −k Grouping the p term together with the exp( 2n s ) term, and using the fact that exp(t) ≤ 1 + 2t when t ≤ 0.1 then gives the result. 61 Proof. (of Lemma 3.5) We first separate the summation in terms of all possible forests F of size k that any pair of trees could intersect in X T1 ,T2 |T1 ∩T2 |=k X w (T1 ) · w (T2 ) = X F ⊆E T1 ,T2 |F |=k F =T1 ∩T2 w (T1 ) · w (T2 ) We then consider the inner summation, the number of pairs of trees T1 , T2 with T1 ∩ T2 = F for some particular set F of size k. This is upper bounded by the square of the number of trees containing F : X T1 ,T2 F =T1 ∩T2 w (T1 ) · w (T2 ) ≤ X T1 ,T2 F ⊆T1 ∩T2  w (T1 ) · w (T2 ) =  X T :F ⊆T 2 w (T ) This allow us to directly incorporate the bounds from Lemma 3.4, and in turn the assumption n of τ e ≤ m to obtain the bound: X T1 ,T2 F =T1 ∩T2 w (T1 ) · w (T2 ) ≤  TG  n k 2 m . Furthermore, the number of possible subsets of F is bounded by k even more crudely by mk! . Incorporating this then gives: X T1 ,T2 |T1 ∩T2 |=k m k , which can be bounded    2  2 k mk n k n 2 1 w (T1 ) · w (T2 ) ≤ = TG · · TG . k! m k! m 62
8cs.DS
Computing the L1 Geodesic Diameter and Center of a Polygonal Domain∗ Sang Won Bae1 , Matias Korman2 , Joseph S.B. Mitchell3 , Yoshio Okamoto4 , Valentin Polishchuk5 , and Haitao Wang6 arXiv:1512.07160v2 [cs.CG] 9 Nov 2016 1 2 3 4 5 6 Kyonggi University, Suwon, South Korea. [email protected] Tohoku University, Sendai, Japan. [email protected] Stony Brook University, New York, USA. [email protected] The University of Electro-Communications, Tokyo, Japan. [email protected] Linköping University, Linköping, Sweden. [email protected] Utah State University, Utah, USA. [email protected] Abstract For a polygonal domain with h holes and a total of n vertices, we present algorithms that compute the L1 geodesic diameter in O(n2 + h4 ) time and the L1 geodesic center in O((n4 + n2 h4 )α(n)) time, respectively, where α(·) denotes the inverse Ackermann function. No algorithms were known for these problems before. For the Euclidean counterpart, the best algorithms compute the geodesic diameter in O(n7.73 ) or O(n7 (h + log n)) time, and compute the geodesic center in O(n11 log n) time. Therefore, our algorithms are significantly faster than the algorithms for the Euclidean problems. Our algorithms are based on several interesting observations on L1 shortest paths in polygonal domains. Keywords and phrases geodesic diameter, geodesic center, shortest paths, polygonal domains, L1 metric 1 Introduction A polygonal domain P is a closed and connected polygonal region in the plane R2 , with h ≥ 0 holes (i.e., simple polygons). Let n be the total number of vertices of P. Regarding the boundary of P as obstacles, we consider shortest obstacle-avoiding paths lying in P between any two points p, q ∈ P. Their geodesic distance d(p, q) is the length of a shortest path between p and q in P. The geodesic diameter (or simply diameter) of P is the maximum geodesic distance over all pairs of points p, q ∈ P, i.e., maxp∈P maxq∈P d(p, q). Closely related to the diameter is the min-max quantity minp∈P maxq∈P d(p, q), in which a point p∗ that minimizes maxq∈P d(p∗ , q) is called a geodesic center (or simply center) of P. Each of the above quantities is called Euclidean or L1 depending on which of the Euclidean or L1 metric is adopted to measure the length of paths. For simple polygons (i.e., h = 0), the Euclidean geodesic diameter and center have been studied since the 1980s [3, 8, 23]. For the diameter, Chazelle [8] gave the first O(n2 )-time algorithm, followed by an O(n log n)-time algorithm by Suri [23]. Finally, Hershberger and Suri [15] gave a linear-time algorithm for computing the diameter. For the center, after an O(n4 log n)-time algorithm by Asano and Toussaint [3], Pollack, Sharir, and Rote [21] gave an O(n log n) time algorithm for computing the geodesic center. Recently, Ahn et al. [1] solved the problem in O(n) time. ∗ A preliminary version of this paper appeared in the Proceedings of the 33rd International Symposium on Theoretical Aspects of Computer Science (STACS 2016). © S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang; licensed under Creative Commons License CC-BY Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 2 The L1 Geodesic Diameter and Center For the general case (i.e., h > 0), the problems are more difficult. The Euclidean diameter problem was solved in O(n7.73 ) or O(n7 (h + log n)) time [4]. The Euclidean center problem was first solved in O(n12+ ) time for any  > 0 [5] and then an improved O(n11 log n) time algorithm was given in [24]. For the L1 versions, the geodesic diameter and center of simple polygons can be computed in linear time [6, 22], but we are unaware of any previous algorithms for polygonal domains. In this paper, we present the first algorithms that compute the geodesic diameter and center of a polygonal domain P (as defined above) in O(n2 + h4 ) and O((n4 + n2 h4 )α(n)) time, respectively, where α(·) is the inverse Ackermann function. Comparing with the algorithms for the same problems under the Euclidean metric, our algorithms are much more efficient, especially when h is significantly smaller than n. As discussed in [4], a main difficulty of polygonal domains seemingly arises from the fact that there can be several topologically different shortest paths between two points, which is not the case for simple polygons. Bae, Korman, and Okamoto [4] observed that the Euclidean diameter can be realized by two interior points of a polygonal domain, in which case the two points have at least five distinct shortest paths. This difficulty makes their algorithm suffer a fairly large running time. Similar issues also arise in the L1 metric, where a diameter may also be realized by two interior points (this can be seen by extending the examples in [4]). We take a different approach from [4]. We first construct an O(n2 )-sized cell decomposition of P such that the L1 geodesic distance function restricted to any pair of two cells can be explicitly described in O(1) complexity. Consequently, the L1 diameter and center can be obtained by exploring these cell-restricted pieces of the geodesic distance. This leads to simple algorithms that compute the diameter in O(n4 ) time and the center in O(n6 α(n)) time. With the help of an “extended corridor structure” of P [9, 10, 11], we reduce the O(n2 ) complexity of our decomposition to another “coarser” decomposition of O(n + h2 ) complexity; with another crucial observation (Lemma 7), one may compute the diameter in O(n3 + h4 ) time by using our techniques for the above O(n4 ) time algorithm. One of our main contributions is an additional series of observations (Lemmas 9 to 18) that allow us to further reduce the running time to O(n2 + h4 ). These observations along with the decomposition may have other applications as well. The idea for computing the center is similar. We are motivated to study the L1 versions of the diameter and center problems in polygonal (even non-rectilinear) domains for several reasons. First, the L1 metric is natural and well studied in optimization and routing problems, as it models actual costs in rectilinear road networks and certain robotics/VLSI applications. Indeed, the L1 diameter and center problems in the simpler setting of simply connected domains have been studied [6, 22]. Second, the L1 metric approximates the Euclidean metric. Further, improved understanding of algorithmic results in one metric can assist in understanding in other metrics; e.g., the continuous Dijkstra methods for L1 shortest paths of [18, 19] directly led to improved results for Euclidean shortest paths. 1.1 Preliminaries For any subset A ⊂ R2 , denote by ∂A the boundary of A. Denote by pq the line segment with endpoints p and q. The L1 length of pq is defined to be |xp − xq | + |yp − yq |, where xp and yp are the x- and y-coordinates of p, respectively, and xq and yq are the x- and y-coordinates of q, respectively. For any polygonal path π ∈ R2 , let |π| be the L1 length of π, which is the sum of the L1 lengths of all segments of π. In the following, a path always refers to a polygonal path. A path is xy-monotone (or monotone for short) if every vertical S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang or horizontal line intersects it in at most one connected component. Following is a basic observation on the L1 length of paths in R2 , which will be used in our discussion. I Fact 1. For any monotone path π between two points p, q ∈ R2 , |π| = |pq| holds. We view the boundary ∂P of our polygonal domain P as a series of obstacles so that no path in P is allowed to cross ∂P. Throughout the paper, unless otherwise stated, a shortest path always refers to an L1 shortest path and the distance/length of a path (e.g., d(p, q)) always refers to its L1 distance/length. The diameter/center always refers to the L1 geodesic diameter/center. For simplicity of discussion, we make a general position assumption that no two vertices of P have the same x- or y-coordinate. The following will also be exploited as a basic fact in further discussion. I Fact 2 ([13, 14]). In any simple polygon P , there is a unique Euclidean shortest path π between any two points in P . The path π is also an L1 shortest path in P . The rest of the paper is organized as follows. In Section 2, we introduce our cell decomposition of P and exploit it to have preliminary algorithms for computing the diameter and center of P. The algorithms will be improved later in Section 4, based on the extended corridor structure and new observations discussed in Section 3. One may consider the preliminary algorithms in Section 2 relatively straightforward, but we present them for the following reasons. First, they provide an overview on the problem structure. Second, they will help the reader to understand the more sophisticated algorithms given in Section 4. Third, some parts of them will also be needed in the algorithms in Section 4. 2 The Cell Decomposition and Preliminary Algorithms In this section, we introduce our cell decomposition D of P and exploit it to have preliminary algorithms that compute the diameter and center of P. We first build the horizontal trapezoidal map by extending a horizontal line from each vertex of P until each end of the line hits ∂P. Next, we compute the vertical trapezoidal map by extending a vertical line from each vertex of P and each of the ends of the above extended lines. We then overlay the two trapezoidal maps, resulting in a cell decomposition D of P (e.g., see Fig. 1). The above extended horizontal or vertical line segments are called the diagonals of D. Note that D has O(n) diagonals and O(n2 ) cells. Each cell σ of D is bounded by two to four diagonals and at most one edge of P, and thus appears as a trapezoid or a triangle; let Vσ be the set of vertices of D that are incident to σ (note that |Vσ | ≤ 4). By an abuse of notation, we let D also denote the set of all the cells of the decomposition. Each cell of D is an intersection between a trapezoid of the horizontal trapezoidal map and another one of the vertical trapezoidal map. Two cells of D are aligned if they are contained in the same trapezoid of the horizontal or vertical trapezoidal map, and unaligned otherwise. Lemma 1 is crucial for computing both the diameter and the center of P. I Lemma 1. Let σ, σ 0 be any two cells of D. For any point s ∈ σ and any point t ∈ σ 0 , if σ and σ 0 are aligned, then d(s, t) = |st|; otherwise, there exists an L1 shortest path between s and t that passes through two vertices v ∈ Vσ and v 0 ∈ Vσ0 (e.g., see Fig. 2). Proof. If two cells σ, σ 0 ∈ D are aligned, then they are contained in a trapezoid τ of the vertical or horizontal trapezoidal map. Since τ is convex, any two points in τ can be joined by a straight segment, so we have d(s, t) = |st| for any s ∈ σ and t ∈ σ. Now, suppose that σ and σ 0 are unaligned (e.g., see Fig. 1). Let π be any shortest path between s and t. We first observe that π intersects one horizontal diagonal e1 of D and one 3 4 The L1 Geodesic Diameter and Center t t v0 s s e1 e2 e1 v e2 Figure 1 The cell decomposition D of P, and a Figure 2 Illustrating Lemma 1: a shortest path shortest path from s to t. through vertices v ∈ Vσ and v 0 ∈ Vσ0 . vertical diagonal e2 , both of which bound σ (e.g., see Fig. 1, where e1 and e2 are highlighted with red color): otherwise, σ and σ 0 must be aligned. Since e1 and e2 are bounding σ, the intersection v = e1 ∩ e2 is a vertex of σ (e.g., see Fig. 2). Let p1 be the first intersection of π with e1 while we go along π from s to t. Similarly, define p2 to be the first intersection of π with e2 . Since e1 is horizontal and e2 is vertical, the union of the two line segments p1 v ∪ vp2 is a shortest path between p1 and p2 . We replace the portion of π between p1 and p2 by p1 v ∪ vp2 to have another s-t path π 0 . Since p1 v ∪ vp2 is monotone, its length is equal to |p1 p2 | by Fact 1. This implies that π 0 is a shortest path between s and t and passes through the vertex v. Symmetrically, the above argument can be applied to the other side, the destination t and the cell σ 0 , which implies that π 0 can be modified to a s-t shortest path π 00 that passes through v and simultaneously a vertex v 0 of σ 0 . The lemma thus follows. J 2.1 Computing the Geodesic Diameter In this section, we present an O(n4 ) time algorithm for computing the diameter of P. The general idea is to consider every pair of cells of D separately. For each pair of such cells σ, σ 0 ∈ D, we compute the maximum geodesic distance between σ and σ 0 , that is, maxs∈σ,t∈σ0 d(s, t), called the (σ, σ 0 )-constrained diameter. Since D is a decomposition of P, the diameter of P is equal to the maximum value of the constrained diameters over all pairs of cells of D. We handle two cases depending on whether σ and σ 0 are aligned. If σ and σ 0 are aligned, by Lemma 1, for any s ∈ σ and t ∈ σ 0 , we have d(s, t) = |st|, i.e, the L1 distance of st. Since the L1 distance function is convex, the (σ, σ 0 )-constrained diameter is always realized by some pair (v, v 0 ) of two vertices with v ∈ Vσ and v 0 ∈ Vσ0 . We are thus done by checking at most 16 pairs of vertices, in O(1) time. In the following, we assume that σ and σ 0 are unaligned. Consider any point s ∈ σ and any point t ∈ σ 0 . For any vertex v ∈ Vσ and any vertex v 0 ∈ Vσ0 , consider the path from s to t obtained by concatenating sv, a shortest path from v to v 0 , and v 0 t, and let dvv0 (s, t) be its length. Lemma 1 ensures that d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t). Since dvv0 (s, t) = |sv| + |v 0 t| + d(v, v 0 ) and d(v, v 0 ) is constant over all (s, t) ∈ σ × σ 0 , the function dvv0 is linear on σ × σ 0 . Thus, it is easy to compute the (σ, σ 0 )-constrained diameter once we know the value of d(v, v 0 ) for every pair (v, v 0 ) of vertices. S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang I Lemma 2. For any two cells σ, σ 0 ∈ D, the (σ, σ 0 )-constrained diameter can be computed in constant time, provided that d(v, v 0 ) for every pair (v, v 0 ) with v ∈ Vσ and v 0 ∈ Vσ0 has been computed. Proof. The case where σ and σ 0 are aligned is easy as discussed above. We thus assume they are unaligned. Assume that we know the value of d(v, v 0 ) for every pair (v, v 0 ) with v ∈ Vσ and v 0 ∈ Vσ0 . Recall that d(s, t) = minv∈Vσ ,v0 ∈Vσ dvv0 (s, t) and dvv0 (s, t) = |sv| + |v 0 t| + d(v, v 0 ). Further, note that |Vσ | ≤ 4, |Vσ0 | ≤ 4. Since each dvv0 is a linear function on its domain σ × σ 0 , its graph appears as a hyperplane in a 5-dimensional space. Thus, the geodesic distance function d restricted on σ × σ 0 corresponds to the lower envelope of those hyperplanes. Since there are only a constant number of pairs (v, v 0 ), the function d can also be explicitly constructed in O(1) time. Finally, we find the highest point on the graph of d by traversing all of its faces. J For each vertex v of D, a straightforward method can compute d(v, v 0 ) for all other vertices v 0 of D in O(n2 log n) time, by first computing the shortest path map SPM (v) [18, 19] in O(n log n) time and then computing d(v, v 0 ) for all v 0 ∈ D in O(n2 log n) time. We instead give a faster sweeping algorithm in Lemma 3 by making use of the property that all vertices on every diagonal of D are sorted. I Lemma 3. For each vertex v of D, we can evaluate d(v, v 0 ) for all vertices v 0 of D in O(n2 ) time. Proof. Our algorithm attains its efficiency by using the property that all vertices on each diagonal of D are sorted. Specifically, suppose that D is represented by a standard data structure, e.g., the doubly connected edge list. Then, by traversing each diagonal (either vertical or horizontal), we can obtain a vertically or horizontally sorted list of vertices on that diagonal. We first compute the shortest path map SPM (v) in O(n log n) time [18, 19]. We then apply a standard sweeping technique, say, we sweep SPM (v) by a vertical line from left to right. The events are when the sweep line hits vertices of SPM (v), obstacle vertices of P, or vertical diagonals of D. Note that each vertex of D is either on a vertical diagonal or an obstacle vertex. We use the standard technique to handle the events of vertices of SPM (v) and P, and each such event costs O(log n) time. For each event of a vertical diagonal of D, we simply do a linear search on the sweeping status to find the cells of SPM (v) that contain the cell vertices of D on the diagonal. Each such event takes O(n) time since each diagonal of D has O(n) vertices. Note that the total number of events is O(n). Hence, the running time of the sweeping algorithm is O(n2 ). J Thus, after O(n4 )-time preprocessing, for any two cells σ, σ 0 ∈ D, the (σ, σ 0 )-constrained diameter can be computed in O(1) time by Lemma 2. Since D has O(n2 ) cells, it suffices to handle at most O(n4 ) pairs of cells, resulting in O(n4 ) candidates for the diameter, and the maximum is the diameter. Hence, we obtain the following result. I Theorem 4. The L1 geodesic diameter of P can be computed in O(n4 ) time. 2.2 Computing the Geodesic Center We now present an algorithm that computes an L1 center of P. The observation in Lemma 1 plays an important role in our algorithm. 5 6 The L1 Geodesic Diameter and Center For any point q ∈ P, we define R(q) to be the maximum geodesic distance between q and any point in P, i.e., R(q) := maxp∈P d(p, q). A center q ∗ of P is defined to be a point with R(q ∗ ) = minq∈P R(q). Our approach is again based on the decomposition D: for each cell σ ∈ D, we want to find a point q ∈ σ that minimizes the maximum geodesic distance d(p, q) over all p ∈ P. We call such a point q ∈ σ a σ-constrained center. Thus, if q 0 is a σ-constrained center, then we have R(q 0 ) = minq∈σ R(q). Clearly, the center q ∗ of P must be a σ-constrained center for some σ ∈ D. Our algorithm thus finds a σ-constrained center for every σ ∈ D, which at last results in O(n2 ) candidates for a center of P. Consider any cell σ ∈ D. To compute a σ-constrained center, we investigate the function R restricted to σ and exploit Lemma 1 again. To utilize Lemma 1, for any point q ∈ σ, we define Rσ0 (q) := maxp∈σ0 d(p, q) for any σ 0 ∈ D. For any q ∈ σ, R(q) = maxσ0 ∈D Rσ0 (q), that is, R is the upper envelope of all the Rσ0 on the domain σ. Our algorithm explicitly computes the functions Rσ0 for all σ 0 ∈ D and computes the upper envelope U of the graphs of the Rσ0 . Then, a σ-constrained center corresponds to a lowest point on U. We observe the following for the function Rσ0 . I Lemma 5. The function Rσ0 is piecewise linear on σ and has O(1) complexity. Proof. Recall that Rσ0 (q) = maxp∈σ0 d(p, q) for q ∈ σ. In this proof, we regard d to be restricted on σ × σ 0 ⊂ R4 and use a coordinate system of R4 by introducing 4 axes, x, y, u, and w with p = (x, y) ∈ σ and q = (u, w) ∈ σ 0 . Thus, we may write Rσ0 (q) = Rσ0 (x, y) = max(u,w)∈σ0 d(x, y, u, w). The graph of function d consists of O(1) linear patches as shown in the proof of Lemma 2. Once we fully identify the geodesic distance function d on σ × σ 0 , we consider its graph S := {z = d(x, y, u, w)} for all (x, y, u, w) ∈ σ × σ 0 , which is a hypersurface in a 5-dimensional space (σ × σ 0 ) × R ⊂ R5 with an additional axis z. We then project the graph S onto the (x, y, z)-space. More precisely, the projection of S is the set {(x, y, z) | (x, y, u, w, z) ∈ S}. Thus, for any (x, y) ∈ σ, Rσ0 (x, y) is determined by the highest point in the intersection of the projection with the z-axis parallel line through point (x, y, 0). This implies that the function Rσ0 simply corresponds to the upper envelope (in the z-coordinate) of the projection of S. Since S consists of O(1) linear patches, so does the upper envelope of its projection, which concludes the proof. J Now, we are ready to describe how to compute a σ-constrained center. We first handle every cell σ 0 ∈ D to compute the graph of Rσ0 and thus gather its linear patches. Let Γ be the family of those linear patches for all σ 0 ∈ D. We then compute the upper envelope of Γ and find a lowest point on the upper envelope, which corresponds to a σ-constrained center. Since |Γ| = O(n2 ) by Lemma 5, the upper envelope can be computed in O(n4 α(n)) time by executing the algorithm by Edelsbrunner et al. [12], where α(·) denotes the inverse Ackermann function. The following theorem summarizes our algorithm. I Theorem 6. An L1 geodesic center of P can be computed in O(n6 α(n)) time. Proof. As a preprocessing, we compute all of the vertex-to-vertex geodesic distances d(v, v 0 ) for all pairs of vertices of D in O(n4 ) time. We show that for a fixed σ ∈ D, a σ-constrained center can be computed in O(n4 α(n)) time. As discussed in the proof of Lemma 2, for any σ 0 ∈ D, the geodesic distance function d restricted on σ × σ 0 , along with its graph D over σ × σ 0 , can be specified in O(1) time. By Lemma 5, from D we can describe the function Rσ0 in O(1) time. The last task is to compute the upper envelope of all Rσ0 in O(n4 α(n)) time, as discussed above, by executing the algorithm by Edelsbrunner et al. [12]. J S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang e b e b d d Pi c Pj Pj x Pi πK y f c a f a (a) Figure 3 A triangulation T of P and the 3regular graph obtained from the dual graph of T whose nodes and edges are depicted by black dots and red solid curves. Each junction triangle corresponds to a node and removing all junction triangles results in three corridors, in this figure, each of which corresponds to an edge of the graph. 3 (b) Figure 4 Hourglasses HK in corridors K. The dashed segments be and af are diagonals of junction triangles in T . (a) HK is open. Five bays can be seen. A bay with gate cd is shown as the shaded region. (b) HK is closed. There are three bays and a canal, and the shaded region depicts the canal with two gates dx and cy. Exploiting the Extended Corridor Structure In this section, we briefly review the extended corridor structure of P and present new observations, which will be crucial for our improved algorithms in Section 4. The corridor structure has been used for solving shortest path problems [9, 16, 17]. Later some new concepts such as “bays,” “canals,” and the “ocean” were introduced [10, 11], referred to as the “extended corridor structure.” 3.1 The Extended Corridor Structure Let T denote an arbitrary triangulation of P (e.g., see Figure 3). We can obtain T in O(n log n) time or O(n + h log1+ h) time for any  > 0 [7]. Let G denote the dual graph of T , i.e., each node of G(P) corresponds to a triangle in T (P) and each edge connects two nodes of G(P) corresponding to two triangles sharing a diagonal of T (P). Based on G, one can obtain a planar 3-regular graph, possibly with loops and multi-edges, by repeatedly removing all degree-one nodes and then contracting all degree-two nodes. The resulting 3-regular graph has O(h) faces, nodes, and edges [17]. Each node of the graph corresponds to a triangle in T , called a junction triangle. The removal of all junction triangles from P results in O(h) components, called corridors, each of which corresponds to an edge of the graph. See Figure 3. Refer to [17] for more details. Next we briefly review the concepts of bays, canals, and the ocean. Refer to [10, 11] for more details. Let P1 , . . . , Ph be the h holes of P and P0 be the outer polygon of P. For simplicity, a hole may also refer to the unbounded region outside P0 hereafter. The boundary ∂K of a corridor K consists of two diagonals of T and two paths along the boundary of holes Pi and Pj , respectively (it is possible that Pi and Pj are the same hole, in which case one may consider Pi and Pj as the above two paths respectively). Let a, b ∈ Pi and e, f ∈ Pj be the endpoints of the two paths, respectively, such that be and f a are diagonals of T , each of which bounds a junction triangle. See Figure 4. Let πab (resp., πef ) denote the Euclidean shortest path from a to b (resp., e to f ) inside K. The region HK bounded by πab , πef , be, and f a is called an hourglass, which is either open if πab ∩ πef = ∅, or closed, otherwise. If HK is open, then both πab and πef are convex chains and are called the sides of HK ; otherwise, HK consists of two “funnels” and a path πK = πab ∩ πef joining the two apices 7 8 The L1 Geodesic Diameter and Center of the two funnels, called the corridor path of K. The two funnel apices (e.g., x and y in Figure 4(b)) connected by πK are called the corridor path terminals. Note that each funnel comprises two convex chains. We consider the region of K minus the interior of HK , which consists of a number of simple polygons facing (i.e., sharing an edge with) one or both of Pi and Pj . We call each of these simple polygons a bay if it is facing a single hole, or a canal if facing both holes. Each bay is bounded by a portion of the boundary of a hole and a segment cd between two obstacle vertices c, d that are consecutive along a side of HK . We call the segment cd the gate of the bay. (See Figure 4(a).) On the other hand, there exists a unique canal for each corridor K only when HK is closed and the two holes Pi and Pj both bound the canal. The canal in K in this case completely contains the corridor path πK . A canal has two gates xd and yc that are two segments facing the two funnels, respectively, where x, y are the corridor path terminals and d, c are vertices of the funnels. (See Figure 4(b).) Note that each bay or canal is a simple polygon. Let M ⊆ P be the union of all junction triangles, open hourglasses, and funnels. We call M the ocean. Its boundary ∂M consists of O(h) convex vertices and O(h) reflex chains each of which is a side of an open hourglass or of a funnel. Note that P \ M consists of all bays and canals of P. For convenience of discussion, define each bay/canal in such a way that they do not contain their gates and hence their gates are contained in M; therefore, each point of P is either in a bay/canal or in M, but not in both. After the triangulation T is obtained, computing the ocean, all bays and canals can be done in O(n) time [10, 11, 17]. Roughly speaking, the reason we partition P into the ocean, bays, and canals is to facilitate evaluating the distance d(s, t) for any two points s and t in P. For example, if both s and t are in M, then we can use a similar method as in Section 2 to evaluate d(s, t). However, the challenging case happens when one of s and t is in M and the other is in a bay or canal. The following lemma is one of our key observations for our improved algorithms in Section 4. It essentially tells that for any point s ∈ P and any bay or canal A, the farthest point of s in A is achieved on the boundary ∂A, which is similar in spirit to the simple polygon case. I Lemma 7. Let s ∈ P be any point and A be a bay or canal of P. Then, for any t ∈ A, there exists t0 ∈ ∂A such that d(s, t) ≤ d(s, t0 ). Equivalently, maxt∈A d(s, t) = maxt∈∂A d(s, t). Proof. Recall that the gates of A are not contained in A but in the ocean M. Let Ā be the closure of A, that is, Ā consists of A and its gates. For any p, q ∈ Ā, let dA (p, q) be the L1 geodesic distance in Ā. Since Ā is a simple polygon, Fact 2 implies that there is a unique Euclidean shortest path π2 (p, q) in Ā between any p, q ∈ Ā, and dA (p, q) = |π2 (p, q)|. In general, we have dA (p, q) ≥ d(p, q). Depending on whether A is a bay or a canal, our proof will consider two cases. We first prove a basic property as follows. A Basic Property Consider any point s0 ∈ P and any point t0 ∈ A. Then, we claim that there exists a shortest s0 -t0 path π with the following property (*): (*) π crosses each gate of A at most once and each component of π ∩ Ā is the unique Euclidean shortest path π2 (p, q) for some points p, q ∈ Ā. S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang A u1 g s B u1 t u1 t u2 t g A (a) t′ (b) γ∗ y By u2 B u2 (c) Figure 5 Illustration to the proof of Lemma 7 when A is a bay. (a) When s ∈ Ā and (b)(c) when s∈ / Ā. Consider any shortest s0 -t0 path π 0 . If π 0 crosses a gate g of A at least twice, then let p ∈ g and q ∈ g be the first and last points on g we encounter when walking along π 0 from s0 to t0 . We can replace the portion of π 0 between p and q with the line segment pq by Fact 1 to obtain another shortest path that crosses g at most once. One can repeat this procedure for all gates of A to have a shortest path π 00 crossing each gate of A at most once. Then, we take a connected component of π 00 ∩ Ā, which is an L1 shortest path between its two endpoints p, q inside Ā. This implies that d(p, q) = dA (p, q) = |π2 (p, q)|, so we can replace the component by π2 (p, q). Repeat this for all components of π 00 ∩ Ā to obtain another shortest s0 -t0 path π with the desired property (*). The Bay Case To prove the lemma, we first prove the case where A is a bay. Then, A has a unique gate g. Recall that the gate g is not contained in A. Depending on whether s is in Ā, there are two cases. Suppose that s ∈ Ā. Let t ∈ A be any point in A. By our claim, there exists a shortest s-t path π in P with property (*). Since both s and t lie in Ā, π does not cross g, and is thus contained in Ā. Moreover, by property (*), we have π = π2 (s, t). Hence, d(s, t) = dA (s, t). If t lies on ∂A, then the lemma trivially holds. Suppose that t lies in the interior of A. Then, we can extend the last segment of π2 (s, t) until it hits a point t0 on the boundary ∂A. See Figure 5(a). Again since Ā is a simple polygon, the extended path is indeed π2 (s, t0 ). By the above argument, d(s, t0 ) = dA (s, t0 ) = |π2 (s, t0 )|, which is strictly larger than |π2 (s, t)| = d(s, t). Suppose that s ∈ / Ā. Then, any shortest path from s to any point t ∈ A must cross the gate g. This implies that d(s, t) = minx∈g {d(s, x) + dA (x, t)} for any t ∈ A. We show that there exists t0 ∈ ∂A such that for any point x ∈ g, it holds that dA (x, t) ≤ dA (x, t0 ), which implies that d(s, t) = minx∈g {d(s, x) + dA (x, t)} ≤ minx∈g {d(s, x) + dA (x, t0 )} = d(s, t0 ). For the purpose, we consider the union of π2 (x, t) for all x ∈ g. The union forms a funnel Fg (t) plus the Euclidean shortest path π2 (u, t) from the apex u of Fg (t) to t. If u 6= t, then we extend the last segment of π2 (u, t) to a point t0 on the boundary ∂A, similarly to the previous case so that dA (u, t) ≤ dA (u, t0 ) and thus dA (x, t) ≤ dA (x, t0 ) for any x ∈ g. Otherwise, if u = t, then let u1 and u2 be the two vertices of Fg (t) adjacent to the apex t. See Figure 5(b). Observe that the segment u1 u2 separates t and the gate g, and hence path π2 (x, t) for any x ∈ g crosses u1 u2 . We now claim that there exists a ray γ ∗ from t such that as t moves along γ ∗ , dA (t, y) for any fixed y ∈ u1 u2 is nondecreasing. If the claim is true, then we select t0 = γ ∗ ∩ ∂A, so the lemma follows since it holds that dA (t, x) = miny∈ u1 u2 {dA (t, y) + dA (y, x)} ≤ miny∈ u1 u2 {dA (t0 , y) + dA (y, x)} = dA (t0 , x) 9 10 The L1 Geodesic Diameter and Center d g Ag x x′ g′ c y Ag′ y′ Figure 6 Illustration to the proof of Lemma 7 when A is a canal with two gates g = dx and g 0 = cy. for any x ∈ g. Next, we prove the claim. For each y ∈ u1 u2 , let By be the L1 disk centered at y with radius dA (y, t) = |yt|. See Figure 5(c). Since t lies on the boundary of By , as we move t along a ray γ in some direction outwards By , |yt| is not decreasing, that is, for any p ∈ γ, |yp| ≥ |yt|. This also implies that dA (y, p) ≥ |yp| ≥ |yt| = dA (y, t). Let hy be the set of all such rays γ that as t moves along γ, |yt| is not decreasing. Our goal is thus to show that T 6 ∅, and pick γ ∗ as any ray in the intersection. For the purpose, we consider y∈u1 u2 hy = the four quadrants—left-upper, right-upper, left-lower, and right-lower—centered at t. Then, since the By are all L1 disks, the set hy only depends on which quadrant y belongs to; more precisely, for any y in a common quadrant, the set hy stays constant. For example, for any y ∈ u1 u2 lying in the right-upper quadrant, then hy is commonly the set of all rays from t in direction between 135◦ and 315◦ , inclusively, since t lies on the bottom-left edge of By in this case. Thus, the directions of all rays in hy span an angle of exactly 180◦ . Moreover, u1 u2 is a line segment and thus intersects only three quadrants. T Therefore, y∈u1 u2 hy is equal to the intersection of at most three different sets of rays, whose directions span an angle of 180◦ . (Figure 5(c) illustrates an example scene when T u1 u2 intersects three quadrants centered at t.) This implies that y∈u1 u2 hy 6= ∅. The Canal Case Above, we have proved the lemma for the bay case where A is a bay. Next, we turn to the canal case: suppose that A is a canal. Let g = dx and g 0 = cy be the two gates of A, where x and y are the two corridor path terminals (e.g., see Figure 6). We extend g from x into the interior of A, in the direction opposite to d. Note that due to the definition of canals, this extension always goes into the interior of A (refer to [10] for detailed discussion). Let x0 be the first point on ∂A hit by the extension. The line segment xx0 partitions A into two simple polygons, and the one containing d is denoted by Ag . We consider dx0 as an edge of Ag , but for convenience of discussion, we assume that Ag does not contain the segment dx0 . Define Ag0 analogously for the other gate g 0 = cy. If t ∈ Ag , then we can view Ag as a “bay” with gate dx0 , and apply the identical argument as done in the bay case, concluding that for any t ∈ Ag there exists t0 ∈ ∂Ag such that d(s, t) ≤ d(s, t0 ). If t0 ∈ ∂A, then we are done. Otherwise, if t0 ∈ xx0 , then s ∈ Ag according to our analysis on the bay case. In this case, we move t0 along xx0 to x or x0 , since max{d(s, x), d(s, x0 )} ≥ d(s, t0 ) ≥ d(s, t), we are done. The case of t ∈ Ag0 is analogous. S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang b Observe that for any p ∈ g, b := A \ (Ag ∪ Ag0 ). From now on, we suppose t ∈ A. Let A π2 (p, t) passes through the corridor path terminal x since t ∈ / Ag [10]; symmetrically, for any p0 ∈ g 0 , π2 (p0 , t) passes through y. Consider any L1 shortest s-t path π in P with property (*). We classify π into one of the following three types: (a) π lies inside A, that is, π = π2 (s, t), (b) when walking along π from s to t, the last gate crossed by π is g, or (c) is g 0 . Note that π falls into one of the three cases. In case (a), indeed we have s ∈ A and d(s, t) = dA (s, t). In case (b), π consists of a shortest path from s to x and π2 (x, t), and thus d(s, t) = d(s, x) + dA (x, t). Symmetrically, in case (c), we have d(s, t) = d(s, y) + dA (y, t). Depending on whether s ∈ Ā or not, we handle two possibilities. In the following, we assume property (*) when we discuss any shortest s-t path. Suppose that s ∈ / Ā. Then, any shortest s-t path in P must cross a gate of A. This means that there is no shortest s-t path of type (a), and we have d(s, t) = min{d(s, x) + b into three regions Rx , Ry , and dA (x, t), d(s, y) + dA (y, t)}. Consider a decomposition of A b b | d(s, x) + B such that Rx = {p ∈ A | d(s, x) + dA (x, p) < d(s, y) + dA (y, p)}, Ry = {p ∈ A b dA (x, p) > d(s, y) + dA (y, p)}, and B = {p ∈ A | d(s, x) + dA (x, p) = d(s, y) + dA (y, p)}. b of two This decomposition is clearly the geodesic Voronoi diagram in simple polygon A sites {x, y} with additive weights. See Aronov [2] and Papadopoulou and Lee [20]. Also, we have that d(s, t) = d(s, x) + dA (x, t) for any t ∈ Rx ; d(s, t) = d(s, y) + dA (y, t) for any t ∈ Ry . The region B is called the bisector between x and y. By the property of Voronoi b Let diagrams [2, 20], B = ∂Rx ∩ ∂Ry and B is a path connecting two points on ∂ A. b0 ∈ B be the intersection π2 (x, y) ∩ B. Then, dA (x, b0 ) = dA (y, b0 ) ≤ dA (x, b) = dA (y, b) for any b ∈ B, and moreover if we move b along B in one direction from b0 , dA (x, b) is nondecreasing. Thus, maxb∈B dA (x, b) is attained when b is an endpoint of B. When t ∈ ∂A, the lemma is trivial. If t ∈ B, then we let t0 be the endpoint of B in direction away from b0 . Then, by the property of the bisector B, we have dA (x, t) ≤ dA (x, t0 ) and dA (y, t) ≤ dA (y, t0 ), and hence d(s, t) ≤ d(s, t0 ). If t0 lies on the boundary ∂A, we b \ ∂A, say on xx0 . In this case, we conclude the lemma; otherwise, t0 may lie on ∂ A apply the analysis of the bay case where s ∈ / Ag to find a point t00 on ∂A such that d(s, t0 ) ≤ d(s, t00 ). If t lies in the interior of Rx , then we extend the last segment of π2 (x, t) until it hits b or a point t0 on ∂Rx . Then, we have that d(s, t0 ) ≥ d(s, t). Note that t0 lies on ∂ A 00 on B; in any case, we apply the above argument so that we can find a point t on ∂A with d(s, t00 ) ≥ d(s, t0 ) ≥ d(s, t). The case where t lies in the interior of Ry is handled analogously. b of Finally, suppose that s ∈ Ā. We again consider the L1 geodesic Voronoi diagram in A three sites {s, x, y} with additive weights 0, d(s, x), d(s, y), respectively. As done above, we observe that the maximum value maxt∈Ab d(s, t) is attained when t ∈ ∂A or t is a Voronoi vertex. The former case is analyzed above. Here, we prove that the latter case cannot happen. Note that there are three shortest paths of different types between s and the Voronoi vertex while there are exactly two shortest paths of types (b) and (c) to any point on the bisector between x and y. In the following, we show that the bisector between x and y cannot appear in the Voronoi diagram, which implies that the Voronoi diagram has no vertex. Suppose to the contrary that the bisector between x and y appears as a nonempty Voronoi edge of the Voronoi diagram, and that t is a point on it. That is, d(s, t) = d(s, x) + dA (x, t) = d(s, y) + dA (y, t) > dA (s, t). Let π and π 0 be two shortest s-t paths of type (b) and (c), respectively. Thus, π passes through x and π 0 passes through y to b By property (*), π crosses g 0 first and then g when walking along π from s reach t ∈ A. 11 12 The L1 Geodesic Diameter and Center p g x g q p g′ t s p x p′ g ′ y z t ′ L s Figure 7 Illustration to the proof of Lemma 7 Figure 8 Illustrating two shortest s-t paths π (red when A is a canal. dotted) and π 0 (blue solid), intersecting at z, in a canal with two gates g and g 0 . to t, and π 0 crosses g first and then g 0 . Let p ∈ g and p0 ∈ g 0 be the last point of π 0 ∩ g and π ∩ g 0 , respectively, when we walk along π and π 0 from s to t. We claim that π and π 0 intersect each other in a point other than s and t. Indeed, consider the loop L formed by the subpath of π between s and x, the segment xp, and the subpath of π 0 between s and p. See Figure 7. Also, let U be a disk centered at p with arbitrarily small radius and q ∈ π 0 ∩ ∂U be the point on π 0 not lying in A. If the loop L does not separate q and t, then the subpath of π from x to t must intersect π 0 in a point other than t (see Fig. 8), and thus the claim follows; otherwise, the subpath of π 0 from q to t must cross L at some point other than s and t, and thus the claim also follows. 0 Let z ∈ π ∩ π 0 \ {s, t} (see Fig. 8), and πzt and πzt be the subpath of π and π 0 , respectively, 0 from z to t. By the property of shortest paths, we have |πzt | = |πzt | = d(z, t). Hence, 0 00 replacing πzt by πzt in π results in another shortest s-t path π . If π 00 lies inside Ā, then we have d(s, t) = |π 00 | ≥ dA (s, t). Otherwise, π 00 crosses g 0 twice at p0 and y, and thus replacing the subpath of π 00 from p0 to y by p0 y results in another shortest path inside Ā. In either way, there is another L1 shortest s-t path of type (a), and hence d(s, t) = dA (s, t), a contradiction to the assumption that t lies on the bisector between x and y. This finishes the proof of the lemma. 3.2 J Shortest Paths in the Ocean M We now discuss shortest paths in the ocean M. Recall that corridor paths are contained in canals, but their terminals are on ∂M. By using the corridor paths and M, finding an L1 or Euclidean shortest path between two points s and t in M can be reduced to the convex case since ∂M consists of O(h) convex chains. For example, suppose both s and t are in M. Then, there must be a shortest s-t path π that lies in the union of M and all corridor paths [9, 11, 17]. Consider any two points s and t in M. A shortest s-t path π(s, t) in P is a shortest path in M that possibly contains some corridor paths. Intuitively, one may view corridor paths as “shortcuts” among the components of the space M. As in [17], since ∂M consists of O(h) convex vertices and O(h) reflex chains, the complementary region P 0 \ M (where P 0 refers to the union of P and all its holes) can be partitioned into a set B of O(h) convex objects with a total of O(n) vertices (e.g., by extending an angle-bisecting segment inward from each convex vertex [17]). If we view the objects in B as obstacles, then π is a shortest path avoiding all obstacles of B but possibly containing some corridor paths. Note that our S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang σ core Figure 9 Illustrating the core of a convex Figure 10 Illustrating the core-based cell decomposiobstacle: the (red) squared vertices are corridor tion DM : the (red) squared vertices are core vertices and path terminals. the green cell σ is a boundary cell. algorithms can work on P and M directly without using B; but for ease of exposition, we will discuss our algorithm with the help of B. Each convex obstacle Q of B has at most four extreme vertices: the topmost, bottommost, leftmost, and rightmost vertices, and there may be some corridor path terminals on the boundary of Q. We connect the extreme vertices and the corridor path terminals on ∂Q consecutively by line segments to obtain another polygon, denoted by core(Q) and called the core of Q (see Figure 9). Let Pcore denote the complement of the union of all cores core(Q) for all Q ∈ B and corridor paths in P. Note that the number of vertices of Pcore is O(h) and M ⊆ Pcore . For s, t ∈ Pcore , let dcore (s, t) be the geodesic distance between s and t in Pcore . The core structure leads to a more efficient way to find an L1 shortest path between two points in P. Chen and Wang [9] proved that an L1 shortest path between s, t ∈ M in Pcore can be locally modified to an L1 shortest path in P without increasing its L1 length. I Lemma 8 ([9]). For any two points s and t in M, d(s, t) = dcore (s, t) holds. Hence, to compute d(s, t) between two points s and t in M, it is sufficient to consider only the cores and the corridor paths, that is, Pcore . We thus reduce the problem size from O(n) to O(h). Let SPMcore (s) be a shortest path map for any source point s ∈ M. Then, SPMcore (s) has O(h) complexity and can be computed in O(h log h) time [9]. 3.3 Decomposition of the Ocean M We introduce a core-based cell decomposition DM of the ocean M (see Figure 10) in order to fully exploit the advantage of the core structure in designing algorithms computing the L1 geodesic diameter and center. For any Q ∈ B, the vertices of core(Q) are called core vertices. The construction of DM is analogous to that of the previous cell decomposition D for P. We first extend a horizontal line only from each core vertex until it hits ∂M to have a horizontal diagonal, and then extend a vertical line from each core vertex and each endpoint of the above horizontal diagonal. The resulting cell decomposition induced by the above diagonals is DM . Hence, DM is constructed in M with respect to core vertices. Note that DM consists of O(h2 ) cells and can be built in O(n log n + h2 ) time by a typical plane sweep algorithm. We call a cell σ of DM a boundary cell if ∂σ ∩ ∂M = 6 ∅. For any boundary cell σ, the portion ∂σ ∩ ∂M appears as a convex chain of Q ∈ B by our construction of its core and DM ; since ∂σ ∩ ∂M may contain multiple vertices of M, the complexity of σ may not be constant. Any non-boundary cell of DM is a rectangle bounded by four diagonals. Each 13 14 The L1 Geodesic Diameter and Center vertex of DM is either an endpoint of its diagonal or an intersection of two diagonals; thus, the number of vertices of DM is O(h2 ). Below we prove an analogue of Lemma 1 for the decomposition DM of M. Let Vσ be the set of vertices of DM incident to σ. Note that |Vσ | ≤ 4. We define the alignedness relation between two cells of DM analogously to that for D. We then observe an analogy to Lemma 1. I Lemma 9. Let σ, σ 0 be any two cells of DM . If they are aligned, then d(s, t) = |st| for any s ∈ σ and t ∈ σ 0 ; otherwise, there exists a shortest s-t path in P containing two vertices v ∈ Vσ and v 0 ∈ Vσ0 with d(s, t) = |sv| + d(v, v 0 ) + |v 0 t|. Proof. We first discuss the case where σ and σ 0 are aligned. In this case, they are bounded by two consecutive parallel diagonals of DM , and let S ⊂ M be the region in between the two diagonals. Since S consists of two monotone concave chains and the two diagonals by our construction of DM , it is not difficult to see that any s ∈ σ and t ∈ σ 0 can be joined by a monotone path π inside S. This implies that |π| = |st| = d(s, t) by Fact 1. Next, we consider the unaligned case. Suppose that σ and σ 0 are unaligned. By Lemma 8, there exists a shortest s-t path π in P such that π lies inside the union M and all the corridor paths of P. Our proof for this case is analogous to that of Lemma 1. Since σ and σ 0 are unaligned, there are two possibilities when we walk along π from s to t: either we meet a horizontal diagonal e1 and a vertical diagonal e2 of DM that bound σ, or enter a corridor path via its terminal x. In the former case, we can apply the same argument as done in the proof of Lemma 1 to show that π can be modified to pass through a vertex v ∈ Vσ with v = e1 ∩ e2 without increasing the length of the resulting path. In the latter case, observe by our construction of DM that x is also a vertex of DM and there is a diagonal extended from x. If x ∈ Vσ , we are done since d(s, x) = |sx| as discussed above (any cell σ is aligned with itself). Otherwise, there is a unique cell σ 00 6= σ ∈ DM with x ∈ Vσ00 that is aligned with σ, and there is a common diagonal e bounding σ and σ 00 . In this case, since π passes through x, it indeed intersects two diagonals, which means that this is the former case. J 4 Improved Algorithms In this section, we further explore the geometric structures and give more observations about our decomposition. These results, together with our results in Section 3, help us to give improved algorithms that compute the diameter and center, using a similar algorithmic framework as in Section 2. 4.1 The Cell-to-Cell Geodesic Distance Functions Recall that our preliminary algorithms in Section 2 rely on the nice behavior of the cell-to-cell geodesic distance function: specifically, d restricted to σ × σ 0 for any two cells σ, σ 0 ∈ D is the lower envelope of O(1) linear functions. We now have two different cell decompositions, D of P and DM of M. Here, we observe analogues of Lemmas 1 and 9 for any two cells in D ∪ DM , by extending the alignedness relation between cells in D and DM , as follows. Consider the geodesic distance function d restricted to σ × σ 0 for any two cells σ, σ 0 ∈ D ∪ DM . We call a cell σ ∈ D ∪ DM oceanic if σ ⊂ M, or coastal, otherwise. If both σ, σ 0 ∈ D ∪ DM are coastal, then σ, σ 0 ∈ D and the case is well understood as discussed in Section 2. Otherwise, there are two cases: the ocean-to-ocean case where both σ and σ 0 are oceanic, and the coast-to-ocean case where only one of them is oceanic. We discuss the two cases below. S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang Ocean-to-ocean For the ocean-to-ocean case, we extend the alignedness relation for all oceanic cells in D ∪ DM . To this end, when both σ and σ 0 are in D or DM , the alignedness has already been defined. For any two oceanic cells σ ∈ D and σ 0 ∈ DM , we define their alignedness relation in the following way. If σ is contained in a cell σ 00 ∈ DM that is aligned with σ 0 , then we say that σ and σ 0 are aligned. However, σ may not be contained in a cell of DM because the endpoints of horizontal diagonals of DM that are on bay/canal gates are not vertices of D and those endpoints create vertical diagonals in DM that are not in D. To resolve this issue, we augment D by adding the vertical diagonals of DM to D. Specifically, for each vertical diagonal l of DM , if no diagonal in D contains l, then we add l to D and extend l vertically until it hits the boundary of P. In this way, we add O(h) vertical diagonals to D, and the size of D is still O(n2 ). Further, all results we obtained before are still applicable to the new D. With a little abuse of notation, we still use D to denote the new version of D. Now, for any two oceanic cells σ ∈ D and σ 0 ∈ DM , there must be a unique cell σ 00 ∈ DM that contains σ, and σ and σ 0 are defined to be aligned if and only if σ 00 and σ 0 are aligned. Lemmas 1 and 9 are naturally extended as follows, along with this extended alignedness relation. I Lemma 10. Let σ, σ 0 ∈ D ∪ DM be two oceanic cells. For any s ∈ σ and t ∈ σ 0 , it holds that d(s, t) = |st| if σ and σ 0 are aligned; otherwise, there exists a shortest s-t path that passes through a vertex v ∈ Vσ and a vertex v 0 ∈ Vσ0 . Proof. If both of σ and σ 0 belong to D or DM , Lemmas 1 and 9 are applied. Suppose that σ ∈ D and σ 0 ∈ DM . If they are aligned, then σ is contained in σ 00 ∈ DM that is aligned with σ 0 by definition. Hence, we have d(s, t) = |st| by Lemma 9. J Coast-to-ocean We then turn to the coast-to-ocean case. We now focus on a bay or canal A. Since A has gates, we need to somehow incorporate the influence of its gates into the decomposition D. To this end, we add O(1) additional diagonals into DM as follows: extend a horizontal line from each endpoint of each gate of A until it hits ∂M, and then extend a vertical line from each endpoint of each gate of A and each endpoint of the horizontal A diagonals that are added above. Let DM denote the resulting decomposition of M. Note A that there are some cells of DM each of which is partitioned into O(1) cells of DM but the A 2 combinatorial complexity of DM is still O(h ). For any gate g of A, let Cg ⊂ P be the cross-shaped region of points in P that can be joined with a point on g by a vertical or horizontal line segment inside P. Since the endpoints of g are also obstacle vertices, the A boundary of Cg is formed by four diagonals of D. Hence, any cell in D or DM is either A completely contained in Cg or interior-disjoint from Cg . A cell of D or DM in the former case is said to be g-aligned. A In the following, we let σ ∈ D be any coastal cell that intersects A and σ 0 ∈ DM be any 0 oceanic cell. Depending on whether σ and σ are g-aligned for a gate g of A, there are three cases: (1) both cells are g-aligned; (2) σ 0 is not g-aligned; (3) σ 0 is g-aligned but σ is not. Lemma 11 handles the first case. Lemma 12 deals with a special case for the latter two cases. Lemma 13 is for the second case. Lemma 15 is for the third case and Lemma 14 is for proving Lemma 15. The proof of Lemma 16 summarizes the entire algorithm for all three cases. I Lemma 11. Suppose that σ and σ 0 are both g-aligned for a gate g of A. Then, for any s ∈ σ and t ∈ σ 0 , we have d(s, t) = |st|. Proof. It suffices to observe that s ∈ σ and t ∈ σ 0 in Cg can be joined by an L-shaped rectilinear path, whose length is equal to the L1 distance between them by Fact 1. J 15 16 The L1 Geodesic Diameter and Center Consider any path π in P from s ∈ σ to t ∈ σ 0 , and assume π is directed from s to t. For a gate g of A, we call π g-through if g is the last gate of A crossed by π. The path π is a shortest g-through path if its L1 length is the smallest among all g-through paths from s to t. Suppose π is a shortest path from s to t in P. Since σ may intersect M, if s ∈ σ is not in A, then π may avoid A (i.e., π does not intersect A). If A is a bay, then either π avoids A or π is a shortest g-through path for the only gate g of A; otherwise (i.e., A is a canal), either π avoids A or π is a shortest g-through or g 0 -through path for the two gates g and g 0 of A. We have the following lemma, which is self-evident. I Lemma 12. Suppose that for any gate g of A, at least one of σ and σ 0 is not g-aligned. For any s ∈ σ and t ∈ σ 0 , if there exists a shortest s-t path that avoids A, then a shortest s-t path passes through a vertex v ∈ Vσ and another vertex v 0 ∈ Vσ0 . We then focus on shortest g-through paths according to the g-alignedness of σ and σ 0 . I Lemma 13. Suppose σ 0 is not g-aligned for a gate g of A and there are no shortest s-t paths that avoid A. Then, for any s ∈ σ and t ∈ σ 0 , there exists a shortest g-through s-t path containing a vertex v ∈ Vσ and a vertex v 0 ∈ Vσ0 . Proof. If A is a bay, since there are no shortest s-t paths that avoid A, s ∈ σ must be contained in A, and thus there must exist g-through paths from s ∈ σ and t ∈ σ 0 . If A is a canal, although σ may be crossed by the other gate of A, there also exist g-through paths from s ∈ σ and t ∈ σ 0 . More specifically, if s ∈ A, then there are g-through paths from s to any t ∈ σ 0 ; otherwise there are also g-through paths from s to any t ∈ σ 0 that cross both gates of A. Let π be any shortest g-through path between s ∈ σ and t ∈ σ 0 . Since π is g-through and σ 0 is not g-aligned, π crosses a horizontal and a vertical diagonals of D that define Cg , and escape Cg to reach t in σ 0 . This implies that π intersects a horizontal and a vertical diagonals defining σ and thus can be modified to pass through a vertex v ∈ Vσ of σ as done in the proof of Lemma 1. At the opposite end t, since σ 0 ∩ Cg = ∅, we can apply the above argument symmetrically to modify π to pass through a vertex v 0 ∈ Vσ0 of σ 0 . Thus, the lemma follows. J A The remaining case is when σ 0 ∈ DM is g-aligned but σ ∈ D is not. Recall σ is coastal 0 and intersects A, and σ is oceanic (implying σ 0 does not intersect A). I Lemma 14. Let g be a gate of A, and suppose that σ is not g-aligned. Then, there exists a unique vertex vg ∈ Vσ ∩ A such that for any s ∈ σ and x ∈ g, the concatenation of segment svg and any L1 shortest path from vg to x inside A ∪ σ results in an L1 shortest path from s to x in A ∪ σ. Proof. Let P := A ∪ σ. Since σ is not g-aligned, σ does not intersect the gate g. Therefore, if A is a bay, σ must be contained in A and thus P = A; if A is a canal, σ may intersect the other gate of A while the union P forms a simple polygon. Thus, P is a simple polygon, and we apply Fact 2 to P . Let π2 (s, t) be the unique Euclidean shortest path between s, t ∈ P in P . Consider the union H of π2 (s, x) for all s ∈ σ and all points x ∈ g, and suppose π2 (s, x) is directed from s to x. Then, H forms an hourglass. We distinguish two possibilities: either H is open or closed. Assume that H is open. See Figure 11(a). Then, there exist s0 ∈ σ and x0 ∈ g such that s0 x0 ⊂ P , and thus π2 (s0 , x0 ) = s0 x0 . Without loss of generality, we assume that s0 lies to the right of and above x0 so that π2 (s0 , x0 ) is left-downwards. We then observe that the first S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang A vg s′ σ F A x′ σ vg u g H g (a) (b) Figure 11 Illustration to the proof of Lemma 14. (a) When H is open or (b) closed. segment su of π(s, x) for any s ∈ σ and any x ∈ g is also left-downwards since σ is a cell of D and is not g-aligned. This implies that the shortest path π2 (s, x) contained in H crosses the same pair of a vertical and a horizontal diagonals that define σ; more precisely, it crosses the left vertical and the lower horizontal diagonals of D. Letting vg be the vertex defined by the two diagonals, we apply the same argument as in the proof of Lemma 1 to modify π2 (s, x) to pass through vg . Now, assume that H is closed. See Figure 11(b). Then, H has two funnels and let F be the one that contains σ. Let u be the apex of F , that is every Euclidean shortest path in H passes through u. Note that u is an obstacle vertex, and thus u ∈ Vσ00 for a cell σ 00 ∈ D that is not aligned with σ. Without loss of generality, we assume that σ lies to the right of and above σ 0 . We observe that the Euclidean shortest path π2 (s, u) for any s ∈ σ is monotone since u is the apex of F . Since u lies to the left of and below any s ∈ σ and π2 (s, u) is monotone, we can modify the path to pass through the bottom-left vertex vg ∈ Vσ , as in the previous case. J From now on, let vg be the vertex as described in Lemma 14 (vg can be found efficiently, as shown in the proof of Lemma 16). Consider the union of the Euclidean shortest paths inside A from vg to all points x ∈ g. Since A is a simple polygon, the union forms a funnel Fg (vg ) with base g, plus the Euclidean shortest path from vg to the apex of Fg (vg ). Recall Fact 2 that any Euclidean shortest path inside a simple polygon is also an L1 shortest path. Let Wg (vg ) be the set of horizontally and vertically extreme points in each convex chain of Fg (vg ), that is, Wg (vg ) gathers the leftmost, rightmost, uppermost, and lowermost points in each chain of Fg (vg ). Note that |Wg (vg )| ≤ 8 and Wg (vg ) includes the endpoints of g and the apex of Fg (vg ). We then observe the following lemma. I Lemma 15. Suppose that σ 0 is g-aligned but σ is not. Then, for any s ∈ σ and t ∈ σ 0 , there exists a shortest g-through s-t path that passes through vg and some w ∈ Wg (vg ). Moreover, the length of such a path is |svg | + d(vg , w) + |wt|. Proof. Since A is a simple polygon, any Euclidean shortest path in A is also an L1 shortest path by Fact 2. Thus, the L1 length of a shortest path from vg to any point x in the funnel Fg (vg ) is equal to the L1 length of the unique Euclidean shortest path in A, which is contained in Fg (vg ). By Lemma 14 and the assumption that σ 0 is g-aligned, among the paths from s to t that cross the gate g, there exists an L1 shortest g-through s-t path π consisting of three portions: svg , the unique Euclidean shortest path from vg to a vertex u on a convex chain of Fg (vg ), and ut. Let w ∈ Wg (vg ) be the last one among Wg (vg ) that we encounter during the walk from s to t along π. Consider the segment wt, which may cross ∂Fg (vg ). If wt ∩ ∂Fg (vg ) = ∅, 17 18 The L1 Geodesic Diameter and Center then we are done by replacing the subpath of π from u to t by wt. Otherwise, wt crosses ∂Fg (vg ) at two points p, q ∈ ∂Fg (vg ). Since Wg (vg ) includes all extreme points of each chain of Fg (vg ), there is no w0 ∈ Wg (vg ) on the subchain of Fg (vg ) between p and q. Hence, we can replace the subpath of π from w to t by a monotone path from w to t, which consists of wp, the convex path from p to q along ∂Fg (vg ), and qt, and the L1 length of the above monotone path is equal to |wt| by Fact 1. Consequently, the resulting path is also an L1 shortest path with the desired property. J For any cell σ ∈ D ∪ DM , let nσ be the combinatorial complexity of σ. If σ is a boundary cell of DM , then nσ may not be bounded by a constant; otherwise, σ is a trapezoid or a triangle, and thus nσ ≤ 4. The geodesic distance function d defined on σ × σ 0 for any two cells σ, σ 0 ∈ D ∪ DM can be explicitly computed in O(nσ nσ0 ) time after some preprocessing, as shown in Lemma 16. I Lemma 16. Let σ be any cell of D or DM . After O(n)-time preprocessing, the function d on σ × σ 0 for any cell σ 0 ∈ D ∪ DM can be explicitly computed in O(nσ nσ0 ) time, provided that d(v, v 0 ) has been computed for any v ∈ Vσ and any v 0 ∈ Vσ0 . Moreover, d on σ × σ 0 is the lower envelope of O(1) linear functions. Proof. If both σ and σ 0 are oceanic, then Lemma 10 implies that for any (s, t) ∈ σ × σ 0 , d(s, t) = |st| if they are aligned, or d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t), where dvv0 (s, t) = |sv| + d(v, v 0 ) + |v 0 t|. On the other hand, if σ and σ 0 are coastal, then both are cells of D and Lemma 1 implies the same conclusion. Since |Vσ | ≤ 4 and |Vσ0 | ≤ 4 in either case, the geodesic distance d on σ × σ is the lower envelope of at most 16 linear functions. Hence, provided that the values of d(v, v 0 ) for all pairs (v, v 0 ) are known, the envelope can be computed in time proportional to the complexity of the domain σ × σ 0 , which is O(nσ nσ0 ). From now on, suppose that σ is coastal and σ 0 is oceanic. Then, σ is a cell of D and intersects some bay or canal A. If σ 0 is also a cell of D, then Lemma 1 implies the lemma, as discussed in Section 2; thus, we assume σ 0 is a cell of DM . A As above, we add diagonals extended from each endpoint of each gate of A to obtain DM , and specify all g-aligned cells for each gate g of A in O(n) time. In the following, let σ 0 be A an oceanic cell of D or of DM . Note that a cell of DM can be partitioned into O(1) cells of A DM . We have two cases depending on whether A is a bay or a canal. First, suppose that A is a bay; let g be the unique gate of A. In this case, any L1 shortest path is g-through, provided that it intersects A, since g is unique. There are two subcases depending on whether σ is g-aligned or not. If σ is g-aligned, then by Lemmas 11, 12, and 13, we have d(s, t) = |st| if σ 0 is g-aligned, or d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t), otherwise, where dvv0 (s, t) = |sv| + d(v, v 0 ) + |v 0 t|. Thus, the lemma follows by an identical argument as above. Suppose that σ is not g-aligned. Then, σ ⊂ A since A has a unique gate g. In this case, we need to find the vertex vg ∈ Vσ . For the purpose, we compute at most four Euclidean shortest path maps SPMA (v) inside A for all v ∈ Vσ in O(n) time [13]. By Fact 2, SPMA (v) is also an L1 shortest path map in A. We then specify the L1 geodesic distance from v to all points on g, which results in a piecewise linear function fv on g. For each v ∈ Vσ , we test whether it holds that fv (x) + |vv 0 | ≤ fv0 (x) for all x ∈ g and all v 0 ∈ Vσ . By Lemma 14, there exists a vertex in Vσ for which the above test is passed, and such a vertex is vg . Since each shortest path map SPMA (v) is of O(n) complexity, all the above effort to find vg is bounded by O(n). Next, we compute the funnel Fg (vg ) and the extreme vertices Wg (vg ) as done above by exploring SPMA (vg ) in O(n) time. S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang If σ 0 is not g-aligned, we apply Lemma 13 to obtain d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t). Thus, d is the lower envelope of at most 16 linear functions over σ × σ 0 . Otherwise, if σ 0 is g-aligned, then we have d(s, t) = minw∈Wg (vg ) dvg w (s, t) by Lemma 15. Since |Wg (vg )| ≤ 8, d is the lower envelope of a constant number of linear functions. Thus, in any case, we conclude the bay case. Now, suppose that A is a canal. Then, A has two gates g and g 0 , and σ falls into one of the three case: (i) σ is both g-aligned and g 0 -aligned, (ii) σ is neither g-aligned nor g 0 -aligned, or (iii) σ is g- or g 0 -aligned but not both. As a preprocessing, if σ is not g-aligned, then we compute vg , Fg (vg ), and Wg (vg ) as done in the bay case; analogously, if not g 0 -aligned, compute vg0 , Fg0 (vg0 ), and Wg0 (vg0 ). Note that any shortest path in P is either g-through or g 0 -through, provided that it intersects A. Thus, d(s, t) chooses the minimum among a shortest g-through path, a shortest g 0 -through path, and a shortest path avoiding A if possible. We consider each of the three cases of σ. 1. Suppose that σ is both g-aligned and g 0 -aligned. In this case, if σ 0 is either g-aligned or g 0 -aligned, then we have d(s, t) = |st| by Lemma 11. Otherwise, if σ 0 is neither g-aligned nor g 0 -aligned, then we apply Lemmas 12 and 13 to have d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t). Hence, the lemma follows. 2. Suppose that σ is neither g-aligned nor g 0 -aligned. If σ 0 is both g-aligned and g 0 -aligned, then by Lemma 15 the length of a shortest g-through path is equal to minw∈Wg (vg ) dvg w (s, t) while the length of a shortest g 0 -through path is equal to minw∈Wg0 (vg0 ) dvg0 w (s, t). The geodesic distance d(s, t) is the minimum of the above two quantities, and thus the lower envelope of O(1) linear function on σ × σ 0 . If σ 0 is g-aligned but not g 0 -aligned, then by Lemmas 13 and 15, we have d(s, t) = min{ min w∈Wg (vg ) dvg w (s, t), min v∈Vσ ,v 0 ∈Vσ0 dvv0 (s, t)}. The case where σ 0 is g 0 -aligned but not g-aligned is analogous. If σ 0 is neither g-aligned nor g 0 -aligned, then d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t) by Lemma 13. 3. Suppose that σ is g 0 -aligned but not g-aligned. The other case where it is g-aligned but not g 0 -aligned can be handled symmetrically. If σ 0 is g 0 -aligned, then we have d(s, t) = |st| by Lemma 11. If σ 0 is neither g-aligned nor g 0 -aligned, then, by Lemmas 12 and 13, d(s, t) = minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t). The remaining case is when σ 0 is g-aligned but not g 0 -aligned. In this case, the length of a shortest g-through path is equal to minw∈Wg (vg ) dvg w (s, t) by Lemma 15 for gate g while the length of a shortest g 0 -through path is equal to minv∈Vσ ,v0 ∈Vσ0 dvv0 (s, t) by Lemmas 12 and 13. Thus, the geodesic distance d(s, t) is the smaller of the two quantities. Consequently, we have verified every case of (σ, σ 0 ). As the last step of the proof, observe that it is sufficient to handle separately all the cells A σ 0 ∈ DM whose union forms the original cell of DM , since any cell of DM can be decomposed A into O(1) cells of DM . J 4.2 Computing the Geodesic Diameter and Center Lemma 7 assures that we can ignore coastal cells that are completely contained in the interior of a bay or canal, in order to find a farthest point from any s ∈ P. This suggests a combined set Df of cells from the two different decompositions D and DM : Let Df be the set of all cells σ such that either σ belongs to DM or σ ∈ D is a coastal cell with ∂σ ∩ ∂P = 6 ∅. Note that Df consists of O(h2 ) oceanic cells from DM and O(n) coastal cells from D. Since the 19 20 The L1 Geodesic Diameter and Center boundary ∂A of any bay or canal A is covered by the cells of Df , Lemma 7 implies the following lemma. I Lemma 17. For any point s ∈ P, maxt∈P d(s, t) = maxσ0 ∈Df maxt∈σ0 d(s, t). We apply the same approach as in Section 2 but we use Df instead of D. To compute the L1 geodesic diameter, we compute the (σ, σ 0 )-constrained diameter for each pair of cells σ, σ 0 ∈ Df . Suppose we know the value of d(v, v 0 ) for any v ∈ Vσ and any v ∈ Vσ0 over all σ, σ 0 ∈ Df . Our algorithm handles each pair (σ, σ 0 ) of cells in Df according to their types by applying Lemma 16. The following lemma computes d(v, v 0 ) for all cell vertices v and v 0 of Df . I Lemma 18. In O(n2 + h4 ) time, one can compute the geodesic distances d(v, v 0 ) between every v ∈ Vσ and v 0 ∈ Vσ0 for all pairs of two cells σ, σ 0 ∈ Df . Proof. Let VM be the set of vertices Vσ for all oceanic cells σ ∈ DM , and Vc be the set of vertices Vσ for all coastal cells σ ∈ Df . Note that |VM | = O(h2 ) and |Vc | = O(n). We handle the pairs (v, v 0 ) of vertices separately in three cases: (i) when v, v 0 ∈ VM , (ii) when v ∈ Vc and v 0 ∈ VM , and (iii) when v, v 0 ∈ Vc . Let v ∈ VM be any vertex. We compute the shortest path map SPMcore (v) in the core domain Pcore as discussed in Section 3. Recall that SPMcore (v) is of O(h) complexity and can be computed in O(n + h log h) time (after P is triangulated) [9, 11]. For any point p ∈ M, the geodesic distance dcore (v, p) can be determined in constant time after locating the region of SPMcore (v) that contains p. By Lemma 8, we have d(v, p) = dcore (v, p). Computing d(v, v 0 ) for all v 0 ∈ VM can be done in O(h2 ) time by running the plane sweep algorithm of Lemma 3 on SPMcore (v). Thus, for each v ∈ VM we spend O(n + h2 ) time. Since |VM | = O(h2 ), we can compute d(v, v 0 ) for all pairs of vertices v, v 0 ∈ VM in time O(nh2 + h4 ). Case (ii) can also be handled in a similar fashion. Let v ∈ Vc . We also show that computing d(v, v 0 ) for all v 0 ∈ VM can be done in O(n + h2 ) time. If v lies in the ocean M, then we can apply the same argument as in case (i). Thus, we assume v ∈ / M. For the purpose, we consider v as a point hole (i.e., a hole or an obstacle consisting of only one point) into the polygonal domain P to obtain a new domain Pv , and compute the corresponding corridor structures of Pv , which can be done in O(n + h log1+ h) time (or O(n) time after a triangulation of P is given), as discussed in Section 3.1. Let Mv denote the ocean corresponding to the new polygonal domain Pv . Since v lies in a bay or canal of P, M is a subset of Mv by the definition of bays, canals and the ocean. Thus, we have VM ⊂ Mv . 0 We then compute the core structure of Pv and the shortest path map SPMcore (v) in Mv in 0 O(n + h log h) time [9, 11]. Analogously, the complexity of SPMcore (v) is bounded by O(h). 0 Finally, perform the plane sweep algorithm on SPMcore (v) as in case (i) to get the values of 0 0 2 d(v, v ) for all v ∈ VM in O(h ) time. What remains is case (iii) where v, v 0 ∈ Vc . Fix v ∈ Vc . The vertices in Vc either lie on ∂P or in its interior. In this case, we assume that we have a triangulation of P as discussed in Section 3. Recall that we can compute the shortest path map SPM (v) in O(n + h log h) time [9, 11]. Since SPM (v) stores d(v, v 0 ) for all obstacle vertices v 0 of P, computing d(v, v 0 ) for all v 0 ∈ Vc ∩ ∂P can be done in the same time bound by adding Vc ∩ ∂P into P as obstacle vertices. Thus, the case where v, v 0 ∈ Vc and one of them lies in ∂P can be handled in O(n2 + nh log h) time. In the following, we focus on how to compute d(v, v 0 ) for all v, v 0 ∈ Vc \ ∂P. Let e1 , . . . , en be the edges of P in an arbitrary order. We modify the original polygonal domain P to obtain the rectified polygonal domain Prect as follows. For each i = 1, . . . , n, we define Vi to S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang v △v g g (a) (b) Figure 12 Illustration to how to construct Prect . (a) A bay A with gate g and the decomposition D inside A. The dark gray region depicts the hole of P bounding A, coastal cells of D intersecting ∂A are shaded by light gray color, and black dots are vertices in Vc \ ∂P. One of those in Vc is labeled v and its triangle 4v is highlighted. (b) The rectified polygonal domain Prect obtained by expanding the hole into 4v for all v ∈ Vc . The boundary of Prect is depicted by solid segments. Here, the edges of A are ordered in the counter-clockwise order. be the set of all vertices v ∈ (Vc \ ∂P) \ (V1 ∪ · · · ∪ Vi−1 ) such that v ∈ Vσ for some coastal cell σ ∈ Df with ∂σ ∩ ei = 6 ∅. For each v ∈ Vi , we shoot two rays from v, vertical and horizontal, towards ei until each hits ei . Let 4v be the triangle formed by v and the two points on ei hit by the rays. Since v is a vertex of a cell of D facing ei , by the construction of D, the two rays must hit ei and thus the triangle 4v is well defined. We then expand each hole of P into the triangles 4v for all v ∈ Vc \ ∂P. Let Prect be the resulting polygonal domain; that is, every triangle 4v is regarded as an obstacle in Prect . We also add all those in Vc \ ∂P into Prect as obstacle vertices. See Figure 12. Observe that Prect is a subset of P as subsets of R2 and all those in Vc \ ∂P lie on the boundary of Prect as its obstacle vertices. For any two points s, t ∈ Prect , let drect (s, t) be the L1 geodesic distance between s and t in Prect . We then claim the following: For any s, t ∈ Prect , it holds that d(s, t) = drect (s, t). Suppose that the claim is true. The construction of Prect can be done in O(n2 ) time. Then, for any v ∈ Vc \ ∂P, we compute the shortest path map SPMrect (v) in the rectified domain Prect and obtain d(v, v 0 ) for all other v 0 ∈ Vc \ ∂P. Since Prect has h holes and O(n) vertices by our construction of Prect , this task can be done in O(n + h log h) time [9, 11]. At last, case (iii) can be processed in total O(n2 + nh log h) time. We now prove the claim, as follows. Proof of the claim. For any v ∈ Vc \ ∂P, the triangle 4v is well defined. We call a triangle 4v maximal if there is no other 4v0 with 4v ⊂ 4v0 . Note that any two maximal triangles are interior-disjoint but may share a portion of their sides. Indeed, P \ Prect is the union of all maximal triangles 4v . Pick any connected component C of P \ Prect . The set C is either a maximal triangle 4v itself or the union of two maximal triangles that share a portion of their sides by our construction of Prect and of D. In either case, observe that the portion ∂C \ ∂P is a monotone path. Consider any s, t ∈ Prect and any shortest s-t path π in P, that is, d(s, t) = |π|. If π lies inside Prect , then we are done since the L1 length of any s-t path inside Prect is at least d(s, t). Otherwise, π may cross a number of connected components of P \Prect . Pick any such connected component C that is crossed by π. Let p and q be the first and the last points on ∂C we encounter when walking along π from s to t. Since ∂C \ ∂P is monotone as observed 21 22 The L1 Geodesic Diameter and Center above, the path πpq along the boundary of C is also monotone. By Fact 1, |πpq | = |pq| and thus we can replace the subpath of π between p and q by πpq without increasing the L1 length. The resulting path thus has length equal to |π| and avoids the interior of C. We repeat the above procedure for all such connected components C crossed by π. At last, the final path π 0 has length equal to |π| and avoids the interior of P \ Prect . That is, π 0 is a s-t path in Prect with |π 0 | = |π| = d(s, t). Since drect (s, t) ≥ d(s, t) in general, π 0 is an L1 shortest s-t path in Prect , and hence drect (s, t) = d(s, t). This proves the above claim. Consequently, the total time complexity is bounded by O(nh2 + h4 ) + O(n2 + nh log h) = O(n2 + nh2 + h4 ) = O(n2 + h4 ). J The lemma thus follows. Our algorithms for computing the diameter and center are summarized in the proof of the following theorem. I Theorem 19. The L1 geodesic diameter and center of P can be computed in O(n2 + h4 ) and O((n4 + n2 h4 )α(n)) time, respectively. Proof. We first discuss the diameter algorithm, whose correctness follows directly from Lemma 17. After the execution of the procedure of Lemma 18 as a preprocessing, our algorithm considers three cases for two cells σ, σ 0 ∈ Df : (i) both are oceanic, (ii) both are coastal, or (iii) σ is coastal and σ 0 is oceanic. In either case, we apply Lemma 16. P For case (i), we have O(h2 ) oceanic cells and the total complexity is σ∈DM nσ = O(n+h2 ). Thus, the total time for case (i) is bounded by X X X O(nσ nσ0 ) = O(nσ (n + h2 )) = O((n + h2 )2 ) = O(n2 + h4 ). σ∈DM σ 0 ∈DM σ∈DM For case (ii), we have O(n) coastal cells in DM and their total complexity is O(n) since they are all trapezoidal. Thus, the total time for case (ii) is bounded by O(n2 ). For case (iii), we fix a coastal cell σ ∈ Df and iterate over all oceanic cells σ 0 ∈ DM , after an O(n)-time preprocessing, as done in the proof of Lemma 16. For each σ, we take P O(n + h2 ) time since σ∈DM nσ = O(n + h2 ). Thus, the total time for case (iii) is bounded by O(n2 + nh2 ) = O((n + h2 )2 ) = O(n2 + h4 ). Next, we discuss our algorithm for computing a geodesic center of P. We consider O(n2 ) cells σ ∈ D and compute all the σ-constrained centers. As a preprocessing, we spend O(n4 ) time to compute the geodesic distances d(v, v 0 ) for all pairs of vertices of D by Lemma 3. Fix a cell σ ∈ D. For all σ 0 ∈ Df , we compute the geodesic distance function d restricted to σ × σ 0 by applying Lemma 16. As in Section 2, compute the graph of Rσ0 (q) = maxp∈σ0 d(p, q) by projecting the graph of d over σ × σ 0 , and take the upper envelope of the graphs of Rσ0 for all σ 0 ∈ Df . By Lemma 16, we have an analogue of Lemma 5 and thus a σ-constrained center can be computed in O(m2 α(m)) time, where m denotes the total complexity of all Rσ0 . Lemma 16 implies that m = O(n + h2 ). P P For the time complexity, note that σ∈DM nσ = O(n + h2 ) and σ∈Df \DM nσ = O(n). Since any cell in D is either a triangle or a trapezoid, its complexity is O(1). Thus, for each σ ∈ D, by Lemma 16, computing a σ-constrained center takes O((n+h2 )2 α(n)) time, after an O(n4 )-time preprocessing (Lemma 3). Iterating over all σ ∈ D takes O(n2 (n + h2 )2 α(n)) = O((n4 + n2 h4 )α(n)) time. J S.W. Bae, M. Korman, J.S.B. Mitchell, Y. Okamoto, V. Polishchuk, and H. Wang 5 Conclusions We gave efficient algorithms for computing the L1 geodesic diameter and center of a polygonal domain. In particular, we exploited the extended corridor structure to make the running times depend on the number of holes in the domain (which may be much smaller than the number of vertices). It would be interesting to find further improvements to the algorithms in hopes of reducing the worst-case running times; it would also be interesting to prove non-trivial lower bounds on the time complexities of the problems. Acknowledgements. Work by S.W. Bae was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2013R1A1A1A05006927), and by the Ministry of Education (2015R1D1A1A01057220). M. Korman is partially supported by JSPS/MEXT Grant-in-Aid for Scientific Research Grant Numbers 12H00855 and 15H02665. J. Mitchell acknowledges support from the US-Israel Binational Science Foundation (grant 2010074) and the National Science Foundation (CCF-1018388, CCF-1526406). Y. Okamoto is partially supported by JST, CREST, Foundation of Innovative Algorithms for Big Data and JSPS/MEXT Grant-in-Aid for Scientific Research Grant Numbers JP24106005, JP24700008, JP24220003, and JP15K00009. V. Polishchuk is supported in part by Grant 2014-03476 from the Sweden’s innovation agency VINNOVA and the project UTM-OK from the Swedish Transport Administration Trafikverket. H. Wang was supported in part by the National Science Foundation (CCF-1317143). References 1 2 3 4 5 6 7 8 9 10 H.-K. Ahn, L. Barba, P. Bose, J.-L. De Carufel, M. Korman, and E. Oh. A linear-time algorithm for the geodesic center of a simple polygon. In Proc. of the 31st Symposium on Computational Geometry, pages 209–223, 2015. B. Aronov. On the geodesic Voronoi diagram of point sites in a simple polygon. Algorithmica, 4(1–4):109–140, 1989. T. Asano and G. Toussaint. Computing the geodesic center of a simple polygon. Technical Report SOCS-85.32, McGill University, Montreal, Canada, 1985. S.W. Bae, M. Korman, and Y. Okamoto. The geodesic diameter of polygonal domains. Discrete and Computational Geometry, 50:306–329, 2013. S.W. Bae, M. Korman, and Y. Okamoto. Computing the geodesic centers of a polygonal domain. In Proc. of the 26th Canadian Conference on Computational Geometry, 2014. Journal version to appear in Computational Geometry: Theory and Applications, http://dx.doi.org/10.1016/j.comgeo.2015.10.009. S.W. Bae, M. Korman, Y. Okamoto, and H. Wang. Computing the L1 geodesic diameter and center of a simple polygon in linear time. Computational Geometry: Theory and Applications, 48:495–505, 2015. R. Bar-Yehuda and B. Chazelle. Triangulating disjoint Jordan chains. International Journal of Computational Geometry and Applications, 4(4):475–481, 1994. B. Chazelle. A theorem on polygon cutting with applications. In Proc. of the 23rd Annual Symposium on Foundations of Computer Science, pages 339–349, 1982. D.Z. Chen and H. Wang. A nearly optimal algorithm for finding L1 shortest paths among polygonal obstacles in the plane. In Proc. of the 19th European Symposium on Algorithms, pages 481–492, 2011. D.Z. Chen and H. Wang. Computing the visibility polygon of an island in a polygonal domain. In Proc. of the 39th International Colloquium on Automata, Languages and Programming, pages 218–229, 2012. Journal version published online in Algorithmica, 2015. 23 24 The L1 Geodesic Diameter and Center 11 12 13 14 15 16 17 18 19 20 21 22 23 24 D.Z. Chen and H. Wang. L1 shortest path queries among polygonal obstacles in the plane. In Proc. of the 30th Symposium on Theoretical Aspects of Computer Science, pages 293–304, 2013. H. Edelsbrunner, L.J. Guibas, and M. Sharir. The upper envelope of piecewise linear functions: Algorithms and applications. Discrete and Computational Geometry, 4:311–336, 1989. L.J. Guibas, J. Hershberger, D. Leven, M. Sharir, and R.E. Tarjan. Linear-time algorithms for visibility and shortest path problems inside triangulated simple polygons. Algorithmica, 2(1-4):209–233, 1987. J. Hershberger and J. Snoeyink. Computing minimum length paths of a given homotopy class. Computational Geometry: Theory and Applications, 4(2):63–97, 1994. J. Hershberger and S. Suri. Matrix searching with the shortest-path metric. SIAM Journal on Computing, 26(6):1612–1634, 1997. R. Inkulu and S. Kapoor. Planar rectilinear shortest path computation using corridors. Computational Geometry: Theory and Applications, 42(9):873–884, 2009. S. Kapoor, S.N. Maheshwari, and J.S.B. Mitchell. An efficient algorithm for Euclidean shortest paths among polygonal obstacles in the plane. Discrete and Computational Geometry, 18(4):377–383, 1997. J.S.B. Mitchell. An optimal algorithm for shortest rectilinear paths among obstacles. In the 1st Canadian Conference on Computational Geometry, 1989. J.S.B. Mitchell. L1 shortest paths among polygonal obstacles in the plane. Algorithmica, 8(1):55–88, 1992. E. Papadopoulou and D.T. Lee. A new approach for the geodesic Voronoi diagram of points in a simple polygon and other restricted polygonal domains. Algorithmica, 20(4):319–352, 1998. R. Pollack, M. Sharir, and G. Rote. Computing the geodesic center of a simple polygon. Discrete and Computational Geometry, 4(1):611–626, 1989. S. Schuierer. Computing the L1 -diameter and center of a simple rectilinear polygon. In Proc. of the International Conference on Computing and Information, pages 214–229, 1994. S. Suri. Computing geodesic furthest neighbors in simple polygons. Journal of Computer and System Sciences, 39:220–235, 1989. H. Wang. On the geodesic centers of polygonal domains. In Proc. of the 24th European Symposium on Algorithms, pages 77:1–77:17, 2016.
8cs.DS
MMSE PRECODER FOR MASSIVE MIMO USING 1-BIT QUANTIZATION Ovais Bin Usman, Hela Jedda, Amine Mezghani and Josef A. Nossek arXiv:1706.08717v1 [cs.IT] 27 Jun 2017 Institute for Circuit Theory and Signal Processing Technische Universität München, 80290 Munich, Germany Email:{hela.jedda, josef.a.nossek}@tum.de ABSTRACT We propose a novel linear minimum-mean-squared-error (MMSE) precoder design for a downlink (DL) massive multiple-input-multiple-output (MIMO) scenario. For economical and computational efficiency reasons low resolution 1-bit digital-to-analog (DAC) and analog-to-digital (ADC) converters are used. This comes at the cost of performance gain that can be recovered by the large number of antennas deployed at the base station (BS) and an appropiate precoder design to mitigate the distortions due to the coarse quantization. The proposed precoder takes the quantization non-linearities into account and is split into a digital precoder and an analog precoder. We formulate the two-stage precoding problem such that the MSE of the users is minimized under the 1-bit constraint. In the simulations, we compare the new optimized precoding scheme with previously proposed linear precoders in terms of uncoded bit error ratio (BER). Index Terms— Massive MIMO, Precoding, 1-bit quantization, Transmit signal processing 1. INTRODUCTION The massive MIMO system, or named large-scale antenna system has been seen as a promising technology for the next generation wireless communication systems [1, 2]. The huge increase in the number of antennas at BS can improve spectral efficiency (SE), energy efficiency (EE) and reliability. The BS with large number of antennas, say 100 antennas or more, simultaneously serves a much smaller number of single-antenna users. With the knowledge of CSI at the BS (CSIT), this large spatial DoF of massive MIMO systems can be exploited to significantly increase the spatial multiplexing/diversity gain using MU-MIMO precoding [3, 4]. The linear precoders, such as MF, ZF [5] and the regularized zero-forcing (RZF) scheme [3] are shown to be near-optimal. Thus, it is more practical to use low-complexity linear precoding techniques in massive MIMO systems. Therefore, we mainly focus on linear precoding techniques in this work. The price to pay for massive MIMO systems is increased complexity of the hardware (number of radio frequency (RF) and ADC/DAC chains) and the signal processing and resulting increased energy consumption at the transmitter [5]. Several approaches are considered in the literature to decrease the power consumption such as spatial modulation [6], load modulation [7], the use of parasitic antennas [8] and the use of low-cost transceivers [9]. One attractive solution to overcome the issues of high complexity and high energy consumption associated with massive MIMO, is the use of very low resolution ADCs and DACs. The power consumption of the ADC and the DAC, one of the most power-hungry devices, can be reduced exponentially by decreasing the resolution [10] and 1-bit quantization can drastically simplify other RF-components, e.g., amplifiers and mixers. Therefore, we design an MMSE linear precoder in a DL massive MIMO scenario where the resolution of the DACs and ADCs is restricted to 1 bit. This precoder design aims at mitigating the distortions due to the coarse quantization in addition to inter-user interference (IUI). A similar work has been presented in [11], where the authors optimize first the quantizer’s levels and then give a closed-form expression of an MMSE precoder that takes into account the quantizer non-linearities. However, only quantization at the transmitter was considered. In this contribution, we do not optimize the quantizer. The quantizer in our work has constant levels. But we introduce a second precoding stage in the analog domain after the quantizer to minimize the distortions due to 1-bit DAC/ADC in i.i.d. complex Gaussian channels. The proposed two-stage precoder is designed based on iterative methods. We assume perfect CSIT and study how the new precoder scheme is improving the BER compared to the precoder introduced in [11]. This paper is organized as follows: in Section 2 the system model is presented. In Section 3 some derivations related to the 1-bit quantization are introduced. In Section 4 we formulate our optimization problem and show the derivations and the corresponding solution. In Sections 5 and 6 we interpret the simulation results and summarize this work. Notation: Bold letters indicate vectors and matrices, nonbold letters express scalars. The operators (.)∗ , (.)T , (.)H and E [.] stand for complex conjugation, the transposition, Hermitian transposition and the expectation, respectively. The n× n identity matrix is denoted by In while the zeros (ones) matrix with n rows and m columns is defined as 0n,m (1n,m ). We For a complex-valued signal vector x we get Q(x) = Q (xR + j xI ) = Q (xR ) + j Q (xI ) . Fig. 1. System Model define (•)R = ℜ{•}, (•)I = ℑ{•} and Q(x) = sign(xR ) + j sign(xI ). Additionally, diag(A) denotes a diagonal matrix containing only the diagonal elements of A. σα and ραβ denote the standard deviation of α and the correlation coefficient between α and β, respectively. For a circular distributed Gaussian complex-valued signal α we have σαR = σαI . 2. SYSTEM MODEL We consider a massive MIMO downlink scenario as depicted in Fig. 1. The BS with N antennas serves M single-antenna users, where N ≫ M . The signal vector s ∈ OM contains the data symbols for each of the M users, where O represents the set of QPSK constellation. We assume that  s ∼ ON 0M , σs2 IM . In this system 1-bit quantization at the transmitter Qt as well as at the receiver Qr is deployed. Therefore, in order to mitigate the IUI, we make use of a two-stage precoder consisting of the digital precoder P and the analog precoder D. The use of the 1-bit quantizer at the transmitter Qt delivers a signal yQ that belongs to the set of {±1 ± j }. It means that the magnitude of the entry yQ,n , n = 1, ..., N , is constant and its phase belongs to 5π 7π { π4 , 3π 4 , 4 , 4 }. As a result, all the antennas end up getting the same power. To recover the information loss of the power allocation due to Qt , we employ an analog precoder D of real-valued diagonal structure. So, we end up with D ∈ RN ×N , P ∈ C N ×M and yQD = D Qt (Ps), where  T P = p1 . . . pN . The received decoded signal vector ŝ ∈ C M×1 of the M single-antenna users reads as ŝ = Qr (HyQD + η), where H ∈ C M×N is the channel matrix with i.i.d. complex-valued entries of zero mean and unit variance and η ∼ CN (0M , Cη = IM ) is the AWG noise vector. 3. STATISTICAL THEORY OF 1-BIT QUANTIZATION To design a precoder which takes into account the effects of Qt and Qr , we need to know some statistical properties of quantization especially the auto and cross-correlation properties for a Gaussian input signal. Since quantization is non-linear, it has strong effects on the statistical properties of the signal. The statistical properties of hard limiters dealing with real-valued Gaussian-distributed signals are derived in [12]. These derivations are applied to complex-valued Gaussian-distributed signals and introduced in this section. (1) The covariance matrix between an unquantized circular distributed complex-valued signal x of covariance matrix Cx and its 1-bit quantized signal xQ = Q (x) is given by r 4 −1 KCx , where K = diag (Cx ) 2 . CxQ x = (2) π The covariance matrix of the 1-bit quantized circular distributed complex-valued signals xQ is given by CxQ = 4 (arcsin (Kℜ {Cx } K) + j arcsin (Kℑ {Cx } K)) . π (3) Note that the diagonal entries of CxQ are the squared norm of quantized signals, which lead to the following result diag (CxQ ) = 2I. (4) These four equations are the basis for solving the optimization problem presented in the next section. 4. OPTIMIZATION PROBLEM The optimization problem is formulated as follows h i 2 {PMMSE-Q , DMMSE-Q } = arg min E kŝ − sk2 P,D s.t. E h 2 kyQD k2 i (5) ≤ Etx and D ∈ RN ×N is diagonal. 4.1. Objective function We aim at minimizing the MSE between the desired signals s and the received signals ŝ given that the power of the transmitted signal yQD is limited by the available transmit power Etx . We end up with the following expression for MSE       MSE = σs2 tr (IM)+tr E ŝŝH −E sŝH −E ŝsH . (6) We have to find the three expectation terms in the above for which we make use of the covariance and cross correlation matrices. We have already mentioned that the input signal covariance matrix Cs = σs2 IM . The covariance matrix of the precoder’s output y is given by  (7) Cy = E yyH = σs2 PPH . Tofind a linear expression for the covariance matrix CyQ = H E yQ yQ , we make use of (3), (4) and the approximation arcsin (x) ≃ x, for x 6= 1. So, we get Cy Q =  4 K2 PPH K2 + cIN , π (8) with 4.2. Constraint  1 H −2 K2 = diag PP  and c = − 1 . The covariance matrix CyQD of the transmitted signal yQD is given by π 2 CyQD = DCyQ D. (9) The received signal covariance matrix reads as Cx = HDCyQ DHH + Cη . (10) If we look at our MSE expression in (6), one of the terms  H  which we need to find is tr E ŝŝ . Since the structure of  Cŝ = E ŝŝH is very similar to CyQ , we end up with   tr E ŝŝH = 2M (11) i 4σ h s E ŝsH = K1 HDK2 P π  4σs H  E sŝH = P K2 DHH K1 , π − 12 K1 = diag (Cx ) (12) (13) . Finally, putting the expressions of (11), (12) and (13) in (6), we end up with the following closed-form expression for MSE MSE = σs2 M + 2M  4σs tr K1 HDK2 P + PH K2 DHH K1 . − π (14) The MSE expression in (14) contains two unknown variables P and D. Intuitively, D should be a function of P, since it reallocates the power to the transmit signal originally intended by P which gets lost due to Qt . To this end, we define a new matrix P′ = K2 P. P′ is a row-normalized version of P, such that each row of P′ has unit norm. Note that the MSE expression contains the product K2 P and PH K2 . K1 also contains these products. Thus, the MSE expression found so far is in P′ rather than P. The purpose of D is to remove this row-normalization of P introduced by K2 . Therefore, an obvious choice for D is H D = K−1 2 = diag PP Using (8) and the fact that D is a diagonal matrix, we can simplify the constraint to  (16) 2 tr D2 ≤ Etx . 4.3. Final Optimization Problem Using (14), (15) and (16), we can finally write our optimization problem as  12 . (15) In other words, the optimization with respect to D is reformulated as a one with respect to the norm of each row of P.  4σs tr K1 HP + PH HH K1 π (17) 1  Etx and D = diag PPH 2 . s.t. tr PPH ≤ 2 min σs2 M + 2M − P We still more terms in the MSE, i.e.  need  to find two   tr E ŝsH and tr E sŝH before we can proceed to  H   H H  . We solve for P. Note that tr E ŝs = tr E sŝ use (2) to calculate the above mentioned expectations, which can be expressed as follows with The constraint can be simply expressed as  i  h 2 E yQD 2 = tr DCyQ D ≤ Etx . 4.4. Solving the Optimization Problem Note that our objective function in (17) is non-linear in P because of K1 . Furthermore, the solution set has to satisfy the constraint in (17). Thus, we resort to the gradient projection algorithm to solve our optimization problem [13]. The steps for this algorithm can be found in Table 1. The needed derivative of the MSE with respect to P is given by  ∂MSE (P) 2 4 = − σs HT K1 − HT K31 diag (H∗ P∗ ) H∗ P∗ ∂P π π   2c − diag HT diag H∗ P∗ K31 H∗ P∗ π  2 − HT K31 diag PT HT H∗ P∗ π   ∗ ∗ 2c T 3 T T − diag H diag K1 P H H P . π 5. SIMULATION RESULTS In this section, we compare our proposed precoder with different precoding schemes in terms of the uncoded BER. All the simulation results are averaged over 200 channel realizations. The used modulation scheme is QPSK, where σs2 = 2. N = 20 antennas at the BS serve M = 4 users with Nb = 1000 transmit symbols per channel use. The tolerable error ǫ and the iteration step µ of the gradient projection algorithm are set to 10−6 and 0.05, respectively. In Fig. 2 the uncoded BER is simulated as function of the available transmit power Etx . ”WF, no Quant.” refers to the linear Wiener filter precoder while no quantization is applied in the system model. ”WF, D=I” is the linear Wiener filter precoder that does not take the quantization into account and BER performance sensitivity to inaccuracy in D implementation is studied and plotted in Fig. 3. It can be seen that even with 10% error in D, the BER performance does not degrade much as compared to the ideal case. Table 1. Gradient Projection Algorithm Iteration step µ,Tolerable error ǫ InitializationP(0) = HH , n = 0 Step 1: If tr P(0) PH > E2tx , r(0)  0.5Etx  P(0) ; let P(0) = tr P(0) PH  (0) ∗ ∂MSE(P(n) ) Step 2: P(n+1) = P(n) − µ ; ∂P   > E2tx , If tr P(n+1) PH r(n+1) 0.5Etx   P(n+1) ; let P(n+1) = H Uncoded BER 10 QP-GP, D with 5% error QP-GP, D with 10% error QP-GP QP-GP, D=I -2 tr P(n+1) P(n+1) Step 3: If MSE(n+1) − MSE(n) ≤ ǫ → terminate the algorithm. Otherwise, let n = n + 1 and return to Step 2. 10 -3 8 10 12 14 16 18 20 Transmit Power/dB Fig. 3. Sensitivity analysis with respect to D equal power allocation is performed [14]. The transmit power constraint is still satisfied by appropriate scaling. ”QP-GP” denotes our proposed precoder design: Quantized Precoder with Gradient Projection method. ”QP-GP, D=I” refers to the proposed precoder design when the power allocation is equal for all transmit antenns. So, no additional analog processing D is required. ”QWP” designates the Quantized Wiener filter Precoder introduced in [11]. It can be seen from the results that ignoring the distortions due to the 1-bit quantization in WF leads to the worst case scenario. When taking them into account in QP-GP, D=I a significant improvement in the uncoded BER can be achieved. This performance improvement can be further increased when unequal power allocation at the transmit antennas is deployed, as shown in the case of QP-GP and QWF. The proposed precoder design QP-GP outperforms the other designs. This iterative design converges to the same solution for different initial values. The analog real-valued diagonal precoder D can be built within the power amplifiers at each antenna. Fig. 4 shows the distribution of the normalized diagonal coefficients of D. We observe that the deviation of these coefficients among the different antennas and the channel realizations with respect to the mean value (at max 6dB) is quite small. Therefore, the requirements in terms of the dynamic range of the power amplifier are still reasonable. 600 500 400 300 200 100 0 0.5 1 1.5 2 dnn/sqrt(E tx/2N) Uncoded BER 10 0 Fig. 4. Distribution of the diagonal D coefficients over 200 channel realizations: Etx = 10dB WF, no Quant. WF, D=I QP-GP, D=I QWP QP-GP 10 -1 6. CONCLUSION 10 -2 10 -3 10 -4 -5 0 5 10 15 20 E tx[dB] Fig. 2. BER comparison between different precoding schemes In general, the analog processing exhibits higher complexity and lower accuracy as compared to the digital counterpart due to hardware implementations and imperfections (aging, temperature,...). The analog precoder D offers less complexity due to its positive real-valued diagonal structure, and since it has to be updated only every coherence time. The We present a new MMSE precoder design to mitigate the IUI in a DL massive MIMO scenario assuming perfect CSIT. The proposed precoder design takes into account the signal distortions due to the 1-bit quantization at the transmitter and at the receiver. The precoder is split into a digital precoder that separates the users in the direction and a real-valued diagonal analog precoder for the power allocation at each antenna. Our precoding method shows better performance in terms of the uncoded BER compared to the precoder designed in [11]. The analog precoder involved in the proposed scheme is updated every coherence time thus reducing the implementation complexity. Furthermore, the BER performance is insensitive to imperfections in the analog precoder implementation. 7. REFERENCES [1] T.L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” Wireless Communications, IEEE Transactions on, vol. 9, no. 11, pp. 3590–3600, November 2010. [2] E. Bjornson, M. Kountouris, and M. Debbah, “Massive mimo and small cells: Improving energy efficiency by optimal soft-cell coordination,” in Telecommunications (ICT), 2013 20th International Conference on, May 2013, pp. 1–5. [3] C.B. Peel, B.M. Hochwald, and A.L. Swindlehurst, “A vector-perturbation technique for near-capacity multiantenna multiuser communication-part i: channel inversion and regularization,” Communications, IEEE Transactions on, vol. 53, no. 1, pp. 195–202, Jan 2005. [4] A.B. Gershman, N.D. Sidiropoulos, S. ShahbazPanahi, M. Bengtsson, and B. Ottersten, “Convex optimizationbased beamforming,” Signal Processing Magazine, IEEE, vol. 27, no. 3, pp. 62–75, May 2010. [5] F. Rusek, D. Persson, Buon Kiong Lau, E.G. Larsson, T.L. Marzetta, O. Edfors, and F. Tufvesson, “Scaling up mimo: Opportunities and challenges with very large arrays,” Signal Processing Magazine, IEEE, vol. 30, no. 1, pp. 40–60, Jan 2013. [6] M. Di Renzo, H. Haas, A. Ghrayeb, S. Sugiura, and L. Hanzo, “Spatial modulation for generalized mimo: Challenges, opportunities, and implementation,” Proceedings of the IEEE, vol. 102, no. 1, pp. 56–103, Jan 2014. [7] R.R. Muller, M.A. Sedaghat, and G. Fischer, “Load modulated massive mimo,” in Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference on, Dec 2014, pp. 622–626. [8] A. Kalis, A. Kanatas, and C. Papadias, Parasitic Antenna Arrays for Wireless MIMO Systems, Springer, 2014. [9] E. Bjornson, M. Matthaiou, and M. Debbah, “Massive MIMO with Non-Ideal Arbitrary Arrays: Hardware scaling laws and circuit-aware design,” Wireless Communications, IEEE Transactions on, vol. PP, no. 99, pp. 1–1, 2015. [10] C. Svensson, S. Andersson, and P. Bogner, “On the power consumption of analog to digital converters,” in Norchip Conference, 2006. 24th, Nov 2006, pp. 49–52. [11] A. Mezghani, R. Ghiat, and J.A. Nossek, “Transmit processing with low resolution d/a-converters,” in Electronics, Circuits, and Systems, 2009. ICECS 2009. 16th IEEE International Conference on, Dec 2009, pp. 683– 686. [12] R. Price, “A useful theorem for nonlinear devices having gaussian inputs,” Information Theory, IRE Transactions on, vol. 4, no. 2, pp. 69–72, June 1958. [13] D. P. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computation:Numerical Methods, PrenticeHall, 1989. [14] M. Joham, Optimization of Linear and Nonlinear Transmit Signal Processing, Ph.D. thesis, Lehrstuhl für Netzwerktheorie und Signalverarbeitung, Technische Universität München, 2004.
7cs.IT
On using Tra er Driver for External Dynami Pro ess Observation ⋆ (extended abstra t) arXiv:cs/0701106v1 [cs.PL] 17 Jan 2007 Pierre Deransart Inria Ro quen ourt, BP 105, 78153 Le Chesnay Cedex, Fran e Pierre.Deransartinria.fr Abstra t One is interested here in the observation of dynami pro esses starting from the tra es whi h they leave or those that one makes them produ e. It is onsidered here that it should be possible to make several observations simultaneously, using a large variety of independently developed analyzers. For this purpose, we introdu e the original notion of full tra e to apture the idea that a pro ess an be instrumented in su h a way that it may broad ast all information whi h ould ever be requested by any kind of observer. Ea h analyzer an then nd in the full tra e the data elements whi h it needs. This approa h uses what has been alled a "tra er driver" whi h ompletes the tra er and drives it to answer the requests of the analyzers. A tra er driver allows to restri t the ow of information and makes this approa h tra table. On the other side, the potential size of a full tra e seems to make the idea of full tra e unrealisti . In this work we explore the onsequen es of this notion in term of potential e ien y, by analyzing the respe tive workloads between the (full) tra er and many dierent analyzers, all being likely run in true parallel environments. To illustrate this study, we use the example of the observation of the resolution of onstraints systems (proof-tree, sear h-tree and propagation) using so- phisti ated visualization tools, as developed in the proje t OADymPPaC (20012004). The pro esses approa h 1 onsidered here are omputer programs, but we believe the an be extended to many other kinds of pro esses. Introdu tion One is interested here in the observation of dynami pro esses starting from the tra es whi h they leave or those that one makes them produ e. It is onsidered here that it should be possible to make several observations simultaneously, using a large variety of independently developed analyzers. When one wants to observe a pro ess, the pra ti e is to instrument it for ea h type of observation whi h one wants to make on it. One thus implements a ⋆ This work has been partly supported by OADymPPaC [1℄, a Fren h RNTL proje t. new "ad ho " tra er for ea h analyzer, or one adapts and one. Su h a work approa h whi h ompletes an existing an be largely avoided if one adopts from the start a general onsists to instrument it su h that it produ es what we all a "full tra e". This unique tra e will be useful then for all the later observations whi h one an plan to make. Ea h analyzer an then nd in the full tra e the data elements whi h it needs. This approa h uses what was driver" whi h alled a "tra er ompletes the tra er and drives it to answer the requests of the analyzers. This approa h is parti ularly tempting in pra ti e as the full tra e never needs to be ompletely expressed (the ex hanges of information remain limited) and the work of the tra er implementation and of its driver is made on e for all. The evaluation in terms of feasibility and performan e remains however problemati . In fa t, this approa h allows to redu e the size of the tra e emitted to a useful bare minimum and thus to speed up the whole pro ess. In it allows to onsider very large full tra es. This has also a the size of the tra e. Beyond a ompensation, ost whi h grows with ertain size, the produ tion ost of the tra e is likely to be ome prohibitory. It is pre isely the question in whi h one is interested here. Until where an one go in this approa h on a pra ti al level without slowing down a pro ess ex essively and how? To get a more pre ise idea, one must take into a ount not only the time of tra e produ tion, but also how the tra e will be used. In [2℄ and [3℄ the notion of tra er driver is presented and experimented is the ontext of nite domain onstraint resolution [4℄. But the question of the nature of the tra e whose emission is ontrolled by the tra er driver is not dire tly ta k- led. In this work we explore the onsequen es of this notion in term of potential e ien y, by analyzing the respe tive workloads between the (full) tra er and many dierent analyzers, all being likely run in a true parallel environment. In this work, we introdu e the notion of full tra e to pro ess whi h apture the idea that a an be instrumented in su h a way that it may broad ast all information ould ever be requested by any kind of observer. We then analyze the nature of the work of the tra er and the driver, and the distribution of the fun tions between the tra er and its driver on the one hand, and the analyzers on the other hand. This allows us to better estimate how powerful, useful and e ient the on ept of full tra e ar hite ture of all involved an be, provided it is a ompanied by the right omponents. To illustrate this study, one will take the example of the observation of the resolution of onstraints systems (proof-tree, sear h-tree and propagation) us- ing sophisti ated tools for visualization, a ording to the method developed in the proje ts DiSCiPl (1997-2000) [5℄ then OADymPPaC (2001-2004) [1℄. This eld is of parti ular interest be ause the tra es in lude the representations of ompli ated and potentially bulky obje ts, and the omputations (evolution of the domain of the variables) are at the same time logi al and sto hasti . The onstraints systems, be ause of the to true omplex systems. omplexity of their resolution, are very lose In this extended abstra t we present su essively the on epts of full tra e and its in remental  ompressed version, then the question of their semanti s. We analyze nally the problem of the distribution of work between a driven tra er and external analyzers whi h work only with the useful tra e ow whi h is provided to them by their requests. 2 Full Tra e We introdu e here the pro ess on ept of full tra e. By denition the full tra e of a ontains all one may like to know about it during its exe ution (this in ludes likely a des ription of the pro ess itself ) . A pro ess is at a given moment t by a state St . hara terized It does not enter in the framework of this arti le to dene what is exa tly su h a state. It will be supposed only that it an be des ribed by a nite set of parameters for its value at moment A t. The pn for the nth parameter, and pn,t on ept of "moment" will be spe ied hereafter. urrent state will be denoted by the list of the values of its parameters. It is also assumed that the transformation of a state into another is made by "steps" hara terized by an a tion a. The set of a tions performed at moment t is labelled at . So dened, the on ept of full tra e seems not to have any appli ation. In pra ti e, there are only approximations; but the important thing here, is to admit that, whatever is the level of details with whi h one wishes to observe a pro ess, there is always a threshold whi h makes it possible to dene su h a tra e. One an onsider that in the ase of a program, it a ts of a more or less thorough instrumentation whi h produ es a tra e, in other words a program augmented with a tra er. Denition 1 (Virtual Full Tra e). sequen e of tra e events of the form . An virtual full tra e is an unbounded et : (t, at , St+1 ) omprising the following elements:  et : unique identier of the event.  t: hrono. Time of the tra e. It only varies by unit values and is always in reasing. To distinguish from the time of the observed pro esses or of the analyzers whi h may not be monotonous ompared to the hrono.  St = p1,t ..., pn,t : parameters at hrono t. In a tra e event the parameters are alled attributes and St the full urrent state. The parameters may St is the last urs. The parameters (or attributes) des ribe obje ts or a tions performed to rea h the new state. observed state before the event et orrespond to the new rea hed state o St+1 .  at : a tion an identier of the set of a state St to the state tions hara terizing the step from the St+1 . Any tra e ee tively produ ed by a pro ess an be regarded as a partial full tra e. In pra ti e, one "sees" only partial tra es whi h start after the moment 0 where the pro ess observed is in a presumably initial state S0 . We will limit ourselves in this summary to only a single example of tra e: the tra e of the proof-trees in Prolog systems based on standard Prolog [6℄. This tra e is far from being a full tra e (many useful information, even easily available at any moment are not represented there). Here is an extra t: 1 2 3 3 4 4 5 .... 1 2 3 3 3 3 3 Call: Call: Call: Exit: Call: Exit: Call: '$ all$'(ben h(2)) ben h(2) 2>0 2>0 _182 is 2-1 1 is 2-1 ben h(1) This is a Byrd's tra e [7℄, adopted in the majority of the Prolog systems. The moment "0" event orresponds to the laun hing of the resolution of a goal. Ea h tra e orresponds to a stage in its resolution. An event ontains the following information: two attributes whi h are indi ation of depths (the rst, the depth in the sear h-tree and the se ond in the proof-tree), a "port" whi h orresponds to the a tion whi h made it possible to rea h this stage. Thus the port orresponds to a goals to solve, and total of 5 in the all all to the indi ated subgoal and the installation of the sub- exit to the su ess of the subgoal. There are other ports (a ase of GNU-Prolog) not detailed here. The rst " all" denes the laun hing of the rst goals (if there is only one of them). If the resolution terminates, the tra e is nite, unbounded otherwise. The last attribute gives the subgoal to solve. This tra e does not hrono omprise identiers nor hrono; the orresponds to the sequential order of emission of the tra e events and the resulting hrono plays the role of an identier. It is interesting to note that the obje tive of su h a tra e is to display all the steps of evolution of a proof-tree until obtaining all the possible proofs (the port fail orresponds to a failure and redo to a nondeterministi goal where a new resolution will be tried), and to some extend to des ribe also the sear h-tree. However, the (partial) proof-tree is never expli itly des ribed (not more than the sear h-tree). This tra e thus does not provide the parameters of interest dire tly (the partial proof-tree). This brings us to the following observation. The parameters of the full state are not given expli itly in this tra e, but only some attributes (port and goal) whi h possibly make it possible to nd it. We will re onsider this point later. These attributes thus give only an in remental information whi h makes it possible to obtain the new proof-tree after a resolution step. We will say that the tra e is "in remental". This leads us to dene the following parti ular tra es whi h we dene here without more details. Denition 2 (Dis ontinuous, Ee tive, In remental Full Tra e). A tra e is dis ontinuous if it is a (full) tra e whi h ontains su events whose variation of the . essive hrono may be higher than a unit. There are "holes" in it, either be ause the emission is dis ontinuous, or be ause the observing proess "listens" only o asionally to it. Noti e that the dis ontinuity on erns only the tra e emission and not its extra tion; in other words moment 0 orresponds to the a tivation of the tra er. A tra e is ee tive if it is a (full) tra starting from the knowledge of (St , At ) e of the form one an dedu e et : (t, At ) and (at , St+1 ). At su h that, denotes a set of attributes. The ee tive tra e is the tra e emitted by a tra er, that whi h is a tually visible. The virtual full tra e is a parti ular where the attributes parti ular At are the a tion label at ase of ee tive tra e and the parameters St . Another ase is the full in remental tra e. A tra e is in remental if the attributes are su h that only the urrent state are noted. It has the form et : (t, Deltat +) hanges ae t- Deltat + ontains the des ription of the a tions whi h modify the values of the parameters ing the where of the moment t. To remain a full tra e, this tra e must satisfy the following dition: starting from the knowledge of (St , Deltat +) one an dedu e on- (at , St+1 ). In this extended summary, when the distin tion is not absolutely ne essary, one will not distinguish between virtual and ee tive tra es, and one will speak indierently about parameters or attributes. Pra ti ally all the tra es are in remental (thus it uses attributes), as the pre eding example illustrates it well, be ause the emission of a full state in ea h tra e event would be obviously prohibitive. In fa t the size whi h would take the events would be mu h too high and the tra e would be extremely redundant. The ondition imposes simply that one an retrieve the full tra e starting from the transmitted attributes and from the pre eding full state. In pra ti e the observed pro esses will produ e partial tra es only. In this ase the retrieval of the full state is impossible. If one wants to nd a full tra e, or at least a more omplete one, it will be ne essary "to ask" the tra er to provide at least one full state. If the observing pro ess needs to take into a that an be su ient to enable it to maintain a ount only a partial state, onsistent partial state. On the other hand if it needs, at a given moment, to know a full state, or at least a more full omplete state, it will have to ask the tra er to provide him at least a urrent state or a part of it. Pra ti ally all the tra es are dis ontinuous, even if often ea h part of them (ne essarily nite) an be regarded as a nite single tra e. This also raises the problem of the knowledge of the initial state S0 in whi h the observed pro ess was at the moment of the initial tra e event ( hrono equals to 0) and thus of the ommuni ation to the analyzers of the full initial state S0 , before any event of tra e. These two reasons justify that one is interested in the manner of obtaining su h a state. The urrent value of a parameter may exist just as it is in the pro ess and requires only a small omputation to extra t it. On the other hand it may not exist and should require a partial re-exe ution of the pro ess (this is used in the analyzers of the CHIP environment of Cosyte apa ity [5℄ or CLPGUI [1℄). This obliges to stop the exe ution of the observed pro ess (at least when that is possible), and to give the ability to the observing pro ess to stop and resume the observed pro ess. This leads to the idea sket hed in the introdu tion of syn hronization primitives between pro esses, a kind "image freezing" whi h makes it possible to omplete the information at any moment, a need. This also results in the need for a fun tion "a ess to the ording to the urrent state". It is important to note that with an ee tive or in remental tra e, keeping a full urrent state is then in harge of the observing pro ess and not of the observed pro ess. This assumes however that the observed pro ess least re overy points in whi h full ontains at urrent state will be maintained and a essible, so as to allow the observing pro ess to resume the tra e and to be able to restart from a full urrent state. It is important to note that with a full ee tive tra e, dierent from the full virtual tra e, to keep a full pro ess will be an additional urrent state in the observing harge of this pro ess itself, be ause the tra er of the observed pro ess then does not have any more obligation to al ulate the requested parameters expli itly (only the requested attributes are This supposes however that the observed pro ess points in whi h a full omputed). ontains at least re overy urrent state will be preserved and a essible. This may allow the observing pro ess to resume the tra e and to be able to restart from a full urrent state. This aspe t is not treated here. 3 Observational Semanti s One is interested in this se tion in the semanti s of the full tra e, alled here "observational semanti s". The tra e does not explain anything. It is only a olle tion of fa ts. The question arises however to understand the tra e. For that one needs two levels of semanti s. The rst level orresponds to the des ription of the a tions and ob- je ts appearing in the parameters and attributes of the tra es, i.e. a semanti s of the observed data. The se ond level orresponds to a kind of tra e explanation, i.e. a semanti s des ribing how the values of the parameters at the moment are derived from the values of the parameters of the moment a tions whi h a at t−1 t and how the are sele ted. Clearly this means that one has a model of the pro ess urately des ribes the evolution of the tra e between two events. The form of this semanti s is the subje t of another work in progress. To read a tra e, one needs only the rst level of semanti s. Only the relations between the parameters in the same state or attributes in the emitted tra e events must be known. In the example of the Prolog tra e, the properties of the obje t "proof-tree" must be known to understand the relation between the depth of the tree and the tree itself. The semanti s of the tra e (full and/or in remental) thus ontains the des ription of the relations between the parameters whi h relates the semanti s and the produ ed attributes. But to understand the tra e omprehensively, it is ne essary to go further in the knowledge of the pro ess itself. What we all here "observational semanti s" (OS) is the semanti s of the tra er (the rst semanti s, although being part of the OS, an be seen like a semanti s of the tra e). It uses the semanti s of the obje ts and a tions of the full tra e and an be seen as an abstra t semanti s in the sense of Cousot [8℄. It l ∈ dom(Σ) ∧ choice-point(Σ(l)) N ← l, S ← Σ(l) ba k to Fig. 1. A rule of the abstra t model of Prolog Proof-Tree displayed in [13℄ is a kind of natural semanti s [9℄ whi h an be expressed by a nite set of rules of the form a : Condition(S) → S ′ = a(S) su h that any event of tra e et : (t, at , St+1 ) an be obtained starting from the state St and the a tion at by appli ation of the rule a of the OS. The (set of ) a tions a performed at hrono t is denoted at . This semanti s an take the form of a stru tural operational semanti s [10℄ or of an evolving algebra [11℄ and being more or less rened, "big-step" or "small-step" [12℄. It is in fa t very tempting to have a omplete semanti s for the tra er in order to allow a lear implementation of it. Coming ba k to the example of Prolog, a tra er augmented with the tra e of onstraints resolution (proof-tree, sear h-tree, labeling-tree and propagation), alled Codeine, has been implemented in this manner on GNU-Prolog [13℄. An abstra t model has been dened [14℄, whi h has been then implemented on several solvers [1℄. This made it possible to meet two prin ipal obje tives: portability of the analyzers whose input data are based on the full tra e, and robustness of the tra ers whose implementation is guided and improved by a good methodologi al approa h [15℄ based on a pre-spe ied rigorous semanti s. It is useful however to note that a would be a omplete semanti s of the tra e, whi h omplete formalization of the observed pro ess, is almost impossible in pra ti e, be ause of the degree of renement that would imply. For example, an attribute in luded in many tra es is the CPU time onsumed by the pro ess sin e the "beginning" of the tra e emission. To formalize its variations, in fa t issued from the host system, would amount introdu ing into the observational semanti s a model of the system in whi h the pro ess is exe uted. Finally an OS should not be onfused with a whi h would make it possible to re all the the sole initial state and its rules. The omplete operational semanti s ourse of the pro ess starting from urrent full state is not su ient to know whi h rule may apply. For example, the model developed for nite domain onstraints resolution des ribed in [13℄ as at least one rule ontains a set of operational rules su h an be applied at ea h state, but whose always pre ise enough to de ide how it onditions are not an be applied. So is the ba k to rule, depi ted in the Figure 1. It ontains a the new ondition l ∈ dom(Σ) whi h must be satised, meaning that urrent node belongs to the sear h-tree, but nothing says whi h node must be sele ted. The sole knowledge of the full urrent state (whi h in ludes the urrent sear h-tree) is not su ient. The knowledge of the urrent tra e event is ne essary to know whi h is this new node and thus to know how this rule is in fa t instantiated. 4 Tra er Driver and Evaluation The idea to use a tra er driver was proposed by M. Du assé and J. Noyé sin e the origin of Prolog [16℄ in the ontext of logi programming, then regularly de- veloped and tested in various environments [17℄. The originality of this approa h onsists in proposing that the full tra e should not be ommuni ated in its in- tegrity to an analyzer, but that this one re eives only the part of the tra e whi h relates to it. Instead of broad asting "urbi et orbi" a full tra e that any analyzer would have the task to lter, ltering is performed at the sour e level, i.e. by the observed pro ess whi h behaves then like a server of tra es. The analyzer is a lient whi h restri ts himself to indi ate to the observed pro ess the tra e whi h it needs indeed. The pro esses then brings to information: the omplete separation of the observed and observing onsider an ar hite ture server/ lient with ex hanges of lient indi ates to the server the tra e it needs and the server provides him only what it requires. The ltering of the tra e is no longer arried out by the analyzer, but by the observed pro ess. It is the task of the tra er driver to perform all requested ltering and to dispat h the tra es requested by the lients. This ar hite ture as well as the ex hanges between the pro esses have been des ribed in parti ular in [1℄ and [2℄. We will not go more into the details in this extended abstra t. In addition, only the aspe ts related to the possibilities of modulating the tra es emitted a be ording to the needs of the analyzers will onsidered; the possibility previously mentioned to syn hronize the pro esses will not be onsidered here. This approa h allows to redu e the size of the tra e emitted to a useful bare minimum and thus to speed up the whole pro ess. In to onsider very large full tra es. This has also a of the tra e. Beyond a ompensation, it allows ost whi h grows with the size ertain size, the produ tion ost of the tra e is likely to be ome prohibitory. It is pre isely the question in whi h one is interested. Until where an one go into this approa h on a pra ti al level without slowing down a pro ess ex essively and how? To get a more pre ise idea, one must take into a ount not only the time of tra e produ tion, but also how the tra e will be used. One ould think at rst sight that the fa t, for the observed pro ess, to have to produ e a full tra e makes this approa h unrealisti . The server is indeed slowed down by the simple fa t of having to ompute a great number of parameters whi h will perhaps never be used. This approa h would be thus very penalizing for the pro ess instrumented with an expensive tra er whenever only a weak portion of the full tra e would be used. On another side, and pre isely in this ase, a onsiderable e onomy is realized be ause of ltering at the sour e, and the transmission of a limited tra e whose osts of oding and diusion are then extremely redu ed. The idea is that in pra ti e the fa t of emitting only one small part of the tra e, ltered at the sour e, ompensates for the over ost of work mainly related to the updates of all the parameters of the full tra e in the analyzed pro ess. On the other hand, if many analyzers are a tivated simultaneously and use at a given moment a tra e equivalent to a full tra e, the problem to produ e or not the full tra e does not arise any more (it must in any ase be produ ed), and the question about the interest of using a tra er driver is worth to be posed. We show that even in this ase the driver an save time. Additionally another type of e onomy must be onsidered whi h is omple- mentary to the previous one: the use of an in remental tra e as an ee tive tra e instead of the virtual full tra e. In this ase there is no loss of information (the equivalent of the full tra e is still transmitted), but there is a redu tion of the amount of data transmitted (a kind of data ompression is used in order to limit the size of the emitted data ow). In this later ase the tra er performs a kind of  ompression and the analyzer a kind of de ompression and both task must be taken into a ount in the analysis of the workloads. It will be shown that the performan es of the tra er and the analyzers an be inuen ed more by this kind of load rather than by the size of the full tra e. In order to be more pre ise, it is ne essary to analyze the repartition of work within the various pro esses. The times to take into a ount for a detailed performan es analysis are times on erning the pro ess itself, its tra er and its pilot on the one hand, and times on erning one analyzer on the other hand (one must suppose here that, if there are several analyzers, they are running with true parallelism): Pro ess Tra er and Driver --------------- ------------------------------------| | | | T_prog + T_ ore + T_ ond + T_extra t + T_en ode-and- om Analyser -----------------------------------------| | T_filter + T_de ode + T_rebuild + T_exe From the side of the pro ess, tra er and driver:  Tprog : time devoted to the exe ution of the not instrumented program (or instrumented but with dea tivated tra er).  Tcore: additional exe ution time of the pro ess on e instrumented to produ e the full tra e and with a tivated tra er. It is a time devoted to the onstru - tion of the elements ne essary to a likely later extra tion of the parameters of the urrent state. This time is largely inuen ed by the size of the full tra e. At this stage all approa h, one omputations must be performed be ause, in the presented onsiders that it must be possible to produ e the full state at any moment (in urrent ase in parti ular of dis ontinuous tra e). This time is related to the form of the full tra e only and does not depend on what will be emitted. If all the parameters of the full tra e are already part of the pro ess, this time is just null.  Tcond : time of he king of the onditions dening the tra es to be emitted for ea h analyzer (ltering). This time is null if there is no ltering (emission of the full tra e).  Textract : omputing time of the parameters requested during or after ltering.  Tencode−and−com : time for formatting the tra e (en oding), possible ompression and emission. Time spe i Textract and to the driver Tencode−and−com Tcond . orresponds to Other times, namely, Tcore , an be regarded as times related to the tra er. It should be noti ed here that, in this approa h, the driver a ts only on the hoi e of the parameters and the attributes to be tra e, i.e. on the ontained in the ee tive ommuni ated information. It does not have the possibility of inuen ing the form of the attributes, for example the degree of  ompression of the information. In fa t, this  ompression is oded here in the form of the attributes. The nature of the attributes (in remental information or not) is part of the tra er and it annot be modied or adapted through the tra er driver. On the other side any additional ompression algorithm used to redu e the size of the information ow belongs to the stage of en oding. Generalizing this idea, one ould also onsider the possibility to put into the tra e more abstra t attributes, adapted to some more spe i a redu ed size. The use, su h that the whole tra e has orresponding attribute omputation time would thus be related to the extra tion stage. This generalization is not studied here. From the side of the analyzer:  Tf ilter : time of ltering by an analyzer. This time is null if ltering is per- formed at the sour e (the tra e events sent to a parti ular analyzer an indeed be tagged at the sour e). In fa t by pre aution but mainly be ause of la k of implemented tra er driver, many external analyzers will lter again the tra e. However it is not ne essary to  Tdecode: ir umvent, as the time of well. It must be not be onsider this ase here. time of de oding of the re eived tra e. This time is impossible to oding and ompared with the ompletely eliminated. If used, it is be ause it is Tencode−and−com as Tencode−and−com. It an- ommuni ation encode part of ompression/de ompression algorithms are onsidered that, even if both times are umulated, one will save a substantial amount of time over the transmission.  Trebuild : time of rebuilding the full tra e starting from the ee tive tra e ( omputation of the urrent parameters starting from the emitted attributes). This time must be tributes. It is ompared with Textract , equilibrates most favorably with the  Texec : the omputation time of the at- onsidered that su h a time, even if umulated with Textract , ost of tra e emission. exe ution time of the proper fun tions of the analyzer. With very sophisti ated analyzers (as those used for data analysis for example), this time an be ome so important that it makes negligible the one orresponding to the tra e produ tion. Example: Codeine, des ribed in [13℄, implements the generation of a full tra e for the analysis of onstraints resolution, as an extension of GNU-Prolog. The urrent state St ontains (among other attributes): proof-tree, sear h-tree, straints state and variables with their domains. For a the full tra e see [1℄ ( alled in this proje t "generi not generate a full tra e (as full as it on- omplete des ription of tra e"). Even if Codeine does ould be possible), the Codeine tra e is onsiderably ri her than the simple Byrd's tra e of GNU-Prolog whi h is stri tly ontained. Only an in remental tra e is generated, and only the proof-tree and the onstraints and variables states urrent state of the pro ess (the an be rebuilt later starting just from the ost of extra tion is redu ed to the proper data management realized by the tra er). To obtain the ost of the urrent sear h- tree the pro ess would have to be re-exe uted partially, therefore it would be ne essary to freeze its nently a urrent exe ution. The ost of management of a perma- essible sear h-tree at any moment would be of its size. On the other hand an analyzer learly intra table be ause an, using the produ ed in remental tra e, maintain all these obje ts permanently (obtaining useful for it). Codeine also St or those parameters ontains a tra er driver su h that the denitions of the tra es to be emitted (spe i ation of the emitted tra e) are stored in a data le whi h must be provided before the pro ess starts. Times are distributed as follows: From the side of the pro ess, tra er and driver:  Tprog : exe part of  Tcore: ution time of GNU-Prolog with "swit hes" of the tra er (a small Tcore of negligible duration in general). time of onstru tion of the parameters of the full Codeine tra e ( ol- le ting of all data useful to extra t the full tra e); a kind of GNU-Prolog plug-in.  Tcond : time of ltering the full tra e to sele  Textract : omputing time of the attributes t all the requested tra es. orresponding to the parameters requested during ltering.  Tencode−and−com : omputing time of the attributes orresponding to the re- quested parameters, en oding (XML format or Prolog term) of the emitted tra e, and emission time of the in remental tra e. From the side of the analyzers: experiments in the framework of the OADymPPaC proje t with sophisti ated analyzers (intensive visualization of graphs, visual data analyses) revealed the following  Tf ilter and Tdecode : osts. both times are intri ate in a synta ti (XML) of the full tra e. Re-ltering, a part of whi h But the driven tra er approa h analysis module ould have been avoided. ould not be taken into a ount in the analyzers built during this proje t.  Trebuild : time of onstru tion of the parameters of the full tra e (variables domains, a tive onstraints set, sear h-tree ...). This time grows (non esti- mated fa tor) a ording to the size of the data, sometimes related to the size of the tra e, with a onsiderable slow down of the analyzer during the read- ing of the tra e . The low speed of an analyzer may ause, in the ase of analysis of the tra e on the y, a strong slow down of the observed pro ess.  Texec : time of onstru tion of the obje ts to be visualized (graphs, data tables). These times an grow exponentially a The e ien y of the used algorithms is ording to the size of the data. ru ial here. This an also ause a slow down of the pro ess, and pleads in favor of a preliminary treatment of information before transmission (for example, sele tion of distinguished nodes to put in the tra e to redu e the size of a drawn graphs, or to olle t groups of variables as a unique attribute to redu e the number of lines in a matrix). It was been shown experimentally in [3℄ that the behavior of the Codeine tra er with the full tra e above ompares favorably with the behavior of GNU- Prolog with the Byrd's tra e only. Furthermore, the ltering realized by the tra er driver does not prejudi es the performan es. We give here a theoreti al justi ation to this result, showing that this approa h, already justied experimentally, an also be justied theoreti ally. In [2℄ L. Langevine observes that ltering the tra es all together is more ee tive than to lter them one after the other. This omes from the fa t that running several automata together may be more e ient than running one only. Indeed the essen e of ltering relates to simplied sele t rst the tra e events ner additional ltering will be thus of events mu h more redu ed. One a tra e whose language to onditions whose role is to ontaining the ports requested by an analyzer. A arried out thereafter but on a number an admit that this rst ltering relates to orresponds to a regular language. It is then possible onsider that ea h lter is itself a regular expression whose re ognition on the full tra e Filtering an be done using a non deterministi nite-state automaton. orresponds then to the re ognition task by a union of as many nite- state automata than there are a tive analyzers requesting a tra e. However the resulting automaton, on e optimized, an be mu h more e ient than the most e ient of the automata asso iated with a single analyzer (the union of the automata an be more e ient in terms of omputation steps than only one of them [18℄). As these operations of ltering are extremely frequent, be ause they apply to all the tra e events, the speed up an be onsiderable. We are now in position to analyze the respe tive workloads. First observe that respe tive times of both sides may be onsidered as u- mulative or not, depending whether the respe tive pro ess are run sequentially or with true parallelism. In the later essors (a situation whi h an be ase, if all pro ess are run on dierent pro- onsidered with su h an approa h), only the slowest pro ess must be taken into a ount to evaluate the exe ution time of the whole system.  Tprog and Tcore These times on one side, Texec on the other side. orrespond to times spe i to the tra er and the analyzers (the slowest analyzer has the main inuen e on the exe ution time). These times Tcore Tf ilter are in ompressible and  Tcond on one side and depends only on the size of the virtual tra e. on the other side. At least one of these times must be null, and, if the ltering is at the sour e, the performan e an be improved. In any whatever is the size of the full tra e,  Textract on one side and These times Trebuild ases this time appears negligible, ompared with the other times. on the other side. orrespond respe tively to the omputation of the attributes from the parameters and re ipro ally. If one an redu e the extra tion time thanks to the ltering ( onsidering the low number of sele ted tra e events and attributes, and the fa t that the most of the parameters work is already in luded in Tcore ), the time of rebuilding omputation an be very im- portant and will probably be signi antly greater than the extra tion time.  Tencodea ndc om on one side and These times Tdecode on the other side. an be important, but the interest lies in the fa t that the prots realized on the ompensates the ommuni ation time (redu ed emitted volume) largely oding/de oding times. To summarize, the tra er and the slowest analyzer are the main fa tors inuen ing the whole performan e and they sides an in rease the workload of both onsiderably. However the use of a tra er driver and of te hniques of tra e ompression make it possible to ompensate partially, but sometimes in very ee tive manner, the over- osts related to the use of a full tra e. 5 Con lusion We introdu ed the on ept of full tra e in order to take into a possibilities of analysis of a dynami ount the multiple pro ess. The analyzed pro ess is instru- mented with, in addition to its tra er, a tra e driver, and the analyzers have the possibility of addressing orders to the driver. An ar hite ture then lient/server is onsidered to des ribe the intera tions between the pro esses analyzers and the analyzed pro ess. This enabled us to ta kle the problem of the evaluation of this approa h in terms of e ien y. We tried to appre iate how the introdu tion of a tra er driver the global e ien y of the analysis of a dynami ould improve pro ess using several analyzers observing the pro ess in a simultaneous way. We initially observed that a full tra e ould be parti ularly expensive to produ e, but that part of this ould be transferred, without loss of apa ity of analysis (the full tra e retrieved by the analyzers), on the analyzers. The most unfavorable of e ien y ost an be ase in term orresponds to the situation where the equivalent of a full tra e must be built, extra ted and emitted. In this ase, the full tra e is in fa t a union of all the redu ed tra es requested by several analyzers. We showed that, even in this ase, a ltering realized by a tra er driver was able to bring an important bene e. Our observations, during the proje ts DiSCiPl [5℄ and OADymPPaC [1℄, using very sophisti ated analyzers as powerful tools for visualizations as well ([19℄ [20℄), also showed that the limits of performan e analyzers that tra er, even with a full tra e. This study opens nally on a series of questions: ame often more of the  How deep is it possible to implement a very broad full tra e? ourse the limits of the approa h are obvious: the Of on ept of full tra e is meaningful only with regards to a family of possible analyses, well known and sele ted in advan e. Nothing guarantees a priori that an additional instrumentation of the observed pro ess will never be ne essary. But beyond this aspe t, the interesting question relates to the feasibility of the implementation of a very ne grained full tra e. On one side indeed, one will be able to ompensate for ertain produ tion osts of su h large tra e, by emit- ting an ee tive tra e of limited size; but on the other side, the analyzers (whose use an be temporary or ex eptional) will be loaded with most of time of development/re-building of the full tra e (ne essary, even if it uses only a part of it) and will o asionally slow down the observed pro ess.  Whi h intera tion language to use and whi h dialogue between the driver and the analyzers? This question has been little ta kled here and mainly remains out of the s ope of this arti le. The tenden y however is with the use of a language like XML. It is the way hosen by the OADymPPaC proje t, and the possibility of redu ing the ow of tra e to its bare minimum en ourages this. Nevertheless our experiments showed that the data ommuni ation needed to be optimized by ompression with spe i tra e ombining usual methods of ompression like using in remental at- tributes, but also by introdu ing more abstra t attributes in the tra e. This leads to the idea that the dialogue between the involved pro esses, limited here to the hoi e of the tra e events and the attributes in the tra e, and apa ities of syn hronization, must be extended su h that it allows also to  inuen e the design of the attributes themselves. Finally a ru ial question related to the omprehension of the tra e. to understand a tra e, or how to des ribe its semanti s ? How If the semanti s of the tra e (and of the tra er), or at least a large part of it, is given a priori (be ause one has a model for the observed pro ess), then the omprehension of the tra e as well as the implementation of the tra er are largely fa ilitated. In the opposite or arti ial ase - and it is the ase for many natural omplex pro esses - one has only vast tra es to study. Even in the elds of programming languages where semanti s seems better ontrolled a priori, one tries to analyze a program behavior by trying to understand its tra es. Thus one sees stinging the usefulness of general te hniques based on data mining [21℄ or on Web mining [22℄ for su h purposes. However one must re ognize that any full tra e will probably always in lude portions es aping any kind of des ription based on formal semanti s. Referen es 1. Deransart, P., & al: Outils d'Analyse Dynamique Pour la Programmation par Contraintes (OADymPPaC). Te hni al report, Inria Ro quen ourt and É ole des Mines de Nantes and Insa de Rennes and Université d'Orléans and Cosyte and ILOG (2004) Projet RNTL. http:// ontraintes.inria.fr/OADymPPaC . 2. Langevine, L., Du assé, M.: A Tra er Driver for Hybrid Exe ution Analyses. In Press, A., ed.: Pro eedings of the 6th Automated Debugging Symposium. (2005) 3. Langevine, L., Du assé, M.: A Tra er Driver for Versatile Dynami Analyses of Constraint Logi Programs. In Serebrenik, A., Muñoz-Hernandez, S., eds.: Pro eedings of the 15th Workshop on Logi -based Methods in Programming Environments (WLPE'05), a pre- onferen e workshop of ICLP'05, Sitges, Spain (2005) Computer Resear h Repository s.SE/0508105. 4. Langevine, L., Du assé, M.: A Tra er Driver for CLP: Debugging, Monitoring and Visualization of an Exe ution from a Single Tra er. In Demoen, B., Lifs hitz, V., eds.: Pro . of the 20th Int. Conf. on Logi Programming, (ICLP'04). Number 3132 in LNCS, Saint-Malo, Fran e (2004) 462463 5. Deransart, P., Hermenegildo, M., Maªuszy«ski, J., eds.: Analysis and Visualisation Tools for Constraint Programming. Number 1870 in LNCS. Springer Verlag (2000) 6. GNU-Prolog: A CLP(FD) System Based on Standard Prolog (ISO) developed by D. Diaz (2003) http://gprolog.sour eforge.net/ Distributed under the GNU li ense. 7. Byrd, L.: Understanding the ontrol ow of Prolog programs. Logi Programming Workshop (1980) 8. Cousot, P.: Abstra t Interpretation. Te hnique et S ien e Informatiques 19 (1994) 19 9. Kahn, G.: Natural Semanti s. In Brandenburg, F.J., Vidal-Naquet, G., Wirsing, M., eds.: Pro eedings of STACS, Springer (1987) also INRIA, RR 416, Natural Semanti s on the Computer. 10. Plotkin, G.: A Stru tural Approa h to Operational Semanti s. TR DAIMI FN 19, Computer S ien e Department, Aarhus University, Aarhus, Denmark (1981) 11. Gurevit h, Y.: Evolving algebras, a tutorial introdu tion. Bulletin of the European Asso iation for Theoreti al Computer S ien e 43 (1991) 264284 12. Lu as, S.: Observational Semanti s and Dynami Analysis of Computational Proess. RR 00/02, E ole Polyte hnique, Laboratoire d'Informatique, LIX, Palaiseau (Fran e) (2000) 13. Langevine, L., Du assé, M., Deransart, P.: A Propagation Tra er for GNU-Prolog: from Formal Denition to E ient Implementation. In Palamidessi, C., ed.: Proeedings of the 19th International Conferen e on Logi Programming, ICLP'03, Mumbai, India (2003) 14. Langevine, L., Deransart, P., Du assé, M.: A Generi Tra e S hema for the Portability of CP(FD) Debugging Tools. In Apt, K., Fages, F., Rossi, F., P., S., Van za, J., eds.: Re ent Advan es in Constraints. Number 3010 in Le ture Notes in Arti ial Intelligen e. Springer Verlag (2004) Sele ted papers of the Joint ERCIM/CoLogNET International Workshop on Constraint Solving and Constraint Logi Programming. 15. Du assé, M., Langevine, L., Deransart, P.: Rigorous design of tra ers: an experiment for onstraint logi programming. In Ronsse, M., Boss here, K.D., eds.: Pro eedings of the 5th International Workshop on Automated and Algorithmi Debugging, AADEBUG'03, Ghent, Belgium (2003) Computer Resear h Repository s.SE/0310042. 16. Du assé, M., Noyé, J.: Logi Programming Environments: Dynami Program Analysis and Debugging. The Journal of Logi Programming 19/20 (1994) 351384 17. Du assé, M.: Tra e S hemata for (Multi-language) Dynami Analysis. In Choi, J.D., Ryder, B., Zeller, A., eds.: Dagstuhl Seminar 03491, "Understanding Program Dynami s", Saint-Malo, Fran e, Dagstuhl, Germany (2003) 18. Hop roft, J.E., Ullman, J.D., eds.: Introdu tion to Automata Theory, Languages, and Computation. Computer S ien e. Addison-Wesley (1979) 19. Baudel, T., & al: Visual CP, Referen e Manual (2004) Manufa tured and distributed by Ilog, http://www2.ilog. om/preview/Dis overy/ . 20. Ghoniem, M., Jussien, N., Fekete, J.D.: VISEXP: Visualizing Constraint Solver Dynami s Using Explanations. In Barr, V., Markov, Z., eds.: Pro . of the 17th Int. of the Florida Arti ial Intelligen e Resear h So iety Conferen e (FLAIRS'04), AAAI Press (2004) 21. Denmat, T., Du assé, M., Ridoux, O.: Data Mining and Cross-Che king of Exe ution Tra es. A reinterpretation of Jones, Harrold and Satsko test Information Visualization. RI 1743, IRISA, Rennes (Fran e) (2005) 22. Zaidman, A., Calders, T., Demeyer, S., Paredaens, J.: Applying Webmining Te hniques to Exe ution Tra es to Support the Program Comprehension Pro ess. In So iety, I.C., ed.: Pro eedings of the 9th European Conferen e on Software Maintenan e and Rengineering (CSMR 2005), Man hester, UK (2005) 134142
2cs.AI
Sample Efficient Policy Search for Optimal Stopping Domains arXiv:1702.06238v2 [cs.AI] 24 May 2017 Karan Goel Carnegie Mellon University [email protected] Christoph Dann Carnegie Mellon University [email protected] Abstract Optimal stopping problems consider the question of deciding when to stop an observation-generating process in order to maximize a return. We examine the problem of simultaneously learning and planning in such domains, when data is collected directly from the environment. We propose GFSE, a simple and flexible model-free policy search method that reuses data for sample efficiency by leveraging problem structure. We bound the sample complexity of our approach to guarantee uniform convergence of policy value estimates, tightening existing PAC bounds to achieve logarithmic dependence on horizon length for our setting. We also examine the benefit of our method against prevalent model-based and model-free approaches on 3 domains taken from diverse fields. Introduction Sequential decision making and learning in unknown environments, commonly modeled as reinforcement learning (RL), is a key aspect of artificial intelligence. An important subclass of RL is optimal stopping processes, where an agent decides at each step whether to continue or terminate a stochastic process and the reward upon termination is a function of the observations seen so far. Many common problems in Computer Science and Operations Research can be modeled within this setting, including the secretary problem [Ferguson, 1989], house selling [Glower et al., 1998; Lippman and McCall, 1976], American options trading [Jacka, 1991; Mordecki, 2002], product pricing [Feng and Gallego, 1995] and asset replacement [Jiang and Powell, 2015], as well as problems in artificial intelligence like mission monitoring robots [Best et al., 2015], metareasoning about the value of additional computation [Zilberstein, 1995] and automatically deciding when to purchase an airline ticket [Etzioni et al., 2003]. Often the stopping process dynamics are unknown in advance and so finding a good stopping policy (when to halt) requires learning from experience in the environment. As real experience can incur real losses, we desire algorithms that can quickly (with minimal samples) learn good policies that achieve high reward for these problems. Emma Brunskill Stanford University [email protected] Interestingly, most prior work on optimal stopping has focused on the planning problem: how to compute near-optimal policies given access to the dynamics and reward of the stochastic stopping process [Peskir and Shiryaev, 2006]. Optimal stopping problems can also be framed as a partially observable Markov decision process (POMDP), and there also exists work on learning a good policy for acting in POMDPs, that bounds the number of samples required to identify the near optimal policy out of a class of policies [Kearns et al., 1999; Ng and Jordan, 2000]. However, such work either (i) makes the strong assumption that the algorithm has access to a generative model (ability to simulate from any state) of the stochastic process, which makes this work more suited to improving the efficiency of planning using simulations of the domain, or (ii) can use trajectories directly collected from the environment, but incurs exponential horizon dependence. In this paper, we consider how to quickly learn a nearoptimal policy in a stochastic optimal stopping process with unknown dynamics, given an input class of policies. We assume there is a fixed maximum length horizon for acting, and then make a simple but powerful observation: for stopping problems with process-dependent rewards, the outcomes of a full length trajectory (that is, a trajectory in which the policy only halts after the entire horizon) provide an estimated return for halting after one step, after two steps, and so on, till the horizon. In this way, a single full-length trajectory yields a sample return for any stopping policy. Based on this, we propose an algorithm that first acts by stopping only after the full length horizon for a number of trajectories, and then performs policy search over an input policy class, where the full length trajectories are used to provide estimates of the expected return of each policy considered in the policy class. The policy in the set with the highest expected performance is selected for future use. We provide sample complexity bounds on the number of full length trajectories sufficient to identify a near optimal policy within the input policy class. Our results are similar to more general results for POMDPs [Kearns et al., 1999; Ng and Jordan, 2000], but due to the structure of optimal stopping we achieve two key benefits: our bounds’ dependence on the horizon is only logarithmic instead of linear (with a generative model) and exponential (without), and our results apply to learning in stochastic stopping processes, with no generative model required. Simulation results on student tutoring, ticket purchase, and asset replacement show our approach significantly improves over state-of-the-art approaches. Problem Formulation We consider the standard stochastic discrete-time optimal stopping process setting. As in Tsitsiklis and Van Roy [1999], we assume there is a stochastic process P that generates observations o1 , . . . , ot (they may be vectors). There are two actions: halt or continue the process. The reward model is a known, deterministic function of the sequence of observations and the choice of whether to continue or halt. While there do exist domains where the reward model can be a nondeterministic function of the observations and the actions (such as a medical procedure that reveals the patient’s true condition after a sequence of waiting), most common optimal stopping problems fall within the framework considered here, including the secretary problem (the quality of each secretary is directly observed), house selling (the price for the house from each bidder is known), asset replacement (published guides on the worth of an asset, plus knowledge of the cost of buying a new one), etc. We focus on the episodic setting where there is a fixed maximum time horizon for each process. The finite horizon value of a policy Vπ = EP [r|π] is the expected return from following π over a horizon of H steps, where the expectation is taken over the stochastic process dynamics P. Note the policy may choose to halt before H steps. The goal is to maximize return across episodes. We focus here on direct policy search methods (see e.g. [Sutton et al., 1999]). More precisely, we assume as input a parameterized policy class Π = {f (θ)|θ ∈ Θ} where Θ is the set of policy parameters. Direct policy search does not require building a model of the domain, and has been very successful in a variety of reinforcement learning (RL) contexts [Deisenroth and Rasmussen, 2011; Levine and Abbeel, 2014]. Sample Efficient Policy Search We are particularly interested in domains where evaluation of a policy incurs real cost in the environment, such as stock market options selling. In such settings we wish to find sample efficient methods for doing policy search, that can minimize the number of poor outcomes in the real world. The challenge is that we do not know the stochastic dynamics P and so it is not possible to, in advance of acting, perform policy search to identify a good policy. Instead we can only obtain information about the domain dynamics by executing policies in the real world. We seek to efficiently leverage such experience to quickly make good decisions. We now present a simple approach, GFSE (Gather Full, Search and Execute) (Algorithm 1), to do sample efficient policy search. GFSE collects a set of full-length (horizon H) trajectories, uses these to evaluate the performance of any policy in the input policy class Π, identifies a good policy, and then executes the resulting policy on all future episodes. The key insight is in the first step, gathering the data to be used to evaluate the performance of any policy in the policy class Π. Monte Carlo estimation can be used to estimate the expected return of a policy by running it many times. However, this scales poorly with the cardinality of the policy class. Algorithm 1: Gather Full, Search and Execute (GFSE) Input: policy class Π, search method S, , δ n ← Use Theorem 1 with , δ Γ ← Gather n full trajectories from environment π∗ ← Identify policy using S(Π, Γ) \\evaluation uses Γ Execute π∗ Building a dynamics model from a set of data is more efficient, as a model can be used to simulate the performance of any policy, but this requires us to make certain assumptions about the domain (for ex. the Markov property) Which can lead to biased estimates. Alternatively, importance sampling can be used to do off-policy evaluation [Precup, 2000] but unfortunately such estimates tend to be very high variance. However, a simple but powerful observation is that a fullhorizon (H-step) trajectory can be used to yield a sample return for all optimal stopping policies in Π. Given a full length trajectory (o1 , . . . , oH ), the performance of a particular policy π can be simulated by providing (o1 , o2 , . . . ) to the target policy until it halts at some time step t ≤ H. Therefore we can take the subsequence of observations (o1 , o2 , . . . , ot ) and use it to directly compute the return that would have been observed for executing π on this trajectory. A single full-horizon trajectory will provide just one sample of the return of any policy. But a set of n full-horizon trajectories can be used to provide n sample returns for a given policy π, thereby providing an empirical estimate of V π . We can do this off policy evaluation of V π for any policy in the class Π. Prior work has shown that given access to a generative model of the domain, policy search can be done in an efficient way by using common random numbers to evaluate policies that act differently in an episode [Kearns et al., 1999; Ng and Jordan, 2000]. In our setting, a full-horizon trajectory is essentially equivalent to having access to a generative model that can produce a single return for any policy. However, access to a full length trajectory can be obtained by running in the environment, whereas generic generative models typically require ”teleporation”: the ability to simulate what would happen next under a particular action given an arbitrary prior history, which is hard unless in a planning scenario in which one already has knowedge of the dynamics process. Our results require weaker assumptions than prior results that use stronger generative models to obtain similar sample efficiency, while also achieving better sample efficiency than approaches with access to similar generative models. We will shortly provide a sufficient condition on the number of full length trajectories n, to guarantee that we can evaluate any policy sufficiently accurately to enable policy search to identify a near-optimal policy (within the input policy class). Of course, empirically, we will often wish to select a smaller n: our simulation experiments will demonstrate that often a small n still enables us to identify a good policy. Theoretical Analysis We now provide bounds on the sample complexity of GFSE: the number of full length trajectories required to obtain near accurate estimates of all policies in a policy class. This is suf- ficient to identify the optimal (or near-optimal) policy in the policy class with the highest expected return. First, we note that the optimal stopping problems we consider in this paper can be viewed as a particular instance of a POMDP. Briefly, there is some hidden state space, with a dynamics model that determines how the current state transitions to a new state stochastically, given the continue action. The observation is a function of the hidden state, and the reward is also a function of the hidden state and action. Our main result is that, given a policy class Π, the sample complexity scales logarithmically with the horizon. We make no assumption of access to a generative model. This is a significant improvement over prior sample complexity results for policy search for generic POMDPs and large MDPs [Kearns et al., 1999; Ng and Jordan, 2000] which required access to a generative model of the environment and had a sample complexity that scaled linearly with the horizon. These results can be thought of as bounding the computation/simulation time required during planning, when one has access to a generative model that can be used to sample an outcome (reward, observation) given any prior history and action. In contrast, our results apply during learning, where the agent has no generative model of the domain, but must instead explore to observe different outcomes. Without a generative model of the domain, sample complexity results for policy search in generic POMDPs when learning scale exponentially with the horizon [Kearns et al., 1999]. Optimal stopping trajectories are related to the trajectory trees of Kearns et al. which were used to evaluate the returns of different POMDP policies. For a POMDP with 2 actions, each trajectory tree is a complete binary tree (of depth H) rooted at a start state. Nodes in the tree are labeled with a state and observation, and a path from the root to any node in the tree denotes a series of actions taken by a policy. A trajectory tree can be used to evaluate any policy in Π, since every action sequence is part of the tree. However, while for generic POMDPs the size of a trajectory tree is exponential in the horizon, for optimal stopping problems the tree size is linear in the horizon (Figure 1). This allows us to obtain significantly tighter dependence on H than for generic POMDPs. Our analysis closely follows the prior sample complexity results of [Kearns et al., 1999]. Kearns et al. proceeded by first considering a bound on the VC-dimension of Π when viewed as a set of real-valued mappings from histories to returns, as a function of the VC-dimension of Π when viewed as mappings of histories to actions. Then they use this result to bound the sample complexity needed to get near-accurate estimates of the returns of all policies in the policy class. We will follow a similar procedure to bound the sample complexity when Π contains a potentially infinite number of deterministic policies.1 Let d = VC(Π) be the VC-dimension of our policy class. This is well-defined, since each optimalstopping policy maps trajectories to 2 actions (binary labeling). Let VCr (Π) be the VC-dimension of Π when viewed as a set of real-valued mappings from full trajectories to returns 1 Similar to Kearns et al. (1999) our results extend to finite Π and infinite, stochastic Π, as well as the discounted infinite-horizon case (using an -approximation to Vπ with horizon H ). Figure 1: The structure of a full trajectory for horizon H. Each node represents an observation while arrows represent one of the two available actions. and assume Vπ is bounded by Vmax . From [Vapnik and Kotz, 1982], we know that VCr (Π) can be computed as VC(H), where H = {I(π, ∆, ·)|π ∈ Π, ∆ ∈ [−Vmax , Vmax ]} with I(π, ∆, x) = 1 if π(x) ≥ ∆, and 0 otherwise (π(x) is the return for full trajectory x under π). Lemma 1. Let Π be a set of deterministic optimal-stopping policies with VC-dimension d when viewed as a set of maps from trajectories to actions. Then, when viewed as a set of maps from the space of all full trajectories to [−Vmax , Vmax ], Π has dimension bounded by, VCr (Π) = O(d log H) Proof. Our proof proceeds similarly to Lemma A.1 in Kearns et al.. The crucial difference is that our policies operate on a full-trajectory structure that contains H nodes (Figure 1), rather than Kearns et al.’s trajectory trees with 2H+1 nodes. In our setting at each point the agent only gets to consider whether to halt or continue, and if the halt action is chosen, the trajectory terminates. This implies that in contrast to standard expectimax trees where the size of the tree depends on the action space as an exponential of the horizon, |A|H , in our setting the dependence induced by the actions is only linear in H. Thus Π can produce a much smaller set of behaviors, and our dependence on H is logarithmic, rather than polynomial. More formally, by Sauer’s lemma, k trajectories can be lad beled in atmost ( ek d ) ways by Π. First note that n full trajectories contain at most nH distinct trajectories across them (one per node; refer to Figure 1 for the structure of full trajectories). Each action labeling of these k = nH trajectories by Π, corresponds to selecting n paths (1 path per full trajectory), where each path starts at the first observation and ends at a terminal node. The number of possible selections by Π is d thus atmost ( enH d ) . Each path can be viewed as mapping a full trajectory to a return, and a selection therefore maps the n full trajectories to n real-valued returns. There are nH terminal nodes across the n full trajectories. Thus there are at most nH distinct real-valued returns on the n full trajectories under Π. If we set the indicator threshold ∆ to equal each of these nH returns in turn, there would be d atmost ( enH d ) distinct binary labelings of the full trajectories for each such ∆. Thus, the set of indicator functions that d define VCr (Π) can generate atmost nH( enH d ) distinct labelings on n full trajectories. To shatter the n full trajectories, d n we set nH( enH d ) ≥ 2 , and the result follows. We now proceed similarly to Theorem 3.2 in Kearns et al. Theorem 1. Let Π be a potentially infinite set of deterministic optimal stopping policies and let d be the VC-dimension of Π. Let Γ be n full trajectories collected from the environment, and let Vˆπ be the value estimates for π ∈ Π using Γ. Let the return Vπ be bounded by Vmax for any trajectory. If 2  !  1 Vmax d log H + log n=O  δ then with probability at least 1 − δ, |Vπ − V̂π | ≤  holds simultaneously for all π ∈ Π. Proof. Let X be the space of full trajectories. Every policy π ∈ Π is a bounded real-valued map π : X → [−Vmax , Vmax ]. Let x1 , . . . , xn ∼ P be i.i.d. full trajectories generated by the environment dynamics. Using a result of [Vapnik and Kotz, 1982],Pwe have with n − n1 i=1 π(xi ) ≤ probability 1 − δ, supπ∈Π EP [π(x)]   q VCr (Π) log VC n(Π) +log δ1 r O Vmax . Substitute EP [π(x)] = n P n Vπ , n1 i=1 π(xi ) = V̂π , VCr (Π) = O(d log H) in the inequality and upper-bound by  to get the result. In practice it may be impossible for us to evaluate every policy in Π, and then select the one with the best estimated mean. In such cases, we can use a different search method (S in Algorithm 1) to find a local optima in Π, while using our bound to ensure that policy values are estimated accurately. Lastly, we discuss [Tsitsiklis and Van Roy, 1999], who estimate Q values for finite-horizon Markov optimal stopping problems using a linear combination of basis functions, and then use that to find a threshold policy. They outline a procedure to tune the basis function weights that asymptotically guarantees their policy value’s convergence to the best basis-function approximation. Under their assumptions, if we construct a policy class using basis functions, we inherit the useful convergence results relying on their search procedure, along with retaining our finite sample complexity results. Experiments We now demonstrate the setting we consider is sufficiently general to capture several problems of interest and that our approach, GFSE, can improve performance in optimal stopping problems over some state-of-the-art baselines. Ticket Purchase Many purchasing problems can be posed as an optimal stopping process where the return from stopping is simply the advertised cost. We consider deciding when to purchase an airline ticket for a later trip date in order to minimize cost. The opaque way in which prices are set, and competitive pricing makes this domain difficult to model. Prior work [Etzioni et al., 2003; Groves and Gini, 2015] has focused on identifying features to create sophisticated models that make good purchase decisions. Surprisingly, it can be hard to improve on an earliest purchase baseline that buys after the first observation. We use data from Groves and Gini (2015) who collected real pricing data for a fixed set of routes over a period of 2 years, querying travel sites regularly to collect price information. Each route has several departure dates distributed over the 2 year period. For a price observation sequence of length Table 1: Mean expenditure of deploying different policies on the test set for ticket purchase. Earliest purchase buys immediately, latest purchase waits till the departure date. Method NYC-MSP MSP-NYC SEA-IAD Ours (Πsimple ) Ours (Πcomplex ) Earliest purchase Latest purchase $355 $351 $380 $631 $374 $344 $383 $647 $565 $560 $578 $938 Best possible price $307 $306 $513 T , a customer could commence his ticket search at any point in the sequence (e.g. some customer starts 60 days before departure while another only a week before). Thus, we consider all such commencement points separately to get T distinct full trajectories (similar to [Groves and Gini, 2015]). We construct a parameterized policy class (Πsimple ) based on Ripper’s decision rules in [Etzioni et al., 2003]: WAIT if (curr price > θ0 AND days to depart > θ1 ) else BUY, where BUY corresponds to halting. We also constructed a more complex class (Πcomplex ) with 6 parameters, that learns different price thresholds depending on how far the departure date is. We consider nonstop flights on 3 routes, NYC-MSP, MSP-NYC and SEA-IAD, training/testing each separately. Our method, GFSE collects full length trajectories during the first 200 days (∼1000 trajectories) and uses them to construct a single stopping policy. It performs a simple policy search by sampling and evaluating 500 policies randomly from the policy space. It then uses the best identified policy to simulate ticket purchasing decisions for departure dates occurring during the remaining part of the 2 years (∼2000 trajectories). We restrict the data to departure dates that contain at-least 30 price observations.2 Results on the test sets are shown in Table 1. Our policy search method succeeds in finding a policy that leads to non-trivial improvement over the difficult earliest purchase baseline. Our improvements are in line with prior approaches specifically designed for this particular domain.3 These results highlight how our setting can capture important purchasing tasks and how our approach, even with a simple policy search, can find policies with significantly better performance than competitive domain-specific baselines. Tutoring and Asset Replacement We now consider 2 simulated domains and compare GFSE to several approaches for learning to act quickly in these domains. Unless specified, all results are averaged over 20 rounds and error bars indicate 95% confidence intervals. Baselines. One natural idea is to proceed as GFSE, but use the gathered data to build parametric domain models that can be used to estimate the performance of potential policies. We 2 We found that shorter trajectories were collected close to the departure date, where prices fluctuate more and for which our illustrative policy classes are inadequate. In such cases, our method adopted a risk-averse earliest purchase policy. 3 Unfortunately, the authors were unable to provide us with the train/test split used in [Groves and Gini, 2015]. call these ”model-based” approaches. A second idea is to consider the initial set of collected data as a budget of free exploration, and instead use this budget to do Monte Carlo onpolicy evaluation of a set of policies. Of course, doing all exploration, as we do in GFSE, is not always optimal. We also consider a state-of-the-art approach for quickly identifying the global optima of a function where the function is initially unknown and each function evaluation is expensive, Bayesian Optimization (BO). Multiple papers have shown BO can be used to speed online policy search for reinforcement learning tasks [Wilson et al., 2014; Deisenroth and Rasmussen, 2011]. Given the policy class, BO selects a policy to evaluate at each step, and maintains estimates over the expected value of every policy. We use Yelp’s MOE for BO [Yelp, 2016] with a Gaussian kernel and the popular expected improvement heuristic for picking policies from Π. The hyper-parameters for BO are picked by a separate optimization to find maximum-likelihood estimates. Simulated Student Learning. We first consider a simulated student tutor domain. A number of tutoring systems use mastery teaching, in which a student is provided with practice examples until they are estimated to have mastered the material. This is an optimal stopping problem because at each time step, after observing whether a student got the activity correct or not, the tutor can decide whether to halt or continue providing the student with additional practice. On halting, the student is given the next problem in the sequence; the objective is to maximize the score on this ‘posttest’, while giving as few problems as possible overall. As is popular in the literature, we model student learning using the Bayesian Knowledge Tracing (BKT) model [Corbett and Anderson, 1995]. BKT is a 2-state Hidden Markov Model (HMM) with the state capturing whether the student has mastered the skill or not. Within the HMM, 4 probabilities – pi (prior mastery), pt (transition to mastery), pg (guess) and ps (slip) describe the model. To simulate student data, we fix BKT parameters4 pi = 0.18, pt = 0.2, pg = 0.2, ps = 0.1 and generate student trajectories using this BKT model for H = 20 problems. For GFSE, we consider two policy classes, both of which halt when the probability of the student’s next response (according to the model in use) being correct crosses a threshold. Thus, we halt if Pr(ot = correct|o1 , . . . , ot−1 ) > θ0 where θ0 is some threshold. In fact, policies of this kind are widely used in commercial tutoring systems [Koedinger et al., 2013]. If we use the BKT model to implement this policy class, it is parameterized by (pi , pt , pg , ps , θ0 ). Π then contains all possible instantiations of these parameters for our model-free approach to search over. We also consider a policy class based on another popular educational data mining model of student learning: Additive Factors Model (AFM) [Draney et al., 1995]. AFM is a logistic regression model used to predict the probability that a student will get the next problem correct given their past responses. Thus, Pr(ot = correct|o1 , . . . , ot−1 ) = 1+e−(β11 +β2 nc ) where nc is the number of correct past attempts. We first note that GFSE is significantly more effective than 4 Our results hold for other instantiations of these parameters as well. See [Ritter et al., 2009] for other reasonable parameter settings. Figure 2: Comparison of best policy found on varying budget under (a) matched model setting; (b) model mismatch setting. taking the same budget of exploration, and using it to evaluate each policy in an on-policy manner using Monte Carlo (MC) estimation. More precisely, we sample k = 100 policies from the BKT policy class, and fix a budget of B ∈ {100, 1000} trajectories. GFSE uses B trajectories to evaluates all k policies while MC runs every policy on B k trajectories (e.g. 1 trajectory/policy for B = 100) and selects the one with the highest mean performance. Averaging results across 20 separate runs, we found that GFSE identifies a much better policy; MC chose poor policies because it is mislead by the potential performance of a policy due to the limited data. We also explored the performance of building a model of the domain, both in the setting when the model matches the true domain (here, a BKT model), and a model-mismatch case, where the policy class is based on a student AFM model (which does not match the BKT process dynamics). We use maximum likelihood estimation to fit the assumed model’s parameters given the collected data and then separately optimize over the threshold parameters θ0 . We compare, on varying the budget B: (a) GFSE; (b) model-based; (c) BO. All results are averaged over 50 trials. The results of this experiment are shown in Figure 2. Our approach does well in both settings, quickly finding a near optimal policy. As one would expect, the model-based approach does well under the matched model setting, making full use of the knowledge of the underlying process dynamics. However, on fitting the mismatched AFM model, the model-based approach suffers. As has been noted by prior work [Mandel et al., 2014] model-fitting procedures focus on maximizing the likelihood of the observed data rather than trying to directly identify a policy that is expected to perform well. BO can find a good policy, but takes more samples to do so. Since BO is an online approach whereas GFSE uses a fixed budget of exploration, we also compare the averaged cumulative performance of BO to variants of GFSE in Figure 3. This mimics a scenario where we care about online performance on every individual trajectory, rather than having access to a fixed budget before deploying a policy. For our method, we can choose to collect more or less full trajectories before finding the best policy. Interestingly, if we use 5 trajectories as the initial budget to collect full length trajectories, GFSE meets or exceeds BO performance in this setting in both the matched and mismatched model cases, within 10 trajectories. BO suffers from the highly stochastic returns of policies in this setting. For more efficient data reuse, we also consider a variant of BO (BO-REuse) where we evaluate each proposed Figure 3: Average cumulative performance on the simulated student domain. (a) matched model; (b) model-mismatch. GFSE-k collects k initial full-length trajectories before identifying and then executing the best policy. Figure 4: Cumulative performance of augmented methods on (a) matched model; (b) model-mismatch. policy online and also using previously collected trajectories, yielding a more robust estimate of the policy’s performance. Similarly, for GFSE we deploy a policy using an initial budget of trajectories, and then use its on-policy trajectory (in addition to earlier trajectories) to rerun policy search and identify another policy for the next time step (GFSE-RE). Figure 4 shows this improved both methods (especially in the mismatch case), with our approaches still performing best. Asset Replacement. Another natural problem that falls into our optimal stopping problem is when to replace a depreciating asset (such as a car, machine, etc). For simulation, we use a model described in [Jiang and Powell, 2015]. Variants of this model are widely used in that field [Feldstein and Rothschild, 1974; Rust, 1987]. In the model, observations are d dimensional vectors of the form (X, Y1 , . . . , Yd−1 ). Each asset starts at a fixed valuation X = Xmax which depreciates stochastically5 while emitting observations Y1 , . . . , Yd−1 at every time step. The reward function used incorporates the cost of replacement (which increases over time), the utility derived from the asset and a penalty if the asset becomes worthless before replacement. We use d = 3 for experiments. We construct a logistic threshold policy class; replacing the asset if 1+e−(β11+β2 ·depr) > β3 where depr is the total depreciation from Xmax seen so far (normalized to lie in [0, 1]). In addition to the approaches seen before, we also include baseline policies that choose to (i) replace the asset immediately; (ii) never replace. Lastly, we include the optimal value (known only in hindsight) for reference. The results are shown in Fig 5. Surprisingly, our method 5 Details of the model can be found in [Jiang and Powell, 2015]. Figure 5: Results from asset replacement. outperforms competing methods by a considerable margin. It appears that our chosen policy class is tricky to optimize over: most policies in the space perform poorly. For 500 random policies chosen from this space, the mean cost is around 240 with a 95% confidence interval of only 16. However, the domain itself is not very noisy, with robust value estimation requiring less than 5 trajectories (see Figure 5). This enables our method to consistently find a good policy even with a low budget: one that corresponds to replacing the asset when depreciation is around 50%. BO improves slowly; either sampling bad policies due to the sparse nature of the space, or disbelieving the estimate of a good policy due to the bad policies surrounding it. Manually adjusting the BO hyperparameters to account for this did not improve performance significantly. Discussion and Conclusion GFSE performed well, outperforming state-of-the-art algorithms and common baselines, in a variety of simulations of important domains. While we randomly searched over policies in relatively simple policy classes for illustration, more sophisticated search methods and policy classes could be employed, without effecting the theoretical guarantees we derived. Another extension is in using shorter trajectories that terminate before the horizon for policy evaluation (similar to how full trajectories are used). This is useful in a scenario where we get trajectories on-policy using the best policy found by GFSE. We can then rerun policy search with all trajectories (full length or short) collected so far. Our policy value estimates will be biased in this case, since only a policy that halts earlier than a shorter trajectory can use it for evaluation. Values for policies that halt later may be overestimated (higher variance of estimation due to fewer trajectories), biasing us to pick them. If the number of evaluations per policy exceeds the number in Theorem 1, our estimates would remain within  of the true values (with high probability), which would minimize the effect of this bias. As we saw from Figure 4, this (GFSE-RE) works well empirically. To summarize, we introduced a method for learning to act in optimal stopping problems, which reuses full length trajectories to perform policy search. Our theoretical analysis and empirical simulations demonstrate that this simple observation can lead to benefits in sample complexity and practice. Acknowledgments We appreciate the financial support of a NSF BigData award #1546510, a Google research award and a Yahoo gift. References [Best et al., 2015] Graeme Best, Wolfram Martens, and Robert Fitch. A spatiotemporal optimal stopping problem for mission monitoring with stationary viewpoints. In Robotics: Science and Systems, 2015. [Corbett and Anderson, 1995] Albert T. Corbett and John R. Anderson. Knowledge tracing: Modelling the acquisition of procedural knowledge. User Model. User-Adapt. Interact., 4(4):253–278, 1995. [Deisenroth and Rasmussen, 2011] Marc Deisenroth and Carl E Rasmussen. Pilco: A model-based and dataefficient approach to policy search. In ICML, pages 465–472, 2011. [Draney et al., 1995] Karen L Draney, Peter Pirolli, and Mark Wilson. A measurement model for a complex cognitive skill. Cognitively diagnostic assessment, pages 103– 125, 1995. [Etzioni et al., 2003] Oren Etzioni, Rattapoom Tuchinda, Craig A. Knoblock, and Alexander Yates. To buy or not to buy: mining airfare data to minimize ticket purchase price. In KDD, pages 119–128, 2003. [Feldstein and Rothschild, 1974] Martin S Feldstein and Michael Rothschild. Towards an economic theory of replacement investment. Econometrica: Journal of the Econometric Society, pages 393–423, 1974. [Feng and Gallego, 1995] Youyi Feng and Guillermo Gallego. Optimal starting times for end-of-season sales and optimal stopping times for promotional fares. Management Science, 41(8):1371–1391, 1995. [Ferguson, 1989] Thomas S Ferguson. Who solved the secretary problem? Statistical science, pages 282–289, 1989. [Glower et al., 1998] Michel Glower, Donald R Haurin, and Patric H Hendershott. Selling time and selling price: The influence of seller motivation. Real estate economics, 26(4):719–740, 1998. [Groves and Gini, 2015] William Groves and Maria L. Gini. On optimizing airline ticket purchase timing. ACM TIST, 7(1):3:1–3:28, 2015. [Jacka, 1991] SD 1 Jacka. Optimal stopping and the american put. Mathematical Finance, 1(2):1–14, 1991. [Jiang and Powell, 2015] Daniel R. Jiang and Warren B. Powell. An approximate dynamic programming algorithm for monotone value functions. Operations Research, 63(6):1489–1511, 2015. [Kearns et al., 1999] Michael J. Kearns, Yishay Mansour, and Andrew Y. Ng. Approximate planning in large pomdps via reusable trajectories. In NIPS, pages 1001–1007, 1999. [Koedinger et al., 2013] Kenneth R Koedinger, Emma Brunskill, Ryan SJd Baker, Elizabeth A McLaughlin, and John Stamper. New potentials for data-driven intelligent tutoring system development and optimization. AI Magazine, 34(3):27–41, 2013. [Levine and Abbeel, 2014] Sergey Levine and Pieter Abbeel. Learning neural network policies with guided policy search under unknown dynamics. In NIPS, pages 1071–1079, 2014. [Lippman and McCall, 1976] Steven A Lippman and John McCall. The economics of job search: A survey. Economic inquiry, 14(2):155–189, 1976. [Mandel et al., 2014] Travis Mandel, Yun-En Liu, Sergey Levine, Emma Brunskill, and Zoran Popovic. Offline policy evaluation across representations with applications to educational games. In AAMAS, pages 1077–1084. International Foundation for Autonomous Agents and Multiagent Systems, 2014. [Mordecki, 2002] Ernesto Mordecki. Optimal stopping and perpetual options for lévy processes. Finance and Stochastics, 6(4):473–493, 2002. [Ng and Jordan, 2000] Andrew Y. Ng and Michael I. Jordan. PEGASUS: A policy search method for large mdps and pomdps. In UAI, 2000. [Peskir and Shiryaev, 2006] Goran Peskir and Albert Shiryaev. Optimal stopping and free-boundary problems. Springer, 2006. [Precup, 2000] Doina Precup. Eligibility traces for offpolicy policy evaluation. Computer Science Department Faculty Publication Series, page 80, 2000. [Ritter et al., 2009] Steven Ritter, Thomas K. Harris, Tristan Nixon, Daniel Dickison, R. Charles Murray, and Brendon Towle. Reducing the knowledge tracing space. In Educational Data Mining, pages 151–160, 2009. [Rust, 1987] John Rust. Optimal replacement of gmc bus engines: An empirical model of harold zurcher. Econometrica: Journal of the Econometric Society, pages 999–1033, 1987. [Sutton et al., 1999] Richard S. Sutton, David A. McAllester, Satinder P. Singh, and Yishay Mansour. Policy gradient methods for reinforcement learning with function approximation. In NIPS, pages 1057–1063, 1999. [Tsitsiklis and Van Roy, 1999] John N Tsitsiklis and Benjamin Van Roy. Optimal stopping of markov processes: Hilbert space theory, approximation algorithms, and an application to pricing high-dimensional financial derivatives. IEEE Transactions on Automatic Control, 44(10):1840– 1851, 1999. [Vapnik and Kotz, 1982] Vladimir Naumovich Vapnik and Samuel Kotz. Estimation of dependences based on empirical data, volume 40. Springer-Verlag New York, 1982. [Wilson et al., 2014] Aaron Wilson, Alan Fern, and Prasad Tadepalli. Using trajectory data to improve bayesian optimization for reinforcement learning. Journal of Machine Learning Research, 15(1):253–282, 2014. [Yelp, 2016] Yelp. Metric optimization engine. https:// github.com/Yelp/MOE, 2016. [Zilberstein, 1995] Shlomo Zilberstein. Operational rationality through compilation of anytime algorithms. AI Magazine, 16(2):79, 1995.
2cs.AI
Exact Learning of Lightweight Description Logic Ontologies Exact Learning of Lightweight Description Logic Ontologies Boris Konev [email protected] Department of Computer Science University of Liverpool, United Kingdom arXiv:1709.07314v1 [cs.LG] 20 Sep 2017 Carsten Lutz [email protected] Department of Computer Science University of Bremen, Germany Ana Ozaki [email protected] Department of Computer Science University of Liverpool, United Kingdom Frank Wolter [email protected] Department of Computer Science University of Liverpool, United Kingdom Editor: Abstract We study the problem of learning description logic (DL) ontologies in Angluin et al.’s framework of exact learning via queries. We admit membership queries (“is a given subsumption entailed by the target ontology?”) and equivalence queries (“is a given ontology equivalent to the target ontology?”). We present three main results: (1) ontologies formulated in (two relevant versions of) the description logic DL-Lite can be learned with polynomially many queries of polynomial size; (2) this is not the case for ontologies formulated in the description logic EL, even when only acyclic ontologies are admitted; and (3) ontologies formulated in a fragment of EL related to the web ontology language OWL 2 RL can be learned in polynomial time. We also show that neither membership nor equivalence queries alone are sufficient in cases (1) and (3). Keywords: Exact Learning, Description Logic, Complexity 1. Introduction In many subfields of artificial intelligence, ontologies are used to provide a common vocabulary for the application domain of interest and to give a meaning to the terms in the vocabulary, and to describe the relations between them. Description logics (DLs) are a prominent family of ontology languages with a long history that goes back to Brachman’s famous knowledge representation system KL-ONE in the early 1980s (Brachman and Schmolze, 1985). Today, there are several widely used families of DLs that differ in expressive power, computational complexity, and intended application. The most important ones are the ALC family which aims at high expressive power, the EL family (Baader et al., 2005) which aims to provide scalable reasoning, and the DL-Lite family (Calvanese et al., 2007; Artale et al., 2009) which is tailored specifically towards applications in data access. In 2004, the World Wide Web Committee (W3C) has standardised a DL of the ALC family as an ontology 1 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter language for the web, called OWL. The standard was updated to OWL 2 in 2009, and since then comprises a family of five languages including the OWL 2 profiles OWL 2 EL, OWL 2 QL, and OWL 2 RL. While OWL 2 EL is based on EL and OWL 2 QL on DL-Lite, OWL 2 RL is closely related to the fragment of EL that is obtained by allowing only concept names on the right-hand side of concept inclusions. In this paper we study DLs from the EL and DL-Lite families. Designing an ontology for an application domain is a subtle, error-prone, and time consuming task. From its beginnings, DL research was driven by the aim to provide various forms of support for ontology engineers, assisting them in the design of high-quality ontologies; examples include the ubiquitous task of ontology classification (Baader et al., 2017), reasoning support for debugging ontologies (Wang et al., 2005; Schlobach et al., 2007), support for modular ontology design (Stuckenschmidt et al., 2009), and checking the completeness of the modelling in a systematic way (Baader et al., 2007). The same aim is pursued by the field of ontology learning, where the goal is to use machine learning techniques for various ontology engineering tasks such as to identify the relevant vocabulary of the application domain (Cimiano et al., 2010; Wong et al., 2012), to learn an initial version of the ontology that is then refined manually (Borchmann and Distel, 2011; Ma and Distel, 2013; Jiménez-Ruiz et al., 2015), and to learn concept expressions as building blocks of an ontology (Lehmann and Hitzler, 2010); see the recent collection (Lehmann and Völker, 2014) and the related work section at the end of the paper for details. In this paper we concentrate on learning the full logical structure of a description logic ontology. Our starting point is the observation that building a high-quality ontology relies on the successful communication between an ontology engineer and a domain expert because the former is typically not sufficiently familiar with the domain and the latter is rarely an expert in ontology engineering. We study the foundations of this communication process in terms of a simple communication model and analyse, within this model, the complexity of constructing a correct and complete domain ontology. Our model rests on the following assumptions: 1. The domain expert has perfect knowledge of the domain, but is not able to formalise or communicate the target ontology O to be constructed. 2. The domain expert is able to communicate the vocabulary (predicate symbols, which in the case of DLs take the form of concept and role names) of O and shares it with the ontology engineer. The ontology engineer knows nothing else about the domain. 3. The ontology engineer can pose queries to the domain expert which the domain expert answers truthfully. The main queries posed by the ontology engineer are of the form “Is the concept inclusion C ⊑ D entailed by O?” 4. In addition, the ontology engineer needs a way to find out whether the ontology H that has been constructed so far, called the hypothesis ontology, is complete. If not, he requests an example illustrating the incompleteness. The engineer can thus ask: “Is the ontology H complete? If not, then return a concept inclusion C ⊑ D entailed by O but not by H.” 2 Exact Learning of Lightweight Description Logic Ontologies We are then interested in whether the target ontology O can be constructed with only polynomially many queries of polynomial size (polynomial query learnability) or, even better, with overall polynomial time (polynomial time learnability). In both cases, the polynomial is in the size of the ontology to be constructed plus the size of the counterexamples returned by the domain expert. Without taking into account the latter, one can never expect to achieve polynomial time learnability because the domain expert could provide unnecessarily large counterexamples. Note that polynomial time learnability implies polynomial query learnability, but that the converse is false because polynomial query learnability allows the ontology engineer to run computationally costly procedures between posing queries. The above model is an instance of Angluin et al.’s framework of exact learning via queries (Angluin, 1987b). In this context, the queries mentioned in Point 3 above are called membership queries. The queries in Point 4 are a form of equivalence queries. In Angluin’s framework, however, such queries are slightly more general: “Is the hypothesis ontology H equivalent to the target ontology O? If not, then return a concept inclusion C ⊑ D entailed by O but not by H (a positive counterexample) or vice versa (a negative counterexample).” In our upper bounds (that is, polynomial learnability results), we admit only queries of the more restricted form in Point 4 above: the learning algorithm is designed in a way so that the hypothesis ontology H is a consequence of the target ontology O at all times, and thus the only meaningful equivalence query is a query of the form “Is H already complete?”. Our lower bounds (results saying that polynomial learnability is impossible), in contrast, apply to unrestricted equivalence queries, that is, they do not assume that the hypothesis is implied by the target. In this way, we achieve maximum generality. Within the setup outlined above, we study the following description logics: (a) DL-Lite∃R , which is a member of the DL-Lite family that admits role inclusions and allows nested existential quantification on the right-hand side of concept inclusions; (b) the extension DL-Lite∃R,horn of DL-Lite∃R with conjunction on the left-hand side of concept inclusions; (c) the basic member EL of the EL family; (d) the fragment ELlhs of EL where only concept names (but no compound concept expressions) are admitted on the right-hand side of concept inclusions. We remark that DL-Lite∃R is closely related to OWL 2 QL, which is based on the fragment of DL-Lite∃R that does not allow nested existential quantification on the right-hand side of concept inclusions. In this more restricted case, though, polynomial learnability is uninteresting. In fact, the number of concept inclusions formulated in a fixed finite vocabulary Σ is bounded polynomially in the size of Σ instead of being infinite as in the description logics studied in this paper; consequently, TBoxes are trivially learnable in polynomial time, even when only membership queries (but no equivalence queries) are available or vice versa. The extension DL-Lite∃R,horn of DL-Lite∃R is not part of the OWL 2 QL standard, but admitting conjunctions on the left-hand side of concept inclusions is a useful and widely considered 3 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Not polynomial query learnable EL DL-Lite∃R DL-Lite∃R,horn Polynomial query learnable ELrhs Polynomial time learnable ELlhs Figure 1: Summary of main results extension of basic DL-Lite dialects, see for example (Artale et al., 2009). ELlhs is a significant part of the OWL 2 RL language and can be viewed as a natural fragment of Datalog. An even better approximation of OWL 2 RL would be the extension of ELlhs with inverse roles, but polynomial learnability in that language remains an open problem. And finally, unrestricted EL can be viewed as a logical core of the OWL 2 EL language. After introducing preliminaries in Section 2, we study exact learning of DL-Lite∃R ontologies in Section 3, establishing polynomial query learnability. We strengthen this result to DL-Lite∃R,horn in Section 4, using a significantly more subtle algorithm. It remains open whether DL-Lite∃R and DL-Lite∃R,horn admit polynomial time learnability. Our algorithms do not yield such a stronger result since they use subsumption checks to analyse counterexamples provided by the oracle and to integrate them into the current hypothesis ontology, and subsumption is NP-complete in these DLs (Kikot et al., 2011). In Section 5, we show that ELlhs ontologies are learnable in polynomial time, a result that extends the known polynomial time learnability of propositional Horn formulas (Angluin et al., 1992), which correspond to EL ontologies without existential restrictions. In fact, our algorithms take inspiration from learning algorithms for propositional Horn formulas and combine the underlying ideas with modern concepts from DL such as canonical models, simulations, and products. The algorithm for ELlhs also uses subsumption checks, which in this case does not get in the way of polynomial time learnability since subsumption in ELlhs can be decided in polynomial time. In Section 6, we then establish that EL ontologies are not polynomial query learnable. Note that the fragment ELrhs of EL, which is symmetric to ELlhs and only admits concept names on the left-hand side of concept inclusions is a fragment of DL-Lite∃R . Together, our upper bounds for DL-Lite∃R and ELlhs thus establish that failure of polynomial query learnability of EL ontologies is caused by the interaction between existential restrictions on the left- and right-hand sides of concept inclusions. Interestingly, our result already applies to acyclic EL TBoxes, which disallow recursive definitions of concepts and are of a rather restricted syntactic form. However, the result does rely on concept inclusions as counterexamples that are of a form not allowed in acyclic TBoxes. We also show that ontologies formulated in DL-Lite∃R,horn and in ELlhs are neither polynomial query learnable with membership queries alone nor with equivalence queries alone; corresponding results for propositional Horn formulas can be found in (Frazier and Pitt, 1993; Angluin et al., 1992; Angluin, 1987a), see also (Arias and Balcázar, 2011). Figure 1 summarises the main results obtained in this paper. In Section 7 we provide an extensive discussion of related work on the exact learning of logical formulas and theories, and we close the paper with a discussion of open problems. A small number of proofs are deferred to an appendix. 4 Exact Learning of Lightweight Description Logic Ontologies 2. Preliminaries We introduce the description logics studied in this paper, then consider a representation of concept expressions in terms of labelled trees and show how important semantic notions such as subsumption between concept expressions can be characterised by homomorphisms between the corresponding trees. This also involves introducing canonical models, which are an important tool throughout the paper. Finally, we formally introduce the framework of exact learning. 2.1 Description Logics Let NC be a countably infinite set of concept names (denoted by upper case letters A, B, etc) and let NR be a countably infinite set of role names disjoint from NC (denoted by lower case letters r, s, etc). Concept and role names can be regarded as unary and binary predicates, respectively. In description logic, constructors are used to define compound concept and role expressions from concept and role names. In this paper, the only role constructor is the inverse role constructor: for r ∈ NR , the expression r − is the inverse role of r. Semantically, r − represents the converse of the binary relation r. A role expression is a role name or an inverse role. We set r − := s if r = s− for a role name s. For brevity, we will typically speak of roles rather than of role expressions. The concept constructors used in this paper are ⊤ (everything), ⊓ (conjunction), and ∃r.C (qualified existential restriction). Formally, concept expressions C are defined according to the following syntactic rule: C, D := ⊤ | A | C ⊓D | ∃r.C where A is a concept name and r is a role. For example, ∃hasChild.⊤ ⊓ ∃gender.Male denotes the class of individuals who have a child and whose gender is male. Terminological knowledge is captured by finite sets of inclusions between concept expressions or roles. Specifically, • a concept inclusion (CI) takes the form C ⊑ D, where C and D are concept expressions, and • a role inclusion (RI) takes the form r ⊑ s, where r and s are roles. An ontology or TBox is a finite set of CIs and RIs.1 We use C ≡ D as an abbreviations for the two CIs C ⊑ D and D ⊑ C and likewise for r ≡ s; we speak of concept equivalences (CEs) and role equivalences (REs), respectively. 1. In the description logic literature, CIs of the form introduced here are often called E LI CIs to distinguish them from CIs that use concept expressions formulated in other description logics. The TBoxes are called E LIH TBoxes (TBoxes that consist of E LI CIs and RIs). 5 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Example 1 Consider the following TBox: Prof ⊑ ∃supervisor of.Student ⊓ ∃conduct research.⊤ Graduate ≡ ∃has degree.⊤ GraduateStudent ≡ Student ⊓ Graduate − GraduateStudent ⊑ ∃supervisor of .Prof (1) (2) (3) (4) supervisor of ⊑ advisor of (5) CS Graduate ≡ ∃has degree.CS Degree (6) The CI in Line 1 states that every professor supervises students and conducts research. Notice that we do not specify the specific area of research, hence we use an unqualified existential restriction of the form ∃r.⊤. The CE in Line 2 defines a graduate as anyone who has a degree. The CE in Line 3 defines a graduate student as a student who is a graduate. The CI in Line 4 states that graduate students are supervised by professors. Notice that we use the inverse role of supervisor of here. Line 5 shows an RI which states that every supervisor is an advisor. The CE in the last line defines a computer science graduate as someone with a degree in computer science. A signature is a set of concept and role names and we use ΣT to denote the signature of the TBox T , that is, the set of concept and role names that occur in it. The size |C| of a concept expression C is the length of the string that represents C, where concept names and P role names are considered to be of length one. The size |T | of a TBox T is defined as C⊑D∈T |C| + |D|. The semantics of concept expressions and TBoxes is defined as follows (Baader et al., 2017). An interpretation I = (∆I , ·I ) is given by a non-empty set ∆I (the domain of I) and a mapping ·I that maps every concept name A to a subset AI of ∆I and every role name r to a subset r I of ∆I × ∆I . The interpretation r I of an inverse role r = s− is given by r I = {(d, d′ ) | (d′ , d) ∈ sI } and the interpretation C I of a concept expression C is defined inductively by ⊤I (C1 ⊓ C2 )I (∃r.C)I = ∆I = C1I ∩ C2I = {d ∈ ∆I | there exists d′ ∈ C I with (d, d′ ) ∈ r I }. An interpretation I satisfies a concept expression C if C I is not empty. It satisfies the CI C ⊑ D if C I ⊆ D I , written as I |= C ⊑ D. Similarly, I satisfies RI r ⊑ s if r I ⊆ sI , written as I |= r ⊑ s. I is a model of a TBox T if it satisfies all CIs and RIs in T . A TBox T entails a CI or RI α, in symbols T |= α, if α is satisfied in every model of T . Concept expressions C and D are equivalent w.r.t. T , written T |= C ≡ D, if T |= C ⊑ D and T |= D ⊑ C; equivalence of roles r and s is defined accordingly, written T |= s ≡ r. TBoxes T and T ′ are logically equivalent, in symbols T ≡ T ′ , if T |= α for all α ∈ T ′ and vice versa. 6 Exact Learning of Lightweight Description Logic Ontologies CS Deg d1 d5 has deg Stud Grad d4 Grad Stud d3 con res d0 CS Grad Grad d2 Prof has deg sup of adv of Figure 2: Illustration to Example 2. Example 2 Consider the TBox T from Example 1 and the interpretation I that is illustrated in Figure 2 and defined by setting ∆I = {d0 , . . . , d5 } and Prof I StudentI Graduate StudentI GraduateI CS GraduateI = = = = = {d2 }, {d4 }, {d4 }, {d4 , d0 }, {d0 }, conduct researchI supervisor of I advisor of I has degreeI CS DegreeI = = = = = {(d2 , d3 )} {(d2 , d4 )}, {(d2 , d4 )}, {(d4 , d5 ), (d0 , d1 )}, {d1 }. It is easy to see that I is a model of T . Moreover, I 6|= Graduate ⊑ CS Graduate as GraduateI = {d4 , d0 } but CS GraduateI = {d0 }, thus T 6|= Graduate ⊑ CS Graduate. It can be shown that T |= CS Graduate ⊑ Graduate. It is ExpTime-complete to decide, given a TBox T and a concept inclusion C ⊑ D, whether T |= C ⊑ D (Baader et al., 2008); this reasoning problem is known as subsumption. Because of this high complexity, the profiles of OWL 2 are based on syntactically more restricted description logics in which subsumption is less complex. We next introduce a few relevant such logics. A basic concept is a concept name or a concept expression of the form ∃r.⊤, where r is a role. For example, ∃hasChild− .⊤ is a basic concept, but ∃hasChild− .Graduate is not. DL-Lite∃R . A DL-Lite∃R CI takes the form B⊑C where B is a basic concept and C is a concept expression. A DL-Lite∃R inclusion is a DL-Lite∃R CI or an RI. A DL-Lite∃R TBox is a finite set of DL-Lite∃R inclusions. Example 3 Lines (1), (4), and (5) of Example 1 are DL-Lite∃R inclusions and Line (2) abbreviates the two DL-Lite∃R CIs Graduate ⊑ has degree.⊤ and has degree.⊤ ⊑ Graduate. Lines (3) and (6) do not fall within DL-Lite∃R . DL-Lite∃R,horn . In the extension DL-Lite∃R,horn of DL-Lite∃R , CIs take the form B1 ⊓ · · · ⊓ Bn ⊑ C where B1 , . . . , Bn are basic concepts and C is a concept expression. A DL-Lite∃R,horn TBox T is a finite set of DL-Lite∃R,horn CIs and RIs. Both DL-Lite∃R and DL-Lite∃R,horn have been investigated in detail in (Artale et al., 2009). 7 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Example 4 As Lines (1), (2), (4) and (5) from Example 1 fall within DL-Lite∃R , they also fall within DL-Lite∃R,horn . Line (3) falls within DL-Lite∃R,horn . Line (6) is not in DL-Lite∃R,horn . EL. An EL concept expression is a concept expression that does not use inverse roles. An EL concept inclusion is a CI of the form C⊑D where C and D are EL concept expressions. An EL TBox is a finite set of EL CIs. Thus, EL does neither admit role inclusions nor inverse roles. In contrast to DL-Lite∃R,horn , however, it allows existential restrictions ∃r.C with C 6= ⊤ on the left-hand side of CIs. Example 5 Inclusions (1), (2), (3) and (6) from Example 1 are EL inclusions. Inclusion (5) is not an EL inclusion. Subsumption is NP-complete in DL-Lite∃R and in DL-Lite∃R,horn , see (Kikot et al., 2011) for the lower bound and (Calvanese et al., 2007; Artale et al., 2009) for the upper bound. Subsumption in EL is in PTime (Baader et al., 2005) and this is still true if RIs that do not use inverse roles are admitted in the TBox. Given a TBox T and an RI r ⊑ s, deciding whether T |= r ⊑ s is possible in PTime in all description logics considered in this paper. In fact, T |= r ⊑ s if, and only if, there exists a sequence r0 , . . . , rn of roles such that r = r0 , − s = rn , and for every i < n either ri ⊑ ri+1 ∈ T or ri− ⊑ ri+1 ∈ T . Our learning algorithms will carry out various subsumption checks as a subprocedure, as detailed later on. 2.2 Tree representation of concept expressions To achieve an elegant and succinct exposition of our learning algorithms, it will be convenient to represent concept expressions C as a finite directed tree TC whose nodes are labelled with sets of concept names and whose edges are labelled with roles, and to describe manipulations of concept expressions in terms of manipulations of the corresponding tree such as merging nodes, replacing subgraphs, modifying node and edge labels, etc. We generally use ρC to denote the root node of the tree TC . In detail, TC is defined as follows. For C = ⊤, the tree TC has a single node d with label l(d) = ∅; if C = A, where A is a concept name, then TC has a single node d with l(d) = {A}; if C = ∃r.D, then TC is obtained from TD by adding a new root d0 and an edge from d0 to the root d of TD with label l(d0 , d) = r (we then call d an r-successor of d0 ); if C = D1 ⊓ D2 , then TC is obtained by identifying the roots of TD1 and TD2 . Example 6 For C = Student ⊓ ∃has degree.∃has degree− .Graduate Student, TC has three nodes, e0 , e1 , e2 , where e0 is the root ρC of TC , e1 is a successor of e0 and e2 is a successor of e1 , the labelling of the nodes is given by l(e0 ) = {Student}, l(e1 ) = ∅, and l(e2 ) = {Graduate Student}, and the labelling of the edges is given by l(e0 , e1 ) = has degree and l(e1 , e2 ) = has degree− , see Figure 3 (left). 8 Exact Learning of Lightweight Description Logic Ontologies Grad Stud e2 has deg− Grad e5 e4 e1 con res has deg e0 Stud e3 Prof sup of Figure 3: Illustration to Examples 6 (left) and 7 (right). Conversely, every labelled finite directed tree T of the described form gives rise to a concept expression CT in the following way: if T has a single node d labelled by {A1 , . . . , An }, then CT = A1 ⊓ · · · ⊓ An (we treat ⊤ as the empty conjunction here, so if l(d) = ∅ then CT = ⊤). Inductively, let d be the root of T labelled with l(d) = {A1 , . . . , An }, let d1 , . . . , dm be the successors of d, and let l(d, d1 ) = r1 , . . . , l(d, dm ) = rm . Assume Cd1 , . . . , Cdm are the concept expressions corresponding to the subtrees of T with roots d1 , . . . , dm , respectively. Then CT = A1 ⊓ · · · ⊓ An ⊓ ∃r1 .Cd1 ⊓ · · · ⊓ ∃rm .Cdm . Example 7 Let T be the tree with root e3 labelled by {Prof} and successors e4 , e5 labelled by ∅ and {Graduate}, respectively, and with edge labelling given by l(e3 , e4 ) = conduct research and l(e3 , e5 ) = supervisor of. Then CT = Prof⊓∃conduct research.⊤⊓∃supervisor of.Graduate; see Figure 3 (right). In what follows, we will not always distinguish explicitly between C and its tree representation TC which allows us to speak, for example, about the nodes and subtrees of a concept expression. One important use of the tree representation of concept expressions is that both the truth relation ‘d ∈ C I ’ and the entailment ‘T |= C ⊑ D’ can be characterised in terms of homomorphisms between labelled trees and interpretations. A mapping h from a tree TC corresponding to a concept expression C to an interpretation I is a homomorphism if A ∈ l(d) implies h(d) ∈ AI for every concept name A and r = l(d, d′ ) implies (h(d), h(d′ )) ∈ r I for all role names r. The following characterisation of the truth relation d ∈ C I by means of homomorphisms is well-known. Lemma 8 Let I be an interpretation, d ∈ ∆I , and C a concept expression. Then d ∈ C I if, and only if, there is a homomorphism from TC to I mapping ρC to d. The proof is by a straightforward induction on the structure of C, see for example Baader et al. (1999) for details. Example 9 Consider the interpretation I from Example 2 and the tree representations of the concept expressions given in Figure 3. It can be seen that functions g and h defined as g(e0 ) = d4 , g(e1 ) = d5 , g(e2 ) = d4 and h(e3 ) = d2 , h(e4 ) = d3 , h(e5 ) = d4 are homomorphisms and so, by Lemma 8, d4 ∈ (Student ⊓ ∃has degree.∃has degree− .Graduate Student)I and d2 ∈ (Prof ⊓ ∃conduct research.⊤ ⊓ ∃supervisor of.Graduate)I . 9 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter It is also standard to characterise the subsumption relation ∅ |= C ⊑ D (that is, subsumption relative to the empty TBox) by means of homomorphisms between the tree representations TD and TC . A homomorphism h from labelled tree T1 to labelled tree T2 is a mapping from the nodes of T1 to the nodes of T2 such that A ∈ l(d) implies A ∈ l(h(d)) for every concept name A and r = l(d, d′ ) implies r = l(h(d), h(d′ )) for every role r. Lemma 10 Let C and D be concept expressions. Then ∅ |= C ⊑ D if, and only if, there is a homomorphism from TD to TC that maps ρD to ρC . The ‘if’ direction is essentially a consequence of Lemma 8 and the fact that the composition of two homomorphisms is again a homomorphism. For the ‘only if’ direction, one can consider TC as an interpretation I and apply Lemma 8. We again refer to Baader et al. (1999) for details. Next, we characterise subsumption in the presence of TBoxes in terms of homomorphisms. To achieve this, we make use of the canonical model IC0 ,T of a concept expression C0 and a TBox T . If T = ∅, then we want IC0 ,T to be TC0 viewed as a tree-shaped interpretation which we denote by IC0 rather than by IC0 ,T . More precisely, the domain of IC0 is the set of nodes of TC0 and d ∈ AIC0 iff A ∈ l(d), for all d ∈ ∆IC0 and concept names A (d, d′ ) ∈ r IC0 iff r = l(d, d′ ), for all d, d′ ∈ ∆IC0 and roles names r We call the root ρC0 of TC0 the root of IC0 . If T 6= ∅, then IC0 ,T is obtained by extending IC0 so that the CIs in T are satisfied. For example, if T = {A ⊑ ∃r.B} and C0 = A, then IC0 is a single node ρC0 with AIC0 = {ρC0 } and X IC0 = ∅ for all concept and role names X distinct from A. To define IC0 ,T we add a node d to ∆IC0 and set B IC0 ,T = {d} and r IC0 ,T = {(ρC0 , d)}. In general, IC0 ,T is defined as the limit of a sequence I0 , I1 , . . . of interpretations, where I0 = IC0 . For the inductive definition of the sequence, assume that In has been defined. Then obtain In+1 by applying one of the following rules once: 1. if C ⊑ D ∈ T and d ∈ C In but d 6∈ D In , then take the interpretation ID and add it to In by identifying its root ρC with d. In more detail, assume that ∆In ∩ ∆IC = {d} and d = ρC and define In+1 by setting, for all concept names A and role names r: ∆In+1 = ∆In ∪ ∆IC , AIn+1 = AIn ∪ AIC , r In+1 = r In ∪ r IC ; 2. if r ⊑ s ∈ T and (d, d′ ) ∈ r In but (d, d′ ) 6∈ sIn , then define In+1 as In except that sIn+1 := sIn ∪ {(d, d′ )} if s is a role name; otherwise there is a role name s0 with In+1 s = s− = sI0 n ∪ {(d′ , d)}. 0 and we define In+1 as In except that s0 We assume that rule application is fair, that is, if a rule is applicable in a certain place, then it will indeed eventually be applied there. If for some n > 0 no rule is applicable then we set In+1 = In . We obtain IC0 ,T by setting for all concept names A and role names r: ∆IC0 ,T = [ ∆ In , AIC0 ,T = [ n≥0 n≥0 10 AIn , r IC0 ,T = [ n≥0 r In . Exact Learning of Lightweight Description Logic Ontologies I0 I1 Grad con res sup of Grad sup of adv of I4 Stud con res Stud con res sup of Prof Prof Grad sup of adv of con res sup of adv of Prof I3 I2 Grad has deg Stud Grad sup of adv of sup of adv of Prof con res sup of adv of Prof Figure 4: Canonical model construction for Example 11. Note that the interpretation IC0 ,T obtained in the limit is tree-shaped and might be infinite.2 The following example illustrates the definition of IC0 ,T . Example 11 Consider the following TBox T : Prof ⊑ ∃supervisor of.Student (7) Prof ⊑ ∃conduct research.⊤ (8) Graduate ⊑ ∃has degree.⊤ (9) ∃has degree.⊤ ⊑ Graduate (10) supervisor of ⊑ advisor of (11) and the concept expression C0 = Prof ⊓ ∃conduct research.⊤ ⊓ ∃supervisor of.Graduate. Figure 4 illustrates the steps of the canonical model construction with I0 being IC0 and I4 being the canonical model IC0 ,T . The following lemma provides the announced characterisation of subsumption in the presence of TBoxes. Lemma 12 Let T be a TBox and C a concept expression. Then IC,T is a model of T and the following conditions are equivalent, for every concept expression D: 1. T |= C ⊑ D; 2. ρC ∈ D IC,T ; 3. there is a homomorphism from TD to IC,T that maps ρD to ρC . 2. The exact shape of IC0 ,T depends on the order of rule applications. However, all possible resulting interpretations IC0 ,T are homomorphically equivalent and, as a consequence, the order of rule application is not important for our purposes. 11 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter The proof is completely standard (see, for example, (Krötzsch, 2012)), we only give a highlevel overview. Using the construction of IC,T , it is not hard to show that IC,T is a model of T and that ρC ∈ C IC,T . This implies ‘1 ⇒ 2’ and ‘2 ⇒ 3’ follows from Lemma 8. For ‘3 ⇒ 1’, one can show that for any model I of T and any d ∈ C I , there is a homomorphism from IC,T to I that maps ρC to d. In fact, one constructs a homomorphism to I from each of the interpretations I0 , I1 , . . . built during the construction of IC,T , which is not hard by analysing the rules applied during that construction. The homomorphism built for each In+1 extends that for In and thus we can take the unions of all those homomorphisms to obtain a homomorphism from IC,T to I. It remains to compose homomorphisms and apply Lemma 8. We are only going to use canonical models and Lemma 12 in the context of DL-Lite∃R and DL-Lite∃R,horn . Next, we identify a more subtle property of canonical models of DL-Lite∃R and DL-Lite∃R,horn TBoxes that we need later on. Very roughly speaking, it states a form of locality which is due to the fact that existential restrictions on the left-hand side of CIs in DL-Lite∃R,horn are unqualified. Assume that d ∈ (∃r.D)IC,T for the canonical model IC,T of a concept expression C and TBox T . Assume d ∈ ∆IC . We know that there exists a homomorphism h from T∃r.D to IC,T mapping ρ∃r.D to d. Then either h maps some elements of TD into ∆IC or it maps the whole tree TD into ∆IC,T \ ∆IC . We are interested in the latter case. The following lemma states that if T is a DL-Lite∃R TBox, then there is a basic concept B with d ∈ B IC such that T |= B ⊑ ∃r.D. Thus, the question whether d ∈ (∃r.D)IC,T only depends on the concept names A with d ∈ AIC and the roles r with d ∈ (∃r.⊤)IC . If T is a DL-Lite∃R,horn TBox, it might not be sufficient to take a single basic concept but at least a set of basic concepts suffices (corresponding to the fact that DL-Lite∃R,horn admits conjunctions on the left-hand side of CIs). This observation does not hold for EL TBoxes and is ultimately the reason for the fact that one cannot polynomially learn EL TBoxes. The following example illustrates this observation. Example 13 Consider the EL TBox T = {∃r.A ⊑ A, A ⊑ ∃r.B} and let C = ∃r.∃r.A. Then ρC ∈ (∃r.B)IC,T since T |= C ⊑ ∃r.B. We therefore find a homomorphism h from T∃r.B to IC,T mapping ρ∃r.B to ρC . This homomorphism maps TB (which has a single node only) into ∆IC \ ∆IC,T . The only basic concept B with ρC ∈ B IC is ∃r.⊤ but clearly T 6|= ∃r.⊤ ⊑ ∃r.B and so the observation we sketched above does not hold for EL. We present this result in a more formal way. Let T1 and T2 be trees with labelling functions l1 and l2 , respectively. We call T1 a subtree of T2 if the following conditions hold: T1 ⊆ T2 , l1 is the restriction of l2 to T1 , and if d ∈ T1 and d′ is a successor of d in T2 , then d′ is a successor of d in T1 as well. The one-neigbourhood NIC (d) of d ∈ ∆IC is the set of concept names A with d ∈ AIC and basic concepts ∃r.⊤ such that there exists d′ ∈ ∆IC with (d, d′ ) ∈ r IC . Lemma 14 Let T be a DL-Lite∃R,horn TBox, D = ∃r.D ′ and assume h : TD → IC,T is ′ such that h(ρD ) = d ∈ ∆IC and the image of the subtree TD d of TD under h is included in I I C C,T \ ∆ . Then there exists I ⊆ NIC (d) such that T |= E∈I E ⊑ D. Moreover, if T is ∆ a DL-Lite∃R TBox, then there exists such a set I ⊆ NIC (d) with a single concept. 12 Exact Learning of Lightweight Description Logic Ontologies Proof (sketch) This property of canonical models for DL-Lite∃R,horn has been proved implicitly in many papers, for example (Artale et al., 2009). We give a sketch. Let N be the conjunction of all E ∈ NIC (d) and assume T 6|= N ⊑ D. Consider the canonical model IN,T . By definition, the one-neighbourhoods of ρN in IN,T and d in IC,T coincide. Now observe that the canonical model of any concept expression C0 and TBox T is obtained from IC0 by hooking tree-shaped interpretations Id with root d to every d in IC0 . As in DL-Lite∃R,horn the concept expressions on the left-hand side of CIs are basic concepts, the interpretations Id only depend on the one-neighbourhood NIC0 (d) of d in IC0 . Thus, the tree-shaped interpretations hooked to ρN in IN,T and to d in IC,T coincide and the homomorphism h given in Lemma 14 provides a homomorphism h : TD → IN such that h(ρD ) = ρN . By Lemma 12, T |= N ⊑ D. We have derived a contradiction. For DL-Lite∃R one only requires a single member of NIC (d) since the left-hand side of CIs in DL-Lite∃R consists of a single basic concept only. ❏ We close the introduction of description logics with some comments about the choice of our languages. In the DL literature it is not uncommon to consider the weaker variant DL-LiteR of DL-Lite∃R in which only basic concepts are admitted on the right-hand side of CIs, but compound concepts are not. This is often without loss of generality since every DL-Lite∃R TBox can be expressed in DL-LiteR by using additional role names; in this way, standard DL-Lite∃R reasoning tasks such as subsumption and conjunctive query answering can be reduced in polynomial time to the corresponding tasks for DL-LiteR . Such a reduction is not possible in the framework of exact learning that we are concerned with in this paper. In fact, in contrast to DL-Lite∃R TBoxes, TBoxes in DL-LiteR are trivially polynomial time learnable using either membership queries only or equivalence queries only as there are only polynomially many CIs and RIs over a given signature. 2.3 Exact Learning We introduce the relevant notation for exact learning. A learning framework F is a triple (X, L, µ), where X is a set of examples (also called domain or instance space), L is a set of concepts,3 and µ is a mapping from L to 2X . We say that x ∈ X is a positive example for l ∈ L if x ∈ µ(l) and a negative example for l if x 6∈ µ(l). We give a formal definition of polynomial query and time learnability within a learning framework. Let F = (X, L, µ) be a learning framework. We are interested in the exact identification of a target concept representation l ∈ L by posing queries to oracles. Let MEMF,l be the oracle that takes as input some x ∈ X and returns ‘yes’ if x ∈ µ(l) and ‘no’ otherwise. A membership query is a call to the oracle MEMF,l . Similarly, for every l ∈ L, we denote by EQF,l the oracle that takes as input a hypothesis concept representation h ∈ L and returns ‘yes’ if µ(h) = µ(l) and a counterexample x ∈ µ(h) ⊕ µ(l) otherwise, where ⊕ denotes the symmetric set difference. There is no assumption regarding which counterexample in µ(h) ⊕ µ(l) is chosen by the oracle. An equivalence query is a call to the oracle EQF,l . A learning algorithm for F is a deterministic algorithm that takes no input, is allowed to make queries to MEMF,l and EQF,l (without knowing what the target l to be learned is), 3. The similarity of this name to ‘concept expression’ is accidental and should not be taken to mean that these two notions are closely related. Both is standard terminology in the respective area. 13 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter and that eventually halts and outputs some h ∈ L with µ(h) = µ(l). We say that F is exact learnable if there is a learning algorithm for F and that F is polynomial query learnable if it is exact learnable by an algorithm A such that at every step the sum of the sizes of the inputs to membership and equivalence queries made by A up to that step is bounded by a polynomial p(|l|, |x|), where l is the target and x ∈ X is the largest counterexample seen so far (Arias, 2004). Finally, F is polynomial time learnable if it is exact learnable by an algorithm A such that at every step (we count each call to an oracle as one step of computation) of computation the time used by A up to that step is bounded by a polynomial p(|l|, |x|), where l ∈ L is the target and x ∈ X is the largest counterexample seen so far. Clearly, a learning framework F that is polynomial time learnable is also polynomial query learnable. The aim of this paper is to study learnability of description logic TBoxes. In this context, each DL L gives rise to a learning framework (X, L, µ), as follows: L is the set of all TBoxes formulated in L, X is the set of all CIs and RIs formulated in L, and µ(T ) = {α ∈ X | T |= α} for every T ∈ L. Observe that µ(T ) = µ(T ′ ) iff T ≡ T ′ , for all TBoxes T and T ′ . We say that L TBoxes are polynomial query learnable if the learning framework defined by L is polynomial query learnable, and likewise for polynomial time learnability. What does not show up directly in this representation is our assumption that the signature of the target TBox is known to the learner. Note that this is a standard assumption. For example, when learning propositional Horn formulas, it is common to assume that the variables in the target formula are known to the learner. 3. Learning DL-Lite∃R TBoxes We prove that DL-Lite∃R TBoxes are polynomial query learnable. If inverse roles are disallowed in CIs and RIs of the target TBox then our algorithm runs in polynomial time and thus shows that TBoxes in this restricted language are polynomial time learnable. Without this restriction, polynomial time learnability remains open. To simplify the presentation, we make two minor assumptions about the target TBox T . We will show later how these assumptions can be overcomed. First, we assume that T does not entail non-trivial role equivalences, that is, there do not exist distinct roles r and s such that T |= r ≡ s. This allows us to avoid dealing with classes of equivalent roles, simplifying notation. The second requirement is a bit more subtle. A concept inclusion is in reduced form if it is between basic concepts or its left-hand side is a concept name. A TBox T is in named form if all CIs in it are in reduced form and it contains a concept name Ar such that Ar ≡ ∃r.⊤ ∈ T , for each role r. We assume that the target TBox is in named form and that all CIs considered by the learner are in reduced form. In particular, counterexamples returned by the oracle are immediately converted into this form. Example 15 Although the TBox T from Example 11 does not entail role equivalences and all its CIs are in reduced form, it is not in named form. To fix this, we introduce concept names Asupervisor of , Aconduct research and Aadvisor of and extend T with the following equivalences: Asupervisor Aconduct of research ≡ ∃supervisor of.⊤ (12) ≡ ∃conduct research.⊤ (13) 14 Exact Learning of Lightweight Description Logic Ontologies Algorithm 1 Naı̈ve learning algorithm for DL-Lite∃R Input: A DL-Lite∃R TBox T in named form given to the oracle; ΣT given to the learner. Output: TBox H, computed by the learner, such that T ≡ H. 1: Compute Hbasic = {r ⊑ s | T |= r ⊑ s} ∪ {B1 ⊑ B2 | T |= B1 ⊑ B2 , B1 , B2 basic} 2: Set Hadd = ∅ 3: while Hbasic ∪ Hadd 6≡ T do 4: Let A ⊑ C be the returned positive counterexample for T relative to Hbasic ∪ Hadd 5: if there is A ⊑ C ′ ∈ Hadd then 6: Replace A ⊑ C ′ by A ⊑ C ⊓ C ′ in Hadd 7: else 8: Add A ⊑ C to Hadd 9: end if 10: end while 11: return H = Hbasic ∪ Hadd Aadvisor of ≡ ∃advisor of.⊤. (14) Notice that Graduate acts as a name for ∃has degree.⊤ so no new definition is needed for the role has degree. The TBox T ′ = T ∪ {(12), (13), (14)} is in named form. To develop the learning algorithm it is instructive to start with a naı̈ve version that does not always terminate but which can be refined to obtain the desired algorithm. This version is presented as Algorithm 1. Given the signature ΣT of the target TBox T , the learner starts with computing the set Hbasic by posing to the oracle the membership query ‘T |= r ⊑ s?’ for all r, s ∈ ΣT and ‘T |= B1 ⊑ B2 ?’ for all basic concept B1 , B2 over ΣT . Observe that T |= Hbasic . Then it enters the main while loop. Note that the condition ‘Hbasic ∪ Hadd 6≡ T ?’ in Line 3 is implemented using an equivalence query to the oracle, and that A ⊑ C in Line 4 refers to the counterexample returned by the oracle in the case that equivalence does not hold. The counterexample must be positive since we maintain the invariant T |= Hbasic ∪ Hadd throughout the run of the algorithm. If there is no CI of the form A ⊑ C ′ in Hadd then A ⊑ C is added to Hadd , otherwise A ⊑ C ⊓ C ′ is (Lines 6 and 8). The algorithm terminates when Hbasic ∪ Hadd ≡ T , implying that the target TBox has been learned. Example 16 For the TBox T ′ from Example 15, Algorithm 1 first computes Hbasic which coincides with T ′ except that Prof ⊑ ∃supervisor of.Student is not included since the concept ∃supervisor of.Student is not basic. In the main loop the only counterexamples to Hbasic ∪ Hadd ≡ T ′ are (up to logical equivalence modulo Hbasic ) the CIs Prof ⊑ ∃supervisor of.Student, Prof ⊑ ∃advisor of.Student. If the oracle returns the first CI in the first iteration, the algorithm terminates immediately having learned T ′ . Otherwise the oracle first returns the second CI and then returns the first CI in the second iteration. The algorithm terminates with Hadd = {Prof ⊑ ∃supervisor of.Student ⊓ ∃advisor of.Student} 15 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter which is equivalent to T ′ . We now consider five examples on which this naı̈ve algorithm fails to terminate after polynomially many steps (or at all), each example motivating a different modification step that is added to Algorithm 1 after Lines 4 and 5. The final, corrected algorithm is given as Algorithm 2 below. Each modification step takes as input a counterexample A ⊑ C against the equivalence Hbasic ∪ Hadd ≡ T and modifies it by posing membership queries to the oracle to obtain a CI A′ ⊑ C ′ which is still a counterexample and has additional desired properties. CIs satisfying all five additional properties will be called T -essential. The five modification steps are of three different types: 1. two saturations steps: the underlying tree of TC is left unchanged but the labelling is modified by adding concept names to node labels or replacing roles in edge labels; 2. two merging steps: nodes in the tree TC are merged, resulting in a tree with fewer nodes; 3. a decomposition step: TC is replaced by a subtree or a subtree is removed from TC , and the concept name A on the left-hand side might be replaced. The saturation and merging steps do not change the left-hand side A of the CI A ⊑ C and result in a logically stronger CI A ⊑ C ′ in the sense that ∅ |= C ′ ⊑ C. In contrast, the decomposition step can be regarded as a reset operation in which also the left-hand side can change and which is logically not related to A ⊑ C. We start with an example which motivates the first saturation step. Example 17 Let T = {A ⊑ ∃r.A} ∪ Tnf , where Tnf = {Ar ≡ ∃r.⊤} ensures that T is in named form. First, Algorithm 1 computes Hbasic . Afterwards the oracle can provide for the n-th equivalence query in the while loop the positive counterexample A ⊑ ∃r n+1 .⊤, for any n ≥ 1 (here we set inductively ∃r m+1 .⊤ = ∃r.∃r m .⊤ and ∃r 1 .⊤ = ∃r.⊤). Thus, the algorithm does not terminate. Informally, the problem for the learner in Example 17 is that the concepts ∃r n .⊤ used in the counterexamples A ⊑ ∃r n .⊤ get larger and larger, but still none of the counterexamples implies A ⊑ ∃r.A. We address this problem by saturating TC with implied concept names. For the following discussion, recall that we do not distinguish between the concept expression C and its tree representation TC . For example, if we say that C ′ is obtained from C by adding a concept name B to the label of node d in C, then this stands for: C ′ is the concept expression corresponding to the tree obtained from TC by adding B to the label of d in TC . Definition 18 (Concept saturation for T ) Let A ⊑ C be a CI with T |= A ⊑ C. A CI A ⊑ C ′ is obtained from A ⊑ C by concept saturation for T if T |= A ⊑ C ′ and C ′ is obtained from C by adding a concept name to the label of some node of C. We say that A ⊑ C is concept saturated for T if there is no A ⊑ C ′ with C 6= C ′ that can be obtained from A ⊑ C by concept saturation. 16 Exact Learning of Lightweight Description Logic Ontologies Observe that the learner can compute a concept saturated A ⊑ C ′ from a counterexample A ⊑ C by posing polynomially many membership queries to the oracle: it simply asks for any node d in TC and concept name E ∈ ΣT whether T |= A ⊑ C E,d , where C E,d is obtained from C by adding E to the label of d. If the answer is positive, it replaces C by C E,d and proceeds. Example 19 (Example 17 continued) The CIs A ⊑ ∃r n .⊤ are not concept saturated for T . For example, for n = 2, the concept saturation of A ⊑ ∃r 2 .⊤ is A ⊑ A ⊓ Ar ⊓ ∃r.(A ⊓ Ar ⊓ ∃r.(Ar ⊓ A)). Now observe that if the CI A ⊑ C returned by the oracle to the first equivalence query is transformed by the learner into a concept saturated CI (after Line 4), then the TBox T = {A ⊑ ∃r.A} ∪ Tnf is learned in one step: the only possible counterexamples returned by the oracle to the equivalence query Hbasic ≡ T are of the form A ⊑ C1 ⊓ ∃r.C2 for some concepts C1 and C2 . Concept saturation results in a concept of the form C1′ ⊓ ∃r.(A ⊓ C2′ ) and {A ⊑ C1′ ⊓ ∃r.(A ⊓ C2′ )} |= A ⊑ ∃r.A. The following example motivates the second saturation step. Here and in the subsequent examples we do not transform the TBoxes into named form as this does not effect the argument and simplifies presentation. Example 20 Consider for n ≥ 1 the TBoxes Tn = {A ⊑ ∃e1 .∃e2 . . . . ∃en .⊤} ∪ {ei ⊑ ri , ei ⊑ si | 1 ≤ i ≤ n}. For M ⊆ {1, . . . , n}, set CM = ∃t1 .∃t2 . . . . ∃tn .⊤, where ti = ri if i ∈ M and ti = si if i∈ / M . Then for the first 2n equivalence queries in the while loop the oracle can provide a positive counterexample A ⊑ CM by always choosing a fresh set M ⊆ {1, . . . , n}. Intuitively, the problem for the learner in Example 20 is that there are exponentially many logically incomparable CIs that are entailed by Tn but do not entail A ⊑ ∃e1 .∃e2 . . . . ∃en .⊤. A step towards resolving this problem is to replace the roles ri and si by the roles ei in the counterexamples A ⊑ CM . Definition 21 (Role saturation for T ) Let A ⊑ C be a CI with T |= A ⊑ C. A CI A ⊑ C ′ is obtained from A ⊑ C by role saturation for T if T |= A ⊑ C ′ and C ′ is obtained from C by replacing in some edge label a role r by a role s with T |= s ⊑ r. We say that A ⊑ C is role saturated for T if there is no A ⊑ C ′ with C 6= C ′ that can be obtained from A ⊑ C by role saturation. Similarly to concept saturation, the learner can compute a role saturated A ⊑ C ′ from a counterexample A ⊑ C by posing polynomially many membership queries. Observe that in Example 20 the role saturation of any A ⊑ CM is A ⊑ ∃e1 .∃e2 . . . . ∃en .⊤. Thus, if the counterexample A ⊑ CM returned by the first equivalence query is transformed into a role saturated CI, then the algorithm terminates after one step. We now introduce and motivate our two merging rules. Example 22 Consider the TBox T = {A ⊑ ∃r.⊤ ⊓ ∃s.⊤ ⊓ ∃e.B}. 17 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter e r− r s− s B h e .. . s r r− r Figure 5: Tree representation of C{1,3} and homomorphism to ∃r.⊤ ⊓ ∃s.⊤ ⊓ ∃e.B. − − and fix an n ≥ 1. For M ⊆ {1, . . . , n}, set CM = ∃t1 .∃t− 1 .∃t2 .∃t2 . . . . ∃tn .∃tn .∃e.⊤, where / M . Figure 5 (left) illustrates the concept expression C{1,3} , ti = r if i ∈ M and ti = s if i ∈ assuming n = 3. By Lemma 10, T |= A ⊑ CM since there is a homomorphism h from TCM to the labelled tree that corresponds to ∃r.⊤ ⊓ ∃s.⊤ ⊓ ∃e.B, as shown in Figure 5. Thus, the oracle can provide for the first 2n equivalence queries a positive counterexample A ⊑ CM by always choosing a fresh set M ⊆ {1, . . . , n}. The problem for the learner in Example 22 is similar to that in Example 20: there are exponentially many logically incomparable CIs that are entailed by T but do not entail A ⊑ ∃r.⊤ ⊓ ∃s.⊤ ⊓ ∃e.B. A step towards solving this problem is to merge the predecessor and successor nodes of a node if the edge labels are inverse to each other and the resulting CI is still implied by the TBox. Definition 23 (Parent/Child Merging for T ) A concept C ′ is obtained from a concept C by parent/child merging if C ′ is obtained from C by choosing nodes d, d′ , d′′ such that d is an r-successor of d′ , and d′′ is an r − -successor of d, for some role r, and then removing d′′ , setting l(d′ ) = l(d′ ) ∪ l(d′′ ), and making every s-successor e of d′′ in C an s-successor of d′ , for any role s. Let A ⊑ C be a CI with T |= A ⊑ C. A CI A ⊑ C ′ is obtained from A ⊑ C by parent/child merging if T |= A ⊑ C ′ and C ′ is obtained from C by parent/child merging. We say that A ⊑ C is parent/child merged for T if there is no A ⊑ C ′ with C 6= C ′ that can be obtained from A ⊑ C by parent/child merging. Note that when C ′ is obtained from C by parent/child merging with d′ and d′′ as in Definition 23, then ∅ |= C ′ ⊑ C. To show this, one can use Lemma 10 and the natural homomorphism h from TC to TC ′ , that is, the identity except that h(d′′ ) = d′ . Similarly to the saturation operations, the learner can compute a parent/child merged A ⊑ C ′ by posing polynomially many membership queries. In Example 22 the parent/child merging of any A ⊑ CM with ∅ = 6 M 6= {1, . . . , n} is A ⊑ ∃r.⊤ ⊓ ∃s.⊤ ⊓ ∃e.⊤, as illustrated in Figure 6: in the first step the nodes d0 and d2 are merged, two additional merging steps give ∃r.⊤ ⊓ ∃s.⊤ ⊓ ∃e.⊤. The following example motivates the second merging operation. Example 24 Define concept expressions Ci by induction as follows: C1 = ∃r.⊤ ⊓ ∃s.⊤, Ci+1 = C1 ⊓ ∃e.Ci 18 Exact Learning of Lightweight Description Logic Ontologies e r− r e s− s r− r d2 rd− 1 r ··· s− s d1 r r s e d0 = d2 d0 Figure 6: Parent/Child Merging of C{1,3} for T s r C3 s e e r r {1,2} e s r s r {1,3} C3 e C3 r s e e r {1,3} Figure 7: Tree representation of the concept expressions C3 , C3 {1,2} and C3 . and let Tn = {A ⊑ ∃e.Cn }. / M . Also, let For M ⊆ {1, . . . , n}, set C1M = ∃r.⊤ if 1 ∈ M and C1M = ∃s.⊤ if 1 ∈ M = ∃r.⊤ ⊓ ∃e.C M if i + 1 ∈ M and C M = ∃s.⊤ ⊓ ∃e.C M if i + 1 ∈ Ci+1 / M , 1 ≤ i < n. i i+1 i M Figure 7 illustrates concept expressions of the form Cn and Cn . As an answer to the first 2n equivalence queries the oracle can compute a positive counterexample A ⊑ ∃e.CnM by always choosing a fresh set M ⊆ {1, . . . , n}. To deal with this example we introduce a modification step that identifies siblings in C rather than a parent and a child. Definition 25 (Sibling Merging for T ) A concept C ′ is obtained from a concept C by sibling merging if C ′ is obtained from C by choosing nodes d, d′ , d′′ such that d′ and d′′ are r-successors of d, for some role r, and then removing d′′ , setting l(d′ ) = l(d′ ) ∪ l(d′′ ), and making every s-successor e of d′′ in TC an s-successor of d′ , for any role s. Let A ⊑ C be a CI with T |= A ⊑ C. A CI A ⊑ C ′ is obtained from A ⊑ C by sibling merging if T |= A ⊑ C ′ and C ′ is obtained from C by sibling merging. We say that A ⊑ C is sibling merged for T if there is no A ⊑ C ′ with C 6= C ′ that can be obtained from A ⊑ C by sibling merging. It can be verified that when C ′ is obtained from C by sibling merging, then ∅ |= C ′ ⊑ C. In Example 24 the counterexamples A ⊑ CnM are actually sibling merged for Tn . Thus, producing a sibling merged A ⊑ C ′ directly from the counterexamples returned by the oracle does not overcome the problem illustrated by the example. Instead, we apply sibling 19 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter merging after Line 5 of the algorithm: instead of adding A ⊑ C ⊓ C ′ to Hadd , the learner computes a sibling merged A ⊑ D from this CI and adds it to Hadd . For Example 24, this is illustrated in Figure 8. Clearly, after at most n + 1 counterexamples, the learner has added A ⊑ ∃e.Cn , as required. {1,3} C5 r r s e e {1,2} C5 r s r e r s r s e e e r {1,3} Figure 8: Sibling Merging C3 {1,2} and C3 for T . Finally, we need a decomposition rule. The following variant of Example 17 illustrates that the four modification steps introduced so far do not yet lead to a polynomial learning algorithm even if they are applied both after Line 4 and after Line 5 in Algorithm 1. Example 26 Let T = {A ⊑ B, B ⊑ ∃r.B}. The oracle can provide for the n-th equivalence query the positive counterexample A ⊑ CB,n , where CB,n = A ⊓ DB,n and, inductively, DB,0 = B and DB,n+1 = B ⊓ ∃r.DB,n , for any n ≥ 0. The algorithm does not terminate even with the four modification steps introduced above applied after Lines 4 and 5: the CIs A ⊑ CB,n are concept and role saturated and they are parent/child and sibling merged. The problem illustrated in Example 26 is that so far the learning algorithm attempts to learn T without ever considering to add to Hadd a CI whose left-hand side is B (rather than A). To deal with this problem we introduce a ‘reset step’ that, in contrast to the previous modification steps, can lead to a different left-hand side and also to a CI that does not imply the original CI given T , as in all previous modification steps. Definition 27 (Decomposed CI for T ) Let A ⊑ C be a CI with T |= A ⊑ C. We say that A ⊑ C is decomposed for T if for every non-root node d in C, every concept name A′ ∈ l(d), and every r-successor d′ of d in C, we have T 6|= A′ ⊑ ∃r.C ′ where C ′ corresponds to the subtree of C rooted at d′ . In contrast to the previous four modification steps, the membership queries used by the learner to obtain a decomposed CI do not only depend on T but also on the hypothesis Hadd ∪ Hbasic computed up to that point: starting from CI A ⊑ C, the learner takes a non-root node d in C, a concept name A′ ∈ l(d), and an r-successor d′ of d in C, and then checks using a membership query whether T |= A′ ⊑ ∃r.C ′ , where C ′ is the subtree rooted at d′ in C. If the check succeeds, A ⊑ C is replaced by (a) A′ ⊑ ∃r.C ′ if Hbasic ∪ Hadd 6|= A′ ⊑ ∃r.C ′ ; and otherwise by − ′ (b) A ⊑ C|− d′ ↓ , where C|d′ ↓ is obtained from C by removing the subtree rooted in d from C. 20 Exact Learning of Lightweight Description Logic Ontologies B B d′ r r B d′ d d B r d r A, B A, B ′ Figure 9: Illustration of decomposition of CIs. Here C|− d′ ↓ = A ⊓ B ⊓ ∃r.B and C = B. Algorithm 2 The learning algorithm for DL-Lite∃R Input: A DL-Lite∃R TBox T in named form given to the oracle; ΣT given to the learner. Output: TBox H, computed by the learner, such that T ≡ H. 1: Compute Hbasic = {r ⊑ s | T |= r ⊑ s} ∪ {B1 ⊑ B2 | T |= B1 ⊑ B2 , B1 , B2 basic} 2: Set Hadd = ∅ 3: while Hbasic ∪ Hadd 6≡ T do 4: Let A ⊑ C be the returned positive counterexample for T relative to Hbasic ∪ Hadd 5: Find a T -essential CI A′ ⊑ C ′ such that Hbasic ∪ Hadd 6|= A′ ⊑ C ′ 6: if there is A′ ⊑ C ′′ ∈ Hadd then 7: Find T -essential CI A′ ⊑ C ∗ such that ∅ |= C ∗ ⊑ C ′′ ⊓ C ′ 8: Replace A′ ⊑ C ′′ by A′ ⊑ C ∗ in Hadd 9: else 10: Add A′ ⊑ C ′ to Hadd 11: end if 12: end while 13: return H = Hbasic ∪ Hadd − ′ ′ ′ ′ Note that {A ⊑ C|− d′ ↓ , A ⊑ ∃r.C } |= A ⊑ C. Thus, one of the CIs A ⊑ C|d′ ↓ and A ⊑ ∃r.C is not entailed by Hbasic ∪ Hadd , and this is the CI that replaces the original CI. In Example 26, assume that the oracle returns A ⊑ C with C = A ⊓ B ⊓ ∃r.(B ⊓ ∃r.B) as the first counterexample. The tree TC corresponding to C is shown on the left-hand side of Figure 9. This CI is not decomposed for T : the label of node d contains B, the concept C ′ rooted in d′ in C is B and T |= B ⊑ ∃r.B. Since H ∪ Hadd 6|= B ⊑ ∃r.B, Case (a) applies and A ⊑ B is replaced by B ⊑ ∃r.B. This finishes the description of the modification steps. It turns out that they cure all problems with the initial version of the algorithm and enable polynomial query learnability. Definition 28 A DL-Lite∃R CI is T -essential if it is concept saturated, role saturated, parent/child merged, sibling merged, and decomposed for T . After Lines 4 and 5 of Algorithm 1, we need to make the CI currently considered T -essential, by exhaustively applying the modification steps described above in all possible orders. The resulting refined version of the learning algorithm is shown as Algorithm 2. We next analyse the properties of this algorithm. 21 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Polynomial Query Bound on the Algorithm If Algorithm 2 terminates, then it obviously has found a TBox Hbasic ∪ Hadd that is logically equivalent to T . It thus remains to show that the algorithm terminates after polynomially many polynomial size queries. Observe that Hadd contains at most one CI A ⊑ C for each concept name A. At each step in the while loop, either some A′ ⊑ C ′ is added to Hadd such that no CI with A′ on the left-hand side existed in Hadd before (Line 10) or an existing CI A′ ⊑ C ′′ in Hadd is replaced by a fresh CI A′ ⊑ C ∗ with ∅ |= C ∗ ⊑ C ′′ . We start with showing that Lines 5 and 7 can be implemented with polynomially many membership queries. The next lemma addresses Line 5. Lemma 29 Given a positive counterexample A ⊑ C for T relative to Hbasic ∪Hadd , one can construct a T -essential counterexample A′ ⊑ C ′ using only polynomially many polynomial size membership queries in |C| + |T |. Proof Let A ⊑ C be a positive counterexample for T relative to Hbasic ∪ Hadd and assume the five modification steps introduced above are applied exhaustively by posing membership queries to the oracle. Observe that the number of applications of modifications steps is bounded polynomially in |C| × |T |. To show this, let nC be the number of nodes in TC . Then nC ′′ = nC ′ if A′′ ⊑ C ′′ is obtained from A′ ⊑ C ′ by a concept or role saturation step and nC ′′ < nC ′ if A′′ ⊑ C ′′ is obtained from A′ ⊑ C ′ by a merging or decomposition step. Thus, the number of applications of merging and decomposition steps is bounded by nC and the number of applications of concept and role saturated steps is bounded by |ΣT | × nC and |ΣT | × n2C , respectively. Thus, after at most nC + |ΣT | × nC + |ΣT | × n2C steps no modification step is applicable and the final CI is T -essential. We verify that it is also a positive counterexample for T relative to Hbasic ∪ Hadd . It suffices to show that the CI resulting from each single modification step is entailed by T , but not by Hbasic ∪ Hadd . The former has been shown when we introduced the modification steps. Regarding the latter, in the first four modification steps we have Hbasic |= C ′ ⊑ C if A ⊑ C is replaced by A ⊑ C ′ . Hence Hbasic ∪ Hadd 6|= A ⊑ C ′ . For the decomposition step, we have already argued, after Definition 27, that the added CI is not entailed by Hbasic ∪ Hadd . ❏ The following lemma addresses Line 7. Lemma 30 Assume that A ⊑ C1 and A ⊑ C2 are T -essential. Then one can construct a T -essential A ⊑ C such that ∅ |= C ⊑ C1 ⊓ C2 using polynomially many polynomial size membership queries in |C1 | + |C2 |. Proof We start with A ⊑ C1 ⊓ C2 . Using the fact that C1 and C2 are both T -essential, one can show that this CI is (i) concept saturated for T , (ii) role saturated for T , (iii) parent/child merged for T , and (iv) decomposed for T . Assume, for example, that A ⊑ C1 ⊓ C2 is not concept saturated. Then one can add a new concept name A′ to the label l(d) for some node d in TC1 ⊓C2 and T |= A ⊑ C ′ for the resulting concept C ′ . Clearly d is a node in TC1 or in TC2 . Assume without loss of generality that d is in TC1 and let C1′ be the concept obtained from C1 by adding A′ to l(d). Then T |= A ⊑ C1′ since T |= A ⊑ C ′ which contradicts the assumption that A ⊑ C1 is concept saturated. The remaining three modification steps are considered similarly. We now exhaustively apply the modification 22 Exact Learning of Lightweight Description Logic Ontologies step ‘Sibling merging for T ’ and use the resulting CI as the desired A ⊑ C. Similarly to the argument above one can show that a CI with properties (i)–(iv) still has those properties after applying sibling merging. Thus, A ⊑ C is T -essential. We have argued in the proof of Lemma 29 already that the number of applications of a sibling merging step to a CI of the form A ⊑ D is bounded by the number of nodes in TD . Thus, the number of modification steps is bounded polynomially in |C1 | + |C2 |. ❏ To analyse the algorithm further we first prove a polynomial upper bound on the size of T -essential CIs. To this end, we require the notion of an isomorphic embedding and an auxiliary lemma. A homomorphism h : TC → I is an isomorphic embedding for T if it is injective, A ∈ l(d) if h(d) ∈ AI for all concept names A, and for r = l(d, d′ ) it holds that T |= r ⊑ s for all (h(d), h(d′ )) ∈ sI . The following lemma shows that for T -essential CIs A ⊑ C and any D that interpolates between A and C (meaning that T |= A ⊑ D and T |= D ⊑ C) the homomorphism h from TC to ID,T that witnesses ρD ∈ C ID,T (see Lemma 12) is an isomorphic embedding. Lemma 31 Assume the A ⊑ C is T -essential, T |= A ⊑ D and T |= D ⊑ C. Then any homomorphism h : TC → ID,T that maps ρC to ρD is an isomorphic embedding. Proof Assume first that h is not injective. Then there is a parent/child or sibling merging C ′ of C and a homomorphism f : TC ′ → ID,T such that h = f ◦ g for the natural homomorphism g : TC → TC ′ . By Lemma 12, T |= D ⊑ C ′ . Thus, T |= A ⊑ C ′ and we have derived a contradiction to the assumption that C is parent/child and sibling merged. Now let T ′ be the following labelled tree: the nodes in T ′ are the same as in T , A ∈ l′ (d) iff h(d) ∈ AID,T , and for any two nodes d, d′ with d′ a successor of d: l′ (d, d′ ) = r for the unique role r with T |= r ⊑ s for all s with (d, d′ ) ∈ sID,T . Let C ′ be the concept expression that corresponds to T ′ . Then ρD ∈ C ′ ID,T and so, by Lemma 12, T |= D ⊑ C ′ . Thus T |= A ⊑ C ′ . But then A ⊑ C ′ can be obtained from A ⊑ C by concept and role saturation steps. As A ⊑ C is concept and role saturated already, C = C ′ and so h is an isomorphic embedding. ❏ We are now able to prove that T -essential CIs are of polynomial size in T . Let nC denote the number of nodes in the tree representation TC of C and let AT = {A} ∪ {B | A ⊑ B ∈ Hbasic } ∪ {D | T |= A ⊑ B, B ⊑ D ∈ T }. Lemma 32 If A ⊑ C is T -essential, then nC ≤ X D∈AT nD . d Proof Assume A ⊑ C is T -essential. Let D0 := D∈AT D and ID0 ,T be the canonical model of D0 and T . By Lemma 12, there is a homomorphism h : TC → ID0 ,T mapping ρC to ρD0 . By Lemma 31, h is an isomorphic embedding. Using that A ⊑ C is decomposed for T we now show that h maps TC into the restriction of ID0 to ∆ID0 from which the lemma follows since h is injective. For a proof by contradiction, assume that there exists d′ in TC with h(d′ ) 6∈ ∆ID0 . As h(ρC ) ∈ ∆ID0 , we may assume that all d′ on the path from ρC to d′ are mapped to ∆ID0 . 23 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter In particular, the parent d of d′ in TC is mapped into ∆ID0 . Let l(d, d′ ) = r. Observe that the whole subtree rooted in d′ must be mapped into ∆ID0 ,T \ ∆ID0 since otherwise h would not be injective. Let C ′ = ∃r.C ′′ , where C ′′ corresponds to the subtree rooted in d′ in C. By Lemma 14 there exists a basic concept B such that h(d) ∈ B ID0 ,T and T |= B ⊑ C ′ . As T is in named form there exists a concept name E with T |= E ≡ B. Thus h(d) ∈ E ID0 ,T and T |= E ⊑ C ′ . As h is an isomorphic embedding, E ∈ l(d). We make a case distinction: • h(d) 6= ρD0 . Then A ⊑ C is not decomposed for T since C contains an edge (d, d′ ) such that E is in the node label of d, l(d, d′ ) = r, and T |= E ⊑ ∃r.C ′′ . We have derived a contradiction. • h(d) = ρD0 . As h(d′ ) ∈ ∆ID0 ,T \ ∆ID0 , by construction of ID0 ,T , there exists a CI ID B0 ⊑ D ∈ T with B0 a basic concept such that ρD0 ∈ B0 0 and h(d′ ) is in the copy of the tree-shaped interpretation ID which was attached to ρD0 in the construction of ID0 ,T . But since T |= A ⊑ B0 we have D ∈ AT and so ρD0 ∈ D ID0 . But then, by the construction of ID0 ,T , no fresh ID was attached to ρD0 because D is already satisfied in ID0 and we have derived a contradiction. ❏ ,T We are now in the position to prove that the learning algorithm terminates after posing a polynomial number of queries. Lemma 33 For every concept name A, the number of replacements of a CI A ⊑ C in Hadd by a CI of the form A ⊑ C ′ is bounded polynomially in |T |. Proof All CIs A ⊑ C ever added to Hadd are T -essential. We show that when A ⊑ C is replaced with A ⊑ C ′ , then the number of nodes in the tree representation of C ′ is strictly larger than the number of nodes in the P tree representation of C. By Lemma 32, the number of replacements is thus bounded by D∈AT nD , which is polynomial in |T |. Note that when A ⊑ C is replaced with A ⊑ C ′ , then ∅ |= C ′ ⊑ C and ∅ 6|= C ⊑ C ′ . It thus suffices to establish the following. Claim. If A ⊑ C and A ⊑ C ′ are T -essential, ∅ |= C ′ ⊑ C and ∅ 6|= C ⊑ C ′ , then TC is obtained from TC ′ by removing at least one subtree. We prove the claim. Since ∅ |= C ′ ⊑ C, by Lemma 12 there is a homomorphism h from TC to the canonical model IC ′ that maps ρC to ρC ′ . Then h is also a homomorphism into the canonical model IC ′ ,T and thus, by Lemma 31, h is an isomorphic embedding into IC ′ ,T . Then, trivially, h is also an isomorphic embedding into IC ′ which means that TC is obtained from TC ′ by removing subtrees. Since ∅ 6|= C ⊑ C ′ , at least one subtree must in fact have been removed. ❏ We have obtained the following main result of this section. Theorem 34 DL-Lite∃R TBoxes are polynomial query learnable using membership and equivalence queries. Moreover, DL-Lite∃R TBoxes without inverse roles can be learned in polynomial time using membership and equivalence queries. 24 Exact Learning of Lightweight Description Logic Ontologies Proof Recall that our algorithm requires the target TBox to be in named form. We first show Theorem 34 under that assumption and then argue that the assumption can be dropped. In each iteration of Algorithm 2, either a CI is added to Hadd or a CI is replaced in Hadd . Since the number of times the former happens is bounded by |ΣT | and (by Lemma 33) the number of times the latter happens is polynomial in |T |, the number of iterations of Algorithm 2 is polynomial in |T |. For polynomial query learnability of DL-Lite∃R TBoxes, it remains to show that in each iteration Algorithm 2 makes only polynomially many polynomial size queries in |T | and the size of the largest counterexample seen so far. We start with equivalence queries, made only in Line 3. We have already argued that the number of iterations is polynomial in |T | and thus so is the number of equivalence queries made. Regarding their size, we observe that there are at most |ΣT |2 CIs in Hbasic and at most |ΣT | CIs in Hadd , that the size of CIs in Hbasic is constant and by Lemma 32 the size of CIs in Hadd is polynomial in |T |. Membership queries are made only in Lines 5 and 7 for which it suffices to invoke Lemmas 29 and 30. Now for the “moreover” part of Theorem 34. Observe that since each (membership or equivalence) query counts as one step of computation, the only potentially costly step of Algorithm 2 is the implementation of the decomposition step in Line 5, which relies on making subsumption checks of the form Hbasic ∪ Hadd |= A ⊑ C. As discussed in Section 2, deciding subsumption in DL-Lite∃R is NP-complete while in EL with role inclusions subsumption is in PTime. As DL-Lite∃R without inverse roles is a fragment of EL with role inclusions, we obtain polynomial time learnability for TBoxes in this case. To drop the requirement that the target TBox is in named form, we show that any polynomial (query or time) learning algorithm for TBoxes in named form can be transformed into the same kind of algorithm for unrestricted target TBoxes. In fact, the learner can use at most O(|ΣT |2 ) membership queries “Does T entail r ⊑ s?” to compute for every role r the class [r]T of roles s with T |= s ≡ r and choose a representative rT for this class. Then whenever some s ∈ [r]T is used in any counterexample returned by the oracle, it gets replaced with rT . Likewise, whenever T does not have a name for some ∃r.⊤, the algorithm still uses the concept name Ar in its internal representations (although they are no longer included in the signature ΣT of the target TBox) and replaces ∃r.⊤ with Ar in the counterexamples returned by the oracle. It also replaces each Ar with ∃r.⊤ in membership queries to the oracle and in the hypothesis used for posing equivalence queries. ❏ 4. Learning DL-Lite∃R,horn TBoxes We study exact learnability of TBoxes in DL-Lite∃R,horn , the extension of DL-Lite∃R that admits conjunctions of basic concepts on the left-hand side of CIs. This language is a generalisation of both DL-Lite∃R and propositional Horn logic. In fact, the algorithm we present combines the classical algorithms for propositional Horn logic (Angluin et al., 1992; Frazier and Pitt, 1993) with the algorithm for DL-Lite∃R presented in Section 3. The resulting algorithm is quite subtle and indeed this is the reason why we treated the DL-Lite∃R case separately in Section 3. To simplify the presentation, we make the same assumptions as in Section 3 about the target TBox T with signature ΣT . In particular, we assume that T is in named form, 25 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Algorithm 3 The learning algorithm for DL-Lite∃R,horn TBoxes Input: A DL-Lite∃R,horn TBox T in named form given to the oracle; ΣT given to the learner. Output: TBox H, computed by the learner, such that T ≡ H. 1: Compute Hbasic = {r ⊑ s | T |= r ⊑ s} ∪ {B1 ⊑ B2 | T |= B1 ⊑ B2 , B1 , B2 basic} 2: Set Hadd to be the empty list and H = Hbasic ∪ Hadd 3: while H 6≡ T do 4: Let γ be the returned positive counterexample for T and H 5: Find a T -essential γ ′ with H 6|= γ ′ and |{∃r.F | ∃r.F ∈ rhs(γ ′ )}| ≤ 1 6: Left saturate γ ′ for H 7: if there is A ∈ NC such that T |= lhs(γ ′ ) ⊑ A and H 6|= lhs(γ ′ ) ⊑ A then 8: H :=CN-Refine(H, lhs(γ ′ ) ⊑ A) 9: else 10: H :=∃-Refine(H, γ ′ ) 11: end if 12: Set H = Hbasic ∪ Hadd 13: end while 14: return H suitably generalised to DL-Lite∃R,horn : there are no distinct roles r and s such that T |= r ≡ s, for each role r the TBox T contains an equivalence Ar ≡ ∃r.⊤ and all CIs of T are either CIs between basic concepts or contain no concept expressions of the form ∃r.⊤ on the left-hand side, for any role r. Denote by lhs(α) the set of concept names that occur as conjuncts on the left-hand side of a CI α and denote by rhs(α) the set of concept expressions that occur as top-level conjuncts on the right-hand side of α (that is, they are not nested inside restrictions). We often do not distinguish between the set lhs(α) and the conjunction over all its concept expressions, and similarly for rhs(α). For example, if α1 = C1 ⊑ D1 and α2 = C2 ⊑ D2 then lhs(α1 ) ⊑ rhs(α2 ) stands for C1 ⊑ D2 . Also, if lhs(α1 ) = {A1 , A2 , A3 } and lhs(α2 ) = {A2 , A3 , A4 } then lhs(α1 ) ∩ lhs(α2 ) ⊑ D stands for A2 ⊓ A3 ⊑ D. The algorithm for learning DL-Lite∃R,horn TBoxes is shown as Algorithm 3. Like Algorithm 2, Algorithm 3 first determines the set Hbasic that contains all CIs B1 ⊑ B2 with B1 , B2 basic concepts such that T |= B1 ⊑ B2 and all RIs r ⊑ s such that T |= r ⊑ s. The hypothesis H is the union of Hbasic and Hadd . In contrast to Algorithm 2, Hadd is an ordered list of CIs rather than a set. We write αi to denote the CI α at position i in the list Hadd . In the learning algorithm, working with an ordered list of CIs allows the learner to pick the first αi in Hadd with a certain property and merge it with a new CI, a technique we adopt from (Angluin et al., 1992; Frazier and Pitt, 1993). As in Algorithm 2, T |= H is a loop invariant, thus, γ is necessarily positive. The algorithm terminates when H ≡ T . Algorithm 3 uses membership queries to compute a T -essential counterexample γ such that rhs(γ) contains at most one concept expression of the form ∃r.F (Line 5) and which is ‘Left saturated for H’ (Line 6); here, a CI is left saturated for H if its left-hand side contains all subsuming concept names w.r.t. H (Definition 35 below) and T -essential if it satisfies the conditions for T -essential CIs from Section 3, appropriately modified for CIs with conjunctions of concept names on the left-hand side (Definition 37 below). Then, the algorithm checks whether there is a concept name A such that lhs(γ) ⊑ A is a positive 26 Exact Learning of Lightweight Description Logic Ontologies Algorithm 4 Function CN-Refine(H, γ) 1: if there is A ∈ NC and αi ∈ Hadd such that T |= lhs(αi ) ∩ lhs(γ) ⊑ A, 2: and H 6|= lhs(αi ) ∩ lhs(γ) ⊑ A then 3: Concept saturate γ ′ = lhs(αi ) ∩ lhs(γ) ⊑ A for T 4: Replace the first such αi in Hadd by γ ′ 5: else 6: Concept saturate γ for T 7: Append γ to the list Hadd 8: end if 9: return H Algorithm 5 Function ∃-Refine(H, γ) 1: if there is C ∈ rhs(γ) of the form ∃r.D and αi ∈ Hadd such that T |= lhs(αi )∩lhs(γ) ⊑ C 2: and H 6|= lhs(αi ) ∩ lhs(γ) ⊑ C then 3: if T |= lhs(αi ) ∩ lhs(γ) ⊑ C ⊓ rhs(αi ) then 4: Find a T -essential lhs(αi ) ∩ lhs(γ) ⊑ D ∗ with ∅ |= D ∗ ⊑ C ⊓ rhs(αi ) 5: Replace the first such αi in Hadd by lhs(αi ) ∩ lhs(γ) ⊑ D ∗ 6: else 7: Concept saturate γ ′ = lhs(αi ) ∩ lhs(γ) ⊑ C for T 8: Replace the first such αi in Hadd by γ ′ 9: end if 10: else 11: Append γ to the list Hadd 12: end if 13: return H counterexample. If so, then it calls Function CN-Refine (Algorithm 4) and updates the hypothesis either by refining some αi in Hadd or by appending a new CI to Hadd . The number of replacements of any given αi in Hadd in CN-Refine is bounded by |ΣT | since whenever αi is replaced in CN-Refine(H, γ), then lhs(αi ) ∩ lhs(γ) ( lhs(αi ).4 If there is no concept name A such that lhs(γ) ⊑ A is a positive counterexample then Algorithm 3 calls Function ∃-Refine (Algorithm 5). In this case one considers the existential restrictions that occur on top-level on the right-hand side of γ. Note that ∃-Refine can be viewed as a variation of the body of the while loop in Algorithm 2 in which one considers sets of concept names on the left-hand side of CIs rather than a single concept name. Recall that in Algorithm 2, the new CI γ and a CI α in Hadd are merged if they have the same concept name on the left-hand side. In contrast, now they are merged if the intersection of their left-sides is still subsumed by some existential restriction C from rhs(γ) (Lines 1 and 2). There are two cases: if the intersection is also subsumed by rhs(α) (checked in Line 3), then in the next line a T -essential counterexample is computed and the first such αi is replaced by the new CI. Otherwise it follows that lhs(αi ) ∩ lhs(γ) ( lhs(αi ) and the 4. This is a consequence of the fact that Hadd only contains concept saturated CIs (defined essentially as in the previous section, see Definition 37 below): lhs(αi ) ∩ lhs(γ) = lhs(αi ) and T |= lhs(αi ) ∩ lhs(γ) ⊑ A implies A ∈ rhs(αi ) by concept saturatedness, thus contradicting H 6|= lhs(αi ) ∩ lhs(γ) ⊑ A. 27 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter first such αi is replaced by the CI computed in Line 7. Note that the latter can happen at most |ΣT | times for each CI in Hadd (and the former can happen at most |T | times for each CI in Hadd , see Lemma 43 below). If no CI can be refined with γ then ∃-Refine appends γ to Hadd . We now define the step ‘left-saturate γ for H’ used in Line 6 of Algorithm 3. Observe that this step is meaningless for DL-Lite∃R . Definition 35 (Left saturation for H) A CI γ ′ is obtained from a CI γ by left saturation for H if rhs(γ ′ ) = rhs(γ) and lhs(γ ′ ) = {A ∈ ΣT | H |= lhs(γ) ⊑ A}. A CI γ is left saturated for H if it coincides with its left saturation for H. One can clearly left saturate any CI γ for H by checking whether H |= lhs(γ) |= A for every A ∈ ΣT . The following example shows that Line 6 is necessary for Algorithm 3 to be polynomial. A similar step is also necessary in Frazier et al.’s algorithm learning propositional Horn logic from entailments (Frazier and Pitt, 1993). Example 36 Assume Line 6 of Algorithm 3 is omitted. Let for n ≥ 2, Tn = {E1 ⊓ · · · ⊓ En ⊑ A} ∪ {Ai ⊑ Ei , Bi ⊑ Ei | 1 ≤ i ≤ n}. d / M . Then For M ⊆ {1, . . . , n}, set CM = i≤n Ci , where Ci = Ai if i ∈ M and Ci = Bi if i ∈ n the oracle can provide for the first 2 equivalence queries in the while loop of Algorithm 3 a positive counterexample CM ⊑ A by always choosing a fresh set M ⊆ {1, . . . , n}. For the refinements on the right-hand side, we extend to DL-Lite∃R,horn the notion of T essential CIs introduced in the previous section: 1. (Concept saturation for T ) A CI γ ′ is obtained from a CI γ by concept saturation for T if lhs(γ) = lhs(γ ′ ), rhs(γ ′ ) is obtained from rhs(γ) by adding a concept name to the label of some node of rhs(γ), and T |= γ ′ . A CI γ is concept saturated for T if T |= γ and there is no γ ′ with γ 6= γ ′ that can be obtained from γ by concept saturation for T . 2. (Role saturation for T ) A CI γ ′ is obtained from γ by role saturation for T if lhs(γ) = lhs(γ ′ ), rhs(γ ′ ) is obtained from rhs(γ) by replacing in some edge label a role r by a role s with T |= s ⊑ r, and T |= γ ′ . A CI γ is role saturated for T if T |= γ and there is no γ ′ with γ 6= γ ′ that can be obtained from γ by role saturation for T . 3. (Parent/child merged for T ) A CI γ ′ is obtained from a CI γ by parent/child merging for T if lhs(γ) = lhs(γ ′ ), rhs(γ ′ ) is obtained from rhs(γ ′ ) by parent/child merging (as in Definition 23), and T |= γ ′ . A CI γ is parent/child merged for T if T |= γ and there is no γ ′ with γ 6= γ ′ that can be obtained from γ by parent/child merging for T . 4. (Sibling merged for T ) A CI γ ′ is obtained from a CI γ by sibling merging for T if lhs(γ) = lhs(γ ′ ), rhs(γ ′ ) is obtained from rhs(γ ′ ) by sibling merging (as in Definition 25), and T |= γ ′ . A CI γ is sibling merged for T if T |= γ and there is no γ ′ with γ 6= γ ′ that can be obtained from γ by sibling merging for T . 28 Exact Learning of Lightweight Description Logic Ontologies 5. (Decomposed CI for T ) A CI γ is decomposed for T if T |= γ and for every nonroot node d in rhs(γ), every role r, and every r-successor d′ of d in rhs(γ) we have T 6|= l(d) ⊑ ∃r.C ′ , where C ′ corresponds to the subtree of rhs(γ) rooted at d′ . Definition 37 A DL-Lite∃R,horn CI is T -essential if it is concept saturated, role saturated, parent/child merged, sibling merged, and decomposed for T . The saturation, merging and decomposition steps defined above are straightforward generalisations of Definitions 18 to 27 to CIs with conjunctions on the left-hand side. One can easily generalise the arguments from DL-Lite∃R to show that for any CI γ with H 6|= γ one can compute a T -essential γ ′ with H 6|= γ ′ using polynomially many membership queries and entailment checks relative to H. For the analysis of the learning algorithm it is crucial that all CIs in the ordered list Hadd are T -essential at all times, which we prove next. Lemma 38 At any point in the execution of Algorithm 3, all CIs in Hadd are T -essential. Proof If a CI γ is of the form A1 ⊓ · · · ⊓ An ⊑ A with A a concept name, then the set rhs(γ ′ ) of the concept saturation γ ′ of γ for T contains concept names only. Thus, γ ′ is T -essential. It follows that the CIs added to Hadd in Lines 4 and 7 of CN-Refine are T essential. Also, it is easy to see that if γ is T -essential and C ∈ rhs(γ) then the concept saturation of lhs(γ) ⊑ C for T is T -essential as well. Thus, the CI γ ′ in Line 8 of ∃-Refine is T -essential. ❏ Polynomial Query Bound on the Algorithm As in the previous section it is immediate that upon termination the algorithm has found a TBox H = Hbasic ∪ Hadd that is logically equivalent to the target TBox T . It thus remains to show that it issues only polynomially many queries of polynomial size. We first discuss how Lines 5 and 6 of Algorithm 3 and Line 4 of ∃-Refine can be implemented. The next lemma addresses Lines 5 and 6 of Algorithm 3. Lemma 39 Given a positive counterexample γ for T relative to H, one can construct with polynomially many polynomial size membership queries in |γ| and |T |, a counterexample γ ′ that is left saturated for H, T -essential and such that |{∃r.F | ∃r.F ∈ rhs(γ ′ )}| ≤ 1. The proof of Lemma 39 is a straightforward extension of the proof of Lemma 29 and uses the observation that a left-saturated γ ′ for H can be computed from γ by adding all concept names A ∈ ΣT with H |= lhs(γ) ⊑ A to lhs(γ). This lemma also requires that |{∃r.F | ∃r.F ∈ rhs(γ ′ )}| ≤ 1. If there is A ∈ rhs(γ ′ ) such that H 6|= lhs(γ ′ ) ⊑ A then we can simply drop all conjuncts of the form ∃r.F from rhs(γ ′ ). Otherwise, we can satisfy the condition by simply choosing a conjunct ∃r.F ∈ rhs(γ ′ ) such that H 6|= lhs(γ ′ ) ⊑ ∃r.F and then apply ‘Concept saturation for T ’ to lhs(γ ′ ) ⊑ ∃r.F . The resulting γ ′ is left saturated for H, T -essential and has at most one conjunct of the form ∃r.F in rhs(γ ′ ). The following lemma addresses Line 4 of ∃-Refine. Lemma 40 Assume that α and γ are T -essential and there is C ∈ rhs(γ) such that T |= lhs(α) ∩ lhs(γ) ⊑ rhs(α) ⊓ C. Then one can construct, with polynomially many polynomial 29 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter size membership queries in |rhs(α)| and |C|, a T -essential lhs(α) ∩ lhs(γ) ⊑ D ∗ such that ∅ |= D ∗ ⊑ rhs(α) ⊓ C. Proof Assume T |= lhs(α) ∩ lhs(γ) ⊑ rhs(α) ⊓ C. Then, similar to Lemma 30, one can show that the only property of T -essential CIs that can fail is being sibling merged for T and that after applying the step ‘Sibling merging for T ’ to lhs(α) ∩ lhs(γ) ⊑ rhs(α) ⊓ C the resulting CI is T -essential, as required. ❏ We also have to show that the number of CIs in Hadd is bounded polynomially in |T | and for each position of Hadd the number of replacements is bounded polynomially in |T |. These properties follow from the following lemma. Lemma 41 Let Hadd be a ordered list of CIs computed at some point of an execution of Algorithm 3. Then (i) the length of Hadd is bounded by the number of CIs in T and (ii) The number of replacements of an existing CI α ∈ Hadd is bounded polynomially in |T |. The rest of the section is devoted to proving Lemma 41. We first show Point (ii) of Lemma 41 and start by generalising Lemma 32 on the size of T -essentials CIs. For any conjunction C of concept names we set CT = {D | T |= C ⊑ A1 ⊓ · · · ⊓ Ak and A1 ⊓ · · · ⊓ Ak ⊑ D ∈ T } ∪ {B | T |= C ⊑ B, B basic concept over ΣT } Recall that for any concept expression C we denote by nC the number of nodes in the tree TC corresponding to C. Lemma 42 If α is T -essential, then nrhs(α) ≤ P D∈lhs(α)T nD . Proof Thedproof is almost the same as the proof of Lemma 32. Let D0 := D∈lhs(α)T D and let ID0 ,T be the canonical model can prove in almost the same way as in the proof of Lemma 32 h from Trhs(α) into ID0 ,T mapping ρrhs(α) to ρD0 ,T is an injective Lemma 14 for DL-Lite∃R,horn instead of DL-Lite∃R ). Assume α is T -essential. of D0 and T . Now one that the homomorphism mapping into ID0 (using ❏ We are now in the position to prove Point (ii) of Lemma 41. Lemma 43 The number of replacements of an existing CI α ∈ Hadd is bounded polynomially in |T |. 30 Exact Learning of Lightweight Description Logic Ontologies Proof A CI α ∈ Hadd can be replaced in Line 4 of CN-Refine or in Lines 5 or 8 of ∃-Refine. If α is replaced by α′ in Line 4 of CN-Refine or in Line 8 of ∃-Refine then lhs(α′ ) ( lhs(α), so the number of replacements is bounded by |ΣT |. If α is replaced by α′ in Line 5 of ∃-Refine, then either lhs(α′ ) ( lhs(α) or lhs(α′ ) = lhs(α). For the latter case one can show as in the proof of Lemma 33 for DL-Lite∃R , the following Claim. If A1 ⊓ · · · ⊓ An ⊑ C and A1 ⊓ · · · ⊓ An ⊑ C ′ are T -essential, and ∅ |= C ′ ⊑ C, then TC is obtained from TC ′ by removing subtrees. Thus, each time α ∈ Hadd is replaced in Line 5 of ∃-Refine without decreasing the number of concept names in lhs(α), the number nrhs(α) of nodes in the tree representation of rhs(α) strictly increases. By Lemma 42, nrhs(α) is bounded polynomially in |T | and the lemma follows. ❏ We now come to the proof of Point (i) of Lemma 41. To formulate an upper bound on the length of Hadd in terms of T it is convenient to assume that the right-hand side of every CI in T is primitive, that is, either a concept name or a concept expression of the form ∃r.D. This assumption is w.l.o.g. since one can equivalently transform every CI C ⊑ D1 ⊓ D2 into two CIs C ⊑ D1 and C ⊑ D2 . We call such a TBox rhs-primitive. Note that CIs in H may still have multiple concepts on the right-hand side. A concept C is called concept saturated for T if T |= C ⊑ C ′ whenever C ′ results from C by adding a new concept name A′ to the label of some node in TC . Denote by C sat the (unique) concept obtained from C by adding concept names to the node labels of TC until it is concept saturated for T . The following definition enables us to link the CIs in Hadd to the CIs in T . Definition 44 Let T be rhs-primitive. We say that a CI α has target β ∈ T if 1. lhs(β) ⊆ lhs(α) and 2. there exists D ∈ rhs(α) \ lhs(α) such that ∅ |= rhs(β)sat ⊑ D. We aim to show that Algorithm 3 maintains the invariant that (iii) every α ∈ Hadd has some target β ∈ T and (iv) every β ∈ T is the target of at most one α ∈ Hadd . Then Point (i) of Lemma 41 clearly follows. Example 45 To illustrate Definition 44, suppose that T = {A1 ⊓ A4 ⊑ A2 , A2 ⊑ ∃r.A3 , A3 ⊑ A4 , Ar ≡ ∃r.⊤} is the target TBox. T is rhs-primitive. To simplify notation, we use βi to denote the i-th CI occurring in T above. Assume Hbasic = {β3 , β4 } and Hadd = ∅. Let α1 = A1 ⊓ A3 ⊑ A2 . Then there is no βi ∈ T such that α1 has target βi . However, by applying left saturation for H to α1 we obtain α′1 = A1 ⊓ A3 ⊓ A4 ⊑ A2 and since lhs(β1 ) ⊆ lhs(α′1 ) and A2 6∈ lhs(α′1 ), α′1 has target β1 . For α2 = A1 ⊓ A4 ⊑ ∃r.A3 , there is no βi ∈ T such that α2 has target βi . But α2 is not T -essential and making it T -essential results in α′2 = A1 ⊓ A4 ⊑ 31 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Ar ⊓ A1 ⊓ A2 ⊓ A4 ⊓ ∃r.(A3 ⊓ A4 ) which again has target β1 . Finally, let α3 = A2 ⊑ ∃r.A4 . As lhs(β2 ) ⊆ lhs(α3 ) and ∅ |= Ar ⊓ ∃r.(A3 ⊓ A4 ) ⊑ ∃r.A4 , α3 has target β2 . Note that α3 is not T -essential, but the result of making it T -essential also has target β2 . Point (iii) is a consequence of the following lemma. Lemma 46 Let T be rhs-primitive and let γ be a T -essential CI such that ∅ 6|= γ. Then γ has some target β ∈ T . Proof Assume γ is T -essential and ∅ 6|= γ. Assume for a proof by contradiction that γ has no target in T . We first show the following Claim 1. If γ has no target in T and T |= lhs(γ) ⊑ A then A ∈ lhs(γ), for all A ∈ NC . For the proof of Claim 1, consider the canonical model Ilhs(γ),T of lhs(γ) and T . Recall that ρlhs(γ),T denotes the root of Ilhs(γ),T . By Lemma 12, ρlhs(γ),T ∈ D Ilhs(γ),T iff T |= lhs(γ) ⊑ D, for any concept D. Thus, it suffices to prove that ρlhs(γ),T ∈ AIlhs(γ),T implies A ∈ lhs(γ), for all concept names A. The proof is by induction over the sequence I0 , . . . used to construct Ilhs(γ),T , where I0 = Ilhs(γ) . For Ilhs(γ) this is the case by definition. Now suppose the claim holds for In and ρlhs(γ),T ∈ AIn+1 \ AIn . Then there either exist concept names A1 , . . . , Ak with A1 ⊓ · · · ⊓ Ak ⊑ A ∈ T and ρlhs(γ),T ∈ (A1 ⊓ · · · ⊓ Ak )In or there exists ∃r.⊤ with ∃r.⊤ ⊑ A ∈ T and ρlhs(γ),T ∈ (∃r.⊤)In . In the first case, we have {A1 , . . . , Ak } ⊆ lhs(γ) by induction hypothesis and so A ∈ lhs(γ) because otherwise A1 ⊓ · · · ⊓ Ak ⊑ A would be a target of γ. In the second case there must be an Im with m < n such that there are E1 ⊓ · · · ⊓ Ek ⊑ ∃s.D ∈ T and s ⊑ r ∈ T with ρlhs(γ),T ∈ (E1 ⊓ · · · ⊓ Ek )Im (the case s = r is similar and omitted). It follows that A ∈ lhs(γ) because otherwise E1 ⊓ · · · ⊓ Ek ⊑ ∃s.D would be a target of γ since, by induction hypothesis, {E1 , . . . , Ek } ⊆ lhs(γ) and A ∈ (∃s.D)sat . This finishes the proof of Claim 1. By Claim 1, as ∅ 6|= γ, there is a conjunct of thed form ∃r.F in rhs(γ). Let (lhs(α))T be as above and ID0 ,T be the canonical model of D0 = D∈(lhs(α))T D and T . As ∃r.F ∈ rhs(γ) and γ is T -essential one can show in the same way as in the proof of Lemma 32 that there is an injective homomorphism from the labelled tree T∃r.F corresponding to ∃r.F into the restriction of ID0 ,T to ∆ID0 mapping the root of T∃r.F to the root ρD0 ,T of ID0 ,T . Thus, by definition of (lhs(α))T , there is β ∈ T such that T |= lhs(α) ⊑ lhs(β) and ∅ |= rhs(β)sat ⊑ ∃r.F . By Lemma 12, ρlhs(γ),T ∈ AIlhs(γ),T , for all A ∈ lhs(β). Hence, by Claim 1 and again Lemma 12, lhs(β) ⊆ lhs(γ). We have shown that γ has target β and so derived a contradiction. ❏ Point (iii) is a direct consequence of Lemma 46 and the fact that all CIs in Hadd are T -essential (Lemma 38). To prove Point (iv), we first establish the following intermediate Lemmas 47 and 48. Lemma 47 Let T be rhs-primitive and let H, γ be inputs to CN-Refine. Let αi ∈ Hadd , β ∈ T , and concept name A 6∈ lhs(γ) satisfy the following conditions: (a) lhs(β) ⊆ lhs(γ); (b) T |= lhs(β) ⊑ A; (c) lhs(β) ⊆ lhs(αi ). Then there is some j ≤ i such that αj is replaced in Line 4 of CN-Refine. 32 Exact Learning of Lightweight Description Logic Ontologies Proof Assume H, γ, αi , β, and A satisfy the conditions of the lemma. If CN-Refine replaces some αj with j < i then we are done. Suppose this does not happen. Then we need to show that αi is replaced. By Conditions (a), (b), and (c), T |= lhs(γ) ∩ lhs(αi ) ⊑ A. As γ is left saturated for H, A 6∈ lhs(γ) implies that H 6|= lhs(γ) ⊑ A. So H 6|= lhs(γ) ∩ lhs(αi ) ⊑ A. Then, the condition in Lines 1 and 2 of CN-Refine is satisfied and αi is replaced. ❏ Lemma 48 Let T be rhs-primitive and let H, γ be inputs to ∃-Refine. If γ has target β ∈ T and αi ∈ Hadd satisfies lhs(β) ⊆ lhs(αi ), then there is some j ≤ i such that αj is replaced in Line 5 or 8 of ∃-Refine. Proof Let H, γ, β, and αi satisfy the conditions of the lemma. If ∃-Refine replaces some αj with j < i then we are done. Suppose this does not happen. We need to show that αi is replaced. We first show that there is a concept C of the form ∃r.F in rhs(γ) such that lhs(γ) ⊑ C has target β. Note that if Algorithm 3 calls ∃-Refine then there is no concept name A such that T |= lhs(γ) ⊑ A and H 6|= lhs(γ) ⊑ A (Line 10). As γ is left saturated for H and T -essential, this implies NC ∩ rhs(γ) ⊆ lhs(γ). But then any C ∈ rhs(γ) \ lhs(γ) with ∅ |= rhs(β)sat ⊑ C is compound. As γ has target β it follows that lhs(γ) ⊑ C has target β for some C of the form ∃r.F in rhs(γ). By Line 5 of Algorithm 3, there is only one such conjunct C in rhs(γ). From ∅ |= rhs(β)sat ⊑ C we obtain T |= lhs(β) ⊑ C. Since lhs(β) ⊆ lhs(γ) ∩ lhs(αi ), we have that T |= lhs(γ) ∩ lhs(αi ) ⊑ C. As γ is a positive counterexample, H 6|= γ. From NC ∩ rhs(γ) ⊆ lhs(γ) we thus obtain H 6|= lhs(γ) ⊑ C, and so, H 6|= lhs(αi ) ∩ lhs(γ) ⊑ C. Hence, the condition in Lines 1 and 2 of ∃-Refine is satisfied and αi is replaced (in Line 5 or 8). ❏ Point (iv) above is now a direct consequence of the following lemma. Lemma 49 At any point in the execution of Algorithm 3, if αj ∈ Hadd has target β ∈ T then lhs(β) 6⊆ lhs(αi ), for all i < j. Proof The proof is by induction on the number k of iterations. For k = 1 the lemma is vacuously true. Assume it holds for k = n, n ≥ 1. Now the algorithm modifies Hadd in response to receiving a positive counterexample in iteration k = n + 1. We make a case distinction: Case 1. Algorithm 3 calls CN-Refine: Let H, γ be the inputs to CN-Refine. Assume first that the condition in Lines 1 and 2 is not satisfied. Then CN-Refine appends the result of concept saturating γ for T to Hadd . Call this CI γ ′ . Suppose that the lemma fails to hold. This can only happen if γ ′ has a target β ∈ T and there is αi ∈ Hadd such that lhs(β) ⊆ lhs(αi ). Then, since lhs(γ ′ ) = lhs(γ), we have that lhs(β) ⊆ lhs(γ) and, since rhs(γ ′ ) ⊆ NC , there is a concept name A 6∈ lhs(γ) such that ∅ |= rhs(β)sat ⊑ A. So T |= lhs(β) ⊑ A. Then Lemma 47 applies to H, γ, αi , β and A which contradicts the assumption that CN-Refine did not replace any αj ∈ Hadd , j ≤ i. Now assume that the condition in Lines 1 and 2 is satisfied. Suppose that the lemma fails to hold. This can only happen if there are αi , αj ∈ Hadd with i < j such that either (a) αi is replaced by α′i , lhs(β) ⊆ lhs(α′i ) and αj has target β; or (b) αj is replaced by α′j , α′j has target β and lhs(β) ⊆ lhs(αi ). In case (a), from lhs(γ) ∩ lhs(αi ) = lhs(α′i ), we obtain 33 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter lhs(β) ⊆ lhs(γ) ∩ lhs(αi ). Thus, lhs(β) ⊆ lhs(αi ). This contradicts the induction hypothesis. Now assume case (b). Since α′j has target β, we obtain: 1. lhs(β) ⊆ lhs(α′j ); and 2. as rhs(α′j ) ⊆ NC , there is A ∈ NC with A ∈ rhs(α′j ) \ lhs(α′j ) and ∅ |= rhs(β)sat ⊑ A. Since lhs(γ) ∩ lhs(αj ) = lhs(α′j ), it follows from Point 1 that lhs(β) ⊆ lhs(αj ) and lhs(β) ⊆ lhs(γ). From ∅ |= rhs(β)sat ⊑ A we obtain T |= lhs(β) ⊑ A. If A ∈ rhs(α′j ) \ lhs(α′j ) then either A ∈ rhs(αj ) \ lhs(αj ) or A 6∈ lhs(γ). So either αj has target β or A 6∈ lhs(γ). αj does not have target β as this would contradict the induction hypothesis. Thus, A 6∈ lhs(γ) and the conditions of Lemma 47 are satisfied by H, γ, αi , β, and A. Thus, some αi′ with i′ ≤ i is replaced which contradicts the assumption that αj is replaced. Case 2. Algorithm 3 calls ∃-Refine: Let H, γ be the inputs to ∃-Refine. Assume first that the condition in Lines 1 and 2 is not satisfied. Then ∃-Refine appends γ to Hadd . Suppose the lemma fails to hold. This can only happen if γ has a target β ∈ T and there is αi ∈ Hadd such that lhs(β) ⊆ lhs(αi ). By Lemma 48, this contradicts the assumption that ∃-Refine did not replace any αj ∈ Hadd , j ≤ i. Assume now that the condition in Lines 1 and 2 is satisfied. Suppose that the lemma fails to hold. This can only happen if there are αi , αj ∈ Hadd with i < j such that either (a) αi is replaced by α′i , lhs(β) ⊆ lhs(α′i ) and αj has target β; or (b) αj is replaced by α′j , α′j has target β and lhs(β) ⊆ lhs(αi ). For case (a) we argue as above: from lhs(γ)∩lhs(αi ) = lhs(α′i ), we obtain lhs(β) ⊆ lhs(γ) ∩ lhs(αi ). Thus, lhs(β) ⊆ lhs(αi ), which contradicts the induction hypothesis. Now assume case (b). As α′j has target β, we obtain the following: 1. lhs(β) ⊆ lhs(α′j ); and 2. there is D ∈ rhs(α′j ) \ lhs(α′j ) and ∅ |= rhs(β)sat ⊑ D. Since lhs(γ) ∩ lhs(αj ) = lhs(α′j ), it follows from Point 1 that lhs(β) ⊆ lhs(αj ) and lhs(β) ⊆ lhs(γ). Recall that if Algorithm 3 calls ∃-Refine then there is no A ∈ NC such that T |= lhs(γ) ⊑ A and H 6|= lhs(γ) ⊑ A. So NC ∩ rhs(γ) ⊆ lhs(γ) (by left saturation of γ for H). Assume D ∈ NC . Since D ∈ rhs(α′j ) \ lhs(α′j ) (Point 2), it follows that D 6∈ lhs(αj ). As lhs(α′j ) ⊆ lhs(αj ), we have that D ∈ rhs(αj ). So D ∈ rhs(αj ) \ lhs(αj ). This means that αj has target β, which contradicts the induction hypothesis. Otherwise, D is of the form ∃r.F . Then, either D ∈ rhs(γ) or there is D ′ ∈ rhs(αj ) such that ∅ |= D ⊑ D ′ . In the latter case, D ′ ∈ rhs(αj ) \ lhs(αj ) and ∅ |= rhs(β)sat ⊑ D ′ , so αj has target β, which contradicts the induction hypothesis. In the former case, γ has target β. Then H, γ, and αi satisfy the conditions of Lemma 48. Thus, some αi′ with i′ ≤ i is replaced which contradicts the assumption that αj is replaced. ❏ We have proved the main result of this section. Theorem 50 DL-Lite∃R,horn TBoxes are polynomial query learnable using membership and equivalence queries. Moreover, DL-Lite∃R,horn TBoxes without inverse roles can be learned in polynomial time using membership and equivalence queries. 34 Exact Learning of Lightweight Description Logic Ontologies Proof Polynomial query learnability of DL-Lite∃R,horn TBoxes follows from Lemma 41 and the analysis of the number of membership queries in Lemmas 39 and 40, see the proof of Theorem 34. For the second part observe that the only potentially costly steps are entailment checks of the form H |= α, where H is a DL-Lite∃R,horn TBox and α a DL-Lite∃R,horn CI, both without inverse roles. Then both H and α are in EL with role inclusions for which entailment is known to be in PTime (Baader et al., 2005). ❏ 5. Learning ELlhs TBoxes We study polynomial learnability of TBoxes in the restriction ELlhs of EL in which only concept names are allowed on the right-hand side of CIs. We assume that CIs used in membership queries and in equivalence queries and those returned as counterexamples are also of this restricted form and show that under this assumption ELlhs TBoxes can be learned in polynomial time. As in the previous section, our learning algorithm is an extension of the polynomial time algorithm for learning propositional Horn theories presented by (Angluin et al., 1992; Arias and Balcázar, 2011). There is a certain similarity between the learning algorithm of this section and the DL-Lite∃R,horn learning algorithm introduced in Section 4. In both cases the left-hand side of inclusions can contain complex concept expressions, which, unless addressed, might lead to several counterexamples with unnecessarily strong left-hand sides targeting the same inclusion in the target TBox. In Algorithm 3 storing multiple such counterexamples in Hadd is prevented by taking the intersection of the set of conjuncts of the left-hand sides. To deal with the more complex left-hand sides of inclusions in ELlhs , a more sophisticated way of ‘taking the intersection’ of concept expressions is required. To define it, we identify concept expressions with tree-shaped interpretations and then take their product. Products have also been employed in the construction of least common subsumers (Baader et al., 1999). In detail, we say interpretation I is a ditree interpretation if the directed graph S that an I with E = r∈NR r is a directed tree and r I ∩ sI = ∅ for all distinct r, s ∈ NR . We denote the root of a ditree interpretation I with ρI . The interpretation IC corresponding to an EL concept expression C is a ditree interpretation with root ρC . Conversely, every ditree interpretation I can be viewed as an EL concept expression CI in the same way as any labelled tree T with edge labels that are role names (rather than arbitrary roles) can be seen as an EL concept expression. (∆I , E) An interpretation I is a T -countermodel for a given ELlhs TBox T if I 6|= T . Notice that for any ELlhs inclusion C ⊑ A with T |= C ⊑ A and ∅ 6|= C ⊑ A the interpretation IC is a T -countermodel. Indeed, by construction of IC , we have ρC ∈ C IC and, as ∅ 6|= C ⊑ A, we have ρC ∈ / AIC . So IC 6|= C ⊑ A and, as T |= C ⊑ A, we have IC 6|= T . Conversely, given a T -countermodel I, a learning algorithm can construct in polynomial time in |ΣT | all inclusions of the form CI ⊑ A, where A is a concept name, such that T |= CI ⊑ A by posing membership queries to the oracle. Thus a learning algorithm can use inclusions and T -countermodels interchangeably. We prefer working with interpretations as we can then use the notion of products to define the ‘intersection of concept expressions’ and the results of Section 2 linking homomorphisms with entailment in a direct way. 35 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter A B d1 Ae d2 (d2 , e1 ) = × d0 A (d1 , e1 ) 1 e0 (d2 , e0 ) (d1 , e0 ) (d0 , e1 ) (d0 , e0 ) Figure 10: Illustration to Example 52. The product of two interpretations I and J is the interpretation I × J with ∆I×J = ∆I × ∆J AI×J = {(d, e) | d ∈ AI , e ∈ AJ } r I×J = {((d, e), (d′ , e′ )) | (d, d′ ) ∈ r I , (e, e′ ) ∈ r J } Products preserve the membership in EL concept expressions (Lutz et al., 2011): Lemma 51 For all interpretations I and J , all d ∈ ∆I and e ∈ ∆J , and for all EL concept expressions C the following holds: d ∈ C I and e ∈ C J if, and only if, (d, e) ∈ C I×J . One can easily show that the product of ditree interpretations is a disjoint union of ditree interpretations. If I and J are ditree interpretations, we denote by I ×ρ J the maximal ditree interpretation that is a subinterpretation of I × J and contains (ρI , ρJ ). Example 52 Figure 10 depicts the product of the ditree interpretations I with root d0 and J with root e0 . The ditree interpretation I ×ρ J has root (d0 , e0 ) and does not contain the nodes (d2 , e0 ), (d1 , e0 ) and (d0 , e1 ) from I × J . Observe that the product IC ×ID of concept expressions C = A1 ⊓· · ·⊓An and D = B1 ⊓· · ·⊓ Bm , where A1 , . . . , An and B1 , . . . , Bm are concept names, coincides with the interpretation IE , where E is the conjunction of all concept names in {A1 , . . . , An } ∩ {B1 , . . . , Bm }. Thus, products can be seen as a generalisation of taking the intersection of the concept names from the left-hand side of DL-Lite∃R,horn concept inclusions used in Section 4. We will now describe a class of T -countermodels that are in a sense minimal and central to our learning algorithm. Let T be the ELlhs TBox to be learned, and assume that its signature ΣT is known to the learner. For a ditree interpretation I, we use I|− ρ to denote the interpretation obtained from I by removing the root ρI of I. For any d ∈ ∆I \ {ρI }, we use I|− d↓ to denote I with the subtree rooted at d removed. A T -countermodel is essential if the following conditions are satisfied: 1. I|− ρ |= T ; I 2. I|− d↓ |= T for all d ∈ ∆ \ {ρI }. Intuitively, Condition 1 states that I contradicts T only at the root, that is, the only reason for why I does not satisfy T is that for at least one CI C ⊑ A ∈ T , we have that ρI ∈ C I and ρI ∈ / AI . Condition 2 is a minimality condition which states that for any such 36 Exact Learning of Lightweight Description Logic Ontologies Algorithm 6 The learning algorithm for ELlhs TBoxes Input: ELlhs TBox T given to the oracle; ΣT given to the learner. Output: TBox H, computed by the learner, such that T ≡ H. 1: Set I to the empty list (of ditree interpretations) 2: Set H = ∅ 3: while H 6≡ T do 4: Let C ⊑ A be the returned positive counterexample for T relative to H 5: Find an essential T -countermodel I with I |= H 6: if there is a J ∈ I such that J 6→ρ (I ×ρ J ) and I ×ρ J 6|= T then 7: Let J be the first such element of I 8: Find an essential T -countermodel J ′ ⊆ I ×ρ J 9: Replace J in I with J ′ 10: else 11: Append I to I 12: end if 13: Construct H = {CI ⊑ A | I ∈ I, A a concept name in ΣT , T |= CI ⊑ A} 14: end while 15: return H C ⊑ A ∈ T , ρI is no longer in C I if we remove any node from I. Example 61 at the end of this section shows that working with essential T -countermodels is needed for our learning algorithm to be in polynomial time. The algorithm for learning ELlhs TBoxes is given as Algorithm 6. It maintains an ordered list I of ditree interpretations that intuitively represents the TBox H constructed in Line 13. In Line 6 we write I →ρ J if there is a homomorphism from a ditree interpretation I to a ditree interpretation J mapping ρI to ρJ . I 6→ρ J denotes that no such homomorphism exists. By Lemma 10, I →ρ J iff ∅ |= CJ ⊑ CI which can be checked in polynomial time in the size of I and J . In Line 8, we write J ′ ⊆ I ×ρ J as shorthand for the condition that J ′ is a subinterpretation of I ×ρ J that is obtained from I ×ρ J by removing subtrees. Note that the assumption in Line 4 that a positive counterexample is returned is justified by the construction of H in Lines 2 and 13, which ensures that, at all times, T |= H. We now provide additional details on how to realise lines 5, 8 and 13. Line 13 is the easiest: we simply use membership queries ‘T |= CI ⊑ A?’ with I ∈ I and A ∈ ΣT to find all CIs CI ⊑ A entailed by T . We will later show that the length of I is bounded polynomially in |T | and that each interpretation in I is replaced only polynomially many times, therefore polynomially many membership queries suffice. Lines 5 and 8 are addressed by Lemmas 53 and 54 below. Lemma 53 Given a positive counterexample C ⊑ A for T relative to H, one can construct an essential T -countermodel I with I |= H using only polynomially many membership queries in |T | + |C|. 37 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Proof Let C ⊑ A be a positive counterexample for T relative to H. Let IC be the ditree interpretation of C. First observe that IC 6|= T : since H 6|= C ⊑ A, we know that A does not occur as a top-level conjunct in C. Consequently, ρC ∈ C IC \ AIC and thus IC 6|= T . We construct an essential T -countermodel I with I |= H by applying the following rules to I := IC . 1. Saturate I by exhaustively applying the CIs from H as rules: if D ⊑ B ∈ H and d ∈ D I , then add d to B I . 2. Replace I by a minimal subtree of I refuting T to address Condition 1 of essential T -countermodels. To describe how this can be achieved using membership queries denote for d ∈ ∆I by I|d the ditree interpretation obtained from I by taking the subtree of I rooted in d. Now check using membership queries for any d ∈ ∆I \ {ρI } and concept name B whether T |= CI|d ⊑ B. Then replace I by any I|d such that there exists a B with T |= CI|d ⊑ B and d 6∈ B I|d but there does not exist a d′ in ∆I|d and a B ′ with T |= CI|d′ ⊑ B ′ and d′ 6∈ B I|d′ . If no such d and B exist, then I is not replaced. 3. Exhaustively remove subtrees from I until Condition 2 of essential T -countermodels − is also satisfied: if I|− d↓ 6|= T , then replace I by I|d↓ . This can again be achieved using the membership queries T |= CI|− ⊑ B for B a concept name. d↓ Now we show that the interpretation J constructed above has the required properties. First observe that J |= H: clearly, the interpretation I constructed in Step 1 is a model of H. As taking subtrees and removing subtrees from I preserves being a model of H, we conclude that J |= H. Next we show that J 6|= T : the interpretation I constructed in Step 1 is not a model of T . In fact, we can use CI ⊑ A as a positive counterexample for T relative to H instead of C ⊑ A. Observe that ∅ |= CI ⊑ C, and thus T |= C ⊑ A implies T |= CI ⊑ A. On the other hand, ρI ∈ B I implies H |= C ⊑ B for all concept names B. Consequently and since H 6|= C ⊑ A, we have ρI ∈ / AI . Thus I 6|= T . By construction, Steps 2 and 3 preserve the condition that I is not a model of T and so J 6|= T . It remains to argue that J satisfies Conditions 1 and 2 for essential T -countermodels for H. But Condition 1 is ensured by Step 2 and Condition 2 is ensured by Step 3, respectively. ❏ Lemma 54 Given essential T -countermodels I and J with I ×ρ J 6|= T , one can construct an essential T -countermodel J ′ ⊆ I ×ρ J using only polynomially many membership queries in |T | + |I| + |J |. Proof Let I and J be essential T -countermodels with I ×ρ J 6|= T . Obtain the interpretation J ′ from I ×ρ J by exhaustively applying Rule 3 from the proof of Lemma 53. As argued above, applying Rule 3 can be implemented using membership queries and J ′ is a T -countermodel. Thus, it remains to argue that it satisfies Conditions 1 and 2 for T -essential countermodels. For Condition 1, we have to show that J ′ |− ρ |= T . We know − − − − that I|ρ |= T and J |ρ |= T . Thus, by Lemma 51, I|ρ × J |ρ |= T . Now J ′ |− ρ is obtained − by removing subtrees and removing subtrees preserves being a model of an from I|− × J | ρ ρ 38 Exact Learning of Lightweight Description Logic Ontologies ′ − ELlhs TBox. Thus, J ′ |− ρ |= T . For Condition 2, we have to show that J |d↓ |= T for all ′ d ∈ ∆J \ {ρJ ′ }. But if this is not the case, then the subtree rooted at d would have been removed during the construction of J ′ from I ×ρ J using Rule 3. ❏ If Algorithm 6 terminates, then it obviously returns a TBox H that is equivalent to the target TBox T . It thus remains to prove that the algorithm terminates after polynomially many steps, which is a consequence of the following lemma. Lemma 55 Let I be a list computed at some point of an execution of Algorithm 6. Then (i) the length of I is bounded by the number of CIs in T and (ii) each interpretation in each position of I is replaced only |T | + |T |2 often with a new interpretation. The rest of this section is devoted to proving Lemma 55. For easy reference, assume that at each point of the execution of the algorithm, I has the form I0 , . . . , Ik for some k ≥ 0. To establish Point (i) of Lemma 55, we closely follow (Angluin et al., 1992) and show that (iii) for every Ii , there is a Di ⊑ Ai ∈ T with Ii 6|= Di ⊑ Ai and (iv) if i 6= j, then Di ⊑ Ai and Dj ⊑ Aj are not identical. In fact, Point (iii) is immediate since whenever a new Ii is added to I in the algorithm, then Ii is a T -countermodel. To prove Point (iv), we first establish the intermediate Lemma 56 below. For a ditree interpretation I and a CI C ⊑ A, we write I |=ρ C ⊑ A if ρI ∈ / C I or ρI ∈ AI ; that is, the CI C ⊑ A is satisfied at the root of I, but not necessarily at other points in I. It is easy to see that if some interpretation I is a T -countermodel, then there is C ⊑ A ∈ T such that I 6|=ρ C ⊑ A. The following lemma shows under which conditions Algorithm 6 replaces an interpretation in the list I. Lemma 56 If the interpretation I constructed in Line 5 of Algorithm 6 satisfies I 6|=ρ C ⊑ A ∈ T and ρIj ∈ C Ij for some j, then J = Ii is replaced with J ′ in Line 9 for some i ≤ j. Proof Assume that the interpretation I constructed in Line 5 of Algorithm 6 satisfies I 6|=ρ C ⊑ A ∈ T and that there is some j with ρIj ∈ C Ij . If there is some i < j such that Ii 6→ρ (I ×ρ Ii ) and I ×ρ Ii 6|= T , then J = Ii′ will be replaced with J ′ in Line 9 for some i′ ≤ i and we are done. Thus assume that there is no such i. We aim to show that J = Ij is replaced with J ′ in Line 9. To this end, it suffices to prove that Ij 6→ρ (I ×ρ Ij ) and I ×ρ Ij 6|= T . The latter is a consequence of I 6|=ρ C ⊑ A and ρIj ∈ C Ij . Assume to the contrary of what we have to show that Ij →ρ (I ×ρ Ij ). We establish a contradiction against I |= H (which holds by construction of I in the algorithm) by showing that 1. I 6|=ρ CIj ⊑ A and 2. CIj ⊑ A ∈ H. 39 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter For Point 1, Ij →ρ (I ×ρ Ij ) and ρIj ∈ (CIj )Ij imply ρI×ρ Ij ∈ (CIj )I×ρ Ij , which gives ρI ∈ (CIj )I , by Lemma 51. It remains to observe that I 6|=ρ C ⊑ A implies ρI ∈ / AI . In view of the construction of H in the algorithm, Point 2 can be established by showing that T |= CIj ⊑ A. Since C ⊑ A ∈ T , it suffices to prove that ∅ |= CIj ⊑ C. This, however, is an immediate consequence of the fact that ρIj ∈ C Ij and the definition of CIj . ❏ Now, Point (iv) above is a consequence of the following. Lemma 57 At any time of the algorithm execution, the following condition holds: if Ii 6|=ρ C ⊑ A ∈ T and j < i, then ρIj ∈ / C Ij . Proof We prove the invariant formulated in Lemma 57 by induction on the number of iterations of the while loop. Clearly, the invariant is satisfied before the loop is entered. We now consider the two places where I is modified, that is, Line 9 and Line 11, starting with the latter. In Line 11, I is appended to I. Assume that I |6 =ρ C ⊑ A ∈ T . We have to show that, before I was added to I, there was no Ii ∈ I with ρIi ∈ C Ii . This, however, is immediate by Lemma 56. Now assume that J was replaced in Line 9 with J ′ . We have to show two properties: / C Ij . 1. If J ′ = Ii 6|=ρ C ⊑ A ∈ T and j < i, then ρIj ∈ Assume to the contrary that ρIj ∈ C Ij . Since J ′ is obtained from I × J by removing subtrees (see Lemma 54), J ′ 6|=ρ C ⊑ A implies I × J 6|=ρ C ⊑ A. Consequently, I 6|=ρ C ⊑ A or J 6|=ρ C ⊑ A. The former and ρIj ∈ C Ij yields i ≤ j by Lemma 56, in contradiction to j < i. In the latter case, since Ii = J before the replacement of J with J ′ , we have a contradiction against the induction hypothesis. / C Ij . 2. If J ′ = Ij and Ii 6|=ρ C ⊑ A ∈ T with i > j, then ρIj ∈ Assume to the contrary that ρIj ∈ C Ij . Since J ′ is obtained from I ×ρ J by removing subtrees, we then have ρI×ρ J ∈ C I×ρ J , thus ρJ ∈ C J . Since Ij = J before the replacement of J with J ′ , we have a contradiction against the induction hypothesis. ❏ We now turn towards proving Point (ii) of Lemma 55. It is a consequence of Lemma 59 below. Lemma 58 If I is an essential T -countermodel, then |∆I | ≤ |T |. Proof Let I be an essential T -countermodel. Then I 6|= T , but I|− ρ |= T . It follows that I I there is a C ⊑ A ∈ T such that ρI ∈ C \ A . By Lemma 8, there is a homomorphism h from IC to I mapping ρIC to ρI . We show that |∆I | ≤ |C|, from which |∆I | ≤ |T | follows. It suffices to show that h is surjective. Assume that this is not the case and let d ∈ ∆I be outside the range of h. Then h is a homomorphism from IC to J := I|− d↓ . Therefore, J J ρ ∈ C by Lemma 8, which implies J 6|= C ⊑ A. But J 6|= C ⊑ A contradicts the assumption that I is an essential T -countermodel as it violates Condition 2 of being an essential T -countermodel. ❏ 40 Exact Learning of Lightweight Description Logic Ontologies Lemma 59 Let I0 , . . . , In be a list of interpretations such that Ii+1 replaces Ii in Line 9 for all i < n. Then n ≤ |T | + |T |2 . Proof Let I and J be ditree interpretations. We set I ≤ρ J if ρI ∈ AI implies ρJ ∈ AJ for all concept names A. We first show that for every i < n either (a) Ii 6≤ρ Ii+1 or (b) Ii+1 →ρ Ii via a surjective homomorphism. For a proof by contradiction assume that there is i < n such that neither (a) nor (b) holds. Since Ii+1 is obtained from some I ×ρ Ii by removing subtrees and (I ×ρ Ii ) →ρ Ii we obtain that Ii+1 →ρ Ii . Since Ii+1 is an essential T -countermodel, there is a C ⊑ A ∈ T such that Ii+1 6|=ρ C ⊑ A. Let J be the subinterpretation of Ii determined by the range of the homomorphism h from Ii+1 to Ii mapping ρIi+1 to ρIi . By Lemma 8, ρJ ∈ C J and so, since ρJ 6∈ AJ because (a) does not hold, J 6|=ρ C ⊑ A. Ii is an essential T -countermodel and so J = I. But then h is surjective and we have derived a contradiction. In addition to the property stated above, we also have for all i < n: (c) Ii+1 ≤ρ Ii and (d) Ii 6→ρ Ii+1 . It follows that for any i < n with Ii ≤ρ Ii+1 either |∆Ii | < |∆Ii+1 | or |AIi | < |AIi+1 | for some concept name A. By Lemma 58 we have |∆Ii | ≤ |T | for all i ≤ n. Hence k − j ≤ |T |2 for any subsequence Ij . . . , Ik of I0 , . . . , In with Ii ≤ρ Ii+1 for all j ≤ i < k. It follows that n ≤ |T | + |T |2 . ❏ We have thus established the main result of this section. Note that we obtain a polynomial time learning algorithm since checking T |= α is in polynomial times for EL TBoxes T and EL CIs α (as discussed in Section 2). Theorem 60 ELlhs TBoxes are polynomial time learnable using membership and equivalence queries. The following example shows that Algorithm 6 does not terminate in polynomial time if in Line 5 it does not transform the given counterexample into an essential T -countermodel. Example 61 Assume that Line 5 of Algorithm 6 does not modify the counterexample C ⊑ A given in Line 4 if the second condition for essential T -countermodels (IC |− d↓ |= T − I for all d ∈ ∆ C \ {ρIC }) is satisfied but the first condition (IC |ρ |= T ) does not hold. Then for the target TBox T = {∃r.A ⊑ A} the oracle can return the infinite sequence of positive counterexamples ∃r n .A ⊑ A, with n a prime number. In fact, Algorithm 6 would simply construct the list I of interpretations I∃rn .A , n a prime number, and would not terminate. To show this observe that Algorithm 6 would never replace a CI in the list I by another CI since I∃rn .A ×ρ I∃rn+m .A = I∃rn .⊤ and I∃rn .⊤ |= T . 41 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Now assume that Line 5 of Algorithm 6 does not modify the counterexample C ⊑ A given in Line 4 if the first condition for essential T -countermodels is satisfied but the second condition does not hold. Let T be a TBox containing ∃r.A ⊑ A and some CIs containing the concept names B1 and B2 , say, for simplicity, B1 ⊑ B1 and B2 ⊑ B2 . Let ϕ1 = ∃r.(B1 ⊓ B2 ) and ϕn+1 = ∃r.(ϕn ⊓ B1 ⊓ B2 ). Then the oracle can return n positive counterexamples ∃r.A ⊓ Ci ⊑ A, where the tree TCi corresponding to Ci is the result of identifying the i-th node of the tree Tϕi corresponding to ϕi with the root of the tree corresponding to ∃r.(B1 ⊓ ϕn ) ⊓ ∃r.(B2 ⊓ ϕn ). Note that the product of IC1 , . . . , ICn is an interpretation with O(2n ) elements. Then, at the n-th iteration, Algorithm 6 computes an interpretation of exponential size in n. 6. Limits of Polynomial Learnability The main result of this section is that EL TBoxes are not polynomial query learnable using membership and equivalence queries. We also show that DL-Lite∃R TBoxes are not polynomial query learnable using membership or equivalence queries alone. The latter result also holds for ELlhs TBoxes. In this case, however, it follows already from the fact that propositional Horn logic is not polynomial query learnable from entailments using membership or equivalence queries alone (Frazier and Pitt, 1993; Angluin et al., 1992; Angluin, 1987a). We start by proving the non-polynomial query learnability result for EL TBoxes. On our way, we also prove non-polynomial query learnability of DL-Lite∃R TBoxes using membership queries only. Our proof shows that even acyclic EL TBoxes are not polynomial query learnable and, in fact, heavily relies on the additional properties of acyclic TBoxes. Recall that an EL TBox is called acyclic if it satisfies the following conditions (Baader et al., 2017; Konev et al., 2012): • all CIs and CEs are of the form A ⊑ C or A ≡ C, where A is a concept name; • no concept name occurs more than once on the left-hand side of a CI; • there are no cyclic definitions: there is no sequence α0 , . . . , αn of CIs such that the concept name on the left-hand side of α0 occurs in αn and the concept name on the left-hand side of αi+1 occurs in the right-hand side of αi for all i < n. Our non-polynomial query learnability proof is inspired by Angluin’s lower bound for the following abstract learning problem (Angluin, 1987b): a learner aims to identify one of N distinct sets L1 , . . . , LN which have the property that there exists a set L∩ for which Li ∩ Lj = L∩ , for any i 6= j. It is assumed that L∩ is not a valid argument to an equivalence query. The learner can pose membership queries “x ∈ L?” and equivalence queries “H = L?”. Then in the worst case it takes at least N − 1 membership and equivalence queries to exactly identify a hypothesis Li from L1 , . . . , LN . The proof proceeds as follows. At every stage of computation, the oracle (which here should be viewed as an adversary) maintains a set of hypotheses S, which the learner is not able to distinguish based on the answers given so far. Initially, S = {L1 , . . . , LN }. When the learner asks a membership query x, the oracle returns ’Yes’ if x ∈ L∩ and ’No’ otherwise. In the latter case, the (unique) Li such that x ∈ Li is removed from S. When the learner asks an equivalence query H, the 42 Exact Learning of Lightweight Description Logic Ontologies oracle returns ‘No’ and a counterexample x ∈ L∩ ⊕ H (the symmetric difference of L∩ and H). This always exists as L∩ is not a valid query. If the counterexample x is not a member of L∩ , (at most one) Li ∈ S such that x ∈ Li is eliminated from S. In the worst case, the learner has to reduce the cardinality of S to one to exactly identify a hypothesis, which takes N − 1 queries. Similarly to the method outlined above, in our proof we maintain a set of acyclic EL TBoxes whose members the learning algorithm is not able to distinguish based on the answers obtained so far. For didactic purposes, we first present a set of acyclic TBoxes SN = {T1 , . . . , TN }, where N is superpolynomial in the size of every TBox Ti , for which the oracle can respond to membership queries in the way described above but which is polynomial time learnable when equivalence queries are also allowed. We then show how the TBoxes can be modified to obtain a family of acyclic TBoxes that is not polynomial query learnable using membership and equivalence queries. To present the TBoxes in SN , fix two role names r and s. We use the following abbreviation. For any sequence σ = σ 1 σ 2 . . . σ n ∈ {r, s}n , the expression ∃σ.C stands for ∃σ 1 .∃σ 2 . . . ∃σ n .C. Then for every such sequence σ, of which there are N = 2n many, consider the acyclic EL TBox Tσ defined as Tσ = {A ⊑ ∃σ.M ⊓ X0 } ∪ T0 with T0 = {Xi ⊑ ∃r.Xi+1 ⊓ ∃s.Xi+1 | 0 ≤ i < n} . Observe that the canonical model IX0 ,T0 of X0 and T0 consists of a full binary tree whose edges are labelled with the role names r and s and with X0 at the root ρX0 , X1 at level 1, and so on. In the canonical model IA,Tσ of A and Tσ , the root is labelled by A and X0 and, in addition to the binary tree, there is a path given by the sequence σ whose endpoint is marked by the concept name M . One can use Angluin’s strategy to show that TBoxes from the set SN of all such TBoxes Tσ cannot be learned using polynomially many polynomial size membership queries only: notice that for no sequence σ′ 6= σ of length n, we have Tσ |= A ⊑ ∃σ′ .M . Thus a membership query of the form A ⊑ ∃σ.M eliminates at most one TBox from the set of TBoxes that the learner cannot distinguish. This observation can be generalised to arbitrary membership queries C ⊑ D in EL; however, we instead observe that the TBoxes Tσ are formulated in DL-Lite∃R and prove a stronger result. The proof, given in the appendix, uses the canonical model construction introduced in Section 2. Lemma 62 For every DL-Lite∃R CI B ⊑ D over the signature of Tσ , • either Tσ |= B ⊑ D for every Tσ ∈ SN • or there is at most one Tσ ∈ SN such that Tσ |= B ⊑ D. The argument outlined above immediately gives us the following side result. Theorem 63 DL-Lite∃R TBoxes (even without inverse roles) are not polynomial query learnable using only membership queries. 43 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter We return now to our proof that EL TBoxes are not polynomial query learnable using both membership and equivalence queries. Notice that the set of TBoxes SN is not suitable as a single equivalence query is sufficient to learn any TBox from SN in two steps: given the equivalence query {A ⊑ X0 } ∪ T0 , the oracle has no other option but to reveal the target TBox Tσ as A ⊑ ∃σ.M can be found ‘inside’ every counterexample. Our strategy to rule out equivalence queries with the ‘intersection TBox’ is to modify T1 , . . . , TN in such a way that although a TBox T∩ axiomatising the intersection over the set of consequences of each Ti , i ≤ N , exists, its size is superpolynomial and so it cannot be used as an equivalence query by a polynomial query learning algorithm. For every n > 0 and every n-tuple L = (σ1 , . . . , σn ), where every σi is a role sequence of length n as above, we define an acyclic EL TBox TL as the union of T0 and the following CIs and CEs:5 A1 ⊑ ∃σ1 .M ⊓ X0 An ⊑ ∃σn .M ⊓ X0 ... B1 ⊑ ∃σ1 .M ⊓ X0 Bn ⊑ ∃σn .M ⊓ X0 A ≡ X0 ⊓ ∃σ1 .M ⊓ · · · ⊓ ∃σn .M. Observe that every TL contains the TBoxes Tσi , 1 ≤ i ≤ n, discussed above with A replaced by any d of the three concept names A, Ai , Bi . In addition, every TL entails, among other CIs, ni=1 Ci ⊑ A, where every Ci is either Ai or Bi . There are 2n different such CIs, which indicates that every representation of the ‘intersection TBox’ requires superpolynomially many axioms. It follows from Lemma 67 below that this is indeed the case. Let Ln be a set of n-tuples such that for 1 ≤ i ≤ n and every L, L′ ∈ Ln with L = (σ1 , . . . , σn ), L′ = (σ1′ , . . . , σn′ ), if σi = σj′ then L = L′ and i = j. Then for any sequence σ of length n there exists at most one L ∈ Ln and at most one i ≤ n such that TL |= Ai ⊑ ∃σ.M and TL |= Bi ⊑ ∃σ.M . We can choose Ln such that there are N = ⌊2n /n⌋ different tuples in Ln . Notice that the size of each TL with L ∈ Ln is polynomial in n and so N is superpolynomial in the size of each TL with L ∈ Ln . Let the set of TBoxes that the learner cannot distinguish initially be SL = {TL | L ∈ Ln }. We use Σn to denote the signature of TL . For the proof of non-polynomial query learnability, we show that the oracle has a strategy to answer both membership and equivalence queries without eliminating too many TBoxes from SL . We start with the former. Unlike the DL-Lite∃R case presented above, membership query can eliminate more than one TBox from SL . Consider, for example, two TBoxes TL and TL′ , where {L, L′ } ⊆ Ln with L = (σ1 , . . . , σn ) and L′ = (σ1′ , . . . , σn′ ). Then the CI X0 ⊓ ∃σ1 .M ⊓ ∃σ1′ .M ⊓ A2 ⊓ · · · ⊓ An ⊑ A is entailed by both TL and TL′ but not by any other TL′′ with L′′ ∈ Ln . We prove, however, that the number of TBoxes eliminated from SL by a single membership query can be linearly bounded by the size of the query. 5. In fact, to prove non-polynomial query learnability, it suffices to consider ∃σ1 .M ⊓ · · · ⊓ ∃σn .M ⊑ A in place of the concept equivalence; however, CIs of this form are not allowed in acyclic TBoxes. CIs with a complex left-hand side or concept equivalences are essential for non-polynomial query learnability as any acyclic TBox containing expressions of the form A ⊑ C only is a DL-Lite∃R TBox and thus polynomially learnable with membership and equivalence queries (Section 3). 44 Exact Learning of Lightweight Description Logic Ontologies Lemma 64 For all EL CIs C ⊑ D over Σn : • either TL |= C ⊑ D for every L ∈ Ln • or the number of L ∈ Ln such that TL |= C ⊑ D does not exceed |C|. The proof of Lemma 64 is technical and is deferred to the appendix. To illustrate our proof method here we consider a particular case that deals with membership queries of the form C ⊑ ∃σ.M and is used in the proof of the general case. Both proofs rely on the following lemma from (Konev et al., 2012) that characterises CIs entailed by acyclic EL TBoxes. Lemma 65 (Konev et al.) Let T be andacyclic EL d TBox, r a role name and D an EL concept expression. Suppose that T |= 1≤i≤n Ai ⊓ 1≤j≤m ∃rj .Cj ⊑ D, where Ai are concept names for 1 ≤ i ≤ n, Cj are EL concept expressions for 1 ≤ j ≤ m, and m, n ≥ 0. Then the following holds: • if D is a concept name such that T does not contain any CE D ≡ C for any concept expression C, then there exists Ai , 1 ≤ i ≤ n, such that T |= Ai ⊑ D; • if D is of the form ∃r.D ′ then either (i) there exists Ai , 1 ≤ i ≤ n, such that T |= Ai ⊑ ∃r.D ′ or (ii) there exists rj , 1 ≤ j ≤ m, such that rj = r and T |= Cj ⊑ D ′ . The following lemma considers membership queries of the form C ⊑ ∃σ.M . Lemma 66 For any 0 ≤ m ≤ n, any sequence of role names σ = σ 1 . . . σ m ∈ {r, s}m , and any EL concept expression C over Σn : • either TL |= C ⊑ ∃σ.M for every TL with L ∈ Ln ; • or there is at most one TL such that TL |= C ⊑ ∃σ.M . Proof The lemma follows from the following claim. Claim. Let L = (σ1 , . . . , σn ) ∈ Ln be such that TL |= C ⊑ ∃σ.M . Then either (1) there exists i ≤ n such that σ = σi and C is of the form A ⊓ C ′ , Ai ⊓ C ′ or Bi ⊓ C ′ , for some EL concept expression C ′ ; or (2) we have ∅ |= C ⊑ ∃σ.M . Proof of Claim. We prove the claim by induction on m. If m = 0, by Lemma 65, the concept expression C is of the form Z ⊓ C ′ , for some concept name Z and concept expression C ′ such that TL |= Z ⊑ M . As TL |= Z ⊑ M does not hold for any concept name Z distinct from M , we obtain Z = M . Thus, ∅ |= C ⊑ M and Point (2) follows. Let m > 0. By Lemma 65 we have one of the following two cases: • C is of the form X ⊓C ′ , for some concept name X and concept expression C ′ such that TL |= X ⊑ ∃σ.M . But then there exists i ≤ n such that σ = σi and X ∈ {A, Ai , Bi } and Point (1) follows. • C is of the form ∃σ 1 .C ′ ⊓ C ′′ , for some concept expressions C ′ and C ′′ , and TL |= C ′ ⊑ ∃σ 2 . · · · ∃σ m .M . Notice that the length of the sequence σ 2 . . . σ n is strictly less than n. Thus, by induction hypothesis, ∅ |= C ′ ⊑ ∃σ 2 . · · · ∃σ m .M . But then ∅ |= C ⊑ ∃σ.M and Point (2) follows. 45 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter This finishes the proof of the claim. To see that the claim entails the lemma observe that at most one L ∈ Ln can satisfy Point (1). Point (2) entails that TL |= C ⊑ ∃σ.M for every TL with L ∈ Ln . ❏ We now show how the oracle can answer equivalence queries, aiming to show that for any polynomial size equivalence query H, the oracle can return a counterexample C ⊑ D such that either (i) H |= C ⊑ D and TL |= C ⊑ D for at most one L ∈ Ln or (ii) H 6|= C ⊑ D and TL |= C ⊑ D for every L ∈ Ln . Thus, such a counterexample eliminates at most one TL from the set SL of TBoxes that the learner cannot distinguish. In addition, however, we have to take extra care of the size of counterexamples as the learning algorithm is allowed to formulate queries polynomial not only in the size of the target TBox but also in the size of the counterexamples returned by the oracle. For instance, if the hypothesis TBox H contains a CI C ⊑ D which is not entailed by any TL , one cannot simply return C ⊑ D as a counterexample since the learner will be able to ‘pump up’ its capacity by asking a sequence of equivalence queries Hi = {Ci ⊑ Di } such that the size of Ci+1 ⊑ Di+1 is twice the size of Ci ⊑ Di . Then at every stage in a run of the learning algorithm, the query size will be polynomial in the size of the input and the size of the largest counterexample received so far, but exponential size queries will become available to the learner. The following lemma addresses this issue. Lemma 67 For any n > 1 and any EL TBox H in Σn with |H| < 2n , there exists an EL CI C ⊑ D over Σn such that the size of C ⊑ D does not exceed 6n and • if H |= C ⊑ D, then TL |= C ⊑ D for at most one L ∈ Ln ; • if H 6|= C ⊑ D, then TL |= C ⊑ D for every L ∈ Ln . Proof We define an exponentially large TBox T∩ and use it to prove that one can select the required EL CI C ⊑ D in such a way that either H |= C ⊑ D and T∩ 6|= C ⊑ D, or vice versa. n d To define T∩ , denote for any sequence b = b1 . . . bn ∈ {0, 1} by Cb the conjunction i≤n Ci , where Ci = Ai if bi = 1 and Ci = Bi if bi = 0. Then we define T∩ = T0 ∪ {Cb ⊑ A ⊓ X0 | b ∈ {0, 1}n }. Consider the following cases for H and T∩ . 1. Suppose H 6|= T∩ . Then there exists a CI C ⊑ D ∈ T∩ such that H 6|= C ⊑ D. Clearly, C ⊑ D is entailed by every TL , for L ∈ Ln , and the size of C ⊑ D does not exceed 6n. Thus C ⊑ D is as required. 2. Suppose there exist b ∈ {0, 1}n and a concept expression of the form ∃t.D ′ such that H |= Cb ⊑ ∃t.D ′ and T0 6|= Cb ⊑ ∃t.D ′ . It can be seen (Lemma 73 in the appendix), that there exists a sequence of role names t1 , . . . , tl ∈ {r, s}l with 0 ≤ l ≤ n + 1 and Y ∈ {⊤} ∪ NC such that ∅ |= ∃t.D ′ ⊑ ∃t1 . · · · ∃tl .Y . Thus, H |= Cb ⊑ ∃t1 . · · · ∃tl .Y and T0 6|= X0 ⊑ ∃t1 . · · · ∃tl .Y . We show that the inclusion Cb ⊑ ∃t1 . · · · ∃tl .Y is as required. Clearly, the size of Cb ⊑ ∃t1 . · · · ∃tl .Y does not exceed 6n. It remains to prove that TL |= Cb ⊑ ∃t1 · · · ∃tl .Y for at most one L ∈ Ln . 46 Exact Learning of Lightweight Description Logic Ontologies Suppose there exists L ∈ Ln such that TL |= Cb ⊑ ∃t1 . · · · ∃tl .Y . By Lemma 65, there exists Aj or Bj such that TL |= Aj ⊑ ∃t1 . · · · ∃tl .Y or TL |= Bj ⊑ ∃t1 . · · · ∃tl .Y , respectively. As T0 6|= X0 ⊑ ∃t1 . · · · ∃tl .Y it is easy to see that l = n, t1 t2 . . . tn = σj , and Y = M follow. As TL′ 6|= Cb ⊑ ∃σj .M for any L′ ∈ Ln such that L′ 6= L, it follows that TL |= Cb ⊑ ∃t1 · · · ∃tl .Y for at most one L ∈ Ln 3. Finally, suppose that neither Case 1 nor 2 above apply. Then H |= T∩ and for every b ∈ {0, 1}n and every EL concept expression over Σn of the form ∃t.D ′ : if H |= Cb ⊑ ∃t.D ′ then T0 |= X0 ⊑ ∃t.D ′ . We show that unless there exists a CI C ⊑ D satisfying the conditions of the lemma, H contains at least 2n different CIs (and thus derive a contradiction). Fix some b = b1 . . . bn ∈ {0, 1}n . From H |= T∩ we obtain H |= Cb ⊑ A. Then there must exist at least one CI C ⊑ A ⊓ D ∈ H such that H |= Cb ⊑ C and ∅ 6|= C ⊑ A. Let C = Z1 ⊓ · · · ⊓ Zm ⊓ ∃t1 .C1′ ⊓ · · · ⊓ ∃tl .Cl′ , where Z1 ,. . . , Zm are different concept names. As H |= Cb ⊑ ∃tj .Cj′ we have T0 |= X0 ⊑ ∃tj .Cj′ , for j = 1, . . . l. As H |= T∩ we have H |= X0 ⊑ ∃tj .Cj′ , for j = 1, . . . l. So H |= Z1 ⊓ · · · ⊓ Zm ⊓ X0 ⊑ A. • Suppose there exists i such that there is no Zj ∈ {Ai , Bi }. Then we have TL 6|= Z1 ⊓· · ·⊓Zm ⊓X0 ⊑ A, for any L ∈ Ln . Notice that Z1 ⊓· · ·⊓Zm contains at most all concepts names in Σn , except Ai , Bi . Thus, the size of Z1 ⊓ · · · ⊓ Zm ⊓ X0 ⊑ A does not exceed 6n, and Z1 ⊓ · · · ⊓ Zm ⊓ X0 ⊑ A is as required. • Assume that Z0 ⊓ · · · ⊓ Zm ⊓ X0 contains a conjunct Bi such that bi 6= 0. Then H |= Cb ⊑ Bi and there is no L ∈ Ln such that TL |= Cb ⊑ Bi . The size of Cb ⊑ Bi does not exceed 6n, so Cb ⊑ Bi is as required. • Assume that Z0 ⊓ · · · ⊓ Zm ⊓ X0 contains a conjunct Ai such that bi 6= 1. Then H |= Cb ⊑ Ai and there is no L ∈ Ln such that TL |= Cb ⊑ Ai . The size of Cb ⊑ Ai does not exceed 6n, so Cb ⊑ Ai is as required. • If none of the above applies, then Z1 ⊓ · · · ⊓ Zm ⊓ X0 contains exactly the Ai with bi = 1 and exactly the Bi with bi = 0. This argument applies to arbitrary b ∈ {0, 1}n . Thus, if there exists no CI C ⊑ D satisfying the conditions of the lemma then, by the final case, H contains at least 2n CIs. ❏ Now we have all the ingredients to prove that EL TBoxes are not polynomial query learnable using membership and equivalence queries. Theorem 68 EL TBoxes are not polynomial query learnable using membership and equivalence queries. Proof Assume that TBoxes are polynomial query learnable. Then there exists a learning algorithm whose query complexity (the sum of the sizes of the inputs to membership and equivalence queries made by the algorithm up to a computation step) is bounded at any stage by a polynomial p(n, m). Choose n such that ⌊2n /n⌋ > (p(n, 6n))2 and let SL = {TL | L ∈ Ln }. We follow Angluin’s strategy of letting the oracle remove TBoxes from SL 47 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter in such a way that the learner cannot distinguish between any of the remaining TBoxes. Given a membership query C ⊑ D, if TL |= C ⊑ D for every L ∈ Ln , then the answer is ‘yes’; otherwise the answer is ‘no’ and all TL with TL |= C ⊑ D are removed from SL (by Lemma 64, there are at most |C| such TBoxes). Given an equivalence query H, the answer is ‘no’, a counterexample C ⊑ D guaranteed by Lemma 67 is produced, and (at most one) TL such that TL |= C ⊑ D is removed from SL . As all counterexamples produced are smaller than 6n, the overall query complexity of the algorithm is bounded by p(n, 6n). Hence, the learner asks no more than p(n, 6n) queries and the size of every query does not exceed p(n, 6n). By Lemmas 64 and 67, at most (p(n, 6n))2 TBoxes are removed from SL during the run of the algorithm. But then, the algorithm cannot distinguish between any remaining TBoxes and we have derived a contradiction. ❏ We conclude this section by showing that DL-Lite∃R TBoxes cannot be learned using polynomially many polynomial size equivalence queries only. We use the following result on non-polynomial query learnability of monotone DNF formulas, that is, DNF formulas that do not use negation, using equivalence queries due to Angluin (1990). Here, equivalence queries take a hypothesis ψ in the form of a monotone DNF formula and return as a counterexample either a truth assignment that satisfies ψ but not the target formula φ or vice versa. Let M (n, t, s) denote the set of all monotone DNF formulas whose variables are x1 , . . . , xn , that have exactly t conjunctions, and where each conjunction contains exactly s variables. Theorem 69 (Angluin) For any polynomial q(·) there exist constants t0 and s0 and a strategy 6 for the oracle O to answer equivalence queries posed by a learning algorithm in such a way that for sufficiently large n any learning algorithm that asks at most q(n) equivalence queries, each bounded in size by q(n), cannot exactly identify elements of M (n, t0 , s0 ). To employ Theorem 69, we associate with every monotone DNF formula φ= t _ (xi1 ∧ · · · ∧ xisi ), i=1 where {xi1 , . . . , xisi } ⊆ {x1 , . . . , xn }, a DL-Lite∃R TBox Tφ as follows. With each conjunct xi1 ∧ · · · ∧ xisi we associate a concept expression Ci := ∃ρi1 .∃ρi2 . . . . ∃ρin .⊤, where ρij = r if xj occurs in xi1 ∧ · · · ∧ xisi and ρij = r̄ otherwise (r and r̄ are role names). Let A be a concept name and set d Tφ = {A ⊑ ti=1 Ci , r̄ ⊑ r}. 6. The existence of this strategy is a direct consequence of Theorem 8 of (Angluin, 1990), which states that the class of DNF formulae has the approximate fingerprint property, and the proof of Theorem 1 of (Angluin, 1990), where such a strategy is explicitly constructed for any class having approximate fingerprints. 48 Exact Learning of Lightweight Description Logic Ontologies For example, for n = 4 and φ = (x1 ∧ x4 ) ∨ x2 we have Tφ = {A ⊑ ∃r.∃r̄.∃r̄.∃r.⊤, A ⊑ ∃r̄.∃r.∃r̄.∃r̄.⊤, r̄ ⊑ r}. We say that a TBox T has a DNF-representation for n if it is obtained by the translation of a monotone DNF-formula with n variables; that is, if T is of the following form, for some Γ ⊆ {r, r̄}n : l {A ⊑ ∃ρ1 .∃ρ2 . . . . ∃ρn .⊤, r̄ ⊑ r}. ρ1 ···ρn ∈Γ A truth assignment I (for the variables x1 . . . , xn ) also corresponds to a concept expression CI := ∃ρi1 .∃ρi2 . . . . ∃ρin .⊤, where ρij = r if I makes xj true and ρij = r̄ otherwise. Then I |= φ if, and only if, Tφ |= A ⊑ CI holds for all truth assignments I. Note that r̄ represents that a variable is false and r that a variable is true. Thus, the RI r̄ ⊑ r captures the monotonicity of the DNF formulas considered. For any fixed values n, s and t, we set T (n, t, s) = {Tφ | φ ∈ M (n, t, s)}. Note that the TBoxes in T (n, t, s) are exactly those TBoxes that have a DNF-representation for n and satisfy additionally the conditions that the DNF represented by Tφ has exactly t conjunctions each conjunction of which has exactly s variables. We describe now the strategy for the oracle O′ to answer equivalence queries so that no learning algorithm is able to exactly identify members of T (n, t, s) based on the answers to polynomially many equivalence queries of polynomial size. If the TBox in the equivalence query is ‘obviously’ not within the class T (n, t, s), then we will explicitly produce a counterexample that the oracle can return. If, on the other hand, the TBox H from the equivalence query is ‘similar’ to TBoxes that have a DNF-representation for n, then we approximate H by a TBox H′ that has a DNF-representation for n and return the counterexample A ⊑ CI corresponding to the truth assignment I that the oracle O from Theorem 69 would return when given ψ. In detail the strategy is as follows. Assume q is the given polynomial in Theorem 69 and that t0 , s0 and the strategy of the oracle O are chosen so that for sufficiently large n no learning algorithm for DNF formulas that asks at most q(n) equivalence queries, each bounded in size by q(n), can distinguish all members of M (n, t0 , s0 ). Choose a sufficiently large n. Let H be an equivalence TBox query issued by a learning algorithm. Then O′ does the following: 1. If H entails some A ⊑ ∃ρ1 .∃ρ2 . . . . ∃ρn+1 .⊤ with ρi ∈ {r, r̄} for 1 ≤ i ≤ n + 1, then return this CI as a negative counterexample; 2. If H entails some ∃ρ1 .⊤ ⊑ ∃ρ2 .⊤ such that {ρ1 , ρ2 } ⊆ {r, r̄, r − , r̄ − } and {r̄ ⊑ r} 6|= ∃ρ1 .⊤ ⊑ ∃ρ2 .⊤, then return this CI as a negative counterexample; 49 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter 3. If H |= ∃ρ1 .⊤ ⊑ ∃ρ2 .∃ρ3 .⊤ such that {ρ1 , ρ2 , ρ3 } ⊆ {r, r̄}, then return this CI as a negative counterexample; 4. If there exists no ρ1 , . . . , ρn ∈ {r, r̄}n such that H |= A ⊑ ∃ρ1 . · · · ∃ρn .⊤ then return A ⊑ |∃r ·{z · · ∃r} .⊤ as a positive counterexample. n 5. Suppose now that none of the above applies. We say that a sequence ρ1 , . . . , ρn ∈ {r, r̄}n is r-minimal for H if H |= A ⊑ ∃ρ1 . · · · ∃ρn .⊤ and whenever ρi = r, for 1 ≤ i ≤ n, we have H 6|= ∃ρ1 . · · · ∃ρi−1 .∃r̄.∃ρi+1 . · · · ∃ρn .⊤. We obtain a TBox H′ with a DNF representation by setting l ∃ρ1 . · · · ∃ρn .⊤, r̄ ⊑ r}. H′ = {A ⊑ ρ1 ,...,ρn is r-minimal for H Observe that for any sequence ρ1 , . . . , ρn ∈ {r, r̄}n we have H |= A ⊑ ∃ρ1 . · · · ∃ρn .⊤ if, and only if, H′ |= A ⊑ ∃ρ1 . · · · ∃ρn .⊤. We convert H′ into its corresponding monotone DNF formula φH′ by reversing the translation from monotone DNF formulas into DL-Lite∃R TBoxes of the above form in the obvious way. Note that the size of φH′ is linear in the size of H′ . Given φH′ the oracle O returns a (positive or negative) counterexample (a truth assignment) I. Then return the counterexample in the form of the CI A ⊑ CI . Observe that the answers given in Points 1 to 3 are correct in the sense that if an inclusion α is returned as a negative example then T 6|= α for any T ∈ T (n, t, s). Point 4 is trivially correct, since any monotone DNF is satisfied by the truth assignment that makes every variable true. We analyse the size of the TBox H′ computed in Point 5. Lemma 70 Assume that Points 1 to 4 do not apply to H. Then the number of sequences ρ1 , . . . , ρn ∈ {r, r̄}n which are r-minimal for H is bounded by |H|. Proof We first show that if ρ1 , . . . , ρn ∈ {r, r̄}n is r-minimal for H, then there exists a CI A ⊑ C ∈ H such that (∗) there are concept expressions C0 , . . . , Cn with C0 = C and ∃ρi+1 .Ci+1 a top-level conjunct of Ci , for all i < n. For the proof we require the canonical model IA,H of A and H (Lemma 12). Denote the root of IA,H by ρA . Let ρ1 , . . . , ρn ∈ {r, r̄}n be r-minimal for H. Then there are I d0 , . . . , dn ∈ ∆IA,H with d0 = ρA such that (di , di+1 ) ∈ ρi A,H for all i < n. By the canonical model construction and the assumption that Points 2 and 3 do not hold, there either exists di ∈ AIA,H or there is a CI A ⊑ C ∈ H such that (∗) holds. We show that the first condition does not hold. Assume for a prove by contradiction that di ∈ AIA,H . By Lemma 12, H |= A ⊑ ∃ρ1 · · · ∃ρi .A. But then H |= A ⊑ ∃(ρ1 · · · ρi )n .⊤ for all n > 0 which contradicts the assumption that Point 1 does not apply to H. It follows that the number of distinct r-minimal sequences is bounded by the number of distinct sequences C0 , . . . , Cn with A ⊑ C0 ∈ H and ∃ρi+1 .Ci+1 a top-level conjunct of Ci for all i < n. Thus, the number of distinct r-minimal sequences is bounded by |H|. ❏ 50 Exact Learning of Lightweight Description Logic Ontologies It follows from Lemma 70 that the size of the TBox H′ computed in Point 5 is bounded by 4n|H| + 2. Theorem 71 DL-Lite∃R TBoxes (even without inverse roles) are not polynomial query learnable using only equivalence queries. Proof Suppose that the query complexity of a learning algorithm A for DL-Lite∃R TBoxes in Σ = {A, r, r̄} is bounded at every stage of computation by a polynomial p(x, y), where x is the size of the target TBox, and y is the maximal size of a counterexample returned by the oracle up to the current stage of computation. Let q(n) = (p(n2 , 4n + 6))2 , and let constants t0 and s0 be as guaranteed by Lemma 69. We claim that, for sufficiently large n, A cannot distinguish some Tφ and Tψ for φ, ψ ∈ M (n, t0 , s0 ). Assuming that n > 11 (the maximal size of counterexamples given under Point 2 and 3), the largest counterexample returned by our strategy described above is of the form A ⊑ ∃ρ1 . · · · ∃ρn+1 .⊤, so for sufficiently large n the maximal size of any counterexample in any run of A is bounded by 4n+6 = 4(n+1)+2. Similarly, the size of every potential target TBox Tφ ∈ T (n, t0 , s0 ) does not exceed t0 · (4n + 2) and, as t0 is a constant, for sufficiently large n it is bounded by n2 . Thus, for sufficiently large n the total query complexity of A on any input from T (n, t0 , s0 ) is bounded by p(n2 , 4n + 6). Obviously, the size of each query is bounded by the query complexity of the learning algorithm. So, the size of a DNF equivalence query forwarded to the strategy O guaranteed by Lemma 69 is bounded by 4n × p(n2 , 4n + 6) + 2 ≤ q(n), and there will be at most q(n) queries forwarded. But then O can return answers such that some φ and ψ from M (n, t0 , s0 ) cannot be distinguished. It remains to observe that A cannot distinguish Tφ and Tψ . ❏ 7. Related Work Some related work has already been discussed in the introduction to this paper. Here we discuss in more detail related work from ontology learning in general and exact learning of ontologies in particular. We start with the former. Ontology Learning. Research in ontology learning has a rich history that we cannot discuss here in full detail. The collection (Lehmann and Völker, 2014) and surveys (Cimiano et al., 2010; Wong et al., 2012) provide an excellent introduction to the state of the art in this field. The techniques applied in ontology learning range from information extraction and text mining to interactive learning and inductive logic programming (ILP). Of particular relevance for this paper are the approaches to learning logical expressions (rather than subsumption hierarchies between concept names). For example, the work in (Lehmann and Haase, 2009; Lehmann and Hitzler, 2010; Bühmann et al., 2014) applies techniques from ILP to learn description logic concept expressions. ILP is applied as well in (Lisi, 2011) for learning logical rules for ontologies. The learning of fuzzy DLs has been considered in (Lisi and Straccia, 2015). Other machine learning methods which have been applied to learn ontology axioms include Association Rule Mining (ARM) (Völker and Niepert, 2011; Fleischhacker et al., 2012; Völker et al., 2015) and Formal Concept Analysis (FCA) (Rudolph, 2004; Baader et al., 2007; Distel, 2011; Borchmann, 2014; Ganter et al., 2016). Recently, learnability of lightweight 51 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter DL TBoxes from finite sets of interpretations has been investigated in (Klarman and Britz, 2015). Exact Learning of Description Logic Concept Expressions. Rather than aiming to learn a TBox here one is interested in learning a target concept expression C∗ . This was first studied in (Cohen and Hirsh, 1994a,b; Frazier and Pitt, 1996). The standard learning protocol is as follows: • a membership query asks whether a concept expression C is subsumed by the target concept expression C∗ (in symbols, ∅ |= C ⊑ C∗ ?); • an equivalence query asks whether a concept expression C is equivalent to the target concept expression C∗ (in symbols, ∅ |= C ≡ C∗ ?). If C and C∗ are not equivalent then the oracle gives a counterexample, that is, a concept expression C ′ such that either ∅ |= C ′ ⊑ C∗ and ∅ 6|= C ′ ⊑ C or ∅ 6|= C ′ ⊑ C∗ and ∅ |= C ′ ⊑ C. (Cohen and Hirsh, 1994a,b; Frazier and Pitt, 1996) consider concept expressions in (variations of) the now largely historic description logic Classic (Borgida et al., 1989; Patel-Schneider et al., 1991; Borgida and Patel-Schneider, 1994). The expressive power of Classic and its variants is incomparable to the expressive power of modern lightweight description logics. Classic only shares conjunction and unqualified existential restrictions of the form ∃r.⊤ with the DLs considered in this paper. It additionally admits value restrictions ∀r.C whose interpretation is given as (∀r.C)I = {d ∈ ∆I |d′ ∈ C I for all d′ with (d, d′ ) ∈ r I } and unqualified number restrictions (≤ n r) and (≥ n r) interpreted as (≤ nr)I = {d ∈ ∆I | |{d′ | (d, d′ ) ∈ r I }| ≤ n} (≥ nr)I = {d ∈ ∆I | |{d′ | (d, d′ ) ∈ r I }| ≥ n} as well as various constructors using individual names. For example, if a1 , . . . , an are names for individual objects, then ONE-OF(a1 , . . . , an ) is a Classic concept denoting the set {aI1 , . . . , aIn }, where aIi denotes the individual with name ai in interpretation I. It is proved in (Cohen and Hirsh, 1994a,b; Frazier and Pitt, 1996) that in many fragments of Classic concept expressions cannot be learned polynomially using only membership or equivalence queries but that they can be learned in polynomial time using both. Exact learning of concept expressions in modern lightweight description logics has not yet been investigated. Exact Learning of TBoxes using Concept Inclusions as Queries. First results on exact learning of description logic TBoxes using concept inclusions as queries were presented in (Konev et al., 2013, 2014), of which this paper is an extension. In contrast to (Konev et al., 2013, 2014), we make the distinction between polynomial time and polynomial query learnability which enables us to formulate and prove results on a more fine grained level. TBoxes in DL-Lite∃R,horn , for which we prove polynomial query learnability, were not considered in (Konev et al., 2013, 2014). The current paper is also closely related to the PhD thesis of the third author (Ozaki, 2016). In addition to the results presented here, it is shown there that even in the extension of ELlhs with role inclusions, TBoxes can be learned in polynomial time. The learning algorithm is a non-trivial extension of the algorithm presented here for ELlhs TBoxes. 52 Exact Learning of Lightweight Description Logic Ontologies Exact Learning of TBoxes using Certain Answers. In recent years, data access mediated by ontologies has become one of the most important applications of DLs, see (Poggi et al., 2008; Bienvenu et al., 2014; Kontchakov and Zakharyaschev, 2014; Bienvenu and Ortiz, 2015) and references therein. The idea is to use a TBox to specify semantics and background knowledge for the data and use it for deriving more complete answers to queries over the data. In this context, the data is stored in an ABox consisting of a finite set of assertions of the form A(a) or r(a, b), where A is a concept names, r a role name, and a, b are individual names. Given a query q(~x) (typically a conjunctive query), a TBox T , and an ABox A, a tuple of individual names ~a from A and of the same length as ~x is called a certain answer to q(~x) over A w.r.t. T , in symbols T , A |= q(~a), if every model I of T and A satisfies q(~a). Motivated by this setup, (Konev et al., 2016; Ozaki, 2016) study polynomial learnability of TBoxes using membership queries that ask whether a tuple of individuals names is a certain answer to a query over an ABox w.r.t. the target TBox. This is a natural alternative to learning using concept inclusions since domain experts are often more familiar with querying data in a particular domain than with the logical notion of subsumption between concept expressions. In detail, the learning protocol is as follows: • a membership query takes the form (A, q(~a)) and asks whether the tuple ~a of individual names is a certain answer to the query q(~x) over the ABox A w.r.t. the target TBox T ; • an equivalence query asks whether a TBox H is equivalent to the target TBox T . If T and H are not equivalent then a counterexample of the form (A, q(~a)) is given such that T , A |= q(~a) and H, A 6|= q(~a) (a positive counterexample) or T , A 6|= q(~a) and H, A |= q(~a) (a negative counterexample). In the learning protocol above we have not yet specified the class of queries from which the q(~x) are drawn and which strongly influences the classes of TBoxes that can be learned. In the context of data access using TBoxes the two most popular classes of queries are: • conjunctive queries (CQs), that is, existentially quantified conjunctions of atoms; and • instance queries (IQs), which take the form C(x) or r(x, y) with C a concept expression from the DL under consideration and r a role name. In (Konev et al., 2016; Ozaki, 2016), exact learning of TBoxes in the languages EL, ELlhs and DL-Lite∃R is studied for both IQs and CQs in queries. The positive learnability results are proved by polynomial reductions to the learnability results presented in this paper and (Ozaki, 2016). The basic link between learning using concept inclusions as queries and learning by certain answers is as follows: if T is a TBox and C, D are concept expressions in any of the DLs discussed above then one can regard the labelled tree TC corresponding to C as an ABox AC with root ρC and it holds that T |= C ⊑ D if, and only if, T , AC |= D(ρC ). The converse direction (obtaining a concept expression from an ABox) is more involved since ABoxes are not tree-shaped and an additional unfolding step is needed to compute a corresponding concept expression. Using this link it is proved in (Konev et al., 2016; Ozaki, 2016) that DL-Lite∃R and ELlhs TBoxes with role inclusions can be learned with polynomially many queries using certain answers to IQs. It is also proved that EL is still not learnable with polynomially many queries using certain answers with neither IQs nor CQs as the query language and that DL-Lite∃R TBoxes cannot be learned with polynomially many queries using certain answers with CQs as the query language. 53 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Exact Learning in (other) Fragments of FO Horn. We discuss results on exact learning of finite sets of FO Horn clauses or fragments of this logic, where a FO Horn clause is a universally quantified clause with at most one positive literal (Page Jr, 1993; Arimura, 1997; Reddy and Tadepalli, 1998; Arias and Khardon, 2002; Arias et al., 2007; Selman and Fern, 2011). Depending on what is used as membership queries and as counterexamples to equivalence queries, one can distinguish between exact learning FO Horn clauses using interpretations and using entailments. As learning using entailments is closer to our approach we focus on that setting. The exact learning protocol is then as follows: • a membership query asks whether an FO Horn clause is entailed by the target set T of FO Horn clauses; • an equivalence query asks whether a set H of FO Horn clauses is equivalent to the target set T . If H and T are not equivalent then a counterexample is given, that is, an FO Horn clause entailed by T but not by H (a positive counterexample) or vice versa. Considering how terms (with function symbols allowed) can appear in an FO Horn clause, two main restrictions have been studied in the literature: 1. Range restricted clauses: when the set of terms in the positive literal (if existent) is a subset of the terms in the negative literals and their subterms; and 2. Constrained clauses: when the set of terms and subterms in the positive literal (if existent) is a superset of the terms in the negative literals. For example, the FO Horn clause ∀x(¬P (f (x)) ∨ P (x)) is range restricted but not constrained and the FO Horn clause ∀x(¬P (x) ∨ P (f (x))) is constrained but not range restricted, where P is a predicate symbol and f a function symbol. In (Reddy and Tadepalli, 1998) and (Arimura, 1997), it is shown that under certain acyclicity conditions FO Horn with range restricted clauses and, respectively, constrained clauses are polynomial time learnable from entailments if the arity of predicates is bounded by a constant. A learning algorithm for a fragment of FO Horn (called closed FO Horn) that subsumes the two languages defined above is presented in (Arias and Khardon, 2002). The algorithm is polynomial in the number of clauses, terms and predicates and the size of the counterexamples, but exponential not only in the arity of predicates but also in the number of variables per clause. In fact, it is an open question whether there exists a learning algorithm for closed FO Horn that is polynomial in the number of variables per clause. We relate the learnability results for FO Horn to the learnability results for lightweight description logics presented in this paper. Observe that most DLs (and in particular all DLs investigated in this paper) can be translated into FO (Baader et al., 2003). For example, a translation of the ELlhs CI ∃r.A ⊑ B is ∀x∀y(¬r(x, y) ∨ ¬A(y) ∨ B(x)) and a translation of the DL-Lite∃R CI A ⊑ ∃r.A is ∀x(A(x) → ∃y.(r(x, y) ∧ A(y))). Under this translation, every ELlhs TBox can be regarded as a set of range restricted FO Horn clauses, where the arity of predicates is bounded by 2. In contrast, since in DL-Lite∃R existential quantifiers can be nested in the right side of CIs, DL-Lite∃R CIs cannot be translated into FO Horn clauses. We can now summarise the relationship between our learnability results 54 Exact Learning of Lightweight Description Logic Ontologies for ELlhs , DL-Lite∃R and DL-Lite∃R,horn and the results on exact learnability of FO Horn from entailments as follows: since the arity of DL predicates is at most 2 and since no function symbols are admitted in DLs, none of the DLs considered in this paper can express the fragments of FO Horn discussed above. On the other hand, we do not impose an acyclicity condition on the TBoxes (in contrast to (Reddy and Tadepalli, 1998; Arimura, 1997)) and our algorithms are polynomial in the number of variables permitted in any clause (in contrast to (Arias and Khardon, 2002)). Thus, the results discussed above for FO Horn do not translate into polynomial learning algorithms for ELlhs and are not applicable to DL-Lite∃R nor DL-Lite∃R,horn . Our results thus cover new fragments of FO that have not yet been considered for exact learning. This is not surprising, given the fact that the fragments of FO considered previously were not motivated by applications in ontology learning. Also related to exact learning of Horn FO is recent work on exact learning of schema mappings in data exchange (ten Cate et al., 2012). Schema mappings are tuples (S, T, M ) where S is a source schema (a finite set of predicates), T is a target schema (a finite set of predicates), and M is a finite set of sentences of the form ∀~x(ϕ(~x) → ∃~yψ(~x, ~y )) where ϕ(~x) and ψ(~x, ~y ) are conjunctions of atoms over S and T , respectively (Fagin et al., 2005). (S, T, M ) is a GAV schema mapping if ~y is empty and ψ(~x, ~y ) is an atom. In (ten Cate et al., 2012), the authors study exact learnability of GAV schema mappings from data examples (I, J) consisting of a database I over the source schema S and a database J over the target schema T . Such a data example satisfies M if I ∪ J |= M . The authors present both polynomial query learnability results for protocols using membership and equivalence queries and non-polynomial query learnability results if either only membership or only equivalence queries are allowed. The results presented in (ten Cate et al., 2012) are not applicable to the setting considered in this paper since the learning protocol uses data examples instead of entailments. 8. Conclusion We have presented the first study of learnability of DL ontologies in Angluin et al’s framework of exact learning, obtaining both positive and negative results. Several research questions remain to be explored. One immediate question is whether acyclic EL TBoxes can be learned in polynomial time using queries and counterexamples of the form A ≡ C and A ⊑ C only. Note that our non-polynomial query learnability result for acyclic EL TBoxes relies heavily on counterexamples that are not of this form. Another immediate question is whether the extension of ELlhs with inverse roles (which is a better approximation of OWL2 RL than ELlhs itself) can still be learned in polynomial time, or at least with polynomially many queries of polynomial size. Other interesting research directions are non-polynomial time learning algorithms for EL TBoxes and the admission of different types of membership queries and counterexamples in the learning protocol. For example, one could replace CIs as counterexamples with interpretations. Acknowledgements Lutz was supported by the DFG project Prob-DL (LU1417/1-1). Konev and Wolter were supported by the EPSRC project EP/H043594/1. Ozaki was supported by the Science without Borders scholarship programme. 55 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter References Dana Angluin. Learning propositional Horn sentences with hints. Technical report, Yale University, 1987a. Dana Angluin. Queries and concept learning. Machine Learning, 2(4):319–342, 1987b. Dana Angluin. Negative results for equivalence queries. Machine Learning, 5:121–150, 1990. Dana Angluin, Michael Frazier, and Leonard Pitt. Learning conjunctions of Horn clauses. Machine Learning, 9:147–164, 1992. Marta Arias. Exact learning of first-order expressions from queries. PhD thesis, Tufts University, 2004. Marta Arias and José L. Balcázar. Construction and learnability of canonical Horn formulas. Machine Learning, 85(3):273–297, 2011. Marta Arias and Roni Khardon. Learning closed Horn expressions. Information and Computation, 178(1):214–240, 2002. Marta Arias, Roni Khardon, and Jérôme Maloberti. Learning Horn expressions with LOGAN-H. Journal of Machine Learning Research, 8:549–587, 2007. Hiroki Arimura. Learning acyclic first-order horn sentences from entailment. In International Workshop on Algorithmic Learning Theory, pages 432–445, 1997. Alessandro Artale, Diego Calvanese, Roman Kontchakov, and Michael Zakharyaschev. The DL-Lite family and relations. Journal of Artificial Intelligence Research (JAIR), 36:1–69, 2009. Franz Baader, Ralf Küsters, and Ralf Molitor. Computing least common subsumers in description logics with existential restrictions. In International Joint Conference on Artificial Intelligence (IJCAI), pages 96–103, 1999. Franz Baader, Diego Calvanese, Deborah L. McGuinness, Daniele Nardi, and Peter F. Patel-Schneider, editors. The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, New York, NY, USA, 2003. ISBN 0-52178176-0. Franz Baader, Sebastian Brandt, and Carsten Lutz. Pushing the EL envelope. In International Joint Conference on Artificial Intelligence (IJCAI), pages 364–369, 2005. Franz Baader, Bernhard Ganter, Baris Sertkaya, and Ulrike Sattler. Completing description logic knowledge bases using formal concept analysis. In International Joint Conference on Artificial Intelligence (IJCAI), pages 230–235, 2007. Franz Baader, Carsten Lutz, and Sebastian Brandt. Pushing the EL envelope further. In Proceedings of the Fourth OWLED Workshop on OWL: Experiences and Directions, 2008. 56 Exact Learning of Lightweight Description Logic Ontologies Franz Baader, Ian Horrocks, Carsten Lutz, and Ulrike Sattler. An Introduction to Description Logic. Cambridge University Press, 2017. Meghyn Bienvenu and Magdalena Ortiz. Ontology-mediated query answering with datatractable description logics. In Reasoning Web. Semantic Technologies for Advanced Query Answering - 11th International Summer School, pages 218–307, 2015. Meghyn Bienvenu, Balder ten Cate, Carsten Lutz, and Frank Wolter. Ontology-based data access: A study through disjunctive datalog, csp, and MMSNP. ACM Trans. Database Syst., 39(4):33:1–33:44, 2014. Daniel Borchmann and Felix Distel. Mining of EL-GCIs. In The 11th IEEE International Conference on Data Mining Workshops, Vancouver, Canada, 2011. Dipl-Math Daniel Borchmann. Learning terminological knowledge with high confidence from erroneous data. PhD thesis, Higher School of Economics, 2014. Alexander Borgida and Peter F Patel-Schneider. A semantics and complete algorithm for subsumption in the classic description logic. Journal of Artificial Intelligence Research, 1:277–308, 1994. Alexander Borgida, Ronald J. Brachman, Deborah L. McGuinness, and Lori Alperin Resnick. CLASSIC: A structural data model for objects. In Proceedings of the 1989 ACM SIGMOD International Conference on Management of Data, pages 58–67, 1989. Ronald J. Brachman and James G. Schmolze. An overview of the KL-ONE knowledge representation system. Cognitive Science, 9(2):171–216, 1985. Lorenz Bühmann, Daniel Fleischhacker, Jens Lehmann, André Melo, and Johanna Völker. Inductive lexical learning of class expressions. In Knowledge Engineering and Knowledge Management - 19th International Conference (EKAW), pages 42–53, 2014. Diego Calvanese, Giuseppe De Giacomo, Domenico Lembo, Maurizio Lenzerini, and Riccardo Rosati. Tractable reasoning and efficient query answering in description logics: The DL-Lite family. Journal of Automated reasoning, 39(3):385–429, 2007. Philipp Cimiano, Johanna Völker, and Paul Buitelaar. Ontology construction. In Handbook of Natural Language Processing, Second Edition., pages 577–604. Chapman and Hall/CRC, 2010. William W Cohen and Haym Hirsh. The learnability of description logics with equality constraints. Machine Learning, 17(2-3):169–199, 1994a. William W. Cohen and Haym Hirsh. Learning the CLASSIC description logic: Theoretical and experimental results. In Principles of Knowledge Representation and Reasoning (KR), pages 121–133, 1994b. Felix Distel. Learning description logic knowledge bases from data using methods from formal concept analysis. PhD thesis, Dresden University of Technology, 2011. 57 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Ronald Fagin, Phokion G Kolaitis, Renée J Miller, and Lucian Popa. Data exchange: semantics and query answering. Theoretical Computer Science, 336(1):89–124, 2005. Daniel Fleischhacker, Johanna Völker, and Heiner Stuckenschmidt. Mining RDF data for property axioms. In On the Move to Meaningful Internet Systems: OTM 2012, pages 718–735. Springer, 2012. Michael Frazier and Leonard Pitt. Learning from entailment: An application to propositional horn sentences. In International Conference on Machine Learning (ICML), pages 120–127, 1993. Michael Frazier and Leonard Pitt. Classic learning. Machine Learning, 25(2-3):151–193, 1996. Bernhard Ganter, Sergei A Obiedkov, Sebastian Rudolph, and Gerd Stumme. Conceptual exploration. Springer, 2016. Ernesto Jiménez-Ruiz, Evgeny Kharlamov, Dmitriy Zheleznyakov, Ian Horrocks, Christoph Pinkel, Martin G Skjæveland, Evgenij Thorstensen, and Jose Mora. BootOX: practical mapping of RDBs to OWL 2. In International Semantic Web Conference, (ISWC), pages 113–132. 2015. Stanislav Kikot, Roman Kontchakov, and Michael Zakharyaschev. On (in)tractability of OBDA with OWL 2 QL. In Proceedings of the 24th International Workshop on Description Logics (DL 2011), 2011. Szymon Klarman and Katarina Britz. Ontology learning from interpretations in lightweight description logics. In Inductive Logic Programming, 2015. Boris Konev, Michel Ludwig, Dirk Walther, and Frank Wolter. The logical difference for the lightweight description logic EL. Journal of Artificial Intelligence Research (JAIR), 44:633–708, 2012. Boris Konev, Carsten Lutz, and Frank Wolter. Exact learning of Tboxes in EL and DL-Lite. In Informal Proceedings of the 26th International Workshop on Description Logics, pages 341–352, 2013. Boris Konev, Carsten Lutz, Ana Ozaki, and Frank Wolter. Exact learning of lightweight description logic ontologies. In Principles of Knowledge Representation and Reasoning (KR), 2014. Boris Konev, Ana Ozaki, and Frank Wolter. A model for learning description logic ontologies based on exact learning. In Conference on Artificial Intelligence (AAAI), pages 1008– 1015, 2016. Roman Kontchakov and Michael Zakharyaschev. An introduction to description logics and query rewriting. In Reasoning Web. Semantic Technologies for Advanced Query Answering - 10th International Summer School, pages 195–244, 2014. 58 Exact Learning of Lightweight Description Logic Ontologies Markus Krötzsch. OWL 2 profiles: An introduction to lightweight ontology languages. In Reasoning Web. Semantic Technologies for Advanced Query Answering - 8th International Summer School, pages 112–183, 2012. Jens Lehmann and Christoph Haase. Ideal downward refinement in the\ mathcal {EL} description logic. In International Conference on Inductive Logic Programming (ILP), pages 73–87, 2009. Jens Lehmann and Pascal Hitzler. Concept learning in description logics using refinement operators. Machine Learning, 78(1-2):203–250, 2010. Jens Lehmann and Johanna Völker. Perspectives on Ontology Learning, volume 18. IOS Press, 2014. Francesca A. Lisi. Al-quin: An onto-relational learning system for semantic web mining. International Journal on Semantic Web and Information Systems, 7(3):1–22, 2011. Francesca A. Lisi and Umberto Straccia. Learning in description logics with fuzzy concrete domains. Fundamenta Informaticae, 140(3-4):373–391, 2015. Carsten Lutz, Robert Piro, and Frank Wolter. Description logic TBoxes: Model-theoretic characterizations and rewritability. In International Joint Conference on Artificial Intelligence (IJCAI), pages 983–988, 2011. Yue Ma and Felix Distel. Learning formal definitions for snomed ct from text. In Artificial Intelligence in Medicine Conference (AIME), pages 73–77, 2013. Ana Ozaki. Exact Learning of Description Logic Ontologies. PhD thesis, University of Liverpool, 2016. Charles David Page Jr. Anti-unification in constraint logics: foundations and applications to learnability in first-order logic, to speed-up learning, and to deduction. PhD thesis, University of Illinois at Urbana-Champaign, 1993. Peter F. Patel-Schneider, Deborah L. McGuinness, and Alexander Borgida. The CLASSIC knowledge representation system: Guiding principles and implementation rationale. SIGART Bulletin, 2(3):108–113, 1991. Antonella Poggi, Domenico Lembo, Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, and Riccardo Rosati. Linking data to ontologies. J. Data Semantics, 10:133–173, 2008. Chandra Reddy and Prasad Tadepalli. Learning first-order acyclic Horn programs from entailment. Inductive Logic Programming, pages 23–37, 1998. Sebastian Rudolph. Exploring relational structures via FLE. In International Conference on Conceptual Structures, ICCS, pages 196–212, 2004. Stefan Schlobach, Zhisheng Huang, Ronald Cornet, and Frank Van Harmelen. Debugging incoherent terminologies. Journal of Automated Reasoning, 39(3):317–349, 2007. 59 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter Joseph Selman and Alan Fern. Learning first-order definite theories via object-based queries. In European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD), pages 159–174, 2011. Heiner Stuckenschmidt, Christine Parent, and Stefano Spaccapietra, editors. Modular Ontologies: Concepts, Theories and Techniques for Knowledge Modularization, volume 5445 of Lecture Notes in Computer Science. Springer, 2009. Balder ten Cate, Vı́ctor Dalmau, and Phokion G. Kolaitis. Learning schema mappings. In International Conference on Database Theory (ICDT), pages 182–195, 2012. Johanna Völker and Mathias Niepert. Statistical schema induction. In The Semantic Web: Research and Applications, pages 124–138. Springer, 2011. Johanna Völker, Daniel Fleischhacker, and Heiner Stuckenschmidt. Automatic acquisition of class disjointness. Journal of Web Semantics, 35:124–139, 2015. Hai Wang, Matthew Horridge, Alan L. Rector, Nick Drummond, and Julian Seidenberg. Debugging OWL-DL ontologies: A heuristic approach. In 4th International Semantic Web Conference ISWC, pages 745–757, 2005. Wilson Wong, Wei Liu, and Mohammed Bennamoun. Ontology learning from text: A look back and into the future. ACM Computing Surveys, 44(4):20:1–20:36, 2012. 60 Exact Learning of Lightweight Description Logic Ontologies Appendix A. Proofs for Section 6 We supply proofs for Lemma 62 and Lemma 64. In addition, we prove a claim used in the proof of Lemma 67. We start by giving the proof of Lemma 62. Lemma 62 For every DL-Lite∃R CI B ⊑ D over the signature of Tσ , • either Tσ |= B ⊑ D for every Tσ ∈ SN • or there is at most one Tσ ∈ SN such that Tσ |= B ⊑ D. Proof Assume the CI B ⊑ D is given. If B 6= A or M does not occur in D, then the claim can be readily checked. Thus, we assume that B = A and M occurs in D. Assume there exists σ0 such that Tσ0 |= A ⊑ D (if no such σ0 exists, we are done). For any σ, let IA,Tσ be the canonical model of A and Tσ (Lemma 12). Apply the following restricted form of parent/child merging exhaustively to the concept expression D: • if there are nodes d, d1 , d2 ∈ TD with l(d1 , d) = σ and l(d, d2 ) = σ − for some σ ∈ {r, s}, then replace D by the resulting concept expression after d1 and d2 are merged in D. Let D ′ be the resulting concept expression. Recall from Lemma 12 that Tσ |= A ⊑ D iff there is a homomorphism from TD to IA,Tσ mapping ρD to ρA . Using the fact that IA,Tσ is a ditree interpretation, one can readily check that any homomorphism h from TD to IA,Tσ mapping ρD to ρA factors through TD′ and that D ′ is an EL concept expression. Thus, if there is an additional σ′ 6= σ0 such that Tσ′ |= A ⊑ D, then there are two homomorphisms hσ0 and hσ′ with the same domain TD′ into IA,Tσ0 and IA,Tσ′ and mapping the root of TD′ to the roots of IA,Tσ0 and IA,Tσ′ , respectively. Since M occurs in D ′ and D ′ is an EL concept expression we find a sequence D0 , . . . , Dm with D0 = D ′ and Dm = M such that ∃si+1 .Di+1 is a top-level conjunct of Di for si ∈ {r, s} and all i < m. But then s1 · · · sm = σ0 and s1 · · · sm = σ′ and we have derived a contradiction to the assumption that σ0 and σ′ are distinct. ❏ To prove Lemma 64 we require the following observation. Lemma 72 For any acyclic EL TBox T , any CI A ⊑ C ∈ T and any concept expression of the form ∃t.D we have T |= A ⊑ ∃t.D if, and only if, T |= C ⊑ ∃t.D. We are now ready to prove Lemma 64. Lemma 64 For every EL CI C ⊑ D over Σn : • either TL |= C ⊑ D for every L ∈ Ln • or the number of L ∈ Ln such that TL |= C ⊑ D does not exceed |C|. Proof We prove the lemma by induction on the structure of D. We assume throughout the proof that there exists some L0 ∈ Ln such that TL0 |= C ⊑ D. Base case: D is a concept name. We make the following case distinction. • D ∈ {Xi , Ai , Bi | 1 ≤ i ≤ n} or D = M . By Lemma 65, C is of the form Z ⊓ C ′ , for some concept name Z, and TL0 |= Z ⊑ D. But then Z = D and it follows that TL |= C ⊑ D for every L ∈ Ln . 61 Boris Konev, Carsten Lutz, Ana Ozaki and Frank Wolter • D = X0 . By Lemma 65, C is of the form Z ⊓ C ′ , for some concept name Z, and TL0 |= Z ⊑ X0 . This is the case if either Z = X0 , or Z ∈ {A, A1 , B1 , . . . , An , Bn }. In either case, TL |= C ⊑ X0 for every L ∈ Ln . • D = A. If C is of the form A ⊓ C ′ or for all i such that 1 ≤ i ≤ n, Ai or Bi is a conjunct of C, then TL |= C ⊑ A for every L ∈ Ln . Assume now that C is not of this form. Then for some j such that 1 ≤ j ≤ n, C is neither of the form A ⊓ C ′ nor of the form Aj ⊓ C ′ nor of the form Bj ⊓ C ′ . Let L = (σ1 , . . . , σn ) ∈ Ln be such that TL |= C ⊑ A. Notice that TL |= C ⊑ A, for L = (σ1 , . . . , σn ) ∈ Ln , if, and only if, TL |= C ⊑ X0 ⊓∃σ1 .M ⊓· · ·⊓∃σn .M . By the claim in the proof of Lemma 66, for such a TL we must have ∅ |= C ⊑ ∃σj .M . Clearly, the number of L = (σ1 , . . . , σn ) ∈ Ln with ∅ |= C ⊑ ∃σj .M does not exceed |C|. Thus, either TL |= C ⊑ A for every L ∈ Ln or the number of L ∈ Ln such that TL |= C ⊑ A does not exceed |C|. Induction step. If D = D1 ⊓ D2 , then TL |= C ⊑ D if, and only if, T |= C ⊑ Di , i = 1, 2. By induction hypothesis, for i = 1, 2 either TL |= C ⊑ Di for every L ∈ Ln or there exist at most |C| different L ∈ Ln such that TL |= C ⊑ Di . Thus either TL |= C ⊑ D for every L ∈ Ln or the number of L ∈ Ln such that TL |= C ⊑ D also does not exceed |C|. Now assume that D = ∃t.D ′ . Suppose that TL |= C ⊑ D for some L ∈ Ln . Then, by Lemma 65, either there exists a conjunct Z of C, Z a concept name, such that TL |= Z ⊑ ∃t.D ′ or there exists a conjunct ∃t.C ′ of C with TL |= C ′ ⊑ D ′ . We analyse for every conjunct of C of the form Z or ∃t.C ′ the number of L ∈ Ln such that TL |= Z ⊑ ∃t.D ′ or TL |= ∃t.C ′ ⊑ ∃t.D ′ , respectively. (i) Let Z be a conjunct of C such that Z is a concept name and TL |= Z ⊑ ∃t.D ′ . Notice that Z 6= M as there is no L ∈ Ln such that TL |= M ⊑ ∃t.D ′ . We consider the remaining cases. – Z = Xi , for some i ≥ 0. It is easy to see that for L, L′ ∈ Ln we have TL |= Xi ⊑ ∃t.D ′ if, and only if TL′ |= Xi ⊑ ∃t.D ′ . Thus, TL |= Z ⊑ ∃t.D ′ for every L ∈ Ln . – Z ∈ {Ai , Bi | 1 ≤ i ≤ n}. By Lemma 72, TL |= Z ⊑ ∃t.D ′ if, and only if, TL |= X0 ⊓ ∃σi .M ⊑ ∃t.D ′ . By Lemma 65, either TL |= X0 ⊑ ∃t.D ′ or TL |= ∃σi .M ⊑ ∃t.D ′ . If TL |= X0 ⊑ ∃t.D ′ then, as above, for TL |= C ⊑ ∃t.D ′ every L ∈ Ln . Suppose that ∃t.D ′ is such that TL 6|= X0 ⊑ ∃t.D ′ and TL |= ∃σi .M ⊑ ∃t.D ′ . By inductive applications of Lemma 65, this is only possible if ∃t.D ′ = ∃σi .M . Thus, there is exactly one L ∈ Ln (namely, L = L0 ) such that TL |= Z ⊑ ∃σi .M . – Z = A. Suppose that for some L = (σ1 , . . . , σn ) ∈ Ln we have TL |= A ⊑ ∃t.D ′ . Equivalently, TL |= X0 ⊓ ∃σ1 .M ⊓ . . . σn .M ⊑ ∃t.D ′ . By Lemma 65, either TL |= X0 ⊑ ∃t.D ′ or TL |= ∃σi .M ⊑ ∃t.D ′ for some i with 1 ≤ i ≤ n. Thus, as above, unless TL |= X0 ⊑ ∃t.D ′ we have ∃t.D ′ is ∃σi .M . But then L = L0 . (ii) Let ∃t.C ′ be a conjunct of C with TL |= C ′ ⊑ D ′ . The induction hypothesis implies that the number of L ∈ Ln such that TL |= C ′ ⊑ D ′ does not exceed |C ′ |. 62 Exact Learning of Lightweight Description Logic Ontologies To summarise, either TL |= C ⊑ ∃t.D ′ for every L ∈ Ln or for every conjunct C0 of C of the form Z or ∃t.C ′ , the number of L ∈ Ln such that TL |= C0 ⊑ ∃t.D ′ does not exceed |C0 |. Hence the number of L ∈ Ln such that TL |= C ⊑ ∃t.D ′ does not exceed |C|. ❏ The next result is used in the proof of Lemma 67. Lemma 73 For any 0 ≤ i ≤ n and concept expression D over Σn , if T0 6|= Xi ⊑ D then there exists a sequence of role names t1 , . . . tl ∈ {r, s}l such that ∅ |= D ⊑ ∃t1 . · · · ∃tl .Y and T0 6|= Xi ⊑ ∃t1 . · · · ∃tl .Y , where Y is either ⊤ or a concept name and 0 ≤ l ≤ n − i + 1. Proof We prove the lemma by induction on i from i = n to i = 0. If i = n, then T0 6|= Xi ⊑ D if either ∅ |= D ⊑ ∃t.⊤, for some role name t, or ∅ |= D ⊑ Y , for some concept name Y 6= Xi . Suppose that the lemma is proved for 0 < j ≤ n and let i = j − 1. We proceed by induction on the structure of D. If D is a concept name, we are done as T0 |= Xi ⊑ Z does not hold for any concept name Z 6= Xi . If D is of the form ∃t.D ′ , where t ∈ {r, s}, then T0 6|= Xi+1 ⊑ D ′ , and so, by induction hypothesis, there exists a sequence of role names t1 , . . . , tl , with l ≤ n − i, such that T0 6|= Xi+1 ⊑ ∃t1 . · · · ∃tl .Y and ∅ |= D ′ ⊑ ∃t1 . · · · ∃tl .Y . But then, by Lemma 72 and Lemma 65, T0 6|= Xi ⊑ ∃t.∃t1 . · · · ∃tl .Y and ∅ |= ∃t.D ′ ⊑ ∃t.∃t1 . · · · ∃tl .Y . If D is of the form D = D1 ⊓ D2 , there there exists Di , i = 1, 2, such that T0 6|= Xi ⊑ Di and the lemma holds by induction hypothesis. ❏ 63
2cs.AI
FLIC: Fast Linear Iterative Clustering with Active Search Jiaxing Zhao1 Bo Ren1∗ arXiv:1612.01810v2 [cs.CV] 21 Nov 2017 1 Qibin Hou1 Nankai University Abstract In this paper, we reconsider the clustering problem for image over-segmentation from a new perspective. We propose a novel search algorithm named “active search” which explicitly considers neighboring continuity. Based on this search method, we design a back-and-forth traversal strategy and a “joint” assignment and update step to speed up the algorithm. Compared to earlier works, such as Simple Linear Iterative Clustering (SLIC) and its follow-ups, who use fixed search regions and perform the assignment and the update step separately, our novel scheme reduces the number of iterations required for convergence, and also improves the boundary sensitivity of the over-segmentation results. Extensive evaluations on the Berkeley segmentation benchmark verify that our method outperforms competing methods under various evaluation metrics. In particular, lowest time cost is reported among existing methods (approximately 30 fps for a 481 × 321 image on a single CPU core). To facilitate the development of over-segmentation, the code will be publicly available. 1 Introduction Superpixels, generated by image over-segmentation, take the place of pixels to become the fundamental units in various computer vision tasks, including image segmentation (Cheng et al. 2016), image classification (Wang et al. 2013b), 3D reconstruction (Hoiem, Efros, and Hebert 2005), object tracking (Wang et al. 2011), etc. Such a technique can greatly reduce computational complexity, avoid undersegmentation, and reduce the influence caused by noise. Therefore, how to generate superpixels with high efficiency plays an important role in many vision and image processing applications. Generating superpixels has been an important research issue, and a group of classical methods have been developed, including FH (Felzenszwalb and Huttenlocher 2004), Mean Shift (Comaniciu and Meer 2002), Watershed (Vincent and Soille 1991), etc. The lack of compactness and the irregularity of superpixels restrict their applications, especially when contrast is poor or shadows are present. To solve the above-mentioned problems, Shi and Malik proposed Normalized Cuts (NC) (Shi and Malik 2000) that generated compact superpixels. However, this method does not ∗ Bo Ren is the corresponding author: [email protected]. Ming-Ming Cheng1 2 Paul L. Rosin2 Cardiff University adhere to image boundaries very well, and the complexity is high. GraphCut (Boykov, Veksler, and Zabih 2001; Veksler, Boykov, and Mehrani 2010) regarded the segmentation problem as an energy optimization process. It solved the compactness problem by using min-cut/max-flow algorithms (Boykov and Kolmogorov 2004; Kolmogorov and Zabin 2004), but their parameters are hard to control. Turbopixel (Levinshtein et al. 2009) is another method that is proposed to solve the compactness problem. However, the inefficiency of the underlying level-set method (Osher and Sethian 1988) restricts its applications. Bergh et al. (2012) proposed an energy-driven algorithm SEEDS whose results adhered to the boundaries well, but unfortunately it suffers from irregularity and the number of superpixels is uncertain. ERS (Liu et al. 2011), although it performs well on the Berkeley segmentation benchmark, has a high computational cost that limits its practical use. Achanta et al. (2012) proposed a linear clustering based algorithm SLIC. It generates superpixels based on Lloyd’s algorithm (Lloyd 1982) (also known as Voronoi iteration or k-means). In the assignment step of SLIC, as a key point to speed up the algorithm, each pixel p is associated with those cluster seeds whose search regions overlap its location. Such a strategy is also adopted by most subsequent works based on SLIC. SLIC is widely used in various applications (Wang et al. 2011) because of its high efficiency and good performance. Inspired by SLIC, Wang et al. (2013a) implemented an algorithm SSS that considered the structural information within images. It uses the geodesic distance (Peyré et al. 2010) computed by the geometric flows instead of the simple Euclidean distance. However, efficiency is poor because of the bottleneck caused by the high computational cost of measuring geodesic distances. Very recently, Liu et al. proposed Manifold SLIC (2016) that generated contentsensitive superpixels by computing Centroidal Voronoi Tessellation (CVT) (Du, Faber, and Gunzburger 1999) in a special feature space. Such an advanced technique makes it much faster than SSS but still slower than SLIC owing to the cost of its mapping, splitting and merging processes. From the aforementioned descriptions, we see that abovementioned methods improve the results by either using more complicated distance measurements or providing more suitable transformations of the feature space. However, the assignment and update steps within these methods are per- formed separately, leading to low convergence rate. In this paper, we consider the over-segmentation problem from a new perspective. Each pixel in our algorithm is allowed to actively search which superpixel it should belong to, according to its neighboring pixels as shown in Figure 1. In the meantime, the seeds of the superpixels can be adaptively changed during this process, which allows our assignment and update steps to be performed jointly. This property enables our approach to converge rapidly. To sum up, our main advantages are: • Our algorithm features good awareness of neighboringpixel continuity, and produces results with good boundary sensitivity regardless of image complexity and contrast. • Our algorithm performs the assignment step and the update step in a joint manner, and has a high convergence rate as well as the lowest time cost among all superpixel segmentation approaches. Experiments show that our approach is able to converge in two scan loops, with better performance measured under a variety of evaluation metrics on the Berkeley segmentation benchmark. 2 Preliminaries Before introducing our approach that allows adaptive search regions and joint assignment and update steps, we first briefly recap the standard previous scheme with fixed search regions and separate steps. A typical one is the SLIC algorithm who improves Lloyd’s algorithm, reducing the time complexity from O(KN ) to O(N ), where K is the number of the superpixels and N is the number of pixels. Let {Ii }N i=1 be a color image, where Ii represents the corresponding variable of each pixel. Given a set of evenly distributed seeds {Sk }K k=1 , SLIC simplifies the Lloyd’s algorithm to get the Centroidal Voronoi Tessellation (CVT) (Du, Faber, and Gunzburger 1999) that will be introduced in Section 3.4. In the assignment step, each pixel Ii is associated with those cluster seeds whose search regions overlap its location as shown in Figure 1(a). The area of a search p region can be denoted by 2T × 2T , where T = N/K. Specifically, SLIC considers Ii to lie in a five dimensional space that contains a three dimensional CIELAB color space (li , ai , bi ) and a two dimensional spatial space (xi , yi ). SLIC measures the distance between two points using a weighted Euclidean distance, which can be computed by s  2 ds ∗ m 2 D(Ii , Ij ) = dc + , (1) Ns p s s p p p s s: seed p: pixel (a) SLIC s s: seed p: pixel (b) Active search Figure 1: (a) The search method used in SLIC. Each seed only searches a limited region to reduce computation complexity. (b) Our proposed active search. Each pixel is able to decide its own label by searching its surroundings. obtains the over-segmentation results by iteratively performing the assignment and update steps. The follow-up works of SLIC also use a similar procedure as SLIC. They improve the performance of SLIC using better distance measures or more suitable transformation function between color space and spatial space. However, in these algorithms, each search region is fixed in the assignment step of a single loop, and the relationship among neighboring pixels is largely ignored when allocating pixels to superpixels. Separately performing the assignment step and the update step also leads to a delayed feedback of pixel label change. 3 The Proposed Approach Since superpixels normally serve as the first step of other vision related applications, how to generate superpixels with good boundaries and very fast speed is a crucial problem. Here, unlike previous algorithms (Achanta et al. 2012; Liu et al. 2016), we consider this problem from a new aspect, in which only the surrounding pixels are considered for determining the label of the current pixel. Each pixel actively selects which superpixel it should belong to in a back-andforth order to provide better estimation of over-segmentation regions. Moreover, the assignment step and the update step are performed jointly. Very few iterations are required for our approach to reach convergence. An overview of our algorithm can be found in Alg. 1. 3.1 Problem Setup (3) Given the desired number of superpixels K and an input image I = {Ii }N i=1 , where N is the number of pixels, our goal is to produce a series of disjoint small regions (or superpixels). Following most previous works (Achanta et al. 2012), the original RGB color space is transformed to the CIELAB color space (which has been proven useful). Thus, each pixel Ii in an image I can be represented in a five dimensional space, Ii = (li , ai , bi , xi , yi ). (4) In the update step, SLIC recomputes the center of each superpixel and moves the seeds to these new centers. Then it We first divide the original image into a regular grid p containing K elements {Gk }K with step length υ = N/K as k=1 where m is a variable that controls the weight of the spatial term, and Ns = T . Variables ds and dc are respectively the spatial and color distances, which can be expressed as q ds = (xi − xj )2 + (yi − yj )2 , (2) and dc = q (li − lj )2 + (ai − aj )2 + (bi − bj )2 . Algorithm 1 FLIC Require: Image I with N pixels, the desired number of superpixels K, the maximal iteration numbers itrmax and the spatial distance weight m. Ensure: K superpixels K Divide the original image pinto regular grids {Gk }k=1 with step length υ = N/K. Initialize labels {Lk }K k=1 for pixels according to their locations. Move each seed to the lowest gradient position in 3×3 neighborhoods. Initialize seeds {Sk }K k=1 . Regard pixels sharing the same label as a superpixel ζ. Initialize distance d(i) = ∞ for each pixel and itr = 0. while itr < itrmax do for each superpixel ζk do Use back-and-forth scan to traverse superpixel ζk to get the pixels processing sequence (Section 3.3). for each pixel Ii in the sequence do Set d(i) = D(Ii , SLi ) by Eqn. 1 for Ij in the four-neighborhood of Ii do if Lj 6= Li then Compute D = D(Ii , SLj ).(Eqn. 1) if D < d(i) then d(i) = D; Li = Lj . end if end if end for if Li is changed to Lj then Use Eqn. 10 to update ζLi ; Use Eqn. 11 to update ζLj ; Update the bounding box of ζLj .(Section 3.4) end if end for end for itr++; end while in (Achanta et al. 2012), and the initial label for each pixel Ii is assigned as: Li = k, if Ii ∈ Gk . (5) We initialize the seed Sk in Gk as the centroid. Therefore, Sk can also be defined in the same five dimensional space Sk = {lk , ak , bk , xk , yk }. 3.2 (6) Label Decision In most natural images adjacent pixels tend to share the same labels, i.e. neighboring pixels have natural continuity. Thus, we propose an active search method that is able to leverage as much of this a priori information as possible. In our method, unlike most previous works (Achanta et al. 2012; Liu et al. 2016), the label of the current pixel is only determined by its neighbors. We will compute the distances between the current pixel and the seeds of its four or eight adjacent pixels. Figure 1 provides a more intuitive illustration. Specifically, for a pixel Ii , our assignment principle is Li = argmin D(Ii , SLj ), Ij ∈ Ai , (7) Lj where Ai consists of Ii and its four neighboring pixels, SLj is Ij ’s corresponding superpixel seed. We use Eqn. 1 to measure the distance D(Ii , SLj ). Since each pixel can only be assigned to a superpixel containing at least one of its neighbors, the local pixel continuity has a stronger effect in the proposed strategy, allowing each pixel to actively assign itself to one of its surrounding closely connected superpixel regions. The advantages of such a strategy are obvious. First, the nearby assignment principle can avoid the occurrence of too many isolated regions, indirectly preserving the desired number of superpixels. Second, such an assignment operation is not limited by a fixed range in space, resulting in better boundary adherence despite some irregular shapes of those superpixels with very complicated content. Furthermore, in the assignment process, the superpixel centers are also self-adaptively modified, leading to faster convergence. Detailed demonstration and analysis can be found in Section 4.3. It is worth mentioning that the neighbors of the internal pixels in a superpixels normally share the same labels, so it is unnecessary to process them any more. This fact allows us to process each superpixel extremely quickly. 3.3 Traversal Order The traversal order plays a very important role in our approach in that an appropriate scanning order may lead to a visually better segmentation. As demonstrated in Section 3.2, the label of each pixel only depends on the seeds of its surrounding pixels. This indicates that, in a superpixel, the label of the current pixel is directly or indirectly related to those pixels that have already been dealt with. To better take advantage of this avalanche effect, we adopt a back-andforth traversal order as in PatchMatch (Barnes et al. 2009), in which the pixels that are processed later will benefit from the previously processed pixels. Figure 2 makes this process clear. In the forward pass, the label decision of each pixel considers the information from the top surrounding pixels of the superpixel, and similarly, the backward pass will provide the information from the bottom surrounding pixels of the superpixel. With such a scanning order, all the surrounding information can be taken into consideration, yielding better segments. Considering that an arbitrary superpixel might have an irregular shape instead of a simple rectangle or square, we actually use a simplified strategy to traverse the whole superpixel. For any superpixel, we first find a minimum bounding box within which all its pixels are enclosed, as shown in Figure 2. We then perform the scanning process for all the pixels in the corresponding minimum bounding box and only deal with those pixels that are within the superpixel. 3.4 Joint assignment and update step A common phenomenon in existing methods, such as SLIC (Achanta et al. 2012), is that the assignment step and the up- (a) A region and its bounding box (b) Forward scan order (c) Backward scan order (d) Bounding box after updating Figure 2: Illustration of our scanning order for each superpixel. We use gray regions enclosed by blue lines to represent superpixels and use red dashed rectangles to denote their corresponding bounding boxes. As shown in (b) and (c), we first scan the bounding box from left to right and top to bottom and then in the opposite direction. The shape of each superpixel might change, and so we update the bounding box if this occurs, as in (d), and leave it unchanged if there are no changes to the superpixel shape. date step are performed separately, leading to delayed feedback from pixel label changes to superpixel seeds. An obvious problem of such a strategy is that many (normally more than five) iterations are required which becomes the bottleneck of fast convergence. In our approach, based on the assignment principle Eqn. 7, we design a “joint” assignment and update strategy which operate these two steps at a finer granularity. The approximately joint step is able to adjust the superpixel seed center position on the fly, drastically reducing the number of iterations needed for convergence. Since most clustering-based superpixel methods use the Centroidal Voronoi Tessellation (CVT), we will briefly introduce the CVT first and then describe our method. Let S = {Sk }K k=1 be the set of seeds in the image, where K is the expected number of superpixels. The Voronoi cell V(Sk ) of a seed Sk is denoted by: VSk = {Ii ∈ I | d(Ii , Sk ) ≤ d(Ii , Sj ), ∀Sj ∈ S}, (8) where d(Ii , Sk ) is an arbitrary distance measure from pixel Ii to the seed Sk . The Voronoi Diagram VD (S) is defined by VD (S) = {VSk 6= φ | ∀Sk ∈ S}. (9) A CVT is then defined as a Voronoi Diagram whose generator point of each Voronoi cell is also its center of mass. As mentioned above, the traditional CVT is usually obtained by heuristic algorithms, such as Lloyd’s algorithm, iteratively performing updates after each assignment step until convergence is reached. In our approach, on account of our novel label decision strategy as shown in Eqn. 7, we are able to jointly perform the update step and the assignment step instead of separately. More specifically, after pixel Ii is processed, if its label is changed to, for instance, Lj , we immediately update the current seed SLi using the following equation: SLi = SLi ∗ |ζLi | − Ii , |ζLi | − 1 update SLj using the following equation SLj = where |ζLi | is the number of pixels in superpixel ζLi , and (11) The bounding box of ζLj is also updated thereafter. It is noteworthy to mention that the above updates only contain very simple arithmetic operations and hence can be performed very efficiently. Such an immediate update will help later pixels make a better choice during assignment, leading to better convergence. Figure 6 shows the convergence speed of our approach. 4 Experiments Our method is implemented in C++ and runs on a PC with an Intel Core i7-4790K CPU with 4.0GHz, 32GB RAM, and 64 bit operating system. We compare our method with many previous and current state-of-the-art works, including FH (Felzenszwalb and Huttenlocher 2004), SLIC (Achanta et al. 2012), Manifold SLIC (Liu et al. 2016), SEEDS (Van den Bergh et al. 2012), and ERS (Liu et al. 2011) on the BSDS500 benchmark, using the evaluation methods proposed in (Arbelaez et al. 2011; Stutz, Hermans, and Leibe 2014). Note that the source codes used in evaluation of the above works may be of different versions, and we find this leads to performance difference from the original reports when a different implementation of evaluation code is applied. To give a fair comparison, we uniformly use publicly available source code (Arbelaez et al. 2011; Stutz, Hermans, and Leibe 2014) for all the methods. As in previous researches in the literature (Liu et al. 2016; Wang et al. 2013a), we evaluate all algorithms on 200 randomly selected images of resolution 481 × 321 from the Berkeley dataset. 4.1 (10) SLj ∗ ζLj + Ii . ζL j + 1 Parameters In our approach, three parameters need to be set. The first one is the number of superpixels K. One of the common advantages of clustering-based algorithms is that the expected Ours ERS SEEDS FH SLIC M-SLIC 0.8 0.75 0.7 0.65 0.6 100 200 300 400 500 Undersegment error Boundary recall 0.9 0.85 0.15 0.1 0.05 600 Number of superpixels 0.2 (a) BR curves 0 0.2 0.4 Time(seconds) 0.6 0.8 (b) UE trade-off 1 0.9 0.95 0.85 Ours ERS SEEDS FH SLIC M-SLIC 0.9 0.85 0.8 0 0.2 0.4 Time(seconds) 0.6 (c) ASA trade-off 0.8 Boundary Recall Ours ERS SEEDS FH SLIC M-SLIC Achievable segmentation accuracy 0.25 1 0.95 Ours ERS SEEDS FH SLIC M-SLIC 0.8 0.75 0.7 0 0.2 0.4 Time(seconds) 0.6 0.8 (d) BR trade-off Figure 3: Comparisons between existing state-of-the-art methods and our approach (FLIC) on the BSDS500 benchmark. In (b)(d), K is fixed to 200 to demonstrate our best trade-off between performance and efficiency between competing methods. As can be seen, our strategy significantly outperforms methods that have similar time cost in boundary recall. At least competitive results are also achieved compared to slower methods (e.g. the state-of-the-art method ERS (Liu et al. 2011)) in all the evaluation metrics, but at an order of magnitude faster speed. 0.85 itr = 4 (Normal scan-line) itr = 1 (Forth-and-back) itr = 2 (Forth-and-back) 0.8 0.75 Time(seconds) Boundary recall 0.9 0.7 100 100 200 300 400 BR Time BR Time BR Time BR Time 4-N 78.6 34 85.9 35 89.1 36 91.8 38 8-N 80.5 54 87.4 56 90.5 59 92.7 61 0.08 1 0.95 0.06 0.04 0.02 itr = 3 (Forth-and-back) 200 300 400 500 Number of superpixels (a) BR 600 0 100 200 300 400 500 Number of superpixels 600 (b) Time Cost Figure 4: Part of sensitivity analysis under the standard evaluation metrics and time cost. number of superpixels can be directly obtained by setting the clustering parameter K. The second one is the spatial distance weight m. Parameter m has a large effect on the smoothness and compactness of superpixels. We shall show that our performance will increase as m decreases. However, a small m can also lead to the irregularity of superpixels. To achieve a good trade-off between compactness and performance, in the following experiments, we set m = 5 as default. The last parameter is the number of iterations itr. Here we set itr = 2 in default to get the balance between time cost and performance. What should be stressed out here is that to compare with other methods in a fair way, for each method we optimize its parameters to maximize the recall value computed on the BSDS500 benchmark. 4.2 Table 1: Boundary recall and time cost comparisons between 4-neighborhood and 8-neighborhood with different superpixel counts: 100, 200, 300, 400. Comparison with Existing Methods Our approach outperforms previous methods that have similar computational efficiency , and achieve at least comparable results compared to slower algorithms with an order of magnitude faster speed. Details are discussed below. Boundary Recall (BR). Boundary recall is a measurement which denotes the adherence to the boundaries. It computes what fraction of the ground truth edges falls within εpixel length from at least one superpixel boundary. The BR (Achanta et al. 2012) can be computed by P p∈ξG Π(minq∈ξS kp − qk < ε) , (12) BRG (S) = |ξG | where ξS and ξG respectively denote the union set of superpixel boundaries and the union set of ground truth boundaries. The indicator function Π checks if the nearest pixel is within ε distance. Here we follow (Achanta et al. 2012; Liu et al. 2016) and set ε = 2 in our experiment. The boundary recall curves of different methods are plotted in Figure 3(a). One can easily observe that our FLIC method outperforms all other methods. Undersegment Error (UE). The undersegment error reflects the extent that superpixels do not exactly overlap the ground truth segmentation. Similar to BR, UE can also reflect the boundary adherence. The difference is that UE uses segmentation regions instead of boundaries in the measurement. Mathematically, the UE (Neubert and Protzel 2012) can be computed by P P G∈%G ( S:S∩G6=φ min(Sin , Sout )) , (13) U EG (S) = N where %S is the union set of superpixels, %G is the union set of the segments of the ground truth, Sin denotes the overlapping of the superpixel S and the ground truth segment G, and Sout denotes the rest of the superpixel S. As shown in Figure 3(b), our results are nearly the same as those of the best approach ERS(Liu et al. 2011) and run significantly faster. Achievable Segmentation Accuracy (ASA). ASA gives the highest accuracy achievable for object segmentation that utilizes superpixels as units. Similar to UE, ASA utilizes segments instead of the boundaries, which can be computed by (Liu et al. 2011) P maxi |Sk ∩ Gi | ASAG (S) = k P , (14) i Gi 0.9 Ours SLIC 0.85 Boundary recall Boundary recall 0.9 0.8 0.75 0.7 0 5 10 15 Spatial distance weight m 0.85 Ours SLIC 0.8 0.75 0.7 0 5 (a) Iteration 10 15 (b) 4.3 Figure 5: (a) The BR-m curves, where m is the spatial distance weight in Eqn. 1. Our overall performance is far better than SLIC for all the tested m. (b) The BR-Iteration curves. Our method converges within 2 iterations, which is much faster than SLIC. Boundary recall 0.9 Jointly Separately 0.88 0.86 0.84 0.82 0.8 0 5 Iteration 10 method, our approach adheres to boundaries very well and runs twice as fast. Compared to ERS method, our resulting superpixels are much more regular and the mean execution time of our approach is 20 times shorter. All the aforementioned facts and Figure 3 reflect that our approach achieves an excellent compromise among adherence, compactness, and time cost. 15 Figure 6: Comparison of the convergence rate between joint and separate assignment and update steps. where Sk represents the superpixel and Gi represents the ground truth segment. A better superpixel segmentation will have a larger ASA value. As shown in Figure 3(c), compared to the ERS (Liu et al. 2011), the performance of our approach is competitive and our method achieves the best trade-off between the performance and time cost. Time Cost (TC). Similar to SLIC, our method also achieves an O(N ) time complexity. We know that computation efficiency is one of the most important points for using superpixels as elementary units. Many approaches are limited by their speeds, such as SSS (Wang et al. 2013a) and ERS (Liu et al. 2011). As shown in Figure 3, the average time cost of FLIC with two iterations when processing an image is 0.035s, while the time costs of ERS, Manifold SLIC, SLIC, and FH are 0.625, 0.281s, 0.072s, and 0.047s, respectively. It is obvious that FLIC has the lowest time cost among all methods and it runs nearly 20 times faster than ERS with comparable result quality. Visual Results and Analysis. In Figure 7, we show several superpixel segmentation results using different algorithms. As can be seen, our approach is more sensitive to image boundaries, especially when there is poor contrast between the foreground and background. Compared to SLIC Algorithm Analysis Efficacy of the back-and-forth Traverse Order. As shown in Figure 2, we adopt a back-and-forth traverse order to scan the whole region enclosed by a bounding box for each superpixel. Actually, a couple of forward scans can also perform very well for our method. We provide a comparison between two strategies: using pure forward scan order for four iterations versus using the proposed back-and-forth scan order twice (which is also four iterations). Figure 4 shows quantitative comparisons between these two strategies. The blue line represents the results using normal forward scan order while the red line stands for the results using our method. It can be seen that the red curve significantly outperforms the blue one and achieves competitive time cost compared to the blue curve. This fact reflects that our back-and-forth scan order considers more information about the regions outside the bounding box, leading to more reliable boundaries. The Role of the Spatial Distance Weight. As shown in Figure 5(a), unlike SLIC (Achanta et al. 2012), the BR curve with respect to the spatial distance weight m is monotonically decreasing in our approach. The reason for this phenomenon is that in our method local region continuity is mostly ensured by the active search algorithm, and color boundaries are less well preserved for larger m. On the other hand, small m will result in less regular superpixels, so we choose m = 5 for our comparison with previous works. It is noteworthy to mention that superpixels are normally considered as the first step of most vision tasks and these vision tasks often favor those superpixel methods with good boundaries. Therefore, users can select a reasonable value for m according to their specific conditions. In any case, our overall performance is significantly better for all m values. Convergence Rate. FLIC significantly accelerates the evolution so that we only need a few iterations before convergence. We compare the performance curves with different iterations on the Berkeley benchmark. It can be easily found in Figure 5(b) that our algorithm quickly converges within only two iterations and more iterations only bring marginal benefits to the results. Numerically, the boundary recall of the superpixels with only one iteration is 0.835 when K is set to 200. The value after two iterations is 0.859 and after three iterations it is 0.860 when generating the same number of superpixels. The undersegment error values are 0.115, 0.108, and 0.107, respectively. The achievable segmentation accuracy values are 0.941, 0.945, and 0.946, respectively. As can be seen in Figure 5(b), our algorithm not only converges much faster than SLIC (which requires ten iterations to converge), but also obtains better performance. The Role of the Joint Assignment and Update. Our algorithm jointly performs the assignment and update steps. In Figure 6, we show the convergence rates of both our (a) Ours (b) FH (c) SLIC (d) M-SLIC (e) SEEDS (f) ERS Figure 7: Visual comparison of superpixel segmentation results using different existing algorithm with 100 superpixels and m = 10. Our approach adheres to boundaries very well and at the same time produces compact superpixels. Figure 8: Images segmented by our proposed approach with m = 20 and the number of superpixels set to 1000, 400, and 200, respectively. The resulting superpixels adhere to region boundaries very well. Figure 9: Images segmented by our proposed approach with m = 10, 20, and 30, respectively. When m tends to be a smaller value, the superpixels adhere well to boundaries. When m becomes larger, the superpixels become more compact. joint approach and that of separately performing assignment and update steps. One can observe that our joint approach converges very quickly and only two iterations are needed, while the separate approach needs another two iterations to reach the same BR value. This phenomenon demonstrates that our joint approach is efficient and without any negative effect on our final results. Effect on the Size of Neighborhoods. As mentioned in Section 3, in our implementation, the label of the current pixel relies on its four neighborhood pixels. Actually, using eight neighborhood pixels is also reasonable as more neighbors will definitely provide more useful information. In Table 1, we briefly compare the results for these two cases. A natural observation is that using larger neighborhoods leads to an increase in performance but at the cost of reducing running speed. With regard to real applications, users can select either case to suit their own preferences. Qualitative Results. In Figure 8 we show some segmentation results produced by our approach with m = 20 and the number of superpixels set to 1000, 400, and 200, respectively. It is seen that, over the range of K value, the edges of the resulting superpixels are always very close to the boundaries. This phenomenon is especially obvious in the first image and the third image. We also show some segmentation results with different values of m in Figure 9. When m tends to smaller values, for example 10, the shapes of the resulting superpixels become less regular. When m is larger, for example 30, the resulting superpixels become more compact. 5 Conclusions In this paper we present a novel algorithm using active search, which is able to improve the performance and significantly reduce the time cost for using superpixels to oversegment an image. Taking advantage of local continuity, our algorithm provides results with good boundary sensitivity regardless of image contrast and complexity. Moreover, it is able to converge in only two iterations, achieving the lowest time cost compared to previous methods while obtain- ing performance comparable to the state-of-the-art method ERS with 1/20th of its running time. We have used various evaluation metrics on the Berkeley segmentation benchmark dataset to demonstrate the high efficiency and high performance of our approach. Acknowledgments This research was sponsored by NSFC (61620106008, 61572264), CAST (YESS20150117), Huawei Innovation Research Program (HIRP), and IBM Global SUR award. References Achanta, R.; Shaji, A.; Smith, K.; Lucchi, A.; Fua, P.; and Süsstrunk, S. 2012. SLIC superpixels compared to state-of-theart superpixel methods. IEEE Trans. PAMI 34(11):2274–2282. Arbelaez, P.; Maire, M.; Fowlkes, C.; and Malik, J. 2011. Contour detection and hierarchical image segmentation. IEEE Trans. PAMI 33(5):898–916. Barnes, C.; Shechtman, E.; Finkelstein, A.; and Goldman, D. 2009. Patchmatch: a randomized correspondence algorithm for structural image editing. ACM Transactions on Graphics-TOG 28(3):24. Boykov, Y., and Kolmogorov, V. 2004. An experimental comparison of min-cut/max-flow algorithms for energy minimization in vision. IEEE Trans. PAMI 26(9):1124–1137. Boykov, Y.; Veksler, O.; and Zabih, R. 2001. Fast approximate energy minimization via graph cuts. IEEE Trans. PAMI 23(11):1222– 1239. Cheng, M.-M.; Liu, Y.; Hou, Q.; Bian, J.; Torr, P.; Hu, S.-M.; and Tu, Z. 2016. HFS: Hierarchical feature selection for efficient image segmentation. In ECCV, 867–882. Springer. Comaniciu, D., and Meer, P. 2002. Mean shift: A robust approach toward feature space analysis. IEEE Trans. PAMI 24(5):603–619. Du, Q.; Faber, V.; and Gunzburger, M. 1999. Centroidal Voronoi tessellations: applications and algorithms. SIAM review 41(4):637– 676. Felzenszwalb, P. F., and Huttenlocher, D. P. 2004. Efficient graphbased image segmentation. International Journal of Computer Vision 59(2):167–181. Hoiem, D.; Efros, A. A.; and Hebert, M. 2005. Automatic photo pop-up. ACM transactions on graphics (TOG) 24(3):577–584. Kolmogorov, V., and Zabin, R. 2004. What energy functions can be minimized via graph cuts? IEEE Trans. PAMI 26(2):147–159. Levinshtein, A.; Stere, A.; Kutulakos, K. N.; Fleet, D. J.; Dickinson, S. J.; and Siddiqi, K. 2009. Turbopixels: Fast superpixels using geometric flows. IEEE Trans. PAMI (12):2290–2297. Liu, M.-Y.; Tuzel, O.; Ramalingam, S.; and Chellappa, R. 2011. Entropy rate superpixel segmentation. In Computer Vision and Pattern Recognition (CVPR), 2011 IEEE Conference on, 2097–2104. IEEE. Liu, Y.-J.; Yu, C.-C.; Yu, M.-J.; and He, Y. 2016. Manifold SLIC: A fast method to compute content-sensitive superpixels. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 651–659. Lloyd, S. 1982. Least squares quantization in PCM. IEEE Transactions on Information Theory 28(2):129–137. Neubert, P., and Protzel, P. 2012. Superpixel benchmark and comparison. In Proc. Forum Bildverarbeitung, 1–12. Osher, S., and Sethian, J. A. 1988. Fronts propagating with curvature-dependent speed: algorithms based on Hamilton-Jacobi formulations. Journal of computational physics 79(1):12–49. Peyré, G.; Péchaud, M.; Keriven, R.; and Cohen, L. D. 2010. Geodesic methods in computer vision and graphics. Foundations and Trends R in Computer Graphics and Vision 5(3–4):197–397. Shi, J., and Malik, J. 2000. Normalized cuts and image segmentation. IEEE Trans. PAMI 22(8):888–905. Stutz, D.; Hermans, A.; and Leibe, B. 2014. Superpixel segmentation using depth information. RWTH Aachen University, Aachen, Germany. Van den Bergh, M.; Boix, X.; Roig, G.; de Capitani, B.; and Van Gool, L. 2012. Seeds: Superpixels extracted via energy-driven sampling. In European conference on computer vision, 13–26. Springer. Veksler, O.; Boykov, Y.; and Mehrani, P. 2010. Superpixels and supervoxels in an energy optimization framework. In European conference on Computer vision, 211–224. Springer. Vincent, L., and Soille, P. 1991. Watersheds in digital spaces: an efficient algorithm based on immersion simulations. IEEE Trans. PAMI 13(6):583–598. Wang, S.; Lu, H.; Yang, F.; and Yang, M.-H. 2011. Superpixel tracking. In 2011 International Conference on Computer Vision, 1323–1330. IEEE. Wang, P.; Zeng, G.; Gan, R.; Wang, J.; and Zha, H. 2013a. Structure-sensitive superpixels via geodesic distance. International journal of computer vision 103(1):1–21. Wang, Z.; Feng, J.; Yan, S.; and Xi, H. 2013b. Image classification via object-aware holistic superpixel selection. IEEE Transactions on Image Processing 22(11):4341–4352.
1cs.CV
An asymptotically optimal indirect approach to continuous-time system identification arXiv:1803.08449v1 [cs.SY] 22 Mar 2018 Rodrigo A. González, Cristian R. Rojas and James S. Welsh Abstract— The indirect approach to continuous-time system identification consists in estimating continuous-time models by first determining an appropriate discrete-time model. For a zero-order hold sampling mechanism, this approach usually leads to a transfer function estimate with relative degree 1, independent of the relative degree of the strictly proper real system. In this paper, a refinement of these methods is developed. Inspired by indirect PEM, we propose a method that enforces a fixed relative degree in the continuous-time transfer function estimate, and show that the resulting estimator is consistent and asymptotically efficient. Extensive numerical simulations are put forward to show the performance of this estimator when contrasted with other indirect and direct methods for continuous-time system identification. Index Terms— System identification; Continuous-time systems; Parameter estimation; Sampled data. I. I NTRODUCTION System identification deals with the problem of estimating adequate models of dynamical systems from input-output data. The methods developed over the years in this field have seen applications in many areas of science and engineering, and comprehensive literature has been written on the subject [1]–[3]. When postulating a mathematical model for describing a dynamical system based on sampled data, one must decide between obtaining a discrete-time (DT), or a continuoustime (CT) model. In a predominantly digital era, DT system identification has been studied thoroughly (see, e.g., [1], [2]). Nevertheless, interest in CT models still persists due to its advantages over discrete-time. For example, greybox modelling [4], which is commonly based on physical principles and conservation laws, is naturally suited for continuous time, as the parameters can usually be better interpreted in this domain. Also, CT models are known to have more intuitive dynamics, and they do not depend on a sampling period. In CT system identification there are two main approaches, namely the direct and indirect approaches. For direct CT system identification, a CT model is obtained directly from the sampled data. The main difficulty present in the direct methods is the handling of derivatives, as they are not immediately available from discrete data points without amplifying This work was supported by the Swedish Research Council under contract number 2016-06079 (NewLEADS). R.A. González and C.R. Rojas are with the Department of Automatic Control and ACCESS Linnaeus Centre, KTH Royal Institute of Technology, 10044 Stockholm, Sweden (e-mails: [email protected], [email protected]). James S. Welsh is with the School of Electrical Engineering and Computer Science, University of Newcastle, Australia (e-mail: [email protected]). noise [5]. To effectively deal with this issue, many well known methods have been proposed [6], with success in real applications [7]. On the other hand, indirect methods for CT modelling first determine a suitable DT model via DT system identification methods like the Prediction Error Methods (PEM) or Maximum Likelihood (ML) [2], and then transform this model into a CT equivalent model. Evidence has been shown regarding the advantages of direct over indirect CT model identification [8], although with a precise initialisation of PEM, the approaches seem comparable for certain sampling periods [9]. Even though the indirect approach seems easy to implement, as there is much theory and literature concerning DT system identification, there are reasons why this approach is not always recommended. First, it may suffer from numerical inaccuracies at fast sampling, and requires a precise initialisation. In addition, it is not possible to select the desired numerator order of the CT model, as the estimated DT model will generally lead to a CT model with relative degree 1 in the case of sampling by a zero-order hold mechanism. Hence, an unnecessarily complex model structure is indirectly being estimated, which leads to a loss in accuracy according to the parsimony principle [1]. In this paper, we introduce a method that optimally imposes a desired relative degree in the indirect approach to continuous-time system identification. Based on Indirect PEM [10], we prove that the proposed estimator is a consistent and asymptotically efficient estimator of the system’s true parameter vector. Extensive numerical simulations show that the new method imposes the correct relative degree, while improving the statistical properties of the transfer function estimate, and achieves a performance that compares favourably against both standard direct and indirect approaches. The remainder of this paper is organised as follows. In Section II the problem is formulated. Section III provides an introduction to the indirect approach for CT system identification. In Section IV we derive an estimator that optimally enforces the desired relative degree for the indirect approach, and determine its properties. Section V illustrates the method with extensive numerical examples. Finally, conclusions are drawn in Section VI. II. P ROBLEM FORMULATION Consider a linear time-invariant, causal, stable, single input single output, CT system y(t) = G0 (ρ)u(t) βn−r ρn−r + βn−r−1 ρn−r−1 + · · · + β1 ρ + β0 = u(t), ρn + αn−1 ρn−1 + · · · + α1 ρ + α0 (1) where ρ is the Heavyside operator, i.e., ρg(t) = dg(t)/dt, and r is the relative degree of the system. In this paper, we denote θc0 := [βn−r . . . β0 αn−1 . . . α0 ]> as the true CT system parameter vector. Suppose that the input-output signals are sampled with period h and the resulting output is contaminated by an additive zero-mean white noise sequence {e(kh)}k∈N of variance σ 2 . That is, ym (kh) = y(kh) + e(kh), k ∈ N. (2) The goal of CT system identification is to obtain a CT transfer function estimate for G0 (ρ), given N discrete input-output data measurements {u(kh), ym (kh)}N k=1 and knowledge about the physical characteristics of the system, or the intersample behaviour. In this paper, we assume that the input is a piecewise constant signal between samples (i.e., zero-order hold behaviour [11]). For obtaining a model of G0 (ρ), a simple way to proceed is to identify the zero-order hold equivalent model given the input and output data measurements by using standard PEM in the DT domain, and then return to the CT domain via zero-order hold equivalences. Although this procedure has good statistical properties, it does not impose relative degree constraints in the CT domain. Our goal is to optimally impose this constraint, which should lead to a statistically improved estimate of G(s). III. T HE INDIRECT APPROACH TO CONTINUOUS - TIME SYSTEM IDENTIFICATION One approach to identifying a CT system is to first estimate the DT model given the input and output data samples, and then translate this model into continuous time. This is called the indirect approach, since it relies on DT system identification theory instead of obtaining immediately a CT model using CT system identification methods. Much literature has been written regarding the first step of the indirect approach [1], [2]. The theoretically optimal solution is to apply the maximum likelihood method. This method is known to give consistent and asymptotically efficient estimates under very general conditions. Under the assumption that the additive white noise is Gaussian, the ML method is equivalent to PEM, which is one of the most celebrated parametric methods, and is available in the MATLAB System Identification Toolbox [12]. If a CT model for (1) is required, we should propose a DT model structure of the form bn−1 z n−1 + bn−2 z n−2 + · · · + b1 z + b0 . H(z) = z n + an−1 z n−1 + · · · + a1 z + a0 (3) If we define θd = [bn−1 . . . b0 an−1 . . . a0 ]> and denote ŷ as the model’s output, then the ML estimate is θ̂d = arg min θd N 1 X kym (kh) − ŷ(kh, θd )k2 . σ2 k=1 The next step is to transform this DT transfer function into an adequate CT model. This can be done in several ways. For example, the well-known Tustin transformation can be applied on the DT transfer function estimate by letting sh + 2 , z= 2 − sh as reported in [13]. If it is assumed that the CT input signal is piecewise constant, the most natural mapping (used in e.g. [9], [14]), is the zero-order hold sampling equivalence     G0 (s) −1 −1 , (4) H0 (z) = (1 − z )Z L s t=kh where Z and L denote the Z and Laplace transforms, respectively. This mapping is known to be a troublesome part of the indirect approach, as it can be ill conditioned and its uniqueness depends on a correct choice of the sampling period. In both of these mappings, the resulting CT model can have numerator parameters that exceed the desired numerator orders. This is generally the case when the relative degree of G0 (s) is greater than 1. This problem contributes to poor accuracy and high standard deviations at high frequencies. One very simple way of treating this issue is setting to zero the numerator coefficients which should be zero, but this is not the best way of taking care of the information [9]. IV. O PTIMAL ENFORCEMENT OF RELATIVE DEGREE In this section we develop an indirect-approach estimator for the CT parameter vector θc0 that renders a CT transfer function estimate Ĝ(s) of a desired relative degree r. For this matter, we first focus on the PEM estimator of the zeroorder hold equivalent model of G0 (s). For simplicity, we assume that the correct model order has been found. A model with structure (3) is obtained by PEM, and the covariance matrix of θ̂d is also estimated. We know that the CT zero-order hold equivalent of this estimated model is in general given by Ĝ(s) = β̂n−1 sn−1 + β̂n−2 sn−2 + · · · + β̂1 s + β̂0 . sn + α̂n−1 sn−1 + · · · + α̂1 s + α̂0 Define θ̂c = [β̂n−1 . . . β̂0 α̂n−1 . . . α̂0 ]> , and denote by θd0 the true DT parameter vector. The parameters in θ̂c are related to θ̂d by the zero-order hold equivalence equations that can be derived by using (4) and comparing coefficients. This relation is a nonlinear mapping f : θ̂c → f (θ̂c ) = θ̂d , which is differentiable almost everywhere. Hence, the following asymptotic relationship is valid for the covariance matrices of θ̂d and θ̂c : Σθ̂d = E{(θ̂d − θd0 )(θ̂d − θd0 )> } ≈ E{J(θ̂c − θc0 )(θ̂c − θc0 )> J > } = JΣθ̂c J > , (5) where J is the Jacobian matrix of f evaluated at the naive estimation of θc0 , that is, throwing away the high order coefficients of the numerator of Ĝ which should be zero1 . Now, we propose to find an appropriate projection of θ̂c into a proper subspace of the parameter space that yields the desired relative degree. This subspace is simply the one formed by all vectors with first r − 1 elements set to zero. Hence, we decide to study the following problem: 1 (θ̂c − θ) θ̃c = arg min (θ̂c − θ)> Σ−1 θ̂c θ 2   Ir−1 0 θ = 0, s.t. (6) (7) where Ir−1 is the identity matrix of dimension r − 1, 0 is the null matrix of appropriate dimensions, and Σ−1 = J > Σ−1 J. θ̂c θ̂d The optimisation problem in this context can be interpreted as an application of the Indirect PEM [10]. By Lagrange multiplier theory, the optimization problem in (6) is equivalent to calculating, for a suitable λ,   1 (θ̂c − θ) + λ> Ir−1 0 θ. θ̃c = arg min (θ̂c − θ)> Σ−1 θ̂ c θ 2 Partitioning Σθ̂c appropriately (dropping the subindex for simplicity), and differentiating with respect to θ we obtain    Σ11 Σ12 Ir−1 θ̃c = θ̂c − λ, (8) Σ21 Σ22 0   Imposing (7) we obtain λ = Σ−1 11 Ir−1 0 θ̂c . If we denote by C the Cholesky factorization matrix of Σθ̂c [15] (i.e., a lower triangular matrix with positive diagonal entries such that Σθ̂c = CC > ) we can write (8) as    Ir−1 −1  θ̃c = θ̂c − Σ Σ11 Ir−1 0 θ̂c 0      C 0 Ir−1 −1 Ir−1 0 θ̂c = θ̂c − 11 C11 C21 C22 0   > 0 0 = C r−1 C −1 θ̂c . (9) 0 I2n−r+1 That is, the estimator (9) can be seen as an L2 best approximation to the PEM CT estimate θ̂c that imposes the desired relative degree. A. Properties We briefly present the most important properties of estimator (9) in the following theorems. Theorem 4.1: Consider the system described by (1) and (2), where {e(kh)}N k=1 is a Gaussian white noise sequence. Assume that the sampling frequency 2π/h is larger than twice the largest imaginary part of the s-domain poles and there is no delay in the real system2 . Then, the estimator (9) is a consistent and asymptotically efficient estimator of the real vector parameter θc0 , provided the DT model set (with the chosen relative degree) contains the real system. 1 Note that the standard PEM estimate could have also been used for this matter, and the asymptotic relation still holds. 2 These conditions can be relaxed, as long as the sampling frequency is such that the z → s transformation is well defined. Proof: Under the Gaussian noise assumption, the DT PEM estimate can be interpreted as the ML estimate. Under the proposed sampling frequency, the z → s transformation is unique for sufficiently large N [16]. Hence, by the invariance principle of ML estimators [17], the CT equivalent of the system’s parameters is also an ML estimate. To prove the theorem, we only require that the assumptions in [10] are satisfied in this scenario, and then directly apply the results obtained in the cited contribution. First, note that the model structure given by this procedure contains the models with the desired relative degree (and the contention is proper if r > 1), with a linear mapping between parameter vectors given by the matrix   T := 0r−1 I2n−r+1 . Furthermore, provided that the DT model set contains the real system, both structures give parameter identifiability. Also note that Σθ̂c , obtained via (5), is a consistent estimate of the covariance matrix of θ̂c . Hence, the results in Namely, estimation errors3 √ the normalized √ [10] follow. 0 0 N (θ̂c − θc )/σ and N (θ̃c − θc )/σ are asymptotically normally distributed with zero means and their asymptotic covariance matrices satisfy the relation [AsCov(θ̃c − θc0 )]−1 = T [AsCov(θ̂c − θc0 )]−1 T > . (10) Moreover, following the √ steps in [10, Section 3], the improved PEM estimate is N −consistent and has the same asymptotic distribution as θ̂c , thereby proving its asymptotic efficiency. Remark 4.1: Note that by (9) and (10), the asymptotic covariances can be shown to satisfy the following properties: • AsCov(θ̃c − θc0 , θ̂c − θ̃c ) = 0, • AsCov(θ̃c − θc0 ) = AsCov(θ̂c − θc0 ) − AsCov(θ̂c − θ̃c ). Both of these claims follow by applying properties 10.5 and 10.6 from [18, Chapter 10] to this context. These properties imply that for sufficiently large N , the proposed estimator can only decrease the covariance of the estimated parameters compared to standard PEM. The asymptotic covariances satisfy a Pythagorean relation, as the PEM estimate is projected orthogonally on to the proper subspace where θc0 lies. Next, we establish that imposing a larger relative degree improves the accuracy of the estimates, provided that the highest relative degree model structure contains the real system. Theorem 4.2: Given a plant G0 (s) of order n and relative degree r > 1, consider CT candidate models of relative degree r1 and r2 and their improved PEM parameter vector estimates θ̃cr1 and θ̃cr2 respectively. If r1 < r2 ≤ r, then their asymptotic covariance matrices satisfy AsCov(θ̃cr2 )  AsCov(θ̃cr1 ). Proof: The proof follows by applying [19, Theorem 2]. Details are omitted due to length restrictions. 3 For simplicity, we assume that the vector θ 0 has the appropriate c dimension, where zeros have been considered in the first terms if necessary. Remark 4.2: The relative degree of the CT system is not always known. In some practical applications, physical knowledge about the system can give intuition. In addition, statistical measures can be used such as the coefficient of determination [7], or the Young Information Criterion [20]. differences, and the correct relative degree has been imposed for this estimator. We have used the command d2c of MATLAB in both cases. SRIVC has been implemented with the CONTSID toolbox for MATLAB [6, Chapter 9] with default initialisation, and has been set to estimate the model V. M ONTE C ARLO SIMULATION STUDIES β1 s + β0 . s4 + α3 s3 + α2 s2 + α1 s + α0 A. Effect of the number of data points and sampling rate In this study, we have designed the input as a pseudorandom binary sequence (PRBS) of amplitude switches between 0 and 2. For the first input sequence, the number of stages of the shift register is n = 10 and the data length of the shortest interval is p = 7. Hence, a sequence of N = 7161 data points has been obtained. The noise is a zero-mean white Gaussian noise signal, where the variance has been set such that the signal-to-noise ratio (SNR in dB) between the noiseless output sequence and the noise equals 10 dB. Three Monte Carlo studies have been performed with M = 500 simulations of different noise realisations each one, for h = 0.01, 0.05, 0.1. The results are shown in Table I. We will now study the performance of the proposed estimator under a series of experiments. The system considered is the Rao-Garnier system [8], which is a linear fourth-order non-minimum phase system with complex poles that has been tested in many publications (see e.g. [7], [21], [22]) of CT system identification: −6400s + 1600 . s4 + 5s3 + 408s2 + 416s + 1600 This system is interesting since it has two damped oscillatory modes at 2 and 20 rad/sec with damping of 0.1 and 0.25 respectively, and has a non-minimum phase zero at s = 0.25. It is known that this is a particularly difficult system to estimate by PEM/ML, since these methods may converge to a local minimum if they are not well initialised [21]. Three methods have been compared: PEM, PEM with relative degree enforcement (labeled PEMrd (9)), and the simplified refined IV method for continuous-time systems (SRIVC), which is one of the most successful direct methods available, and has been suggested for general use in one of the most recent surveys on CT system identification [7]. Each method has been tested in M different Monte Carlo simulations, and they have been evaluated according to the average normalized square error of the system estimate G(s) = M 1 X kĜi − G0 k22 MSE Ĝ = , M i=1 kG0 k22 Ĝ(s) = TABLE I M ONTE C ARLO SIMULATION RESULTS FOR PRBS INPUT OF TOTAL LENGTH h 0.01 0.05 0.1 Method PEM PEMrd SRIVC PEM PEMrd SRIVC PEM PEMrd SRIVC N = 7161. MSE Ĝ 1.113 · 10−4 0.732 · 10−4 0.733 · 10−4 1.996 · 10−3 1.406 · 10−3 1.397 · 10−3 3.275 · 10−3 1.914 · 10−3 1.922 · 10−3 MSE θ̂ 6.757 · 10−5 4.283 · 10−5 4.292 · 10−5 5.423 · 10−4 3.933 · 10−4 3.925 · 10−4 7.937 · 10−4 4.797 · 10−4 4.749 · 10−4 Fit 98.9742 99.1219 99.1217 98.9645 99.1141 99.1146 98.9436 99.0884 99.0870 the average normalized square error of the parameter vectors M 1 X kθ̂ci − θc0 k22 MSE θ̂ = , M i=1 kθc0 k22 and the fit measure Fit =  M  kŷ i − yk2 100 X 1− , M i=1 ky − ȳk2 where y is the noise-free output sequence (the simulated data without the additive measurement noise), ŷ i is the simulated output sequence of the i-th estimated model, and ȳ is the average value of {y(kh)}N k=1 . We have run PEM using the standard MATLAB System Identification Toolbox [12] with the oe command, and assumed that the correct order of the system is known. The search algorithm has been initialised with the estimate given by the Null Space Fitting method4 [23]. We based PEMrd on the PEM estimate previously obtained. The required Jacobian matrix has been numerically calculated via finite 4 PEM initialised with the estimate from SRIVC (as in [9]) has also been tested with similar results. In order to analyse the performance of each estimator under less data, we have set the number of stages to n = 9 and the data length of the shortest interval to p = 3, resulting in a input of N = 1533 data points. With the same SNR as the test above, the results for 500 Monte Carlo simulations for each sampling period can be found in Table II. TABLE II M ONTE C ARLO SIMULATION RESULTS FOR PRBS INPUT OF TOTAL LENGTH N = 1533. h 0.01 0.05 0.1 Method PEM PEMrd SRIVC PEM PEMrd SRIVC PEM PEMrd SRIVC MSE Ĝ 5.882 · 10−4 4.025 · 10−4 4.017 · 10−4 7.431 · 10−4 4.316 · 10−4 4.319 · 10−4 1.959 · 10−2 1.077 · 10−2 9.992 · 10−3 MSE θ̂ 3.651 · 10−4 2.057 · 10−4 2.060 · 10−4 4.539 · 10−4 2.788 · 10−4 2.789 · 10−4 2.915 · 10−3 2.184 · 10−3 3.877 · 10−3 Fit 97.7791 98.0705 98.0719 97.7892 98.1172 98.1167 97.7416 98.0339 97.9754 Both Tables I and II show that the refined PEM estimator statistically improves the estimates given by PEM, and is A different input signal has also been tested. We have taken 2000 data measurements of a multisine input given by the sum of sine waves of angular frequencies ω = 0.5, 1, 5, 8, 10, 12, 15, 20, 25, 30. The standard deviation of the additive noise has been set to 0.1, and the median of 500 Monte Carlo simulations of the normalized model error, normalized parameter error, and fit have been obtained. The results are shown in Table III. Bode Diagram 0 -50 -100 -150 -200 0 -180 -360 -540 -720 10-2 TABLE III Bode Diagrams 50 Magnitude (dB) B. Multisine input simulations under the setup in Section V-A, for h = 0.05, N = 7161. It is clear by Fig. 1 that the improvement over PEM is mainly at high frequencies. This is intuitive, since the relative degree determines the asymptotic slope of the Bode diagram of magnitude. The proposed method enforces the true asymptotic slope, leading to an important gain in accuracy in both magnitude and phase. Phase (deg) a very competitive method against SRIVC, even for high frequency sampling. Note that under less data points, PEMrd still outperforms PEM for every sampling period, which indicates that the asymptotic properties studied in Section IV can be observed in practical finite data cases as well. Remark 5.1: In Tables I and II we have discarded cases where PEM has delivered estimates with one pole in the negative real axis. Fortunately this scenario is very uncommon (9 cases seen in 3000 simulations). A similar phenomenon was observed in Table II for h = 0.1 in SRIVC, where 2 estimates gave negative fit values. These simulations were not considered either. 10-1 M ONTE C ARLO SIMULATION RESULTS FOR MULTISINE WAVE INPUT OF TOTAL LENGTH h 0.01 0.02 Method PEM PEMrd SRIVC PEM PEMrd SRIVC 100 101 Frequency (rad/s) 102 103 104 N = 2000. kĜ−G0 k2 kG0 k2 8.799 · 10−5 kθ̂−θ0 k2 kθ0 k2 7.269 · 10−5 1.352 · 10−5 1.439 · 10−1 1.422 · 10−4 2.294 · 10−5 2.141 · 10−2 4.435 · 10−6 6.205 · 10−2 8.368 · 10−5 1.013 · 10−5 4.599 · 10−3 Fit 99.4319 99.8173 80.8446 99.2684 99.7325 94.3144 For this input and sampling method, SRIVC performs poorly, while PEM and PEMrd normally reach the global optimum. Even though the fit is very near the optimal, PEMrd is consistently better than standard PEM at all metrics. C. Mean and covariance of the estimated parameters As established in Theorem 4.1, the improved PEM estimate should reduce (at least asymptotically) the covariance of the parameter vector. To test this, we have obtained the mean and standard deviation of each parameter given by the Monte Carlo study under the setup of Section V-A with h = 0.05 and N = 7161. The results are shown in Table IV. It can be observed that the mean values are similar in all methods (except standard PEM, which does not estimate the correct model structure), and PEMrd provides the lowest standard deviation for every parameter. D. Direct comparison with standard PEM In this subsection we analyse the improvements of the novel method over the standard PEM estimates. To show the impact of selecting and enforcing the correct relative degree, we have focused on the Bode Diagrams of the resulting models for PEM and PEMrd. In Figure 1 we have plotted the frequency response estimates of 100 Monte Carlo Fig. 1. Bode Diagram of 100 estimates by PEM (green), 100 estimates by PEMrd (blue), and the real system (red). Also, direct comparison plots between PEM and PEMrd are shown in Figure 2. These plots compare the normalized model and parameter error, and the fit of PEM and PEMrd for each Monte Carlo experiment (500 in total). PEMrd outperforms standard PEM in most Monte Carlo simulations, specially in the fit comparison, where 496 out of 500 experiments have lead to an increase in fit under PEM refinement. E. Random systems To obtain the average performance of each estimator, we have tested them on a data set created with 500 random systems of order 3 and relative degree 2, by using the rss command in MATLAB. The slowest pole has been set to have real part less than -0.1. The input was a unit variance Gaussian white noise, and the additive white noise was also Gaussian, of standard deviation equal to 5% of the maximum value of the noiseless output. The sampling period has been chosen as 10 times faster than the fastest pole or zero of the real system. We have computed the median of the metrics used above, as in Section V-B, for the 500 random systems. We also have counted failures of the estimators, which are the cases when the estimates produced a negative fit, when the algorithm crashed, or when it was not possible to correctly initialise the PEM estimate having tried reducing by a factor of 2 the sampling rate for initialisation estimation. The results can be seen in Table V. Although all estimators report failures, the PEMrd again shows promising results in TABLE IV E STIMATED PARAMETER VALUE MEANS AND STANDARD DEVIATIONS FOR EACH METHOD , CONSIDERING h = 0.05. Method PEM PEMrd SRIVC 10 -3 Model error norms 8 b2 0 0.301 11.414 0 0 0 0 b3 -6400 -6403.01 147.13 -6397.25 122.39 -6399.19 132.05 4 PEMrd 4 b4 1600 1601.33 47.85 1599.79 42.39 1600.49 44.21 a1 5 5.006 0.399 4.994 0.315 5.014 0.338 a2 408 408.16 7.98 407.88 7.11 407.99 7.75 a3 416 416.25 9.27 415.84 8.33 416.61 8.98 a4 1600 1600.49 33.29 1599.27 28.59 1599.71 31.1 random systems have been put forward with promising results. These have shown that the refinement to standard PEM leads to an important improvement in all the statistical metrics studied, and its performance is comparable, if not better, to SRIVC for all sampling periods in this study provided PEM is initialised correctly. 10 -3 Parameter error norms 5 6 PEMrd b1 0 -0.044 0.963 0 0 0 0 Parameter True value Mean Std. Dev Mean Std. Dev. Mean Std. Dev. 3 2 R EFERENCES 2 1 0 0 0 2 4 6 8 0 10 -3 PEM 1 2 3 4 Fit 100 5 10 -3 PEM PEMrd 99.5 99 98.5 98.5 99 99.5 100 PEM Fig. 2. Direct comparison plots between PEM and PEMrd for 500 Monte Carlo simulations. The green dots correspond to Monte Carlo simulations where PEMrd outperforms PEM. Red dots represent the opposite, and the dashed blue line is the separatrix. TABLE V M ONTE C ARLO SIMULATION RESULTS FOR RANDOM SYSTEMS . Method PEM PEMrd SRIVC kĜ−G0 k2 kG0 k2 1.449 · 10−4 kθ̂−θ0 k2 kθ0 k2 3.328 · 10−3 1.046 · 10−4 1.111 · 10−4 1.872 · 10−3 2.126 · 10−3 Fit N◦ Failures 98.871 98.997 98.9723 12 16 30 all metrics. As pointed out in [9] and seen in these tests, initialisation aspects are in fact a major issue concerning the reliability of these algorithms. VI. C ONCLUSIONS We have proposed a refinement to the standard PEM estimator for indirect continuous-time system identification that achieves an asymptotically optimal desired relative degree enforcement. An explicit expression for this estimator has been found, and its statistical properties have been analysed. Extensive simulations using both standard benchmarks and [1] T. Söderström, P. Stoica, System Identification, Prentice-Hall, 1988. [2] L. Ljung, System Identification: Theory for the User, 2nd edition, Prentice-Hall, 1999. [3] R. Pintelon, J. Schoukens, System Identification: A Frequency Domain Approach, John Wiley & Sons, 2012. [4] T. P. Bohlin, Practical Grey-box Process Identification: Theory and Applications, Springer, 2006. [5] G. Rao, H. Unbehauen, Identification of continuous-time systems, IEE Proceedings-Control theory and applications 153 (2) (2006) 185–220. [6] H. Garnier, L. Wang, Identification of Continuous-time Models from Sampled Data, Springer, 2008. [7] H. Garnier, Direct continuous-time approaches to system identification. Overview and benefits for practical applications, European Journal of control 24 (2015) 50–62. [8] G. Rao, H. Garnier, Numerical illustrations of the relevance of direct continuous-time model identification, IFAC Proceedings Volumes 35 (1) (2002) 133–138. [9] L. Ljung, Experiments with identification of continuous time models, IFAC Proceedings Volumes 42 (10) (2009) 1175–1180. [10] T. Söderström, P. Stoica, B. Friedlander, An Indirect Prediction Error Method for System Identification, Automatica 27 (1) (1991) 183–188. [11] K. J. Åström, B. Wittenmark, Computer Controlled Systems: Theory and Design, Prentice-Hall, 1984. [12] L. Ljung, System Identification Toolbox 7: Getting Started Guide. [13] H. Unbehauen, G. Rao, Continuous-time Approaches to System Identification - A Survey, Automatica 26 (1) (1990) 23–35. [14] N. K. Sinha, Identification of continuous-time systems from samples of input-output data: An introduction, Sadhana 25 (2) (2000) 75–83. [15] R. A. Horn, C. R. Johnson, Matrix Analysis, 2nd Edition, Cambridge University Press, 2012. [16] I. Kollar, G. Franklin, R. Pintelon, On the Equivalence of z-domain and s-domain Models in System Identification, in: Instrumentation and Measurement Technology Conference, IMTC-96, Vol. 1, IEEE, 1996, pp. 14–19. [17] P. W. Zehna, et al., Invariance of maximum likelihood estimators, Annals of Mathematical Statistics 37 (3) (1966) 744. [18] C. Gourieroux, A. Monfort, Statistics and econometric models, Vol. 1, Cambridge University Press, 1995. [19] R. A. González, P. E. Valenzuela, C. R. Rojas, R. A. Rojas, Optimal enforcement of causality in non-parametric transfer function estimation, IEEE Control Systems Letters 1 (2) (2017) 268–273. [20] P. Young, Recursive estimation, forecasting and adaptive control, Control and Dynamic systems 30 (Part 3) (1989) 119–165. [21] L. Ljung, Initialisation aspects for subspace and Output-Error identification methods, in: European Control Conference (ECC), 2003, 2003, pp. 773–778. [22] J. S. Welsh, J. C. Agüero, M. Alamir, Continuous-time System Identification using Indirect Inference, IFAC Proceedings Volumes 42 (10) (2009) 1169–1174. [23] M. Galrinho, C. R. Rojas, H. Hjalmarsson, The weighted null-space fitting method, arXiv preprint arXiv:1708.03946.
3cs.SY
1 When data mining meets optimization: A case study on the quadratic assignment problem arXiv:1708.05214v2 [cs.DM] 7 Oct 2017 Yangming Zhou, Jin-Kao Hao∗ , and Béatrice Duval Abstract—This paper presents a hybrid approach called frequent pattern based search that combines data mining and optimization. The proposed method uses a data mining procedure to mine frequent patterns from a set of high-quality solutions collected from previous search, and the mined frequent patterns are then employed to build starting solutions that are improved by an optimization procedure. After presenting the general approach and its composing ingredients, we illustrate its application to solve the well-known and challenging quadratic assignment problem. Computational results on the 21 hardest benchmark instances show that the proposed approach competes favorably with state-of-the-art algorithms both in terms of solution quality and computing time. Index Terms—Frequent pattern mining, heuristic design, learning-based optimization, quadratic assignment ✦ 1 I NTRODUCTION R ECENT years, hybridization of data mining techniques with metaheuristics has received increasing attention from the optimization community. A number of attempts have been made to use data mining techniques to enhance the performance of metaheuristic optimization for solving hard combinatorial problems [6], [35], [45], [46], [48], [49]. Data mining involves discovering useful rules and hidden patterns from data [47]. With the help of data mining techniques, heuristic search algorithms can hopefully make their search strategies more informed and thus improve their search performances. For instance, candidate solutions visited by a search algorithm can be collected and exploited by supervised or unsupervised learning techniques to extract useful hidden patterns and rules, which can be used to guide future search decisions of the search algorithm. More generally, data mining techniques could help to build the starting solution or initial population, choose the right operators, set the suitable parameters or make automatic algorithm configuration [21], [40]. In this work, we introduce a hybrid approach called frequent pattern based search (FPBS) that combines data mining techniques and optimization methods for solving combinatorial search problems. Basically, FPBS employs a data mining procedure to mine useful patterns that frequently occur in high-quality (or elite) solutions collected from previous search and then uses the mined patterns to construct new starting solutions that are further improved by an optimization method. To update the set of elite solutions used for pattern mining, FPBS calls for a dedicated procedure to manage newly discovered elite solutions. The key intuition behind the proposed approach is that a frequent pattern extracted from high-quality solutions identi- fies a particularly promising region in the search space that is worthy of an intensive examination by the optimization procedure. By using multiple mined patterns combined with an effective optimization procedure, FPBS is expected to achieve a suitable balance between search exploration and exploitation that is critical for a high performance of the search algorithm [19]. To verify the interest of the proposed FPBS approach, we consider the well-known and highly challenging quadratic assignment problem (QAP) as a case study. Besides its popularity as one of the most studied NP-hard combinatorial optimization problem, QAP is also a relevant representative of many permutation problems. To apply the general FPBS approach to solve QAP, we specify the underlying patterns and frequent patterns, the frequent pattern mining algorithm and the dedicated optimization procedure. We then assess the resulting algorithm on the set of the hardest QAP benchmark instances from the QAPLIB. Our experimental results show that the proposed algorithm is highly competitive compared to state-of-the-art algorithms both in terms of solution quality and computing time. The rest of this paper is organized as follows. In the next section, we introduce the concept of frequent pattern mining and provide a literature review on hybridization of association rule mining with metaheuristic optimization. In Section 3, we present the proposed frequent pattern based search approach. Section 4 shows the application of the general FPBS approach to solve the quadratic assignment problem. Section 5 is dedicated to an experimental analysis of key components of the proposed approach. Finally, conclusions and further work are discussed in Section 6. • 2 Y. Zhou, J.K. Hao (corresponding author) and B. Duval are with the Department of Computer Science, LERIA, Université d’Angers, 2 Boulevard Lavoisier, 49045 Angers, France, J.K. Hao is also affiliated with the Institut Universitaire de France, 1 rue Descartes, 75231 Paris, France (E-mails: [email protected]; [email protected]; [email protected]). F REQUENT PATTERN MINING AND HEURISTIC SEARCH : STATE OF THE ART In this section, we briefly recall the concept of frequent pattern mining and review related literature on combination of search methods with association rule mining (or frequent 2 pattern mining) techniques for solving combinatorial optimization problems. 2.1 Frequent pattern mining Frequent pattern mining was originally introduced for market basket analysis in the form of association rules mining [3], with the purpose of identifying associations between different items that customers place in their “shopping baskets”. Also, the concept of frequent itemsets was first introduced for mining transaction database. Let D = {T1 , T2 , . . . , TN } be a transaction database defined over a set of items I = {x1 , x2 , x3 , . . . , xM }. A frequent itemset typically refers to a set of items that often appear together in a transactional dataset [18], e.g., milk and bread, which are frequently bought together in grocery stores by many customers. Furthermore, a l-itemset (or l-pattern) p ⊆ I , which consists of l items from I , is frequent if p occurs in the transaction database D no lower than θ times, where θ is a user-defined minimum support threshold. In the original model of frequent pattern mining [3], the problem of finding association rules has also been proposed. Association rules are closely related to frequent patterns in the sense that association rules can be considered as a “second-stage” output, which are derived from the mined frequent patterns. Given two itemsets U ⊆ I and V ⊆ I , the rule U ⇒ V is considered to be an association rule at minimum support θ and minimum confidence η , when the following two conditions are satisfied simultaneously: the set U ∪ V is a frequent pattern for the minimum support θ and the ratio of the support of U ∪ V over U is at least η . 2.2 Association rule (or frequent pattern) mining for heuristic search We now review existing studies on hybridization between data mining and heuristic search, starting by the issue of representation of frequent patterns. 2.2.1 Representation of frequent patterns The mined knowledge or information can be represented in the form of frequent patterns or association rules. Frequent patterns are patterns that occur frequently in the given data [18]. There are various types of patterns, such as itemsets, subsequences, and substructures. To apply frequent pattern mining for solving combinatorial optimization problems, one of the main challenges is to define a suitable pattern for the problem under consideration. In the following, we introduce the definition of frequent patterns (in terms of frequent items) for two categories of representative optimization problems. • Frequent pattern for subset selection problems. Subset selection is basically to determine a subset of specific elements among a set of given elements while optimizing an objective function defined over the selected elements or unselected elements. Subset selection is encountered in many situations and includes, for instance, knapsack problems, clique problems, diversity problems, maximum stable problems and critical node problems. A candidate solution to a subset selection problem is usually represented by a • set of selected elements. Since it is natural to treat each element as an item, frequent pattern mining techniques can be directly applied to subset selection problems. In this setting, a transaction corresponds to a solution of the subset selection problem and a pattern can be conveniently defined as a subset of elements that frequently appear in some specific (e.g., high-quality) solutions. Thus, given a database D (i.e., a set of visited solutions), a frequent pattern p mined from D with support θ corresponds to a set of elements that occur at least θ times in the database. Frequent pattern for permutation problems. Permutation problems cover another large range of important combinatorial problems. Many classic NP-hard problems, such as the traveling salesman problem, the quadratic assignment problem, graph labeling problems and flow shop scheduling problems, are typical permutation examples. Even if the solutions of this category of problems are represented as permutations, the practical meaning of a permutation depends on the problem under consideration. To apply frequent pattern mining techniques to such a problem, a transformation between a permutation and an itemset is necessary. For instance, in the context of a vehicle routing problem, a transformation was proposed to map a permutation (a sequence of visited cities) into a set of pairs between any two consecutive elements (cities) in the permutation [16]. This transformation emphasizes the order between two consecutive elements. In Section 4.2.3, we introduce a new transformation for QAP whose main idea is to decompose a permutation into a set of element-position pairs, which focuses on not only the order between elements but also the relation between an element and its location. In these settings, a frequent pattern can be considered as a set of pairs that frequently appear in some specific solutions. 2.2.2 Mining and heuristics In this section, we present a brief literature review on hybridizing association rule mining (or frequent pattern mining) techniques with metaheuristics. The reviewed studies are summarized in Table 1. GRASP (Greedy randomized adaptive search procedure) was the first metaheuristic to be hybridized with data mining techniques (i.e., association rule mining) [33], [34]. Denoted as DM-GRASP, this approach was originally designed to solve the set packing problem. DM-GRASP organizes its search process into two sequential phases, and incorporates an association rule mining procedure at the second phase. Specifically, high-quality solutions found in the first phase (GRASP) were stored in an elite set, and then a data mining procedure is invoked to extract some patterns from the elite set. At the second phase, a new solution is constructed based on a mined pattern instead of using the greedy randomized construction procedure of GRASP. This approach has been applied to solve several problems including the maximum diversity problem [37], the server replication for reliable multicast problem [38], and the p-median problem [28]. A survey on some significant applications of DM-GRASP can 3 TABLE 1 Main work on hybridizing association rules mining techniques with metaheuristics for solving combinatorial optimization problems. Algorithm metaheuristic⋆ optimization problem DM-GRASP [33], [34] DM-GRASP [37] DM-GRASP [38] GADMLS [36] DM-GRASP [28] HDMNS [32] DM-GRASP-PR [7] MDM-GRASP [27] DM-HH [25] VALS [44] GAAR [31] GAAR [30] MDM-GRASP/VND [16] DM-ILS [26] GRASP GRASP GRASP GA+LS GRASP NS GRASP+PR GRASP PR+LS LS GA GA GRASP+VND ILS set packing problem maximum diversity problem server replication for reliable multicast problem single-vehicle routing problem p-median problem p-median problem 2-path network design problem server replication for reliable multicast problem p-median problem set partitioning problem constrain satisfaction problem weighted constrain satisfaction problem one-commodity pickup-and-delivery traveling salesman problem set covering with pairs problem ⋆ year 2004,2006 2005 2006 2006 2011 2012 2013 2014 2014 2015 2015 2015 2016 2016 Greedy randomized adaptive search procedure (GRASP), genetic algorithm (GA), local search (LS), neighborhood search (NS), path-relinking (PR), variable neighborhood descent (VND), and iterated local search (ILS). be found in [39]. An interesting extension of DM-GRASP is to execute the data mining procedure multiple times instead of only once [16], [26], [27]. Compared to DM-GRASP where the data mining call occurs once at the midway of the whole search process, the multi-mining version performs the mining task when the elite set stagnates. The same idea has been explored recently by hybridizing data mining and GRASP enhanced with path-relinking (PR) [7] or variable neighborhood descent (VND) [16]. In addition to GRASP, data mining has also been hybridized with other metaheuristics like evolutionary algorithms. To improve the performance of an evolutionary algorithm applied to an oil collecting vehicle routing problem, a hybrid algorithm (GADMLS) combining genetic algorithm, local search and data mining was proposed in [36]. Another hybrid approach (GAAR) that uses a data mining module to guide an evolutionary algorithm was presented in [30], [31] to solve the constraint satisfaction problem (CSP). Besides the standard components of a genetic algorithm, a data mining module is added to find association rules (between variables and values) from an archive of best individuals found in the previous generations. Apart from GRASP and evolutionary algorithms, it has been shown that other heuristics can also benefit from the incorporation of a data mining procedure. For example, a data mining approach was applied to extract variable associations from previously solved instances for identifying promising pairs of flipping variables in a large neighborhood search method for the set partitioning problem, thus reducing the search space of local search algorithms for the set partitioning problem [44]. Another example is the hybridization of neighborhood search with data mining techniques for solving the p-median problem [32]. A data mining procedure was also integrated into a multistart hybrid heuristic for the p-median problem [25], which combines elements of different traditional metaheuristics (e.g., local search) and uses path-relinking as a memorybased intensification mechanism. Finally, the widely-used iterated local search method was recently hybridized with data mining for solving the set covering with pairs problem [26]. 3 F REQUENT PATTERN BASED SEARCH In this section, we propose frequent pattern based search (FPBS) for solving combinatorial search problems. This general-purpose search approach tightly integrates frequent pattern mining with an optimization procedure. Below, we first show the general scheme of the proposed FPBS approach, and then present its composing ingredients. 3.1 General scheme The FPBS approach uses relevant frequent patterns extracted from high-quality solutions to build promising starting solutions which are further improved by an optimization procedure. The improved solutions are in turn used to help mine additional patterns. By iterating the mining procedure and the optimization procedure, FPBS is expected to examine the search space effectively and efficiently. As a case study, we illustrate in Section 4 its application to solve the well-known quadratic assignment problem. From a perspective of system architecture, FPBS maintains an archive of high-quality solutions (called elite set) for the purpose of pattern mining and includes five critical operating components: an initialization procedure (Section 3.2), an optimization search procedure (Section 3.4), a data mining procedure (Section 3.3), a frequent pattern based solution construction procedure (Section 3.5) and an elite solution management procedure (Section 3.6). The general framework of the proposed FPBS approach is presented in Algorithm 1. FPBS starts from a set of high-quality solutions that are obtained by the initialization procedure (line 3). From these high-quality solutions, a data mining procedure is invoked to mine a number of frequent patterns (line 5). A new solution is then constructed based on a mined pattern and further improved by the optimization procedure (lines 7-10). The improved solution is finally inserted to the elite set according to the elite solution management policy (line 15). The process is repeated until a stopping condition (e.g., a time limit) is satisfied. In addition to its invocation just after the initialization procedure, the data mining procedure is also called each time the elite set is judged to be stagnating (lines 17-18), i.e., it has not been updated during a predefined number of iterations. 4 Algorithm 1: General framework of Frequent Pattern Based Search 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Input: Problem instance I , elite set size k and number of patterns to be mined m Output: The best solution S ∗ found begin // I is supposed to be a minimization problem ES ← EliteSetInitialize(); /* ES is the set of elite solution */ S ∗ ← arg min{f (Si ) : i = 1, 2, . . . , k}; /* S ∗ is the best solution found so far */ P ← F requentP atternM ine(ES, m); while a stopping condition is not reached do p ← P atternSelection(P); // construct a new solution based mined frequent pattern S ← P atternBasedConstruct(p); // improve the constructed solution S ′ ← Optimize(S); // update the best solution found so far if f (S ′ ) < f (S ∗ ) then S∗ ← S′; // update the elite set ES ← EliteSetU pdate(ES, S ′ ); // restart the mining procedure when the elite set stagnates if elite set stagnates then P ← F requentP atternM ine(ES, m); 3.2 Elite set initialization FPBS starts its search with an elite set (ES ) composed of k distinct high-quality solutions. To build such an elite set, we first generate, by any means (e.g., with a random or greedy construction method), an initial solution that is improved by an optimization procedure (see Section 3.4). The improved solution is then inserted into the elite set according to the elite set management strategy (see Section 3.6). We repeat this process until an elite set of k different solutions is built. Note that similar ideas have been successfully applied to build a high-quality initial population for memetic algorithms [10], [24], [49]. 3.3 Frequent pattern mining procedure In our approach, the frequent pattern mining procedure is used to discover some patterns that frequently occurs in high-quality solutions stored in the elite set. Beside the itemsets (see Section 2.2.1), mined patterns can also be subsequences or substructures [2]. A subsequence is an order of items, e.g., buying a mobile phone first, then a power bank, and finally a memory card. If a subsequence occurs frequently in a transaction database, then it is a frequent sequential pattern. A substructure can refer to different structural forms, such as subgraphs, subtrees, or sublattices, which may be combined with itemsets or subsequences. If a substructure occurs frequently in a graph database, it is called a frequent structural pattern. To handle a wide diversity of data types, numerous mining tasks and algorithms have been proposed in the literature [2], [15], [17]. A simple summary of frequent pattern mining algorithms is provided in Table 2. For a specific application, the patterns of high-quality solutions collected in the elite set can be expressed as itemsets, subsequences, or substructures. Once the form of patterns is determined, a suitable mining algorithm can be selected accordingly. For our case study on QAP presented in Section 4, a pattern corresponds to a set of element-location pairs. Thus frequent patterns can be conveniently represented as frequent itemsets (i.e., a set of identical element-location assignments). Consequently, we adopt the FPmax* algorithm (see Section 4.2.3 for more details) to mine only the maximal frequent items. Detailed reviews on frequent pattern mining algorithms can be found in [2], [17]. 3.4 Optimization procedure For the purpose of solution improvement (to built the initial elite set and to improve each new solution built from a mined pattern), any optimization procedure dedicated to the given problem can be applied in principle. On the other hand, since the optimization component ensures the key role of search intensification, it is desirable to call for a powerful search algorithm. Basically, the optimization procedure can be considered to be a black box optimizer that is called to improve the input solution. In practice, the optimization procedure can be based on local search, population-based search or even hybrid memetic search. In any case, the search procedure must be carefully designed with respect to the problem under consideration and should ideally be effective both in terms of search capacity and time efficiency. As we show in Section 4, for the quadratic assignment problem considered in this work, we will adopt the powerful breakout local search procedure [9] as our optimization procedure. 3.5 Solution construction based on mined pattern Once a set of frequent patterns P is extracted from the elite set, new solutions are constructed based on these mined patterns. For this purpose, we first select a mined frequent pattern by the tournament selection strategy as follows. Let λ be the size of the tournament pool. We randomly choose λ (1 6 λ 6 |P|) individuals with replacement from the mined pattern set P , and then pick the best one (i.e., with the largest size), where λ is a parameter. The computational complexity of this selection strategy is O(|P|). The advantage of the tournament selection strategy is that the selection pressure can be easily adjusted by changing the size of the tournament pool λ. The larger the tournament pool is, the smaller the chance for shorter patterns to be selected. Since frequent patterns usually correspond to a set of common elements shared by the high-quality solutions examined by the mining procedure, each mined pattern directly defines a partial solution. To obtain a whole solution, we can apply a greedy or random procedure to complete the partial solution. The way to build such a solution shares similarity with the general backbone-based crossover procedure [8], [49]. However, compared to the notion of backbones that are typically shared by two parent solutions, our frequent patterns are naturally shared by two or more high-quality solutions. In this sense, backbones can be considered as a special case of more general frequent patterns. 5 TABLE 2 A simple summary of frequent pattern mining algorithms [2]. algorithms tasks patterns apriori-based pattern-growth frequent itemset mining sequential pattern mining structural pattern mining itemsets subsequences substructures e.g., Apriori e.g., GSP, SPADE e.g., AGM, FSG e.g., FP-growth, FPmax e.g., PrefixSpan e.g., gSpan, FFSM Finally, it is possible to construct a new solution for each mined pattern instead of using a long pattern selected by the tournament selection strategy, as explained above. Also, an elite solution can be selected to guide the construction of a new solution. In particular, the way to use frequent patterns should be determined according to the studied problem. 3.6 Elite set management As explained above, each new solution constructed using a mined frequent pattern is improved by the optimization procedure. Then, we decide whether the improved solution should be inserted into the elite set ES . There are a number of updating strategies in the literature [41] that can be applied within the FPBS approach. For example, the classic quality-based replacement strategy simply inserts the solution into ES to replace the worst solution if it is better than the worst solution in ES . In addition, more elaborated updating strategies consider other criteria than the quality of solutions. For example, the quality-and-distance updating strategy not only considers the quality of the solution, but also its distance to other solutions in the population [24], [29], [49]. A suitable elite set management strategy can be determined according to the practical problem. 4 where a and b are the flow and distance matrices respectively, and π ∈ Ω is a solution and π(i) represents the location chosen for facility i. The optimization objective is to find a permutation π ∗ in Ω such that the sum of the products of the flow and distance matrices, i.e., f (π ∗ ) 6 f (π), ∀π ∈ Ω, is minimized. In addition to the facility location application, QAP can be used to formulate many other real-world problems [12], [13], [23] such as electrical circuit wiring/routing, transportation engineering, parallel and distributed computing, image processing and analysis of chemical reactions for organic compounds. Moreover, a number of classic NPhard problems, such as the traveling salesman problem, the maximum clique problem, the bin packing problem and the graph partitioning problem, can also be recast as QAPs [23]. Due to its practical and theoretical significance, QAP has attracted much research effort since its first formulation [1], [9], [10], [20], [43]. In fact, QAP is among the most studied and the most competitive combinatorial optimization problems. Since exact algorithms are unpractical for instances of size larger than 36 [5], a large number of heuristic methods have been proposed for QAP, which can provide near-optimal solutions in reasonable computation times. Detailed reviews of heuristic and metaheuristic algorithms developed till 2007 for QAP are available in [12], [23]. An updated review of more recent studies on QAP can be found in [9], [10]. FPBS APPLIED TO THE QUADRATIC ASSIGN 4.2 FPBS for QAP MENT PROBLEM In this section, we present a case study of applying the general FPBS approach to the well-known quadratic assignment problem (QAP) and show its competitiveness compared to state-of-the-art QAP algorithms. 4.1 Quadratic assignment problem The quadratic assignment problem is a well-known NPhard combinatorial optimization problem. It was originally introduced by Koopmans and Beckman [22] in 1957 to model the locations of indivisible economic activities such as capital equipment. QAP aims to determine a minimal cost assignment of n facilities to n locations, given a flow aij from facility i to facility j for all i, j ∈ {1, . . . , n} and a distance buv between locations u and v for all u, v ∈ {1, . . . , n}. Let Ω denotes the set of all possible permutations π : {1, . . . , n} → {1, . . . , n}, then QAP can mathematically be formulated as follows. min f (π) = π∈Ω n n X X i=1 j=1 aij bπ(i)π(j) (1) Algorithm 2 shows the FPBS algorithm for QAP (denoted as FPBS-QAP), which is an instantiation of the general scheme of Algorithm 1. Since FPBS-QAP inherits the main components of FPBS, hereafter we only present the specific features related to QAP: solution representation and evaluation, optimization procedure, frequent pattern mining for QAP, solution construction using QAP patterns, and elite set update strategy. 4.2.1 Solution representation, neighborhood and evaluation Given a QAP instance with n facilities (or locations), a candidate solution is naturally represented by a permutation π of {1, 2, . . . , n}, such that π(i) is the location assigned to facility i. The search space Ω is thus composed of all possible n! permutations. For any solution π ∈ Ω, its quality is given by Eq. (1). To examine the search space, we adopt an iterated local search algorithm called BLS (see Section 4.2.2). For this purpose, we introduce the neighborhood used by BLS. Give a solution, i.e., a permutation π , its neighborhood N (π) is defined as the set of all possible permutations that can 6 Algorithm 2: The FPBS algorithm for QAP. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 Input: Instance G, elite set size k, the number of mined patterns m, time limit tmax and the maximum number of iterations without updating max no update Output: The best solution π ∗ found so far begin ES ← EliteSetInitialize(); π ∗ ← arg min{f (πi ) : i = 1, 2, . . . , k}; P ← F requentP atternM ine(ES, m); no update ← 0; t ← 0; while t < tmax do pi ← P atternSelection(P); // build a new solution based selected pattern π ← P atternBasedConstruct(pi); // improve the constructed solution π ′ ← BreakoutLocalSearch(π); // update the best solution found so far if f (π ′ ) < f (π ∗ ) then π∗ ← π′; // update the elite set if EliteSetU pdate(ES, π ′ ) = T rue then no update ← 0; else no update ← no update + 1; // restart the mining procedure when the elite set is steady if no update > max no update then P ← F requentP atternM ine(ES, m); no update ← 0; be obtained by exchanging the values of any two different positions π(u) and π(v) in π , i.e., N (π) = {π ′ | π ′ (u) = π(v), π ′ (v) = π(u), u 6= v and π ′ (i) = π(i), ∀i 6= u, v}, which has a size of n(n − 1)/2. As indicated in [42], given a permutation π and its objective value f (π), the objective value of any neighnoring permutation π ′ can be effectively calculated according to an incremental evaluation technique. 4.2.2 Breakout local search To ensure an effective examination of the search space, we adopt the breakout local search (BLS) algorithm [9], which is a state-of-the-art algorithms for QAP currently available in the literature. BLS follows the iterated local search scheme and iteratively alternates between a descent search phase (to find local optima) and a dedicated perturbation phase (to discover new promising regions). BLS starts from an initial random permutation, and then improves the initial solution to a local optimum by the best improvement descent search with the above exchange-based neighborhood. Upon the discovery of a local optimum, BLS triggers a perturbation mechanism. The perturbation mechanism adaptively selects a tabu-based perturbation (called directed perturbation) or a random perturbation (called undirected perturbation). BLS also determines the number of perturbation steps (called perturbation strength) in an adaptive way [9]. The tabu-based perturbation and random perturbation provide two complementary means for search diversifica- tion. The former applies a selection rule that favors neighboring solutions that minimize the objective degradation, under the constraint that the neighboring solutions have not been visited during the last γ iterations (where γ is the pre-defined tabu tenure), while the latter performs moves selected uniformly at random. To keep a suitable balance between an intensified search and a diversified search, BLS alternates probabilistically between these two perturbations. The probability to select a particular perturbation is determined dynamically according to the current number of times to visit local optima without improvement on the best solution found. The probability of applying the tabu-based perturbation over the random perturbation is empirically limited to be at least as Q. The perturbation strength L is determined based on a simple reactive strategy. One increases L by one if the search returns to the immediate previous local optimum, and otherwise resets L to a given initial value L0 . Once the type and the strength L of the perturbation are determined, the selected perturbation with strength L is applied to the current solution. The resulting solution is then used as the starting solution of the next round of the descent search procedure (see [9] for more details). 4.2.3 Mining frequent patterns for QAP The quadratic assignment problem is a typical permutation problem whose solutions are naturally represented by permutations. For QAP, we define a frequent pattern to be a set of identical location-facility assignments shared by highquality solutions, and represent a frequent pattern by an itemset. To apply a frequent itemset mining algorithm, we need to transform a permutation into a set of items. A transformation is recently proposed in [16]. The transformation works as follows. For each pair of elements (π(i) and π(j)) of a given permutation π , an arc (π(i), π(j)) is generated, which maps a permutation π to a set S ′ of |π| − 1 arcs. For example, considering a permutation π = {5, 4, 7, 2, 1, 6, 3} represented by a sequence of these elements, π can be mapped as S ′ = {(5, 4), (4, 7), (7, 2), (2, 1), (1, 6), (6, 3)}. By this transformation, a permutation is divided into a set of arcs, which conserves the order of elements. However, this transformation loses the information between the elements and their locations. In practice, we can not identify the true location of an element when only a part of pairs are available. To overcome this difficulty, we propose a new transformation. Our transformation decomposes a permutation into a set of ordered pairs, each pair being formed by an element (facility) i and its position (location) π(i). Specifically, let π be a candidate solution of QAP, for each element (facility) i, a corresponding element-position pair (i, π(i)) is generated, which transforms permutation π into a set of n elementposition pairs. For example, given π = {5, 4, 7, 2, 1, 6, 3}, {(1, 5), (2, 4), (3, 7), (4, 2), (5, 1), (6, 6), (7, 3)} is the corresponding set of element-position pairs. Once a permutation is transformed into a set of pairs, we will treat each pair (x, y) as an item z = x ∗ n + y , where n is the length of the permutation. Now, the task of mining frequent patterns from multiple permutations can be conveniently transformed into the task of mining frequent itemsets. The main drawback of mining all frequent itemsets 7 is that if there is a large frequent itemset, then almost all subsets of the itemset might be examined. However, it is usually sufficient to find only the maximal frequent itemsets (a maximal frequent itemset is that it has no superset that is frequent). Thus mining frequent itemsets can be reduced to mine only the maximal frequent itemsets. For this purpose, we adopt the popular FPmax*1 algorithm [14]. Algorithm 3: Pseudo code of the FPmax* Algorithm [14] 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Input: T : a FP-tree M : the MFI-tree for T.base. Output: Updated M begin if T only contains a single path P then insert P into M ; else for each i in T .header do set Y = T.base ∪ {i}; if T.array is not N ull then T ail={frequent items for i in T.array}; 4.2.4 Solution construction based on mined pattern Algorithm 4 describes the main steps to construct new solutions based on the mined frequent patterns. Initially, a pattern is first selected from the set of mined frequent patterns P according to the tournament selection strategy (line 2). Then, we re-map this chosen pattern into a partial solution π (line 3). If the length of the partial solution |π| is less than a given threshold (i.e., β ∗ n), we use an elite solution to guide the construction (lines 4-6). Specifically, we first select an elite solution π 0 (called guiding solution) from the elite set (line 5), and then we complete π based on the guiding solution π 0 (i.e., directly copy the elements of all unassigned positions of π 0 to π if the elements have not been assigned in π ). Finally, if π is still an incomplete solution, we randomly assign the remaining elements to the unassigned positions until a full solution is obtained (line 7). Algorithm 4: Solution construction based on mined frequent patterns else T ail={frequent items in i’s conditional pattern base}; sort T ail in decreasing order of the items’ counts; if subset checking(Y ∪ T ail, M ) = F alse then construct Y’s conditional FP-tree TY and its array AY ; initialize Y’s conditional MFI-tree MY ; call FPmax*(TY , MY ); merge MY with M ; 1 2 3 4 5 6 7 Algorithm 3 shows the pseudo code of the FPmax* algorithm. A description of the basic concepts used in FPmax* such as the frequent pattern tree (FP-tree), the FP-growth method, and the maximal frequent itemset tree (MFI-tree) can be found in [14]. Here we only provide a brief presentation of its general procedure. In the initial call, a FP-tree T is constructed from the first scan of the database, together with an initial empty MFI-tree. During the recursion, if there is only one single path in the FP-tree T , this single path together with T.base is a MFI of the dataset. The MFI is then inserted into M (line 3). Otherwise, for each item i in the header table, we set Y = T.base ∪ {i} and prepare for the recursive call FPmax*(TY , MY ). The items in the header table are processed in increasing order of frequency, so that maximal frequent itemsets will be found before any of their frequent subsets (line 11). Lines 7-10 use the array technique, and line 12 invokes the subset checking() function to check if Y together with all frequent items in Y ’s conditional pattern base is a subset of any existing MFI in M , thus we perform superset pruning. If function subset checking() returns F alse, FPmax* will be called recursively, with (TY , MY ) (lines 13-16). For a detailed description of the FPmax* algorithm, please refer to [14]. Input: Instance G, a set of m mined patterns P and an elite set ES of size k Output: A new solution π begin p ← P atternSelection(P); /∗ select a mined pattern ∗/ π ← re-map(p); /∗ generate a partial solution based on selected pattern ∗/ if |π| < β ∗ n then π 0 ← GuidedSolutionSelect(ES); /∗ select a guiding solution ∗/ π ← GuidedComplete(π, π 0 ); /∗ complete based on guiding solution ∗/ π ← RandomComplete(π); /∗ complete at random ∗/ 4.2.5 Elite set update strategy Once a new improved solution π ′ is obtained by the BLS algorithm, we decide whether π ′ should be inserted into the elite set ES . In our case, we adopt the following qualitybased strategy that π ′ is inserted into ES if two conditions are satisfied simultaneously: (i) π ′ is different from any solution in ES and (ii) π ′ is not worse than any solution in ES , i.e., f (π ′ ) 6 f (π w ), where π w ← arg maxπ∈ES {f (π)} is the worst solution in the ES . 4.3 Computational studies of FPBS for QAP Our computational studies aim to evaluate the efficiency of the FPBS-QAP algorithm. For this purpose, we first perform a detailed performance comparisons between FPBS-QAP and two state-of-the-art algorithms, i.e., BLS [9] and BMA [10], whose source codes are available to us. Furthermore, we compare FPBS-QAP with four additional algorithms that are published very recently since 2015. 4.3.1 Benchmark instances 1. The source code of the FPmax* algorithm is publicly available at http://fimi.ua.ac.be/src/ The experimental evaluations of QAP algorithms are usually performed on 135 popular benchmark instances from 8 QAPLIB2 , with n ranging from 12 to 150. These instances can be classified into four categories: • • • • Type I. 114 real-life instances are obtained from practical QAP applications; Type II. 5 unstructured, randomly generated instances whose distance and flow matrices are randomly generated based on a uniform distribution; Type III. 5 real-like-life instances are generated instances that are similar to the real-life QAP instances; Type IV. 11 instances with grid-based distances in which the distances are the Manhattan distance between points on a grid. Like [9], [10], we do not consider the 114 instances from Type I because they are very easy for modern QAP algorithms (i.e., their optimal solutions can be found easily with a short time, often less than one second). Our experiments focus on the remaining 21 hard instances from Type II, Type III and Type IV. Notice that for these 21 challenging instances, no single algorithm can attain the best-known results for all the instances. Indeed, even the best performing algorithm misses at least two best-known results. 4.3.2 Experimental settings The proposed FPBS-QAP algorithm3 was implemented in the C++ programming language and complied with gcc 4.1.2 and flag ‘-O3’. All the experiments were carried out on a computer equipped with an Intel E5-2670 processor with 2.5 GHz and 2 GB RAM operating under the Linux system. Without using any compiler flag, running the wellknown DIMACS machine benchmark procedure dfmax.c4 on our machine requires 0.19, 1.17 and 4.54 seconds to solve the benchmark graphs r300.5, r400.5 and r500.5 respectively. Our computational results were obtained by running the FPBS-QAP algorithm with the parameter settings provided in Table 3. To identify an appropriate value for a given parameter, we compare the performance of the algorithm with different parameter values, while fixing other parameter values. An example to select a appropriate m (frequent pattern set size) value is provided in Section 5.3. TABLE 3 Parameter settings of FPBS-QAP algorithm. Parameter description value tmax k max no update θ m λ β max iter time limit (hours) elite set size number of times without updating minimum support frequent pattern set size tournament pool size length threshold number of iterations for BLS⋆ 0.5 or 2.0 15 15 2 11 3 0.75 10000 ⋆ Other parameters of BLS adopt the default values provided in [9]. Given its stochastic nature, the proposed FPBS-QAP algorithm was independently ran 10 times on each test instance, which is a standard practice for solving QAP [1], [9], [10], [43]. Our assessment is based on the percentage 2. https://www.opt.math.tugraz.at/qaplib/ 3. The source code of our FPBS-QAP algorithm will be made available at http://www.info.univ-angers.fr/∼hao/fpbs.html 4. dfmax: ftp://dimacs.rutgers.edu/pub/dsj/clique deviation (PD) metrics that are widely used in the literature. The PD metrics measures the percentage deviation from the best-known value (BKV). For example, the best percentage deviation (BAD), the average percentage deviation (APD) and the worst percentage deviation (WPD), are respectively calculated according to: XP D = 100 ∗ X − BKV [%] BKV (2) where X ∈ {B, A, W } corresponds to the best objective value, average objective value and worst objective value achieved by an algorithm. The smaller the XPD value, the better the evaluated algorithm. 4.3.3 Comparison of FPBS-QAP with BLS and BMA To demonstrate the effectiveness of the FPBS-QAP algorithm, we first show a detailed comparison of FPBS-QAP with two main reference algorithms: BLS (breakout local search) [9] and BMA (population-based memetic algorithm) [10]. This experiment was based on two motivations. First, BLS and BMA are among the best performing QAP algorithms in the literature. Second, the source codes of BLS and BMA are available to us, making it possible to make a fair comparision (using the same computing platform and stopping conditions). Third, both FPBS-QAP and BMA use BLS as their underlying optimization procedure, this comparison allows us to assess the added value of the data mining component of FPBS-QAP. For this experiment, we run FPBS-QAP and the two reference algorithms under two stopping conditions, i.e., a limit of tmax = 30 minutes (0.5 hour) and a limit of tmax = 120 minutes (2 hours). This allows us to study the behavior of the compared algorithms under short and long conditions. The comparative performances of FPBS-QAP with BLS and BMA under tmax = 30 minutes and tmax = 120 minutes are presented in Table 4 and Table 5, respectively. In these two tables, we report the BPD, APD, WPD values of each algorithm, and the average time in minutes (T (m)) to achieve the results. At the last row of each table, we also indicate the average value of each indicator. The smaller the value, the better the performance of an algorithm. From Table 4, we observe that FPBS-QAP achieves the best performance compared to the algorithms BLS and BMA under tmax = 30 minutes. First, FPBS-QAP achieves all best-known values except two cases while BLS and BMA fail to find the best-known values for five instances. Second, FPBS-QAP is able to reach the best-known values of the two largest instances, i.e., tai150b and tho150 within the given computing time. BLS fails to find the best-known values of tai150b and tho150 within the time limit of 30 minutes (it can find these values only under a very long time limit of tmax = 10 hours). BMA performs better than BLS by attaining the best-known value of tai150b, but still fails on tho150. The BPD value of FPBS-QAP for the 21 benchmark instances is only 0.043%, which is smaller than 0.059% of BLS, and 0.051% of BMA respectively. Similar observations can also be found for the APD and WPD indicators. It is worth noting that FPBS-QAP needs less time to achieve these (better) results than BLS, while it consumes nearly the same computing time as BMA. 9 TABLE 4 Performance comparison of the proposed FPBS-QAP algorithm with BLS and BMA on 21 hard instances under tmax = 30 minutes. The number of times of reaching the best-known value over 10 runs is indicated in parentheses. BLS BMA Instance BKV BPD APD WPD T (m) tai40a tai50a tai60a tai80a tai100a tai50b tai60b tai80b tai100b tai150b sko72 sko81 sko90 sko100a sko100b sko100c sko100d sko100e sko100f wil100 tho150 3139370 4938796 7205962 13499184 21052466 458821517 608215054 818415043 1185996137 498896643 66256 90998 115534 152002 153890 147862 149576 149150 149036 273038 8133398 0.000(1) 0.000(1) 0.273(0) 0.474(0) 0.467(0) 0.000(10) 0.000(10) 0.000(10) 0.000(9) 0.014(0) 0.000(10) 0.000(9) 0.000(4) 0.000(4) 0.000(8) 0.000(7) 0.000(3) 0.000(5) 0.000(5) 0.000(6) 0.013(0) 0.067 0.181 0.371 0.571 0.566 0.000 0.000 0.000 0.005 0.219 0.000 0.001 0.023 0.006 0.001 0.001 0.004 0.002 0.006 0.001 0.091 0.074 0.364 0.442 0.647 0.630 0.000 0.000 0.000 0.045 0.390 0.000 0.011 0.095 0.018 0.004 0.004 0.009 0.005 0.032 0.003 0.128 5.5 14.5 17.7 13.5 16.4 0.2 0.6 3.3 10.3 14.5 4.4 8.0 9.5 12.4 4.6 10.2 13.5 13.7 11.5 11.4 11.9 0.059 0.101 0.138 9.8 avg. APD WPD T (m) 0.000(1) 0.053(0) 0.165(0) 0.468(0) 0.389(0) 0.000(10) 0.000(10) 0.000(10) 0.000(6) 0.000(1) 0.000(9) 0.000(10) 0.000(9) 0.000(8) 0.000(10) 0.000(10) 0.000(9) 0.000(10) 0.000(6) 0.000(10) 0.003(0) 0.067 0.216 0.285 0.553 0.510 0.000 0.000 0.000 0.044 0.137 0.006 0.000 0.004 0.003 0.000 0.000 0.007 0.000 0.005 0.000 0.021 0.074 0.317 0.381 0.621 0.623 0.000 0.000 0.000 0.143 0.316 0.063 0.000 0.038 0.016 0.000 0.000 0.066 0.000 0.021 0.000 0.067 7.0 12.8 17.6 14.5 19.0 0.2 0.3 1.8 2.4 21.5 0.7 3.5 5.9 5.2 8.5 6.9 6.6 6.5 6.3 6.4 19.9 0.051 0.095 0.139 8.2 When a long time limit of tmax = 120 minutes is allowed, our FPBS-QAP algorithm is able to achieve even better results. As we see from Table 5, the best-known values are obtained with a higher success rate compared to the results under tmax = 30 minutes in Table 4. The average BPD value of FPBS-QAP is 0.028%, which is the smallest compared to 0.037% of BMA, and 0.038% of BLS. FPBSQAP also achieves the smallest average APD value and average WPD value. As to the computing times, FPBS-QAP requires on average 22.0 minutes to reach its best solution, which is the shortest time among the compared algorithms (32.2 minutes for BLS, and 23.1 minutes for BMA). In summary, our FPBS-QAP algorithm competes favorably with the two best-performing QAP algorithms (i.e., BLS and BMA) in terms of both solution quality and computing time. The computational results demonstrate the effectiveness of the proposed FPBS-QAP algorithm, and further shows the usefulness of using frequent patterns mined from high-quality solutions to guide the search for an effective exploration of the solution space. 4.3.4 Comparison with four other state-of-the-art algorithms We now extend our experimental study by comparing FPBSQAP with four other very recent state-of-the-art QAP algorithms in the literature. • • FPBS-QAP BPD Parallel hybrid algorithm (PHA) [43] (2015) used the MPI libraries and was implemented on a highperformance cluster with 46 nodes, a total RAM of 736 GB and a total disk capacity of 6.5 TB configured in a high-performance RAID. Each node includes 2 CPUs (4 cores per CPU) and 16 GB of RAM. Two-stage memory powered great deluge algorithm (TMSGD) [1] (2015) was implemented on a personal computer with 2.1 GHz and 8 GB RAM. The algorithm was stopped when the number of fitness evaluations reaches 20000 ∗ n (n is the instance size). • • BPD APD WPD T (m) 0.000(1) 0.000(1) 0.165(0) 0.430(0) 0.311(0) 0.000(10) 0.000(10) 0.000(10) 0.000(6) 0.000(1) 0.000(10) 0.000(10) 0.000(6) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(7) 0.000(7) 0.000(10) 0.000(1) 0.067 0.279 0.377 0.516 0.402 0.000 0.000 0.000 0.040 0.191 0.000 0.000 0.015 0.000 0.000 0.000 0.000 0.001 0.003 0.000 0.051 0.074 0.415 0.469 0.614 0.553 0.000 0.000 0.000 0.100 0.321 0.000 0.000 0.038 0.000 0.000 0.000 0.000 0.004 0.021 0.000 0.123 6.4 17.3 8.7 18.2 13.4 0.1 0.5 1.2 4.0 20.5 1.4 2.7 4.2 7.7 7.7 8.7 9.0 10.3 4.4 9.5 24.2 0.043 0.092 0.130 8.6 Parallel multi-start hyper-heuristic algorithm (MSH) [11] (2016) was implemented on the same high performance cluster as the above PHA algorithm. Breakout local search using OpenMP (BLS-OpenMP) [4] (2017) was implemented on OpenMP (i.e., an API for shared-memory parallel computations that runs on multi-core computers.) and was executed on a personal computer with an Intel Core i7-6700 CPU 3.4 GHZ with 4 cores and 16 GB RAM. It is possible to execute 8 logical processors on this computer. One notices that three of these four recent QAP algorithms are implemented and run on parallel machines. Moreover, their results have been obtained on different computing platforms, with different stopping conditions. The comparison shown in this section is provided mainly for indicative purposes. Still, the comparison provides interesting indications on the performance of the proposed algorithm relative to these state-of-the-art algorithms. Moreover, the availability of our FPBS-QAP code makes it possible for researchers to make fair comparisons with FPBS-QAP (see footnote 3). Table 6 presents the comparative results between the proposed FPBS-QAP algorithm and the four reference algorithms. Like [1], [4], [11], we adopt the APD indicator (defined in Section 4.3.2) for this comparative study and indicate the running time (T (m)) as an additional indicator, which should be interpreted with cautions for the reasons raised above. For completeness, we also include the results of BLS and BMA from Table 6. In the last row of the table, we again indicate the average value of each indicator. From Table 6, we observe that our FPBS-QAP algorithm achieves a highly competitive performance compared to these state-of-the-art algorithms. The average APD value of FPBS-QAP is 0.061%, which is only slightly worse than 0.058% of the parallel PHA algorithm and better than all remaining reference algorithms. Moreover, even if PHA was 10 TABLE 5 Performance comparison of the proposed FPBS-QAP algorithm with BLS and BMA on 21 hard instances under tmax = 120 minutes. The number of times of reaching the best-known value over 10 runs is indicated in parentheses. BLS BMA Instance BKV BPD APD WPD T (m) tai40a tai50a tai60a tai80a tai100a tai50b tai60b tai80b tai100b tai150b sko72 sko81 sko90 sko100a sko100b sko100c sko100d sko100e sko100f wil100 tho150 3139370 4938796 7205962 13499184 21052466 458821517 608215054 818415043 1185996137 498896643 66256 90998 115534 152002 153890 147862 149576 149150 149036 273038 8133398 0.000(7) 0.000(1) 0.036(0) 0.416(0) 0.335(0) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.001(0) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(6) 0.000(10) 0.000(7) 0.000(9) 0.009(0) 0.022 0.100 0.233 0.502 0.460 0.000 0.000 0.000 0.000 0.040 0.000 0.000 0.000 0.000 0.000 0.000 0.001 0.000 0.002 0.000 0.056 0.074 0.245 0.331 0.587 0.560 0.000 0.000 0.000 0.000 0.183 0.000 0.000 0.000 0.000 0.000 0.000 0.005 0.000 0.005 0.002 0.116 0.038 0.067 0.100 avg. FPBS-QAP BPD APD WPD T (m) BPD APD WPD T (m) 40.7 47.0 73.9 58.0 58.4 0.2 0.3 3.9 6.1 42.7 3.0 10.3 19.6 51.0 21.6 22.4 38.5 44.2 40.2 28.9 64.2 0.000(5) 0.000(3) 0.165(0) 0.332(0) 0.223(0) 0.000(10) 0.000(10) 0.000(10) 0.000(6) 0.055(0) 0.000(10) 0.000(10) 0.000(9) 0.000(8) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(8) 0.000(10) 0.000(1) 0.037 0.098 0.221 0.428 0.370 0.000 0.000 0.000 0.040 0.213 0.000 0.000 0.004 0.003 0.000 0.000 0.000 0.000 0.001 0.000 0.036 0.074 0.291 0.352 0.505 0.511 0.000 0.000 0.000 0.100 0.414 0.000 0.000 0.038 0.016 0.000 0.000 0.000 0.000 0.005 0.000 0.065 28.9 38.8 34.7 69.9 59.9 0.1 0.4 2.0 8.1 56.0 0.7 3.2 3.6 28.6 11.0 7.1 12.6 5.3 23.7 6.9 83.9 0.000(7) 0.000(2) 0.000(1) 0.313(0) 0.280(0) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(5) 0.000(10) 0.000(10) 0.000(9) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(6) 0.000(10) 0.000(3) 0.022 0.107 0.216 0.451 0.378 0.000 0.000 0.000 0.000 0.099 0.000 0.000 0.004 0.000 0.000 0.000 0.000 0.000 0.002 0.000 0.008 0.074 0.231 0.300 0.618 0.466 0.000 0.000 0.000 0.000 0.313 0.000 0.000 0.038 0.000 0.000 0.000 0.000 0.000 0.005 0.000 0.064 52.5 67.8 60.0 55.2 36.1 0.2 0.4 1.4 2.9 46.4 4.8 3.3 2.4 8.5 5.8 8.7 16.2 12.2 4.0 16.4 57.4 32.2 0.037 0.069 0.113 23.1 0.028 0.061 0.100 22.0 TABLE 6 Comparative performance between the FPBS-QAP algorithm and state-of-the-art algorithms on hard instances in terms of the APD value. Computational time are given in minutes for indicative purposes. BLS⋆ PHA◦ BMA⋆ TMSGD MSH◦ BLS-OpenMP◦ FPBS-QAP Instance BKV APD T (m) APD T (m) APD T (m) APD T (m) APD T (m) APD T (m) APD T (m) tai40a tai50a tai60a tai80a tai100a tai50b tai60b tai80b tai100b tai150b sko72 sko81 sko90 sko100a sko100b sko100c sko100d sko100e sko100f wil100 tho150 3139370 4938796 7205962 13499184 21052466 458821517 608215054 818415043 1185996137 498896643 66256 90998 115534 152002 153890 147862 149576 149150 149036 273038 8133398 0.022 0.100 0.233 0.502 0.460 0.000 0.000 0.000 0.000 0.040 0.000 0.000 0.000 0.000 0.000 0.000 0.001 0.000 0.002 0.000 0.056 40.7 47.0 73.9 58.0 58.4 0.2 0.3 3.9 6.1 42.7 3.0 10.3 19.6 51.0 21.6 22.4 38.5 44.2 40.2 28.9 64.2 0.000 0.000 0.000 0.644 0.537 0.000 0.000 0.000 0.000 0.026 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.009 10.6 12.7 19.6 40.0 71.9 5.8 9.5 27.7 42.5 177.4 33.6 39.9 40.5 41.7 42.3 42.2 41.9 42.5 42.0 42.0 177.4 0.037 0.098 0.221 0.428 0.370 0.000 0.000 0.000 0.040 0.213 0.000 0.000 0.004 0.003 0.000 0.000 0.000 0.000 0.001 0.000 0.036 28.9 38.8 34.7 69.9 59.9 0.1 0.4 2.0 8.1 56.0 0.7 3.2 3.6 28.6 11.0 7.1 12.6 5.3 23.7 6.9 83.9 0.261 0.276 0.448 0.832 0.874 0.005 0.000 0.025 0.028 0.051 0.007 0.019 0.031 0.029 0.015 0.013 0.017 0.016 0.013 0.008 0.039 27.8 41.1 78.9 111.3 138.3 10.2 33.6 0.0 72.6 258.0 38.0 57.1 93.8 153.2 164.3 154.5 148.9 146.1 153.4 155.1 512.8 0.261 0.165 0.270 0.530 0.338 0.000 0.000 0.000 0.000 * 0.000 0.000 0.000 0.003 0.004 0.003 0.004 0.000 0.000 * * 30.0 37.5 45.0 60.0 75.0 3.0 3.2 4.0 5.0 * 3.6 4.1 4.5 75.0 75.0 75.0 75.0 75.0 75.0 * * 0.000 0.000 0.000 0.504 0.617 0.000 0.000 0.000 0.000 * 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 0.000 * * 32.2 68.2 107.9 236.0 448.5 0.7 18.6 218.1 160.8 * 1.8 2.4 3.3 29.8 8.5 4.3 12.9 4.3 17.1 * * 0.022 0.107 0.216 0.451 0.378 0.000 0.000 0.000 0.000 0.099 0.000 0.000 0.004 0.000 0.000 0.000 0.000 0.000 0.002 0.000 0.008 52.5 67.8 60.0 55.2 36.1 0.2 0.4 1.4 2.9 46.4 4.8 3.3 2.4 8.5 5.8 8.7 16.2 12.2 4.0 16.4 57.4 0.067 32.2 0.058 47.8 0.069 23.1 0.143 121.4 0.088 40.3 0.062 76.4 0.061 22.0 avg. ⋆ The results of BLS and BMA were obtained by running the programs on our computer with tmax = 120 minutes. These results are slightly different from the results reported in [9], [10]. ◦ PHA, MSH and BLS-OpenMP are parallel algorithms that were run on high-performance platforms under various stopping conditions. run on a parallel high-performance computing platform, its average computing time (≥ 177.4 minutes) is almost three times of the time required by FPBS-QAP (≤ 67.8 minutes) to obtain very similar results. Note that the results of three instances, including the two hardest and largest instances tai150b and tho150, are not reported for BLS-OpenMP. The APD value of BLS-OpenMP is computed for the remaining 18 instances. Importantly, our algorithm requires the least time to achieve the best results, and its average time is only 22.0 minutes. These observations show that our FPBS-QAP algorithm is highly competitive compared to the state-of- the-art algorithms in terms of solution quality and computing time. 5 A NALYSIS AND DISCUSSION In this section, we perform additional experiments to gain understandings of the proposed FPBS algorithm including the rationale behind the solution construction based on frequent patterns, the effectiveness of the solution construction based on mined frequent patterns, and the impact of the number of the largest patterns m on the performance of the proposed algorithm. 11 5.1 Rationale behind the solution construction based on mined patterns To explain the rationale behind the solution construction based on mined frequent patterns, we analyze the structural similarity between high-quality solutions in the elite set, and the length distribution of the frequent patterns mined from the elite set. Given two high-quality solutions π s and π t , we define their similarity as follows. 5.2 Effectiveness of the solution construction based on frequent pattern The frequent pattern based solution construction method is a good alternative to the general crossover operator 0.8 0.8 0.6 0.6 0.4 0.4 0.2 max_sim avg_sim min_sim 0 0.2 max_len avg_len min_len 0 tho150 wil100 sko100f sko100e sko100d sko100c sko100b sko100a sko90 sko81 sko72 tai150b tai100b tai80b tai60b tai50b tai100a tai80a tai60a tai50a tai40a |p| (4) n where the length of a pattern is the proportion of the number of identical elements over the total number of elements. A larger pattern length indicates thus more shared elements. The solution similarity defined in Def. (3) can be considered as a special case of the pattern length defined in Def. (4). Specifically, when the support value of a mined pattern equals 2, the pattern is simplified as the set of common elements shared by only two solutions. This is further confirmed according to the results reported in Figure 1, where the curve of the maximum solution similarity (left sub-figure) is exactly the same as the curve of the maximum length (right sub-figure). In this experiment, we solved each benchmark instance with a time limit of tmax = 30 minutes. To analyze the solution similarity of high-quality solutions stored in the elite set according to Eq. (3), we calculate the length distribution of a set of frequent patterns mined from the elite set according to Eq. (4). The results of the similarity between high-quality solutions and the length distribution of the mined frequent patterns are presented in Figure 1. In Figure 1, we report the maximum value, average value, and minimum value of the solution similarity and the pattern length, respectively. We can clearly observe that there is a high similarity between the high-quality solutions. Specifically, for all instances, the maximum solution similarity is larger than 0.9. Also, the average solution similarities between any two high-quality solutions are larger than 0.5 except for sko72, for which the average solution similarity is about 0.4. A more significant observation can be derived based on the lengths of the mined patterns showed in the right sub-figure. The high structural similarities between the high-quality solutions provide the rationale behind our solution construction based on mined patterns. len(p) = pattern length 1 tho150 wil100 sko100f sko100e sko100d sko100c sko100b sko100a sko90 sko81 sko72 tai150b tai100b tai80b tai60b tai50b tai100a tai80a tai60a tai50a tai40a |π s ∩ π t | sim(π s , π t ) = (3) n where π s ∩ π t is the set of common elements shared by s π and π t . The larger the similarity between two solutions, the more common elements they share. As we mentioned above, a mined frequent pattern represents a set of identical elements shared by two or more solutions under a given minimum support θ. A frequent pattern can be directly converted to a partial solution, thus we define the length of a pattern p as follows. solution similarity 1 Fig. 1. Solution similarity between high-quality solutions (left sub-figure) and length distribution of the mined patterns (right sub-figure). in evolutionary algorithms and memetic algorithms. To demonstrate the effectiveness of the solution construction using frequent patterns, we compare this approach with the general crossover operator within the framework of our FPBS-QAP algorithm. In this experiment, we compared FPBS-QAP with its alternative version FPBS-QAP0 where the frequent pattern based solution construction of FPBSQAP was replaced by the standard uniform crossover operator used in [10]. We ran both algorithms on each benchmark instance 10 times with a time limit of tmax = 30 minutes. The comparative results between FPBS-QAP and FPBSQAP0 are summarized in Table 7. Table 7 indicates that FPBS-QAP performs better than FPBS-QAP0 . FPBS-QAP is able to achieve a better or the same BPD value on all instances except tai60a. For tai60a, the BPD value of FPBS-QAP is 0.165%, which is only marginally worse than 0.164% achieved by FPBS-QAP0 . The average BPD value of FPBS-QAP is also better than that of FPBS-QAP0 , i.e., 0.043% < 0.056%. Finally, FPBS-QAP achieves better results in terms of the average APD value and the average WPD value. To achieve these results, the average run time of FPBS-QAP0 is slightly shorter than that of FPBS-QAP (i.e., 7.9 < 8.6 minutes). This can be explained by the fact that FPBS-QAP needs to execute a frequent pattern mining procedure during the search. These observations confirms the interest of the solution construction method using mined frequent patterns. 5.3 Impact of the number of the largest frequent patterns m The number of the longest frequent patterns m (m > 1) influences the diversity of the new solutions constructed by the solution construction method using mined frequent patterns. To investigate the impact of this parameter, we varied the values of m within a reasonable range and compared their performances. The box and whisker plots showed in Figure 2 are obtained by considering ten different values m ∈ {1, 3, . . . , 21}. The experiments were conducted on four representative instances selected from different families (tai100a, tai150b, sko100f and tho150). For each m value 12 TABLE 7 Comparisons between FPBS-QAP0 and FPBS-QAP on hard instances under the time limit of tmax = 30 minutes. The success rate of reaching the best-known value over 10 runs is indicated in parentheses. FPBS-QAP0 ⋆ BKV BPD APD WPD T (m) tai40a tai50a tai60a tai80a tai100a tai50b tai60b tai80b tai100b tai150b sko72 sko81 sko90 sko100a sko100b sko100c sko100d sko100e sko100f wil100 tho150 3139370 4938796 7205962 13499184 21052466 458821517 608215054 818415043 1185996137 498896643 66256 90998 115534 152002 153890 147862 149576 149150 149036 273038 8133398 0.000(2) 0.241(0) 0.164(0) 0.446(0) 0.316(0) 0.000(10) 0.000(10) 0.000(10) 0.000(8) 0.000(1) 0.000(9) 0.000(10) 0.000(9) 0.000(9) 0.000(8) 0.000(10) 0.000(10) 0.000(10) 0.000(7) 0.000(9) 0.002(0) 0.059 0.318 0.334 0.533 0.466 0.000 0.000 0.000 0.018 0.204 0.006 0.000 0.004 0.002 0.001 0.000 0.000 0.000 0.002 0.000 0.022 0.074 0.392 0.486 0.622 0.615 0.000 0.000 0.000 0.100 0.358 0.063 0.000 0.038 0.016 0.004 0.000 0.000 0.000 0.005 0.002 0.080 7.4 11.8 13.1 15.7 16.8 0.1 0.3 1.5 3.1 20.2 2.2 5.1 4.1 7.0 6.0 6.0 9.5 7.6 3.6 6.0 19.1 0.056 0.094 0.136 7.9 avg. ⋆ 5 7 9 11 13 15 17 19 21 PD to the best known value(%) PD to the best known value(%) tai100a 0.6 0.55 0.5 0.45 0.4 0.35 0.3 0.25 0.2 3 tai150b 0.6 0.5 0.4 0.3 0.2 0.1 0 1 3 5 7 sko100f 0.07 0.06 0.05 0.04 0.03 0.02 0.01 0 1 3 5 7 9 11 13 number of patterns 9 11 13 15 17 19 21 15 17 19 21 number of patterns 15 17 19 21 PD to the best known value(%) PD to the best known value(%) number of patterns 0.08 tho150 0.15 0.1 0.05 0 1 3 5 7 9 11 13 number of patterns Fig. 2. Impact of the number of the largest frequent patterns m. Box and whisker plots corresponding to 10 different values of m ∈ {1, 3, . . . , 21} in terms of the percentage deviation (PD) to the best-known value. In Figure 2, X-axis indicates the different values for the number of the largest frequent patterns m and Y-axis shows the performance (i.e., the percentage deviation to the bestknown value). We observe that the performance of the FPBSQAP algorithm strongly depends on the m value except for sko100f. FPBS-QAP achieves a good performance when the number of the largest pattern m is fixed to 11. This justifies the default value for m shown in Table 3. To tune parameters β and max no update, we used the same method and chosen β = 0.75, max no update = 15 as their default values. It is possible that FPBS-QAP improves its performance when its parameters are tuned for each specific problem instance. 6 BPD APD WPD T (m) 0.000(1) 0.000(1) 0.165(0) 0.430(0) 0.311(0) 0.000(10) 0.000(10) 0.000(10) 0.000(6) 0.000(1) 0.000(10) 0.000(10) 0.000(6) 0.000(10) 0.000(10) 0.000(10) 0.000(10) 0.000(7) 0.000(7) 0.000(10) 0.000(1) 0.067 0.279 0.377 0.516 0.402 0.000 0.000 0.000 0.040 0.191 0.000 0.000 0.015 0.000 0.000 0.000 0.000 0.001 0.003 0.000 0.051 0.074 0.415 0.469 0.614 0.553 0.000 0.000 0.000 0.100 0.321 0.000 0.000 0.038 0.000 0.000 0.000 0.000 0.004 0.021 0.000 0.123 6.4 17.3 8.7 18.2 13.4 0.1 0.5 1.2 4.0 20.5 1.4 2.7 4.2 7.7 7.7 8.7 9.0 10.3 4.4 9.5 24.2 0.043 0.092 0.130 8.6 FPBS-QAP0 can also be considered as an alternative version of BMA [10] by removing the mutation procedure. and each instance, we ran the algorithm 10 times with the stopping condition of tmax = 30 minutes. 1 FPBS-QAP Instance C ONCLUSIONS AND FURTHER WORK In this paper, we proposed a general-purpose optimization approach called frequent pattern based search (FPBS). The proposed approach relies on a data mining procedure to mine frequent patterns from high-quality solutions collected during the search. The mined patterns are then used to create new starting solutions for further improvements. By iterating the pattern mining phase and the optimization phase, FPBS is designed to ensure an effective exploration of the combinatorial search space. The viability of the proposed approach was verified on the well-known quadratic assignment problem. Extensive computational results on popular QAPLIB benchmarks showed that FPBS performs remarkably well compared to very recent and state-of-the-art algorithms both in terms of solution quality and computational efficiency. Specifically, our approach is able to find the best-known objective values for all the benchmark instances except tai80a and tai100a within a time limit of 0.5 hour or 2 hours. To the best of our knowledge, very few QAP algorithms can achieve such a performance. Furthermore, we performed additional experiments to investigate three key issues of the proposed FPBS algorithm. As future work, three directions can be followed. First, this study focused on exploring maximal frequent itemsets. However, there are other interesting patterns available in the area of pattern mining. It is worth studying alternative patterns like sequential patterns and graph patterns. Second, FPBS is a general-purpose approach, it would be interesting to investigate its interest to solve other optimization problems, particularly other permutation problems (e.g., linear ordering problem and traveling salesman problem) and subset selection problems (e.g., diversity or dispersion problems and critical node problems). R EFERENCES [1] A. Acan and A. Ünveren. A great deluge and tabu search hybrid with two-stage memory support for quadratic assignment problem. Applied Soft Computing, 36:185–203, 2015. 13 [2] C.C. Aggarwal, M.A. Bhuiyan, and M.A. Hasan. Frequent pattern mining algorithms: A survey. In Frequent Pattern Mining, pages 19– 64. Springer, 2014. [3] R. Agrawal, T. Imieliński, and A. Swami. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pages 207–216, New York, USA, 1993. [4] Y. Aksan, T. Dokeroglu, and A. Cosar. A stagnation-aware cooperative parallel breakout local search algorithm for the quadratic assignment problem. Computers & Industrial Engineering, 103:105– 115, 2017. [5] K. Anstreicher, N. Brixius, J.P. Goux, and J. Linderoth. Solving large quadratic assignment problems on computational grids. Mathematical Programming, 91(3):563–588, 2002. [6] S. Asta and E. Özcan. A tensor-based selection hyper-heuristic for cross-domain heuristic search. Information Sciences, 299:412–432, 2015. [7] H. Barbalho, I. Rosseti, S.L. Martins, and A. Plastino. A hybrid data mining GRASP with path-relinking. Computers & Operations Research, 40(12):3159–3173, 2013. [8] U. Benlic and J.K. Hao A multilevel memetic approach for improving graph k-partitions. IEEE Transactions on Evolutionary Computation, 15(5):624–472, 2011. [9] U. Benlic and J.K. Hao. Breakout local search for the quadratic assignment problem. Applied Mathematics and Computation, 219(9):4800–4815, 2013. [10] U. Benlic and J.K. Hao. Memetic search for the quadratic assignment problem. Expert Systems with Applications, 42(1):584–595, 2015. [11] T. Dokeroglu and A. Cosar. A novel multistart hyper-heuristic algorithm on the grid for the quadratic assignment problem. Engineering Applications of Artificial Intelligence, 52:10–25, 2016. [12] Z. Drezner, P.M. Hahn, and É.D. Taillard. Recent advances for the quadratic assignment problem with special emphasis on instances that are difficult for metaheuristic methods. Annals of Operations Research, 139(1):65–94, 2005. [13] E. Duman and I. Or. The quadratic assignment problem in the context of the printed circuit board assembly process. Computers & Operations Research, 34(1):163–179, 2007. [14] G. Grahne and J. Zhu. Efficiently using prefix-trees in mining frequent itemsets. In Proceedings of the ICDM 2003 Workshop on Frequent Itemset Mining Implementations, 19 December 2003. [15] G. Grahne and J. Zhu. Fast Algorithms for Frequent Itemset Mining Using FP-Trees. IEEE Transactions on Knowledge and Data Engineering, 17(10):1347–1362, 2005. [16] M. Guerine, I. Rosseti, and A. Plastino. Extending the hybridization of metaheuristics with data mining: Dealing with sequences. Intelligent Data Analysis, 20(5):1133–1156, 2016. [17] J. Han, H. Cheng, D. Xin, and X. Yan. Frequent pattern mining: current status and future directions. Data Mining and Knowledge Discovery, 15(1):55–86, 2007. [18] J. Han, J. Pei, and M. Kamber. Data Mining: Concepts and Techniques. Elsevier, 2011. [19] J.K. Hao. Memetic Algorithms in Discrete Optimization. In F. Neri, C. Cotta, P. Moscato (Eds.) Handbook of Memetic Algorithms. Studies in Computational Intelligence 379, pages 73-94, 2012. [20] T. James, C. Rego, and F. Glover. Multistart tabu search and diversification strategies for the quadratic assignment problem. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 39(3):579–596, May 2009. [21] L. Jourdan, C. Dhaenens, and E.G. Talbi. Using datamining techniques to help metaheuristics: A short survey, pages 57–69. Springer Berlin Heidelberg, Berlin, Heidelberg, 2006. [22] T.C. Koopmans and M. Beckmann. Assignment problems and the location of economic activities. Econometrica: Journal of the Econometric Society, pages 53–76, 1957. [23] E.M. Loiola, N.M.M. de Abreu, P.O. Boaventura-Netto, P. Hahn, and T. Querido. A survey for the quadratic assignment problem. European Journal of Operational Research, 176(2):657–690, 2007. [24] Z. Lü and J.K. Hao. A memetic algorithm for graph coloring. European Journal of Operational Research, 203(1):241–250, 2010. [25] D. Martins, G.M. Vianna, I. Rosseti, S.L. Martins, and A. Plastino. Making a state-of-the-art heuristic faster with data mining. Annals of Operations Research, pages 1–22, 2014. [26] S.L. Martins, I. Rosseti, and A. Plastino. Data mining in stochastic local search, pages 1–49. Springer, 2016. [27] A. Plastino, H. Barbalho, L.F.M. Santos, R. Fuchshuber, and S.L. Martins. Adaptive and multi-mining versions of the DMGRASP hybrid metaheuristic. Journal of Heuristics, 20(1):39–74, 2014. [28] A. Plastino, R. Fuchshuber, S.L. Martins, A.A. Freitas, and S. Salhi. A hybrid data mining metaheuristic for the p-median problem. Statistical Analysis and Data Mining, 4(3):313–335, 2011. [29] D.C. Porumbel, J.K. Hao, and P. Kuntz. An Evolutionary Approach with Diversity Guarantee and Well-Informed Grouping Recombination for Graph Coloring. Computers & Operations Research, 37(10):1822–1832, 2010. [30] M. Raschip, C. Croitoru, and K. Stoffel. Guiding evolutionary search with association rules for solving weighted CSPs. In Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, pages 481–488. ACM, 2015. [31] M. Raschip, C. Croitoru, and K. Stoffel. Using association rules to guide evolutionary search in solving constraint satisfaction. In Proceedings of the 2015 IEEE Congress on Evolutionary Computation (CEC), pages 744–750. IEEE, 2015. [32] D.S. Reddy, A. Govardhan, and S. Sarma. Hybridization of neighbourhood search metaheuristic with data mining technique to solve p-median problem. International Journal of Computational Engineering Research, 2(7):159–163, 2012. [33] M.H. Ribeiro, V.A. Trindade, A. Plastino, and S.L. Martins. Hybridization of GRASP metaheuristics with data mining techniques. In Proceedings of First International Workshop on Hybrid Metaheuristics, Valencia, Spain, August 22-23,, pages 69–78, 2004. [34] M.H. Ribeiro, A. Plastino, and S.L. Martins. Hybridization of GRASP metaheuristic with data mining techniques. Journal of Mathematical Modelling and Algorithms, 5(1):23–41, 2006. [35] M. Samorani and M. Laguna. Data-mining-driven neighborhood search. INFORMS Journal on Computing, 24(2):210–227, 2012. [36] H.G. Santos, L.S. Ochi, E.H. Marinho, and L.M. Drummond. Combining an evolutionary algorithm with data mining to solve a single-vehicle routing problem. Neurocomputing, 70(1):70–77, 2006. [37] L.F. Santos, M.H. Ribeiro, A. Plastino, and S.L. Martins. A hybrid GRASP with data mining for the maximum diversity problem, pages 116–127. Springer, Berlin, Heidelberg, 2005. [38] L.F. Santos, R. Milagres, C.V. Albuquerque, S. Martins, and A. Plastino. NGL01-4: A hybrid GRASP with data mining for efficient server replication for reliable multicast. In Proceedings of the 2006 Global Telecommunications Conference, Sans Francisco, USA, pages 1– 6. IEEE, 2006. [39] L.F. Santos, S.L. Martins, and A. Plastino. Applications of the DMGRASP heuristic: a survey. International Transactions in Operational Research, 15(4):387–416, 2008. [40] T. Stützle and M. López-Ibáñez. Automatic (offline) configuration of algorithms. Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, pages 681–702. [41] K. Sörensen and M. Sevaux. MA mid PM: memetic algorithms with population management. Computers & Operations Research, 33(5):1214–1225, 2006. [42] É. Taillard. Robust taboo search for the quadratic assignment problem. Parallel Computing, 17(4-5):443–455, 1991. [43] U. Tosun. On the performance of parallel hybrid algorithms for the solution of the quadratic assignment problem. Engineering Applications of Artificial Intelligence, 39:267–278, 2015. [44] S. Umetani. Exploiting variable associations to configure efficient local search in large-scale set partitioning problems. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, AAAI’15, pages 1226–1232. AAAI Press, 2015. [45] T. Wauters, K. Verbeeck, P. De Causmaecker and G.V. Berghe. Boosting metaheuristic search using reinforcement learning, Hybrid Metaheuristics, Springer Berlin Heidelberg, 433-452, 2013. [46] T. Wauters, K. Verbeeck, P. De Causmaecker and G.V. Berghe. A learning-based optimization approach to multi-project scheduling, Journal of Scheduling, Springer, 18(1):61–74, 2015. [47] I.H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems) Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2005. [48] Y. Zhou, J.K. Hao, and B. Duval. Reinforcement learning based local search for grouping problems: A case study on graph coloring. Expert Systems with Applications, 64:412–422, 2016. [49] Y. Zhou, J.K. Hao, and B. Duval. Opposition-based memetic search for the maximum diversity problem. IEEE Transactions on Evolutionary Computation, 21(5):731–745, 2017.
8cs.DS
Divergence, Entropy, Information An Opinionated Introduction to Information Theory Phil Chodrow 1 1 arXiv:1708.07459v1 [cs.IT] 24 Aug 2017 MIT Operations Research Center [email protected] https://philchodrow.github.io/ August 25, 2017 Information theory is a mathematical theory of learning with deep connections with topics as diverse as artificial intelligence, statistical physics, and biological evolution. Many primers on the topic paint a broad picture with relatively little mathematical sophistication, while many others develop specific application areas in detail. In contrast, these informal notes aim to outline some elements of the information-theoretic “way of thinking,” by cutting a rapid and interesting path through some of the theory’s foundational concepts and theorems. They are aimed at practicing systems scientists who are interested in exploring potential connections between information theory and their own fields. The main mathematical prerequisite for the notes is comfort with elementary probability, including sample spaces, conditioning, and expectations. We take the Kullback-Leibler divergence as our foundational concept, and then proceed to develop the entropy and mutual information. We discuss some of the main foundational results, including the Chernoff bounds as a characterization of the divergence; Gibbs’ Theorem; and the Data Processing Inequality. A recurring theme is that the definitions of information theory support natural theorems that sound “obvious” when translated into English. More pithily, “information theory makes common sense precise.” Since the focus of the notes is not primarily on technical details, proofs are provided only where the relevant techniques are illustrative of broader themes. Otherwise, proofs and intriguing tangents are referenced in liberally-sprinkled footnotes. The notes close with a highly nonexhaustive list of references to resources and other perspectives on the field. 1 Contents 1 Why Information Theory? 3 2 Why Not Start with Entropy? 3 3 Introducing the Divergence 4 4 Entropy 8 5 Conditional Entropy 10 6 Information Three Ways 12 7 Why Information Shrinks 14 8 Some Further Reading 16 2 1 Why Information Theory? Briefly, information theory is a mathematical theory of learning with rich connections to physics, statistics, and biology. Information-theoretic methods quantify complexity and predictability in systems, and make precise how observing one feature of a system assists in predicting other features. Information-theoretic thinking helps to structure algorithms; describe natural processes; and draw surprising connections between seemingly disparate fields. Formally, information theory is a subfield of probability, the mathematical study of uncertainty and randomness. What is distinctive about information theory is its emphasis on properties of probability distributions that are independent of how those distributions are represented. Because of this representation-independence, information-theoretic quantities often have claim to be the most “fundamental” properties of a system or problem, governing its complexity and learnability. In its original formulation Shannon (1948), information theory is a theory of communication: specifically, the transmission of a signal of some given complexity over an unreliable channel, such as a telephone line corrupted by a certain amount of white noise. In these notes, we will emphasize a slightly different role for information theory, as a theory of learning more generally. This emphasis is consistent with the original formulation, since the communication problem may be viewed as the problem of the message receiver learning the intent of the sender based on the potentially corrupted transmission. However, the emphasis on learning allows us to more easily glimpse some of the rich connections of information theory to other disciplines. Special consideration in these notes will be given to statistical motivations for information-theoretic concepts. Theoretical statistics is the design of mathematical methods for learning from data; information-theoretic considerations determine when such learning is possible and to what degree. We will close with a connection to physics; some connections to biology are cited in the references. 2 Why Not Start with Entropy? Entropy is easily the information-theoretic concept with the widest popular currency, and many expositions of that theory take entropy as their starting point. We, however, will choose a different point of departure for these notes, and derive entropy along the way. Our point of choice is the Kullback-Leibler (KL) divergence between two distributions, also called in some contexts the relative entropy, relative information, or free energy.1 Why start with the 1 For the remainder of these notes I’ll stick with “divergence” – though there are many other interesting objects called “divergences” in mathematics, we won’t be discussing any of them here, so no confusion 3 divergence? Well, there’s a simple reason – while we’ll focus on discrete random variables here, we’d like to develop a theory that, wherever possible, applies to continuous random variables as well. The divergence is well-defined for both discrete random variables and continuous ones; that is, if p and q are two distributions satisfying certain regularity properties, then d(p, q) is a uniquely determined, nonnegative real number whether p and q are discrete or continuous. In contrast, the natural definition of entropy (so called differential entropy) for continuous random variables has two bad behaviors. First, it can be negative, which is undesirable for a measure of uncertainty. Second, and arguably worse, the differential entropy is not even uniquely defined. There are multiple ways to describe the same continuous distribution – for example, the following three distributions are the same: 1. “The Gaussian distribution with mean 0 and variance 1.” 2. “The Gaussian distribution with mean 0 and standard deviation 1.” 3. “The Gaussian distribution with mean 0 and second moment equal to 1.” Technically, the act of switching from one of these descriptions to another can be viewed as a smooth change of coordinates2 in the space of distribution parameters. For example, we move from the first description to the second by changing coordinates from (µ, σ 2 ) to (µ, σ), which we can do by applying √ the function f (x, y) = (x, y). Regrettably, the differential entropy is not invariant under such coordinate changes – change the way you describe the distribution, and the differential entropy changes as well. This is undesirable – the foundations of our theory should be independent of the contingencies of how we describe the distributions under study. The divergence passes this test in both discrete and continuous cases; the differential entropy does not.3 Since we can define the entropy in terms of the divergence in the discrete case, we’ll start with the divergence and derive the entropy along the way. 3 Introducing the Divergence It is often said that the divergence d(p, q) between distributions p and q measures how “surprised” you are if you think the state of the world is q but then measure it to be p. However, this idea of surprise isn’t typically explained or made precise. To motivate the KL divergence, we’ll start from a somewhat unusual beginning – the Chernoff bounds – that makes exact the role that the divergence plays in governing how surprised you ought to be. should arise. Technically, the idea of a smooth coordinate change is captured by diffeomorphisms: invertible functions on coordinate space whose inverses are also smooth. 3 It is possible to define alternative notions of entropy that attempt to skirt these issues; however, they have their own difficulties. https://en.wikipedia.org/wiki/Limiting_density_of_discrete_points 2 4 Let’s begin with a simple running example. You are drawing from an (infinite) deck of standard playing cards, with four card suits {♠, ♣, ♦, ♥} and thirteen card values {1, . . . , 13}. We’ll view the sets of possible values as alphabets: X = {♠, ♣, ♦, ♥} is the alphabet of possible suits, and Y = {1, . . . , 13} the alphabet of possible values. We’ll let X and Y be the corresponding random variables, so for each realization, X ∈ X and Y ∈ Y. Suppose that I have a prior belief that the distribution of suits in the deck is uniform. My belief about the suits can be summarized by a vector q = ( 14 , 14 , 14 , 14 ). It’s extremely convenient to view q as a single point in the probability simplex P X of all valid probability distributions over X . Definition 1 (Probability Simplex). For any finite alphabet X with |X| = m, the probability simplex P X is the set ( ) X X m P , q∈R | qi = 1, qi ≥ 0 ∀i . (1) i Remark. It’s helpful to remember that P X is an P m − 1-dimensional space; the “missing” dimension is due to the constraint i qi = 1. When m = 3, P X is an equilateral triangle; when m = 4 a tetrahedron, and so on. If q is your belief, you would naturally expect that, if you drew enough cards, the observed distribution of suits would be “close” to q, and that if you could draw infinitely many cards, the distribution would indeed converge to q. Let’s make this precise: define p̂n to be the distribution of suits you observe after pulling n cards. It’s important to remember that p̂ is a random vector, which changes in each realization. But it would be reasonable to expect that p̂ → q as n → ∞, and indeed this is true almost surely (with probability 1) according to the Strong Law of Large Numbers, if q is in fact the true distribution of cards in the deck. But what happens if you keep drawing cards and the observed distribution p̂n is much different than your belief q? Then you would justifiably be surprised, and your “level of surprise” can be quantified by the probability of observing p̂n if the true distribution were q, which I’ll denote P(p̂n ; q). We’d expect P(p̂n ; q) to become small when n grows large. Indeed, there is a quite strong result here – P(p̂n ; q) decays exponentially in n, with a very special exponent. Definition 2 (Kullback-Leibler Divergence). For p, q ∈ P X , the KullbackLeibler (KL) divergence of q from p is d(p, q) , X p(x) log x∈X p(x) , q(x) (2) where we are using the conventions that log ∞ = ∞, log 0 = −∞, 0/0 = 0, and 0 × ∞ = 0. 5 Theorem 1 (Chernoff Bounds). Suppose that the card suits are truly distributed according to p 6= q. Then, e−nd(p,q) ≤ P(p̂n ; q) ≤ e−nd(p,q) . (n + 1)m (3) So, the probability of observing p̂n when you thought the distribution was q decays exponentially, with the exponent given by the divergence of your belief q from the true distribution p. Another way to say this: ignoring non-exponential factors, 1 ∼ d(p, q) , (4) − log P(p̂n ; q) = n that is, d(p, q) is the minus the log of your average surprise per card drawn. The Chernoff bounds thus provide firm mathematical content to the idea that the divergence measures surprise. Just to make this concrete, suppose that I start with the belief that the deck is uniform over suits; that is, my belief is q = ( 14 , 14 , 14 , 14 ) over the alphabet {♠, ♣, ♦, ♥}. Unbeknownst to me, you have removed all the black  cards from the deck, which therefore has true distribution p = 0, 0, 21 , 12 . I draw 100 cards and record the suits. How surprised am I by the suit distribution I observe? The divergence between my belief and the true deck distribution is d(p, q) ≈ 0.69, so Theorem 1 states that the dominating factor in the probability of my observing an empirical distribution close to p in 100 draws is e−0.69×100 ≈ 10−30 . I am quite surprised indeed! We’ll now state one of the most important properties of the divergence. Theorem 2 (Gibbs’ Inequality). For all p, q ∈ P X , it holds that d(p, q) ≥ 0, with equality iff p = q. In words, you can never have “negative surprise,” and you are only unsurprised if you what you observed is exactly what you expected. Proof. There are lots of ways to prove Gibbs’ Inequality; here’s one with Lagrange multipliers. Fix p ∈ P X . We’d like to show that the problem min d(p, q) q∈P X (5) has value 0 and that this value is achieved at the unique point q = p. We need two gradients: the gradient P of d(p, q) with respect to q and the gradient of the implicit constraint g(q) , x∈X q(x) = 1. The former is # " X p(x) (6) p(x) log ∇q d(p, q) = ∇q q(x) x∈X # " X p(x) log q(x) (7) = −∇q x∈X = −p ⊘ q, 6 (8) where p ⊘ q is the elementwise quotient of vectors, and where we recall the convention 0/0 = 0. On the other hand, ∇q g(q) = 1, (9) the vector whose entries are all unity. The method of Lagrange multipliers states that we should seek λ ∈ R such that ∇q d(p, q) = λ∇q (gq ), (10) − p ⊘ q = λ1, (11) or from which it’s easy to see that the only solution is q = p and λ = −1. It’s a quick check that the corresponding solution value is d(p, p) = 0, which completes the proof. Remark. Theorem 2 is the primary sense in which d behaves “like a distance” on the simplex P. On the other hand, d is unlike a distance in that it is not symmetric and does not satisfy the triangle inequality.4 Let’s close out this section by noting one of the many connections between the divergence and classical statistics. Maximum likelihood estimation is a foundational method of modern statistical practice; tools from linear regression to neural networks may be viewed as likelihood maximizers. The divergence allows a particularly elegant formulation of maximum likelihood estimation: likelihood maximization is the same as divergence minimization. Let θ be some statistical parameter, which may be multidimensional; for example, in the context of normal distributions, we may have θ = (µ, σ 2 ); in the context of regression, θ may be the regression coefficients β. Let pθX be the probability distribution over X with parameters θ. Let {x1 , . . . , xn } be a sequence of i.i.d. observations of X. Maximum likelihood estimation encourages us to find the parameter θ such that θ ∗ = argmax θ n Y pθX (xi ) , (12) i=1 i.e. the parameter value that makes the data most probable. To express this in terms of the divergence, we need just one more piece of notation: let p̂X be the empirical distribution of observations of X. Then, it’s a slightly involved algebraic exercise to show that the maximum likelihood estimation problem can also be written θ ∗ = argmin d(p̂X , pθX ). (13) θ 4 In fact, d is related to a “proper” distance metric on P X , which is usually called the Fisher Information Metric and is the fundamental object of study in the field of information geometry (Amari and Nagaoka, 2007). 7 This is rather nice – maximum likelihood estimation consists in making the parameterized distribution pθX as close as possible to the observed data distribution p̂X in the sense of the divergence.5 4 Entropy After having put it off for a while, let’s define the Shannon entropy. If we think about the divergence as a (metaphorical) distance, the entropy measures how close a distribution is to the uniform. Definition 3 (Shannon Entropy). The Shannon entropy of p ∈ P X is X H(p) , − p(x) log p(x) . (14) x∈X When convenient, we will also use the notation H(X) to refer to the entropy of a random variable X distributed according to p. Theorem 3. The Shannon entropy is related to the divergence according to the formula H(p) = log m − d(p, u) , (15) where m = |X | is the size of the alphabet X and where u is the uniform distribution on X .6 Remark. This formula makes it easy to remember the entropy of the uniform distribution – it’s just log m, where m is the number of possible choices. If we are playing a game in which I draw a card from the infinite deck, the suit of the card is uniform, and the entropy of the suit distribution is therefore H(X) = log 4 = 2 log 2. Remark. In words, d(p, u) is your surprise if you thought the suit distribution was uniform and then found it was in fact p. If you are relatively unsurprised, then p is very close to uniform. Indeed, Gibbs’ inequality (Theorem 2) immediately implies that H(p) assumes its largest value of log m exactly when p = u. 5 This result is another hint at the beautiful geometry of the divergence: the operation of minimizing a distance-like measure is often called “projection.” Maximum likelihood estimation thus consists in a kind of statistical projection. 6 Here is as good a place as any to note that for discrete random variables, the divergence can also be defined in terms of the entropy. Technically, d is the Bregman divergence induced by the Shannon entropy, and can be characterized by the equation d(p, q) = − [H(p) − H(q) − h∇q H, p − qi] . (16) Intuitively, d(p, q) is minus the approximation loss associated with estimating the difference in entropy between p and q using a first-order Taylor expansion centered at q. This somewhat artificial-seeming construction turns out to lead in some very interesting directions in statistics and machine learning. 8 Remark. Theorem 3 provides one useful insight into why the Shannon entropy does not generalize naturally to continuous distributions – whereas equation (15) involves the uniform distribution on X , but there can be no analogous formula for continuous random variables on R because there is no uniform distribution on R. A Bayesian Interpretation of Entropy The construction of the entropy in terms of the divergence is fairly natural – we use the divergence to measure how close p is to the uniform distribution, flip the sign so that high entropy distributions are more uniform, and add a constant term to make the entropy nonnegative. This formulation of the entropy turns out to have another interesting characterization in the context of Bayesian prediction. In Bayesian prediction, I will pull a single card from the deck. Before I do, I ask you to provide a distribution p over the alphabet {♠, ♣, ♦, ♥} representing your prediction about the suit of the card I pulled. As examples, you can choose p = (1, 0, 0, 0) if you are certain that the suite will be ♠, or p = ( 41 , 41 , 14 , 14 ) to express maximal ignorance. After you guess, I pull the card, obtaining a sample x ∈ X , and reward you based on the quality of your prediction relative to the outcome x. I do this based on a loss function f (p, x); after your guess I give you f (p, x) dollars, say. If we assume that my aim is to encourage you to (a) report your true beliefs about the deck and (b) reward you based only on what happened (i.e. not on what could have happened), then there is only one appropriate loss function f , which turns out to be closely related to the entropy. More formally, Definition 4. A loss function f is proper if, for any alphabet Y and random variable Y on Y, pX|Y =y = argmin E[f (p, x)|Y = y]. (17) p∈P X Remark. In this definition, it’s useful to think of Y as some kind of “side information” or “additional data.” For example, Y could be my telling you that the card I pulled is a red card, which could influence your predictive distribution. When f is proper, you have an incentive to factor that into your predictive distribution. While it may feel that “of course” you should factor this in, not all loss functions encourage you to do so. For example, if f is constant, then you have no incentive to use Y at all, since each guess is just as good as any other. A proper loss function guarantees that you can maximize your payout (minimize your loss) by completely accounting for all available data when forming your prediction, which should therefore be pX|Y =y . Thus, a proper loss function ensures that the Bayesian prediction game is “honest”. Definition 5. A loss function f is local if f (p, x) = ψ(p, p(x)) for some function ψ. 9 Remark. The function f is local iff f can be written as a function only of my prediction p and how much probabilistic weight I put on the event that actually occurred – not events that “could have happened” but didn’t. Thus, a proper loss funciton ensures that the Bayesian prediction game is “fair.” Somewhat amazingly, the log loss function given by f (p, x) = − log p(x) is the only loss function that is both proper and local (both honest and fair), up to an affine transformation. Theorem 4 (Uniqueness of the Log-Loss). Let f be a local and proper reward function. Then, f (p, x) = A log p(x) + B for some constants A < 0 and B ∈ R. Without loss of generality, we’ll take A = −1 and B = 0. The entropy in this context occurs as the expected log-loss when you know the distribution of suits in the deck. If you know, say, that the proportions in the deck are p = ( 41 , 14 , 14 , 14 ) and need to formulate your predictive distribution, Theorem 4 implies that your best guess is just p, since you have no additional side information. Then.... Definition 6 (Entropy, Bayesian Characterization). The (Shannon) entropy of p is your minimal expected loss when playing the Bayesian prediction game in which the true distribution of suits is p. Remark. To see that this definition is consistent with the one we saw before, we can simply compute the expectation: E[f (p, X)] = E[− log p(X)] X =− p(x) log p(x), (18) (19) x∈X which matches Definition 3. The second inequality follows from the fact that, if you are playing optimally, p is both the true distribution of X and your best predictive distribution. 5 Conditional Entropy The true magic of probability theory is conditional probabilities, which formalize the idea of learning: P(A|B) represents my best belief about A given what I know about B. While the Shannon entropy itself is quite interesting, information theory really starts becoming a useful framework for thinking probabilistically when we formulate the conditional entropy, which encodes the idea of learning as a process of uncertainty reduction. In this section and the next, we’ll need to keep track of multiple random variables and distributions. To fix notation, we’ll let pX ∈ P X be the distribution of a discrete random variable X on alphabet X , pY ∈ P Y the distribution of a discrete random variable Y on alphabet Y, and pX,Y ∈ P X ×Y their 10 joint distribution on alphabet X × Y. Additionally, we’ll denote the product distribution of marginals as pX ⊗ pY ∈ P X ×Y ; that is, (pX ⊗ pY )(x, y) = pX (x)pY (y). Definition 7 (Conditional Entropy). The conditional entropy of X given Y is X H(X|Y ) , pX,Y (x, y) log pX|Y (x|y) . (20) x,y∈X ×Y Remark. It might seem as though H(X|Y ) ought to be defined as X H̃(X|Y ) = pX|Y (x|y) log pX|Y (x|y) , (21) x,y∈X ×Y which looks more symmetrical. However, a quick think makes clear that this definition isn’t appropriate, because it doesn’t include any information about the distribution of Y . If Y is concentrated around some very informative (or uninformative) values, then H̃ won’t notice that some values of Y are more valuable than others. In the framework of our Bayesian interpretation of the entropy above, the conditional entropy is your expected reward in the guessing game assuming you receive some additional side information. For example, consider playing the suit-guessing game in the infinite deck of cards. Recall that the suit distribution is uniform, with entropy H(X) = H(u) = 2 log 2. Suppose now that you get side information – when I draw the card from the deck, before I ask you to guess the suit, I tell you the color (black or red). Since for each color there are just two possible suits, the entropy decreases. Formally, if X is the suit and Y the color, it’s easy to compute that H(X|Y ) = log 2 – knowing the color reduces your uncertainty by half. The conditional entropy is somewhat more difficult to express in terms of the divergence, but it does have a useful relationship with the (unconditional) entropy. Theorem 5. The conditional entropy is related to the unconditional entropy as H(X|Y ) = H(X, Y ) − H(Y ), (22) where H(X, Y ) is the entropy of the distribution pX,Y . Remark. This theorem is easy to remember, because it looks like what you get by recalling the definition of the conditional probability and taking logs: pX|Y (x|y) = pX,Y (x, y) . pY (y) (23) Indeed, take logs and compute the expectations over X and Y to prove the theorem directly. Another way to remember this theorem is to just say it 11 out: the uncertainty you have about X given that you’ve been told Y is equal to the uncertainty you had about both X and Y , less the uncertainty that was resolved when you learned Y . From this theorem, it’s a quick use of Gibbs’ inequality to show: Theorem 6 (Side Information Reduces Uncertainty). H(X|Y ) ≤ H(X). (24) That is, knowing Y can never make you more uncertain about X, only less. This makes sense – after all, if Y is not actually informative about X, you can just ignore it. Theorem 6 implies that H(X) − H(X|Y ) ≥ 0. This difference quantifies how much Y reduces uncertainty about X; if H(X) − H(X|Y ) = 0, for example, then H(X|Y ) = H(X) and it is natural to say that Y “carries no information” about X. We encode the idea of information as uncertainty reduction in the next section. 6 Information Three Ways Thus far, we’ve seen two concepts – divergence and entropy – that play fundamentals role in information theory. But neither of them exactly resemble an idea of “information,” so how does the theory earn its name? Our brief note at the end of the last section suggests that we think about information as a relationship between two variables X and Y , in which knowing Y decreases our uncertainty (entropy) about X. As it turns out, the idea of information information that falls out of this motivation is a remarkably useful one, and can be formulated in many interesting and different ways. Let’s start by naming this difference: Definition 8 (Mutual Information). The mutual information I(X, Y ) in Y about X is I(X, Y ) , H(X) − H(X|Y ). (25) The mutual information is just the uncertainty reduction associated with knowing Y . In the context of the Bayesian guessing game, I(X, Y ) is the “value” of being told the suit color, compared to having to play the game without that information. From our calculations above, in the suit-guessing game, I(X, Y ) = H(X) − H(X|Y ) = 2 log 2 − log 2 = log 2. Let’s now express mutual information in two other ways. Remarkably, these follow directly via simple algebra, but each identity gives a new way to think about the meaning of the mutual information. Theorem 7. The mutual information may also be written as: I(X, Y ) = d(pX,Y , pX ⊗ pY ) = EY [d(pX|Y , pX )] 12 (26) (27) Let’s start by unpacking equation (26). I(X, Y ) is the divergence between the actual joint distribution pX,Y and the product distribution pX ⊗ pY . Importantly, the latter is what the distribution of X and Y would be, were they independent random variables with the same marginals. This plus Gibb’s inequality implies: Corrolary 1. Random variables X and Y are independent if and only if I(X, Y ) = 0. So, I(X, Y ) is something like a super-charged correlation coefficient – it measures the degree of statistical correlation between X and Y , but it is stronger than the correlation coefficient in two ways. First, I(X, Y ) detects all kinds of statistical relationships, not just linear ones. Second, while the correlation coefficient can vanish for dependent variables, this never happens for the mutual information – zero mutual information implies dependence, period. As a quick illustration, it’s not hard to see that if X is the suit color and Z is the numerical value of the card pulled, then I(X, Z) = 0. Intuitively, if we were playing the suit-guessing game and I offered to tell you the card’s face-value, you would be rightly annoyed – that’s an unhelpful (“uninformative”) offer, because the face-values and suit colors are independent.7 Equation (26) has another useful consequence. Since that formulation is symmetric in X and Y , Corrolary 2. The mutual information is symmetric: I(X, Y ) = I(Y, X) . (28) Finally, as we noted briefly at the end of the previous section, the following is a direct consequence of Equation (26) and Gibbs’ inequality. Corrolary 3. The mutual information is nonnegative: I(X, Y ) ≥ 0. (29) Now let’s unpack equation (27). One way to read this is as quantifying the danger of ignoring available information: d(pX|Y =y , pX ) is how surprised you would be if you ignored the information Y and instead kept using pX as your belief. If I told you that the deck contained only red  cards, but you chose to ignore this and continue guessing u = 14 , 14 , 14 , 14 as your guess, you would be surprised to keep seeing red cards turn up draw after draw. Formulation (27) expresses the mutual information as the expected surprise 7 So, why don’t we just dispose of correlation coefficients and use I(X, Y ) instead? Well, correlation coefficients can be estimated from data relatively simply and are fairly robust to error. In contrast, I(X, Y ) requires that we have reasonably good estimates of the joint distribution pX,Y , which is not usually available. Furthermore, it can be hard to distinguish I(X, Y ) = 10−6 from I(X, Y ) = 0, and statistical tests of significance that would solve this problem are much more complex than those for correlation coefficients. 13 you would experience by ignoring your available side information Y , with the expectation taken over all the possible values the side information could assume. While this formulation may seem much more opaque than (26), it turns out to be remarkably useful when thinking geometrically, as it expresses the mutual information as the average “distance” between the marginal pX and the conditionals pX|Y . Pursuing this thought turns out to express the mutual information as something like the “moment of inertia” for the joint distribution pX,Y . 7 Why Information Shrinks The famous 2nd Law of Thermodynamics states that, in a closed system, entropy increases. The physicists’ concept of entropy is closely related to but slightly different from the information theorist’s concept, and we therefore won’t make a direct attack on the 2nd Law in these notes. However, there is a close analog of the 2nd Law that gives much of the flavor and can be formulated in information theoretic terms. Whereas the 2nd Law states that entropy grows, the Data Processing Inequality states that information shrinks. Theorem 8 (Data Processing Inequality). Let X and Y be random variables, and let Z = g(Y ), where g is some function g : Y → Z. Then, I(X, Z) ≤ I(X, Y ). (30) This is not the most general possible form of the Data Processing Inequality, but it has the right flavor. The meaning of this theorem is both “obvious” and striking in its generality.8 Intuitively, if you are using Y to predict X, then any processing you do to Y can only reduce your predictive power. Data processing can enable tractable computations; reduce the impact of noise in your observations; and improve your visualizations. The one thing it can’t do is create information out of thin air. No amount of processing is a substitute for having enough of the data you really want. We’ll pursue the proof the Data Processing Inequality, as the steps are quite enlightening. First, we need the conditional mutual information: Definition 9 (Conditional Mutual Information). The conditional mutual information of X and Y given Z is X I(X, Y |Z) = pZ (z)d(pX,Y |Z=z , pX|Z=z ⊗ pY |Z=z ). (31) z∈Z 8 My first thought when seeing this was: “g can be ANY function? Really?” I then spent half an hour fruitlessly attempting to produce a counter-example. 14 The divergence in the summand P is naturally written I(X, Y |Z = z), in which case we have I(X, Y |Z) = z∈Z pZ (z)I(X, Y |Z = z), which has the form of an expectation of mutual informations conditioned on specific values of Z. The conditional mutual information is naturally understood as the value of knowing Y for the prediction of X, given that you also already know Z. Somewhat surprisingly, both of the cases I(X, Y |Z) > I(X, Y ) and I(X, Y |Z) < I(X, Y ) may hold; that is, knowing Z can either increase or decrease the value of knowing Y in the context of predicting X. Theorem 9 (Chain Rule of Mutual Information). We have I(X, (Y, Z)) = I(X, Z) + I(X, Y |Z). (32) Remark. The notation I(X, (Y, Z)) refers to the (regular) mutual information between X and the random variable (Y, Z), which we can regard as a single random variable on the alphabet Y × Z. Proof. We can compute directly, dividing up sums and remembering relations like pX,Y,Z (x, y, z) = pX,Y |Z (x, y|z)pZ (z). Omitting some of the more tedious algebra, I(X, (Y, Z)) = d(pX,Y,Z , pX ⊗ pY,Z ) X pX,Z (x, z) + = pX,Y |Z (x, z) log pX (x)pZ (z) x,z∈X ×Z X pZ (z)pX,Y |Z (x, y|z) log x,y,z∈X ×Y×Z pX,Y |Z (x, y|z) pY |Z (y|z)pX|Z (x|z) = I(X, Z) + I(X, Y |Z) , as was to be shown. As always, the Chain Rule has a nice interpretation if you think about estimating X by first learning Z, and then Y . At the end of this process, you know both Y and Z, and therefore have information I(X, (Y, Z)). This total information splits into two pieces: the information you gained when you learned Z, and the information you gained when you learned Y after already knowing Z. We are now ready to prove the Data Processing Inequality.9 Proof. Since Z = g(Y ), that is, is a function of Y alone, we have that Z ⊥ X|Y , that is, given Y , Z and X are independent.10 So, I(X, Z|Y ) = 0. 9 10 Proof borrowed from http://www.cs.cmu.edu/~ aarti/Class/10704/lec2-dataprocess.pdf In fact, Z ⊥ X|Y is often taken as the hypothesis of the Data Processing inequality rather than Z = g(Y ), as it is somewhat weaker and sufficient to prove the result. 15 On the other hand, using the chain rule in two ways, I(X, (Y, Z)) = I(X, Z) + I(X, Y |Z) = I(X, Y ) + I(X, Z|Y ). Since I(X, Z|Y ) = 0 by our argument above, we obtain I(X, Y ) = I(X, Z) + I(X, Y |Z). Since I(X, Y |Z) is nonnegative by Gibbs’ inequality, we conclude that I(X, Z) ≤ I(X, Y ), as was to be shown. The Data Processing Inequality states that, in the absence of additional information sources, processing leaves you with less information than you started. The 2nd Law of Thermodynamics states that, in the absence of additional energy sources, the system dynamics leave you with less order than you started. These formulations suggest a natural parallel between the concepts of information and order, and therefore a natural parallel between the two theorems. We’ll close out this note with an extremely simplistic-yetsuggestive way to think about this. Let X0 and Y0 each be random variables reflecting the possible locations and momenta of two particles at time t = 0. We’ll assume (a) that the particles don’t interact, but that (b) the experimenter has placed the two particles very close to each other with similar momenta. Thus, the initial configuration of the system is highly ordered, reflected by I(X0 , Y0 ) > 0. If we knew Y0 , then we’d also significantly reduce our uncertainty about X0 . How does this system evolve over time? We’re assuming no interactions, so each of the particles evolve separately according to some dynamics, which we can write X1 = gx (X0 ) and Y1 = gy (Y0 ). Using the data processing inequality twice, we have I(X1 , Y1 ) ≤ I(X0 , Y1 ) ≤ I(X0 , Y0 ). (33) Thus, the dynamics tend to reduce information. Of course, we can complicate this picture in various ways, by considering particle interactions or external potentials, either of which require a more sophisticated analysis. The full 2nd Law, which is beyond the scope of these notes, is most appropriate for considering these cases. 8 Some Further Reading This introduction has been far from exhaustive, and I heartily encourage those interested to explore these topics in more detail. The below is a short list of some of the resources I have found most intriguing and useful, in addition to those cited in the introduction. 16 Information Theory “in General” 1. Shannon’s original work (Shannon, 1948) – in the words of one of my professors, “the most important masters’ thesis of the 20th century.” 2. Shannon’s entertaining information-theoretic study of written English (Shannon, 1951). 3. The text of Cover and Thomas (1991) is the standard modern overview of the field for both theorists and practitioners. 4. Colah’s blog post “Visual Information Theory” at http://colah.github.io/posts/2015-09-Vi is both entertaining and extremely helpful for getting basic intuition around the relationship between entropy and communication. Information Theory, Statistics, and Machine Learning 1. An excellent and entertaining introduction to these topics is the alreadymentioned MacKay (2003). 2. Those who want to further explore will likely enjoy Csiszar and Shields (2004), but I would suggest doing this one after MacKay. 3. Readers interested in pursuing the Bayesian development of entropy much more deeply may enjoy Bernardo and Smith (2008), which provides an extremely thorough development of decision theory with a strong information-theoretic perspective. 4. The notes for the course “Information Processing and Learning” at Carnegie-Mellon’s famous Machine Learning department are excellent and accessible; find them at http://www.cs.cmu.edu/~aarti/Class/10704/lecs.html Information Theory, Physics, and Biology 1. Marc Harper has a number of very fun papers in which he views biological evolutionary dynamics as learning processes through the framework of information theory; a few are (Harper, 2009, 2010). 2. John Baez and his student Blake Pollard wrote a very nice and easyreading review article of the role of information concepts in biological and chemical systems (Baez and Pollard, 2016). 3. More generally, John Baez’s blog is a treasure-trove of interesting vignettes and insights on the role that information plays in the physical and biological worlds: https://johncarlosbaez.wordpress.com/category/information-and For a more thoroughly worked-out connection between information dissipation and the Second Law of Thermodynamics, see this one: https://johncarlosbaez.wordp 17 References Amari, S.-I. and Nagaoka, H. (2007). Methods of Information Geometry. American Mathematical Society. Baez, J. and Pollard, B. (2016). Relative entropy in biological systems. Entropy, 18(2):46. Bernardo, J. M. and Smith, A. F. (2008). Bayesian Theory. John Wiley and Sons, New York. Cover, T. M. and Thomas, J. A. (1991). Elements of Information Theory. John Wiley and Sons, New York. Csiszar, I. and Shields, P. C. (2004). Information Theory and Statistics: A Tutorial. Foundations and Trends in Communications and Information Theory, 1(4):417–528. Harper, M. (2009). Information geometry and evolutionary game theory, arXiv: 0911.1383. pages 1–13. Harper, M. (2010). The replicator equation as an inference dynamic, arXiv: 0911.1763. pages 1–10. MacKay, D. J. C. (2003). Information Theory, Inference, and Learning Algorithms. Cambridge Univeristy Press, 4th edition. Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27:379–423. Shannon, C. E. (1951). Prediction and entropy of printed English. Bell System Technical Journal, 30(1):50–64. 18
7cs.IT
On the topological dimension of the Gromov boundaries of some hyperbolic Out(FN )-graphs Mladen Bestvina, Camille Horbez and Richard D. Wade arXiv:1610.02115v1 [math.GR] 7 Oct 2016 October 10, 2016 Abstract We give upper bounds, linear in the rank, to the topological dimensions of the Gromov boundaries of the intersection graph, the free factor graph and the cyclic splitting graph of a finitely generated free group. Contents 1 Hyperbolic Out(FN )-graphs and their boundaries 1.1 The free factor graph . . . . . . . . . . . . . . . . . 1.2 The intersection graph . . . . . . . . . . . . . . . . 1.3 The cyclic splitting graph . . . . . . . . . . . . . . 1.4 More on mixing Z-averse trees . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 5 6 6 7 2 Train-tracks, indices and stratifications 9 2.1 Train-tracks and carried trees . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.2 Indices and stratifications . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 3 Closedness of P (τ ) in its stratum 4 The 4.1 4.2 4.3 15 cells P (τ ) have dimension at most 0. 20 Existence of folding sequences of train-tracks directed by a boundary point 21 Openness of the set of points carried by a specialization or a fold . . . . . 27 Control on the diameter: getting finer and finer decompositions . . . . . . 29 5 End of the proof of the main theorem 30 A Why equivalence classes of vertices and specializations? 31 Introduction The curve graph C(Σ) of an orientable hyperbolic surface of finite type Σ is an essential tool in the study of the mapping class group of Σ. It was proved to be Gromov hyperbolic 1 by Masur–Minsky [22], and its Gromov boundary was identified with the space of ending laminations on Σ by Klarreich [17]. A striking application of the curve graph and its geometry at infinity is the recent proof by Bestvina–Bromberg–Fujiwara [2] that Mod(Σ) has finite asymptotic dimension, which implies in turn that it satisfies the integral Novikov conjecture. A crucial ingredient in the proof is the finite asymptotic dimension of the curve graph: this was first proved by Bell–Fujiwara [4] using Masur– Minsky’s tight geodesics, and recently recovered (with a bound linear in the genus of Σ and the number of punctures) by Bestvina–Bromberg [1], via finite capacity dimension of the Gromov boundary. The latter approach builds upon work of Gabai [10], who bounded the topological dimension of ∂∞ C(Σ) by building covers in terms of train-tracks on the surface; bounding the capacity dimension requires getting more metric control on such covers. The importance of the curve graph in the study of mapping class groups led people to look for hyperbolic graphs with Out(FN )-actions. In the present paper, we will be mainly interested in three of them: the free factor graph F FN , the cyclic splitting graph F ZN and the intersection graph IN . The Gromov boundary of each graph is homeomorphic to a quotient of a subspace of the boundary ∂CVN of outer space [5, 12, 14, 8]. As ∂CVN has dimension equal to 3N − 5 [3, 11] and the quotient maps are cell-like, this bounds the cohomological dimension of each of these Gromov boundaries. A priori this does not imply finiteness of their topological dimensions. This is the goal of the present paper. Main Theorem. The boundary ∂∞ IN has topological dimension at most 2N − 3. The boundary ∂∞ F FN has topological dimension at most 2N − 2. The boundary ∂∞ F ZN has topological dimension at most 3N − 5. We do not know whether equality holds in any of these cases (see the open questions at the end of the introduction). Following Gabai’s work, our proof relies on constructing a decomposition of each Gromov boundary in terms of a notion of train-tracks. We hope that, by getting further control on the covers we construct, this approach may pave the way towards a proof of finite asymptotic dimension of F FN , F ZN or IN (via finite capacity dimension of their Gromov boundaries). The rest of the introduction is devoted to explaining the strategy of our proof. Although we treat the cases of ∂∞ IN , ∂∞ F FN and ∂∞ F ZN all at once in the paper, we will mainly focus on the free factor graph in this introduction for simplicity, and only say a word about how the proof works for F ZN (the proof for IN is similar). Bounding the topological dimension. To establish our main theorem, we will use the following two topological facts [9, Lemma 1.5.2 and Proposition 1.5.3]. Let X be a separable metric space. 1. If X can be written as a finite union X = X0 ∪ X1 ∪ · · · ∪ Xk where each Xi is 0-dimensional, then dim(X) ≤ k. Zero-dimensionality of each Xi will be proved by appealing to the following fact. 2. If there exists a countable cover of Xi by closed 0-dimensional subsets, then dim(Xi ) = 0. For example, one can recover the fact that dim(Rn ) ≤ n from the above two facts, by using the decomposition of Rn where Xi is the set of points having exactly i rational 2 coordinates. Zero-dimensionality of each Xi can be proved using the second point, by decomposing each Xi into countably many closed subsets Xij , two points being in the same set precisely when they have the same rational coordinates (one easily checks that these sets Xij are 0-dimensional by finding arbitrarily small boxes around each point of Xij with boundary outside of Xij ). Notice that a decomposition (hereafter, a stratification) of X into finitely many subsets Xi as in the first point can be provided by a map X → {0, . . . , k} (hereafter, an index map). Showing that each Xi is zero-dimensional amounts to proving that every point in Xi has clopen neighborhoods (within Xi ) of arbitrary small diameter (equivalently, every point in Xi has arbitrary small open neighborhoods in Xi with empty boundary). Actually, thanks to the second point above, it is enough to write each stratum Xi as a countable union of closed subsets (called hereafter a cell decomposition) and prove 0-dimensionality of each cell of the decomposition. Stratification and cell decomposition of ∂∞ F FN . The boundary ∂∞ F FN is a separable metric space when equipped with a visual metric. Points in the boundary are represented by FN -trees, and a first reasonable attempt could be to define a stratification of ∂∞ F FN by using an index map similar to the one introduced by Gaboriau–Levitt in [11], that roughly counts orbits of branch points and of directions at these points in the trees. Although we make use of these features, our definition of the stratification is slightly different; it is based on a notion of train-tracks. A train-track τ consists of a triple (S τ , ∼V , ∼D ), where S τ is a free FN -action on a simplicial tree, and ∼V (respectively ∼D ) is an equivalence relation on the set of vertices (respectively directions) in S τ . We then say that a tree T ∈ cv N is carried by τ if there is an FN -equivariant map f : S τ → T (called a carrying map) that is in a sense compatible with the train-track structure. The typical situation is when f identifies two vertices in S τ if and only if they are ∼V -equivalent, and identifies the germs of two directions based at equivalent vertices in S τ if and only if the directions are ∼D -equivalent. For technical reasons, our general definition of a carrying map is slightly weaker; in particular it is a bit more flexible about possible images of vertices in S τ at which there are only three equivalence classes of directions. A point ξ ∈ ∂∞ F FN – which is an equivalence class of trees that all admit alignment-preserving bijections to one another – is then carried by τ if some (equivalently, any) representative is carried. A train-track τ as above has an index i(τ ) of at most 2N − 2: this is a combinatorial datum which mainly counts orbits of equivalence classes of vertices and directions in τ . The index i(ξ) of a point ξ ∈ ∂∞ F FN is then defined as the maximal index of a train-track that carries ξ. A train-track determines a cell P (τ ) in ∂∞ F FN , defined as the set of points ξ ∈ ∂∞ F FN such that τ carries ξ and i(τ ) = i(ξ). We define a stratification of ∂∞ F FN by letting Xi be the collection of points of index i. Each Xi is covered by the countable collection of the cells P (τ ), where τ varies over all train-tracks of index i. In view of the topological facts recalled above, our main theorem follows for ∂∞ F FN from the following points: 1. (Proposition 3.1) The boundary of P (τ ) in ∂∞ F FN is contained in a union of cells of strictly greater index. This implies that P (τ ) is closed in Xi(τ ) . 2. (Proposition 4.1) Each cell P (τ ) has dimension at most 0. We say that P (τ ) has dimension ‘at most’ 0, and not ‘equal to’ 0, as we do not exclude the possibility that P (τ ) is empty. 3 For the first point, we show that if (ξn )n∈N ∈ P (τ )N converges to ξ ∈ ∂P (τ ), then the carrying maps fn from S τ to representatives of ξn converge to a map f from S τ to a representative T of ξ. However, the limiting map f may no longer be a carrying map: for example, inequivalent vertices in S τ may have the same image in the limit, and edges in S τ may be collapsed to a point by f . We then collapse all edges in S τ that map to a point under f and get an induced map f ′ from the collapse S ′ to T . This determines a new train-track structure τ ′ on S ′ . A combinatorial argument enables us to count the number of directions ‘lost’ when passing from τ to τ ′ , and show that i(τ ′ ) > i(τ ) unless T is carried by τ . Our proof of the second point relies on a cell decomposition process similar to Gabai’s [10], who used splitting sequences of train-tracks on surfaces to get finer and finer covers of the space of ending laminations. In our context, starting from a cell P (τ ), we will construct finer and finer decompositions of P (τ ) into clopen subsets by means of folding sequences of train-tracks. Eventually the subsets in the decomposition have small enough diameter. More precisely, starting from a train-track τ one can ‘resolve’ an illegal turn in τ by folding it. There are several possibilities for the folded track (see the figures in Section 4), so this operation yields a subdivision of P (τ ) into various P (τ j ). A first crucial fact we prove is that these P (τ j ) are all open in P (τ ). Now, if ξ ∈ P (τ ) and ε > 0, then by folding the train-track τ for sufficiently long we can reach a train-track τ ′ with diam(P (τ ′ )) < ε. Here, hyperbolicity of F FN is crucial: our folding sequence will determine an (unparameterized) quasi-geodesic going to infinity (towards ξ) in F FN . The set P (τi ) defined by the train-track obtained at time i of the process is contained in the set of endpoints of geodesic rays in F FN starting at the simplicial tree associated to τ0 and passing at a bounded distance from τi . From the definition of the visual metric on the boundary, this implies that the diameter of P (τi ) converges to 0 as we move along the folding path. All in all, we find a train-track τ ′ such that P (τ ′ ) is an open neighborhood of ξ in P (τ ), and diam(P (τ ′ )) < ε. The boundary of P (τ ′ ) in P (τ ) is empty (it contains points of strictly greater index), so we get dim(P (τ )) = 0, as required. A word on ∂∞ F ZN . Some points in ∂∞ F ZN are represented by trees in which some free factor system of FN is elliptic. This leads us to work with train-tracks that are allowed to have bigger vertex stabilizers, and the index of a train-track now also takes into account the complexity of this elliptic free factor system. A priori, our definition of index in this setting only yields a quadratic bound in N to the topological dimension of ∂∞ F ZN , but we then get the linear bound from cohomological dimension. We also have to deal with the fact that a point ξ ∈ ∂∞ F ZN is an equivalence class of trees that may not admit alignment-preserving bijections between different representatives; this leads us to analysing preferred (mixing) representatives of these classes more closely. Organization of the paper. In Section 1, we review the definitions of F FN , IN and F ZN , and the descriptions of their Gromov boundaries. We also prove a few facts concerning mixing representatives of points in ∂∞ F ZN , which are used to tackle the last difficulty mentioned in the above paragraph. Train-tracks and indices are then defined in Section 2, and the stratifications of the Gromov boundaries are given. We prove in Section 3 that each cell P (τ ) is closed in its stratum, by showing that ∂P (τ ) is made of points with strictly higher index. We introduce folding moves in Section 4, and use them to prove that each cell P (τ ) has dimension at most 0. The proof of our main theorem 4 is then completed in Section 5. The paper has an appendix in which we illustrate the motivations behind some technical requirements that appear in our definitions of traintracks and carrying maps. Some open questions. As mentioned earlier, we hope that the cell decompositions of the boundaries defined in the present paper may provide a tool to tackle the question of finiteness of the asymptotic dimension of the various graphs, following the blueprint of [1]. Gabai uses the cell decomposition of the ending lamination space EL to show that it is highly connected for sufficiently complicated surfaces [10] (connectivity had been established earlier for most surfaces by Leininger–Schleimer [18]). It is unknown whether the boundaries of IN , F FN or F ZN are connected. The question of local connectivity of these boundaries (or the related question of local connectivity of the boundary of Culler–Vogtmann’s outer space) are also open to our knowledge. Finally, we would like to address the question of finding lower bounds on the dimensions. Gabai shows that the topological dimension of EL is bounded from below by 3g + p − 4 (where g is the genus of the surface and p is the number of punctures). Since the ending lamination space of a once-punctured surface sits as a subspace of ∂∞ F F2g and ∂∞ F Z2g , this gives a lower bound on the dimension of ∂∞ F F2g and ∂∞ F Z2g . Improving the gap between the upper and lower bounds, as well as finding a lower bound for ∂∞ IN , is an interesting problem. Acknowledgments. We would like to thank Patrick Reynolds for conversations we had related to the present project, and Vera Tonić for pointing out to us the reference [9] relating topological and cohomological dimensions. The present work was supported by the National Science Foundation under Grants No. DMS-1440140 while the authors were in residence at the Mathematical Sciences Research Institute in Berkeley, California, during the Fall 2016 semester. The first author was supported by the NSF under Grant No. DMS-1607236. 1 Hyperbolic Out(FN )-graphs and their boundaries We review the definitions of three hyperbolic Out(FN )-graphs (the free factor graph, the intersection graph and the Z-splitting graph) and the descriptions of their Gromov boundaries. The only novelties are some facts concerning mixing Z-averse trees in the final subsection. 1.1 The free factor graph The free factor graph F FN is the graph (equipped with the simplicial metric) whose vertices are the conjugacy classes of proper free factors of FN . Two conjugacy classes [A] and [B] of free factors are joined by an edge if they have representatives A, B such that A ( B or B ( A. Its hyperbolicity was proved in [4]. To describe its Gromov boundary, we first recall that unprojectivized outer space cvN is the space of all FN -equivariant isometry classes of minimal, free, simplicial, isometric FN -actions on simplicial metric trees. Its closure cv N (for the equivariant Gromov– Hausdorff topology) was identified in [6, 4] with the space of all minimal very small FN -trees, i.e. FN -actions on R-trees in which all stabilizers of nondegenerate arcs are 5 cyclic (possibly trivial) and root-closed, and tripod stabilizers are trivial. There exists a coarsely Out(FN )-equivariant map π : cvN → F FN , which sends a tree T to a free factor that is elliptic in a tree T obtained from T by collapsing some edges to points. An FN -tree T ∈ ∂cvN is arational if no proper free factor of FN is elliptic in T , or acts with dense orbits on its minimal subtree. Two arational trees T and T ′ are equivalent (T ∼ T ′ ) if there exists an FN -equivariant alignment-preserving bijection from T to T ′ . We denote by AT N the subspace of ∂cvN made of arational trees. Arational trees were introduced by Reynolds in [25], where he proved that every arational FN -tree is either free, or dual to an arational measured lamination on a once-holed surface. Theorem 1.1. (Bestvina–Reynolds [5], Hamenstädt [12]) There is a homeomorphism ∂π : AT N /∼ → ∂∞ F FN , which extends the map π continuously to the boundary. By this we mean that for all sequences (Sn )n∈N ∈ (cvN )N converging to a tree S∞ ∈ AT N (for the topology on cv N ), the sequence (π(Sn ))n∈N converges to ∂π(S∞ ) (for the topology on F FN ∪ ∂∞ F FN ). 1.2 The intersection graph A conjugacy class α of FN is geometric if it is either part of a free basis of FN , or else corresponds to the boundary curve of a once-holed surface with fundamental group identified with FN . The intersection graph IN (with Mann’s definition [21], a variation on Kapovich–Lustig’s [16]) is the bipartite graph whose vertices are the simplicial FN trees in ∂cvN together with the set of geometric conjugacy classes of FN . A tree T is joined by an edge to a conjugacy class α whenever α is elliptic in T . Its hyperbolicity was proved in [21]. The intersection graph is also quasi-isometric to Dowdall–Taylor’s co-surface graph [8, Section 4]. We denote by FAT N ⊆ AT N the space of free arational trees in cv N . Again, there is a coarsely Out(FN )-equivariant map π : cvN → IN , which sends a tree T ∈ cvN to a tree T ∈ ∂cvN obtained by collapsing some of the edges of T to points. Theorem 1.2. (Dowdall–Taylor [8]) There is a homeomorphism ∂π : FAT N /∼ → ∂∞ IN , which extends the map π continuously to the boundary. Continuity of the extension is understood in the same way as in the statement of Theorem 1.1 above. 1.3 The cyclic splitting graph A cyclic splitting of FN is a simplicial, minimal FN -tree in which all edge stabilizers are cyclic (possibly trivial). The Z-splitting graph F ZN is the graph whose vertices are the FN -equivariant homeomorphism classes of Z-splittings of FN . Two splittings are joined by an edge if they have a common refinement. Its hyperbolicity was proved by Mann [20]. We recall that two trees T, T ′ ∈ cv N are compatible if there exists a tree Tb ∈ cv N that admits alignment-preserving FN -equivariant maps onto both T and T ′ . A tree T ∈ cv N is Z-averse if it is not compatible with any tree T ′ ∈ cv N which is compatible with a 6 Z-splitting of FN . We denote by XN the subspace of cv N made of Z-averse trees. Two Z-averse trees are equivalent if they are both compatible with a common tree; although not obvious, this was shown in [14] to be an equivalence relation on XN , which we denote by ≈. There is an Out(FN )-equivariant map π : cvN → F ZN , given by forgetting the metric. Theorem 1.3. (Hamenstädt [12], Horbez [14]) There is a homeomorphism ∂π : XN /≈ → ∂∞ F ZN , which extends the map π continuously to the boundary. Each ≈-equivalence class in XN has preferred representatives that are mixing. We recall that a tree T ∈ cv N is mixing if for all segments I, J ⊆ T , there exists a finite set {g1 , . . . , gk } ⊆ FN such that J is contained in the union of finitely many translates gi I. Theorem 1.4. (Horbez [14]) Every ≈-class in XN contains a mixing tree, and any two mixing trees in the same ≈-class admit FN -equivariant alignment-preserving bijections between each other. Any Z-averse tree admits an FN -equivariant alignment-preserving map onto every mixing tree in its ≈-class. The space of arational trees AT N is contained in the space of Z-averse trees XN , and the equivalence relation ∼ we have defined on AT N is the restriction to AT N of the equivalence relation ≈ on XN (all arational trees are mixing [25]). The inclusion AT N ⊆ XN then induces a subspace inclusion ∂∞ F FN ⊆ ∂∞ F ZN . 1.4 More on mixing Z-averse trees In this section, we establish a few more facts concerning mixing Z-averse trees and their possible point stabilizers, building on the work in [14]. If we were only concerned with the free factor graph, we would not need these results. The reader may decide to skim through the section and avoid the technicalities in the proofs in a first reading. Lemma 1.5. Let T ∈ cv N be mixing and Z-averse, and let A ⊆ FN be a proper free factor. Then the A-action on its minimal subtree TA ⊆ T is discrete (possibly TA is reduced to a point). In particular, if no proper free factor is elliptic in T , then T is arational. Proof. Assume towards a contradiction that TA is not simplicial. Since T has trivial arc stabilizers, the Levitt decomposition of TA [19] has trivial arc stabilizers (it may be reduced to a point in the case where T has dense orbits). Let B ⊆ A be a free factor of A (hence of FN ) which is a vertex group of this decomposition. The B-minimal subtree TB of T (which is also the B-minimal subtree of TA ) has dense orbits, so by [24, Lemma 3.10] the family {gTB |g ∈ FN } is a transverse family in T . As T is mixing, it is a transverse covering. In addition, by [25, Corollary 6.4] the stabilizer of TB is equal to B. But by [14, Proposition 4.23], the stabilizer of a subtree in a transverse covering of a mixing Z-averse tree cannot be a free factor (in fact, it cannot be elliptic in a Z-splitting of FN ), so we get a contradiction. A collection A of subgroups of FN is a free factor system if it coincides with the set of nontrivial point stabilizers in some simplicial FN -tree with trivial arc stabilizers. 7 There is a natural order on the collection of free factor systems, by saying that a free factor system A is contained in a free factor system A′ whenever every factor in A is contained in one of the factors in A′ . Proposition 1.6. Let T ∈ cv N be mixing and Z-averse. Then either T is dual to an arational measured lamination on a closed hyperbolic surface with finitely many points removed, or else the collection of point stabilizers in T is a free factor system. Proof. First assume that there does not exist any free splitting of FN in which all point stabilizers of T are elliptic. Then, with the terminology of [13, Section 5], the tree T is of surface type (by the same argument as in [13, Lemma 5.8]). Since T is Z-averse, the skeleton of the dynamical decomposition of T is reduced to a point, in other words T is dual to an arational measured lamination on a surface. Assume now that there exists a free splitting S of FN in which all point stabilizers of T are elliptic. Let A be the smallest free factor system such that every point stabilizer of T is contained within some factor in A. By Lemma 1.5, each factor A in A acts discretely on its minimal subtree TA . In addition TA has trivial arc stabilizers because T has trivial arc stabilizers. So either A is elliptic in T , or else TA is a free splitting of A. The second situation cannot occur, as otherwise the point stabilizers in TA would form a free factor system of A, contradicting the minimality of A. Hence A coincides with the collection of point stabilizers of T . We will also establish a characterization of the mixing representatives in a given equivalence class of Z-averse trees. Before that, we start with the following lemma. Lemma 1.7. Let T, T ′ ∈ cv N . Assume that T has dense orbits, and that there exists an FN -equivariant alignment-preserving map p : T → T ′ . Then either p is a bijection, or else there exists g ∈ FN that is elliptic in T ′ but not in T . In the latter case, some point stabilizer in T ′ is non-cyclic. Proof. Notice that surjectivity of p follows from the minimality of T ′ . The collection of all subtrees of the form p−1 ({x}) with x ∈ T ′ is a transverse family in T . If p is not a bijection, then one of the subtrees Y in this family is nondegenerate, and [25, Proposition 7.6] implies that its stabilizer A = Stab(p(Y )) is nontrivial, and that the A-action on Y is not discrete. This implies that the minimal A-invariant subtree of Y is not reduced to a point, and A contains an element that acts hyperbolically on T , while it fixes a point in T ′ . In addition A is not cyclic, so the last assertion of the lemma holds. Proposition 1.8. A Z-averse tree T is mixing if and only if for all T ′ ≈ T , every element of FN that is elliptic in T ′ is also elliptic in T . If T is dual to an arational lamination on a surface, then all trees in the ≈-class of T are mixing. Proof. If T is mixing, then all trees T ′ in its ≈-class admit an FN -equivariant alignmentpreserving map onto T , so every element elliptic in T ′ is also elliptic in T . If T is not mixing, then it admits an FN -equivariant alignment-preserving map p onto a mixing tree T in the same ≈-class, and p is not a bijection. By Lemma 1.7, there exists an element of FN that is elliptic in T but not in T . The second assertion in Proposition 1.8 follows from the last assertion of Lemma 1.7 because if T is dual to an arational lamination on a surface, then T is mixing and all point stabilizers in T are cyclic. 8 Corollary 1.9. Let T be a Z-averse tree, and let A be a maximal free factor system elliptic in T . Let T be a mixing representative of the ≈-class of T . Then A is a maximal elliptic free factor system in T if and only if T is mixing. Proof. If T is mixing, then T and T have the same point stabilizers, so the conclusion is obvious. If T is not mixing, then Proposition 1.8 implies that T is not dual to a lamination on a surface, and that there exists an element g ∈ FN not contained in A that is elliptic in T . Proposition 1.6 shows that the collection of elliptic subgroups in T is a free factor system of FN , and this free factor system strictly contains A. 2 Train-tracks, indices and stratifications 2.1 Train-tracks and carried trees Definition 2.1 (Train-tracks). A train-track τ is the data of • a minimal, simplicial FN -tree S τ with trivial edge stabilizers, • an equivalence relation ∼τV on the set V (S τ ) of vertices of S τ , such that if v ∼τV v ′ , then gv ∼τV gv ′ for all g ∈ FN , and such that no two adjacent vertices are equivalent, • for each ∼τV -class X, an equivalence relation ∼τD,X on the set D(X) of directions at the vertices in X, such that if two directions d, d′ ∈ D(X) are equivalent, then for all g ∈ FN , the directions gd, gd′ ∈ D(gX) are also equivalent. Equivalence classes of directions at X are called gates at X. We denote by A(τ ) the free factor system made of all point stabilizers in S τ . Remark 2.2. Including an equivalence relation on the vertex set of S τ in the definition may look surprising to the reader, as this is not standard in train-track theory for free groups. Roughly speaking, the equivalence classes of vertices correspond to branch points in trees carried by a track; this is explained in more detail in the appendix of the paper. We will usually also impose that the train-tracks we work with satisfy some additional assumptions. Let τ be a train-track. A pair (d, d′ ) of directions based at a common vertex of S τ is called a turn, and is said to be legal if d and d′ are inequivalent. A subtree A ⊂ S τ crosses the turn (d, d′ ) if the intersection of A with both directions d and d′ is non-empty. We say that A is legal in τ if each turn crossed by A is legal in τ . Definition 2.3 (Admissible train-tracks). A train-track τ is admissible if for every vertex v ∈ S τ , there exist three pairwise inequivalent directions d1 , d2 , d3 at v such that for all i ∈ {1, 2, 3}, there exists an element gi ∈ FN acting hyperbolically on S τ whose axis in S τ is legal and crosses the turn (di , di+1 ) (mod 3). In particular, there are at least three gates at every equivalence class of vertices in admissible train-tracks. We will call a triple (g1 , g2 , g3 ) as in Definition 2.3 a tripod of legal elements at v, and we say that their axes form a tripod of legal axes at v. Edges in simplicial trees are given an affine structure, which enables us to consider maps from simplicial trees to R-trees that are linear on edges. If f : S → T is linear then there is a unique metric on S for which f is isometric when restricted to every edge. We say that this is the metric on S determined by the linear map f . 9 Train-tracks naturally arise from morphisms between trees. Suppose that f : S → T is an FN -equivariant map from a simplicial FN -tree S to an FN -tree T which is linear on edges and does not collapse any edge of S to a point. There is an induced equivalence relation ∼V on the set of vertices of S given by saying that two vertices are equivalent if they have the same f -image in T . Let w be a point in T and let X := f −1 (w) ∩ V (S) be its associated equivalence class in V (S). As soon as X 6= ∅, equivariance of f implies that its (setwise) stabilizer Stab(X) in S is equal to the stabilizer of the point w in T . Let D(X) be the set of directions in S based at points in X. Since f does not collapse any edge, it induces an equivalence relation ∼D,X on D(X), where two directions in D(X) are equivalent if they have germs that map into the same direction at w in T . The set of Stab(X)-orbits of equivalence classes in D(X) then maps injectively into the set of Stab(w)-orbits of directions at w in T . We call this collection of equivalence classes τf the train-track structure on S induced by f . This will be the typical example where a tree T is carried by the train-track τf . Our general definition of carrying is slightly more technical, as it involves a bit more flexibility with respect to the definition of f at exceptional classes of vertices, defined as follows. Definition 2.4 (Exceptional classes of vertices). Let τ be an admissible train-track. An equivalence class X of vertices of S τ is called exceptional if there are exactly 3 gates at X. Definition 2.5 (Specialization). Let τ and τ ′ be two train-tracks, and let [v0 ] ∈ S τ be an exceptional equivalence class of vertices. We say that τ ′ is a specialization of τ at [v0 ] if ′ • Sτ = Sτ , ′ • there exists a vertex v1 ∈ S τ , not in the same orbit as v0 , such that ∼τV is the ′ coarsest FN -invariant equivalence relation finer than ∼τV and such that v1 ∼τV v0 , ′ • if d, d′ are two directions not based at any vertex in the orbit of [v0 ], then d ∼τ d′ if and only if d ∼τ d′ , • every direction at a vertex in [v0 ] is equivalent to some direction at a vertex which is τ -equivalent to v1 . Definition 2.6 (Carrying ). We say that an FN -tree T is carried by a train-track τ if there is an FN -equivariant map f : S τ → T , which is linear on edges and does not collapse any edge to a point, such that the train-track structure τf induced by f is obtained from τ by a finite (possibly trivial) sequence of specializations. In this situation, we call the map f a carrying map (with respect to τ ). Remark 2.7. The motivation for introducing specializations and allowing them in the definition of carrying is again explained in the appendix; specializations will appear naturally later in the paper when we start performing folds on tracks. Lemma 2.8. The collection of all train-tracks τ for which there exists a tree T ∈ cv N carried by τ is countable. Proof. There are countably many minimal, simplicial FN -trees with trivial edge stabilizers. In addition, if τ carries a tree T ∈ cv N , then the stabilizer of every equivalence class X of vertices in τ is a finitely generated subgroup of FN (because every point 10 stabilizer in a very small FN -tree is finitely generated by [11]). The set X/Stab(X) is finite because there are finitely many FN -orbits of vertices in S τ , and if v, gv are two vertices in X, then g ∈ Stab(X). The stabilizer of every gate [d] is at most cyclic, and again [d]/Stab([d]) is finite. The equivalence relation on vertices is recovered by taking a finite set A1 , . . . , Ak of representatives of FN -orbits of equivalence classes, and in each Ai taking a finite set Vi of vertices such that Stab(Ai ).Vi = Ai . Each equivalence class is of the form gStab(Ai ).Vi , for some g ∈ FN . The equivalence relation on edges is recovered by taking a finite set B1 , . . . , Bl of representatives of FN -orbits of gates in τ , and for each Bi taking a finite set Ei of representatives of FN -orbits of oriented edges determining the directions in Bi . Then each gate in τ is of the form gStab(Bi ).Ei for some g ∈ FN . Hence τ is determined by the simplicial tree S τ and the finite family ({Stab(Ai )}, {Vi }, {Stab(Bi )}, {Ei }), which gives a countable number of possible traintracks. We will also need the following observation. Lemma 2.9. Let τ be an admissible train-track, and let [a, b] ⊆ S τ be a legal segment. Then there exists an element g ∈ FN acting hyperbolically on S τ , whose axis in S τ is legal and contains [a, b]. Proof. Since τ is admissible, there exist elements g, h ∈ FN acting hyperbolically in S τ , whose axes Ag , Ah are legal and pass through a, b respectively, only meet [a, b] at one extremity, and such that the subtree Y := Ag ∪ [a, b] ∪ Ah is legal. Standard properties of group actions on trees [7] imply that all turns in the axis of gh are contained in translates of Y . So the axis of gh is legal, and it contains [a, b]. The following two lemmas state that every tree T ∈ cv N is carried by an admissible train-track, and in addition the carrying map f : S τ → T is completely determined by the train-track structure. Given a free factor system A, we say that a tree T ∈ cv N is an A-tree if all subgroups in A are elliptic in T . Lemma 2.10. Let A be a free factor system, and let T ∈ cv N be an A-tree with trivial arc stabilizers. Then there exists an admissible train-track τ such that T is carried by τ and A(τ ) = A. Proof. Without loss of generality, we can assume that A is a maximal free factor system such that T is an A-tree. We let A/FN := {[A1 ], . . . , [Ak ]}. If A = 6 ∅, then (up to replacing the subgroups Ai by appropriate conjugates) we can choose for S the universal cover of the graph of groups depicted on Figure 1. There is a unique FN -equivariant map f : S → T that is linear on edges: indeed, every vertex v of S has nontrivial stabilizer Gv , and must be sent by f to the unique point in T fixed by Gv . The elements ai and the subgroups A2 , . . . , Ak cannot fix the same point as A1 in T by maximality of A, so f does not collapse any edge, and therefore τf is well-defined. Admissibility of τf can be checked by taking advantage of the fact that all vertex groups are infinite: one can construct the required legal elements by taking appropriate products of elliptic elements in T . We now assume that A = ∅. Let {a1 , . . . , aN } be a free basis of FN such that A = ha1 , a2 i acts freely with discrete orbits on T , and no ai is elliptic in T . Such a basis exists as the reducing factors of T (if there are any) form a bounded subset of F FN , see [5, Corollary 5.3]. Let TA be the minimal A-invariant subtree for the A-action on T . Let ΓA = TA /A. Then ΓA is a finite graph in cv2 with one or two vertices. We extend ΓA 11 a1 A2 A1 al Ak Figure 1: The tree S in the proof of Lemma 2.10, in the case where A 6= ∅. to a marked FN –graph Γ with the same number of vertices, by attaching loops labelled by the elements a3 , . . . , aN at a fixed vertex of ΓA . Let S be the universal cover of Γ. The isometric embedding from TA into T extends to a map f : S → T , and f does not collapse any edges because no element ai is elliptic in T . The induced train-track τf is admissible as each vertex of TA has valence at least 3 and f is an FN -equivariant isometric embedding when restricted to TA . Lemma 2.11. Let T ∈ cv N , and let τ be an admissible train-track such that T is carried by τ . Then there exists a unique carrying map f : S τ → T for the train-track structure. Furthermore, the carrying map f varies continuously on the set of trees that are carried by τ (in the equivariant Gromov–Hausdorff topology). Proof. To prove uniqueness, it is enough to show that the f -image of any vertex v ∈ S τ is completely determined by the train-track structure. Let (g1 , g2 , g3 ) be a tripod of legal elements at v, and let e1 , e2 , e3 be the three edges at v taken by their axes. Then f is isometric when restricted to e1 ∪ e2 ∪ e3 , and also when restricted to the axes of g1 , g2 , g3 . This implies that the intersection of the axes of g1 , g2 , g3 in T is reduced to a point, and f must send v to that point. Continuity also follows from the above argument. In order to define what it means for an equivalence class of Z-averse trees to be carried by a train-track, we will need the following lemma. Lemma 2.12. Let T, T ′ ∈ cv N , and let τ be a train-track. If there is an FN -equivariant alignment-preserving bijection from T to T ′ , then T is carried by τ if and only if T ′ is carried by τ . Proof. Let f : S τ → T be a carrying map, and let θ : T → T ′ be an FN -equivariant alignment-preserving bijection. Let f ′ : S τ → T ′ be the unique linear map that coincides with θ ◦ f on the vertices of S τ . We claim that f ′ is a carrying map. Indeed, since θ is a bijection, two vertices in S τ have the same f ′ -image if and only if they have the same f -image. In addition, since θ preserves alignment, the germs of two directions in S τ are identified by f ′ if and only if they are identified by f . We recall that XN ⊆ cv N denotes the subspace made of Z-averse trees. Definition 2.13 (Carrying equivalence classes of Z-averse trees). An equivalence class ξ ∈ XN /≈ is carried by a train-track τ if some (equivalently, any) mixing representative of ξ is carried by τ . 12 2.2 Indices and stratifications We now define stratifications of the Gromov boundaries of IN , F FN and F ZN by means of an index function taking finitely many values. We will define both the index of a train-track and the index of a tree T ∈ cv N , and explain how the two are related, before defining the index of a boundary point (which is an equivalence class of trees). 2.2.1 Geometric index of a tree in cv N The following definition is reminiscent of Gaboriau–Levitt’s index for trees in cv N [11], with a slight difference in the constants we use. Definition 2.14 (Geometric index of a tree T ∈ cv N ). Let T ∈ cv N be a tree with trivial arc stabilizers. The geometric index of T is defined as X igeom (T ) := (αv + 3rank(Stab(v)) − 3), v∈V (T )/FN where V (T ) denotes the set of branch points in T , and αv denotes the number of FN orbits of directions at v. Lemma 2.15. For all T ∈ cv N with trivial arc stabilizers, we have igeom (T ) ≤ 3N − 3. If T is arational, then igeom (T ) ≤ 2N − 2. If T is free and arational, then igeom (T ) ≤ 2N − 3. Proof. Let iGL (T ) := X (αv + 2rank(Stab(v)) − 2). v∈V (T )/FN We have igeom (T ) ≤ 23 iGL (T ) for all T ∈ cv N , and Gaboriau–Levitt proved in [11, Theorem III.2] that iGL (T ) ≤ 2N − 2, so igeom (T ) ≤ 3N − 3. In addition we have X igeom (T ) = iGL (T ) + (rank(Stab(v)) − 1). (1) v∈V (T )/FN Assume now that T is arational. If the FN -action on T is free, since there is at least one orbit of branch points in T , we get from Equation (1) that igeom (T ) < iGL (T ) ≤ 2N − 2. Otherwise, by [25], the FN -action on T is dual to a measured lamination on a once-holed surface, so all point stabilizers in T are either trivial or cyclic, and we get igeom (T ) ≤ iGL (T ) ≤ 2N − 2. 2.2.2 Index of a train-track and carrying index of a tree The height h(A) of a free factor system A is defined as the maximal length k of a proper chain of free factor systems ∅ = A0 ( A1 ( · · · ( Ak = A. We recall that the free factor system A(τ ) associated to a train-track τ is the free factor system consisting of the vertex stabilizers in the associated tree S τ . Definition 2.16 (Index of a train-track ). The geometric index of a train-track τ is defined as k X (αi + 3ri − 3), igeom (τ ) := i=1 13 where the sum is taken over a finite set {X1 , . . . , Xk } of representatives of the FN -orbits of equivalence classes in V (S τ ), αi denotes the number of Stab(Xi )-orbits of gates at the vertices in Xi , and ri denotes the rank of Stab(Xi ). The index of τ is defined to be the pair i(τ ) := (h(A(τ )), igeom (τ )). Indices of train-tracks will be ordered lexicographically. Remark 2.17. If τ is admissible, then every equivalence class X of vertices in τ has a nonnegative contribution to the geometric index of τ . The contribution of a class X to the geometric index of τ is zero if and only if Stab(X) is trivial, and there are exactly three gates at X; this is precisely when X is exceptional. Lemma 2.18. Let T ∈ cv N be a tree with trivial arc stabilizers, and let τ be an admissible train-track that carries T . Then igeom (τ ) ≤ igeom (T ). Proof. Let f : S τ → T be the unique carrying map. Since τ is admissible, vertices in S τ are mapped to branch points in T . As f is a carrying map, distinct equivalence classes of nonexceptional vertices in S τ are mapped to distinct branch points in T . If X is an equivalence class in S τ mapping to a branch point v ∈ T then Stab(X) = Stab(v). Furthermore, one checks that two gates based at X in distinct Stab(X)-orbits are mapped under f to directions at v in distinct Stab(v)-orbits. Since exceptional vertices do not contribute to the geometric index, it follows that igeom (τ ) ≤ igeom (T ). Notice that the inequality from Lemma 2.18 might be strict if some branch direction in the tree T is not “visible” in the track. In the following definition, instead of directly counting branch points and branch directions in T , we will count the maximal number of such directions that are visible from a train-track. Definition 2.19 (Carrying index of a tree T ∈ cv N ). Let T ∈ cv N be a tree with trivial arc stabilizers. We define the carrying index of T , denoted by i(T ), as the maximal index of an admissible train-track τ that carries T . An ideal carrier for T is an admissible train-track τ that carries T such that i(T ) = i(τ ). Remark 2.20. In view of Lemma 2.10, if τ is an ideal carrier of a tree T , then A(τ ) is a maximal free factor system that is elliptic in T . Lemma 2.21. The index of a tree T ∈ cv N with trivial arc stabilizers can only take boundedly many values (with a bound only depending on N ). The index of an arational tree is comprised between (0, 0) and (0, 2N − 2). The index of a free arational tree is comprised between (0, 0) and (0, 2N − 3). Proof. The first assertion is a consequence of Proposition 2.15, together with the fact that there is a bound (only depending on N ) on the height of a free factor system of FN . The other assertions follow from Proposition 2.15 because no nontrivial free factor is elliptic in an arational tree, so the height h(A(τ )) for a train-track τ that carries an arational tree is 0. 2.2.3 Index of a boundary point and stratifications We now define the index of an equivalence class ξ of Z-averse trees. We recall that by definition a train-track τ carries ξ if and only if τ carries the mixing representatives of ξ. 14 Definition 2.22 (Index of a boundary point). The index i(ξ) of an equivalence class ξ ∈ XN /≈ is defined as the maximal index of an admissible train-track that carries ξ (equivalently i(ξ) is the carrying index of the mixing representatives of ξ). Given an admissible train-track τ , we define the cell P (τ ) as the subspace of XN /≈ made of all classes ξ that are carried by τ and such that i(ξ) = i(τ ). For all i, we define the stratum Xi ⊆ XN /≈ as the set of all points ξ ∈ XN /≈ such that i(ξ) = i. The Gromov boundary ∂∞ F ZN can be written as the union of all strata Xi , where i varies over the finite set of all possible indices for mixing Z-averse trees. If a tree T ∈ cv N is mixing and Z-averse, and if no proper free factor is elliptic in T , then Lemma 1.5 says that T is arational. Therefore, the boundary ∂∞ F FN coincides with the subspace of XN /≈ which is the union of all strata Xi with i comprised between (0, 0) and (0, 2N − 2). ′ ′ Finally, the boundary ∂∞ IN can be written as the union X0′ ∪ · · · ∪ X2N −3 , where Xi is the subspace of X(0,i) made of equivalence classes of free actions. In view of the topological facts recalled in the introduction, we are left showing that each cell P (τ ) is closed in its stratum Xi(τ ) , and that dim(P (τ )) ≤ 0. This will be the contents of Sections 3 and 4, respectively. We give a complete overview of the proof of our main theorem in Section 5. 3 Closedness of P (τ ) in its stratum In general, the property of a tree being carried by a train-track is not a closed condition. However, cells determined by train-tracks are closed in their own strata. This is the goal of the present section. As each boundary we study is metrizable, throughout the paper we will use sequential arguments to work with the topology where this is appropriate. Proposition 3.1. Let τ be an admissible train-track. Then all points in ∂P (τ ) = P (τ ) \ P (τ ) ⊆ XN /≈ have index strictly greater than i(τ ). In particular P (τ ) is closed in Xi(τ ) . Our proof of Proposition 3.1 is based on Lemma 3.2 and Proposition 3.4 below. Lemma 3.2. Let τ be an admissible train-track, and let (Tn )n∈N be a sequence of mixing Z-averse trees carried by τ . Assume that the trees Tn converge to a Z-averse tree T , and denote by ξ the ≈-class of T . Then either T is mixing and A(τ ) is a maximal free factor system that is elliptic in T , or else i(ξ) > i(τ ). Proof. The free factor system A(τ ) is elliptic in all trees Tn , and therefore it is also elliptic in T . If A(τ ) is not a maximal free factor system elliptic in T , then as T collapses to any mixing representative T ∈ ξ the free factor system A(τ ) is not maximally elliptic in T . Remark 2.20 then implies that i(ξ) > i(τ ). If T is not mixing (but possibly A(τ ) is maximally elliptic in T ), then Corollary 1.9 implies that again A(τ ) is not maximally elliptic in any mixing representative of ξ. Hence i(ξ) > i(τ ) in this case, also. To complete the proof of Proposition 3.1, we are thus left understanding the case where the limiting tree T is mixing, and A(τ ) is a maximal elliptic free factor system in T : this will be done in Proposition 3.4 below. The idea is that the carrying maps fn : S τ → Tn will always converge to an FN -equivariant map f : S τ → T ; in general 15 the limiting map f can fail to be a carrying map (it may even collapse some edges to points), and in this case we will prove in Proposition 3.4 that there is a jump in index. We start by proving the existence of the limiting map f . Lemma 3.3. Let τ be an admissible train-track, and let (Tn )n∈N be a sequence of trees in cv N with trivial arc stabilizers, converging to a tree T ∈ cv N . Assume that all trees Tn are carried by τ , and for all n ∈ N, let fn : S τ → Tn be the carrying map. Then the maps fn converge (in the equivariant Gromov–Hausdorff topology) to a map f : Sτ → T . Proof. Let v be a vertex in S τ . Since τ is admissible, there exist three inequivalent edges e1 , e2 , e3 that form a legal tripod at v, and two elements g, h ∈ FN that both act hyperbolically in S τ , whose axes are legal, and such that the axis of g (resp. h) crosses the turn (e1 , e3 ) (resp. (e2 , e3 )). Then the axes of g and h in S τ intersect in a compact non-degenerate segment with initial point v, and up to replacing g and h by their inverses, we can assume that g and h both translate along this segment in the direction going out of v. Since all maps fn are carrying maps, the elements g and h are hyperbolic in all trees Tn , and their axes in Tn intersect in a compact nondegenerate segment, on which they translate in the same direction. In the limiting tree T the intersection ATg ∩ ATh of the axes (or fixed sets) of g and h is still a compact segment, and if it is non-degenerate the elements g and h are hyperbolic in T and still translate in the same direction along the intersection. We then define f (v) to be the initial point of ATg ∩ ATh . We repeat this process over each orbit of vertices to obtain an FN -equivariant map from the vertices of S τ to T , and extend the map linearly over edges. Distances between intersections of axes (as well as their initial points) are determined by the Gromov–Hausdorff topology [23], so it follows that for any two vertices v and v ′ , the distance dTn (fn (v), fn (v ′ )) converges to dT (f (v), f (v ′ )) as n goes to infinity. This implies that the sequence of maps (fn ) converges to f . Proposition 3.4. Let τ be an admissible train-track, and let (Tn )n∈N be a sequence of mixing Z-averse trees carried by τ . Assume that (Tn ) converges to a mixing Z-averse tree T , and that A(τ ) is a maximal free factor system elliptic in T . For all n ∈ N, let fn : S τ → Tn be the carrying map, and let f : S τ → T be the limit of the maps fn . Let S ′ be the tree obtained from S τ by collapsing all edges whose f -image is reduced to a point, let f ′ : S ′ → T be the induced map, and let τ ′ := τf ′ be the train-track on S ′ induced by f ′ . Then τ ′ is admissible. Either igeom (τ ′ ) > igeom (τ ), or else S ′ = S τ and τ ′ is obtained from τ by a finite (possibly trivial) sequence of specializations (hence τ carries T ). Before proving Proposition 3.4, we first complete the proof of Proposition 3.1 from the above facts. Proof of Proposition 3.1. Let ξ ∈ ∂P (τ ). If ξ is carried by τ , then i(ξ) ≥ i(τ ), and this inequality is strict because otherwise τ would be an ideal carrier of ξ, contradicting ξ ∈ ∂P (τ ). We now assume that ξ is not carried by τ . Let (ξn )n∈N ∈ P (τ )N be a sequence converging to ξ, and for all n ∈ N, let Tn be a mixing representative of the equivalence class ξn . Since cv N is projectively compact, up to a subsequence we can assume that (Tn )n∈N converges to a tree T . Since the boundary map ∂π : XN → ∂∞ F ZN is closed, the tree T is Z-averse, and in the ≈-class ξ. Using Lemma 3.2, the proof reduces to the case where T is mixing, and A(τ ) is a maximal free factor system elliptic in T . Since 16 ξ is not carried by τ , Proposition 3.4 then shows that T is carried by a train-track τ ′ satisfying igeom (τ ′ ) > igeom (τ ). This implies in turn that i(ξ) > i(τ ). The rest of the section is devoted to the proof of Proposition 3.4. Proof of Proposition 3.4. 1. The track τ ′ is admissible. Before proving that τ ′ is admissible, we first observe that all hyperbolic elements in S τ are still hyperbolic in S ′ . Indeed, in view of Proposition 1.6 and of our assumption that A(τ ) is a maximal elliptic free factor system in T , if g ∈ FN \ {e} is elliptic in T but is not contained in a free factor from A(τ ), then the conjugacy class of g is given by (some power of) a boundary curve. Hence g is not contained in any proper free factor of FN relative to A(τ ). Therefore the axis of g in S τ crosses all orbits of edges, and so cannot be collapsed to a point by the collapse map π : Sτ → S′. We now prove that τ ′ is admissible. Let v ∈ V (S ′ ), and let X ⊆ S τ be the πpreimage of v. We first observe that X is a bounded subtree of S τ : indeed, otherwise, we would find two oriented edges e, e′ in X in the same FN -orbit (say e′ = ge) and pointing in the same direction; this would imply that g is hyperbolic in S τ but not in S ′ , a contradiction. Let Y ⊆ X be a maximal legal subtree of X. Using the fact that τ is admissible, we can find three pairwise inequivalent edges e1 , e2 , e3 lying outside of X based at extremal vertices v1 , v2 , v3 of Y (these vertices are not necessarily distinct), such that the subtree Y ∪ e1 ∪ e2 ∪ e3 is legal in τ . In particular, no edge ei is collapsed to a point by π. Since τ is admissible, Lemma 2.9 gives three elements g1 , g2 , g3 , which act hyperbolically in S τ , whose axes are legal, and such that the axis of gi in S τ crosses the segment ei ∪ [vi , vi+1 ] ∪ ei+1 (mod 3). For all n ∈ N, the map fn preserves alignment when restricted to each of these axes, so in the limit f also preserves alignment when restricted to these axes. This implies that g1 , g2 and g3 are legal in S ′ . In addition, their axes form a legal tripod at v, so τ ′ is admissible. 2. Controlling the index of τ ′ . We now prove that igeom (τ ′ ) > igeom (τ ) unless τ carries T . Given a vertex v ∈ V (S ′ ), we will first establish that the contribution of the equivalence class [v] to the index of τ ′ is no less than the sum of the contributions of its π-preimages in V (S τ ) to the index of S τ . Let x := f ′ (v). Let X be the set of vertices in S τ that are mapped to x under f . As equivalent vertices in τ are mapped to the same point in T under f , the set X is a union of equivalence classes of vertices in τ . As Stab(x) = Stab(X), if two vertices in X are in the same FN -orbit, then they are in the same Stab(x)-orbit. Hence we may pick a finite set E1 , . . . , Ek of representatives of the Stab(x)-orbits of equivalence classes of vertices in X. Suppose that the images of these equivalence classes correspond to l orbits of points in Tn (where l can be chosen to be independent of n by passing to an appropriate subsequence). After reordering (and possibly passing to a further subsequence) we may assume E1 , . . . , El are mapped to distinct Stab(x)-orbits of points in Tn for all n ∈ N, and El+1 , . . . , Ek are exceptional classes in τ (notice that some of the classes Ei with i ∈ {1, . . . , l} might be exceptional as well). Suppose that each equivalence class Ei has αi gates in τ and has a stabilizer of rank ri . As exceptional classes do not contribute to the geometric index, the amount E1 , . . . , Ek contribute to the geometric index of τ is l X i=1 αi + 3 l X ri − 3l. i=1 17 (2) Let E = [v] be the equivalence class corresponding to the image of X in τ ′ . Then E contributes α′ + 3r ′ − 3 to the index of τ ′ , where α′ isPthe number of orbits P of gates at E and r ′ is the rank of Stab(x). If we define α = li=1 αi and r = li=1 ri , then the difference between the index contribution of E in τ ′ and the index contribution of E1 , . . . , Ek in τ is α′ − α + 3(r ′ − r) + 3(l − 1). (3) Our goal is to control the number of Stab(x)-orbits of gates lost when passing from τ to τ ′ . For all n ∈ N, we let Yn be the subtree of Tn spanned by the points in fn (X). Since there are finitely many Stab(x)-orbits of equivalence classes of vertices in X, the tree Yn is obtained from the Stab(x)-minimal invariant subtree of Tn by attaching finitely many orbits of finite trees (if Stab(x) = {e}, then Yn is a finite subtree of Tn ). Recall that we assumed that A(τ ) is a maximal elliptic free factor system in T . Using Proposition 1.6, this implies that Stab(x) is either cyclic or contained in A(τ ) (it may be trivial). In the second case A(τ ) is elliptic in Tn . Hence the quotient Gn = Yn /Stab(x) is a finite graph of rank 0 or 1. There are l marked points in Gn corresponding to the images of E1 , . . . , El . Claims: 1. If e is an oriented edge in S τ which is collapsed under π, and such that f ′ (π(e)) = x, then the gate corresponding to e in τ is mapped under fn to a direction in Yn at a point in fn (X). 2. If e and e′ are oriented edges in S τ that determine inequivalent directions d, d′ in τ , based at vertices in Stab(x).{E1 , . . . , El }, and if π(e) and π(e′ ) are nondegenerate and equivalent in τ ′ , then for all sufficiently large n ∈ N, one of the directions d, d′ is mapped under fn to a direction in Yn at a point in fn (X). Proof of claims: For the first claim, as e is collapsed its endpoints lie in X, so that fn (e) is an arc between two points of fn (X) in Yn . For the second claim, if π(e) and π(e′ ) are equivalent, then f (e) ∩ f (e′ ) is nondegenerate. Then for all sufficiently large n ∈ N, the intersection of fn (e) with fn (e′ ) contains a nondegenerate segment. As e and e′ are not equivalent in τ , they are based at distinct equivalence classes of vertices in Stab(x).{E1 , . . . , El }. Let us call these [v1 ] and [v2 ]. We have fn (v1 ) 6= fn (v2 ), and the arc connecting fn (v1 ) with fn (v2 ) is contained in the tree Yn , and is covered by the union of the two arcs corresponding to fn (e) (starting at fn (v1 )) and fn (e′ ) (starting at fn (v2 )). One can check that the initial direction of either fn (e) or fn (e′ ) must then be contained in Yn . Since T has trivial arc stabilizers, no two oriented edges in the same orbit are equivalent in τ ′ , and therefore there are only finitely many orbits of pairs of equivalent directions in τ ′ . Therefore, we can choose n ∈ N large enough so that the conclusion of the second claim holds for all pairs of inequivalent directions in S τ based at vertices in Stab(x).{E1 , . . . , El }, whose π-images are (nondegenerate and) equivalent in S ′ . Denote by Gnout (resp. Gnin ) the set of gates based at vertices in Stab(x).{E1 , . . . , El } which are mapped outside of Yn (resp. inside Yn ) by fn . Claim 1 implies that there is a map Ψ from the set Enout of edges in Gnout , to the set of gates at E in τ ′ . Claim 2 then implies that any two edges in Enout in distinct gates have distinct Ψ-images, so |Gnout /Stab(x)| ≤ α′ . Furthermore, our definition of E1 , . . . , El implies that the natural map (induced by fn ) from Gnin /Stab(x) to the set Dir(Gn ) of directions based at the 18 marked points in the quotient graph Gn , is injective, so |Gnin /Stab(x)| ≤ |Dir(Gn )|. By summing the above two inequalities, it follows that α − α′ is bounded above by the number of directions based at the marked points in the quotient graph Gn . We will now distinguish three cases. Notice that up to passing to a subsequence, we can assume that one of them occurs. Case 1: The stabilizer Stab(x) is either trivial, or fixes a point xn in all trees Tn , and for all n ∈ N, there is a vertex vn ∈ V (S τ ) such that fn (vn ) = xn (this happens in particular if Stab(x) is contained in A(τ )). In this case, we have r = r ′ , and the graph Gn has rank 0. The l marked points of Gn include the leaves of Gn : indeed, every leaf of Gn is either the projection to Gn of a point in fn (X), or else it is the projection to Gn of the unique point y ∈ Tn with stabilizer equal to Stab(x). In the latter case, we again have y ∈ fn (X) by assumption. We will apply the following fact to the graph Gn . Fact: If G is a finite connected graph of rank r with l marked points containing all leaves of G, then there are at most 2(l + r − 1) directions at these marked points. Proof of the fact: An Euler characteristic argument shows that in any finite connected graph G with v vertices, there are exactly 2(v + r − 1) directions at the vertices. Viewing the vertex set as a set of marked points, removing any non-leaf vertex from this set loses at least two directions, from which the fact follows. This fact applied to the quotient graph Gn shows that α′ − α ≥ −2(l − 1). (4) From (3) we see that the new equivalence class contributes at least l − 1 more to the geometric index than the sum of the contributions of the previous equivalence classes to the index of τ . This shows that the index increases as soon as l ≥ 2, so we are left with the case where l = 1. In this remaining situation, the graph Gn is a single point, so all but possibly one (say E1 ) of the equivalence classes E1 , . . . , Ek are exceptional. By Claim 1 no edges corresponding to directions at X are collapsed under π. Furthermore, by Claim 2 distinct equivalence classes of gates based at vertices in the orbit of E1 are mapped to distinct gates under π. It follows that either there are more gates at the equivalence class X when passing from τ to τ ′ (so the index increases), or the gates corresponding to directions at E1 are mapped bijectively and each exceptional class in E2 , . . . , Ek corresponds to a specialization of τ (otherwise we would see extra gates). Repeating this argument across all equivalence classes in τ ′ , we find that either the geometric index of τ ′ is greater than that of τ , or τ ′ is obtained from τ by applying a finite number of specializations. In this latter case, this implies that T is carried by τ . Case 2: The group Stab(x) is not elliptic in Tn (in particular Stab(x) is cyclic). In this case, we have r ′ = 1 and r = 0. The graph Gn is then a circle, with finitely many finite trees attached, whose leaves are the projections of points in fn (X). In particular Gn has rank r ′ − r = 1, and all its leaves are marked. By applying the above fact, we thus get that α′ − α ≥ −2(l + r ′ − r − 1). (5) 19 Since r ′ − r = 1, we get from (3) that the new equivalence class contributes at least l more to the geometric index than the sum of the contributions of the previous equivalence classes to the index of τ , so i(τ ′ ) > i(τ ). Case 3: The stabilizer Stab(x) is cyclic, fixes a point xn in all trees Tn , but no vertex in S τ is mapped to xn under fn . In this case, we have r = 0 and r ′ = 1. The graph Gn has rank 0. The image of xn in the quotient graph Gn might not be marked, however the set of marked points in Gn includes all other leaves. We will use the following variation on the above fact (which is easily proved by first including the missing leaf to the set of marked points). Fact: Suppose G is a finite connected graph of rank r with a set of l marked points containing all leaves except possibly one. Then there are at most 2(l + r − 1) + 1 directions at these marked points. This fact, applied to the graph Gn , shows that α′ − α ≥ −2(l − 1) − 1. (6) Since r ′ − r = 1, we get from (3) that the new equivalence class contributes at least l + 1 more to the geometric index than the sum of the contributions of the previous equivalence classes to the index of τ , and again we are done. 4 The cells P (τ ) have dimension at most 0. The goal of this section is to prove the following fact. Proposition 4.1. Let τ be an admissible train-track. Then P (τ ) has dimension at most 0. The strategy of our proof of Proposition 4.1 is the following. Given any point ξ ∈ P (τ ), our goal is to construct arbitrarily small open neighborhoods of ξ with empty boundary in P (τ ). This will be done using folding sequences of train-tracks. In Section 2, we defined the notion of a specialization, which gives a new train-track τ ′ from a traintrack τ . In Section 4.1, we will introduce other operations called folding moves. These will enable us to define a new train-track τ ′ from a train-track τ by folding at an illegal turn. We will then make the following definition. Definition 4.2 (Folding sequence of train-tracks). A folding sequence of traintracks is an infinite sequence (τi )i∈N of admissible train-tracks such that for all i ∈ N, the train-track τi+1 is obtained from τi by applying a folding move followed by a finite (possibly trivial) sequence of specializations. Given ξ ∈ ∂∞ F ZN , we say that the folding sequence of train-tracks (τi )i∈N is directed by ξ if ξ ∈ P (τi ) for all i ∈ N. We will first prove in Section 4.1 that folding sequences of train-tracks exist. Lemma 4.3. Let τ be an admissible train-track, and let ξ ∈ P (τ ). Then there exists a folding sequence of train-tracks (τi )i∈N directed by ξ, such that τ0 is obtained from τ by a finite (possibly trivial) sequence of specializations. 20 We will then prove in Section 4.2 that all sets P (τi ) in a folding sequence of traintracks are open in P (τ0 ), by showing the following two facts. Lemma 4.4. Let τ be an admissible train-track, and let τ ′ be a specialization of τ . Then τ ′ is admissible, and P (τ ′ ) is an open subset of P (τ ). Lemma 4.5. Let τ be an admissible train-track, and let τ ′ be a train-track obtained from τ by folding an illegal turn. Then τ ′ is admissible, and P (τ ′ ) is an open subset of P (τ ). In other words, the sets P (τi ) are open neighborhoods of ξ in P (τ ), and they are closed in P (τ ) (because their boundaries are made of trees with higher index in view of Proposition 3.1). So to complete the proof of Proposition 4.1, we are left showing that P (τi ) can be made arbitrary small. This is proved in Section 4.3 in the form of the following proposition. Lemma 4.6. Let τ be an admissible train-track, let ξ ∈ P (τ ), and let (τi )i∈N be a folding sequence of train-tracks directed by ξ. Then the diameter of P (τi ) converges to 0. We now sum up the proof of Proposition 4.1 from the above four lemmas. Proof of Proposition 4.1. Assume that P (τ ) 6= ∅, and let ξ ∈ P (τ ). Let ε > 0. Let (τi )i∈N be a folding sequence of train-tracks directed by ξ provided by Lemma 4.3, where τ0 is obtained from τ by a finite (possibly trivial) sequence of specializations. Lemma 4.6 shows that we can find k ∈ N such that P (τk ) contains ξ and has diameter at most ε. An iterative application of Lemmas 4.4 and 4.5 then ensure that P (τk ) is an open neighborhood of ξ in P (τ ). Furthermore, the boundary of P (τk ) in P (τ ) is empty (it is made of trees of higher index by Proposition 3.1). As each point in P (τ ) has arbitrarily small open neighborhoods with empty boundary, dim(P (τ )) = 0. 4.1 4.1.1 Existence of folding sequences of train-tracks directed by a boundary point More on specializations The notion of specialization was given in Definition 2.5. Lemma 4.7. Let τ be an admissible train-track, and let τ ′ be a specialization of τ . Then τ ′ is admissible, and i(τ ′ ) = i(τ ). Proof. Admissibility is clear, as the underlying tree S τ and the collection of legal turns at each vertex of S τ are unchanged after a specialization. To see that i(τ ′ ) = i(τ ), notice first that the exceptional vertices in S τ contribute 0 to the geometric index of τ . Stabilizers do not increase by definition of a specialization (otherwise two inequivalent vertices in τ that are not in the orbit of v0 would become equivalent in τ ′ ), and no new gate is created. So igeom (τ ′ ) = igeom (τ ), and since stabilizers of equivalence classes of vertices are the same in τ and in τ ′ , we have i(τ ′ ) = i(τ ). 4.1.2 Folding moves We now introduce three types of folding moves and discuss some of their properties. 21 τ τ′ v1 v2 singular fold e1 e2 v Figure 2: A singular fold. The two black vertices v1 and v2 are equivalent in τ , and the colors give the gates at the equivalence class of vertices they define. Definition 4.8 (Singular fold, see Figure 2). Let τ be a train-track. Let e1 = [v, v1 ] and e2 = [v, v2 ] be two edges in S τ that are based at a common vertex v, determine equivalent directions at v, and such that v1 ∼τ v2 . A train-track τ ′ is obtained from τ by a singular fold at {e1 , e2 } if ′ • there is an FN -equivariant map g : S τ → S τ that consists in equivariantly identifying e1 with e2 , ′ • for all vertices v, v ′ ∈ V (S τ ), we have g(v ′ ) ∼τ g(v) if and only if v ′ ∼τ v, • for all directions d, d′ in S τ based at equivalent vertices of S τ , we have g(d′ ) ∼τ g(d) if and only if d′ ∼τ d. ′ Remark 4.9. Note that if d1 (resp. d2 ) is the direction in S τ at v1 (resp. v2 ) pointing towards v, one can perform a singular fold at {e1 , e2 } if d1 and d2 (as well as v1 and v2 ) are equivalent: indeed, the first condition in the definition implies that g(d1 ) = g(d2 ), and the last condition then implies that d1 ∼τ d2 . Definition 4.10. Given an admissible train-track τ , we denote by P(τ ) the subspace of ∂cv N made of trees T with dense orbits such that τ is an ideal carrier of T . Lemma 4.11. Let τ be an admissible train-track, and let e1 = [v, v1 ] and e2 = [v, v2 ] be two edges that form an illegal turn in τ , such that v1 ∼τ v2 , and such that the directions at v1 and v2 pointing towards v are τ -equivalent. Let τ ′ be the train-track obtained from τ by applying a singular fold at {e1 , e2 }. Then τ ′ is admissible, and P(τ ′ ) = P(τ ). ′ Proof. Let g : S τ → S τ be the folding map given in Definition 4.8. The numbers and the stabilizers of equivalence classes of vertices and gates are unchanged under g, so that ′ i(τ ′ ) = i(τ ). To check admissibility of τ ′ , let v ′ be a vertex in S τ . Then there exists 22 τ τ′ v1 v2 e1 e2 partial fold v′ v Figure 3: A partial fold. v ∈ V (S τ ) such that v ′ = g(v), and the g-image of any tripod of legal axes at v is a tripod of legal axes at v ′ (because g sends legal turns to legal turns). We finally show that P(τ ) = P(τ ′ ). Let T ∈ P(τ ), with carrying map f : S τ → T . Since the extremities of e1 and e2 are equivalent, these two edges are mapped to the same segment in T . It follows that the carrying map f factors through the fold g to ′ attain a map f ′ : S τ → T , and one can check that the train-track induced by f ′ is obtained from τ ′ by a finite (possibly trivial) sequence of specializations (using the same sequence of specializations as when passing from τ to τf ). So T is carried by τ ′ , and equality of the indices of τ and τ ′ shows that τ ′ is also an ideal carrier of T . It follows that P(τ ) ⊆ P(τ ′ ). Conversely, if τ ′ is an ideal carrier of T with carrying map f ′ then the composition f = f ′ ◦ g is such that τf is obtained from τ by a finite (possibly trivial) sequence of specializations, and it follows that P(τ ′ ) ⊆ P(τ ). Definition 4.12 (Partial fold, see Figure 3). Let τ be a train-track, and let {e1 , e2 } be an illegal turn at a vertex v ∈ S τ . A train-track τ ′ is obtained from τ by a partial fold at {e1 , e2 } if ′ • there is a map g : S τ → S τ that consists in equivariantly identifying a proper initial segment [v, v1′ ] of e1 with a proper initial segment [v, v2′ ] of e2 , so that the ′ ′ vertex v ′ = g(v1′ ) = g(v2′ ) is trivalent in S τ (all vertices of S τ that are not in the FN -orbit of v ′ have a unique g-preimage in S τ ), ′ • for all v, w ∈ V (S τ ), we have g(v) ∼τV g(w) if and only if v ∼τV w, ′ • for all directions d, d′ based at vertices of S τ , we have g(d′ ) ∼τ g(d) if and only if d′ ∼τ d, • the vertex v ′ is not equivalent to any other vertex in τ ′ , and all directions at v ′ in ′ S τ are pairwise inequivalent. Remark 4.13. The last condition in the definition implies that the new vertex v ′ is exceptional in τ ′ . 23 Lemma 4.14. Let τ be an admissible train-track, and let τ ′ be a train-track obtained from τ by a partial fold. Then τ ′ is admissible, and i(τ ′ ) = i(τ ). Proof. The condition from the definition of admissibility is easy to check at any vertex ′ in S τ not in the orbit of v ′ (with the notations from Definition 4.12). Let d0 , d1 , d2 be the three directions at v ′ , containing the g-images of v = v0 , v1 , v2 , respectively. Let i ∈ {0, 1, 2} (considered modulo 3). To construct a legal element whose axis crosses the turn {di , di+1 }, we argue as in the proof of Lemma 2.9: one first finds two elements h, h′ that are legal in both τ and τ ′ such that ′ • the axes Ah , Ah′ in S τ go through g(vi ) and g(vi+1 ) respectively, • the axes Ah and Ah′ do not go through v ′ , • the subtree Y spanned by Ah and Ah′ (which contains the turn {di , di+1 }) is legal. The element hh′ is then a legal element that crosses the turn {di , di+1 }, as required. To see that i(τ ′ ) = i(τ ), we first note that A(τ ′ ) = A(τ ) because the stabilizer of any equivalence class corresponding to a new vertex is trivial, and the stabilizers of the other equivalence classes of vertices are unchanged when passing from τ to τ ′ . In addition, under the folding process the number of nonexceptional equivalence classes of vertices, along with the ranks of their stabilizers and the number of associated gates, remains the same, and the new exceptional trivalent vertex contributes 0 to the index. Hence igeom (τ ′ ) = igeom (τ ), and therefore i(τ ′ ) = i(τ ) also. Lemma 4.15. Let τ be an admissible train-track, and let T ∈ P(τ ) with carrying map f : S τ → T . Assume that there exist two edges e1 , e2 in S τ that form an illegal turn, such that |f (e1 ) ∩ f (e2 )| is smaller than both |f (e1 )| and |f (e2 )|. Let τ ′ be the train-track obtained from τ by applying a partial fold at {e1 , e2 }. Then T ∈ P(τ ′ ). Proof. Recall that S τ is equipped with the metric induced by the map f : S τ → T , so that any edge e of S τ has length |f (e)|. Let S ′ be the simplicial tree obtained from S τ by equivariantly identifying a proper initial segment [v, v1′ ] of e1 of length |f (e1 ) ∩ f (e2 )| with a proper initial segment [v, v2′ ] of e2 of the same length. Let g : S τ → S ′ be the folding map. We first claim that the vertex v ′ := g(v1′ ) = g(v2′ ) is trivalent in S ′ . Indeed, otherwise, the vertex v ′ would have infinite stabilizer, so A(τ ) would not be a maximal ′ free factor system elliptic in T , a contradiction. We thus have S ′ = S τ . The map f ′ factors through a map f ′ : S τ → T . Since i(τ ′ ) = i(τ ), it is enough to prove that the train-track τf ′ is obtained from τ ′ by a finite sequence of specializations. By definition, the train-track τf is obtained from τ by a finite sequence of specializations. Let (τf )′ be the partial fold of τf at {e1 , e2 }, and notice that (τf )′ is obtained from τ ′ by the same sequence of specializations as when passing from τ to τf . If the f ′ -image of the new trivalent vertex v ′ is not equal to the f -image of any other vertex in S τ , then τf ′ = (τf )′ and we are done. Otherwise, we will show that τf ′ is a specialization of (τf )′ , from which the lemma will follow. Indeed, if f ′ (v ′ ) is equal to the f -image of another vertex v0 ∈ S τ , we first observe that we can always find such a v0 which is not in the orbit of v ′ . This is because if v ′ is only identified with vertices in its own orbit, then the equivalence class of v ′ in τf ′ has nontrivial stabilizer in τf ′ , and contributes positively to the geometric index of τf ′ . Then i(τf ′ ) > i(τ ), contradicting 24 τ τ′ vd v2 v2′ g(vd ) g(v1 ) = g(v2′ ) full fold v1 v Figure 4: A full fold. The new direction at g(v1 ) = g(v2′ ) has been identified with the g-image of the direction d0 at v1 with initial edge [v1 , vd ] (in general, the direction d0 may also be based at a vertex v1′ 6= v1 as long as v1 and v1′ are τ -equivalent). the fact that τ is an ideal carrier. So we can assume that v0 and v ′ are not in the same orbit. Next, we observe that all germs of directions at v ′ are identified by f ′ with germs of directions at vertices that are τ -equivalent to v0 , as otherwise we would be creating a new gate when passing from τ to τf ′ , again increasing the index. So τf ′ is a specialization of (τf )′ . Definition 4.16 (Full fold, see Figure 4). Let τ be a train-track, and let {e1 , e2 } be an illegal turn at a vertex v ∈ S τ . Denote by v1 , v2 the other extremities of e1 , e2 . Let d0 be a direction in τ based at a vertex τ -equivalent to v1 . A train-track τ ′ is obtained from τ by a full fold of e1 into e2 with special gate [d0 ] if ′ • there is an FN -equivariant map g : S τ → S τ that consists in equivariantly identifying [v, v1 ] with a proper initial segment [v, v2′ ] ( [v, v2 ], ′ • for all vertices v, v ′ ∈ V (S τ ), we have g(v ′ ) ∼τ g(v) if and only if v ′ ∼τ v, ′ • for all directions d, d′ based at vertices of S τ , we have g(d′ ) ∼τ g(d) if and only if d′ ∼τ d, ′ • if d is the direction in S τ based at g(v1 ) = g(v2′ ) and pointing towards g(v2 ), then d ∼ g(d0 ). The number of equivalence classes of vertices remains unchanged under a full fold, ′ and the vertex stabilizers in S τ are the same as the vertex stabilizers in S τ . The fold creates no new gates, so the index remains unchanged. If τ is admissible then τ ′ is also admissible. Hence: Lemma 4.17. Let τ be an admissible train-track, and let τ ′ be a train-track obtained from τ by a full fold. Then τ ′ is admissible and i(τ ′ ) = i(τ ). 25 Lemma 4.18. Let τ be an admissible train-track, and let T ∈ P(τ ), with carrying map f : S τ → T . Let e1 = [v, v1 ] and e2 = [v, v2 ] be two edges in S τ that form an illegal turn. Assume that f (e1 ) ( f (e2 ). Also assume that there is a direction d0 (whose initial edge we denote by [v1′ , vd ]) at a vertex v1′ ∼τ v1 such that dT (f (vd ), f (v2 )) < dT (f (vd ), f (v1′ )) + dT (f (v1′ ), f (v2 )). (7) Let τ ′ be the train-track obtained from τ by fully folding e1 into e2 , with special gate [d0 ]. Then T ∈ P(τ ′ ). ′ Proof. Since f (e1 ) ( f (e2 ), the map f factors through the fold g : S τ → S τ to reach ′ an FN -equivariant map f ′ : S τ → T , and Equation (7) ensures that f ′ identifies germs of [g(v1 ), g(v2 )] and of g(d0 ). So τf ′ is obtained from τ ′ by the same finite sequence of specializations as when passing from τ to τf . We know in addition that i(τ ′ ) = i(τ ) (Lemma 4.17). This implies that T ∈ P(τ ′ ). Corollary 4.19. Let τ be an admissible train-track, and let T ∈ P(τ ), with carrying map f : S τ → T . Let e1 = [v, v1 ] and e2 = [v, v2 ] be two edges in S τ that form an illegal turn. Assume that f (e1 ) ( f (e2 ). Also assume that T is not carried by any specialization of τ . Then there exists a train-track τ ′ obtained from τ by fully folding e1 into e2 , such that T ∈ P(τ ′ ). Proof. Let S ′ be the underlying simplicial tree of any full fold of τ . Since f (e1 ) ( f (e2 ), ′ the map f factors through an FN -equivariant map f ′ : S τ → T . Equality in indices shows the existence of a direction d0 in τ for which Equation (7) from Lemma 4.18 holds, as otherwise the fold would create a new gate, and T would be carried by a train-track with higher index. The direction d0 is based at a vertex v1′ satisfying f (v1′ ) = f (v1 ). Since T is not carried by any specialization of τ , this implies that v1′ is τ -equivalent to v1 . Therefore, Lemma 4.18 implies that T ∈ P(τ ′ ), where τ ′ is the full fold of τ with special gate [d0 ]. 4.1.3 Folding sequences: proof of Lemma 4.3 Given two train-tracks τ and τ ′ , we say that τ ′ is obtained from τ by applying a folding move if τ ′ is obtained from τ by applying either a singular fold, a partial fold or a full fold. We then define a folding sequence of train-tracks as in Definition 4.2: recall that this is a sequence (τi )i∈N of train-tracks such that τi+1 is obtained from τi by applying a folding move, followed by a finite (possibly trivial) sequence of specializations. The goal of the present section is to prove Lemma 4.3. We will actually prove a slightly stronger version of it, given in Lemma 4.22 below. The main fact we will use in the proof is the following. Lemma 4.20. Let τ be an admissible train-track, and let T ∈ P(τ ). Then there exists a train-track τ ′ 6= τ obtained either by a specialization, or by applying a folding move, such that T ∈ P(τ ′ ). Proof. Assume that T is not carried by any train-track τ ′ 6= τ obtained from τ by performing a specialization. Let f : S τ → T be the carrying map, and let e1 = [v, v1 ] and e2 = [v, v2 ] be two edges that form an illegal turn in τ : this exists because T is not simplicial by definition of P(τ ). If f (v1 ) = f (v2 ), then v1 ∼τ v2 , as otherwise T would 26 be carried by a specialization of τ . In this case f identifies germs of the directions at v1 and v2 pointing towards v, so Lemma 4.11 implies that T ∈ P(τ ′ ), where τ ′ is the singular fold of τ . If f (v1 ) 6= f (v2 ), and if |f (e1 ) ∩ f (e2 )| is smaller than both |f (e1 )| and |f (e2 )|, then Lemma 4.15 implies that T is carried by the partial fold of τ at {e1 , e2 }. Finally, if f (e1 ) ( f (e2 ) (or vice versa), then Corollary 4.19 implies that T is carried by a full fold of τ . We also make the following observation. Lemma 4.21. Let τ be an admissible train-track, and let τ ′ be a train-track obtained from τ by applying either a specialization or a folding move. Then P(τ ′ ) ⊆ P(τ ) (and hence P (τ ′ ) ⊆ P (τ )). Proof. If τ ′ is obtained from τ by applying a specialization, then the conclusion follows from the definition of being carried, together with the fact that i(τ ′ ) = i(τ ) (Lemma 4.7). If τ ′ is obtained from τ by applying a folding move, then the conclusion follows from the fact that i(τ ′ ) = i(τ ) (Lemmas 4.11, 4.14 and 4.17), together with the observation that ′ ′ if g : S τ → S τ is the fold map, and f : S τ → T is a carrying map, then f ◦ g : S τ → T is also a carrying map. We are now in position to prove the following stronger version of Lemma 4.3. Lemma 4.22. Let ξ ∈ ∂∞ F ZN . Let τ0 , . . . , τk be a finite sequence of admissible traintracks such that ξ ∈ P (τk ), and for each i ∈ {0, . . . , k − 1}, the train-track τi+1 is obtained from τi by applying a folding move followed by a finite (possibly trivial) sequence of specializations. Then there exists a folding sequence (τi′ )i∈N of train-tracks directed by ξ, such that τi = τi′ for all i ∈ {0, . . . , k − 1}, and τk′ is obtained from τk by a finite (possibly trivial) sequence of specializations. Proof. Lemma 4.21 shows that ξ ∈ P (τi ) for all i ∈ {1, . . . , k}. The conclusion is then obtained by iteratively applying Lemma 4.20 to some mixing representative of the class ξ (starting with the train-track τk ), and noticing that we can only perform finitely many specializations in a row. 4.2 4.2.1 Openness of the set of points carried by a specialization or a fold From trees to equivalence classes of trees We first reduce the proofs of Lemmas 4.4 and 4.5 to their analogous versions for trees in cv N . Lemma 4.23. Let τ and τ ′ be admissible train-tracks. If P(τ ′ ) is an open subset of P(τ ) in ∂cv N , then P (τ ′ ) is an open subset of P (τ ) in XN /≈. Proof. The conclusion is obvious if P(τ ′ ) is empty (in this case P (τ ′ ) is also empty), so we assume otherwise. Since P(τ ′ ) ⊆ P(τ ), we have i(τ ′ ) = i(τ ). Let ξ ∈ P (τ ′ ), and let (ξn )n∈N ∈ P (τ )N be a sequence converging to ξ. We wish to prove that ξn ∈ P (τ ′ ) for all sufficiently large n ∈ N (we may use sequential arguments as XN /≈ is a separable metric space). For all n ∈ N, let Tn be a mixing representative of ξn . Since cv N is projectively compact, up to passing to a subsequence, we can assume that (Tn )n∈N converges to a 27 tree T ∈ cv N . Closedness of the boundary map ∂π : XN → ∂∞ F ZN shows that T ∈ XN , and T is a representative of the class ξ. Since A(τ ) is elliptic in each tree Tn , it is also elliptic in T . If T is not mixing, then Corollary 1.9 implies that A(τ ) is not the largest free factor system elliptic in the mixing representatives of ξ, contradicting that i(ξ) = i(τ ). So T is mixing, and the fact that ξ ∈ P (τ ′ ) thus implies that T ∈ P(τ ′ ). Openness of P(τ ′ ) in P(τ ) then shows that Tn ∈ P(τ ′ ) for all sufficiently large n ∈ N. Since Tn is a mixing representative of ξn , this precisely means that ξn ∈ P (τ ′ ) for all sufficiently large n ∈ N, as desired. 4.2.2 Specializations In this section, we will prove Lemma 4.4. More precisely, we will prove its analogous version for trees in cv N , from which Lemma 4.4 follows thanks to Lemma 4.23. Lemma 4.24. Let τ be an admissible train-track, and let τ ′ be a specialization of τ . Then P(τ ′ ) is an open subset of P(τ ). Proof. By Lemma 4.21, we have P(τ ′ ) ⊆ P(τ ). Let T ∈ P(τ ′ ), and let (Tn )n∈N ∈ P(τ )N be a sequence of trees that converges to T . We aim to show that Tn is carried by τ ′ for all sufficiently large n ∈ N, which will imply that Tn ∈ P(τ ′ ) by equality of the indices. Let [v0 ] be the class of vertices in S τ at which the specialization occurs, and let v1 ∈ V (S τ ) be a vertex identified with v0 in τ ′ . Let e10 , e20 , e30 be three edges adjacent to vertices in the class [v0 ], determining distinct gates, and let e11 , e21 , e31 be edges based at vertices τ -equivalent to v1 that are identified with e10 , e20 , e30 in τ ′ . We aim to show that for all sufficiently large n ∈ N, the vertices v0 and v1 are identified by the carrying map fn : S τ → Tn , and so are initial segments of ei0 and ei1 for all i ∈ {1, 2, 3}. For all i ∈ {1, 2, 3}, the intersection f (ei0 ) ∩ f (ei1 ) (where f : S τ → T is the carrying map) is nondegenerate. Since the carrying map varies continuously with the carried tree (Lemma 2.11), for all sufficiently large n ∈ N, the image fn (ei1 ) has nondegenerate intersection with fn (ei0 ). Since the three directions determined by e10 , e20 , e30 are inequivalent, their images fn (e10 ), fn (e20 ), fn (e30 ) form a tripod at fn (v0 ). If fn (v1 ) 6= fn (v0 ), then at least two of the images fn (e11 ), fn (e21 ), fn (e31 ) would then have a nondegenerate intersection (containing [fn (v0 ), fn (v1 )]), which is a contradiction because these three edges are inequivalent. So fn (v1 ) = fn (v0 ), and since fn (ei1 ) has nondegenerate intersection with fn (ei0 ), it follows that Tn is carried by τ ′ . 4.2.3 Folds Lemma 4.5 follows from the following proposition together with Lemma 4.23. Proposition 4.25. Let τ be an admissible train-track. Let τ ′ be a train-track obtained from τ by folding an illegal turn. Then P(τ ′ ) is open in P(τ ). Proof. By Lemma 4.21, we have P(τ ′ ) ⊆ P(τ ). If τ ′ is obtained from τ by applying a singular fold, then Lemma 4.11 ensures that P(τ ′ ) = P(τ ), so the conclusion holds. Denoting by f : S τ → T the carrying map, we can thus assume that f (v1 ) 6= f (v2 ) (using the notations of the previous sections). Let p := f (e1 ) ∩ f (e2 ). The endpoints of p, f (e1 ), and f (e2 ) are branch points in T (because τ is admissible), so the lengths of these segments are determined by a finite set of translation lengths in T . 28 If τ ′ is obtained from τ by a partial fold, then |p| is strictly less than both |f (e1 )| and |f (e2 )|. Using the fact that the carrying map f varies continuously with the carried tree (Lemma 2.11), we see that this property remains true for all trees in a neighborhood of T , and Lemma 4.15 implies that all trees in this neighborhood are carried by τ ′ . Assume now that τ ′ is obtained from τ by a full fold, with e1 fully folded into e2 . Let vd be the endpoint of an edge corresponding to a direction d based at a vertex v1′ equivalent to v1 , in the special gate. Then |f (e1 )| < |f (e2 )|, and dT (f (vd ), f (v2 )) < dT (f (vd ), f (v1′ )) + dT (f (v1′ ), f (v2 )). These are open conditions in cv N . Therefore, Lemma 4.19 gives the existence of an open neighborhood U of T in P(τ ) such that all trees in U are carried by the same full fold. 4.3 Control on the diameter: getting finer and finer decompositions The goal of the present section is to prove Lemma 4.6. The key lemma is the following. Lemma 4.26. Let ξ ∈ ∂∞ F ZN , and let (τi )i∈N be a folding sequence of train-tracks directed by ξ. Then (S τi ) converges to ξ for the topology on F ZN ∪ ∂∞ F ZN . Proof. Let T be a mixing representative of ξ. We can find a sequence (Sn )n∈N of simplicial metric FN -trees with trivial edge stabilizers such that • for all n ∈ N, the simplicial tree S τn is obtained from Sn by forgetting the metric, • for all n ∈ N, the unique carrying map fn : Sn → T is isometric on edges. In addition, for all i < j, there are natural morphisms fij : Si → Sj , such that fik = fjk ◦ fij for all i < j < k. The sequence (Sn )n∈N converges to a tree S∞ : indeed, for all g ∈ FN , the sequence (||g||Sn )n∈N is non-increasing, so it converges. In addition, the tree S∞ is not reduced to a point, because the legal structure on S0 induced by the morphisms f0j will stabilize as j goes to +∞, and a legal element (which exists because τ0 is admissible, and every legal turn for the train-track τ0 is also legal for the train-track structure on S0 induced by the morphisms f0j ) cannot become elliptic in the limit. By taking a limit of the maps f0,j , we get an FN -equivariant map f0∞ : S0 → S∞ , which is isometric when restricted to every edge of S0 . We will show that S∞ is Z-averse and ≈-equivalent to T , which implies the convergence of S τi to ξ (for the topology on F ZN ∪ ∂∞ F ZN ) by the continuity statement for the boundary map ∂π given in Theorem 1.3. We first claim that the tree S∞ is not simplicial. Indeed, assume towards a contra′ be the simplicial tree obtained from S diction that it is, and let S∞ ∞ by adding the f0∞ -images of all vertices of S0 to subdivide the edges of S∞ . Subdivide the edges of S0 ′ . Since T has trivial arc stabilizers, so that every edge of S0 is mapped to an edge of S∞ ′ never identifies two edges in the same orbit, so there the folding process from S0 to S∞ is a lower bound on the difference between the volume of Si+1 /FN and the volume of Si /FN . Therefore, the folding process has to stop, contradicting the fact that the folding sequence is infinite. This shows that S∞ is not simplicial. We now assume towards a contradiction that S∞ is not equivalent to T . There exists a 1-Lipschitz FN -equivariant map f from S∞ to the metric completion of T , obtained by taking a limit of the maps fnm as m goes to infinity, see the construction from [15, Theorem 4.3]. Therefore, if S∞ has dense orbits, then there is a 1-Lipschitz FN -equivariant alignment-preserving map from S∞ to T by [15, Proposition 5.7], which implies that S∞ is Z-averse and equivalent to T by [14, Theorem 4.1]. Therefore, there 29 remains to prove that S∞ has dense orbits. Assume towards a contradiction that it does not. Since S∞ is a limit of free and simplicial FN -trees that all admit 1-Lipschitz maps onto it, it has trivial arc stabilizers. Since S∞ is not simplicial, there is a free factor A acting with dense orbits on its minimal subtree SA in S∞ . By [25, Lemma 3.10], the translates in T of f (SA ) (which cannot be reduced to a point) form a transverse family in T : this is a contradiction because the stabilizer of a subtree in a transverse family in a mixing Z-averse tree cannot be a free factor (in fact, it cannot be elliptic in any Z-splitting of FN by [14, Proposition 4.23]). Proof of Lemma 4.6. Let ξ ′ ∈ P (τi ), and let T ′ be a mixing representative of ξ ′ . By Lemma 4.22, there exists a folding sequence of train-tracks (τj′ )j∈N directed by ξ ′ , such that τj′ = τj for all j < i, and τi′ is obtained from τi by a finite (possibly trivial) sequence ′ of specializations. All trees S τi then lie on the image in F ZN of an optimal liberal folding ′ path, which is a quasi-geodesic by [20], and (S τi )i∈N converges to ξ ′ by Lemma 4.26. This shows that any quasi-geodesic ray in F ZN from S τ0 to a point in P (τi ) passes within bounded distance of S τi . As S τi converges to ξ ∈ ∂∞ F ZN (Lemma 4.26), it follows from the definition of a visual distance that the diameter of P (τi ) converges to 0. 5 End of the proof of the main theorem We now sum up the arguments from the previous sections to complete the proof of our main theorem. Proof of the main theorem. We start with the case of F ZN . The Gromov boundary ∂∞ F ZN is a separable metric space (equipped with a visual metric). It can be written as the union of all strata Xi (made of boundary points of index i), where i ∈ N2 can only take finitely many values. Each stratum Xi is the union of the sets P (τ ), where τ varies over the collection of all train-tracks of index i, and the collection of all traintracks τ for which P (τ ) is nonempty is countable by Lemma 2.8. By Proposition 3.1, each cell P (τ ) is closed in its stratum Xi , and by Proposition 4.1 it has dimension at most 0. So each Xi is a countable union of closed 0-dimensional subsets, so Xi is 0dimensional by the countable union theorem [9, Lemma 1.5.2]. Since ∂∞ F ZN is a union of finitely many subsets of dimension 0, the union theorem [9, Proposition 1.5.3] implies that ∂∞ F ZN has finite topological dimension (bounded by the number of strata, minus 1). In particular, the topological dimension of ∂∞ F ZN is equal to its cohomological dimension, see the discussion in [9, pp. 94-95]. This gives the desired bound because the cohomological dimension of ∂∞ F ZN is bounded by 3N − 5 by [14, Corollary 7.3] (this is proved by using the existence of a cell-like map from a subset of ∂CVN – whose topological dimension is equal to 3N − 5 by [11], and applying [26]). It was shown in Section 2.2.3 that the Gromov boundary ∂∞ F FN is equal to the union of the strata Xi , with i comprised between (0, 0) and (0, 2N − 2). Therefore, the above argument directly shows that the topological dimension of ∂∞ F FN is at most 2N − 2 (without appealing to cohomological dimension). Finally, the Gromov boundary ∂∞ IN is equal to a union of strata Xi′ , with i ∈ Z+ comprised between 0 and 2N − 3, where each stratum Xi′ is a subspace of the stratum X(0,i) from above. Given a train-track τ of index (0, i), we let P ′ (τ ) := P (τ ) ∩ Xi′ . Being a subspace of P (τ ), the set P ′ (τ ) has dimension at most 0. In addition P ′ (τ ) is closed in its stratum Xi′ , because its boundary in ∂∞ IN is made of points of higher index by 30 v v Step 1 v′ v v Step 2 Step 3 Figure 5: The following three steps may repeat infinitely often along a folding sequence, showing that the homeomorphism type of the underlying simplicial tree might never stabilize. Proposition 3.1. The same argument as above thus shows that the topological dimension of ∂∞ IN is at most 2N − 3. A Why equivalence classes of vertices and specializations? In this appendix, we would like to illustrate the reason why we needed to introduce an equivalence relation on the vertex set of S τ in the definition of a train-track (Definition 2.1), and allow for specializations in the definition of carrying (Definition 2.6). Why equivalence classes of vertices in the definition of a train-track? In the world of train-tracks on surfaces, when one defines a train-track splitting sequence towards an arational foliation, the homeomorphism type of the complement of the traintrack eventually stabilizes, after which each singularity in the limiting foliation is determined by a complementary region of a track, and the visible prongs determine the index of the singular point. On the contrary, in a folding sequence of train-tracks towards an arational tree T as defined in the present paper, the number of vertices in the preimage of a branch point in T , as well as the number of directions at these vertices, may never stabilize, as illustrated by the following situation (see Figure 5). At some point on the folding sequence, one may have to perform a singular fold as depicted on the right-hand side of Figure 5 (Step 3). If we had not declared the two identified vertices equivalent before computing the index, such an operation would have resulted in a drop in index. If such a situation could only occur finitely many times along the folding sequence, we could have defined a ‘stable’ index along the folding sequence, but this might not be true in general. Indeed, later on along the folding sequence, a new trivalent vertex v can be created due to a partial fold (Step 1 on Figure 5), and this exceptional vertex v may then be declared equivalent to another vertex v ′ in the track by applying a specialization: this results in the possibility of performing a new singular fold later on, identifying v and v ′ . One could then hope that eventually, all singular folds in the folding sequence involve an exceptional vertex, which would not cause trouble as far as index is concerned; but even this may fail to be true in general. Indeed, it might 31 happen that later on in the process, a full fold involving v creates a fourth direction at v (this is the red direction in Step 2 of Figure 5), which is not equivalent to any direction at v (but is instead equivalent to a direction at another vertex v ′ in the same class as v). Introducing an equivalence class on the set of vertices in the definition of a train-track ensures that the index of our train-tracks remains constant along a folding path, and prevents overcounting the number of branch points in the limiting tree when counting branch points in the train-track. Why introducing specializations in the definition of carrying? We would finally like to give a word of motivation for the necessity to introduce specializations in the definition of carrying, instead of just saying that a train-track τ carries a tree T if τ = τf for some FN -equivariant map f : S τ → T . As already observed, in a folding sequence of train-tracks directed by T , partial folds create new trivalent vertices, and it can happen that the newly created vertex v gets mapped to the same point in T as another vertex v ′ ∈ S τ . We could have tried in this case to perform the partial fold and the specialization at the same time, in other words declare that there are several distinct partial folds of τ , including one (denoted by τ1 ) where v is not declared equivalent with any other vertex, and a second (denoted by τ2 ) where v is declared equivalent to v ′ (and there would be infinitely many other partial folds where v is identified with any possible vertex from S τ ). With this approach, the difficulty comes when proving openness of the set P(τ1 ) within P(τ ). Indeed, for a certain point T ∈ P(τ ), the carrying map may ′ ′ not identify the new trivalent vertex v in S τ with any other vertex in S τ (hence T is carried by τ1 ), while for nearby trees Tn in P(τ ) (for the Gromov–Hausdorff topology), the carrying map identifies v with a vertex vn going further and further away in S τ as n goes to infinity (hence no tree Tn is carried by τ1 ). So without the extra flexibility in the definition of carrying, this would lead to P(τ1 ) not being open in P(τ ). This justifies our definition of carrying. We have a single way of performing a partial fold of a turn, and the specialization is performed later on along the folding sequence if needed. References [1] M. Bestvina and K. Bromberg, On the asymptotic dimension of the curve complex, arXiv:1508.04832v1 (2015). [2] M. Bestvina, K. Bromberg, and K. Fujiwara, Constructing group actions on quasitrees and applications to mapping class groups, Publ. math. IHÉS 122 (2015), no. 1, 1–64. [3] M. Bestvina and M. Feighn, Outer limits, preprint (1994). , Hyperbolicity of the complex of free factors, Adv. Maths. 256 (2014), 104– [4] 155. [5] M. Bestvina and P. Reynolds, The boundary of the complex of free factors, Duke Math. J. 164 (2015), no. 11, 2213–2251. [6] M.M. Cohen and M. Lustig, Very small group actions on R-trees and Dehn twist automorphisms, Topology 34 (1995), no. 3, 575–617. [7] M. Culler and J.W. Morgan, Group actions on R-trees, Proc. London Math. Soc. 55 (1987), no. 3, 571–604. 32 [8] S. Dowdall and S.J. Taylor, The co-surface graph and the geometry of hyperbolic free group extensions, arXiv:1601.00101v1 (2016). [9] R. Engelking, Dimension theory, North Holland Publishing Company, 1978. [10] D. Gabai, Almost filling laminations and the connectivity of ending lamination space, Geom. Topol. 13 (2009), no. 2, 1017–1041. [11] D. Gaboriau and G. Levitt, The rank of actions on R-trees, Ann. Scient. Ec. Norm. Sup. 28 (1995), no. 5, 549–570. [12] U. Hamenstädt, The boundary of the free factor graph and the free splitting graph, arXiv:1211.1630v5 (2014). [13] C. Horbez, The boundary of the outer space of a free product, to appear in Israel J. Math. [14] , Hyperbolic graphs for free products, and the Gromov boundary of the graph of cyclic splittings, to appear in J. Topol. [15] , Spectral rigidity for primitive elements of FN , J. Group Theory 19 (2016), no. 1, 55–123. [16] I. Kapovich and M. Lustig, Geometric intersection number and analogues of the curve complex for free groups, Geom. Topol. 13 (2009), no. 3, 1805–1833. [17] E. Klarreich, The Boundary at Infinity of the Curve Complex and the Relative Teichmüller Space, preprint (1999). [18] C.J. Leininger and S. Schleimer, Connectivity of the space of ending laminations, Duke Math. J. 150 (2009), no. 3, 533–575. [19] G. Levitt, Graphs of actions on R-trees, Comment. Math. Helv. 69 (1994), no. 1, 28–38. [20] B. Mann, Hyperbolicity of the cyclic splitting graph, Geom. Dedic. 173 (2014), no. 1, 271–280. [21] , Some hyperbolic Out(FN )-graphs and nonunique ergodicity of very small FN -trees, Ph.D. thesis, University of Utah, 2014. [22] H.A. Masur and Y.N. Minsky, Geometry of the complex of curves I : Hyperbolicity, Invent. math. 138 (1999), no. 1, 103–149. [23] F. Paulin, The Gromov topology on R-trees, Topology Appl. 32 (1989), no. 3, 197– 221. [24] P. Reynolds, On indecomposable trees in the boundary of outer space, Geom. Dedic. 153 (2010), no. 1, 59–71. [25] , Reducing systems for very small trees, arXiv:1211.3378v1 (2012). [26] L.R. Rubin and P.J. Schapiro, Cell-like maps onto non-compact spaces of finite cohomological dimension, Topol. Appl. 27 (1987), 221–244. 33 Mladen Bestvina, Department of Mathematics, University of Utah, 155 South 1400 East, JWB 233, Salt Lake City, Utah 84112-0090, United States e-mail:[email protected] Camille Horbez, Laboratoire de Mathématiques d’Orsay, Univ. Paris-Sud, CNRS, Université Paris-Saclay, 91405 Orsay, France. e-mail:[email protected] Richard D. Wade, Department of Mathematics, The University of British Columbia, 1984 Mathematics Road, Vancouver, B.C., Canada V6T 1Z2 email:[email protected] 34
4math.GR
Accepted in the IEEE Transactions on Cognitive and Developmental Systems (TCDS), 2017 Seamless Integration and Coordination of Cognitive Skills in Humanoid Robots: A Deep Learning Approach Jungsik Hwang and Jun Tani Abstract This study investigates how adequate coordination among the different cognitive processes of a humanoid robot can be developed through end-to-end learning of direct perception of visuomotor stream. We propose a deep dynamic neural network model built on a dynamic vision network, a motor generation network, and a higher-level network. The proposed model was designed to process and to integrate direct perception of dynamic visuomotor patterns in a hierarchical model characterized by different spatial and temporal constraints imposed on each level. We conducted synthetic robotic experiments in which a robot learned to read human's intention through observing the gestures and then to generate the corresponding goal-directed actions. Results verify that the proposed model is able to learn the tutored skills and to generalize them to novel situations. The model showed synergic coordination of perception, action and decision making, and it integrated and coordinated a set of cognitive skills including visual perception, intention reading, attention switching, working memory, action preparation and execution in a seamless manner. Analysis reveals that coherent internal representations emerged at each level of the hierarchy. Higher-level representation reflecting actional intention developed by means of continuous integration of the lower-level visuo-proprioceptive stream. Index Terms—Neurorobotics, deep learning, sensorimotor learning This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) [No. 2014R1A2A2A01005491]. Jungsik Hwang is with the school of Electrical Engineering in Korea Advanced Institute of Science and Technology, Daejeon, South Korea (e-mail: [email protected]). Jun Tani is a corresponding author and he is a professor at the school of Electrical Engineering in Korea Advanced Institute of Science and Technology, Daejeon, South Korea and an adjunct professor at Okinawa Institute of Science and Technology, Okinawa, Japan. (e-mail: [email protected]). I. INTRODUCTION It would be desirable if a robot could learn to generate complex goal-directed behaviors from its own sensorimotor experience, as human beings do. One challenge in reaching this goal is that such complex behaviors require an agent to coordinate multiple cognitive processes. For instance, imagine a robot conducting an object manipulation task with a human partner, such as reaching for and grasping an object. The human partner indicates a target objects located on the workspace through a gesture. Then, the robot observes the workspace, finds the indicated object by combining the perceived gesture information as well as the perceived object’s properties, switches its attention to the object, prepares an action and executes it. Even this simple task is complex, involving diverse cognitive skills such as visual perception, intention reading, working memory, decision-making, action preparation and execution. It is essential to link these skills with synergy by developing spatio-temporal coordination among them. Furthermore, these skills ideally arise from the robot’s experience (of reaching for and grasping objects, for example), rather than from hand-engineered features reflecting a human engineer’s understanding of what any given task may require [1-9]. In this study, we employed a deep learning approach to build a robotic system which can directly and autonomously learn from its own visuomotor experience. Deep learning is a fast-growing field in machine learning and artificial intelligence with remarkable advances, such as text recognition, speech recognition, image recognition and many others (See [10-12] for recent reviews of deep learning). One of the most important characteristics of deep learning is that deep networks can autonomously extract task-related features in high-dimensional data, such as images and action sequences, without the necessity of hand-engineered feature extraction methods [1, 10, 12]. So, deep learning provides an important tool for robotics, because through deep learning a robot can learn directly from its huge-dimensional sensorimotor data acquired through dynamic interaction with the environment [1]. A few recent studies [13-16] have demonstrated the plausibility of deep learning in the field of robotics. However, several challenges in adapting deep learning schemes to robotics remain. For example, a robotic system must process spatio-temporally dynamic patterns, whereas deep learning schemes have generally been designed to process static patterns. In addition, robotic tasks typically incorporate multiple sensory modalities, such as vision, proprioception and audition, while most deep learning applications attend to single modalities, e.g. visual facial recognition. Also, Sigaud and Droniou [1] have pointed out that it is still unclear how higher-level representations can be built by stacking several networks. In this paper, we propose a dynamic deep neural network model called the Visuo-Motor Deep Dynamic Neural Network (VMDNN) which can learn to generate goal-directed behaviors by coordinating multiple cognitive processes including visual perception, intention reading1, attention switching, memorization and retrieval with working memory, action preparation and generation. The model was designed to process and to integrate dynamic visuomotor patterns directly perceived through the robot’s interaction with its environment. The VMDNN is composed of three different types of subnetwork: the Multiple Spatio-Temporal scales Neural Network (MSTNN) [17], the Multiple Timescales Recurrent Neural Network (MTRNN) [18] and the PFC (Prefrontal Cortex) subnetworks. The MSTNN has demonstrated an ability to recognize dynamic visual scenes [17], and the MTRNN to learn compositional actions [18]. In the VMDNN model, these two subnetworks are tightly coupled via the PFC subnetwork, enabling the system to process dynamic visuomotor patterns simultaneously. In other words, the problems of perceiving visual patterns and generating motor patterns were regarded as inseparable problem and therefore the visual perception and the motor generation were performed simultaneously in a single VMDNN model in the current study. This approach is based on the previous studies which emphasized the importance of perception-action coupling in robotic manipulation [13] as well as in developmental robotics [40]. Each part of the architecture is imposed with different spatial and temporal constraints to enable the hierarchical computation of visuomotor processing in the lower-level and its abstraction in the higher-level. We conducted a set of synthetic robotics experiments to examine the proposed model and also to gain insight into mechanisms involved in learning goal-directed actions in biological systems. Here, it is worth noting that artificial neural networks are meant to model the essential features of the nervous system, not its detailed implementation [19-21]. In our experiments, a humanoid robot learned goal-directed actions from huge-dimensional visuomotor data acquired from repeated tutoring during which the robot’s actions were guided by the experimenter. We investigated how a set of cognitive skills can be integrated and coordinated in a seamless manner to generate goal-directed sequential behaviors of the robot. Particularly, we focused on identifying the human gestures, reading intention underlying them, and generating corresponding sequential behaviors of the humanoid robot in a reaching-and-grasping task. In our experiment, the robot was trained to recognize human gestures and to grasp the target object indicated by the gestures. This task thus required a set of cognitive skills such as visual perception, intention reading, working memory, action preparation and execution. Recognizing gestures is more challenging than recognizing static images 1 Here, the term of “reading” or “categorizing” is used rather than “recognizing” because recognition may involve reconstruction of patterns but categorization in the current study does not. since both spatial and temporal information in the gesture need to be identified. Moreover, reading intention of others by observing their behavior has been considered as one of the core abilities required for social cognition [5, 22-24]. In addition, reaching and grasping are fundamental skills that have significant influences on the development of perceptual and cognitive abilities [5]. The reaching-and-grasping task has been extensively studied in child development [25, 26] as well as in robotics [19, 20, 27-29]. In a robotic context, they require robust perception and action systems as well as simultaneous coordination of a set of cognitive skills, making hand-designing features demanding and time-consuming [14]. Moreover, the visuomotor task in our experiment was not explicitly segmented into the different sub-tasks such as gesture classification and action generation by the experimenter. Therefore, the task requires the robot to adapt to different task phases autonomously by coordinating a set of cognitive skills in a seamless manner throughout the task. In addition, this task requires the robot to have working memory capability to keep the contextual information such that the robot could compare the categorized human intention with perceived object properties. This implies that simply mapping perception to action cannot perform the task successfully since it lacks contextual dynamics. We expected that the synergic coordination of the above mentioned cognitive skills would arise through end-to-end learning of the tightly coupled structure in which the multiple subnetworks densely interact. In the learning stage, the robot learned a task in the supervised end-to-end manner. In the testing stage, we examined the model’s learning and generalization capabilities. Furthermore, the robot was examined under a visual occlusion experimental paradigm in which the visual input to the model was unexpectedly and completely occluded. This was to verify whether the proposed model was equipped with a sort of memory capability for maintaining task-related information. In addition, we analyzed the neuronal activation in order to clarify the internal dynamics and representations emerging in the model during different phases of operation. The remaining part of the paper is organized as follows. In Section II, we review several previous studies employing deep learning schemes in the robotic context. In Section III, we introduce the proposed model in detail. Section IV and V are devoted to the experimental settings and the results respectively. Several key aspects and the implications of the proposed model are discussed in Section VI. Finally, we conclude our paper and indicate current and future research directions in Section VII. II. RELATED WORKS Due to the remarkable success of deep learning in various fields, recent studies have attempted to employ deep learning in the field of robotics (See [1] for a recent review). For instance, Di Nuovo, et al. [15] employed a deep neural network architecture in order to study number cognition in a humanoid robot. The robot was trained to classify numbers by learning the association between an auditory signal and corresponding finger counting activity. They found that their model was quicker and more accurate when both modalities were associated. Similarly, Droniou, et al. [2] introduced a deep network architecture which could learn from different sensory modalities, including vision, audition and proprioception. During experiments, their model was trained to classify handwritten digits, and they demonstrated that learning across multiple modalities significantly improved classification performance. Yu and Lee [30] employed a deep learning approach on reading human intention. A supervised MTRNN model was employed in their experiments, and they showed that their model could successfully recognize human intention through observing a set of motions. Lenz, et al. [14] proposed a two-stage cascaded detection system to detect robotic grasps in an RGB-D view of a scene and conducted experiments on different robotic platforms. They found that their deep learning method performed significantly better than one with well-designed hand-engineered features. Pinto and Gupta [31] also addressed the problem of detecting robotic grasps, adopting a convolutional neural network (CNN) model to predict grasp location and angle. Although these studies demonstrate the utility of deep learning in a robotic context, they most focused on robotic perception and robots were not directly controlled by deep learning schemes. A few recent studies have attempted to utilize deep learning to control a robot. Wahlström, et al. [16], addressed the pixels-to-torques problem by introducing a reinforcement learning algorithm that enabled their agent to learn control policy from pixel information. Deep auto-encoders and a multi-layer feedforward neural network were employed in their model, and a 1-link robotic pendulum was used as a testing platform. Their model was able to learn closed-loop policies in continuous state-action spaces directly from pixel information. Noda, et al. [32] introduced a deep auto-encoder-based computational framework designed to integrate sensorimotor data. A humanoid robot was used in their object manipulation experiments, and they showed that their model was able to form higher-level multimodal representations by learning sensorimotor information including joint angles, RGB images and audio data. Levine, et al. [13] proposed a deep neural network model which learned a control policy that linked raw image percepts to motor torques of the robot. They showed that the robot was able to conduct various object manipulation tasks by learning perception and control together in an end-to-end manner. Park and Tani [33] investigated how a robot could infer the underlying intention of human gestures and generate corresponding behaviors of a humanoid robot. In their work, an MTRNN model was employed and the robot could successfully achieve the task by extracting the compositional semantic rules latent in the various combinations of human gestures. Several problems confront ongoing deep-learning research in robotics applications, as represented by limitations in existing studies such as relatively simple testing platform [16, 33], separate processing of individual modalities [32], and inability to handle temporal information [13]. In the current study, we aim to address these challenges with a deep dynamic neural network model for a humanoid robot which can process and integrate spatio-temporal dynamic visuomotor patterns in an end-to-end manner. III. THE DEEP NEURAL NETWORK MODEL In this section, we describe the Visuo-Motor Deep Dynamic Neural Network (VMDNN) in detail. The proposed model was designed to process and to integrate direct perception of visuomotor patterns in a hierarchical structure characterized by different spatio-temporal constraints imposed on each part of the hierarchy. It has several distinctive characteristics. First, the model can perform low-level visuomotor processing without hand-engineered feature extraction methods by means of deep learning schemes. Second, the model processes dynamic visuomotor patterns in a hierarchical structure essential to cortical computation [15, 34]. Third, perception and action are tightly intertwined within the system, enabling the model to form multimodal representations across sensory modalities. The VMDNN model consists of three types of subnetworks: (1) MSTNN subnetworks for processing dynamic visual images, (2) MTRNN subnetworks for controlling the robot’s action and attention and (3) a prefrontal cortex (PFC) subnetwork located on top of these two subnetworks which dynamically integrates them (Fig. 1). Fig. 1. The VMDNN model consists of three types of subnetworks: MSTNN subnetworks (VI, VF and VS) for dynamic visual image processing (left), MTRNN subnetworks (MO, MF and MS) for action generation (right) and the PFC subnetwork for integration of perception and action (top) A. MSTNN Subnetwork In our study, we employed Multiple Spatio-Temporal Scales Neural Network (MSTNN) to process dynamic visual images perceived by a robot conducting a visuomotor task. The MSTNN is an extended Convolutional Neural Network (CNN) [35] employing leaky integrator neural units with different time constants [17, 36]. Although conventional CNN models have been shown the ability to process spatial data such as static images, they lack the ability to process spatio-temporally dynamic patterns. To successfully conduct a visuomotor task, the robot needs to extract both spatial and temporal features latent in the sequential observations. Unlike conventional CNN models that utilize spatial constraints only, the MSTNN model has been shown that it can process both spatial and temporal patterns by imposing multiple spatio-temporal scales constraints on local neural activity [17, 36]. Consequently, the MSTNN can extract the task-related visual features latent in the dynamic visual images while the robot was tutored for the task iteratively. The MSTNN subnetwork was composed of three layers imposed with different spatio-temporal constraints: the MSTNN-input (VI) layer containing a current visual scene, the MSTNN-fast (VF) layer with shorter-distance connectivity and smaller time constants, and the MSTNN-slow (VS) layer with longer-distant connectivity and larger time constants. Each MSTNN layer organizes into a specific set of feature maps retaining spatial information of visual input. They are connected successively from VI to VS. B. MTRNN Subnetwork In the current study, we employed Multiple Timescales Recurrent Neural Network (MTRNN) for generating the robot’s behavior and controlling the attention of the robot. The MTRNN is a hierarchical neural network model consisting of a multiple continuous time recurrent neural networks with leaky integrator neurons [18]. MTRNN has been shown superior performance in modeling robot’s sequential action by utilizing its temporal hierarchy. To be more specific, the lower level in the MTRNN has a smaller time constant showing fast dynamics whereas the higher level has a bigger time constant exhibiting slow dynamics. Due to this temporal hierarchy, an MTRNN can learn compositional action sequences as a meaningful functional hierarchy emerges within the system [18, 34, 37]. Consequently, the entire behavior of the robot including reaching and grasping as well as visual attention control can be decomposed into a set of primitives for their flexible recombination adapting to various situations [18]. In our model, the MTRNN subnetwork is composed of three layers characterized by different temporal constraints: the MTRNN-slow (MS) showing slow dynamics with the larger time constant, the MTRNN-fast (MF) showing fast dynamics with smaller and the MTRNN-output (MO) layer with the smallest time constant. Neurons in the MS and MF layers are asymmetrically connected to each other and to themselves. The MO layer is composed of groups of softmax neurons indicating the sparse representation of the model’s output. The MO layer receives inputs from the MF layer and generates behavior outputs as well as attention control signals. C. PFC Subnetwork At the top, the PFC (Prefrontal Cortex) layer tightly couples the MSTNN and MTRNN subnetworks for achieving tight association between the visual perception and the motor generation. The PFC layer is a recurrent neural network consisting of a set of leaky-integrator neurons equipped with recurrent loops in order to process abstract sequential information. The PFC layer receives inputs from the VS layer in the MSTNN subnetwork as well as from the MS layer in the MTRNN subnetwork, meaning that both abstracted visual information (V S) and proprioceptive information (MS) are integrated in the PFC layer. The PFC layer also has a forward connection to the M S layer to control the robot’s behavior and attention. The PFC layer can be characterized by several key features. First, neurons in the PFC layer are assigned the largest time constant. As a result, the PFC subnetwork exhibits the slowest-scale dynamics and this enables the PFC subnetwork to carry more information about a situation [38]. Second, neurons in the PFC layer are equipped with recurrent connections which are essential to handle dynamic sequential data [1, 9, 39]. Third, perception and action are coupled via the PFC layer which integrates two monomodal subnetworks (MSTNN and MTRNN) and builds higher-level multimodal representations from abstracted visuomotor information in each pathway. Lungarella and Metta [40] argued that perception and action are not separated but tightly coupled, with this coupling is gradually getting refined during developmental process. D. Problem Formulation Fig. 1 illustrates the structure of the VMDNN model. The input to the model (𝐼 𝑡 ) is an observation of the world at time step t which can be obtained from the robot’s camera at the beginning to the end of the task. The observation is a pixel-level image represented as a matrix H × W, where H is a height and W is a width of the image. Robot’s behavior outputs as well as attention control signals are generated at the output layer MO at each time step t. Let 𝑦 𝑡 = [𝑦1𝑡 , 𝑦2𝑡 , … , 𝑦𝑛𝑡 ] denotes the output of the model at the time step t where n is the number of neurons at the output layer M O. In forward dynamics computation, the problem is defined as to the behavior output and the attention signal (𝑦 𝑡 ) at time step t given a visual observation 𝐼 𝑡 and the model parameters θ such as kernels, weights, and biases. In the training phase, the problem is defined as to optimize the model’s parameters θ in order to minimize the error E at the output layer MO represented by the Kullback-Leibler divergence between the teaching signal 𝑦̅ 𝑡 and the network’s output 𝑦 𝑡 . The training data was visuomotor sequences obtained from the repeated tutoring prior to the training phase. The detailed description about the forward dynamics and the training phase are described in the following sections. E. Forward Dynamics for Action Generation The internal states of all neural units were initialized with neutral values at the onset of the action generation mode. Then, a pixel image 𝐼 𝑡 in grayscale obtained from the robot’s camera was given to the vision input layer (VI) and neural unit’s internal states and activations were successively computed in every layer from the input layer (VI) to the output layer (MO). The neuron activation at the MO layer was transformed to analog values using the softmax activation to control the robot’s joints and attention. A detailed description of the computational procedure follows. txy At each time step t, the internal state ui txy and the dynamic activation vi of the neural unit located at the (x, y) position in the ith feature map in the MSTNN layers (i ∈ VF ˅ VS) are computed according to the following formulas: 𝑡𝑥𝑦 𝑢𝑖 = (1 − 1 (𝑡−1)𝑥𝑦 1 )𝑢 + [ ∑ (𝑘𝑖𝑗 ∗ 𝑣𝑗𝑡 ) + 𝑏𝑖 ] 𝑥𝑦 𝜏𝑖 𝑖 𝜏𝑖 𝑗∈𝑉𝑗 𝑡𝑥𝑦 v𝑖 2 𝑡𝑥𝑦 = 1.7159 × tanh( 𝑢𝑖 ) 3 (1) (2) τ is the time constant, Vj is the feature maps in the previous layer (if i ∈ VF, then Vj = VI and if i ∈ VS, then Vj = VF), * is the convolution operator, kij is the kernel connecting jth feature map in Vj with the ith feature map in the current layer, and b is the bias. Please note that the hyperbolic tangent recommended in [41] was used as an activation function to enhance convergence. From the PFC layer to the MO layer, the internal state uti and the dynamic activation yit of the ith neuron in the PFC and MTRNN layers (i ∈ PFC ˅ MS ˅ MF ˅ MO) are determined by the following equations: 𝑢𝑖𝑡 = (1 − 1 )𝑢𝑡−1 𝜏𝑖 𝑖 + 1 [∑𝑗∈𝑉𝑆 𝑘𝑖𝑗 ∗ 𝑣𝑗𝑡 + ∑𝑘∈𝑀𝑆 ˅𝑃𝐹𝐶 𝑤𝑖𝑘 𝑦𝑘𝑡−1 + 𝑏𝑖 ] 𝜏𝑖 1 [∑𝑗∈𝑃𝐹𝐶 𝑤𝑖𝑗 𝑦𝑗𝑡 + ∑𝑘∈𝑀𝐹 ˅𝑀𝑆 𝑤𝑖𝑘 𝑦𝑘𝑡−1 + 𝑏𝑖 ] 𝜏𝑖 1 [∑𝑗∈𝑀𝑆 ˅𝑀𝐹 𝑤𝑖𝑗 𝑦𝑗𝑡−1 + 𝑏𝑖 ] 𝜏𝑖 1 [∑𝑗∈𝑀𝐹 𝑤𝑖𝑗 𝑦𝑗𝑡 + 𝑏𝑖 ] 𝜏 { y𝑖𝑡 = 𝑖 2 1.7159 × tanh ( 𝑢𝑖𝑡 ) 3 exp(𝑢𝑖𝑡 ) 𝑡 {∑𝑗∈𝑀𝑂 exp(𝑢𝑗 ) 𝑖𝑓 𝑖 ∈ 𝑃𝐹𝐶 𝑖𝑓 𝑖 ∈ 𝑀𝑆 𝑖𝑓 𝑖 ∈ 𝑀𝐹 (3) 𝑖𝑓 𝑖 ∈ 𝑀𝑂 𝑖𝑓 𝑖 ∈ 𝑃𝐹𝐶˅𝑀𝑆 ˅𝑀𝐹 𝑖𝑓 𝑖 ∈ 𝑀𝑂 (4) wij are the weight from the jth neural unit to the ith neural unit. In sum, the image obtained from the robot’s camera was sent to the input layer (VI) of the model at each time step of the action generation mode. Then, the internal states and activations were successively computed from the input layer (VI) to the output layer (MO). The robot was operated based on the output of the model including the joint position values. After the execution of an action, the image acquired from the robot’s camera was sent to the input layer (VI) of the model again in the next time step. In this sense, an image given to the model can be considered as a visual feedback since it reflects the effect of the robot’s action in the preceding time step. F. Training Phase The model was trained in a supervised end-to-end learning fashion. The training data consisted of raw visuomotor sequences obtained from repeated tutoring during which the robot was manually operated by the experimenter. From the beginning to the end of tutoring, a visual image perceived from the robot’s camera (visual observation) was jointly collected with the encoder values of the robot’s joint positions as well as the level of grasping and the level of foveation at each time step. The model was trained to abstract and associate visual perception with proprioceptive information using these visuomotor sequence patterns. Backpropagation through time (BPTT) [42] was employed in learning values of parameters, such as the kernels, weights and biases of the model. Prior to end-to-end training, learnable parameters in the visual pathway (from VI to PFC) were initialized by means of pre-training. Studies have demonstrated that pre-training is an efficient method for initializing network parameters [10, 13, 43]. The pre-training method in our study is similar to that of [13] in which the visual part of the model was pre-trained prior to the end-to-end learning phase of the experiment. During pre-training in our study, the softmax output layer was connected to the PFC layer and the connections between the MTRNN subnetworks and the PFC layer, as well as the recurrent connections within the PFC layer were removed. In this condition, the system operates as an MSTNN model, and it was trained as a typical classifier using BPTT as described in [36]. Then, the values of the parameters in the visual pathway acquired during pre-training were used as initial values for the parameters in the same pathways during the end-to-end training phases of the experiment. After the pre-training, end-to-end training was conducted from the VI layer to the MO layer. During end-to-end training, the model’s entire learnable parameters (k, w and b) were updated to minimize the error E at the MO layer represented by Kullback-Leibler divergence between the teaching signal y̅it and the network’s output yit . 𝐸 = ∑ ∑ 𝑦̅𝑖𝑡 𝑙𝑜𝑔 𝑡 𝑖∈𝑀𝑂 𝑦̅𝑖𝑡 𝑦𝑖𝑡 (5) A stochastic gradient descent method was applied during end-to-end training and the entire learnable parameters were updated when each training data was presented as follows. 𝜕𝐸 𝑤𝑖𝑗 (𝑛 + 1) = 𝑤𝑖𝑗 (𝑛) − 𝜂 ( + 0.0005𝑤𝑖𝑗 (𝑛)) 𝜕𝑤𝑖𝑗 (6) 𝜕𝐸 𝑘𝑖𝑗 (𝑛 + 1) = 𝑘𝑖𝑗 (𝑛) − 𝜂 ( + 0.0005𝑘𝑖𝑗 (𝑛)) 𝜕𝑘𝒊𝒋 (7) 𝜕𝐸 b𝑖 (𝑛 + 1) = b𝑖 (𝑛) − 𝜂 ( ) 𝜕𝑏𝑖 (8) n is an index of the learning step and η is the learning rate. The weight decay method was used to prevent overfitting [35] with the weight decay rate of 0.0005. IV. EXPERIMENT SETTINGS A. Robotic Platform iCub [44] is a child-like humanoid robot consisting of 53 degrees of freedom (DOFs) distributed in the body. We used a simulation of the iCub [45] in our experiments. The iCub simulator accurately models the actual robot’s physical interaction with the environment, making it an adequate research platform for studying developmental robotics [15, 45]. Simulation of the iCub is shown in (Fig. 2). In our simulation environment, a screen was located in front of the robot to display human gestures, the task table was placed between the screen and the robot and the two objects were placed on the task table. At each time step, the interfacing program captured the image perceived from the robot’s camera, preprocessed the captured image, sent it to the VMDNN model, received the output of the VMDNN model and then operated the robot based on the output of the model. To be more specific, the pixel image obtained from the robot’s camera embedded in its left eye was passed to the vision input layer (VI) of the model at each time step. The obtained image was preprocessed by resizing to 64 (w) × 48 (h), converting to grayscale, and normalizing to -1 to 1. The softmax values of the output layer (MO) were converted into the values of the corresponding joint positions (7 DOFs in the right arm, 2 DOFs in the neck) as well as into grasping and attention control signals. Then, the interfacing program operated the robot based on the VMDNN model’s outputs using the motor controller provided in the iCub software package [45]. Then, the interfacing program captured an image from the robot’s camera and sent it back to the VMDNN model in the next time step. Fig. 2. The experimental settings using an iCub simulator. (a) Four types of human gestures (b) Two objects consisting of a tall and a long object were placed in the task space, and the robot grasped the target object indicated by a human gesture (c) Object locations on a task space. Regarding the output for the robot’s behavior, we used the robot’s right arm consisting of 7 DOFs (shoulder’s pitch, roll, yaw, elbow, wrist’s pronosupination, pitch, and yaw). In addition, the network output the level of extension or flexion of finger joints in order to control grasping similar to [20]. The level varied from 1 (not grasping) to 10 (fully grasping) and it was used to control the 9 DOFs of the right hand. In our experiments, the VMDNN model also controlled visual attention which is essential to generate adequate robot’s behavior [37]. Jeong, et al. [37] demonstrated that MTRNN could seamlessly coordinate visual attention and motor behaviors. In their work, the MTRNN model outputted the category of the object to be attended to, and the external visual guiding system localized the position of the specified object based on the network’s output and the retina image so that the robot’s camera could fixate the object. In contrast, no external module was employed in our study, and the VMDNN model itself controlled robot’s visual attention. More specifically, two attention control mechanisms were employed in our study: attention shift and foveation. First, the robot located the object of attention at the center of the visual scene by orienting its head (2 DOFs – neck’s pitch and yaw). Second, the robot controlled the resolution of the visual scene given to the network by controlling the level of foveation from 1 (minimum foveation) to 10 (maximum foveation). For instance, the level of foveation increased while the robot’s hand was closely approaching to the attended object. Consequently, images containing the target object and the robot’s hand were given to the network with higher resolution so that the model could more clearly perceive the object’s properties including orientation and the location of the hand. B. Network Configuration The VMDNN model was composed of 7 layers: the VI, VF, VS layers in the MSTNN subnetwork, the PFC layer, and the MS, MF, MO layers in the MTRNN subnetwork. The structure of the VMDNN model used in this study was found empirically in our preliminary experiments [46]. Note that the structure of the VMDNN model including the number of layers in each subnetwork can be extended depending on the complexity of the task since the ‘deeper’ structure can enhance learning of complex functions in visuomotor patterns [11]. For instance, more number of layers in the MSTNN subnetwork can be employed to process more complex visual images [17]. Similarly, more complex robot’s behavior can be learned by employing more number of layers in the MTRNN subnetwork as reported in [33]. Each MSTNN layer consisted of a set of feature maps retaining the spatial information of the visual input. The number and size of feature maps varied between layers. The vision input layer (VI) had a single feature map containing the current visual scene (64 (w) × 48 (h)) obtained from the left eye of the robot. The VF layer consisted of 4 feature maps with sized 15 × 11 and the VS layer consisted of 8 feature maps with sized 5 × 3. The size of kernels in the VF and VS layers were set to 8 × 8 and 7 × 7 respectively. The sampling factors denoting the amount of shift of the kernel in a convolution operation were set to 4 and 2 for the VF and VS respectively. The PFC layer was composed of 20 neurons and the kernel size was 5 × 3 with the sampling factor set to 1. The numbers of neurons employed in the MTRNN layers (MS, MF and MO) were 30, 50 and 110 respectively. The 110 neurons in the MO layer were comprised of 11 groups of softmax neurons representing the 11 categories of the model’s output: the joint position values of the robot’s neck (2), the joint position values of the right arm (7), the level of grasping (1) and the level of foveation (1). The softmax output values in each group at the MO layer were inversely transformed to analog values that directly set the joint angles of the robots, the level of grasping and the level of foveation. Regarding the time scale properties, we compared two different types of visual pathway: CNN and MSTNN. In the CNN condition, the time constants of both the VF and the VS layers were set to 1, resulting in no temporal hierarchy. On the other hand, in the MSTNN condition, the time constants of the VF and the VS layers were set to 1 and 15 respectively, resulting in a temporal hierarchy in the visual pathway. We also compared two different temporal scales (fast and slow) in the PFC layer. The time constant was set to 1 in the fast PFC condition whereas it was set to 150 in the slow PFC condition. In sum, there were 4 different network conditions examined in our experiments. Throughout the experiments, the time constants of the MS, MF and MO layers were fixed to 70, 2 and 1 respectively. The proper values for the time constant at each level of the model were found heuristically in our preliminary study [46]. Prior to end-to-end learning, learnable parameters were initialized with the values acquired from the pre-training stage to enhance learning capability. During the pre-training stage, the model was trained to grasp an object without human gestures. Also, the visual pathway was additionally pre-trained to classify the four types of human gestures as described in Section III. During the end-to-end learning, the network was trained for 13,000 epochs with a learning rate of 0.01. C. Task The objective of the task was to grasp the target object indicated by the human gesture displayed on the screen at the beginning of the task. The overall task flow was as follows. At the beginning of the task, the robot was set to the home position, orienting its head toward the screen in front of the robot and stretching both arms sideways. From the home position, the robot observed a human gesture being displayed on the screen (Fig. 2). After observing the gesture, the robot oriented its head to the task table on which two objects consisting of a long and a tall object were placed. While observing the task space, the robot figured out the target object indicated by the human gesture and oriented its head to the target object. Then, the robot reached out its right arm and grasped the target object. For example, when the human gesture indicated the tall object, the robot had to pick out the tall object from among the two available along with information about its orientation. Similarly, when the human gesture indicated the right side, the robot had to figure out the type and orientation of the object on the right side (see the supplementary video). This task, therefore, inherently required the robot to have working memory capability to maintain the human gesture information throughout the task phases and dynamically combine it with the perceived object properties. The visuomotor sequence for each training trial consisted of images perceived from the robot’s camera (visual observation), the values of robot’s joint positions and the values of the grasping and foveation signals and they were collected simultaneously from the beginning to the end of tutoring. Consequently, the images in the visuomotor sequences included the ones that were perceived while observing the human gestures on the screen as well as the ones perceived while completing the behavioral task. Similarly, the values of the robot’s joint positions in the visuomotor sequences included the ones that were recorded while observing the human gestures as well as the ones recorded while acting in the task space after the observation. The robot was trained with 200 trials consisting of varying object configurations and human gestures. Two objects consisting of one tall and one long object were presented in each trial and the location and the orientation of the two objects were controlled so that the way of presenting the two objects did not bias the robot’s behavior toward certain reaching and grasping behaviors and away from others. Regarding human gestures, a target object was specified by one of four different human gestures indicating the location (either left or right) or the type (either tall or long) of the target object (Fig. 2 (a)). A 40-frame video clip of the human gesture was displayed on the screen in front of the robot. We collected several gesture trials from 7 human subjects and pseudo-randomly selected from amongst them so that each type of gesture appeared the same number of times in the training dataset. Throughout the experiments, two different types of box-shape objects were used: a tall object with a size of 2.8cm × 5cm × 10cm and a long object with a size of 2.8cm × 10cm × 5cm. Objects were placed with 5 different orientations (-45°, -22.5°, 0°, 22.5°, 45°) at 10 positions symmetrically distributed on the XY-plane of the task space (Fig. 2 (c)). During the testing stage, we evaluated the model’s performance with respect to the learned trials (TR) as well as with a set of novel situations in order to examine the model’s generalization capability. First, we tested the model with 60 trials in which two objects were randomly located (OBJ) to examine whether the robot was able to generalize reaching and grasping skills to unlearned object positions and orientations. We also examined the model’s generalization capability with respect to human gestures, using 200 training trials with the gestures of a novel subject (SUB). Then, we examined the model’s generalization capability with 60 cases of the most novel situation, in which randomly located objects were indicated by gestures of the novel subject (OBJ × SUB). It should be noted that main focus was on the model’s ability to coordinate cognitive skills such as gesture recognition and working memory rather than solely on gesture recognition, since the latter is more concerned with typical perceptual classification tasks. In addition, we evaluated the model under a visual occlusion experimental paradigm in which the vision input to the network was completely occluded. The main focus of this evaluation was to verify whether the network was equipped with a sort of internal memory, enabling it to show robust behavior even the visual information was unexpectedly and completely occluded. From the training trials (TR) and the testing trials (OBJ × SUB), we selected 80 and 60 trials respectively. During the visual occlusion experiment, vision input to the network was occluded at the onset of observing the task space (t = 51), at the onset of attending to the target object (t = 55), at the onset of observing the target object (t = 61), at the onset of reaching (t = 66), and during reaching (t = 86). Prior to the testing, the learnable parameters were initialized to the ones obtained from the training. V. RESULTS A. Generalization Performances Table 1 shows the success rate of each network condition. Each trial was evaluated as “successful” if the robot grasped and lifted an object and “failure” otherwise. In general, the MSTNN vision with the slow PFC condition showed the better performance than did other conditions. In this condition, the model successfully learned the training trials (TR = 98.5%) and was able to generalize learned skills to different testing conditions. This model was able to generalize reaching and grasping skills when the objects were randomly located (OBJ = 85.0%), when the gestures of the novel subject were displayed (SUB = 96.5%), and when the randomly located objects were specified by the novel subject (OBJ × SUB = 83.3%). It is worth noting that the model demonstrated relatively low success rates when in the fast PFC conditions, especially CNN vision with the fast PFC condition. The task required the robot to maintain human gesture information displayed at the beginning of the trial throughout all task phases. In the end, the model equipped with the temporal hierarchy performed significantly better than did those without it. TABLE 1 THE SUCCESS RATE OF FOUR NETWORK CONDITIONS Network Conditions Type of PFC Vision Scales Layer Testing Conditions TR OBJ SUB OBJ × SUB CNN Fast 47.0% 41.7% 44.0% 41.7% CNN Slow 87.5% 85.0% 87.5% 80.0% MSTNN Fast 92.0% 60.0% 86.0% 56.7% MSTNN Slow 98.5% 85.0% 96.5% 83.3% TABLE 2 THE PERCENTAGE OF TASK FAILURE CAUSED BY CONFUSION Network Conditions Type of PFC Scales Vision Layer Testing Conditions TR OBJ × SUB CNN Fast 59.4% 71.4% CNN Slow 44.0% 41.7% MSTNN Fast 68.8% 65.4% MSTNN Slow 0.0% 20.0% We analyzed failure cases in training trials (TR) and in the most novel trials (OBJ × SUB). Particularly, we focused on task failure caused by apparent confusion between gesture-indicated and other objects. In these cases, the robot simply grasped the incorrect object. Table 2 shows the percentage of the error caused by confusion in the four network conditions. The model showed the least confusion errors in the MSTNN with slow PFC condition. Moreover, the error caused by confusion was more pronounced in fast PFC than in slow PFC conditions. This result implies that the model was able to maintain correct and stable representations by means of slow dynamics in the PFC layer. Fig. 3. The success rate of the four different network conditions in the visual occlusion experiment: (a) testing on learned human gestures and object positions and orientations (TR) and (b) testing on unlearned human gestures and object positions and orientations (SUB × POS). Fig. 3 illustrates the success rate for each network condition with respect to (a) training trials (TR) and (b) testing trials (OBJ × SUB) with different occlusion timings. When vision input to the model was occluded, performance of the four different network conditions differed significantly. As expected, the model’s performance in all conditions generally degraded when vision input was occluded during earlier task phases. Especially, the model showed relatively worse performance in the CNN vision with the fast PFC condition than other conditions. Therefore, it can be inferred that memory capability achieved by the slow dynamics subnetwork at the higher level plays an important role when vision input is occluded. That is, by means of memory, the robot was able to maintain information about human gestures as well as information about the target objects including position, type and orientation throughout the all phases of task execution. This result shows the importance of the internal contextual dynamics of the proposed model and highlights a difference between the proposed model and the previous study [13] which was prone to occlusion due to the lack of capability of keeping memory. B. Development of Internal Representation In order to reveal the model’s self-organized internal representation, we analyzed neural activation during training trials using the t-Distributed Stochastic Neighbor Embedding (t-SNE) dimensionality reduction algorithm [47]. During t-SNE analysis, the parameters for the initial dimensions and the perplexity were set to 10 and 30 respectively. Fig. 4 depicts the internal representation emerging at each layer during the three different task phases. Each point indicates a single training trial and distances between those points represent relative similarity between trials. The color and the shape of each point denote the type of human gesture and the type of the object respectively. The number next to each point indicates the object’s position. Fig. 4. Internal representations emerging during three different task phases at each layer in the MSTNN with the slow PFC. Each point represents a single trial and the distance between points represents the similarity between trials. The shape and the color of each point indicate the type of the target object and the type of human gesture, respectively. The number next to each point signifies the object’s position. In some cases, numbers are omitted due to overlap. Please note that the mode of grasping is different depending on the type of object. We focused on the relationships between patterns, so we did not plot the axes varying between plots. In MSTNN layers (VF and VS), sequential visual images were abstracted in both temporal and spatial dimensions through hierarchical processing. For instance, where the robot begins observation of the task space, five clusters can be observed in the VF layer (b). These clusters correspond to the five possible pair locations employed during training. Objects appearing in the same position appeared in the same cluster regardless of the type of object and type of human gesture. In the VS layer, those representations were further separated, with the type of target object differentiated within the clusters reflecting the relative locations of the two objects (e). Similarly, in the mid-reaching phase, the VF layer (c) and the VS layer (f) encoded both the type and the location of the target object, but the distinction with respect to the object’s type was less clear in the VF layer. Transitions of representations from those reflecting types of human gesture to those reflecting specific target objects organized in the PFC layer. After observing the gesture (g), four clusters reflecting the type of gesture appeared, suggesting that human gestures were successfully recognized. Then, those internal representations started to develop progressively, and smaller clusters indicating specific target objects emerged in the mid-reaching phase regardless of the presented human gesture (i). Our interpretation is that the higher-level of the model read the human’s intention and translated it into robot’s own intention to reach and to grasp the specified object. To be more specific, lower-level visual images containing human gestures were processed hierarchically by MSTNN subnetworks and the abstracted representation underlying one of the four human’s intentions appeared in the higher-level (the PFC layer). Then, the robot simultaneously incorporated the perceived object’s properties including location, type and orientation, and it formed its own intention for reaching and grasping the target object. In the end, this result suggests that the robot’s intention was not explicitly mapped but arose dynamically from perceived information. In the MS layer, four clusters representing each type of gesture appeared at the end of human gesture observation (j) and at the onset of target object observation (k). This implies that higher-level proprioception was calibrated based on the perceived human gestures before the robot exhibited different behaviors depending on the target object. At mid-reach (l), the MS layer encoded both the type and the location of the target object, but differences with respect to the object’s location were less clear than those appearing in the PFC layer. In the MF layer, the internal representations developed similarly, but less clearly than those in the MS layer. For instance, the MF layer encoded both the type and the location of the object during mid-reach (o), but representations were less clear than those of the PFC (i) and MS (l). Fig. 5. The development of internal representations in PFC, MS and MF for exemplar cases. 8 trials consisting of 4 different configurations of the target object indicated by 2 different types of human gesture were examined using the t-SNE algorithm. Line colors indicate the type of human gesture, markers indicate the task phase and an arrow indicates the direction of the time step. At the end of the trajectories, the configuration of each target object is specified. We further analyzed the development of internal representations for exemplar cases in the PFC, M S and MF layers using the t-SNE algorithm (Fig. 5). A total number of 8 representative training trials consisting of 4 different target objects indicated by 2 different human gestures were compared. In the t-SNE analysis, the number of the initial dimensions and the perplexity were set to 10 and 50 respectively. Fig. 5 illustrates that the proposed model dynamically integrated perception and computed motor plans. The PFC layer developed higher-level task-related representations encompassing both visual and motor information whenever available. For instance, the PFC layer identified the type of gesture even before the end of human gesture presentation. While the robot was observing the gestures, the representations at the PFC layer already started to develop differently according to the type of gesture. When the robot started observing the task space, representations developed differently depending on the object’s features, such as location and type. Analysis shows that the MS layer was calibrated based on the perceived human gesture. For example, when the robot started observing the task space, representations in the M S layer began to differentiate themselves depending on the perceived human gesture. The implication here is that higher-level proprioception was calibrated based on perceived visual information. The representations of the MF layer developed similarly to those of the MS layer, showing very similar development of representations for the same target object, but they were more closely related the robot’s current action. In sum, the MS layer mainly encoded higher-level motor actions and mediated between higher-level cognition (PFC) and the lower-level motor actions (MF). Fig. 6. The development of the first three principal components (PCs) at each layer in the two opposite cases: (a) the CNN with the fast PFC condition and (b) the MSTNN with the slow PFC condition. The numbers at the bottom (horizontal lines) indicate the time step from the beginning of the task to the end of the task, and the colors denote component score values. Legends are omitted since as our focus is on similarities in the development of neuronal activation with different occlusion timings. In order to clarify differences in the internal dynamics of the model when vision input was occluded, we compared two different timings in the two diametrically opposed cases: not occluded and occluded at the onset of reaching, in the CNN with the fast PFC condition and in the MSTNN with the slow PFC condition. The development of the first three principal components (PCs) of each layer for the same target object is depicted from the beginning to the end of the task in Fig. 6. In the CNN with fast PFC condition, the robot failed to grasp the target object when visual input was completely occluded at the onset of reaching. However, it was able to grasp the target object when the visual input was not occluded. Analysis clearly reveals that PCs in the PFC, MS and MF layers developed differently in both cases, implying that the model cannot form consistent representations. In the MSTNN with the slow PFC condition, the robot was able to grasp the target object in both cases. Analysis reveals that the development of PCs of the PFC, MS and MF layers in occluded and non-occluded cases were similar. Especially, when vision input was occluded at the onset of reaching, the activation of MS and MF developed similarly with those in the non-occluded case, implying the development of the coherent proprioceptive representations regardless of occlusion conditions. In sum, the PFC layer as well as MTRNN layers developed consistent representations even when visual information was lost at the initiation of a reaching action, resulting in successful task performance. VI. DISCUSSION Throughout the experiments, we verified several key aspects of the proposed model. In this section, we discuss them in detail. A. Self-organized Coordinated Dynamic Structure The proposed model developed a coordinated dynamic mechanism in the whole network, enabling the robot to learn goal-directed behaviors through the seamless coordination of cognitive skills. In terms of downward causation, spatio-temporal constraints imposed on the each level of the hierarchy and end-to-end learning performed on the tightly coupled structure are the two key factors in achieving the coordinated dynamic mechanism. First, multiple scales of spatio-temporal constraint enabled the model to dynamically compose conceptual representations in the higher level by assembling perceptual features in the lower level, suggesting the emergence of different cognitive functionalities in its hierarchy. Sporns [48] argues that cognitive functions develop in human brains through anatomical spatio-temporal constraints including connectivity and timescales among local regions. Similarly, different spatio-temporal constraints imposed on different parts of the proposed model lead to the development of different cognitive functionalities at each level of the hierarchy. For example, the PFC layer mainly encoded higher-level task-related information whereas the MTRNN layers encoded information related to the robot’s current action. Specifically, lower-level proprioception layer (MF) developed the representation closely reflecting the robot’s current action whereas higher-level proprioception layer (MS) played the role of mediating between higher-level cognition (PFC) and lower-level proprioception (MF). This result is analogous to findings in [49] that higher-level task-related information was encoded in the PFC and the lower-level arm movements were encoded in the primary motor cortex of monkeys. Second, end-to-end learning performed on a tightly coupled structure enabled the model to form coordinated representations without explicitly encapsulating each perceptual modality, i.e. perception, action, and decision making. On the present model, the coupling of perception and action is achieved by connecting two different deep networks through the PFC layer. This coupling enabled the model to generate motor plans dynamically in response to visual perceptual flow. This finding is in line with the previous studies [13, 40] in which the importance of coupling perception and action was emphasized. Analysis of neural activation shows that this dynamic motor plan generation involved continuous integration of the visual perceptual flow, rather than being directly mapped from visual perception. This dynamic transformation of visual information into behavioral information was also observed in the experiments with macaque monkey’s brains [50]. Multimodal representation helps with distinguishing object type and orientation [3] and competency for multimodal information integration is considered essential for embodied cognition [2, 4, 51, 52]. Ultimately, the present model was able to develop multimodal representations by abstracting and associating visual perception with proprioceptive information in different pathways. In other words, higher level representations were based not only on visual information about and object and corresponding human gesture, but also on information about movement trajectories resulting in the successful grasp of the target object. B. Memory and Pre-planning Capability Results indicate that the proposed model is capable of developing and employing working memory. We found that the robot was able to maintain task-related information in higher levels throughout the task phases, and dynamically combining it with object percepts. For instance, the robot maintained human intention categorized at the beginning of the task and combined it with the object percept, so that it could reach and grasp the target object. Furthermore, the proposed model performed robustly even when visual input was completely and unexpectedly occluded. This memory capability was achieved by the temporal hierarchy of the model as well as by the recurrent connections of the PFC layer. Particularly, when the time constants of the higher-level were larger than those of the lower-level, the model showed the most robust performance in the various circumstances including the experiments with the novel object configurations as well as the ones with unexpected visual occlusion. Although the suitable values of time constant at each level might differ depending on the task, the finding of our study suggests that the progressively larger time constants from the low-level to the higher-level of the architecture played an important role to form the coordinated dynamic structure including a memory capability. This finding is also in consistency with the other previous studies [9, 17-18, 33-34, 36-37, 46] that have shown the importance of a similar temporal hierarchy in the multiple timescales neural network such as MSTNN and MTRNN. This internal contextual dynamics of the proposed model highlights a key difference between the proposed model and the previous study [13] which lacked capability for keeping memory. Furthermore, the model was able to pre-plan an action prior to action execution. More specifically, neuronal activation in the higher-level proprioception layer (MS) was calibrated based on the perceived visual images prior to action execution. This pre-planning capability played a particularly important role in the visual occlusion experiment, enabling the robot to reach and grasp the target object even without monitoring the target object and the hand during reaching. This result is analogous to findings in [53] which reported that F5 neurons in the brain of the macaque monkey encoded grip-specific information even when no movement was intended. VII. CONCLUSION The current study introduced the Visuo-Motor Deep Dynamic Neural Network (VMDNN) model which can learn to read human intention and generate corresponding behaviors in robots by coordinating multiple cognitive processes including visual recognition, attention switching, memorizing and retrieving with working memory, action preparation and generation in a seamless manner. The simulation study on the model using the iCub simulator revealed that the robot could categorize human intention through observing gestures, preserve the contextual information, and execute corresponding goal-directed actions. The analysis further showed that synergic coordination among these cognitive processes can be developed when end-to-end learning of tutored experience is performed on the whole network, allowing dense interaction between subnetworks. In conclusion, the aforementioned cognitive mechanism can be developed by means of downward causation in terms of spatio-temporal scale differentiation among local subnetworks, topological connectivity among them, and the way of interacting through sensory-motor coupling. There are several research directions suggested by this study. First, experiments incorporating other cognitive skills as well as other sensory modalities need to be conducted for a better understanding of the mechanisms of learning goal-directed actions in human and other biological neural systems. Second, the scalability of the proposed model will need to be examined in experiments with a real robot and with a larger variety of objects. The complexity of the task that the model can perform seems proportional to the size of the learnable parameters including the number of layers in each subnetwork and the number of neurons in each layer. Third, the robot’s sensorimotor experience in our study was acquired from tutoring by the experimenter. In some cases, tutoring may be impossible, so it would be worth investigating how such experience can be obtained autonomously. REFERENCES [1] O. Sigaud and A. Droniou, "Towards Deep Developmental Learning," IEEE Transactions on Cognitive and Developmental Systems, vol. 8, pp. 99-114, 2016. [2] A. Droniou, S. Ivaldi, and O. Sigaud, "Deep unsupervised network for multimodal perception, representation and classification," Robotics and Autonomous Systems, vol. 71, pp. 83-98, 2015. [3] F. Guerin, N. Kruger, and D. Kraft, "A Survey of the Ontogeny of Tool Use: From Sensorimotor Experience to Planning," IEEE Transactions on Autonomous Mental Development, vol. 5, pp. 18-45, 2013. [4] M. Lungarella, G. Metta, R. Pfeifer, and G. Sandini, "Developmental robotics: a survey," Connection Science, vol. 15, pp. 151-190, 2003. [5] A. Cangelosi, M. Schlesinger, and L. B. Smith, Developmental robotics: From babies to robots: MIT Press, 2015. [6] L. Berthouze and T. Ziemke, "Epigenetic robotics—modelling cognitive development in robotic systems," Connection Science, vol. 15, pp. 147-150, 2003. [7] M. Asada, K. F. MacDorman, H. Ishiguro, and Y. Kuniyoshi, "Cognitive developmental robotics as a new paradigm for the design of humanoid robots," Robotics and Autonomous Systems, vol. 37, pp. 185-193, 2001. [8] T. Taniguchi, T. Nagai, T. Nakamura, N. Iwahashi, T. Ogata, and H. Asoh, "Symbol emergence in robotics: a survey," Advanced Robotics, vol. 30, pp. 706-728, 2016. [9] J. Tani, "Self-Organization and Compositionality in Cognitive Brains: A Neurorobotics Study," Proceedings of the IEEE, vol. 102, pp. 586-605, 2014. [10] Y. Bengio, A. Courville, and P. Vincent, "Representation Learning: A Review and New Perspectives," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 35, pp. 1798-1828, 2013. [11] Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, pp. 436-444, 2015. [12] J. Schmidhuber, "Deep learning in neural networks: An overview," Neural Networks, vol. 61, pp. 85-117, 2015. [13] S. Levine, C. Finn, T. Darrell, and P. Abbeel, "End-to-end training of deep visuomotor policies," arXiv preprint arXiv:1504.00702, 2015. [14] I. Lenz, H. Lee, and A. Saxena, "Deep learning for detecting robotic grasps," The International Journal of Robotics Research, vol. 34, pp. 705-724, 2015. [15] A. Di Nuovo, V. M. De La Cruz, and A. Cangelosi, "A Deep Learning Neural Network for Number Cognition: A bi-cultural study with the iCub," in 2015 Joint IEEE International Conference on Development and Learning and Epigenetic Robotics (ICDL-EpiRob), 2015, pp. 320-325. [16] N. Wahlström, T. B. Schön, and M. P. Deisenroth, "From pixels to torques: Policy learning with deep dynamical models," arXiv preprint arXiv:1502.02251, 2015. [17] M. Jung, J. Hwang, and J. Tani, "Self-Organization of Spatio-Temporal Hierarchy via Learning of Dynamic Visual Image Patterns on Action Sequences," PLoS ONE, 2015. [18] Y. Yamashita and J. Tani, "Emergence of functional hierarchy in a multiple timescale neural network model: a humanoid robot experiment," PLoS Computational Biology, vol. 4, p. e1000220, 2008. [19] P. Savastano and S. Nolfi, "Incremental Learning in a 14 DOF Simulated iCub Robot: Modeling Infant Reach/Grasp Development," in Biomimetic and Biohybrid Systems: First International Conference, Living Machines 2012, Barcelona, Spain, July 9-12, 2012. Proceedings, T. J. Prescott, N. F. Lepora, A. Mura, and P. F. M. J. Verschure, Eds., ed Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 250-261. [20] P. Savastano and S. Nolfi, "A Robotic Model of Reaching and Grasping Development," IEEE Transactions on Autonomous Mental Development, vol. 5, pp. 326-336, 2013. [21] J. L. McClelland, M. M. Botvinick, D. C. Noelle, D. C. Plaut, T. T. Rogers, M. S. Seidenberg, et al., "Letting structure emerge: connectionist and dynamical systems approaches to cognition," Trends in Cognitive Sciences, vol. 14, pp. 348-356, 2010. [22] P. F. Dominey and F. Warneken, "The basis of shared intentions in human and robot cognition," New Ideas in Psychology, vol. 29, pp. 260-274, 12// 2011. [23] M. Tomasello, M. Carpenter, J. Call, T. Behne, and H. Moll, "Understanding and sharing intentions: the origins of cultural cognition," Behav Brain Sci, vol. 28, pp. 675-91; discussion 691-735, Oct 2005. [24] D. Vernon, S. Thill, and T. Ziemke, "The Role of Intention in Cognitive Robotics," in Toward Robotic Socially Believable Behaving Systems - Volume I : Modeling Emotions, A. Esposito and C. L. Jain, Eds., ed Cham: Springer International Publishing, 2016, pp. 15-27. [25] M. E. McCarty, R. K. Clifton, D. H. Ashmead, P. Lee, and N. Goubet, "How infants use vision for grasping objects," Child Dev, vol. 72, pp. 973-87, Jul-Aug 2001. [26] R. E. Lasky, "The effect of visual feedback of the hand on the reaching and retrieval behavior of young infants," Child Dev, vol. 48, pp. 112-7, Mar 1977. [27] E. Oztop, N. S. Bradley, and M. A. Arbib, "Infant grasp learning: a computational model," Exp Brain Res, vol. 158, pp. 480-503, Oct 2004. [28] E. Ugur, E. Şahin, and E. Oztop, "Self-discovery of motor primitives and learning grasp affordances," in 2012 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2012, pp. 3260-3267. [29] E. Ugur, Y. Nagai, E. Sahin, and E. Oztop, "Staged Development of Robot Skills: Behavior Formation, Affordance Learning and Imitation with Motionese," IEEE Transactions on Autonomous Mental Development, vol. 7, pp. 119-139, 2015. [30] Z. Yu and M. Lee, "Human motion based intent recognition using a deep dynamic neural model," Robotics and Autonomous Systems, vol. 71, pp. 134-149, 9// 2015. [31] L. Pinto and A. Gupta, "Supersizing Self-supervision: Learning to Grasp from 50K Tries and 700 Robot Hours," arXiv preprint arXiv:1509.06825, 2015. [32] K. Noda, H. Arie, Y. Suga, and T. Ogata, "Multimodal integration learning of robot behavior using deep neural networks," Robotics and Autonomous Systems, vol. 62, pp. 721-736, 2014. [33] G. Park and J. Tani, "Development of Compositional and Contextual Communication of Robots by Using the Multiple Timescales Dynamic Neural Network," presented at the The 5th Joint IEEE International Conference on Development and Learning and on Epigenetic Robotics, Rhode Island, USA, 2015. [34] R. Nishimoto and J. Tani, "Development of hierarchical structures for actions and motor imagery: a constructivist view from synthetic neuro-robotics study," Psychol Res, vol. 73, pp. 545-58, Jul 2009. [35] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in Advances in neural information processing systems, 2012, pp. 1097-1105. [36] M. Jung, J. Hwang, and J. Tani, "Multiple spatio-temporal scales neural network for contextual visual recognition of human actions," in 2014 Joint IEEE International Conferences on Development and Learning and Epigenetic Robotics (ICDL-Epirob), 2014, pp. 235-241. [37] S. Jeong, H. Arie, M. Lee, and J. Tani, "Neuro-robotics study on integrative learning of proactive visual attention and motor behaviors," Cognitive Neurodynamics, vol. 6, pp. 43-59, 2012. [38] H. Celikkanat, E. Sahin, and S. Kalkan, "Recurrent Slow Feature Analysis for Developing Object Permanence in Robots," presented at the IROS 2013 Workshop on Neuroscience and Robotics, Tokyo, Japan, 2013. [39] P. F. Dominey, M. Hoen, J. M. Blanc, and T. Lelekov-Boissard, "Neurological basis of language and sequential cognition: evidence from simulation, aphasia, and ERP studies," Brain Lang, vol. 86, pp. 207-25, Aug 2003. [40] M. Lungarella and G. Metta, "Beyond Gazing, Pointing, and Reaching: A Survey of Developmental Robotics," vol. 101, C. G. Prince, L. Berthouze, H. Kozima, D. Bullock, G. Stojanov, and C. Balkenius, Eds., ed: Lund University Cognitive Studies, 2003, pp. 81-89. [41] Y. A. LeCun, L. Bottou, G. B. Orr, and K.-R. Müller, "Efficient backprop," in Neural Networks: Tricks of the Trade. vol. 7700, G. Montavon, G. B. Orr, and K.-R. Müller, Eds., ed: Springer Berlin Heidelberg, 2012, pp. 9-48. [42] D. E. Rumelhart, J. L. McClelland, and P. R. Group, Parallel distributed processing vol. 1: MIT press, 1986. [43] Y. Bengio, P. Lamblin, D. Popovici, and H. Larochelle, "Greedy layer-wise training of deep networks," Advances in neural information processing systems, vol. 19, p. 153, 2007. [44] N. G. Tsagarakis, G. Metta, G. Sandini, D. Vernon, R. Beira, F. Becchi, et al., "iCub: the design and realization of an open humanoid platform for cognitive and neuroscience research," Advanced Robotics, vol. 21, pp. 1151-1175, 2007. [45] V. Tikhanoff, A. Cangelosi, P. Fitzpatrick, G. Metta, L. Natale, and F. Nori, "An open-source simulator for cognitive robotics research: the prototype of the iCub humanoid robot simulator," presented at the Proceedings of the 8th Workshop on Performance Metrics for Intelligent Systems, Gaithersburg, Maryland, 2008. [46] J. Hwang, M. Jung, N. Madapana, J. Kim, M. Choi, and J. Tani, "Achieving "synergy" in cognitive behavior of humanoids via deep learning of dynamic visuo-motor-attentional coordination," in 2015 IEEE-RAS 15th International Conference on Humanoid Robots (Humanoids), 2015, pp. 817-824. [47] L. Van der Maaten and G. Hinton, "Visualizing data using t-SNE," Journal of Machine Learning Research, vol. 9, p. 85, 2008. [48] O. Sporns, Networks of the Brain. Cambridge, MA: MIT press, 2011. [49] H. Mushiake, N. Saito, K. Sakamoto, Y. Itoyama, and J. Tanji, "Activity in the lateral prefrontal cortex reflects multiple steps of future events in action plans," Neuron, vol. 50, pp. 631-41, May 18 2006. [50] C. E. Vargas-Irwin, L. Franquemont, M. J. Black, and J. P. Donoghue, "Linking Objects to Actions: Encoding of Target Object and Grasping Strategy in Primate Ventral Premotor Cortex," The Journal of Neuroscience, vol. 35, pp. 10888-10897, 2015. [51] K. Meyer and A. Damasio, "Convergence and divergence in a neural architecture for recognition and memory," Trends Neurosci, vol. 32, pp. 376-82, Jul 2009. [52] O. L. Georgeon, J. B. Marshall, and R. Manzotti, "ECA: An enactivist cognitive architecture based on sensorimotor modeling," Biologically Inspired Cognitive Architectures, vol. 6, pp. 46-57, 2013. [53] J. Carpaneto, M. A. Umilta, L. Fogassi, A. Murata, V. Gallese, S. Micera, et al., "Decoding the activity of grasping neurons recorded from the ventral premotor area F5 of the macaque monkey," Neuroscience, vol. 188, pp. 80-94, Aug 11 2011.
2cs.AI
MINIMUM DISTANCE FUNCTIONS OF COMPLETE INTERSECTIONS arXiv:1601.07604v4 [math.AC] 24 Oct 2017 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL Abstract. We study the minimum distance function of a complete intersection graded ideal in a polynomial ring with coefficients in a field. For graded ideals of dimension one, whose initial ideal is a complete intersection, we use the footprint function to give a sharp lower bound for the minimum distance function. Then we show some applications to coding theory. 1. Introduction Let S = K[t1 , . . . , ts ] = ⊕∞ d=0 Sd be a polynomial ring over a field K with the standard grading and let I 6= (0) be a graded ideal of S. The degree or multiplicity of S/I is denoted by deg(S/I). Fix a graded monomial order ≺ on S and let in≺ (I) be the initial ideal of I. The footprint of S/I or Gröbner éscalier of I, denoted ∆≺ (I), is the set of all monomials of S not in the ideal in≺ (I) [28, p. 13, p. 133]. This notion occurs in other branches of mathematics under different names; see [20, p. 6] for a list of alternative names. Given an integer d ≥ 1, let M≺,d be the set of all zero-divisors of S/in≺ (I) of degree d that are in ∆≺ (I), and let F≺,d be the set of all zero-divisors of S/I that are not zero and are a K-linear combination of monomials in ∆≺ (I) of degree d. The footprint function of I, denoted fpI , is the function fpI : N+ → Z given by  deg(S/I) − max{deg(S/(in≺ (I), ta )) | ta ∈ M≺,d } if M≺,d 6= ∅, fpI (d) := deg(S/I) if M≺,d = ∅, and the minimum distance function of I, denoted δI , is the function δI : N+ → Z given by  deg(S/I) − max{deg(S/(I, f ))| f ∈ F≺,d } if F≺,d 6= ∅, δI (d) := deg(S/I) if F≺,d = ∅. These two functions were introduced and studied in [24]. Notice that δI is independent of the monomial order ≺ (see Lemma 3.9). To compute δI is a difficult problem but to compute fpI is much easier. We come to the main result of this paper which gives an explicit lower bound for δI and a formula for fpI for a family of complete intersection graded ideals: Theorem 3.14 If the initial ideal in≺ (I) of I is a complete intersection of height s−1 generated by tα2 , . . . , tαs , with di = deg(tαi ) and 1 ≤ di ≤ di+1 for i ≥ 2, then  s P   (di − 1) − 1,  (dk+2 − ℓ)dk+3 · · · ds if d ≤ i=2 δI (d) ≥ fpI (d) = s P   if d ≥ (di − 1) ,  1 i=2 where 0 ≤ k ≤ s − 2 and ℓ are integers such that d = Pk+1 i=2 (di − 1) + ℓ and 1 ≤ ℓ ≤ dk+2 − 1. 2010 Mathematics Subject Classification. Primary 13P25; Secondary 94B60, 11T71. The first and third author were supported by SNI. The second author was supported by CONACyT. 1 2 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL An important case of this theorem, from the viewpoint of applications, is when I is the vanishing ideal of a finite set of projective points over a finite field (see the discussion below about the connection of fpI and δI with coding theory). If I is a complete intersection monomial ideal of dimension 1, then δI (d) = fpI (d) for d ≥ 1 (see Proposition 3.11), but this case is only of theoretical interest because, by Proposition 2.9, a monomial ideal is a vanishing ideal only in particular cases. Let I ⊂ S be a graded ideal such that L = in≺ (I) is a complete intersection of dimension 1. We give a formula for the degree of S/(L, ta ) when ta is in M≺,d , that is, ta is not in L and is a zero-divisor of S/L. By an easy classification of the complete intersection property of L (see Lemma 3.1) there are basically two cases to consider. One of them is Lemma 3.4, and the other is the following: Lemma 3.3 If L = in≺ (I) is generated by td22 , . . . , tds s and ta = ta11 · · · tas s is in M≺,d , then deg(S/(L, ta )) = d2 · · · ds − (d2 − a2 ) · · · (ds − as ). To show our main result we use the formula for the degree of the ring S/(L, ta ), and then use Proposition 3.13 to bound the degrees uniformly. The proof of the main result takes place in an abstract algebraic setting with no reference to vanishing ideals or finite fields. The formulas for the degree are useful in the following setting. If I = I(X) is the vanishing ideal of a finite set X of projective points, and in≺ (I) is generated by td22 , . . . , tds s , then Lemma 3.3 can be used to give upper bounds for the number of zeros in X of homogeneous polynomials of S. In fact, if f ∈ F≺,d and in≺ (f ) = ta11 · · · tas s , then in≺ (f ) is in M≺,d , and by Corollary 3.8 one has: |VX (f )| ≤ d2 · · · ds − (d2 − a2 ) · · · (ds − as ), where VX (f ) is the set of zeros or variety of f in X. This upper bound depends on the exponent of the leading term of f . A more complex upper bound is obtained when the initial ideal of I(X) is as in Lemma 3.1(ii). In this case one uses the formula for the degree given in Lemma 3.4. The interest in studying fpI and δI comes from algebraic coding theory. Indeed, if I = I(X) is the vanishing ideal of a finite subset X of a projective space Ps−1 over a finite field K = Fq , then the minimum distance δX (d) of the corresponding projective Reed-Muller-type code is equal to δI(X) (d), and fpI(X) (d) is a lower bound for δX (d) for d ≥ 1 (see Theorem 2.6 and Lemma 3.10). Therefore, one has the formula: (2.2) δI(X) (d) = deg(S/I(X)) − max{|VX (f )| : f 6≡ 0; f ∈ Sd }, where f 6≡ 0 means that f is not the zero function on X. Our abstract study of the minimum distance and footprint functions provides fresh techniques to study δX (d). It is well-known that the degree of S/I(X) is equal to |X| [19, Lecture 13]. Hence, using Eq. (2.2) and our main result, we get the following uniform upper bound for the number of zeros of all polynomials f ∈ Sd that do not vanish at all points of X. Corollary 4.2 If the initial ideal in≺ (I(X)) is a complete intersection generated by tα2 , . . . , tαs , with di = deg(tαi ) and 1 ≤ di ≤ di+1 for i ≥ 2, then (4.1) |VX (f )| ≤ |X| − (dk+2 − ℓ) dk+3 · · · ds , for any f ∈ Sd that does not vanish at all point of X, where 0 ≤ k ≤ s − 2 and ℓ are integers P such that d = k+1 i=2 (di − 1) + ℓ and 1 ≤ ℓ ≤ dk+2 − 1. This result gives a tool for finding good uniform upper bounds for the number of zeros in X of polynomials over finite fields. This is a problem of fundamental interest in algebraic coding COMPLETE INTERSECTIONS 3 theory [31] and algebraic geometry [30]. We leave as an open question whether this uniform bound is optimal, that is, whether the equality is attained for some polynomial f . Tohǎneanu and Van Tuyl conjectured [33, Conjecture 4.9] that if the vanishing ideal I(X) is a complete intersection generated by polynomials of degrees d2 , . . . , ds and di ≤ di+1 for all i, then δX (1) ≥ (d2 − 1)d3 . . . ds . By Corollary 4.2 this conjecture is true if in≺ (I(X)) is a complete intersection. We leave as another open question whether Corollary 4.2 is true if we only assume that I(X) is a complete intersection (cf. Proposition 3.12). To illustrate the use of Corollary 4.2 in a concrete situation, consider the lexicographical order on S with t1 ≺ · · · ≺ ts and a projective torus over a finite field Fq with q 6= 2: T = {[(x1 , . . . , xs )] ∈ Ps−1 | xi ∈ F∗q for i = 1, . . . , s}, where F∗q = Fq \ {0}. As I(T) is generated by the Gröbner basis {tiq−1 − t1q−1 }si=2 , its initial ideal is a complete intersection generated by t2q−1 , . . . , tsq−1 . Therefore, noticing that deg(S/I(T)) is equal to (q − 1)s−1 and setting di = q − 1 for i = 2, . . . , s in Eq. (4.1), we obtain that any homogeneous polynomial f of degree d, not vanishing at all points of T, has at most (q − 1)s−1 − (q − 1)s−(k+2) (q − 1 − ℓ) zeros in T if d ≤ (q − 2)(s − 1) − 1, and k and ℓ are the unique integers such that k ≥ 0, 1 ≤ ℓ ≤ q − 2 and d = k(q − 2) + ℓ. This uniform bound was given in [29, Theorem 3.5] and it is seen that this bound is in fact optimal by constructing an appropriate polynomial f . If fpI (d) = δI (d) for d ≥ 1, we say that I is a Geil–Carvalho ideal. For vanishing ideals over finite fields, this notion is essentially another way of saying that the bound of Eq. (4.1) is optimal. The first interesting family of ideals where equality holds is due to Geil [13, Theorem 2]. His result essentially shows that fpI (d) = δI (d) for d ≥ 1 when ≺ is a graded lexicographical order and I is the homogenization of the vanishing ideal of the affine space As−1 over a finite field K = Fq . Recently, Carvalho [5, Proposition 2.3] extended this result by replacing As−1 by a cartesian product of subsets of Fq . In this case the underlying Reed-Muller-type code is called an affine cartesian code and an explicit formula for the minimum distance was first given in [14, 21]. In a very recent paper, Bishnoi, Clark, Potukuchi, and Schmitt give another proof of this formula [3, Theorem 5.2] using a result of Alon and Füredi [1, Theorem 5] (see also [4]). As the two most relevant applications of our main result to algebraic coding theory, we recover the formula for the minimum distance of an affine cartesian code given in [21, Theorem 3.8] and [14, Proposition 5], and the fact that the homogenization of the corresponding vanishing ideal is a Geil–Carvalho ideal [5] (see Corollary 4.4). Then we present an extension of a result of Alon and Füredi [1, Theorem 1]—in terms of the regularity of a vanishing ideal—about coverings of the cube {0, 1}n by affine hyperplanes, that can be applied to any finite subset of a projective space whose vanishing ideal has a complete intersection initial ideal (see Corollary 4.5 and Example 4.6). Finally, using Macaulay2 [17], we exemplify how some of our results can be used in practice, and show that the vanishing ideal of P2 over F2 is not Geil–Carvalho by computing all possible initial ideals (see Example 4.8). In Section 2 we introduce projective Reed-Muller-type codes and present some of the results and terminology that will be needed in the paper. For all unexplained terminology and additional information, we refer to [36] (for deeper advances on the knowledge of the degree), [8] (for the theory of Gröbner bases), [2, 11, 32] (for commutative algebra and Hilbert functions), and [23, 34] (for the theory of error-correcting codes and linear codes). 4 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL 2. Preliminaries In this section, we present some of the results that will be needed throughout the paper and introduce some more notation. All results of this section are well-known. Let S = K[t1 , . . . , ts ] = ⊕∞ d=0 Sd be a graded polynomial ring over a field K with the standard grading and let (0) 6= I ⊂ S be a graded ideal. The Hilbert function of S/I is: HI (d) := dimK (Sd /Id ), d = 0, 1, 2, . . . where Id = I ∩ Sd . By the dimension of I we mean the Krull dimension of S/I. The degree or multiplicity of S/I is the positive integer ( (k − 1)! lim HI (d)/dk−1 if k ≥ 1, d→∞ deg(S/I) := dimK (S/I) if k = 0, and the regularity of the Hilbert function of S/I, or simply the regularity of S/I, denoted reg(S/I), is the least integer r ≥ 0 such that HI (d) is equal to hI (d) for d ≥ r, where hI is the Hilbert polynomial of S/I. Let ≺ be a monomial order on S and let (0) 6= I ⊂ S be an ideal. The leading monomial of f is denoted by in≺ (f ) and the initial ideal of I is denoted by in≺ (I). A monomial ta is called a standard monomial of S/I, with respect to ≺, if ta is not in the ideal in≺ (I). A polynomial f is called standard if f 6= 0 and f is a K-linear combination of standard monomials. The set of standard monomials, denoted ∆≺ (I), is called the footprint of S/I. If I is graded, then HI (d) is the number of standard monomials of degree d. Lemma 2.1. Let ≺ be a monomial order, let I ⊂ S be an ideal, and let f be a polynomial of S of positive degree. If in≺ (f ) is regular on S/in≺ (I), then f is regular on S/I. Proof. Let g be a polynomial of S such that gf ∈ I. It suffices to show that g ∈ I. Pick a Gröbner basis P g1 , . . . , gr of I. Then, by the division algorithm [8, Theorem 3, p. 63], we can write g = ri=1 ai gi + h, where h = 0 or h is a standard polynomial of S/I. We need only show that h = 0. If h 6= 0, then hf is in I and in≺ (h)in≺ (f ) is in in≺ (I). Therefore in≺ (h) is in in≺ (I), a contradiction.  Remark 2.2. Given an integer d ≥ 1, there is a map in≺ : F≺,d → M≺,d given by f 7→ in≺ (f ). This follows from Lemma 2.1. If I is a monomial ideal, then M≺,d ⊂ F≺,d . Projective Reed-Muller-type codes. Let K = Fq be a finite field with q elements, let Ps−1 be a projective space over K, and let X be a subset of Ps−1 . As usual, points of Ps−1 are denoted by [α], where 0 6= α ∈ K s . In this paragraph all results are valid if we assume that K is any field and X is a finite subset of Ps−1 , instead of assuming that K is finite. However, the interesting case for coding theory is when K is finite. The vanishing ideal of X, denoted I(X), is the ideal of S generated by the homogeneous polynomials that vanish at all points of X. In this case the Hilbert function of S/I(X) is denoted by HX (d). Let P1 , . . . , Pm be a set of representatives for the points of X with m = |X|. Fix a degree d ≥ 1. For each i there is fi ∈ Sd such that fi (Pi ) 6= 0. Indeed suppose Pi = [(a1 , . . . , as )], there is at least one k in {1, . . . , s} such that ak 6= 0. Setting fi (t1 , . . . , ts ) = tdk one has that fi ∈ Sd and fi (Pi ) 6= 0. There is a K-linear map:   f (Pm ) f (P1 ) ,..., . (2.1) evd : Sd = K[t1 , . . . , ts ]d → K |X| , f 7→ f1 (P1 ) fm (Pm ) COMPLETE INTERSECTIONS 5 The map evd is called an evaluation map. The image of Sd under evd , denoted by CX (d), is called a projective Reed-Muller-type code of degree d over X [10]. It is also called an evaluation code associated to X [15]. This type of codes have been studied using commutative algebra methods and especially Hilbert functions, see [9, 16, 26, 31] and the references therein. Definition 2.3. A linear code is a linear subspace of K m for some m. The basic parameters of the linear code CX (d) are its length |X|, dimension dimK CX (d), and minimum distance δX (d) := min{kvk : 0 6= v ∈ CX (d)}, where kvk is the number of non-zero entries of v. Lemma 2.4. [24, Lemma 2.13] (a) The map evd is well-defined, i.e., it is independent of the set of representatives that we choose for the points of X. (b) The basic parameters of the ReedMuller-type code CX (d) are independent of f1 , . . . , fm . The following summarizes the well-known relation between projective Reed-Muller-type codes and the theory of Hilbert functions. Notice that items (i) and (iv) follow directly from Eq. (2.1) and item (iii), respectively. Proposition 2.5. The following hold. (i) (ii) (iii) (iv) HX (d) = dimK CX (d) for d ≥ 1. [19, Lecture 13] deg(S/I(X)) = |X|. (Singleton bound) 1 ≤ δX (d) ≤ |X| − HX (d) + 1 for d ≥ 1. δX (d) = 1 for d ≥ reg(S/I(X)). The next result gives an algebraic formulation of the minimum distance of a projective ReedMuller-type code in terms of the degree and the structure of the underlying vanishing ideal. Theorem 2.6. [24, Theorem 4.7] If |X| ≥ 2, then δX (d) = δI(X) (d) ≥ 1 for d ≥ 1. This result gives an algorithm, that can be implemented in CoCoA [7], Macaulay2 [17], or Singular [18], to compute δX (d) for small values of q and s, where q is the cardinality of Fq and s is the number of variables of S (see the procedure of Example 4.6). Using SAGE [27] one can also compute δX (d) by finding a generator matrix of CX (d). As a direct consequence of Theorem 2.6 one has: (2.2) δI(X) (d) = deg(S/I(X)) − max{|VX (f )| : f 6≡ 0; f ∈ Sd }, where VX (f ) is the zero set of f in X and f 6≡ 0 means that f does not vanish at all points of X. The next lemma follows using the division algorithm [8] (cf. [12, Problem 1-17]). Lemma 2.7. Let X be a finite subset of Ps−1 , let [α] be a point in X, with α = (α1 , . . . , αs ) and αk 6= 0 for some k, and let I[α] be the vanishing ideal of [α]. Then I[α] is a prime ideal, I[α] = ({αk ti − αi tk | k 6= i ∈ {1, . . . , s}), deg(S/I[α] ) = 1, T ht(I[α] ) = s − 1, and I(X) = [β]∈X I[β] is the primary decomposition of I(X). Remark 2.8. If X is a finite set of projective points, then S/I(X) is a Cohen–Macaulay reduced graded ring of dimension 1. This is very well-known, and it follows directly from Lemma 2.7. In particular, the regularity of the Hilbert function of S/I(X) is the Castelnuovo–Mumford regularity of S/I(X). An ideal I ⊂ S is called unmixed if all its associated primes have the same height. The next result classifies monomial vanishing ideals of finite sets in a projective space. 6 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL Proposition 2.9. Let X be a finite subset of Ps−1 . The following are equivalent: (a) I(X) is a monomial ideal. (b) I(X) = ∩m i=1 pi , where the pi ’s are generated by s − 1 variables. (c) X ⊂ {[e1 ], . . . , [es ]}, where ei is the i-th unit vector. Proof. (a) ⇒ (b): By Remark 2.8, I(X) is a radical Cohen–Macaulay graded ideal of dimension 1. Hence, I(X) is an unmixed square-free monomial ideal of height s − 1. Therefore, I(X) is equal to ∩m i=1 pi , where the pi ’s are face ideals (i.e., ideals generated by variables) of height s − 1. (b) ⇒ (c): Let X be the Zariski closure of X. As X is finite, one has X = X = V (I(X)) = (pi ). Thus it suffices to notice that V (pi ) = {[eij ]} for some ij . (c) ⇒ (a): This follows from Lemma 2.7.  ∪m i=1 V 3. Complete intersections Let S = K[t1 , . . . , ts ] = ⊕∞ d=0 Sd be a polynomial ring over a field K with the standard grading and s ≥ 2. An ideal I ⊂ S is called a complete intersection if there exist g1 , . . . , gr in S such that I = (g1 , . . . , gr ), where r is the height of I. In what follows by a monomial order ≺ we mean a graded monomial order in the sense that ≺ is defined first by total degree [8]. Lemma 3.1. Let L ⊂ S be an ideal generated by monomials. If dim(S/L) = 1, then L is a complete intersection if and only if, up to permutation of the variables t1 , . . . , ts , we can write (i) L = (td22 , . . . , tds s ) with 1 ≤ di ≤ di+1 for i ≥ 2, or dp c cp+1 dp+2 (ii) L = (td12 , . . . , tp−1 , tpp tp+1 , tp+2 , . . . , tds s ) for some p ≥ 1 such that 1 ≤ cp ≤ cp+1 and 1 ≤ di ≤ di+1 for 2 ≤ i ≤ s − 1, where dp+1 = cp + cp+1 . Proof. ⇒) Let tα1 , . . . , tαs−1 be the minimal set of generators of L consisting of monomials. These monomials form a regular sequence. Hence tαi and tαj have no common variables for i 6= j. Then, either all variables occur in tα1 , . . . , tαs−1 and we are in case (ii), up to permutation of the variables t1 , . . . , ts , or there is one variable that is not in any of the tαi ’s and we are in case (i), up to permutation of the variables t1 , . . . , ts . ⇐) In both cases L is an ideal of height s − 1 generated by s − 1 elements, that is, L is a complete intersection.  Proposition 3.2. [35, Propositions 3.1.33 and 5.1.11] Let A = R1 /I1 , B = R2 /I2 be two standard graded algebras over a field K, where R1 = K[x], R2 = K[y] are polynomial rings in disjoint sets of variables and Ii is an ideal of Ri . If R = K[x, y] and I = I1 R + I2 R, then (R1 /I1 ) ⊗K (R2 /I2 ) ≃ R/I and F (A ⊗K B, x) = F (A, x)F (B, x), where F (A, x) and F (B, x) are the Hilbert series of A and B, respectively. Lemma 3.3. Let L be the ideal of S generated by td22 , . . . , tds s . If ta = ta11 tar r · · · tas s , r ≥ 2, ar ≥ 1, and ai ≤ di − 1 for i ≥ r, then deg(S/(L, ta )) = deg(S/(L, tar r · · · tas s )) = d2 · · · ds − d2 · · · dr−1 (dr − ar ) · · · (ds − as ), where ai = 0 if 2 ≤ i < r. COMPLETE INTERSECTIONS 7 Proof. In what follows we will use the fact that Hilbert functions and Hilbert series are additive on short exact sequences [12, Chapter 2, Proposition 7]. If a1 ≥ 1, then taking Hilbert functions in the exact sequence a1 t 1 S/(L, ta ) −→ S/(L, ta11 ) −→ 0, 0 −→ S/(L, tar r · · · tas s )[−a1 ] −→ and noticing that dim(S/(L, ta11 )) = 0, the first equality follows. Thus we may assume that ta has the form ta = tar r · · · tas s and ai = 0 for i < r. We proceed by induction on s ≥ 2. Assume s = 2. Then r = 2, ta = ta22 , (L, ta ) = (ta22 ), and the degree of S/(L, ta ) is a2 , as required. Assume s ≥ 3. If ai = 0 for i > r, then (L, ta ) = (L, tar r ) is a complete intersection and the required formula follows from [32, Corollary 3.3]. Thus we may assume that ai ≥ 1 for some i > r. There is an exact sequence (3.1) tar a d d r r+1 r+1 r−1 0 −→ S/(td22 , . . . , tr−1 · · · tas s )[−ar ] −→ , . . . , tds s , tr+1 , trdr −ar , tr+1 d d r−1 r+1 S/(L, ta ) −→ S/(td22 , . . . , tr−1 , tar r , tr+1 , . . . , tds s ) −→ 0. Notice that the ring on the right is a complete intersection and the ring on the left is isomorphic to the tensor product (3.2) d d a r−1 r+1 r+1 K[t2 , . . . , tr ]/(td22 , . . . , tr−1 , trdr −ar ) ⊗K K[t1 , tr+1 , . . . , ts ]/(tr+1 , . . . , tds s , tr+1 · · · tas s ). Hence, taking Hilbert series in Eq. (3.1), and applying [32, Corollary 3.3], the theorem of Hilbert–Serre [32, p. 58], and Proposition 3.2, we can write the Hilbert series of S/(L, ta ) as F (S/(L, ta ), x) = xar (1 − xd2 ) · · · (1 − xdr−1 )(1 − xdr −ar ) g(x) + (1 − x)r−1 (1 − x) (1 − xd2 ) · · · (1 − xdr−1 )(1 − xar )(1 − xdr+1 ) · · · (1 − xds ) , (1 − x)s where g(x)/(1 − x) is the Hilbert series of the second ring in the tensor product of Eq. (3.2) and g(1) is its degree. By induction hypothesis g(1) = dr+1 · · · ds − (dr+1 − ar+1 ) · · · (ds − as ). Therefore, writing F (S/(L, ta ), x) = h(x)/(1−x) with h(x) ∈ Z[x] and h(1) > 0, and recalling that h(1) is the degree of S/(L, ta ), we get deg(S/(L, ta )) = h(1) = d2 · · · dr−1 (dr − ar )g(1) + d2 · · · dr−1 ar dr+1 · · · ds = d2 · · · ds − (d2 − a2 ) · · · (ds − as ). ✷ d c c d p p+1 p+2 , tpp tp+1 Lemma 3.4. (A) Let L be the ideal of S generated by td12 , . . . , tp−1 , tp+2 , . . . , tds s , where a1 a a p ≥ 1, 1 ≤ cp ≤ cp+1 and di ≥ 1 for all i. If t = t1 · · · ts s is not in L, dp+1 = cp + cp+1 , and ai ≥ 1 for some i, then the degree of S/(L, ta ) is equal to (i) d2 · · · ds − (cp+1 − ap+1 ) p−1 Y (ii.1) d2 · · · ds − (cp − ap ) (di+1 − ai ) s Y (di − ai ) if ap < cp , ap+1 ≥ cp+1 ; i=p+2 i=1 (ii.2) d2 · · · ds − (dp+1 − ap − ap+1 ) (di − ai ) if ap ≥ cp ; i=p+2 i=1 p−1 Y s Y (di+1 − ai ) p−1 Y (di+1 − ai ) i=1 s Y (di − ai ) if ap < cp , ap+1 < cp+1 . i=p+2 8 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL (B) Let I be a graded ideal such that L = in≺ (I). If 0 ≤ k ≤ s − 2, ℓ are integers such that P d = k+1 i=2 (di − 1) + ℓ and 1 ≤ ℓ ≤ dk+2 − 1, then fpI (d) ≤ (dk+2 − ℓ)dk+3 · · · ds . a Proof. (A) Case (i): Assume ap ≥ cp . If ai = 0 for i 6= p, then ta = tpp , and by the first equality of Lemma 3.3, and using [32, Corollary 3.3], we get d a d d c d c c p p+2 p+1 , tpp , tp+2 deg(S/(L, ta )) = deg(S/(td12 , . . . , tp−1 , . . . , tds s , tpp tp+1 )) p p+2 = deg(S/(td12 , . . . , tp−1 , tpp , tp+2 , . . . , tds s )) = d2 · · · dp cp dp+2 · · · ds = d2 · · · dp (dp+1 − cp+1 )dp+2 · · · ds = d2 · · · ds − cp+1 d2 · · · dp dp+2 · · · ds , as required. We may now assume that ai ≥ 1 for some i 6= p. As ta ∈ / L and ap ≥ cp , one has ai < di+1 for i = 1, . . . , p − 1, ap+1 < cp+1 , and ai < di for i = p + 2, . . . , s. Therefore from the exact sequence c d d a −cp ap+1 tp+1 a p p+1 p+2 p−1 0 −→ S/(td12 , . . . , tp−1 , tp+1 , tp+2 , . . . , tds s , ta11 · · · tp−1 tp p d c d c tpp · · · tas s )[−cp ] −→ p p+2 , tpp , tp+2 S/(L, ta ) −→ S/(td12 , . . . , tp−1 , . . . , tds s ) −→ 0, and using Lemma 3.3 and [32, Corollary 3.3], the required equality follows. a Case (ii): Assume ap < cp . If ai = 0 for i 6= p, then ta = tpp and 0 = ap+1 < cp+1 . Hence, by [32, Corollary 3.3], we get a d d p p+2 deg(S/(L, ta )) = deg(S/(td12 , . . . , tp−1 , tpp , tp+2 , . . . , tds s )) = d2 · · · dp ap dp+2 · · · ds = d2 · · · ds − (dp+1 − ap )d2 · · · dp dp+2 · · · ds , as required. We may now assume that ai ≥ 1 for some i 6= p. Consider the exact sequence d c d a a c tpp p p+1 p+2 p−1 p+1 0 −→ S/(td12 , . . . , tp−1 , tp+1 , tp+2 , . . . , tds s , t1a1 · · · tp−1 tp+1 · · · tas s )[−cp ] −→ (3.3) d d c p p+2 S/(L, ta ) −→ S/(td12 , . . . , tp−1 , tpp , tp+2 , . . . , tds s , ta11 · · · tas s ) −→ 0. Subcase (ii.1): Assume ap+1 ≥ cp+1 . As ta ∈ / L, in our situation, one has ai < di+1 for i = 1, . . . , p − 1, ap < cp , and ai < di for i = p + 2, . . . , s. If ai = 0 for i 6= p + 1, then taking Hilbert series in Eq. (3.3), and noticing that the ring on the right has dimension 0, we get deg(S/(L, ta )) = d2 · · · dp cp+1 dp+2 · · · ds = d2 · · · ds − cp d2 · · · dp dp+2 · · · ds , as required. Thus we may now assume that ai ≥ 1 for some i 6= p + 1. Taking Hilbert series in Eq. (3.3), and using [32, Corollary 3.3], we obtain deg(S/(L, ta )) = d2 · · · dp cp+1 dp+2 · · · ds + d c d p p+2 , tpp , tp+2 deg(S/(td12 , . . . , tp−1 , . . . , tds s , ta11 · · · tas s )). Therefore, using Lemma 3.3, the required equality follows. Subcase (ii.2): Assume ap+1 < cp+1 . If ai = 0 for i 6= p + 1, taking Hilbert series in Eq. (3.3), and noticing that the ring on the right has dimension 0, by Lemma 3.3, we get deg(S/(L, ta )) = d2 · · · dp cp+1 dp+2 · · · ds − d2 · · · dp (cp+1 − ap+1 )dp+2 · · · ds = d2 · · · dp ap+1 dp+2 · · · ds = d2 · · · ds − (dp+1 − ap+1 )d2 · · · dp dp+2 · · · ds , COMPLETE INTERSECTIONS 9 as required. Thus we may now assume that ai ≥ 1 for some i 6= p + 1. Taking Hilbert series in Eq. (3.3), and applying Lemma 3.3 to the ends of Eq. (3.3), the required equality follows. (B) It suffices to find a monomial tb in M≺,d such that (3.4) deg(S/(in≺ (I), tb )) = (dk+2 − ℓ)dk+3 · · · ds . There are five cases to consider:  dk+1 −1 ℓ dp −1 cp cp+1 −1 dp+2 −1  td12 −1 · · · tp−1 tp tp+1 tp+2 · · · tk+1 tk+2    dp −1 cp cp+1 −1 ℓ d2 −1   · · · tp−1 tp tp+1 tp+2  t1 d −1 b d −1 2 t = · · · tkk+1 tℓk+1 t1   dp −1 cp ℓ−cp  td12 −1 · · · tp−1 tp tp+1     d2 −1 dp −1 ℓ t1 · · · tp−1 tp if if if if if k k k k k ≥ p + 1, = p, ≤ p − 2, = p − 1 and ℓ ≥ cp , = p − 1 and ℓ < cp . In each case, by the formulas for the degree of part (A), we get the equality of Eq. (3.4).  If f ∈ S, the quotient ideal of I with respect to f is given by (I : f ) = {h ∈ S| hf ∈ I}. Lemma 3.5. [24, Lemma 4.1] Let I ⊂ S be an unmixed graded ideal and let ≺ be a monomial order. If f ∈ S is homogeneous and (I : f ) 6= I, then deg(S/(I, f )) ≤ deg(S/(in≺ (I), in≺ (f ))) ≤ deg(S/I), and deg(S/(I, f )) < deg(S/I) if I is an unmixed radical ideal and f ∈ / I. Remark 3.6. Let I ⊂ S be an unmixed graded ideal of dimension 1. If f ∈ Sd , then (I : f ) = I if and only if dim(S/(I, f )) = 0. In this case deg(S/(I, f )) could be greater than deg(S/I). Lemma 3.7. [24, Lemma 3.2] Let X be a finite subset of Ps−1 over a field K and let I(X) ⊂ S be its graded vanishing ideal. If 0 6= f ∈ S is homogeneous, then the number of zeros of f in X is given by  deg S/(I(X), f ) if (I(X) : f ) 6= I(X), |VX (f )| = 0 if (I(X) : f ) = I(X). Corollary 3.8. Let I = I(X) be the vanishing ideal of a finite set X of projective points, let f ∈ F≺,d , and in≺ (f ) = ta11 · · · tas s . If in≺ (I) is generated by td22 , . . . , tds s , then there is r ≥ 2 such that ar ≥ 1, ai ≤ di − 1 for i ≥ r, ai = 0 if 2 ≤ i < r, and |VX (f )| ≤ d2 · · · ds − (d2 − a2 ) · · · (ds − as ). Proof. As f is a zero-divisor of S/I, by Lemma 2.1, ta = in≺ (f ) is a zero-divisor of S/in≺ (I). Hence, there is r ≥ 2 such that ar ≥ 1 and ai = 0 if 2 ≤ i < r. Using that ta is a standard monomial of S/I, we get that ai ≤ di − 1 for i ≥ r. Therefore, using Lemma 3.7 together with Lemmas 3.3 and 3.5, we get |VX (f )| = deg(S/(I(X), f )) ≤ deg(S/(in≺ (I(X)), in≺ (f ))) = d2 · · · ds − (d2 − a2 ) · · · (ds − as ). ✷ Lemma 3.9. Let I be a graded ideal and let ≺ be a monomial order. Then the minimum distance function δI is independent of ≺. Proof. Fix a positive integer d. Let Fd be the set of all homogeneous zero-divisors of S/I not in I of degree d and let f be an element of Fd . Pick a Gröbner basis P g1 , . . . , gr of I. Then, by the division algorithm [8, Theorem 3, p. 63], we can write f = ri=1 ai gi + h, where h is a 10 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL homogeneous standard polynomial of S/I of degree d. Since (I : f ) = (I : h), we get that h is in F≺,d . Hence, as (I, f ) = (I, h), we get the equalities: δI (d) = deg(S/I) − max{deg(S/(I, f ))| f ∈ F≺,d } = deg(S/I) − max{deg(S/(I, f ))| f ∈ Fd }, that is, δI (d) does not depend on F≺,d .  Lemma 3.10. Let I be an unmixed graded ideal and ≺ a monomial order. The following hold. (a) δI (d) ≥ fpI (d) and δI (d) ≥ 0 for d ≥ 1. (b) fpI (d) ≥ 0 if in≺ (I) is unmixed. (c) δI (d) ≥ 1 if I is radical. Proof. If F≺,d = ∅, then clearly δI (d) = deg(S/I) ≥ 1, δI (d) ≥ fpI (d), and if in≺ (I) is unmixed, then fpI (d) ≥ 0 (this follows from Lemma 3.5). Thus, (a), (b), and (c) hold. Now assume that F≺,d 6= ∅. Pick a standard polynomial f ∈ Sd such that (I : f ) 6= I and δI (d) = deg(S/I) − deg(S/(I, f )). As I is unmixed, by Lemma 3.5, deg(S/(I, f )) ≤ deg(S/(in≺ (I), in≺ (f ))). On the other hand, by Lemma 2.1, in≺ (f ) is a zero-divisor of S/in≺ (I). Hence δI (d) ≥ fpI (d). Using the second inequality of Lemma 3.5 it follows that δI (d) ≥ 0, fpI (d) ≥ 0 if in≺ (I) is unmixed, and δI (d) ≥ 1 if I is radical.  Proposition 3.11. If I is an unmixed monomial ideal and ≺ is any monomial order, then δI (d) = fpI (d) for d ≥ 1, that is, I is a Geil–Carvalho ideal. Proof. The inequality δI (d) ≥ fpI (d) follows from Lemma 3.10. To show the reverse inequality notice that M≺,d ⊂ F≺,d because one has I = in≺ (I). Also notice that M≺,d = ∅ if and only if F≺,d = ∅, this follows from Lemma 2.1. Therefore one has fpI (d) ≥ δI (d).  Proposition 3.12. Let I ⊂ S be a graded ideal and let ≺ be a monomial order. Suppose that in≺ (I) is a complete intersection of height s − 1 generated by tα2 , . . . , tαs , with di = deg(tαi ) and di ≥ 1 for all i. The following hold. (a) [25, Example 1.5.1] I is a complete intersection and dim(S/I) = 1. P (b) ([25, Example 1.5.1], [6, Lemma 3.5]) deg(S/I) = d2 · · · ds and reg(S/I) = si=2 (di − 1). (c) 1 ≤ fpI (d) ≤ δI (d) for d ≥ 1. Proof. (a): The rings S/I and S/init≺ (I) have the same dimension. Thus dim(S/I) = 1. As ≺ is a graded order, there are f2 , . . . , fs homogeneous polynomials in I with in≺ (fi ) = tαi for i ≥ 2. Since in≺ (I) = (in≺ (f2 ), . . . , in≺ (fs )), the polynomials f2 , . . . , fs form a Gröbner basis of I, and in particular they generate I. Hence I is a graded ideal of height s − 1 generated by s − 1 polynomials, that is, I is a complete intersection. (b): Since I is a complete intersection generated by the fi ’s, then the degree and regularity of P S/I are deg(f2 ) · · · deg(fs ) and si=2 (deg(fi ) − 1), respectively. This follows from the formula for the Hilbert series of a complete intersection given in [32, Corollary 3.3]. (c) The ideal I is unmixed because, by part (a), I is a complete intersection; in particular Cohen–Macaulay and unmixed. Hence the inequality δI (d) ≥ fpI (d) follows from Lemma 3.10. Let ta be a standard monomial of S/I of degree d such that (in≺ (I) : ta ) 6= in≺ (I), that is, ta is in M≺,d . Using Lemma 3.1, and the formulas for deg(S/(in≺ (I), ta )) given in Lemma 3.3 and Lemma 3.4, we obtain that deg(S/(in≺ (I), ta )) < deg(S/I). Thus fpI (d) ≥ 1.  COMPLETE INTERSECTIONS 11 Proposition 3.13. [24, Proposition 5.7] Let 1 ≤ e1 ≤ · · · ≤ em and 0 ≤ bi ≤ ei − 1 for i = 1, . . . , m be integers. If b0 ≥ 1, then ! m k+1 m X X Y (ei − bi ) − (k − 1) − b0 − (ei − bi ) ≥ bi ek+2 · · · em (3.5) i=1 i=1 i=k+2 for k = 0, . . . , m − 1, where ek+2 · · · em = 1 and We come to the main result of this paper. Pm i=k+2 bi = 0 if k = m − 1. Theorem 3.14. Let I ⊂ S be a graded ideal and let ≺ be a graded monomial order. If the initial ideal in≺ (I) is a complete intersection of height s−1 generated by tα2 , . . . , tαs , with di = deg(tαi ) and 1 ≤ di ≤ di+1 for i ≥ 2, then δI (d) ≥ fpI (d) ≥ 1 for d ≥ 1 and  s P   (di − 1) − 1,  (dk+2 − ℓ)dk+3 · · · ds if d ≤ i=2 fpI (d) = s P   if d ≥ (di − 1) ,  1 i=2 where 0 ≤ k ≤ s − 2 and ℓ are integers such that d = Pk+1 i=2 (di − 1) + ℓ and 1 ≤ ℓ ≤ dk+2 − 1. Proof. Let ta be any standard monomial Ps of S/I of degree d which is a zero-divisorPofs S/in≺ (I), a that is, t is in M≺,d . Thus d = i=1 ai , where a = (a1 , . . . , as ). We set r = i=2 (di − 1). Ps P If we substitute −ℓ = k+1 i=1 ai in the expression (dk+2 − ℓ)dk+3 · · · ds , it follows i=2 (di − 1) − that for d < r the inequality fpI (d) ≥ (dk+2 − ℓ)dk+3 · · · ds is equivalent to show that ! s k+2 X X a ai dk+3 · · · ds (di − ai ) − k − a1 − (3.6) deg(S/I) − deg(S/(in≺ (I), t )) ≥ i=2 ta i=k+3 Ps for any in M≺,d , where by convention i=k+3 ai = 0 and dk+3 · · · ds = 1 if k = s − 2. Recall that, by Proposition 3.12, one has that fpI (d) ≥ 1 for d ≥ 1. By Lemma 3.1, and by permuting variables and changing I, ≺, and ta accordingly, one has the following two cases to consider. Case (i): Assume that in≺ (I) = (td22 , . . . , tds s ) with 1 ≤ di ≤ di+1 for i ≥ 2. Then, as ta is in M≺,d , we can write ta = ta11 · · · tar r · · · tas s , r ≥ 2, ar ≥ 1, ai = 0 if 2 ≤ i < r, and ai ≤ di − 1 for i ≥ r. By Lemma 3.3 we get (3.7) deg(S/(in≺ (I), ta )) = d2 · · · ds − (d2 − a2 ) · · · (ds − as ) d2 −1 for any ta in M≺,d . If d ≥ r, setting tc = td−r · · · tds s −1 , one has tc ∈ M≺,d . Then, using 1 t2 c Eq. (3.7), it follows that deg(S/(in≺ (I), t )) = d2 · · · ds − 1. Thus fpI (d) ≤ 1 and equality dk+1 −1 ℓ fpI (d) = 1 holds. We may now assume d ≤ r − 1. Setting tb = td22 −1 · · · tk+1 tk+2 , one has b t ∈ M≺,d . Then, using Eq. (3.7), we get deg(S/(in≺ (I), tb )) = d2 · · · ds − (dk+2 − ℓ)dk+3 · · · ds . Hence fpI (d) ≤ (dk+2 − ℓ)dk+3 · · · ds . Next we show the reverse inequality by showing that the inequality of Eq. (3.6) holds for any ta ∈ M≺,d . By Eq. (3.7) it suffices to show that the following equivalent inequality holds ! s k+2 X X ai dk+3 · · · ds (di − ai ) − k − a1 − (d2 − a2 ) · · · (ds − as ) ≥ i=2 i=k+3 12 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL for any a = (a1 , . . . , as ) such that ta ∈ M≺,d . This inequality follows from Proposition 3.13 by making m = s − 1, ei = di+1 , bi = ai+1 for i = 1, . . . , s − 1 and b0 = 1 + a1 . c c d d p p+1 p+2 , tpp tp+1 Case (ii): Assume that in≺ (I) = (td12 , . . . , tp−1 , tp+2 , . . . , tds s ) for some p ≥ 1 such that 1 ≤ cp ≤ cp+1 and 1 ≤ di ≤ di+1 for all i, where dp+1 = cp + cp+1 . d −1 d−r+c −1 d c −1 p p p+1 p+2 If d ≥ r, setting tc = td12 −1 · · · tp−1 tp tp+1 tp+2 · · · tds s −1 , we get that tc ∈ M≺,d . Then, using the first formula of Lemma 3.4, it follows that deg(S/(in≺ (I), tc )) = d2 · · · ds − 1. Thus fpI (d) ≤ 1 and the equality fpI (d) = 1 holds. We may now assume d ≤ r − 1. The inequality fpI (d) ≤ (dk+2 − ℓ)dk+3 · · · ds follows from Lemma 3.4(B). To show that fpI (d) ≥ (dk+2 −ℓ)dk+3 · · · ds we need only show that the inequality of Eq. (3.6) holds for any ta in M≺,d . Take ta in M≺,d . Then we can write ta = ta11 · · · tas s with ai < di+1 for i < p and ai < di for i > p + 1. There are three subcases to consider. Subcase (ii.1): Assume ap ≥ cp . Then cp+1 > ap+1 because ta is a standard monomial of S/I, and by Lemma 3.4 we get deg(S/(in≺ (I), ta )) = d2 · · · ds − (cp+1 − ap+1 ) p−1 Y (di+1 − ai ) (cp+1 − ap+1 ) p−1 Y (di+1 − ai ) (di − ai ) i=p+2 i=1 ≥ s Y (di − ai ). i=p+2 i=1 Therefore the inequality of Eq. (3.6) is equivalent to s Y s k+2 X X (di − ai ) − k − a1 − ai i=2 i=k+3 ! dk+3 · · · ds , and this inequality follows at once from Proposition 3.13 by making m = s − 1, ei = di+1 for i = 1, . . . , m, bi = ai for P 1 ≤ i ≤ p − 1, Psbp = ap+1 + cp , bi = ai+1 for p < i ≤ m, and m b0 = ap − cp + 1. Notice that i=0 bi = 1 + i=1 ai . Subcase (ii.2): Assume ap < cp , ap+1 ≥ cp+1 . By Lemma 3.4 we get a deg(S/(in≺ (I), t )) = d2 · · · ds − (cp − ap ) p−1 Y (di+1 − ai ) (cp − ap ) p−1 Y (di+1 − ai ) (di − ai ) i=p+2 i=1 ≥ s Y (di − ai ). i=p+2 i=1 Therefore the inequality of Eq. (3.6) is equivalent to s Y s k+2 X X (di − ai ) − k − a1 − ai i=2 i=k+3 ! dk+3 · · · ds , and this inequality follows from Proposition 3.13 by making m = s−1, ei = di+1 for i = 1, . . . , m, bi = ai for 1P ≤ i ≤ p − 1, P bp = cp+1 + ap , bi = ai+1 for p < i ≤ m, and b0 = ap+1 − cp+1 + 1. m Notice that i=0 bi = 1 + si=1 ai . Subcase (ii.3): Assume ap < cp , ap+1 ≤ cp+1 − 1. By Lemma 3.4 we get a deg(S/(in≺ (I), t )) = d2 · · · ds − (dp+1 − ap − ap+1 ) p−1 Y i=1 (di+1 − ai ) s Y (di − ai ). i=p+2 COMPLETE INTERSECTIONS 13 Therefore the inequality of Eq. (3.6) is equivalent to (dp+1 − ap − ap+1 ) p−1 Y (di+1 − ai ) i=1 ≥ s Y (di − ai ) i=p+2 s k+2 X X (di − ai ) − k − a1 − ai i=2 i=k+3 ! dk+3 · · · ds , and this inequality follows from Proposition 3.13 by making m = s−1, ei = di+1 for i = 1, . . . , m, bi = ai forP1 ≤ i ≤ p − P 1, bp = ap + ap+1 , bi = ai+1 for p < i ≤ m, and b0 = 1. Notice that in s this case m b = 1 +  i i=0 i=1 ai . 4. Applications and examples This section is devoted to give some applications and examples of our main result. As the two most important applications to algebraic coding theory, we recover the formula for the minimum distance of an affine cartesian code [14, 21], and the fact that the homogenization of the corresponding vanishing ideal is a Geil–Carvalho ideal [5]. We begin with a basic application for complete intersections in P1 . Corollary 4.1. If X is a finite subset of P1 and I(X) is a complete intersection, then  |X| − d if 1 ≤ d ≤ |X| − 2, δI(X) (d) = fpI(X) (d) = 1 if d ≥ |X| − 1. Proof. Let f be the generator of I(X). In this case d2 = deg(f ) = |X| and reg(S/I(X)) = |X|− 1. By Proposition 2.5 and Theorem 3.14 one has δX (d) = δI(X) (d) ≥ fpI(X) (d) = |X| − d for 1 ≤ d ≤ |X| − 2, and δX (d) = 1 for d ≥ |X| − 1. Assume that 1 ≤ d ≤ |X| − 2. Pick [P1 ], . . . , [Pd ] points in P1 . By Lemma 2.7, the vanishing ideal I[Pi ] of [Pi ] is a principal ideal generated by a linear form hi . Notice that VX (hi ), the zero-set of hi in X, is equal to {[Pi ]}. Setting h = h1 · · · hd , we get a homogeneous polynomial of degree d with exactly d zeros. Thus δX (d) ≤ |X| − d.  As another application we get the following uniform upper bound for the number of zeroes of all polynomials f ∈ Sd that do not vanish at all points of X. Corollary 4.2. Let X be a finite subset of Ps−1 , let I(X) be its vanishing ideal, and let ≺ be a monomial order. If the initial ideal in≺ (I(X)) is a complete intersection generated by tα2 , . . . , tαs , with di = deg(tαi ) and 1 ≤ di ≤ di+1 for i ≥ 2, then (4.1) |VX (f )| ≤ deg(S/I(X)) − (dk+2 − ℓ) dk+3 · · · ds , for any f ∈ SdPthat does not vanish at all point of X, where 0 ≤ k ≤ s − 2 and ℓ are integers such that d = k+1 i=2 (di − 1) + ℓ and 1 ≤ ℓ ≤ dk+2 − 1. Proof. It follows from Corollary 2.6, Eq. (2.2), and Theorem 3.14.  We leave as an open question whether this uniform bound is optimal, that is, whether the equality is attained for some polynomial f . Another open question is whether Corollary 4.2 is true if we only assume that I(X) is a complete intersection. This is related to the following conjecture of Tohǎneanu and Van Tuyl. 14 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL Conjecture 4.3. [33, Conjecture 4.9] Let X be a finite set of points in Ps−1 . If I(X) is a complete intersection generated by f1 , . . . , fs−1 , with ei = deg(fi ) for i = 1, . . . , s − 1, and 2 ≤ ei ≤ ei+1 for all i, then δX (1) ≥ (e1 − 1)e2 · · · es−1 . Notice that by Corollary 4.2 this conjecture is true if in≺ (I(X)) is a complete intersection, and it is also true for s = 2 (see Corollary 4.1). Affine cartesian codes and coverings by hyperplanes. Given a collection of finite subsets A2 , . . . , As of a field K, we denote the image of X ∗ = A2 × · · · × As under the map As−1 7→ Ps−1 , x 7→ [(1, x)], by X = [1 × A2 × · · · × As ]. The affine Reed-Mullertype code CX∗ (d) of degree d is called an affine cartesian code [21]. The basic parameters of the projective Reed-Muller-type code CX (d) are equal to those of CX∗ (d) [22]. A formula for the minimum distance of an affine cartesian code is given in [21, Theorem 3.8] and in [14, Proposition 5]. A short and elegant proof of this formula was given by Carvalho in [5, Proposition 2.3], where he shows that the best way to study the minimum distance of an affine cartesian code is by using the footprint. As an application of Theorem 3.14 we also recover the formula for the minimum distance of an affine cartesian code by examining the underlying vanishing ideal and show that this ideal is Geil–Carvalho. Corollary 4.4. [5, 14, 21] Let K be a field and let CX (d) be the projective Reed-Muller type code of degree d on the finite set X = [1 × A2 × · · · × As ] ⊂ Ps−1 . If 1 ≤ di ≤ di+1 for i ≥ 2, with di = |Ai |, and d ≥ 1, then the minimum distance of CX (d) is given by  s P   (dk+2 − ℓ) dk+3 · · · ds if d ≤ (di − 1) − 1,  i=2 δX (d) = s P   1 if d ≥ (di − 1) ,  i=2 and I(X) is Geil–Carvalho, that is, δI(X) (d) = fpI(X) (d) for d ≥ 1, where k ≥ 0, ℓ are the unique P integers such that d = k+1 i=2 (di − 1) + ℓ and 1 ≤ ℓ ≤ dk+2 − 1. Proof.QLet ≻ be the reverse lexicographical order on S with t2 ≻ · · · ≻ ts ≻ t1 . Setting fi = γ∈Ai (ti − γt1 ) for i = 2, . . . , s, one has that f2 , . . . , fs is a Gröbner basis of I(X) whose initial ideal is generated by td22 , . . . , tds s (see [21, Proposition 2.5]). By Theorem 2.6 one has the equality δX (d) = δI(X) (d) for d ≥ 1. Thus the inequality “≥” follows at once from Theorem 3.14. This is the difficult part of the proof. The rest of the argument reduces to finding an appropriate polynomial f where equality occurs, and to using that the minimum distance δX (d) is 1 for d greater than or equal to reg(S/I(X)). P We set r = si=2 (di − 1). By Propositions 2.5 and 3.12, the regularity and the degree of S/I(X) are r and |X| = d2 · · · ds , respectively. Assume that d < r. To show the inequality “≤” notice that there is a polynomial f ∈ Sd which is a product of linear forms such that |VX (f )|, the number of zeros of f in X, is equal to d2 · · · ds − (dk+2 − ℓ)dk+3 · · · ds , see [21, p. 15]. Hence δX (d) is less than or equal to (dk+2 − ℓ)dk+3 · · · ds . Thus the required equality holds. If d ≥ r, by Proposition 2.5, δX (d) = 1 for d ≥ r. Therefore, by Theorem 3.14, I(X) is Geil–Carvalho.  COMPLETE INTERSECTIONS 15 The next result is an extension of a result of Alon and Füredi [1, Theorem 1] that can be applied to any finite subset of a projective space whose vanishing ideal has a complete intersection initial ideal relative to a graded monomial order. Corollary 4.5. Let X be a finite subset of a projective space Ps−1 and let ≺ be a monomial order such that in≺ (I(X)) is a complete intersection generated by tα2 , . . . , tαs , with di = deg(tαi ) and 1 ≤ di ≤ di+1 for all i. If the hyperplanes H1 , . . . , Hd in Ps−1 avoid P a point [P ] in X but otherwise cover all the other |X| − 1 points of X, then d ≥ reg(S/I(X)) = si=2 (di − 1). Proof. LetPh1 , . . . , hd be the linear forms in S1 that define H1 , . . . , Hd , respectively. Assume that d < si=2 (di − 1). Consider the polynomial h = h1 · · · hd . Notice that h ∈ / I(X) because h(P ) 6= 0, and h(Q) = 0 for all [Q] ∈ X with [Q] 6= [P ]. By Theorem 3.14, δX (d) ≥ fpI(X) (d) ≥ 2. Hence, h does not vanish in at least two points of X, a contradiction.  Example 4.6. Let S be the polynomial ring F3 [t1 , t4 , t3 , t2 ] with the lexicographical order t1 ≺ t4 ≺ t3 ≺ t2 , and let I = I(X) be the vanishing ideal of X = {[(1, 0, 0, 0)], [(1, 1, 1, 0)], [(1, −1, −1, 0)], [(1, 1, 0, 1)], [(1, −1, 1, 1)], [(1, 0, −1, 1)], [(1, −1, 0, −1)], [(1, 0, 1, −1)], [(1, 1, −1, −1)]}. Using the procedure below in Macaulay2 [17] and Theorem 3.14, we obtain the following information. The ideal I(X) is generated by t2 − t3 − t4 , t33 − t3 t21 , and t34 − t4 t21 . The regularity and the degree of S/I(X) are 4 and 9, respectively, and I(X) is a Geil–Carvalho ideal whose initial ideal is a complete intersection generated by t2 , t33 , t34 . The basic parameters of the ReedMuller-type code CX (d) are shown in the following table. d |X| HX (d) δX (d) fpI(X) (d) 1 9 3 6 6 2 9 6 3 3 3 9 8 2 2 4 9 9 1 1 By Corollary 4.5, if the hyperplanes H1 , . . . , Hd in P3 avoid a point [P ] in X but otherwise cover all the other |X| − 1 points of X, then d ≥ reg(S/I(X)) = 4. S=ZZ/3[t2,t3,t4,t1,MonomialOrder=>Lex]; I1=ideal(t2,t3,t4),I2=ideal(t4,t3-t1,t2-t1),I3=ideal(t4,t1+t3,t2+t1) I4=ideal(t4-t1,t4-t2,t3),I5=ideal(t4-t1,t3-t1,t2+t1),I6=ideal(t2,t1-t4,t3+t1) I7=ideal(t3,t1+t4,t1+t2),I8=ideal(t2,t4+t1,t3-t1),I9=ideal(t1+t4,t3+t1,t2-t1) I=intersect(I1,I2,I3,I4,I5,I6,I7,I8,I9) M=coker gens gb I, regularity M, degree M h=(d)->degree M - max apply(apply(apply(apply (toList (set(0..q-1))^**(hilbertFunction(d,M))-(set{0})^**(hilbertFunction(d,M)), toList),x->basis(d,M)*vector x),z->ideal(flatten entries z)), x-> if not quotient(I,x)==I then degree ideal(I,x) else 0)--this --gives the minimum distance in degree d apply(1..3,h) Example 4.7. Let S be the polynomial ring S = F3 [t1 , t2 , t3 ] with the lexicographical order t1 ≻ t2 ≻ t3 , and let I = I(X) be the vanishing ideal of X = {[(1, 1, 0)], [(1, −1, 0)], [(1, 0, 1)], [(1, 0, −1)], [(1, −1, −1)], [(1, 1, 1)]}. 16 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL As in Example 4.6, using Macaulay2 [17], we get that I(X) is generated by t22 t3 − t2 t23 , t21 − t22 + t2 t3 − t23 . The regularity and the degree of S/I(X) are 3 and 6, respectively, I is a Geil–Carvalho ideal, and in≺ (I) is a complete intersection generated by t22 t3 and t21 . The basic parameters of the Reed-Muller-type code CX (d) are shown in the following table. d |X| HX (d) δX (d) fpI(X) (d) 1 6 3 3 3 2 6 5 2 2 3 6 6 1 1 By Corollary 4.5, if the hyperplanes H1 , . . . , Hd in P2 avoid a point [P ] in X but otherwise cover all the other |X| − 1 points of X, then d ≥ reg(S/I(X)) = 3. Next we give an example of a graded vanishing ideal over a finite field, which is not Geil– Carvalho, by computing all possible initial ideals. Example 4.8. Let X = P2 be the projective space over the field F2 and let I = I(X) be the vanishing ideal of X. Using the procedure below in Macaulay2 [17] we get that the binomials t1 t22 −t21 t2 , t1 t23 −t21 t3 , t2 t23 −t22 t3 form a universal Gröbner basis of I, that is, they form a Gröbner basis for any monomial order. The ideal I has exactly six different initial ideals and δX 6= fpI for each of them, that is, I is not a Geil–Carvalho ideal. The basic parameters of the projective Reed-Muller code CX (d) are shown in the following table. d |X| HX (d) δX (d) fpI(X) (d) 1 7 3 4 4 2 7 6 2 1 3 7 7 1 1 load "gfaninterface.m2" S=ZZ/2[symbol t1, symbol t2, symbol t3] I=ideal(t1*t2^2-t1^2*t2,t1*t3^2-t1^2*t3,t2*t3^2-t2^2*t3) universalGroebnerBasis(I) (InL,L)= gfan I, #InL init=ideal(InL_0) M=coker gens gb init f=(x)-> if not quotient(init,x)==init then degree ideal(init,x) else 0 fp=(d) ->degree M -max apply(flatten entries basis(d,M),f) apply(1..regularity(M),fp) Acknowledgments. We thank the referee for a careful reading of the paper and for the improvements suggested. References [1] N. Alon and Z. Füredi, Covering the cube by affine hyperplanes, European J. Combin. 14 (1993), 79–83. [2] M. F. Atiyah and I. G. Macdonald, Introduction to Commutative Algebra, Addison-Wesley, Reading, MA, 1969. COMPLETE INTERSECTIONS 17 [3] A. Bishnoi, P. L. Clark, A. Potukuchi and J. R. Schmitt, On zeros of a polynomial in a finite grid, Combin. Probab. Comput., to appear. [4] A. Bishnoi, P. L. Clark, A. Potukuchi and J. R. Schmitt, On the Alon-Füredi bound, Electron. Notes Discrete Math. 54 (2016), 57–62. [5] C. Carvalho, On the second Hamming weight of some Reed-Muller type codes, Finite Fields Appl. 24 (2013), 88–94. [6] M. Chardin and G. Moreno-Socı́as, Regularity of lex-segment ideals: some closed formulas and applications, Proc. Amer. Math. Soc. 131 (2003), no. 4, 1093–1102 (electronic). [7] CoCoATeam, CoCoA: a system for doing Computations in Commutative Algebra. Available at http://cocoa.dima.unige.it. [8] D. Cox, J. Little and D. O’Shea, Ideals, Varieties, and Algorithms, Springer-Verlag, 1992. [9] P. Delsarte, J. M. Goethals and F. J. MacWilliams, On generalized Reed-Muller codes and their relatives, Information and Control 16 (1970), 403–442. [10] I. M. Duursma, C. Renterı́a and H. Tapia-Recillas, Reed-Muller codes on complete intersections, Appl. Algebra Engrg. Comm. Comput. 11 (2001), no. 6, 455–462. [11] D. Eisenbud, Commutative Algebra with a view toward Algebraic Geometry, Graduate Texts in Mathematics 150, Springer-Verlag, 1995. [12] W. Fulton, Algebraic curves, Advanced Book Classics, Addison-Wesley Publishing Company, Advanced Book Program, Redwood City, CA, 1989, An introduction to algebraic geometry, Notes written with the collaboration of Richard Weiss, Reprint of 1969 original. [13] O. Geil, On the second weight of generalized Reed-Muller codes, Des. Codes Cryptogr. 48 (2008), 323–330. [14] O. Geil and C. Thomsen, Weighted Reed–Muller codes revisited, Des. Codes Cryptogr. 66 (2013), 195–220. [15] L. Gold, J. Little and H. Schenck, Cayley-Bacharach and evaluation codes on complete intersections, J. Pure Appl. Algebra 196 (2005), no. 1, 91–99. [16] M. González-Sarabia, C. Renterı́a and H. Tapia-Recillas, Reed-Muller-type codes over the Segre variety, Finite Fields Appl. 8 (2002), no. 4, 511–518. [17] D. Grayson and M. Stillman, Macaulay2, 1996. Available via anonymous ftp from math.uiuc.edu. [18] G. M. Greuel and G. Pfister, A Singular Introduction to Commutative Algebra, 2nd extended edition, Springer, Berlin, 2008. [19] J. Harris, Algebraic Geometry. A first course, Graduate Texts in Mathematics 133, Springer-Verlag, New York, 1992. [20] M. Kreuzer and L. Robbiano, Computational Commutative Algebra 2, Springer-Verlag, Berlin, 2005. [21] H. H. López, C. Renterı́a and R. H. Villarreal, Affine cartesian codes, Des. Codes Cryptogr. 71 (2014), no. 1, 5–19. [22] H. H. López, E. Sarmiento, M. Vaz Pinto and R. H. Villarreal, Parameterized affine codes, Studia Sci. Math. Hungar. 49 (2012), no. 3, 406–418. [23] F. J. MacWilliams and N. J. A. Sloane, The Theory of Error-correcting Codes, North-Holland, 1977. [24] J. Martı́nez-Bernal, Y. Pitones and R. H. Villarreal, Minimum distance functions of graded ideals and ReedMuller-type codes, J. Pure Appl. Algebra 221 (2017), 251–275. [25] J. C. Migliore, Introduction to liaison theory and Deficiency Modules, Progress in Mathematics 165, Birkhäuser Boston, Inc., Boston, MA, 1998. [26] C. Renterı́a, A. Simis and R. H. Villarreal, Algebraic methods for parameterized codes and invariants of vanishing ideals over finite fields, Finite Fields Appl. 17 (2011), no. 1, 81–104. [27] SAGE Mathematical Software, http://www.sagemath.org. [28] M. Sala, T. Mora, L. Perret, S. Sakata and C. Traverso (eds.), Gröbner Bases, Coding, and Cryptography, RISC Book Series, Springer, Heidelberg, 2009. [29] E. Sarmiento, M. Vaz Pinto and R. H. Villarreal, The minimum distance of parameterized codes on projective tori, Appl. Algebra Engrg. Comm. Comput. 22 (2011), no. 4, 249–264. [30] W. M. Schmidt, Equations over finite fields, An elementary approach, Lecture Notes in Mathematics 536, Springer-Verlag, Berlin-New York, 1976. [31] A. Sørensen, Projective Reed-Muller codes, IEEE Trans. Inform. Theory 37 (1991), no. 6, 1567–1576. [32] R. Stanley, Hilbert functions of graded algebras, Adv. Math. 28 (1978), 57–83. [33] S. Tohǎneanu and A. Van Tuyl, Bounding invariants of fat points using a coding theory construction, J. Pure Appl. Algebra 217 (2013), no. 2, 269–279. [34] M. Tsfasman, S. Vladut and D. Nogin, Algebraic geometric codes: basic notions, Mathematical Surveys and Monographs 139, American Mathematical Society, Providence, RI, 2007. 18 JOSÉ MARTÍNEZ-BERNAL, YURIKO PITONES, AND RAFAEL H. VILLARREAL [35] R. H. Villarreal, Monomial Algebras, Second Edition, Monographs and Research Notes in Mathematics, Chapman and Hall/CRC, 2015. [36] W. Vogel, Lectures on results on Bezout’s theorem, Tata Institute of Fundamental Research Lectures on Mathematics and Physics 74, Springer-Verlag, Berlin, 1984. Departamento de Matemáticas, Centro de Investigación y de Estudios Avanzados del IPN, Apartado Postal 14–740, 07000 Mexico City, D.F. E-mail address: [email protected] Departamento de Matemáticas, Centro de Investigación y de Estudios Avanzados del IPN, Apartado Postal 14–740, 07000 Mexico City, D.F. E-mail address: [email protected] Departamento de Matemáticas, Centro de Investigación y de Estudios Avanzados del IPN, Apartado Postal 14–740, 07000 Mexico City, D.F. E-mail address: [email protected]
7cs.IT
arXiv:1604.00795v1 [math.AC] 4 Apr 2016 Méthodes Matricielles Introduction à la Complexité Algébrique ABDELJAOUED Jounaı̈di Maı̂tre Assistant Université de Tunis LOMBARDI Henri Maı̂tre de Conférences Université de Franche-Comté, Besançon Version mise à jour en, avril 2012 Avant-Propos L’algèbre linéaire nous a semblé être le terrain idéal pour une introduction simple et pédagogique aux outils modernes de la complexité algébrique développés durant les trois dernières décennies. Le tournant en matière de complexité algébrique en algèbre linéaire fut la découverte par Strassen [86], en 1969, d’un fait d’une simplicité déconcertante, mais d’une portée considérable, à savoir que la multiplication de deux matrices carrées d’ordre deux pouvait se faire avec seulement sept multiplications (non commutatives) au lieu de huit dans l’anneau de base. Ce qui ramenait la complexité asymptotique de la multiplication de deux matrices carrées d’ordre n à O(nlog2 7 ) au lieu de O(n3 ) et faisait descendre pour la première fois l’exposant de n audessous de 3, alors que les recherches antérieures n’avaient réussi qu’à réduire le coefficient de n3 dans le nombre d’opérations arithmétiques nécessaires pour calculer le produit de deux matrices carrées d’ordre n (cf. [18]). Depuis, de nombreux outils ont été développés. Des notions nouvelles sont apparues comme celles de complexité bilinéaire et de rang tensoriel utilisées de manière intensive notamment par Bini, Pan, Schönhage, Strassen, Winograd et d’autres (cf. [7, 8, 19, Pan, 82, 90]) pour réduire l’exposant α : à l’heure actuelle, on sait que α < 2, 376. Il est cependant conjecturé que la borne inférieure des exposants α acceptables serait 2, c’est-à-dire que pour tout ε > 0 le produit de deux matrices carrées d’ordre n pourrait être calculé par un circuit arithmétique de taille O(n2+ε ) et de profondeur O(log n). Cependant ces méthodes, d’un intérêt théorique certain, sont à l’heure actuelle inapplicables à cause notamment de la constante démesurée que le (( grand O )) cache (cf. [Knu] § 4.6.4). Par contre la méthode de Strassen a pu trouver une implémentation concrète [14], et elle commence à battre la multiplication usuelle (dite conventionnelle) à partir de n = 70. ii Avant-Propos Le calcul parallèle est une technique, en plein développement, qui distribue un calcul à faire sur un grand nombre de processeurs travaillant au même moment, en parallèle. Pour la multiplication rapide de matrices carrées, si le nombre de processeurs disponibles est suffisamment grand (de l’ordre de O(nα )), le temps de calcul est alors extrêmement faible (de l’ordre de O(log n) pour des matrices sur un corps fini). La multiplication rapide des matrices carrées a de nombreuses applications en algèbre linéaire sur les corps, par exemple l’inversion d’une matrice carrée peut se faire en O(nα ) avec le même exposant. Cependant, contrairement à la multiplication rapide des matrices, ces algorithmes ne sont pas bien adaptés au calcul parallèle. Ainsi l’agorithme d’inversion d’une matrice carrée auquel on vient de faire allusion, et que nous étudierons dans la section 8.2, ne voit jamais son temps de calcul descendre en dessous d’un O(n log n). C’est sur la base de résultats parfois anciens qu’on a pu exhiber, en algèbre linéaire, des algorithmes bien adaptés au calcul parallèle, s’appuyant sur la multiplication rapide des matrices. Ces algorithmes sont en outre des algorithmes sans divisions (ou presque) et s’appliquent donc à des anneaux commutatifs. C’est le cas en particulier de la méthode développée en 1847 par l’astronome français Le Verrier améliorée, un siècle plus tard, par Souriau, Frame et Faddeev qui l’utilisent pour le calcul des déterminants, du polynôme caractéristique, pour l’inversion des matrices, et pour la résolution des systèmes linéaires. Cette méthode s’est avérée porteuse d’un algorithme très bien adapté au calcul parallèle, dû à Csanky, qui en 1976 a construit, dans le cas d’un anneau commutatif contenant le corps des rationnels, une famille de circuits arithmétiques, pour calculer en O(log2 n) étapes parallèles les coefficients du polynôme caractéristique. Une autre méthode, dite de partitionnement ([Gas] pp. 291–298) et attribuée à Samuelson [79] (1942), a eu un regain d’intérêt avec l’algorithme de Berkowitz [6], qui fournit un calcul rapide, parallèle et sans division, du polynôme caractéristique. Cet algorithme a permis de généraliser aux anneaux commutatifs arbitraires le résultat de Csanky concernant la complexité parallèle, par une voie tout à fait différente. Nous en présenterons une version parallèle améliorée (section 10.2). La version séquentielle la plus simple de l’algorithme de Berkowitz n’utilise pas de produits de matrices mais seulement des produits d’une Avant-Propos iii matrice par un vecteur. Elle s’est avérée tout à fait efficace sur les ordinateurs usuels, et particulièrement bien adaptée au cas des matrices creuses. Nous présentons dans cet ouvrage les principaux algorithmes en algèbre linéaire, et donnons plus particulièrement un aperçu détaillé des différentes méthodes utilisées pour le calcul du polynôme caractéristique, avec des résultats récents. L’intérêt porté au polynôme caractéristique d’une matrice est justifié par le fait que la détermination de ses coefficients suffit à connaı̂tre le déterminant de cette matrice et à calculer son adjointe. Dans le cas des corps cela permet de calculer son inverse et de résoudre les systèmes d’équations linéaires. Il réside également dans les renseignements que cela donne sur une forme quadratique, comme par exemple sa signature dans le cas du corps des réels. Plan de l’ouvrage Nous faisons quelques rappels d’algèbre linéaire dans le chapitre 1. Le chapitre 2 contient quelques méthodes classiques couramment utilisées pour le calcul du polynôme caractéristique : l’algorithme de Jordan-Bareiss, la méthode de Hessenberg, la méthode d’interpolation de Lagrange, l’algorithme de Le Verrier et son amélioration par SouriauFaddeev-Frame, la méthode de Samuelson modifiée à la Berkowitz, en général la plus efficace, la méthode de Chistov qui a des performances voisines, et enfin des méthodes reliées aux suites récurrentes linéaires, les plus efficaces sur les corps finis. Le chapitre 3 développe le formalisme des circuits arithmétiques (ou programmes d’évaluation) pour une description formelle des calculs algébriques. Nous y expliquons la technique importante d’élimination des divisions, elle aussi inventée par Strassen. Dans le chapitre 4 nous donnons un aperçu des principales notions de complexité les plus couramment utilisées. Ces notions constituent une tentative de théoriser les calculs sur ordinateur, leur temps d’exécution et l’espace mémoire qu’ils occupent. Dans le chapitre 5 nous expliquons la stratégie générale (( diviser pour gagner )), bien adaptée au calcul parallèle. Nous donnons quelques exemples de base. Le chapitre 6 est consacré à la multiplication rapide des polynômes, avec la méthode de Karatsuba et la Transformée de Fourier Discrète. iv Avant-Propos Le chapitre 7 est consacré à la multiplication rapide des matrices. Nous y abordons notamment les notions fondamentales de complexité bilinéaire, de rang tensoriel et de calculs bilinéaires approximatifs. Le chapitre 8 est consacré à des algorithmes dans lesquels intervient la multiplication rapide des matrices, mais sans que l’ensemble de l’algorithme soit bien adapté au calcul parallèle. On obtient ainsi en général les procédures les plus rapides connues en ce qui concerne le temps séquentiel asymptotique, pour la plupart des problèmes classiques liés à l’algèbre linéaire. Ces performances sont en général obtenues uniquement sur les corps. Seule la dernière section du chapitre, consacrée à l’algorithme de Kaltofen-Wiedemann concerne le calcul sur un anneau commutatif arbitraire. Le chapitre 9 présente les parallélisations de la méthode de Le Verrier, qui s’appliquent dans tout anneau commutatif où les entiers sont non diviseurs de zéro et où la division par un entier, quand elle est possible, est explicite. Le chapitre 10 est consacré aux méthodes parallèles de Chistov et de Berkowitz qui s’appliquent en toute généralité. Le chapitre 11 présente tout d’abord quelques tableaux récapitulatifs des complexités des différents algorithmes étudiés, séquentiels ou parallèles, pour le calcul du déterminant et celui du polynôme caractéristique. Nous donnons ensuite les résultats des tests expérimentaux concernant quelques méthodes séquentielles du calcul du polynôme caractéristique. Ces résultats montrent des performances supérieures pour les algorithmes de Chistov et de Berkowitz avec un léger avantage pour ce dernier. Les deux derniers chapitres sont consacrés aux travaux de Valiant sur un analogue algébrique de la conjecture P = 6 N P, dans lesquels le déterminant et le permanent occupent une place centrale. Bien qu’on ait très peu d’idées sur la manière de résoudre la conjecture de Valiant VP 6= VN P, celle-ci semble quand même moins hors de portée que la conjecture algorithmique dont elle s’inspire. L’annexe contient les codes Maple des algorithmes expérimentés. Nous avons choisi le logiciel de Calcul Formel Maple essentiellement pour des raisons de commodité. Le langage de programmation qui lui est rattaché est proche de celui de nombreux autres langages classiques, permettant de définir et de présenter de manière lisible et efficace les algorithmes considérés. Les autres langages de calcul formel généralistes auraient pu aussi bien faire l’affaire. Il n’y aura d’ailleurs aucun mal à Avant-Propos v implémenter dans un de ces langages les algorithmes présentés dans ce livre. Une liste récapitulative en est donnée dans la table page 355. L’esprit dans lequel est écrit cet ouvrage Nous avons en général donné des preuves complètes de nos résultats, en accordant une grande place aux exemples. Mais il nous est aussi arrivé de ne donner qu’une idée de la preuve, ou de ne la donner complètement que sur un exemple, ou de renvoyer à une référence. Nous assumons très consciemment ce que nous avons sacrifié de la rigueur formelle au profit de la compréhension de (( ce qui se passe )). Nous avons essayé de donner dessins et figures pour illustrer notre texte, tout en ayant conscience d’en avoir fait bien trop peu. Nous avons aussi essayé de rapprocher cet exposé de la pratique concrète des algorithmes, en développant chaque fois que nous l’avons pu des calculs de complexité dans lesquels nous explicitons les constantes (( cachées dans le grand O )), sans la connaissance desquelles les résultats théoriques n’ont pas de réelle portée pratique, et peuvent être trompeurs. Le niveau requis pour lire ce livre est seulement une bonne familiarité avec l’algèbre linéaire. Le mieux serait évidemment d’avoir lu auparavant cette perle rare qu’est le livre de Gantmacher [Gan]. On peut recommander aussi le grand classique (toujours disponible) [LT] de Lancaster & Tismenetsky. Il est naturellement préférable, mais pas indispensable, d’avoir une idée des concepts de base de la complexité binaire pour lesquels nous recommandons les ouvrages [BDG] et [Ste]. Enfin, sur les algorithmes en général, si vous n’avez pas lu le livre de Knuth [Knu] parce que vous comprenez mal l’anglais ou que vous êtes plutôt habitués à la langue de Voltaire, avant même de commencer la lecture de notre ouvrage, écrivez une lettre à tous les éditeurs scientifiques en leur demandant par quelle aberration la traduction en français n’a pas encore été faite. Pour aller au delà en Calcul Formel nous recommandons les livres de von zur Gathen & Gerhard [GG], Bini & Pan [BP], Bürgisser, Clausen & Shokrollahi [BCS], Bürgisser [Bur] et le Handbook of Computer Algebra [GKW]. Nous espérons que notre livre contribuera à mieux faire saisir l’importance de la complexité algébrique à un moment où les mathématiques constructives et les solutions algorithmiques se développent de manière rapide et commencent à occuper de plus en plus une place essentielle vi Avant-Propos dans l’enseignement des Mathématiques, de l’Informatique et des Sciences de l’ingénieur. Remerciements Nous remercions Marie-Françoise Roy et Gilles Villard pour leur relecture attentive et leurs suggestions pertinentes, ainsi que Peter Bürgisser pour son aide concernant les deux derniers chapitres. Et enfin François Pétiard qui nous a fait bénéficier avec une patience infinie de son expertise en LaTeX. Table des matières Avant-Propos i Table des matières : vous y êtes ! vii 1 Rappels d’algèbre linéaire 1.1 Quelques propriétés générales . . . . . . . . . . . . 1.1.1 Notations . . . . . . . . . . . . . . . . . . . 1.1.2 Formule de Binet-Cauchy . . . . . . . . . . 1.1.3 Rang, déterminant et identités de Cramer . 1.1.4 Identités de Sylvester . . . . . . . . . . . . 1.2 Polynôme caractéristique . . . . . . . . . . . . . . 1.2.1 Matrice caractéristique adjointe . . . . . . . 1.2.2 Formule de Samuelson . . . . . . . . . . . . 1.2.3 Valeurs propres de f (A) . . . . . . . . . . . 1.3 Polynôme minimal . . . . . . . . . . . . . . . . . . 1.3.1 Sous-espaces de Krylov . . . . . . . . . . . 1.3.2 Cas de matrices à coefficients dans Z. . . . 1.4 Suites récurrentes linéaires . . . . . . . . . . . . . . 1.4.1 Polynôme générateur, opérateur de décalage 1.4.2 Matrices de Hankel . . . . . . . . . . . . . . 1.5 Polynômes symétriques et relations de Newton . . 1.6 Inégalité de Hadamard et calcul modulaire . . . . . 1.6.1 Normes matricielles . . . . . . . . . . . . . 1.6.2 Théorème chinois et applications . . . . . . 1.7 Résolution uniforme des systèmes linéaires . . . . 1.7.1 L’inverse de Moore-Penrose . . . . . . . . . 1.7.2 Généralisation sur un corps arbitraire . . . 1 1 1 4 5 9 10 11 13 14 16 16 20 21 21 23 25 30 30 32 34 35 42 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . viii Table des matières 2 Algorithmes de base en algèbre linéaire 2.1 Méthode du pivot de Gauss . . . . . . . . . . . 2.1.1 Transformations élémentaires . . . . . . 2.1.2 La LU - décomposition . . . . . . . . . . 2.1.3 Recherche de pivot non nul . . . . . . . 2.2 Méthode de Jordan-Bareiss . . . . . . . . . . . 2.2.1 Formule de Dodgson-Jordan-Bareiss . . 2.2.2 Méthode de Jordan-Bareiss modifiée . . 2.2.3 La méthode de Dodgson . . . . . . . . 2.3 Méthode de Hessenberg . . . . . . . . . . . . . 2.4 Méthode d’interpolation de Lagrange . . . . . . 2.5 Méthode de Le Verrier et variantes . . . . . . . 2.5.1 Le principe général . . . . . . . . . . . . 2.5.2 Méthode de Souriau-Faddeev-Frame . . 2.5.3 Méthode de Preparata & Sarwate . . . . 2.6 Méthode de Samuelson-Berkowitz . . . . . . . . 2.6.1 Principe général de l’algorithme . . . . 2.6.2 Version séquentielle . . . . . . . . . . . 2.7 Méthode de Chistov . . . . . . . . . . . . . . . 2.7.1 Le principe général . . . . . . . . . . . . 2.7.2 La version séquentielle . . . . . . . . . 2.8 Méthodes reliées aux suites récurrentes linéaires 2.8.1 L’algorithme de Frobenius . . . . . . . . 2.8.2 Algorithme de Berlekamp/Massey . . . 2.8.3 Méthode de Wiedemann . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Circuits arithmétiques 3.1 Circuits arithmétiques et programmes d’évaluation 3.1.1 Quelques définitions . . . . . . . . . . . . . 3.1.2 Circuit arithmétique vu comme un graphe . 3.1.3 Circuits arithmétiques homogènes . . . . . 3.1.4 Le problème des divisions . . . . . . . . . . 3.2 Élimination des divisions à la Strassen . . . . . . . 3.2.1 Le principe général . . . . . . . . . . . . . . 3.2.2 Coût de l’élimination des divisions . . . . . 3.3 Calcul des dérivées partielles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 53 53 56 62 65 66 70 71 74 81 82 82 84 88 90 90 91 93 93 95 97 98 108 109 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 . 112 . 112 . 116 . 118 . 119 . 120 . 121 . 125 . 126 Table des matières ix 4 Notions de complexité 4.1 Machines de Turing et Machines à Accès Direct . 4.2 Complexité binaire, les classes P, N P et #P . . 4.2.1 Calculs faisables . . . . . . . . . . . . . . 4.2.2 Quand les solutions sont faciles à tester . 4.2.3 Problèmes de comptage . . . . . . . . . . 4.3 Complexités arithmétique et binaire . . . . . . . 4.3.1 Complexité arithmétique . . . . . . . . . 4.3.2 Complexité binaire . . . . . . . . . . . . . 4.4 Familles uniformes de circuits . . . . . . . . . . . 4.5 Machines parallèles à accès direct . . . . . . . . . 4.5.1 Une idéalisation des calculs parallèles . . 4.5.2 PRAM-complexité et Processeur-efficacité 4.5.3 Le principe de Brent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 . 129 . 134 . 134 . 135 . 141 . 142 . 142 . 143 . 149 . 151 . 152 . 153 . 156 5 Diviser pour gagner 159 5.1 Le principe général . . . . . . . . . . . . . . . . . . . . . . 159 5.2 Circuit binaire équilibré . . . . . . . . . . . . . . . . . . . 162 5.3 Calcul parallèle des préfixes . . . . . . . . . . . . . . . . . 163 6 Multiplication rapide des polynômes 6.1 Méthode de Karatsuba . . . . . . . . . . . . . . 6.2 Transformation de Fourier discrète usuelle . . . 6.3 Transformation de Fourier discrète rapide . . . 6.3.1 Cas favorable . . . . . . . . . . . . . . . 6.3.2 Cas d’un anneau commutatif arbitraire 6.4 Produits de matrices de Toeplitz . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171 . 172 . 175 . 177 . 177 . 180 . 183 7 Multiplication rapide des matrices 185 7.1 Analyse de la méthode de Strassen . . . . . . . . . . . . . 187 7.1.1 La méthode et sa complexité . . . . . . . . . . . . 187 7.1.2 Une famille uniforme de circuits arithmétiques . . 191 7.2 Inversion des matrices triangulaires . . . . . . . . . . . . . 195 7.3 Complexité bilinéaire . . . . . . . . . . . . . . . . . . . . . 197 7.3.1 Rang tensoriel d’une application bilinéaire . . . . . 198 7.3.2 Exposant de la multiplication des matrices carrées 204 7.3.3 Complexités bilinéaire et multiplicative . . . . . . 205 7.3.4 Extension du corps de base . . . . . . . . . . . . . 207 7.4 Calculs bilinéaires approximatifs . . . . . . . . . . . . . . 209 7.4.1 Méthode de Bini . . . . . . . . . . . . . . . . . . . 209 x Table des matières 7.4.2 7.4.3 7.4.4 Une amélioration décisive de Schönhage . . . . . . 215 Sommes directes d’applications bilinéaires . . . . 221 L’inégalité asymptotique de Schönhage . . . . . . . 225 8 Algèbre linéaire séquentielle rapide 8.1 L’Algorithme de Bunch & Hopcroft . 8.2 Calcul du déterminant et de l’inverse 8.3 Forme réduite échelonnée en lignes . 8.4 Méthode de Keller-Gehrig . . . . . . 8.5 Méthode de Kaltofen-Wiedemann . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229 231 235 236 243 245 9 Parallélisations de la méthode de Leverrier 255 9.1 Algorithme de Csanky . . . . . . . . . . . . . . . . . . . . 255 9.2 Amélioration de Preparata et Sarwate . . . . . . . . . . . 259 9.3 Amélioration de Galil et Pan . . . . . . . . . . . . . . . . 266 10 Polynôme caractéristique sur un anneau arbitraire 10.1 Méthode générale de parallélisation . . . . . . . . . . 10.2 Algorithme de Berkowitz amélioré . . . . . . . . . . 10.3 Méthode de Chistov . . . . . . . . . . . . . . . . . . 10.4 Applications des algorithmes . . . . . . . . . . . . . . . . . . . . . . . . . 271 271 272 283 287 11 Résultats expérimentaux 11.1 Tableaux récapitulatifs des complexités . . . . . . . . . . 11.2 Présentation des tests . . . . . . . . . . . . . . . . . . . 11.3 Tableaux de Comparaison . . . . . . . . . . . . . . . . . 291 . 291 . 295 . 296 12 Le déterminant et les expressions arithmétiques 12.1 Expressions, circuits et descriptions . . . . . . . . . 12.2 Parallélisation des expressions et des circuits . . . 12.3 La plupart des polynômes sont difficiles à évaluer . 12.4 Le caractère universel du déterminant . . . . . . . . . . . . . . . . . . . . . . . 13 Le permanent et la conjecture P = 6 NP 13.1 Familles d’expressions et de circuits booléens . . . . . . 13.2 Booléen versus algébrique . . . . . . . . . . . . . . . . . 13.2.1 Évaluation booléenne des circuits arithmétiques 13.2.2 Simulation algébrique des circuits et expressions booléennes . . . . . . . . . . . . . . . . . . . . . 13.2.3 Formes algébriques déployées . . . . . . . . . . . 13.3 Complexité binaire versus complexité booléenne . . . . 303 303 309 313 315 321 . 321 . 328 . 328 . 330 . 333 . 335 Table des matières xi 13.4 Le caractère universel du permanent . . . . . . . . . . . . 339 13.5 La conjecture de Valiant . . . . . . . . . . . . . . . . . . . 340 Annexe : codes Maple Tables, bibliographie, index. Liste des algorithmes, circuits Liste des Figures . . . . . . . Bibliographie . . . . . . . . . Index des notations . . . . . . Index des termes . . . . . . . 343 et programmes d’évaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 355 357 359 371 371 1. Rappels d’algèbre linéaire Introduction Ce chapitre est consacré à des rappels d’algèbre linéaire insistant sur quelques identités algébriques liées aux déterminants et polynômes caractéristiques. Notre but est double. D’une part fixer les notations et donner les formules qui justifieront les algorithmes de calcul de ces objets. D’autre part, donner une idée de l’étendue des applications qui pourront être tirées de ces calculs. La section 1.1 fixe les notations et rappelle la formule de BinetCauchy ainsi que les identités de Cramer et de Sylvester. La section 1.2 est consacrée au polynôme caractéristique et à la formule de Samuelson. Dans la section 1.3 nous étudions le polynôme minimal et les sous-espaces de Krylov. La section 1.4 est consacrée aux suites récurrentes linéaires. Nous rappelons les identités liées aux sommes de Newton dans la section 1.5. La section 1.6 aborde les méthodes du calcul modulaire. Enfin la section 1.7 est consacrée à l’inverse de Moore-Penrose et à ses généralisations. 1.1 1.1.1 Quelques propriétés générales Notations Dans cet ouvrage A est un anneau commutatif et unitaire 1 et K un corps commutatif. Pour deux entiers positifs quelconques m et n, Am×n désigne l’ensemble des matrices de m lignes et n colonnes à coefficients dans A. 1. Si A n’est pas unitaire, on peut toujours le plonger dans un anneau avec unité (cf. [Jac]). 2 1. Rappels d’algèbre linéaire Soit A = (aij ) ∈ An×n une matrice carrée d’ordre n ≥ 2 à coefficients dans A et soit un entier r (1 ≤ r ≤ n). On adopte les notations suivantes : – Ir est la matrice unité d’ordre r. – det(A) désigne le déterminant de A : par définition, c’est le polynôme en les aij défini par la même formule que dans le cas d’une matrice à coefficients dans un corps, autrement dit det(A) est donné par : n X Y det(A) = ε(σ) ai,σ(i) σ i=1 où σ parcourt l’ensemble des permutations de l’ensemble d’indices {1, . . . , n} et où ε(σ) est la signature de la permutation σ. Lorsque cela ne prête pas à confusion, nous noterons parfois |A| au lieu de det(A) le déterminant de A . – Tr(A) est la trace de A, c’est-à-dire la somme de ses éléments diagonaux. – La comatrice de A est la matrice (dij )1≤i,j≤n où chaque dij est le cofacteur de l’élément en position (i, j) dans A, c’est-à-dire dij = (−1)i+j det(Bij ) où Bij est la matrice obtenue à partir de A en supprimant la i - ème ligne et la j - ème colonne. – On a alors les formules de développement de det(A) (suivant la i - ème ligne ou suivant la j - ème colonne) valables sur un anneau commutatif arbitraire : det(A) = n X k=1 aik dik = n X akj dkj (1 ≤ i, j ≤ n) . k=1 – Adj(A) désigne la matrice adjointe de A. C’est la transposée de la comatrice de A. Rappelons qu’elle vérifie la double égalité : A Adj(A) = Adj(A) A = det(A) In . (1.1) Maintenant A = (aij ) ∈ Am×n désigne une matrice quelconque à coefficients dans A et r un entier ∈ {1, . . . , min(m, n)}. – Un mineur d’ordre r de A est le déterminant d’une matrice carrée extraite de A en supprimant m − r lignes et n − r colonnes. 1.1. Quelques propriétés générales 3 – Ai..j,h..k désigne la matrice extraite de A sur les lignes de i à j et sur les colonnes de h à k (i ≤ j ≤ m, h ≤ k ≤ n). Si j − i = k − h on note ah..k i..j = det(Ai..j,h..k ) le mineur correspondant. – Plus généralement, si α = {α1 , . . . , αr } avec 1 ≤ α1 < · · · < αr ≤ m et β = {β1 , . . . , βs } avec 1 ≤ β1 < · · · < βs ≤ n on notera Aα,β la matrice extraite de A sur les lignes (resp. les colonnes) dont les indices sont en ordre croissant dans α (resp. dans β). – Les sous-matrices principales sont les sous-matrices dont la diagonale principale est extraite de celle de A. On appellera mineurs principaux de A les déterminants des sous-matrices principales de A. Comme cas particulier, Ar désigne la sous-matrice A1..r,1..r : nous dirons que c’est une sous-matrice principale dominante de A. Son déterminant est appelé un mineur principal dominant. – Ai,h..k = (aih , . . . , aik ) = Ai..i,h..k est la matrice-ligne extraite de la i - ème ligne de A sur les colonnes de h à k. On pose de même Ai..j,h = t (aih , . . . , ajh ) = Ai..j,h..h . Ar A1..r,j (r) – On définit a ij = pour tous entiers r, i, j tels Ai,1..r aij que 1 ≤ r ≤ min(m, n) − 1 et r < i ≤ m, r < j ≤ n, le mineur d’ordre r + 1 de A obtenu en bordant la sous-matrice principale dominante Ar par les coefficients correspondants de la i - ème ligne et de la j - ème colonne de A, ce qui fait par exemple que (r−1) (0) (−1) |Ar | = a rr . Par convention on pose a ij = aij et a 00 = 1. Parmi les propriétés du déterminant qui restent valables dans un anneau commutatif arbitraire, on doit citer en premier la linéarité par rapport à chaque ligne et par rapport à chaque colonne. La deuxième propriété la plus importante est son caractère alterné, c’est-à-dire qu’il s’annule si deux lignes ou si deux colonnes sont égales. On déduit de ces propriétés que le déterminant d’une matrice carrée ne change pas si on ajoute à une ligne (resp. à une colonne) une combinaison linéaire des autres lignes (resp. des autres colonnes). Plus généralement, on peut citer toutes les propriétés qui relèvent d’identités algébriques. Par exemple l’égalité det(AB) = det(A)det(B), ou encore le théorème de Cayley-Hamilton (qui peut être vu, pour une matrice carrée d’ordre n, comme une famille de n2 identités algébriques). Ces identités sont vérifiées lorsque les coefficients sont réels, elles sont donc vraies dans tous les anneaux commutatifs (un polynôme en k variables à coefficients entiers est identiquement nul si et seulement si il s’annule sur Zk ). 4 1. Rappels d’algèbre linéaire 1.1.2 Formule de Binet-Cauchy C’est une formule qui généralise l’égalité det(AB) = det(A)det(B) au cas d’un produit AB avec A ∈ Am×n et B ∈ An×m ( m < n ) : pour chaque m-uple β = β1 , . . . , βm extrait en ordre croissant de {1, . . . , n} , on considère A1..m,β la matrice extraite de A sur les colonnes β1 , . . . , βm et Bβ,1..m la matrice extraite 2 de B sur les lignes β1 , . . . , βm , alors on a la formule de Binet-Cauchy (cf. [Gan] p. 9) : det(AB) = X det(A1..m,β ) det(Bβ,1..m ) β (1.2) (la somme comporte Cm n termes). Pour le vérifier, on pose A = (aij ) ∈ Am×n , B = (bij ) ∈ An×m et on utilise les propriétés élémentaires des déterminants pour obtenir la suite d’égalités immédiates suivantes (avec des notations évidentes) : Pn a1, i1 bi1 ,1 .. . ... .. . Pn a1, im bim ,m .. . Pn am, i1 bi1 ,1 . . . Pn am, im bim ,m i1 =1 det(AB) = i1 =1 = a1, i1 bi1 ,1 .. . X 1≤i1 , i2 , ... ,im ≤n = X 1≤i1 , i2 , ... , im ≤n im =1 im =1 ... .. . a1, im bim ,m .. . am, i1 bi1 ,1 . . . am, im bim ,m a1, i1 .. bi1 ,1 ×bi2 ,2 ×· · ·×bim ,m × . am, i1 ... .. . a1, im .. . . . . . am, im Parmi les nm termes de cette somme, il n’y a que m! Cm n termes qui risquent de ne pas être nuls 3 . Ce sont, pour chacun des Cm n multi-indices β = ( β1 , β2 , . . . , βm ) avec 1 ≤ β1 < β2 < . . . < βm ≤ n , les m! termes correspondant aux multi-indices (i1 , i2 , . . . , im ) tels que : { i1 , i2 , . . . , im } = { β1 , β2 , . . . , βm } . 2. A1..m,β et Bβ,1..m sont des matrices carrées d’ordre m. 3. à cause du fait qu’un déterminant ayant deux colonnes identiques est nul ; c’est d’ailleurs la raison simple pour laquelle det(AB) = 0 lorsque m > n. 1.1. Quelques propriétés générales 5 On regroupe ces termes en Cm n sommes partielles. Chaque somme partielle correspond à une valeur β du multi-indice (β1 , β2 , . . . , βm ) et comporte m! termes dans lesquels on peut mettre en facteur : a1, β1 .. . ... .. . a1, βm .. . am, β1 . . . am, βm = det(A1..m,β ) . Il suffit alors d’utiliser la définition du déterminant de la matrice Bβ,1..m pour voir que la somme partielle correspondant au multi-indice β n’est bβ1 , 1 . . . bβ1 , m .. .. .. autre que : det(A1..m,β ). Ce qui donne : . . . bβm , 1 . . . bβm , m X det(AB) = det(A1..m,β ) × det(Bβ,1..m ) . 2 1≤β1 <β2 <...<βm ≤n 1.1.3 Rang, déterminant et identités de Cramer Une matrice carrée est dite régulière si elle est inversible, c’est-à-dire si son déterminant est inversible dans A, et singulière si son déterminant est nul. Une matrice (non nécessairement carrée) est dite fortement régulière si toutes ses sous-matrices principales dominantes sont régulières (i.e. tous les mineurs principaux dominants sont inversibles dans l’anneau de base considéré). Lorsque A est supposé intègre, on désignera par rg(M ) le rang d’une matrice M quelconque à coefficients dans A, c’est-à-dire l’ordre maximum des mineurs non nuls de M. Utilisant les notations ci-dessus, nous rappelons maintenant quelques résultats élémentaires d’algèbre linéaire dont certains seront accompagnés de brèves démonstrations. Comme nous travaillerons souvent avec un anneau commutatif arbitraire A, nous aurons besoin de la notion de A – module, qui est la généralisation aux anneaux de la notion d’espace vectoriel sur un corps. Un A – module M est par définition un groupe abélien (la loi de groupe est notée +) muni d’une loi externe A × M → M, (a, x) 7→ a.x qui vérifie les axiomes usuels (pour tous a, b ∈ A et x, y ∈ M ) : 1.x a.(b.x) (a + b).x a.(x + y) = = = = x (ab).x a.x + b.x a.x + a.y 6 1. Rappels d’algèbre linéaire Nous ne considérerons dans cet ouvrage que des modules libres de dimension finie, c’est-à-dire isomorphes à An , ou parfois le module AN . Dans le cas où il est intègre, l’anneau A peut être plongé dans son corps des fractions qui est noté FA , et tout A – module libre de dimension finie (isomorphe à un module An ) peut être considéré comme inclus dans un FA – espace vectoriel (isomorphe à (FA )n ). Le rang d’une matrice est alors égal à son rang usuel si on considère que ses coefficients sont dans le corps FA . Dans la suite, chaque fois que l’hypothèse d’intégrité sur A doit intervenir, elle sera clairement soulignée. Propriété 1.1.1 Soit A un anneau intègre. Pour toutes matrices carrées M et N d’ordre n ≥ 2, à coefficients dans A, on a : (i) M N = 0 =⇒ rg(M ) + rg(N ) ≤ n; (ii) Adj(M ) = 0 ⇐⇒ rg(M ) ≤ n − 2. Preuve. (i) provient du fait que si u et v sont deux endomorphismes d’un FA – espace vectoriel de dimension finie n, alors : dim(Im u) + dim(Ker u) = n et (u ◦ v = 0 ⇒ Im v ⊆ Ker u). (ii) découle du fait que si Adj(M ) = 0, tous les mineurs d’ordre n − 1 de M sont nuls, et réciproquement. t u Propriété 1.1.2 A étant un anneau intègre, le rang de la matrice adjointe de toute matrice carrée singulière M ∈ An×n (n ≥ 2) est au plus égal à 1, et on a les équivalences : Adj(M ) 6= 0 ⇐⇒ rg(M ) = n − 1 ⇐⇒ rg(Adj(M )) = 1. Preuve. C’est une conséquence de la propriété 1.1.1 sachant que, par hypothèse, M Adj(M ) = det(M ) In = 0. t u Propriété 1.1.3 Soit A un anneau commutatif arbitraire. Pour tous entiers n, p ≥ 2 et toutes matrices P ∈ Ap×n , M ∈ An×n et Q ∈ An×p , on a l’implication : det(M ) = 0 =⇒ det(P Adj(M ) Q) = 0 Preuve. • Supposons tout d’abord l’anneau A intègre. La propriété (1.1.2) nous permet alors d’écrire : det(M ) = 0 ⇒ rg(Adj(M )) ≤ 1 ⇒ rg(P Adj(M ) Q) ≤ 1 < p et de conclure. 1.1. Quelques propriétés générales 7 • Voyons maintenant le cas où A n’est pas intègre, et commençons par le cas générique. Considérons pour cela l’anneau Z[a1 , a2 , . . . , at ] = Z[a] où t = n2 + 2np et où les ai sont des variables représentant les entrées des matrices M, P et Q. Il est bien connu que det(M ) ∈ Z[a] est un polynôme irréductible dans cet anneau et que donc Z[a] /hdet(M )i est un anneau intègre. Comme dans cet anneau det(M ) = 0 , on est ramené au cas précédent et l’on a : det(P Adj(M ) Q) = 0 dans Z[a] /hdet(M )i . Ceci prouve l’existence d’un polynôme f (a) ∈ Z[a] vérifiant l’identité : det(P Adj(M ) Q) = f (a) det(M ) (le polynôme f (a) peut être calculé par un algorithme de division exacte dans l’anneau Z[a]). Cette identité algébrique est vérifiée dans tout anneau commutatif, ce qui permet de conclure dans le cas général. t u Proposition 1.1.4 (Identités de Cramer) Soit A un anneau commutatif arbitraire et A ∈ Am×n . Notons Cj la j- ème colonne de A (Cj = A1..m,j ) et Bj la matrice extraite de A en supprimant la colonne Cj . 1. Si n = m + 1 et si µj = det(Bj ) on a : Xn j=1 (−1)j µj Cj = 0 (1.3) 2. Supposons n ≤ m et que tous les mineurs d’ordre n de A sont nuls. Soit α = α1 , . . . , αn−1 extrait en ordre croissant de {1, . . . , m}. Soit Dj = (Bj )α,1..n−1 ∈ A(n−1)×(n−1) la matrice extraite de Bj en gardant les lignes de α, et soit νj = det(Dj ). Alors on a : Xn j=1 (−1)j νj Cj = 0 (1.4) Preuve. Pn j Pour le premier point : la coordonnée no k de j=1 (−1) µj Cj est égale au déterminant de la matrice obtenue en collant au dessous de A la ligne no k de A (ceci se voit en développant ce déterminant selon la dernière ligne). Cette coordonnée est donc nulle. Le deuxième point se prouve de manière analogue. t u Ces deux égalités peuvent être relues sous la forme (( solution d’un système linéaire )). Pour la première on considère A ∈ An×n et V ∈ An×1 on note Ej la matrice obtenue à partir de A en remplaçant la 8 1. Rappels d’algèbre linéaire colonne Cj par V , et µ0j = det(Ej ). Alors (1.3) se relit sous la forme plus classique :  0  µ1 Xn ..  = A · Adj(A) · V 0  µ Cj = A (1.5) det(A) V = . j=1 j 0 µn On peut également relire (1.4) comme suit. On considère une matrice A ∈ Am×n et V ∈ Am×1 avec m > n. On suppose que tous les mineurs d’ordre n + 1 de (A|V ) sont nuls. On note toujours Cj = A1..m,j la j ème colonne de A. On choisit α = α1 , . . . , αn extrait en ordre croissant de {1, . . . , m}. On considère la matrice Fj obtenue à partir de Aα,1..n en remplaçant la j - ème colonne par V et on pose να,j = det(Fj ). Si on applique (1.4) avec la matrice (A|V ) ∈ Am×(n+1) on obtient : Xn det(Aα,1..n ) V = να,j Cj (1.6) j=1 Proposition 1.1.5 Soit A un anneau commutatif arbitraire non trivial, c’est-à-dire dans lequel 1A 6= 0A , et A ∈ Am×n . Les propriétés suivantes sont équivalentes : 1. Pour tout V ∈ Am×1 il existe X ∈ An×1 tel que A X = V . Autrement dit, l’application linéaire ϕ : An → Am définie par A est surjective. 2. Il existe B ∈ An×m tel que A B = Im . 3. On a n ≥ m et il existe une combinaison linéaire des mineurs d’ordre m de A qui est égale à 1. Preuve. (1) ⇒ (2) Soit ej le j - ème vecteur de la base canonique de Am et soit Xj un vecteur de An tel que A Xj = ej . On prend pour matrice B la matrice dont les colonnes sont les Xj . (2) ⇒ (1) On prend X = B V . (2) ⇒ (3) Montrons que n < m est impossible. Si tel est le cas on rajoute m − n colonnes nulles à droite de A et m − n lignes nulles en dessous de B, on obtient deux matrices carrées A0 et B 0 pour lesquelles on a det(A0 ) = det(B 0 ) = 0 et A0 · B 0 = A · B = Im , ce qui donne 0A = 1A . Pour la combinaison linéaire, on applique la formule de Binet-Cauchy (1.2) avec A B = Im . P (3) ⇒ (2) Supposons β cβ det(A1..m,β ) = 1. La somme est étendue à tous les β = {β1 , . . . , βm } où 1 ≤ β1 < · · · < βm ≤ n. On a A1..m,β = A · (In )1..n,β . Posons Bβ = (In )1..n,β · Adj(A P 1..m,β ). Alors A · Bβ = det(A1..m,β ) Im . Il suffit donc de prendre B = β cβ Bβ . t u 1.1. Quelques propriétés générales 1.1.4 9 Identités de Sylvester Propriété 1.1.6 (Une identité de Sylvester) Soit A un anneau commutatif quelconque. Pour tout entier n ≥ 2 et toute matrice A = (aij ) ∈ An×n , on a : det(A) = ann det(An−1 ) − An,1..n−1 [Adj(An−1 )] A1..n−1,n . Preuve. Pour obtenir cette formule, il suffit de développer det(A) = An−1 A1..n−1,n An,1..n−1 ann suivant la dernière ligne puis chacun des cofacteurs des éléments de An,1..n−1 intervenant dans ce développement suivant la dernière colonne qui n’est autre que A1..n−1,n . t u Nous allons voir maintenant que la propriété précédente peut être généralisée à d’autres partitions de A. Étant donnés en effet deux entiers r et n avec n ≥ 2 et 1 ≤ r < n, on associe à toute matrice A ∈ An×n la partition suivante de la matrice A en blocs :   Ar A12 A= A21 A22 où A12 = A1..r,r+1..n ∈ Ar×(n−r) , A21 = Ar+1..n,1..r ∈ A(n−r)×r et A22 = Ar+1..n,r+1..n ∈ A(n−r)×(n−r) . On a alors le résultat suivant, valable pour tout anneau commutatif et unitaire A. Proposition 1.1.7 (Identités de Sylvester) Avec les notations cidessus, et pour tous entiers n et r tels que 1 ≤ r ≤ n − 1, on a les identités suivantes, dans lesquelles on a posé Br = AdjAr :    Ar 0 |Ar | Ir Br A12 |Ar | A = (1.7) A21 In−r 0 |Ar | A22 − A21 Br A12 |Ar |n−r−1 |A| = det(|Ar | A22 − A21 Br A12 ) (r)  a(r−1) rr n−r−1 a(n−1) = nn = (r) ar+1,r+1 . . . ar+1,n .. .. . . (r) (r) an,r+1 . . . an,n (n−2) (n−3) an−2,n−2 a(n−1) nn (n−2) (1.9) (n−2) an−1,n−1 an−1,n an,n−1 (1.8) (n−2) a n,n (1.10) 10 1. Rappels d’algèbre linéaire Preuve. – L’égalité matricielle (1.7) résulte de l’identité Ar Br = |Ar | Ir . – Pour démontrer (1.8) qui est une identité algébrique, on peut se restreindre au cas où les coefficients aij de A sont des indéterminées. Les mineurs de A peuvent alors être vus comme des polynômes non nuls dans l’anneau intègre Z[(aij )1≤i,j≤n ]. L’égalité (1.8) est alors obtenue en prenant les déterminants des deux membres de l’égalité (1.7) et en simplifiant par le polynôme |Ar |r+1 . – Le premier membre de l’identité (1.9) est le même que celui de (1.8). L’égalité des seconds membres provient du fait que l’élément de la (i−r) ème ligne et (j − r) - ème colonne (r + 1 ≤ i, j ≤ n) de la matrice : det(Ar ) A22 − A21 [Adj(Ar )] A12 ∈ A(n−r)×(n−r) est égal à : aij det(Ar ) − Ai,1..r [Adj(Ar )] A1..r,j (r) qui n’est autre que a ij d’après la propriété (1.1.6) appliquée à la   Ar A1..r,j matrice . Ai,1..r aij – L’égalité (1.10) est un cas particulier de (1.9) pour r = n − 2. t u Remarque. Si l’on fait r = n − 1 et par conséquent   An−1 A1..n−1,n A= , An,1..n−1 ann l’égalité (1.8) donne exactement la formule de la propriété (1.1.6), ce qui permet d’affirmer que celle-ci est une identité de Sylvester particulière. Les identités de Sylvester seront utilisées dans la section 2.2 pour le calcul des déterminants par la méthode de Jordan-Bareiss. 1.2 Polynôme caractéristique On appelle matrice caractéristique d’une matrice A ∈ An×n la matrice A − XIn ∈ (A[X])n×n ( X désigne une indéterminée sur A ). Le polynôme caractéristique de A est, par définition, le déterminant de sa matrice caractéristique ( 4 ). On le notera PA : PA (X) = det(A − XIn ) = p0 X n + p1 X n−1 + · · · + pn−1 X + pn . 4. Il serait en fait plus pratique de définir comme le fait Bourbaki le polynôme caractéristique de A comme le déterminant de XIn − A, mais nous nous en tenons à l’usage le plus répandu. 1.2. Polynôme caractéristique 11 Notons que p0 = (−1)n , pn = det(A) et que pour 1 ≤ k ≤ n − 1, le coefficient pk est le produit par (−1)n−k de la somme de tous les mineurs diagonaux d’ordre k de A ( 5 ). En particulier : (−1)n−1 p1 = n X aii = Tr(A). i=1 1.2.1 Matrice caractéristique adjointe On appelle matrice caractéristique adjointe de A ∈ An×n la matrice : Q(X) = Adj(XIn − A) = (−1)(n−1) Adj(A − XIn ) . C’est, à un signe près, l’adjointe de la matrice caractéristique de A . Elle peut être vue comme un polynôme matriciel de degré n − 1 en X, à coefficients dans An×n : en effet, la matrice des cofacteurs de XIn − A est une matrice n × n dont les éléments diagonaux sont des polynômes de degré n − 1 en X et les autres des polynômes de degré n − 2 en X . Ce qui fait que la matrice caractéristique adjointe de A s’écrit : Q(X) = B0 X n−1 + B1 X n−2 + · · · + Bn−2 X + Bn−1 ∈ An×n [X] . (1.11) D’après l’équation (1.1) page 2, on a l’égalité : (XIn − A) Q(X) = P (X) In où P (X) = (−1)n PA (X). On posera : P (X) = X n − [ c1 X n−1 + · · · + cn−1 X + cn ] . Ainsi le polynôme P (X) In est divisible par le polynôme (XIn − A) au sens de la division euclidienne dans l’anneau de polynômes An×n [X]. Pour obtenir les coefficients (matriciels) du quotient Q(X) dans cette division, on applique la procédure de Horner 6 au polynôme matriciel 5. Pour s’en convaincre, on peut examiner la formule qui donne par définition PA (−X) = det(A + XIn ) et voir quels sont les produits qui contiennent X n−k . On peut aussi faire une preuve par récurrence sur n en développant det(A + XIn ) suivant la première colonne. 6. La procédure (ou encore schéma) de Horner n’est rien d’autre qu’une P misei en forme algorithmique de la division euclidienne d’un polynôme P (X) = n i ci X par un polynôme X − a. Le reste, égal à P (a), est alors obtenu sous la forme c0 + a (c1 + a (c2 + · · · + a cn ) · · ·). Ceci consitue une évaluation efficace de P (a), utilisant un minimum de multiplications. Cette méthode est en fait identique à celle de Ch’in Chiu-Shao employée en Chine médiévale. Elle a été redécouverte par Ruffini (1802) et Horner (1819). Voir l’Encyclopedia of Mathematics, chez Kluwer (1996). 12 1. Rappels d’algèbre linéaire P (X) In ∈ An×n [X] avec la constante A ∈ An×n . Le reste Bn = P (A) est nul ; ce qui donne l’identité PA (A) = 0 et fournit en passant une démonstration (élégante) du théorème de Cayley-Hamilton. Le procédé de Horner peut être représenté par le schéma suivant : P (X) In A In 0 −c1 In B0 avec : B0 = In et −c2 In B1 ... ... −cn−1 In Bn−2 −cn In Bn−1 Bk = ABk−1 − ck In (1 ≤ k ≤ n) . Bn = 0 (1.12) Cela donne une méthode rapide et efficace pour calculer, à partir des coefficients du polynôme caractéristique, la matrice caractéristique adjointe, et fournit les relations détaillées suivantes utilisées pour établir la formule de Samuelson (§ 1.2.2 page ci-contre) :  B1 = A − c1 In    2    B2 = A − c1 A − c2 In   .. ..  .. . . . (1.13) k − c Ak−1 − . . . − c B = A  1 k k−1 A − ck In    .. .. ..   . . .    Bn = An − c1 An−1 − . . . − cn−1 A − cn In = 0 Notons qu’à la fin de la procédure de Horner, on obtient Bn = 0 c’est-à-dire A Bn−1 − cn In = 0 ou encore : A Bn−1 = cn In = (−1)n−1 det(A) In . Si det(A) est inversible dans A, alors A possède un inverse qui peut être calculé par la formule A−1 = (cn )−1 Bn−1 . Notons que Bn−1 = Q(0) = (−1)n−1 Adj(A). Donc Adj(A) = (−1)(n−1) [ An−1 − c1 An−2 − · · · − cn−2 A − cn−1 In ] . Ainsi le calcul de la matrice caractéristique adjointe nous donne l’adjointe de A. Il nous permet aussi d’obtenir l’inverse de A (s’il existe) notamment dans les cas où la méthode du pivot de Gauss s’avérerait impraticable, ce qui se produit lorsque l’anneau contient des diviseurs de zéro. La matrice caractéristique adjointe de A sert également, comme nous le verrons plus loin (voir § 2.5.2 page 84 et suivantes), à calculer le polynôme caractéristique de A par la méthode de Faddeev-SouriauFrame et, dans certains cas, des vecteurs propres non nuls. Nous allons à présent l’utiliser pour établir un résultat important pour la suite et faisant l’objet du paragraphe suivant. 1.2. Polynôme caractéristique 1.2.2 13 Formule de Samuelson Utilisant l’égalité 1.11 et les relations 1.13 dans lesquelles on remplace les coefficients ci par les coefficients pi du polynôme caractéristique de A , sachant que pi = (−1)n+1 ci , on obtient l’identité algébrique : Adj(A − X In ) = − n−1 X X k j=0 k=0 pj A k−j  X n−1−k . (1.14) Cette égalité nous sert à démontrer la formule de Samuelson [79] (voir [Gas], méthode de partitionnement pp. 291–298, [FF]) . Proposition 1.2.1 (Formule de Samuelson) Soit A un anneau commutatif arbitraire, ≥ 2 , A = (aij ) ∈ Prn un entier i n×n A et r = n − 1 . Notons Pr (X) = i=0 qr−i X = det(Ar − XIr ) le polynôme caractéristique de la sous-matrice principale dominante Ar . Posons Rr := An,1..r et Sr := A1..r,n de sorte que la matrice A est partitionnée comme suit :   Ar Sr A := . Rr ann Alors on a : PA (X) = (an,n − X) Pr (X) + r−1 X X k  qj (Rr Ak−j r Sr ) j=0 k=0 X r−1−k . C’est-à-dire encore : ( (an,n − X) Pn−1 (X) +  n−2−k PA (X) = Pn−2  k k=0 q0 (Rr Ar Sr ) + · · · + qk (Rr Sr ) X (1.15) Preuve. Tout d’abord on applique l’identité de Sylvester donnée en 1.1.6 à la matrice (A − XIn ). On obtient : PA (X) = (an,n − X) det(Ar − XIr ) − Rr Adj(Ar − XIr ) Sr . Ensuite on applique (1.14) en remplaçant A par Ar et n par r : Adj(Ar − XIr ) = − r−1 X X k k=0 qj Ak−j r j=0  X r−1−k . 2 La formule de Samuelson sera utilisée dans l’algorithme de Berkowitz. 14 1.2.3 1. Rappels d’algèbre linéaire Valeurs propres de f (A) Supposons l’anneau A intègre et soit FA son corps des fractions et L une extension de FA dans laquelle PA se décompose en produit de facteurs du premier degré. Une telle extension est ce qu’on appelle un corps de décomposition de PA . Tout zéro de PA dans L est appelé valeur propre de A, et sa multiplicité est, par définition, la multiplicité algébrique de la valeur propre de A. Plus généralement, même si A n’est pas intègre, il est parfois utile de l’envoyer dans un corps K par un homomorphisme d’anneaux unitaires ϕ : A → K. Les valeurs propres de la matrice A dans K seront alors par définition les zéros du polynôme Xn def ϕ(PA ) = ϕ(pi )X n−i ∈ K[X] . i=1 m = a0 X + a1 X m−1 + · · · + am−1 X + am ∈ L[X]. f (A) = a0 Am + a1 Am−1 + · · · + am−1 A + am In ∈ Soit un polynôme f Considérons la matrice Ln×n et les polynômes caractéristiques PA et Pf (A) de A et de f (A). Le lemme suivant exprime alors en particulier le lien entre les valeurs propres de la matrice A ∈ An×n et celles de la matrice f (A), dans le cas où l’anneau de base A est intègre. Lemme 1.2.2 Soit A un anneau intègre, L une extension du corps des fractions de A, et f un polynôme de L[X]. Si le polynôme caractéristique de A s’écrit : PA (X) = (−1)n (X − λ1 ) (X − λ2 ) · · · (X − λn ) avec les λi ∈ L, alors le polynôme caractéristique de f (A) s’écrit : Pf (A) = (−1)n (X − f (λ1 )) (X − f (λ2 )) · · · (X − f (λn )). Pn k En particulier, Tr(f (A)) = i=1 f (λi ) et pour tout k ∈ N, Tr(A ) = Pn k i=1 λi . Preuve. Il suffit de montrer le premier point. Dans le corps L, qui contient toutes les valeurs propres de la matrice A, celle-ci peut être ramenée à une forme triangulaire. C’est-à-dire qu’il existe une matrice triangulaire A0 ∈ Ln×n avec les λi sur la diagonale et une matrice M ∈ Ln×n inversible telles que A0 = M −1 AM . Comme f est un polynôme, et que A0 est triangulaire de la forme   λ1 0 · · · 0 . .. ..  . . ..  ×  0 A = . .  . . . .  . . . 0  × · · · × λn 1.2. Polynôme caractéristique 15 la matrice f (A0 ) sera aussi triangulaire, de la forme   f (λ1 ) 0 · · · 0 ..  .. ..  . .  × .  f (A0 ) =  . . .. ..  .. . . 0  × · · · × f (λn ) De plus, puisque ΘM : A 7−→ M −1 A M est un automorphisme 7 de n×n , on a f (A0 ) = M −1 f (A)M , et par suite P l’anneau f (A) = Pf (A0 ) = QnL n (−1) (X − f (λ )). t u i i=1 En fait, il n’est pas nécessaire que les deux matrices A et A0 soient semblables pour conclure que Pf (A) = Pf (A0 ) . Il suffit pour cela que PA = PA0 , comme l’indique le résultat suivant, valable dans un anneau commutatif arbitraire A. Propriété 1.2.3 Soient A et A0 deux matrices carrées à coefficients dans A ayant même polynôme caractéristique PA = PA0 . Alors, pour tout f ∈ A[X] on a : Pf (A) = Pf (A0 ) . Démonstration. Soit B la matrice compagnon du polynôme unitaire (−1)n PA (X) = X n − (c1 X n−1 + · · · + cn−1 X + cn ), c’est-à-dire la matrice   0 · · · · · · 0 cn  1 0 · · · 0 cn−1    . ..   . . n×n B =  0 . . . . .. . . ∈A . .  . . ..  .. .. 0  .. 0 ··· 0 1 c1 On vérifie sans difficulté que PA (X) = PB (X). Il suffit de montrer que Pf (A) = Pf (B) pour conclure (puisqu’alors on a aussi Pf (A0 ) = Pf (B) ). On peut écrire Pf (B) = Qn (c1 , . . . , cn , X) = (−1)n X n + Xn−1 i=0 qn,i (c1 , . . . , cn ) X i . 7. Précisément, B = Ln×n est une L - algèbre, c’est-à-dire un anneau muni d’une loi externe (x, A) 7→ x.A (produit d’une matrice par un scalaire) qui vérifie les identités (x+y).A = x.A+y.A, x.(A+B) = x.A+x.B, x.(y.A) = xy.A, x.(AB) = (x.A)B et 1.A = A. Et ΘM est un automorphisme de cette structure : un homomorphisme bijectif d’anneau qui vérifie en plus ΘM (x.A) = x.ΘM (A). On en déduit que pour tout polynôme f ∈ A[X] on a : ΘM (f (A)) = f (ΘM (A)). 16 1. Rappels d’algèbre linéaire Il s’agit alors de montrer que n n Pf (A) = (−1) X + n−1 X qn,i (c1 , c2 , . . . , cn )X i . i=0 Si l’on considère les coefficients de f et les entrées de A comme indéterminées x1 , . . . , x` sur Z (on a ` = n2 + 1 + deg f ), établir l’égalité précédente revient à démontrer n identités algébriques dans Z[x1 , . . . , x` ]. Ces identités algébriques sont ensuite valables dans tout anneau commutatif A, en remplaçant les variables formelles xi par des éléments ξi de A et elles donnent le résultat souhaité. Or, pour démontrer ces identités algébriques, il suffit de les vérifier sur un ouvert U de C` , c’est-à-dire lorsqu’on substitue à (x1 , . . . , x` ) un élément (ξ1 , . . . , ξ` ) arbitraire de U . Pour cela, on considère par exemple l’ouvert correspondant à des matrices (( suffisamment proches )) de la matrice diagonale suivante : 1 0 .  .. 0  0 2 .. . ··· ··· .. . .. . 0  0 .. . . 0 n Ces matrices sont diagonalisables puisque leurs valeurs propres restent distinctes dans l’ouvert considéré. Dans ce cas-là, A et B sont diagonalisables avec les mêmes valeurs propres, et le résultat est trivial. t u 1.3 Polynôme minimal Soit K un corps, E un K – espace vectoriel de dimension n > 0 et ϕ : E −→ E un opérateur linéaire, représenté en général par une matrice A dans une base donnée de E. 1.3.1 Polynôme minimal et sous-espaces de Krylov Le polynôme minimal de ϕ (ou de A) est par définition le polynôme unitaire Pϕ ∈ K[X] engendrant l’idéal des polynômes f ∈ K[X] tels que f (ϕ) = 0. A priori, ce polynôme peut être calculé par les méthodes usuelles d’algèbre linéaire en cherchant la première relation de dépendance linéaire entre les (( vecteurs )) successifs : IdE , ϕ, ϕ2 , ϕ3 . . . , de l’espace vectoriel End(E) ' Kn×n des endomorphismes de E. 1.3. Polynôme minimal Pϕ 17 Puisque Pϕ (ϕ) = 0 (théorème de Cayley-Hamilton), on obtient que divise Pϕ . Par ailleurs, étant donné un vecteur v ∈ E, le sous-espace ϕ-engendré par v (on dit aussi sous-espace de Krylov pour le couple (ϕ, v) ) est, par définition, le sous-espace de E engendré par le système de vecteurs (ϕi (v)) i∈N . On le note Kr(ϕ, v). Sa dimension n’est autre que le degré du polynôme unitaire Pϕ,v ∈ K[X] qui engendre l’idéal {f ∈ K[X] | f (ϕ)(v) = 0} de K[X]. Ce polynôme s’appelle le polynôme ϕ-minimal de v. Les deux polynômes Pϕ et Pϕ appartiennent évidemment à cet idéal et on a : Kr(ϕ, v) = E ⇐⇒ do Pϕ,v = n ⇐⇒ Pϕ,v = Pϕ = (−1)n Pϕ . Ainsi, l’existence d’un vecteur v qui ϕ-engendre E suffit pour que le polynôme caractéristique de l’endomorphisme ϕ de E soit égal (à un signe près) à son polynôme minimal : ∃v ∈ E, do Pϕ,v = n =⇒ Pϕ = (−1)n Pϕ . Mais la réciproque est aussi vraie, comme nous allons le voir bientôt. Remarquons que, comme le polynôme Pϕ , le polynôme Pϕ,v peut être calculé par les méthodes usuelles d’algèbre linéaire. Rappelons maintenant la propriété classique suivante relative à la décomposition de E en sous espaces ϕ-stables : Propriété 1.3.1 Soit ϕ un endomorphisme de E et f ∈ K[X] tel que f = f1 f2 · · · fr avec pgcd(fi , fj ) = 1 pour i 6= j et f (ϕ) = 0. Posons gi = f /fi , θi = fi (ϕ), ψi = gi (ϕ), Ei = Ker θi . Chaque Ei est un sous-espace ϕ -stable, on note ϕi : Ei → Ei la restriction de ϕ. Alors : a) E = E1 ⊕ · · · ⊕ Er . b) Ei = Im ψi , et la restriction de ψi à Ei induit un automorphisme de l’espace vectoriel Ei .Q Q c) On a les égalités Pϕ = ri=1 Pϕi et Pϕ = ri=1 Pϕi . d) Si (v1 ,Q . . . , vr ) ∈ E1 × · · · ×Er , et v = v1 + · · · + vr , on a l’égalité Pϕ,v = ri=1 Pϕi ,vi . Preuve. Tout d’abord on remarque que deux endomorphismes de la forme a(ϕ) et b(ϕ) commutent toujours puisque a(ϕ) ◦ b(ϕ) = (ab)(ϕ). Ensuite il est clair que tout sous-espace du type Ker a(ϕ) ou Im a(ϕ) est ϕ-stable. 18 1. Rappels d’algèbre linéaire La preuve des points a) et b) est alors basée sur les égalités ϕi ◦ ψi = ψi ◦ ϕi = f (ϕ) = 0E et sur l’identité de Bézout u1 g1 + · · · + ur gr = 1, qui implique u1 (ϕ) ◦ g1 (ϕ) + · · · + ur (ϕ) ◦ gr (ϕ) = IdE , ce qui se lit : ψ1 ◦ α1 + · · · + ψr ◦ αr = IdE , où αi = ui (ϕ). Si on choisit dans chaque Ei une base Bi leur réunion est une base B de E et la matrice de ϕ sur B est diagonale parQblocs, chaque bloc étant la matrice de ϕi sur Bi . Ceci implique Pϕ = ri=1 Pϕi . Soit hi = P ϕi . Il est clair que (h1 · · · hr )(ϕ) = 0E (car nul sur chaque Ei ), et que les hi sont premiers entre eux 2 à 2 (car hi divise fi ). Si g(ϕ) = 0, a fortiori g(ϕi ) = 0, donc g est multiple des hi , et par suite multiple de h = h1 · · · hr . Ceci termine la preuve du point c). Et la preuve du point d) est analogue, en remplaçant hi = P ϕi par ϕ i P ,vi . t u Propriété 1.3.2 Soit Pϕ = P1m1 P2m1 . . . Prmr la décomposition du polynôme minimal de ϕ en facteurs premiers distincts P1 , P2 , . . ., Pr . On reprend les notations de la propriété 1.3.1 avec fi = Pimi . On pose en outre Qi = Pϕ /Pi , Gi = Ker(Qi (ϕ)), Fi = Ker(Pimi −1 (ϕ)), pour 1 ≤ i ≤ r. Alors E = E1 ⊕ · · · ⊕ Er , chaque Fi est strictement inclus dans Ei et pour tout v = v1 + · · · + vr (vi ∈ Ei ) on a les équivalences suivantes : v∈ / r [ i=1 Gi ⇐⇒ P ϕ,v =P ϕ ⇐⇒ r ^ i=1 P ϕi ,vi =P ϕi ⇐⇒ r ^ vi ∈ / Fi . i=1 Preuve. Le fait que E = E1 ⊕· · ·⊕Er résulte de la propriété 1.3.1 a). La deuxième équivalence résulte des propriétés 1.3.1 c) et d). La première équivalence est claire : la première condition signifie exactement que le polynôme ϕ-minimal de v ne divise pas strictement le polynôme minimal de ϕ. Même chose pour la dernière équivalence (tout diviseur strict de Pimi divise Pimi −1 ). Cette remarque montre aussi que l’inclusion Fi ⊂ Ei est stricte. t u Corollaire 1.3.3 Il existe toujours un vecteur v tel que Pϕ,v = Pϕ . En particulier, si le polynôme minimal de ϕ a pour degré la dimension de E (autrement dit si, au signe près, il est égal au polynôme caractéristique) il existe des vecteurs qui ϕ-engendrent E. Preuve. Il suffit de prendre v = v1 + · · · + vr avec chaque vi dans Ei \ Fi . t u 1.3. Polynôme minimal 19 Ainsi, sauf exception, c’est-à-dire si l’on choisit v en dehors de la réunion d’un petit nombre de sous-espaces vectoriels stricts de E, les Ker(Qi (ϕ)), (cette réunion ne remplit jamais l’espace, même si le corps de base est fini), le vecteur v convient. Notons que la preuve précédente est peu satisfaisante parce qu’en général on ne sait pas calculer la décomposition en facteurs premiers d’un polynôme. Il s’ensuit que notre preuve de l’existence d’un vecteur qui ϕ-engendre E reste plus théorique que pratique. Voici une manière de contourner cet obstacle. Premièrement on établit le lemme suivant. Lemme 1.3.4 Si on connaı̂t un polynôme Q qui est un facteur strict d’un polynôme P de K[X] on peut, ou bien décomposer P en un produit P1 P2 de deux polynômes étrangers, ou bien écrire P et Q sous la forme P1k et P1` (1 ≤ ` < k). La procédure (que nous ne donnons pas en détail) consiste à partir de la factorisation intitiale P = QQ1 et à la raffiner au maximum en utilisant les pgcd’s. Ensuite on rappelle que les polynômes Pϕ,v et Pϕ peuvent facilement être calculés par les méthodes classiques d’algèbre linéaire. On démarre alors avec un v non nul arbitraire. Si Pϕ,v est égal à Pϕ on a terminé. Sinon, on applique le lemme précédent avec P = Pϕ et Q = Pϕ,v . Dans le premier cas, on applique la propriété 1.3.1 c) et d) avec les polynômes P1 et P2 . On est ramené à résoudre le même problème séparément dans deux espaces de dimensions plus petites. Dans le deuxième cas, on choisit un nouveau v dans le complémentaire de Ker(P1k−1 (ϕ)), ce qui fait que le degré de son polynôme minimal augmente strictement. Lk Remarque. Toute décomposition E = i=1 Ei en sous-espaces Ei ϕ -stables donne une forme réduite de ϕ, c’est-à-dire la représentation de ϕ dans une base convenable par une matrice diagonale par blocs de la forme :   A1 0 · · · 0 ..  .  .   0 A2 . . A= . . . . .. .. 0   .. 0 · · · 0 Ak où A1 , A2 , . . . , Ak sont les matrices des endomorphismes ϕi induits par ϕ dans les sous-espaces Ei . Certaines de ces formes réduites sont 20 1. Rappels d’algèbre linéaire dites canoniques, comme la réduction de Jordan dans le cas où le polynôme caractéristique se factorise en facteurs linéaires sur K. Il existe d’autres formes réduites canoniques entièrement rationnelles, c’est-à-dire qui n’utilisent pour le changement de base que des expressions rationnelles en les coefficients de la matrice de départ. Sur le sujet des formes normales réduites (et sur bien d’autres) nous recommandons le livre de Gantmacher ([Gan]) dont on attend toujours la réédition à un prix abordable. 1.3.2 Cas de matrices à coefficients dans Z. Dans certains algorithmes que nous aurons à développer par la suite, nous partirons d’une matrice C à coefficients dans un anneau intègre A et bien souvent il sera avantageux qu’aucun des calculs intermédiaires ne produise des éléments qui seraient dans le corps des fractions de A sans être dans A. Se pose alors naturellement la question suivante : les polynômes PC et PC,v que nous pouvons être amenés à envisager comme résultats de calculs intermédiaires en vue de trouver le polynôme caractéristique de C, sont-ils toujours des polynômes à coefficients dans A ? Dans le cas de matrices carrées à coefficients dans Z, ou dans un anneau de polynômes Z[x1 , . . . , xn ] ou Q[x1 , . . . , xn ], la réponse est positive. Ce résultat n’est pas évident. Il est basé sur les définitions et les propriétés qui suivent, pour lesquelles on peut consulter les livres classiques d’algèbre (par exemple [Gob] ou [MRR]). Définition 1.3.5 Un anneau intègre A est dit intégralement clos si tout diviseur unitaire dans FA [X] d’un polynôme unitaire de A[X] est dans A[X]. Avec de tels anneaux les polynômes PC et PC,v sont donc automatiquement à coefficients dans A. Définition 1.3.6 Un anneau intègre A est dit anneau à pgcds si tout couple d’éléments (a, b) admet un pgcd, c’est-à-dire un élément g ∈ A tel que : ∀x ∈ A ((x divise a et b) ⇐⇒ x divise g) . Propriété 1.3.7 Pour qu’un anneau intègre soit intégralement clos, il suffit que la propriété qui le définit soit vérifiée pour les diviseurs de 1.4. Suites récurrentes linéaires 21 degré 1. Autrement dit, tout zéro dans FA d’un polynôme unitaire de A[X] est dans A. Propriété 1.3.8 Tout anneau à pgcds est intégralement clos. Propriété 1.3.9 Si A est un anneau à pgcds il en va de même pour A[x1 , . . . , xn ]. 1.4 1.4.1 Suites récurrentes linéaires Polynôme générateur, opérateur de décalage Soit E un K – espace vectoriel (resp. un A – module). On considère une suite (an )n∈N d’éléments de E et un entier p ∈ N. Une relation de récurrence linéaire d’ordre p pour cette suite est définie par la donnée de p + 1 éléments c0 , c1 , . . . , cp de K (resp. de A) vérifiant : ∀n ∈ N c0 an + c1 an+1 + · · · + cp an+p = 0 (1.16) Pp i Le polynôme h(X) = i=0 ci X dans K[X] (resp. dans A[X]) est appelé un polynôme générateur de la suite (an ). Lorsque le coefficient cp est inversible, la suite est alors déterminée par la donnée de a0 , a1 , . . . , ap−1 car elle peut ensuite être construite par récurrence : elle est en quelque sorte (( engendrée )) par le polynôme h, ce qui justifie la terminologie adoptée. Une suite récurrente linéaire dans E est une suite (an )n∈N d’éléments de E qui possède un polynôme générateur dont le coefficient dominant est inversible. On interprète cette situation de la manière suivante en algèbre linéaire. On appelle S le K – espace vectoriel (resp. le A – module) E N formé de toutes les suites (un )n∈N à valeurs dans E. On note Φ : S → S l’opérateur de décalage qui donne pour image de (un )n∈N la suite décalée d’un cran (un+1 )n∈N . Il est clair que l’opérateur de décalage est un opérateur linéaire. Dire que la suite a = (an )n∈N vérifie la relation de récurrence linéaire (1.16) se traduit exactement, en langage un peu plus abstrait, par : a ∈ Ker(h(Φ)) . Cela montre que les polynômes générateurs d’une suite récurrente linéaire donnée forment un idéal de K[X] (resp. de A[X]). Dans le cas d’un corps et d’une suite récurrente linéaire, comme K[X] est un anneau principal, cet idéal (non nul) est engendré par un polynôme unitaire 22 1. Rappels d’algèbre linéaire unique qu’on appelle le polynôme générateur minimal ou simplement le polynôme minimal de la suite. Nous le noterons Pa . Nous allons voir plus loin que ce polynôme peut effectivement être calculé, dès qu’on connaı̂t un polynôme générateur de la suite récurrente linéaire. Considérons maintenant un polynôme unitaire fixé p f (X) = X − p−1 X bi X i i=0 dans K[X] (resp. dans A[X]). Le K – espace vectoriel (resp. le A – module) Ker(f (Φ)) formé des suites récurrentes linéaires dans E pour lesquelles f est un polynôme générateur sera noté Sf . Il est isomorphe à Kp (resp. Ap ) et une base canonique est fournie par les p suites 8 e(i) (i = 0, . . . , p − 1) telles que e(i) (j) = δij pour j = 0, . . . , p − 1, où δij est le symbole de Kronecker (δij = 1 si i = j et δij = 0 si i 6= j). Pour une suite récurrente linéaire arbitraire a = (an )n∈N dans Sf on a P (j) alors : a = p−1 j=0 aj e . Il est clair que Sf est stable par Φ. Notons Φf la restriction de Φ à Sf . On constate immédiatement que la matrice de Φf sur la base canonique (e(p−1) , . . . , e(1) , e(0) ) est la matrice compagnon du polynôme f :   0 · · · · · · 0 b0   0 ··· 0 b0  1 0 · · · 0 b1   b1   .. ..  .. ..  = . . Cf =   0 . . . .  ..   . . Ip−1  . ..  .. ... 0  .. bp−1 0 · · · 0 1 bp−1 (1) En particulier PΦf ,e = PΦf = PΦf = f . En outre, par simple application des définitions on obtient PΦf ,a = Pa . Comme exemples importants de suites récurrentes linéaires, on peut citer : – la suite récurrente linéaire formée des puissances (An )n∈N d’une matrice A ∈ Km×m dont le polynôme générateur minimal n’est autre que le polynôme minimal PA de la matrice ; – pour des vecteurs donnés u, v ∈ Km×1 , les suites récurrentes linéaires (An v)n∈N et ( t u An v)n∈N dont les polynômes minimaux, notés A,v respectivement PA,v et PA,v divise PA,v et u , sont alors tels que : Pu PA,v divise PA . 8. Chacune de ces suites est évidemment définie par ses p premiers termes. 1.4. Suites récurrentes linéaires 1.4.2 23 Suites récurrentes linéaires et matrices de Hankel Comme le montre la discussion qui suit, l’étude des suites récurrentes linéaires est étroitement liée à celle des matrices de Hankel. Une matrice de Hankel est une matrice (pas nécessairement carrée) H = (vij ) dont les coefficients sont constants sur les diagonales montantes : vij = vhk si i + j = h + k. Les matrices de Hankel fournissent un exemple de matrices structurées. L’autre exemple le plus important est celui des matrices de Toeplitz, celles dont les coefficients sont constants sur les diagonales descendantes : vij = vhk si i − j = h − k. Remarquons qu’une matrice de Hankel carrée d’ordre n est une matrice symétrique et que les produits H Jn et Jn H d’une matrice de Hankel H carrée d’ordre n par la matrice de Hankel particulière Jn :     Jn =    0 0 ··· 0 0 ··· .. .. . . 0 1 ··· 1 0 ···  0 1 1 0   .. ..  . .   0 0  0 0 sont des matrices de Toeplitz. Cette matrice de permutation d’ordre n permet de renverser l’ordre des n colonnes (resp. des n lignes) d’une matrice lorsque celle-ci est multipliée à droite (resp. à gauche) par la matrice Jn : c’est pourquoi on l’appelle matrice de renversement ou encore matrice d’arabisation du fait qu’elle permet d’écrire de droite à gauche les colonnes que l’on lit de gauche à droite et inversement. Inversement, les produits Jn T et T Jn d’une matrice de Toeplitz T carrée d’ordre n par la matrice Jn sont des matrices de Hankel. Une matrice structurée est déterminée par la donnée de beaucoup moins de coefficients qu’une matrice ordinaire de même taille. Par exemple une matrice de Hankel (resp. de Toeplitz) de type (n, p) est déterminée par la donnée de n + p − 1 coefficients : ceux des première ligne et dernière (resp. première) colonne. Cela rend ces matrices particulièrement importantes pour les (( grands calculs )) d’algèbre linéaire. Si a = (an )n∈N est une suite arbitraire et si i, r, p ∈ N nous noterons 24 1. Rappels d’algèbre linéaire a H i,r,p la matrice de Hankel suivante, qui possède r lignes et p colonnes :   ai ai+1 ai+2 . . . ai+p−1  ai+1 ai+2 ai+p      a H i,r,p =  ai+2 .   .. ..   . . ai+r−1 ai+r . . . . . . ai+r+p−2 Le fait suivant est une simple constatation. Fait 1.4.1 Reprenant les notations ci-dessus, une suite a est une suite récurrente linéaire avec f comme polynôme générateur si et seulement si sont vérifiées pour tous i, r ∈ N les équations matricielles a a H i,r,p Cf = H i+1,r,p (1.17) a a Ou ce qui revient au même, en transposant, t Cf H i,p,r = H i+1,p,r . Naturellement, il suffit que ces équations soient vérifées lorsque r = 1. On en déduit a a H i,r,p (Cf )k = H i+k,r,p (1.18) et donc on a aussi : a Fait 1.4.2 Sous les mêmes hypothèses, dans toute matrice H i,r,p+k les k dernières colonnes sont combinaisons linéaires des p premières. Et, a par transposition, dans toute matrice H i,p+k,s les k dernières lignes sont combinaisons linéaires des p premières. On en déduit la proposition suivante. Proposition 1.4.3 Avec les notations ci-dessus, et dans le cas d’un corps K, si a est une suite récurrente linéaire qui admet f pour polynôme générateur, le degré d de son polynôme générateur minimal Pa est a égal au rang de la matrice de Hankel H 0,p,p . Les coefficients de Pa (X) = P i X d − d−1 i=0 gi X ∈ K[X] sont l’unique solution de l’équation a a H 0,d,d CPa = H d,d,1 c’est-à-dire encore l’unique solution du système linéaire      a0 a1 a2 · · · ad−1 ad g0 . .  a1  . a a    2 d   g1   ad+1   ..  . ..  g2   ad+2 .  a2 . . .  =     ..   ..   .. . . .  ..  .   .  . .. .. a2d−1 gd−1 ad−1 ad · · · · · · a2d−2 (1.19)     .   1.5. Polynômes symétriques et relations de Newton 25 Preuve. Considérons la première relation de dépendance linéaire entre a les colonnes de H 0,p,p , et appelons g le polynôme unitaire correspondant, qui vérifie a a t Cg H 0,d,p = H 1,d,p . Cela donne l’équation récurrence sur k : tC a g a H 0,d,p = H 0,d,p Cf d’où immédiatement par a a a ( t Cg )k H 0,d,p = H 0,d,p (Cf )k = H k,d,p , et donc t a a a a Cg H k,d,p = H k+1,d,p . A fortiori, pour tout k on a : t Cg H k,d,1 = H k+1,d,1 , et cela signifie que g est également un polynôme générateur pour la suite a. On laisse le soin à la lectrice et au lecteur de finir la preuve. t u 1.5 Polynômes symétriques et relations de Newton Soit A un anneau commutatif unitaire et A [x1 , . . . , xn ] l’algèbre sur A des polynômes à n indéterminées x1 , . . . , xn . Tout polynôme f ∈ A [x1 , . . . , xn ] s’écrit de manière unique comme une somme finie de monômes distincts aJ xJ = aJ xj11 · · · xjnn où J = (j1 , . . . , jn ) ∈ Nn et aJ ∈ A : X f= aJ xj11 · · · xjnn J où la somme porte sur une partie finie de Nn . On a souvent intérêt à donner un bon ordre sur les termes xJ = xj11 · · · xjnn pour faire des preuves par induction. Il suffit par exemple d’ordonner les indéterminées (x1 < x2 < · · · < xn ) pour définir un bon ordre sur les termes xJ , par exemple l’ordre lexicographique, ou l’ordre lexicographique subordonné au degré total. On écrit souvent aussi le polynôme comme somme de ses composantes homogènes Xn f= fh , h=0 26 1. Rappels d’algèbre linéaire où n est le degré total de f et fh la composante homogène de degré h de f . Une manière simple de voir les composantes homogènes d’un polynôme f ∈ A [x1 , . . . , xn ] est de considérer une nouvelle indéterminée z et le polynôme en z : g(z) = f (x1 z, . . . , xn z) ∈ A [x1 , . . . , xn ] [z]. La composante homogène fh n’est autre que le coefficient de z h dans g(z). Désignant par Sn le groupe des permutations de {1, 2, . . . , n}, un polynôme f ∈ A [x1 , . . . , xn ] est dit symétrique si son stabilisateur par l’action τ f = f (x1 , . . . , xn ) 7−→ τ f = f (xτ (1) , . . . , xτ (n) ) de Sn sur A [x1 , . . . , xn ] est le groupe Sn tout entier. C’est-à-dire encore si les monômes d’une même orbite de Sn figurent dans l’expression de f avec le même coefficient. Des polynômes symétriques importants sont les sommes de Newton à n indéterminées : Xn Sk (x1 , . . . , xn ) = xki ∈ A [x1 , . . . , xn ] (k ∈ N) (1.20) i=1 On notera A [x1 , . . . , xn ]sym l’ensemble des polynômes symétriques en x1 , . . . , xn sur A. C’est une sous-algèbre propre de A [x1 , . . . , xn ]. Il est bien connu (la démonstration peut se faire par récurrence en utilisant l’ordre lexicographique) que tout polynôme symétrique s’exprime de manière unique comme polynôme en σ1 , σ2 , . . . , σn où les σp (1 ≤ p ≤ n) sont les polynômes symétriques élémentaires en x1 , x2 , . . . , xn : X σp = x i1 x i2 · · · x ip · 1≤i1 <i2 <···<ip ≤n Cela signifie que l’homomorphisme de A –algèbres ϕ : A [y1 , . . . , yn ] −→ A [x1 , . . . , xn ]sym défini par ϕ(f (y1 , . . . , yn )) := f (σ1 , σ2 , . . . , σn ) est un isomorphisme. En outre, lorsque A est intègre, FA désignant le corps des fractions de A, cet isomorphisme ϕ se prolonge de manière unique en un isomorphisme de FA – algèbres, de FA (y1 , . . . , yn ) vers FA (x1 , . . . , xn )sym , qui est par définition la sous-algèbre de FA (x1 , . . . , xn ) formée des fractions rationnelles invariantes par permutation des variables. Autrement dit, 1.5. Polynômes symétriques et relations de Newton 27 toute fraction rationnelle sur FA , symétrique en x1 , . . . , xn , s’écrit de manière unique comme une fraction rationnelle en σ1 , . . . , σn sur FA . On exprime ce fait en disant que (σ1 , . . . , σn ) est un système fondamental de polynômes symétriques en x1 , . . . , xn sur le corps FA . Plus généralement : Définition 1.5.1 Étant donné un anneau commutatif unitaire A (resp. un corps K), et n indéterminées x1 , . . . , xn sur cet anneau (resp. ce corps), on appelle système fondamental de polynômes symétriques en x1 , . . . , xn sur l’anneau A (resp. fractions rationnelles symétriques en x1 , . . . , xn sur le corps K) tout système (f1 , . . . , fn ) de n éléments de A [x1 , . . . , xn ]sym (resp. de K(x1 , . . . , xn )sym ) vérifiant A [x1 , . . . , xn ]sym = A [f1 , . . . , fn ] (resp. K(x1 , . . . , xn )sym = K(f1 , . . . , fn )). Attention à l’ambiguité de langage : un système fondamental sur le corps K n’est pas nécessairement un système fondamental sur l’anneau K, même s’il est formé de polynômes. Par contre, un système fondamental sur l’anneau intègre A est toujours un système fondamental sur le corps FA . La définition d’un système fondamental sur un corps K implique l’indépendance algébrique du système (f1 , f2 , . . . , fn ) et garantit l’unicité de l’expression rationnelle, dans ce système fondamental, de toute fraction rationnelle symétrique sur K. Les relations dites de Newton permettent d’exprimer les sommes de Newton dans le système fondamental des polynômes symétriques élémentaires. Proposition 1.5.2 (Relations de Newton) Les polynômes de Newton à n indéterminées (Sk )k∈N sont reliés aux n polynômes symétriques élémentaires (σk )1≤k≤n par les relations suivantes : (i) S0 = n ; P i k (ii) pour 1 ≤ k ≤ n : SkP + k−1 i=1 (−1) σi Sk−i + (−1) k σk = 0 ; n i (iii) pour k > n : Sk + i=1 (−1) σi Sk−i = 0. Preuve. On pose αk = (−1)k+1 σk (k = 1 . . . , n). Les polynômes symétriques élémentaires apparaissent dans le développement du polynôme Q(X) = n Y i=1 (1 − xi X) = 1 − n X k=1 αk X k . 28 1. Rappels d’algèbre linéaire Par dérivation logarithmique formelle, on obtient les égalités suivantes dans l’algèbre de séries formelles FA (x1 , . . . , xn ) [[X, X −1 ]] :  n n  ∞ Q0 (X) X −xi 1 1 X 1 X = 1− Sk X k =− = Q(X) 1 − xi X X 1 − xi X X i=1 i=1 k=1 ou encore dans FA (x1 , . . . , xn ) [[X]] : 0 − X Q (X) = Q(X) ∞ X Sk X k (1.21) k=1 avec Q(X) = 1−[α1 X + . . . + αn X n ] et −XQ0 (X) = α1 X+2 α2 X 2 + . . . + n αn X n . Identifiant dans l’équation (1.21) les termes en X k pour 1 ≤ k ≤ n, on obtient les formules (ii). Les formules (iii) sont obtenues par identification des termes de degré supérieur à n. Remarque. En notant αi = (−1)i+1 σi les relations de Newton s’écrivent sous la forme matricielle suivante :       α1 S1 1 0 ... ... 0      ..  ..  S1   S2  α  . 2 .    2       ..   ..   ..  .. .. .. ..  .     . . . . . .           .  .  .. ..   Sn−2     . . n − 1 0 .         (1.22) = S αn S1 n   Sn−1 Sn−2  n       Sn Sn−1   S1    Sn+1    ..   .. ..   .   . .       Sn+k   Sk+1    Sn+k+1  .. .. .. .. .. .. . . . . . . Les relations (ii) (qui correspondent aux n premières lignes dans la matrice infinie ci-dessus) et (iii) (qui correspondent aux lignes no n et suivantes) donnent la même formule si l’on fait k = n. D’autre part, les relations (iii) peuvent être obtenues directement : en multipliant par X k−n (k > n) le polynôme P (X) = n Y n (X − xi ) = X − i=1 on obtient X k−n P (X) = X k − n X αi X n−i , i=1 Xn i=1 αi X k−i . 1.5. Polynômes symétriques et relations de Newton 29 Lorsque k > n les identités xk−n P (xj ) = 0 donnent alors par sommaj tion : n X j=1 xkj − n X i=1 αi hXn j=1 n i X xk−i = S − αi Sk−i = 0 . k j i=1 Corollaire 1.5.3 Si A est un anneau commutatif où les entiers 1, 2, . . . , n sont inversibles, alors les sommes de Newton (Sk )1≤k≤n en les n indéterminées x1 , . . . , xn forment un système fondamental de polynômes symétriques en x1 , . . . , xn sur l’anneau A. Preuve. Le système triangulaire formé par les n premières équations dans (1.22) admet clairement une solution unique en les αi . t u   Corollaire 1.5.4 Soit P = X n − a1 X n−1 + . . . + an−1 X + an un polynôme unitaire à une indéterminée sur un anneau intègre A, et soient λ1 , λ2 , . . . , λn les n racines de ce polynôme (distinctes ou non) dans un corps P de décomposition de P (une extension de FA ). Si l’on pose sk = ni=1 λki pour 1 ≤ k ≤ n, on a les relations :    s 1 = a1   s2 = s1 a1 + 2 a2 (1.23) .. .. ..  . . .    sn = sn−1 a1 + . . . + s1 an−1 + n an Ainsi les coefficients du polynôme P sont déterminés de manière unique dans A par la donnée de ses sommes de Newton si n ! est non diviseur de zéro dans A. Et si la division exacte par chacun des entiers 2, . . . , n est explicite lorsqu’elle est possible, le calcul des si à partir des ai est lui aussi explicite. Dans la définition suivante, on généralise les sommes de Newton pour les zéros du polynôme P au cas d’un anneau commutatif arbitraire.   Définition 1.5.5 Soit P = X n − a1 X n−1 + . . . + an−1 X + an un polynôme unitaire à une indéterminée sur un anneau commutatif A. Alors les éléments si donnés par les équations (1.23) s’appellent les sommes de Newton de P (ou de tout polynôme u P avec u non diviseur de zéro dans A). Un fait important est le suivant. 30 1. Rappels d’algèbre linéaire Lemme 1.5.6 Soit A un anneau commutatif arbitraire, A une matrice carrée d’ordre n sur A et PA son polynôme caractéristique. Les sommes de Newton de PA données dans la définition précédente sont les traces des puissances de la matrice A : sk = Tr(Ak ) pour 1 ≤ k ≤ n. Preuve. On remarque que les égalités à démontrer sont des identités algébriques en les entrées de la matrice A (considérées comme des indéterminées). Il suffit donc de traiter le cas d’un anneau intègre. Dans ce cas, le résultat est donné par le corollaire 1.5.4 et le lemme 1.2.2. t u 1.6 Inégalité de Hadamard et calcul modulaire Nous décrivons d’abord quelques majorations utiles en algèbre linéaire. 1.6.1 Normes matricielles Si A = (aij ) ∈ Am×n est une matrice à coefficients réels ou complexes, on définit classiquement les normes suivantes (cf. [Cia], [GL]) hXm hXn i i k A k1 = max |aij | , k A k∞ = max |aij | 1≤j≤n i=1 k A kF = 1≤i≤m rX m i=1 Xn j=1 j=1 |aij |2 Chacune de ces normes vérifie les relations classiques k c A k = |c| k A k , kA + B k ≤ kAk + kB k (si A et B ont mêmes dimensions) et kA B k ≤ kAk kB k (si le produit A B est défini). Considérons maintenant des matrices à coefficients entiers. La taille d’un entier x est l’espace qu’il occupe lorsqu’on l’implante sur machine. Si le codage des entiers est standard, cela veut dire que la taille de x est correctement appréciée par 1 + dlog2 (1 + |x|)e. Notation 1.6.1 Dans tout cet ouvrage log x dénote max(1, log2 |x|). 1.6. Inégalité de Hadamard et calcul modulaire 31 Lorsque x est entier, cela représente donc la taille de x à une constante près. Si λ(A) = log(k A k) avec l’une des normes précédentes, la taille de chaque coefficient de A est clairement majorée par λ(A) (à une constante additive près) et en outre les relations précédentes impliquent immédiatement que λ(A B) ≤ λ(A) + λ(B), λ(A + B) ≤ max(λ(A), λ(B)) + 1. Ces relations sont souvent utiles pour calculer des majorations de la taille des entiers qui interviennent comme résultats de calculs matriciels. L’inégalité de Hadamard L’inégalité de Hadamard s’applique aux matrices à coefficients réels. La valeur absolue du déterminant représente le volume (n - dimensionnel) du parallélépipède construit sur les vecteurs colonnes de la matrice, (( et donc )) elle est majorée par le produit des longueurs de ces vecteurs : v n uX Y u n t | det((aij )1≤i,j≤n )| ≤ a2ij (1.24) j=1 i=1 Il y a évidemment des preuves rigoureuses de ce fait intuitif. Par exemple le processus d’orthogonalisation de Gram-Schmidt remplace la matrice par une matrice de même déterminant dont les vecteurs-colonnes sont deux à deux orthogonaux et ne sont pas plus longs que ceux de la matrice initiale. La signification géométrique de cette preuve est la suivante : le processus d’orthogonalisation de Gram-Schmidt remplace le parallélépipède (construit sur les vecteurs colonnes) par un parallélépipède droit de même volume dont les cotés sont devenus plus courts. Ce même raisonnement donne l’inégalité dans le cas d’une matrice à coefficients complexes en remplaçant a2ij par |aij |2 (mais l’interprétation géométrique directe disparaı̂t). Avec les normes k k1 et k k∞ on obtient pour une matrice carrée : | det(A)| ≤ (k A k1 )n , | det(A)| ≤ (k A k∞ )n (1.25) Avec la norme de Frobenius k A kF on obtient la majoration suivante (un produit de n réels positifs dont la somme est constante est maximum lorsqu’ils sont tous égaux) :   k A kF n √ | det(A)| ≤ (1.26) n 32 1.6.2 1. Rappels d’algèbre linéaire Le théorème chinois et son application aux calculs modulaires Soient p1 , p2 , . . . , pr des entiers positifs deux à deux premiers entre eux. On pose M = p1 p2 · · · pr . Pour toute suite x1 , x2 , . . . , xr de r entiers relatifs, il existe un entier x (unique modulo M ) vérifiant : x ≡ xi [mod pi ] (i = 1, . . . , r). On peut calculer cet entier (modulo M ) en remarquant que, pour tout i compris entre 1 et r, les nombres pi et qi = M/pi sont premiers entre eux et que par conséquent il existe des entiers ui et vi (relation de Bézout) tels que P pi ui + qi vi = 1 (i = r 1, . . . , r). Le nombre x recherché n’est autre que i=1 xi qi vi (modulo M ). Il est facile de vérifier qu’il répond bien à la question. L’une des conséquences importantes du Théorème chinois en calcul formel est son utilisation pour le calcul de coefficients entiers x ∈ Z dont on sait majorer la valeur absolue par un entier B strictement positif. Il arrive souvent que les calculs intermédiaires, lorsqu’ils sont effectués (avec ou sans division) dans Z, donnent des coefficients dont la taille explose rapidement, ce qui risque de rendre ces calculs impraticables ou trop coûteux, alors que la taille du résultat final est bien plus petite. Supposons que l’on ait à calculer un x ∈ Z tel que −B ≤ x ≤ B par un algorithme sans divisions. On commence par choisir des entiers positifs p1 , p2 , . . . , pr deux à deux premiers entre eux dont le produit dépasse strictement 2B. Au lieu de calculer directement x, on effectue tous les calculs modulo pi séparément pour chaque i (i = 1, . . . , r). Les résultats x1 , x2 , . . . , xr ainsi obtenus sont tels que x est dans la classe de xi modulo pi (pour i = 1 . . . r). Utilisant les mêmes notations que ci-dessus pour les coefficients de Bézout relatifs aux couples (pi , qi ), on récupère ensuite le résultat principal x à partir des résultats partiels x1 , x2 , . . . , xr en remarquant que x est l’entier relatif de plus petite valeur absolue congru Pr à x q i=1 i i vi modulo p1 p2 · · · pr (puisque −B ≤ x ≤ B). Dans le cas d’un algorithme avec divisions, les facteurs pi doivent être choisis de manière à ce qu’ils soient premiers avec les diviseurs intervenant dans les calculs. Pour le calcul des déterminants de matrices à coefficients entiers, par exemple, on peut utiliser l’inégalité de Hadamard (1.24) pour faire fonctionner la méthode modulaire. On prendra pour borne B = M n nn/2 où M = max1≤i,j≤n |aij |. Si cela s’avère préférable, on peut choisir une des bornes données dans les équations (1.25) et (1.26). Il en est de même pour le calcul du polynôme caractéristique PA 1.6. Inégalité de Hadamard et calcul modulaire 33 d’une matrice A ∈ Zn×n car chacun des coefficients de PA est une somme de mineurs diagonaux de la matrice A. On peut donc là aussi utiliser l’inégalité de Hadamard pour majorer les valeurs absolues des coefficients en vue du traitement modulaire. Plus précisément, si l’on prend M = max1≤i,j≤n |aij | comme cidessus et si l’on désigne par mk,j (1 ≤ j ≤ Cnk ) les mineurs de A diagonaux d’ordre k (pour k donné entre 1 et n), alors le coefficient µk du terme de degré n − k de PA est majoré en valeur absolue comme suit : |µk | = X k n mk,j ≤ Cnk M k k 2 ≤ (2M )n n 2 (1.27) k} j∈{1,...,Cn puisque Cnk ≤ 2n . Quelques considérations pratiques L’idée principale dans l’utilisation du calcul modulaire est de remplacer un algorithme dans Z permettant de résoudre un problème donné par plusieurs algorithmes modulo des nombres premiers. Pour être vraiment efficace, cette méthode doit être appliquée avec des listes de nombres premiers p1 , p2 , . . . , pr déjà répertoriées et pour lesquelles on a déjà calculé les coefficients qi vi correspondants qui permettent de récupérer x à partir des xi . Ces nombres premiers peuvent être choisis par rapport à la taille des mots traités par les processeurs. Par exemple, pour des processeurs qui traitent des mots à 64 bits, on prend des nombres premiers compris entre 263 et 264 − 1 : il y en a suffisamment (bien plus que 1017 nombres !) pour résoudre dans la pratique tous les problèmes de taille humainement raisonnable et réaliste [GG]. En outre on possède des tests rapides pour savoir si un nombre est premier, et cela a permis d’établir des listes p1 , p2 , . . . , pr avec la liste des coefficients qi vi correspondants, qui répondent à tous les cas qui se posent en pratique. Chaque opération arithmétique élémentaire modulo un tel nombre premier se fait alors en temps constant, ce qui réduit considérablement le temps de calcul. En outre la décomposition du problème en algorithmes modulaires offre la possibilité d’utiliser plusieurs processeurs en parallèle. 34 1.7 1. Rappels d’algèbre linéaire Résolution uniforme des systèmes linéaires Nous expliquons ici comment le polynôme caractéristique permet de déterminer le rang d’une matrice et de résoudre uniformément (avec une seule formule, du type Cramer) les systèmes linéaires ayant un format donné et un rang fixé. Et ceci sur un corps arbitraire. Cette solution uniforme (cf. [24]) constitue une extension d’un résultat de Mulmuley [73] qui ne traite que la question du rang. Naturellement, le rang d’une matrice peut être calculé par la méthode du pivot de Gauss. Mais la méthode n’est pas uniforme et, a priori, ne se laisse pas bien paralléliser. Les applications des formules et algorithmes que nous allons décrire ici seront de deux ordres : d’une part en calcul parallèle, d’autre part lorsqu’on doit traiter des systèmes linéaires dépendant de paramètres. Dans ce deuxième cas de figure, la méthode du pivot de Gauss produit un arbre de calcul qui risque de comporter un très grand nombre de branches, correspondant à un grand nombre de formules distinctes, lorsque les paramètres prennent toutes les valeurs possibles. Le cas extrême est celui où toutes les entrées d’une matrice sont des paramètres indépendants. Par exemple avec une matrice de rang maximum de format n × 2n la solution du système linéaire correspondant par la méthode du pivot de Gauss dépend du mineur maximal non nul qu’on extrait, et ce n > 2n mineurs d’ordre n de dernier peut être n’importe lequel des C2n la matrice. En analyse numérique matricielle, avec des matrices à coefficients réels ou complexes, une formule uniforme compacte en rang fixé est obtenue par l’utilisation des coefficients de Gram de la matrice correspondant au système linéaire homogène : dans le cas réel, le Gram d’ordre k d’une matrice A est égal à la somme des carrés de tous les mineurs d’ordre k de A, son annulation signifie que le rang de la matrice n’excède pas k − 1. Les identités que nous allons obtenir sont des généralisations directes des formules usuelles qui expriment l’inverse de Moore-Penrose en fonction des coefficients de Gram de la matrice. L’étonnant est que, même sur un corps fini, un petit nombre de sommes de carrés de mineurs suffit à contrôler le rang d’une matrice, et que des formules semblables aux formules usuelles fonctionnent encore. Il y a cependant un prix à payer, non négligeable, qui est d’introduire un paramètre supplémentaire dans les calculs. 1.7. Résolution uniforme des systèmes linéaires 1.7.1 35 Les coefficients de Gram et l’inverse de Moore-Penrose dans le cas réel ou complexe Théorie générale Dans toute la section 1.7.1 A est une matrice dans Km×n , avec K = C ou R, représentant sur des bases orthonormées une application linéaire ϕ : E → F entre espaces vectoriels hermitiens ou euclidiens de dimension finie. Nous noterons hx, yi le produit scalaire des vecteurs x et y. Nous notons A? la transposée de la conjuguée de A (dans le cas réel on a A? = tA). La matrice A? représente sur les mêmes bases l’application linéaire adjointe 9 ϕ? , caractérisée par : ∀x ∈ E ∀y ∈ F hϕ(x), yiF = hx, ϕ? (y)iE (1.28) Les matrices AA? et A? A sont des matrices carrées hermitiennes positives (symétriques réelles positives dans le cas réel), en général non régulières. Si H est un sous-espace vectoriel de E nous noterons πH la projection orthogonale de E sur H, vue comme application linéaire de E dans E. D’un point de vue de pure algèbre linéaire tous les résultats de la (( théorie générale )) qui suit sont basés sur la décomposition des espaces E et F en sommes directes de noyaux et d’images de ϕ et ϕ? . Lemme 1.7.1 Nous avons deux sommes directes : Im ϕ ⊕ Ker ϕ? = F, Ker ϕ ⊕ Im ϕ? = E (1.29) Cela résulte du fait que Ker ϕ? (resp. Ker ϕ) est le sous-espace orthogonal de Im ϕ (resp. Im ϕ? ), ce qui est une conséquence directe de l’égalité (1.28). Nous en déduisons les faits suivants. Fait 1.7.2 1. L’application linéaire ϕ se restreint en un isomorphisme ϕ0 de Im ϕ? sur Im ϕ et ϕ? se restreint en un isomorphisme ϕ?0 de Im ϕ sur Im ϕ? . 2. En outre : Im ϕ = Im ϕϕ? , Ker ϕ? = Ker ϕϕ? , Ker ϕ = Ker ϕ? ϕ , Im ϕ? = Im ϕ? ϕ . (1.30) 9. A ne pas confondre avec la matrice adjointe Adj(A). Cette ambigüité dans la terminologie, en français, est ennuyeuse. 36 1. Rappels d’algèbre linéaire 3. Soit ϕ1 : Im ϕ → Im ϕ l’automorphisme linéaire défini par ϕ1 = ϕ0 ϕ?0 . C’est la restriction de ϕ ϕ? à Im ϕ. Nous avons :  det(IdIm ϕ + Z ϕ1 ) = det(IdF + Z ϕϕ? ) = 1 + a1 Z + · · · + ar Z r . où r = rg(ϕ) = rg(ϕ1 ) et ar = 6 0. De la même façon, nous avons l’automorphisme ϕ?1 = ϕ?0 ϕ0 de Im ϕ? et  det(IdIm ϕ? + Z ϕ?1 ) = det(IdE + Z ϕ? ϕ) = 1 + a1 Z + · · · + ar Z r . Ce sont des conséquences directes du lemme 1.7.1. Peut-être cela sera plus clair si nous représentons ϕ? et ϕ dans les sommes orthogonales (1.29) :  ϕ= ϕ0 0I ? ,K ? 0K,I 0K,K ?  , ? ϕ =  ϕ?0 0I,K 0K ? ,I ? 0K ? ,K  (1.31) où K = Ker ϕ, K ? = Ker ϕ? , I = Im ϕ, I ? = Im ϕ? . Définition 1.7.3 Les coefficients de Gram de A (ou de ϕ) sont les Gk (A) = Gk (ϕ) = ak donnés par la formule det(Im + Z AA? ) = 1 + a1 Z + · · · + am Z m . Nous définissons aussi G0 (A) = 1 et G` (A) = 0 pour (1.32) ` > m. Notez que le polynôme caractéristique de B = AA? est égal à (−1)m Z m Q(1/Z) où Q(Z) = det(Im + Z B). Les coefficients de Gram de ϕ sont donc, au signe près, les coefficients du polynôme caractéristique de ϕϕ? . Lemme 1.7.4 (Conditions de Gram pour le rang) 1. L’application linéaire ϕ est de rang ≤ r si et seulement si Gk (ϕ) = 0 pour r < k ≤ n. Elle est de rang r si en outre Gr (ϕ) 6= 0. 2. Le coefficient de Gram Gk (A) est un nombre réel positif ou nul, égal à la somme des carrés des modules des mineurs d’ordre k de la matrice A. En conséquence, Gr+1 (ϕ) = 0 suffit pour certifier que le rang est ≤ r. 1.7. Résolution uniforme des systèmes linéaires 37 Preuve. Le premier point est une conséquence directe du fait 1.7.2-3. Il pourrait aussi être vu comme une conséquence du second point, que nous démontrons maintenant. Le coefficient ak est la somme des mineurs principaux d’ordre k de AA? . Chaque mineur principal d’ordre k est obtenu comme déterminant de la matrice correspondante, qui est égale à Aα (Aα )? où α désigne un k-uple α1 < · · · < αk extrait de {1, . . . , m} et Aα est la matrice extraite de A en gardant seulement les k lignes correspondant à α. La formule de Binet-Cauchy (1.2) nous indique alors que ce déterminant est la somme des carrés des modules des mineurs d’ordre k extraits de Aα . t u Nous supposons désormais r = rg(ϕ) (donc ar = Gr (ϕ) 6= 0). Puisque det(IdIm ϕ + Z ϕ1 ) = det(IdF + Z ϕϕ? ) = 1 + a1 Z + · · · + ar Z r le théorème de Cayley-Hamilton nous donne + · · · + (−1)r ar IdIm ϕ = 0 . ϕr1 − a1 ϕr−1 1 (1.33) Par suite, on obtient en remplaçant ϕ1 par ϕϕ? dans la formule précédente (ϕϕ? )r − a1 (ϕϕ? )r−1 + · · · + (−1)r ar πIm ϕ = 0 . Ainsi : Lemme 1.7.5 (projections orthogonales sur l’image et sur le noyau) 1. La projection orthogonale πI sur le sous-espace I = Im ϕ ⊆ F est égale à :  a−1 ar−1 ϕ ϕ? − ar−2 (ϕ ϕ? )2 + · · · + (−1)r−1 (ϕ ϕ? )r . (1.34) r 2. La projection orthogonale πI ? sur le sous-espace I ? = Im ϕ? ⊆ E est égale à :  a−1 ar−1 ϕ? ϕ − ar−2 (ϕ? ϕ)2 + · · · + (−1)r−1 (ϕ? ϕ)r . (1.35) r Et la projection orthogonale sur le noyau de ϕ est IdE − πI ? . En outre l’équation (1.33) implique que l’inverse de ϕ1 est donné par  ϕ−1 = a−1 ar−1 IdIm ϕ − ar−2 ϕ1 + · · · + (−1)r−1 ϕr−1 . r 1 1 38 1. Rappels d’algèbre linéaire De même on a   ? r−1 ? r−1 ? ϕ?1 −1 = a−1 a Id − a ϕ + · · · + (−1) ϕ . r−1 Im ϕ r−2 1 r 1 et puisque ϕ?1 = ϕ?0 ϕ0 , cela donne ( ∀y ∈ Im ϕ? ϕ?1 −1 (y) =  a−1 ar−1 IdE − ar−2 (ϕ? ϕ) + · · · + (−1)r−1 (ϕ? ϕ)r−1 (y) r (1.36) Définition 1.7.6 Supposons que ϕ est de rang r. L’inverse de Moore-Penrose de ϕ (en rang r) est l’application linéaire ϕ[−1]r : F → E définie par : ∀y ∈ F ϕ[−1]r (y) = ϕ−1 0 (πIm ϕ (y)). Remarque. Nous n’avons pas écrit ϕ[−1]r = ϕ−1 0 ◦ πIm ϕ parce que le deuxième membre est a priori (( mal défini )) : πIm ϕ est une application est une application de Im ϕ dans Im ϕ? et ϕ[−1]r de F dans F , ϕ−1 0 est une application de F dans E. D’après (1.29) et (1.31) on voit que ∀y ∈ F ∀y ∈ F πIm ϕ (y) = ϕ?0 −1 (ϕ? (y)) ? −1 ? ϕ[−1]r (y) = ϕ−1 0 (ϕ0 (ϕ (y))). ? −1 = ϕ? −1 nous obtenons et puisque ϕ−1 1 0 ◦ ϕ0 ∀y ∈ F ϕ[−1]r (y) = ϕ?1 −1 (ϕ? (y)) (1.37) En appliquant (1.36) on obtient alors une formule uniforme en rang r qui donne une solution des systèmes linéaires en analyse numérique matricielle : Proposition 1.7.7 (Inverse de Moore-Penrose) Soit v ∈ F . Soit ϕ ⊕ v l’application linéaire E ⊕ K → F définie par (ϕ ⊕ v)(x, λ) = ϕ(x) + λv. 1) L’inverse de Moore-Penrose ϕ[−1]r ∈ L(F, E) est donné par :   −1  ar ar−1 IdE − ar−2 (ϕ? ϕ) + · · · + (−1)r−1 (ϕ? ϕ)r−1 ϕ? = (1.38)   −1 ? ar ϕ ar−1 IdF − ar−2 (ϕϕ? ) + · · · + (−1)r−1 (ϕϕ? )r−1 où ak = Gk (ϕ). 2) Nous avons v ∈ Im(ϕ) si et seulement si Gr+1 (ϕ ⊕ v) = 0 si et seulement si v = ϕ ϕ[−1]r (v) (1.39) Dans ce cas x = ϕ[−1]r (v) est l’unique solution dans Im(ϕ? ). 1.7. Résolution uniforme des systèmes linéaires 39 Remarque 1.7.8 Voici la formulation matricielle du lemme 1.7.5 et de la proposition 1.7.7. Soient m, n, r > 0 dans N avec r ≤ min(m, n) et A ∈ Km×n une matrice de rang r. Posons ak = Gk (A). Soit V ∈ Km×1 . 1) La matrice de la projection orthogonale sur le sous-espace Im A ⊆ Km est égale à  P = a−1 ar−1 AA? − ar−2 (AA? )2 + · · · + (−1)r−1 (AA? )r . r 2) La matrice de la projection orthogonale sur le sous-espace Im A? ⊆ Kn est égale à :  P ? = a−1 ar−1 A? A − ar−2 (A? A)2 + · · · + (−1)r−1 (A? A)r . r Et celle de la projection orthogonale sur le noyau de A est In − P ? . 3) La matrice A[−1]r ∈ Kn×m (inverse de Moore-Penrose de A en rang r) est égale à :  a−1 ar−1 In − ar−2 A? A + · · · + (−1)r−1 (A? A)r−1 A? (1.40) r 4) Le système linéaire AX = V admet une solution si et seulement si Gr+1 (A|V ) = 0 ((A|V ) est la matrice obtenue en juxtaposant la colonne V à droite de la matrice A) si et seulement si on a l’égalité : V = A A[−1]r V (1.41) Dans ce cas X = A[−1]r V est l’unique solution dans l’espace Im A? . Notez que la matrice A[−1]r ∈ Kn×m est bien définie par la formule (1.40) dès que A est de rang ≥ r. Cela est utile en analyse numérique et de manière plus générale chaque fois que les coefficients de A sont des réels connus avec seulement une précision finie (ce qui peut introduire une incertitude sur le rang de la matrice). Cas des matrices hermitiennes Lorsque E = F et ϕ = ϕ? , l’endomorphisme ϕ est dit hermitien. Alors on a une décomposition orthogonale E = Ker ϕ ⊕ Im ϕ et la restriction ϕ0 de ϕ à Im ϕ est un automorphisme linéaire de Im ϕ. Nous posons det(IdE + Z ϕ) = det(Im + Z A) = 1 + b1 Z + · · · + bn Z n . (1.42) 40 1. Rappels d’algèbre linéaire Au signe près, les bi sont donc les coefficients du polynôme caractéristique de ϕ. Si le rang de ϕ est égal à r alors br 6= 0, br+1 = . . . = bn = 0 et det(IdE + Z ϕ) = det(IdIm ϕ + Z ϕ0 ) = 1 + b1 Z + · · · + br Z r . Ainsi par Cayley-Hamilton ϕr0 − b1 ϕr−1 + b2 ϕ0r−2 + · · · + (−1)r−1 br−2 ϕ0 + (−1)r−1 br IdIm ϕ = 0 0 Et en remplaçant ϕ0 par ϕ nous obtenons : ϕr − b1 ϕr−1 + b2 ϕr−2 + · · · + (−1)r−1 br−2 ϕ + (−1)r−1 br πIm ϕ = 0 Ceci donne, pour le cas des matrices hermitiennes, une version simplifiée des résultats précédents plus généraux. Elle se trouve dans l’ouvrage [BP] de Bini et Pan. Proposition 1.7.9 (inverse de Moore-Penrose, cas hermitien) 1) La projection orthogonale πIm ϕ sur le sous-espace Im ϕ est égale à :  b−1 br−1 ϕ − br−2 ϕ2 + · · · + (−1)r−1 b1 ϕr−1 + (−1)r ϕr . (1.43) r 2) L’inverse de Moore-Penrose ϕ[−1]r ∈ L(E, E) est égal à : b−1 br−1 πIm ϕ − br−2 ϕ + · · · + (−1)r−1 b1 ϕr−2 + (−1)r ϕr−1 r  (1.44) Remarquez que l’équation (1.34) peut être déduite de (1.30) et (1.43). Interprétation géométrique Si λ1 ≥ λ2 ≥ · · · ≥ λr sont les valeurs singulières non nulles de ϕ, c’est-à-dire les racines carrées des valeurs propres > 0 de ϕϕ? il existe des bases orthonormées de E et F par rapport auxquelles la matrice de ϕ est égale à L :   λ1 0 · · · · · · 0 · · · 0 ..   .  0 λ2 0  . . ..  . . .. .. ..  .. .   . ..  .  L =  .. .. λ 0 . r    0 ··· ··· 0 0 0  . ..   .. . 0 ··· ··· ··· 0 1.7. Résolution uniforme des systèmes linéaires 41 (cf. [Cia, GL, LT]). Matriciellement on obtient A = U LV où U et V sont des matrices unitaires (orthogonales dans la cas réel) convenables. Ceci s’appelle la décomposition de A en valeurs singulières (la SVD en anglais). On voit que ϕ transforme la sphère unité de E en un ellipsoı̈de dans Im ϕ avec pour longueurs des axes principaux 2λ1 , . . . , 2λr . Dans ces conditions la matrice de ϕ? est égale à L? = tL et celle de ϕ[−1]r est égale à  [−1]r L        =        (λ1 )−1 0 ··· 0 .. . .. . (λ2 )−1 .. . 0 0 .. . ··· 0 ··· .. . .. . ··· ··· .. . (λr )−1 0 ···  0 ··· 0 ..  .   ..  .   ..  0 .    0 0   ..  .  ··· 0 de même format que tL. Bien que les matrices L et A[−1]r soient attachées de manière unique à A et dépendent continument de A (sous l’hypothèse que le rang est fixé), il n’en va pas de même pour les matrices U et V de la décomposition en valeurs singulières, qui sont fondamentalement instables. Que le vecteur v appartienne ou non à Im ϕ on a toujours ϕ[−1]r (v) ∈ Im ϕ? , qui est le sous-espace orthogonal à Ker ϕ et ϕ(ϕ[−1]r (v)) est la projection orthogonale de v sur Im ϕ. Ainsi lorsque v n’est pas dans l’image, l’inverse de Moore-Penrose fournit une solution approchée x = ϕ[−1]r (v) qui donne pour ϕ(x) la meilleure approximation (au sens des moindres carrés) de v. En outre x est la plus petite en norme (parmi les solutions qui réalisent cette meilleure approximation). Ce qui est remarquable est qu’on arrive à calculer (essentiellement à l’aide du polynôme caractéristique de ϕϕ? ) les projections orthogonales et l’inverse de Moore-Penrose par une formule uniforme (plus exactement, par une formule qui ne dépend que du rang, lequel se lit sur le polynôme caractéristique en question) sans qu’on ait besoin de calculer les bases orthonormées dans lesquelles se révèle la géométrie de l’application linéaire ϕ. 42 1.7.2 1. Rappels d’algèbre linéaire Généralisation sur un corps arbitraire Théorie générale Dans le cas réel ou complexe, on a vu qu’en termes d’algèbre linéaire tout le paragraphe (( théorie générale )) est gouverné par les sommes directes (1.29) entre les noyaux et images de ϕ et ϕ? (lemme 1.7.1) : Im ϕ ⊕ Ker ϕ? = F, Ker ϕ ⊕ Im ϕ? = E . Il suffit en effet, lorsqu’on parle de projection orthogonale, de remplacer par exemple l’expression projection orthogonale sur Im ϕ par projection sur Im ϕ parallèlement à Ker(ϕ? ). Nous allons voir maintenant que ces relations (1.29) peuvent être réalisées de manière automatique sur un corps arbitraire K à condition d’introduire, à la place de A? , une matrice A◦ à coefficients dans le corps K(t) où t est une indéterminée. Pour cela nous nous limitons au point de vue purement matriciel, (c’est le point de vue où des bases ont été fixées dans E et F ). Nous considérons une forme quadratique Φt,n sur E 0 = K(t)n et une forme quadratique Φt,m sur F 0 = K(t)m : Φt,n (ξ1 , . . . , ξn ) = ξ1 2 + t ξ2 2 + · · · + tn−1 ξn 2 Φt,m (ζ1 , . . . , ζm ) = ζ1 2 + t ζ2 2 + · · · + tm−1 ζm 2 Nous notons les (( produits scalaires )) correspondants par h·, ·itE 0 et h·, ·itF 0 . Nous notons Qn et Qm les matrices (diagonales) de ces formes sur les bases canoniques. Toute application linéaire ϕ : E → F donne lieu à une application linéaire E 0 → F 0 que nous notons encore ϕ et qui est définie par la même matrice sur les bases canoniques. Il existe alors une unique application linéaire ϕ◦ : F 0 → E 0 qui réalise les égalités (1.28) dans ce nouveau contexte : ∀x ∈ E 0 ∀y ∈ F 0 hϕ(x), yitF 0 = hx, ϕ◦ (y)itE 0 La matrice A◦ de ϕ◦ sur les bases canoniques est alors A◦ = Qn −1 tA Qm , puisqu’on doit avoir pour tous X ∈ K(t)n×1 , Y ∈ K(t)m×1 t (A X) Qm Y = tX Qn (A◦ Y ) . (1.45) 1.7. Résolution uniforme des systèmes linéaires 43 En pratique si A = (ai,j ) on obtient A◦ = (tj−i aj,i ), par exemple :   a11 t a21 t2 a31    t−1 a12 a22 t a32  a11 a12 a13 a14 a15   −2 ◦ −1 a33  A =  a21 a22 a23 a24 a25  , A =    t a13 t a23  t−3 a14 t−2 a24 t−1 a34  a31 a32 a33 a34 a35 t−4 a15 t−3 a25 t−2 a35 Comme nous l’avons déjà indiqué, pour pouvoir reproduire (avec les légères variations nécessaires) le fait 1.7.2, les définitions 1.7.3 et 1.7.6, les lemmes 1.7.4, 1.7.5 et la proposition 1.7.7 il nous suffit de démontrer l’analogue du lemme 1.7.1. Lemme 1.7.10 Avec les notations ci-dessus on a pour toute matrice M ∈ Km×n , des sommes directes orthogonales dans les espaces F 0 = K(t)m et E 0 = K(t)n Im ϕ ⊕ Ker ϕ◦ = F 0 , Ker ϕ ⊕ Im ϕ◦ = E 0 (1.46) Preuve. Les dimensions conviennent et il suffit de montrer que l’intersection est réduite à 0. Prenons par exemple la première. La relation (1.45) implique que l’orthogonal de Im ϕ au sens de la forme bilinéaire h·, ·iF 0 est égal à Ker ϕ◦ . Il nous suffit donc de montrer que si H est un sous-espace vectoriel de F 0 = K(t)m défini sur K , son orthogonal H ⊥ dans K(t)m au sens du produit scalaire h·, ·itF 0 ne le coupe qu’en 0. Soit donc (p1 (t), . . . , pm (t)) ∈ H ∩ H ⊥ . Il existe P v1 , . . . , vr ∈ H et a1 (t), . . . , ar (t) ∈ K(t) tels que (p1 (t), . . . , pm (t)) = i ai (t) vi . Quitte à multiplier par le produit des dénominateurs on peut supposer que les ai sont des polynômes et donc aussi les pi . On peut introduire une nouvelle indéterminée u et travailler dans K[t, u]. Alors P puisque P a (t) v est orthogonal à tous les v il est orthogonal à i i i i ai (u) vi = i (p1 (u), . . . , pm (u)) et cela donne Xm P (t, u) = pi (t) pi (u) ti−1 = 0 . i=1 Il nous reste à voir que cette relation implique que les pi sont tous nuls. Supposons l’un des pi non nul. Soit d ≥ 0 le plus grand des degrés des pi . Soit k le plus grand indice pour lequel deg pk = d et ak le coefficient dominant de pk . Alors on vérifie facilement que le coefficient de ud td+k−1 dans P (t, u) est égal à a2k , et donc P est non nul. t u Nous nous contentons maintenant de reproduire les définitions et résultats dans notre nouveau cadre. 44 1. Rappels d’algèbre linéaire Fait 1.7.11 1. L’application linéaire ϕ : E 0 → F 0 se restreint en un isomorphisme ϕ0 de Im ϕ◦ sur Im ϕ et ϕ◦ se restreint en un isomorphisme ϕ◦0 de Im ϕ sur Im ϕ◦ . 2. En outre : Im ϕ = Im ϕϕ◦ , Ker ϕ◦ = Ker ϕϕ◦ , Ker ϕ = Ker ϕ◦ ϕ , Im ϕ◦ = Im ϕ◦ ϕ . (1.47) 3. Soit ϕ1 : Im ϕ → Im ϕ l’automorphisme linéaire défini par ϕ1 = ϕ0 ϕ◦0 . C’est la restriction de ϕ ϕ◦ à Im ϕ. Nous avons :  det(IdIm ϕ + Z ϕ1 ) = det(IdF + Z ϕϕ◦ ) = 1 + a1 Z + · · · + ar Z r . où r = rg(ϕ) = rg(ϕ1 ) et ar 6= 0. De la même façon, nous avons l’automorphisme ϕ◦1 = ϕ◦0 ϕ0 de Im ϕ◦ et  det(IdIm ϕ◦ + Z ϕ◦1 ) = det(IdE + Z ϕ◦ ϕ) = 1 + a1 Z + · · · + ar Z r . Les coefficients de la matrice A A◦ sont des polynômes de Laurent, autrement dit des éléments de K[t, 1/t]. Définition 1.7.12 Les polynômes de Gram (généralisés) de A sont les polynômes de Laurent Gk0 (A)(t) = ak (t) ∈ K[t, 1/t], et les coefficients de 0 (A) = a Gram généralisés de A sont les coefficients Gk,` k,` donnés par la formule   det(Im + Z AA◦ ) = 1 + a1 (t) Z + · · · + am (t) Z m P  (1.48) k(m+n−2k) `  ak (t) = t−k(n−k) a t k,` `=0 Nous définissons aussi G00 (A) = 1 et G`0 (A) = 0 pour ` > m. On vérifie aisément que Gk0 (A)(t) = Gk0 ( tA)(1/t). Dans la suite de cette section, nous dirons, pour abréger, (( polynôme )) à la place de (( polynôme de Laurent )) en laissant au lecteur le soin de déterminer selon le contexte si des puissances négatives de la variable sont présentes ou non. Notons que les coefficients de Gram usuels sont donnés par X Gk (A) = Gk0 (A)(1) = ak,` (1.49) ` 1.7. Résolution uniforme des systèmes linéaires 45 Les coefficients de Gram généralisés sont des sommes de carrés de mineurs et ils permettent de contrôler le rang de la matrice en vertu du lemme suivant, qui est l’analogue du lemme 1.7.4. Lemme 1.7.13 (Conditions de Gram généralisées pour le rang) Soit A ∈ Km×n ⊆ K(t)m×n . (1) La matrice A est de rang ≤ r si et seulement si les polynômes Gk0 (A)(t) pour k > r sont identiquement nuls. Elle est de rang r si en outre Gr0 (A) 6= 0. 0 (A) est égal à la somme des (2) Le coefficient de Gram ak,` = Gk,` carrés des mineurs µα,β d’ordre k de la matrice A extraits sur les lignes et les colonnes correspondant aux multi-indices α = (α1 , . . . , αk ) et β = (β1P , . . . , βk ) pour toutes les paires (α, β) qui vérifient l’égalité P k k i=1 αi − j=1 βj = ` − k(n − k). En particulier Gk0 (A) = 0 si k > p = inf(m, n). En posant p = inf(m, n) et p0 = sup(m, n) le nombre total des coefficients de Gram généralisés est égal à : p X k=1 (k (m + n − 2k) + 1) = p + 1 1 p (p + 1) (3p0 − p − 2) ≤ p(p + 1)p0 . 6 2 Nous avons les analogues du lemme 1.7.5 et de la proposition 1.7.7. Lemme 1.7.14 (projections sur l’image et sur le noyau) Soient m, n, r > 0 dans N avec r ≤ min(m, n), A ∈ Km×n une matrice de rang r. Posons ak (t) = Gk0 (A). (1) La matrice de la projection sur le sous-espace Im A ⊆ K(t)m parallèlement à Ker A◦ est égale à P = a−1 ar−1 AA◦ − ar−2 (AA◦ )2 + · · · + (−1)r−1 (AA◦ )r r  (1.50) (2) La matrice de la projection sur le sous-espace Im A◦ ⊆ K(t)n parallèlement à Ker A est égale à P • = a−1 ar−1 A◦ A − ar−2 (A◦ A)2 + · · · + (−1)r−1 (A◦ A)r r  (1.51) Et la matrice de projection sur le noyau de A parallèlement à Im A◦ est In − P • . 46 1. Rappels d’algèbre linéaire Notez qu’il s’agit de projections orthogonales par rapport aux formes bilinéaires h., .itE 0 et h., .itF 0 . Remarque. En fait chaque formule peut être spécialisée en remplaçant t par n’importe quelle valeur τ ∈ K \ {0} qui n’annule pas le dénominateur ar (t) (ce qui est toujours possible si le corps possède au moins r(m + n − 2r) + 1 éléments). Définition 1.7.15 Supposons que ϕ est de rang r. L’inverse de Moore-Penrose généralisé de ϕ (en rang r) est l’application linéaire ϕ[−1]r,t : F 0 → E 0 définie par : ∀y ∈ F 0 ϕ[−1]r,t (y) = ϕ−1 0 (πIm ϕ (y)). Proposition 1.7.16 (inverse de Moore-Penrose généralisé) Soient m, n, r > 0 dans N avec r ≤ min(m, n), A ∈ Km×n de rang r, V ∈ Km×1 . (1) L’inverse de Moore-Penrose généralisé de A en rang r est la matrice A[−1]r,t ∈ K(t)n×m égale à  a−1 ar−1 Im − ar−2 A◦ A + · · · + (−1)r−1 (A◦ A)r−1 A◦ (1.52) r où ak = Gk0 (A). (2) Le système linéaire AX = V admet une solution si et seulement si 0 le polynôme Gr+1 (A|V ) est identiquement nul si et seulement si V = A A[−1]r,t V (1.53) Dans ce cas X = A[−1]r,t V est l’unique solution dans Im(A◦ ). Remarque. Si ϕ est injective et v ∈ Im ϕ est représenté par un vecteur colonne V ∈ Km×1 l’élément A[−1]r,t V est l’unique solution du système linéaire correspondant. En conséquence, il ne dépend pas de t et les fractions rationnelles données par le calcul des coordonnées de A[−1]r,t V se simplifient en des constantes. Cas des matrices symétriques Dans ce paragraphe E 0 = F 0 = K(t)n×n , ϕ est défini par une matrice symétrique A = tA ∈ Kn×n et rg(ϕ) = r. Soit λ l’automorphisme linéaire de E 0 defini par Qn par rapport à la base canonique. Définissons ϕ b = λ−1 ◦ ϕ, ϕ e = ϕ ◦ λ. 1.7. Résolution uniforme des systèmes linéaires 47 b = Q−1 A, celle de ϕ e = A Qn . La matrice de ϕ b est A e est A n Puisque A est symétrique, on a : b = t (A)(1/t) e A(t) et ϕ◦ = λ−1 ◦ ϕ ◦ λ = ϕ b ◦ λ = λ−1 ◦ ϕ e. On en déduit : Im ϕ b = Im ϕ◦ , Ker ϕ b = Ker ϕ, Im ϕ e = Im ϕ, Ker ϕ e = Ker ϕ◦ , Im ϕ = λ(Im ϕ◦ ), Ker ϕ = λ(Ker ϕ◦ ) Donc l’équation (1.46) peut être réécrite comme deux décompositions orthogonales (par rapport à la forme bilinéaire h., .itE 0 ) : Im ϕ b ⊕ Ker ϕ b = Im ϕ◦ ⊕ Ker ϕ = I ◦ ⊕ K = E 0 , Im ϕ e ⊕ Ker ϕ e = Im ϕ ⊕ Ker ϕ◦ = I ⊕ K ◦ = E 0 . Nous notons ϕ e0 l’automorphisme de I obtenu par restriction de ϕ. e Les applications linéaires ϕ, ϕ e et ϕ e0 ont même rang r, et la somme directe Im ϕ e ⊕ Ker ϕ e = I ⊕ K ◦ = E 0 entraı̂ne que : det(In + Z ϕ) e = det(IdI + Z ϕ e0 ) = 1 + b1 (t) Z + · · · + br (t)Z r (1.54) avec br 6= 0 et br+1 = . . . = bn = 0. Les bi (t) sont au signe près les coefficients du polynôme caractéristique de ϕ. e On vient de démontrer la version simplifiée du lemme 1.7.13. Ceci constitue le résultat clé de Mulmuley [73]. Lemme 1.7.17 (Conditions de Mulmuley pour le rang d’une matrice e = A Qn avec A ∈ Kn×n symétrique. Soit ck = ck (t) symétrique) Soit A e le coefficient de Z n−k dans le polynôme caractéristique PAe(Z) de A. Alors, la matrice A est de rang ≤ r si et seulement si les polynômes ck (t) pour k > r sont identiquement nuls. Elle est de rang r si en outre cr (t) 6= 0. Puisqu’on a la somme orthogonale Im ϕ e ⊕ Ker ϕ e = E 0 on peut reproduire les calculs donnés dans le cas des matrices symétriques réelles et on obtient le résultat suivant, qui simplifie ceux obtenus dans le cas d’une matrice arbitraire, de façon similaire à la proposition 1.7.9. Proposition 1.7.18 (Un inverse généralisé d’une matrice symétrique) Soit A ∈ Kn×n symétrique de rang r, E 0 = K(t)n et ϕ : E 0 → E 0 e = A Qn . l’application linéaire définie par A. On considère la matrice A 48 1. Rappels d’algèbre linéaire Les coefficients bi sont définis par l’égalité (1.54). Dans la suite l’orthogonalité s’entend par rapport à la forme bilinéaire h., .itE 0 . (1) La projection orthogonale πIm ϕ sur le sous-espace Im ϕ de E 0 a pour matrice :   e − br−2 A e 2 + · · · + (−1)r−1 b1 A e r−1 + (−1)r A er . P = b−1 b A r−1 r (2) L’inverse de Moore-Penrose généralisé ϕ e [−1]r,t ∈ L(E 0 , E 0 ) de ϕ e a pour matrice :   e [−1]r,t = br −1 br−1 P − br−2 A e + · · · + (−1)r−1 b1 A e r−2 + (−1)r A e r−1 A (3) L’endomorphisme ψ = λ ◦ ϕ e [−1]r,t de E 0 , dont la matrice est B = e [−1]r,t , est un inverse généralisé de ϕ au sens suivant : Qn A ϕ◦ψ◦ϕ=ϕ et ψ◦ϕ◦ψ = ψ. L’application linéaire ϕ ◦ ψ est la projection sur Im ϕ parallèlement à Ker ψ et ψ ◦ ϕ est la projection sur Im ψ parallèlement à Ker ϕ. Pour tout vecteur colonne V le système linéaire AX = V admet une solution si et seulement si ABV = V et en cas de réponse positive, BV est l’unique solution dans l’espace Im ψ. Preuve. Il reste à prouver le point 3. Posons θ = ϕ e [−1]r,t . On sait que ϕ e◦θ ◦ϕ e=ϕ e et θ◦ϕ e◦θ = θ. Puisque ϕ e = ϕ◦λ et ψ = λ◦θ, cela donne tout de suite les deux égalités demandées pour ψ et ϕ. Tout le reste suit sans difficulté. t u Pour la théorie des inverses généralisés nous recommandons les livres [Bha] et [LT]. Interprétation par les identités de Cramer Supposons la matrice A de rang r et V dans l’espace engendré par les colonnes de A. Appelons Cj la j - ème colonne de A. Soit µα,β = det(Aα,β ) le mineur d’ordre r de la matrice A extrait sur les lignes α = {α1 , . . . , αr } et les colonnes β = {β1 , . . . , βr }. Pour j = 1, . . . , r soit να,β,j le déterminant de la même matrice extraite, à ceci près que la colonne j a été remplacée par la colonne extraite de V sur les lignes α. 1.7. Résolution uniforme des systèmes linéaires 49 Alors on obtient pour chaque couple (α, β) de multi-indices une identité de Cramer : Xr να,β,j Cβj (1.55) µα,β V = j=1 due au fait que le rang de la matrice (A1..m,β |V ) est inférieur ou égal à r (cf. l’égalité 1.6 page 8). Ceci peut se relire comme suit :   να,β,1     Cβ1 . . . Cβr ·  ...  = µα,β V = να,β,r   v α1     Cβ1 . . . Cβr · Adj(Aα,β ) ·  ...  = = v αr = A · (In )1..n,β · Adj(Aα,β ) · (Im )α,1..m · V P P Notons |α| = ri=1 αi , |β| = ri=1 βi . Rappelons que X Gr0 (A)(t) = t|α|−|β| µ2α,β . (1.56) α,β Si nous multiplions chaque égalité (1.56) par µα,β t|α|−|β| et si nous additionnons toutes ces égalités nous obtenons une expression de la forme : X  0 |α|−|β| Gr (A)·V = A· µα,β t · (In )1..n,β · Adj(Aα,β ) · (Im )α,1..m ·V α,β Cette formule ressemble beaucoup trop à (1.53) donnée dans la proposition 1.7.16 : V = A A[−1]r,t V pour ne pas être due à une égalité X Gr0 (A) A[−1]r,t = µα,β t|α|−|β| (In )1..n,β ·Adj(Aα,β )·(Im )α,1..m . (1.57) β,α Ainsi l’inverse de Moore-Penrose généralisé peut être interprété comme une somme pondérée d’identités de Cramer. Nous ne prouverons cependant pas cette dernière égalité. On peut la trouver, démontrée dans un cadre différent (plus général) et formulée différemment, comme l’égalité 2.13 dans [76] ou, avec la même formulation qu’ici, dans [25]. 2. Algorithmes de base en algèbre linéaire Introduction Il s’agit dans ce chapitre de décrire et d’analyser certaines méthodes séquentielles, plus ou moins classiques, pour le calcul du déterminant et du polynôme caractéristique à coefficients dans un anneau commutatif. L’objectif recherché est de comparer ces algorithmes séquentiels et de dégager le meilleur possible, c’est-à-dire le plus rapide théoriquement et pratiquement, occupant le moins d’espace mémoire possible (en évitant notamment l’explosion de la taille des résultats intermédiaires), le plus facilement implémentable sur machine séquentielle et le plus général, c’est-à-dire applicable dans un anneau commutatif arbitraire. Nous introduirons plus loin (chapitre 4) des notions précises de complexité. Dans ce chapitre nous nous contenterons de la notion informelle de complexité arithmétique donnée par le compte du nombre d’opérations arithmétiques dans l’anneau de base lors de l’exécution de l’algorithme considéré. Nous ferons également quelques commentaires, souvent informels, sur le bon contrôle (ou non) de la taille des résultats intermédiaires. Nous commençons par l’algorithme du pivot de Gauss pour le calcul du déterminant. C’est l’algorithme d’algèbre linéaire le plus classique. Il fonctionne sur un corps et possède de nombreuses applications (solutions de systèmes linéaires , calcul de l’inverse, LU-décomposition . . .). La méthode du pivot pour la résolution des systèmes linéaires est en fait due aux savants chinois : on pourra consulter à ce sujet la notice historique du chapitre 3 dans l’ouvrage de Schrijver [Sch] ainsi que l’étude plus récente de Karine Chemla 1 [15, 16]. 1. Dès le troisième siècle de notre ére, on trouve dans les commentaires de Liu Hui sur le texte classique Les neuf Chapitres ce qu’il semble légitime d’appeler une 52 2. Algorithmes de base en algèbre linéaire Nous continuons avec un algorithme qui a pour mérite sa très grande simplicité : l’algorithme de Jordan-Bareiss qui peut être vu comme une adaptation de la méthode du pivot de Gauss, avec un meilleur comportement des coefficients intermédiaires. Cet algorithme fonctionne sur un anneau commutatif intègre, à condition que les divisions exactes ne soit pas trop coûteuses. Dans le cas du calcul du polynôme caractéristique, il devient un algorithme sans division et s’applique sur un anneau commutatif arbitraire. C’est ce que nous appelons la méthode de Jordan-Bareiss modifiée. Une variante de l’algorithme de Jordan-Bareiss due à Dodgson (alias Lewis Caroll) offre des perspectives intéressantes dans le cas des matrices structurées. Nous étudions ensuite l’algorithme de Hessenberg, couramment utilisé en analyse numérique. Il utilise des divisions par des éléments non nuls arbitraires (on suppose donc qu’on travaille sur un corps). Mais en calcul formel, où l’on veut des résultats exacts, se pose sérieusement le problème de la croissance de la taille des résultats intermédiaires. Nous signalons la méthode d’interpolation de Lagrange dans laquelle le calcul du polynôme caractéristique dépend du calcul de plusieurs déterminants. Nous examinons ensuite des méthodes qui utilisent des divisions uniquement par des nombres entiers (de petite taille). Il s’agit de la méthode de Le Verrier et de son amélioration à la Souriau-Faddeev-Frame. Nous continuons avec les méthodes sans division de Samuelson-Berkowitz et de Chistov. Plus sophistiquées et nettement plus efficaces que la méthode de Jordan-Bareiss modifiée elles fonctionnent également sur un anneau commutatif arbitraire. L’algorithme de Chistov présente les mêmes caractéristiques que celui de Samuelson-Berkowitz mais révèle un léger handicap par rapport à ce dernier dans les tests expérimentaux. Nous terminons avec les méthodes qui utilisent les suites récurrentes linéaires. Celle que nous appelons méthode de Frobenius a de bonnes caractéristiques tant du point de vue du nombre d’opérations arithmétiques que de la taille des résultats intermédiaires. Elle ne s’applique cependant pas en toute généralité, et, hormis le cas des corps finis, elle est en pratique surpassée par l’algorithme de Berkowitz, sans doute parce que ce dernier n’utilise pas de division, et a besoin de moins d’espace mémoire (meilleur contrôle des résultats intermédiaires). Nous exposons également une variante due à Wiedemann. Dans ce chapitre, nous nous intéressons seulement à des versions preuve de correction de l’algorithme du pivot de Gauss présenté dans ce texte ancien. 2.1. Méthode du pivot de Gauss 53 assez simples des algorithmes. Nous dirons qu’une version d’un algorithme est élémentaire si les multiplications de matrices, de polynômes ou de nombres entiers qui interviennent en son sein sont exécutées selon la méthode classique usuelle (dite parfois (( naı̈ve ))). Pour les matrices et les polynômes la multiplication usuelle consiste à appliquer simplement la formule définissant le produit. Pour la multiplication des entiers, il s’agit de l’algorithme qu’on apprend à l’école primaire. D’autre part, nous parlons de versions séquentielles dans la mesure où les méthodes qui cherchent à accélérer l’exécution lorsque de nombreux processeurs sont utilisés en parallèle ne sont pas envisagées. Dans ce chapitre, nous ne développons que des versions séquentielles élémentaires. Rappelons enfin la convention importante suivante : dans tout cet ouvrage la notation log n signifie max(1, log2 n). 2.1 Méthode du pivot de Gauss C’est la méthode la plus répandue et la plus courante aussi bien pour le calcul exact que pour le calcul approché des déterminants lorsque les coefficients appartiennent à un corps K dans lequel les opérations de base ( + , − , × , / ) ainsi que le test d’égalité à 0 s’effectuent par des algorithmes. Son intérêt réside non seulement dans le fait qu’elle possède plusieurs variantes (symboliques ou numériques) jouant un rôle important dans la réduction et l’inversion des matrices et dans la résolution des systèmes linéaires, mais aussi dans le fait que la technique du pivot est utilisée dans d’autres méthodes de réduction comme celle de Jordan-Bareiss, ou pour le calcul du polynôme caractéristique comme nous le verrons plus loin avec, par exemple, les méthodes de (( Jordan-Bareiss modifiée )) ou de Hessenberg. 2.1.1 Transformations élémentaires Une matrice est dite triangulaire supérieure (resp. triangulaire inférieure) si les éléments situés au-dessous de (resp. au dessus de) la diagonale principale sont nuls. On dit matrice triangulaire lorsque le contexte rend clair de quelle variante il s’agit. Une matrice triangulaire 54 2. Algorithmes de base en algèbre linéaire est dite unitriangulaire si les coefficients sur la diagonale principale sont tous égaux à 1. Basée sur l’idée des éliminations successives des inconnues dans la résolution d’un système linéaire, la méthode du pivot de Gauss consiste à réduire une matrice A ∈ Km×n à une matrice triangulaire supérieure par une succession de transformations élémentaires sur les lignes (et éventuellement sur les colonnes) de A. Les transformations élémentaires sur les lignes d’une matrice sont de trois types : (i) multiplier une ligne par un élément non nul de K ; (ii) échanger deux lignes ; (iii) ajouter à une ligne le produit d’une autre ligne par un élément de K. On définit de manière analogue les transformations élémentaires sur les colonnes. On associe à toute transformation élémentaire (sur les lignes ou sur les colonnes) d’une matrice A ∈ Km×n la matrice (dite élémentaire) obtenue en effectuant cette même transformation élémentaire de la matrice unité (matrice unité d’ordre m ou n selon le cas). Toute transformation élémentaire sur les lignes (resp. colonnes) de A revient alors à multiplier à gauche (resp. à droite) la matrice A par la matrice élémentaire correspondante. Ceci est dû simplement au fait que si L1 , L2 ∈ K1×n , on a pour tout λ ∈ K :           L1 λ 0 λL1 L1 0 1 L2 = ; = ; 0 1 L2 L2 1 0 L2 L1  et 1 0 λ 1  L1 L2   = L1 L2 + λL1  · ( 2) Il est clair que l’inverse d’une transformation élémentaire sur les lignes (resp. colonnes) est une transformation élémentaire de même type sur les lignes (resp. colonnes). Précisément :  λ 0 0 1 −1 =  et  1 0 λ 1 λ−1 0 0 1  −1 1 0 −λ 1  =  , 2. Égalités analogues pour les colonnes. 0 1 1 0 −1  = 0 1 1 0  pour tout λ ∈ K.  2.1. Méthode du pivot de Gauss 55 Une matrice (et l’application linéaire correspondante) est dite unimodulaire si elle est de déterminant 1. Lorsqu’on veut se limiter aux transformations élémentaires qui correspondent au produit par une matrice unimodulaire, on a droit seulement à celles du troisième type. Néanmoins, il est facile de voir qu’une succession de trois telles transformations permet d’obtenir un échange signé de lignes (ou de colonnes) du type (Li , Lj ) ← (Lj , −Li ), qui est considéré comme la variante unimodulaire des transformations élémentaires du deuxième type. Les échanges signés et les transformations élémentaires du troisème type sont appelées transformations élémentaires unimodulaires. L’élimination de Gauss proprement dite que nous considérons ici est essentiellement une succession de transformations élémentaires du troisième type sur les lignes : des échanges de lignes ou de colonnes n’interviennent que s’il y a lieu de chercher un pivot non nul pour le ramener au bon endroit. Chaque étape de l’algorithme de Gauss consiste donc à traiter le pivot (non nul) issu de l’étape précédente, en faisant apparaı̂tre des zéros au-dessous de ce pivot, et à déterminer ensuite le pivot de l’étape suivante pour le placer sur la diagonale consécutivement au pivot précédent. Si on remplaçait les échanges (de lignes ou de colonnes) signés, on obtiendrait donc une réduction n’utilisant que des transformations élémentaires unimodulaires. En fait, il est bien connu, et c’est une conséquence de la méthode du pivot de Gauss, que toute matrice carrée inversible est égale à un produit de matrices élémentaires. Et qu’en conséquence toute matrice (de n’importe quel format) peut être ramenée par manipulations élémentaires de lignes et de colonnes à une forme canonique du type suivant   Ir | 0  − − −  0 | 0 avec la possibilité de lignes ou de colonnes vides. Cette réduction est d’une importance théorique capitale. Citons par exemple Gabriel & Roiter [GR] page 5, qui donnent d’ailleurs dans leur chapitre 1 des extensions très intéressantes de la méthode : [. . .] en dépit de son évidence et de sa simplicité, ou peut-être grâce à elles, cette réduction est très utile, et son usage répété conduit à des résultats profonds. Si on se limite aux transformations élémentaires unimodulaires, alors la forme réduite est la même que ci-dessus dans le cas d’une matrice rectangulaire ou carrée non inversible, et pour une matrice carrée inversible 56 2. Algorithmes de base en algèbre linéaire il faut modifier la forme réduite en prenant son dernier coefficient diagonal non nécessairement égal à 1. 2.1.2 La LU - décomposition Lorsque le processus de triangulation d’une matrice A ∈ Km×n aboutit sans qu’aucune permutation de lignes ou de colonnes n’intervienne — ce qui a lieu si les r premières sous-matrices principales dominantes de A, r étant le rang de A, sont régulières — et si l’on garde en mémoire les matrices élémentaires associées aux transformations effectuées, la méthode du pivot de Gauss permet d’obtenir, en même temps que la triangulation de A, ce qu’il est convenu d’appeler une LU -décomposition, c’est-à-dire une façon d’écrire A sous la forme : A = LU , où U ∈ Km×n est une matrice triangulaire supérieure (c’est la forme triangulaire recherchée de A), et L ∈ Km×m une matrice unitriangulaire inférieure : L n’est autre que l’inverse du produit des matrices élémentaires correspondant aux transformations successives effectuées sur les lignes de A. Pour une matrice carrée régulière, l’existence d’une telle décomposition équivaut au fait que le processus de triangulation arrive à son terme sans aucun échange de lignes ni de colonnes. Elle équivaut aussi à la complète régularité de la matrice puisque les mineurs principaux de la matrice considérée ne sont autres que les produits successifs des pivots rencontrés au cours du processus. Enfin, toujours dans le cas d’une matrice carrée régulière, l’existence de la décomposition implique son unicité. Cela ne serait plus le cas pour une matrice singulière comme on peut le voir ici          1 0 0 1 3 1 1 3 1 1 0 0 1 3 1  2 1 0   0 0 1  =  2 6 3  =  2 1 0  0 0 1 . 3 4 1 0 0 1 3 9 8 3 0 1 0 0 5 Nous donnons maintenant à voir le résultat de la méthode du pivot de Gauss avec des matrices à coefficients entiers. Exemples 2.1.1 Nous montrons deux exemples caractérisitiques, où tous les pivots qui se présentent sur la diagonale sont non nuls. Nous donnons les matrices L et U . Le premier est celui d’une matrice dont les coefficients entiers ne prennent pas plus 2.1. Méthode du pivot de Gauss 57 que 2 chiffres. Sur la première ligne les matrices M1 et L1 , ensuite la matrice U1 .   1 0 0 0 0 19    1 0 0 0    9 7 8 11 13 4  9      19 35 −313 4 56 84 73 10     1 0 0   35 62 −13 17 23 11  ,  , 9 97       20 3 6 7 5 9   20  113 −5562  1 0  49 23 50 42 2 17  9  97 7963   136 −4694 −21433 49 1 9 97 7963 244718   9 7 8 11 13 4 352 547 410 14  0 −97    9 9 9 9 9     7963 16523 11586 45   0  0  U1 =  . 97 97 97 97    51521 −10965  244718  0  0 0   7963 7963 7963   −15092695 −1665525 0 0 0 0 244718 244718 Le deuxième exemple est celui d’une matrice à coefficients dans Q. Le numérateur et le dénominateur n’ont qu’un chiffre, mais la croissance de la taille des coefficients est spectaculaire. Sur la première ligne M2 et U2 , sur la seconde L2 .  1 3 −9 7 −7    3 −9 7 −7 1  6 2 5 6 6    6   2 5 6 6  3 −9 5 2       1  86 −137 193   0 −117  2 8 7 9      8 5 14 18  −1 2 7 1 9        6763 −4175 35446   9 3 6 8 5     0  0    7 3510 19656 15795 3 1 −7 −4     ,    8 −959257 −3391183  4 4 9 3     0 0 0     −1 1704276 486936   −7 −4 6     −1    25849022797  6 9 7   0  3 0 0 0   9 10254937392  −1 2 −5 9          0 0 0 0  8 2 5 9 8   0   0 0 0 0 0 2 −8 4 −3 −1 3 7 9 7   1 0 0 0 0 0 0  9 1 0 0 0 0 0      −2 −40  1 0 0 0 0    3 351     21 19 4635   1 0 0 0  4  39 6763 , L2 =    −16 −8475 −969733  −2 1 0 0    117 6763 6782366    27  85 381 8966489 251177120859   1 0   117 13526 13564732 258490227970  4    400 −54066 −3752551 64239864618 4 0 1 819 47341 23738281 129245113985 58 2. Algorithmes de base en algèbre linéaire Nous allons comprendre ces comportements typiques en exprimant précisément les coefficients calculés dans la méthode du pivot de Gauss en fonction de déterminants extraits de la matrice initiale. Nous avons pour cela besoin de préciser les notations. Notation 2.1.2 Soit A ∈ Km×n une matrice de rang r. On suppose que la triangulation de Gauss aboutit à son terme sans échange de ligne ni de colonne. Dans ces conditions on pose A[0] = A, on note A[p] la matrice transformée de A à l’issue de l’étape p (p ≤ r) et on note L[p] le produit des matrices élémentaires correspondant aux transformations effectuées au cours de l’étape p, de sorte que A[p] = L[p] A[p−1] et L[p] est une matrice qui ne diffère de la matrice unité Im que des éléments de la p - ème colonne situés au-dessous de la diagonale principale. On [p] [p] note a ij l’élément en position (i, j) de la matrice A[p] et l ij celui de la matrice L[p] . (p) Le symbole de Kronecker est défini page 22 et la notation a ij page 3. On a alors : [p] [p] Propriété 2.1.3 Avec les notations précédentes, les éléments l ij , a ij (p) et a ij sont liés par les relations suivantes (dans (2.1) on a 1 ≤ p ≤ r, p < j ≤ n et p < i ≤ m) : [p] a ij = [p−1] a ij [p] l ip − = [p−1] ip [p−1] a pp a [p−1] a pj [p−1] ip − [p−1] a pp a = [p−1] [p−1] [p−1] [p−1] ij a pp − a ip a pj . [p−1] a pp a si i > p, [p] l ij = δij sinon. [0] [1] (p−1) a 11 a 22 · · · a[p−1] pp = a pp . (2.1) (2.2) (2.3) (p) [p] a ij [p] l ip = (p−1) ip − (p−1) a pp a = a ij a (p−1) pp si i > p, . (2.4) [p] (2.5) l ij = δij sinon. 2.1. Méthode du pivot de Gauss 59 Preuve. Les deux premières équations correspondent exactement aux affectations de l’algorithme de Gauss. Les deux suivantes correspondent au fait que les déterminants des sous matrices correspondantes de A sont inchangés par les transformations élémentaires de lignes utilisées dans l’algorithme. La dernière résulte de la deuxième et la quatrième. t u [r−1] Il est clair que la matrice U = A (où r = rg(A)) obtenue à l’issue de la dernière étape de l’algorithme de Gauss dans ce cas, est bien la forme triangulaire supérieure recherchée de la matrice A, et que A = LU où h i−1 h i−1 h i−1 L = [lij ] = L[1] L[2] · · · L[r−1] (2.6) est une matrice triangulaire inférieure avec en outre (j−1) l ij = [j] −l ij = a ij (j−1) a jj si m ≥ i > j ≥ 1, l ij = δij sinon. (2.7)  −1 [p] ne diffère de L[p] que des éléments l ip pour En effet la matrice L[p] 1 ≤ p < i ≤ m qui doivent être remplacés par leurs opposés, et la mul −1  −1  [p+1] −1 tiplication à gauche par L[p−1] du produit L[p] L ···  [r−1] −1 n’affecte que la (p−1) - ème colonne de ce dernier (identique à L la (p − 1) - ème colonne de Im ) et revient tout simplement à la remplacer  −1 par la (p − 1) - ème colonne de L[p−1] . Remarquons aussi que la relation (2.3) montre comment l’algorithme du pivot de Gauss permet de calculer les mineurs principaux de la matrice A (et donc son déterminant lorsqu’elle est carrée). Nous comprenons maintenant dans le cas d’une matrice initiale à coefficients entiers le comportement typique de la taille des coefficients calculés dans la méthode du pivot de Gauss (cf. la matrice M1 de l’exemple précédent). On voit sur les relations (2.4), (2.2) et (2.7) que tous ces coefficients peuvent être écrits comme des fractions dont le numérateur et le dénominateur sont des mineurs de la matrice initiale. En outre les mineurs sont majorés (en valeur absolue, donc aussi en taille si ce sont des entiers) en utilisant l’inégalité de Hadamard. Grosso modo, en partant d’une matrice à k lignes avec des coefficients de taille τ , on obtient dans l’algorithme du pivot de Gauss des coefficients de taille kτ . Pour ce qui concerne une matrice à coefficients dans Q (comme M2 ), pour obtenir une majoration de la taille des coefficients calculés, nous devons remplacer M2 par une matrice à coefficients entiers M20 = c M2 60 2. Algorithmes de base en algèbre linéaire (où c est le ppcm des dénominateurs). Grosso modo, en partant d’une matrice à k lignes avec des coefficients dont le dénominateur et le numérateur sont de taille τ , on obtient maintenant dans l’algorithme du pivot de Gauss des coefficients de taille kτ 2 . Algorithme du pivot de Gauss simplifié L’algorithme simplifié pour la méthode du pivot de Gauss s’applique pour les matrices fortement régulières. Dans ce cas, il n’y a pas de recherche de pivot et la matrice est de rang maximum inf(m, n). Cet algorithme remplace la matrice A par une matrice de mêmes dimensions dont la partie supérieure (diagonale principale comprise) est celle de la matrice U et la partie inférieure (sans la diagonale) 3 celle de la matrice L de la LU -décomposition de A. On obtient l’algorithme 2.1. Algorithme 2.1 Algorithme du pivot de Gauss simplifié (sans recherche de pivot) et LU-décomposition. Entrée : Une matrice A = (aij ) ∈ Km×n fortement régulière. Sortie : La matrice A transformée ainsi que les matrices L et U comme expliqué ci-dessus. Début Variables locales : i, j, p ∈ N ; piv ∈ A ; pour p de 1 à inf(m, n) faire piv := app ; pour i de p + 1 à m faire aip := aip /piv ; pour j de p + 1 à n faire aij := aij − aip ∗ apj fin pour fin pour fin pour Fin. En fait la dernière étape ( p = inf(m, n)) de la boucle principale ne s’exécute que si m > n et elle ne modifie alors que les valeurs des ain pour i > n. On aurait donc pu écrire pour p de 1 à inf(m, n) − 1 faire . . . mais il aurait fallu rajouter à la fin : 3. Et sans les éléments nuls en position (i, j) avec i > j > n lorsque m ≥ n + 2. 2.1. Méthode du pivot de Gauss 61 si m > n alors piv := ann ; pour i de n + 1 à m faire ain := ain /piv ; fin pour fin si Un calcul élémentaire donne le résultat suivant. Proposition 2.1.4 Le nombre d’opérations arithmétiques dans K lorsqu’on exécute l’algorithme du pivot de Gauss simplifié, est majoré par : n(m − 1)(2n − 2m + 1) + 61 m(m − 1)(4m − 5) ce qui donne pour m = n la majoration 2 3 3n − 12 n2 − 61 n. Si la matrice A est de rang r et si les r premiers mineurs principaux dominants sont non nuls, l’algorithme précédent, modifié pour s’arrêter lorsque le pivot piv est nul, fournit encore la LU -décomposition de A. Cela donne l’algorithme 2.2 page suivante. Exemple 2.1.5 Voici une matrice M3 ∈ Z6×5 de rang 4, suivie des matrices L3 et U3 obtenues à partir de l’algorithme 2.2.  1 0 0  −21  1 0    73  −73 −53 −30 45 −58  −72 8123  21 −54 −11  1 0 −1     73 5055  72 −59  52 −23 77    ,  −33 −2266 220594  33  55 66 −15 62     73 5055 272743   −41 −95 −25  51 −54  41 4762 52277  14 55 35 −5 25  73 5055 272743   −14 −1091 83592 73 1685 272743  −73 −53 −30 45 −58 −5055 −1433 945 −1291  0  73 73 73 73   272743 196 243716   0 0  5055 337 5055   2911532 −3038698  0 0 0  272743 272743   0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0  0     0     0     0     1 1193 949 1052 949                0 1 0 62 2. Algorithmes de base en algèbre linéaire Algorithme 2.2 Deuxième algorithme du pivot de Gauss simplifié (sans recherche de pivot) et LU-décomposition. Entrée : Une matrice A = (aij ) ∈ Km×n . Sortie : La matrice A transformée ainsi que le rang r de A lorsque celui-ci est égal à l’ordre du dernier mineur principal dominant non nul. On obtient également, dans ce cas, la LU-décomposition de la matrice A comme dans l’algorithme 2.1. Début Variables locales : i, j, p, r ∈ N ; piv ∈ K ; p := 1 ; r := inf (m, n) ; tant que p ≤ inf (m, n) faire piv := app ; si piv = 0 alors r := p − 1 ; p := inf (m, n) sinon pour i de p + 1 à m faire aip := aip /piv ; pour j de p + 1 à n faire aij := aij − aip ∗ apj fin pour fin pour fin si ; p := p + 1 fin tant que Fin. 2.1.3 Algorithmes avec recherche de pivot non nul Si on rencontre un pivot nul sur la diagonale principale au cours du processus de triangulation on doit procéder à des échanges de lignes et/ou de colonnes pour ramener un pivot en position convenable (s’il reste un élément non nul dans le coin sud-est). Alors ce n’est pas une LU -décomposition de A que l’on obtient avec la méthode du pivot de Gauss, mais une P̃LUP -décomposition (voir par exemple [AHU, BP]), c’est-à-dire une LU -décomposition du produit à droite et à gauche de la matrice A par des matrices de permutation. De manière plus précise, si à l’issue de l’étape p − 1 du processus de [p−1] triangulation, on obtient un pivot nul (a pp = 0), alors de deux choses [p−1] l’une : ou bien a ij = 0 pour tous i, j ≥ p auquel cas le rang de A est égal à p − 1, et le processus est terminé, ou bien on peut trouver des 2.1. Méthode du pivot de Gauss 63 [p−1] entiers i et j ≥ p et tels que a ij 6= 0. Dans ce cas, une permutation de lignes et/ou de colonnes doit intervenir pour remplacer le pivot nul [p−1] par l’élément a ij : ce qui revient à remplacer la matrice A[p−1] par la matrice Eip (m) A[p−1] Ejp (n) où Ekl (h) désigne la matrice élémentaire obtenue à partir de Ih par échange des lignes k et l (ou, ce qui revient au même, par échange des colonnes k et l). Cette opération, qui prépare A[p−1] à subir avec succès l’étape p, n’altère pas les p − 1 premières lignes et les p − 1 premières colonnes de cette matrice. Plus précisément, elle commute avec les opérations de type (( traitement d’un pivot )) déjà effectuées (qui correspondent au produit à gauche par une matrice triangulaire inférieure). Par exemple, si sur une matrice 6 × 6 on doit faire des échanges de lignes et de colonnes avant de traiter les pivots no 3 et 5 on obtiendra la décomposition suivante L[5] Q5 L[4] L[3] Q3 L[2] L[1] = L[5] L̃[4] L̃[3] L̃[2] L̃[1] Q5 Q3 = L5 Q5 Q3 où L̃[4] = Q5 L[4] Q5 , L̃[3] = Q5 L[3] Q5 , L̃[2] = Q5 Q3 L[2] Q3 Q5 , L̃[1] = Q5 Q3 L[1] Q3 Q5 et L5 = L[5] L̃[4] L̃[3] L̃[2] L̃[1] , et donc A = Q3 Q5 (L5 )−1 U P5 P3 = P̃ L U P . Ainsi le processus de triangulation de Gauss, lorsqu’une recherche de pivots intervient, se ramène à un processus sans recherche de pivot sur le produit à droite et à gauche de la matrice A par des matrices de permutation. Cela montre aussi que l’algorithme du pivot de Gauss, appliqué à la matrice A, donne, en même temps que sa P̃LUP -décomposition, le rang de la matrice A. Notons aussi que la méthode avec recherche du pivot permet de calculer dans tous les cas le déterminant de la matrice A si elle est carrée. Il suffit de garder en mémoire et de mettre à jour à chaque étape la parité des permutations de lignes et de colonnes déjà effectuées. LUP-décomposition d’une matrice surjective Un cas particulier est donné par les matrices surjectives. Un pivot non nul existe toujours sur la ligne voulue. Cela donne l’algorithme 2.3 page suivante. 64 2. Algorithmes de base en algèbre linéaire Algorithme 2.3 LUP-décomposition d’une matrice surjective. Entrée : Une matrice A = (aij ) ∈ Km×n surjective. Sortie : La matrice A transformée (elle donne les matrices L et U comme dans l’algorithme 2.1), la matrice de permutation P et sa signature e ∈ {−1, 1}. Début Variables locales : i, j, p ∈ N ; piv ∈ K ; P := In ; e := 1 ; pour p de 1 à m faire piv := app ; j := p ; si piv = 0 alors tant que piv = 0 faire j := j + 1 ; piv := apj ; fin tant que ; EchCol(A, p, j) ; EchCol(P, p, j) ; e := −e ; # EchCol(A, p, j) est une procédure qui échange # les colonnes p et j de la matrice A. fin si ; pour i de p + 1 à m faire aip := aip /piv ; pour j de p + 1 à n faire aij := aij − aip ∗ apj fin pour fin pour fin pour Fin. Ainsi lorsqu’une matrice A ∈ Km×n est surjective (c’est-à-dire si son rang est égal au nombre de ses lignes), on peut la décomposer en un produit de trois matrices L, U, P où L ∈ Kn×n est une matrice triangulaire inférieure avec des 1 sur la diagonale, U ∈ Km×n une matrice triangulaire supérieure et P ∈ Kn×n une matrice de permutation. La LUP -décomposition permet de résoudre des problèmes comme le calcul du déterminant ou la résolution d’un système d’équations linéaires. En effet, pour résoudre le système A x = b avec A = L U P , on commence par résoudre le système L z = b puis le système U y = z et enfin le système P x = y. Les deux premiers systèmes sont des systèmes triangulaires que l’on peut résoudre par substitutions successives des 2.2. Méthode de Jordan-Bareiss 65 inconnues (en O(n2 ) opérations arithmétiques donc) et le dernier système est une simple permutation des inconnues. Enfin det A = ± det U (selon la parité de la permutation représentée par la matrice P ). Il faut remarquer qu’une matrice non surjective n’admet  pas toujours  0 0 de LUP -décomposition comme par exemple la matrice . 1 1 Par ailleurs la LUP -décomposition d’une matrice surjective n’est   pas 2 1 1 unique comme on peut le voir sur la matrice A = qui 0 3 4 admet les deux LUP -décompositions A = L U P avec L = I2 , P = I3 et U = A, ou encore A = L U P avec       0 1 0 1 2 1 1 0 et P =  1 0 0  . , U= L= 0 −6 1 3 1 0 0 1 Notons enfin que la matrice U obtenue dans la décomposition A = L U P est une matrice surjective et fortement régulière. Résolution de systèmes linéaires et calcul de l’inverse La méthode du pivot de Gauss permet de résoudre un ou plusieurs systèmes linéaires associés à la même matrice, en triangulant la matrice élargie aux seconds membres. Dans sa variante (( Gauss-Jordan )), qui consiste à poursuivre le processus d’élimination de Gauss (( de bas en haut )) et (( de droite à gauche )) sur les lignes de la matrice U de façon à annuler les éléments au dessus de la diagonale principale, la méthode du pivot de Gauss sert également à calculer l’inverse d’une matrice carrée inversible lorqu’on l’applique à cette matrice élargie (à droite) avec la matrice unité de même ordre, moyennant un coût légèrement supérieur qui fait passer la constante dans O(n3 ) de 23 à 43 . 2.2 Méthode de Jordan-Bareiss La méthode du pivot de Gauss est une méthode de traitement automatique des systèmes d’équations linéaires dont les coefficients et les inconnues sont dans un corps donné K. Cette méthode fonctionne bien dans le cas de matrices à coefficients dans un corps fini (et dans une moindre mesure, dans le cas du corps Q). Mais hormis le cas des corps finis, elle possède l’inconvénient majeur de nécessiter une simplification 66 2. Algorithmes de base en algèbre linéaire systématique des fractions calculées si on ne veut pas voir la taille des coefficients exploser, ce qui entraı̂ne souvent un temps de calcul prohibitif, par exemple lorsqu’on travaille avec un corps de fractions rationnelles à plusieurs variables. En outre cette méthode utilise des divisions et ne s’applique donc pas si la matrice a ses coefficients dans un anneau arbitraire. Nous allons voir dans cette section que la méthode connue aujourd’hui sous le nom de (( méthode de Bareiss )), qui peut être considérée comme une adaptation de la méthode du pivot de Gauss classique, permet dans une certaine mesure de pallier aux inconvénients présentés par cette dernière. La méthode de Bareiss (cf. [4], 1968) était connue de Jordan (cf. [Dur]), et elle semble avoir été découverte par Dodgson (plus connu sous le nom de Lewis Caroll) qui en a donné une variante dans [26]. Nous la désignerons désormais sous le nom de méthode de Jordan-Bareiss. Nous réservons le nom de méthode de Dodgson à la variante de Lewis Caroll que nous exposons à la fin de la section. La méthode de Jordan-Bareiss est valable dans le cas d’un anneau intègre A où l’égalité peut être testée par un algorithme, et l’addition, la multiplication et la division (( exacte )) (quand il y a un quotient exact) peuvent être effectuées par des algorithmes. Cela signifie, pour la division exacte, qu’il y a un algorithme prenant en entrée un couple (a, b) ∈ A2 , b 6= 0, et donnant en sortie l’unique élément x ∈ A vérifiant ax = b, dans le cas où il existe. 2.2.1 Formule de Dodgson-Jordan-Bareiss et variantes Soit A une matrice dans Am×n . Reprenant les relations données à la [p] (p) (p−1) propriété 2.1.3, et puisque tous les coefficients a ij s’écrivent a ij /a pp (relation (2.4)) avec le même dénominateur pour un p fixé, l’idée est de calculer directement les numérateurs de manière récursive. L’équation (2.1) se relit alors sous la forme (p) a ij = a (p−1) (p−1) (p−1) (p−1) a pp − a ip a pj ij (p−2) ap−1,p−1 (2.8) C’est ce que nous appellerons la formule de Dodgson-Jordan-Bareiss. On peut obtenir ce même résultat en appliquant l’identité de Sylvester 2.2. Méthode de Jordan-Bareiss 67 (1.10) de la proposition 1.1.7 page 9 à la matrice   Ap A1..p,j Ai,1..p aij avec p ∈ [1.. min(m, n) − 1] , i ∈ [p + 1..m] , j ∈ [p + 1..n] . Cela donne : Proposition 2.2.1 (Formule de Dodgson-Jordan-Bareiss) Soit A un anneau commutatif arbitraire. Pour toute matrice A = (aij ) ∈ Am×n , on a la relation : (p) avec les conventions usuelles a (−1) 00 (p−1) apj (p−1) aij app (p−2) aij × ap−1,p−1 = aip (p−1) (2.9) (p−1) (0) = 1 et aij = aij . On a également la variante suivante.  la formule (1.9)  Si l’on applique Ap A1..p,j , on obtient : de la proposition 1.1.7 à la matrice Ai,1..p aij Proposition 2.2.2 (Formule de Bareiss à plusieurs étages) Soit A un anneau commutatif arbitraire. Pour toute matrice A ∈ Am×n et tout entier p ≥ 2, on a lorsque 1 ≤ r ≤ p − 1, p + 1 ≤ i ≤ m, et p+1≤j ≤n : (r)  a(r−1) rr p−r (p) aij = ar+1,r+1 .. . (r) ap,r+1 (r) ai,r+1 (r) (r) . . . ar+1,n ar+1,j .. .. .. . . . (r) (r) . . . ap,p ap,j ... (r) ai,p . (2.10) (r) ai,j Dans son article, Bareiss a remarqué qu’on pouvait utiliser cette (p) identité avec p − r = 2 pour calculer les aij de proche en proche, lorsque l’anneau est intègre et possède un algorithme de division exacte. En fait la (( méthode de Bareiss )) couramment utilisée aujourd’hui est plutôt basée sur la première formule (celle de Dodgson-Jordan-Ba(p) reiss). L’équation (2.8) permet en effet de calculer les aij de proche en proche. La méthode de Jordan-Bareiss est donc une adaptation de la méthode du pivot de Gauss qui garantit, tout au long du processus de triangulation de la matrice traitée, l’appartenance des coefficients à l’anneau de base. L’efficacité de cet algorithme tient à ce que les coefficients calculés sont tous des déterminants extraits de la matrice initiale, et donc restent de taille raisonnable pour la plupart des anneaux usuels. 68 2. Algorithmes de base en algèbre linéaire Algorithme de Jordan-Bareiss En utilisant la relation (2.8) on obtient l’algorithme de Jordan-Bareiss 2.4, dans sa version de l’élimination à un seul étage déchargée de la recherche du pivot. (−1) (p−1) Rappelons les conventions a 00 = 1 et a pp = 0 pour p > inf(m, n). Algorithme 2.4 Algorithme de Jordan-Bareiss Entrée : Une matrice A = (aij ) ∈ Am×n . L’anneau A est supposé intègre avec un algorithme de division exacte. Sortie : La matrice A transformée. Si les r premiers mineurs principaux dominants sont non nuls, et si le (r+1)-ème est nul, elle contient en position (p) (i, j) le mineur ai,j avec p = inf(r, i−1, j −1). L’entier r est aussi calculé. Si en outre r = rg(A) on retrouve facilement la LU-décomposition de A à partir de la sortie, comme expliqué avant l’exemple 2.2.3. Début Variables locales : i, j, p ∈ N ; piv, den, coe ∈ A ; p := 1 ; den := 1 ; r := inf(m, n) ; tant que p < inf(m, n) faire piv := app ; si piv = 0 alors p := inf(m, n) ; r := p − 1 sinon pour i de p + 1 à m faire coe := aip ; pour j de p + 1 à n faire aij := (piv ∗ aij − coe ∗ apj ) / den fin pour fin pour fin si ; p := p + 1 ; den := piv fin tant que Fin. On retrouve facilement la LU -décomposition de A à partir de la matrice retournée par l’algorithme précédent en utilisant les formules (2.4) (propriété 2.1.3) et (2.7) page 59 : notons cij les coefficients de cette matrice ; alors pour la matrice L on a lij = cij /cjj si 1 ≤ j < 2.2. Méthode de Jordan-Bareiss 69 i ≤ m (lij = δij sinon) et pour la matrice U on a uij = cij /ci−1,i−1 si 1 ≤ i ≤ j (uij = 0 sinon). On peut le voir sur l’exemple suivant. Exemple 2.2.3 Dans cet exemple on reprend la matrice M3 de l’exemple 2.1.5 et on donne ses transformées par les algorithmes de Jordan-Bareiss et de Gauss.   −73 −53 −30 45 −58  21 −54 −11 0 −1     72 −59 52 −23 77   M3 =   33 55 66 −15 62     −41 −95 −25 51 −54  14 55 35 −5 25   −73 −53 −30 45 −58  21 5055 1433 −945 1291      72 8123 272743 2940 243716    33 −2266 220594 2911532 −3038698     −41 4762 52277 3660124 0  14 −3273 83592 3227536 0   −73 −53 −30 45 −58  −21 −5055 −1433 945 −1291     73  73 73 73 73    −72  8123 272743 196 243716    73  5055 5055 337 5055    −33 −2266 220594 2911532 −3038698     73 5055 272743 272743 272743     41  4762 52277 1193   0   73 5055 272743 949    −14 −1091  83592 1052 0 73 1685 272743 949 Comparons l’algorithme de Jordan-Bareiss à l’algorithme du pivot de Gauss dans le cas de l’anneau A = Z[X, Y ]. Lorsqu’on utilise l’algorithme du pivot de Gauss dans le corps des fractions FA = Q(X, Y ) sans réduire les fractions au fur et à mesure qu’elles sont calculées (ce qui est très coûteux), il n’est pas difficile de voir que les degrés des numérateurs et dénominateurs ont un comportement exponentiel. Avec l’algorithme de Jordan-Bareiss, par contre, les degrés ont seulement une croissance linéaire. Remarque. Dans le cas non intègre, le fonctionnement de l’algorithme de Jordan-Bareiss sans recherche du pivot reste possible si tous les (p−1) mineurs principaux rencontrés app au cours du processus de triangulation sont non diviseurs de 0, et si les divisions exactes : (p−1) (p−1) (p−1) (p−1) aij − aip apj (p−2) ap−1,p−1 app peuvent se faire algorithmiquement . 70 2. Algorithmes de base en algèbre linéaire Cette condition est satisfaite lorsqu’on remplace la matrice carrée A par sa matrice caractéristique A − XIn ∈ A [X]n×n où tous les pivots rencontrés sont des polynômes unitaires (au signe près). Donc l’algorithme de Jordan-Bareiss appliqué à A − XIn ne fait intervenir que la structure d’anneau de A et ne nécessite aucune division dans A. C’est l’objet du paragraphe suivant. 2.2.2 Cas d’un anneau commutatif arbitraire : méthode de Jordan-Bareiss modifiée C’est la méthode de Jordan-Bareiss appliquée à la matrice caractéristique A − XIn d’une matrice carrée A ∈ An×n . Les coefficients de A − XIn sont dans l’anneau A [X]. Même si A n’est pas intègre, les divisions exactes requises sont ici des divisions par des polynômes unitaires qui ne nécessitent par conséquent aucune division dans A, mais uniquement des additions, soustractions, et multiplications. En particulier, aucune permutation de lignes ou de colonnes n’intervient au cours du processus de triangulation. La méthode de Jordan-Bareiss modifiée permet donc de calculer le polynôme caractéristique de la matrice A, et par conséquent son déterminant, son adjointe, et, au cas où elle est inversible, son inverse. Cette méthode a été proposée en 1982 par Sasaki & Murao [80]. Les auteurs remarquent également que dans un calcul de base de l’algorithme (du type (( produit en croix divisé par le pivot précédent ))) : f (X) := a(X) c(X) − b(X) d(X) , e(X) les degrés en X sont égaux à k ou k + 1 pour f, à k ou k − 1 pour a, b, c, d et à k − 1 pour e. On peut donc se passer de calculer les coefficients des monômes de degré < k−1 dans ac−bd et le calcul du quotient ne doit pas non plus s’encombrer des termes de degrés < k − 1 dans les restes successifs (pour l’algorithme usuel de division des polynômes). Ceci conduit précisément aux résultats suivants. – Les coefficients des monômes de degré k − 1 à 2k dans le produit de deux polynômes de degré k se calculent (en utilisant la méthode usuelle) en k 2 + 2 k − 2 opérations arithmétiques. – La division exacte d’un polynôme de degré 2k par un polynôme unitaire de degré k − 1 se calcule (en utilisant la méthode usuelle) en k 2 + 3 k − 1 opérations arithmétiques. 2.2. Méthode de Jordan-Bareiss 71 c On en déduit qu’une affectation f := a d−b dans l’algorithme de Jore dan-Bareiss modifié, lorsque e = e(X) est le pivot unitaire de degré k − 1, consomme 3 k 2 + O(k) opérations arithmétiques dans l’anneau de base (et en tout cas au plus 3 k 2 + 8 k − 4). Pour l’ensemble de l’algorithme on obtient un nombre total d’opérations arithmétiques inférieur à n X (3 k 2 + 8 k − 4) (n − k + 1)2 ≤ k=2 1 5 7 4 7 3 n + n + n . 10 6 3 Proposition 2.2.4 Soit A ∈ An×n une matrice carrée sur un anneau commutatif arbitraire. L’algorithme de Jordan-Bareiss appliqué à la matrice caractéristique A−X In s’exécute (en utilisant la méthode usuelle) 1 5 en 10 n + O(n4 ) opérations arithmétiques dans l’anneau A. 2.2.3 La méthode de Dodgson La méthode de Dodgson est une variante élégante et symétrique de la méthode de Jordan-Bareiss. Cependant son but n’est pas le calcul de la LU -décomposition d’une matrice, mais seulement celui de ses mineurs connexes, c’est-à-dire les mineurs ah..k i..j (avec j−i = k−h). En particulier elle peut être utilisée pour le calcul du déterminant d’une matrice carrée. Une variante de la formule 2.9 (après un échange de lignes et un échange de colonnes) est la formule suivante concernant les mineurs connexes ah..k−1 ah+1..k i..j−1 i..j−1 h..k ah+1..k−1 · a = (2.11) i..j i+1..j−1 h+1..k ah..k−1 a i+1..j i+1..j Cela donne les affectations correspondantes dans l’algorithme de Dodgson. Mais ce dernier fonctionne uniquement si tous les mineurs connexes appelés à servir de dénominateur sont non nuls : contrairement à la méthode du pivot de Gauss et à la méthode de Jordan-Bareiss, la méthode de Dodgson ne possède pas de variante connue efficace dans le cas où une affectation x := 0/0 est produite par l’algorithme( 4 ). 4. Lewis Caroll propose dans sa communication d’opérer des permutations circulaires sur les lignes et les colonnes de la matrice. Voici un contre-exemple  montrant que  1 0 1 1  1 0 1 0   la méthode de Dodgson ne s’applique pas toujours. La matrice A =   0 1 0 0  1 0 0 1 est une matrice inversible de déterminant 1, lequel ne peut pas se calculer par la méthode de Lewis Carrol, même lorsqu’on effectue des permutations circulaires de lignes et de colonnes. 72 2. Algorithmes de base en algèbre linéaire Pour voir plus clairement ce que signifie l’équation de Lewis Caroll (2.11) appelons B la matrice extraite Ai+1..j−1,h+1..k−1, et notons p, q, u, v les indices i + 1, j − 1, h + 1, k − 1. L’équation se réécrit alors : ai,h | B | · Ap..q,h aj,h ai,h Ap..q,h Ai,u..v B Aj,u..v B Ai,u..v · Aj,u..v B ai,k Ap..q,k = aj,k Ap..q,h Ap..q,k − aj,h aj,k Ai,u..v B · B Aj,u..v ai,k Ap..q,k Un exemple : c2 d2 b1 c1 d1 b1 c3 c1 · d3 d1 e1 b2 c2 d2 b2 c2 d2 e2 b3 c2 c 3 · d2 d3 e2 b3 c3 d3 e3 c3 d3 e3 b4 c4 = d4 e4 c4 c1 d4 − d1 e4 e1 c2 d2 e2 c3 b2 d3 · c2 e3 d2 b3 c3 d3 b4 c4 d4 Dans la méthode de Jordan-Bareiss sans recherche de pivot on calcule (p) à l’étape no p tous les mineurs aij ((i, j > p) d’une matrice A. Dans la [p] (p) (p−1) méthode du pivot de Gauss on calcule les quotients aij = aij /ap,p . Si la matrice a une (( structure interne )) comme dans le cas des matrices de Hankel ou de Toeplitz la structure est perdue dès la première étape. Dans la méthode de Dodgson, on calcule à l’étape no p tous les mineurs connexes d’ordre p + 1 de la matrice A. Il s’ensuit que dans le cas d’une matrice structurée, les matrices intermédiaires calculées par la méthode de Dodgson sont également structurées. Ceci diminue très sérieusement le nombre d’opérations arithmétiques à effectuer et le fait passer de O(n3 ) à O(n2 ). Dans le cas d’un anneau intègre où les divisions exactes sont faisables par un algorithme, on obtient les mêmes avantages que dans l’algorithme de Jordan-Bareiss concernant la taille des coefficients intermédiaires. Algorithme de Dodgson pour une matrice de Hankel Nous donnons ici une version précise de l’algorithme de Dodgson pour les matrices de Hankel dont tous les mineurs connexes sont non nuls. C’est l’algorithme 2.5 page ci-contre. L’entrée est une liste L = (ai ) contenant les m + n − 1 coefficients de la matrice de Hankel initiale H ∈ Am×n (hi,j = ai+j−1 ). La sortie est un tableau T = (tr,j ) (r = 0, . . . , inf(m, n), j = r, . . . , m + n − r) qui 2.2. Méthode de Jordan-Bareiss 73 contient tous les mineurs connexes de la matrice H, calculés en suivant l’algorithme de Dodgson. Pour l’initialisation, sur la ligne 0 il y a des 1 (les (( mineurs connexes d’ordre 0 ))) et sur le ligne 1 les coefficients de H (les (( mineurs connexes d’ordre 1 ))). Sur la ligne r ≥ 2 il y a les coefficients de la matrice de Hankel formée par les mineurs connexes d’ordre r de H. Dans la colonne j il y a les déterminants des sous-matrices carrées de H qui ont le coefficient aj sur leur diagonale ascendante. Algorithme 2.5 Algorithme de Dodgson pour une matrice de Hankel Entrée : Deux entiers m, n ∈ N et une liste L = (ai ) ∈ Am+n−1 . Cette liste contient les coefficients d’une matrice de Hankel H ∈ Am×n . L’anneau A est supposé intègre avec un algorithme de division exacte. Sortie : Un tableau T = (tr,j ) rempli d’éléments de A pour r ∈ {0, . . . , inf(m, n)}, j ∈ {r, . . . , m + n − r}. Il contient sur la ligne r les mineurs connexes d’ordre r de la matrice H, supposés tous non nuls. Début Variables locales : r, j, q ∈ N ; q := inf(m, n) ; T :=TableauVide(0..q, 1..m + n − 1) ; # on a créé T tableau vide de taille voulue pour j de 1 à m + n − 1 faire t0,j := 1 ; t1,j := aj ; fin pour ; # fin de l’initialisation pour r de 1 à q − 1 faire pour j de r + 1 à m + n − r − 1 faire tr+1,j := (tr,j−1 tr,j+1 − t2r,j )/tr−1,j fin pour fin pour Fin. L’algorithme est pratiquement le même dans le cas d’une matrice de Toeplitz Z (il suffit de changer le signe dans l’affectation de tr+1,j ) et il peut s’appliquer pour le calcul du polynôme caractéristique. Exemples 2.2.5 Dans le premier exemple, on considère la matrice de Hilbert d’ordre 5, qui est un exemple classique de matrice de Hankel mal conditionnée (le déterminant de la ma- 74 2. Algorithmes de base en algèbre linéaire trice, 1/266716800000, est l’inverse d’un entier très grand).    A=   1 1/2 1/3 1/4 1/5 1/2 1/3 1/4 1/5 1/6 1/3 1/4 1/5 1/6 1/7 1/4 1/5 1/6 1/7 1/8  1/5 1/6 1/7 1/8 1/9      Voici alors la sortie de l’algorithme de Dodgson 2.5 (on a supprimé la ligne des 1) : 1 2 1 12 1 1 3 1 72 1 2160 1 4 1 240 1 43200 1 6048000 1 5 1 600 1 378000 1 423360000 1 266716800000 1 6 1 1260 1 2116800 1 10668672000 1 7 1 2352 1 8890560 1 8 1 4032 1 9 Voici ensuite un exemple de la sortie de l’algorithme avec une matrice de Hankel carrée d’ordre 7 à coefficients entiers (lisibles sur la première ligne) : 1 7 −42 2.3 7 −42 −330 1 13 −85 −1165 2 −2 24 373 −1671 2 4 2 −85 −442 −41 4 −10 −14 17 −119 259 870 3 11 13 −23 −42 889 5 −16 6 −1 157 3 26 4 −41 7 −43 −175 2 24 4 Méthode de Hessenberg Toutes les matrices considérées ici sont à coefficients dans un corps commutatif K. Matrices quasi-triangulaires Définition 2.3.1 Une matrice carrée H = (hij ) ∈ Kn×n (n ∈ N∗ ) est dite quasi-triangulaire supérieure (resp. quasi-triangulaire inférieure) si hij = 0 dès que i − j ≥ 2 (resp. dès que j − i ≥ 2). On dit encore que H est une matrice de Hessenberg. 2.3. Méthode de Hessenberg Une matrice quasi-triangulaire supérieure H la forme :  h11 h12 . . . h1,n−1  h21 h22 . . . h2,n−1   .. . H=  0 h32  .. . . .. .. ..  . . 0 . . . 0 hn,n−1 75 est donc une matrice de  h1n h2n    h3n  (2.12)  ..  .  hnn On démontre par une récurrence immédiate sur k (1 ≤ k ≤ n) la propriété suivante des matrices de Hessenberg : Proposition 2.3.2 Soit H = (hij ) une matrice de Hessenberg (supérieure ou inférieure). On désigne par Hk (1 ≤ k ≤ n) la sous-matrice principale dominante d’ordre k de H et par Dk le déterminant de Hk . On pose D0 = 1. La suite (Dk )1≤k≤n (des mineurs principaux dominants de H) vérifie alors la relation de récurrence : Dk = hkk Dk−1 + k−1 X (−1)k−i hk,k−1 hk−1,k−2 . . . hi+1,i hik Di−1 · i=1 Pour le voir, il suffit de développer Dk suivant la dernière ligne (resp. la dernière colonne) de Hk si celle-ci est une matrice quasi-triangulaire supérieure (resp. inférieure). Appliquant ce résultat à la matrice H − XIn , elle-même quasi-triangulaire, dont les mineurs principaux dominants sont les polynômes caractéristiques Pk (X) des sous-matrices principales dominantes Hk de H (1 ≤ k ≤ n), on obtient les relations de récurrence suivantes dites relations de Hessenberg permettant de calculer de proche en proche les polynômes caractéristiques Pk (X) de Hk pour 2 ≤ k ≤ n sachant que P0 (X) = 1, P1 (X) = h11 − X ; et ( Pk (X) = (hkk − X) Pk−1 (X) + i  Pk−1 hQk (−h ) h P (X) j,j−1 ik i−1 i=1 j=i+1 (2.13) La méthode de Hessenberg Elle consiste à calculer le polynôme caractéristique d’une matrice carrée A d’ordre n ≥ 2, dont les éléments aij appartiennent à un corps K, en la réduisant à la forme (2.12) c’est-à-dire à une matrice 76 2. Algorithmes de base en algèbre linéaire de Hessenberg H semblable à A dont les éléments hij appartiennent également à K. Algorithme 2.6 Algorithme de Hessenberg (K est un corps) Entrée : Un entier n ≥ 2 et une matrice A = (aij ) ∈ Kn×n . Sortie : Le polynôme caractéristique de A : PA (X). Variables locales : jpiv, ipiv, iciv, i, m ∈ N ; piv, c, ∈ K ; H := (hij ) ∈ Kn×n : les matrices transformées successives de A ; P = (Pi ) : liste des polynômes caractéristiques successifs dans K[X] ; Début P0 := 1 ; H := A ; # Initialisations # Réduction de H à la forme de Hessenberg pour jpiv de 1 à n − 2 faire ipiv := jpiv + 1 ; iciv := ipiv ; piv := hiciv,jpiv ; tant que piv = 0 et iciv < n faire iciv := iciv + 1 ; piv := hiciv,jpiv fin tant que ; si piv 6= 0 alors si iciv > ipiv alors EchLin(H, ipiv, iciv) ; # Echange de lignes EchCol(H, ipiv, iciv) # Echange de colonnes fin si ; pour i de iciv + 1 à n faire c := hi,jpiv /piv ; AjLin(H, ipiv, i, −c) ; # Manipulation de lignes AjCol(H, i, ipiv, c) # Manipulation de colonnes fin si fin pour ; # Calcul du polynôme caractéristique pour m de 1 à n faire Pm := (hmm − X) · Pm−1 ; c := 1 ; pour i de 1 à m − 1 faire c := −c · hm−i+1,m−i ; Pm := Pm + c · hm−i,m · Pm−i−1 fin pour fin pour ; PA (X) := Pn (X) # le polynôme caractéristique de A. Fin. 2.3. Méthode de Hessenberg 77 Pour ce faire, on applique la méthode du pivot de Gauss aux lignes de la matrice donnée A en prenant comme pivots les éléments sousdiagonaux de la matrice traitée, et en prenant bien soin d’effectuer les transformations (( inverses )) sur les colonnes de A pour que la matrice et sa transformée soient semblables. Plus précisément, l’étape p (1 ≤ p ≤ n − 2) consiste tout d’abord à voir si l’élément en position (p + 1, p) est nul, auquel cas il faut chercher un élément non nul au-dessous de lui (sur la colonne p) : si un tel élément n’existe pas, on passe à l’étape suivante p+1. Sinon par une permutation de lignes, on ramène le pivot non nul au bon endroit, c’est-à-dire à la position (p + 1, p), ce qui revient à multiplier à gauche la matrice traitée par la matrice de permutation Ei,p+1 (i > p + 1) obtenue en permutant les lignes i et p + 1 (ou les colonnes i et p + 1, ce qui revient au même) de la matrice unité In . On multiplie à droite par la même matrice de permutation (qui est ici égale à son inverse) afin que la matrice obtenue à l’issue de chaque étape reste semblable à la matrice de départ. Le pivot non nul étant alors au bon endroit, on achève l’étape p en utilisant ce pivot pour faire apparaı̂tre des zéros au-dessous de lui dans sa colonne, ce qui revient à multiplier à gauche la matrice traitée par une matrice du type :  1 ...  .. . .  . .   0 ...  L=  0 ...  0 ...   .. . .  . . p ↓ p+1 ↓ 0 .. . 0 .. . 1 0 0 1 0 lp+2,p+1 .. .. . . 0 ... 0 ln,p+1  0 ... 0 .. ..  . .   0 ... 0   ← p 0 ... 0   ← p+1 1 ... 0   ← p+2 .. . . ..  . .  . 0 ... 1 et multiplier ensuite à droite la matrice traitée par la matrice L−1 (obtenue à partir de L en changeant le signe des éléments sous la diagonale). Il est clair que ces opérations, qui définissent l’étape p et qui sont effectuées sur la matrice provenant de l’étape précédente (appelonsla A(p−1) ), n’affectent pas les p − 1 premières colonnes de A(p−1) et donnent une matrice A(p) semblable à A(p−1) . 78 2. Algorithmes de base en algèbre linéaire Ceci donne l’algorithme de Hessenberg : Primo, calculer, à l’aide de la procédure décrite ci-dessus, une matrice de Hessenberg H semblable à la matrice donnée A ∈ Kn×n . Secundo, calculer le polynôme caractéristique de H (qui est aussi celui de A) en utilisant les relations de Hessenberg (2.13). On obtient ainsi l’algorithme 2.6 page 76. Dans cet algorithme la procédure AjLin(H, i, j, c) opère une manipulation de lignes sur la matrice H : on ajoute à la ligne j la ligne i multipliée par c. Exemple 2.3.3 Dans cet exemple on montre une (( entiers et sa réduction à la forme de Hessenberg.  −3 3 0 −2 −3 1  1 2 1 1 2 3   2 2 3 −3 3 0   −2 0 1 −2 0 0 A :=   3 −3 3 3 2 3   3 2 3 −3 1 2   −3 3 3 2 3 1 0 −1 −3 −1 −1 1 petite )) matrice à coefficients −2 2 −2 −1 0 −1 −2 −1 2 0 −3 2 3 −2 0 −3             Voici la liste des lignes de la forme réduite de Hessenberg. Nous n’avons pas indiqué les 0 en position (i, j) lorsque i > j + 1.   −122 −26680 −4080544 4747626797 109259596132466 −3 , 7 , , , , , ,2 7 6639 1522773 1757764263 234026268743849   87 24037 17521799 1473144559 1 , 11 , , , , , 2, 0 7 13278 7613865 1757764263   −415 −54333 −1294739 689762552 −2270125812893340 7, , , , , , −3 7 4426 2537955 585921421 234026268743849   13278 1670911 13199211 −11965124859 79329636778655517 107 , , , , , 49 30982 1973965 4101449947 1638183881206943 7   −17765685 −2532182353 2798215923779 6108776229950083011 25553 , , , , 19589476 2246597766 2593288209346 1035800265460275674 4426   −2593288209346 954443884297868 17689012510838333947 600431 , , , 1288243116405 1487042200034055 28283244709037870895 2537955   13198847530884339751 −10729114442300396518997896 −64207585234 , , 5149558673799888615 2056815059005858366341435 26366463945   306462654496531416683963262645 481086736521535 , 54768294462168235404375334801 234026268743849 On voit apparaı̂tre des fractions de grande taille : les coefficients de la matrice initiale sont majorés par 3 en valeur absolue, et le numérateur le plus grand dans la matrice transformée est environ égal à 361,8 . Une étude expérimentale dans les mêmes conditions avec des matrices carrées d’ordre n variant entre 8 et 32 donne une taille des 2.3. Méthode de Hessenberg 79 coefficients intermédiaires de type quadratique : le numérateur ou dénominateur de 2 taille maximum est de l’ordre de 32(n−2) . Il s’agit donc ici d’un cas typique d’une méthode qui ne s’applique efficacement de manière directe, en calcul formel, que dans le cas d’un corps fini. Remarque 2.3.4 Une matrice triangulaire A ∈ Kn×n est une matrice de Hessenberg particulière qui a ses valeurs propres dans K. Mais une matrice de Hessenberg qui a ses valeurs propres dans K n’est pas nécessairement triangulaire ni semblable à  une matrice triangulaire, comme  1 0 1 on le voit avec la matrice  1 1 1  . 0 0 1 Nombre d’opérations arithmétiques • La phase 1 de réduction à la forme de Hessenberg est composée de n − 2 étapes. Chacune des étapes p (1 ≤ p ≤ n − 2) comporte un travail sur les lignes avec (n − p − 1) divisions, (n − p − 1) (n − p) multiplications et autant d’additions. L’opération inverse sur les colonnes comporte (n − p − 1) n multiplications et autant d’additions. Ce qui donne 61 (n − 1) (n − 2) (5n + 3)  56 n3 multiplications/divisions et 56 n (n − 1) (n − 2) additions/soustractions, c’est-à-dire un nombre total d’opérations arithmétiques dans K qui est asymptotiquement de l’ordre de 53 n3 . • La phase 2 qui consiste à calculer les polynômes caractéristiques Pk (X) (2 ≤ k ≤ n) des sous-matrices principales dominantes de la réduite de Hessenberg s’effectue par récurrence sur k à partir de P0 (X) = 1 et P1 (X) = h11 − X. Si l’on désigne par S(k) le nombre de multiplications/divisions (resp. additions/soustractions) permettant de calculer le polynôme caractéristique Pk (X) de Hk , l’utilisation des relations de Hessenberg conduit aux relations de récurrence suivantes, vraies pour 2≤k≤n :  k−1 X    S(k) = S(k − 1) + (k − 1) + i     i=1   pour les multiplications/divisions k−2  X    S(k) = S(k − 1) + 2 (k − 1) + i     i=1  pour les additions/soustractions 80 2. Algorithmes de base en algèbre linéaire c’est-à-dire, dans les deux cas (que S(k) désigne le nombre de multiplications/divisions ou celui des additions/soustractions) : S(k) = S(k − 1) + 1 (k − 1) (k + 2) . 2 Comme S(1) = 0, cela donne par sommation : 61 n (n − 1) (n + 4)  multiplications/divisions et autant d’additions/soustractions dans le corps K (la phase de quasi-triangularisation est donc la plus coûteuse, asymptotiquement cinq fois plus chère en nombre d’opérations arithmétiques que la phase de calcul du polynôme caractéristique de la matrice quasi-triangulaire). D’où le résultat : 1 6 n3 Proposition 2.3.5 L’algorithme de Hessenberg calcule les polynômes caractéristiques de toutes les sous-matrices principales dominantes d’une matrice n × n sur un corps K avec moins de (n + 1) (n − 1)2 multiplications/divisions et n (n − 1)2 additions/soustractions, soit en tout 2 n3 − 3 n2 + 1 opérations arithmétiques. Remarque 2.3.6 Ce que la méthode de Hessenberg gagne en complexité arithmétique par rapport aux précédentes méthodes de calcul du polynôme caractéristique, elle le perd sur un aspect essentiel au plan pratique. Celui de l’absence de contrôle raisonnable de la taille des coefficients intermédiaires. La formule permettant d’exprimer dans la méthode du pivot de Gauss chaque coefficient intermédiaire comme quotient de deux déterminants extraits de la matrice de départ (voir propriété 2.1.3 page 58), ne s’applique plus dans le processus de quasi-triangularisation de Hessenberg. En effet les transformations subies par les lignes sont ici suivies par des transformations inverses sur les colonnes. Et on ne dispose pas actuellement pour la méthode de Hessenberg, pourtant la plus rapide en temps séquentiel si on ne prend en compte que le nombre d’opérations arithmétiques, d’une formule analogue qui permette de conclure sur la question de la taille des coefficients intermédiaires. Cela est confirmé par les résultats expérimentaux que nous avons pu avoir (voir l’exemple 2.3.3 et le chapitre 11). Dans le cas de matrices à coefficients entiers, il y a la possibilité de remédier à ce problème en utilisant le calcul modulaire (cf. section 1.6 page 32). Remarque 2.3.7 Signalons l’existence d’une version modifiée récente de l’algorithme de Hessenberg sur un anneau intègre, développée dans 2.4. Méthode d’interpolation de Lagrange 81 [3], qui permet de garder les coefficients intermédiaires, tout au long des calculs, dans l’anneau de base, supposé intègre. Elle semble bien adaptée au calcul modulaire sur les anneaux de polynômes à coefficients entiers. 2.4 Méthode d’interpolation de Lagrange Elle ramène le calcul du polynôme caractéristique d’une matrice carrée A ∈ An×n au calcul de n + 1 déterminants. On est donc supposé être dans une situation où le calcul des déterminants ne pose pas problème : cela peut être le cas par exemple lorsque la méthode du pivot de Gauss ne se heurte pas à des problèmes graves de simplification de fractions, ou lorsque l’on dispose d’un algorithme efficace et sans division pour le calcul des déterminants (comme celui du développement suivant une ligne ou une colonne si la matrice donnée est creuse). La méthode consiste à appliquer la formule d’interpolation de Lagrange au polynôme caractéristique PA (X) = det(A − XIn ), c’est-àdire la formule bien connue :   i6Y =k n X X − xi   P (xi ) PA (X) = xk − xi i=0 i∈{0,...,n} où x0 , x1 , . . . , xn sont n + 1 éléments distincts de A, avec la restriction suivante : les (xi − xj ) (pour i 6= j) doivent être non diviseurs de zéro dans A et on doit disposer d’un algorithme de division exacte par les (xi − xj ) dans A. C’est par exemple le cas avec xi = i × 1A lorsque A est de caractéristique nulle, ou finie étrangère à n!, ou plus généralement lorsque la division exacte par les les entiers de A inférieurs ou égaux à n (c’està-dire les éléments 1A , 1A + 1A , . . ., n 1A ), si elle est possible, est unique et réalisable par un algorithme. En effet, si l’on choisit xk = k pour 0 ≤ k ≤ n, la formule d’interpolation s’écrit :   i6Y =k n X det(A − k I ) n  (−1)k det(A − XIn ) = (X − i)  k ! (n − k) ! k=0 i∈{0,...,n} ce qui exige la possibilité d’effectuer des divisions (exactes) par les entiers de A inférieurs ou égaux à n. 82 2. Algorithmes de base en algèbre linéaire En fait, PA (X) = (−1)n X n + Q(X) avec deg(Q) ≤ n − 1 et il suffit d’appliquer la méthode d’interpolation de Lagrange à Q(X), ce qui revient à calculer la valeur de PA en n points au lieu de n + 1. Le nombre d’opérations arithmétiques lors de l’exécution de cet algorithme est à peu près n fois celle du calcul d’un déterminant d’ordre n. Si, pour le calcul des déterminants P (xi ) = det(A − xi In ), on choisit d’utiliser l’algorithme du pivot de Gauss (ou l’algorithme de JordanBareiss si on est dans une situation où il s’avère être préférable à l’algorithme de Gauss 5 ), on obtient donc pour la méthode d’interpolation de Lagrange un O(n4 ). En fait les meilleurs algorithmes sans division dont on dispose actuellement pour calculer les déterminants passent par le calcul du polynôme caractéristique, ce qui rend caduque la méthode d’interpolation de Lagrange. Celle-ci, avec le calcul du déterminant dans l’anneau de base abandonné à la sagacité de Maple, sera comparée à ces autres algorithmes sur quelques exemples testés sur machine (voir chapitre 11). 2.5 Méthode de Le Verrier et variantes Cette méthode, découverte en 1848 par l’astronome français Le Verrier [65], repose sur les relations de Newton entre les sommes de Newton et les polynômes symétriques élémentaires dans l’algèbre des polynômes à n indéterminées x1 , . . . , xn sur un anneau commutatif A. De manière générale, la méthode de Le Verrier appliquée à une matrice n × n réclame qu’on soit dans un anneau où les entiers 1, 2, . . . , n sont non diviseurs de zéro. Les seules divisions requises sont des divisions exactes par l’un de ces entiers. 2.5.1 Le principe général La méthode de Le Verrier consiste précisément à déduire le calcul des coefficients du polynôme caractéristique du calcul de ses sommes de Newton. Celles-ci sont en effet égales aux traces des puissances de A comme le montre le lemme 1.5.6 page 30. Rappelons que l’anneau de base n’a pas besoin d’être intègre, puisque les sommes de Newton peuvent être définies sans recours aux valeurs propres, en utilisant les équations (1.23) page 29 (cf. définition 1.5.5). 5. Dans les deux cas, nous avons vu que le nombre d’opérations arithmétiques est O(n3 ). 2.5. Méthode de Le Verrier et variantes 83 Ceci donne l’algorithme 2.7. Algorithme 2.7 Algorithme de Le Verrier Début Étape 1 : Calculer les puissances A2 , . . . , An−1 de la matrice A ainsi que les éléments diagonaux de la matrice An ; Étape 2 : Calculer les traces des matrices A1 , A2 , . . . , An ; Étape 3 : Calculer les coefficients pk (1 ≤ k ≤ n) en utilisant les équations (1.23). Fin. Nombre d’opérations arithmétiques Pour un anneau A fixé par le contexte, nous noterons µM (n) le nombre d’opérations arithmétiques nécessaires pour la multiplication de deux matrices carrées d’ordre n (on trouvera une définition plus précise dans la notation 7.2.1 page 195). Lorsqu’on utilise la méthode usuelle de multiplication des matrices carrées on a µM (n) = n2 (2n − 1). Pour l’algorithme de Le Verrier, le compte est le suivant : – l’étape 1 utilise (n−2) µM (n)+n (2n−1) opérations arithmétiques n X – les étapes 2 et 3 utilisent n2 + 2 (k − 1) = 2 n2 − n opérations. k=1 Proposition 2.5.1 Le nombre total d’opérations arithmétiques lors de l’exécution de l’algorithme de Le Verrier, si on utilise la multiplication usuelle des matrices, est 2 n4 + O(n3 ) = O(n4 ) (précisément égal à 2 n (n − 1/2) (n2 − 2n + 2)). Des algorithmes dérivés de l’algorithme de Le Verrier ont été proposés par de nombreux auteurs, avec des améliorations concernant la complexité (cf. [22, 32, 77, 84] et [FF]). Nous les étudions dans la suite de cette section et dans le chapitre 9. 84 2.5.2 2. Algorithmes de base en algèbre linéaire Méthode de Souriau-Faddeev-Frame Cette méthode, découverte séparément par Faddeev & Sominskii [FS], Souriau [84] et Frame [31], est une amélioration astucieuse de l’algorithme de Le Verrier. Comme dans le cas de l’algorithme de Le Verrier, l’anneau A est supposé tel que la division par un entier, quand elle est possible, est unique (autrement dit, les entiers ne sont pas des diviseurs de zéro) et réalisable par un algorithme. Cette méthode permet de calculer : – le polynôme caractéristique PA d’une matrice carrée A ∈ An×n ; – l’adjointe de la matrice A et son inverse (s’il existe) ; – un vecteur propre non nul relatif à une valeur propre donnée de A si l’on suppose de plus que l’anneau A est intègre.   Posant P (X) = (−1)n PA (X) = X n − c1 X n−1 + · · · + cn−1 X + cn , la méthode consiste à calculer les coefficients ck pour en déduire le polynôme caractéristique de A . On utilise pour cela le calcul de la matrice caractéristique adjointe de A tel que développé dans 1.2.1. Rappelons la définition de la matrice caractéristique adjointe de A : c’est la matrice P n−1−k (formule 1.11 page 11) dans B X Q(X) = Adj(XIn − A) = n−1 k=0 k laquelle les matrices Bk sont données par les relations 1.12 (page 12) : Bk = ABk−1 − ck In (1 ≤ k ≤ n) avec B0 = In . On démontre, en utilisant les relations de Newton (1.23 page 29), que : ck = 1 Tr(A Bk−1 ) k pour 1 ≤ k ≤ n . En effet, partant des équations suivantes (voir 1.13 page 12) qui découlent des relations 1.12 rappelées ci-dessus : Bk = Ak − c1 Ak−1 − . . . − ck−1 A − ck In pour tout entier k ∈ {1, . . . , n} , on considère les traces des deux membres dans chacune de ces n égalités matricielles pour obtenir : Tr(Bk ) = sk − c1 sk−1 − . . . − ck−1 s1 − nck (1 ≤ k ≤ n) . Mais sk = c1 sk−1 + . . . + ck−1 s1 + kck (ce sont les relations de Newton pour le polynôme P (X)). Comme Tr(Bk ) = Tr(ABk−1 ) − nck (à cause de l’égalité Bk = ABk−1 − ck In ), on obtient Tr(ABk−1 ) = kck . t u Notons par ailleurs (comme nous l’avons fait au § 1.2.1 page 11) que Bn = A Bn−1 −cn In = 0, c’est-à-dire A Bn−1 = cn In = (−1)n−1 det(A) In . 2.5. Méthode de Le Verrier et variantes 85 Ce qui montre que si det(A) est inversible dans A, alors A possède un inverse donné par A−1 = (cn )−1 Bn−1 . Rappelons également que Bn−1 = (−1)n−1 Adj(A) ce qui donne, sans autre calcul, l’adjointe de la matrice A . Nous traduisons la méthode de Souriau-Faddeev-Frame qui vient d’être développée par l’algorithme 2.8, dans lequel B désigne successivement les matrices B0 = In , B1 ,. . ., Bn , et C les matrices A, A B1 ,. . ., A Bn . Algorithme 2.8 Algorithme de Souriau-Faddeev-Frame Entrée : Un entier n et une matrice A ∈ An×n . L’anneau A est supposé avoir un algorithme de division exacte par les entiers ≤ n. Sortie : Le polynôme caractéristique PA de A. Début Variables locales : k ∈ N ; c ∈ A ; C, B ∈ An×n ; P ∈ A[X]. Id := In ; B := Id ; P := X n ; pour k de 1 à n − 1 faire C := B · A ; c := Tr(C)/k ; P := P − c · X n−k ; B := C − c · Id fin pour ; c := Tr(B · A)/n ; P := P − c ; PA := (−1)n P Fin. Calcul de vecteurs propres Dans le cas où A est intègre, si λ est une valeur propre simple de A (c’est-à-dire une racine simple de P (X)), le même calcul (donnant entre autres la matrice caractéristique adjointe Q(X) = Adj(XIn − A)) nous permet d’obtenir un vecteur propre non nul associé à λ. En effet Q(X) = n−1 X Bi X n−1−i donc Tr(Q(X)) = i=0 n−1 X Tr(Bi ) X n−1−i . i=0 Mais Tr(Bi ) = (i − n) ci , donc Tr(Q(X)) = − n−1 X i=0 (n − i) ci X n−i−1 = P 0 (X) 86 2. Algorithmes de base en algèbre linéaire où P 0 (X) désigne le polynôme dérivé de P (X). Ainsi Tr(Q(λ)) = P 0 (λ) 6= 0 puisque λ est une racine simple de P . Par conséquent la matrice Q(λ) n’est pas nulle. Mais l’égalité (XIn − A) Q(X) = P (X) In donne (A − λIn ) Q(λ) = −P (λ) In = 0. Ce qui prouve que n’importe quelle colonne non nulle v de Q(λ) vérifie Av = λv et c’est donc un vecteur propre non nul de A relatif à la valeur propre λ. Si l’on désigne par ` le numéro de la colonne présumée non nulle de la matrice Q(λ) = B0 λn−1 + B1 λn−2 + · · · + Bn−2 λ + Bn−1 et par bk` la colonne no ` de Bk , le calcul de ce vecteur propre peut se faire de la manière suivante : • Poser v0 = e` (colonne numéro ` de la matrice In ) ; • Faire vk = λ vk−1 + bk` (pour k allant de 1 à n − 1). Le vecteur propre recherché n’est autre que v = vn−1 . Plus généralement, si la multiplicité géométrique 6 de λ est égale à 1, la matrice Q(λ) n’est pas nulle (elle est de rang 1) et n’importe quelle colonne non nulle de Q(λ) représente un vecteur propre non nul de A pour la valeur propre λ. Si par contre la multiplicité géométrique (et par conséquent la multiplicité algébrique 7 ) de la valeur propre λ est supérieure ou égale à 2, non seulement la trace, mais la matrice Q(λ) elle-même est nulle d’après la propriété 1.1.2 page 6, puisque le rang de la matrice singulière A−λIn est, dans ce cas, au plus égal à n − 2. La matrice Q(λ), dans ce cas, ne donne donc aucun vecteur propre non nul de A. On montre alors que ce sont les matrices dérivées successives (par rapport à X) de la matrice Q(X) qui permettent de calculer des vecteurs propres non nuls relatifs à λ. Considérons en effet pour k ∈ N l’opérateur ∆[k] : A[X] −→ A[X], P 7→ ∆[k] P , où ∆[k] P (X) = P [k] (X) est défini par l’identité X P (X + Y ) = P [k] (X) Y k . k≥0 Remarquons que P [0] (X) = P (X), P [1] (X) = P 0 (X) et qu’en ca1 ractéristique nulle ∆[k] = k! Dk où Dk est l’opérateur de dérivation 1 (k) d’ordre k dans A [X] (P [k] (X) = k! P (X)). Il est facile de voir qu’en [k] caractéristique quelconque, ∆ est un A - endomorphisme de l’algèbre 6. La multiplicité géométrique d’une valeur propre est par définition la dimension du sous-espace propre correspondant. 7. C’est la multiplicité de λ en tant que zéro du polynôme caractéristique. 2.5. Méthode de Le Verrier et variantes 87 A [X] qui vérifie une formule analogue à la formule de Leibnitz, mais plus simple : k X ∆[k] (P1 P2 ) = ∆[i] (P1 ) ∆[k−i] (P2 ) i=0 En outre un polynôme P admet λ comme racine d’ordre k ≥ 1 si et seulement si P [0] (λ) = P [1] (λ) = . . . = P [k−1] (λ) = 0 et P [k] (λ) 6= 0. Appliquant successivement les opérateurs ∆[k] pour k allant de 1 à m (où m est la multiplicité algébrique de la valeur propre λ) à l’égalité matricielle : (XIn − A) Q(X) = P (X) In , on obtient la suite d’égalités : Q[k−1] (X) + (XIn − A) Q[k] (X) = P [k] (X) In (1 ≤ k ≤ m). Remplaçant dans ces égalités X par la valeur propre λ, et tenant compte du fait que Q(λ) = P (λ) = P [1] (λ) = · · · = P [m−1] (λ) = 0, on obtient le système :  Q(λ) = 0     (λIn − A) Q[1] (λ) = 0     Q[1] (λ) + (λIn − A) Q[2] (λ) = 0 .. .. .. .. ..  . . . . .     Q[m−2] (λ) + (λIn − A) Q[m−1] (λ) = 0    [m−1] Q (λ) + (λIn − A) Q[m] (λ) = P [m] (λ) In . Soit r ∈ N le plus petit entier tel que Q[r] (λ) 6= 0. Alors r < m car sinon, on aurait Q(λ) = Q[1] (λ) = · · · = Q[m−1] (λ) = 0 et (λIn − A) Q[m] (λ) = P [m] (λ) In avec P [m] (λ) 6= 0, ce qui contredit (nous sommes dans un anneau intègre) le fait que la matrice λIn − A est singulière. Donc (λIn − A) Q[r] (λ) = 0 et toute colonne non nulle de Q[r] (λ) est un vecteur propre non nul de A pour la valeur propre multiple λ. Nombre d’opérations arithmétiques L’algorithme de Souriau-Faddeev-Frame consiste à calculer, pour k allant de 1 à n, le produit matriciel Ak = ABk−1 , le coefficient ck = 1 k Tr(Ak ) et enfin la matrice Bk = Ak − ck In . Rappelons qu’on désigne par µM (n) le nombre d’opérations arithmétiques dans l’anneau de base pour la multiplication de deux matrices 88 2. Algorithmes de base en algèbre linéaire carrées d’ordre n. Le coût de l’algorithme de Souriau-Faddeev-Frame s’élève à (n − 2) µM (n) + n (2n − 1) + 2 n (n − 1) . C’est à très peu près le même coût que pour l’algo de Le Verrier (on gagne n opérations arithmétiques). Outre la plus grande simplicité, l’avantage est que l’on a aussi calculé la matrice adjointe. En particulier le calcul de la matrice inverse, si elle existe ne coûte que n2 divisions supplémentaires dans A. Enfin le calcul d’un vecteur propre non nul relatif à une valeur propre donnée de multiplicité géométrique égale à 1 se fait moyennant 2 n (n − 1) opérations arithmétiques supplémentaires. Proposition 2.5.2 Avec la méthode de Faddeev-Souriau-Frame, le calcul du polynôme caractéristique de la matrice A, de son déterminant, de sa matrice adjointe, de son inverse quand elle existe, ainsi que des sous-espaces propres de dimension 1 (quand on connaı̂t la valeur propre correspondante) se fait en 2 n4 + O(n3 ) = O(n4 ) opérations arithmétiques. Pour le calcul du seul polynôme caractéristique on en effectue précisément 2 n (n − 1) (n2 − 3n/2 + 1/2) opérations. 2.5.3 Méthode de Preparata & Sarwate La méthode de Preparata & Sarwate est une accélération astucieuse de la méthode de Le Verrier, basée sur la remarque simple suivante. Pour calculer la trace d’un produit AB de deux matrices carrées d’ordre 2 n, P il suffit d’éxécuter 2n opérations arithmétiques puisque Tr AB = k,` ak,` b`,k . Or le calcul le plus coûteux dans la méthode de Le Verrier est celui des traces des puissances successives de la matrice A dont on veut calculer le polynôme caractéristique. √ Posons donc r = d n e, B0 = C0 = In , B1 = A, et calculons les Bi = Ai pour i = 2, . . . , r, puis les Cj = Br j pour j = 1, . . . , r − 1. Ce calcul consomme (2r − 3)(n3 − n2 ) ' 2 n3,5 opérations arithmétiques dans A. P On a alors Tr Arj+i = Tr Bi Cj = k,` bi,k,` cj,`,k , et les valeurs rj + i pour 0 ≤ i, j ≤ r −1 parcourent l’intervalle [0, r2 −1]. Si r2 = n on doit calculer en outre Sn = Tr C1 Cr−1 . On obtient donc toutes les sommes de Newton Sm = Tr Am , 1 ≤ m ≤ n pour un peu moins que 2n3 opérations arithmétiques supplémentaires dans A. 2.5. Méthode de Le Verrier et variantes 89 Ceci donne l’algorithme 2.9. Comme la récupération des coefficients du polynôme caractéristique à partir des sommes de Newton réclame O(n2 ) opérations arithmétiques on obtient la proposition suivante. Algorithme 2.9 Algorithme de Preparata & Sarwate, version séquentielle simple. Entrée : Une matrice carrée A ∈ An×n où A est un anneau vérifiant les hypothèses de l’algorithme de Le Verrier. P Sortie : Le polynôme caractéristique PA = (−1)n (X n + nk=1 pk X n−k ). Début Variables locales : i, j, r ∈ N ; Bi , Cj ∈ An×n (i, j = 1..r − 1), Si ∈ A (i = 1..n) ; √ Étape 1 : Calcul des puissances Ai pour i < r = d n e. √ r := d n e ; B1 := A ; S0 := n ; S1 := Tr A ; pour i de 1 à r − 2 faire Bi+1 := A Bi ; Si+1 := Tr Bi+1 fin pour ; Étape 2 : Calcul des puissances Arj pour j < r. C1 := A Br−1 ; Sr := Tr C1 ; pour j de 1 à r − 2 faire Cj+1 := C1 Cj ; S(j+1)r := Tr Cj+1 fin pour ; Étape 3 : Calcul des sommes de Newton. pour i de 1 à r − 1 faire pour j de 1 à r − 1 faire Sjr+i := Tr Bi Cj fin pour fin pour si n = r2 alors Sn := Tr C1 Cr−1 fin si ; Étape 4 : Calcul des coefficients de PA . Calculer les coefficients pk (1 ≤ k ≤ n) en utilisant les équations (1.23). Fin. Proposition 2.5.3 Supposons que l’anneau commutatif A satisfasse les hypothèses de l’algorithme de Le Verrier : la division par un entier, quand elle est possible, est unique, et réalisable par un algorithme. Le nombre total d’opérations arithmétiques lors de l’exécution de l’algorith- 90 2. Algorithmes de base en algèbre linéaire me de Preparata & Sarwate, si on utilise la multiplication usuelle des matrices, est égal à 2 n3,5 + O(n3 ) = O(n3,5 ). 2.6 Méthode de Samuelson-Berkowitz Elle est basée sur la méthode de partitionnement ([Gas] pp. 291–298, [FF]), attribuée à Samuelson [79], et elle a l’avantage de s’appliquer à un anneau commutatif arbitraire. Berkowitz [6] en donne une version parallèle de laquelle nous extrayons une méthode séquentielle particulièrement simple et efficace. Elle montre l’intérêt pratique de cet algorithme pour les machines séquentielles, en le plaçant parmi les algorithmes les plus performants actuellement pour le calcul sans division du polynôme caractéristique (cf. les test expérimentaux présentés au chapitre 11). 2.6.1 Principe général de l’algorithme Soit A = (aij ) ∈ An×n une matrice carrée d’ordre n ≥ 2 sur un anneau commutatif arbitraire A. Conformément aux notations introduites dans la section 1.1, pour tout entier r (1 ≤ r ≤ n − 1), on désigne par Ar la sous-matrice principale dominante d’ordre r de A. On partitionne comme suit la matrice Ar+1 :     Ar A1..r,r+1 Ar Sr Ar+1 = = . Ar+1,1..r ar+1,r+1 Rr ar+1,r+1 Le polynôme caractéristiquePPr+1 (X) de Ar+1 est relié au polynôme caractéristique Pr (X) = ri=0 pr−i X i de Ar par la formule de Samuelson (1.15) (proposition 1.2.1 page 13) que l’on peut réécrire sous la forme suivante : ( (ar+1,r+1 − X) Pr (X) +  r+1−k (2.14) Pr+1 = Pr+1  k−2 S )p + · · · + (R S )p r 0 r r k−2 X k=2 (Rr Ar Notons Qr+1 le polynôme : −X r+1 + ar+1,r+1 X r + Rr Sr X r−1 + Rr Ar Sr X r−2 + · · · + Rr Ar−1 r Sr . Pour calculer Pr+1 (X) selon la formule de Samuelson on peut : – effectuer le produit Pr Qr+1 ; – supprimer les termes de degré < r ; 2.6. Méthode de Samuelson-Berkowitz 91 – et enfin diviser par X r . On peut aussi décrire ce calcul sous la forme : −−→ − → Pr+1 = Toep(Qr+1 ) × Pr (2.15) − → où Pr est le vecteur colonne t (p0 , p1 , . . . , pr ) des coefficients du polynôme Pr et Toep(Qr+1 ) ∈ A(r+2)×(r+1) est la matrice de Toeplitz suivante définie à partir du polynôme Qr+1 :   −1 0 ··· ··· 0   .. ..  a  . −1 . r+1,r+1     .. .. .. ..   . . .   Rr Sr .   Toep(Qr+1 ) =   .. .. .. ..   . . . 0 .       .. ..  R Ar−2 S  . . −1 r r r   r−2 Rr Ar−1 r Sr Rr Ar Sr . . . Rr Sr ar+1,r+1 Algorithme 2.10 Algorithme de Berkowitz, principe général. Entrée : Une matrice A ∈ An×n . Sortie : Le polynôme caractéristique PA (X) de A. Début Étape 1 : Pour k < r dans {1, . . . , n} calculer les produits Rr (Ar )k Sr , ce qui donne les polynômes Qr+1 et les matrices Toep(Qr+1 ), Étape 2 : − → Calculer le produit Toep(Qn ) Toep(Qn−1 ) · · · Toep(Q2 ) P1 : − → on obtient PA . Fin. − → Avec P1 = 2.6.2  −1 a1,1  , on obtient l’algorithme de Berkowitz informel 2.10. Version séquentielle Dans la version séquentielle la plus simple de l’algorithme de Berkowitz, le calcul des coefficients de la matrice Toep(Qr+1 ) se fait naturellement par l’utilisation exclusive de produits scalaires ou de produits de 92 2. Algorithmes de base en algèbre linéaire matrices par des vecteurs. De même dans l’étape 2, le produit s’effectue de droite à gauche, donc n’utilise que des produits matrice par vecteur. Cela donne l’algorithme 2.11. Algorithme 2.11 Algorithme de Berkowitz, version séquentielle simple. Entrée : Un entier n ≥ 2 et une matrice A = (aij ) ∈ An×n . Sortie : Le polynôme caractéristique de A : PA (X). Début Variables locales : i, j, k, r ∈ N ; v = (vi ), c = (ci ), s = (si ), P = (pi ) : listes de longueur variable r (1 ≤ r ≤ n + 1) dans A. # initialisation de c et de v c1 := −1 ; v := (−1, a11 ) ; # Calcul des polynômes caractéristiques des matrices principales # dominantes d’ordre ≥ 2 (les listes successives dans P = (pi )) pour r de 2 à n faire (si )i=1..r−1 := (air )i=1..r−1 ; c2 := arr ; pour i de 1 à r − 2 faire Pr−1 ci+2 := j=1 arj sj ; P pour j de 1 à r − 1 faire pj := r−1 k=1 ajk sk fin pour ; (sj )j=1..r−1 := (pj )j=1..r−1 fin pourP ; cr+1 := r−1 j=1 arj sj ; pour i de 1 à r + 1 faire Pmin (r,i) pi := j=1 ci+1−j vj fin pour ; (vi )i=1..r+1 := (pi )i=1..r+1 fin pour ; P PA (X) := ni=0 vi+1 X n−i Fin. Ainsi, sans calculer des puissances de matrices Ak−1 (3 ≤ k ≤ r) on r commence par calculer Rr Sr puis successivement, pour k allant de 2 à r, le produit (matrice par vecteur) Ak−1 Sr suivi du produit scalaire r 3 + r 2 − 3r + 1 opérations arithRr Ak−1 S , ce qui se traduit par 2r r r métiques pour chaque r (1 ≤ r ≤ n − 1). On en déduit que le nombre d’opérations arithmétiques (dans l’anneau de base A) intervenant dans 2.7. Méthode de Chistov 93 ce calcul est égal à : n−1 X r=1 1 2 3 8 (2r3 + r2 − 3r + 1) = n4 − n3 − n2 + n − 1 . 2 3 2 3 Il en est de même pour la multiplication des matrices de Toeplitz Toep(Qr ). On commence par multiplier la première matrice Toep(Q1 ) = − → − → P1 à gauche par la matrice Toep(Q2 ) pour obtenir le vecteur P2 qui − → −−−→ est un vecteur 3 × 1 et ainsi de suite jusqu’à Pn = Toep(Qn ) × Pn−1 . − → −−→ Comme chaque multiplication Pr = Toep(Qr ) × Pr−1 (d’une matrice sous-triangulaire (r + 1) × r avec des −1 sur la diagonale par un vecteur − → r × 1) coûte r (r − 1) opérations arithmétiques dans A, le calcul de Pn n X 1 se fait en (r2 − r) = (n3 − n) opérations arithmétiques de base 8 . 3 r=2 Proposition 2.6.1 Le coût total de l’algorithme séquentiel simple de Berkowitz s’élève à 1 4 1 3 3 2 7 1 4 1 3 n − n − n + n−1 ≤ n − n 2 3 2 3 2 3 opérations arithmétiques dans l’anneau de base. 2.7 2.7.1 Méthode de Chistov Le principe général La méthode de Chistov [17] consiste à calculer le polynôme caractéristique PA (X) d’une matrice carrée A ∈ An×n (n ≥ 2) en le ramenant à l’inversion du polynôme formel Q(X) = det(In − XA) dans l’anneau des séries formelles A[[X]]. Ce polynôme est, à un signe près, le polynôme réciproque du polynôme caractéristique puisque     1 1 n n n (−1) X Q = (−X) det In − A = det(A − XIn ) = PA (X). X X Comme les polynômes PA et Q, résultat final du calcul, sont de degré n, tous les calculs peuvent se faire modulo X n+1 dans l’anneau des séries 8. Ce calcul peut être accéléré en utilisant une multiplication rapide des polynômes (cf. chapitre 6), mais cela ne change pas substantiellement le résultat global qui reste de O(n4 ) opérations arithmétiques avec la même constante asymptotique. Nous n’avons pas implémenté cette amélioration lors de nos tests expérimentaux. 94 2. Algorithmes de base en algèbre linéaire formelles A[[X]], c’est-à-dire encore peuvent se faire l’anneau des  dans n+1 développements limités à l’ordre n sur A : A[X] X . Dans la suite, nous noterons souvent cet anneau An . L’algorithme de Chistov utilise le fait que, pour toute matrice carrée B d’ordre n régulière, le n - ème élément de la diagonale de la matrice inverse B −1 , noté (B −1 )n,n , est égal à : (B −1 )n,n = det Bn−1 det B (Bn−1 )n,n = ou encore det Bn−1 , det Bn où Br désigne la sous-matrice principale dominante d’ordre r de B (avec la convention det B0 = 1). Ceci permet d’écrire lorsque B est fortement régulière : Bn−1 −1 × Bn−1  n,n  n−1,n−1 × · · · × B1−1  1,1 = 1 . detB Appliquant ce fait à la matrice B = In − XAn ∈ A[X]n×n qui est fortement régulière puisque tous ses mineurs principaux dominants sont des polynômes de terme constant égal à 1 et sont donc inversibles dans l’anneau A[[X]], on obtient : −1 Q(X) −1 = [ det(In − XAn ) ] = n Y B −1 r  r,r . (2.16) r=1 Mais on a un isomorphisme canonique A[[X]]r×r ' Ar×r [[X]] et la matrice Br = Ir − XAr est aussi inversible dans l’algèbre des séries formelles sur l’anneau de matrices Ar×r , et son inverse est la matrice : Br−1 = Ir + ∞ X (Ar )k X k ∈ Ar×r [[X]] . (2.17) k=1 Donc en notant Er la r - ème colonne de Ir : Br−1  r,r mod X n+1 = 1 + n  X t  Er (Ar )k Er X k . (2.18) k=1 e Par conséquent en notant Q(X) = Q(X)−1 mod X n+1 on obtient : " # n n   Y X t e Q(X) = 1+ Er (Ar )k Er X k mod X n+1 r=1 k=1 2.7. Méthode de Chistov 95 et donc, ( Q(X) = n Y r=1 " 1+ n  X t  #)−1 Er (Ar )k Er X k dans A[X]  X n+1 k=1 Ainsi Q(X) est l’inverse modulo X n+1 du produit modulo X n+1 de n polynômes de terme constant égal à 1 et de degré inférieur ou égal à n. Rappelons que le polynôme caractéristique à calculer PA (X) est le produit par (−1)n du polynôme réciproque à l’ordre n de Q(X). On obtient alors l’algorithme de Chistov 2.12. Algorithme 2.12 Algorithme de Chistov, principe général. Entrée : la matrice A ∈ An×n . Sortie : le polynôme caractéristique PA (X) de A. Début Étape 1 : Calculer pour r, k ∈ {1, . . . , n} les produits t Er (Ar )k Er , ce qui donne les polynômes B −1 r r,r (formule (2.18)). Étape 2 : Calculer le produit des n polynômes précédents modulo X n+1 , ce qui donne Q(X)−1 mod X n+1 (formule (2.16)). Étape 3 : Inverser modulo X n+1 le polynôme précédent : on obtient Q(X). Étape 4 : Prendre le polynôme réciproque à l’ordre n du polynôme Q(X). On obtient PA (X) en multipliant par (−1)n . Fin. Nous détaillons maintenant la version séquentielle élémentaire de cet algorithme. 2.7.2 La version séquentielle Dans la version séquentielle la plus simple on obtient l’algorithme 2.13 page suivante. On démontre maintenant que le coût en nombre d’opérations arithmétiques dans l’anneau de base pour cette version élémentaire est asymptotiquement de l’ordre de (2/3) n4 . 96 2. Algorithmes de base en algèbre linéaire Algorithme 2.13 Algorithme de Chistov, version séquentielle simple. Entrée : Un entier n ≥ 2 et une matrice A = (ai,j ) ∈ An×n . Sortie : Le polynôme caractéristique de A, PA ∈ A[X]. Début Variables locales : i, j, k, r ∈ N ; q = (qi ), b = (bi ), c = (ci ) ∈ An+1 où 0 ≤ i ≤ n ; v = (vi ) , w = (wi ) ∈ Ar où 1 ≤ i ≤ r, Q ∈ A[X]. q := (1)i=0..n ; c := q ; (initialisation) pour i de 1 à n faire qi := qi−1 a1,1 fin pour ; pour r de 2 à n faire v := (ai,r )i=1..r ; c1 := vr ; pour i de 2 à n − 1 faire P pour j de 1 à r faire wj := rk=1 aj,k vk fin pour ; v := w ; ci := vr fin pour P; cn := rk=1 ar,k vk ; P pour j de 0 à n faire bj := jk=0 cj−k qk fin pour ; q := b fin pour P  n k mod X n+1 ; Q := 1/ k=0 qk X PA := (−1)n X n Q(1/X) Fin. Reprenons en effet les quatre étapes dans l’algorithme de Chistov général 2.12 page précédente. • L’étape 1, la plus coûteuse, se ramène en fait à calculer successivement les produits (Ar )k Er pour 1 ≤ r ≤ n et pour 1 ≤ k ≤ n, puisque t Er (Ar )k Er n’est autre que la r - ème composante du vecteur (Ar )k Er . Pour chaque valeur de r (1 ≤ r ≤ n), on commence par calculer Ar Er puis, pour k allant de 2 à n, le produit de la matrice Ar par le vecteur (Ar )k−1 Er , ce qui se traduit par n (2r2 −r) opérations arithmétiques (additions/soustractions et multiplications) pour chaque r compris entre 1 et n. On en déduit que le nombre d’opérations dans ce calcul est égal à : n n X r=1 (2r2 − r) = 1 2 n (n + 1)(4n − 1) = (2/3) n4 + O(n3 ) . 6 2.8. Méthodes reliées aux suites récurrentes linéaires 97 • L’étape 2 revient à calculer le produit tronqué de n polynômes de degré au plus égal à n, ce qui se fait en O(n3 ) opérations de base. • L’étape 3 consiste à calculer le produit tronqué à l’ordre n des dlog ne dlog ne polynômes 1 + R, 1 + R2 , . . . , 1 + R2 eux-mêmes obtenus à l’issue de dlog ne élévations successives au carré, tronquées à l’ordre n, de polynômes de degré n. Cela fait un nombre d’opérations arithmétiques de l’ordre de n2 dlog ne. • L’étape 4 a un coût négligeable. Proposition 2.7.1 Le coût total de l’algorithme séquentiel élémentaire de Chistov s’élève à (2/3) n4 + O(n3 ) opérations arithmétiques dans l’anneau de base. Nous présentons ci-dessous un résumé de la discussion sur le nombre d’opérations arithmétiques : Etape Etape Etape Etape Etape 1 2 3 4 Coût (2/3) n4 + O(n3 ) O(n3 ) O(n2 log n) négligeable Tableau 2.7.2 Complexité de la version séquentielle de l’algorithme de Chistov 2.8 Méthodes reliées aux suites récurrentes linéaires Dans la section 2.8.1 nous donnons un algorithme de calcul du polynôme caractéristique d’une matrice A basé sur la considération des transformés successifs de vecteurs de la base canonique par A. Dans la section 2.8.2 nous présentons un algorithme dû à Berlekamp qui permet de calculer le polynôme générateur minimal d’une suite récurrente linéaire dans un corps lorsqu’on sait qu’elle vérifie une relation de récurrence linéaire d’ordre n et qu’on connaı̂t les 2n premiers termes de la suite. Dans la section 2.8.3 on décrit l’algorithme de Wiedemann qui utilise celui de Berlekamp pour trouver avec une bonne probabilité le polynôme caractéristique d’une matrice sur un corps fini. 98 2. Algorithmes de base en algèbre linéaire 2.8.1 L’algorithme de Frobenius Nous donnons ici un algorithme qui est basé sur une description de nature géométrique pour un endomorphisme d’un K – espace vectoriel. Comme conséquence, on calcule le polynôme caractéristique de l’endomorphisme avec essentiellement le même nombre d’opérations arithmétiques que dans la méthode du pivot de Gauss (qui ne calcule que le déterminant), sans les inconvénients que présentait la méthode de Hessenberg (hormis le cas des corps finis) concernant la taille des coefficients intermédiaires. Le cas usuel Nous aurons besoin de la procédure 2.14 page ci-contre (dérivée de l’algorithme de Jordan-Bareiss) à laquelle nous donnons le nom de JorBarSol. Elle calcule, à la Jordan-Bareiss, la relation de dépendance linéaire exprimant la dernière colonne en fonction des premières dans une matrice fortement régulière ayant une colonne de plus que de lignes. La fin du calcul, après la triangulation, reste dans l’anneau A si la relation de dépendance linéaire est à coefficients dans A. Considérons une matrice carrée A ∈ Z5×5 d’ordre 5 prise au hasard, donnée par exemple par Maple. Elle définit un endomorphisme hA de Q5 . On note (fi )1≤i≤6 le premier vecteur de la base canonique de Q5 et ses 5 transformés successifs par A. Ceci fournit une matrice B ∈ Z5×6 . Voici un exemple typique    A =    57 −7 −35 −73 43 −82 58 −14 −91 −4 −48 −94 −9 1 −50 −11 −68 −51 5 50 38 14 −73 −86 67    ,   1 57 7940 55624 −46831857 −22451480858  0   B =   0   0 −7 8051 1071926 199923276 −35 −998 −245490 54032957 −73 −7622 −1648929 −128141849 14745797441    9123769947  .  −10372211183  0 43 3460 209836 −58008810   −15808793525 En général les vecteurs (fi )1≤i≤5 sont indépendants, et même, la matrice B est fortement régulière. C’est le cas ici. Concernant la taille des coefficients, ceux de la matrice initiale sont majorés par 100 en valeur absolue, et ceux de la matrice B dans la 2.8. Méthodes reliées aux suites récurrentes linéaires 99 k -ème colonne, sont majorés par M k−1 si M est une des normes de A décrite en section 1.6, par exemple M < 270 pour la norme de Frobenius. Algorithme 2.14 Algorithme JorBarSol Entrée : Une matrice A = (aij ) ∈ An×(n+1) fortement régulière. L’anneau A est supposé intègre avec un algorithme de division exacte. Sortie : P L = (`j ) ∈ An : on a, en notant Cj la j-ème colonne de A, Cn+1 = nj=1 `j Cj . La fin du calcul reste dans A si les `i sont dans A. Début Variables locales : i, j, p, q ∈ N ; piv, den, coe ∈ A ; # LU-décomposition à la Jordan-Bareiss den := 1 ; m := n + 1 ; pour p de 1 à n − 1 faire piv := app ; fortement régulière pour i de p + 1 à n faire coe := aip ; pour j de p + 1 à m faire aij := (piv ∗ aij − coe ∗ apj ) / den fin pour fin pour den := piv fin pour # calcul des coefficients `i pour q de 1 à n − 1 faire p := n − q ; `p := apm /app ; pour i de 1 à p − 1 faire aim := aim − `p aip fin pour fin pour Fin. P On peut calculer la relation de dépendance linéaire f6 = 5i=1 αi fi , P qui se relit hA 5 (f1 ) = 4i=0 αi hA i (f1 ). La matrice de hA sur la base (f1 , . . . , f5 ) estPalors clairement la matrice compagnon du polynôme P (X) = X 5 − 4i=0 αi X i (cf. page 15) et on obtient le polynôme caractéristique de A par la formule PA (X) = (−1)5 P (X). Cet algorithme qui calcule le polynôme caractéristique de A fonc- 100 2. Algorithmes de base en algèbre linéaire tionne lorsque le polynôme générateur minimal P de la suite récurrente linéaire (An f1 )n∈N dans Q5 est de degré ≥ 5. Dans ce cas le polynôme P est en effet égal au polynôme minimal et au polynôme caractéristique de A (au signe près). P Pour calculer la relation de dépendance linéaire f6 = 5i=1 αi fi on applique la procédure JorBarSol. Elle commence par la triangulation à la Jordan-Bareiss de la matrice B. Cette triangulation (en fait, une LU -décomposition) ne change pas les deux premières colonnes et donne les 4 dernières suivantes. 7940 55624 −46831857 −22451480858 8051 1071926 199923276 14745797441 288771 39235840 6619083961 452236520806 641077 −110921281313 −32874613863452 −5984786805270056 −370413 −114147742050 −8244227015780803785 −1467472408808983073730 Si on traite une matrice carrée A d’ordre n dont une norme est majorée par M , le coefficient en position (i, j) dans la matrice ainsi obtenue (k−1) est égal au mineur bi,j de la matrice B = [f1 |Af1 | · · · |An f1 ] avec k = min(i, j). A priori (comme dans l’exemple ci-dessus, d’ailleurs) le plus grand coefficient serait en position (n, n+1), majoré par M 1+···+(n−2)+n , 2 c’est-à-dire M (n −n+2)/2 , ce qui reste raisonnable, en tout cas bien meilleur que dans l’algorithme de Hessenberg. L’algorithme termine en donnant la combinaison linéaire recherchée par le calcul successif des coefficients α5 , α4 , . . . , α1 . Une matrice de Frobenius d’ordre n est un autre nom donné à une matrice compagnon d’un polynôme P (X) de degré n. On peut l’interprèter comme la matrice de l’application linéaire (( multiplication par x )) (la classe de X) dans l’algèbre quotient K[X] /hP (X)i sur la base canonique 1, x, . . . , xn−1 . L’algorithme que nous venons de décrire n’ayant pas de nom officiel, nous l’appellerons algorithme de Frobenius, c’est l’algorithme 2.15 page suivante. Nombre d’opérations arithmétiques Avec une matrice carrée d’ordre n l’algorithme de Frobenius donne un calcul en O(n3 ) opérations arithmétiques, ce qui est du même ordre de grandeur que pour la méthode du pivot de Gauss. Plus précisément l’algorithme 2.15 se décompose en deux grandes étapes. La première étape crée la matrice B et exécute (n − 1) n2 mul- 2.8. Méthodes reliées aux suites récurrentes linéaires 101 Algorithme 2.15 Algorithme de Frobenius (le cas simple) Entrée : Une matrice A = (aij ) ∈ An×n . L’anneau A est supposé intègre avec un algorithme de division exacte. Sortie : Le polynôme caractéristique PA (X). L’algorithme ne fonctionne que si le premier vecteur de base et ses n − 1 transformés successifs par A sont linéairement indépendants. Début Variables locales : i, k, m ∈ N ; B = (bi,j ) ∈ An×(n+1) ; V = (vi ) ∈ An×1 , L = (`j ) ∈ An ; m := n + 1 ; V := première colonne de A ; B := 0 dans An×(n+1) ; b1,1 := 1 ; 2-ème colonne de B := V ; pour k de 3 à m faire V := A V ; k-ème colonne de B := V fin pour ; L := JorBarSol(B) ; P PA := (−1)n (X n − nk=1 `k X k−1 ) Fin. tiplications et (n − 1)3 additions. La deuxième étape applique l’algorithme JorBarSol à la matrice B. Vue la première colonne de celle-ci, cet algorithme utilise n−1 X (n − p) (n − p + 1) + p=2 n−1 X (p − 1) = p=1 1 3 1 2 5 n − n − n+1 3 2 6 additions/soustractions et 3 n−1 X n−1 X p=2 p=1 (n − p) (n − p + 1) + (p − 1) + n − 2 = n3 − 5 2 3 n + n−1 2 2 multiplications/divisions (les divisions sont toutes exactes). Ceci donne le résultat suivant. Proposition 2.8.1 L’algorithme de Frobenius (dans le cas usuel simple) appliqué à une matrice carrée d’ordre n sur un anneau intègre dans lequel les divisions exactes sont explicites demande en tout 10 3 11 n − 7 n2 + n−1 3 3 102 2. Algorithmes de base en algèbre linéaire opérations arithmétiques dans l’anneau. Plus précisément cet algorithme 4 7 13 7 3 exécute n3 − n2 + n additions/soustractions et 2 n3 − n2 + n−1 3 2 6 2 2 multiplications/divisions. En pratique, sur un corps fini, les algorithmes de Hessenberg et de Frobenius s’avèrent meilleurs que tous les autres, ce qui correspond au fait qu’ils fonctionnent en exécutant seulement O(n3 ) opérations arithmétiques. Mais dès qu’on passe à des matrices à coefficients dans Z, l’algorithme de Berkowitz devient plus performant, car ses O(n4 ) opérations arithmétiques sont exécutées sur des entiers de taille mieux contrôlée. Si on passe à des anneaux tels que Z[t, u], l’algorithme de Berkowitz bénéficie en plus du fait qu’il n’utilise pas de divisions. Enfin sur des anneaux non intègres, les algorithmes de Hessenberg et de Frobenius, même dans leurs variantes avec recherche de pivot non nuls, ne fonctionnent plus en toute généralité. Le cas difficile : triangularisation par blocs La méthode que nous décrivons maintenant est l’adaptation de la précédente pour le cas le plus difficile, qui se présente cependant rarement. Cette méthode, comme celle décrite pour le cas usuel (celui où le polynôme caractéristique de A est égal à son polynôme minimal et où le premier vecteur de base A -engendre l’espace Kn ) fait partie de l’usage, et nous ne savons pas à qui l’attribuer. Soit A une matrice carrée dans Kn×n . Notons a = (e1 , . . . , en ) la base canonique de Kn (on identifiera Kn×1 avec Kn ) et hA l’endomorphisme de Kn ayant pour matrice A dans cette base. Nous allons construire une nouvelle base b = (f1 , . . . , fn ) dans laquelle l’endomorphisme hA aura une matrice suffisamment sympathique, dont le polynôme caractéristique sera facile à calculer. Il s’agit précisément de réduire la matrice de hA à une forme triangulaire par blocs avec des blocs diagonaux ayant la forme de Frobenius. Voyons ce qui se passe sur un exemple. Un exemple dans K7 = Q7 : Soit (e1 , e2 , e3 , e4 , e5 , e6 , e7 ) la base canonique de K7 , v un vecteur de K7 et A la matrice carrée d’ordre 7 ci-dessous. Rappelons que le sous-espace de Krylov 9 associé au couple (A, v) (ou au couple (hA , v) ), 9. On dit parfois aussi sous espace cyclique. 2.8. Méthodes reliées aux suites récurrentes linéaires 103 noté KrA, v , est le sous-espace de K7 engendré par la suite récurrente linéaire (An v)n∈N . 1 5 43 683 794 206  −1    0   A= 1   1    2 −2 −26 −458 −554 −148 −7  0 1 14 18 5 3 24 387 469 125 4 21 300 357 92 5 53 888 1082 292 −23 −163 −2547 −3074 −813 268  −186    6    157  ,  119    363  −1028 Pour obtenir une base du sous-espace KrA, e1 (de dimension k1 ) nous calculons successivement les vecteurs e1 , Ae1 , A2 e1 , . . . en nous arrêtant au dernier vecteur qui ne soit pas combinaison linéaire de ceux qui le précèdent ou, ce qui revient au même, nous construisons successivement les matrices [e1 ], [e1 | Ae1 ], [e1 | Ae1 | A2 e2 ] , . . . en nous arrêtant à la dernière matrice dont le rang est égal au nombre de colonnes. Dans notre cas, cela donne la suite de matrices :           1 0 0 0 0 0 0           ,          1 0 0 0 0 0 0 1 −1 0 1 1 2 −7           ,          1 0 0 0 0 0 0 1 −1 0 1 1 2 −7 9 −5 0 5 5 10 −35       , ...     Il faut s’arrêter à la deuxième matrice car la matrice [ e1 | Ae1 | A2 e1 ] est de rang 2. On remarque en effet que A2 e2 = 4 e1 + 5 Ae1 . Une base du sous-espace V1 = KrA, e1 est donc formée du couple (e1 , Ae1 ) et dim V1 = k1 = 2. La matrice correspondante est notée U1 = [ e1 | Ae1 ]. Passons au second vecteur de la base canonique. On remarque que e2 n’est pas dans le sous-espace V1 et l’on poursuit la construction de la base recherchée avec les matrices [ U1 | e2 ] puis [ U1 | e2 | Ae2 ] puis [ U1 | e2 | Ae2 | A2 e2 ] . . . jusquà obtenir une matrice dont la dernière colonne est combinaison linéaire des autres. Ici c’est le vecteur A3 e2 qui est combinaison linéaire de ceux qui le précèdent (c’est-à-dire qu’il appartient au sous-espace V2 = V1 + 104 2. Algorithmes de base en algèbre linéaire e2 , Ae2 , A2 e2 ) et on obtient la suite de matrices :           1 0 0 0 0 0 0 1 −1 0 1 1 2 −7 0 1 0 0 0 0 0            ,          1 0 0 0 0 0 0 1 −1 0 1 1 2 −7 0 1 0 0 0 0 0  5 −2 0 3 4 5 −23           , U2 =          1 0 0 0 0 0 0 1 −1 0 1 1 2 −7 0 1 0 0 0 0 0 5 −2 0 3 4 5 −23 86 −53 1 50 48 103 −347      .     Et la matrice [ e1 | Ae1 | e2 | Ae2 | A2 e2 | A3 e2 ] = [ U2 | A3 e2 ] :  1 1 0 5 86             348 0 −1 1 −2 −53 0 0 0 0 1 0 1 0 3 50 0 1 0 4 48 0 2 0 5 103 0 −7 0 −23 −347  −200    −2    209   214    411  −1471 est de rang 5 puisque sa dernière colonne A3 e2 est combinaison des autres. On peut le voir par exemple par la méthode du pivot de Gauss, qui fournit la relation de dépendance linéaire A3 e2 = 209e1 + 306Ae1 + 2e2 + Ae2 − 2A2 e2 . On passe ensuite au troisième vecteur de la base canonique. On remarque que e3 n’est pas dans le sous-espace V2 . On construit alors une base de V3 = V2 + KrA, e3 . On poursuit donc la construction de la base recherchée avec les nouvelles matrices [ U2 | e3 ] et [ U2 | e3 | Ae3 ] :  1 1 0 5 86             0 −1 1 −2 −53 0 0 0 0 1 0 1 0 3 50 0 1 0 4 48 0 2 0 5 103 0 −7 0 −23 −347 0 1 0 5 86 0  0    0    1    0   0 ,  0    0    0   0   0 −1 1 −2 −53 0 0 0 0 1 1 1 0 3 50 0 1 0 4 48 0 2 0 5 103 0 −26    1    24   21    53  0 −7 0 −23 −347 0 −163   1 0 43  La dernière matrice, que nous notons U3 = U , est de rang 7. C’est la matrice de passage de la base canonique à la base que nous venons de construire b = (e1 , Ae1 , e2 , Ae2 , A2 e2 , e3 , Ae3 ). Dans cette nouvelle base, il est clair que la matrice de l’endomorphisme hA est une matrice triangulaire supérieure par blocs, les blocs diagonaux étant formés de matrices de Frobenius. 2.8. Méthodes reliées aux suites récurrentes linéaires 105 On peut d’ailleurs le vérifier, en calculant le produit matriciel U −1 A U pour obtenir :  0 4 0 0 209 0 179       −1 U AU =       1 5 0 0 306 0 0 0 0 0 2 0 0 0 1 0 1 0 0 0 0 1 −2 0 0 0 0 0 0 0 291    6    −17   −4    1  0 0 0 0 0 1  5 dont le polynôme caractéristique (celui aussi de A ) est égal au produit des polynômes caractéristiques des blocs diagonaux de Frobenius, c’est   2 3 2 2 à-dire : X − 5 X − 4 X + 2 X − X − 2 X − 5 X − 1 . En fait la matrice U −1 A U , et par suite les polynômes caractéristiques des blocs diagonaux de Frobenius, peuvent être retrouvés à partir des relations de dépendance linéaires déjà calculées et de la relation qui exprime le vecteur A2 e3 comme combinaison linéaire des vecteurs de la base b, qui peut être obtenue en appliquant la méthode du pivot de Gauss à la matrice [ U3 | A2 e3 ]. Description générale de l’algorithme On prend f1 = e1 puis f2 = Ae1 , sauf si Ae1 est colinéaire avec e1 , auquel cas on prend f2 = e2 . Précisément, on définit l’entier k1 ∈ {1, . . . , n} comme suit : les vecteurs e1 , Ae1 , . . . , Ak1 −1 e1 sont indépendants, mais Ak1 e1 dépend linéairement des précédents. Ceci définit le début (f1 , . . . , fk1 ) = (e1 , Ae1 , . . . , Ak1 −1 e1 ) de notre base. Les tests de dépendance linéaire dont nous avons eu besoin peuvent être obtenus en appliquant le pivot de Gauss, avec éventuels échanges de lignes mais sans échange de colonnes, sur les matrices successives (e1 , Ae1 ), (e1 , Ae1 , A2 e1 ) etc. Cette méthode fournit aussi la relation de dépendance linéaire lorsque l’entier k1 est atteint. Notez aussi que nous n’avons pas besoin de calculer les puissances successives de la matrice A mais seulement les transformés successifs du vecteur e1 par A. Si k1 = n notre base b est trouvée, et en exprimant Afk1 sur la base b nous obtenons en même temps la matrice de hA sur b sous forme 106 2. Algorithmes de base en algèbre linéaire d’une matrice de Frobenius.  0   1   ..  . 0 · · · 0 a0 . . .. . . a1 .. .. . 0 . · · · 1 an−1       dont le polynôme caractéristique est, au signe près, P (X) = X n − (an−1 X n−1 + · · · + a1 X + a0 ) Si k1 < n, nous cherchons le premier vecteur ei (i > 1) linéairement indépendant de f1 , . . . , fk1 . Ceci nous fournit le vecteur fk1 +1 . Le calcul de l’indice i et donc du vecteur fk1 +1 peut de nouveau être obtenu par la méthode du pivot de Gauss (sans échange de colonnes) appliquée aux matrices (f1 , . . . , fk1 , ei ). On définit ensuite l’entier k2 ∈ {1, . . . , n − k1 } comme suit : les vecteurs f1 , . . . , fk1 +1 , Afk1 +1 , . . . , Ak2 −1 fk1 +1 sont indépendants, mais Ak2 fk1 +1 dépend linéairement des précédents. Ceci définit le nouveau début de notre base, (f1 , . . . , fk1 +k2 ) = (f1 , . . . , fk1 +1 , Afk1 +1 , . . . , Ak2 −1 fk1 +1 ). Si k1 + k2 = n notre base b est trouvée, et en exprimant Afk1 +k2 sur la base b nous obtenons en même temps la matrice de hA sur b sous forme d’une matrice triangulaire par blocs, ayant pour blocs diagonaux deux matrices de Frobenius.   0 ··· 0 a0 0 · · · · · · 0 c0 . .. ..   .  1 . . ..  a . . c 1 1   .. .. .. ..   .. . . . 0  . . . . .     0 · · · 1 an−1 0 · · · · · · 0 cn−1     0 ··· ··· 0 0 ··· ··· 0 b0     .  .. .. ..  .. . . 1 . b1     . .. ..  . . . . ..  .. . . . . 0 .     . .. .. . . . . ..   .. . . 0 . . .  0 ··· ··· 0 0 · · · 0 1 bm−1 2.8. Méthodes reliées aux suites récurrentes linéaires 107 dont le polynôme caractéristique est, au signe près,     Xm−1 Xn−1 bj X j . ai X i · X m − P (X) = X n − i=0 j=0 Si k1 +k2 < n nous cherchons le vecteur fk1 +k2 +1 parmi les vecteurs restants de la base canonique, et nous continuons le processus. En fin de compte, en ayant calculé un nombre relativement restreint (certainement < 2n) de produits du type matrice fois vecteur Ag, et en ayant appliqué le pivot de Gauss un nombre relativement restreint de fois nous avons obtenu une nouvelle base b ainsi que la matrice de hA sur cette base sous la forme d’une matrice triangulaire par blocs, ayant sur la diagonale des blocs formés de matrices de Frobenius. Le polynôme caractéristique de la matrice est donc égal au produit des polynômes caractéristiques Pi (X) des blocs diagonaux, qui sont donnés par simple lecture de la dernière colonne de la matrice de Frobenius. Notons pour terminer qu’il est facile de vérifier sur une telle forme réduite que chacun des vecteurs fj est annulé par l’endomorphisme Q i Pi (hA ), ce qui fournit une preuve géométrique élémentaire du théorème de Cayley-Hamilton. Pour la preuve de ce théorème il suffit d’ailleurs de constater le fait pour le vecteur f1 , car celui-ci est simplement le premier vecteur d’une base, et donc n’importe quel vecteur non nul a priori. Domaine de validité et nombre d’opérations arithmétiques Dans cet algorithme le nombre d’opérations arithmétiques est encore un O(n3 ). Son domaine de validité est celui des corps, et plus généralement celui des anneaux intègres et intégralement clos, que nous avons envisagés à l’occasion de l’étude du polynôme minimal (voir section 1.3.2 page 20). En effet avec un tel anneau, si C ∈ An×n les polynômes PC et PC,v sont automatiquement à coefficients dans A. Il s’ensuit que les procédures du type JorBarSol que nous utilisons au cours de l’algorithme ne calculent que des éléments dans A. Dans le cas d’une matrice à coefficients dans Z on a les mêmes majorations des coefficients intermédiaires que celles que nous avons esquissées dans le cas facile le plus usuel. 108 2.8.2 2. Algorithmes de base en algèbre linéaire Algorithme de Berlekamp/Massey On donne dans un corps K les 2n premiers éléments d’une suite récurrente linéaire (ak )k∈N pour laquelle on sait qu’il existe un polynôme générateur de degré n. Le problème est de calculer le polynôme générateur minimal g de la suite. Une telle solution est donnée par l’algorithme de Berlekamp/Massey [27] qui donne en sortie le degré d ainsi que les coefficients d’un polynôme f = cd g associé au polynôme g. Ce polynôme g est alors obtenu en divisant par cd . L’algorithme de Berlekamp/Massey utilise les propriétés de la suite des triplets (Ri , Ui , Vi ) formée des restes et des multiplicateurs de Bézout successifs dans l’algorithme d’Euclide étendu pour le couple de polynôP2n−1 2n mes (R−1 , R0 ) où R−1 = X et R0 = i=0 ai X i . Posant V−1 = U0 = 0 et U−1 = V0 = 1, ces triplets vérifient, pour tout i ≥ 0, les relations : Ri−1 Ui+1 Vi+1 Ri de plus : Ui Vi−1 − Vi Ui−1 = = = = = Ri Qi + Ri+1 où do Ri+1 < do Ri Ui−1 − Qi Ui , Vi−1 − Qi Vi , d’où : Ui R−1 + Vi R0 , (−1)i et do Ri < 2n − do Vi . Les deux dernières relations se vérifient facilement par récurrence sur i. On arrête le processus au premier reste, disons Rm , de degré plus bas que n, pour obtenir : Um X 2n + Vm R0 = Rm avec do Rm < n. Posons d = sup(do Vm , 1+do Rm ) et P = X d Vm (1/X). Alors on peut montrer que P divisé par son coefficient dominant est le polynôme générateur minimal de la suite (ak ) (cf. [GG] et [27]). Par exemple dans le cas où do Vm = n et Vm (0) 6= 0, en écrivant que les termes de degré compris entre n et 2n − 1 du polynôme Vm (X) R0 (X) sont nuls, on constate que P (X) est bien un polynôme générateur de la suite (ak ). Ceci donne précisément l’algorithme 2.16 page suivante (dans lequel cd(P ) désigne le coefficient dominant de P ). Cet algorithme est dû à Berlekamp, mais sous une forme où la relation avec l’algorithme d’Euclide étendu était invisible. C’est Massey qui a fait le rapprochement. Pour plus de détails sur la relation entre cet algorithme et l’algorithme d’Euclide étendu, on pourra consulter [27]. 2.8. Méthodes reliées aux suites récurrentes linéaires 109 Algorithme 2.16 Algorithme de Berlekamp-Massey Entrée : Un entier n ≥ 1. Une liste non nulle d’éléments du corps K, [a0 , a1 , . . . , a2n−1 ] : les 2n premiers termes d’une suite récurrente linéaire, sous l’hypothèse qu’elle admet un polynôme générateur de degré ≤ n. Sortie : Le polynôme générateur minimal P de la suite récurrente linéaire. Début Variables locales : R, R0 , R1 , V, V0 , V1 , Q : polynômes en X # initialisationP i R0 := X 2n ; R1 := 2n−1 i=0 ai X ; V0 := 0 ; V1 := 1 ; # boucle tant que n ≤ deg(R1 ) faire (Q, R) := quotient et reste de la division de R0 par R1 ; V := V0 − Q ∗ V1 ; V0 := V1 ; V1 := V ; R0 := R1 ; R1 := R ; fin tant que # sortie d := sup(deg(V1 ), 1 + deg(R1 )) ; P := X d V1 (1/X) ; Retourner P := P/cd(P ). Fin. 2.8.3 Méthode de Wiedemann L’algorithme de Wiedemann [96] pour la résolution des systèmes linéaires sur un corps K est un algorithme probabiliste, avec divisions, qui est basé sur la théorie des suites récurrentes linéaires. Il est particulèrement efficace dans le cas des matrices creuses sur les corps finis. Il utilise le fait que si le polynôme minimal PA d’une matrice A ∈ est de degré n (donc égal, à un signe près, au polynôme caractéristique PA de A ) , alors il existe toujours un vecteur v ∈ Kn×1 pour lequel le polynôme générateur minimal de la suite récurrente linéaire (Ak v) k∈N est égal à PA . Il suffit en effet, comme nous l’avons vu dans la section 1.3 (corollaire 1.3.3), de prendre un vecteur de Kn en dehors d’une réunion finie de sous-espaces de Kn . L’algorithme de Wiedemann choisit au hasard une forme linéaire π : Kn → K et un vecteur v ∈ Kn puis il calcule les 2n premiers termes de la suite récurrente linéaire (π(Ak v)) k∈N dans K. Enfin le polynôme générateur minimal de cette suite est obtenu par l’algorithme Kn×n 110 2. Algorithmes de base en algèbre linéaire de Berlekamp-Massey. Dans le cas étudié par Wiedemann, le corps K est fini de cardinal q, et on a une mesure de probabilité naturelle, en postulant une équiprobabilité des éléments du corps. Si le polynôme minimal de la matrice A est égal à son polynôme caractéristique, la probabilité pour trouver un vecteur v convenable après k essais successifs est supérieure q k−1 à 1 − log qk−1 ≥ 1 − qk−11 −1 (cf. [96]). −1 Si on compare avec l’algorithme de Frobenius, on voit que l’on doit calculer 2n vecteurs Ak v au lieu de n. Par contre le calcul du polynôme générateur minimal est ensuite beaucoup plus rapide. En outre, dans le cas des matrices creuses, même le calcul des 2n vecteurs Ak v est très rapide. Notons enfin que les algorithmes de Frobenius et de Wiedemann peuvent être accélérés très significativement au moyen de la multiplication rapide des polynômes et de la multiplication rapide des matrices (cf. sections 8.4 et 8.5). 3. Circuits arithmétiques Introduction Dans ce chapitre nous introduisons la notion fondamentale de circuit arithmétique qui est le cadre général dans lequel se situe l’analyse des algorithmes développés dans cet ouvrage. La complexité algébrique peut être vue comme une théorie qui cherche à analyser les algorithmes qui acceptent de se mettre sous forme de familles de circuits arithmétiques. Dans un circuit arithmétique les instructions de branchement ne sont pas autorisées, ce qui semble une limitation assez sévère. Les algorithmes usuels d’algèbre linéaire sont en effet ordinairement écrits en utilisant des tests d’égalité à 0. Néanmoins, il s’avère que dans beaucoup de cas, cette limitation apparente n’en est pas une, notamment en raison de la procédure d’élimination des divisions de Strassen que nous exposons dans la section 3.2. Par contre le cadre un peu strict fourni par les circuits arithmétiques s’avère très fécond. C’est grâce à lui que l’on peut mettre en place la stratégie générale (( diviser pour gagner )). Lorsqu’on envisage les algorithmes liés à la géométrie algébrique réelle, la nécessité des tests de signe, et donc des instructions de branchement, devient souvent impérieuse, et une autre branche de la complexité algébrique est nécessaire, avec la théorie des réseaux arithmétiques que nous ne développerons pas ici. Dans la section 3.1 nous donnons les définitions précises des circuits arithmétiques et de leur variante (( programmée )), les programmes d’évaluation (straight-line programs en anglais). C’est l’occasion d’introduire quelques mesures de complexité pour ces algorithmes. Dans la section 3.2 nous introduisons l’élimination des divisions selon la méthode de Strassen et nous établissons quelques uns des résultats les plus importants qui la concernent. Dans la section 3.3 nous donnons une méthode qui transforme un cir- 112 3. Circuits arithmétiques cuit arithmétique Γ qui calcule une fraction rationnelle f en un circuit arithmétique Γ0 de taille comparable (la taille est multipliée par au plus 5), qui calcule à la fois la fonction f et toutes ses dérivées partielles. 3.1 Circuits arithmétiques et programmes d’évaluation Un circuit arithmétique constitue une façon naturelle et simple de représenter les calculs algébriques dans un anneau arbitraire, dans le cas où un algorithme n’utilise pas d’instructions de branchements, et uniquement des boucles du type pour i de m à n faire . . . fin pour. Si la taille de l’entrée est fixée, ces boucles peuvent être (( mises à plat )) et on obtient un programme dont les seules instructions sont des affectations. La plupart des algorithmes présentés dans le chapitre 2 sont de ce type et donnent donc lieu, lorsque les dimensions des matrices sont fixées, à des programmes d’évaluation. 3.1.1 Quelques définitions Par exemple l’idée d’un circuit arithmétique est donnée par le calcul du déterminant d’une matrice carrée par l’algorithme du pivot de Gauss simplifié, dans le cas des matrices fortement régulières, pour des matrices de taille fixée. Le calcul est alors toujours exactement le même et peut être représenté comme une suite d’affectations qu’on peut disposer séquentiellement ou dessiner au moyen d’un graphe plan. Par exemple pour une matrice 4 × 4, en donnant un nom différent à chaque résultat de calcul élémentaire (addition, soustraction, multi[k] plication ou division), et en reprenant la notation aij introduite à la section 2.1, on obtient la mise à plat sous la forme du programme d’évaluation 3.1 page ci-contre dans lequel toutes les affectations situées à une même profondeur peuvent en principe être exécutées simultanément. Pour une profondeur donnée, les calculs sont faits avec des variables définies aux étages précédents. Ce calcul comprend 37 opérations arithmétiques, et sa profondeur est égale à 10, sa largeur est égale à 9. 3.1. Circuits arithmétiques et programmes d’évaluation 113 Programme d’évaluation 3.1 Calcul du déterminant et de la LU-décomposition d’une matrice carrée d’ordre 4 par la méthode du pivot de Gauss (sans recherche de pivot). Entrée : Une matrice A = (aij ) ∈ K4×4 à coefficients dans un corps K. Sortie : Les coefficients lij en dessous de la diagonale de la matrice L, les [i−1] coefficients uij = aij (j ≥ i) de la matrice U , le déterminant d4 de A. Début profondeur 1 : Traitement du premier pivot l21 := a21 /a11 ; l31 := a31 /a11 ; l41 := a41 /a11 profondeur 2 : largeur 9 [1] [1] [1] b22 := l21 a12 ; b23 := l21 a13 ; b24 := l21 a14 ; [1] [1] [1] b32 := l31 a12 ; b33 := l31 a13 ; b34 := l31 a14 ; [1] [1] [1] b42 := l41 a12 ; b43 := l41 a13 ; b44 := l31 a44 profondeur 3 : largeur 9 [1] [1] [1] [1] [1] [1] a22 := a22 − b22 ; a23 := a23 − b23 ; a24 := a24 − b24 ; [1] [1] [1] [1] [1] [1] a32 := a32 − b32 ; a33 := a33 − b33 ; a34 := a33 − b34 ; [1] [1] [1] [1] [1] [1] a42 := a42 − b42 ; a43 := a43 − b43 ; a44 := a43 − b44 profondeur 4 : Traitement du deuxième pivot [1] [1] [1] [1] [1] l32 := a32 /a22 ; l42 := a42 /a22 ; d2 := a11 a22 profondeur 5 : largeur 4 [2] [1] [2] [1] b33 := l32 a23 ; b34 := l32 a24 ; [2] [1] [2] [1] b43 := l42 a23 ; b44 := l42 a24 profondeur 6 : largeur 4 [2] [1] [2] [2] [1] [2] a33 := a33 − b33 ; a34 := a34 − b34 ; [2] [1] [2] [2] [1] [2] a43 := a43 − b43 ; a44 := a44 − b44 profondeur 7 : Traitement du troisième pivot [2] [2] [2] [2] [2] l43 := a43 /a33 ; l44 := a44 /a33 ; d3 := d2 a33 profondeur 8 : [3] [2] b44 := l43 a44 profondeur 9 : [3] [2] [3] a44 := a44 − b44 profondeur 10 : [3] d4 := d3 a44 Fin. Plus généralement. 114 3. Circuits arithmétiques Définition 3.1.1 Un programme d’évaluation arithmétique P sans division (resp. avec division) avec constantes dans C, où C est une partie (codée) d’un anneau A ou d’un corps K, est la donnée : — d’un ensemble de variables xp,u où p est un entier ≥ 0 donnant la profondeur de la variable et (p, u) est l’identificateur de la variable, — d’une suite d’instructions d’affectations de l’un des types suivants : – xp,u := a ◦ b où a et b désignent ou bien une variable xq,u avec q < p ou bien une constante c ∈ C, et ◦ ∈ {+, −, ×} (resp. ◦ ∈ {+, −, ×, /}). – xp,u := a (avec les mêmes conventions pour a). Mises à part les variables x0,u qui sont les entrées du programmes d’évaluation, toutes les variables xp,u sont affectées exactement une fois dans le programme. Ce sont les variables d’affectation du programme. Les constantes sont considérées comme de profondeur nulle. En conséquence on note prof(a) = 0 si a ∈ C et prof(xp,u ) = p. Quelques commentaires sur cette définition. Dans le cas d’un programme d’évaluation avec divisions, l’évaluation peut échouer pour certaines valeurs des variables d’entrée dans le corps K. Souvent l’ensemble C est vide ou réduit à {0, 1}. Le programme peut alors être évalué sur un corps arbitraire (sur un anneau arbitraire s’il est sans division). Naturellement, tous les identificateurs doivent être distincts. Les affectations du type xp,u := a sont prévues uniquement pour le cas où on désire respecter certaines contraintes dans une gestion précise des étapes parallèles. Ordinairement, on demande que dans une affectation xp,u := a ◦ b on ait prof(xp,u ) = 1 + max(prof(a), prof(b)) et dans une affectation xp,u := a on ait prof(xp,u ) = 1 + prof(a). On peut aussi demander que dans une affectation xp,u := a ◦ b on ait a ∈ C ou p = 1 + prof(a), et b ∈ C ou p = 1 + prof(b). Le texte du programme d’évaluation doit normalement préciser quelles sont les variables représentant les sorties. Mais on peut demander que les sorties soient exclusivement les variables de profondeur maximum. On peut demander aussi que toute variable de profondeur non maximum soit utilisée. Remarque 3.1.2 De manière plus générale, un programme d’évaluation peut être défini pour n’importe quel type de structure algébrique, une fois qu’ont été précisés les opérateurs de base dans la structure, 3.1. Circuits arithmétiques et programmes d’évaluation 115 qui peuvent être de n’importe quelle arité. Par exemple un programme d’évaluation booléen correspond à la structure d’algèbre de Boole avec les opérateurs booléens usuels. Autre exemple, dans les anneaux commutatifs, on peut définir une notion de programme d’évaluation avec déterminants si on introduit en tant qu’opérateurs de base les detn comme opérations d’arité n2 qui donnent le déterminant d’une matrice n × n en fonction de ses entrées. Définition 3.1.3 Nous utiliserons la terminologie suivante concernant les programmes d’évaluation : – Le nombre des entrées dans un programme d’évaluation est en général contrôlé par un ou plusieurs paramètres qu’on appelle les paramètres d’entrée du programme. Par exemple, dans un programme d’évaluation qui calcule le produit de deux matrices n × n, on prend l’entier n comme paramètre d’entrée et dans un programme d’évaluation associé à la résolution d’un système de m équations polynomiales à n indéterminées, de degré maximum d, écrites en représentation dense 1 , les paramètres d’entrée sont m, n, d. – Dans une affectation du type xp,u := a ◦ b, a et b sont les antécédents de xp,u . – La profondeur du programme d’évaluation est la profondeur maximum de ses variables d’affectation ; notée prof(P ), elle correspond au nombre d’étapes parallèles du programme d’évaluation P . – La taille ou longueur du programme d’évaluation désignera le nombre total de toutes les opérations arithmétiques, c’est-à-dire les affectations du type xp,u := a ◦ b. – Pour chaque étape p (1 ≤ p ≤ prof(P )), on considère le nombre τp d’opérations effectuées durant cette étape. On appelle largeur du programme d’évaluation le plus grand de ces nombres , c’est-à-dire max {τp | 1 ≤ p ≤ prof(P )}. – Lors de l’évaluation d’un programme d’évaluation arithmétique sur un anneau ou sur un corps dont les éléments sont codés, les entrées xi ont a priori n’importe quelle taille tandis que les constantes du programme ont une taille fixée une fois pour toutes. Du point de vue du calcul concret sur des objets codés, on est donc souvent en 1. Un polynôme est codé en représentation dense lorsque le codage donne la liste de tous les coefficients des monômes en dessous d’un degré donné, dans un ordre convenu. Il est codé en représentation creuse lorsque le codage donne la liste des paires (am , m) où m code un monôme (par exemple x2 y 3 z 5 peut être codé par (2, 3, 5) et am son coefficient (non nul) dans le polynôme. 116 3. Circuits arithmétiques droit d’estimer que seules importent vraiment les affectations sans scalaires, c’est-à-dire celles du type xp,u := a±b et xp,u := a×b ou aucun des deux antécédents n’est une constante, ainsi que xp,u := a/b où b n’est pas une constante. Ceci donne lieu aux notions de longueur stricte et de profondeur stricte, dans lesquelles seules sont prises en compte les affectations sans scalaires. Une multiplication ou division sans scalaire dans un programme d’évaluation arithmétique est encore dite essentielle. – Variation sur le thème précédent. Dans la mesure où on consière que les additions ainsi que les multiplications ou divisions par des constantes sont relativement peu coûteuses (ou éventuellement pour des raisons plus profondes d’ordre théorique) on est intéressé par la longueur multiplicative d’un programme d’évaluation et par sa profondeur multiplicative qui sont définies comme la longueur et la profondeur mais en ne tenant compte que des multiplications et divisions essentielles. Par exemple le programme d’évaluation 3.1 a une profondeur multiplicative égale à 6 et une largeur multiplicative égale à 9. 3.1.2 Circuit arithmétique vu comme un graphe On peut également représenter un programme d’évaluation sous forme d’un dessin plan. Par exemple pour le calcul du déterminant par l’algorithme du pivot de Gauss avec une matrice fortement régulière 3 × 3, on peut le représenter par le dessin du circuit 3.2 page suivante. Pour une matrice n × n, on obtiendra un circuit de profondeur 3n − 2 avec un nombre de portes, en tenant compte des n − 1 affectations [p−1] dp := dp−1 a pp (2 ≤ p ≤ n) qui donnent les mineurs principaux dominants de la matrice, égal à : (n − 1) + Xn−1 k=1 k (2k + 1) = 1 (n − 1) (4n2 + n + 6) . 6 Si on veut formaliser ce genre de dessin qui visualise bien la situation, on peut adopter la définition suivante. Définition 3.1.4 Un circuit arithmétique avec divisions (resp. sans division) (( avec constantes dans C )), où C est une partie (codée) d’un anneau A ou d’un corps K, est un graphe acyclique orienté et étiqueté, chaque nœud qui n’est pas une porte d’entrée ayant exactement deux 3.1. Circuits arithmétiques et programmes d’évaluation a [0] 3,3 a [0] 2,3 a [0] 1,3 a [0] 3,2 a [0] 3,1 a [0] 2,1 a [0] 1,1 [1] 3,3 b [1] 2,3 b [1] 2,2 a [1] 2,2 b [1] 3,2 a [1] 3,2 a [1] 2,3 a [1] 3,3 a [0] 1,2 l 2,1 l 3,1 b a [0] 2,2 117 l 3,2 b [2] 3,3 d2 a [2] 3,3 d3 ( : division ; ⊗ : multiplication ; : soustraction) Pour la division et la soustraction le brin entrant gauche représente le premier terme de l’opération Circuit 3.2: Pivot de Gauss simplifié pour une matrice 3 × 3 antécédents. Le circuit est étiqueté de la manière suivante : — chaque porte d’entrée est étiquetée par un triplet (0, n, c) où 0 est la profondeur, (0, n) est le nom qui identifie le nœud et c ∈ {x} ∪ C (avec x ∈ / C). Ici un triplet (0, n, x) représente la variable xn et un triplet (0, n, c) avec c ∈ C représente l’élément (codé par) c de A. — chaque nœud interne et chaque porte de sortie est étiqueté par un triplet (m, n, ◦) où m est sa profondeur, (m, n) est son identificateur, et ◦ ∈ {+, −, ×, /} (resp. ◦ ∈ {+, −, ×}) désigne une opération arithmétique. — enfin, dans le cas des opérateurs / et − (et dans le cas de l’opérateur × si le circuit est destiné à être évalué dans un anneau non commutatif ) il faut étiqueter de manière à les distinguer (gauche, droite) les deux arcs qui aboutissent à un nœud correspondant à cet opérateur. — les portes de sortie correspondant aux résultats du calcul sont spécifiées par une marque distinctive dans leur identificateur. En fait, dans toute la suite, nous utiliserons indifféremment (( circuit arithmétique )) et (( programme d’évaluation arithmétique )), tout en sous-entendant que, pour ce qui est du codage, nous choisissons toujours un codage correspondant à la définition d’un programme d’évaluation arithmétique. De la même manière, nous considérerons comme 118 3. Circuits arithmétiques synonymes programme d’évaluation booléen et circuit booléen. Dans un circuit arithmétique on peut interpréter chaque nœud comme représentant un polynôme de A [(xi )i∈I ] ou K [(xi )i∈I ] (dans le cas sans division) ou une fraction rationnelle de K((xi )i∈I ) (dans le cas avec division). 3.1.3 Circuits arithmétiques homogènes Définition 3.1.5 On appelle circuit arithmétique homogène un circuit arithmétique sans division dont tous les noeuds représentent des polynômes homogènes et qui a la structure suivante. – Les polynômes de degré d sont calculés après ceux de degrés strictement inférieurs. – Le calcul des polynômes de degré d se fait en deux phases. Dans la première phase, en une seule étape parallèle, on effectue des produits de polynômes précédemment calculés (de degrés d0 < d et d − d0 ). Dans la deuxième phase on calcule des combinaisons linéaires des précédents. Proposition 3.1.6 Tout circuit arithmétique sans division qui calcule une famille de polynômes de degré ≤ d peut être réorganisé en un circuit arithmétique homogène qui calcule toutes les composantes homogènes des polynômes en sortie. Le circuit arithmétique homogène obtenu est de profondeur multiplicative d − 1. Par rapport au circuit initial, la profondeur a été multipliée par O(log d), la longueur multiplicative a été au plus multipliée par d(d − 1)/2, et la longueur totale a été au plus multipliée par (d + 1)2 . Preuve. Chaque noeud yj du circuit initial représente un polynôme en les entrées xi qu’on décompose en somme de composantes homogènes. [0] [1] [d] yj := yj + yj + · · · + yj + des composantes sans importance On analyse alors le calcul qui est fait sur les composantes homogènes de degré ≤ d. Lorsqu’on a dans le circuit arithmétique original une affectation correspondant à une addition y` := yh + yk on obtient sur les composantes homogènes au plus d + 1 additions qui peuvent être exécutées en dlog(d + 1)e étapes parallèles. 3.1. Circuits arithmétiques et programmes d’évaluation 119 Lorsqu’on a dans le circuit arithmétique original une affectation correspondant à une multiplication essentielle y` := yh yk on obtient [0] [0] [0] y` = yh yk [1] [0] [1] [1] [0] y` = yh yk + yh yk [2] [0] [2] [1] [1] [2] [0] y` = yh yk + yh yk + yh yk .. .. .. . . . [d] [0] [d] [d−1] [1] [d] [0] = yh yk + yh yk + · · · + yh yk y` ce qui correspond à (au plus) d(d − 1)/2 multiplications essentielles entre les composantes homogènes, 2d + 1 multiplications scalaires, et d(d + 1)/2 additions, soit (d + 1)2 opérations arithmétiques en tout. Par ailleurs on peut réorganiser l’ensemble du calcul de manière que tous les polynômes homogènes de degré k soient calculés après ceux de degré < k. t u 3.1.4 Le problème des divisions dans les circuits arithmétiques Certains circuits arithmétiques avec division comportent une division par une fraction rationnelle identiquement nulle, et ne représentent plus aucun calcul raisonnable. Implicitement on suppose toujours qu’on n’est pas dans ce cas. Le cas de l’algorithme de Jordan-Bareiss sans recherche de pivot est un peu plus subtil. Il correspond à un circuit arithmétique (( avec divisions exactes )), c’est-à-dire que, lorsqu’on le regarde comme produisant à chaque porte un élément du corps des fractions rationnelles, on reste en fait toujours dans l’anneau des polynômes : les divisions ont toujours pour résultat un polynôme et non une fraction rationnelle. Si les portes de sortie d’un circuit arithmétique sont des polynômes (en les entrées) il est a priori préférable que le circuit soit sans division. Il pourra en effet être évalué dans n’importe quel anneau. Dans le cas d’un circuit avec divisions évalué dans un corps, il se peut que certaines divisions soient impossibles, non parce qu’on doit diviser par une fraction rationnelle identiquement nulle, mais parce que les valeurs des xi annulent la fraction rationnelle du dénominateur. C’est encore une raison qui fait qu’on préfère les circuits sans divisions. Une autre raison est que si le corps K est de caractéristique nulle ou s’il contient des éléments transcendants, l’addition de deux fractions est 120 3. Circuits arithmétiques une affaire bien encombrante. L’addition dans Q par exemple, réclame, dans Z tout d’abord 3 multiplications et une addition, suivies d’une simplification de fraction, qui réclame un calcul de pgcd, donc les divisions successives de l’algorithme d’Euclide. Ainsi, lorsque les entrées sont dans Z par exemple, on préfère que tout le calcul reste dans Z. Si on essaie d’évaluer un circuit avec divisions dans un anneau arbitraire A, la situation est encore un peu compliquée. Toute division par un diviseur de zéro est impossible. Et si on divise par un non diviseur de zéro, on se retrouve naturellement dans l’anneau total des fractions de A, défini de la même manière que le corps des fractions d’un anneau intègre, mais en autorisant comme dénominateurs uniquement des non diviseurs de zéro dans A. Naturellement, les calculs dans ce nouvel anneau A0 sont nettement plus compliqués que ceux dans A (cf. la discussion à propos de la méthode du pivot dans Q.) La profondeur d’un circuit est un paramètre pertinent à plus d’un titre. Tout d’abord, la profondeur représente en quelque sorte le (( temps de calcul parallèle )) si on donne une unité de temps pour chaque opération arithmétique et si on dispose de suffisamment de (( processeurs )) entre lesquels on répartit les calculs à faire. Ensuite, la profondeur permet un contrôle de la taille des objets intermédiaires lorsque le calcul est effectué comme une évaluation par exemple dans Z, Q, ou Q(x, y). Grosso modo, la taille double au maximum lorsque la profondeur augmente de 1. Dans le cas des circuits sans divisions évalués par exemple dans Z ou Z[x, y] la profondeur multiplicative est de loin la plus importante pour le contrôle de la taille des objets intermédiaires. Tout ceci a conduit à attacher une importance toute particulière aux circuits sans division et de faible profondeur. 3.2 Élimination des divisions à la Strassen Lorqu’on dispose d’une procédure utilisant les divisions dans le corps des fractions rationnelles pour calculer un polynôme de degré déterminé à coefficients dans un anneau intègre, une technique de Strassen ([87]) basée sur une idée très simple permet d’éliminer toutes les divisions dans cette procédure. 3.2. Élimination des divisions à la Strassen 3.2.1 121 Le principe général L’idée de base est que la division par un polynôme de la forme (1−u) où u = u((xi )) peut être remplacée par le produit par la série formelle 1 + u + · · · + um + · · · à condition d’être dans une situation où on sait qu’on peut ne considérer qu’une partie finie bien contrôlée des séries formelles en jeu. Nous allons expliquer cette idée fondamentale sur l’exemple du calcul du déterminant d’une matrice carrée A par l’algorithme du pivot de Gauss simplifié (c’est-à-dire sans recherche de pivot) mis sous forme d’un circuit arithmétique pour les matrices n × n pour une valeur fixée de n. On considère ce circuit comme un programme d’évaluation dans un anneau arbitraire A (on peut se limiter au sous-anneau engendré par les coefficients de la matrice, ou plutôt à l’anneau total des fractions de ce sous-anneau). Naturellement un obstacle apparaı̂t éventuellement lors d’une affectation vh := vk /v` si v` est diviseur de zéro. Il y a cependant des cas où cet obstacle n’apparaı̂t pas du tout, le plus simple est celui où la matrice de départ est égale à In : toutes les divisions se font par 1 ! Cette remarque d’apparence anodine est cependant la clé de l’élimination des divisions. En effet, il suffit de faire le changement de variable F := A − In et de décider d’évaluer le circuit pour l’entrée In + zF , où z est une nouvelle variable, dans l’anneau A[z] z n+1 : l’anneau des développements limités à l’ordre n à coefficients dans A, que nous noterons souvent An . Quelle que soit la matrice F à coefficients dans A prise en entrée, chaque nœud v` intervenant dans une division est maintenant un développement limité du type v` = 1 + c`,1 z + · · · + c`,n z n , (c`,1 , . . . , c`,n ∈ A)  c’est-à-dire un élément inversible de An = A[z] z n+1 . A la fin du calcul on récupère donc det(In + zF ) dans An , c’est-à-dire en fait : on récupère det(In + zF ) dans A[z]( 2 ). Et il suffit de faire z = 1 pour 2. Dans le cas présent, il serait donc plus astucieux, d’appliquer la procédure avec la matrice A à la place de la matrice F , car on obtient ici à très peu près le polynôme caractéristique de F . Dans le cas présent la procédure d’élimination des divisions est donc très proche de la méthode de Jordan-Bareiss modifiée. Cette dernière est cependant un peu plus simple, car dans la méthode de Strassen on manipule très rapidement des polynômes de degré n (l’ordre de la matrice). Pour terminer notons que c’est un fait d’expérience assez curieux que les procédures (( rapides )) de calcul sans division du déterminant passent toutes par le calcul du polynôme caractéristique. 122 3. Circuits arithmétiques obtenir det(A). En fait la division dans An d’un élément a(z) par un élément inversible b(z) = 1−zu(z) ne nécessite que des additions et multiplications dans An : on peut en effet faire une division en puissances croissantes de a(z) par b(z) jusqu’à l’ordre n en z. On peut également invoquer la formule (valable dans An ) k (1 − zu(z))−1 = (1 − w)−1 = (1 + w)(1 + w2 )(1 + w4 ) · · · (1 + w2 ) (3.1) si 2k+1 ≥ n + 1 (il suffit de prendre k = dlog (n + 1)e − 1). Ainsi toutes les affectations (correspondant à l’évaluation du circuit) dans An se ramènent à des additions et multiplications de polynômes tronqués, c’est-à-dire encore à des additions et multiplications dans A. Le théorème suivant est maintenant clair : Théorème 3.1 La procédure d’élimination des divisions de Strassen peut être appliquée à tout circuit arithmétique pourvu qu’on soit dans le cas suivant : on connaı̂t un point (ξ1 , . . . , ξn ) de (( l’espace des entrées )) tel que, lorsque le circuit est évalué en ce point, toutes les divisions qui doivent être exécutées le sont par des éléments inversibles de l’anneau de base (on rajoute alors ces éléments et leurs inverses à l’ensemble des constantes C du circuit). En particulier l’élimination des divisions est toujours possible si l’anneau de base est un corps infini. Définition 3.2.1 Éliminer les divisions (à la Strassen) dans un circuit arithmétique à partir du point (ξ1 , . . . , ξn ), c’est lui appliquer la procédure d’élimination des divisions de Strassen en utilisant (ξ1 , . . . , ξn ) comme point en lequel le circuit est évalué sans divisions. Nous appellerons ce point le centre d’élimination des divisions. Sur un corps infini, l’existence d’un centre d’élimination des divisions pour un circuit arithmétique résulte du fait qu’on peut toujours éviter l’ensemble des zéros d’une famille finie de polynômes non (formellement) nuls : leur produit est un polynôme non formellement nul et un tel polynôme définit une fonction non identiquement nulle sur Kn (n est le nombre de variables) si K est infini. Un exemple d’élimination des divisions Donnons à titre d’exemple le résultat de l’élimination des divisions pour l’algorithme du pivot de Gauss simplifié, dans le cas n = 3, pour 3.2. Élimination des divisions à la Strassen 123 une matrice I3 +zF . Le circuit initial est donné par le programme d’évaluation 3.3. Programme d’évaluation 3.3 Calcul du déterminant de la matrice carrée I3 + zF par la méthode du pivot de Gauss. Entrée : Les coefficients fij de la matrice F dans un anneau commutatif arbitraire A. Sortie : Le déterminant d3 = det(I3 + zF ). Le calcul est correct si on se situe dans un anneau B contenant z et A et dans lequel tous les éléments de la forme 1 + zb sont inversibles. Les opérations arithmétiques de ce programme d’évaluation sont effectuées dans B. Notez que les coefficients de I3 + zF sont les éléments zfij pour i 6= j et les éléments (1 + zfii ) pour i = j. Début profondeur 1 : Traitement du premier pivot l21 := z f 21 /(1 + zf 11 ) ; l31 := z f 31 /(1 + zf 11 ) profondeur 2 : [1] [1] b 22 := l21 z f 12 ; b 23 := l21 z f 13 ; [1] [1] b 32 := l31 z f 12 ; b 33 := l31 z f 13 profondeur 3 : [1] [1] [1] [1] f 22 := z f 22 − b 22 ; f 23 := z f 23 − b 23 ; [1] [1] [1] [1] f 32 := z f 32 − b 32 ; f 33 := z f 33 − b 33 profondeur 4 : Traitement du deuxième pivot [1] [1] [1] l32 := f 32 /(1 + f 22 ) ; d2 := (1 + z f 11 ) (1 + f 22 ) profondeur 5 : [2] [1] b 33 := l32 f 23 profondeur 6 : [2] [1] [2] f 33 := f 33 − b 33 profondeur 7 : [2] d3 := d2 (1 + f 33 ) Fin. Pour passer de l’ancien circuit (programme d’évaluation 3.3) au nouveau (programme d’évaluation 3.4 page suivante), chaque porte yij ou di (sauf les portes d’entrée) a été remplacée par les portes yijk ou dik , avec k = 0, . . . , 3, qui donnent les quatre premiers coefficients de la série formelle en z. 124 3. Circuits arithmétiques Dans l’algorithme transformé 3.4, nous n’avons pas écrit les portes nulles (pour les bas degrés) et nous n’avons pas mentionné les yijk qu’il est inutile d’évaluer pour obtenir le résultat final. Il faut remarquer que pour le déterminant et même le polynôme caractéristique des matrices 3 × 3, les formules directes sont bien entendu préférables. Programme d’évaluation 3.4 Calcul du déterminant d’une matrice carrée F par la méthode du pivot de Gauss après élimination des divisions à la Strassen. Entrée : Les coefficients fij de la matrice F dans un anneau commutatif arbitraire. Sortie : Le déterminant det(F ). En fait, on calcule même d3 = det(I3 + zF ) = 1 + d31 z + d32 z 2 + d33 z 3 . L’algorithme fonctionne (( en ligne droite )) et sans aucune hypothèse restrictive. Les opérations arithmétiques de ce programme d’évaluation sont effectuées dans A. Début [1] [1] Renommages : l211 = f21 , l311 = f31 , f221 = f22 , f231 = f23 , [1] [1] l321 = f321 = f32 , f331 = f33 . profondeur 1 : Traitement du premier pivot l212 := −f21 f11 ; l312 := −f31 f11 ; d21 := f11 + f22 profondeur 2 : [1] [1] f222 := −l211 f12 ; f232 := −l211 f13 ; [1] [1] [1] f322 := −l311 f12 ; f332 := −l311 f13 ; f333 := −l312 f13 profondeur 3 : [1] [1] d22 := f11 f221 + f222 profondeur 4 : Traitement du deuxième pivot [1] [1] [1] l322 := f322 − f221 f321 profondeur 6 : [2] [1] [2] [1] [1] b332 := l321 f231 ; b333 := l321 f232 + l322 f231 profondeur 7 : [2] [1] [2] [1] [2] [2] [1] [2] f331 := f331 ; f332 := f332 − b332 ; f333 := f333 − b333 profondeur 8 : [2] d31 := d21 + f331 profondeur 9 : [2] [2] [2] [2] [2] d32 := d22 + d21 f331 + f332 ; d33 := d22 f331 + d21 f332 + f333 Fin. 3.2. Élimination des divisions à la Strassen 3.2.2 125 Coût de l’élimination des divisions Quel est le coût de la transformation d’un circuit avec division en un circuit sans division, lorsque les sorties sont des polynômes de degré ≤ n en les entrées ? Tout d’abord si on utilise les algorithmes usuels pour les opérations arithmétiques dans An , la taille du circuit sera en gros multipliée par n2 (ce qui fait qu’on reste dans le cadre des circuits de taille polynomiale). Par exemple le produit de deux éléments de An réclame (n+1)(n+2)/2 multiplications et n (n + 1)/2 additions, tandis que la division de a(z) par 1−zu(z) nécessite n (n+1)/2 multiplications et autant d’additions si on effectue la division en puissance croissante. Si on applique ces constatations dans le cas du calcul du déterminant (et du polynôme caractéristique par la même occasion) d’une matrice carrée par élimination des divisions dans l’algorithme du pivot de Gauss comme nous l’avons 3.2.1, on trouve une taille de Pn−1 vu2 à la section 2 c’est-à-dire un 1 n5 + O(n4 ), à n (n − k) circuit équivalente à k=1 3 1 5 n + O(n4 ) que nous avons obtenu pour l’algorithme de comparer au 10 Jordan-Bareiss modifié. Notons aussi que la multiplication dans An par l’algorithme usuel se fait naturellement en profondeur O(log n) tandis que la division par puissance croissante est en profondeur O(n log n). On peut pallier ce dernier inconvénient en utilisant la formule (3.1) qui donne un circuit de taille O(n2 log n) et de profondeur O(log2 n). Il existe par ailleurs des procédures de multiplication rapide pour les polynômes : les opérations arithmétiques +, −, × et division par un élément f vérifiant f (0) = 1 dans An peuvent être exécutées par des circuits de taille O(n log n log log n) et de profondeur O(log n) (voir [13] et, infra, le théorème 6.2 page 182). Plus généralement nous utiliserons la notation suivante. Notation 3.2.2 Pour un anneau A fixé par le contexte, nous noterons µP (n) le nombre d’opérations arithmétiques nécessaires pour la multiplication de deux polynômes de degré n en profondeur O(log n). Strassen obtient alors précisément le résultat suivant : Théorème 3.2 Lorsqu’on élimine les divisions à la Strassen pour l’évaluation d’une famille de polynômes de degrés ≤ n la profondeur du circuit est multipliée par O(log n) et sa taille par O(µP (n)). 126 3. Circuits arithmétiques Notons aussi le résultat suivant simple et intéressant concernant les circuits arithmétiques qui évaluent des familles de polynômes du second degré. Proposition 3.2.3 Lorsqu’on élimine les divisions à la Strassen pour l’évaluation d’une famille de polynômes de degré ≤ 2, la longueur multiplicative du circuit arithmétique est inchangée. Preuve. Lorsqu’on applique la procédure d’élimination des divisions, supposons qu’on ait f = f0 + zf1 + z 2 f2 , et g = g0 + zg1 + z 2 g2 dans l’anneau des développements limités à l’ordre 2 en z sur A [(xi )] (ici on suppose sans perte de généralité que (0, . . . , 0) est le centre d’élimination des divisions et donc que les fj et gj sont homogènes de degré j en les entrées xi ). On obtient pour le produit h = f g modulo z 3 , h = h0 + zh1 + z 2 h2 avec h0 = f0 g0 , h1 = f1 g0 + f0 g1 et h2 = f2 g0 + f1 g1 + f0 g2 avec la seule multiplication essentielle f1 g1 puisque f0 et g0 sont des constantes. Et on a un calcul analogue pour k = f /g. k0 = f0 /g0 , k1 = f1 /g0 − g1 (f0 /g02 ) et k2 = f2 /g0 − k1 g1 /g0 − g2 k0 /g0 avec la seule multiplication essentielle k1 g1 . t u On pourrait généraliser avec un circuit arithmétique calculant une famille de polynômes de degrés ≤ d. 3.3 Calcul de toutes les dérivées partielles d’un polynôme ou d’une fraction rationnelle Nous donnons une méthode pour transformer un circuit arithmétique Γ qui calcule une fraction rationnelle f en un circuit arithmétique Γ0 de taille comparable (la taille est multipliée par au plus 5), qui calcule à la fois la fonction f et toutes ses dérivées partielles. Si le circuit arithmétique Γ est sans division, il en est de même pour 0 Γ . La méthode est due à Baur & Strassen [5]. Nous suivons l’exposé simple et constructif que Morgenstern en fait dans [72]. Une application importante de ce résultat concerne le calcul de l’adjointe d’une matrice avec un coût voisin de celui de son déterminant. En effet les coefficients bij de la matrice adjointe de A sont donnés par : bij = (−1)i+j det(A ↓ji ) = ∂ det(A) ∂ aji 3.3. Calcul des dérivées partielles 127 où det(A ↓ji ) est le mineur d’ordre n − 1 obtenu en supprimant la j ème ligne et la ième colonne de la matrice A. Nous montrons le résultat par récurrence sur la longueur du programme d’évaluation qui calcule la fonction. Supposons donc par exemple qu’un polynôme f (x1 , . . . , xn ) soit calculé par un programme d’évaluation Γ sans division de longueur s. On peut numéroter xn+1 , . . . , xn+s les variables du programme. La variable xn+1 représente un polynôme g(x1 , . . . , xn ) de l’un des 4 types suivants : (1) xi + xj , (2) xi × xj , (3) c + xi , (4) c × xi avec 1 ≤ i, j ≤ n et c une constante. On a aussi f (x1 , . . . , xn ) = f1 (x1 , . . . , xn , g(x1 , . . . , xn )) où le polynôme f1 (x1 , . . . , xn , xn+1 ) est calculé par le programme d’évaluation évident Γ1 (( extrait )) de Γ et de longueur s − 1. Par hypothèse de récurrence f1 et les n + 1 dérivées partielles de f1 peuvent être calculées par un programme d’évaluation Γ01 de longueur `1 ≤ 5(s − 1). On considère alors les formules qui permettent de calculer les dérivées partielles de f à partir de celles de f1 dans les 4 cas envisagés précédemment : (1) ∂f /∂xh = ∂f1 /∂xh si h 6= i, j, ∂f /∂xi = ∂f1 /∂xi + ∂f1 /∂xn+1 , ∂f /∂xj = ∂f1 /∂xj + ∂f1 /∂xn+1 . (2) ∂f /∂xh = ∂f1 /∂xh si h 6= i, j, ∂f /∂xi = ∂f1 /∂xi + xj × ∂f1 /∂xn+1 , ∂f /∂xj = ∂f1 /∂xj + xi × ∂f1 /∂xn+1 . (3) ∂f /∂xh = ∂f1 /∂xh si h 6= i, ∂f /∂xi = ∂f1 /∂xi + ∂f1 /∂xn+1 . (4) ∂f /∂xh = ∂f1 /∂xh si h 6= i, ∂f /∂xi = ∂f1 /∂xi + c × ∂f1 /∂xn+1 . C’est le deuxième cas qui consomme le plus d’instructions nouvelles : 4 en tout (2 instructions pour calculer ∂f /∂xi et 2 pour ∂f /∂xj ). Il faut par ailleurs rajouter l’instruction qui permet de calculer xn+1 en fonction des xi précédents. Ceci nous permet donc de construire à partir de Γ01 un programme d’évaluation Γ0 pour calculer f et ses n dérivées partielles. Ce programme d’évaluation Γ0 a une longueur majorée par `1 + 1 + 4 ≤ 5(s − 1) + 5 = 5s. Par ailleurs l’initialisation de la récurrence est immédiate. Le cas d’un programme d’évaluation avec divisions se traite de la même manière et aboutit à la même majoration. 4. Notions de complexité Introduction Ce chapitre est consacré aux notions de complexité binaire d’une part, directement issue de la modélisation du travail des ordinateurs, et de complexité arithmétique d’autre part, en relation avec le nombre d’opérations arithmétiques exécutées par un algorithme. Les deux premières sections sont consacrées à la complexité binaire et constituent une présentation rapide en guise de (( rappels )). Les trois dernières sections décrivent de manière précise la complexité arithmétique des familles de circuits arithmétiques, elles servent donc de base de travail pour les calculs de complexité développés dans tout le reste de l’ouvrage. Dans la section 4.3 nous introduisons les classes importantes de complexité arithmétique SD(f (n), g(n)). Nous discutons le rapport entre complexité arithmétique (le nombre d’opérations arithmétiques exécutées) et complexité binaire (le temps d’exécution effectivement utilisé lorsqu’on travaille avec des entrées représentant les éléments de l’anneau A convenablement codés). Ceci nous conduit à la notion de famille uniforme de circuits arithmétiques et aux classes N C k qui sont discutées dans la section 4.4. Enfin dans la section 4.5 nous discutons brièvement un modèle de machine parallèle (les PRAMs) correspondant aux circuits arithmétiques et assez proche de la pratique des architectures parallèles. 4.1 Machines de Turing et Machines à Accès Direct Nous donnons ici quelques indications succinctes sur les modèles de calcul algorithmique dans lesquels est prise en compte la taille des objets 130 4. Notions de complexité à manipuler. Par exemple le temps utilisé pour additionner deux entiers écrits en base 10 est manifestement du même ordre de grandeur que la place occupée par l’écriture de ces deux entiers, tandis que l’algorithme usuel pour la multiplication de deux entiers de tailles k et ` utilise un temps du même ordre de grandeur que k × `. Lorsque dans les années 30 des mathématiciens et logiciens ont réfléchi à la manière de décrire en termes précis ce qu’est un calcul algorithmique, ils ont abouti à des résultats assez variés quant à la forme, mais identiques quant au fond. Tous les modèles élaborés ont abouti à la même notion de (( fonction calculable de N vers N )). La Machine de Turing abstraite Cependant, c’est Alan Turing qui a emporté la conviction par la simplicité de son modèle et par son caractère vraiment mécanique. Il est parti de l’idée qu’un calcul doit pouvoir être exécuté par une machine idéale qui, à l’instar d’un calculateur humain, dispose d’une feuille de papier et d’un crayon, et procède selon une suite d’opérations élémentaires bien répertoriées une fois pour toutes, exécutées conformément à un plan de travail détaillé ne laissant place à aucune ambigüité. Ce modèle est basé sur la notion d’opération élémentaire. Une telle opération doit être suffisamment simple pour ne consommer qu’une quantité fixe de temps et d’énergie. On imagine donc que la machine dispose d’un alphabet fini fixé une fois pour toutes, et qu’une opération élémentaire consiste à lire, écrire ou effacer une lettre à un endroit précis (la feuille de papier doit être divisée en cases, par exemple on prend du papier quadrillé), ou encore à se déplacer vers une case voisine sur la feuille de papier. Naturellement on n’autorise qu’un nombre fini de lettres distinctes. Dans le premier modèle, Turing utilise une feuille de papier constituée d’une simple succession de cases sur une seule ligne potentiellement infinie : la bande de la machine de Turing. Par la suite, il a semblé plus naturel d’utiliser pour modèle une Machine de Turing qui utilise plusieurs bandes pour son travail. Quant au crayon (muni d’une gomme), il est représenté par ce qu’il est convenu d’appeler une tête de lecture 1 qui se déplace le long de la bande. Il y a une tête de lecture pour chacune des bandes. Au départ, certaines bandes doivent contenir l’entrée de l’algorithme (convenablement codée), tandis que les autres sont entièrement vides. Lorsque la machine s’arrête, on lit le résultat à 1. Il serait plus correct mais plus lourd de parler d’une tête de lecture/effaçage/écriture. 4.1. Machines de Turing et Machines à Accès Direct 131 un endroit convenu. Une tête de lecture est capable de reconnaı̂tre si la case lue est vide, d’y écrire alors une lettre, si elle n’est pas vide de lire la lettre qui s’y trouve et éventuellement de l’effacer. Pour plus de détails nous renvoyons à l’ouvrage [Tur] où sont traduits et commentés les articles originaux de Turing, ainsi qu’aux ouvrages [Ste] et [BDG]. Le caractère très élémentaire du fonctionnement abstrait de la Machine de Turing en a fait un candidat naturel, non seulement pour les questions de calculabilité théorique, mais également pour les questions de complexité, et en particulier pour la question de l’appréciation du temps et de l’espace nécessaires à l’exécution d’un algorithme. Une fois l’algorithme traduit dans le modèle de la Machine de Turing, le temps d’exécution est simplement mesuré par le nombre d’opérations élémentaires qui sont effectuées avant d’aboutir à l’arrêt. L’espace nécessaire à l’exécution est représenté par le nombre de cases réellement utilisées. Programmes élémentaires On peut donner un modèle équivalent à la machine de Turing en termes de programmes exécutables, sans doute plus parlant pour quiconque a déjà écrit un programme informatique. On considère des programmes de nature très simple. Ils sont écrits en utilisant des variables entières N1 , . . . , Nr (les entiers sont supposés écrits en binaire) ou booléennes B1 , . . . , Bs (∈ {0, 1}). Un (( programme élémentaire )) est une suite finie d’instructions numérotées de l’un des types suivants : (A) Affectations (1) Bj ← Ni mod 2 (2) Ni ← Ni div 2 (3) Ni ← 2Ni + Bj (4) Bj ← 0 (5) Bj ← 1 (B) Branchements (1) Direct : aller à l’instruction no . . . (2) Conditionnel booléen : si Bj = 0 aller à l’instruction no . . . (3) Conditionnel entier : si Ni = 0 aller à l’instruction no . . . (S) Arrêt. Les variables sont toutes initialisées à 0 sauf celles qui représentent les entrées du programme. Puisque les entiers sont écrits en binaire, on voit que chaque affectation ou branchement peut correspondre à un travail réalisé en consommant un temps et une énergie indépendantes de l’état des variables. 132 4. Notions de complexité Le temps d’exécution est donc raisonnablement estimé comme étant le nombre d’instructions exécutées avant d’aboutir à l’arrêt. Machines à Accès Direct Comme tout modèle abstrait, la machine de Turing est une idéalisation. Le point le plus contestable est l’hypothèse implicite selon laquelle une opération élémentaire est équivalente à une autre quel que soit l’état de la bande (dans la version Machine) ou des variables (dans la version programme informatique élémentaire). Une telle conception se heurte à des limitations physiques. Elle n’est en tout cas pas conforme à ce qui se passe concrètement dans les ordinateurs actuels. Alan Turing participa à l’aventure des premiers ordinateurs. Les ordinateurs ont une conception globale qui diffère sensiblement de la Machine de Turing abstraite. Les données ne sont pas traitées (( là où elles sont )), comme dans l’image du crayon qui se déplace sur la feuille de papier, mais elles sont transférées depuis la périphérie (un disque dur par exemple) vers le centre où elles sont traitées, c’est-à-dire vers un microprocesseur, avant d’être renvoyées vers la périphérie. Ces transferts permanents prennent d’autant plus de temps que les données sont plus éloignées et que l’espace nécessaire à leur stockage est plus grand. Ceci a donné lieu à un autre modèle de calcul, le modèle MAD des Machines à Accès Direct (RAM en version anglaise abrégée), avec de nombreuses variantes. Dans un modèle MAD, on doit considérer une infinité potentielle de (( registres )) (correspondant au stockage des données en mémoire, ou aux cases d’une bande de Machine de Turing). Il serait logique (mais ce n’est pas en général l’option choisie), de considérer que chaque registre ne contient qu’une information dont la taille est fixée une fois pour toutes. Pour traiter le registre dont l’adresse est l’entier n, on considère que l’opération de transfert vers l’unité centrale requiert un temps égal à la taille en binaire de l’entier n. Dans le modèle de Turing, le temps correspondant peut être nul mais aussi beaucoup plus grand que log n, selon la position des têtes de lecture sur chaque bande. En fin de compte, selon l’algorithme utilisé (et selon le modèle MAD choisi), les temps d’exécution T et T 0 obtenus dans le modèle MT (Machine de Turing à plusieurs bandes) ou dans les modèles MAD pour une entrée de taille t sont soumis à des majorations respectives du type suivant (voir un exemple précis dans [Ste] chapitre 2, sections 5.5 et 5.6) : a T 0 ≤ T ≤ b T 02 ), c T ≤ T 0 ≤ d T (T + t)2 . 4.1. Machines de Turing et Machines à Accès Direct 133 Signalons le terme d’accumulateur qui dans le modèle MAD désigne le microprocesseur. L’espace de travail proprement dit Nous terminons cette section avec un commentaire et une définition plus précise de (( l’espace de travail )) utilisé dans les modèles MT ou MAD. Dans le modèle MT nous avons défini (( l’espace nécessaire )) comme le nombre total de cases effectivement utilisées au cours de l’exécution de l’algorithme. En fait, si on veut étudier l’espace de travail proprement dit utilisé par un algorithme, il est judicieux d’opérer une distinction entre l’espace nécessaire aux données d’entrée-sortie d’une part, et l’espace nécessaire au travail proprement dit d’autre part. On convient dans ce cas que les bandes contenant les entrées sont utilisées en lecture uniquement et qu’elles sont lues en une seule passe. De même, les bandes contenant les sorties sont utilisées en écriture uniquement, et elles sont écrites en une seule passe. Par exemple lorsqu’on veut faire la preuve par 9 pour un produit a × b = c où a, b et c sont considérées comme des entrées écrites en base 10, il suffit de lire en une seule passe les données et aucun stockage des résultats intermédiaires n’est nécessaire. On donne à la fin le résultat (oui, ou non) sans avoir utilisé aucun espace pour le travail proprement dit 2 . Si on écrivait cela sous forme d’un programme informatique élémentaire du type que nous avons décrit ci-dessus, cela signifierait que les variables de travail sont toutes booléennes, que les variables représentant les entrées sont seulement utilisées en lecture (elles ne peuvent être utilisées que via les affectations A1 et A2) et les variables représentant la sortie sont seulement utilisées en écriture (elles ne peuvent être utilisées que via les affectations A3). Ainsi certains algorithmes utilisent un espace de travail nul (dans le cas optimal) ou nettement inférieur à la taille des entrées-sorties. Pour les études de complexité d’algorithmes on est particulièrement intéressé par ceux qui n’utilisent aucun espace de travail d’une part, par ceux qui utilisent un espace de travail linéaire par rapport à la taille de l’entrée 2. De même si on veut additionner deux entiers il suffit de les lire en une seule passe et d’écrire au fur et à mesure le résultat sur la bande de sortie. Cependant les entrées et la sortie ne sont pas écrites dans le même sens. En effet, pour pouvoir enchaı̂ner des algorithmes, la convention naturelle est que la tête de lecture sur chaque entrée doit être au départ à l’extrémité droite de l’entrée, et la tête de lecture sur chaque sortie doit être à la fin à l’extrémité droite de la sortie 134 4. Notions de complexité d’autre part et enfin par ceux qui utilisent un espace de travail de l’ordre de grandeur de C log(n) où C est une constante et n est la taille de l’entrée. On appelle ces derniers des algorithmes LOGSPACE . 4.2 4.2.1 Complexité binaire, les classes P, N P et #P Calculs faisables Malgré la grande abondance des modèles de calcul proposés, un consensus a fini par s’établir sur ce qu’est un calcul faisable. On dit qu’un calcul est faisable, ou encore qu’il est dans la classe P si on connaı̂t un algorithme qui dans les modèles MT ou MAD nécessite un temps polynomial par rapport à la taille de l’entrée. Plus précisément, on ne dit rien concernant tel calcul isolé (celui des 100.000 premières décimales de π par exemple), mais on dit quelque chose concernant un calcul général correspondant à des entrées de tailles variables et en tout cas arbitrairement grandes (celui de la k - ème décimale de π par exemple). On demande que, pour un certain polynôme à coefficients positifs ou nul P , pour toute entrée de taille inférieure ou égale à n, l’algorithme donne sa réponse en un temps majoré par P (n). Les algorithmes LOGSPACE sont dans la classe P, et ils sont considérés à juste titre comme bien meilleurs que les algorithmes qui travailleraient en temps et espace polynomial. On voit que la notion d’algorithme de classe P est une notion asymptotique, qui peut être assez éloignée de la réalité des calculs. Un algorithme ayant un temps de calcul (( linéaire )) égal à n + 10100 correspond en pratique à quelque chose d’infaisable, tandis que si son temps de 100 calcul est (( exponentiel )) majoré par sup(n, 2n /210 ) il reste facile à exécuter pour toutes les entrées concrètement envisageables, alors même qu’il n’est pas dans la classe P. De nombreux auteurs distinguent les problèmes faisables (les entrées sont des entiers, ou codées par des entiers, mais la sortie est du type oui/non, donc codée par un booléen dans {0, 1}) des fonctions faisables (la ou les sorties sont des entiers) et ils réservent le symbole P pour les problèmes faisables. La classe des fonctions faisables (calculables en temps polynomial) est alors notée FP. En fait une fonction f : N → N est faisable si et seulement si d’une part la taille de la sortie est polynomialement majorée en fonction de la taille de l’entrée, et d’autre part, le problème f (n) ≤ p ? est dans la classe P. Nous n’introduirons donc pas deux notations distinctes et nous ferons confiance au contexte pour lever les ambigüités éventuelles. 4.2. Complexité binaire, les classes P, N P et #P 135 Citons des problèmes de base qui ont reçu dans le passé une solution algorithmique satisfaisante, ce qui les mettait dans la classe P bien avant qu’elle ne fût inventée. La résolution des systèmes linéaires par la méthode chinoise du pivot, appelée en Occident méthode du pivot de Gauss, donne un algorithme de classe P lorsque les coefficients et les inconnues sont des nombres rationnels. Le calcul du nombre de racines réelles d’un polynôme par la méthode de Sturm, qui avait été saluée lors de sa découverte pour sa clarté et son élégance, fournit un algorithme en temps polynomial lorsque les coefficients du polynôme sont des nombres rationnels. Le calcul du polynôme caractéristique d’une matrice carrée par la méthode de Leverrier est un autre exemple célèbre. Le calcul intégral lui-même a un aspect algorithmique (pour le calcul automatique de certaines aires par exemple) qui frappa les contemporains de Leibniz et Newton et qui est devenu aujourd’hui une des branches du calcul formel. 4.2.2 Problèmes dont les solutions sont faciles à tester La conjecture P = 6 N P est apparue dans les années 70 (Cook, [21]). Elle correspond à l’idée intuitive suivante : il y a des problèmes dont les solutions sont faciles à tester mais qui sont difficiles à résoudre. On pourrait dire a priori que la plupart des systèmes d’équations qu’on cherche à résoudre correspondent à ce paradigme. Il est remarquable que cette idée intuitive n’ait pu recevoir une forme mathématique précise qu’avec l’avènement de la théorie de la complexité des algorithmes. Tard venue dans le monde des conjectures mathématiques, la conjecture P 6= N P apparaı̂t aujourd’hui comme l’une des plus importantes, l’une dont la signification est la plus profonde. Elle a résisté à toutes les tentatives d’en venir à bout, et beaucoup d’experts pensent qu’on ne dispose pas aujourd’hui des concepts nécessaires à sa solution, alors même qu’elle a quasiment la force d’une évidence. Nous allons en donner quelques commentaires relativement informels. Ils sont nécessaires pour aborder dans les chapitres 12 et 13 l’analogue en complexité algébrique de la conjecture P = 6 N P en complexité binaire. Nous recommandons là encore sur ce sujet les ouvrages [BDG] et [Ste]. Comme exemple de problème dont les solutions sont faciles à tester mais qui sont difficiles à résoudre, nous allons considérer les problèmes de programmation linéaire. Un tel problème est donné par une matrice A (de type n × m) et un vecteur colonne b (de type m × 1) à coefficients réels, et une solution du problème est un vecteur colonne x (de type 136 4. Notions de complexité n × 1) tel que le vecteur y = Ax − b ait toutes ses coordonnées ≥ 0 ( 3 ). Pour en faire un problème dont la nature algorithmique est bien précise, nous nous limitons aux matrices A0 = [A|b] à coefficients entiers codés en binaire. Quant aux solutions, nous avons le choix. Si nous demandons des solutions en nombres rationnels, nous parlons de programmation linéaire en rationnels, et si nous demandons des solutions en nombres entiers, nous parlons de programmation linéaire en entiers. Pour chacun de ces deux problèmes une solution x éventuelle est facile à tester. Un algorithme qui donne en général une solution rapide (s’il en existe une) pour la programmation linéaire en rationnels a été mis au point dans les années 50 (cf. [23]). Il est en général très performant et il est encore aujourd’hui fréquemment utilisé, c’est l’agorithme de Dantzig. L’inconvénient est que pour certaines matrices A0 , l’algorithme a un mauvais comportement et son temps de calcul peut devenir exponentiel par rapport à la taille de A0 . Dans les années 70 on a trouvé d’autres algorithmes, qui dans la plupart des cas sont nettement plus lents que celui de Dantzig, mais qui tournent en temps polynomial pour n’importe quelles matrices A0 (cf. [55, 60, 61] et l’ouvrage [Sch]). Depuis, on sait donc que la programmation linéaire en rationnels est dans la classe P. Par contre pour ce qui concerne la programmation linéaire en entiers, on n’est toujours pas capable de résoudre ce problème par un algorithme de la classe P, même si on ne s’intéresse qu’aux solutions de petite taille. En fait, on pense qu’on en sera à tout jamais incapable, car une réponse dans l’autre sens signifierait que la conjecture P = 6 N P est fausse. Pour expliquer comment est définie la classe N P, nous essayons d’examiner avec un peu de recul ce que signifierait en général (( savoir résoudre un problème dont on sait tester facilement les solutions )). Nous commençons par remarquer que pour bien poser la question, il faut savoir donner le problème sous une forme codée, qui puisse être prise comme entrée d’un programme informatique (ou d’une Machine de Turing). On peut donc toujours considérer que l’on a une suite infinie de problèmes Pn où n est justement la forme codée en binaire du problème (les entiers n qui ne coderaient pas correctement une instance de notre problème doivent pouvoir être faciles à repérer). Quant aux solutions, elles doivent également pouvoir être codées, données comme telles en entrée ou à la sortie d’un programme informatique. Nous supposons donc sans perte 3. Un problème de programmation linéaire est en général énoncé sous forme d’un problème d’optimisation. Nous en présentons ici une version équivalente plus facile à discuter pour notre propos actuel. 4.2. Complexité binaire, les classes P, N P et #P 137 de généralité que la solution éventuelle est elle aussi codée par un entier x. Maintenant considérons la fonction ϕ : N × N → {0, 1} qui est définie comme suit : ϕ(n, x) = 1 si x est le code d’une solution du problème Pn et ϕ(n, x) = 0 sinon. Supposer qu’on sait tester facilement les solutions de notre famille Pn peut être raisonnablement interprété comme signifiant que la fonction ϕ est dans la classe P. Tandis que supposer que le problème est intrinsèquement difficile à résoudre peut être raisonnablement interprété comme signifiant que la question ∃x ∈ N ϕ(n, x) = 1 ? n’a pas de réponse dans la classe P. Maintenant, nous devons apporter une restriction. Il se peut que le problème soit intrinsèquement difficile à résoudre pour une trop bonne raison, à savoir que les solutions éventuelles sont de taille trop grande. Plus exactement que la taille de toute solution x du problème no n croisse trop vite par rapport à celle de n. Nous notons dans la suite de cette section |x| la taille de l’entier naturel x, c’est-à-dire la longueur de son écriture en binaire. Nous pouvons maintenant énoncer ce qu’est un problème dans la classe N P. C’est répondre à une question du type suivant : Existe-t-il une solution x(n) de taille raisonnable pour telle famille Pn de problèmes dont les solutions sont faciles à tester ? Plus précisément une famille de problèmes codée dans N est dite dans la classe N P si sa solution revient à résoudre une question du type ∃x ∈ N (|x| ≤ a + |n|k et ϕ(n, x) = 1) ? (4.1) où a et k sont deux entiers positifs donnés et où ϕ : N × N → {0, 1} est dans la classe P. Autrement dit si on pose n o ψ(n) = sup ϕ(n, x) ; |x| ≤ a + |n|k (4.2) et si la fonction ϕ est dans la classe P, alors la fonction ψ est dans la classe N P. On peut d’ailleurs supposer sans perte de généralité que ϕ(n, x) = 0 si |x| > a + |n|k . Le N de N P est mis pour non déterministe. La raison en est la suivante. La fonction ψ ci-dessus pourrait être calculée en temps polynomial par une machine dont le fontionnement serait (( non déterministe )). Plus précisément, en utilisant nos programmes informatiques élémentaires ci-dessus, on admettrait des intructions de branchement non déterministe : aller à l’instruction no . . . ou . . . (selon l’humeur du moment). 138 4. Notions de complexité Le programme peut alors aboutir à plusieurs résultats différents selon le chemin choisi lors de son exécution. Et ce programme serait réputé calculer (pour une entrée x fixée) la plus grande des valeurs qu’il peut délivrer en sortie. L’acronyme N P vaut alors pour : calculable en temps polynomial par une machine à fonctionnement non déterministe. Notez que si on avait P = N P (ce que personne ne croit), on pourrait non seulement calculer, dans l’exemple ci-dessus, la fonction ψ en temps polynomial, mais également, dans le cas d’une réponse positive ψ(n) = 1, trouver une solution x pour ϕ(n, x) = 1 en temps polynomial. En effet, on pourrait calculer un tel x par dichotomie en temps polynomial en posant un nombre polynomial de fois la question ∃x x ≤ p et ϕ(n, x) = 1 ? qui serait résoluble en temps polynomial sur les entrées n, p (on démark rerait avec p = 2a+|n| ). Certains problèmes qui peuvent sembler a priori être dans la classe N P sont ramenés dans la classe P lorsque quelqu’un découvre un algorithme rapide pour les résoudre. Des succès spectaculaires ont été à la fin du 20ème siècle la solution en temps polynomial des systèmes d’équations linéaires à coefficients et inconnues entières, celle des problèmes de programmation linéaire en rationnels et la détermination de (( petits vecteurs )) dans un réseau (qui conduit notamment à la factorisation en temps polynomial des polynômes sur Q[X]). Cook a montré (cf. [21]) que certains problèmes de la classe N P sont universels : si on démontre pour l’un d’entre eux qu’il est dans la classe P, alors P = N P. Un tel problème est dit N P - complet. Par exemple la programmation linéaire en entiers est un problème N P - complet, même si on limite a priori la taille des solutions par un entier fixe. Nous pouvons expliquer informellement pourquoi il existe des problèmes N P - complets. Un ordinateur qui ne serait soumis à aucune limitation physique de temps et d’espace serait une machine universelle en ce sens qu’il est capable d’exécuter n’importe quel programme qu’on lui soumet (en faisant abstraction des limitations physiques). Un des premiers théorèmes d’Alan Turing était l’existence d’une Machine de Turing universelle. Une conséquence importante de l’existence d’une Machine de Turing universelle est, via le processus diagonal de Cantor, l’existence de problèmes bien posés (pour les Machines de Turing) mais qui ne pourront être résolus par aucun procédé mécanique du type Machine de Turing : l’ensemble des (codes Turing de) fonctions mécaniquement calculables 4.2. Complexité binaire, les classes P, N P et #P 139 de N vers N (au sens des Machines de Turing) n’est pas mécaniquement calculable (au sens des Machines de Turing). L’existence de problèmes N P - complets est un résultat de nature similaire. Introduisons la notation hx1 , . . . , xk i pour un code dans N d’un k-uple d’entiers 4 . En termes de programmes informatiques élémentaires, l’existence d’une Machine de Turing universelle signifie qu’on sait écrire un programme élémentaire (( universel )) en ce sens qu’il remplit le contrat suivant : – Il prend en entrée 2 entiers binaires n, x et un entier bâton t ( 5 ), où n est un texte de programme élémentaire Qn codé en binaire, x est un code pour la liste des entrées pour Qn et t est le nombre d’étapes élémentaires pendant lequel on désire que soit exécuté Qn . – Il donne en sortie une description instantanée de (c’est-à-dire un codage binaire U (n, x, t) qui décrit de manière exacte) l’état où se trouve la machine qui exécute le programme Qn après l’exécution de t étapes élémentaires de calcul sur l’entrée x : la valeur de chacune des variables xi du programme d’une part, le numéro h de l’instruction en cours d’autre part (codés par hx1 , . . . , x` , hi). Si le temps d’exécution est t0 on demande que pour t > t0 on ait U (n, x, t) = U (n, x, t0 ). Nous supposons aussi sans perte de généralité que les variables de sortie sont en écriture seulement, c’est-à-dire ne sont utilisées que via les affectations de type A3. Il n’est pas très difficile de vérifier qu’un programme élémentaire universel écrit de manière naturelle calcule la fonction universelle U en temps polynomial. Comme conséquence on obtient quelque chose qui pouraı̂t être compris comme une énumération dans la classe P de tous les programmes dans la classe P s’exécutant sur une entrée de taille polynomialement majorée. Expliquons nous. Tout d’abord notons (n, x, t) 7→ V (n, x, t) la fonction (dans la classe P) qui donne l’état de la variable en sortie (ou, s’il y a plusieurs sorties 4. On considère un codage naturel, de sorte que les fonctions de codage (x1 , . . . , xk ) 7→ hx1 , . . . , xk i et celles de décodage (hx1 , . . . , xk i 7→ xi et hx1 , . . . , xk i 7→ k) sont dans la classe P. On suppose aussi sans perte de généralité que hx1 , . . . , xk i ≥ xi . 5. Un entier bâton sert de compteur, il est codé en binaire par 2t − 1, c’est-à-dire (si t ≥ 1) le mot formé de t fois la lettre 1. Ici il est nécessaire de prendre pour t un entier bâton parce qu’on veut que la fonction universelle soit calculable en temps polynomial par rapport à la taille de ses entrées. 140 4. Notions de complexité prévues, l’état de la première d’entre elles). Soit maintenant ϕ : N × N → {0, 1} une fonction dans la classe P qui vérifie ∀x |x| > a + |n|k ⇒ ϕ(n, x) = 0 (4.3) Alors la fonction ψ(n) = sup {ϕ(n, x) ; x ∈ N} résoud un poblème dans la classe N P. Vu que ϕ est dans la classe P et vu le caractère universel de V il existe un entier m0 et deux entiers b, ` tels que ϕ(n, x) = V (m0 , hn, xi , t) avec t ≤ b + |n|` si |x| ≤ a + |n|k Définissons par ailleurs (avec z, t des entiers bâtons, et n et x des entiers binaires,)  Φ(p, x) = inf(1, V (m, hn, xi , t)) si |x| ≤ z 0 sinon avec p = hm, n, z, ti . C’est naturellement une fonction N × N → {0, 1} dans la classe P pour laquelle on a ∀x |x| > |p| ⇒ Φ(p, x) = 0 et à partir de laquelle on peut définir Ψ(p) = sup {Φ(p, x) ; |x| ≤ |p|} (4.4) qui est dans la classe N P. Maintenant il est clair que si on pose D E λ(n) = m0 , n, a + |n|k , b + |n|` alors la fonction λ est dans la classe P et ψ(n) = Ψ(λ(n)). Ceci montre le caractère universel de la fonction Ψ au sens où nous le souhaitions. En écrivant cette preuve en détail, on peut donner des précisions supplémentaires sur la manière dont le problème N P associé à ϕ à été réduit en temps polynomial à celui associé à Φ. En particulier on peut fabriquer une variante où la réduction est dans la classe LOGSPACE . 4.2. Complexité binaire, les classes P, N P et #P 4.2.3 141 Problèmes de comptage Si E est un ensemble fini, nous noterons #E le nombre d’éléments de E. Lorsqu’on a une famille de problèmes dont les solutions sont faciles à tester et de taille polynomialement majorées, on peut se poser non seulement la question de savoir si une solution existe, mais également combien de solutions existent. Précisément si ϕ : N × N → {0, 1} est une fonction dans la classe P qui vérifie ∀x |x| > a + |n|k ⇒ ϕ(n, x) = 0 alors la fonction θ(n) = # {x | x ∈ N, ϕ(n, x) = 1 } = X ϕ(n, x) (4.5) |x|≤a+|n|k compte le nombre de solutions (pour la question codée par n). A priori cette fonction est plus difficile à calculer que la fonction définie par l’équation (4.2) ψ(n) = sup {ϕ(n, x) ; x ∈ N} (qui est dans la classe N P). La taille de θ(n) est polynomialement majorée en fonction de celle de n. Les fonctions θ obtenues de cette manière définissent une nouvelle classe de complexité, les fonctions de comptage pour les problèmes dont les solutions sont faciles à tester, que l’on note #P (prononcer dièse P). Cette classe a été introduite par Valiant dans [93]. Si on veut que la classe #P soit une classe de problèmes plutôt qu’une classe de fonctions, on la définit comme la classe des problèmes k du type θ(n) ≤ p ?. En effet, puisque θ(n) ≤ 2a+|n| il est facile de calculer par dichotomie, en temps polynomial, la fonction θ à partir des tests θ(n) ≤ p ?. On conjecture que les deux inclusions P ⊂ N P ⊂ #P sont strictes. De même qu’il existe des problèmes N P - complets, il existe des fonctions #P-complètes. En fait la réduction que nous avons esquissée dans le cas N P ci-dessus fonctionne aussi pour les fonctions de comptage. Définissons en effet X Θ(p) = # {x | x ∈ N, Φ(p, x) = 1 } = Φ(p, x) (4.6) |x|≤|p| alors, avec la même fonction λ que ci-dessus, on obtient θ(n) = Θ(λ(n)). 142 4.3 4.3.1 4. Notions de complexité Complexité arithmétique et complexité binaire des circuits Complexité arithmétique La taille (en fait le nombre d’opérations arithmétiques) et la profondeur d’un circuit arithmétique ou d’un programme d’évaluation sont les deux paramètres qui mesurent ce qu’on appelle la complexité arithmétique de ce circuit arithmétique ou de ce programme d’évaluation. Ce sont des fonctions de ce que nous avons appelé les paramètres d’entrée du circuit arithmétique. Comme on s’intéresse souvent à la complexité asymptotique des algorithmes (c’est-à-dire à leur comportement quand ces paramètres tendent vers l’infini), nous allons utiliser les notations classiques O, o, Θ, Ω définies de la manière suivante : Notation 4.3.1 Étant données deux fontions f et g de N∗ dans R∗+ , on dit que : • g ∈ O(f ) et l’on écrira g(n) = O(f (n)) s’il existe une constante réelle c > 0 telle que ∀n, n ∈ N∗ ⇒ g(n) ≤ c f (n). • g ∈ o(f ) et l’on écrira g(n) = o(f (n)) si pour tout réel ε > 0, il existe k ∈ N∗ tel que ∀n, (n ∈ N∗ et n > k) ⇒ g(n) ≤ ε f (n). • g ∈ Ω(f ) et l’on écrira g(n) = Ω(f (n)) si f (n) = O(g(n)). • g ∈ Θ(f ) et l’on écrira g(n) = Θ(f (n)) si g(n) = O(f (n)) et f (n) = O(g(n)). On dit dans ce cas que f est du même ordre que g. Remarquons que pour montrer que g ∈ O(f ), il suffit de trouver une constante réelle K0 et un entier n0 ∈ N∗ tels que g(n) ≤ K0 f (n) pour tout n ≥ n0 . Nous appellerons une telle constante K0 une constante asymptotique (cachée dans le grand O). Dans la suite chaque fois que ce sera possible nous nous appliquerons à faire apparaı̂tre la constante asymptotique cachée dans le grand O dans l’étude de complexité des algorithmes. Et l’entier n0 sera parfois précisé. Notation 4.3.2 (complexité arithmétique d’une famille de circuits) On écrira qu’un algorithme est (dans la classe) SD(f (n), g(n)) pour dire qu’il correspond à une famille de circuits arithmétiques de taille t(n) = O(f (n)) et de profondeur p(n) = O(g(n)). Par exemple, l’algorithme simplifié du pivot de Gauss, tel qu’il a été développé dans la section 2.1, est SD(n3 , n). 4.3. Complexités arithmétique et binaire 143 Un algorithme est dit optimal lorsqu’il n’y a pas d’algorithme asymptotiquement plus performant, du point de vue de la taille. Il y a des problèmes dont on connaı̂t la complexité séquentielle, c’està-dire l’ordre asymptotique exact du nombre d’opérations arithmétiques nécessaires pour le résoudre, comme par exemple le problème de l’évaluation d’un polynôme à une indéterminée sur un anneau commutatif quelconque 6 . D’autres problèmes, par contre, comme celui de la multiplication des matrices, sont des problèmes dont on ignore la complexité exacte à cause de l’écart entre les bornes inférieure et supérieure asymptotiques que l’on connaı̂t 7 . Il faut remarquer que le grand O de la notation introduite ci-dessus présente l’inconvénient majeur de (( cacher )) la constante asymptotique qui permet de le définir. Elle a pourtant une importance pratique considérable puisque deux algorithmes permettant par exemple de résoudre respectivement le même problème avec 100n3 et 109 n2 opérations arithmétiques sont tels que le second a une complexité asymptotique nettement meilleure que le premier (il peut arriver qu’il soit aussi optimal) alors que le second, asymptotiquement moins performant, reste plus rapide tant que le nombre d’opérations à effectuer n’a pas atteint la borne astronomique de 1023 . 4.3.2 Complexité binaire On raconte que l’inventeur du jeu d’échec demanda comme récompense un grain de blé sur la première case, deux sur la deuxième, quatre sur la troisième et ainsi de suite jusqu’à la soixante-quatrième. Cela fait a priori un circuit arithmétique de profondeur 64. Mais pour calculer 6 264 − 1 = 22 − 1 = 18.446.744.073.709.551.615 un circuit arithmétique de taille (et de profondeur) 6+1 suffit : Début v0 := x (porte d’entrée, on évaluera avec x = 2) v1 := v0 × v0 v2 := v1 × v1 v3 := v2 × v2 v4 := v3 × v3 v5 := v4 × v4 6 v6 := v5 × v5 (v6 = 22 ) 6. L’algorithme de Horner est optimal pour ce problème, cf. page 11. 7. Le problème de la multiplication des matrices est Ω(n2 ) et O(n2,376 ). 144 4. Notions de complexité v7 := v6 − 1 Fin. De même, un circuit arithmétique de taille 20 évalué sur l’entrée 2 20 permet de calculer 22 = 21.048.576 = 6, 7411 . . . 10315.652 . Ceci montre clairement qu’il y a une différence considérable entre la taille d’un circuit et celle des objets qu’il peut produire lorsqu’on l’évalue sur des entiers codés en binaire. La complexité binaire d’un circuit (ou d’une famille de circuits) est par définition la complexité du calcul d’évaluation qu’il produit lorsqu’on prend ses entrées dans un anneau fixé avec un codage fixé. L’exemple le plus simple et le plus important est l’anneau des entiers codés en binaire. Naturellement, si on accepte de coder un entier par un circuit arithmétique sans division ayant pour seules entrées des constantes déterminées a priori (−1, 0, 1, 2 par exemple) et si on note Zpreval l’anneau des entiers ainsi codé, on voit que l’évaluation d’un circuit arithmétique sans division dans Zpreval est en temps linéaire (il suffit de mettre les circuits bout à bout en changeant seulement certaines profondeurs et certains identificateurs). Le problème avec Zpreval est alors reporté du côté du test de signe, de la division euclidienne, ou de l’évaluation des circuits avec divisions exactes. Il est donc crucial de préciser à la fois l’anneau et le codage choisi pour cet anneau lorsqu’on veut parler de la complexité binaire d’un circuit arithmétique. Signalons à ce sujet qu’en géométrie algébrique, la notion usuelle de degré d’un polynôme peut être souvent remplacée avantageusement par la notion de profondeur d’un programme d’évaluation arithmétique qui lui correspond. Il s’agit là d’un sujet de recherche actif et prometteur (cf. [39, 40]). Un exemple : complexité binaire de l’algorithme du pivot de Gauss Elle est mesurée par le nombre d’opérations booléennes nécessaires pour exécuter l’algorithme avec des entrées codées sous forme de suites de bits. Cette complexité dépend de manière importante du corps K et du codage choisi pour les éléments de K. Si le corps K est un corps fini, la complexité binaire est proportionnelle à la complexité arithmétique. C’est (( le bon cas )) pour l’algorithme. Appliqué dans le cadre de calculs numériques (ce qui constitue aujourd’hui une partie importante du travail des ordinateurs), l’algorithme 4.3. Complexités arithmétique et binaire 145 est en général exécuté avec des nombres en virgule flottante, codés par des suites de bits de longueur fixe, et la complexité binaire est de nouveau proportionnelle à la complexité arithmétique. Mais naturellement, on ne travaille pas vraiment avec les éléments du corps des réels. D’où la nécessité de garantir les résultats avec une précision demandée. L’analyse numérique matricielle remplit des rayons entiers de bibliothèques. Dans cet ouvrage, nous ne prenons en compte que les calculs exacts (en précision infinie dit-on parfois), et nous ne ferons guère d’autre allusion aux aspects proprement numériques des algorithmes que nous commenterons (voir cependant page 148). La méthode du pivot de Gauss appliquée dans le corps des rationnels réserve quelques désagréables surprises. Même si les entrées sont des nombres entiers (supposés codés en binaire de la manière usuelle), on doit immédiatement passer au corps des fractions. Un rationnel est alors codé par un couple d’entiers, le numérateur avec un signe et le dénominateur strictement positif. Avec les rationnels ainsi codés (ce qui est le codage binaire naturel), on est alors devant l’alternative suivante : simplifier les nouvelles entrées de la matrice dès qu’elles sont calculées, ou ne jamais simplifier. La deuxième solution est désastreuse, car les fractions successives voient en général les tailles de leur numérateur et dénominateur croı̂tre de manière exponentielle. La première solution, quoique moins désastreuse, est néanmoins coûteuse, car elle implique des calculs systématiques de pgcd. La dernière formule donnée dans la [p] propriété 2.1.3 permet d’exprimer a ij comme quotient de deux déterminants extraits de la matrice de départ (et elle se généralise au cas où des permutations de lignes ou de colonnes sont effectuées). On a donc la garantie que toutes les fractions qui sont calculées au cours de l’algorithme restent de taille raisonnable (O(n (t + log n)) si on part d’une matrice n × n à coefficients entiers majorés par t en taille binaire, i.e. majorés par 2t en valeur absolue). Le nombre d’opérations arithmétiques dans Z doit donc être multiplié par un facteur nt pour tenir compte du calcul de simplification des fractions. La complexité binaire, elle, a une majoration fort décevante en O(n5 t2 ) (à des facteurs logarithmiques près) si on utilise les algorithmes usuels pour la multiplication ou la division de deux entiers. Appliquée avec le corps des fractions de Z[X] ou Z[X, Y, Z] la méthode du pivot de Gauss se heurte au même type de difficultés, mais très nettement aggravées, car les calculs de pgcd de polynômes, surtout en plusieurs variables, sont très coûteux. 146 4. Notions de complexité Situations dans lesquelles la complexité binaire d’un circuit est en rapport étroit avec sa complexité arithmétique Nous signalerons ici trois situations de ce type. Le premier cas est celui d’une famille de circuits arithmétiques évalués dans un anneau avec un codage pour lequel les opérations arithmétiques produisent des objets de taille bien contrôlée, du fait même de la structure du circuit arithmétique. Proposition 4.3.3 Considérons une famille de circuits arithmétiques Γn de taille σn et de profondeur πn (n est un paramètre contrôlant le nombre d’entrées du circuit Γn . Supposons en outre que la production du circuit Γn réclame un temps τn . Soit enfin A un anneau donné dans un codage pour lequel les opérations arithmétiques sont en temps polynomial O(N k ) avec k > 1 et la taille t(x) des objets vérifie l’inégalité t(a ◦ b) ≤ t(a) + t(b). Alors la production puis l’exécution de ce circuit réclame, dans le modèle MAD, un temps majoré par τn +σn ·O((2πn N )k ) (N > n est la taille de la liste des entrées). En particulier si σn = O(nh ), πn ≤ ` log n et τn = O(nc ) (pour des constantes convenables h, ` et c) alors l’exécution de l’algorithme correspondant à la famille Γn est (globalement) en temps polynomial, précisément en O(nc + nh+`k N k ). Preuve. Dans le modèle MAD, on peut utiliser un registre distinct pour chacune des variables du programme d’évaluation. La taille de tous les résultats intermédiaires est majorée par 2πn N puisqu’elle double au maximum quand la profondeur augmente d’une unité. Les transferts entre les registres de travail et l’accumulateur représentent un temps de l’ordre de σn · (2πn N + log(σn )) qui est négligeable devant l’estimation du temps d’exécution des opérations arithmétiques proprement dites : σn · O((2πn N )k ). t u Remarque 4.3.4 Dans le modèle des machines de Turing, on obtient les mêmes majorations pour n fixé. Par contre, lorsque n varie, se pose le problème de la gestion d’un nombre non fixé a priori de variables de travail, alors qu’une telle machine n’a, quant à elle, qu’un nombre fixé a priori de bandes de travail. Les transferts de données entre d’une part la bande où est stockée la liste des (contenus des) variables de travail et d’autre part les bandes où sont exécutées les opérations arithmétiques prennent normalement un temps de l’ordre de (σn )2 (2πn N + log(σn )) 4.3. Complexités arithmétique et binaire 147 car la bande de stockage doit être relue pour chacune des σn opérations arithmétiques, et sa taille est seulement majorée par σn · (2πn N + log(σn )). Il s’ensuit que la majoration en temps obtenue peut parfois être un peu moins bonne que celle indiquée pour le modèle MAD. De nombreuses variantes de la situation précédente peuvent être utilisées. Par exemple, pour l’évaluation dans Z, c’est seulement la profondeur multiplicative qui doit être en O(log n) pour qu’on ait un bon contrôle de la taille des objets produits, et donc de l’ensemble du calcul d’évaluation. Un algorithme est dit bien parallélisé lorsqu’il correspond à une famille de circuits arithmétiques (Γn ) dont la taille σn est optimale et dont la profondeur est en O(log` (σn )) (pour un certain exposant ` > 0). Si la taille est polynomiale en n, la profondeur est alors polylogarithmique , c’est-à-dire en O(log` (n)). En fait, nous utilisons dans cet ouvrage le terme bien parallélisé avec un sens un peu plus libéral pour le mot optimal. Pour les algorithmes en temps polynomial nous demandons seulement que, en ce qui concerne la taille, l’exposant du n ne soit pas très loin de celui du meilleur algorithme séquentiel connu (la profondeur étant, elle polylogarithmique). C’est en ce sens que nous considérons que les algorithmes de Csanky, de Chistov ou de Berkowitz sont bien parallélisés. Le deuxième cas est celui d’une famille de circuits arithmétiques dont la profondeur n’est pas nécessairement logarithmique et pour laquelle on a un argument de nature algébrique qui permet de mieux majorer la taille des objets intermédiaires que l’argument de profondeur. C’est par exemple le cas de l’algorithme du pivot de Gauss simplifié (éventuellement modifié par élimination des divisions à la Strassen) ou de l’algorithme de Jordan-Bareiss. Même dans le cas d’un algorithme bien parallélisé comme celui de Berkowitz, exécuté dans Z, les majorations de taille obtenues par un argument algébrique direct sont meilleures que celles obtenues par l’argument de profondeur. Signalons un calcul de majoration simple qui permet souvent un contrôle satisfaisant de la taille des objets intermédiaires dans le cas de l’évaluation dans un anneau du style Matn (Z[x, y]) ( 8 ) codé en représentation dense (voir la note 1 page 115), les entiers étant eux-mêmes codés en binaire. Si A = (aij ) est une matrice dans cet anneau, on note dA le degré maximum d’une entrée aij (x, y) et `A := log(Σijhk |aijhk |), 8. Ceci désigne l’anneau des matrices n × n à coefficients dans Z[x, y]. 148 4. Notions de complexité où aijhk est le coefficient de xh y k dans aij (x, y). On a alors la taille de A qui est majorée par n2 d2A `A et les formules suivantes sont faciles à vérifier : `A±B ≤ 1 + max (`A , `B ) `AB ≤ `A + `B dA±B ≤ 1 + max (dA , dB ) dAB ≤ dA + dB Ceci signifie que ce type d’anneau se comporte comme Z pour tous les calculs de majoration de taille des objets produits lors de l’évaluation d’un circuit arithmétique. En particulier si la taille du circuit no n est polynomiale en n et si sa profondeur multiplicative est logarithmique, alors la taille des objets est polynomialement majorée. La plupart des algorithmes que nous examinons dans cet ouvrage ont pour le type d’anneau que nous venons de signaler, une majoration polynomiale de la taille des objets intermédiaires. Signalons en revanche le mauvais comportement de l’algorithme de Hessenberg pour la taille des objets intermédiaires. Le troisième cas est celui d’une famille de circuits arithmétiques (sans divisions) évalués dans un cadre de calcul numérique bien contrôlé. Lors de l’évaluation du circuit, les entrées sont des nombres dyadiques interprétés comme des nombres réels pris avec une précision fixée. Toutes les portes du circuit sont elles-mêmes évaluées avec une précision fixée. Un calcul de majoration d’erreur est nécessaire pour que le résultat du calcul ait un sens mathématique précis. Ce calcul dit une chose du genre suivant : sachant que vous désirez les sorties avec une précision absolue p (c’est-à-dire de p digits après la virgule), et que les entrées sont prises sur l’intervalle contrôlé par le paramètre n, alors vous devez évaluer le circuit Γn,p en effectuant tous les calculs intermédiaires avec la précision ε(n, p) (en particulier les entrées doivent être prises avec cette précision). Par exemple, on pourra imaginer une famille de circuits arithmétiques évaluant en ce sens la fonction (x2 +1)/ln(1+x) sur l’intervalle ] 0, ∞ [ : le circuit arithmétique Γn,p doit permettre d’évaluer cette fonction sur l’intervalle [2−n , 2n ] avec la précision p, en exécutant tous les calculs avec une précision ε(n, p). Si la famille peut être produite en temps polynomial, et si la précision requise ε(n, p) peut être majorée par un polynôme en (n, p) alors la fonction réelle ainsi calculée est dite calculable en temps polynomial (cf. [KKo, 45, 59, 63]). Cela signifie que cette fonction peut être évaluée avec la précision p sur n’importe quel réel dans l’intervalle contrôlé par n en un temps qui dépend polynomialement de (n, p). Il s’agit donc d’analyse numérique entièrement sûre et parfaitement contrôlée. Ce type d’algorithmes est en phase d’être implémenté sur machine, 4.4. Familles uniformes de circuits 149 cela peut être considéré comme une des tâches importantes à réaliser par le Calcul Formel. 4.4 Familles uniformes de circuits arithmétiques et booléens Les algorithmes de calcul algébrique usuels ont un nombre d’entrées et de sorties qui dépend d’un ou plusieurs paramètres entiers, comme par exemple (( la multiplication de deux matrices )) (3 paramètres pour fixer les tailles des deux matrices) ou (( le produit d’une liste de matrices )) (une liste d’entiers pour paramètres) ou (( le déterminant d’une matrice )) (un paramètre). Nous avons appelé ces paramètres des paramètres d’entrée. Comme nous l’avons déjà dit, ce n’est pas seulement la taille et la profondeur du circuit (en fonction des paramètres d’entrée) qui sont importantes, mais aussi son coût de production. Pour calculer le déterminant d’une matrice à coefficients entiers dans la situation la plus générale possible, par exemple, on doit d’abord produire le texte du programme d’évaluation correspondant au circuit qu’on envisage, et ensuite exécuter ce programme d’évaluation sur la liste d’entrées voulue. Si le circuit est de faible profondeur et de faible taille mais que le coût de la production du programme d’évaluation correspondant croı̂t très vite lorsque le paramètre d’entrée augmente, on ne peut guère être satisfait du résultat. C’est la raison pour laquelle on a introduit la notion de famille uniforme de circuits arithmétiques. On dit qu’une famille de circuits arithmétiques (indexée par les paramètres d’entrée) est uniforme lorsque le coût de production du circuit (en tant que texte d’un programme d’évaluation) dépend (( de manière raisonnable )) des paramètres d’entrée. Une première notion d’uniformité consiste à demander que le coût de production du circuit soit dans la classe P, c’est-à-dire en temps polynomial. Une deuxième notion, plus forte, consiste à demander qu’on soit dans la classe LOGSPACE c’est-à-dire que l’espace de travail nécessaire à la production du circuit soit logarithmique. Ces notions d’uniformité sont relativement satisfaisantes mais elles nécessiteraient d’être mieux explicitées dans chaque cas concret. Il est clair qu’une famille de circuits dépendant d’un paramètre d’entrée n qui aurait une profondeur en log n, une taille en n2 et un coût de production en n2001 ne serait pas un très bon cru pour l’année 2001. Dans la littérature sur le sujet règne un silence discret. En fait tout le monde 150 4. Notions de complexité considère apparemment qu’il est bien clair que le coût de production du circuit n’a en général pas un ordre de grandeur bien supérieur à sa taille. Nous nous contenterons de confirmer cette impression par l’étude d’un cas d’école, la multiplication rapide des matrices à la Strassen. Nous renvoyons pour cette étude au chapitre 7 section 7.1.2 théorème 7.2. Classes de complexité N C Pour définir les notions de taille et profondeur en complexité arithmétique parallèle on a utilisé des familles de circuits arithmétiques sans exiger que ces familles soient uniformes. En complexité binaire, les entrées et les sorties d’un algorithme sont des mots écrits sur un alphabet fixé, par exemple l’alphabet {0, 1} (ou si on préfère des entiers écrits en binaire). Il est alors naturel d’utiliser les familles de circuits booléens pour définir les notions de taille et profondeur d’un algorithme parallèle. Dans un circuit booléen, chaque entrée est un élément de {0, 1}, et les portes sont de trois sortes : ∨, ∧ (avec deux antécédents) ou ¬ (à un seul antécédent). Pour chaque longueur de l’entrée d’un algorithme parallèle, codée comme une suite finie de booléens, le circuit booléen correspondant doit calculer la sortie, codée de la même manière. Mais sans uniformité de la famille, on aboutirait à des contre-sens intuitifs évidents, puisque toute fonction f de N vers {0, 1} telle que f (n) ne dépend que de la longueur de n est réalisable par une famille non uniforme de circuits booléens de taille n + 1 et de profondeur 0 (a vrai dire, l’entrée du circuit no n ne sert à rien, et aucune opération booléenne n’est exécutée). Or une telle fonction peut ne pas être calculable. Pour un entier naturel k donné, on note N C k la classe de toutes les fonctions qui peuvent être calculées par une famille uniforme de circuits booléens dans SD(nh , logk n) où h est un entier positif (par hypothèse, le circuit Cn a un nombre de portes d’entrée polynomialement relié à n). L’uniformité est prise ici au sens le plus fort que nous avons considéré au début de cette section. C’est la LOGSPACE uniformité, c’est-à-dire, pour une famille de circuits (Cn )n∈N , l’existence d’une machine de Turing qui, pour l’entrée n, donne en sortie le codage du circuit Cn en utilisant un espace mémoire en O(log n). S On pose N C = k∈N N C k . Il s’agit d’un acronyme pour Nick’s Class du nom de Nicholas Peppinger qui a proposé cette classification des algorithmes parallèles. 4.5. Machines parallèles à accès direct 151 Alors N C ⊆ P mais l’inclusion dans l’autre sens (c’est-à-dire l’égalité des deux classes) est un problème ouvert, et il est conjecturé que l’inclusion est stricte. On peut définir des notions analogues en complexité arithmétique ([34, BCS]). Il serait alors théoriquement nécessaire de distinguer dans les notations la classe N C au sens de la complexité arithmétique de celle définie précédemment. En outre, en complexité arithmétique on peut exiger ou ne pas exiger l’uniformité de la famille de circuits, et on peut aussi vouloir indiquer sur quel anneau commutatif on travaille. Dans le cadre de cet ouvrage, nous ne désirons pas multiplier les notations et nous garderons la notation N C k pour parler des familles uniformes de circuits arithmétiques en SD(nh , logk n), (où n est la somme des paramètres d’entrée du circuit et h est un entier positif). Nous demandons en outre que le degré de tous les polynômes évalués aux noeuds du circuit soit majoré par un polynôme en n. Enfin, nous prendrons l’uniformité en un sens plus modeste : la famille des circuits doit seulement être construite en temps polynomial. La seule vraie preuve d’uniformité que nous faisons est d’ailleurs celle du théorème 7.2, et la construction que nous donnons n’est pas LOGSPACE (par contre, notre résultat est plus précis en ce qui concerne le temps de construction du circuit arithmétique). La plupart des autres algorithmes développés dans cet ouvrage ont une preuve d’uniformité plus simple, ou alors analogue à celle donnée pour le théorème 7.2. Dans le cas des familles non nécessairement uniformes, qui ont été intensivemnt étudiées par Valiant, nous utiliserons les notations VN C k et VN C en complexité arithmétique et BN C k et BN C en complexité booléenne. (voir chapitres 12 et 13). 4.5 Machines parallèles à accès direct Nous présentons brièvement dans cette section quelques modèles de (( machines )) susceptibles d’exécuter des familles de circuits, arithmétiques ou booléens. Nous ne développerons pas cependant les questions de la programmation pour les machines parallèles concrètes. Le principal objet de la conception d’algorithmes parallèles est la réduction du temps de calcul permettant de résoudre un problème donné moyennant un nombre suffisant mais raisonnable de processeurs. 152 4.5.1 4. Notions de complexité Une idéalisation des calculs parallèles sur ordinateur A défaut de modèle unique nous devons faire un choix. En algorithmique séquentielle la Machine à Accès Direct ou (( Random Access Machine )) (RAM) est une abstraction de l’ordinateur séquentiel de Von Neumann. Nous considérons ici le modèle analogue en algorithmique parallèle, celui des machines parallèles à accès direct (Parallel Random Access Machines) ou PRAM, qui constitue le modèle (( standard )) (cf. [CT, 36, 57]). Une machine parallèle à accès direct ou PRAM est une machine virtuelle (et un modèle idéal abstrait) composée d’un nombre illimité de processeurs partageant une mémoire commune, la mémoire globale , elle-même constituée d’un nombre illimité de registres 9 , auxquels ils ont accès pour y lire ou pour y écrire des données ou des résultats de calcul. Chaque processeur a sa propre mémoire locale supposée également de taille illimitée, et inaccessible aux autres processeurs. Elle lui permet d’exécuter en une seule unité de temps ou étape de calcul la tâche, considérée comme élémentaire, composée de la suite d’instructions suivantes : – chercher ses opérandes dans la mémoire globale ; – effectuer l’une des opérations arithmétiques {+, −, ×} (et éventuellement la division quand elle est permise) sur ces opérandes ; – écrire le résultat dans un registre de la mémoire commune (ou globale). Faisant abstraction de tous les problèmes d’accès à la mémoire globale, de communication et d’interconnexion entre processeurs, une unité de temps ou étape de calcul parallèle dans un tel modèle abstrait correspond à l’exécution simultanée de cette tâche par un certain nombre de processeurs, les processeurs actifs , d’autres processeurs pouvant rester inactifs. L’exécution des tâches par l’ensemble des processeurs actifs est synchronisée : une étape démarre dès que les opérandes sont disponibles, c’est-à-dire au démarrage du processus, quand chaque processeur sollicité puise ses données dans la mémoire globale, ou dès la fin d’une étape quand chaque processeur actif a livré le résultat de son calcul, le déroulement de ce calcul étant lié aux contraintes de dépendance entre données dans l’algorithme considéré. 9. Le nombre de processeurs ainsi que le nombre de registres de mémoire partagée sont habituellement fonctions de la taille du problème à traiter. 4.5. Machines parallèles à accès direct 153 Il existe plusieurs variantes du modèle PRAM selon le mode d’accès à la mémoire globale, concurrent ou exclusif. Ce sera une PRAM-EREW 10 si la lecture ou l’écriture dans un même registre n’est permise qu’à un seul processeur à la fois, une PRAMCREW 11 si la lecture est concurrente et l’écriture exclusive, une PRAMERCW si la lecture est exclusive et l’écriture concurrente, et une PRAMCRCW si la lecture et l’écriture simultanées dans un même registre de la mémoire globale sont permises pour plusieurs processeurs à la fois. Dans les deux derniers cas, il faut éviter que deux processeurs mettent simultanément dans un même registre des résultats différents, ce qui donne d’autres variantes de machines PRAM selon le mode de gestion de la concurrence d’écriture (mode prioritaire, arbitraire, etc.). Même s’il existe une hiérarchie entre ces différentes variantes, de la (( moins puissante )) (EREW) à la (( plus puissante )) (CRCW prioritaire), ces modèles PRAM sont en fait équivalents, pour la classe des problèmes qui nous intéressent, dans le sens où ils se ramènent l’un à l’autre par des techniques de simulation (cf. [CT, 36, 57]). Nous utiliserons pour la description et l’analyse des algorithmes qui nous concernent, la variante PRAM-CREW dont la conception est très proche de la notion de circuit arithmétique ou de programme d’évaluation, puisqu’une PRAM-CREW peut être représentée par un circuit arithmétique dans lequel les nœuds d’entrée représentent les données du problème, et chacun des autres nœuds (internes) représente aussi bien un processeur actif (et l’opération qu’il exécute) que le contenu d’un registre de la mémoire globale correspondant au résultat de cette opération. Enfin la profondeur du circuit arithmétique ou du programme d’évaluation telle que nous l’avons définie précédemment (section 3.1) correspond au nombre d’étapes du calcul parallèle. 4.5.2 PRAM-complexité et Processeur-efficacité Plusieurs paramètres permettent de mesurer ce que nous appellerons la PRAM-complexité d’un algorithme donné. Ces paramètres sont : – le temps parallèle qui est égal au nombre d’étapes du calcul parallèle et qui correspond au temps d’exécution de l’algorithme parallèle ; c’est aussi ce que l’on appelle la complexité parallèle ou la profondeur de l’algorithme ; 10. EREW comme (( Exclusive Read, Exclusive Write )). 11. CREW comme (( Concurrent Read, Exclusive Write )) etc. 154 4. Notions de complexité – le nombre de processeurs c’est-à-dire le nombre maximum de processeurs simultanément actifs durant une étape quelconque du calcul, sachant qu’un processeur peut être sollicité durant une ou plusieurs étapes successives ; – le temps séquentiel de l’algorithme c’est-à-dire le nombre d’opérations arithmétiques qui interviennent dans le calcul ou, ce qui revient au même, le temps parallèle si on ne disposait que d’un seul processeur, ou encore la somme des nombres de processeurs actifs durant toutes les étapes du calcul parallèle. C’est ce que l’on appelle aussi la taille et parfois même la surface de calcul [CT] ou la complexité séquentielle de l’algorithme ; – le travail potentiel ou la surface totale de l’algorithme qui est le produit du nombre de processeurs utilisés par le nombre d’étapes du calcul parallèle, c’est-à-dire le temps séquentiel si tous les processeurs étaient actifs durant toutes les étapes du calcul. On peut résumer la parfaite analogie des paramètres jusqu’ici définis entre PRAM-CREW, circuit arithmétique et programme d’évaluation par le tableau suivant : PRAM-CREW Temps parallèle Temps séquentiel Nombre de processeurs Programme d’Evaluation Profondeur Longueur Largeur Circuit Arithmétique Profondeur Taille Largeur Tableau 4.5.2 Le nombre de processeurs dans une PRAM est l’équivalent de la largeur dans un programme d’évaluation, le temps séquentiel dans une PRAM est l’analogue de la longueur (ou la taille) d’un programme d’évaluation, et le temps parallèle correspond à la profondeur. L’efficacité d’un algorithme est alors définie comme le rapport entre le temps séquentiel et le travail potentiel de cet algorithme, ou encore le rapport entre surface de calcul et surface totale de l’algorithme considéré. Pour revenir à l’exemple de l’algorithme du pivot de Gauss (voir page 117), la PRAM-CREW qui réalise cet algorithme peut être représentée par le tableau suivant (rectangle de gauche) dont les lignes correspondent aux 7 étapes successives du calcul et les colonnes aux processeurs (ceux marqués d’une croix sont les processeurs actifs au cours d’une étape donnée) : 4.5. Machines parallèles à accès direct 155 4 processeurs z Etape 1 Etape 2 Etape 3 Etape 4 Etape 5 Etape 6 Etape 7 −·− −·− −→ −→ −→ −→ −→ −→ −→ × × × × × × × · · }| { × × × × × × × × · · · · 2 processeurs · · z }| { Etape Etape Etape Etape Etape Etape Etape Etape Etape 1 2 3 4 5 6 7 8 9 −→ −→ −→ −→ −→ −→ −→ −→ −→ × × × × × × × × × × × × × × × Le même algorithme peut être simulé par une PRAM à deux processeurs (rectangle de droite) au lieu de quatre, moyennant une augmentation du nombre d’étapes (c’est-à-dire un (( ralentissement )) des calculs) avec 9 étapes au lieu de 7. Pour chaque rectangle, la surface marquée représente la surface de calcul ou le temps séquentiel, la surface totale représentant le travail potentiel ; la longueur et la largeur du rectangle représentent respectivement le temps parallèle et le nombre de processeurs. L’efficacité de cet algorithme passe de 15/28 quand il est réalisé par la PRAM initiale à 15/18 avec la PRAM modifiée c’est-à-dire de 54 % à 83 % environ. Nous introduisons maintenant la notation classique suivante pour la PRAM-complexité qui sera utilisée dans la suite. Notation 4.5.1 On note PRAM (p(n), t(n)) la classe des problèmes de taille n résolus par un algorithme PRAM-CREW en O(t(n)) étapes, avec O(p(n)) processeurs. Tout algorithme P qui, exécuté sur une telle machine, permet de résoudre un problème de cette classe, est lui-même considéré, par abus de langage, comme appartenant à cette classe, et on dira que P est un algorithme PRAM (p(n), t(n)). La Processeur-efficacité d’un algorithme représenté par une PRAMCREW est une notion relative [50, 51, 62] estimée à partir du temps séquentiel d’un algorithme choisi comme algorithme de référence : il s’agit en ce qui nous concerne, pour l’algèbre linéaire, de l’algorithme de la multiplication des matrices carrées d’ordre n supposé être réalisé par 156 4. Notions de complexité une PRAM-CREW en log n étapes, avec M(n) processeurs. On peut évidemment supposer M(n) = O(n3 ) et M(n) = Ω(n2 ). Définition 4.5.2 Un algorithme P est dit processeur-efficace (par rapport à un algorithme de référence de temps séquentiel S(n)) s’il existe k, m ∈ N∗ tels que P soit dans PRAM (S(n) logm (n), logk (n)). Nous verrons plus loin des exemples d’algorithmes (( processeur-efficaces )) (comme celui de l’inversion des matrices fortement régulières, page 195) pour lesquels on prend comme algorithme de référence celui de la multiplication usuelle (resp. rapide) des matrices carrées n×n réalisée par un circuit arithmétique en SD(n3 , log n) (resp. SD(nα , log n) pour α < 3). 4.5.3 Le principe de Brent Le principe de Brent affirme qu’on peut répartir intelligemment le travail entre les différentes étapes d’un calcul parallèle, afin de diminuer de manière significative la proportion des processeurs inactifs (cf. [10] lemme 2.4). Proposition 4.5.3 Un algorithme parallèle dont le temps séquentiel sur une PRAM est égal à s(n) et dont le temps parallèle est égal à t(n) peut être simulé sur une PRAM utilisant p processeurs et bs(n)/pc + t(n) étapes de calcul sans changer le temps séquentiel. Preuve. Supposons, en effet, qu’un calcul parallèle peut être effectué en t(n) étapes parallèles à raison de mi opérations arithmétiques de base par étape. Si l’on implémente directement ce calcul sur une PRAM pour être exécuté en t(n) étapes, le nombre de processeurs utilisés sera alors égal à m = max {mi | 1 ≤ i ≤ t(n)}. En prenant p processeurs au lieu de m avec p < m (pour le cas p ≥ m, la proposition est triviale) on peut exécuter le même calcul en faisant effectuer les mi opérations de base de la i - ème étape par les p processeurs en dmi /pe étapes, et comme dmi /pe ≤ bmi /pc + 1 le nombre total d’étapes avec une PRAM à p processeurs n’excèdera pas    X t(n) X  t(n)  (bmi /pc + 1) ≤ t(n) +  mi /p  ≤ t(n) + bs(n)/pc . i=1 i=1 t u 4.5. Machines parallèles à accès direct 157 Ce principe est très utile lorsque le temps parallèle t(n) est négligeable (quand n → ∞) devant le temps séquentiel s(n) de l’algorithme puisqu’on peut pratiquement diviser le nombre de processeurs par t(n) en doublant simplement le temps d’exécution parallèle de l’algorithme : on prend p = ds(n)/t(n)e. Par exemple, un algorithme SD(nα , logk (n)) où α est un réel positif et k un entier naturel quelconque, donne par application de ce principe de Brent un algorithme PRAM (nω / logk (n), logk (n)). Cela permet dans la pratique, au prix d’un ralentissement relatif (multiplication du temps de calcul par une petite constante), d’améliorer l’efficacité d’un algorithme parallèle en diminuant le temps d’inactivité des processeurs par une réduction du rapport entre le travail potentiel (i.e. la surface totale) et le travail réel (i.e. la surface de calcul), et ceci par une réorganisation des calculs dans le sens d’une meilleure répartition des processeurs entre les étapes parallèles. Nous en déduisons la propriété suivante qui relie la complexité des circuits arithmétiques à celle des PRAM. Proposition 4.5.4 Un algorithme parallèle en SD(f (n), g(n)) est un algorithme PRAM (f (n)/g(n), g(n)). Inversement, tout algorithme dans PRAM (p(n), t(n)) est un algorithme en SD(p(n)t(n), t(n)). Remarque. Dire qu’un algorithme est processeur-efficace par rapport à un algorithme de référence de temps séquentiel S(n) revient à dire qu’il est SD(S(n) logm (n), logk (n)) pour un couple (m, k) ∈ N∗ × N∗ . 5. Diviser pour gagner Introduction Dans ce chapitre, nous présentons une approche bien connue sous le nom de (( divide and conquer )) que l’on peut traduire par (( diviser pour régner )) auquel nous préférons le concept (( diviser pour gagner )) parce que mieux adapté, nous semble-t-il, au calcul parallèle. Après en avoir donné le principe général nous l’utilisons pour étudier deux problèmes classiques de l’algorithmique parallèle que nous serons amenés à utiliser dans la suite : – le calcul du produit de n éléments d’un monoı̈de ; – le problème du calcul parallèle des préfixes ((( Parallel Prefix Algorithm ))) Pour ce dernier problème, nous développerons, en plus de l’algorithme classique, une méthode récursive due à Ladner & Fischer [64] pour obtenir une famille de circuits de taille linéaire et de profondeur logarithmique. C’est le meilleur résultat connu à l’heure actuelle. Nous appliquerons la stratégie (( diviser pour gagner )) en plusieurs autres occasions dans les chapitres suivants, notamment pour les multiplications rapides de matrices et de polynômes et pour l’algèbre linéaire rapide sur les corps. 5.1 Le principe général L’approche (( diviser pour gagner )) s’applique pour résoudre une famille de problèmes (Pn )n∈N . Elle consiste à (( diviser )) le problème numéro n en q (q ≥ 2) sous-problèmes du style Pm avec m < n, auxquels on peut appliquer, en parallèle et de manière récursive, le même algorithme que celui qui permet de résoudre le problème initial, pour récupérer ensuite le résultat final à partir des solutions des sous-problèmes. 160 5. Diviser pour gagner Le paramètre entier q représente le nombre des sous-problèmes qui seront traités en parallèle. Lorsqu’il ne dépend pas de n, il s’appelle le degré de parallélisme de l’algorithme ainsi obtenu. Une telle approche récursive de conception d’algorithmes permet souvent d’apporter une solution efficace à un problème dans lequel les q sous-problèmes Pm sont des copies réduites du problème initial, et avec m sensiblement égal (à dn/pe par exemple, où p est un entier donné ≥ 2). Cette méthode nous permet également d’analyser la complexité de l’algorithme qu’elle produit et de calculer des majorants asymptotiques de la taille et de la profondeur du circuit arithmétique correspondant, avec une estimation précise de la constante cachée du (( grand O )). En effet, supposons que le problème à traiter est le problème no n = m0 pν (m0 , p, ν ∈ N∗ ) et qu’il peut être scindé en q sous-problèmes Pm avec m = m0 pν−1 , suceptibles d’être traités en parallèle. Remarquons tout de suite que q est un entier ≥ 2 dépendant éventuellement de ν : c’est pourquoi on écrira, dans le cas général, q = q(ν). Le coût κ̂(ν) = (τ (ν), π(ν)) de cet algorithme où τ (ν) (resp. π(ν)) désigne la taille (resp. la profondeur) du circuit correspondant, se calcule par récurrence sur ν à l’aide des formules suivantes : ( τ (ν) = q(ν) τ (ν − 1) + τ 0 (ν) (5.1) π(ν) = π(ν − 1) + π 0 (ν) où τ 0 (ν) (resp. π 0 (ν)) représente la taille (resp. la profondeur) des circuits correspondant à la double opération de partitionnement du problème et de récupération de sa solution à partir des solutions partielles. L’absence du facteur q dans l’égalité exprimant la profondeur π est due au fait que les q sous-problèmes, de même taille, sont traités en parallèle avec des circuits de profondeur maximum π(ν − 1). Si l’on se donne τ (0) et π(0) le système (5.1) ci-dessus admet pour solution :  ν hY i X  ν   τ (ν) = q(1) q(2) · · · q(ν) τ (0) + q(j) τ 0 (i)   j=i+1 i=1 (5.2) ν X   0  π (i)   π(ν) = π(0) + i=1 Dans le cas où q = q(ν) est une constante, sachant que la profondeur, ne dépendant pas de q, reste la même, le système (5.2) devient (5.3) 5.1. Le principe général 161 ci-dessous. Nous rappelons précisément les hypothèses dans l’énoncé qui suit. Proposition 5.1.1 Soient m0 , p, q ∈ N∗ fixés et ν ∈ N∗ variable. Nous supposons que le problème à traiter est le problème Pn avec n = m0 pν et qu’il peut être scindé en q sous-problèmes de type Pm avec m = m0 pν−1 , suceptibles d’être traités en parallèle. Nous notons τ 0 (ν) (resp. π 0 (ν)) la taille (resp. la profondeur) des circuits correspondant à la double opération de partitionnement du problème et de récupération de sa solution à partir des solutions partielles. Enfin τ0 et π0 sont la taille et la profondeur d’un circuit qui traite le problème Pm0 . Alors la taille et profondeur d’un circuit produit en utilisant la méthode (( diviser pour gagner )) sont : ( P τ (ν) = q ν τ0 + νi=1 q ν−i τ 0 (i) P π(ν) = π0 + νi=1 π 0 (i) (5.3) En particulier si τ 0 (ν) = O(nr ) avec r 6= log q et π 0 (ν) = O(ν ` ) on obtient : ( τ (ν) = O(q ν ) = O(nsup(r,log q) ) (5.4) π(ν) = O(ν `+1 ) = O(log`+1 n) Donnons un aperçu rapide sur quelques cas particuliers significatifs que nous allons traiter dans la suite. Dans le calcul parallèle des préfixes section 5.3, nous avons de manière naturelle p = q = 2, r = 1 et ` = 0 ce qui conduit à une famille de circuits en SD(n log n, log n), et nous verrons qu’on peut encore très légèrement améliorer la borne sur la taille. Dans la multiplication des polynômes à la Karatsuba section 6.1, nous avons p = 2, q = 3, r = 1 et ` = 0 ce qui conduit à une famille de circuits en SD(nlog 3 , log n). Dans la multiplication rapide des matrices à la Strassen section 7.1, nous avons p = 2, q = 7, r = 2 et ` = 0 ce qui conduit à une famille de circuits en SD(nlog 7 , log n). Enfin pour l’inversion des matrices triangulaires section 7.2, nous avons p = 2, q = 2, r = α et ` = 1 ce qui conduit à une famille de circuits en SD(nα , log2 n). 162 5.2 5. Diviser pour gagner Circuit binaire équilibré L’approche (( diviser pour gagner )), appliquée à ce premier problème, nous donne la construction d’un type particulier de circuits arithmétiques de taille linéaire et de profondeur dlog ne que l’on appelle les circuits binaires équilibrés ((( Balanced Binary Trees ))). Un circuit binaire équilibré est un circuit arithmétique prenant en entrée une liste (x1 , x2 , . . . , xn−1 , xn ) de n éléments d’un monoı̈de M (loi associative notée ∗ avec élément neutre noté 1) et donnant en sortie le produit Π = x1 ∗ x2 ∗ · · · ∗ xn−1 ∗ xn . On peut supposer n = 2ν où ν ∈ N∗ quitte à compléter la liste donnée par 2dlog ne − n éléments égaux à 1, ce qui ne change pas le résultat. Le circuit est défini de manière récursive en divisant le problème en deux sous-problèmes de taille 2ν−1 , qui correspondent à deux (( sous-circuits )) acceptant chacun en entrée une liste de taille moitié. Ces deux sous-circuits calculent respectivement et en parallèle les deux produits partiels Π1 = x1 ∗· · ·∗x2ν−1 et Π2 = x2ν−1 +1 ∗· · ·∗x2ν . On récupère ensuite le produit Π en multipliant ces deux produits partiels. Ainsi un circuit binaire équilibré pour une entrée de taille 2ν est défini par récurrence sur ν : pour ν = 0 c’est le circuit trivial C0 de taille profondeur nulles. Pour ν ≥ 1, le circuit Cν prend en entrée une liste de longueur 2ν , fait agir deux copies du circuit Cν−1 pour calculer Π1 et Π2 qu’il utilise pour récupérer le résultat final Π = Π1 ∗ Π2 (comme l’indique la figure 5.1 page ci-contre). Si l’on note τ (ν) et π(ν) la taille et la profondeur du circuit Cν , on obtient les relations : ( τ (ν) = 2τ (ν − 1) + 1 avec τ (0) = 0 π(ν) = π(ν − 1) + 1 qui admet la solution exacte : ( τ (ν) avec π(0) = 0 = 2ν − 1 π (ν) = ν . (5.5) Proposition 5.2.1 Un circuit binaire équilibré qui prend en entrée une liste une liste (x1 , x2 , . . . , xn−1 , xn ) dans un monoı̈de M et donne en sortie le produit Π = x1 ∗ x2 ∗ · · · ∗ xn−1 ∗ xn est un circuit arithmétique de profondeur dlog ne. Il est de taille n − 1 si n est une puissance de 5.3. Calcul parallèle des préfixes 163 2 ν e n tré e s 2 ν − 1 e n tré e s 2 ν − 1 e n tré e s .... .... ν−1 ν−1 π1 π2 π Figure 5.1 – Construction récursive du circuit binaire équilibré Cν (à partir du circuit binaire équilibré Cν−1 ) 2, et cette taille est en tous cas majorée par 2n − 3 lorsque n n’est pas une puissance de 2. Notons qu’on peut trouver une majoration légèrement meilleure de la taille pour n > 3. 5.3 Calcul parallèle des préfixes Étant donnée une liste de n éléments x1 , x2 , . . . , xn (ou n -uplet) d’un monoı̈de (M, ∗, 1) dont la loi (en général non commutative) est notée multiplicativement et dont l’élément neutre est noté 1, le problème du calcul des préfixes consiste à calculer les produits partiels Yk Πk = xi pour (1 ≤ k ≤ n). i=1 La solution naı̈ve de ce problème donne un circuit de taille n − 1 (c’est la taille minimum) et de profondeur n − 1. Première méthode de parallélisation Il est facile de voir que ce calcul peut être parallélisé pour obtenir un circuit de profondeur dlog ne. 164 5. Diviser pour gagner On peut toujours supposer n = 2ν où ν = dlog ne ∈ N∗ , quitte à compléter la liste donnée par 2dlog ne − n copies de l’élément neutre 1. Ce problème peut se décomposer en deux sous-problèmes de taille n/2 = 2ν−1 qui seront traités en parallèle : • le calcul des préfixes pour la liste x1 , x2 , . . . , x2ν−1 ; • le calcul des préfixes pour la liste y1 , y2 , . . . , y2ν−1 où yi = x2ν−1 +i pour 1 ≤ i ≤ 2ν−1 . La solution du problème principal est ensuite obtenue par multiplication du produit Π2ν−1 , faisant partie de la solution du premier sous-problème, par les 2ν−1 produits partiels des yi qui constituent la solution du second sous-problème. Cette dernière étape de récupération augmente par conséquent de 2ν−1 multiplications la taille du circuit et de 1 sa profondeur. Pour le cas n = 7 par exemple (on prend n = 8 pour avoir une puissance de 2 et on fait x8 = 1), on obtient le circuit 5.1 qui montre le déroulement de cette procédure pour le calcul des sept (ou huit) produits Π1 = x1 , Π2 = x1 ∗x2 , Π3 = x1 ∗x2 ∗x3 , . . . , Π7 = x1 ∗x2 ∗· · ·∗x7 (Π8 = Π7 puisque x8 = 1). Appliquées à notre problème, les relations (5.3) x1 x2 x3 x4 x5 x6 (x 8 = 1 ) x7 E ta p e 1 E ta p e 2 E ta p e 3 1 2 3 Circuit 5.1: 4 5 6 7 ( 8 = 7) Calcul Parallèle des Préfixes pour n = 7 donnent la taille et la profondeur du circuit arithmétique correspondant au calcul parallèle des préfixes pour une liste donnée de taille 2ν . Il suffit en effet de faire p = q = 2, τ 0 (i) = 2i−1 , π 0 (i) = 1 (pour 5.3. Calcul parallèle des préfixes 165 i ≥ 1) et τ (0) = π(0) = 0 pour obtenir : τ (ν) = ν X i=1 ν 2 ν−i i−1 2 ν−1 =ν2 X n = log n, et π(ν) = 1 = ν = log n. 2 i=1 Ainsi le problème du calcul des préfixes pour une liste de n éléments se parallélise bien, et il admet une solution en SD(n log n, log n) ou encore, en utilisant le principe de Brent (proposition 4.5.3), une solution qui est PRAM (n, log n). Ladner & Fischer [64] obtiennent un meilleur résultat en donnant une construction récursive d’un circuit en SD(n, log n). C’est ce que nous allons développer au paragraphe suivant. Amélioration du calcul des préfixes (Ladner & Fischer) Étant donnés un monoı̈de (M, ∗, 1), un entier n ≥ 2, et x1 , . . . , xn dans M, nous allons construire, à l’instar de Ladner & Fischer [64] deux familles de circuits (Pk (n)) n∈N∗ de tailles Sk (n) (k ∈ {0, 1}) majorées respectivement par 4n et 3n et de profondeurs respectives D0 (n) = dlog ne et D1 (n) = dlog ne + 1 qui calculent les préfixes Π1 , Π2 , . . . , Πn du n-uplet (x1 , x2 , . . . , xn ). Cette construction se fait conjointement et de manière récursive à partir du circuit trivial P0 (1) = P1 (1) réduit à une seule porte (la porte d’entrée). La figure 5.2 page suivante montre le déroulement de cette construction récursive conjointe des deux familles (P0 (n)) n∈N∗ et (P1 (n)) n∈N∗ . Construction de la famille (P0 (n)) n∈N∗ On définit récursivement le circuit P0 (n) à partir des circuits P1 (b n2 c) et P0 (d n2 e) appliqués respectivement aux entrées (x1 , . . . , xb n2 c ) et n (xb 2 c+1 , . . . , xn ) qui forment une partition de la liste donnée (x1 , . . . , xn ). Comme P1 (b n2 c) calcule Π1 , Π2 , . . . , Πb n2 c , il suffit d’effectuer en parallèle et en une seule étape les d n2 e multiplications de Πb n2 c par les d n2 e sorties de P0 (d n2 e) pour avoir les préfixes Πb n2 c+1 , Πb n2 c+2 , . . . , Πn et par conséquent tous les préfixes Π1 , Π2 , . . . , Πn de la liste (x1 , . . . , xn ). Partant du circuit trivial P0 (1) = P1 (1), la figure 5.3 page 167 illustre cette construction. La construction du circuit (P1 (n)), quant à elle, se fait à partir du circuit P0 (b n2 c), elle est illustrée par la figure 5.4 page 168. 166 5. Diviser pour gagner P0 (1) P1 (1) 2 ≤ m0 < 4 P0 (m0) P1 (m0) 4 ≤ m1 < 8 P0 (m0) P1 (m1) ... ... P0 (mp-1) P1 (mp-1) P0 (mp) P1 (mp) ... ... 2p-1 ≤ mp-1 < 2p 2p ≤ mp < 2p+1 Figure 5.2 – Schéma de la construction récursive des circuits (Pk (n)) n∈N (k ∈ {0, 1}, (mp = 2 mp−1 pour 1 ≤ p ≤ dlog ne) Construction de la famille (P1 (n)) n∈N∗ • On commence par calculer en parallèle (c’est-à-dire en une seule étape) les produits x1 ∗ x2 , x3 ∗ x4 , · · · , x2p−1 ∗ x2p (où p = b n2 c) d’un élément de rang impair par l’élément suivant (de rang pair) dans la liste donnée (x1 , . . . , , xn ) (n = 2p si n est pair et n = 2p + 1 si n est impair). • À ce p-uplet on applique le circuit P0 (b n2 c) = P0 (p) pour obtenir en sortie les p préfixes de longueur paire : Π2 , Π4 , . . . , Π2p . • On multiplie enfin, et en parallèle, les préfixes Π2 , Π4 , . . . , Π2p respectivement par les entrées (x3 , x5 , . . . , x2p−1 (et éventuellement x2p+1 si n est impair) pour obtenir, en plus de Π1 (Π1 = x1 est déjà donné), les autres préfixes de longueur impaire : Π3 , Π5 , . . . , Π2p−1 (et éventu- 5.3. Calcul parallèle des préfixes 167 n entrées n/2 entrées n/2 entrées .... .... P1 ( n/2 ) π1 π2 ... P0 ( n/2 ) π n/2 ... πn Figure 5.3 – Construction récursive des circuits P0 (n). ellement Π2p+1 si n est impair). On obtient ainsi le circuit arithmétique parallèle P1 (n) à partir du circuit P0 (b n2 c) en ajoutant au maximum deux étapes (à l’entrée et à la sortie) comportant au total n − 1 opérations arithmétiques (2p − 1 si n est pair et 2p si n est impair). Les circuits 5.2 page 169 sont des exemples de circuits P0 (n) et P1 (n) pour quelques valeurs de n. Analyse de la complexité des circuits Si l’on note Sk (n) (resp. Dk (n)) la taille (resp. la profondeur) du circuit Pk (n) pour n ≥ 2 et k ∈ {0, 1}, cette construction récursive donne les relations suivantes : – Pour la taille : ( S1 (n) = S0 (b n2 c) + n − 1 (5.6) S0 (n) = S1 (b n2 c) + S0 (d n2 e) + d n2 e – Pour la profondeur : ( D1 (n) ≤ D0 (b n2 c) + 2 D0 (n) = max {D0 (b 12 b n2 cc) + 1 , D0 (d n2 e)} + 1 (5.7) 168 5. Diviser pour gagner x1 x2 x3 ∗ n/2 entrées x4 x5 ... ... x2p-1 x2p x2p+1 Première Etape ∗ ∗ ... Pk-1 ( n/2 ) π2p π2p-2 ... ... n/2 sorties π4 π2 π1 ∗ ∗ ∗ π3 π5 ... π2p-1 ∗ π2p+1 Dernière Etape Figure 5.4 – Construction du circuit P1 (n) à partir du circuit P0 (b n2 c) (p = b n2 c et les 2 lignes en pointillé sont absentes si n est pair) avec Sk (1) = Dk (1) = 0 pour tout k ∈ {0, 1}. Il faut remarquer que l’inégalité D1 (n) ≤ D0 (b n2 c) + 2 dans (5.7) peut être stricte (voir par exemple le circuit P1 (6) dans les circuits 5.2 page ci-contre pour s’en convaincre). La deuxième équation dans (5.7) est justifiée par le fait que, dans le circuit P0 (n), le nœud correspondant au produit Πb n2 c – dont on a besoin pour calculer en une étape supplémentaire les autres préfixes – se trouve exactement à la profondeur D0 (b 12 b n2 cc) + 1 dans le sous-circuit P1 (b n2 c) de P0 (n) qui calcule ce produit. Il est facile de voir, à partir des équations (5.7), par une récurrence immédiate sur n, que les profondeurs Dk (n) des circuits Pk (n) pour k ∈ {0, 1} vérifient : D0 (n) = dlog ne et D1 (n) ≤ dlog ne + 1 . Pour calculer les tailles des circuits à partir des équations (5.6), nous allons d’abord considérer le cas où n est une puissance de 2 en faisant n = 2ν où ν = dlog ne. Posant τk (ν) = Sk (2ν ) avec τk (0) = 0 pour k ∈ {0, 1} les équations (5.6) deviennent : 5.3. Calcul parallèle des préfixes x1 x2 x1 x2 x3 169 x1 x2 x3 x4 x5 x x x x1 x2 x3 x4 x5 x6 x6 x x x x x x Pk (2) 1 (k = 0, 1) 2 x x 3 x x x Pk (3) 1 (k = 0, 1) 2 3 4 5 x 6 x x P1 (6) 1 2 3 4 5 6 P0 (6) x1 x2 x3 x4 x5 x6 x7 x8 x1 x2 x3 x4 x5 x6 x7 x x1 x2 x3 x4 x5 x6 x7 x x x x x x x x x x x x x x x x x x x x x x x x x x x 1 2 3 4 5 P0 (7) Circuit 5.2: ( 6 7 1 2 3 4 P1 (7) 5 6 7 1 2 3 4 5 6 7 8 P1 (8) Circuits P0 (n) , P1 (n) pour quelques valeurs de n. τ0 (ν) = τ0 (ν − 1) + τ0 (ν − 2) + 2ν − 1 τ1 (ν) = τ1 (ν − 1) + τ1 (ν − 2) + 3.2ν−2 . (5.8) Posant u0 (ν) = 4.2ν + 1 − τ0 (ν) et u1 (ν) = 3.2ν − τ1 (ν), les relations (5.8) permettent de vérifier que uk (ν + 2) = uk (ν + 1) + uk (ν) (ν ∈ N, k ∈ {0, 1}). Comme u0 (0) = 5 , u0 (1) = 8 , u1 (0) = 3 et u1 (1) = 5 , on en déduit que : u0 (ν) = F (ν + 5) et u1 (ν) = F (ν + 4) où (F (ν))ν∈N est la suite de Fibonacci 1 . Par conséquent : 1. La suite de Fibonacci est définie par F (0) = 0, F (1) = 1 et la relation F (ν + 2) = F (ν + 1) + F (ν) pour tout ν ∈ N. 170 5. Diviser pour gagner ( τ0 (ν) = 4.2ν + 1 − F (ν + 5) τ1 (ν) = 3.2ν − F (ν + 4) . (5.9) qui donne, lorsque n est une puissance de 2, les majorations souhaitées. Dans le cas contraire, il est facile – en utilisant directement les relations (5.7) – d’obtenir, par récurrence sur n, les majorations suivantes vraies pour tout n ≥ 2 : S0 (n) ≤ 4 n − 7 et S1 (n) ≤ 3 n − 3 . Ce qui donne le résultat suivant de Ladner & Fischer ([64]) qui montre que le calcul des préfixes est PRAM (n/ log n, log n) : Théorème 5.1 (Ladner & Fischer) Le calcul des préfixes d’une liste de n éléments dans un monoı̈de (non nécessairement commutatif ) se fait par un circuit arithmétique parallèle de profondeur dlog ne et de taille inférieure à 4n et aussi par un circuit arithmétique parallèle de profondeur 1 + dlog ne et de taille inférieure à 3n. 6. Multiplication rapide des polynômes Introduction Soit A un anneau commutatif unitaire et A[X] l’anneau des polynômes à une indéterminée sur A. P P i Le produit de deux polynômes A = ni=0 ai X i et B = m i=0 bi X est défini par C = AB = m+n X k=0 ck X k avec ck = k X ai bk−i pour 0 ≤ k ≤ m + n . i=0 L’algorithme usuel pour le calcul des coefficients du polynôme C correspond à un circuit arithmétique de profondeur O(log m) (si l’on suppose m ≤ n) et de taille O(mn) avec précisément (m + 1) (n + 1) multiplications et mn additions dans l’anneau de base A. Pour m = n, cela donne un algorithme en SD(n2 , log n). Dans les trois premières sections nous exposons deux façons d’améliorer la multiplication des polynômes. Dans la section 6.1 nous expliquons la méthode de Karatsuba, facile à implémenter pour n’importe quel anneau commutatif, avec un résultat en SD(nlog 3 , log n). Un bien meilleur résultat est obtenu en SD(n log n, log n) grâce à la transformation de Fourier discrète ([AHU, Knu]) pour un anneau auquel s’applique une telle transformation. Ceci fait l’objet des sections 6.2 et 6.3.1. Dans la section 6.3.2 nous exposons une amélioration due à Cantor et Kaltofen [13] qui ont étendu le résultat à tout anneau commutatif unitaire en exhibant un algorithme en SD(n log n log log n, log n) (avec 172 6. Multiplication rapide des polynômes le même nombre de multiplications dans l’anneau de base, le facteur log log n étant dû à l’augmentation du nombre d’additions). Pour réaliser ce travail il a fallu l’adjonction de racines principales de l’unité à l’anneau considéré. On peut comparer la borne obtenue avec la meilleure borne inférieure actuellement connue, qui est O(n). Dans la section 6.4 nous donnons le lien entre la multiplication des polynômes et celle des matrices de Toeplitz triangulaires inférieures. Nous en déduisons un résultat de complexité intéressant concernant le produit d’une matrice de Toeplitz arbitraire par une matrice arbitraire. 6.1 Méthode de Karatsuba Considérons deux polynômes arbitraires A et B et leur produit C. Si les polynômes A et B sont de degré < d (déterminés chacun par d coefficients), leur produit C = AB peut être calculé en appliquant directement la formule qui le définit. Il y a alors d2 multiplications et (d − 1)2 additions. Les d2 multiplications peuvent être calculées en une seule étape de calcul parallèle et les 2d−1 coefficients de C sont ensuite calculés en dlog de étapes parallèles (le coefficient réclamant l’addition la plus longue est celui de degré d − 1). Une première façon d’améliorer cette multiplication est d’adopter une démarche récursive basée sur le fait que le produit de deux polynômes de degré 1 peut s’effectuer avec seulement 3 multiplications au lieu de 4 (le nombre d’additions/soustractions passant de 1 à 4). En effet, on peut calculer a + bX + cX 2 = (a1 + a2 X) (b1 + b2 X) en posant : a = a1 b1 , c = a2 b2 , b = (a1 + a2 ) (b1 + b2 ) − (a + c), (6.1) ce qui correspond à un circuit arithmétique de profondeur totale 3, de largeur 4 et de profondeur multiplicative 1. Considérons maintenant deux polynômes arbitraires A et B et leur produit C . Ces polynômes s’écrivent de manière unique, sous la forme :   A = A1 (X 2 ) + X A2 (X 2 ) B = B1 (X 2 ) + X B2 (X 2 )  C = C1 (X 2 ) + X C2 (X 2 ) avec C1 = A1 B1 + X A2 B2 et C2 = A1 B2 + A2 B1 . Si A1 , B1 , A2 , B2 sont de degrés ≤ k − 1 (avec k coefficients) alors A et B sont de degré ≤ 2k − 1 (avec 2k coefficients). 6.1. Méthode de Karatsuba 173 Supposons qu’un programme d’évaluation Kara(k) calcule les coefficients du produit de deux polynômes arbitraires de degré ≤ k − 1, avec une profondeur multiplicative égale à µ(k) , une profondeur totale égale à π (k) , une largeur égale à λ(k) , un nombre de multiplications égal à m(k) , un nombre d’additions/soustractions égal à a(k) , et donc avec pour nombre total d’opérations arithmétiques s(k) = a(k) + m(k) . L’utilisation des équations (6.1) donne un circuit arithmétique Kara(2k) que nous avons décrit schématiquement dans le programme d’évaluation 6.1. Programme d’évaluation 6.1 Kara(2k) Entrée : Les 4k coefficients dans A (un anneau commutatif arbitraire) de deux polynômes de degré < 2k : A(X) = A1 (X 2 ) + X A2 (X 2 ) et B(X) = B1 (X 2 ) + X B2 (X 2 ). Sortie : Les coefficients du produit des deux polynômes : C(X) = C1 (X 2 )+ X C2 (X 2 ). Début profondeur 1 : D1 := A1 + A2 ; D2 := B1 + B2 profondeur π (k) : D3 := Kara(k) (A1 , B1 ) ; D4 := Kara(k) (A2 , B2 ) profondeur π (k) + 1 : D5 := Kara(k) (D1 , D2 ) ; D6 := D3 + D4 ; C1 := D3 + XD4 profondeur π (k) + 2 : C2 := D5 − D6 Fin. Notez que la ligne écrite avec la profondeur π (k) représente la dernière ligne des deux programmes d’évaluation Kara(k) (A1 , B1 ) et Kara(k) (A2 , B2 ), qui ont démarré en parallèle avec les deux affectations indiquées sur la ligne de profondeur 1. Sur la ligne écrite avec la profondeur π (k) +1, la première affectation correspond à la dernière ligne du programme d’évaluation Kara(k) (D1 , D2 ) qui a commencé à la profondeur 2, tandis que les deux autres affectations sont effectuées à la profondeur π (k) + 1. On constate donc que lorsqu’on passe de Kara(k) à Kara(2k) selon la méthode décrite dans le programme d’évaluation 6.1 : – la profondeur passe de π (k) à π (2k) = π (k) + 2, – la profondeur multiplicative n’a pas changé (µ(2k) = µ(k) ), 174 6. Multiplication rapide des polynômes – la largeur passe de λ(k) à λ(2k) = sup(3 λ(k) , λ(k) + 4k − 2), – le nombre de multiplications est maintenant m(2k) = 3m(k) , – le nombre d’additions/soustractions ( 1 ) est a(2k) = k + k + 3a(k) + (2k − 1) + (2k − 2) + (2k − 1) = 3a(k) + 8k − 4, – et le nombre total d’opérations arithmétiques passe de s(k) à s(2k) = 3s(k) + 8k − 4. En comparaison, pour la multiplication usuelle des polynômes, le nombre de multiplications passe de m̃(k) = k 2 à m̃(2k) = 4k 2 = 4m̃(k) , le nombre d’additions/soustractions de ã(k) = (k−1)2 à ã(2k) = (2k−1)2 = 4ã(k) + 4k − 3 et le nombre total d’opérations arithmétiques de s̃(k) à s̃(2k) = 4s̃(k) + 4k − 3. Si on veut minimiser le nombre de multiplications on initialisera la processus récursif avec Kara(1) (le produit de deux constantes) et on mettra en place les circuits arithmétiques successifs Kara(2) , Kara(4) , ν Kara(8) , . . ., Kara(2 ) selon la procédure décrite ci-dessus. Le circuit ν Kara(2 ) = Karaν est ensuite utilisé pour le produit de deux polynômes de degrés < n = 2ν et ≥ 2ν−1 . Pour deux polynômes de degré exactement n−1 on aura ainsi remplacé le circuit arithmétique usuel qui utilise 4ν = n2 multiplications par un circuit arithmétique Kara(n) = Karaν qui utilise 3ν = nlog 3 ' n1.585 multiplications 2 . Le gain concernant le nombre total d’opérations arithmétiques est du même style. En notant sν pour s(n) , on passe en effet de sν à sν+1 = 3 sν + 8.2ν − 4. Les premières valeurs de sν sont s0 = 1, s1 = 7, s2 = 33 et la relation de récurrence se résoud avec l’aide de Maple en : sν = 7 · 3ν − 8 · 2ν + 2. En fait sν devient meilleur que 4n + (2n − 1)2 à partir de ν = 4 (pour des polynômes de degré 15). Enfin, concernant la largeur λν du circuit arithmétique Karaν , la résolution de la récurrence donne λν = 2 · 3ν pour ν ≥ 2. Nous pouvons conclure avec la proposition suivante. Proposition 6.1.1 La multiplication de deux polynômes de degré ≤ n par la méthode de Karatsuba se fait en SD(nlog 3 , log n). Plus précisément, le produit de deux polynômes de degrés < 2ν = n peut être réalisé 1. On ne compte pas les opérations de substitution de X 2 à X ou vice-versa, ni les multiplications par X ou par X 2 , qui reviennent en fait à des décalages de coefficients. 2. log 3 = 1.58496250072115618145373894394. 6.2. Transformation de Fourier discrète usuelle 175 par un circuit arithmétique de profondeur multiplicative 1, de profondeur totale 1+2 ν, de largeur 2·3ν = 2 nlog 3 , avec 3ν = nlog 3 multiplications et 6 · 3ν − 8 · 2ν + 2 = 6nlog 3 − 8n + 2 additions/soustractions. Notons que pour deux polynômes dont les degrés sont compris entre et 2ν , on obtient seulement les majorations suivantes en appelant n le plus grand degré : 3 + 2 log n pour la profondeur, 6 nlog 3 pour la largeur et 21 nlog 3 − 8 n + 2 pour la taille du circuit. Remarquons qu’on aurait pu envisager une autre partition de coefficients des polynômes A et B pour une application récursive, à savoir 2ν−1 A = A1 + X k A2 et B = B1 + X k B2 . avec Ai et Bi de degrés ≤ k − 1, A et B de degrés ≤ 2k − 1. Alors C = A B = A1 B1 + X k (A1 B2 + A2 B1 ) + X 2k A2 B2 . Une procédure récursive basée sur cette partition produirait des circuits arithmétiques avec une estimation analogue à la précédente pour ce qui concerne la taille mais une profondeur de 1 + 3 log n au lieu de 1 + 2 log n (pour le produit de deux polynômes de degré n − 1 lorsque n = 2ν ). 6.2 Transformation de Fourier discrète usuelle Un bien meilleur résultat, que nous exposons dans cette section et la suivante, est obtenu en SD(n log n, log n) grâce à la transformation de Fourier discrète pour un anneau auquel s’applique une telle transformation. La transformation de Fourier discrète, que nous désignerons ici par le sigle TFD, est définie sur un anneau commutatif unitaire A, pour un entier donné n ≥ 2, à condition de disposer dans A d’une racine n - ème principale de 1, c’est-à-dire d’un élément ξ ∈ A vérifiant : ξ 6= 1 , ξ n = 1 , et n−1 X ξ ij = 0 pour i = 1, . . . , n − 1 . j=0 Dans un anneau intègre, toute racine primitive 3 n - ème de 1 est principale, mais ceci peut-être mis en défaut dans un anneau contenant des diviseurs de zéro. Dans un anneau intègre, s’il y a une racine primitive n - ème de 1, il y en a ϕ(n) où ϕ désigne l’indicatrice d’Euler. Dans C, les racines n - èmes principales de 1 sont les nombres complexes e2ikπ/n tels que 1 ≤ k < n et k premier avec n. 3. C’est un ξ tel que ξ n = 1 mais ξ m 6= 1 si 1 ≤ m < n. 176 6. Multiplication rapide des polynômes Il est clair que si ξ est une racine n - ème principale de 1, alors il en est de même de ξ −1 . Définition 6.2.1 La transformation de Fourier discrète d’ordre n sur A, associée à la racine principale ξ, est l’application linéaire TFDn,ξ : An −→ An définie, pour tout (a0 , a1 , . . . , an−1 ) ∈ An par : TFDn,ξ (a0 , a1 , . . . , an−1 ) = (A(1), A(ξ), . . . , A(ξ n−1 )) où A est le polynôme A(X) = a0 + a1 X + . . . + an−1 X n−1 . Cette application peut aussi être vue comme un homomorphisme de A-algèbres TFDn,ξ : A[X] /hX n − 1i −→ An qui à tout polynôme A de degré ≤ n − 1 associe le vecteur formé des valeurs de A aux points 1, ξ, . . . , ξ n−1 . En effet, en notant la loi produit (coordonnée par coordonnée) de l’algèbre An , il est immédiat de vérifier que : TFDn,ξ (AB) = TFDn,ξ (A) TFDn,ξ (B) . En tant qu’application linéaire, TFDn,ξ est représentée dans les bases canoniques par la matrice de Vandermonde particulière :   1 1 1 ... 1 ξ ξ2 . . . ξ n−1  1   2 4 1 ξ ξ . . . ξ 2(n−1)  . Wn,ξ =  .  .. .. .. ..  ..  . . . . 2 1 ξ n−1 ξ 2(n−1) . . . ξ (n−1) Si, de plus, n 1A est inversible dans l’anneau A (on désignera par n−1 son inverse), alors la matrice Wn,ξ est inversible dans An×n et on vérifie qu’elle admet pour inverse la matrice   1 1 1 ... 1 −1 −2 1−n ξ ... ξ 1 ξ    −2 −4 2(1−n) −1 −1  1  = n−1 Wn,ξ−1 . ξ ξ ... ξ Wn,ξ = n   . . . . ..  ..  .. .. .. . 2 1 ξ 1−n ξ 2(1−n) . . . ξ −(n−1) 6.3. Transformation de Fourier discrète rapide 177 Dans ce cas, modulo l’identification précédente, l’application TFDn,ξ est un isomorphisme d’algèbres TFDn,ξ : A[X] /hX n − 1i −→ An . Nous énonçons ce résultat. Proposition 6.2.2 Supposons que l’anneau commutatif A possède une racine n - ème principale de 1, notée ξ, et que n 1A est inversible dans A. Alors la transformation de Fourier discrète TFDn,ξ : An −→ An −1 est un isomorphisme de A – modules, et TFD−1 n,ξ = (n1A ) TFDn,ξ −1 . n Par ailleurs, si on identifie le A – module A source de l’application linéaire TFDn,ξ avec A[X] /hX n − 1i (en choisissant le représentant de degré ≤ n et en l’exprimant sur la base des monômes) alors TFDn,ξ définit un isomorphisme de l’algèbre A[X] /hX n − 1i (munie de la multiplication des polynômes) vers l’algèbre An (munie de la multiplication coordonnée par coordonnée). En bref, pour deux polynômes de degré < n, on a : −1 AB ≡ T F Dn,ξ (T F Dn,ξ (A) T F Dn,ξ (B)) modulo (X n − 1). C’est la clé de l’algorithme de multiplication rapide, que nous explicitons dans la section suivante. 6.3 6.3.1 Transformation de Fourier discrète rapide Cas favorable Le résultat énoncé dans la proposition P2n−16.2.2 kprécédente peut être de deux polynômes appliqué au calcul du produit AB = k=0 ck X Pn−1 Pn−1 i i A = i=0 ai X et B = i=0 bi X à une indéterminée sur A, à condition que l’anneau A s’y prête. Nous supposons qu’il possède une racine 2n - ème principale ω de 1, et que (2n) 1A est inversible dans A, alors la proposition 6.2.2 pour la TFD d’ordre 2n sur l’anneau A se traduit par : −1 AB = T F D2n,ω (T F D2n,ω (A) T F D2n,ω (B)) . car le calcul de AB modulo X 2n − 1 donne exactement AB. Le calcul du produit AB de deux polynômes de degrés inférieur ou égal à n par la TFD est résumé dans l’algorithme 6.2 page suivante. Le lemme suivant nous permet tout d’abord de montrer comment une TFD d’ordre 2ν peut être effectuée rapidement au moyen d’une stratégie (( diviser pour gagner )). 178 6. Multiplication rapide des polynômes Algorithme 6.2 Multiplication des polynômes via la Transformation de Fourier Discrète. Entrée : Deux polynômes A et B de degrés < n sur un anneau A convenable (voir proposition 6.2.2). Sortie : Le produit A B. Début Étape 1 : Deux TFD d’ordre 2n appliquées à A et B. Étape 2 : Évaluation de 2n multiplications dans A pour obtenir la transformée de Fourier discrète de A B. Étape 3 : Calcul de l’inverse d’une TFD d’ordre 2n pour obtenir A B. Fin. Lemme 6.3.1 Soit n un entier ≥ 2 et ν = dlog ne. La transformation de Fourier discrète d’ordre n et son inverse, dans un anneau possédant une racine 2ν - ème principale de 1 et dans lequel 2A est inversible, se font en SD(n log n, log n). Plus précisément, la taille S(n) et la profondeur D(n) du circuit arithmétique correspondant sont respectivement majorées par n (3 log n+3) et 2 log n+2 pour la transformation directe et par n (3 log n + 4) et 2 log n + 3 pour la transformation inverse. Pn−1 ai X i un polynôme de degré ≤ n − 1 à coefPreuve. Soit A = i=0 ficients dans A, ν = dlog ne (de sorte que 2ν−1 < n ≤ 2ν ) et ω une racine 2ν - ème principale de 1. Il s’agit de calculer les valeurs de A aux ν points 1, ω, ω 2 , . . . , ω 2 −1 . Le polynôme A peut être mis sous la forme A = A1 (X 2 ) + XA2 (X 2 ) avec deg A1 , deg A2 ≤ 2ν−1 − 1. Remarquons que ξ = ω 2 est une racine 2ν−1 - ème principale de 1, ν−1 que ω 2 = −1 et que A (ω i ) = A1 (ξ i )+ω i A2 (ξ i ) pour 0 ≤ i ≤ 2ν−1 − ν−1 ν−1 1. Comme ω 2 +i = −ω i , on a aussi A (ω 2 +i ) = A1 (ξ i ) − ω i A2 (ξ i ) pour 0 ≤ i ≤ 2ν−1 − 1. Ce qui donne toutes les valeurs recherchées de A et ramène récursivement l’évaluation de A en les 2ν points ω i (0 ≤ i ≤ 2ν − 1), c’est-à-dire la TFD d’ordre 2ν , au calcul suivant : • deux TFD d’ordre 2ν−1 appliquées à A1 et A2 et effectuées en parallèle ; 6.3. Transformation de Fourier discrète rapide 179 • 2ν−1 multiplications (par les ± ω i avec 0 ≤ i ≤ 2ν−1 − 1) effectuées en parallèle et en une seule étape de calcul, suivies de 2ν additions dans l’anneau de base A effectuées également en une seule étape parallèle. Si S et D désignent respectivement la taille et la profondeur de l’algorithme récursif ainsi défini, on obtient les relations suivantes valables pour tout entier ν ≥ 1 :  S(2ν ) ≤ 2 S(2ν−1 ) + 3 2ν−1 D(2ν ) ≤ D(2ν−1 ) + 2 . Ce qui donne, par sommation, sachant que S(1) = D(1) = 0 :  S(2ν ) ≤ 3 ν 2ν−1 D(2ν ) ≤ 2 ν . Comme 2ν−1 < n ≤ 2ν et par conséquent ν − 1 < log n, on en déduit que S(n) < 3 n (1 + log n) et que D(n) < 2 (1 + log n). −1 = Pour la TFD inverse d’ordre n, nous avons vu que T F Dn,ω (n 1A )−1 T F Dn,ω−1 . Cela signifie que l’on peut récupérer les coefficients ~ = (A(1), du polynôme A de degré ≤ n − 1, à partir du vecteur A n−1 A(ω), . . . , A(ω )) formé des valeurs de ce polynôme aux points ω i , ~ la TFD d’ordre n associée à la racine prinen effectuant sur le vecteur A −1 n−1 cipale ω = ω et en multipliant ensuite ce vecteur par (n 1A )−1 . Par conséquent, la TFD inverse d’ordre n peut se faire par un circuit arithmétique de taille S(n) + n et de profondeur D(n) + 1. t u Ce résultat et l’algorithme 6.2 qui a introduit le lemme 6.3.1 nous permettent d’estimer avec précision la complexité de l’algorithme de la multiplication rapide des polynômes et d’énoncer le théorème suivant. Théorème 6.1 On considère un anneau A possédant une racine 2ν+1 ème principale de 1 et dans lequel 2A est inversible. Alors, en utilisant l’algorithme 6.2 avec l’évaluation récursive décrite dans la preuve du lemme 6.3.1, la multiplication de deux polynômes de degrés < n ≤ 2ν à coefficients dans A se fait à l’aide d’un circuit arithmétique de taille ≤ n (18 log n + 44) et de profondeur ≤ 4 log n + 10. Preuve. Supposons d’abord n = 2ν . On exécute en parallèle deux TFD d’ordre 2n suivies d’une étape parallèle avec 2n multiplications dans l’anneau de base, et on termine par une transformation inverse d’ordre 180 6. Multiplication rapide des polynômes 2n. La preuve du lemme 6.3.1 donne la majoration de la taille par 9(ν + 1) 2ν +4n = 9 n log n+13 n et de la profondeur par 4 ν +6 = 4 log n+6. Dans le cas général, il faut remplacer n par 2n et log n par 1 + log n. t u Rappelons que pour un anneau A fixé par le contexte, nous notons µP (n) le nombre d’opérations arithmétiques nécessaires pour la multiplication de deux polynômes de degré n en profondeur O(log n). Le théorème précédent nous dit donc qu’on a µP (n) = O(n log n) si 2A est inversible et si l’anneau possède des racines 2ν - èmes principales de l’unité pour tout ν. 6.3.2 Algorithme de la TFD rapide pour un anneau commutatif arbitraire L’algorithme que nous venons de développer n’est pas valable lorsque 2A divise zéro dans l’anneau A (puisque, dans un tel anneau, la division par 2 ne peut pas être définie de manière unique, même lorsqu’elle est possible). On peut essayer de contourner cette difficulté en remplaçant 2 par un entier s ≥ 2 tel que s 1A ne divise pas zéro dans A. Lorsqu’un tel entier s ≥ 2 existe, et à supposer qu’on dispose d’une racine principale s - ème de 1 dans A, il faut encore disposer d’un algorithme performant pour la division par s (quand elle est possible) pour pouvoir effectuer la transformation de Fourier inverse. En outre, un tel entier s n’existe pas nécessairement. Pour se débarrasser radicalement de ce problème, l’idée de CantorKaltofen dans [13] est de calculer séparément uAB et vAB avec deux entiers u et v premiers entre eux, puis de récupérer AB en utilisant une relation de Bezout entre u et v. Par exemple, on prend u = 2ν ≥ 2n et v = 3µ ≥ 2n. On calcule sans aucune division 2ν AB par la formule 2ν AB = T F D2ν ,ω−1 (T F D2ν ,ω2,ν (A) 2,ν T F D2ν ,ω2,ν (B)) . (où ω2,ν est une racine 2ν - ème principale de 1). De même, on calcule 3µ AB par la formule 3µ AB = T F D3µ ,ω−1 (T F D3µ ,ω3,µ (A) 3,µ T F D3µ ,ω3,µ (B)) (où ω3,µ est une racine 3µ - ème principale de 1). Il reste néanmoins un obstacle de taille, qui consiste en la nécessité de rajouter un substitut formel à ω2,ν (et ω3,µ ) lorsqu’on ne les a pas 6.3. Transformation de Fourier discrète rapide 181 sous la main dans l’anneau A. Or l’idée toute simple de faire les calculs dans l’anneau A[λ2,ν ], où λ2,ν est un susbstitut formel de ω2,ν ne donne pas le résultat souhaité. En effet, une opération arithmétique dans l’anneau A [λ2,ν ] correspond a priori à grosso modo n opérations arithmétiques dans A, ce qui annule le bénéfice de la transformation de Fourier discrète. L’idée de Cantor et Kaltofen pour résoudre ce deuxième problème est d’appliquer une stratégie (( diviser pour gagner )), un peu semblable à celle du lemme 6.3.1. La définition précise de l’anneau A [λ2,ν ] et la description de l’algorithme font appel aux polynômes cyclotomiques, dont nous rappelons maintenant quelques propriétés. Le n - ème polynôme cyclotomique est défini à partir d’une racine n ème primitive de 1, c’est-à-dire un générateur ωn du groupe multiplicatif (cyclique) des racines n - èmes de 1 dans une clôture algébrique de Q, par exemple dans C avec ωn = ei 2π/n . Le n - ème polynôme cyclotomique est, par définition, le polynôme Φn (X) = Y   X − ωnh . 1≤h<n (h, n) = 1 C’est un polynôme unitaire à coefficients entiers dont les zéros sont les racines n - èmes primitives de 1 et dont le degré est égal à ϕ(n). C’est aussi un polynôme réciproque : X ϕ (n) Φn (1/X) = Φn (X). Les polynômes cyclotomiques possèdent en outre les propriétés suivantes : Q • Φn (X) = d|n Φd (X) ; (d|n signifie que d est un diviseur positif de n) • Φp (X) = X p−1 + · · · + X + 1 pour tout nombre premier p ; • Φmsk (X) = Φms (X s k−1 ) si k ≥ 2 ; • Φm (X) Φmp (X) = Φm (X p ) si p premier ne divise pas m ; • Φ2n (X) = Φn (−X) si n est impair ≥ 3. On en déduit, en particulier, que :  p si n est une puissance d’un nombre premier p • Φn (1) = 1 sinon. Rajouter formellement une racine primitive sq - ème de 1 dans A revient à considérer l’anneau A[Y ] /hΦsq (Y )i = A[λs,q ]. Dans cet anneau, 182 6. Multiplication rapide des polynômes une addition équivaut à ϕ(sq ) additions dans A. Pour une multiplicaq tion, on peut travailler dans A[Y ] modulo (Y s − 1) puis réduire le résultat obtenu modulo Φsq (Y ). Cette dernière opération est relativeq−1 ment peu coûteuse car Φsq (Y ) = Φs (Y s ) est un polynôme unitaire qui a très peu de coefficents non nuls. Cette remarque permet de voir que les multiplications dans A[λs,q ] ne sont pas tellement plus coûteuses que les additions. Elle donne une idée de comment pourra être appliquée une stratégie diviser pour gagner, de manière à rendre peu coûteux les calculs dans l’anneau A[λs,q ]. L’algorithme de Cantor-Kaltofen donne alors le résultat suivant : Théorème 6.2 Il existe une famille uniforme de circuits arithmétiques de profondeur O(log n) qui calculent le produit de deux polynômes de degré < n à coefficients dans un anneau commutatif arbitraire A avec O(n log n) multiplications et µP (n) = O(n log n log log n) additions/soustractions. Remarque 6.3.2 L’algorithme de Cantor-Kaltofen prend en entrée deux polynômes A et B de degré < n et donne en sortie C = AB. Il calcule tout d’abord sq11 C et sq22 C, où s1 et s2 sont deux petits entiers premiers entre eux, et sq11 et sq22 ne sont pas trop grands par rapport à n. La constante cachée du (( grand O )) dans l’estimation O(n log n log log n) de la taille du circuit calculant sq C est de l’ordre de 4s2 (3s + 1) si s est premier. Il s’ensuit qu’en utilisant les deux valeurs optimales s1 = 2 et s2 = 3, l’algorithme de Cantor-Kaltofen ne devient plus performant que l’algorithme en O(nlog 3 ) que pour les valeurs de n qui sont de l’ordre de 6 104 . Remarque 6.3.3 La multiplication rapide des polynômes est en fait couramment utilisée en analyse numérique, en prenant des approximations numériques des racines de l’unité dans C. Cela laisse supposer qu’une implémentation efficace de cette multiplication rapide est également possible en calcul formel avec des anneaux tels que Z ou un anneau de polynômes sur Z. Il suffit en effet de faire le calcul numérique approché avec une précision suffisante pour que le résultat du calcul soit garanti avec une précision meilleure que 1/2. Une autre solution voisine, mais où la précision est plus facile à contrôler, serait de faire un calcul numérique approché non dans C mais dans un anneau d’entiers p - adiques (voir par exemple [Ser]) : un tel anneau contient une racine primitive (p − 1) - ème de l’unité, et (p − 1) y est inversible. 6.4. Produits de matrices de Toeplitz 6.4 183 Produits de matrices de Toeplitz Nous signalons ici une interprétation matricielle du produit de deux polynômes A et B de degrés m et n. On considère le A – module libre Pm+n+1 ' Am+n+1 des polynômes de degré ≤ m + n muni de la base canonique des monômes X k . La multiplication par A (resp. B, resp. AB) tronquée au degré m + n est représentée sur cette base par une matrice de Toeplitz triangulaire TA (resp. TB , resp. TAB ) et on a TA TB = TAB . Par exemple avec m = 3, n = 2 on obtient le produit     a0 0 0 0 0 0 b0 0 0 0 0 0  a1 a0 0 0 0 0   b1 b0 0 0 0 0       a2 a1 a0 0 0 0      ×  b2 b1 b0 0 0 0   a3 a2 a1 a0 0 0   0 b2 b1 b0 0 0       0 a3 a2 a1 a0 0   0 0 b2 b1 b0 0  0 0 a3 a2 a1 a0 0 0 0 b2 b1 b0 qui est égal à la matrice de Toeplitz triangulaire inférieure dont la première colonne est donnée par les coefficients du produit AB :       a0 0 0 0 0 0 b0 a0 b0  a1 a0 0 0 0 0   b1    a1 b0 + a0 b1        a2 a1 a0 0 0 0   b2   a2 b0 + a1 b1 + a0 b2   ×  =    a3 a2 a1 a0 0 0   0   a3 b0 + a2 b1 + a1 b2         0 a3 a2 a1 a0 0   0    a3 b1 + a2 b2 0 0 a3 a2 a1 a0 0 a3 b2 Inversement, le produit de deux matrices de Toeplitz triangulaires inférieures dans An×n peut s’interpréter comme le produit de deux polynômes de degrés ≤ n − 1, tronqué au degré n − 1 (c’est-à-dire encore comme le produit dans l’anneau des développements limités An−1 = A[X] /hX n i ). Par exemple       a0 0 0 0 b0 a0 b0  a1 a0 0 0   b1    a1 b0 + a0 b1      .  a2 a1 a0 0  ×  b2  =   a2 b0 + a1 b1 + a0 b2 b3 a3 b0 + a2 b1 + a1 b2 + a0 b3 a3 a2 a1 a0 En bref il n’y a pas de différence significative entre le produit de 2 polynômes, le produit de 2 matrices de Toeplitz triangulaires inférieures carrées et le produit d’une matrice de Toeplitz triangulaire inférieure par un vecteur. 184 6. Multiplication rapide des polynômes Voyons maintenant la question du produit d’une matrice de Toeplitz arbitraire par un vecteur. Par exemple     c a3 a2 a1 a0 3    a4 a3 a2 a1   c4  b0      a5 a4 a3 a2     b1   =  c5  . ×   c6   a6 a5 a4 a3   b2       c7   a7 a6 a5 a4  b3 c8 a8 a7 a6 a5 Il suffit d’insérer la première matrice dans la matrice de la multiplication P par le polynôme A = 8i=0 ai X i , tronquée au degré 11, dans le A – module libre des polynômes de degrés ≤ 11 :     a0 0 0 0 a0 b0  a a   a b +a b  0 1   1 0 0 0   1 0  a a a    0 c 2  2 1 0     a a a a    c 3  3 2 1 0       a a a a    b0 c4  4 3 2 1          b1  c5  a5 a4 a3 a2    =  ×  .  b2  c6  a6 a5 a4 a3         a7 a6 a5 a4    b3 c7      a8 a7 a6 a5    c8      0 a8 a7 a6    c9      0 0 a8 a7   a7 b3 + a8 b2  0 0 0 a8 a8 b3 On voit alors quePle calcul se ramène au produit du polynôme A par le polynôme B = 3i=0 bi X i . On en déduit le résultat important suivant où l’on voit que le produit par une matrice de Toeplitz n’est guère plus cher que le produit par une matrice creuse. Proposition 6.4.1 Le produit d’une matrice de Toeplitz et d’une matrice arbitraire, toutes deux carrées d’ordre n peut se faire par une famille de circuits arithmétiques en SD(n µP (n), log n)). Remarque. Plus précisément supposons que dans l’anneau commutatif A la multiplication d’un polynôme de degré ≤ n par un polynôme de degré ≤ m soit en SD(µ(n, m), λ(n, m)). Alors le produit T B d’une matrice de Toeplitz T ∈ An×m par une matrice B ∈ Am×p est en SD(p µ(n + m, m), λ(n + m, m)). Ceci n’est qu’un exemple des résultats de complexité arithmétique concernant les matrices de Toeplitz. Nous renvoyons le lecteur intéressé par le sujet à l’ouvrage [BP]. 7. Multiplication rapide des matrices Introduction La multiplication des matrices à coefficients dans un anneau commutatif unitaire A a fait l’objet de multiples investigations durant les trente dernières années en vue de réduire le nombre d’opérations arithmétiques (dans A) nécessaires au calcul du produit d’une matrice m × n par une matrice n × p, et d’améliorer la borne supérieure asymptotique de ce nombre. Il s’est avéré que c’est le nombre de multiplications essentielles qui contrôle la complexité asymptotique de la multiplication des matrices carrées, comme nous allons le voir tout d’abord à travers l’algorithme de la multiplication rapide de Strassen. L’algorithme conventionnel (dit usuel) pour le calcul du produit C = (cij ) ∈ Am×p d’une matrice A = (aij ) ∈ Am×n par une matrice B = (bij ) ∈ An×p se fait par mnp multiplications et mp (n − 1) additions en calculant en parallèle (en une seule étape) les mnp produits aik bkj et en calculant ensuite, en parallèle et en dlog ne étapes, les mp sommes cij intervenant dans les formules cij = Xn k=1 aik bkj pour 1 ≤ i ≤ m et 1 ≤ j ≤ p . En particulier pour la multiplication de deux matrices carrées d’ordre n, cet algorithme correspond à un circuit arithmétique de taille n2 (2n − 1) et de profondeur dlog ne + 1 avec n3 multiplications et n2 (n − 1) additions. Dans un premier temps, les investigations portaient sur la diminution du nombre de multiplications en essayant d’y réduire le coefficient de n3 sans s’occuper de l’exposant de n, et c’est Winograd qui réussit le premier à réduire ce coefficient de moitié, mais en doublant presque le 186 7. Multiplication rapide des matrices nombre d’additions, ce qui constitue, malgré ce prix, un progrès dans la complexité asymptotique si l’on sait que dans une large classe d’anneaux la multiplication est beaucoup plus coûteuse que l’addition 1 . Beaucoup pensaient que ce résultat de Winograd serait optimal au sens que 12 n3 multiplications seraient nécessaires pour le calcul du produit de deux matrices n × n (voir [Knu], page 481). Mais une année plus tard (1969), Strassen montra que l’on pouvait multiplier deux matrices n × n en utilisant seulement O(n2,8 ) multiplications. Ce résultat était basé sur le fait très simple que le produit de deux matrices 2 × 2 à coefficients dans un anneau non nécessairement commutatif pouvait être calculé avec seulement 7 multiplications au lieu de 8, le nombre d’additions passant de 4 à 18, et il donna les relations prouvant ce fait dans son fameux article Gaussian elimination is not optimal [86]. Winograd donna un peu plus tard [97] une variante de la multiplication rapide de Strassen avec seulement 15 additions. Comme ces relations n’utilisent pas la commutativité de la multiplication, elles s’appliquent récursivement au calcul du produit de deux matrices quelconques à coefficients dans A selon la stratégie (( diviser pour gagner )). La section 7.1 est consacrée à une analyse détaillée de la multiplication rapide des matrices dans la version Strassen-Winograd. Nous étudions également l’uniformité de la construction de la famille de circuits arithmétiques qui correspond à la version originale de Strassen, comme annoncé dans la section 4.4. Dans la section 7.2 nous montrons que l’inversion des matrices triangulaires fortement régulières peut être réalisée par des circuits arithmétiques avec une taille de même ordre que les circuits de la multiplication des matrices carrées et une profondeur d’ordre O(log2 n) au lieu de O(log n) . Dans la section 7.3 nous introduisons les notions de complexité bilinéaire, de complexité multiplicative et de rang tensoriel. Nous montrons le rôle central joué par la notion de rang tensoriel dans la complexité asymptotique de la multiplication des matrices carrées (théorème 7.4 dû à Strassen). Nous montrons également le résultat de Schönhage, qui dit que l’exposant de la multiplication des matrices carrées ne dépend que de la caractéristique du corps de base (on conjecture en fait que cet 1. Ce qui n’est pas vrai par exemple dans le corps des fractions rationnelles Q (X) où l’addition est plus coûteuse. 7.1. Analyse de la méthode de Strassen 187 exposant est le même pour tous les corps et pour l’anneau des entiers relatifs.) Dans la section 7.4 nous nous attaquons à des algorithmes nettement plus sophistiqués qui s’appuient sur la notion de calcul bilinéaire approximatif, introduite par Bini. Malgré leurs performances asymptotiques, aucun des algorithmes de cette section ne semble devoir être implémenté sur machine dans un proche avenir. Il nous a pourtant semblé que ce serait un crime contre la beauté que de ne pas dévoiler au moins en partie les idées fascinantes qui y sont à l’œuvre. Nous n’avons cependant pas exposé la (( méthode du laser )) due à Strassen (cf. [BCS, 90]), car nous n’avons pas vu comment en donner une idée assez exacte en termes suffisamment simples. Cette méthode a conduit à la meilleure borne connue pour l’exposant de la multiplication des matrices carrées. L’estimation actuelle de cet exposant ω est de 2, 376 : Winograd & Coppersmith, 1987 ([19, 20]). 7.1 7.1.1 Analyse de la méthode de Strassen La méthode de Strassen (version Winograd) et sa complexité On considère dans un anneau B (non nécessairement commutatif) deux matrices A et B :       a11 a12 b11 b12 c11 c12 A= B= avec C = AB = . a21 a22 b21 b22 c21 c22 Alors la matrice C peut être obtenue par le calcul suivant : m1 := a11 b11 m3 := (a11 − a21 ) (b22 − b12 ) m5 := (a21 + a22 − a11 ) (b22 − b12 + b11 ) m6 := (a11 + a12 − a21 − a22 ) b22 m7 := a22 (b22 − b12 + b11 − b21 ) c11 := m1 + m2 c21 := m1 + m3 + m5 − m7 m2 := a12 b21 m4 := (a21 + a22 ) (b12 − b11 ) c12 := m1 + m5 + m4 + m6 c22 := m1 + m3 + m4 + m5 Ces relations de Strassen (version Winograd), appliquées à l’anneau des matrices carrées d’ordre 2k, ramènent le calcul du produit de deux 188 7. Multiplication rapide des matrices matrices 2k × 2k (k ∈ N∗ ) à celui de sept produits de matrices k × k et de 15 sommes de matrices de même type. L’analyse de complexité faite à la section 5.1 montre que ce passage de 8 à 7 multiplications est un avantage décisif, indépendamment du nombre des additions utilisées par ailleurs. Cela tient à ce que 7 est le degré de parallélisme dans la procédure (( diviser pour gagner )) tandis que le nombre d’additions n’intervient que dans la constante du O(n2 ) opérations arithmétiques nécessaires pour, partant du problème initial Pn , d’une part créer les 7 sous-problèmes de type Pdn/2e , et d’autre part récupérer la solution du problème initial à partir des solutions, calculées en parallèle, des 7 sous-problèmes (cf. proposition 5.1.1 page 161). Posant :      A11 A12 B11 B12 C11 C12 = A21 A22 B21 B22 C21 C22 où les Aij , Bij , Cij (1 ≤ i, j ≤ 2) sont des matrices k × k, on a un schéma de programme d’évaluation comportant les instructions suivantes dans lesquelles les affectations des variables Mi (1 ≤ i ≤ 7) correspondent aux 7 multiplications et celles des variables Ni (1 ≤ i ≤ 11) et Cij (1 ≤ i, j ≤ 2) correspondent aux 15 additions/soustractions( 2 ), avec indication des étapes du calcul parallèle : Appliqué récursivement à une matrice m2ν × m2ν (m ∈ N∗ , ν ∈ N) ce programme donne un circuit arithmétique parallèle de taille S(m2ν ) et de profondeur D(m2ν ) dans l’anneau A, vérifiant les relations de récurrence 3 :  S(m2ν ) = 7 S(m2ν−1 ) + 15 · m2 4ν−1 (7.1) D(m2ν ) = D(m2ν−1 ) + 6 · La dernière équation est justifiée par le fait que les étapes où il n’y a que des additions de matrices m2ν−1 × m2ν−1 ont une profondeur égale à 1 (les m2 4ν−1 additions correspondantes dans A se faisant en parallèle) alors que l’étape comprenant les multiplications de matrices (Etape 4) est de profondeur D(m2ν−1 ). Utilisant l’algorithme usuel pour la multiplication de deux matrices m × m, on peut écrire S(m) = m2 (2m − 1) et D(m) = dlog me + 1. 2. Dans la suite, nous dirons simplement additions, en sous-entendant additions/soustractions. 3. Signalons que pour la version originale de Strassen avec 18 additions (cf. page 191), la profondeur vérifie la relation D(m2ν ) = D(m2ν−1 ) + 3. 7.1. Analyse de la méthode de Strassen 189 Algorithme 7.1 Multiplication de matrices par blocs, à la Strassen-Winograd Début Étape 1 : N1 := A11 − A21 ; N2 := A21 + A22 ; N3 := B12 − B11 ; N4 := B22 − B12 Étape 2 : N5 := N2 − A11 ; N6 := B22 − N3 Étape 3 : N7 := A12 − N5 ; N8 := N6 − B21 Étape 4 : Les 7 multiplications M1 := A11 B11 ; M2 := A12 B21 ; M3 := N1 N4 ; M4 := N2 N3 ; M5 := N5 N6 ; M6 := N7 B22 ; M7 := A22 N8 Étape 5 : C11 := M1 + M2 ; N9 := M1 + M5 ; N10 := M4 + M6 Étape 6 : N11 := M3 + N9 ; C12 := N9 + N10 Étape 7 : C21 := N11 − M7 ; C22 := M4 + N11 Fin. Ce qui donne D(n) = D(m2ν ) = D(m)+6ν = 6 dlog ne+dlog me+1 comme résultat pour la profondeur du circuit arithmétique correspondant au calcul du produit de deux matrices n × n si l’on prend n = m2ν (la version originale de Strassen donne D(n) = 3 dlog ne + dlog me + 1). Concernant la taille, la première équation dans (7.1) donne successivement : 1× 7× .. . S(2ν m) = S(2ν−1 m) = .. . 7 S(2ν−1 m) 7 S(2ν−2 m) 7ν−1 × 7ν × S(2m) = S(m) = 7 S(m) 2 m (2m − 1) −→ S(2ν m) = 7ν m2 (2m − 1) + 15 · 4ν−1 m2 + 15 · 4ν−2 m2 .. . + 15 · m2 + 5 m2 (7ν − 4ν ) 190 7. Multiplication rapide des matrices Ce qui donne comme résultat S(m2ν ) = 7ν m2 (2m + 4) − 5m2 4ν pour la taille du circuit arithmétique correspondant au calcul par la méthode de Strassen (variante Winograd) 4 du produit de deux matrices m2ν × m2ν . Ainsi :  S(m2ν ) = 2m2 (m + 2) 7ν − 5m2 4ν (7.2) D(m2ν ) = 6 dlog ne + dlog me + 1 En particulier, si n est une puissance de 2 (c’est-à-dire m = 1), et comme 7ν = 2ν log 7 : S(n) = 6 nlog 7 − 5 n2 et D(n) = 6 dlog ne (on obtient 3 dlog ne+1 seulement pour la version originale de Strassen). Mais le coefficient de nlog 7 ' n2.807 ( 5 ) dans S(n) peut être ramené à 4, 15 lorsque n est une puissance de 2. En effet, si n = 32 on peut vérifier directement que le nombre d’opérations arithmétiques dans la multiplication usuelle des matrices n2 (2n−1) ne dépasse guère 3,9 nlog 7 et pour n ≥ 32, on pose log n = ν +5 ≥ 5 , de sorte que n = 32. 2ν (m = 32) . La première des équations (7.2) donne alors : S(n) = < ≤ ≤ ≤ S(m2ν ) 2m2 (m + 2) 7ν 211 ∗ 34 ∗ 7ν 211 ∗ 34 ∗ (1/7)5 ∗ 7log n 4, 15 nlog 7 . (puisque 7ν = 7log n−5 ) (on remplace 7log n par nlog 7 ) Ceci conduit donc au résultat suivant dû à Strassen, mais dans lequel nous intégrons la version (avec 15 additions) de Winograd : Théorème 7.1 La multiplication de deux matrices n × n à coefficients dans un anneau arbitraire A est dans la classe SD (nlog 7 , log n). Plus précisément, lorsque n est une puissance de 2, elle se fait soit avec un circuit arithmétique dont la taille et la profondeur sont respectivement majorées par 4, 15 nlog 7 et 6 dlog ne, soit par un circuit dont la taille et la profondeur sont respectivement majorées par 4, 61 nlog 7 et 3 dlog ne. 4. La version originale de Strassen donne S(m2ν ) = 7ν m2 (2m + 5) − 6m2 4ν . 5. log 7 ' 2.8073549220576041074. 7.1. Analyse de la méthode de Strassen 191 Notez aussi que la profondeur multiplicative de ces circuits est égale à 1. En fait la conclusion dans le théorème précédent est non seulement qu’il existe une famille de circuits arithmétiques dans la classe SD(nlog 7 , log n) qui réalise la multiplication des matrices carrées, mais qu’on sait construire explicitement une famille uniforme de tels circuits arithmétiques. Ceci est l’objet du paragaphe qui suit avec le théorème 7.2. 7.1.2 Un exemple de construction uniforme d’une famille de circuits arithmétiques Nous allons maintenant tenir une promesse que nous avions faite dans la section 4.4. Celle d’analyser un exemple de construction récursive uniforme typique d’une famille de circuits arithmétiques pour laquelle le coût de production d’un circuit de la famille n’a pas un ordre de grandeur bien supérieur à sa taille. Nous utiliserons pour cet exemple la multiplication rapide des matrices originale de Strassen [86] qui repose sur le calcul suivant. On considère dans un anneau B (non nécessairement commutatif) deux matrices A et B :       a11 a12 b11 b12 c11 c12 A= B= avec C = AB = . a21 a22 b21 b22 c21 c22 Alors la matrice C peut être obtenue par le calcul suivant, qui nécessite 18 additions/soustractions et 7 multiplications : m1 := (a12 − a22 ) (b21 + b22 ) m3 := (a11 − a21 ) (b11 + b12 ) m5 := a11 (b12 − b22 ) m7 := (a21 + a22 ) b11 c11 := m1 + m2 − m4 + m6 c21 := m6 + m7 m2 := (a11 + a22 ) (b11 + b22 ) m4 := (a11 + a12 ) b22 m6 := a22 (b21 − b11 ) c12 := m4 + m5 c22 := m2 − m3 + m5 − m7 Ceci peut être réécrit sous forme d’un circuit arithmétique de profondeur 4. Concernant les variables en entrée, on note x0,i,j pour aij et x0,2+i,2+j pour bij . On obtient le programme d’évaluation 7.2 page suivante, que nous appelons P1 . La méthode de Strassen consiste à utiliser ces formules de manière récursive. Si on doit multiplier des matrices carrées à m = 2n lignes et colonnes, on les partitionne chacune en 4 matrices carrées à 2n−1 192 7. Multiplication rapide des matrices Programme d’évaluation 7.2 P1 : produit de deux matrices carrées d’ordre 2 sur un anneau non nécessairement commutatif, à la Strassen. Entrée : Les 8 coefficients x0,ij dans A (un anneau arbitraire) de deux matrices carrées A et B d’ordre 2. Sortie : Les coefficients x4,ij du produit : C = A B. Début profondeur 1 : x1,1 := x0,12 − x0,22 ; x1,2 := x0,11 + x0,22 ; x1,3 := x0,11 − x0,21 ; x1,4 := x0,11 + x0,12 ; x1,5 := x0,11 ; x1,6 := x0,22 ; x1,7 := x0,21 + x0,22 ; x1,8 := x0,43 + x0,44 ; x1,9 := x0,33 + x0,44 ; x1,10 := x0,33 + x0,34 ; x1,11 := x0,44 ; x1,12 := x0,34 − x0,44 ; x1,13 := x0,43 − x0,33 ; x1,14 := x0,33 profondeur 2 : Les 7 multiplications x2,1 := x1,1 x1,8 ; x2,2 := x1,2 x1,9 ; x2,3 := x1,3 x1,10 ; x2,4 := x1,4 x1,11 ; x2,5 := x1,5 x1,12 ; x2,6 := x1,6 x1,13 ; x2,7 := x1,7 x1,14 profondeur 3 : x3,1 := x2,1 + x2,2 ; x3,2 := x2,4 − x2,6 ; x3,3 := x2,2 − x2,3 ; x3,4 := x2,5 − x2,7 profondeur 4 : x4,11 := x3,1 − x3,2 ; x4,12 := x2,4 + x2,5 ; x4,21 := x2,6 + x2,7 ; x4,22 := x3,3 + x3,4 Fin. lignes et colonnes, qui jouent le rôle des aij et bij dans les formules précédentes. On obtient en définitive un circuit arithmétique de profondeur 3n + 1 = 3 log(m) + 1 comportant 6m2 additions/soustractions et 7n = mlog(7) multiplications (la méthode usuelle donne un circuit de profondeur 1 + n comportant m3 additions/soustractions et 8n = m3 multiplications). Notre problème est de déterminer la complexité en temps pour l’écriture du programme d’évaluation correspondant. Supposons qu’on ait écrit le programme d’évaluation Pn pour la multiplication de deux matrices carrées à m = 2n lignes et colonnes, avec les entrées x0,ij et x0,2n +i,2n +j avec 1 ≤ i, j ≤ 2n , et les sorties x3n+1,ij (1 ≤ i, j ≤ 2n ). 7.1. Analyse de la méthode de Strassen 193 Comment écrit-on le programme d’évaluation Pn+1 ? Les entrées sont maintenant x0,i,j et x0,2n+1 +i,2n+1 +j avec 1 ≤ i, j ≤ 2n+1 . Notons X0,uv (1 ≤ u, v ≤ 2 ou 3 ≤ u, v ≤ 4) les matrices extraites à 2n lignes et colonnes, avec m = 2n et m2 = 2n+1 : X0,11 [i, j] := x0,i,j X0,21 [i, j] := x0,m+i,j X0,33 [i, j] := x0,m2 +i,m2 +j X0,43 [i, j] := x0,m2 +m+i,m2 +j X0,12 [i, j] := x0,i,m+j X0,22 [i, j] := x0,m+i,m+j X0,34 [i, j] := x0,m2 +i,m2 +m+j X0,44 [i, j] := x0,m2 +m+i,m2 +m+j On commence par créer (conformément au programme P1 appliqué aux matrices X0,uv ) les (( matrices X1,k )) pour 1 ≤ k ≤ 14, au moyen des affectations matricielles : X1,1 := X0,12 − X0,22 X1,3 := X0,11 − X0,21 X1,5 := X0,11 X1,7 := X0,21 + X0,12 X1,9 := X0,33 + X0,44 X1,11 := X0,44 X1,13 := X0,43 − X0,33 X1,2 := X0,11 + X0,22 X1,4 := X0,11 + X0,12 X1,6 := X0,22 X1,8 := X0,34 + X0,44 X1,10 := X0,33 + X0,34 X1,12 := X0,34 − X0,44 X1,14 := X0,33 Cela signifie précisément dans l’anneau de base B, avec X1,k [i, j] = x1,k,i,j pour 1 ≤ i, j ≤ m = 2n : profondeur 1 : x1,1,i,j := x0,i,m+j − x0,m+i,m+j x1,2,i,j := x0,i,j + x0,m+i,m+j x1,3,i,j := x0,i,j − x0,m+i,j x1,4,i,j := x0,i,j + x0,i,m+j x1,5,i,j := x0,i,j x1,6,i,j := x0,m+i,m+j x1,7,i,j := x0,m+i,j + x0,i,m+j x1,8,i,j := x0,m2 +i,m2 +m+j + x0,m2 +m+i,m2 +m+j x1,9,i,j := x0,m2 +i,m2 +j + x0,m2 +m+i,m2 +m+j x1,10,i,j := x0,m2 +i,m2 +j + x0,m2 +i,m2 +m+j x1,11,i,j := x0,m2 +m+i,m2 +m+j x1,12,i,j := x0,m2 +i,m2 +m+j − x0,m2 +m+i,m2 +m+j x1,13,i,j := x0,m2 +m+i,m2 +j − x0,m2 +i,m2 +j x1,14,i,j := x0,m2 +i,m2 +j 194 7. Multiplication rapide des matrices Ensuite on crée les (( matrices X2,k )) pour 1 ≤ k ≤ 7. Pour cela il s’agit d’écrire 7 fois, avec à chaque fois une renumérotation convenable, le programme Pn . Pour k de 1 à 7, on réécrit Pn avec les transformations suivantes : – les variables d’entrées x0,i,j (1 ≤ i, j ≤ m) sont remplacées par les variables x1,k,i,j , – les variables d’entrées x0,m+i,m+j (1 ≤ i, j ≤ m) sont remplacées par les variables x1,7+k,i,j , – toute variable xp,u dans Pn avec une profondeur p ≥ 1 est remplacée par la variable xp+1,k,u . En particulier, on obtient en sortie les variables, de profondeur 3n+2, x3n+2,k,i,j (1 ≤ i, j ≤ m) qui sont les coefficients des matrices X2,k (1 ≤ k ≤ 7). Il reste enfin à réaliser les affectations matricielles : profondeur 3 : X3,1 := X2,1 + X2,2 ; X3,2 := X2,4 − X2,6 X3,3 := X2,2 − X2,3 ; X3,4 := X2,5 − X2,7 profondeur 4 : X4,11 := X3,1 − X3,2 ; X4,12 := X2,4 + X2,5 X4,21 := X2,1 + X2,7 ; X4,22 := X3,3 + X3,4 Cela signifie précisément, avec 1 ≤ i, j ≤ m = 2n : profondeur 3n + 3 : x3n+3,1,i,j := x3n+2,1,i,j + x3n+2,2,i,j ; x3n+3,2,i,j := x3n+2,4,i,j − x3n+2,6,i,j ; x3n+3,3,i,j := x3n+2,2,i,j − x3n+2,3,i,j ; x3n+3,4,i,j := x3n+2,5,i,j − x3n+2,7,i,j profondeur 3n + 4 = 3(n + 1) + 1 : x3n+4,11,i,j := x3n+3,1,i,j − x3n+3,2,i,j ; x3n+4,12,i,j := x3n+2,4,i,j + x3n+2,5,i,j ; x3n+4,21,i,j := x3n+2,1,i,j + x3n+2,7,i,j ; x3n+4,22,i,j := x3n+3,3,i,j + x3n+3,4,i,j Le programme qui, pour l’entrée n donne en sortie le texte du programme d’évaluation Pn est un programme du type (( loop program )) (ou programme à boucles pour : (( pour u de 1 à r faire . . . ))) de structure simple. Lorsqu’on le réalise sous forme d’une machine de Turing écrivant le texte Pn , la gestion des boucles occupe un temps négligeable par rapport aux instructions qui permettent d’écrire successivement P1 , P2 , . . . , Pn . Il faut prévoir que, à la fin de l’étape no i, le texte Pi doit être recopié sur une bande où il sera lu pendant l’étape i+1, 7.2. Inversion des matrices triangulaires 195 car durant cette étape, la première bande où a été écrite Pi sera effacée par l’écriture de Pi+1 . Si t(n) est le temps d’exécution pour l’écriture de Pn et s(n) la taille de Pn , on obtient les formules récurrentes suivantes, où les ci sont des constantes : s(n + 1) ≤ c0 n m2 + 7 s(n) t(n + 1) ≤ c1 n m2 et + t(n) + c2 s(n) + c3 s(n + 1) , d’où, puisque nm2 = n22n = n4n est négligeable devant 7s(n) ≥ 7n , s(n) = O(7n ) et t(n) = O(7n ) . Nous pouvons résumer comme suit (rappelons que nous notons log k pour max(log2 k, 1)). Théorème 7.2 Lorsqu’on utilise la méthode récursive de Strassen pour construire une famille de circuits arithmétiques pour la multiplication des matrices carrées d’ordre m = 2n , on peut construire une machine de Turing qui écrit le code du programme d’évaluation Qm = Pn en un temps du même ordre de grandeur que la taille de sa sortie : O(mlog 7 ). Naturellement, comme d’habitude le résultat sur le temps de calcul O(mlog 7 ) est encore valable lorsque m n’est pas une puissance de 2, en complétant les matrices dans Am×m par des lignes et colonnes de 0. 7.2 Inversion des matrices triangulaires Les notations que nous précisons maintenant concernant la multiplication des matrices carrées seront utilisées dans toute la suite de l’ouvrage quand nous aurons à faire des calculs de complexité. Notation 7.2.1 Nous supposerons que le calcul du produit de deux matrices n×n se fait par un circuit arithmétique de taille µM (n) = Cα nα de profondeur γM (n) = Kα log n et de largeur λM (n) = Lα nα / log n où 2 < α ≤ 3, Kα et Lα sont des constantes réelles positives ≥ 1 et Cα ≥ 3 ( 6 ). 6. Certains calculs de complexité dans la suite de l’ouvrage conduiraient à des formules légèrement différentes pour les cas α > 2 et α = 2. C’est la raison pour laquelle nous avons préféré exclure cette dernière valeur, qui n’est de toute manière pas d’actualité. L’hypothèse Cα ≥ 3 qui est vérifiée pour la multiplication rapide de Strassen et pour toutes les autres multiplications rapides connues, n’est pas non plus restrictive et simplifie quelques calculs. 196 7. Multiplication rapide des matrices L’approche (( diviser pour gagner )) donne un algorithme qui montre que le problème de l’inversion d’une matrice triangulaire inversible (autrement dit, fortement régulière) admet une solution en SD(nα , log2 n) avec une constante asymptotique de l’ordre de 4 Cα pour la taille et de l’ordre de Kα pour la profondeur du circuit. Proposition 7.2.2 Soit A un anneau arbitraire, n un entier ≥ 2 et A ∈ An×n une matrice triangulaire inversible. Alors l’inverse de A peut être calculée par une famille uniforme de circuits arithmétiques de taille τ (n) et de profondeur π(n) vérifiant : τ (n) ≤ 4 Cα nα et π(n) ≤ Kα log2 n + O(log n) . ν ν Preuve. On peut toujours supposer A ∈ A2 ×2 où ν = dlog ne (i.e. 2ν−1 < n ≤ 2ν ) quitte à rajouter 2ν − n lignes et 2ν − n colonnes de zéros à la matrice A, et remplir la partie (( sud-est )) restante par la matrice unité à remplacer la matrice A par la  I2ν−n , ce qui revient  A 02ν−n,n ν ν matrice A0 = ∈ A2 ×2 où 0p,q désigne, pour tous 0n,2ν−n I2ν−n entiers naturels p et q, la matrice nulle à p lignes et q colonnes. Le calcul de A−1 , si A est inversible, se ramène évidemment à celui de A0−1 puisque dans ce cas A0 est inversible et  −1  −1  A 02ν−n,n A 02ν−n,n 0−1 A = = . 0n,2ν−n I2ν−n 0n,2ν−n I2ν−n Ainsi, remplacée par A0 , la matrice A peut être considérée comme une ν ν matrice  2 × 2  et s’écrire (si elle est triangulaire inférieure) : A1 0 ν−1 ν−1 A= où A1 , A2 , A3 ∈ A2 ×2 avec A1 , A2 trianguA3 A2 laires inférieures. Donc : A est fortement régulière ⇐⇒ A1 et A2 sont fortement régulières.   A−1 02ν−1 ,2ν−1 1 −1 . De plus : A = −1 −A−1 A−1 2 A3 A1 2 −1 Le calcul de A−1 1 et A2 se fait en parallèle avec un circuit arithméν−1 tique de taille τ (2 ) et de profondeur π(2ν−1 ). On récupère ensuite le résultat, c’est-à-dire la matrice A−1 , à partir de A−1 et A−1 1 2 , en −1 −1 ν−1 ν−1 calculant le produit A2 A3 A1 de trois matrices 2 ×2 . Ce qui donne les relations de récurrence vraies pour tout ν ≥ 1 avec τ (1) = π(1) = 1 : ( τ (2ν ) = 2 τ (2ν−1 ) + 2 Cα 2(ν−1)α π(2ν ) = π(2ν−1 ) + 2 Kα ν . 7.3. Complexité bilinéaire 197 On obtient par sommation lorsque n = 2ν , avec a = 2α−1 : ( 1 τ (n) = (Cα nα − (Cα + 1 − a) n) / (a − 1) ≤ a−1 Cα nα π(n) = Kα (log n + 1) log n + 1 . (ici on a utilisé sur la première ligne l’hypothèse Cα ≥ 3). Pour le cas général, on remplace n par 2dlog ne < 2 n, log n par 1 + log n et on obtient les majorations (2 < a ≤ 4) : ( 2a τ (n) ≤ a−1 Cα nα ≤ 4 Cα nα π(n) ≤ Kα (log2 n + 3 log n + 2) + 1 . 7.3 2 Complexité bilinéaire Soit un corps K et trois K – espaces vectoriels E, F , G de dimensions finies. Rappelons qu’une application bilinéaire ψ : (x, y) 7→ ψ(x, y) de E × F vers G est une application qui est séparément linéaire en x et en y. Retour sur les égalités de Strassen-Winograd Réécrivons les égalités de Strassen-Winograd données dans la section 7.1, sous une forme où nous isolons les multiplications : α1 := α11 β1 := β11 α2 := α12 β2 := β21 α3 := α11 − α21 β3 := β22 − β12 α4 := α21 + α22 β4 := β12 − β11 α5 := α21 + α22 − α11 β5 := β22 − β12 + β11 α6 := α12 − α21 − α22 + α11 β6 := β22 α7 := α22 β7 := β22 − β12 + β11 − β21 µi := αi βi (i = 1, . . . , 7) γ11 γ12 γ21 γ22 := µ1 + µ2 := µ1 + µ4 + µ5 + µ6 := µ1 + µ3 + µ5 − µ7 := µ1 + µ3 + µ5 + µ4 Ici nous avons considéré avec trois matrices A, B, C les entrées de A comme des formes linéaires αij , celles de B comme des formes linéaires βjk , celles de C comme des formes linéaires γik . Ces formes linéaires sont définies sur l’espace des matrices carrées d’ordre 2 sur un anneau A. Les 8 affectations qui définissent le produit C := AB, γik := αi1 β1k + αi2 β2k 198 7. Multiplication rapide des matrices ont été remplacées par d’autres affectations, avec l’avantage de n’avoir que 7 multiplications. L’analyse de complexité nous a montré que ce passage de 8 à 7 était un avantage décisif, indépendamment du nombre des additions utilisées par ailleurs. Nous avons utilisé 7 formes linéaires α` sur l’espace où vit la matrice A, 7 formes linéaires β` sur l’espace où vit la matrice B, effectué les 7 produits µ` = α` β` et récupéré les γik comme combinaisons linéaires des µ` . Si nous appelons (c11 , c12 , c21 , c22 ) la base canonique de l’espace où vit la matrice C, nous pouvons écrire C := µ1 c1 + µ2 c2 + · · · + µ7 c7 i.e., C := X7 `=1 α` · β` · c` où les c` sont des combinaisons linéaires suivantes des cij : c1 := c11 + c12 + c21 + c22 c2 := c11 c3 := c21 + c22 c4 := c12 + c22 c5 := c12 + c21 + c22 c6 := c12 c7 := −c21 Bilan des courses : 7 formes linéaires (( en A )), 7 formes linéaires (( en B )) et 7 vecteurs (( en C )). En mathématiques un peu plus savantes on réécrit ceci en utilisant la notation tensorielle. L’application bilinéaire (A, B) 7→ C = AB correspond au tenseur suivant, (le premier membre de l’égalité provient directement de la définition) X i,j,k∈{1,2} αij ⊗ βjk ⊗ cik = X7 `=1 α` ⊗ β` ⊗ c` On peut considérer, au choix, que ces tenseurs appartiennent à un espace tensoriel abstrait construit à partir des trois espaces E, F , G où vivent les matrices A, B, C, ou bien qu’ils sont dans l’espace des applications bilinéaires de E × F vers G. Dans ce dernier cas un tenseur élémentaire α ⊗ β ⊗ c est égal par définition à l’application bilinéaire (A, B) 7−→ α(A) · β(B) · c 7.3.1 Rang tensoriel d’une application bilinéaire Considérons plus généralement un corps K, trois K – espaces vectoriels E, F , G de dimensions finies. Soient (ei )i∈I , (fj )j∈J , (g` )`∈L des bases de E, F , G et notons (e?i )i∈I , (fj? )j∈J , (g`? )`∈L les bases duales. Toute application bilinéaire ψ de E ×F vers G est alors une somme de 7.3. Complexité bilinéaire 199 tenseurs élémentaires : ψ est complètement déterminée par les images qu’elle donne P pour les vecteurs des bases canoniques de E et F , et si ψ(ei , fj ) = ` γij` g` on obtient ipso facto X γij` e?i ⊗ fj? ⊗ g` ψ= i,j,` Les γij` peuvent être appelées les coordonnées de ψ sur les trois bases (ei )i∈I , (fj )j∈J , (g` )`∈L . L’important du point de vue du calcul sont les règles de manipulation des tenseurs, qui disent qu’on a le droit d’utiliser ⊗ comme (( n’importe quel )) produit (en utilisant la linéarité par rapport à chacune des entrées, l’associativité, mais pas la commutativité). On peut par exemple supprimer les symboles ⊗ et calculer avec des variables formelles xi , yj , z` à la place des e?i , fj? , g` à condition de ne pas autoriser la commutation de deux variables entre elles (par contre, elles commutent avec les éléments de K). L’objet abstrait correspondant à ce calcul s’appelle l’anneau des polynômes non commutatifs à coefficients dans K. Définition 7.3.1 (Rang tensoriel d’une application bilinéaire) Soient K un corps, E, F , G trois K – espaces vectoriels de dimension finie. On note Bil(E, F ; G) l’espace des applications bilinéaires de E ×F vers G. Soit ψ ∈ Bil(E, F ; G). On appelle rang tensoriel de ψ le plus petit entier r tel que ψ puisse s’écrire sous forme Xr ε` ⊗ ϕ` ⊗ g` `=1 où les ε` sont dans E ? , les ϕ` sont dans F ? et les g` sont dans G. Autrement dit encore c’est le plus petit entier r tel que ψ puisse s’écrire comme composée de trois applications selon le format suivant ε×ϕ µr g E × F −→ Kr × Kr −→ Kr −→ G où ε : E → Kr , ϕ : F → Kr et g : Kr → G sont des applications linéaires et µr : Kr ×Kr → Kr est le produit coordonnée par coordonnée. Le programme d’évaluation arithmétique correspondant s’appelle un calcul bilinéaire de ψ. Le rang tensoriel de ψ est encore appelé la complexité bilinéaire de ψ. Nous le noterons R(ψ), ou s’il y a ambiguité RK (ψ). L’importance du rang tensoriel dans les questions de complexité algébrique a été soulignée par Gastinel ([33]) et Strassen ([87, 90, 91]). 200 7. Multiplication rapide des matrices Remarque 7.3.2 Nous laissons libre choix pour l’interprétation du tenseur ε` ⊗ ϕ` ⊗ g` . Pour les gens savants cet objet vit dans un espace tensoriel abstrait E ? ⊗ F ? ⊗ G, canoniquement isomorphe à l’espace des applications bilinéaires E × F → G. Mais on peut considérer aussi que cet objet est égal par définition à l’application bilinéaire (x, y) 7→ ε` (x) · ϕ` (y) · g` . Remarque 7.3.3 Le lecteur ou la lectrice peut donner la définition analogue pour le rang tensoriel d’une application linéaire, ou celui d’une forme bilinéaire, et vérifier qu’on retrouve la notion usuelle de rang pour ces objets. Remarque 7.3.4 Nous pourrions remplacer dans la définition 7.3.1 le corps K par un anneau commutatif arbitraire A, à condition de considérer des espaces convenables analogues aux espaces vectoriels. Une possibilité est de considérer que E, F et G doivent être des A – modules libres, c’est-à-dire des modules (isomorphes à) Ae , Af et Ag . Par exemple pour le produit matriciel, le cadre le plus naturel serait de choisir de travailler sans aucune hypothèse précise, c’est-à-dire sur l’anneau Z. Remarque 7.3.5 Contrairement au rang d’une application linéaire, le rang tensoriel d’une application bilinéaire est en général difficile à déterminer. Il ne semble pas qu’on connaisse d’algorithme qui réalise ce travail, sauf pour quelques classes de corps particuliers (les corps finis ou les corps algébriquement clos par exemple). Mais même dans ces cas, les algorithmes sont impraticables. La détermination du rang tensoriel des applications bilinéaires sur un corps fini fixé est un problème N Pcomplet (cf. [43]) : le problème, en prenant pour entrées un entier r et une application bilinéaire ψ donnée par ses coordonnées sur trois bases, est de déterminer si le rang tensoriel de ψ est ≤ r ou non. Rang tensoriel de la multiplication des matrices La notation tensorielle n’a pas seulement l’avantage de l’élégance. Elle a aussi le mérite de nous aider à réfléchir sur les calculs mis en œuvre. La meilleure synthèse de l’idée de Strassen est peut-être de dire que le miracle s’est produit quand il a pu écrire le tenseur de la multiplication des matrices carrées d’ordre 2 comme somme de 7 tenseurs élémentaires. 7.3. Complexité bilinéaire 201 Chaque fois qu’on arrive à écrire la multiplication des matrices carrées d’ordre k comme une somme de h tenseurs élémentaires, avec une bonne valeur de log h/ log k on obtient immédiatement que la multiplication des matrices tombe dans la classe SD(nlog h/ log k , log n) car le calcul de complexité de la section 7.1 pourra fonctionner à l’identique. Plus précisément, la possibilité d’effectuer des produits de matrices carrées d’ordre k ` par blocs de taille k `−1 implique récursivement que ce produit matriciel est représenté par une somme de h` tenseurs élémentaires. En outre si la profondeur du programme d’évaluation correspondant au produit des matrices d’ordre k est un entier K alors celle du programme d’évaluation correspondant au produit des matrices d’ordre k ` est égale à ` K, et sa profondeur multiplicative (c’est-à-dire la profondeur mesurée en ne tenant compte que des multiplications essentielles, cf. définition 3.1.3 page 116) est égale à `. Depuis la découverte de Strassen, un nouveau sport a été créé, auquel ont participé quelques grands noms de la complexité algébrique : faire diminuer log h/ log k en élaborant des identités algébriques inédites, pour des valeurs de k de plus en plus grandes. Un aspect fascinant de la notation tensorielle pour les applications bilinéaires est qu’elle établit une symétrie entre les trois espaces E, F , G en jeu (rappelons qu’il s’agit ici d’espaces de matrices). Symétrie qui n’est pas directement visible sur la définition. En fait, il n’y aurait vraiment symétrie que si nous considérions notre tenseur comme représentant l’application trilinéaire (A, B, C) 7−→ X i,j,k αij βjk γki L’écriture tensorielle permet de traiter des arguments de dualité sous forme scripturale. Pour montrer que ce jeu d’écriture est bien plus qu’un jeu, prenons de nouveau les égalités de Strassen-Winograd que nous réécrivons avec des tenseurs où nous ne marquons pas la différence entre formes linéaires et vecteurs. Cela donne alors pour le produit matriciel l’égalité X i,j,k∈{1,2} aij ⊗ bjk ⊗ cik = X7 `=1 a` ⊗ b` ⊗ c` 202 7. Multiplication rapide des matrices avec a1 a2 a3 a4 a5 a6 a7 := a11 := a12 := a11 − a21 := a21 + a22 := a21 + a22 − a11 := a12 − a21 − a22 + a11 := a22 b1 b2 b3 b4 b5 b6 b7 := b11 := b21 := b22 − b12 := b12 − b11 := b22 − b12 + b11 := b22 := b22 − b12 + b11 − b21 c1 c2 c3 c4 c5 c6 c7 := c11 + c12 + c21 + c22 := c11 := c21 + c22 := c12 + c22 := c12 + c21 + c22 := c12 := −c21 Pour réaliser une symétrie par permutation circulaire dans la définition, échangeons les indices i et k dans les cik . Alors, vu l’invariance par permutation circulaire nous pouvons remplacer partout a, b et c par b, c et a. Et finalement nous permutons à nouveau les indices i et k dans les (nouveaux) cik pour revenir à la définition. Ceci nous donne d’autres égalités, qui peuvent tout aussi bien servir que les premières : a1 a2 a3 a4 a5 a6 a7 := a11 + a21 + a12 + a22 := a11 := a12 + a22 := a21 + a22 := a21 + a12 + a22 := a21 := −a12 b1 b2 b3 b4 b5 b6 b7 := b11 := b12 := b11 − b21 := b21 + b22 := b21 + b22 − b11 := b12 − b21 − b22 + b11 := b22 c1 c2 c3 c4 c5 c6 c7 := c11 := c12 := c22 − c21 := c21 − c11 := c22 − c21 + c11 := c22 := c22 − c21 + c11 − c12 Naturellement, dans le cas présent, on obtient seulement sans fatigue un nouveau système d’identités algébriques pour traiter le même produit matriciel. Mais si nous étions parti d’un produit de matrices rectangulaires non carrées, la permutation circulaire deviendrait un outil vraiment efficace, produisant des identités correspondant à un cas de figure vraiment nouveau. Cette remarque importante remonte à 1972 (cf. [46, 75]). Notez que nous avons une situation familière analogue si nous considérons le cas des applications linéaires de E vers F . La dualité nous dit que le passage de ϕ à t ϕ est un isomorphisme. En termes de matrices c’est une banale transposition. En termes d’écriture tensorielle, c’est un jeu d’écriture. Les tenseurs remplacent les matrices lorsqu’il y a plus que deux espaces en cause. Notation 7.3.6 (Rang tensoriel de la multiplication des matrices) Soient m, n, p trois entiers > 0 et K un corps. On note hm, n, piK (ou hm, n, pi) l’application bilinéaire (A, B) 7−→ AB où A ∈ Km×n , B ∈ Kn×p et AB ∈ Km×p On note donc le rang tensoriel par R hm, n, pi, ou si on doit préciser RK hm, n, pi. 7.3. Complexité bilinéaire 203 Proposition 7.3.7 (Rang tensoriel de la multiplication des matrices) (1) Si m ≤ m0 , n ≤ n0 et p ≤ p0 alors R hm, n, pi ≤ R hm0 , n0 , p0 i 0 0 0 (2) R hmm0 , nn0 , pp0 i ≤ R hm, n, pi · R Phm , n , p i (3) R hm1 + m2 , n1 + n2 , p1 + p2 i ≤ i,j,k∈{1,2} R hmi , nj , pk i (4) R n` , n` , n` ≤ (R hn, n, ni)` (5) R hm, n, pi est invariant par permutation des entiers m, n, p. (6) R h1, n, 1i = n et R hm, n, 1i = mn Preuve. Le point (1) est facile : on peut compléter des matrices correspondant au format (m, n, p) par des 0 pour en faire des matrices au format (m0 , n0 , p0 ). Les points (2), (3) résultent de la possibilité de faire des produits de matrices par blocs. Et (4) résulte de (2). Le point (5) a été expliqué avant la proposition (voir page 201). On peut redire à peu près la même chose sous la forme suivante un peu plus abstraite, qui décrit peut-être mieux l’essence du résultat. Si E1 , E2 , E3 sont trois K – espaces vectoriels de dimensions finies p, n, m, alors la multiplication des matrices correspondante hm, n, pi : (A, B) 7→ AB est un élément canonique θ de l’espace Bil(Hom(E2 , E3 ), Hom(E1 , E2 ); Hom(E1 , E3 )) = Bil(E, F ; G) Si nous notons L3 (E, F, G) l’espace des formes trilinéaires sur E×F ×G, nous avons un isomorphisme canonique Bil(E, F ; G) ' L3 (E, F, G? ) ψ 7−→ ϕ = ((x, y, γ) 7→ γ(ψ(x, y)) Dans la situation présente, il y a aussi une dualité canonique entre Hom(E1 , E3 ) = G et Hom(E3 , E1 ) donnée sous forme matricielle par (C, D) 7→ Tr(CD), ce qui fournit un isomorphisme canonique entre Hom(E3 , E1 ) et G? . Une fois mis bout à bout tous ces isomorphismes canoniques, on voit que l’élément canonique θ ∈ Bil(Hom(E2 , E3 ), Hom(E1 , E2 ); Hom(E1 , E3 )) correspond à l’élément canonique θ0 ∈ L3 (Hom(E2 , E3 ), Hom(E1 , E2 ), Hom(E3 , E1 )) donné sous forme matricielle par (A, B, D) 7→ Tr(ABD). Maintenant il est bien connu que Tr(ABD) = Tr(BDA) = Tr(DAB) et Tr(ABD) = Tr( t (ABD)) = Tr( t D t B t A). Ceci établit les symétries demandées. 204 7. Multiplication rapide des matrices Voyons maintenant le point (6). Nous reprenons les notations précédentes avec E1 = K, donc on identifie Hom(E1 , Ei ) à Ei (i = 2, 3). Regardons l’espace Bil(E, F ; G) sous la forme (canoniquement équivalente) Hom(E, Hom(F, G)). Si on écrit le produit d’une matrice par un vecteur colonne (A, X) 7→ AX sous forme Xr Xi=m,j=n α` ⊗ β` ⊗ c` αij ⊗ βj1 ⊗ ci1 = i,j=1 `=1 on voit que l’application linéaire correspondante de E vers Hom(F, G) T est nulle sur rl=1 Ker(α` ). Mais dans le cas présent, modulo les identifications précédentes, cette application linéaire n’est autre que l’application identique de E. Son noyau est donc réduit à {0} et r est au moins égal à la dimension de E c’est-à-dire à mn. t u 7.3.2 Exposant de la multiplication des matrices carrées Définition 7.3.8 On dit que α est un exposant acceptable pour la multiplication des matrices carrées si celle-ci peut être réalisée en SD(nα , log n). La borne inférieure des exposants acceptables est appelée l’exposant de la multiplication des matrices carrées et elle est notée ω. A priori on devrait mettre en indice le corps K pour les exposants α et ω. Les résultats concernant ces exposants dont nous rendons compte sont cependant indépendants du corps K considéré. Théorème 7.3 (Rang tensoriel et exposant de la multiplication des matrices carrées) (1) S’il existe n et r tels que R hn, n, ni = r alors l’exposant α = log r log n est acceptable pour la multiplication des matrices carrées. (2) S’il existe m, n, p et r tels que R hm, n, pi = r alors l’exposant r α = 3 loglogmnp est acceptable pour la multiplication des matrices carrées. Preuve. Comme nous l’avons déjà remarqué le point (1) résulte du même calcul de complexité que celui fait dans la section 7.1. Le point (2) résulte du point (1) puisque d’après les points (2) et (5) de la proposition 7.3.7 on a (avec N = mnp) R hN, N, N i ≤ R hm, n, pi R hn, p, mi R hp, m, ni = (R hm, n, pi)3 t u En fait la conclusion dans le théorème précédent est non seulement qu’il existe une famille de circuits arithmétiques dans la classe 7.3. Complexité bilinéaire 205 SD(nα , log n) qui réalise la multiplication des matrices carrées, mais qu’on sait construire explicitement une telle famille uniforme de circuits arithmétiques. En outre le temps de construction du circuit arithmétique numéro n est proportionnel à sa taille, selon les lignes de la preuve du théorème 7.2. Le point (1) du théorème ci-dessus peut être précisé comme suit (par le même calcul qu’à la section 7.1). Proposition 7.3.9 (Précision pour le théorème 7.3 (1)) Supposons que l’application bilinéaire hn, n, ni puisse être calculée par un circuit arithmétique de profondeur ` contenant r multiplications essentielles et s autres opérations arithmétiques (addition, soustraction, multiplication par une constante), avec r > n2 . Alors l’application bilinéaire hnν , nν , nν i peut être calculée par un circuit arithmétique de profonν −n2ν deur ν ` contenant rν multiplications essentielles et s r r−n autres 2 opérations arithmétiques. 7.3.3 Complexité bilinéaire versus complexité multiplicative Soient K un corps, H, G deux K – espaces vectoriels de dimension finie. Une application quadratique de H vers G est par définition une application de la forme Ψ : x 7→ ψ(x, x) où ψ ∈ Bil(H, H; G). Si (hi )i∈I et (g` )`∈L sont des bases de H et G il revient au même de dire que chaque coordonnée de Ψ(x) est une forme quadratique en x, c’est-àdire un polynôme homogène du second degré en les coordonnées de x. Si les coordonnées de x sont prises comme variables, on peut alors considérer les programmes d’évaluation arithmétiques sans division qui permettent de calculer les coordonnées de Ψ(x). La complexité multiplicative de Ψ est alors définie comme la plus petite longueur multiplicative d’un tel programme d’évaluation. Nous la noterons M (Ψ). Comme les changements de base ne coûtent rien en longueur multiplicative cette définition ne dépend pas du choix des bases. Le lemme suivant est une paraphrase de la proposition 3.1.6 dans le cas d’une application quadratique. Lemme 7.3.10 Avec les notations précédentes la complexité multiplicative d’une application quadratique Ψ est aussi égale au plus petit entier r tel que Ψ puisse s’écrire comme composée de trois applications selon 206 7. Multiplication rapide des matrices le format suivant (η,ζ) µr g H −→ Kr × Kr −→ Kr −→ G où η : H → Kr , ζ : H → Kr et g : Kr → G sont des applications linéaires et µr : Kr × Kr → Kr est le produit coordonnée par coordonnée. Un programme d’évaluation arithmétique correspondant à cette décomposition s’appelle un calcul quadratique de Ψ. Remarque 7.3.11 Si on considérait des circuits arithmétiques avec division on ne pourrait pas diminuer pour autant la longueur multiplicative pour évaluer une application quadratique, au moins dans le cas d’un corps infini, d’après le théorème 3.1 et la proposition 3.2.3. Proposition 7.3.12 Soient K un corps, E, F , G trois K – espaces vectoriels de dimension finie. Soit ψ ∈ Bil(E, F ; G) et H = E × F . Alors ψ est une application quadratique de H vers G. Sa complexité bilinéaire R(ψ) et sa complexité multiplicative M (ψ) sont reliées par M (ψ) ≤ R(ψ) ≤ 2M (ψ) Preuve. La première inégalité est évidente. Pour la seconde considérons un programme quadratique comme dans le lemme 7.3.10 qui calcule ψ(u, v) avec m = M (ψ) multiplications essenteielles. On a donc Xm ψ(u, v) = α` (u, v) · β` (u, v) · g` `=1 où les α` et β` sont dans H ? . Remarquons qu’on a α` (u, v) · β` (u, v) = α` (u, 0) · β` (u, 0) + α` (0, v) · β` (0, v)+ α` (u, 0) · β` (0, v) + α` (0, v) · β` (u, 0) Puisque ψ(u, v) est bilinéaire on a ψ(u, 0) = 0 et on peut supprimer les termes α` (u, 0) · β` (u, 0) · g` dont la somme est nulle. Même chose avec ψ(0, v) = 0 et finalement on obtient Xm ψ(u, v) = (α` (u, 0) · β` (0, v) + β` (u, 0) · α` (0, v)) · g` `=1 et ceci montre que R(ψ) ≤ 2r. t u On en déduit le résultat suivant qui relie le rang tensoriel et l’exposant de la multiplication des matrices carrées. 7.3. Complexité bilinéaire 207 Théorème 7.4 L’exposant ω de la multiplication des matrices carrées est égal à la borne inférieure des exposants α qui vérifient, pour au moins un entier n, l’inégalité R hn, n, ni ≤ nα . On a aussi ω = lim n→∞ log R hn, n, ni log M (hn, n, ni) = lim n→∞ log n log n où chaque suite converge vers sa borne inférieure. Preuve. Il est clair d’après la proposition 7.3.12 que les deux suites considérées ont la même borne inférieure β. On a le résultat direct plus précis dans le théorème 7.3 : tout exposant α est acceptable strictement supérieur à la borne inférieure des log Rloghn,n,ni n pour la multiplication des matrices carrées. Pour la réciproque on considère un α > β. Pour un n0 assez grand on a un programme d’évaluation sans division de longueur < nα0 /2 qui calcule l’application quadratique hn0 , n0 , n0 i. A fortiori sa longueur multiplicative est < nα0 /2 et on a R hn0 , n0 , n0 i ≤ 2M (hn0 , n0 , n0 i) < nα0 . t u Malgré la relation très étroite entre M (ψ) et R(ψ), c’est seulement la considération du rang tensoriel qui permet de démontrer les résultats de base concernant l’exposant de la multiplication des matrices. Cela tient à ce que la proposition 7.3.7 ne serait pas vraie en remplaçant le rang tensoriel par la longueur multiplicative. Le fait d’interdire la commutation dans les tenseurs est ce qui permet de traiter correctement le produit des matrices par blocs. 7.3.4 Extension du corps de base Soient K un corps, E, F , G trois K – espaces vectoriels de dimension finie. Soit ψ ∈ Bil(E, F ; G). Si L est une extension de K on peut étendre ψ à L de manière naturelle. Nous nous en tiendrons ici à un point de vue pragmatique et purement calculatoire. Si (ei )i∈I , (fj )j∈J , (g` )`∈L sont des bases de E, F , G et si X ψ = γij` e?i ⊗ fj? ⊗ g` i,j,` nous considérons trois L – espaces vectoriels EL , FL , GL ayant les mêmes bases et l’extension ψL de ψ est définie par la même égalité. Comme tout calcul bilinéaire dans K est aussi un calcul bilinéaire dans L on a nécessairement l’inégalité RL (ψL ) ≤ RK (ψ), mais il se peut 208 7. Multiplication rapide des matrices que l’utilisation de constantes dans L puisse faciliter le calcul de ψ et l’inégalité peut être stricte. Nous allons cependant voir dans ce paragraphe que l’exposant de la multiplication des matrices ne peut pas changer lorsqu’on passe d’un corps K à une extension L. Lemme 7.3.13 Avec les notations précédentes 1) Si L est une extension finie de K de degré n il existe un entier m ≤ n3 tel que pour toute application bilinéaire ψ on a RK (ψ) ≤ m RL (ψL ). En particulier l’exposant de la multiplication des matrices ne change pas lorsqu’on passe de K à L. 2) Si L = K(t) (corps des fractions rationnelles en t) et si K est infini, on a l’égalité RL (ψL ) = RK (ψ). Preuve. Dans le cas 2) la famille finie des constantes cs (t) dans L utilisées par le circuit arithmétique peut être remplacée par des constantes cs (a) où a ∈ K est choisi de manière à n’annuler aucun des dénominateurs. Dans le cas 1) considérons une base b = (1, b2 , . . . , bn ) de L lorsqu’on le voit comme K – espace vectoriel. La multiplication dans L représente une application bilinéaire sur K lorsqu’elle est traduite dans les coordonées sur la base b. Cette application bilinéaire L × L → L peut être réalisée par m ≤ n3 multiplications essentielles dans K. En fait la constante m peut être prise égale au rang tensoriel de cette application bilinéaire, qui est en général noté RK (L). Tout calcul bilinéaire dans L peut alors être mimé par un calcul bilinéaire dans K de la manière suivante. Chaque variable xi sur L est remplacée par n variables xi,n sur K qui représentent les coordonnées de xi sur la base b. Seules les multiplications essentielles du calcul dans L produisent des multiplications essentielles dans K. Dans cette simulation, le nombre de multiplications essentielles est multiplié par la constante m. Si maintenant α > ωL il existe un entier n tel que RL hn, n, ni < nα , donc pour une puissance convenable N = n` on a RK hN, N, N i ≤ RK (L) · RL hN, N, N i < N α , donc α ≥ ωK . t u On en déduit le résultat suivant dû à Schönhage ([82]). Proposition 7.3.14 L’exposant de la multiplication des matrices carrées sur un corps K ne dépend que de la caractéristique de K. Preuve. Il suffit de prouver que l’exposant ne change pas lorsqu’on passe d’un corps premier K (Q ou l’un des Fp ) à l’une de ses extensions 7.4. Calculs bilinéaires approximatifs 209 L. Supposons qu’on ait RL (hn, n, ni) ≤ r ≤ nα , c’est-à-dire qu’on ait sur le corps L une égalité Xr X α` ⊗ β` ⊗ c` αij ⊗ βjk ⊗ cik = i,j,k∈{1,...,n} `=1 On peut considérer les coordonnées des α` , β` , c` sur les bases αij , βij , cij comme 3rn2 indéterminées zs . L’égalité des deux tenseurs ci-dessus signifie que ces indéterminées vérifient un système de n6 équations polynomiales de degré 3 dont tous les coefficients sont égaux à 1 ou 0. Maintenant, le lecteur ou la lectrice connaı̂t peut-être le beau résultat suivant 7 : lorsqu’un système d’équations polynomiales sur un corps K admet une solution dans une extension L, alors il admet une solution dans une extension finie de K. On est donc ramené au premier cas du lemme précédent. t u Remarque 7.3.15 L’exposant ωK peut donc être étudié en prenant pour K la clôture algébrique de Q ou de Fp . Lorsqu’on a affaire à un corps algébriquement clos K le rang tensoriel RK (hn, n, ni) est calculable en principe (sinon en pratique) car savoir si RK (hn, n, ni) ≤ m revient à déterminer si un système d’équations algébriques admet ou non une solution (comme dans la preuve de la proposition 7.3.14). Et on sait, en principe, répondre à ce genre de questions par un algorithme d’élimination. On ne sait cependant pas grand chose concernant ωK . Cet exposant mythique est un nombre compris entre 2 et 2, 38. Mais on ne sait apparemment toujours rien sur la vitesse avec laquelle la suite log RK (hn, n, ni)/ log n (cf. théorème 7.4) converge vers ωK . Il se pourrait que la vitesse de convergence soit si lente que le nombre ωK serait définitivement impossible à calculer. 7.4 7.4.1 Accélération par la méthode des calculs bilinéaires approximatifs Méthode de Bini La méthode des calculs bilinéaires approximatifs est inspirée des méthodes numériques approchées, elle a été inventée par Bini et elle 7. Ce résultat admet de nombreuses preuves, dont certaines tout à fait explicites. Essentiellement c’est un résultat de la théorie de l’élimination. On peut le faire découler du Nullstellensatz de Hilbert, du lemme de normalisation de Noether ou encore de la théorie des bases de Gröbner. Il se trouve dans les bons livres d’algèbre. 210 7. Multiplication rapide des matrices a quelque parenté avec l’élimination des divisions de Strassen. Elle a débloqué la situation pour l’exposant ω de la multiplication des matrices. Un exemple est le produit de deux matrices A, B ∈ A2×2 avec la première qui a son coefficient a2,2 nul. On schématise ce produit sous la forme suivante (figure 7.1). Ce produit matriciel à trous correspond Figure 7.1 – Produit matriciel à trou de Bini à un tenseur de rang 6 qui s’écrit avec la notation des polynômes non commutatifs ψ = a11 b11 c11 + a12 b21 c11 + a21 b11 c21 + a11 b12 c12 + a12 b22 c12 + a21 b12 c22 On introduit (pour les mêmes variables) un tenseur de rang 5 perturbé par des ε xij (avec x = a, b ou c). ϕ(ε) = (a12 + εa11 ) (b12 + εb22 ) c21 + (a21 + εa11 ) b11 (c11 + εc12 ) −a12 b12 (c11 + c21 + εc22 ) − a12 (b11 + b12 + εb21 ) c11 +(a12 + a21 ) (b12 + εb21 ) (c11 + εc22 ) Lorsqu’on développe on obtient ϕ(ε) = ε ψ + ε2 θ(ε) Numériquement on a donc lorsque ε est suffisamment petit ψ ' ϕ(ε)/ε. On dit que ϕ constitue une approximation d’ordre 1 de ψ. On peut transformer ceci en un calcul purement formel dans l’anneau des développements limités à l’ordre 1 en ε comme lorsqu’on élimine les divisions à la Strassen. Naturellement, il n’y a pas de miracle, cela ne donne pas une écriture de ψ comme somme de 5 tenseurs élémentaires. Mais il y a néanmoins quelque chose à gagner en prenant un peu de recul et en analysant en détail ce qui se passe. Tout d’abord en appliquant le schéma suivant (où on fait un produit par blocs non rectangulaires !) on constate que le produit matriciel h3, 2, 2i peut être réalisé de manière approximative (à l’ordre 1) par une somme de 10 tenseurs élémentaires au lieu de 12. Grâce au produit de matrices par blocs rectangulaires on pourra alors réaliser h12, 12, 12i de manière approximative (à un ordre 7.4. Calculs bilinéaires approximatifs 211 Figure 7.2 – Produit matriciel plein convenable, nous allons définir cela un peu plus loin) comme somme de 103 tenseurs élémentaires au lieu des 123 nécessaires dans la méthode usuelle. Enfin il reste à réaliser que lorsqu’on passe (grâce au produit par blocs) à h12n , 12n , 12n i l’ordre d’approximation ne croı̂t pas trop vite et que le coût du décryptage d’un calcul bilinéaire approximatif en un calcul bilinéaire exact devient négligeable devant 10εn pour n’importe quel ε > 0. Tout ceci ramène l’exposant ω à 3 log(10)/ log(12) < 2, 78 < 3 log(7)/ log(8) = 2, 807 Nous devons maintenant donner des définitions et énoncés plus précis pour vérifier que ce plan de travail fonctionne bien. Définition 7.4.1 Soient K un corps, E, F , G trois K – espaces vectoriels de dimensions finies. Soit ψ ∈ Bil(E, F ; G). Soit L = K[ε] l’anneau des polynômes en la variable ε sur K. Un élément ϕ(ε) de Bil(EL , FL ; GL ) est appelé une approximation d’ordre q de ψ si on a ϕ(ε) ≡ εq ψ modulo εq+1 Un calcul bilinéaire de ϕ(ε) est appelé un calcul bilinéaire approximatif de ψ à l’ordre q. On appelle rang tensoriel marginal de ψ à l’ordre q le plus petit rang possible pour un calcul bilinéaire approximatif de ψ à l’ordre q. On le note R(ψ, q). Enfin, le rang tensoriel marginal de ψ est le plus petit des R(ψ, q) et il est noté R(ψ). Nous dirons aussi plus simplement le rang marginal de ψ. Remarque 7.4.2 Nous utilisons ici des calculs bilinéaires sur un anneau, comme il était indiqué dans la remarque 7.3.4. De même l’extension de ψ à l’anneau K[ε] se fait comme dans le cas d’une extension du corps de base (cf. page 207). Remarque 7.4.3 Il est clair que lorsque q augmente, le rang tensoriel marginal à l’ordre q d’une application bilinéaire ne peut que diminuer, 212 7. Multiplication rapide des matrices autrement dit R(ψ) = R(ψ, 0) ≥ R(ψ, 1) ≥ · · · ≥ R(ψ, q) ≥ R(ψ, q + 1) · · · Le rang tensoriel marginal à l’ordre q d’une application bilinéaire est a priori nettement plus difficile à calculer que son rang tensoriel. Le rang marginal est encore plus difficile à établir. En fait on est satisfait quand on a établi une bonne majoration du rang marginal en explicitant un calcul bilinéaire approximatif. Quel est le coût d’un décryptage d’un calcul bilinéaire approximatif à l’ordre q ? Nous avons déjà fait un calcul analogue dans la preuve de la proposition 3.1.6 qui concernait la possibilité d’une mise en forme simplifiée des circuits arithmétiques sans division. On commence par considérer que le calcul bilinéaire de ϕ(ε) se passe non pas sur l’anneau L = K[ε] mais sur l’anneau des développements limités à l’ordre q. Ensuite on simule toute variable Z, qui représente un élément de K[ε] modulo εq , par q +1 variables Z [k] dans K (0 ≤ k ≤ q) qui représentent les coefficients de Z en dessous du degré q. Quand on doit calculer le coefficient de εq dans un tenseur X(ε) Y (ε) Z(ε) on voit qu’on doit faire la somme des X [i] Y [j] Z [k] pour tous les triplets (i, j, k) dont la somme vaut q. Il y a au plus (q + 1)(q + 2)/2 triplets de ce type. En termes de rang tensoriel, cela signifie donc que le rang tensoriel de ψ est majoré par (q + 1)(q + 2)/2 fois son rang marginal à l’ordre q. Nous avons donc établi le lemme suivant. Lemme 7.4.4 Soit ψ une application bilinéaire définie sur un corps K. Si un calcul bilinéaire approximatif à l’ordre q de ψ a une complexité bilinéaire `, on en déduit par décryptage un calcul bilinéaire de ψ de complexité bilinéaire ≤ ` · (q + 1)(q + 2)/2. En bref R(ψ) ≤ (q + 1)(q + 2) R(ψ, q) 2 ≤ q 2 R(ψ, q) si q≥4  Maintenant nous devons examiner comment se comporte le rang marginal du produit matriciel lorsqu’on utilise des produits par blocs. Proposition 7.4.5 (Rang tensoriel marginal de la multiplication des matrices) (1) Le rang marginal R(hm, n, pi , q) est une fonction croissante de chacun des entiers m, n, p et décroissante de l’entier q. 7.4. Calculs bilinéaires approximatifs 213 (2) R(hmm0 , nn0 , pp0 i , q+q 0 ) ≤ R(hm, n, pi , q)·R(hm0 , n0 , p0 i , q 0 ). En particulier avec N = mnp on a n, pi , q))3 R(hN, N, N i , 3q) ≤ (R(hm, P (3) R(hm1 + m2 , n1 + n2 , p1 + p2 i , q) ≤ i,j,k∈{1,2} R(hmi , nj , pk i , q)  (4) R n` , n` , n` , `q ≤ R(hn, n, ni , q)` (5) R(hm, n, pi , q) est invariant par permutation des entiers m, n, p. Preuve. Tout se passe comme avec le rang tensoriel usuel dans la preuve de la proposition 7.3.7. Le seul point qui demande un peu d’attention est le point (2). La meilleure manière de le comprendre est (encore une fois) de prendre du recul. Il faut prendre du recul sur ce que représente le tenseur hm1 m2 , n1 n2 , p1 p2 i par rapport aux tenseurs hm1 , n1 , p1 i et hm2 , n2 , p2 i. Lorsque nous voyons une matrice A de type m1 m2 × n1 n2 comme une matrice de type m1 × n1 ayant pour entrées des matrices Aij de type m2 × n2 nous repérons une entrée de la grosse matrice par deux paires d’indices ((i1 , j1 ), (i2 , j2 )) correspondant au couple d’indices (i1 (m2 − 1) + i2 , j1 (n2 − 1) + j2 ) comme dans l’exemple décrit par la figure 7.4.1 avec (m1 , n1 ) = (5, 6), (m2 , n2 ) = (3, 4), (i1 , i2 ) = (3, 1) et (j1 , j2 ) = (4, 2). (4, 2) (3, 1) s Figure 7.3 – Numérotation par blocs Cependant la mise en ligne de la paire (i1 , i2 ) sous forme i1 (m2 −1)+ i2 , si elle est indispensable au dessin et à une première compréhension des choses, est plutôt un obstacle pour ce qui concerne la compréhension du calcul (( emboité )) que représente un produit par blocs. Prenons en 214 7. Multiplication rapide des matrices effet les indices dans la grande matrice sous forme des couples (i, j) = ((i1 , i2 ), (j1 , j2 )) comme dans la figure 7.4.1 (et non pas (i1 (m2 − 1) + i2 , j1 (n2 − 1) + j2 ) ni non plus ((i1 , j1 ), (i2 , j2 ))). Nous obtenons, en notation de polynômes non commutatifs : X hm1 m2 , n1 n2 , p1 p2 i = ai,j bj,k ci,k i,j,k (où la somme est prise sur i ∈ I1 × I2 , j ∈ J1 × J2 , k ∈ K1 × K2 pour des ensembles d’indices de cardinalités convenables). Alors nous avons l’égalité : hm1 m2 , n1 n2 , p1 p2 i = hm1 , n1 , p1 i hm2 , n2 , p2 i où P hm1 , n1 , p1 i = a b c et Pi1 ,j1 ,k1 0i1 ,j1 0j1 ,k1 0i1 ,k1 hm2 , n2 , p2 i = i2 ,j2 ,k2 ai2 ,j2 bj2 ,k2 ci2 ,k2 (nous avons mis des 0 pour le cas où les ensembles d’indices dans le premier tenseur ne seraient pas disjoints de ceux du second) à condition de respecter les règles de calcul suivantes x(i1 ,i2 ),(j1 ,j2 ) = xi1 ,j1 x0i2 ,j2 xi1 ,j1 yi02 ,j2 = yi02 ,j2 xi1 ,j1 (x vaut pour a, b ou c) (idem avec x et y 6= x) Une fois ceci constaté, nous n’avons même plus besoin de penser au calcul emboité que représente le produit par blocs. Nos nouvelles règles de calcul fonctionnent toutes seules et produisent automatiquement le résultat (2) aussi bien dans la proposition 7.3.7 que dans la proposition 7.4.5. Nous sommes en effet ramenés maintenant à la constatation banale suivante concernant les développements limités : le premier terme non nul du produit de deux développements limités est le produit des premiers termes non nuls de chacun des deux développements limités. Et les ordres des deux développements limités s’ajoutent. t u Le raisonnement fait au début de ce paragraphe, en tenant compte de la proposition 7.4.5 et du lemme 7.4.4 donne alors le résultat de Bini. Théorème 7.5 (1) S’il existe n et r tels que R hn, n, ni ≤ r alors log r ω n ≤ r, c’est-à-dire ω ≤ log n. (2) S’il existe m, n, p tels que R hm, n, pi ≤ r alors (mnp)ω/3 ≤ r, r c’est-à-dire ω ≤ 3 loglogmnp . 7.4. Calculs bilinéaires approximatifs 215 En bref, pour ce qui concerne l’exposant ω, une inégalité R hm, n, pi ≤ r donne le même résultat qu’une inégalité R hm, n, pi ≤ r. On pourra remarquer que la preuve du théorème 7.5 est tout à fait explicite. Si on connait un calcul bilinéaire approximatif à l’ordre q qui utilise r multiplications essentielles pour le produit matriciel hm, n, pi r et si α > 3 loglogmnp alors on sait construire un entier N et un calcul bilinéaire pour le produit matriciel hN, N, N i qui utilise moins de N α multiplications essentielles. Corollaire 7.4.6 On a pour l’exposant de la multiplication des matrices carrées ω ≤ 3 log 10/ log 12 < 2.7799. 7.4.2 Une première amélioration décisive de Schönhage La méthode de Bini n’a pas donné dans un premier temps une amélioration très importante de l’exposant ω mais elle a ouvert la voie aux améliorations suivantes, beaucoup plus substantielles. Dans la méthode de Strassen on remplace pour calculer le produit matriciel h2, 2, 2i le calcul bilinéaire avec 8 multiplications (correspondant à la définition du produit) par un calcul bilinéaire avec seulement 7 multiplications essentielles, et on obtient ω ≤ 3 log 7/ log 8. Dans la méthode de Bini, on utilise un produit de matrices à trous dans lesquel les 6 multiplications qui interviennent dans la définition du produit matriciel peuvent être remplacées (dans un calcul bilinéaire approximatif) par seulement 5 multiplications essentielles. Cependant au lieu d’aboutir à ω ≤ 3 log 5/ log 6 comme dans la méthode de Strassen, on a abouti à ω ≤ 3 log 10/ log 12. Schönhage a pensé qu’il y avait là quelque chose d’immoral et il a obtenu dans un travail mémorable (voir [82]) l’amélioration décisive suivante. Théorème 7.6 Si dans un produit de matrices à trous, on est capable de remplacer, dans un calcul bilinéaire approximatif, les ρ multiplications qui interviennent dans la définition du produit matriciel par seulog θ lement θ multiplications essentielles, alors ω ≤ 3 log ρ . En particulier 5 ω ≤ 3 log log 6 ≤ 2, 695. Le reste de ce paragraphe est consacré à la preuve de ce théorème, selon les lignes de [82]. La preuve est faite sur un corps K infini, ce qui est légitime d’après la proposition 7.3.14. Le plus simple est de commencer sur un exemple. Nous allons voir directement sur l’exemple de Bini quelle est la machinerie mise en œuvre par Schönhage. La méthode itérative de 216 7. Multiplication rapide des matrices Strassen donne des produits matriciels à trous successifs du type suivant (figures 7.4 et 7.5). Le produit matriciel à trous itéré une fois de la figure Figure 7.4 – Bini itéré une fois 7.4 peut être obtenu par un calcul bilinéaire approximatif d’ordre 2 et de rang 52 (au lieu de 62 ). Ceci se démontre comme le point (2) dans la proposition 7.4.5. Le produit matriciel à trous itéré deux fois (figure 7.5) Figure 7.5 – Bini itéré deux fois peut être obtenu par un calcul bilinéaire approximatif d’ordre 3 et de rang 53 . Ceci se démontre aussi comme le point (2) dans la proposition 7.4.5. Plus généralement, la même preuve donne. Proposition 7.4.7 Notons ϕ l’application bilinéaire qui correspond à un produit matriciel à trou (A, B) 7→ A B où certaines entrées fixées de A et B sont nulles et les autres sont des variables inépendantes. Notons ϕ⊗k le produit matriciel à trou obtenu en itérant k − 1 fois le produit ϕ. Alors on a   R ϕ⊗k ≤ (R(ϕ))k 7.4. Calculs bilinéaires approximatifs 217 et   R ϕ⊗k , kq ≤ (R(ϕ, q))k De même si on emboı̂te dans un produit par blocs deux produits matriciels à trous ϕ et ψ et qu’on note ϕ ⊗ ψ le produit matriciel à trous que l’on obtient, on a les inégalités R (ϕ ⊗ ψ) ≤ R(ϕ) R(ψ) et  R ϕ ⊗ ψ, q + q 0 ≤ R(ϕ, q) R(ψ, q 0 ) Revenons à notre exemple. Dans le produit de la figure 7.5 nous pouvons sélectionner les 3 colonnes 2, 3, 5 de la première matrice, qui contiennent chacune 4 véritables entrées et les lignes 2, 3, 5 de la deuxième, qui contiennent 8 entrées. On obtient le produit à trous U × V = W suivant (figure 7.6). Du point de vue du calcul bilinéaire approximatif, cette extraction de lignes et de colonnes revient simplement à remplacer des variables par des 0 et donc ne peut que le simplifier. Si nous Figure 7.6 – Produit à trous extrait de (( Bini itéré deux fois )) considérons maintenant une matrice fixée G ∈ K4×8 l’application linéaire µG : U 7→ GU est en fait une application linéaire entre deux espaces vectoriels de dimension 12. Admettons un moment que les coefficients de G peuvent être choisis de manière que µG soit un isomorphisme (lemme de compression). En posant GU = U 0 on voit que le produit matriciel sans trou h4, 3, 8i est réalisé sous forme (U 0 , V ) 7→ U 0 × V par un calcul bilinéaire approximatif d’ordre 3 et de rang 53 : décrypter 218 7. Multiplication rapide des matrices U 0 pour obtenir U (sans aucune multiplication essentielle) puis calculer U ×V. De manière plus générale, nous pouvons considérer le produit à trous Ak × Bk obtenu en itérant k − 1 fois le processus de Bini. La matrice Ak est de plus en plus creuse. Dans chaque colonne, le nombre d’entrées véritables est égal à une puissance de 2. En sélectionnant les colonnes ayant un même nombre d’entrées (disons mk colonnes avec 2hk entrées non nulles), on obtient un produit à trous Uk × Vk = Wk à l’intérieur du format 2k , mk , 2k . Chaque colonne de Uk a exactement 2hk entrées véritables. En appliquant le lemme de compression, nous choisissons une h k matrice convenable Gk ∈ K2 k ×2 nous remplaçons Uk par Uk0 = Gk Uk et nous obtenons un produit matriciel sans trou 2hk , mk , 2k sous la forme (Uk0 , Vk ) 7→ Uk0 × Vk par un calcul bilinéaire approximatif d’ordre k et de rang 5k . Quel est le comportement asymptotique de ce calcul ? On peut facilement se convaincre que le produit mk 2hk est obtenu comme l’un des termes du développement de (1 + 2)k selon la formule du binôme. Cela tient à ce que la matrice à trous initiale possède une colonne à deux entrées et une autre à une entrée. Comme la formule du binôme est une somme de (k + 1) termes, le plus grand de ces termes est certainement supérieur à 3k /(k + 1). Donc par un choix optimal de hk nous obtenons Nk = 2hk · mk · 2k ≥ 6k k+1 Donc en appliquant la proposition 7.4.7 R (hNk , Nk , Nk i , 3k) ≤ 53k d’où en appliquant le lemme 7.4.4 R hNk , Nk , Nk i ≤ 9k 2 53k 5 ce qui donne bien par passage à la limite ω ≤ 3 log log 6 . Avant de passer à la preuve dans le cas général, nous montrons le lemme de compression. Lemme 7.4.8 (lemme de compression) Soit A = (aij ) une (( matrice à trous )) de format m × n dont les entrées sont ou bien nulles ou bien des variables indépendantes. Nous supposons que la matrice possède p variables et m − p entrées nulles dans chaque colonne. Si on spécialise les variables dans le corps K on obtient un espace vectoriel EA de 7.4. Calculs bilinéaires approximatifs 219 dimension n p. On suppose le corps K infini. Alors il existe une matrice G ∈ Kp×m telle que l’application linéaire µG,A : EA −→ Kp×n , U 7−→ G U soit bijective. Preuve. Les colonnes de U sont transformées indépendamment les unes des autres. Chaque colonne Uj de la matrice U , en ne gardant que les entrées non nulles, est transformée selon le schéma Uj 7−→ Gj Uj où Gj est une matrice carrée extraite de G en ne gardant que p colonnes de G. Il s’ensuit que l’application linéaire µG,A est bijective si et seulement si les matrices Gj sont inversibles. Pour cela, il suffit que p colonnes distinctes de G soient toujours indépendantes. Ce problème de géométrie combinatoire admet toujours une solution sur un corps ayant suffisamment d’éléments. Si on a déjà construit une matrice convenable G avec ` ≥ p colonnes, pour rajouter une colonne, il faut choisir un vecteur en dehors des hyperplans définis par n’importe quel système de p − 1 colonnes extraites de G. t u Passons maintenant à la preuve du cas général. Nous supposons que nous avons un produit de matrice à trous A × B par exemple du style suivant (figure 7.7) qui peut être réalisé par un calcul bilinéaire approxi- Figure 7.7 – Un exemple arbitraire de produit matriciel à trous matif de manière économique. Supposons que les colonnes successives de A, au nombre de t contiennent respectivement m1 , m2 , . . ., mt entrées véritables. Supposons que les t lignes successives de B contiennent respectivement n1 , n2 , . . ., nt entrées véritables. A priori ce produit à trous réclame ρ = m1 n1 + · · · + mt nt multiplications : le tenseur qui correspond à sa définition est une somme de ρ tenseurs élémentaires (dans l’exemple ci-dessus, t = 3, (m1 , m2 , 220 7. Multiplication rapide des matrices m3 ) = (2, 2, 1), (n1 , n2 , n3 ) = (1, 2, 4) et ρ = 10). Supposons qu’un calcul bilinéaire approximatif à l’ordre ` et de rang θ permette de réaliser ce produit à trous. Si on itère k − 1 fois ce calcul bilinéaire approximatif, on obtient un nouveau produit de matrices à trous Ak × Bk . Par exemple pour A2 × B2 , on obtient le produit à trous suivant (figure 7.8). Une colonne de Ak doit être indexée par un k-uple j = (j1 , . . . , jk ) Figure 7.8 – L’exemple précédent itéré une fois d’éléments de {1, . . . , t}. Une telle colonne contient alors mj1 · · · mjk = mu1 1 · · · mut t entrées non nulles, où chaque ui est égal au nombre des js égaux à i. De même une ligne de Bk doit être indexée par un k-uple j = (j1 , . . . , jk ) d’éléments de {1, . . . , t} et elle contient nj1 · · · njk entrées non nulles. Parmi toutes les colonnes de Ak on décide de sélectionner toutes celles qui fournissent une certaine liste d’exposants (u1 , . . . , ut ). En particulier elles ont toutes le même nombre µk = mu1 1 · · · mur t d’entrées non nulles (avec u1 + · · · + ut = k). Le nombre des colonnes en question est égal au coefficient multinomial   k k! λk = = u1 , . . . , ut u1 ! · · · ut ! De même, nous sélectionnons parmi les lignes de Bk toutes celles correspondant aux mêmes indices (qui sont des k-uples j = (j1 , . . . , jk )). Elles ont toutes le même nombre d’entrées non nulles νk = nu1 1 · · · nut t . Nous obtenons de cette manière un produit de matrice à trous Uk × Vk . Comme les colonnes de Uk ont toutes le même nombre µk d’entrées non nulles, on peut utiliser le lemme de compression. Même chose pour Vk en tenant compte du fait que toutes les lignes ont le même nombre 7.4. Calculs bilinéaires approximatifs 221 νk d’entrées non nulles. En définitive nous obtenons un produit matriciel sans trou de type hµk , λk , νk i qui est réalisé par un calcul bilinéaire approximatif d’ordre k` et de rang ≤ θk . A quoi est égal µk · λk · νk ? C’est l’un des termes du développement multinomial de (m1 n1 + · · · + mt nt )k = ρk . Si on choisit le terme le plus grand dans cette somme on obtient donc Mk = µk · λk · νk ≥ ρk ≥ k+t t−1 ρk (k + 1)t−1  car il y a k+t t−1 termes dans cette somme. On termine comme dans le cas particulier examiné au début : R (hMk , Mk , Mk i , 3k`) ≤ θ3k , R hMk , Mk , Mk i ≤ 9 k 2 `2 θ3k log θ et par passage à la limite en appliquant le théorème 7.4, ω ≤ 3 log ρ. Remarque 7.4.9 Dans [82] Schönhage indique des produits matriciels à trous avec un rang marginal plus avantageux que celui de Bini, ce qui donne ω ≤ 2, 6087. Mais ce dernier résultat est surpassé par la formule asymptotique qu’il obtient ensuite et que nous exposons dans le paragraphe suivant. Remarque 7.4.10 Dans le lemme 7.4.4 il est possible de remplacer (q+ 1)(q + 2)/2 par 1 + 6q. Même avec cette amélioration, c’est uniquement pour des entiers N très grands que la procédure de Bini aussi bien que celle de Schönhage fournissent un meilleur calcul bilinéaire pour hN, N, N i que celui qui découle de la procédure originale de Strassen. Ces méthodes ne sont donc pas implémentées sur machine. 7.4.3 Sommes directes d’applications bilinéaires Approfondissant son analyse des produits de matrices à trous, Schönhage a remarqué que certains produits du type ci-dessous (figure 7.9) permettent de construire à partir d’un calcul bilinéaire approximatif des calculs bilinéaires exacts donnant un meilleur exposant pour la multiplication des matrices carrées que celui établi dans le théorème 7.6. L’exemple de la figure 7.9 correspond à la somme disjointe (on peut dire aussi somme directe ou encore juxtaposition) des deux applications bilinéaires h1, 2, 1i et h3, 1, 3i. De manière générale, la somme directe de 222 7. Multiplication rapide des matrices Figure 7.9 – Somme directe de deux produits matriciels deux applications bilinéaires ϕ1 : E1 × F1 → G1 et ϕ2 : E2 × F2 → G2 est l’application bilinéaire ϕ : (E1 ⊕ E2 ) × (F1 ⊕ F2 ) −→ (G1 ⊕ G2 ) définie par ϕ((x1 , y1 ), (x2 , y2 )) = (ϕ1 (x1 , y1 ), ϕ2 (x2 , y2 )). Du point de vue des calculs bilinéaires, un calcul bilinéaire possible pour la somme disjointe consiste à faire seulement les deux calculs en parallèle avec toutes les variables distinctes. Notation 7.4.11 On note ϕ1 ⊕ ϕ2 la somme directe des applications bilinéaires ϕ1 et ϕ2 . On note ` ϕ pour la somme directe de ` exemplaires de ϕ. On fait alors les remarques suivantes. Le premier lemme est à la fois simple et crucial. Lemme 7.4.12 Supposons R hf, f, f i ≤ s et R(s Alors R hf m, f n, f pi ≤ r. hm, n, pi) ≤ r. Preuve. L’application bilinéaire hf m, f n, f pi peut être réalisée comme un produit par blocs, chacune des deux matrices A et B qu’on multiplie étant découpée en f 2 blocs de même format. Les f 3 multiplications correspondantes de type hm, n, pi qui sont a priori nécessaires pour ce produit par blocs peuvent être remplacées par seulement s produits (entre combinaisons linéaires convenables des blocs), selon le schéma fourni par le calcul bilinéaire qui montre R hf, f, f i ≤ s. t u Lemme 7.4.13 (1) R(ss0 hmm0 , nn0 , pp0 i) ≤ R(s hm, n, pi) · R(s0 hm0 , n0 , p0 i). En particulier avec N = mnp on a R(s3 hN, N, N i) ≤ (R(s hm, n, pi))3 (2) R(ss0 hmm0 , nn0 , pp0 i , q+q 0 ) ≤ R(s hm, n, pi , q)·R(s0 hm0 , n0 , p0 i , q 0 ). En particulier avec N = mnp on a R(s3 hN, N, N i , 3q) ≤ (R(s hm, n, pi , q))3 7.4. Calculs bilinéaires approximatifs 223 Preuve. C’est toujours la méthode du produit par blocs, appliquée avec les produits matriciels à trous correspondants. On peut considérer qu’il s’agit d’un cas particulier de la proposition 7.4.7. t u On en déduit la proposition suivante qui généralise le théorème 7.5. Proposition 7.4.14 S’il existe s, m, n, p, r tels que R(s hm, n, pi) ≤ r alors s (mnp)ω/3 ≤ r, c’est-à-dire ω ≤ 3 log(r/s) log mnp . Autrement dit, pour ce qui concerne l’exposant ω, l’inégalité R(s hm, n, pi) ≤ r donne le même résultat qu’une inégalité R hm, n, pi ≤ r/s. Preuve. Si R(s hm, n, pi , q) ≤ r, en appliquant le lemme 7.4.13 on obtient avec N = mnp  R s3 hN, N, N i , 3q ≤ r3 puis aussi  R s3` et donc  R s3` D E  N ` , N ` , N ` , 3`q ≤ r3` D N `, N `, N ` E ≤ 9 `2 q 2 r3` . (7.3) Par passage à la limite, cela nous ramène au cas où on connaı̂t des entiers s, m, r tels que R(s hm, m, mi) ≤ r. On veut alors montrer log(r/s) ω ≤ log(r/s) log m . Posons λ = log m . Supposons tout d’abord qu’on connaisse un calcul bilinéaire qui montre que R hf, f, f i ≤ s et posons α0 = log s/ log f (α0 est un exposant acceptable). Si α0 ≤ λ on n’a rien à faire. Si α0 > λ le lemme 7.4.13 nous dit que R hf m, f m, f mi ≤ r. Donc l’exposant α1 = log r/ log f m = α0 log r/(log s + α0 log m) est acceptable pour la multiplication des matrices carrées. Un calcul simple montre alors que λ < α1 < α0 . Donc nous avons amélioré la situation en passant de α0 à α1 . Nous voyons maintenant le travail qui nous reste à faire. Primo, montrer que si on a R hf, f, f i ≤ s0 = f α0 avec un entier s0 6= s, cela n’est pas trop grave, car on peut utiliser R s` m` , m` , m` ≤ r`  α 0 avec s0k ≤ s` et le rapport de leurs et R f k , f k , f k ≤ s0k = f k logarithmes aussi proche qu’on veut de 1. Donc par le lemme 7.4.13 R f k m` , f k m` , f k m` ≤ r` , ce qui conduit à un exposant acceptable α10 = log r`/ log f k m` = α00 log r/(log s + α00 log m) 224 7. Multiplication rapide des matrices avec α00 aussi proche qu’on veut de α0 . Secundo, montrer que si on recommence, les exposants successifs αn qu’on obtient convergent bien vers λ. Nous ne ferons pas ce travail, car les détails techniques deviennent vraiment trop lourds. t u La conjecture additive de Strassen On a évidemment R(ϕ1 ⊕ ϕ2 ) ≤ R(ϕ1 ) + R(ϕ2 ) et R(ϕ1 ⊕ ϕ2 , q) ≤ R(ϕ1 , q) + R(ϕ2 , q) . Une conjecture de Strassen est que la première inégalité est en fait toujours une égalité. On appelle cette conjecture la conjecture additive (pour le rang tensoriel des applications bilinéaires). Bien que plausible, cette conjecture a été ébranlée par Schönhage qui a montré que la variante avec (( rang tensoriel marginal )) à la palce de (( rang tensoriel )) est fausse, d’après le résultat du lemme 7.4.15. Si la conjecture additive est vraie, ou même si seulement R(s hm, m, mi) = s R hm, m, mi pour s et m arbitraires, la preuve de la proposition 7.4.14 est beaucoupsimplifiée, car on déduit de l’équation 7.3 directement R N ` , N ` , N ` ≤ 9 `2 q 2 (r/s)3` . Mais cela ne fournirait les calculs bilinéaires demandés que si on était capable de trouver un calcul bilinéaire de rang convenable pour hm, m, mi à partir d’un calcul bilinéaire pour s hm, m, mi . Lemme 7.4.15 Pour k > 1 et m = (k − 1)2 : R(hk, 1, ki ⊕ h1, m, 1i) = k 2 + 1 < k 2 + m = R hk, 1, ki + R h1, m, 1i Preuve. Nous montrons seulement R(hk, 1, ki ⊕ h1, m, 1i) ≤ k 2 + 1. Nous représentons le produit hk, 1, ki par le polynôme non commutatif P k i=1 ai bj cj,i et le produit h1, m, 1i par le polynôme non commutatif Pm `=1 u` v` w. Pour simplifier les écritures qui suivent, nous prenons ` = (i, j) avec 1 ≤ i, j ≤ k − 1. Nous introduisons en outre les notations ui,k = vk,j = 0, uk,j = − k−1 X ui,j , vi,k = − i=1 k−1 X j=1 de sorte que m X `=1 u` v` = k−1 X i=1,j=1 ui,j vi,j = k X i=1,j=1 ui,j vi,j vi,j 7.4. Calculs bilinéaires approximatifs 225 On considère alors le polynôme non commutatif suivant (qui correspond à un calcul bilinéaire approximatif avec k 2 + 1 multiplications essentielles)  ! k k k X X X (ai + εui,j ) (bj + εvi,j ) (ε2 cj,i + w) − bj  w ai  i=1,j=1 i=1 j=1 qui, une fois développé donne   k X ε2  (ai bj cj,i + ui,j vi,j w) + ε3 Q . i=1,j=1 t u 7.4.4 L’inégalité asymptotique de Schönhage Revenons au produit à trou de la figure 7.9 qui représente la juxtaposition h2, 1, 2i ⊕ h1, 3, 1i. Si nous itérons une fois (à la Strassen) ce produit à trous, nous obtenons un nouveau produit à trou correspondant à la figure 7.10, qui peut être réorganisé, par changement de Figure 7.10 – Somme directe, itérée une fois, de deux produits matriciels numérotation des lignes et colonnes, en le produit à trou qui correspond à la figure 7.11, et nous voyons clairement que cela signifie (h2, 1, 2i ⊕ h1, 3, 1i)⊗2 ' h4, 1, 4i ⊕ 2 h2, 3, 2i ⊕ h1, 9, 1i 226 7. Multiplication rapide des matrices Figure 7.11 – Somme directe, itérée une fois et réorganisée Le lecteur ou la lectrice est invitée à réaliser par elle-même l’itération une deuxième fois, et à vérifier que (h2, 1, 2i ⊕ h1, 3, 1i)⊗3 ' h8, 1, 8i ⊕ 3 h4, 3, 4i ⊕ 3 h2, 9, 2i ⊕ h1, 27, 1i avec la parenté évidente avec la formule du binôme. Cette parenté n’est pas un hasard. C’est bien la même machinerie combinatoire qui est à l’œuvre dans les deux cas. En itérant k − 1 fois on obtiendra ⊗k (h2, 1, 2i ⊕ h1, 3, 1i) ' k   X k i=1 i D 2i , 3k−i , 2i E P où le indique une somme disjointe d’applications bilinéaires. En fait nous avons une formule du multinôme générale, où les sommes indiquent des sommes disjointes d’applications bilinéaires, et où l’isomorphisme correspond à une organisation convenable des lignes et colonnes du produit matriciel à trous correspondant au premier membre t X i=1 !⊗k hmi , ni , pi i ' X (u1 ,...,ut )  k u1 , . . . , ut  *Y t i=1 mui i , t Y i=1 nui i , t Y + pui i i=1 (la deuxième somme est prise sur tous les t-uples (u1 , . . . , ut ) tels que P ui = k). On en déduit la formule asymtotique suivante. 7.4. Calculs bilinéaires approximatifs 227 Théorème 7.7 (formule asymptotique de Schönhage) Supposons qu’on ait ! t t M X R hmi , ni , pi i ≤ r et (mi ni pi )β = r i=1 i=1 Alors on obtient pour l’exposant de la multiplication des matrices carrées ω ≤ 3 β. Preuve. Notons d’abord que le théorème 7.6 donne 2≤ω≤ log r  Pt log i=1 mi ni pi ) donc log r ≥ 2 log t. En appliquant la formule du multinôme et l’inégalité de la proposition 7.4.7 on obtient +!   *Y t t t Y Y k R mui i , nui i , pui i ≤ rk u1 , . . . , ut i=1 i=1 i=1 Pour un choix particulier de u1 , . . . , ut , nous notons ceci sous la forme R(Sk hMk , Nk , Pk i) ≤ rk ce qui nous donne, d’après la proposition 7.4.14 ω≤3 log(rk /Sk ) . log Mk Nk Pk Quel est le choix optimal de u1 , . . . , ut ? Nous considérons l’égalité !k !β  Y t t X  X k (mi ni pi )β = rk = mui i nui i pui i u1 , . . . , ut i=1 (u1 ,...,ut ) i=1  rk ≤ (k+1) La somme de droite a k+t−1 t−1 termes et donc pour le plus t−1 grand d’entre eux on obtient !β   Y t k rk ui ui ui mi ni pi = Sk (Mk Nk Pk )β ≥ (k + 1)t−1 u1 , . . . , ut i=1 ce qui donne  log rk /(Sk (k + 1)t−1 ) (t − 1) log(k + 1) ω≤3 ≤ 3β + 3 log(Mk Nk Pk ) log(Mk Nk Pk ) D’où le résultat par passage à la limite : β log(Mk Nk Pk ) est équivalent à log rk /Sk , et on a Sk < tk et r ≥ t2 . t u 228 7. Multiplication rapide des matrices Corollaire 7.4.16 L’exposant de la multiplication des matrices carrées vérifie ω ≤ 2, 5479. Preuve. On applique la formule asymptotique avec la somme disjointe h4, 1, 4i ⊕ h1, 9, 1i du lemme 7.4.15. t u 8. Algèbre linéaire séquentielle rapide Introduction Une conséquence importante de la multiplication rapide des matrices est la recherche de méthodes de calcul permettant de ramener les problèmes classiques d’algèbre linéaire à une complexité algébrique du même ordre que celle de la multiplication des matrices. Bien que nous utilisions systématiquement la multiplication rapide des matrices, qui est obtenue par un algorithme très bien parallélisé, les algorithmes obtenus dans ce chapitre ne sont pas eux-mêmes bien parallélisés. Leur profondeur est en général en O(n), ce qui explique le titre du chapitre (algèbre linéaire séquentielle rapide) Nous avons déjà vu à la section 7.2 que l’inverse d’une matrice triangulaire d’ordre n peut se calculer par une famille uniforme de circuits arithmétiques de taille O(nα ) et de profondeur O(log2 n). Nous allons dans ce chapitre montrer que, pour autant qu’on travaille sur un corps et qu’on ait droit à la division 1 , des familles de circuits arithmétiques ayant des tailles voisines peuvent être construites pour résoudre les principaux problèmes de l’algèbre linéaire sur un corps. Mais dans tous les algorithmes que nous exhiberons, le temps parallèle (la profondeur du circuit) n’est plus polylogarithmique. En outre, comme ce sont des circuits avec divisions, ils ne peuvent pas être exécutés sur toutes les entrées, et nous donnerons en général une version sous la forme d’un algorithme (( avec branchements )) (les branchements sont gouvernés par des tests d’égalité à 0 dans le corps). Dans ces algorithmes (qui ne correspondent plus à des circuits arith1. Ceci est légitime si la division n’est pas trop coûteuse en termes de complexité binaire. 230 8. Algèbre linéaire séquentielle rapide métiques proprement dits), nous aurons pour le temps séquentiel et le temps parallèle des estimations très voisines de celles obtenues pour les circuits arithmétiques avec divisions. Par exemple le calcul du déterminant et de l’inverse d’une matrice carrée (si elle est inversible) peuvent être réalisés par une famille uniforme de circuits arithmétiques avec divisions de taille O(nα ) (voir section 8.2). Ceci est une conséquence de l’algorithme séquentiel de Bunch & Hopcroft pour la LUP -décomposition que nous développons dans la section 8.1. Cet algorithme se présente naturellement sous la forme d’un algorithme avec branchements. En ce qui concerne le calcul du polynôme caractéristique plusieurs méthodes d’accélération de l’algorithme de Frobenius (section 2.8.1) assez sophistiquées ont été mises au point par Keller-Gehrig. L’algorithme avec branchements, qui utilise un temps séquentiel en O(nα log n) nécessite au préalable une méthode rapide pour la mise en forme (( échelonnée en lignes )) d’une matrice arbitraire. Ceci est expliqué dans les sections 8.3 et 8.4. Dans la dernière section 8.5, nous quittons le cadre de l’algèbre linéaire sur les corps, mais nous restons dans celui de l’algèbre linéaire séquentielle accélérée grâce à la multiplication rapide des matrices. Nous décrivons la méthode de Kaltofen, inspirée de l’algorithme probabiliste de Wiedemann, très efficace pour les matrices creuses sur des corps finis. Elle donne le meilleur temps séquentiel actuellement connu pour le calcul du déterminant, du polynôme caractéristique et de l’adjointe d’une matrice carrée sur un anneau commutatif arbitraire. L’algorithme utilise la multiplication rapide des polynômes et celle des matrices. Contrairement à l’algorithme de Wiedemann, celui de Kaltofen n’a cependant pas encore fait l’objet d’une implémentation satisfaisante. Si les algorithmes développés dans ce chapitre sont théoriquement plus rapides que les algorithmes (( usuels )) donnés au chapitre 2, il y a encore malheureusement loin de la théorie à la pratique. En fait seule la première forme de la multiplication rapide des matrices (celle de Strassen, correspondant à α = log 7 ' 2, 807) commence à être implémentée. Outre la difficulté pratique d’implémenter d’autres algorithmes de multiplication rapide des matrices, les coefficients Cα pour de meilleures valeurs de α sont trop grands. Leur implémentation ne se révèlerait efficace que pour des matrices de tailles astronomiques. 8.1. L’Algorithme de Bunch & Hopcroft 8.1 231 L’Algorithme de Bunch & Hopcroft pour la LUP-décomposition des matrices surjectives Dans la section 2.1 nous avons présenté l’algorithme 8 page 63 qui est l’algorithme séquentiel usuel (par la méthode du pivot de Gauss) pour la LUP -décomposition des matrices surjectives. La procédure de la LUP -décomposition que nous allons développer ici fait appel à la multiplication rapide des matrices. Cette procédure , que nous noterons lup, est due à Bunch et Hopcroft [11]. L’algorithme de Bunch & Hopcroft prend en entrée une matrice de rang n, A ∈ Kn×p (1 ≤ n ≤ p) et donne en sortie un triplet (L, U, P ) tel que L est une matrice unitriangulaire inférieure, U une matrice triangulaire supérieure fortement régulière et P une matrice de permutation. On écrira : lup(A, n, p) = lupn,p (A) = (L, U, P ). Pour n = 1, A est une matrice ligne de rang 1 : il existe donc un élément non nul de A occupant la i - ème place de cette ligne (1 ≤ i ≤ p). Il suffit de prendre L = [1] et U = AP où P est la matrice de permutation d’ordre p correspondant à l’échange des colonnes 1 et i. On a donc lup(A, 1, p) = ([1], A P, P ) pour la matrice P ainsi définie. Supposant la propriété vraie pour tout entier n compris entre 1 et 2ν−1 , on la démontre pour 2ν−1 < n ≤ 2ν (ν = dlog ne). On pose n0 = 2ν−1 , n1 = n − n0 et p1 = p − n0 . Pour obtenir lup(A, n, p) avec A ∈ Kn×p , on considère la partition suivante de la matrice A :   A1 A= , A1 ∈ Kn0 ×p , A2 ∈ Kn1 ×p (8.1) A2 Si A est une matrice surjective, A1 et A2 le sont également. On commence par appeler lup(A1 , n0 , p) qui donne une LUP -décomposition (L1 , U1 , P1 ) de A1 . On considère alors les partitions suivantes des matrices U1 et A2 P1−1 : ( U1 = [ V1 | B ] ∈ Kn0 ×p et A2 P1−1 = [ C | D ] ∈ Kn1 ×p (8.2) V1 ∈ Kn0 ×n0 , B ∈ Kn0 ×p1 , C ∈ Kn1 ×n0 , D ∈ Kn1 ×p1 V1 étant triangulaire supérieure et inversible (puisque U1 est fortement régulière). Posant C1 = C V1−1 et E = D − C1 B, on vérifie que :    L1 0 V1 B A= P1 . (8.3) C1 In1 0 E 232 8. Algèbre linéaire séquentielle rapide Comme la matrice E satisfait à l’hypothèse de récurrence (elle est surjective puisque A l’est), on peut appliquer la procédure lup(E, n1 , p1 ) qui donne la LUP -décomposition E = L2 U2 P2 dans laquelle U2 est une matrice n1 × p1 triangulaire supérieure fortement régulière.   In0 0 Il suffit de poser Q = et B2 := B P2−1 pour obtenir la 0 P2 décomposition :    L1 0 V 1 B2 A= Q P1 . (8.4) C1 L2 0 U2 Ce qui donne lup(A, n, p) = (L, U, P ) avec :     V1 B2 L1 0 , et P = Q P1 . , U= L= 0 U2 C1 L2 En résumé on obtient le schéma récursif de l’algorithme 8.1. Algorithme 8.1 : lup(n,p) , LUP-décomposition à la Bunch & Hopcroft pour une matrice surjective. Entrée : Une matrice surjective A ∈ Kn×p (K est un corps). Sortie : Les matrices L, U, P de la LUP-décomposition de A . Début On utilise la partition donnée en (8.1) Étape 1 : récurrence avec A1 ∈ Kn0 ×p , ν = dlog ne, n0 = 2ν−1 . (L1 , U1 , P1 ) := lup(n0 ,p) (A1 ) Étape 2 : pas d’opération arithmétique ici B2 := A2 P1−1 avec A2 ∈ Kn1 ×p , n1 = n − n0 . Étape 3 : inversion d’une matrice triangulaire supérieure régulière V2 := V1−1 avec V1 ∈ Kn0 ×n0 (cf. la partition (8.2)) Étapes 4, 5, 6 : C1 := C V2 ; F := C1 B ; E := D − F . Étape 7 : récurrence avec E ∈ Kn1 ×p1 (L2 , U2 , P2 ) := lup(n1 ,p1 ) (E) Étape 8 : pas d’opération arithmétique ici B2 := B P2−1 , P := Q P1 . Fin. L’algorithme obtenu est un algorithme avec branchements. Ceci est inévitable puisque la sortie P dépend de manière discontinue de l’entrée 8.1. L’Algorithme de Bunch & Hopcroft 233 A. Les branchements sont tous commandés par le test d’égalité à 0 dans le corps K. Notons τ (n, p) le nombre d’opérations arithmétiques exécutées par cet algorithme pour les matrices A ∈ Kn×p et π(n, p) son temps parallèle arithmétique, c’est-à-dire sa profondeur si on ne prend pas en compte les étapes de recherche d’éléments non nuls ni les produits d’une matrice par une matrice de permutation. On a alors en suivant le schéma récursif 8.1 page ci-contre les inégalités suivantes. Tout d’abord concernant le nombre d’opérations arithmétiques :  τ (n0 , p) + 4 Cα n0 α + Cα n0 α + (8.5) τ (n, p) ≤ dp1 /n0 e Cα n0 α + p1 n1 + τ (n1 , p1 ) Le terme p1 n1 correspond à la soustraction E := D − F et le terme Cα n0 α dp1 /n0 e correspond au calcul du produit C1 B dans lequel B ∈ Kn0 ×p1 et C1 ∈ Kn1 ×n0 : on peut toujours compléter C1 par des lignes de 0 pour en faire une matrice carrée et on découpe B en dp1 /n0 e blocs carrés (après lui avoir éventuellement rajouté des colonnes de 0) ; on effectue alors en parallèle dp1 /n0 e multiplications dans Kn0 ×n0 . Ensuite, concernant le temps parallèle arithmétique, on obtient de la même manière en utilisant le résultat de l’inversion des matrices triangulaires (section 7.2) : π(n, p) ≤ π(n0 , p) + Kα [(ν − 1)2 + 5 (ν − 1) + 2] + 2 + π(n1 , p1 ) (8.6) On en déduit précisément : Théorème 8.1 La LUP-décomposition d’une matrice surjective de type (n, p) sur K peut être effectuée par un algorithme (avec branchements) qui exécute un nombre d’opérations arithmétiques égal à τ (n, p) en temps parallèle (arithmétique) π(n, p) majorés par τ (n, p) ≤ lpm 1 1 lpm 2 γα ( +1) nα + n log n et π(n, p) ≤ 4 (5 Kα +1) n 2 n 2 n   1 où γα = Cα max 4 , α−2 · 2 −1 Notons que pour p = n , la taille du circuit correspondant à l’algorithme de Bunch & Hopcroft est exactement majorée par γα nα + 12 n2 log n . 234 8. Algèbre linéaire séquentielle rapide Preuve. Le calcul de lup(A, n, p) se fait de manière récursive. Nous donnons les majorations pour le cas où n = 2ν , et il est clair que si n < 2ν , le calcul ne peut être que plus rapide. Pour le temps parallèle arithmétique on a π(1, p) = 0 donc, vue la récurrence (8.6), le résultat ne dépend pas de p et π(n, p) = π(n) = π(2ν ) ≤ 2 π(2ν−1 ) + Kα [(ν − 1)2 + 5 (ν − 1) + 2] + 2 . La relation de récurrence f (ν) = 2f (ν−1)+c [(ν−1)2 +5 (ν−1)]+2 (c+1) avec f (0) = 0 est résolue par Maple en f (ν) = (10 c + 2) (2ν − 1) − cν 2 − 7 c ν majoré par (10 c + 2) 2ν = 2 (5 c + 1) n , ce qui donne le résultat. Pour calculer le nombre d’opérations arithmétiques on pose rν = r = dp/ne et on suppose sans perte de généralité que p = rn. L’inégalité (8.5) se réécrit, puisque p1 = (2r − 1)n0 : ( τ (2ν , p) ≤ τ (2ν−1 , p) + (4Cα + Cα + (2rν − 1) Cα ) 2(ν−1)α +(2 r − 1) 22(ν−1) + τ (2ν−1 , p1 ) ce qui donne : τ (2ν , p) ≤ 2 τ (2ν−1 , p) + (4Cα + 2 r Cα ) 2(ν−1)α + 22ν−1 r . Dans le déroulement récursif de l’algorithme, lorsqu’on traite les matrices de type 2 2κ × p , on a rκ = 2ν−κ rν . Et donc en ramenant à r = rν on obtient les inégalités : τ (2κ , p) ≤ 2 τ (2κ−1 , p) + 2(κ−1)α (4Cα + 2ν−κ+1 r Cα ) + 22κ−1 2ν−κ r . Sachant que τ (1, p) = 0, on obtient par sommation (et simplification de la solution d’une relation de récurrence) la majoration suivante : τ (n, p) ≤ 1 2 Cα na r Cα na n r log n + 2 a +4 a · 2 2 −4 2 −2 Ce qui donne le résultat annoncé. 2. La majoration vaut aussi pour les matrices de type 2κ × p0 avec p0 ≤ p. t u 8.2. Calcul du déterminant et de l’inverse 8.2 235 Calcul du déterminant et de l’inverse d’une matrice carrée La LUP -décomposition précédente permet un calcul séquentiel rapide du déterminant et de l’inverse d’une matrice carrée (inversible) en ramenant ces problèmes à la multiplication rapide des matrices carrées d’ordre n. En effet, si l’on passe par la LUP -décomposition, le calcul du déterminant d’une matrice A ∈ Kn×n s’effectue avec le même ordre de complexité séquentielle que la multiplication des matrices n × n puisque si A = L U P , alors det A =  detU ce qui revient à calculer le produit des n éléments diagonaux de la matrice triangulaire U ( = ±1 est la signature de la permutation représentée par la matrice P ). Il y a donc, après la LUP -décomposition, un calcul supplémentaire en SD(n, log n) (par un circuit binaire équilibré). Il en est de même pour le calcul de l’inverse de A, quand elle est inversible, puisque A−1 = P −1 U −1 L−1 ce qui revient, en plus de la LUP -décomposition, à inverser deux matrices triangulaires ( U et L ) et à effectuer un produit de matrices n × n. A priori les algorithmes de calcul du déterminant et de l’inverse tels que nous venons de les décrire sont des algorithmes avec branchements. Dans cette perspective, le coût de la recherche des éléments non nuls comme celui des permutations de lignes ou de colonnes, c’est-à-dire des multiplications à gauche ou à droite par une matrice de permutation, n’est pas pris en considération dans les comptes d’opérations arithmétiques aussi bien du point de vue de leur nombre total que de celui de leur profondeur. Néanmoins, on peut aussi prendre le point de vue selon lequel nous avons construit des familles uniformes de circuits arithmétiques avec divisions, qui calculent des fractions rationnelles formelles en les coefficients de la matrice donnée au départ. Il n’y a alors pas de LUP -décomposition mais seulement une LU -décomposition, sans aucun branchement. Naturellement la contrepartie est que l’algorithme ne peut pas être exécuté concrètement sur un corps avec une matrice arbitraire. C’est seulement pour une (( matrice générique )) que le circuit arithmétique fonctionne : une telle matrice est une matrice qui, lorsqu’on lui applique l’algorithme avec branchements, subit tous les tests x = 0 ? en donnant une réponse négative. Dans nos énoncés nous adoptons de préférence ce second point de vue. 236 8. Algèbre linéaire séquentielle rapide Proposition 8.2.1 Le calcul du déterminant d’une matrice carrée d’ordre n sur un corps K est réalisé par une famille uniforme de circuits arithmétiques avec divisions en SD(nα , n) . Les constantes asymptotiques sont respectivement majorées par γα pour la taille O(nα ) et par 4 (5 Kα +1) pour la profondeur O(n) (les mêmes majorations des constantes que celles données au théorème 8.1). Proposition 8.2.2 L’inversion d’une matrice carrée d’ordre n sur un corps K est un problème résolu par une famille uniforme de circuits arithmétiques avec divisions en SD(nα , n) avec la même estimation que celle de la proposition 8.2.1 pour la constante asymptotique de la profondeur O(n) , et une constante asymptotique majorée par ζα = γα + 9 Cα pour la taille O(nα ) . Dans la constante ζα de la proposition ci-dessus, le terme γα correspond à la LUP -décomposition et le terme 9 Cα à l’inversion de deux matrices triangulaires suivie de la multiplication de deux matrices carrées. 8.3 Forme réduite échelonnée en lignes Dans cette section nous donnons un aperçu sur une méthode récursive permettant de réduire les matrices à coefficients dans un corps commutatif K, à la forme échelonnée en lignes avec une complexité séquentielle du même ordre que celle de la multiplication des matrices. Étant donnée une matrice A de type (n, p) sur K, la réduction de A à la forme échelonnée en lignes consiste à transformer A, en ayant exclusivement recours à des transformations élémentaires unimodulaires sur les lignes 3 , en une matrice de de type (n, p) sur K avec un nombre de zéros strictement croissant apparaissant à gauche des lignes successives de la matrice réduite. Si l’on note E la matrice unimodulaire correspondant à ces transformations 4 , cela revient à multiplier la matrice A à gauche par la matrice E. 3. Rappelons (cf. page 55) qu’il s’agit d’une part de la transformation qui consiste à ajouter à une ligne une combinaison linéaire des autres et d’autre part des échanges signés de lignes du type (Li , Lj ) ← (Lj , −Li ). 4. C’est-à-dire la matrice obtenue en faisant subir à la matrice unité d’ordre n les mêmes transformations. 8.3. Forme réduite échelonnée en lignes 237 Prenons par exemple la matrice carrée d’ordre 6     A=    1 1 1 1 1 3 2 2 2 1 3 6 3 3 3 2 4 9 4 6 2 1 7 10 5 7 3 1 9 11 6 8 1 1 6 20     .    On peut la réduire à la forme échelonnée en lignes en effectuant des transformations du style pivot de Gauss sur les lignes. Ces mêmes transformations, effectuées sur les lignes de la matrice unité d’ordre 6, donnent la matrice unimodulaire E qui résume ces transformations :     E=    1 −1 −1 −2 −2 −4/5 0 0 0 0 0 1 0 0 1 −1 0 1 0 1 0 0 1 −3/5 0 0 0 0 1 −3/5 0 0 0 1 0 0     .    La matrice réduite échelonnée en lignes est alors donnée par le produit :      EA =     1 0 0 0 0 0 2 −1 0 0 0 0 3 −1 0 0 0 0 4 −3 −2 0 0 0 5 −4 −2 −2 0 0 6 −5 −5 7 −5 0    .    Comme nous l’avons fait pour la LUP -décomposition, il s’agit ici de décrire une version rapide de la méthode du pivot de Gauss sur les lignes. Mais contrairement à la LUP -décomposition, aucune hypothèse supplémentaire n’est faite sur la matrice A et aucune permutation de colonnes n’est permise. En contrepartie, dans la décomposition A = F U qui résulte de cette méthode de réduction ( F = E −1 ), la matrice F possède seulement la propriété d’être unimodulaire. La forme échelonnée en lignes trouve sa justification et son application dans des problèmes comme la résolution des systèmes d’équations linéaires ou la détermination d’une base pour un sous-espace de Kn défini par un système générateur. Elle sera aussi utilisée dans la section 8.4 pour le calcul rapide du polynôme caractéristique sur un corps. La méthode que nous allons exposer ci-dessous est due à Keller-Gehrig [58] et elle est reprise dans [BCS]. 238 8. Algèbre linéaire séquentielle rapide Description de la procédure rapide On considère une matrice A ∈ Kn×p . Pour la réduire à la forme échelonnée en lignes, on peut supposer sans perte de généralité que n = p = 2ν quitte à compléter la matrice A avec suffisamment de lignes et/ou colonnes de zéros 5 . La procédure principale que nous noterons Fel utilise les procédures auxiliaires Fel1 , Fel2 et Fel3 suivantes. Procédure Fel1 : C’est une procédure récursive qui transforme une matrice carrée A ∈ K2n×n ( n = 2ν ) dont la moitié inférieure est triangulaire supérieure en une matrice triangulaire supérieure.   A1 Plus précisément, si A = avec A1 , A2 ∈ Kn×n et A2 trianA2 gulaire supérieure, la procédure Fel1 calcule une matrice unimodulaire n×n triangulaire supérieure telles E ∈ SL2n (K)  et une matrice T ∈ K T . Utilisant l’approche (( diviser pour gagner )) on divise que E A = 0 la matrice A donnée en huit blocs 2ν−1 × 2ν−1 (si ν = 0, le traitement de la matrice A est immédiat) et on applique de manière récursive la procédure Fel1 aux blocs 2ν−1 × 2ν qui possèdent la même propriété que A. On obtient, avec des notations évidentes, le déroulement suivant de la procédure :   A12 A14   A22  A24  0 A11  0   0 0  A13 E1 A21  A11 E2 A013 A11  A13   A21 0  A11 0  E1  A13 −→  0 0  A012 A0014  E4  −→ A0022  0   0  A13 = 0   0  A11 = 0   0 A12 A11 A012 00 A014  E2   −→  0 A14 0   0 A022 A22 A24 0 A24  0  A11 A012   0 A000 14   avec  0 0  0 0  0   A14 A14 et = E1 A022 A22  0   A12 A12 et = E2 00 A14 A014   E3  −→  :  ;  ; 5. Les lignes et les colonnes ajoutées ne feront l’objet d’aucune manipulation. 8.3. Forme réduite échelonnée en lignes A022 A24  E3   =  Posant on a bien EA = T 0 laire supérieure A011   et E4 A0014 A0022   = A000 14 0     I2ν−1 0 0 E2 0  E4 0  0 0 E3 0 I2ν−1 0 I2ν−1  0 E= 0  A0022 0 239 A011 A012 où T = 0 A000 14 000 et A14 le sont.    .  0 0 E1 0 , 0 I2ν−1  est une matrice triangu- Procédure Fel2 : Elle prend en entrée une matrice carrée A ∈ Kn×n ( n = 2ν ) et retourne une matrice unimodulaire E ∈ SLn (K) et une matrice triangulaire supérieure T vérifiant EA = T . Là encore, on obtient avec l’approche (( diviser pour gagner )) et des notations analogues à celles utilisées précédemment, le déroulement suivant de la procédure :     A11 A12 A11 A12 E1 −→ A21 A22 A021 A022  E2 −→ A011 A012 0 A0022  E3 −→  A011 A012 0 A000 22  où E1 est la matrice unimodulaire correspondant à l’algorithme Fel2 appliqué de manière récursive à la matrice A21 ( E1 A21 = A021 est donc une matrice triangulaire supérieure, et l’on pose A022 = E1 A22 ) alors que les matrices E2 et E3 correspondent à l’application respective de   A11 l’algorithme Fel1 à la matrice qui est de type (2ν , 2ν−1 ) et de A021 l’algorithme Fel2 à la matrice A0022 qui est carrée d’ordre 2ν−1 . Cela se traduit par le fait que E3 A0022 = A000 22 est triangulaire supérieure et que :  E2 A11 A021  Posant E =  0 A11 où T = 0   = A011 0   avec A012 A0022   = E2 A12 A022  .      I2ν−1 0 I2ν−1 0 T E2 , on a bien EA = 0 E3 0 E1 0  0 A12 est une matrice triangulaire supérieure. A000 22 240 8. Algèbre linéaire séquentielle rapide Procédure Fel3 : Elle prend en entrée une matrice triangulaire supérieure A ∈ Kn×n (avec n = 2ν ) et donne en sortie une matrice unimodulaire E ∈ SLn (K) et une matrice S sous forme échelonnée en lignes   vérifiant EA = S. A11 A12 On considère la partition A = en blocs 2ν × 2ν de la 0 A22 matrice A donnée (A11 et A22 sont des matrices triangulaires supérieures). Le déroulement de la procédure est alors illustré par le schéma suivant dans lequel c’est d’abord l’algorithme   Fel3 qui est appliqué à la matrice S11 A11 pour donner la matrice où S11 est une matrice surjective 6 0 échelonnée en lignes ; c’est ensuite Fel1 qui est appliqué à la matrice   A23 A023 pour donner la matrice où A023 est triangulaire suA24 0 périeure ; et c’est enfin Fel3 qui, appliqué à la matrice A023 , donne la matrice échelonnée en lignes S23 :  A11 A12 0 A22       S11 A012 S11 A012 S11 A012 E E2 3  0 S23  −→  0 A23  −→  0 A023  −→ 0 0 0 0 0 A24  E1  avec E1 A12 = A012 A23  . Si maintenant on pose :    Ir 0 0  Ir 0 E1 0   E = 0 E3 0 0 E2 0 I2ν−1 0 0 Ir   S11 A012 où r est le rang de A11 , alors EA = S avec S =  0 S23  qui est 0 0 bien une matrice échelonnée en lignes puisque S11 et S23 le sont.  Procédure principale Fel : Elle prend en entrée une matrice carrée A ∈ Kn×n ( n = 2ν ) et retourne une matrice unimodulaire E ∈ SLn (K) et une matrice S sous forme échelonnée en lignes vérifiant EA = S. Le cas ν = 0 est trivial. Pour ν ≥ 1, on applique la procédure auxiliaire 6. Le nombre r de ses lignes est égal à son rang qui est aussi celui de A11 . 8.3. Forme réduite échelonnée en lignes 241 Fel2 pour transformer la matrice A en une matrice triangulaire supérieure T puis la procédure Fel3 pour transformer T en une matrice échelonnée en lignes. Analyse de complexité L’étude de complexié de la procédure principale Fel passe par celle des trois algorithmes auxiliaires Fel1 , Fel2 et Fel3 . Si l’on désigne par τ1 , τ2 et τ3 les tailles et par π1 , π2 et π3 les profondeurs respectives de ces trois algorithmes, on a les majorations suivantes dans lesquelles les coefficients Cα et Kα sont les constantes intervenant dans la taille et la profondeur des complexités arithmétiques de la multiplication des matrices. pour les tailles : τ1 (2ν ) ≤ 4 τ1 (2ν−1 ) + 2 Cα 2να τ2 (2ν ) ≤ τ1 (2ν−1 ) + 2 τ2 (2ν−1 ) + (2α + 1) Cα 2(ν−1)α τ3 (2ν ) ≤ τ1 (2ν−1 ) + 2 τ3 (2ν−1 ) + Cα 2(ν−1)α pour les profondeurs : π1 (2ν ) ≤ 3 π1 (2ν−1 ) + 2 Kα ν π2 (2ν ) ≤ π1 (2ν−1 ) + 2 π2 (2ν−1 ) + Kα (2ν − 1) π3 (2ν ) ≤ π1 (2ν−1 ) + 2 π3 (2ν−1 ) + Kα (ν − 1) E 2 Il faut remarquer que dans la procédure Fel1 les étapes −→ et E3 −→ peuvent être exécutées en parallèle, ce qui explique la diminution du coefficient (de 4 à 3) entre τ1 et π1 . Utilisant les inégalités ci-dessus et le fait que : τ (2ν ) = τ2 (2ν ) + τ3 (2ν ) et π(2ν ) = π2 (2ν ) + π3 (2ν ) , nous allons montrer le résultat suivant concernant la complexité du problème de la réduction à la forme échelonnée en lignes. Proposition 8.3.1 La réduction à la forme échelonnée en lignes d’une matrice carrée d’ordre n sur un corps commutatif K est réalisée par une famille uniforme de circuits arithmétiques de taille τ (n) et de profondeur π(n) avec les majorations suivantes : τ (n) ≤ 21 Cα nα −1 2α−2 et π(n) ≤ (3 Kα + 2) nlog 3 . 242 8. Algèbre linéaire séquentielle rapide Preuve. Les sommations des relations τ1 (2k ) ≤ 4 τ1 (2k−1 ) + 2 Cα 2kα d’une part et des relations π1 (2k ) ≤ 3 π1 (2k−1 ) + 2 Kα k d’autre part pour k allant de 0 à ν (avec τ1 (1) = π1 (1) = 1 ) donnent les majorations suivantes pour la taille et la profondeur du circuit arithmétique correspondant à la procédure Fel1 :   3 3 2α+1 Cα να ν ν 2 et π1 (2 ) < Kα + 1 3ν − Kα ν − Kα . τ1 (2 ) < α−2 2 −1 2 2 Tenant compte de ces relations et du fait que τ2 (1) = π2 (1) = 1, les sommations pour k allant de 0 à ν des inégalités relatives à la taille et la profondeur du circuit arithmétique correspondant à la procédure Fel2 nous donnent la majoration : τ2 (2ν ) < 1 2να 1 Eα α−1 < Eα 2να 2 2 −1 2 dans laquelle 2α+1 25 Cα Cα + (2α + 1) Cα < α−2 2α−2 − 1 2 −1 (avec 2 < α ≤ 3) et la majoration :     3 1 ν ν ν π2 (2 ) < Kα + 1 3 − Kα 2 + ν + . 2 2 Eα = On obtient, par des calculs analogues, les majorations suivantes pour la taille et la profondeur du circuit arithmétique correspondant à la procédure Fel3 : 2να 1 1 Fα α−1 < Fα 2να et 2 2 −1 2   3 3 π3 (2ν ) < Kα + 1 3ν − Kα (2ν+1 − 1) 2 2  α+1  2 17 Cα où Fα = + 1 Cα < α−2 α−2 2 −1 2 −1 τ3 (2ν ) < Le résultat annoncé découle des majorations ci-dessus et du fait que l’on a : τ (2ν ) = τ2 (2ν ) + τ3 (2ν ), π(2ν ) = π2 (2ν ) + π3 (2ν ) et n = 2ν . t u Remarque. Le fait de considérer des matrices carrées dont le nombre de lignes (et de colonnes) est une puissance de 2 n’est pas une hypothèse restrictive. On peut en effet plonger toute matrice A ∈ Kn×p dans une matrice carrée d’ordre 2ν en prenant ν = max (dlog ne , dlog pe) et en 8.4. Méthode de Keller-Gehrig 243 complétant la matrice donnée par 2ν −n lignes et 2ν −p colonnes nulles. Les rangées ajoutées, formées de zéros, ne subissent aucune transformation au cours du déroulement de la procédure décrite et le résultat énoncé dans la proposition 8.3.1 reste valable à condition de remplacer n par max (n, p). 8.4 Méthode de Keller-Gehrig Les algorithmes de Keller-Gehrig [58] sont des versions accélérées de l’algorithme de Frobenius que nous avons décrit à la section 2.8.1. Dans la section présente nous ne décrirons en détail que le plus simple de ces algorithmes. Nous reprenons les notations de la section 2.8.1. La matrice A ∈ Kn×n définit l’endomorphisme hA de Kn . Nous appelons a = (e1 , . . . , en ) la base canonique de Kn . Accélération dans le cas simple Nous examinons ici le cas le plus simple (et le plus fréquent) où k1 = n c’est-à-dire le cas où b = (e1 , Ae1 , . . . , An−1 e1 ) est une base de Kn . Nous désignons par [S 0 ]S la matrice d’un système de vecteurs (ou d’un vecteur ou d’un endomorphisme) S 0 dans une base S. Alors U = [b]a est la matrice de passage de a à b, et on a :   0 ... 0 a0 . .   a1   1 . . .. −1 n−1 [hA ]b = U AU = [(e1 , Ae1 , . . . , A e1 )]b =  . . ..  .. 0  .. .  0 . . . 1 an−1 où a0 , a1 , . . . , an−1 sont les coefficients (dans K ) de la relation de dépendance An e1 = an−1 An−1 e1 + . . . + a1 Ae1 + a0 e1 . Ceci prouve que A est semblable à une matrice de Frobenius et que son polynôme caractéristique est PA (X) = (−1)n (X n − (an−1 X n−1 + · · · + a1 X + a0 )). L’algorithme de Keller-Gehrig, dans ce cas le plus simple, consiste à calculer la matrice U puis le produit U −1 A U pour obtenir par simple lecture de la dernière colonne les coefficients du polynôme caractéristique de A. Prenant ν = dlog ne, le calcul de U se fait en ν étapes. L’étape no k ( 1 ≤ k ≤ ν ) consiste à : k k−1 — calculer la matrice A2 (élévation au carré de la matrice A2 calculée à l’étape précédente) ; déjà 244 8. Algèbre linéaire séquentielle rapide ν−1 k−1 — calculer la matrice A2 [e1 | Ae1 | . . . | A2 −1 e1 ] à partir de la mak−1 trice [e1 | Ae1 | . . . | A2 −1 e1 ] calculée à l’étape k − 1 pour obtenir la k matrice [e1 | Ae1 | . . . | A2 −1 e1 ] de l’étape k. À la fin de ces ν étapes, on obtient la matrice [e1 | Ae1 | . . . | A2 ν −1 ν e1 ] ∈ Kn×2 qui admet comme sous-matrice la matrice recherchée U = [e1 | Ae1 | . . . | An−1 e1 ] ∈ Kn×n puisque 2ν − 1 ≥ n − 1. On calcule ensuite la dernière colonne de U −1 A U en commençant par inverser la matrice U (en passant par sa LUP -décomposition). Enfin on calcule la dernière colonne V de A U en multipliant A par la dernière colonne de U , puis on calcule U −1 V . L’analyse de complexité dans ce cas simple nous donne donc : Proposition 8.4.1 On peut calculer le polynôme caractéristique d’une matrice carrée d’ordre n à coefficients dans un corps K au moyen d’un circuit arithmétique avec divisions en SD(nα log n, n log n), de taille majorée plus précisément par 2 Cα nα dlog ne + ζα nα + O(n2 ) où Cα et ζα sont les constantes intervenant dans les complexités séquentielles de la multiplication des matrices et de l’inversion des matrices carrées (voir proposition 8.2.2 page 236). Le cas général L’algorithme précédent fournit déjà une famille uniforme de circuits arithmétiques avec divisions qui calcule le polynôme caractéristique d’une matrice sur un corps, au sens des circuits avec divisions. Autrement dit, le circuit arithmétique évalue correctement le polynôme caractéristique en tant que fraction rationnelle : en tant qu’élément du corps K((aij )) où les coefficients aij de la matrice carrée sont pris comme des indéterminées. Mais il échoue à calculer le polynôme caractéristique de toute matrice qui n’a pas un polynôme minimal de même degré que le polynôme caractéristique. On est donc dans une situation pire que pour le calcul du déterminant à la Bunch & Hopcroft, car dans ce dernier cas, il suffit de 8.5. Méthode de Kaltofen-Wiedemann 245 multiplier à droite et à gauche la matrice par des matrices unimodulaires (à petits coefficients entiers) prises au hasard pour obtenir une matrice qui possède une LU -décomposition avec une très grande probabilité 7 . Et ceci même si son déterminant est nul (cf. l’algorithme 2.2 page 62). L’algorithme de Bunch & Hopcroft sans branchement, avec le preprocessing que nous venons d’indiquer n’échouera que dans le cas d’une matrice n × n dont le rang est strictement inférieur à n − 1. C’est donc en produisant un algorithme avec branchements qui fonctionne dans tous les cas que Keller-Gehrig réalise son véritable tour de force. Et pour cela il lui fallait d’abord développer sa méthode de réduction rapide d’une matrice à la forme échelonnée en lignes (sur un corps). Dans cette réduction nous avons vu que la profondeur de l’algorithme (avec branchements) est un O(nlog 3 ). Keller-Gehrig obtient précisément le résultat suivant : Théorème 8.2 Le polynôme caractéristique d’une matrice carrée d’ordre n sur un corps K peut être calculé par un algorithme avec branchements qui a pour taille un O(nα log n). Une version plus rapide pour les cas favorables Notons que Keller-Gehrig propose une version plus rapide pour un algorithme avec divisions mais sans branchements, qui calcule le polynôme caractéristique dans les mêmes conditions qu’à la proposition 8.4.1 : Proposition 8.4.2 On peut calculer le polynôme caractéristique d’une matrice carrée d’ordre n à coefficients dans un corps K au moyen d’un circuit arithmétique avec divisions qui a pour taille un O(nα ). Une version parallèle Signalons enfin qu’une parallélisation de l’algorithme de Keller-Gehrig a été obtenue par Giesbrecht [37, 38]. 8.5 Méthode de Kaltofen-Wiedemann Pour généraliser l’algorithme de Wiedemann (section 2.8.3) à un anneau commutatif arbitraire A en évitant les divisions qu’il contient et 7. Si cette méthode est seulement probabiliste en théorie, elle fonctionne toujours en pratique. 246 8. Algèbre linéaire séquentielle rapide le débarrasser en même temps de son aspect aléatoire, l’idée de Kaltofen [49] est de lui appliquer la méthode de l’élimination des divisions de Strassen (cf. le théorème 3.1 page 122). Il doit pour cela exhiber une matrice particulière C ∈ Kn×n et un couple de vecteurs u, v ∈ An×1 pour lesquels l’algorithme de Wiedemann s’effectue sans divisions et tels que le polynôme générateur minimal de la suite récurrente linéaire ( t u C i v) i∈N , qui est donné par l’algorithme de Berlekamp/Massey [27], est de degré n (et n’est autre, par conséquent, que le polynôme minimal PC et, à un signe près, le polynôme caractéristique PC de C ). Kaltofen considère la suite de nombres entiers (ai ) ∈ NN définie par (   an+1 = 2 an si n est impair et i ai = , avec n+1 bi/2c an+1 = 2 n+2 an si n estpair. Les premiers termes sont 1, 1, 2, 3, 6, 10, 20, 35, 70, 126, 252, 462, 924, 1716, 3432, 6435, 12870, 24310, 48620, 92378, . . . Il applique l’algorithme de Berlekamp/Massey aux 2n premiers termes :   2n − 1 a0 = 1, a1 = 1, a2 = 2, . . . , a2n−1 = n−1 Il constate que les restes successifs dans l’algorithme d’Euclide étendu, jusqu’au (n − 1) - ème, ont un coefficient dominant égal à ±1, avec un degré ne diminuant que d’une seule unité à chaque pas (c’est-à-dire que do Ri = 2n − 1 − i pour 1 ≤ i ≤ n − 1 ). Ce qui garantit le fait que les polynômes Ri , Qi , Ui , Vi (1 ≤ i ≤ n) appartiennent à Z[X] et que do Rn = n − 1. Il constate également que les multiplicateurs Vi (1 ≤ i ≤ n) ont un coefficient dominant et un terme constant égaux à ±1 et que, par conséquent, dans la dernière égalité obtenue : Un X 2n + Vn 2n−1 X ai X i = Rn ( avec do Rn = n − 1) , i=0 Vn est un polynôme de degré n qui, à un signe près, s’écrit : ±Vn = X n − (cn−1 X n−1 + · · · + c1 X + c0 ) . (avec c0 = ±1, cn−1 = 1) Kaltofen montre même, à partir de l’algorithme qui calcule les coefficients de Vn , que ces derniers sont en fait donnés par la formule :  n+i  n−i−1 b c 2 2 ci = (−1) pour 0 ≤ i ≤ n − 1 . i 8.5. Méthode de Kaltofen-Wiedemann 247 C’est donc le polynôme f (X) = X n −cn−1 X n−1 −. . .−c1 X −c0 ainsi obtenu qui est le polynôme minimal de la suite récurrente linéaire (a0i ) i∈N dont les 2n premiers termes coı̈ncident avec les 2n premiers termes a0 , a1 , . . . , a2n−1 de la suite (ai ). Il considére alors la matrice C du polynôme f (X) :  0 1  0 0   .. C =  ... .   0 0 c0 c1 Par exemple, pour n = 7 on  0  0   0  C :=   0  0   0 −1 transposée de la matrice compagnon 0 1 .. . ... ... .. .  0 0 .. . 0 ... 1 c2 . . . cn−1    ,   obtient 1 0 0 0 0 0 4 0 0 0 1 0 0 0 1 0 0 0 1 0 0 0 0 0 0 6 −10 −5 0 0 0 0 1 0 6 0 0 0 0 0 1 1           Le polynôme caractéristique de C n’est autre que PC = (−1)n f (X). Il considère enfin les deux vecteurs :     1 a0  0   a1    n×1  V = . .  de A  . . .  et E1 =   ..  an−1 0 On vérifie immédiatement que les suites récurrentes linéaires (a0i ) i∈N et ( t E1 C i V ) i∈N , qui admettent un polynôme générateur unitaire commun de degré n, sont telles que a0i = t E1 C i V (= ai ) pour tout i compris entre 0 et 2n − 1. On en déduit que a0i = t E1 C i V pour tout i ∈ N. Ainsi, par construction même de C, l’algorithme de Wiedemann, prenant C en entrée avec les deux vecteurs E1 et V , s’effectue avec les seules opérations d’addition et de multiplication dans Z pour donner en sortie le polynôme minimal de la suite récurrente linéaire ( t E1 C i V ) i∈N , et par conséquent le polynôme caractéristique de C. 248 8. Algèbre linéaire séquentielle rapide Soit maintenant A = (aij ) une matrice carrée d’ordre n à coefficients dans A. Il s’agit de calculer le polynôme caractéristique de A en n’utilisant que les opérations arithmétiques de A. Cela se fait par élimination des divisions dans l’algorithme de Wiedemann pour la matrice A en prenant comme centre d’élimination des divisions le point formé par la matrice C et les deux vecteurs auxilaires E1 et V . Comme les coefficients du polynôme caractéristique de A (les sorties de l’algorithme de Wiedemann) sont des polynômes de degré ≤ n en les coefficients (aij ), on utilise l’élimination des divisions de Strassen en degré n. On considère donc une indéterminée z sur A . On pose F = A − C,et on applique l’algorithme de Wiedemann dans l’anneau An = A[z] z n+1 à la matrice B = C + zF avec les vecteurs auxiliaires E1 et V . On récupère le polynôme caractéristique de A en remplaçant z par 1 dans les sorties. Cet algorithme calcule le polynôme générateur minimal gz (X) ∈ An [X] de la suite récurrente linéaire ( t E1 B i V ) i∈N . Comme les seules divisions se font par des polynômes en z de terme constant égal à ±1, l’ensemble du calcul se fait uniquement avec des additions et multiplications dans A. D’où l’algorithme 8.2 page ci-contre de Kaltofen pour le calcul du polynôme caractéristique d’une matrice carrée A ∈ An×n . Complexité de l’algorithme On utilise comme d’habitude la notation 3.2.2 page 125 ainsi que la notation 7.2.1 page 195. L’étude de complexité donne le résultat suivant dû à Kaltofen [49] : Théorème 8.3 Le calcul du déterminant, du polynôme caractéristique et de l’adjointe d’une matrice carrée d’ordre n sur un anneau commutatif arbitraire A se fait à l’aide d’une famille uniforme de circuits √ α+3 arithmétiques en SD(n log n, n 2 µP (d n e)). Si on utilise une multiplication rapide des polynômes en O(n log n) ou en O(n log n log log n) opérations arithmétiques (selon l’anneau considéré), α α cela fait donc, O(n 2 +2 log n) ou O(n 2 +2 log n log log n) opérations arithmétiques pour l’algorithme de Kaltofen. Nous verrons au chapitre 10 que les algorithmes parallèles en profondeur log2 n font moins bien dans le cas d’un anneau vraiment arbitraire (ils utilisent O(nα+1 log n) 8.5. Méthode de Kaltofen-Wiedemann 249 Algorithme 8.2 Algorithme de Kaltofen-Wiedemann Entrée : Un entier n ≥ 2 et une matrice A = (aij ) ∈ An×n . Sortie : Le polynôme caractéristique PA (X) de A .  Début (on pose An = A[z] z n+1 ) Variables locales : i, k ∈ N ; V = (vi ) ∈ Zn×1 (vecteur du centre d’élimination des divisions) ; C = (cij ) ∈ Zn×n (matrice du centre d’élimination des divisions) ; B ∈ (An )n×n ; (rk )k=0..2n−1 ∈ (An )2n . Étape 1 : Calcul du centre d’élimination des divisions, et initialisation. C := 0 ∈ An×n ; pour i de 1  à n faire  n+i−1  n−i i−1 b c 2 2   ; cn,i := (−1) vi := i−1 i − 1 2 fin pour ; pour i de 1 à n − 1 faire ci,i+1 := 1 fin pour ; B := C + z × (A − C) ; Étape 2 : Calcul de la suite récurrente linéaire pour k de 0 à 2n − 1 faire rk := première coordonnée de B k × V dans An fin pour ; Étape 3 : Berlekamp-Massey Appliquer la procédure de Berlekamp-Massey à la suite (rk )k=0..2n−1 puis remplacer z par 1 dans le polynôme générateur minimal trouvé. Fin. 1 opérations arithmétiques) mais un peu mieux (O(nα+ 2 ) opérations arithmétiques) dans le cas d’un anneau où les entiers ≤ n sont non diviseurs de zéro. Dans le cours de la preuve qui suit nous ferons également l’analyse de complexité de la version élémentaire de l’algorithme de Kaltofen. Nous obtenons le résultat suivant. Proposition 8.5.1 Dans la version séquentielle simple de l’algorithme de Kaltofen, le calcul du déterminant, du polynôme caractéristique et de l’adjointe d’une matrice carrée d’ordre n sur un anneau commutatif arbitraire A se fait à l’aide d’une famille uniforme de circuits arithmétiques de taille O(n4 ) et plus précisément avec un nombre de multiplications égal à 4n4 + O(n3 ) et un nombre d’additions du même ordre de grandeur. Le nombre de multiplications essentielles est de 2n4 + O(n3 ). 250 8. Algèbre linéaire séquentielle rapide Preuve. On remarque tout d’abord que le coût de l’étape 1 est négligeable. Les entiers qu’elle calcule sont des constantes du circuit disponibles une fois pour toutes et leur calcul ne doit pas être pris en compte (ils sont de toute façon calculables en O(n2 ) opérations arithmétiques). Quant à l’affectation B := C + z × (A − C) dans (An )n×n elle signifie du point de vue des opérations arithmétiques dans A qu’on effectue 2n − 1 soustractions qui peuvent être effectuées en une seule étape parallèle. L’étape 3 est pour l’essentiel un algorithme d’Euclide étendu. Elle se fait avec un circuit arithmétique de profondeur O(n log n) et de taille O(n2 µP (n)) où µP (n) est le nombre d’opérations arithmétiques nécessaires pour la multiplication de deux polynômes de degré n dans A[z] en profondeur O(log n). Cela est dû au fait que l’algorithme d’Euclide étendu utilisé comporte O(n) étapes avec chacune O(n) opérations arithmétiques dans l’anneau des développements limités An (certaines de ces opérations sont des divisions par des éléments inversibles). Pour obtenir le résultat énoncé, reste l’étape 2, la plus coûteuse en nombre d’opérations arithmétiques. Voyons tout d’abord la version élémentaire. On calcule successivement les Vk = B k V pour k = 1, . . . , 2n − 1 par Vk+1 = BVk . Cela fait en tout 2n3 − n2 multiplications et n(n − 1)(2n − 1) additions dans An . Chacune des 2n3 − n2 multiplications est le produit d’une entrée de B par une coordonnée de l’un des Vk . Or les entrées de B sont des éléments de la forme c + bz où c est une constante (une des entrées non nulles de C) et b est une entrée de A − C. Un tel produit consomme donc n multiplications essentielles, n + 1 multiplications du type (( produit d’un élément de A par une constante )) et n additions. En résumé, l’étape 2 dans la version séquentielle élémentaire consomme 2n4 − n3 multiplications essentielles, 2n4 + O(n3 ) multiplications non essentielles et 4n4 + O(n3 ) additions. Voyons maintenant la version accélérée. On subdivise l’étape 2 en quatre sous-étapes qui sont les suivantes, numérotées de 2.1 à 2.4, dans √ lesquelles on pose r = d n e , s = d2n/re − 1, U0 = E1 et V0 = V : Étape Étape Étape Étape 2.1 2.2 2.3 2.4 : : : : pour j de 1 à r − 1 calculer Vj := B j V0 Calculer la matrice B r pour k de 1 à s calculer Uk := ( t B r )k E1 pour j de 0 à r − 1 et pour k de 0 à s calculer bkr+j (z) := t Uk (z) Vj (z) . 8.5. Méthode de Kaltofen-Wiedemann 251 Notez que r(s+1) ≥ 2n si bien que que les entiers kr +j parcourent tout l’intervalle [0, 2n − 1]. Au cours des sous-étapes 2.1 et 2.2, les coefficients calculés sont des polynômes en z de degré ≤ r (dans B j V , ils sont de degré ≤ j ), c’est-à-dire que chaque multiplication de deux coefficients correspond à un circuit arithmétique de profondeur O(log r) avec µP (r) opérations de base dans A. Cela donne l’analyse suivante pour les différentes sousétapes. • Sous-étape 2.1 : Pour obtenir tous les vecteurs B j V pour 1 ≤ j ≤ r − 1 on peut procéder en blog rc étapes parallèles où chaque étape i−1 i ( i = 1, . . . , blog rc ) consiste à élever au carré la matrice B 2 puis à i−1 la multiplier à droite par la matrice [ V | B V | . . . | B 2 −1 V ] qui est i une matrice n × 2i−1 pour obtenir la matrice [ V | B V | . . . | B 2 −1 V ] qui est une matrice n × 2i dont les coefficients sont des polynômes de A[z] de degré < 2i ≤ r. Chacune de ces blog rc étapes correspond donc à un circuit arithmétique de profondeur O(log n log r) et de taille O(nα µP (r)), ce qui donne au total, pour la sous-étape 2.1, un circuit arithmétique de profondeur O(log3 n) et de taille O(nα µP (r) log n) . • Sous-étape 2.2 : Si r est une puissance de 2, le calcul de B r se fait en élevant au carré la matrice B r/2 déjà calculée. Sinon il faut faire i−1 le produit de certaines des matrices B 2 : par exemple si r = 39 = 5 2 32 + 4 + 2 + 1, on a B 39 = B 2 B 2 B 2 B. Pour chaque produit les coefficients des matrices sont de degré ≤ r/2 dans A[z]. Ceci correspond de nouveau à un circuit arithmétique de profondeur O(log3 n) et de taille O(nα µP (r) log n). Pour la suite nous posons B1 = tB r • Sous-étape 2.3 : Nous ne pouvons plus utiliser la technique de l’étape 2.1 qui ici donnerait a priori une famille uniforme de circuits arithmétiques dans SD(log3 n, nα µP (n) log n). Partant du vecteur U0 = E1 , la sous-étape 2.3 de notre algorithme consiste à calculer, pour k allant de 1 à s, le vecteur Uk (z) = B1 Uk−1 (z). Posons s1 = d(n + 1)/re. Notons Uk−1 = B1k−1 E1 se Ps1que −1 r` réécrit dans An sous la forme Uk−1 (z) = `=0 z Uk−1,` où chacun des Uk−1,` est un vecteur dont les composantes sont des polynômes en z de degré < r. On peut donc identifier Uk−1 (z) avec la matrice n × s1 : Wk (z) = [ Uk−1,0 | Uk−1,1 | . . . | Uk−1,s1 −1 ] . Le calcul du vecteur Uk (z) à n lignes et s1 colonnes se fait comme suit. On calcule la matrice B1 Wk−1 (z) dont les entrées sont des poly- 252 8. Algèbre linéaire séquentielle rapide nômes de degré ≤ 2r, puis on réorganise les sommes correspondantes pour obtenir Uk (z) (ce qui nécessite au plus n2 additions dans A). Le produit B1 Wk−1 (z) est celui d’une matrice n × n par une matrice n × s1 , toutes les entrées étant de degré ≤ r. Ceci peut se faire avec r2 multiplications parallèles de blocs s1 × s1 . Chaque multiplication de blocs se fait en O(sα1 ) opérations arithmétiques sur des polynômes de degré ≤ r. On obtient donc chaque Uk (z) en SD(log2 r, r2+α µP (r)). Cela donne au total, pour la sous-étape 2.3, une famille uniforme de circuits arithmétiques dans SD(s log2 n, s r2+α µP (r)) c’est-à-dire en√ 3+α 1 core dans SD(n 2 log2 n, n 2 µP (d n e). • Sous-étape 2.4 : Cette étape peut être également ramenée à la multiplication d’une matrice (s + 1) × n par une matrice n × r :      t U (z) 0 t U (z) 1 .. . t U (z) s       × V0 (z) V1 (z) · · · Vr−1 (z) =   t U (z) V (z) 0 0   .. . t U (z) V (z) s 0 ··· .. . ··· t U (z) V 0 r−1 (z)   ..  . t U (z) V s r−1 (z) dont l’élément en position (k +1, j +1) pour 0 ≤ k ≤ s et 0 ≤ j ≤ r −1 n’est autre que le coefficient recherché : t Uk (z) Vj (z) = bkr+j (z). Utilisant à nouveau la multiplication par blocs (s + 1) × (s + 1), nous concluons que la sous-étape 2.4 correspond à un circuit arithmétique √ α+2 de profondeur O(log2 n) et de taille O(n 2 µP (d n e)). On peut résumer le calcul de complexité dans le tableau (8.5) suivant qui donne, pour chaque étape, la complexité arithmétique du circuit correspondant, en même temps que le résultat général. Nous avons également indiqué la taille lorsqu’on exécute l’algorithme avec une multiplication accélérée des polynômes mais sans multiplication rapide des matrices, sur les lignes (( avec α = 3 )). 8.5. Méthode de Kaltofen-Wiedemann Etape 253 Profondeur Taille Etape 1 O(1) Etape 2 O(n 2 log2 n) négligeable √ α+3 O(n 2 µP (d n e)) √ O(n3 µP (d n e) log n) avec α = 3 1 ··· Etape 3 O(n log n) Total O(n log n) avec α = 3 ··· O(n2 µP (n)) √ α+3 O(n 2 µP (d n e)) √ O(n3 µP (d n e) log n) Tableau 8.5 Complexité de l’algorithme de Kaltofen-Wiedemann t u Dans notre preuve c’est l’étape 3 qui détermine la profondeur du circuit arithmétique correspondant à l’algorithme de Kaltofen-Wiedemann. Mais on peut réduire la profondeur de l’étape 3 par diverses méthodes. Une première est de ne pas utiliser l’algorithme de Berlekamp/Massey pour le calcul du polynôme minimal d’une suite récurrente linéaire. Une telle méthode, développée dans [50] (voir aussi [BP]) ramène ce calcul à la résolution d’un système linéaire qui a la forme de Toeplitz, en utilisant le calcul du polynôme caractéristique de sa matrice par la méthode de Le Verrier améliorée par Csanky (cf. section 9.1). On obtient un circuit arithmétique de profondeur de O(log3 n) et de même taille, c’est-à-dire O(n2 µP (n)) . L’inconvénient de cette amélioration est qu’elle s’applique uniquement lorsque n! ne divise pas zéro dans l’anneau A. Une deuxième méthode, qui ne se heurte pas à l’obstacle précédent, consiste à utiliser une version parallélisée de l’algorithme d’Euclide étendu. Voir [71, 66] et [GG] corollaire 11.6 page 304. Cependant, il ne suffit pas de réduire la profondeur de l’étape 3 pour obtenir une profondeur polylogarithmique. Il faudrait le faire également pour l’étape 2 et plus précisément la sous-étape 2.3. On a donc à l’heure actuelle un problème ouvert : peut-on obtenir un circuit, de la taille de cet algorithme et de profondeur polylogarithmique, permettant de calculer le polynôme caractéristique sur un anneau commutatif arbitraire ? L’algorithme de Kaltofen-Wiedemann obtient le résultat asymptoti√ α+3 que ci-dessus, à savoir O(n 2 µP (d n e)), le meilleur temps séquentiel 254 8. Algèbre linéaire séquentielle rapide de tous les algorithmes connus pour le calcul du polynôme caractéristique sur un anneau commutatif arbitraire, grâce à la multiplication rapide des matrices, bien sûr, mais aussi grâce à la multiplication rapide des polynômes. Et pour les polynômes la multiplication rapide est désormais couramment implémentée sur machine. Ainsi lorsqu’on ne dispose pas d’une multiplication rapide des matrices, on obtient un temps séquentiel asymptotiquement meilleur que tous les autres algorithmes fonctionnant sur un anneau commutatif arbitraire, dès qu’on accélère la multiplication des polynômes, ne serait-ce que par la méthode de Karatsuba. Notons que sur un anneau commutatif qui ne possède pas de racines principales de l’unité, la méthode qui utilise la transformation de Fourier rapide est en O(n log n log log n) et elle ne devient plus performante que la méthode de Karatsuba en O(nlog 3 ) que pour n très grand, de l’ordre de plusieurs milliers (cf. section 6.3.2 et notamment la remarque 6.3.2 page 182). Un vaste champ d’expérimentation s’ouvre donc, maintenant que différentes multiplications rapides commencent à avoir une réelle portée pratique en calcul formel. Conclusion Nous terminons ce chapitre en renvoyant le lecteur à deux surveys récents d’Erich Katofen et Gilles Villard [53, 54] concernant la complexité aussi bien algébrique que binaire du calcul des déterminants (nous nous intéressons plutôt au calcul du polynôme caractéristique dans cet ouvrage). Ils montrent à quel point l’algèbre linéaire est un sujet de recherche actif en calcul formel et l’importance des méthodes modulaires et seminumériques pour le traitement des problèmes concrets. 9. Parallélisations de la méthode de Leverrier Introduction Csanky [22] fut le premier à prouver que les problèmes du calcul des déterminants, de l’inversion des matrices, de la résolution des systèmes d’équations linéaires et du calcul du polynôme caractéristique, dans le cas d’un anneau contenant le corps des rationnels, sont dans la classe N C, c’est-à-dire dans la classe des problèmes qui peuvent être résolus en temps parallèle polylogarithmique avec un nombre polynomial de processeurs par une famille uniforme de circuits arithmétiques. Il montre, en effet, que tous ces problèmes se ramènent au calcul du polynôme caractéristique et que ce dernier se calcule en SD(nα+1 , log2 n). En particulier ils sont dans la classe N C 2 . Nous présentons le travail de Csanky dans la section 9.1. Dans la section suivante nous donnons l’amélioration due à Preparata & Sarwate [77] qui montre que le calcul du polynôme caractéristique peut être réalisé dans SD(nα+1/2 , log2 n). Dans la section 9.3 nous donnons une meilleure estimation de la complexité théorique de l’algorithme précédent, légèrement amélioré, due à Galil & Pan [32]. Dans le chapitre 10, nous examinerons des algorithmes qui résolvent les mêmes problèmes sur un anneau commutatif arbitraire. 9.1 Algorithme de Csanky Pour calculer le polynôme caractéristique , Csanky utilise la méthode de Le Verrier en la parallélisant de la manière suivante. On se donne un entier n, un corps K (ou plus généralement un anneau dans lequel n! est inversible) et une matrice A ∈ Kn×n de po- 256 9. Parallélisations de la méthode de Leverrier lynôme caractéristique : P (X) = det(A − XIn ) = (−1)n [X n − c1 X n−1 − . . . − cn−1 X − cn ] . On pose sk = Tr(Ak ) pour k = 1, 2, . . . , n. La méthode de Le Verrier consiste à résoudre l’équation S ~c = ~s (9.1) où     ~c =    c1 .. . .. . cn        , ~s =      s1 .. . .. . sn  1 0   s1 2    . .  et S =  ..  ..      sn−2 sn−1 sn−2  ··· ··· 0 ..  .. . .   ..  .. .. . . .  .   .. .. . 0  . · · · s1 n Cette équation admet la solution unique ~c = S −1~s qui donne les coefficients du polynôme caractéristique. Ceci donne l’algorithme de Csanky 9.1 en quatre grandes étapes. Algorithme 9.1 Algorithme de Csanky, principe général. Entrée : Un entier n ∈ N et une matrice A ∈ An×n . L’anneau A contient le corps Q. Sortie : Les coefficients du polynôme caractéristique PA (X) de A. Début Étape 1 : Calculer en parallèle les puissances A2 , A3 , . . . , An ; Étape 2 : Calculer en parallèle les traces s1 , s2 , . . . , sn des matrices A, A2 , . . . , An . Étape 3 : Créer et inverser la matrice triangulaire S (équation 9.1). Étape 4 : Calculer le produit S −1~s = ~c. Fin. L’analyse de complexité pour cet algorithme utilise les résultats de complexité de la technique (( diviser pour gagner )) et notamment son 9.1. Algorithme de Csanky 257 application au calcul parallèle de l’inverse d’une matrice triangulaire que nous avons décrite au § 7.2. La complexité de l’algorithme • Le calcul en parallèle des puissances A2 , . . . , An de la matrice A se ramène à un algorithme de calcul parallèle des préfixes représenté par un circuit arithmétique parallèle de profondeur O(log n) et de taille majorée par 4n (théorème 5.1 page 170), mais dont les nœuds internes représentent eux-mêmes des circuits de multiplication de matrices n×n, c’est-à-dire des circuits de taille O(nα ) et de profondeur O(log n). Ce qui donne au total, pour réaliser l’étape 1 un circuit arithmétique en SD(nα+1 , log2 n). • On calcule ensuite les traces des matrices A, A2 , . . . , An , c’est-à-dire les coefficients sk = Tr(Ak ) qui forment la matrice triangulaire S. Ce sont des sommes de n éléments de A que l’on calcule en parallèle pour 1 ≤ k ≤ n en SD(n2 , log n). • Le calcul de S −1 se fait comme indiqué au § 7.2. La matrice S est en effet triangulaire et fortement régulière. D’après la proposition 7.2.2, le calcul de la matrice S −1 se fait par un circuit arithmétique parallèle en SD(nα , log2 n). • Enfin, le calcul de ~c = S −1~s, qui est le produit d’une matrice triangulaire par un vecteur, se fait en parallèle par un circuit arithmétique de taille n2 et de profondeur dlog ne, la profondeur étant essentiellement due aux additions. En fait, on a un tout petit peu mieux. Théorème 9.1 (Csanky) Soit A un anneau vérifiant les hypothèses pour l’algorithme de Le Verrier : la division par n!, quand elle est possible, est unique et explicite. Le calcul du polynôme caractéristique, de l’adjointe et l’inverse d’une matrice carrée d’ordre n est en SD(nα+1 , log 2 n). Preuve. Une légère modification de l’algorithme de Csanky pour le polynôme caractéristique d’une matrice carrée d’ordre n montre que l’hypothèse d’un anneau dans lequel n! est inversible, peut être remplacée par l’hypothèse pour l’algorithme de Le Verrier. En effet soit A ∈ An×n et S la matrice utilisée dans l’algorithme de Csanky pour le calcul du polynôme caractéristique . 258 9. Parallélisations de la méthode de Leverrier Au lieu de calculer S −1 (ce qui n’est possible que si n! est inversible dans A ), on calcule n! S −1 . Il suffit pour cela de développer le polynôme caractéristique de S en calculant le produit (X − 1)(X − 2) · · · (X − n), ce qui revient à calculer les valeurs des polynômes symétriques élémentaires σ1 , σ2 , . . . , σn de n variables au point (1, 2, . . . , n ). Le théorème de Cayley-Hamilton permet alors d’écrire : (−1)n+1 n! S −1 = S n−1 + n−1 X (−1)k σk S n−k−1 k=1 ce qui ramène le calcul de n! S −1 à celui des puissances S 2 , S 3 , . . . , S n−1 . Or ce calcul se fait en parallèle, d’après le calcul des préfixes par exemple (proposition 5.1) en SD(nα+1 , log2 n). Nous laissons le lecteur ou la lectrice terminer pour ce qui concerne les calculs de l’adjointe et de l’inverse. t u Variante de Schönhage Signalons qu’il existe une variante de la méthode de Csanky/Le Verrier due à Schönhage [81] qui donne une famille uniforme de circuits arithmétiques avec divisions calculant le polynôme caractéristique avec une faible profondeur sur un corps de caractéristique finie. Schönhage utilise le résultat suivant concernant les sommes de Newton (§ 1.5) connu sous le nom de critère de Kakeya [48] : Proposition 9.1.1 Soit J une partie finie à n éléments de N et (sj )j∈J le système correspondant de n sommes de Newton à n indéterminées sur un corps K de caractéristique nulle. Alors (sj )j∈J est un système fondamental de polynômes symétriques sur K (cf. définition 1.5.1) si et seulement si N \J est stable pour l’addition dans N. Par exemple, pour tout entier p positif, la partie J(p, n) ⊂ N \ p N constituée des n premiers entiers naturels qui ne sont pas des multiples de p, satisfait ce critère, et Schönage [81] l’utilise pour adapter la méthode de Le Verrier au calcul du polynôme caractéristique sur un corps de caractéristique p > 0. Notez qu’en caractéristique p l’égalité (x + y)p = xp + y p implique que les sommes de Newton vérifient les égalités skp = sk p . Prenons maintenant exemple. Le polynôme général de degré 8 P8 un 8−i 8 est P (X) = X − i=1 ai X . Si nous sommes sur un corps de caractéristique 3, nous considérons les 8 premières relations de Newton qui 9.2. Amélioration de Preparata et Sarwate donnent les  1  s1   s3   s4   s6   s7   s9 s10 259 sommes sj pour j ∈ N \ 3 N (cf. l’égalité (1.22) page 28) :      0 0 0 0 0 0 0 s1 a1  s2    2 0 0 0 0 0 0      a2    s4    s 2 s 1 1 0 0 0 0   a3        s3 s2 s1 2 0 0 0    a4  =  s 5  (9.2)      s5 s4 s3 s2 s1 1 0   a5   s7   s8    s6 s5 s4 s3 s2 s1 2      a6    s10    s8 s7 s6 s5 s4 s3 s2 a7 s9 s8 s7 s6 s5 s4 s3 s11 a8 Compte tenu des relations s3 = s1 3 , s6 = s2 3 , s9 = s1 9 , (9.3) le déterminant de la matrice carrée est égal à d = −s1 s32 s5 + s22 s24 + s31 s4 s5 + s51 s2 s5 + s31 s22 s5 − s21 s32 s4 + s21 s25 + s41 s42 + s61 s32 − s51 s7 − s41 s8 − s34 − s1 s7 s22 + s12 1 6 2 8 2 8 2 −s41 s24 + s21 s52 + s10 1 s2 + s2 + s2 s8 − s1 s2 + s1 s4 − s1 s2 s8 +s4 s8 − s5 s7 + s41 s22 s4 + s2 s25 − s61 s2 s4 + s1 s2 s4 s5 Un point non trivial est que d n’est pas une fonction identiquement nulle (si le corps de base est infini). En fait dans le cas générique, c’est-àdire si on considère les ai comme des indéterminées et les si (i = 1, 2, 4, 5, 7, 8, 10, 11) comme donnés par les relations (9.2) et (9.3), les éléments si sont algébriquement indépendants. Cela implique alors que les ai (i = 1, . . . , 8) peuvent s’exprimer comme fractions rationnelles en les si (i = 1, 2, 4, 5, 7, 8, 10, 11) avec d pour dénominateur. Un autre point non trivial consiste à résoudre les systèmes linéaires du type (9.2) (lorsque le déterminant correspondant est non nul) par un algorithme (avec divisions) bien parallélisé. L’algorithme de Schönage [81] correspond à une famille de circuits arithmétiques (avec divisions) dans SD(nα+1 , log2 n) (voir aussi le livre [BP] Annexe C pages 372–377). 9.2 Amélioration de Preparata et Sarwate Principe général Considérons un anneau A vérifiant les hypothèses pour l’algorithme de Le Verrier, et une matrice carrée A ∈ An×n . L’amélioration apportée 260 9. Parallélisations de la méthode de Leverrier par Preparata & Sarwate [77] à l’algorithme de Csanky provient du fait que pour calculer les traces sk = Tr(Ak ) (1 ≤ k ≤ n), on n’a pas besoin de calculer toutes les puissances de A. √ Il suffit en effet, si l’on pose p = d n e, de disposer des 2p matrices 2 In , A, . . . , Ap−1 et Ap = B, B 2 , . . . , B p = Ap , ce qui revient à calculer √ 2 d n e − 2 puissances de matrices n × n au lieu des n − 1 puissances de A. Il est fait appel pour cela à deux procédures récursives notées Powers(A, r) et Superpowers(A, r) permettant de calculer les puissances successives d’une matrice carrée A jusqu’à l’ordre r. Les traces des puissances de A seront alors obtenues en considérant les matrices Uj (1 ≤ j ≤ n) définies de la manière suivante : Uj = Lj Cj où Lj ∈ Ap×n est la matrice formée uniquement des j - èmes lignes ( 1 ≤ j ≤ n ) des p matrices In , A, . . . , Ap−1 et où Cj ∈ An×p est la matrice formée des j - èmes colonnes ( 1 ≤ j ≤ n ) des autres matrices 2 Ap , A2p , . . . , Ap . Les matrices Uj (1 ≤ j ≤ n) sont des matrices carrées d’ordre p dont les p2 coefficients ne sont autres que les j - èmes éléments diagonaux des 2 matrices Ap , Ap+1 , . . . , Ap +p−1 . [j] Plus précisément, l’élément ukl qui est position (k, l) dans la matrice Uj et qui est obtenu par multiplication de la j - ème ligne de la matrice Ak−1 par la j - ème colonne de la matrice Apl est donc le j ème élément de la diagonale du produit Ak−1 Apl = Apl+k−1 , c’est-à-dire [j] [pl+k−1] [m] que ukl = a jj pour 1 ≤ k, l ≤ p, si l’on désigne par a rs l’élément en position (r, s) de la matrice Am . Posant m = pl + k − 1 ( m prend toutes les valeurs comprises entre p et p2 + p − 1 quand k et l varient de 1 à p ) on obtient, avec les notations ci-dessus, et pour p ≤ m ≤ p2 + p − 1 : Tr(Am ) = n X j=1 [m] a jj = n X [j] ukl j=1 (où l et k − 1 sont respectivement le quotient et le reste euclidiens de m par p ). Comme les matrices A, . . . , Ap−1 sont déjà disponibles, cela nous 2 donne donc les traces de toutes les puissances A, . . . , Ap , . . . , Ap donc √ celles de toutes les matrices A, . . . , An puisque p2 +p−1 ≥ n+ n−1 ≥ n. D’où l’algorithme de Preparata & Sarwate qui comprend deux parties, la première pour le calcul du polynôme caractéristique de la matrice 9.2. Amélioration de Preparata et Sarwate 261 donnée A ∈ An×n , et la deuxième pour le calcul de l’adjointe et de l’inverse de cette matrice. Calcul du polynôme caractéristique Avant de donner l’algorithme 9.2 page suivante, voyons tout d’abord les sous-procédures utilisées dans cet algorithme. Il s’agit essentiellement de la procédure Superpowers qui est définie de manière récursive à partir de la procédure Powers (elle-même définie de manière récursive) en vue d’accélérer le calcul des puissances d’une matrice carrée donnée (dans notre cas, c’est la matrice A ∈ An×n ). Chacune de ces deux sous-procédures prend donc en entrée A et un entier p > 1 et donne en sortie la matrice rectangulaire n × np formée des p puissances de A : Powers(A, p) = Superpowers(A, p) = [ A | A2 | . . . | Ap ]. Powers(A, s) • m := ds/2e ; • [ A | . . . | Am ] := Powers(A, m) ; • pour i de m + 1 à s faire Ai := Abi/2c Adi/2e . Superpowers(A, p) • r := dlog pe ; • s := bp/rc ; q := p − rs ; • [ A | . . . | As ] := Powers(A, s) ; • pour k de 1 à r − 1 faire Ask × Powers (A, s) ; (cela donne toutes les puissances de A jusqu’à l’ordre rs) • pour i de 1 à q faire Asr × [ A | . . . | Aq ] ; (pour avoir les q = p − rs puissances restantes de A). La complexité de l’algorithme Nous utilisons comme d’habitude les notations 7.2.1 page 195. Nous allons déterminer les paramètres de complexité de la famille de circuits arithmétiques parallèles représentant l’algorithme de Preparata & Sarwate en commençant par la complexité des sous-procédures qu’il utilise. Les paramètres de complexité pour l’algorithme principal 9.2 (représenté par la colonne PS(A, n) ) et les procédures auxiliaires Powers (colonne PW(A, p) ) et Superpowers (colonne SPW(A, p) ) seront désignés, conformément au tableau suivant, respectivement par : 262 9. Parallélisations de la méthode de Leverrier Algorithme 9.2 Algorithme de Preparata & Sarwate Entrée : Un entier n et une matrice A ∈ An×n . Sortie : Le vecteur ~c des coefficients du polynôme caractéristique de A. √ Les étapes du calcul (avec p = d n e), 1. Calculer les puissances A, . . . , Ap en appelant Superpowers(A, p) ; 2 2. Calculer les puissances Ap , . . . , Ap en faisant Superpowers(Ap , p) ; 3. Calculer en parallèle les n produits Uj = Lj Cj ( 1 ≤ j ≤ n ) ; 4. Former le vecteur ~s et la matrice triangulaire S en calculant en pa[j] rallèle, à partir des matrices Uj = (ukl ) obtenues à l’étape précédente, P [j] les n traces sm = nj=1 ukl (1 ≤ m ≤ n). On prendra, pour chaque valeur de m, l = bm/pc et k = m + 1 − lp ; 5. Calculer S −1 (en utilisant l’approche (( diviser pour gagner ))) ; 6. Calculer le produit S −1~s = ~c. ↓ Paramètre / Procédure → Taille Profondeur Largeur PS(A, n) τ (n) π(n) λ(n) PW(A, p) τ1 (p) π1 (p) λ1 (p) SPW(A, p) τ2 (p) π2 (p) λ2 (p) La définition de la procédure Powers nous donne les relations de récurrence :   τ1 (p) = τ1 (dp/2e) + bp/2c µM (n) π1 (p) = π1 (dp/2e) + γM (n)  λ1 (p) = max { λ1 (dp/2e), bp/2c λM (n) } on en déduit   τ1 (p) π1 (p)  λ1 (p) pour p ≥ 2 par sommation de 1 à r = dlog pe : ≤ (2p − 3) Cα nα ≤ Kα dlog pe log n = bp/2c λM (n) ≤ 12 Lα p log n . La définition de la procédure Superpowers dans laquelle r = dlog pe, s = bp/rc et q := p − rs, permet d’écrire 1 :   τ2 (p) = τ1 (s) + (p − s) µM (n) π2 (p) = π1 (s) + r γM (n)  λ2 (p) = max {λ1 (s), s λM (n)} 1. Le calcul préliminaire des entiers r, s, q n’intervient pas : il fait partie de la construction du circuit arithmétique correspondant. 9.2. Amélioration de Preparata et Sarwate qui donnent,   τ2 (p) π2 (p)  λ2 (p) 263 avec les majorations précédentes : ≤ ≤ = (p + s − 3) Cα nα ≤ [ p + (p/ log p) − 3 ] Cα nα 2Kα (dlog pe log n) bp/rc λM (n) ≤ (Lα p nα ) / (log p log n) . L’algorithme utilise en plus des procédures ci-dessus une procédure d’inversion de matrice triangulaire. Nous avons vu (proposition 7.2.2) que l’inversion d’une matrice triangulaire fortement régulière se fait par un circuit arithmétique parallèle de taille majorée par Cα (2n−1)α donc par 8 Cα nα , de profondeur au plus égale à Kα (log2 (n) + 3 log (n) + 2) + 1 ≤ 2 Kα (log (n) + 1)2 . Et sa largeur est O(nα / log2 n) si on applique le principe de Brent. Ceci permet d’établir la complexité de la première partie de l’algo√ rithme principal. Compte tenu du fait que p = d n e et que 2 ≤ α ≤ 3, le tableau 9.2 indique le résultat des majorations pour la taille et la profondeur et pour chaque étape. Complexité de l’Algorithme de Preparata & Sarwate Etapes Etape 1 Etape 2 Etape 3 Etape 4 Etape 5 Etape 6 Total Taille [ p + (p/ log p) − 3 ] nα [ p + (p/ log p) − 3 ] nα n [pµM (p) + (p − 1)p2 ] n (n − 1) 8 Cα nα n2 1 τ (n) = O(nα+ 2 ) Profondeur 2 Kα dlog pe log n 2 Kα dlog pe log n Kα log n dlog ne 2 Kα (log (n) + 1)2 dlog ne + 1 π(n) = O(log2 n) Tableau 9.2 On en déduit le résultat suivant de Preparata & Sarwate, dans lequel nous avons également intégré, le calcul de l’adjointe et de l’inverse qui constitue la deuxième partie de cet algorithme : Théorème 9.2 Soit A un anneau vérifiant les hypothèses pour l’algorithme de Le Verrier. Le polynôme caractéristique, le déterminant, l’adjointe et l’inverse (s’il existe) d’une matrice carrée A ∈ An×n se fait par un circuit arithmétique de taille τ (n), de profondeur π(n) et 264 9. Parallélisations de la méthode de Leverrier de largeur λ(n) majorées    τ (n) π(n)   λ(n) respectivement par : 1 1 ≤ 4 Cα nα+ 2 + o(nα+ 2 ) ≤ 5 Kα log2 n + O(log n) 1 ≤ (2 Lα nα+ 2 ) / (log2 n) où Cα , Kα , Lα désignent les constantes asymptotiques de la multiplication parallèle des matrices en SD(nα , log n). Calcul de l’adjointe et de l’inverse L’algorithme de Preparata & Sarwate ne calcule pas toutes les puissances de la matrice A. Par conséquent le calcul de l’adjointe de A à partir de la formule de Cayley-Hamilton doit se faire en n’utilisant que √ les 2 d n e puissances de A déjà calculées, avec en plus les coefficients c1 , c2 , . . . , cn du polynôme caractéristique et les matrices Lj formées des lignes des premières puissances de A également disponibles. L’astuce est de considérer les p matrices P j Bi−1 = p−1 j=0 cn−p (i−1)−j−1 A (1 ≤ i ≤ p) formées avec les coefficients du polynôme caractéristique, avec la convention c0 = −1 et ck = 0 si k < 0 (rappelons que n ≤ p2 ). On calcule ensuite la somme Pp−1 Pp−1 Pp−1 pk = pk+j j=0 cn−pk−j−1 A k=0 Bk A k=0 en répartissant les calculs sur dlog pe étapes parallèles avec au maximum p / log p multiplications de matrices n × n (i.e. des produits du type Bk × Apk ) par étape. Pn `−1 = AdjA , puisque d’une Or cette somme est égale à `=1 cn−` A part cn−` = 0 si ` > n et que d’autre part, si ` est compris entre 1 et n, ` correspond de manière unique à un couple (k, j) tel que 1 ≤ j, k ≤ p − 1 et ` − 1 = p k + j (division euclidienne de ` − 1 par p). Ce qui donne l’adjointe puis l’inverse. Ainsi la deuxième partie de l’algorithme de Preparata & Sarwate pour le calcul de l’adjointe et de l’inverse de A peut être détaillée comme suit. Entrées : — Les puissances A, . . . , Ap de la matrice A, ainsi que les puissances 2 A2p , . . . , Ap de la matrice Ap , toutes disponibles à l’issue des deux premières étapes de l’algorithme principal 9.2 ; 2 — La matrice L = [ L1 | L2 | · · · | Ln ] ∈ Ap×n formée des n matrices 9.2. Amélioration de Preparata et Sarwate 265 Lk ( 1 ≤ k ≤ n ) déjà calculées ; — Enfin la matrice C formée à partir des coefficients c1 , c2 ,. . . , cn du P polynôme caractéristique PA (X) = (−1)n X n − ni=1 ci X n−i :    C=  cn−1 cn−2 cn−p−1 .. . cn−p−2 .. . ··· ··· .. . cn−p cn−p−p .. .     ∈ Ap×p .  cn−p (p−1)−1 cn−p (p−1)−2 · · · cn−p (p−1)−p P j On a alors Bi−1 = p−1 j=0 cij A et il est facile de voir que la k - ème ligne de cette matrice n’est autre que la i - ème ligne de la matrice Tk := C Lk où Lk , rappelons-le, est la matrice formée des k - èmes lignes des matrices In , A, . . . , Ap−1 . Sortie : L’adjointe et l’inverse de A, c’est-à-dire les matrices AdjA = An−1 − c1 An−2 − . . . − cn−1 A − cn In et A−1 = 1 cn AdjA. Les étapes du calcul : Faisant suite aux étapes (1 à 6) qui calculent le polynôme caractéristique, elles seront numérotées de 7 à 10. On pose r = dlog pe et D0 = 0nn (la matrice carrée d’ordre n nulle) et s = bp/rc : 7. Calculer le produit T = C L = [ CL1 | CL2 | · · · | CLn ] (ce qui revient à calculer en parallèle les produits de la matrice C qui est une matrice p × p par les n matrices CLk qui sont des matrices p × n ). Cette étape permet d’écrire les matrices Bi−1P( 1 ≤ i ≤ p ). is−1 Bk Apk ; 8. pour k de 1 à r faire Dk := Dk−1 + k=(i−1)s Pp−1 9. Calculer Adj A := −(Dr + k=rs Bk Apk ) ; 10. Calculer A−1 = c1n Adj A. La complexité de cette deuxième partie de l’algorithme de Preparata & Sarwate possède les mêmes bornes que l’algorithme principal du polynôme caractéristique. L’étape 7 se fait en Kα log n étapes comportant au total n p Cα pα opérations arithmétiques dans l’anneau de base, utilisant au maximum n p Lα (pα / log p) processeurs. Les étapes 8 et 9 sont les plus coûteuses. Elles correspondent à un total de r + 1 étapes parallèles comportant p multiplications de matrices carrées d’ordre n c’est-à-dire p Cα nα opérations arithmétiques de 266 9. Parallélisations de la méthode de Leverrier base, ce à quoi il faut rajouter des additions de matrices n × n. Cela fait un circuit de profondeur (r + 1) Lα log n + O(log n) ≤ 1 (log n + 1) Lα log n + O(log n) . 2 Le nombre de processeurs utilisés au cours de ces r + 1 étapes parallèles est égal à s Lα (nα / log n) ≤ (Lα p nα) / log n log p puisque s = bp/rc ≤ p / log p. 9.3 Amélioration de Galil et Pan Galil & Pan [32] réduisent les étapes les plus coûteuses de l’algorithme précédent à quatre multiplications de matrices rectangulaires. Il s’agit plus précisément des l’étapes 1, 2 et 3 de l’algorithme principal (calcul du polynôme caractéristique) d’une part et des étapes 8 et 9 du calcul de l’adjointe d’autre part. Par une réorganisation des étapes 1 et 2 de l’algorithme principal qui font intervenir les procédures récursives Powers et Superpowers, on remplace l’appel à ces procédures par l’appel récursif à une procédure unique permettant de calculer les matrices [ A | A2 | . . . | Ap−1 ] et [ Ap | A2p | . . . | Ap(p−1) ] à partir des matrices [ A | A2 | . . . | As−1 ] et [ As | A2s | . . . | A(s−1) s ] √  où s = p . Cela se fait en effectuant le produit d’une matrice rectangulaire n (s − 1) × n par une matrice rectangulaire n × ns qui donne les puissances restantes :   A  A2  h i 2   .  ..  × As A2s · · · As  .  As−1 L’étape 3 de l’algorithme principal calcule les n produits Uj = Lj Cj ∈ Ap×p pour en déduire les traces des puissances de A. Il est possible de réduire cette étape au calcul d’un seul produit de deux matrices √ rectangulaires de types respectifs p × n2 et n2 × p où p = d n e. En effet, si on écrit les éléments de chaque matrice Ak (pour 0 ≤ k ≤ p−1 ) sur une seule ligne, de manière à la représenter par la suite ordonnée de 2 ses n lignes, c’est-à-dire par vk ∈ A1×n , et si l’on fait de même avec 9.3. Amélioration de Galil et Pan 267 les matrices Apk ( 1 ≤ k ≤ n ), mais en déroulant cette fois chacune d’elles sur une seule colonne ( Apk sera donc représentée, dans l’ordre 2 de ses colonnes, par wk ∈ An ×1 ), le calcul des traces sk revient alors à calculer le produit des deux matrices rectangulaires :  v0  v1      · · ·  × w1 vp−1       v 0 w1 v 1 w1 .. . v 0 w2 v 1 w2 .. . vp−1 w1 vp−1 w2 w2 ··· ··· .. . ··· wp  =  v 0 wp v 1 wp .. .   .  · · · vp−1 wp Il est clair que l’élément vi−1 wj de la i - ème ligne et j - ème colonne de cette matrice est égal à spj+i−1 = TrApj+i−1 (1 ≤ i, j ≤ p). On modifie enfin les étapes 8 et 9 du calcul de l’adjointe de A en √ prenant q = d 3 n e, t = b(n + 1) / qc de manière à avoir qt ≤ n + 1 < q(t+1), et on change les dimensions de la matrice C en la remplaçant par C ∗ = (cij ) ∈ A(t+1)×q (avec les mêmes notations et la même convention pour les cij ) ainsi que les dimensions des matrices L1 , L2 , . . . , Ln en les remplaçant par des matrices L∗1 , L∗2 , · · · , L∗n définies exactement de la même façon mais à partir des lignes des matrices In , A, · · · , Aq−1 , ce qui fait qu’elles sont de type q × n au lieu d’être de type p × n. 2 On calcule alors la matrice T ∗ ∈ A(t+1)×n en effectuant le produit d’une matrice (t + 1) × q par une matrice q × n2 : T ∗ = C ∗ [ L∗1 | L∗2 | · · · | L∗n ] = [ C ∗ L∗1 | C ∗ L∗2 | · · · | C ∗ L∗n ] en tenant compte du fait que la (i + 1) - ème ligne du bloc C ∗ L∗j n’est autre que la j - ème ligne de la matrice Bi = q−1 X j=0 j cn−1−qi−j A = q−1 X ci+1,j+1 Aqi+j (ici 0 ≤ i ≤ t) . j=0 Avec ces modifications, les étapes 8 et 9 se ramènent donc, comme on peut le constater, au calcul du produit de deux matrices rectangulaires (avec les mêmes notations que ci-dessus) qui est un produit d’une 268 9. Parallélisations de la méthode de Leverrier matrice n × n (t + 1) par une matrice n (t + 1) × n  In  Aq     2q B0 B1 B2 · · · Bt ×  A  ..  . Atq :     .   Posant ` = qi + j, ce dernier produit est en effet égal à t X i=0 qi Bi A = q−1 t X X (t+1) q−1 cn−1−qi−j A qi+j = i=0 j=0 X cn−1−` A` . `=0 Comme (t + 1) q − 1 > n (d’après la définition même de t et de q ) et que cn−1−` = 0 pour ` ≥ n, la matriceP ainsi obtenue est exactement l’opposée de l’adjointe de A : AdjA = − nl=1 cn−` A`−1 . Les calculs de ces quatre produits de matrices rectangulaires auxquels Galil & Pan réduisent l’algorithme de Preparata & Sarwate, et qui sont des multiplications respectifs donnés par le tableau suivant où √ d’ordres  √ √ p , q = d 3 n e , t = b(n + 1) / qc, p = d ne, s = Multiplication 1ère multiplication 2ème multiplication 3ème multiplication 4ème multiplication 1er facteur n (s − 1) × n p × n2 (t + 1) × q n × n (t + 1) 2ème facteur n × ns n2 × p q × n2 n (t + 1) × n s’effectuent en O(log2 n) étapes parallèles. On fait d’autre part appel aux résultats concernant les notions d’algorithme bilinéaire et de rang tensoriel (voir la section 7.3), pour améliorer la complexité théorique de l’algorithme de Preparata & Sarwate ainsi remanié, en faisant passer l’exposant de n dans cette complexité (en taille et en nombre de processeurs) de 2, 876 à 2, 851 (si on prend le α ≈ 2, 376 de Winograd & Coppersmith [19]). Rappelons (voir la section 7.3.1) que le rang tensoriel de l’application bilinéaire f : Am×n × An×p −→ Am×p associée à la multiplication des matrices m × n par des matrices n × p à coefficients dans A (on note hm, n, piA cette application bilinéaire) est défini comme le rang de l’algorithme bilinéaire ou du tenseur 9.3. Amélioration de Galil et Pan 269 définissant hm, n, piA , c’est-à-dire le nombre minimum de multiplications essentielles nécessaires au calcul bilinéaire correspondant. Ce rang est noté R hm, n, pi (nous omettons A en indice dans la mesure où tous les résultats cités s’appliquent à n’importe quel anneau). Outre les propriétés établies dans la section 7.3, il y a un résultat dû à Coppersmith [18] pour le cas des matrices rectangulaires qui nous occupe ici. Il est utilisé par Galil & Pan pour établir qu’il existe une constante positive β estimée dans un premier temps à β = (2 log 2) / (5 log 5) ≈ 0, 172 puis à β ≈ 0, 197 qui vérifie la propriété R hm, mβ , mi = O(m2+ ) pour tout  > 0. Les modifications des étapes les plus coûteuses aboutissent à des multiplications de matrices rectangulaires de rangs respectifs : Multiplication 1ère multiplication 2ème multiplication 3ème multiplication 4ème multiplication Rang tensoriel R hn5/4 , n, n5/4 i R hn1/2 , n2 , n1/2 i R ht + 1, q, n2 i R hn, n (t + 1), ni où q  n1/3 et t  n2/3 vérifient aussi qt ≤ n + 1 < q (t + 1). On a alors : Théorème 9.3 (Galil & Pan) Le calcul du polynôme caractéristique, de l’adjointe et l’inverse d’une 1 matrice carrée d’ordre n est en SD(nα+ 2 −δ , log 2 n) où δ est un réel strictement positif dépendant de α. En particulier, pour α ≈ 2, 376 la taille du circuit arithmétique est un O(n2,851 ). Il suffit en effet, pour établir ce résultat, d’évaluer les quatre rangs tensoriels indiqués dans le tableau ci-dessus en utilisant la constante β de la multiplication des matrices rectangulaires ( β < 1 ). Pour cela, on pose m = n1 / (4−4β) et r = n1 / (4−4β) , ce qui donne les estimations R hm, mβ , mi = O(n(2+) / (4−4β) ) et R hr, r, ri = O(nα(4−5β) / (4−4β) ) qui, multipliées entre elles, donnent R hn5/4 , n, n5/4 i = O(nρ ) où 1 ρ = α+ +δ1 2 et δ1 =  − β(α − 2) · 4 − 4β 270 9. Parallélisations de la méthode de Leverrier Comme α > 2 et β < 1, on peut prendre 0 <  < β(α − 2) et δ1 > 0, ce qui établit le résultat pour la première multiplication. Pour les trois autres multiplications, on remarque que : • d’une manière générale R hm, m4 , mi = O(mα+3 ) (multiplication par α+3 blocs m × m ) et que, par conséquent, R hn1/2 , n2 , n1/2 i = O(n 2 ) = 1 O(nα+ 2 +δ2 ) avec δ2 = α−2 2 > 0. 2 (α−3) η+3 ) = O(nα+ 21 +δ3 ) si l’on prend t = nη , • R ht + 1, q, n i = O(n q = n1−η , et δ3 = (1 − η)(3 − α) + 12 avec 0 < η < 1. 1 • R hn, n (t + 1), ni = O(nα+η ) = O(nα+ 2 +δ4 ) avec δ4 = 12 − η pour le même η. Prenant 0 < η < 12 et (1 − η)(α − 3) < 12 , ce qui correspond au cas concret η = 13 , cela donne bien inf (δ1 , δ2 , δ3 , δ4 ) > 0 et établit le résultat o(nα+1/2−δ ) pour n’importe δ > 0 strictement inférieur à inf (δ1 , δ2 , δ3 , δ4 ). Le résultat numérique en découle pour α < 2, 376. En fin de compte l’exposant de n dans la complexité asymptotique pour le calcul du polynôme caractéristique et de l’adjointe par la méthode de Preparata & Sarwate est de 2, 876 au lieu de 2, 851 de Galil & Pan pour α = 2, 376. Conclusion Les algorithmes de Csanky, de Preparata & Sarwate, de Galil & Pan ne sont en fait que des variantes parallélisées de la méthode de Le Verrier (1840) mais elles ont le mérite d’avoir ingénieusement réduit, et de manière spectaculaire, la complexité des circuits arithmétiques permettant de résoudre ces problèmes dans le cas d’un anneau commutatif autorisant les divisions exactes par les entiers. Les estimations de ces algorithmes parallèles dans le cas de tels anneaux restent les meilleures connues à l’heure actuelle. 10. Calcul du polynôme caractéristique sur un anneau commutatif arbitraire Introduction Dans ce chapitre, nous présentons des algorithmes bien parallélisés de calcul du polynôme caractéristique sur un anneau commutatif arbitraire. Le premier résultat de cette sorte, exposé dans la section 10.1, a été obtenu en 1982. L’estimation de son temps séquentiel est pessimiste, mais il reste d’un grand intérêt théorique Dans les sections suivantes nous expliquons les algorithmes de Chistov et de Berkowitz (amélioré) qui sont dans SD(nα+1 log n, log2 n). On notera que le résultat est cependant moins bon en temps séquentiel que pour l’algorithme de Preparata & Sarwate (qui réclame la division par un entier arbitraire) ou celui de Kaltofen (qui n’est pas bien parallélisé). 10.1 Méthode générale de parallélisation Tout programme d’évaluation (donc tout circuit arithmétique) sans division à n indéterminées (xi )i=1..n sur un anneau A calcule un polynôme de A [x1 , . . . , xn ]. Valiant, Skyum, Berkowitz et Rackoff [95] démontrent le résultat important suivant. La preuve, délicate, est bien expliquée dans [Bur]. 272 10. Polynôme caractéristique sur un anneau arbitraire Théorème 10.1 Soit Γ un circuit arithmétique sans division, de taille `, qui calcule un polynôme f de degré d en n variables sur un anneau A. Alors il existe un circuit arithmétique homogène Γ0 de taille O(`3 d6 ) et de profondeur O(log(` d) log d) qui calcule (les composantes homogènes de) f ( 1 ). En outre la construction de Γ0 à partir de Γ est LOGSPACE . En particulier : Corollaire 10.1.1 Toute famille (Q` ) de polynômes de degrés d = O(`k ) qui peut être calculée au moyen d’une famille uniforme de circuits arithmétiques peut aussi être calculée dans la classe N C 2 . En appliquant le théorème 10.1 à l’algorithme du pivot de Gauss auquel on fait subir la procédure d’élimination des divisions à la Strassen, et vu que le déterminant qu’il calcule est un polynôme de degré n, on obtient le résultat suivant dû à Borodin, Hopcroft et Von zur Gathen [9] : Proposition 10.1.2 Le déterminant d’une matrice n × n est calculé par un programme d’évaluation de taille O n18 log3 n log3 log n et de profondeur O(log2 n). Dans la construction correspondant au théorème 10.1 est utilisée la multiplication rapide des polynômes. Avec la multiplication usuelle des  polynômes, la proposition 10.1.2 donne O n21 opérations arithmétiques dans l’anneau de base. 10.2 Algorithme de Berkowitz amélioré Introduction Utilisant la méthode de partitionnement [Gas, FF], attribuée à Samuelson ([79]), Berkowitz [6] a pu exhiber un circuit arithmétique parallèle de taille O(nα+1+ ) et de profondeur O(log2 n), où  est un réel positif quelconque. 1. On trouve dans [Bur] la majoration O(log(` d) log d + log n) pour la profondeur. Le terme log(n) supplémentaire est nécessaire lorsque d = 1 si on a log 1 = 0. Mais la convention de notation 1.6.1 que nous avons choisie pour log d, conforme à la longueur du code binaire de d, nous donne log 1 = 1. 10.2. Algorithme de Berkowitz amélioré 273 Il a ainsi amélioré de manière décisive la complexité asymptotique du calcul des déterminants, polynômes caractéristiques, et adjointes de matrices à coefficients dans un anneau commutatif quelconque A. Nous allons donner une version légèrement améliorée de l’algorithme de Berkowitz, due à Eberly [29], qui ramène sa taille à O(nα+1 log n) sans en changer la profondeur. Pour cela nous donnons une version plus simple de la récurrence utilisée pour le calcul des coefficients du polynôme caractéristique. Nous donnons également une estimation précise de la constante qui intervient dans le (( grand O )) de la complexité séquentielle (cf. [1]). Soit A = (aij ) ∈ An×n une matrice carrée d’ordre n ≥ 2 sur un anneau commutatif arbitraire A. Conformément aux notations introduites dans la section 1.1, pour tout entier r (1 ≤ r ≤ n), on désigne par Ar la sous-matrice principale dominante d’ordre r de A. On notera ici Rr la matrice Ar+1,1..r ∈ A1×r et Sr la matrice A1..r,r+1 ∈ Ar×1 . Rappelons la formule de Samuelson (2.14) vue à la section 2.6. ( (ar+1,r+1 − X) Pr (X) +  r+1−k Pr+1 = Pr+1  k−2 S ) p + · · · + (R S ) p r 0 r r k−2 X k=2 (Rr Ar P où Pr (X) = ri=0 pr−i X i . Notons Qr+1 le polynôme −X r+1 + ar+1,r+1 X r + Rr Sr X r−1 + Rr Ar Sr X r−2 + · · · + Rr Ar−1 r Sr . On peut aussi écrire la formule de Samuelson sous la forme (2.15) : −−→ − → Pr+1 = Toep(Qr+1 ) × Pr − → où Pr est le vecteur colonne t (p0 , p1 , . . . , pr ) des coefficients du polynôme P et Toep(Qr+1 ) ∈ A(r+2)×(r+1) est la matrice de Toeplitz suivante définie à partir du polynôme Qr+1 :   −1 0 ··· ··· 0   .. ..  a  . −1 .  r+1,r+1    .. .. .. ..   . . .   R r Sr .   Toep(Qr+1 ) =   .. .. .. ..   . . . . 0       .. ..  R Ar−2 S  . . −1 r  r r  Rr Arr−1 Sr Rr Ar−2 r Sr . . . Rr Sr ar+1,r+1 Le calcul du polynôme caractéristique consiste donc : 274 10. Polynôme caractéristique sur un anneau arbitraire – à calculer d’abord les coefficients de la matrice Toep(Qr+1 ) – qui interviennent dans l’égalité (2.15) – ou, ce qui revient au même, la famille T = {RM i S}r−1 i=0 lorsque R, M, S sont respectivement des matrices 1 × r, r × r, et r × 1, et lorsque r est un entier tel que 2 ≤ r < n (M = Ar , R = Rr , S = Sr ) ; – à calculer ensuite le polynôme Pn dont le vecteur des coefficients, compte tenu de (2.15), est donné par : − → Pn = Toep(Qn ) × Toep(Qn−1 ) × · · · × Toep(Q1 ) (10.1) Dans son papier original [6], Berkowitz démontre que les familles 1/2 1/2 U = {RM i }ni=0 et V = {M j n 1/2 S}nj=0 peuvent être calculées par un circuit arithmétique parallèle en SD(nα+ , log2 n) pour en déduire que le calcul du polynôme caractéristique se fait en SD(nα+1+ , log2 n) . La version parallèle améliorée et sa complexité Nous utilisons comme d’habitude la notation 7.2.1 page 195. Proposition 10.2.1 On considère un entier r ≥ 2 et des matrices R ∈ A1×r , M ∈ Ar×r , S ∈ Ar×1 . La famille T = {R M i S}r−1 i=0 peut être calculée par un circuit arithmétique dont la taille et la profondeur sont majorées respectivement par Cα rα log r + O(rα ) et Kα log2 r + O(log r) . Preuve. Soit r ≥ 2. On utilisera, pour  1 l’analyse  de complexité des algorithmes, les entiers ν = dlog4 re = 2 log r et η = dlog re qui vérifient les inégalités : 22ν−2 < r ≤ 22ν et 2η−1 < r ≤ 2η (on a aussi 1 ≤ ν ≤ 2ν − 1 ≤ η ≤ 2ν). Toute matrice  carrée A d’ordre r sera plongée, selon le cas, soit  dans  A 0 A 0 η une matrice carrée d’ordre 2 soit dans une matrice 0 0 0 0 2ν carrée d’ordre 2 (chacun des 0 désignant ici une matrice nulle de dimensions convenables). 10.2. Algorithme de Berkowitz amélioré 275 Il faut cependant que, dans les deux cas, l’élévation au carré  remarquer  A 0 de la matrice se fait à l’aide d’un circuit arithmétique de taille 0 0  2  2  A 0 A 0 α Cα r et de profondeur Kα log r puisque = . 0 0 0 0 De même, le produit d’une matrice 2k × 22ν (k = 1, . . . , ν) par une   A 0 2ν 2ν matrice du type ∈ A2 ×2 avec A ∈ Ar×r peut être obtenu 0 0 par le calculdu produit d’une matrice 2k × 2η par une matrice du A 0 η η ∈ A2 ×2 à cause du fait que, dans ces deux produits, type 0 0 les r premières colonnes sont les mêmes alors que les colonnes restantes sont nulles. Ce qui fait que le produit en question peut être obtenu par 22(η−k) multiplications en parallèle de blocs 2k ×2k et de 2η−k (2η−k −1) additions en parallèle des blocs produits obtenus, c’est-à-dire par un circuit arithmétique de taille 2η−k [2η−k Cα 2kα + (2η−k − 1)22k ] ( 2 ) et de profondeur (Kα + 1) k . Considérons à présent, pour k = 1, . . . , ν , la matrice Uk dont les 2k −1 lignes sont les éléments de la famille {RM i }i=0 considérée comme une matrice 2k × 2η et la matrice Vk dont les colonnes sont les éléments k −1 ν de la famille {M j2 S}2j=0 considérée comme une matrice 2η × 2k . La ν η famille T s’obtient alors en calculant la matrice Uν ∈ A2 ×2 puis η ν la matrice Vν ∈ A2 ×2 et enfin le produit matriciel Wν = Uν Vν . La famille T = {R M i S}r−1 déterminée par la donnée i=0 est entièrement ν ×2ν 2 de la matrice Wν = (wij ) = Uν Vν ∈ A puisque : R M k S = wij 2ν−1 ν (0 ≤ k ≤ 2 ) si et seulement si k = (i −  1)ν + (j − 1)2 i.e. si et k k seulement si j = 2ν + 1 et i = k + 1 − 2ν 2 . Le calcul de T se fait donc en deux phases : une première phase de calcul des matrices Uν et Vν et une deuxième phase de calcul du produit Wν = Uν Vν . • Coût de la phase 1 : Le calcul de Uν et de Vν sefait de proche en proche à partir de   S η η U0 = R 0 ∈ A1×2 , V0 = ∈ A2 ×1 et des puissances de 0 M obtenues par élévations successives au carré, c’est-à-dire les matrices s M 2 ( 1 ≤ s ≤ 2ν − 1 ). 2. Le premier terme du crochet provient des multiplications de blocs 2k × 2k , et le second terme indique le nombre d’additions dues aux additions des blocs. 276 10. Polynôme caractéristique sur un anneau arbitraire On a en effet, pour k = 1, . . . , ν : k k−1 −1 {RM i }2i=0−1 {M j2ν = {RM i }2i=0 2k −1 = {M S}j=0 j2ν 2k−1 −1 S}j=0 k−1 ∪ {RM i+2 ∪ {M k−1 −1 }2i=0 2ν (j+2k−1 ) et 2k−1 −1 S}j=0 Ce qui donne, de manière plus précise, les relations matricielles suivantes ν (si on pose N = M 2 ) :   h i Uk−1 k η η k ] Uk = ] ∈ A2 ×2 et Vk = Vk−1 V ∈ A2 ×2 k−1 Uk−1 avec 2k−1 ] et U k−1 = Uk−1 × M 2k−1 ] V × Vk−1 . k−1 = N D’où l’algorithme suivant pour le calcul de Uν et Vν (comportant 2ν étapes successives) à partir des données initiales U0 , V0 (c’est-à-dire R , S) : k 1. L’étape k (1 ≤ k ≤ ν) consiste à calculer Uk et M 2 ; pour cela k−1 deux opérations seront exécutées en parallèle sur M 2 qui est une matrice 2η ×2η (déjà calculée à l’étape k−1 ) : l’élever au carré et la multiplier à gauche par Uk−1 qui est une matrice 2k−1 × 2η . A la fin de ces ν étapes, on obtient la matrice Uν et la matrice ν N = M 2 (figure 10.1). R Etape 0 M 2 Etape 1 M RM 2 RM 3 M RM RM 22 Etape 2 4 . . . ... . 2ν −1− 1 . . . RM .... 2ν−1 RM 2ν −1 Etape (ν − 1) M . . . 2ν M =N Etape ν Figure 10.1 – Calcul de Uν les liens en trait pointillé indiquent les multiplications à effectuer au cours d’une étape pour passer à l’étape suivante 10.2. Algorithme de Berkowitz amélioré 277 k 2. L’étape ν + k (1 ≤ k ≤ ν) consiste à calculer Vk et N 2 : là encore, il s’agit d’élever au carré une matrice 2η × 2η et de la multiplier à droite par Vk−1 qui est une matrice 2η × 2k−1 . A l’issue de ces ν nouvelles étapes, on obtient Vν et la matrice ν N 2 (figure 10.2). S données N 21 Etape ν+1 N NS 2 NS 22 3 Etape ν+2 N NS 22 N S . . . ... . . . . 2ν −1− 1 N S .... 2ν−1 N 2ν −1 Etape 2ν −1 N . . . 2ν N S Etape 2ν Figure 10.2 – Calcul de Vν les liens en trait pointillé indiquent les multiplications à effectuer au cours d’une étape pour passer à l’étape suivante Si l’on utilise les multiplications par blocs 2k−1 ×2k−1 (ils sont ici au nombre de 2η−k+1 blocs ), l’étape k (resp. ν + k) ci-dessus est réalisée par un circuit de taille : Cα rα + 2η−k+1 × [ 2η−k+1 Cα 2(k−1)α + (2η−k+1 − 1)22(k−1) ]. et de profondeur égale à max {Kα η, (k − 1) (Kα − 1) + η} = Kα η (puisque Kα est supposé ≥ 1). Tenant compte du fait qu’il y a 2ν étapes et que η ≤ 2ν < log r + 2 , l’algorithme calculant Uν et Vν est donc réalisé par un circuit de profondeur 2νKα η ≤ Kα (log r + 1)(log r + 2) et de taille majorée par : P Cα rα (log r + 2) + 2η+1 νk=1 (Cα 2(α−2)(k−1) + 1) et donc par : P (Cα rα + 2 r)(log r + 2) + 4 Cα r νk=1 2(α−2)(k−1) qui est égal à : (Cα rα + 2 r)(log r + 2) + 4 Cα 2(α−2)ν − 1 r. 2(α−2) − 1 Cette taille est donc majorée par : α α 8 Cα (Cα rα + 2 r)(log r + 2) + (α−2) r 2 = Cα rα log r + 2 Cα rα + O (r 2 ) . 2 −1 278 10. Polynôme caractéristique sur un anneau arbitraire qui est clairement O(rα log r) . • Coût de la phase 2 : Cette phase consiste à calculer le produit Uν ×Vν qui peut s’effectuer par des multiplications de blocs 2ν × 2ν , en parallèle et en 2 grandes étapes. – La première étape consiste à calculer en parallèle 2η−ν produits de blocs 2ν × 2ν , avec 2η−ν Cα 2να opérations arithmétiques dans l’anneau de base, ce qui donne une profondeur totale de Kα ν ; – Il s’agit dans la deuxième étape de calculer en parallèle la somme des 2η−ν produits obtenus précédemment, faisant intervenir (2η−ν − 1) 22ν additions dans l’anneau de base, à l’aide d’une famille de circuits binaires équilibrés de profondeur η − ν . Le nombre total d’opérations arithmétiques, dans l’anneau de base, qui interviennent dans ces deux grandes étapes du calcul de T, correspondant à une profondeur totale de (Kα − 1) ν + η, est donc majoré par : 2η−ν Cα 2αν + 2η+ν ≤ Cα 2(α+1)ν + 23ν ≤ Cα 2α+1 r α+1 2 3 + 8r2 . α+1 puisque η ≤ 2ν , α ≤ 3 et Cα ≥ 1 . Ce qui fait aussi O(r 2 ) avec une constante asymptotique égale à 2α+1 Cα . Ainsi, le calcul de T à partir de Uν et Vν se fait par un circuit parallèle de taille O(r de profondeur (Kα − 1) ν + η ≤ puisque Kα ≥ 1, ν ≤ 1 2 α+1 2 ) et 1 (Kα + 1) log r + Kα ≤ Kα (1 + log r) 2 (2 + log r) et r ≥ 2. Nous résumons dans le tableau ci-dessous l’analyse de complexité qui vient d’être faite et qui établit le résultat annoncé. Etapes 1ère phase 2ème phase Total Profondeur Kα (log r + 1)(log r + 2) Kα (log r + 1) Kα (log r + 1)(log r + 3) Taille Cα + O (rα ) α+1 O(r 2 ) Cα rα log r + O (rα ) rα log r La différence essentielle avec l’algorithme de Berkowitz [6] réside dans la simplification de la récurrence permettant de calculer de proche en proche les matrices Uν et Vν : à chaque pas, la multiplication par une 10.2. Algorithme de Berkowitz amélioré 279 seule matrice (au lieu de dn e matrices), avec recours à la multiplication par blocs, a permis de réduire le nombre d’opérations arithmétiques dans l’anneau de base, en éliminant le facteur n . La démonstration de la proposition 10.2.1 a permis de donner une estimation précise de la constante asymptotique : cette constante est en effet égale à Cα ; elle est la même que la constante asymptotique de la multiplication des matrices. Théorème 10.2 Les coefficients du polynôme caractéristique d’une matrice carrée d’ordre n peuvent être calculés par un circuit arithmétique dont la taille et la profondeur sont respectivement majorées par 1 α+1 log n + O(nα+1 ) et par 2 K log2 n + O(log n) . α α+1 Cα n Preuve. Le polynôme caractéristique de la matrice A = (aij ) n’est autre que le polynôme Pn donné par la formule (10.1) : − → Pn = Toep(Qn ) × Toep(Qn−1 ) × · · · × Toep(Q1 ). Le calcul des coefficients (de la forme R M i S ) du polynôme Qk+1 (pour 1 ≤ k ≤ n − 1 ) se fait, d’après la proposition 10.2.1, en O(k α log k) . De manière plus précise, le calcul de la totalité des matrices Toep(Qk+1 ) se fait donc avec une profondeur majorée par Kα (log n + 1)(log n + 3) et une taille majorée par : Cα n−1 X α [k α log k + 2k α + O(k 2 )] ; k=1 c’est-à-dire par : α Cα α+1 2Cα α+1 log n + + O(n 2 +1 ) n n α+1 α+1 à cause du fait : n−1 X k=1 α k log k < ( n−1 X k=1 α k ) log n et n−1 X k=1 α α+1 Z k <n 0 1 xα dx = nα+1 · α+1 D’autre part, le produit (10.1) peut être calculé à l’aide d’un circuit binaire équilibré avec O(nα+1 ) opérations arithmétiques de base et une profondeur majorée par Kα log2 n. 280 10. Polynôme caractéristique sur un anneau arbitraire Cela donne en fin de compte, dans l’anneau de base, un nombre total d’opérations arithmétiques majoré par α Cα α+1 2 Cα α+1 Cα α+1 n log n+ n +O(n 2 +1 ) = n log n+O(nα+1 ), α+1 α+1 α+1 avec un circuit arithmétique de profondeur majorée par 2 Kα (log n + 1)2 + Kα = 2 Kα log2 n + O(log n). Proposition 10.2.2 Les coefficients des polynômes caractéristiques de toutes les sous-matrices principales dominantes d’une matrice carrée d’ordre n peuvent être calculés en SD(nα+1 log n, log2 n) (avec les mêmes estimations que celles du théorème 10.2 pour les constantes asymptotiques). Preuve. En effet, on a A = An , et les coefficients du polynôme caractéristique Pr de la sous-matrice principale dominante Ar de A ( 1 ≤ r ≤ n ) sont donnés par les vecteurs : − → Pr = Toep(Qr ) × Toep(Qr−1 ) × · · · × Toep(Q1 ) Ces vecteurs ne sont autres que les troncatures successives (pour r allant de 2 à n ) du second membre de (10.1) : ils peuvent donc être calculés par un algorithme parallèle des préfixes. Le circuit que nous avons représenté (figure 10.3) correspond à l’une des solutions du (( Calcul parallèle des préfixes )) [64], que nous avons présentées dans la section 5.3. Il s’agit d’un circuit parallèle de profondeur dlog ne + 1 et de taille majorée par 3n. Comme il s’agit de multiplications matricielles, chaque nœud interne du circuit (représenté par une croix dans la figure) correspond à un circuit de multiplication de matrices de profondeur Kα log n avec O(nα ) opérations arithmétiques dans l’anneau de base. Le calcul des Pr ( 2 ≤ r ≤ n ) à partir des matrices Toep(Qk ) se fait donc par un circuit de taille O(nα+1 ) et de profondeur majorée par Kα (log n + 1) (log n + 2). On conclut de la même façon que le théorème 10.2 pour le produit des matrices de Toeplitz. t u Corollaire 10.2.3 Le déterminant et l’adjointe d’une matrice carrée d’ordre n se calculent en SD(nα+1 log n, log2 n) (avec les mêmes bornes que celles du théorème 10.2 pour les constantes asymptotiques). Preuve. Le déterminant de A n’est autre que PA (0). D’autre part, la matrice adjointe de A est donnée par la formule : Adj(A) = −(p0 An−1 + p1 An−2 + · · · + pn−2 A + pn−1 In ) 10.2. Algorithme de Berkowitz amélioré Toep(Q1) Toep(Q4) Toep(Q8) ... ... x x x x Toep(Q9) Toep(Q12) Toep(Q16) ... ... x x x 281 x x x x x x x x x x P1 P2 ... P5 P6 P7 P8 x x x P9 P10 x x ... x P13 x x ... x P16 Figure 10.3 – Calcul des Pr pour 1 ≤ r ≤ n (ici n = 24 ) où PA (X) = Pn i=1 pn−i X i. Preparata & Sarwate (voir section 9.2) donnent un algorithme récursif (Powers (A, n)) pour calculer les n premières puissances de A avec un circuit arithmétique parallèle de profondeur Kα log n (log n + 1) et de taille majorée par (2n − 3) Cα nα .( 3 ) Le résultat est alors obtenu en remarquant que Adj (A) se calcule à partir des puissances de A en 1 + dlog ne étapes avec O(n3 ) opérations arithmétiques de base. t u Remarque 10.2.4 La méthode de Baur & Strassen [5] pour le calcul des dérivées partielles (cf. section 3.3) montre que le calcul de l’adjointe d’une matrice a toujours un coût voisin de celui de son déterminant. La construction originale ne se préoccupe pas de la profondeur, mais le résultat a été amélioré par Kaltofen et Singer [52] : tout circuit arithmétique de taille τ et de profondeur π calculant une fonction polynomiale (sur un anneau) ou une fonction rationnelle (sur un corps) donne un circuit de taille 4τ et de profondeur O(π) qui calcule la fonction et toutes 3. Le (( parallel prefix algorithm )) (section 5.3) donne le même résultat pour la profondeur mais une taille majorée par 3n Cα nα . 282 10. Polynôme caractéristique sur un anneau arbitraire ses dérivées partielles, et ceci indépendamment du nombre de variables d’entrées du circuit. Remarque 10.2.5 Les théorèmes de complexité que nous venons d’établir ne citent que deux paramètres de complexité : la taille et la profondeur des circuits. Mais une analyse minutieuse des algorithmes étudiés nous permet également d’avoir le nombre de processeurs utilisés par ces algorithmes dans le modèle PRAM, c’est-à-dire la largeur du circuit arithmétique correspondant. Ce troisième paramètre peut être exprimé en fonction de la largeur d’un circuit arithmétique (de profondeur Kα log n et de taille Cα nα ) qui calcule le produit de deux matrices carrées d’ordre n. Il est facile de vérifier que le résultat trouvé est le même que celui obtenu par application directe du principe de Brent à cet algorithme parallèle, c’est-à-dire un nombre de processeurs de l’ordre de O(nα+1 / log n). Remarque 10.2.6 Concernant les questions d’uniformité et de coût de construction des circuits, ainsi que la taille des coefficients intermédiaires, le travail de Matera & Turull Torres [69] donne, dans le cas de l’anneau Z des entiers relatifs, une construction effective, avec une taille bien contrôlée des coefficients, des circuits de base qui interviennent dans l’algorithme de Berkowitz. Traduisant les opérations arithmétiques de Z (addition et multiplication) par des circuits booléens de profondeur O(log b) où b est la taille maximum de la représentation binaire des coefficients de la matrice donnée A ∈ Zn×n , ils obtiennent : – pour la multiplication de deux matrices n×n sur Z un circuit booléen de taille O(n3 b2 ) et de profondeur O(log (bn)) ; – pour la taille des coefficients intermédiaires calculés, une majoration de l’ordre de O(n(b + log n)) ; – pour l’algorithme de Berkowitz, une famille uniforme de circuits booléens de profondeur O(log (n) log (bn)) et de taille O(n6 b2 log2 (n)) . Cette construction, appliquée à l’algorithme amélioré que nous avons présenté, donne une famille uniforme de circuits booléens de même profondeur, avec la même majoration pour la taille des coefficients intermédiaires, mais de taille réduite à O(n5 b2 log2 n). Le facteur n ainsi économisé provient essentiellement des étapes correspondant aux figures 10.1 page 276 et 10.2 page 277 de notre algorithme. 10.3. Méthode de Chistov 10.3 283 Méthode de Chistov Introduction On considère une matrice carrée A ∈ An×n on pose B = In − XA ∈ A[X]n×n , Br est la sous-matrice principale dominante d’ordre r de B et Q(X) = det B. L’algorithme est basé sur les formules suivantes (ce sont les équations (2.16) et (2.18) établies à la section 2.7.1) valables  dans l’anneau des développements limités à l’ordre n, An = A[X] X n+1 : Q(X)−1 = [ det(In − XA) ]−1 = n Y B −1 r  . (10.2)  Er (Ar )k Er X k . (10.3) r,r r=1 et, en notant Er la r -ème colonne de Ir : Br−1  r,r mod X n+1 = 1 + n  X t k=1 Rappelons alors le principe général de l’algorithme 2.12 donné en section 2.7.1. Algorithme de Chistov, principe général Entrée : la matrice A ∈ An×n . Sortie : le polynôme caractéristique P (X) de A. Début Étape 1 : Calculer pour r, k ∈ {1, . . . , n} les produits t Er (Ar )k Er , ce qui donne les polynômes B −1 r r,r (formule (10.3)). Étape 2 : Calculer le produit des n polynômes précédents modulo X n+1 , ce qui donne Q(X)−1 mod X n+1 (formule (10.2)). Étape 3 : Inverser modulo X n+1 le polynôme précédent : on obtient Q(X). Étape 4 : Prendre le polynôme réciproque à l’ordre n du polynôme Q(X). On obtient P (X) en multipliant par (−1)n . Fin. 284 10. Polynôme caractéristique sur un anneau arbitraire La version parallèle et sa complexité Étudions pour chacune des étapes de cet algorithme, la taille et la profondeur d’un circuit arithmétique correspondant qui tire le meilleur parti de la multiplication rapide des matrices et permet d’obtenir un temps parallèle en O(log2 n). • Coût de l’étape 1 : Chacun des éléments t Er (Ar )k Er qu’il s’agit de calculer est obtenu en prenant la r - ème composante du vecteur-colonne (Ar )k Er . On doit donc calculer simultanément, pour tous r compris entre 1 et n et pour chaque r , les n produits (matrice × vecteur) (Ar )k Er (1 ≤ k ≤ n) . Pour évaluer la complexité de ce calcul, considérons l’entier ν ∈ N tel que 2ν−1 < r ≤ 2ν , c’est-à-dire ν = dlog re , et ramenons la matrice Ar à une matrice 2ν ×2ν en remplissant de zéros les rangées supplémentaires. Ainsi, toutes nos matrices (Ar )k seront considérées comme des matrices 2ν × 2ν , et Er comme une matrice 2ν × 1 : cela ne change pas les produits t Er (Ar )k Er recherchés. Considérons d’autre part l’entier η ∈ N vérifiant 2η−1 ≤ n < 2η c’est-à-dire η = blog nc + 1 . On procède alors en η sous-étapes successives (numérotées de 0 à η −1), chacune utilisant le résultat de la précédente. j À l’étape j (0 ≤ j ≤ η − 1), on élève au carré la matrice (Ar )2 puis on la multiplie à droite par la matrice j −1 (Er |Ar Er | . . . |(Ar )2 pour obtenir la matrice (Ar )2 j −1 (Er |Ar Er | . . . |(Ar )2 j+1 Er ) ∈ A2 ν ×2j et la matrice j j+1 −1 Er |(Ar )2 Er | . . . |(Ar )2 ν ×2j+1 Er ) ∈ A2 . À la fin de ces η étapes (faisant j = η − 1 ), on obtient la matrice η −1 (Er |Ar Er | . . . |(Ar )2 Er ) ∈ A2 ν ×2η dont les éléments de la r - ème ligne, plus précisément les n premiers (on a n < 2η ), ne sont autres que les éléments t Er (Ar )k Er recherchés. Pour chaque r (1 ≤ r ≤ n ≤ 2η − 1) , on a ainsi η sous-étapes, chacune d’elles comportant l’élévation au carré d’une matrice 2ν × 2ν (en fait d’une matrice r × r ), et la multiplication d’une matrice 2ν × 2ν par une matrice 2ν × 2j . Utilisant pour cette dernière opération les multiplications par blocs 2j × 2j (quitte à plonger la matrice 2ν × 2ν dans 10.3. Méthode de Chistov 285 une matrice 2η × 2η et la matrice 2ν × 2j dans une matrice 2η × 2j , on obtient pour chacune des η sous-étapes considérées un nombre d’opérations arithmétiques majoré par : Cα rα + 22η [Cα 2(α−2)j + 1] ≤ Cα rα + 4n2 [Cα 2(α−2)j + 1]. Cela est dû au fait que η − 1 ≤ log n (et 2η ≤ 2n ) qui permet d’obtenir les majorations suivantes : η−1 X α α Cα r ≤ Cα r log n et j=0 η−1 X 2(α−2)j ≤ j=0 2 nα−2 · 2α−2 − 1 D’où la majoration du nombre d’opérations arithmétiques intervenant (pour chaque valeur de r) dans le calcul des n produits t Er (Ar )k Er ( 1 ≤ k ≤ n) : Cα rα log n + 4n2 [ log n + 2 Cα nα−2 ]. 2α−2 − 1 Comme r varie de 1 à n , le calcul de l’étape 1 s’effectue à l’aide d’un circuit arithmétique de taille O(nα+1 log n) et de profondeur O(log2 n). Plus précisément, la taille est majorée par : 3 [ 4n +Cα n X rα ] log n+ r=1 8 Cα Cα α+1 nα+1 ≤ n log n+O(nα+1 ) . −1 α+1 2α−2 et la profondeur par : Kα η log n + η−1 X j=0 (Kα j + η − j) ≤ 3 Kα + 1 log2 n + O(log n). 2 On peut remarquer qu’avec la multiplication usuelle des matrices (α = 3 ), l’étape 1 correspond à un circuit arithmétique parallèle de profondeur O(log2 n) et de taille O(n4 log n) + O(n4 ) = O(n4 log n) η−1 X puisque n2 2j = n2 (2η − 1) < 2n4 . j=0 • Coût de l’étape 2 : On doit calculer le produit tronqué à l’ordre n des n polynômes de degré ≤ n calculés à l’étape précédente. Ce calcul se fait à l’aide d’un circuit binaire équilibré en SD(n3 , log2 n). 286 10. Polynôme caractéristique sur un anneau arbitraire • Coût de l’étape 3 : Il s’agit d’inverser modulo X n+1 le polynôme Q̃ de degré ≤ n obtenu à l’étape précédente. Ce polynôme est de la forme Q̃ = 1 − XR où R est un polynôme de degré n en X. Inverser Q̃ modulo X n+1 revient à calculer le produit ν ν Q(X) = (1 + XR)(1 + X 2 R2 ) . . . (1 + X 2 R2 ) mod X n+1 . Cela s’effectue en SD(n2 log n, log n log log n) à l’aide d’un circuit binaire équilibré. On peut accélérer le calcul des deux étapes précédentes en utilisant une multiplication rapide des polynômes (mais cela n’améliore pas sensiblement le résultat final). • Coût de l’étape 4 : Cette étape, de profondeur 1, n’intervient pas dans la complexité de l’algorithme. Nous donnons ci-dessous un tableau résumant l’analyse qui vient d’être faite pour la complexité de l’algorithme de Chistov, montrant que ce dernier est SD(nα+1 log n, log2 n) si l’on utilise la multiplication rapide des matrices (α < 3) avec une estimation précise des constantes asymptotiques pour la taille et pour la profondeur. Etape Etape 1 Profondeur 3Kα +1 2 log2 n + O(log n) Taille Cα α+1 nα+1 log n + O(nα+1 ) Etape 2 log2 n + O(log n) O(n3 ) Etape 3 O(log n log log n) O(n2 log n) Etape 4 1 négligeable Tableau 10.3 Complexité de la version parallèle de l’algorithme de Chistov Si l’on utilise la multiplication usuelle (α = 3), cela donne un algorithme en SD(n4 log n, log2 n) . Dans ce dernier cas, l’algorithme séquentiel élémentaire donné à la section 2.7.2 est donc préférable (sur une machine séquentielle). 10.4. Applications des algorithmes 287 Théorème 10.3 L’algorithme de Chistov calcule les coefficients du polynôme caractéristique d’une matrice carrée d’ordre n par un circuit arithmétique de profondeur O(log2 n) et de taille O(nα+1 log n) avec des constantes asymptotiques estimées respectivement à 32 (Kα + 1) pour la 1 profondeur et α+1 Cα pour la taille. Enfin, comme dans le cas de l’algorithme de Berkowitz, on obtient facilement le résultat complémentaire suivant. Proposition 10.3.1 Les coefficients des polynômes caractéristiques de toutes les sous-matrices principales dominantes d’une matrice carrée d’ordre n peuvent être calculés en SD(nα+1 log n, log2 n) par un algorithme directement dérivé de celui correspondant au théorème 10.3. Remarque 10.3.2 Remarquons que dans l’estimation de la taille des circuits arithmétiques construits à partir des algorithmes de Chistov et de Berkowitz amélioré, les termes en nα+1 log n sont les mêmes pour les deux algorithmes alors que les termes en nα+1 sont respectivement Cα 8 Cα nα+1 pour Chistov et à seulement 2 α+1 estimés à 2α−2 nα+1 pour −1 Berkowitz amélioré (le rapport du premier coefficient au second étant strictement supérieur à 16). 10.4 Applications des algorithmes à des anneaux commutatifs Application en évaluation dynamique Le calcul des déterminants et des polynômes caractéristiques de toutes les sous–matrices principales d’une matrice donnée trouve une application intéressante en évaluation dynamique. Lorsqu’on travaille dans la clôture algébrique dynamique [28] d’un corps K, on se trouve dans la situation standard suivante : on a des variables x1 , . . . , xn qui représentent des éléments ξ1 , . . . , ξn algébriques sur K. On sait que ces éléments vérifient un système triangulaire d’équations algébriques. De sorte que le corps K[ξ1 , . . . , ξn ] est un quotient d’une K – algèbre de dimension finie AP1 ,...,Pn = K[x1 , . . . , xn ] /hP1 (x1 ), P2 (x1 , x2 ), Pn (x1 , . . . , xn )i . 288 10. Polynôme caractéristique sur un anneau arbitraire Chaque Pi est unitaire en xi et cela donne la structure de l’algèbre de manière explicite. Néanmoins, cette algèbre peut contenir des diviseurs de zéro, ce qui signifie que plusieurs situations différentes sont représentées par un seul calcul dans AP1 ,...,Pn . Lorsqu’on pose la question (( Q(x1 , . . . , xn ) = 0 ? )), le programme doit calculer les coefficients sous-résultants de Pn et Q par rapport à la variable xn (une discussion (( cas par cas )) s’ensuit). Une solution est de calculer ces coefficients dans l’algèbre K[x1 , . . . , xn−1 ] en utilisant l’algorithme des sous-résultants [41, 67, 68] qui nécessite des divisions exactes et se situe naturellement dans le cadre d’un anneau intègre, puis de les réduire modulo l’idéal hP1 , . . . , Pn−1 i. Dès qu’on a trois xi le calcul s’avère très lourd. Une étude de complexité montre qu’on a un bien meilleur contrôle de la taille des objets manipulés si on fait tous les calculs dans l’algèbre AP1 ,...,Pn−1 . Malheureusement l’algorithme des sous-résultants ne peut plus s’appliquer. En effet, des divisions requises par l’algorithme peuvent s’avérer impossibles, et même si l’algèbre est un corps, la division peut demander un effort disproportionné par rapport aux multiplications. Aussi semble-t-il que l’algorithme de Berkowitz (ou celui de Chistov), appliqué à la matrice de Sylvester des polynômes Pn et Q offre la meilleure solution (en l’état de l’art actuel) pour calculer ces coefficients sous-résultants. Il faut noter à cet égard que l’algorithme de Le Verrier-FadeevCsanky etc. (en caractéristique nulle) ou celui proposé par Kaltofen (cf. section 8.5) en caractéristique arbitraire n’ont des performances supérieures à l’algorithme de Berkowitz que pour le calcul d’un déterminant isolé, mais non pour le calcul de tous les mineurs principaux dominants d’une matrice donnée. Signalons aussi que dans le cas où on utilise l’évaluation dynamique pour la clôture réelle d’un corps ordonné, certaines discussions (( cas par cas )) font appel aux signes de tous les coefficients sous-résultants (cf. [42]). Une autre application de l’algorithme du calcul du polynôme caractéristique en évaluation dynamique est la détermination de la signature d’une forme quadratique donnée par une matrice symétrique arbitraire S. Dans ce cas, la seule connaissance des signes des mineurs principaux dominants de la matrice S ne suffit pas toujours pour certifier le rang 10.4. Applications des algorithmes 289 et la signature 4 . On pourra consulter à ce sujet le livre [Gan]. Mais il n’est pas difficile de voir que la connaissance des signes des coefficients du polynôme caractéristique de la matrice S permet de calculer et de certifier le rang de S et la signature de la forme quadratique qui lui est associée. Cas des matrices creuses Signalons pour terminer que l’algorithme de Berkowitz et celui de Chistov sont particulièrement bien adaptés au cas des matrices creuses, notamment en version séquentielle élémentaire où le nombre d’opérations passe de O(n4 ) à O(n3 ) lorsque seulement O(n) coefficients de la matrice sont non nuls. Parmi les autres algorithmes étudiés, celui de Kaltofen-Wiedemann peut également être adapté au cas des matrices creuses, avec une diminution similaire du nombre d’opérations arithmétiques. 4. Cela suffit dans le cas d’une matrice fortement régulière. 11. Résultats expérimentaux 11.1 Tableaux récapitulatifs des complexités Dans cette section, nous donnons les tableaux récapitulatifs des complexités arithmétiques théoriques pour les différents algorithmes étudiés. Y figure notamment le tableau des complexités algébriques des algorithmes en version séquentielle élémentaire (c’est-à-dire n’utilisant que la multiplication usuelle des matrices, des polynômes et des entiers) que nous avons expérimentés. Abbréviations utilisées Le mot Cte signifie (( constante asymptotique )) (pour les estimations de taille des circuits), et Val. signifie (( Domaine de validité )) : – A.C.A. signifie (( anneau commutatif arbitraire )), – A.I.A.D. signifie (( anneau intègre possédant un algorithme pour les divisions exactes )), – A.I.C. signifie (( anneau intègre et intégralement clos possédant un algorithme pour les divisions exactes )), – D. n! signifie (( la division par n! quand elle est possible, est unique et explicite )). – Prob. signifie (( algorithme de nature probabiliste )), il s’agit de l’algorithme de Wiedemann, qui fonctionne sur les corps, avec des variantes possibles dans le cas A.I.A.D. Les sigles M.R.P. et M.U.P. désignent respectivement la multiplication rapide et la multiplication usuelle des polynômes. Rappelons que nous notons µP (n) le nombre d’opérations arithmétiques dans la multiplication de deux polynômes de degré n en profondeur O(log n). En M.U.P. µP (n) = O(n2 ), avec la méthode de Karat- 292 11. Résultats expérimentaux suba µP (n) = O(nlog 3 ), et en M.R.P. µP (n) = O(n log n log log n) ou O(n log n) selon les anneaux. Les initiales G et JB désignent les algorithmes de Gauss (sur un corps) et de Jordan-Bareiss (sur un anneau intègre possédant un algorithme pour les divisions exactes) pour le calcul des déterminants. Rappelons que l’algorithme de Jordan-Bareiss, qui consomme un peu plus d’opérations arithmétiques, présente des avantages significatifs par rapport à l’algorithme du pivot de Gauss, dans le nombreux anneaux commutatifs (comme par exemple les anneaux de polynômes à coefficients entiers). A : Calcul des Déterminants Méthodes séquentielles simples Algorithme Taille Cte Val. Date Gauss O(n3 ) 2/3 Corps < 1900 Jordan-Bareiss O(n3 ) 4/3 A.I.A.D. < 1900 Gauss avec élimination des divisions O(n5 ) 1/3 A.C.A. 1973 Jordan-Bareiss modifié O(n5 ) 1/10 A.C.A. 1982 Méthodes rapides en profondeur O(n) Bunch&Hopcroft O(nα ) γα (*) Corps 1974 (*) Voir théorème 8.1 et proposition 8.2.1. Dans le premier tableau ci-après nous avons rajouté la colonne Cr. pour le traitement des matrices creuses : si une matrice C ∈ An×n a environ k · n coefficients non nuls, certains algorithmes sont accélérés et leur temps d’exécution séquentiel divisé par n/k. Nous avons indiqué cette possibilité d’accélération par un (( oui )) dans la colonne Cr. 11.1. Tableaux récapitulatifs des complexités 293 B : Calcul du Polynôme Caractéristique Versions séquentielles simples Algorithme Taille Cte Val. Cr. Wiedemann O(n3 ) 2 Prob. oui Hessenberg O(n3 ) 2 Corps Frobenius O(n3 ) 10/3 A.I.C. O(n3,5 ) 2 D. n! Berkowitz O(n4 ) 1/2 A.C.A. oui Chistov O(n4 ) 2/3 A.C.A. oui Faddeev-SouriauFrame (Le Verrier) O(n4 ) 2 D. n! oui Interpolation (Lagrange) O(n4 ) 2/3 (G) Corps 4/3 (JB) A.I.A.D. KaltofenWiedemann O(n4 ) 8 A.C.A. Jordan-Bareiss modifié O(n5 ) 1/10 A.C.A. Gauss avec élimination des divisions O(n5 ) 1/3 A.C.A. Preparata & Sarwate oui Taille avec multiplication rapide des polynômes Kaltofen-Wiedemann √ O(n3 µP (d n e) log n) Jordan-Bareiss modifié O(n3 µP (n)) Gauss avec élimination des divisions O(n3 µP (n)) 294 11. Résultats expérimentaux C : Calcul du Polynôme Caractéristique Méthodes séquentielles rapides Taille Cte Val. Keller-Gehrig O(nα log n) ··· Corps Interpolation (de Lagrange) O(nα+1 ) γα Corps Faddeev-SouriauFrame O(nα+1 ) Cα D. n! ··· A.C.A. Algorithme KaltofenWiedemann O(n α+3 2 √ µP (d n e)) D : Calcul du Polynôme Caractéristique Méthodes parallèles en profondeur O(log2 n) Algorithme Taille Cte K Val. Csanky 1976 O(nα+1 ) 4 Cα Kα D. n! Preparata & Sarwate 1978 O(nα+ 2 ) 1 4 Cα 5 Kα D. n! Galil & Pan 1989 O(nα+ 2 −δ(α) ) 1 ··· ··· D. n! B.H.G. (†) 1982 O(n18+ ) (*) O(n21 ) (**) ··· ··· A.C.A. Berkowitz 1984 O(nα+1+ ) ··· ··· A.C.A. Chistov 1985 O(nα+1 log n) 1 α+1 Cα Berkowitz amélioré 1985 O(nα+1 log n) 1 α+1 Cα 3 2 (Kα + 1) 3 Kα A.C.A. A.C.A. (†) Borodin, Hopcroft & v. z. Gathen. (*) M.R.P. (**) M.U.P. La colonne K donne la constante asymptotique du temps parallèle en O(log2 n). Le nombre δ(α) > 0 dépend de α. Enfin  est positif arbitrairement petit. 11.2. Présentation des tests 11.2 295 Présentation des tests Les algorithmes considérés dans les tableaux de comparaison que nous présentons ci-dessous ont été expérimentés à l’aide du logiciel de Calcul Formel Maple et écrits dans le langage de programmation qui lui est rattaché 1 . Les algorithmes sont ceux du tableau B, c’est-à-dire les versions séquentielles simples pour le calcul du polynôme caractéristique. Nous avons indiqué également dans la colonne (( linalpoly )) les performances de l’algorithme donné par Maple dans la version V. Les versions plus récentes du logiciel utilisent désormais l’algorithme de Berkowitz. Chacun des tests de comparaison entre les différents algorithmes a été effectué sur une même machine, avec le même échantillon de matrices. Les matrices utilisées font partie de l’un des groupes suivants, selon le type de l’anneau de base choisi : • Groupe 1 : les matrices randmatrix(n, n) qui sont des matrices carrées d’ordre n à coefficients pris au hasard (entre -99 et +99) dans l’anneau Z des entiers relatifs ; • Groupe 2 : les matrices M athard(n, x, y) dont les éléments sont des polynômes en [x, y] de degré total ≤ 5. Les coefficients de ces polynômes de Z[x, y] sont aussi des entiers compris entre -99 et +99 ; • Groupe 3 : les matrices M atmod(n, lisvar, Ideal, p) qui sont des matrices carrées d’ordre n dont les coefficients sont des éléments choisis au hasard dans l’anneau-quotient Zp [lisvar] /hIdeali où p est un entier positif (on le prendra premier), lisvar une liste donnée de variables et Ideal une liste donnée de polynômes en lisvar à coefficients dans Z. L’anneau de base est donc ici, sauf exception, un anneau dans lequel la division n’est pas permise. • Groupe 4 : les matrices Jou(n, x), carrées d’ordre n, à coefficients dans Z[x], dont les coefficients sont donnés par : [Jou] ij = x + x2 (x − ij)2 + (x2 + j)(x + i)2 pour 1 ≤ i, j ≤ n . Quelle que soit la valeur de n, le rang de la matrice Jou(n, x) ne dépasse pas 3 : c’est ce qui explique la supériorité, dans ce cas, des algorithmes 1. Les programmes ont tourné avec la version Maple V Release 3. 296 11. Résultats expérimentaux de Souriau-Faddeev et de Jordan-Bareiss (nettement plus performants pour les matrices de rang petit). • Groupe 5 : ce sont des matrices creuses à coefficients entiers choisis au hasard entre -99 et +99. Elles sont données par la procédure Maple randmatrix(n,n,sparse) . Quant aux machines utilisées, il s’agit essentiellement d’un DEC Alpha600 à 175 Mhz et 320 Mo de mémoire centrale. 2 Les matrices intervenant dans les comparaisons sont générées par des codes maple : une procédure Matmod par exemple crée une matrice du Groupe 3 à partir de la donnée de deux entiers positifs n (la taille de la matrice) et p (on calcule modulo p), d’une liste de variables lisvar, et d’une liste Ideal de polynômes en lisvar comprenant autant de polynômes Pi que de variables xi , chacun des Pi étant un polynôme en [x1 , . . . , xi ], unitaire en xi . Ceci afin d’illustrer le genre d’application de l’algorithme de Berkowitz lorsqu’on se place dans l’algèbre Zp [lisvar] /hIdeali , et la situation indiquée dans la section 10.4. La procédure Matmod utilise comme sous-procédure la procédure polmod (donnée dans l’annexe) qui prend en entrée un nombre entier p, un polynôme P de Z[lisvar], et donne en sortie un représentant simple de l’image canonique de P dans l’anneau-quotient Zp [lisvar] /hIdeali . 11.3 Tableaux de Comparaison Nous donnons dans les trois pages qui suivent les tableaux correspondant aux cinq groupes de matrices que nous avons précédemment indiqués. Il ne s’agit que de quelques exemples, mais ils sont significatifs. La comparaison entre le comportement pratique des algorithmes montre un bon accord avec les calculs théoriques de complexité, surtout si on prend en compte la taille des objets intermédiaires créés par les différents algorithmes. Sauf exception l’algorithme de Berkowitz est le plus performant, suivi de près par celui de Chistov. Les performances a priori meilleures pour les algorithmes de Hessenberg, Frobenius et Wiedemann ne se révèlent qu’avec des tests portant sur des matrices à coefficients dans des corps finis. En effet l’avantage en nombre d’opérations arithmétiques est contrebalancé par la plus mau2. Grâce notamment à l’hospitalité du Laboratoire GAGE (Ecole Polytechnique). 11.3. Tableaux de Comparaison 297 vaise taille des objets intermédiaires manipulés, par exemple dès que l’anneau des coefficients contient Z. Il aurait fallu créer un autre groupe de matrices pour mettre en évidence cet avantage. Il serait également intéressant d’élargir l’expérimentation en implémentant la version séquentielle simple de l’algorithme de Preparata & Sarwate. Dans le groupe 1 nous avons pris des matrices carrées d’ordre n à coefficients dans Z pour 10 valeurs de n comprises entre 16 et 128. Dans le groupe 2, ce sont des matrices carrées d’ordre n à coefficients dans Z[x, y] pour n ∈ {10, 12, 20} et des matrices à coefficients dans Z[x] pour n ∈ {10, 15, 20, 25}. Parmi les matrices du groupe 3, nous avons prisdes matrices carrées d’ordre n ∈ {8, 10, 12, 16} à coefficients dans Z7 [x] x3 − 1 (pour lesquelles Faddeev ne s’applique pas) et des matrices à coefficients dans Z17 [x, y] /hH, Li (pour lesquelles Faddeev s’applique). Ici hH, Li est l’idéal engendré par les deux polynômes H = x5 − 5xy + 1 et L = y 3 − 2y + 1. Dans le groupe 4, ce sont des matrices carrées d’ordre n ∈ {10, 15, 20, 25} à coefficients dans Z[x], mais de rang petit ≤ 3. Enfin les matrices du groupe 5 (des matrices creuses à coefficients entiers choisis au hasard entre -99 et +99) ont été prises parmi les matrices randmatrix(n,n,sparse) telles que n ∈ {32, 50, 64, 128, 200}. linalpoly † 0’ 05” 1, 244 Mb 0’ 16” 1, 834 Mb 0’ 40” 1, 900 Mb 2’ 09” 1, 507 Mb 6’ 08” 2, 096 Mb 19’ 42” 2, 424 Mb 1H 17’ 17” 1, 900 Mb 71H 33’ 31” – berkosam 0’ 02 ” 3, 014 Mb 0’ 04” 3, 538 Mb 0’ 17” 1, 900 Mb 0’ 30” 1, 965 Mb 1’ 13” 4, 062 Mb 3’ 04” 4, 193 Mb 8’ 47” 4, 324 Mb 8H 17’ 38” 6, 552 Mb Chistov 0’ 05” 2, 003 Mb 0’ 07” 1, 834 Mb 0’ 17” 1, 900 Mb 0’ 44 ” 1, 965 Mb 1’ 48” 2, 031 Mb 4’ 37” 2, 096 Mb 13’ 23” 2, 162 Mb 11H 22’ 53” 6, 814 Mb Faddeev 0’ 12” 1, 376 Mb 0’ 28” 2, 096 Mb 1’ 07” 2, 489 Mb 3’ 16” 3, 014 Mb 17’ 58” 5, 241 Mb 2H 38’ 50” 9, 500 Mb 13H 15’ 45” 18, 870 Mb ≈ 170H OUT∗ barmodif ‡ 0’ 09” 1, 244 Mb 0’ 24” 2, 031 Mb 1’ 04” 1, 834 Mb 3’ 25” 2, 817 Mb 11’ 28” 5, 307 Mb 42’ 38” 8, 124 Mb 3h 54’ 46” 14, 284 Mb ≈ 7H OUT∗ † La procédure Maple linalg[charpoly]. ‡ La procédure correspondant à la Méthode de Jordan-Bareiss modifiée. ∗ OUT signifie qu’après un temps ((( CPU Time ))) plus ou moins long de calcul, un message d’erreur (( Out of memory )) apparaı̂t lorsque la mémoire allouée ((( Mem. All. ))) a dépassé le seuil de 350 Mbytes. matrice CPU Time n = 16 Mem. All. CPU Time n = 20 Mem. All. CPU Time n = 25 Mem. All. CPU Time n = 32 Mem. All. CPU Time n = 40 Mem. All. CPU Time n = 50 Mem. All. CPU Time n = 64 Mem. All. CPU Time n = 128 Mem. All. (Matrices à coefficients entiers) Premier Groupe : Matrices denses n × n Hessenberg 0’ 03” 1, 969 Mb 0’ 20” 5, 254 Mb 1’ 28” 14, 468 Mb ≈ 2H OUT∗ – – – – – – – – 298 11. Résultats expérimentaux 0’ 42” 3, 341 Mb ≈ 2H 10’ OUT – – – – CPU Time Mem. All. CPU Time Mem. All. CPU Time Mem. All. n = 15 &y = 1 n = 20 &y = 1 n = 25 &y = 1 11’ 56” 8, 583 Mb 3’ 26” 5, 110 Mb berkosam 4’ 04” 8, 059 Mb 15’ 30” 13, 891 Mb 1H 23’ 24” 30, 403 Mb 0’ 05” 2, 031 Mb linalpoly 48’ 35” 44, 359 Mb ≈ 1H 25’ OUT – – 0’ 47” 4, 062 Mb matrice CPU Time n = 10 Mem. All. CPU Time n = 12 Mem. All. CPU Time n = 15 Mem. All. CPU Time n = 10 & y = 1 Mem. All. Deuxième Groupe : Mathard(n, x, y) 24’ 52” 10, 025 Mb 7’ 14” 4, 979 Mb 1’ 33” 3, 603 Mb Chistov 13’ 17” 10, 352 Mb 54’ 18” 13, 563 Mb 5H 28’ 28” 26, 733 Mb 0’ 10” 2, 227 Mb 3H 24’ 47” 5, 831 Mb 23H 54’ 55” 9, 107 Mb ≈ 1H 10’ OUT 22’ 06” 3, 800 Mb barmodif ≈ 17’ OUT – – – – 1’ 13” 2, 162 Mb 44’ 30” 47, 111 Mb 5’ 33” 14, 480 Mb Faddeev 53’ 31” 47, 898 Mb ≈ 1H 10’ OUT – – 0’ 27” 3, 276 Mb 11.3. Tableaux de Comparaison 299 linalpoly 0’ 14” 2, 162 Mb 2’ 03” 8, 059 Mb ≈ 1H 30’ OUT berkomod 0’ 02” 1, 703 Mb 0’ 04” 1, 769 Mb 0’ 12” 1, 834 Mb Chistov 0’ 04” 1, 769 Mb 0’ 07” 1, 769 Mb 0’ 19” 1, 900 Mb linalpoly 38’ 13” 37, 872 Mb ≈ 2H OUT – – berkomod 0’ 28” 2, 162 Mb 0’ 50” 2, 293 Mb 2’ 11” 2, 424 Mb Chistov 0’ 50” 3, 014 Mb 1’ 33” 3, 996 Mb 4’ 25” 7, 142 Mb † on a : H = x5 − 5xy + 1 et L = y 3 − 3y + 1. ∗ signifie que Faddeev n’est pas applicable dans ce cas (puisque p < n ). matrice CPU Time n = 10 Mem. All. CPU Time n = 12 Mem. All. CPU Time n = 16 Mem. All. Pour lisvar = [x, y] ; Ideal = [H, L] † ; et p = 17 : matrice CPU Time n = 10 Mem. All. CPU Time n = 12 Mem. All. CPU Time n = 16 Mem. All. Pour lisvar = [x], Ideal = [x3 − 1] et p = 7 : Troisième Groupe : Matmod(n, lisvar, Ideal, p) barmodif 1H 06’ 01” 9, 369 Mb 5H 59’ 23” 14, 087 Mb ≈ 84H 40’ OUT barmodif 0’ 43” 1, 900 Mb 1’ 52” 2, 031 Mb 8’ 31” 2, 424 Mb Faddeev 1’ 25” 1, 638 Mb 2’ 43” 2, 096 Mb 8’ 03” 3, 276 Mb * * * Faddeev 300 11. Résultats expérimentaux linalpoly 0’ 09” 1, 310 Mb 5’ 10” 5, 677 Mb ≈ 3H 30’ OUT ≈ 3H 30’ OUT berkosam 0’ 07” 2, 489 Mb 1’ 00” 3, 603 Mb 5’ 09” 5, 700 Mb 19’ 01” 8, 714 Mb Chistov 0’ 14” 2, 555 Mb 2’ 08” 3, 669 Mb 10’ 55” 5, 176 Mb 44’ 21” 9, 238 Mb Faddeev 0’ 05” 1, 244 Mb 0’ 17” 1, 376 Mb 0’ 43” 1, 834 Mb 1’ 39” 2, 620 Mb barmodif 0’ 06” 1, 310 Mb 0’ 24” 1, 703 Mb 1’ 07” 2, 293 Mb 2’ 32” 2, 948 Mb Jou(n, x) est une matrice n × n dont les coefficients Jij (x) ∈ Z[x] sont donnés par la formule : Jij (x) = x2 (x − ij)2 + (x2 + j)(x + i)2 + x pour 1 ≤ i, j ≤ n . Son rang est ≤ 3 pour tout x et pour tout entier positif n . On remarque la supériorité des algorithmes de Faddeev et de Jordan-Bareiss modifié dans ce cas exceptionnel. † n = 25 n = 20 n = 15 n = 10 matrice CPU Time Mem. All. CPU Time Mem. All. CPU Time Mem. All. CPU Time Mem. All. (Matrices de rang petit) Quatrième Groupe : Jou(n, x) † 11.3. Tableaux de Comparaison 301 matrice CPU Time n = 32 Mem. All. CPU Time n = 50 Mem. All. CPU Time n = 64 Mem. All. CPU Time n = 128 Mem. All. CPU Time n = 200 Mem. All. linalpoly 0’ 59” 2, 424 Mb 5’ 32” 2, 555 Mb 14’ 46” 2, 620 Mb 4H 29’ 43” 9, 173 Mb > 16 heures : Calcul stoppé (Matrices à coefficients entiers) berkosam (creux) 0’ 05” 1, 834 Mb 0’ 21” 1, 965 Mb 0’ 42” 2, 031 Mb 6’ 27” 2, 489 Mb 29’ 20” 2, 555 Mb Cinquième Groupe : Matrices creuses n × n Chistov (creux) 0’ 35” 1, 769 Mb 3’ 55” 1, 834 Mb 12’ 00” 2, 031 Mb 6H 27’ 19” 3, 603 Mb Calcul stoppé Calcul stoppé 302 11. Résultats expérimentaux 12. Le déterminant et les expressions arithmétiques Introduction Ce chapitre et le suivant donnent quelques aperçus sur le travail de Valiant (notamment [92, 93, 94]) dans lequel il décrit un analogue algébrique de la conjecture P = 6 N P. Notre exposé doit beaucoup au survey de von zur Gathen [35] et au livre de Bürgisser [Bur]. Une autre référence classique est le livre de Bürgisser, Clausen et Shokrollahi [BCS]. Dans la section 12.1 nous discutons différents codages possibles pour un polynôme sur un anneau. La section 12.2 est consacrée pour l’essentiel à la méthode de Brent pour la parallélisation des expressions arithmétiques. Dans la section 12.3 nous montrons pourquoi la plupart des polynômes sont difficiles à calculer. Enfin la section 12.4 expose le résultat de Valiant sur le caractère universel du déterminant. 12.1 Expressions, circuits et descriptions Nous nous intéressons dans cette section à différentes approches concernant le codage d’un polynôme arbitraire sur un anneau commutatif A (le codage des éléments de A est supposé fixé). Une première manière de coder un polynôme est de donner son degré total, les noms de ses variables et la liste de ses coefficients, dans un ordre convenu. C’est ce que nous avons appelé la représentation dense des polynômes. Il est raisonnable de penser que pour l’immense majorité des polynômes il n’y a rien de mieux à faire, et nous donnerons un résultat dans cette direction (voir le théorème 12.2). 304 12. Le déterminant et les expressions arithmétiques Certains polynômes très utilisés ont relativement peu de coefficients non nuls. On peut choisir pour leur codage une représentation creuse, dans laquelle on donne la liste des couples (coefficient non nul, monôme) effectivement présents dans le polynôme, chaque monôme étant codé lui-même par la liste des exposants de chaque variable, écrits en binaire. Par exemple le polynôme αX 64 Y + βXY 33 Z 4 sera codé par [[a, [1000000, 1, 0]], [b, [1, 100001, 100]]], où a et b désignent des codes pour α et β. La taille booléenne d’une représentation creuse ou dense est la longueur du mot qui code le polynôme. La taille peut également être appréciée d’un point de vue purement algébrique, auquel cas chaque constante et chaque variable a conventionnellement la longueur 1. Le point faible de la représentation creuse est que le produit d’un petit nombre de polynômes creux est un polynôme dense comme le montre l’exemple classique suivant : 2 4 2n (1 + X) × (1 + X ) × (1 + X ) × · · · × (1 + X ) = 2n+1 X−1 X k (12.1) k=0 Un autre codage naturel est l’utilisation des expressions arithmétiques. Une expression arithmétique est un mot bien formé qui utilise comme ingrédients de base les éléments de A et les symboles de variables d’une part, les symboles +, × d’autre part, et enfin les parenthèses ouvrante et fermante. D’un point de vue un peu plus abstrait, une expression est vue comme un arbre étiqueté. Aux feuilles de l’arbre, il y a des éléments de A (les constantes) et des symboles de variables, chaque nœud est étiqueté par + ou ×. En outre deux branches partent exactement de chaque nœud. La racine de l’arbre représente l’expression arithmétique. La taille d’une expression peut être appréciée d’un point de vue purement algébrique, on prend alors le nombre de nœuds dans l’arbre, sans compter les feuilles (la taille est alors égale au nombre de feuilles moins 1). Si on adopte un point de vue proprement informatique, il faut prendre en compte pour la taille booléenne la longueur de l’écriture explicite de l’expression dans un langage précis, où les constantes et les variables ont des codes. Même si on ne travaille qu’avec un nombre fini de constantes, la taille booléenne de l’expression ne peut être considérée comme simplement proportionnelle à sa taille algébrique, ceci parce que l’ensemble des variables n’est pas borné a priori. 12.1. Expressions, circuits et descriptions a5 X ⊗ a4 ⊕ X ⊗ a3 ⊕ X ⊗ 305 a2 ⊕ X ⊗ a1 ⊕ X ⊗ a0 ⊕ Figure 12.1 – L’arbre de l’expression de Horner La représentation dense peut naturellement être vue comme une représentation par expressions dans laquelle seules sont autorisées des écritures canoniques. Le nombre  de coefficients d’un polynôme de degré d en d+n n variables est égal à n . La représentation par expression arithmétique permet d’exprimer certains polynômes (une petite minorité, mais ce sont les polynômes les plus utilisés) sous forme plus compacte, et plus efficace en ce qui concerne leur évaluation. Donnons en trois exemples. Le premier est celui de la représentation à la Horner d’un polynôme en une variable. Dans les deux écritures ci-dessous  a5 X 5 + · · · + a1 X + a0 = (12.2) a0 + X (a1 + X (a2 + X (a3 + X (a4 + X a5 )))) l’expression dense réclame pour son évaluation 15 multiplications et l’expression de Horner (dans le second membre)  en réclame seulement 5. En degré d on obtient respectivement d+1 + d et 2d opérations arith2 métiques respectivement pour l’expression développée et l’expression de Horner. Le deuxième exemple est celui d’un produit itéré. L’expression cidessous, qui est de taille 2n − 1 (X1 + Y1 ) × (X2 + Y2 ) × · · · × (Xn + Yn ) (12.3) s’écrit comme une somme de 2n monômes, et a une taille de l’ordre de n 2n en représentation creuse (et plus grande encore en représentation dense). 306 12. Le déterminant et les expressions arithmétiques Le troisième exemple, sur lequel nous reviendrons plus en détail est celui du déterminant d’une matrice carrée dont les entrées sont n2 variables indépendantes. On ne sait pas si cette famille de polynômes peut être ou non représentée par une famille d’expressions de taille polynomiale, c’est-à-dire dont la taille serait majorée par un C nk ≤ C 2k log n (avec C et k fixés). On conjecture que c’est faux. Par contre nous verrons que le déterminant peut être représenté par une expression de taille k quasi-polynomiale, c’est-à-dire majorée par un C 2(log n) (avec C et k fixés). Il est clair qu’en représentation dense comme en représentation creuse, le déterminant a une taille ≥ n! ≥ 2n (pour n ≥ 5) donc asympk totiquement beaucoup plus grande que C 2(log n) . Notez par contre que la famille de polynômes de l’exemple (12.1) occupe une taille exponentielle en représentation par expressions arithn métiques, à cause du X 2 : le degré d’un polynôme ne peut pas être plus grand que la taille d’une expression arithmétique qui l’exprime. Un troisième codage naturel est celui que nous avons retenu pour l’ensemble de cet ouvrage, le codage par les programmes d’évaluation arithmétiques ou, ce qui revient au même, par les circuits arithmétiques. Une expression arithmétique peut être vue comme un cas particulier de circuit arithmétique. Sa taille en tant qu’expression arithmétique est la même que celle du circuit arithmétique qui lui correspond, c’est-à-dire est égale au nombre d’opérations arithmétiques lors de l’exécution du circuit. La représentation creuse peut également être simulée efficacement par un circuit. Pour un circuit, les paramètres pertinents sont à la fois la taille et la profondeur. Un polynôme calculé par un circuit arithmétique de profondeur p a un degré majoré par 2p et on est particulèrement intéressé par les familles de polynômes (Pn ) qui peuvent être évalués par des familles de circuits dont la profondeur est un O(log(deg(Pn ))). Il semble cependant très improbable que le déterminant (comme polynôme de degré n à n2 variables), qui est dans la classe SD(n4 , log2 n) puisse être réalisé dans une classe SD(nk , log n) (pour un entier k). Convention 12.1.1 Dans les chapitres 12 et 13 les circuits et les expressions arithmétiques que nous considérerons seront toujours sans division et sans soustraction. Rappelons que l’élimination des divisions à la Strassen montre qu’il ne s’agit pas d’une restriction importante (surtout dans le cas des corps, voir théorèmes 3.1 et 3.2). La soustraction, quant à elle, est simulée en deux opérations par x − y = x + (−1) × y. 12.1. Expressions, circuits et descriptions 307 Un dernier codage naturel que nous envisagerons est celui dans lequel un polynôme P (x1 , . . . , xk ) est obtenu sous la forme P (x1 , . . . , xk ) = X R(x1 , . . . , xk , e1 , . . . , e` ) (12.4) e1 ,...,e` ∈{0,1} le polynôme R étant lui-même donné par un circuit ou une expression arithmétique. Ceci peut sembler a priori artificiel, mais nous verrons dans le chapitre 13 que cette écriture condensée des polynômes est en rapport assez étroit avec la conjecture P = 6 N P. Nous donnons maintenant quelques définitions qui résultent de la discussion précédente. Définition 12.1.2 Soit (Pn ) une famille de polynômes (indexée par n ∈ N ou N` ) à coefficients dans un anneau commutatif A. Notons vn et dn le nombre de variables et le degré de Pn . – Nous disons que la famille (Pn ) est p-bornée si vn et dn sont majorés par un polynôme en n. On dit encore qu’il s’agit d’une p-famille de polynômes. – Nous disons qu’une famille (ϕn ) d’expressions arithmétiques est p-bornée si la taille de ϕn est majorée par un polynôme en n. – Nous disons que la famille (Pn ) est p-exprimable si elle est réalisable par une famille p-bornée d’expressions arithmétiques ϕn (en particulier, (Pn ) est p-bornée). – Nous disons qu’une famille (γn ) de circuits arithmétiques est pbornée en taille si la taille de γn est majorée par un polynôme en n, p-bornée en degrés si les polynômes évalués à tous les noeuds de γn sont majorés par un polynôme en n, p-bornée si la famille est p-bornée en taille et en degrés. – Nous disons que la famille (Pn ) est p-évaluable (ou encore p-calculable) si elle est réalisable par une famille p-bornée de circuits arithmétiques (en particulier, (Pn ) est p-bornée). – Nous disons que la famille (Pn ) est qp-exprimable si c’est une pfamille réalisable par une famille d’expressions arithmétiques dont la taille est quasi-polynomiale en n (c’est-à-dire majorée par un k C 2(log n) avec C et k fixés). – Nous disons que la famille (Pn ) est qp-évaluable (ou encore qpcalculable) si c’est une p-famille réalisable par une famille de circuits arithmétiques dont la taille est quasi-polynomiale en n. 308 12. Le déterminant et les expressions arithmétiques – Nous disons qu’un polynôme R en les variables x1 , . . . , xk , y1 , . . . , y` est une description du polynôme P en les variables x1 , . . . , xk si X (12.5) P (x) = ` R(x, y) y∈{0,1} – Nous disons que la famille (Pn ) est p-descriptible s’il existe une famille p-calculable de polynômes (Rn ), telle que chaque Rn est une description de Pn . – Nous disons que la famille (Pn ) est p-descriptible en expressions s’il existe une famille p-exprimable de polynômes (Rn ), telle que chaque Rn est une description de Pn . Il faut souligner que toutes les notions introduites ici sont non uniformes, c’est-à-dire qu’on ne demande pas que les familles d’expressions ou de circuits soient des familles uniformes (cf. section 4.4). Nous utiliserons les notations suivantes pour décrire les classes (de familles de polynômes) correspondant aux définitions précédentes. Le V est mis pour Valiant, qui a établi la plupart des concepts et des résultats des chapitres 12 et 13. Notation 12.1.3 – La classe des familles de polynômes p-exprimables est notée VPe , celle des familles qp-exprimables VQPe . – La classe des familles de polynômes p-calculables est notée VP, celle des familles qp-calculables VQP. – La classe des familles de polynômes p-descriptibles est notée VN P, celle des familles p-descriptibles en expressions VN Pe . – La classe des familles de polynômes évaluables par des familles pbornées de circuits arithmétiques de profondeur O(logk (n)) est notée VN C k . La réunion des VN C k est notée VN C. Ces classes sont définies relativement à un anneau commutatif fixé A. Si on a besoin de préciser l’anneau on notera VPe (A), VP(A), etc. . .La plupart des résultats sont cependant indépendants de l’anneau. Les conjectures sont énoncées en général pour des corps. Remarque 12.1.4 Vue la proposition 3.1.6, s’il existe une famille pbornée en taille de circuits arithmétiques qui calcule une p-famille de polynômes, alors il existe aussi une famille p-bornée de circuits arithmétiques qui calcule la même famille de polynômes. Pour la même raison nous aurions pu demander, pour définir la classe VQP, que la famille de 12.2. Parallélisation des expressions et des circuits 309 circuits arithmétiques soit non seulement qp-bornée en taille mais aussi p-bornée en degrés. 12.2 Parallélisation des expressions et des circuits Parallélisation des expressions Des expressions comme celles de Horner, qui sont optimales quant à leur taille (i.e. pour le temps séquentiel d’évaluation), présentent un défaut de parallélisme criant. Brent a découvert que n’importe quelle expression arithmétique peut être remplacée par un circuit ou par une expression dont la profondeur est logarithmique en la taille de l’expression initiale. Théorème 12.1 (Brent [10]) Pour tout polynôme P la profondeur π du meilleur circuit et la taille τ de la meilleure expression sont reliés par 2 log(τ + 1) ≤ π ≤ log(τ + 1) (12.6) log 3/2 NB : On a 2 log 3/2 = 3, 4190 . . .. Un calcul plus précis (théorème 21.35 √ dans [BCS]) donne π ≤ log2 φ log(τ ) + 1 où φ est le nombre d’or 1+2 5 et log2 φ = 2, 8808 . . . Preuve. Dans cette preuve nous notons t(ϕ) le nombre de feuilles de l’arbre correspondant à l’expression ϕ (c’est la taille de l’expression +1) et π(γ) la profondeur d’un circuit ou d’une expression γ. La première inégalité est facile. Si P est une variable ou une constante la profondeur et la taille sont nulles. Sinon lorsque P est évalué par un circuit γ on a γ = γ1 ◦ γ2 (où ◦ représente + ou ×) et si on suppose avoir déjà réécrit γ1 et γ2 avec des expressions ϕ1 et ϕ2 on obtient t(ϕ) = t(ϕ1 ) + t(ϕ2 ) et π(γ) = 1 + max(π(γ1 ), π(γ2 )). En fait ce calcul correspond à une procédure qui déploie le circuit en une expression de même profondeur. Or l’arbre d’une expression de profondeur p a au plus 2p feuilles. La deuxième inégalité est nettement plus subtile. L’idée est la suivante. Appelons x1 , . . . , xm les variables de l’expression ϕ qui représente P . Nous voyons cette expression comme un arbre. Si on considère un nœud N de l’arbre, il représente une sous-expression α (voir figure 12.2 page suivante). 310 12. Le déterminant et les expressions arithmétiques En remplaçant cette sous-expression (ce sous-arbre) par une nouvelle variable y (c’est-à-dire une feuille), on obtient une expression (un arbre) β qui représente un polynôme b0 + b1 y avec b0 , b1 ∈ A [x1 , . . . , xm ]. Les polynômes b0 et b1 correspondent à des arbres β0 et β1 qu’il est facile de construire à partir de l’arbre β. 6 α 5 4 3 2 1 N ⊗ ϕ ⊕ ⊗ ⊗ ⊗ ⊕ Figure 12.2 – Parallélisation d’une expression, à la Brent. En effet (voir figure 12.3 page suivante) pour β0 on substitue 0 à y dans β, et on simplifie. Pour β1 on part de la racine de β on suit le chemin jusqu’à y et on supprime les nœuds étiquetés +, (et avec eux, la branche qui ne va pas à y). On peut alors construire une expression dans laquelle on met d’abord en parallèle les expressions α, β0 et β1 et où on termine en calculant β0 + (β1 × α). La profondeur π(γ) de cette expression γ est majorée par 2 + max(π(β0 ), π(β1 ), π(α)). Pour que cela soit efficace, il faut bien choisir le nœud N (de manière que les tailles des trois expressions aient baissé dans une proportion suffisante) et procéder de manière récursive, c’est-à-dire que chacune des 3 expressions est ensuite soumise de nouveau au même traitement (et ainsi de suite, cela va sans dire). Le choix du nœud N se fait comme suit. Soit t0 = t(ϕ). Si t0 ≤ 4 on ne fait rien. Sinon on part de la racine de l’arbre et on choisit à chaque nœud la branche la plus lourde ϕk . Si tk = t(ϕk ) on a donc tk+1 ≥ tk /2. On s’arrête la dernière fois que tk > (1/3)t0 (on aura fait un pas de trop lorsqu’on s’apercevra que le 12.2. Parallélisation des expressions et des circuits 5 4 ⊗ β0 ⊗ 3 2 1 6 4 ⊗ ⊗ β1 ⊕ 311 ⊗ 3 2 ⊗ Figure 12.3 – Parallélisation d’une expression, à la Brent ( β0 et β1 ). seuil a éte franchi, et il faudra retourner un cran en arrière). β1 α β0 ⊗ ⊕ Figure 12.4 – Parallélisation d’une expression, à la Brent, β0 + β1 × α. On a donc tk > (1/3)t0 ≥ tk+1 ≥ tk /2, on en déduit que tk et t0 − tk sont tous deux ≤ (2/3)t0 . Et on a t(α) = tk et t(β0 ), t(β1 ) ≤ t0 − tk . L’inégalité voulue est donc établie par récurrence en vérifiant qu’elle fonctionne pour les expressions de taille ≤ 3. t u Notez que les procédures décrites sont uniformes. Remarque 12.2.1 Dans la première procédure, on transforme un circuit en une expression de même profondeur mais de taille peut-être beaucoup plus grande. La seconde procédure transforme toute expression 312 12. Le déterminant et les expressions arithmétiques (( mal équilibrée )) de taille τ en une expression (( bien équilibrée )) dont la taille τ 0 n’a pas trop augmenté 1 et dont la profondeur est devenue logarithmique. Autrement dit la partie difficile du théorème de Brent fonctionne entièrement au niveau des expressions. a5 X ⊗ a4 ⊕ X X X ⊗ ⊗ a3 X ⊗ a2 X ⊗ X a1 X ⊗ ⊕ ⊗ a0 X ⊕ ⊗ ⊗ ⊕ ⊕ Figure 12.5 – L’arbre de Horner, parallélisé à la Brent Du théorème de Brent, on déduit le corollaire suivant (la version uniforme serait également valable) : Corollaire 12.2.2 On a VPe = VN C 1 . On conjecture que par contre le déterminant n’est pas réalisable par une expression de taille polynomiale, et donc que VP 6= VPe . La partie facile du théorème de Brent et l’algorithme parallèle de Berkovitz montrent également : Fait 12.2.3 Le déterminant n × n est réalisable par une expression de 2 taille quasi-polynomiale, en 2O(log n) . Parallélisation des circuits arithmétiques Rappelons maintenant le théorème 10.1 (section 10.1) de Valiant et al. [95] (voir aussi [47]). C’est en quelque sorte l’analogue pour les circuits arithmétiques du théorème de Brent pour les expressions arithmétiques. Il donne une procédure pour paralléliser n’importe quel circuit arithmétique à condition qu’il calcule un polynôme de degré raisonnable (le 2 1. Le théorème donne (1 + τ 0 ) ≤ (1 + τ ) log(3/2) . En fait, lors d’une étape de parallélisation on a t(β0 + β1 × α) ≤ (5/3) t(ϕ) et cela conduit plus précisément à log(5/2) (1 + τ 0 ) ≤ (1 + τ ) log(3/2) ≤ (1 + τ )2.26 . 12.3. La plupart des polynômes sont difficiles à évaluer 313 n circuit arithmétique purement séquentiel de taille n qui calcule x2 ne peut pas être parallélisé, mais c’est à cause de son degré trop élevé). Théorème 10.1 Soit Γ un circuit arithmétique sans division, de taille `, qui calcule un polynôme f de degré d en n variables sur un anneau A. Alors il existe un circuit arithmétique homogène Γ0 de taille O(`3 d6 ) et de profondeur O(log(` d) log d) qui calcule f . Ce théorème implique immédiatement que VP = VN C 2 . Avec la partie facile du théorème de Brent il implique aussi qu’une famille qpbornée de circuits arithmétiques peut être parallélisée en une famille de circuits de profondeur polylogarithmique et donc en une famille d’expressions arithmétiques de taille quasi-polynomiale. En bref : Corollaire 12.2.4 On a VP = VN C 2 = VN C et VQP = VQPe . Remarque 12.2.5 1) Ainsi VQP est la classe des familles de polynômes réalisables par des circuits arithmétiques dont le nombre de variables et les degrés sont p-bornés et la profondeur est polylogarithmique (ce qui ne signifie pas pour autant qu’ils soient dans VN C). Pour VQPe cela résultait déjà du théorème de Brent. 2) On conjecture a contrario que les inclusions N C 2 ⊂ N C ⊂ P sont strictes. 12.3 La plupart des polynômes sont difficiles à évaluer Pour établir sous forme précise ce qui est annoncé dans le titre de cette section nous avons besoin d’un résultat de théorie de l’élimination, dont la signification est intuitivement évidente. Si vous paramétrez (( un objet géométrique S )) dans l’espace de dimension 3 en donnant les 3 cooordonnées x, y, z comme fonctions polynomiales de deux paramètres u et v, l’objet que vous obtenez est en général une surface, exceptionnellement une courbe ou plus exceptionnellement encore un point, mais jamais l’objet géométrique ainsi créé ne remplira l’espace. Plus précisément, à partir des trois polynômes X(u, v), Y (u, v), Z(u, v) qui paramètrent l’objet S il est possible de calculer un polynôme Q à trois variables non identiquement nul tel que Q(X(u, v), Y (u, v), Z(u, v)) soit identiquement nul. Autrement dit tous les points de S sont sur la surface algébrique S1 d’équation Q(x, y, z) = 0. Donc, si le corps de base K est infini (( la plupart )) des points de K3 sont en dehors de S. Précisément, 314 12. Le déterminant et les expressions arithmétiques considérons un point M en dehors de S1 (puisque le corps est infini, il en existe sûrement), alors toute droite passant par M ne coupe S1 qu’en un nombre fini de points, majoré par le degré de Q. Si le corps de base est celui des réels ou celui des complexes, on en déduit que le complémentaire de S1 est un ouvert dense, ce qui donne encore une signification intuitive plus claire au terme (( la plupart )) utilisé dans la phrase ci-dessus. On peut montrer l’existence du polynôme Q comme suit. Supposons les degrés de X, Y , Z majorés par d. Pour m fixé, les polynômes  , leur X m1 Y m2 Z m3 avec m1 + m2 + m3 ≤ m sont au nombre de m+3 3 degré est majoré par dm, donc ils sont dans l’espace des polynômes de  degré ≤ dm en 2 variables, qui est de dimension dm+2 . Pour m assez 2   dm+2 grand, m+3 > , d’où une relation de dépendance linéaire non 3 2 m m m 1 2 3 triviale entre les X Y Z , ce qui donne le polynôme Q. Nous énonçons maintenant le résultat général, qui peut se démontrer de la même manière. Proposition 12.3.1 Soit K un corps et (Pi )1≤i≤n une famille de polynômes en m variables y1 , . . . , ym avec m < n. Alors il existe un polynôme non identiquement nul Q(x1 , . . . , xn ) tel que Q(P1 , . . . , Pn ) est identiquement nul. En termes plus géométriques, l’image d’un espace Km dans un espace Kn (avec m < n) par une application polynomiale est toujours contenue dans une hypersurface algébrique. La proposition précédente a la signification intuitive que, au moins en géométrie algébrique, ∞n > ∞m lorsque n > m. Nous en déduisons notre théorème, dans lequel l’expresssion (( la plupart )) doit être comprise au sens de la discussion qui précédait la proposition 12.3.1. Théorème 12.2 Soit K un corps infini, n et d des entiers fixés. L’ensemble des polynômes de degré ≤ d en n variables x1 , . . . , xn est un  espace vectoriel E(n, d) sur K de dimension n+d . Soit t une constante d arbitraire fixée. Notons A(n, d, t) la famille de tous les circuits arithmétiques qui représentent des polynômes en x1 , . . . , xn de degré ≤ d, avec  n+d au plus − 1 constantes aux portes d’entrées, et dont la taille est d majorée par t. Alors (( la plupart )) des éléments de E(n, d) ne sont pas représentés par un circuit arithmétique dans A(n, d, t). En particulier, pour la plupart des P ∈ E(n, d) la taille τ du meilleur circuit admet la minoration τ ≥ n+d d . 12.4. Le caractère universel du déterminant 315 Preuve. Chaque circuit dans A(n, d, t) peut être interprété comme calculant un polynôme P (c1 , . . . , cs ; x1 , . . . , xn ) dans lequel les ci sont les constantes du circuit. Le polynôme P en s + n variables correspondant fournit (lorsqu’on fait varier les constantes) une application de Ks vers E(n, d) et chaque coordonnée de cette application est une fonction polynomiale. Le fait de majorer la taille du circuit par t implique que les polynômes correspondants (en s + n variables) sont en nombre fini. Finalement les éléments de E(n, d) représentés par un circuit arithmétique dans A(n, d, t) sont contenus dans une réunion finie d’hypersurfaces algébriques (d’après la proposition 12.3.1), qui est encore une hypersurface algébrique. t u On trouvera dans [44, 88] des résultats plus précis sur ce sujet. Remarque 12.3.2 Notez a contrario, que le circuit arithmétique qui exprime un polynôme de E(n, d) directement comme somme de ses constantes, et qu’il peut être écrit avec une taille monômes utilise n+d d  µ1 n+d ≤ 3 d . Tous les x1 · · · xµnn de degré ≤ d, qui sont au nombre de   n+d n+d − n, étapes (un produit de d d , peuvent en effet être calculés en degré k > 1 est calculé en multipliant un produit de degré k − 1, déjà calculé, par une variable). Il reste ensuite à multiplier chaque produit par une constante convenable, puis à faire l’addition. 12.4 Le caractère universel du déterminant Le but de cette section est de montrer que toute expression arithmétique peut être vue comme un cas particulier de l’expression (( déterminant )) dans laquelle les entrées de la matrice ont simplement été remplacées par une des constantes ou une des variables de l’expression, avec en outre le fait que le nombre de lignes de la matrice carrée est du même ordre de grandeur que la taille de l’expression. Ceci n’est pas très surprenant, au vu de l’exemple classique ci-dessous, (inspiré de la matrice compagnon d’un polynôme) dans lequel nous n’avons pas marqué les entrées nulles :   x a4  −1 x a3    2 3 4  −1 x a2  det   = a4 + a3 x + a2 x + a1 x + a0 x .  −1 x a1  −1 a0 316 12. Le déterminant et les expressions arithmétiques Projections Nous introduisons maintenant formellement une notion précise appelée projection pour décrire le processus de substitution extrêmement limité auquel nous allons avoir recours dans la suite. Définition 12.4.1 Soit A un anneau commutatif fixé. Soient P ∈ A [x1 , . . . , xk ] et Q ∈ A [y1 , . . . , y` ]. Soient aussi (Pn ) et (Qm ) des p-familles de polynômes à coefficients dans A. (1) On dit que Q est une projection de P si Q est obtenu à partir de P en substituant à chaque xi un yj ou un élément de A. (2) On dit que la famille (Qm ) est une p-projection de la famille (Pn ) s’il existe une fonction polynomialement majorée m 7→ ϕ(m) telle que, pour chaque m, Qm est une projection de Pϕ(m) (3) On dit que la famille (Qm ) est une qp-projection de la famille (Pn ) s’il existe une fonction quasi-polynomialement majorée m 7→ ϕ(m) telle que, pour chaque m, Qm est une projection de Pϕ(m) . La proposition suivante est facile. Proposition 12.4.2 (1) La composée de deux projections est une projection. Même chose pour les p-projections, ou pour les qp-projections. (2) Les classes VP et VPe sont stables par p-projection. (3) La classe VQP = VQPe est stable par qp-projection. Réécriture d’une expression comme déterminant Dans le théorème de Valiant qui suit, la difficulté est de produire une matrice ayant pour déterminant la somme des déterminants de deux autres matrices. L’idée est de faire cette construction non pas pour n’importe quelles matrices, mais en respectant un certain format. C’est l’objet du lemme crucial qui suit. Le format des matrices qui interviennent dans ce lemme est visualisé ci-dessous sur un exemple avec d = 4.  a1 1  0  0 0 a2 x1,2 1 0 0 a3 x1,3 x2,3 1 0 a4 x1,4 x2,4 x3,4 1  0  b1   α  b2  = T b3  b4 0 β  12.4. Le caractère universel du déterminant 317 (α est un vecteur ligne, β un vecteur colonne et T est carrée unitriangulaire supérieure). Notez que P lorsqu’on développe le déterminant d’une telle matrice sous la forme 1≤i,j≤4 ai bj cij , le polynôme cij en facteur de ai bj est nul si la colonne de ai et la ligne de bj se coupent dans la partie strictement supérieure de la matrice T , puisque le cofacteur correspondant de T est nul. Lemme 12.4.3 Soient (pour i = 1, 2) deux entiers di , deux matrices carrées Ti ∈ Adi ×di unitriangulaires supérieures, soient deux vecteurs lignes αi ∈ A1×di et deux vecteurs colonnes βi ∈ Adi ×1 . Considérons les trois matrices suivantes       α1 α2 0 α1 0 α2 0 M1 = , M2 = , M =  T1 0 β1  . T1 β1 T2 β2 0 T2 β2 Alors on a det M = (−1)d2 det M1 + (−1)d1 det M2 Preuve. Nous donnons seulement l’idée directrice de cette preuve un peu technique. Lorsqu’on développe complètement le déterminant comme indiqué avant le lemme, le polynôme en facteur d’un produit α2,i β1,j est nul car la ligne et la colonne correspondante secoupent dans la par T1 0 (cf. le commentaire tie strictement supérieure de la matrice 0 T2 juste avant le lemme). Pour voir que le polynôme en facteur d’un produit α1,i β2,j est nul également, il suffit de considérer la matrice  α2 M 0 =  T2 0 α1 0 T1  0 β2  . β1 Son déterminant est identique (en tant qu’expression développée) à celui de M et l’argument précédent s’applique. Il reste à considérer, dans le développement complet du déterminant en somme de produits, les produits contenant un facteur α1,i β1,j (et ceux contenant un facteur α2,i β2,j ). Un examen attentif montre que les seuls produits non nuls de ce type sont ceux qui empruntent la diagonale de T2 , donc on retrouve exactement les facteurs présents dans det M1 au signe près. Ce signe correspond à une permutation circulaire des d2 + 1 dernières colonnes de M . t u 318 12. Le déterminant et les expressions arithmétiques Théorème 12.3 Toute expression de taille n est la projection du déterminant d’une matrice d’ordre inférieur ou égal à 2n + 2. Précisions : la matrice est dans le format décrit au lemme précédent, ses entrées sont soit une constante de l’expression, soit une variable de l’expression, soit 0, 1 ou −1, la dernière colonne (resp. la dernière ligne) ne contient que 0, 1 ou −1, une colonne quelconque contient au plus une variable ou une constante de l’expression. Corollaire 12.4.4 (1) Toute famille p-exprimable est une p-projection de la famille (( déterminant )) (detn est le déterminant d’une matrice carrée d’ordre n donc un polynôme de degré n en n2 variables). (2) VQP = VQPe coı̈ncide avec la classe des familles qui sont des qp-projections de la famille déterminant. Preuve. On construit la matrice en suivant l’arbre de l’expression. Pour une feuille f de l’arbre (constante ou variable) on prend la matrice 2 × 2  f 1 0 1  qui répond bien aux spécifications souhaitées. Supposons qu’on a construit les matrices Ai (i = 1, 2) qui ont pour déterminants les polynômes Pi . Voyons d’abord la matrice pour P1 +P2 . Quitte à changer la dernière colonne βi en −βi on peut aussi avoir les déterminants opposés, et on peut donc dans tous les cas appliquer le lemme 12.4.3. Donnons enfin la matrice N pour P1 × P2 0 0 J =  ... 0   N= A1 J 0 A2  avec ··· ··· ··· 0 0 .. . 0  1 0 . ..  . 0 Cette matrice N répond aux spécifications voulues, et comme elle est triangulaire par blocs, son déterminant est égal à detA1 · detA2 . t u Donnons par exemple la matrice construite comme indiqué dans la preuve ci-dessus pour obtenir le déterminant x + (2 + y)z (nous n’avons 12.4. Le caractère universel du déterminant 319 pas mis les 0) :  x 1  .  .  . . 2 y . . 1 . . 1 . . . . . . −1 −1 1 . . . . . z 1  . 1   .  . .   .  −1 Conclusion Dans le corollaire 12.4.4 on a vu que toute famille p-exprimable est une p-projection du déterminant et que toute famille qp-calculable est une qp-projection du déterminant. Cette dernière propriété s’énonce sous la forme suivante, qui ressemble à la N P - complétude. La famille (detn ) est universelle pour VQP et les qp-projections. Cependant le déterminant lui-même n’est probablement pas p-exprimable et il est p-calculable, donc mieux que qp-calculable. Il se pose donc la question légitime de trouver une famille p-exprimable qui soit universelle dans VPe par rapport aux p-projections et celle de trouver une famille p-calculable qui soit universelle dans VP par rapport aux p-projections (le déterminant serait un candidat naturel, mais pour le moment on ne connaı̂t pas la réponse à son sujet). Le premier de ces deux problèmes a été résolu positivement par Fich, von zur Gathen et Rackoff dans [30]. Le deuxième par Bürgisser dans [12]. La première question admet une réponse assez facile une fois connu le théorème de Brent. En effet toute expression peut être obtenue comme projection d’une expression de profondeur comparable extrêmement parallélisée qui combine systématiquement additions et multiplications. Par exemple l’expression (de profondeur 2) ϕ3 = x1 + (x2 × x3 ) donne par projection, au choix, l’une des deux expressions (de profondeur 1) x1 + x2 ou x2 × x3 . Si maintenant on remplace chacun des xi par l’expression xi,1 + (xi,2 × xi,3 ) on obtient une expression ϕ9 à 9 variables de profondeur 4 et on voit que toute expression de profondeur 2 est une projection de ϕ9 . En itérant le processus, toute expression de profondeur n est une projection de l’expression ϕ3n , qui est elle-même de profondeur 2n. Donc, après parallélisation à la Brent d’une famille dans VPe , la famille parallélisée est clairement une p-projection de la famille (ϕ3n ). Enfin la famille (ϕ3n ) est elle-même dans VPe car ϕ3n est de taille 320 ⊗ 12. Le déterminant et les expressions arithmétiques ⊕ ⊗ ⊕ ⊗ ⊕ ⊗ ⊗ ⊕ ⊗ ⊕ ⊗ ⊕ ⊗ ⊗ ⊕ ⊕ ⊗ ⊕ ⊗ ⊕ ⊕ ϕ27 ⊗ ⊕ ⊗ ⊕ Figure 12.6 – Une famille d’expressions p-universelle dans VPe 3n − 1 (on peut, si on a des scrupules, définir ϕk pour tout entier k en posant ϕk = ϕ3κ où 3κ−1 < k ≤ 3κ ). La deuxième question (trouver une famille p-calculable qui soit universelle dans VP par rapport aux p-projections) admet une réponse positive du même style (cf. [12]), mais nettement plus embrouillée. 13. Le permanent et la conjecture P = 6 NP Introduction Ce chapitre est dédié à la conjecture de Valiant. Nous ne démontrerons que les résultats les plus simples et nous souhaitons faire sentir l’importance des enjeux. Dans la section 13.1 nous faisons une étude rapide des classes de complexité booléenne, qui constituent une variante non uniforme de la complexité binaire. Dans la section 13.2 nous mettons en évidence quelques liens étroits et simples entre fonctions booléennes et polynômes, et entre complexité booléenne et complexité algébrique. Dans la section 13.3 nous faisons le lien entre complexité binaire et complexité booléenne. Dans la section 13.4 nous donnons quelques résultats sur le permanent. Dans la section finale, nous rappelons la conjecture de Valiant et discutons brièvement sa portée. Parmi les références utiles pour ce chapitre, il faut citer le livre [Weg] et l’article [83], non encore signalés. 13.1 Familles d’expressions et de circuits booléens Expressions, circuits et descriptions L’analogue booléen de l’anneau de polynômes A [x1 , . . . , xn ] est l’algèbre de Boole B [x1 , . . . , xn ] ' F2 [x1 , . . . , xn ]  x21 − x1 , . . . , x2n − xn 322 13. Le permanent et la conjecture P = 6 NP avec dans B [x1 , . . . , xn ] les égalités a ∧ b = ab, a ∨ b = a + b + ab, ¬a = 1 + a et a + b = (¬a ∧ b) ∨ (a ∧ ¬b). Cette interprétation de l’algèbre de Boole librement engendrée par n éléments comme quotient d’un anneau de polynômes à n variables sur le corps F2 laisse penser que les méthodes algébriques sont a priori pertinentes pour résoudre les problèmes booléens. L’analogue booléen d’une fonction polynôme à n variables est une fonction booléenne f : {0, 1}n → {0, 1}. Nous aurons aussi à considérer des applications booléennes g : {0, 1}n → {0, 1}m . L’algèbre de Boole B [x1 , . . . , xn ] est isomorphe à l’algèbre des fonctions booléennes f : {0, 1}n → {0, 1}. L’isomorphisme fait correspondre à l’élément xi de B [x] la i -ème fonction coordonnée : (a1 , . . . , an ) 7→ ai . Rappelons que si p1 , . . . , pn sont les variables booléennes présentes dans une expression booléenne, on appelle littéral l’une des expressions p1 , ¬p1 , . . . , pn , ¬pn . Et qu’une expression est dite en forme normale conjonctive (resp. en forme normale disjonctive) si elle est une conjonction de disjonctions de littéraux (resp. une disjonction de conjonctions de littéraux). Il y a plusieurs types d’écritures canoniques pour une fonction booléenne, en forme normale conjonctive, en forme normale disjonctive ou sous forme d’un polynôme en représentation creuse (chaque variable intervenant avec un degré ≤ 1 dans chaque monôme). On peut aussi exprimer une fonction booléenne au moyen d’une expression booléenne ou d’un circuit booléen. Convention 13.1.1 Nous adopterons la convention qu’une expression booléenne ou un circuit booléen n’utilisent que les connecteurs ∧, ∨ et ¬. En outre dans le cas d’une expression l’usage du connecteur ¬ sera seulement implicite : on utilisera les littéraux comme variables (aux feuilles de l’arbre), et nulle part ailleurs n’apparaı̂tra le connecteur ¬. La taille et la profondeur d’une expression booléenne ne prendront en compte que les connecteurs ∧ et ∨ (les littéraux sont tous considérés comme de profondeur nulle). Cette convention n’a pas de conséquence importante en ce qui concerne les circuits car autoriser d’autres connecteurs ne ferait diminuer la taille et/ou la profondeur que d’un facteur constant. Par contre, en ce qui concerne les expressions booléennes, il s’agit d’une restriction significative de leur pouvoir d’expression : par exemple si on admet en plus le 13.1. Familles d’expressions et de circuits booléens 323 def connecteur a ⊕ b = (a ∧ ¬b) ∨ (¬a ∧ b) l’expression p1 ⊕ p2 ⊕ · · · ⊕ pn réclamera très probablement une écriture nettement plus longue sans l’utilisation de ⊕. Classes de complexité booléenne Nous sommes particulièrement interessés ici par les analogues booléens des classes VN C, VP, VPe , VN P et VN Pe (cf. section 12.1). Définition 13.1.2 Soit fn : {0, 1}vn → {0, 1} une famille de fonctions booléennes (indexée par n ∈ N ou N` ). – Nous disons que la famille (fn ) est p-bornée si vn est majoré par un polynôme en n. On dit encore qu’il s’agit d’une p-famille de fonctions booléennes. – Nous disons qu’une famille d’expressions booléennes (ϕn ) est pbornée si la taille de ϕn est majorée par un polynôme en n. – Nous disons que la famille (fn ) est p-exprimable si elle est réalisable par une famille p-bornée d’expressions booléennes. La classe des familles de fonctions booléennes p-exprimables est notée BPe . – Nous disons qu’une famille de circuits booléens (γn ) est p-bornée si la taille de γn est majorée par un polynôme en n. – Nous disons que la famille (fn ) est p-évaluable (ou encore p-calculable) si elle est réalisable par une famille p-bornée de circuits booléens. La classe des familles de fonctions booléennes p-calculables est notée BP = P/poly. – Nous notons BN C k = N C k /poly la classe des familles de fonctions booléennes réalisables par une famille de circuits booléens de taille polynomiale et de profondeur en O(logk n), et BN C = N C/poly dénote la réunion des BN C k . – Nous disons qu’une fonction booléenne g en les variables p1 , . . . , pk , r1 , . . . , r` est une description de la fonction booléenne f en les variables p1 , . . . , pk si f (p) = _ r∈{0,1}` g(p, r) (13.1) – Nous disons que la famille (fn ) est p-descriptible s’il existe une famille p-calculable de fonctions booléennes (gn ), telle que chaque gn est une description de fn . La classe des familles de fonctions booléennes p-descriptibles est notée BN P = N P/poly. 324 13. Le permanent et la conjecture P = 6 NP – Nous disons que la famille (fn ) est p-descriptible en expressions s’il existe une famille p-exprimable de fonctions booléennes (gn ), telle que chaque gn est une description de fn . La classe des familles de fonctions booléennes p-descriptibles en expressions est notée BN Pe . Il faut souligner que toutes les notions introduites ici sont non uniformes, comme dans le cas algébrique. La classe P/poly est clairement l’analogue booléen de la classe VP en complexité algébrique. C’est aussi un analogue non uniforme de la classe P. Ce dernier point sera plus clair après le théorème 13.7 page 337. De même nous verrons que la classe N P/poly est un analogue non uniforme de la classe N P. Si on compare les définitions des descriptions dans le cas algébrique et dans le cas booléen, on voit qu’on utilise maintenant une disjonction à la place d’une somme (formules 12.5 et 13.1). La notation P/poly (voir par exemple [BDG] ou [Weg]) s’explique comme suit : une famille (fn ) dans P/poly peut être calculée en temps polynomial si on a droit à (( une aide )) (sous forme d’une famille de circuits booléens γn qui calculent les fonctions fn ) qui n’est peut-être pas uniforme mais qui est de taille polynomiale en n. Signalons que Karp et Lipton, qui introduisent la classe P/poly dans [56] donnent une définition générale pour une variante non uniforme C/poly en complexité booléenne d’une classe de complexité binaire arbitraire C. Leur définition justifie aussi les égalités BN P = N P/poly et BN C k = N C k /poly. Enfin la définition de Karp et Lipton ne semble rien donner pour Pe /poly par absence de la classe Pe en complexité binaire. La complexité booléenne des opérations arithmétiques dans Z Le livre [Weg] de Wegener contient une étude précise et très complète de la complexité des familles de fonctions booléennes. On y trouve notamment les résultats donnés dans le théorème qui suit concernant la complexité booléenne des opérations arithmétiques dans N. En fait les résultats sont uniformes et ils s’étendent immédiatement à Z. Théorème 13.1 (théorèmes 1.3, 2.4 et 2.8 du chapitre 3 de [Weg]) L’addition et la multiplication dans N sont réalisables par des familles de circuits booléens dans BN C 1 . Plus précisément : 1. L’addition de deux entiers de taille n ≥ 3 est réalisable par un circuit booléen de taille ≤ 9 n et de profondeur 2 dlog ne + 8. 13.1. Familles d’expressions et de circuits booléens 325 2. Le produit de deux entiers de taille n est réalisable à la Karatsuba par un circuit booléen de taille O(nlog 3 ) et de profondeur O(log n), ou même, en suivant Schönage et Strassen qui adaptent la transformation de Fourier discrète rapide des polynômes au cas des entiers, par un circuit booléen de taille O(n log n log log n) et de profondeur O(log n). Concernant la multiplication des entiers on lira aussi avec intérêt l’exposé de Knuth dans [Knu]. Parallélisation des expressions booléennes Nous avons pour les expressions booléennes un résultat analogue à la parallélisation à la Brent des expressions arithmétiques (voir [85] ou [Sav] théorème 2.3.3). Théorème 13.2 Pour toute fonction booléenne f : {0, 1}n → {0, 1} la profondeur π du meilleur circuit booléen et la taille τ de la meilleure expression booléenne sont reliés par log(τ + 1) ≤ π ≤ 2 log(τ + 1) log 3/2 Preuve. Cela marche de la même manière que la parallélisation à la Brent des expressions arithmétiques. Le polynôme b0 y + b1 dans le cas algébrique (cf. la preuve du théorème 12.1, page 310) doit être remplacé par une expression (y ∧ b0 ) ∨ (¬y ∧ b1 ) dans le cas booléen. t u L’analogue booléen du corollaire 12.2.2 (VPe = VN C 1 ) est : Corollaire 13.1.3 On a BPe = BN C 1 . Description des circuits booléens par des expressions booléennes Le lemme suivant est facile et utile. Lemme 13.1.4 Étant donné un circuit booléen γ de taille τ avec les portes d’entrée p1 , . . . , pn , les portes internes r1 , . . . , r` et une seule porte de sortie (donc τ = ` + 1), on peut construire une expression booléenne en forme normale conjonctive ϕ(p, r) de taille ≤ 7 τ et de profondeur ≤ 2 + log(3 τ ) telle que, pour tous p ∈ {0, 1}n on ait l’équivalence : _ γ(p) = 1 ⇐⇒ (13.2) ` ϕ(p, r) = 1 . r∈{0,1} 326 13. Le permanent et la conjecture P = 6 NP En outre dans le second membre il y a une seule affectation des booléens r1 , . . . , r` qui rend l’expression vraie (lorsque γ(p) = 1). Preuve. On remplace chaque affectation du programme d’évaluation défini par le circuit booléen par une expression booléenne qui est vraie si et seulement si la valeur du booléen affecté est correcte. La conjonction de toutes ces expressions booléennes donne l’expression ϕ. Une affectation c := ¬a est traduite par (c∨a)∧(¬c∨¬a). Une affectation c := a∨b est traduite par (¬c∨a∨b)∧(c∨¬a)∧(c∨¬b). Une affectation c := a∧b est traduite par (c ∨ ¬a ∨ ¬b) ∧ (¬c ∨ a) ∧ (¬c ∨ b). t u On en déduit immédiatement. Proposition 13.1.5 On a l’inclusion BP ⊂ BN Pe et l’égalité BN P = BN Pe . Signalons aussi le résultat important de Valiant (pour une preuve voir [Bur]). Théorème 13.3 On a pour tout corps VN P = VN Pe . Expressions, circuits et descriptions : le cas des applications booléennes Nous pouvons reprendre avec les familles d’applications booléennes les définitions données au début de cette section pour les familles de fonctions booléennes. Notre objectif est surtout ici de définir l’analogue non uniforme de la classe #P. Définition 13.1.6 Soit fn : {0, 1}vn −→ {0, 1}wn une famille d’applications booléennes (indexée par n ∈ N ou N` ). Soit (fn,k ) la famille double de fonctions booléennes fn,k : {0, 1}vn → {0, 1} qui donne la k ème coordonnée de fn si k ≤ wn . – Nous disons que la famille (fn ) est p-bornée si vn et wn sont majorés par un polynôme en n. On dit encore qu’il s’agit d’une p-famille d’applications booléennes. – Nous disons que la famille (fn ) est p-exprimable si elle est p-bornée et si la famille double (fn,k ) correspondante est p-exprimable. Définition analogue pour une famille p-calculable, p-descriptible, ou p-descriptible en expressions. 13.1. Familles d’expressions et de circuits booléens 327 – Nous disons qu’une famille gn : {0, 1}vn −→ N est dans la classe #BP = #P/poly, ou encore qu’ elle compte les solutions d’une famille p-calculable de fonctions booléennes si elle vérifie : n o ∀p gn (p) = # q ∈ {0, 1}`n | hn (p, q) = 1 (13.3) où hn : {0, 1}vn +`n → {0, 1} est une famille p-calculable de fonctions booléennes. Si la famille (hn ) est p-exprimable on dira que la famille (gP n ) est dans la classe #BPe . n k−1 on dira que la famille (f ) est dans Si gn (p) = w n k=1 fn,k (p) 2 #BP (resp. dans #BPe ) lorsque la famille (gn ) est dans #BP (resp. dans #BPe ). Une conséquence immédiate de la description des circuits booléens par les expressions booléennes (lemme 13.1.4) est la proposition suivante, analogue à la proposition 13.1.5. Proposition 13.1.7 On a l’égalité #BP = #BPe . Remarque 13.1.8 Il n’y a pas de différence de principe entre une famille d’applications booléennes et une famille de fonctions booléennes, puisque donner une famille d’applications booléennes revient à donner une famille double de fonctions booléennes. Si on veut définir directement la classe #BP = #P/poly comme une classe de fonctions booléennes, on pourra dire que le problème dans #P/poly associé à la famille (hn ) ∈ P/poly est le problème suivant portant sur le couple (p, m) (où m est codé en binaire) : n o # q ∈ {0, 1}`n | hn (p, q) = 1 ≤ m ? La plupart des fonctions booléennes sont difficiles à évaluer On a aussi l’analogue suivant du théorème 12.2 page 314 : ici on trouve qu’une famille de circuits booléens de taille quasi-polynomiale ne peut calculer qune infime partie de toutes les fonctions booléennes. Proposition 13.1.9 Soit VQPB (k) l’ensemble des familles (fn ) de fonctions booléennes à n variables réalisables par une famille de cirk cuits booléens de taille 2 log n . Soit ε > 0. Pour n assez grand seulement une proportion < ε de fonctions booléennes à n variables est dans VQPB (k). 328 13. Le permanent et la conjecture P = 6 NP Preuve. Faisons les comptes. Le nombre total de fonctions booléennes n à n variables est égal à 22 . Le nombre total de circuits booléens à n variables et de taille t+1 est majoré par N (t+1) = 2 N (t) (t+2n)2 : en effet un programme d’évaluation de taille t + 1 est obtenu en rajoutant une instruction à un programme d’évaluation de taille t, instruction de la forme xt+1 ← y ◦z avec ∧ ou ∨ pour ◦ , et y, z sont à choisir parmi les littéraux ou parmi les xi (1 ≤ i ≤ t). Cette majoration conduit à N (1) = 2 (2n)2 , N (2) = 22 (2n)2 (2n + 1)2 , . . ., N (t) < 2t ((2n + t)!)2 = k k+1 2O((n+t) log(n+t)) . Donc si t = 2 log n , log N (t) = O(2log n ) qui devient négligeable devant 2n pour n grand. t u On trouvera des résultats du même style mais nettement plus précis dans le chapitre 4 du livre de Wegener [Weg]. 13.2 Booléen versus algébrique (non uniforme) 13.2.1 Évaluation booléenne des circuits arithmétiques Rappelons ici le problème, déjà évoqué à la section 4.3.2, de l’évaluation d’un circuit arithmétique sur un anneau A dont les éléments sont codés en binaire. Si l’anneau A est fini, le temps parallèle ou séquentiel du calcul booléen correspondant à l’éxécution d’un circuit arithmétique est simplement proportionnel à la profondeur ou à la taille du circuit arithmétique. Par ailleurs rappelons que VP = VN C = VN C 2 , VN C 1 = VPe et BN C 1 = BPe . On obtient donc : Lemme 13.2.1 Si une p-famille de polynômes sur un anneau fini A est dans la classe VP (resp. VPe , VN P) son évaluation booléenne est donnée par une famille dans la classe booléenne BN C 2 ⊂ BP (resp. BPe , #BP). Dans le cas d’un anneau infini, l’évaluation booléenne d’un circuit arithmétique peut réserver quelques mauvaises surprises (voir l’exemple de l’inventeur du jeu d’échec page 144). Il faudrait bannir toute constante (même 1 !) d’un circuit arithmétique sur Z si on veut que l’évaluation booléenne (avec le codage naturel binaire de Z) ne produise pas d’explosion (et Z est l’anneau infini le plus simple). Une solution serait de coder les éléments de l’anneau par des circuits arithmétiques n’ayant que des constantes en entrées 1 . Mais le test d’éga1. Du point de vue des calculs en temps polynomial on peut remarquer que le codage binaire usuel de Z est équivalent à un codage par des expressions arithméti- 13.2. Booléen versus algébrique 329 lité, le test de signe et bien d’autres opérations simples sur Z semblent alors sortir de la classe P. Une autre solution serait d’apporter une restriction plus sévère aux familles p-bornées de circuits arithmétiques. Avant d’y introduire la moindre constante, même 1, la famille devrait être p-bornée (en taille et en degrés). Ensuite seulement on remplacerait certaines variables par des constantes. De manière générale il faut avoir une majoration convenable de la taille des objets à calculer. Définition 13.2.2 Une famille de fonctions fn : Zvn → Z est dite pbornée en taille si vn est majoré par un polynôme en n et la taille de fn (x1 , . . . , xvn ) est majorée par un polynôme en la taille de l’entrée x1 , . . . , xvn (en utilisant les codages binaires usuels). On a alors l’extension importante suivante du lemme 13.2.1 à l’anneau Z, sous une condition restrictive supplémentaire, qui est d’ailleurs inévitable. Lemme 13.2.3 On considère une p-famille (Pn ) de polynômes sur Z. On suppose que la famille de fonctions fn : Zvn → Z définie par (Pn ) est p-bornée en taille. Alors si (Pn ) est dans VP(Z) = VN C 2 (Z) (resp. VPe (Z) = VN C 1 (Z), VN P(Z)) son évaluation booléenne est donnée par une famille de circuits booléens dans BN C 3 ⊂ BP (resp. BN C 2 , #BP). Preuve. Supposons que (Pn ) est dans la classe VP(Z) et soit (Γn ) une famille p-bornée de circuits arithmétiques correspondant à (Pn ). Pour tous m, n entiers positifs on veut construire un circuit booléen γn,m qui calcule (le code de) fn (x1 , . . . , xvn ) à partir des (codes des) xi lorsqu’ils sont de taille ≤ m. On sait que la taille de la sortie y est majorée par un entier p ≤ C (n + m)k . Il suffit alors de prendre les constantes de Γn modulo 22p et d’exécuter les calculs indiqués par le circuit Γn modulo 22p pour récupérer y comme élément de Z à la fin du calcul. La taille du circuit booléen γn,m correspondant est bien polynomialement majorée. Quant à sa profondeur, comparée à celle de Γn , elle a été multipliée par un O(log p) = O(log(m + n)) (cf. le théorème 13.1) Le résultat pour (Pn ) dans la classe VN P(Z) se déduit immédiatement du résultat pour (Pn ) dans la classe VP(Z). t u ques n’ayant que les constantes 0, 1, ou −1 aux feuilles de l’arbre. Il n’est donc pas artificiel de proposer un codage de Z par des circuits arithmétiques n’ayant que les constantes 0, 1, ou −1 aux portes d’entrée, ce que nous avions noté Zpreval . 13. Le permanent et la conjecture P = 6 NP 330 Notez que si (Pn ) est dans VN C 1 , l’hypothèse que (fn ) est p-bornée en taille est automatiquement vérifiée si les constantes du circuit Γn ont une taille majorée par un C n` . Dans la section suivante, tous les circuits arithmétiques qui simulent des circuits booléens utilisent les seules constantes 0, 1 et −1. 13.2.2 Simulation algébrique des circuits et expressions booléennes Nous nous intéressons dans cette section à la possibilité de simuler algébriquement une fonction booléenne f : {0, 1}n → {0, 1}, ou une application g : {0, 1}n → Z (par exemple codée par un circuit booléen {0, 1}n → {0, 1}m ). Nous disons que le polynôme P simule la fonction booléenne f en évaluation s’il a le même nombre de variables, et s’il s’évalue de la même manière que la fonction booléenne sur des entrées dans {0, 1}. Définition analogue pour la simulation algébrique de l’application g par un polynôme (l’anneau doit contenir Z). Un résultat élémentaire Le lemme suivant nous dit ce que donne la simulation naturelle d’un circuit booléen par un circuit arithmétique : la profondeur et la taille sont convenables mais les degrés peuvent réserver de mauvaises surprises. Lemme 13.2.4 Un circuit booléen γ de taille τ et de profondeur π peut être simulé en évaluation par un circuit arithmétique ψ de taille ≤ 4τ et de profondeur ≤ 3π (sa profondeur multiplicative reste égale à π donc le degré des polynômes est ≤ 2π ). Cette simulation fonctionne sur tout anneau commutatif (non trivial). Preuve. Les seules valeurs des booléens sont 0 et 1, on a donc x ∧ y = xy, ¬x = 1 − x, x ∨ y = x + y − xy sur n’importe quel anneau commutatif (non trivial) 2 . t u 2. Nous rappelons que dans les chapitres 12 et 13 les seules opérations arithmétiques autorisées sont + et × ce qui nous contraint à introduire des multiplications par la constante −1 pour faire des soustractions. Ceci implique que le polynôme x+y −xy est évalué par un circuit de profondeur égale à 3. 13.2. Booléen versus algébrique 331 Simulation d’une expression booléenne par une expression arithmétique Le lemme suivant est une conséquence directe du théorème de parallélisation 13.2 et du lemme 13.2.4. Lemme 13.2.5 Une expression booléenne ϕ de taille τ peut être simulée en évaluation par une expression arithmétique de profondeur majorée par log63/2 log(τ + 1) ≤ 10, 26 log(τ + 1). Cette simulation fonctionne sur tout anneau commutatif (non trivial). En particulier la taille de l’expression arithmétique est ≤ (τ + 1)10,26 ( 3 ). On en déduit : Proposition 13.2.6 Toute famille dans BPe est simulée algébriquement par une famille dans VPe . Cette simulation fonctionne sur tout anneau commutatif (non trivial). Dans [Bur] la proposition précédente est énoncée avec une terminologie différente : (( BPe est contenu dans la partie booléenne de VPe )). Une proposition analogue à la précédente et qui voudrait relier de manière aussi simple les classes BP et VP échouerait parce que la traduction naturelle d’un circuit booléen en un circuit arithmétique donnée au lemme 13.2.4 fournit en général un polynôme de degré trop grand. Autrement dit, on ne connaı̂t pas d’analogue satisfaisant du lemme 13.2.5 pour les circuits booléens. Supposons maintenant que nous ayons démarré avec une p-famille double d’expressions booléennes (ϕn,k ) associée à une famille de fonctions fn : {0, 1}vn → Z. La sortie est codée par exemple comme suit dans {0, 1}m , le premier bit code le signe, et les bits suivants codent l’entier sans signe en binaire (supposé < 2m−1 ). Par exemple avec m = 8 les entiers 5, −11 et 69 sont respectivement codés par 00000101, 10001011 et 01000101. Il n’y a alors aucune difficulté à calculer par un circuit arithmétique ou par une expression arithmétique de profondeur O(log m) la sortie dans Z à partir de son code. Nous pouvons alors énoncer la proposition suivante, qui généralise la proposition 13.2.6, et qui résulte également du lemme 13.2.5. Proposition 13.2.7 Soit (ϕn,k )1≤k≤a+nh une p-famille double dans BPe qui code une famille de fonctions fn : {0, 1}vn → Z. Alors il existe 3. Le degré du polynôme est majoré par (τ + 1)3,419 . 13. Le permanent et la conjecture P = 6 NP 332 une p-famille (γn ) d’expressions arithmétiques dans VPe qui simule en évaluation la famille (fn ) sur n’importe quel anneau contenant Z. Description d’un circuit booléen par une expression arithmétique Nous pouvons faire une synthèse des lemmes 13.1.4 et 13.2.4 pour obtenir une description algébrique (au sens de la définition 12.1.2) d’un circuit booléen. Lemme 13.2.8 Soit γ un circuit booléen de taille τ = `+1 qui calcule une fonction booléenne f : {0, 1}n → {0, 1}. Il existe une expression arithmétique ψ(x1 , . . . , xn , y1 , . . . , y` ) de taille ≤ 14 τ et de profondeur ≤ 4 + dlog(3 τ )e vérifiant : ∀p ∈ {0, 1}n f (p) = X r∈{0,1}` ψ(p, r) (13.4) Cette expression arithmétique utilise les seules constantes 0, 1 et −1 et l’égalité est valable sur tout anneau commutatif (non trivial). Preuve. On applique la simulation donnée dans le lemme 13.2.4 à l’expression booléenne ϕ en forme normale conjonctive construite au lemme 13.1.4. On doit simuler algébriquement chacune des expressions booléennes de base qui sont du type (¬c ∨ a ∨ b) ∧ (c ∨ ¬a) ∧ (c ∨ ¬b) ou du type (c ∨ ¬a ∨ ¬b) ∧ (¬c ∨ a) ∧ (¬c ∨ b). Dans ces expressions booléennes c est un littéral positif et a, b des littéraux positifs ou négatifs. L’examen précis montre que la taille maximum pour une telle simulation est 11. Il reste ensuite à faire le produit de 3τ expressions (chacune correspond à l’un des composants dans les deux types ci-dessus). On obtient alors une expression arithmétique ψ de taille ≤ 14 τ et de profondeur ≤ 4 + dlog(3 τ )e vérifiant :   _ n ∀p ∈ {0, 1} f (p) = 1 ⇐⇒ ψ(p, r) = 1 (13.5) ` r∈{0,1} En outre dans le second membre il y a une seule affectation des variables r1 , . . . , r` dans {0, 1}` qui rend l’expression ϕ vraie (lorsque f (p) = 1), ` c’est-à-dire que ψ(p, r) est nulle pour tout P r ∈ {0, 1} à l’exception de cette valeur. D’où l’égalité 13.4 : f (p) = r∈{0,1}` ψ(p, r). t u Nous en déduisons les corollaires suivants. 13.2. Booléen versus algébrique 333 Proposition 13.2.9 Toute famille fn : {0, 1}vn → {0, 1} dans BP est simulée en évaluation par une famille dans VN Pe , ceci sur tout anneau commutatif (non trivial). Toute famille gn : {0, 1}vn → N dans #BP, est simulée en évaluation par une famille dans VN Pe sur tout anneau commutatif contenant Z. Théorème 13.4 Si VP(Z) = VN Pe (Z) alors BN C 3 = BP = BN P = #BP. Preuve. Supposons VP(Z) = VN Pe (Z) et soit (fn ) une famille dans #BP. Remarquons que (fn ) est p-bornée en taille. Par la proposition précédente, cette famille est simulée en évaluation par une famille dans VN Pe (Z) donc par une famille dans VP(Z) = VN C 2 (Z). Or une telle famille s’évalue par une famille dans BN C 3 d’après le lemme 13.2.3. t u En fait, en utilisant des techniques nettement plus subtiles, Bürgisser a montré les résultats suivants (cf. [Bur]). Théorème 13.5 1. Soit Fq un corps fini, si VP(Fq ) = VN Pe (Fq ) alors BN C 2 = BP = BN P. 2. Soit K un corps de caractéristique nulle. Supposons que l’hypothèse de Riemann généralisée est vraie. Si VP(K) = VN Pe (K) alors BN C 3 = BP = BN P. 13.2.3 Formes algébriques déployées Forme algébrique déployée d’une fonction booléenne Pour traiter les questions de taille d’expressions ou de circuits booléens il est a priori prometteur d’interpréter une fonction booléenne par un polynôme algébrique usuel. Une traduction particulièrement simple consiste à étaler certaines valeurs de la fonction booléenne : on remplace la fonction booléenne à m + n variables f (p1 , . . . , pm , q1 , . . . , qn ) par le polynôme suivant, en m variables, avec pour seuls exposants 0 ou 1 dans les monômes X µ F (p1 , . . . , pm ) = (13.6) n f (p1 , . . . , pm , µ) x µ∈{0,1} où µ = µ1 , . . . , µn et xµ = xµ1 1 · · · xµnn . Nous dirons que le polynôme F est la forme algébrique déployée (sur les variables q1 , . . . , qn ) de la fonction booléenne f . Lorsque m 6= 0 13. Le permanent et la conjecture P = 6 NP 334 chaque coefficient de F est une fonction booléenne de p1 , . . . , pm qui doit être simulée algébriquement. Lorsque m = 0 on a une forme algébrique déployée pure et les coefficients de F sont tous égaux à 0 ou 1. Une définition analogue est également valable si on remplace f : {0, 1}m+n → {0, 1} par une application g : {0, 1}m+n → Z. Si la fonction booléenne f est facile à calculer, le polynôme correspondant F aura ses coefficients faciles à évaluer, mais il risque d’être difficile à évaluer, puisqu’il y aura en général un nombre trop grand (exponentiel en n) de coefficients non nuls. On a alors comme conséquence des résultats précédents. Lemme 13.2.10 Soit une fonction booléenne f (p1 , . . . , pm , q1 , . . . , qn ) évaluée par un circuit booléen γ de taille τ . Sa forme algébrique déployée F sur les variables q1 , . . . , qn admet une description (au sens de la définition 12.1.2) par une expression arithmétique de profondeur ≤ 5+dlog(3τ )e et de taille ≤ 14τ +4n ≤ 18τ. Cette expression arithmétique utilise les seuls constantes 0, 1 et −1 et est valable sur tout anneau commutatif (non trivial). Preuve. Cela résulte du lemme 13.2.8 et de la constatation suivante. On a pour µ1 , . . . , µn ∈ {0, 1} Yn (µi (xi − 1) + 1) xµ1 1 · · · xµnn = i=1 qui s’écrit comme une expression de profondeur ≤ 3 + dlog ne < 4 + dlog(3τ )e et de taille 4n − 1. Donc si la fonction booléenne f est décrite par l’expression arithmétique ψ(p, q, r) (lemme 13.2.8), le polynôme F est égal à X Yn ψ(p, µ, r) · (µi xi + 1 − µi ) n+` (µ,r)∈{0,1} i=1 et il admet pour description l’expression arithmétique à m + 2n + ` variables Yn (µi xi + 1 − µi ) θ(p, x, µ, r) = ψ(p, µ, r) · i=1 de profondeur ≤ 5 + dlog(3τ )e et de taille ≤ 14τ + 4n. t u Forme algébrique déployée d’une famille de fonctions booléennes Une famille de fonctions booléennes fn : {0, 1}vn +wn → {0, 1} admet pour forme algébrique déployée (sur les wn dernières variables) la famille des polynômes Fn qui sont les formes algébriques déployées des 13.3. Complexité binaire versus complexité booléenne 335 fonctions fn . Même chose pour la forme algébrique déployée d’une famille gn : {0, 1}vn +wn → N. On a comme corollaire du lemme 13.2.10. Théorème 13.6 (Critère de Valiant) Toute famille de fonctions booléennes dans BP admet pour forme algébrique déployée une famille de polynômes dans VN Pe , qui convient pour tout anneau commutatif (non trivial). En conséquence une famille dans #BP admet pour forme algébrique déployée une famille dans VN Pe (Z), et cette famille convient pour tout anneau contenant Z. Dans le cas d’une fonction booléenne cela peut sembler un peu décevant, puisqu’a priori VN Pe est une classe réputée difficile à calculer (elle simule #BPe = #BP), mais il y a une très bonne raison à cela. En effet, supposons qu’on déploie toutes les variables, alors si on calcule Fn (1, . . . , 1) on trouve le nombre total des solutions de l’équation P fn (p) = 1, c’est-à-dire la somme p fn (p). Et ce n’est donc pas surprenant que Fn soit a priori plus difficile à calculer que ses coefficients. De manière générale, on ne peut guère espérer que l’intégrale définie d’une fonction soit en général aussi simple à calculer que la fonction elle-même. Le critère de Valiant, malgré la simplicité de sa preuve, est un moyen puissant pour fabriquer des familles dans VN Pe . Comme toutes les preuves que nous avons données dans les chapitres 12 et 13, la preuve du critère de Valiant est clairement uniforme. Donc si (gn ) est une famille dans #P (on prend pour entrée le mot formé par l’entier bâton n suivi d’un 0 puis du mot p), alors la forme algébrique déployée de (gn ) admet pour description une famille uniforme de circuits arithmétiques dans N C 1 qui utilise les seules constantes 0, 1 et −1 et qui donne le résultat correct sur tout anneau contenant Z. 13.3 Complexité binaire versus complexité booléenne Famille de fonctions booléennes associée à un problème algorithmique Notons {0, 1}? l’ensemble des mots écrits sur l’alphabet {0, 1}. Nous pouvons voir cet ensemble comme la réunion disjointe des {0, 1}n . Considérons un problème algorithmique P qui est codé sous forme binaire : autrement dit, toute instance de ce problème correspond à une 336 13. Le permanent et la conjecture P = 6 NP question codée comme un élément de {0, 1}n pour un certain entier n et la réponse à la question, du type oui ou non, est elle-même codée comme un élément de {0, 1}. On peut interpréter ce problème P comme fournissant, pour chaque n, une fonction booléenne fn : {0, 1}n → {0, 1}. Nous dirons que la famille (fn ) est la famille de fonctions booléennes associée au problème algorithmique P. Supposons maintenant que le problème P porte sur les graphes orientés. Un code naturel pour un graphe orienté à n sommets est sa matrice d’ajacence qui est une matrice dans {0, 1}n×n . Cette matrice contient 1 en position (i, j) si et seulement si il y a une arète orientée qui va de i à j dans le graphe considéré. Dans ce cas, on voit que la famille de fonctions booléennes associée au problème P est plus natu2 rellement définie comme une famille fn : {0, 1}n → {0, 1}. On dira que le problème algorithmique P est dans une classe de complexité booléenne C si la famille de fonctions booléennes qui lui est naturellement attachée est dans C. Famille d’applications booléennes associée à une fonction algorithmique Considérons maintenant une fonction algorithmique F, une fonction qu’on aurait envie de faire calculer par un ordinateur : l’entrée et la sortie sont codées en binaire, c’est-à-dire considérées comme des éléments de {0, 1}? . Supposons que t(n) est une majoration de la taille de la sortie en fonction de la taille n de l’entrée et que la fonction t (( n’est pas plus difficile à calculer )) que F. Nous pouvons alors recalibrer la fonction F de manière que la taille de sa sortie ne dépende que de la taille de son entrée. Par exemple nous prenons la fonction G qui, pour un mot µ en entrée de taille n, calcule le mot F (µ) précédé d’un 1, lui-même précédé du nombre de 0 nécessaire pour atteindre la longueur 1 + t(n). Il est clair qu’on récupère facilement F à partir de G. Cette convention nous permet d’associer à toute fonction algorithmique F une famille d’applications booléennes fn : {0, 1}n → {0, 1}1+m où m = t(n) est une majoration de la taille de la sortie en fonction de 13.3. Complexité binaire versus complexité booléenne 337 la taille de l’entrée. La famille d’applications booléennes associée à F dépend donc de la fonction de majoration t que l’on considère. Définition 13.3.1 Dans les conditions ci-dessus, nous dirons que la famille (fn ) est la famille d’applications booléennes associée à la fonction algorithmique F avec la fonction de majoration t. Si nous ne précisons pas cette fonction de majoration, nous disons simplement que la famille (fn ) est une famille d’applications booléennes associée à la fonction algorithmique F. On dira que la fonction algorithmique F est dans une classe de complexité booléenne C si la famille (fn ) est dans C. Lorsque la fonction F est calculable, dans une classe de complexité binaire connue, on choisira toujours la fonction de majoration suffisamment simple, de façon que la fonction G reste dans la même classe de complexité. Tout ce que nous venons de dire s’applique par exemple à une fonction F de {0, 1}? ou N vers N ou Z, modulo des codages binaires naturels convenables. Familles uniformes de circuits booléens Considérons un problème algorithmique P qui est codé sous forme binaire : pour chaque n, une fonction booléenne fn : {0, 1}n → {0, 1} donne la réponse pour les mots de longueur n. Cette famille (fn ) peut être réalisée sous forme d’une famille d’expressions booléennes, ou sous forme d’une famille de circuits booléens. En complexité binaire on s’intéresse à la fois à la taille (de ces expressions ou de ces circuits) et à la difficulté proprement algorithmique qu’il peut y avoir à produire l’expression (ou le circuit) no n en fonction de l’entrée n (codée en unaire). Ce deuxième aspect correspond à la question : la famille est-elle uniforme ? Un théorème précis donne l’interprétation de la calculabilité en temps polynomial en termes de familles de circuits booléens (cf. [BDG] théorème 5.19). Théorème 13.7 Soit P un problème algorithmique codé sous forme binaire. (1) Si le problème P est résoluble en temps T par une Machine de Turing à une seule bande, on peut construire en temps O(T 2 ) une famille de circuits booléens qui représente la famille de fonctions booléennes (fn ) associée à P . 338 13. Le permanent et la conjecture P = 6 NP (2) Le problème P est résoluble en temps polynomial par une Machine de Turing si et seulement si il existe une famille uniforme de circuits booléens (γn ) qui représente la famille de fonctions booléennes (fn ) associée à P . Ce théorème est important, même s’il a l’air de se mordre un peu la queue, puisque la famille (γn ) doit être uniforme, c’est-à-dire calculable en temps polynomial par une Machine de Turing. Il n’est pas trop compliqué à démontrer. Il est relié à l’existence d’une Machine de Turing universelle qui travaille en temps polynomial. Le fait que le résultat du calcul (sur une entrée µ de taille n) au bout de t étapes est bien celui affiché peut être vérifié en exécutant soi-même le programme à la main, et on peut certifier la totalité du calcul en certifiant le résultat de chaque étape intermédiaire. Quand au bout du compte, on dit (( la sortie a été correctement calculée )), on peut aussi l’écrire en détail sous forme d’un circuit booléen γn qui fonctionne pour toute entrée de taille n. Il faut un peu d’attention pour vérifier que tout ceci reste dans le cadre de la taille polynomiale. C’est le même genre d’argument qui a permis à Cook de fournir le premier et le plus populaire des problèmes N P - complets, celui de la satisfiabilité des expressions booléennes (étant donné une expression booléenne, existe-t-il une façon d’affecter les variables booléennes en entrée qui donne à l’expression la valeur Vrai ?), problème plus parlant que le problème N P complet universel que nous avons exposé page 140 dans la section 4.2. Le théorème 13.7 nous donne immédiatement. Proposition 13.3.2 Soit P un problème algorithmique, codé sous forme binaire. Soit F : {0, 1}? → N une fonction algorithmique. – Si le problème P est dans la classe P, alors il est dans P/poly. – Si le problème P est dans la classe N P, alors il est dans N P/poly. – Si la fonction F est dans la classe #P, alors elle est dans #P/poly. La signification intuitive importante du théorème 13.7 est que la classe P/poly est l’exact analogue non uniforme de la classe P : soit en effet P un problème algorithmique qui correspond à une famille (fn ) de fonctions booléennes, – le problème P est dans la classe P signifie que (fn ) est calculable par une famille uniforme γn de circuits booléens (à fortiori la taille de (γn ) est polynomiale en n), 13.4. Le caractère universel du permanent 339 – le problème P est dans la classe P/poly signifie que (fn ) est calculable par une famille (γn ) de circuits booléens dont la taille est polynomiale en n. Étant donné que N P/poly et #P/poly sont définis à partir de P/poly de manière similaire à la définition de N P et #P à partir de P, une autre signification intuitive importante du théorème 13.7 est que les classes N P/poly et #P/poly sont les exacts analogues non uniformes des classes N P et #P. La preuve qu’un problème algébrique donné P est N P-complet donne en général un procédé uniforme de réduction d’une famille arbitraire dans BN P (uniforme ou non) à la famille de fonctions booléennes attachée à P . En conséquence on obtient l’implication P = N P ⇒ BP = BN P. Autrement dit la conjecture non uniforme BP 6= BN P est plus forte que la conjecture classique P = 6 N P. La même remarque vaut en remplaçant N P par #P. 13.4 Le caractère universel du permanent Le permanent Par définition le permanent d’une matrice carrée A = (aij )1≤i,j≤n sur un anneau commutatif A est le polynôme en les aij , noté per(A), défini par l’expression analogue à celle du déterminant obtenue en remplaçant les signes − par les + : per(A) = pern ((aij )1≤i,j≤n ) = X σ∈Sn Yn i=1 ai,σ(i) (13.7) où σ parcourt toutes les permutations de {1, . . . , n}. Nous considérons (pern ) comme une famille de polynômes à n2 variables sur l’anneau A. On ne connaı̂t pas de manière rapide d’évaluer le permanent d’une matrice à coefficients entiers, ni sur aucun corps de caractéristique distincte de 2 (en caractéristique 2 le permanent est égal au déterminant et se laisse donc évaluer facilement). Lorsque les coefficients sont tous égaux à 0 ou 1 on peut interpréter la matrice A comme donnant le graphe d’une relation entre deux ensembles à n éléments F et G. Par exemple les éléments de F sont des filles et ceux de G sont des garçons, et la relation est la relation d’affinité (ils veulent bien danser ensemble). Alors le permanent de la matrice correspondante compte le nombre de manières distinctes de rem- 340 13. Le permanent et la conjecture P = 6 NP plir la piste de danse sans laisser personne sur le bord. Ainsi la famille 2 fn : {0, 1}n → N définie par fn (A) = pern (A) est une famille dans #P. Le critère de Valiant (théorème 13.6 page 335) montre par ailleurs que la famille de polynômes (pern ) est dans VN Pe sur n’importe quel anneau commutatif : en effet la famille (pern ) n’est autre que la forme algébrique déployée de la famille des fonctions booléennes qui testent si une matrice dans {0, 1}n×n est une matrice de permutation. Deux théorèmes de Valiant sur le permanent Valiant a établi l’égalité VN P = VN Pe et il a montré le caractère universel du permanent, à la fois en complexité binaire et en complexité algébrique. Théorème 13.8 Le calcul du permanent pour les matrices carrées à coefficients dans {0, 1} est #P-complet. Théorème 13.9 Sur un corps de caractéristique 6= 2, et plus généralement sur un anneau dans lequel 2 est inversible, la famille (pern ) est universelle pour la classe VN P : toute famille dans VN P est une p-projection de la famille (pern ). Les preuves de ces deux théorèmes sont délicates. Pour le deuxième nous recommandons [Bur]. 13.5 La conjecture de Valiant Le petit tableau ci-après récapitule les analogies entre différentes classes de complexité. Dans les colonnes Booléen et Algébrique interviennent des familles non uniformes d’expressions ou circuits. Dans la colonne Sim nous indiquons si la simulation algébrique du cas booléen est connue comme étant sur la même ligne : deux points d’interrogation signifient qu’on ne le croit guère possible. Rappelons que dans la première colonne (complexité binaire) toutes les inclusions en descendant sont conjecturées être strictes, et que les inclusions correspondantes dans le cas booléen (2ème colonne) sont aussi conjecturées strictes. 13.5. La conjecture de Valiant 341 Petit récapitulatif (Analogies entre complexité binaire, booléenne et algébrique) Binaire Booléen Algébrique Sim N C1 BPe = BN C 1 VPe = VN C 1 oui N C2 BN C 2 VN C 2 ?? NC BN C VN C = VN C 2 ?? P BP VP = VN C 2 ?? VQP = VQPe NP BN P = BN Pe #P #BP = #BPe VN P = VN Pe oui Valiant a proposé la conjecture : Pour tout corps K, VP 6= VN P. Cette conjecture est un analogue algébrique non uniforme de la conjecture algorithmique P = 6 N P ou plus précisément de P = 6 #P. Sur un corps de caractéristique 6= 2, vu le théorème 13.9, cette conjecture s’écrit purement en termes d’expressions arithmétiques : Le permanent n’est pas une p-projection du déterminant. C’est sur les corps finis que la conjecture semble le plus significative, parce que la situation algébrique y est le plus proche du cas booléen : elle n’est pas perturbée par la présence d’éléments de taille arbitrairement grande dans le corps. Si on disposait d’une procédure uniforme qui réduise la famille (pern ) à une famille dans VP, alors le calcul du permanent d’une matrice dans 2 {0, 1}n serait dans la classe P et donc on aurait P = #P par le théorème 13.8. Plus généralement, le théorème 13.5 page 333 montre que P/poly 6= #P/poly implique VP(Fq ) 6= VN P(Fq ) pour tout corps fini, et sous l’hypothèse de Riemann généralisée, VP(K) 6= VN P(K) pour tout corps de caractéristique nulle. Par ailleurs si on avait P = #P, le calcul du permanent d’une matrice 2 dans {0, 1}n serait dans la classe P, donc a foriori dans P/poly et on aurait #P/poly = P/poly, mais peut-être pas pour autant VP = VN P. 342 13. Le permanent et la conjecture P = 6 NP La conjecture de Valiant est qu’il n’existe aucune procédure, même sans l’hypothèse restrictive d’uniformité, qui réduise la famille (pern ) à une famille dans VP. L’avantage de la conjecture de Valiant est qu’elle est un problème purement algébrique, qui parle uniquement de la taille de la représentation d’une certaine famille de polynômes par des familles de circuits arithmétiques. Comme un des aspects les plus mystérieux de la conjecture P 6= N P (cela n’a pas toujours représenté un million de dollars 4 mais cela a toujours semblé très excitant) tient à la question de l’uniformité des familles de circuits booléens en jeu, on contournerait cet obstacle si on démontrait la conjecture analogue non uniforme et plus forte P/poly 6= N P/poly. Et la forme purement algébrique VP 6= VN P serait plus à notre portée. Une preuve de VP 6= VN P serait un pas important qui éclairerait le chemin pour une preuve de P/poly 6= #P/poly, qui implique P = 6 #P. Cela pourrait suggérer enfin une preuve de P = 6 N P. Un petit ennui dans cette suite de considérations informelles : les deux points d’interrogation sur la ligne P du petit tableau récapitualtif. Comme VQP = VQPe et VN P = VN Pe , la conjecture de Valiant étendue, à savoir : Pour tout corps K, VN P 6⊂ VQP est regardée par certains auteurs comme encore plus instructive pour la compréhension du problème algorithmique analogue P = 6 #P. Sur un corps de caractéristique 6= 2, cela équivaut à : Le permanent n’est pas une qp-projection du déterminant. Notons que Bürgisser a démontré que VQP 6⊂ VN P sur les corps de caractéristique nulle (voir [Bur]). 4. Un milliardaire américain qui aimerait devenir célèbre a proposé en l’an 2000 un prix d’un million de dollars pour celui ou celle qui résoudrait le problème P = N P ?. Six autres conjectures mathématiques importantes sont dotées d’un prix analogue. Un million de dollars n’est d’ailleurs pas grand chose comparé à ce que gagne un bon joueur de football, et rien du tout par rapport à un avion furtif. Ceci tendrait à dire qu’un milliardaire peut espérer devenir célèbre avec un investissement très modeste. Notez que si vous démontrez que #P = 6 N P, vous aurez droit à l’admiration de tou(te)s les mathé/infor-maticien(ne)s, mais vous n’aurez pas le million de dollars correspondant à P 6= N P. C’est certainement injuste, mais c’est ainsi. Annexe : codes Maple Nous donnons, dans les pages qui suivent, les codes Maple des algorithmes qui calculent le polynôme caractéristique et dont nous avons testé les performances. Les codes sont écrits ici dans la version Maple 6, mais les tests ont été faits avec la version Maple 5. Les différences sont les suivantes. Premièrement la version Maple 6 a grandement amélioré son calcul standard de polynôme caractéristique (en le basant sur l’algorithme de Berkowitz ?). Deuxièmement, dans Maple 6, le dernier objet calculé est désigné par % alors que dans Maple 5 il était désigné par ". Enfin, dans Maple 6 une procédure se termine par end proc: tandis que dans Maple 5 elle se termine par end: Les algorithmes que nous avons comparés sont ceux de Berkowitz amélioré (noté berkodense), de Jordan-Bareiss modifié (barmodif), de Faddeev-Souriau-Frame (faddeev), de Chistov (chistodense) et leurs versions modulaires respectives (nous donnons ici berkomod), ainsi que les algorithmes correspondant à la méthode d’interpolation de Lagrange, celle de Hessenberg et celle de Kaltofen-Wiedemann (notés respectivement interpoly, hessenberg et kalto), en plus de la fonction charpoly faisant partie du package linalg de Maple que nous avons notée linalpoly dans nos tableaux de comparaison. Nous avons également adapté berkodense et chistodense au cas des matrices creuses (voir les codes berksparse et chisparse dérivés) Les mesures du temps CPU et de l’espace-mémoire pour chaque algorithme testé sont prises à l’aide des fonctions time() et bytesalloc du noyau de Maple. 344 Annexe ### Somme des éléments d’une liste ### ### de fractions rationnelles ### somme : = proc(suite : : list(ratpoly)) normal(convert(suite,‘+‘)) end proc: ### ##### Berkowitz dans le cas d’une matrice dense ##### berkodense : = proc(A : : matrix,X : : name) local n,r,i,j,k,V,C,S,Q; n : = coldim(A); V : = table([1 = -1,2 = A[1,1]]); C[1] : = -1; for r from 2 to n do for i to r-1 do S[i] : = A[i,r] od; C[2] : = A[r,r]; for i from 1 to r-2 do C[i+2] : = somme([seq(A[r,k]*S[k],k=1..r-1)]); for j to r-1 do Q[j] : = somme([seq(A[j,k]*S[k],k=1..r-1)]) od; for j to r-1 do S[j] : = Q[j] od; od; C[r+1] : = somme([seq(A[r,k]*S[k],k=1..r-1)]); for i to r+1 do Q[i] : = somme([seq(C[i+1-k]*V[k],k=1..min(r,i))]); od; for i to r+1 do V[i] : = Q[i] od; od; somme([seq(V[k+1]*X^ (n-k),k=0..n)]); collect(%,X) end proc: ##### Codes Maple 345 ##### Berkowitz dans le cas d’une matrice creuse ##### berksparse : = proc(A : : matrix,X : : name) local n,r,i,j,k,V,C,S,Q,N; n : = coldim(A); V : = table([1 = -1,2 = A[1,1]]); N : = vector(n); for i to n do N[i] : = {} od; C[1] : = -1; for r from 2 to n do for i to n do if A[i,r-1]<>0 then N[i] : = N[i] union {r-1} fi od; for i to r-1 do S[i] : = A[i,r] od; C[2] : = A[r,r]; for i from 1 to r-2 do C[i+2] : = somme([seq(A[r,j]*S[j],j = N[r])]); for j to r-1 do Q[j] : = somme([seq(A[j,k]*S[k],k = N[j])]); od; for j to r-1 do S[j] : = Q[j] od; od; C[r+1] : = somme([seq(A[r,j]*S[j],j = N[r])]); for i to r+1 do Q[i] : = somme([seq(C[i+1-k]*V[k],k=1..min(r,i)]); od; for i to r+1 do V[i] : = Q[i] od; od; somme([seq(V[k+1]*X^ (n-k),k=0..n)]); collect(%,X) end proc; ##### Nous avons également adapté les codes Maple ci-dessus, correspondant à l’algorithme amélioré de Berkowitz, au cas où les coefficients appartiennent à un anneau-quotient du type Zp [lisvar] /hIdeali . On obtient une procédure, notée berkomod dans nos tableaux de comparaison, qui prend en entrée un entier positif p , une liste d’indéterminées lisvar , une liste Ideal de polynômes en lisvar et la matrice A ∈ (Zp [lisvar] /hIdeali )n×n pour donner en sortie le polynôme caractéristique de A . La procédure berkomod ainsi que les versions modulaires des autres 346 Annexe algorithmes utilisent comme sous-procédure la procédure polmod qui prend en entrée un nombre entier p, un polynôme P de Z[lisvar] , et donne en sortie un représentant simple de l’image canonique de P dans l’anneau-quotient Zp [lisvar] /hIdeali . ##### Réduction d’un polyn^ ome modulo un idéal ##### polmod : = proc(P : : polynom,lisvar : : list,Ideal : : list,p : : posint) local i, Q; if nops(lisvar)<>nops(Ideal) then ERROR(‘The number of polynomials must be equal to the number of variables‘) fi; Q : = P; for i to nops(lisvar) do Q : = rem(Q,Ideal[i],lisvar[i]); Q : = Q mod p od; sort(Q); end proc: ##### On en déduit les deux calculs de base modulo l’idéal considéré, la somme d’une liste et le produit de deux éléments. ##### Somme d’une liste modulo un idéal ##### sommod : = proc(s : : list(polynom), lsv : : list(name),lsp : : list(polynom),p : : posint) polmod(somme(s),lsv,lsp,p) end proc: ##### ##### Evaluation d’un produit modulo un un ideal ##### promod : = proc(P,Q : : polynom, lsv : : list(name),lsp : : list(polynom),p : : posint) polmod(P*Q,lsv,lsp,p) end proc: ##### Il ne reste plus qu’à réécrire berkodense en y remplaçant les opérations somme d’une liste de polynômes et produit de deux polynômes par les calculs modulaires donnés par sommod et promod. Codes Maple 347 ##### Berkowitz modulaire ##### berkomod : = proc(A : : matrix,X : : name,lsv : : list(name), lsp : : list(polynom),p : : posint) local n,r,i,j,V,C,S,Q; n : = coldim(A); V : = table([1 = -1,2 = A[1,1]]); C[1] : = -1; for r from 2 to n do for i to r-1 do S[i] : = A[i,r] od; C[2] : = A[r,r]; for i from 1 to r-2 do [seq(promod(A[r,k],S[k],lsv,lsp,p),k=1..r-1)]; C[i+2] : = sommod(%,lsv,lsp,p); for j to r-1 do [seq(promod(A[j,k],S[k],lsv,lsp,p),k=1..r-1)] Q[j] : = sommod(%,lsv,lsp,p) od; for j to r-1 do S[j] : = Q[j] od; od; [seq(promod((A[r,k],S[k],lsv,lsp,p),k=1..r-1)]; C[r+1] : = sommod(%,lsv,lsp,p); for i to r+1 do [seq(promod((C[i+1-k],V[k],lsv,lsp,p), k=1..min(r,i))]; Q[i] : = sommod(%,lsv,lsp,p); od; for i to r+1 do V[i] : = Q[i] od; od; somme([seq(V[k+1]*X^ (n-k),k=0..n)]); collect(%,X) end proc: ##### Voici maintenant sans plus de commentaire les codes Maple des algorithmes chistodense, chisparse, barmodif, faddeev, interpoly, hessenberg, kalto. 348 Annexe ##### (Chistov. Cas des matrices denses) ##### chistodense : = proc(A : : matrix,X : : name) local n,r,i,j,k,a,b,C,V,W,Q; n : = coldim(A); a : = array(0..n,[1]); C : = array(0..n,[1]); for i to n do a[i] : = normal(a[i-1]*A[1,1]) od; for r from 2 to n do for i to r do V[i] : = A[i,r] od; C[1] : = V[r]; for i from 2 to n-1 do for j to r do W[j] : = somme([seq(A[j,k]*V[k],k = 1..r)]); od; for j to r do V[j] : = W[j] od; C[i] : = V[r]; od; [C[n] : = somme(seq(A[r,k]*V[k],k = 1..r)]); for j from 0 to n do b[j] : = somme([seq(C[j-k]*a[k],k = 0..j)]); od; for j from 0 to n do a[j] : = b[j] od; od; Q : = somme([seq(X^ k*a[k],k = 0..n)]); Q : = X^ n*subs(X = 1/X,inversf(Q,X,n)); Q : = collect((-1)^ n*Q,X) end proc: ##### ### Calcul de l’inverse modulo z (n+1) d’un polyn^ ome en z ### inversf : = proc(P,z,n) collect(convert(series(1/P,z,n+1),polynom),z,normal) end proc: ### cette procédure utilisée dans les algorithmes ### de Chistov sera aussi utile dans l’algorithme kalto Codes Maple ##### Chistov. Cas des matrices creuses ##### chisparse : = proc(A : : matrix,X : : name) local n,r,i,j,k,a,b,C,N,V,W,Q; n : = coldim(A); a : = array(0..n,[1]); C : = array(0..n,[1]); N : = array(1..n); for i to n do N[i] : = {} od; ## N[i]; éléments non nuls de la i-ème ligne for i to n do for j to n do if A[i,j] <> 0 then N[i] : = N[i] union {j} fi od od; #### Fin de la construction de N for i to n do a[i] : = normal(a[i-1]*A[1,1]) od; for r from 2 to n do for i to r do V[i] : = A[i,r] od; C[1] : = V[r]; for i from 2 to n-1 do for j to r do [seq(A[j,k]*V[k],k = {$ 1..r} intersect N[j])]; W[j] : = somme(%) od; for j to r do V[j] : = W[j] od; C[i] : = V[r]; od; [seq(A[r,k]*V[k],k = {$ 1..r} intersect N[r])]; C[n] : = somme(%); for j from 0 to n do b[j] : = somme([seq(C[j-k]*a[k],k = 0..j)]); od; for j from 0 to n do a[j] : = b[j] od; od; Q : = somme([seq(X^ k*a[k],k = 0..n)]); Q : = X^ n*subs(X = 1/X,inversf(Q,X,n)); Q : = collect((-1)^ n*Q,X) end proc: ##### 349 350 Annexe ##### Jordan-Bareiss Modifié ##### barmodif : = proc(A : : matrix,X : : name) local B,n,p,i,j,piv,dencoe; den : = 1; n : = coldim(A); B : = copy(A); B : = evalm(B-X*array(identity, 1..n,1..n)); piv : = B[1,1]; for p from 1 to n-1 do for i from p+1 to n do coe : = B[i,p]; for j from p+1 to n do B[i,j] : = normal((piv*B[i,j]-coe*B[p,j])/den) od od; den : = piv; piv : = B[p+1,p+1] od; sort(collect(piv,X),X) end proc: ##### ##### Faddeev-Souriau-Frame ##### faddeev : = proc(A : : matrix,X : : name) local n, k, a, C, B, Id, P; n : = coldim(A); a : = array(1..n); Id : = array(1..n,1..n,identity); B : = copy(Id); for k from 1 to n do C : = map(normal,multiply(A,B)); a[k] : = trace(C)/k; B : = map(normal,evalm(C-a[k]*Id)) od; P : = somme([seq(a[k]*X^ (n-k),k=1..n)]); sort((-1)^ n*(X^ n-P,X); end proc: ##### ##### Interpolation de Lagrange ##### interpoly : = proc(M : : matrix,X : : name) local n,Id,i,j,N,d,L; n : = coldim(M); Id : = array(identity, 1..n, 1..n); for i to n+1 do d[i] : = det(evalm(M-(i-1)*Id)) od; L : = [seq(d[j], j = 1..n+1)]; interp([‘$‘(0 .. n)], L, X); end proc: ##### Codes Maple 351 ##### Méthode de Hessenberg ##### hessenberg : = proc(A : : matrix,X : : name) local jpiv, ipiv, iciv, i, m, n, piv, c, H, P; # Initialisations n : = coldim(A); P[0] : = 1; H : = copy(A); # Réduction de H à la forme de Hessenberg for jpiv from 1 to n-2 do ipiv : = jpiv+1; iciv : = ipiv; piv : = normal(H[iciv,jpiv]) ; while piv = 0 and iciv < n do iciv : = iciv+1 ; piv : = normal(H[iciv,jpiv]) od ; if piv <> 0 then if iciv > ipiv then H : = swaprow(H,ipiv,iciv); # Echange de lignes H : = swapcol(H,ipiv,iciv) # Echange de colonnes fi; for i from iciv+1 to n do c : = normal(H[i,jpiv]/piv) ; H : = addrow(H,ipiv,i,-c);# Manipulation de lignes H : = addcol(H,i,ipiv,c) # Manipulation de colonnes od; H : = map(normal,H) fi od ; # Calcul du polyn^ ome caractéristique for m from 1 to n do P[m] : = normal((H[m,m]-X) * P[m-1]) ; c : = 1 ; for i from 1 to m-1 do c : = normal(-c * H[m-i+1,m-i]) ; P[m] : = normal(P[m]+c * H[m-i,m]* P[m-i-1]) od od ; collect(P[n],X) # le polyn^ ome caractéristique de A. end proc; ##### 352 Annexe #### developpement limité à l’ordre n #### devlim : = proc(s : : ratpoly,u : : name,n : : integer) convert(series(s,u,n+1),polynom); collect(",u,normal) end proc; ##### ##### Kaltofen-Wiedemann ##### kalto : = proc(A : : matrix,X : : name) local n,i,j,k,a,b,bv,bw,c,B,C,P,u; n : = coldim(A); ### Initialisation a : = stre(n); C : = stra(n); b : = vector(2*n); B : = evalm(C+u*(A-C)); ### Calcul des b i b[1] : = a[1]; bv : = copy(a); bw : = vector(n); for i from 2 to n+1 do ## multiplication de B par bv for j to n do bw[j] : = somme([seq(B[j,k]*bv[k],k = 1..n)]); od; for j to n do bv[j] : = bw[j] od; b[i] : = bv[1] od; for i from n+2 to 2*n do ## multiplication de B par bv for j to n do bw[j] : = somme([seq(B[j,k]*bv[k],k = 1..n)]); od; for j to n do bv[j] : = bw[j] od; b[i] : = devlim(bv[1],u,n); od; P : = polgenmin(b,X,u,n); P : = sort(subs(u = 1,(-1)^ n*res),X); P : = collect(P,X,normal) end proc: ##### Codes Maple ##### Sous-procédures utilisées dans kalto 353 ##### ### polgenmin: Procédure de Berlekamp-Massey ### ### pour le calcul du polyn^ ome générateur minimal ### ### d’une suite récurrente linéaire ### ### Ici, l’anneau de base est l’anneau des ### ### développements limités A[z]/<z^(n+1)> ### polgenmin : = proc(b : : vector,X : : name,z : : name,n : : integer) local i,lc,ilc,ill,R1,R2,R3,V1,V2,V3,Q; R1 : = somme([seq(b[2*n-k]*X^ k,k = 0..2*n-1)]); Q : = quo(X^(2*n),R,X,’R2’); V1 : = 1; V2 : = -Q; ill : = 1; for i from 2 to n do ### traiter R2 R2 : = collect(R2,X,normal); lc : = lcoeff(R2,X); ilc : = inversf(lc,z,n); R2 : = devlim(ilc*R2,z,n); Q : = quo(R1,R2,X,’R3’); Q : = devlim(Q,z,n); R3 : = devlim(R3,z,n); V3 : = devlim(ill*V1-ilc*V2*Q,z,n); ill : = ilc; V1 : = V2; V2 : = sort(V3,X); R1 : = R2; R2 : = sort(R3,X); od; V2 : = collect(V2,X); lc : = lcoeff(V2,X); ilc : = inversf(lc,z,n); V2 : = devlim(ilc*V2,z,n); V2 : = collect(V2,z,normal) end proc: ##### 354 Annexe #### Vecteur du centre d’élimination des divisions #### stre : = proc(n) local i,a; a : = vector(n); for i to n do a[i] : = binomial(i-1,floor((i-1)/2)) od; eval(a) end proc: ##### #### Matrice du centre d’élimination des divisions #### stra : = proc(n) local i,C; C : = array(1..n,1..n,sparse); for i to n-1 do C[n,i] : = (-1)^ floor((n-i)/2) * binomial(floor((n+i-1)/2),i-1); C[i,i+1] : = 1 od; C[n,n] : = 1; evalm(C) end proc: ##### Liste des algorithmes, circuits et programmes d’évaluation 2.1 Algorithme du pivot de Gauss simplifié et LU -décomposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Deuxième algorithme du pivot de Gauss simplifié . . . . 2.3 LUP -décomposition d’une matrice surjective . . . . . . . 2.4 Algorithme de Jordan-Bareiss . . . . . . . . . . . . . . . 2.5 Algorithme de Dodgson pour une matrice de Hankel . . 2.6 Algorithme de Hessenberg . . . . . . . . . . . . . . . . . 2.7 Algorithme de Le Verrier . . . . . . . . . . . . . . . . . . 2.8 Algorithme de Souriau-Faddeev-Frame . . . . . . . . . . 2.9 Algorithme de Preparata & Sarwate, version séquentielle 2.10 Algorithme de Berkowitz, principe général . . . . . . . 2.11 Algorithme de Berkowitz, version séquentielle . . . . . 2.12 Algorithme de Chistov, principe général . . . . . . . . . 2.13 Algorithme de Chistov, version séquentielle simple . . . 2.14 Algorithme JorBarSol . . . . . . . . . . . . . . . . . . . 2.15 Algorithme de Frobenius. . . . . . . . . . . . . . . . . . 2.16 Algorithme de Berlekamp-Massey . . . . . . . . . . . . 3.1 Programme d’évaluation du déterminant et de la LU -décomposition d’une matrice carrée d’ordre 4 . . . . . . . 3.2 Circuit de l’algorithme du pivot de Gauss simplifié . . . 3.3 Programme d’évaluation du déterminant et de la LU -décomposition de la matrice carrée I3 + zF . . . . . . . . 3.4 Programme d’évaluation du déterminant d’une matrice carrée après élimination des divisions à la Strassen . . . . . . . . . . . . . . . . . . . 60 62 64 68 73 76 83 85 89 91 92 95 96 99 101 109 . 113 . 117 . 123 . 124 356 Liste des algorithmes 5.1 5.2 Calcul Parallèle des Préfixes . . . . . . . . . . . . . . . . 164 Exemples de circuits Pk (n) (k ∈ {0, 1}) . . . . . . . . . . 169 6.1 Produit de deux polynômes à la Karatsuba . . . . . . . . 173 6.2 Transformation de Fourier Discrète . . . . . . . . . . . . . 178 7.1 Multiplication par blocs, à la Strassen-Winograd . . . . . 189 7.2 Produit à la Strassen de deux matrices carrées d’ordre 2 . 192 8.1 LUP -décomposition à la Bunch & Hopcroft . . . . . . . . 232 8.2 Algorithme de Kaltofen-Wiedemann . . . . . . . . . . . . 249 9.1 Algorithme de Csanky . . . . . . . . . . . . . . . . . . . . 256 9.2 Algorithme de Preparata & Sarwate . . . . . . . . . . . . 262 Liste des figures 5.1 5.2 5.3 5.4 Construction récursive des circuits binaires équilibrés Schéma de la construction récursive des circuits Pk (n) Construction récursive des circuits P0 (n) . . . . . . . Construction récursive des circuits P1 (n) . . . . . . . . . . . . . . . 163 166 167 168 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 Produit matriciel à trou de Bini . . . . . . . . . . . Produit matriciel plein . . . . . . . . . . . . . . . . Numérotation par blocs . . . . . . . . . . . . . . . Bini itéré une fois . . . . . . . . . . . . . . . . . . . Bini itéré deux fois . . . . . . . . . . . . . . . . . . Produit à trous extrait de (( Bini itéré deux fois )) . Un exemple arbitraire de produit matriciel à trous L’exemple précédent itéré une fois . . . . . . . . . Somme directe de deux produits matriciels . . . . . Somme directe itérée . . . . . . . . . . . . . . . . . Somme directe itérée, variante . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210 211 213 216 216 217 219 220 222 225 226 . . . . . . . . . . . . . . . . . . . . . . 10.1 Calcul de Uν . . . . . . . . . . . . . . . . . . . . . . . . . 276 10.2 Calcul de Vν . . . . . . . . . . . . . . . . . . . . . . . . . 277 10.3 Calcul des produits partiels . . . . . . . . . . . . . . . . . 281 12.1 12.2 12.3 12.4 12.5 12.6 L’arbre de Horner . . . . . . . Parallélisation d’une expression, Parallélisation d’une expression, Parallélisation d’une expression, L’arbre de Horner parallélisé . Une expression p-universelle . . . . 1 2 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 310 311 311 312 320 Bibliographie [AHU] Aho A.V. & Hopcroft J. & Ulmann J. The Design and Analysis of Computer Algorithms, Addison Wesley, Reading, MA, 1974. 62, 171 [BDG] Balcázar J. L., Dı́az J. & Gabarró J. Structural complexity. I. Second edition. Texts in Theoretical Computer Science. Springer, (1995). v, 131, 135, 324, 337 [Bha] Bhaskara Rao K. The Theory of Generalized Inverses over a Commutative Ring. Taylor & Francis Londres, 2002. 48 [BP] Bini D. & Pan V. Polynomial and Matrix Computations, Vol. 1, Fundamental Algorithms, Birkhäuser, 1994. v, 40, 62, 184, 253, 259 [Bur] Bürgisser P. Completeness and Reduction in Algebraic Complexity Theory, Springer, 2000. v, 271, 272, 303, 326, 331, 333, 340, 342 [BCS] Bürgisser P., Clausen M. & Shokrollahi M. Algebraic Complexity Theory, Springer, 1997. v, 151, 187, 237, 303, 309 [Cia] Ciarlet P. Introduction à l’analyse numérique matricielle et à l’optimisation, Dunod, 1998. 30, 41 [Coh] Cohen H. A course in computational algebraic number theory, Graduate Texts in Maths, vol. 138, Springer, 1993. [CCS] Cohen A., Cuypers H., Sterk H. (eds) Some tapas of computer algebra, Algorithms and Computation in Mathematics, vol. 4, Springer, 1999. 365 [CT] Cosnard M. & Trystram D. Algorithmes et architectures parallèles, InterEditions, Paris, 1993. 152, 153, 154 [Dur] Durand E. Solutions numériques des équations algébriques. Tome II : Systèmes de plusieurs équations, Valeurs propres des matrices. Masson, Paris, 1961. 66 360 Bibliographie [FF] Faddeev D.K. & Faddeeva V.N. Computational methods of linear algebra , W.H. Freeman & Co., San Francisco, 1963. 13, 83, 90, 272 [FS] Faddeev D. & Sominskii I. Collected Problems in Higher Algebra, 1949, Problem no 979. 84 [GR] Gabriel P. & Roiter A. Representations of finite-dimensional algebras, Springer, 1997. 55 [GG] von zur Gathen J. & Gerhard J. Modern Computer Algebra, Cambridge University Press, 1999. v, 33, 108, 253 [Gan] Gantmacher F. Théorie des Matrices, Tome 1, (Théorie Générale), Dunod, Paris, 1966. v, 4, 20, 289 [Gas] Gastinel N. Analyse numérique réelle, Hermann, Paris, 1966. ii, 13, 90, 272 [Gob] Goblot R. Algèbre commutative, Masson, Paris. 2ème édition, 2002. 20 [GL] Golub G. & van Loan Ch. Matrix Computations, J. Hopkins Univ. Press, Baltimore and London. 3ème édition, 1996. 30, 41 [GKW] Grabmeier J., Kaltofen E. & Weispfenning V. (Eds) Computer Algebra Handbook : Foundations, Applications, Systems. Springer, 2003. v [Jac] Jacobson N. Lectures in abstract algebra, I. Basic concepts, D. Van Nostrand & Co., Inc., Toronto, 1951. Réédition Springer G.T.M. no 30, 1975. 1 [KKo] Ker I. Ko Complexity theory of real functions, Birhaüser (1991). 148 [Knu] Knuth D. The art of computer programming, vol. 2 : Seminumerical algorithms, Second Edition, Addison Wesley Publishing Co, 1981. i, v, 171, 186, 325 [Kou] Koulikov L. Algèbre et Théorie des Nombres, Mir, Moscou, 1982. [LT] Lancaster P. & Tismenetsky M. The theory of matrices, Second Edition, Academic Press, 1984. v, 41, 48 [Min] Minc H. Permanents, Encyclopedia of Mathematics and its Applications, Vol 6, Addison-Wesley, Reading MA, 1978. [MRR] Mines R., Richman F. & Ruitenburg W. A Course in Constructive Algebra, Universitext, Springer, 1988. 20 Bibliographie 361 [Pan] Pan V. How to multiply matrices faster, Lecture Notes in Computer Science no 179, Springer Verlag, 1984. i [Rob] Robert Y. The impact of vector and parallel architectures on the Gaussian elimination algorithm, Manchester Univ. Press, Halsted Press, John Wiley & Sons, New-York Brisbane Toronto, 1990. [Sav] Savage J. The Complexity of Computing, Robert E. Krieger Pub. Comp., Malabar, Florida, 1987. 325 [Sch] Schrijver A. Theory of integer and linear programming, John Wiley, New-York, 1985. 51, 136 [Ser] Serre J.-P. Cours d’arithmétique, PUF, Paris, 1970. 182 [Ste] Stern J. Fondements mathématiques de l’informatique. Mc Graw-Hill, Paris, 1990. v, 131, 132, 135 [Tur] Turing A., Girard J.-Y. La machine de Turing, Le Seuil. Points Sciences, Paris, 1995. 131 [Weg] Wegener I. The Complexity of Boolean Functions, WileyTeubner Series in Computer Science, Stuttgart, 1987. 321, 324, 328 Articles [1] Abdeljaoued J. Algorithmes Rapides pour le Calcul du Polynôme Caractéristique, Thèse de l’Université de FrancheComté Besançon, 1997. 273 [2] Abdeljaoued J. Berkowitz Algorithm, Maple and computing the characteristic polynomial in an arbitrary commutative ring, Computer Algebra MapleTech, 4/3, Birkhauser Boston 1997. [3] Abdeljaoued J. & Malaschonok G. Efficient algorithms for Computing the characteristic Polynomial in a Domain, Journal of Pure and Applied Algebra, 156, 2001, pp. 127–145. 81 [4] Bareiss E. Sylvester’s Identity and Multistep Integer-Preserving Gaussian Elimination, Math. Comput., 22, 1968, pp. 565– 578. 66 362 Bibliographie [5] Baur W. & Strassen V. The complexity of partial derivatives, Theoretical Computer Science, 22, 1983, pp. 317–330. 126, 281 [6] Berkowitz S. On computing the determinant in small parallel time using a small number of processors, Information Processing Letters, 18, 1984, pp. 147–150. ii, 90, 272, 274, 278 [7] Bini D. Relation between exact and approximate bilinear algorithms. Applications, Calcolo, 17, 1980, pp. 87–97. i [8] Bini D., Capovani M., Lotti G. & Romani F. O(n2.7799 ) complexity of matrix multiplication, Inf. Proc. Letters, 8, 1979, pp. 234–235. i [9] Borodin A., von zur Gathen J. & Hopcroft J. Parallel matrix and GCD computations, Information & Control, 52, 1982, pp. 241–256. 272 [10] Brent R. The parallel evaluation of general arithmetic expressions, J. Assoc. Comp. Mach., 21, 1974, pp. 201–206. 156, 309 [11] Bunch J. & Hopcroft J. Triangular factorization and inversion by fast matrix multiplication, Math. Comput., 28/125, 1974, pp. 231–236. 231 [12] Bürgisser P. On the structure of Valiant’s complexity classes, Discr. Math. Theoret. Comp. Sci., 3, 1999, pp. 73–94. 319, 320 [13] Cantor D. & Kaltofen E. On fast multiplication of polynomials over arbitrary rings, Acta Informatica, 28/7, 1991, pp. 693–701. 125, 171, 180 [14] Chandra A. Maximal parallelism in matrix multiplication, Report RC – 6193, I.B.M. Watson Research Center, Yorktown Heights, N.Y., 1976. i [15] Chemla K. Résonances entre démonstration et procédure. Remarques sur le commentaire de Liu Hui (3ème siècle) aux Neuf Chapitres sur les Procédures Mathématiques (1er siècle), Extrême-Orient, Extrême-Occident, 14, 1992, pp. 91–129. 51 [16] Équipe de recherche (( Histoire des sciences et de la philosophie arabes et médiévales )) Les problèmes comme champ d’interprétation des algorithmes dans Les neuf chapitres sur les procédures mathématiques et leurs commentaires. De la résolution des systèmes d’équations linéaires, Oriens-Occidens, 3, 2000, pp. 189–234. 51 Bibliographie 363 [17] Chistov A. Fast parallel calculation of the rank of matrices over a field of arbitrary characteristic, Proc. FCT ’85, Springer Lecture Notes in Computer Science no 199, 1985, pp. 147–150. 93 [18] Coppersmith D. & Winograd S. On the asymptotic complexity of matrix multiplication, SIAM J. Comput., 11/3, 1982, pp. 472–492. i, 269 [19] Coppersmith D. & Winograd S. Matrix multiplication via arithmetic progressions, Proc. 19th Ann. ACM Symp. on the Theory of Computing, 1987, pp. 1–6. i, 187, 268 [20] Coppersmith D. & Winograd S. Matrix multiplication via arithmetic progressions, Proc. J. of Symbolic Computation, 9, 1990, pp. 251–280. 187 [21] Cook S. The complexity of theorem proving procedures, Proc. 3rd Ann. ACM Symp. on the Theory of Computing, 1971, pp. 151–158. 135, 138 [22] Csanky L. Fast parallel inversion algorithms, SIAM J. Comput., 5/4, 1976, pp. 618–623. 83, 255 [23] Dantzig G. Maximization of a linear function of variables subject to linear inequalities, in : Activity Analysis of Production and Allocation (Koopmans T. ed.) Wiley New-York, 1951, pp. 359–373. 136 [24] Dı́az-Toca G., Gonzalez Vega L. & Lombardi H. Generalizing Cramer’s Rule : Solving uniformly linear systems of equations, SIAM Journal on Matrix Analysis and Applications. 27 no 3 (2005), 621–637. 34 [25] Dı́az-Toca G., Gonzalez Vega L., Lombardi H. & Quitté C. Modules projectifs de type fini, applications linéaires croisées et inverses généralisés, Journal of Algebra. 303 2 (2006), 450–475. 49 [26] Dodgson C. Condensation of determinants, being a new and brief method for computing their arithmetic values, Proc. Royal Soc. Lond., 15, 1866, pp. 150-155. 66 [27] Dornstetter J. On the equivalence between Berlekamp’s and Euclid’s algorihms, IEEE Trans. Inform. Theory, 33/3, 1987, pp. 428–431. 108, 246 364 Bibliographie [28] Della Dora J., Dicrescenzo C. & Duval D. About a new method for computing in algebraic number fields, Eurocal ’85, vol 2, Springer Lecture Notes in Computer Science 204, 1985, pp. 289–290. 287 [29] Eberly W. Very fast parallel matrix and polynomial arithmetic, Technical Report # 178/85, PhD Thesis, University of Toronto, Canada, 1985. 273 [30] Fich F., von zur Gathen J. & Rackoff C. Complete families of polynomials, Manuscript, 1986. 319 [31] Frame J.S. A simple recurrent formula for inverting a matrix, (abstract) Bull. Amer. Math. Soc., 55, 1949, p. 1045. 84 [32] Galil N. & Pan V. Parallel evaluation of the determinant and of the inverse of a matrix, Information Processing Letters, 30, 1989, pp. 41–45. 83, 255, 266 [33] Gastinel N. Sur le calcul de produits de matrices, Num. Math., 17, 1971, pp. 222–229. 199 [34] von zur Gathen J. Parallel arithmetic computations : a survey, in Proc. 12th. Internat. Symp. on Mathematical Foundations of Computer Science, Lecture Notes in Computer Science, no 233, Springer, Berlin, 1986, pp. 93–113. 151 [35] von zur Gathen J. Feasible Arithmetic Computations : Valiant’s Hypothesis, Journal of Symbolic Computation, 4, 1987, pp. 137–172. 303 [36] von zur Gathen J. Parallel Linear Algebra, in Synthesis of parallel algorithms (J. H. Reif Editor), Morgan Kaufmann publishers, San Mateo, Californie, 1993, pp. 573–617. 152, 153 [37] Giesbrecht, M. Fast algorithms for rational forms of integer matrices, in International Symposium on Symbolic and Algebraic Computation, Oxford, UK, ACM Press, 1994, pp. 305– 317. 245 [38] Giesbrecht, M. Nearly optimal algorithms for canonical matrix forms, SIAM Journal on Computing, 24/5, 1995, pp. 948– 969. 245 [39] Giusti M. & Heintz J. La détermination des points isolés et de la dimension d’une variété algébrique peut se faire en temps polynomial, in Computational Algebraic Geometry & Commutative Algebra, eds : Eisenbud, Robbiano. Cambridge University Press, 1993, pp. 216–256. 144 Bibliographie 365 [40] Giusti M., Heintz J, Morais J.-E., Morgenstern, J. & Pardo, L.-M. Straight-line programs in geometric elimination theory, J. Pure Appl. Algebra, 124/1-3, 1998, 1, pp. 101–146. 144 [41] Gonzalez Vega L., Lombardi H., Recio T. & Roy M.F. Spécialisation de la suite de Sturm et sous-résultants, Informatique Théorique et Applications (R.A.I.R.O.), 24, 1990, pp. 561–588. 288 [42] González-Vega L., Rouillier F., Roy M.-F. & Trujillo G. Symbolic Recipes for Real Solutions, pp. 121-167 dans [CCS]. 288 [43] Håstad J. Tensor rank is N P-complete, in Automata, Languages and Programming Proc. of the 16th International Colloquium, Springer Lecture Notes in Computer Science, 372, 1989, pp. 451–460. 200 [44] Heintz J. & Sieveking M. Lower bounds for polynomials with algebraic coefficients, Theoretical Computer Science 11, 1980, pp. 321–330. 315 [45] Hoover J. Feasible real functions and arithmetic circuits, SIAM J. Comput., 19/1, 1990, pp. 182–204. 148 [46] Hopcroft J. & Musinski Duality applied to the complexity of matrix multiplication and other bilinear forms, SIAM J. Comp., 2, 1973, pp. 159–173. 202 [47] Hyafil L. On the parallel evaluation of multivariate polynomials, SIAM J. Comput., 8, 1979, pp. 120–123. 312 [48] Kakeya R. On fundamental systems of symmetric functions, Jap. J. of Math., 2, 1927, pp. 69–80. 258 [49] Kaltofen E. On computing determinants of matrices without divisions, I.S.S.A.C.’92, ACM, 1992, pp. 342–349. 246, 248 [50] Kaltofen E. & Pan V. Processor efficient parallel solution of linear systems over an abstract field, in Proc. 3rd Ann. Parallel Algo. Architectures, ACM Press (July 1991), pp. 180–191. 155, 253 [51] Kaltofen E. & Pan V. Processor efficient parallel solution of linear systems II : the general case, in Proc. 33rd IEEE Symp. Foundations Of Computer Science, Pittsburg, USA, 1992, pp. 714–723. 155 366 Bibliographie [52] Kaltofen E. & Singer M. Size efficient parallel algebraic circuits for partial derivatives, in Proc. IV Intern. Conf. on Computer Algebra in Physical Research. World Scientific, Singapour, 1991, pp. 113–145. 281 [53] Kaltofen E. & Villard G. On the complexity of computing determinants, In Proc. Fifth Asian Symposium on Computer Mathematics (ASCM 2001) pp. 13–27. 254 [54] Kaltofen E. & Villard G. Computing the sign or the value of the determinant of an integer matrix, a complexity survey, à paraı̂tre dans Computational Applied Math. Special issue on Congrès International Algèbre Linéaire et Arithmétique : Calcul Numérique, Symbolique et Parallèle, Rabat, Maroc, May 2001. 17 pages. 254 [55] Karmakar N. A new polynomial time algorithm for linear programming, Combinatorica, 4/4, 1984, pp. 373-395. 136 [56] Karp R., Lipton R. Turing Machines that take advice, Logic and arithmetic, int. Symp., Zurich 1980, Monogr. L’Enseign. Math. 30, 1982, pp. 255–273,. 324 [57] Karp R. & Ramachandran V. Parallel algorithms for shared-memory machines, Handbook of Theoretical Computer Science, Edited by J. van Leeuwen, Elsevier Science Publishers B.V., 1990, pp. 871–941. 152, 153 [58] Keller-Gehrig W. Fast algorithms for the characteristic polynomial, Theoretical Computer Science, 36, 1985, pp. 309–317. 237, 243 [59] Ker-I. KO & Friedman H. Computational complexity of real functions, Theoretical Computer Science, 20, 1982, pp. 323– 352. 148 [60] Khachiyan L. Polynomial algorithms in linear programming, Soviet Math. Doklady, 20, 1979, pp. 191–194. 136 [61] Khachiyan L. A polynomial algorithm in linear programming, Computational Mathematics and Mathematical Physics, 20, 1980, pp. 53–72. 136 [62] Kruskal C., Rudolph L. & Snir M. A complexity theory of efficient parallel algorithms, Theoretical Computer Science, 71, 1990, pp. 95–132. 155 Bibliographie 367 [63] Labhalla S., Lombardi H. & Moutai E. Espaces métriques rationnellement présentés et complexité, le cas de l’espace des fonctions réelles uniformément continues sur un intervalle compact, Theoretical Computer Science, 250/1-2, 2001, pp. 265– 332. 148 [64] Ladner R. & Fischer M. Parallel Prefix Computation, Journal of the ACM, 27/4, 1980, pp. 831–838. 159, 165, 170, 280 [65] Le Verrier U. Sur les variations séculaires des éléments elliptiques des sept planètes principales : Mercure, Vénus, La Terre, Mars, Jupiter, Saturne et Uranus, J. Math. Pures Appli., 4, 1840, pp. 220–254. 82 [66] Lickteig T., Roy M.-F. Sylvester-Habicht sequences and fast Cauchy index computation, Journal of Symbolic Computation, 31, 2001, pp. 315–341. 253 [67] Lombardi H., Roy M.-F., Safey El Din M. New structure theorems for subresultants, Journal of Symbolic Computation 29/3-4, 2000, pp. 663–690. 288 [68] R. Loos, Generalized polynomial remainder sequences, in : Computer algebra, symbolic and algebraic computation, Springer-Verlag, Berlin, 1982. 288 [69] Matera G. & Turull Torres J.-M. The space complexity of elimination : upper bounds, Foundations of computational mathematics (Rio de Janeiro, 1997), pp. 267–276, Springer, Berlin. 282 [70] Miller G., Ramachandran V., Kaltofen E. Efficient Parallel Evaluation of Straight-Line Code and Arithmetic Circuits, SIAM J. Comput. 17/4, 1988, pp. 687–695. [71] Moenck Fast computation of GCDs, Proc. STOC’73, pp. 142– 151. 253 [72] Morgenstern J. How to compute fast a function and all its derivatives (a variation on the theorem of Baur-Strassen), SIGACT News, 16/4, 1985, pp. 60–62. 126 [73] Mulmuley K. A fast parallel algorithm to compute the rank of a matrix over an arbitrary field, Combinatorica, 7/1, 1987, pp. 101–104. 34, 47 [74] Ostrowski A. On two problems in abstract algebra connected with Horner’s rule, Studies in Math. and Mec. presented to Richard von Mises, Academic Press N.Y, 1954, pp. 40–48. 368 Bibliographie [75] Pan V. Computation schemes for a product of matrices and for the inverse matrix, Uspehi Mat. Nauk, 5/167, 1972, pp. 249– 250. 202 [76] Prasad K., Bapat R. The generalized Moore-Penrose inverse. Linear Algebra Appl. 165, 1992, 59–69. 49 [77] Preparata F. & Sarwate D. An improved parallel processor bound in fast matrix inversion, Inf. Proc. Letters, 7/3, 1978, pp. 148–150. 83, 255, 260 [78] Revol N. Complexité de l’évaluation parallèle de circuits arithmétiques, Thèse de l’Institut National Polytechnique de Grenoble, Août 1994. [79] Samuelson P. A method for determining explicitely the characteristic equation, Ann. Math. Statist., 13, 1942, pp. 424–429. ii, 13, 90, 272 [80] Sasaki T. & Murao H. Efficient Gaussian elimination method for symbolic determinants and linear systems, ACM Trans. Math. Software, 8/4, 1982, pp. 277–289. 70 [81] Schönhage R. Fast parallel computation of characteristic polynomials by Le Verrier’s power sum method adapted to fields of finite characteristic, Proc. 20th ICALP, Lecture Notes in Computer Science no 700, Springer, 1993, pp. 410-417. 258, 259 [82] Schönhage R. Partial and total matrix multiplication, Siam J. Comp., 10, 1981, pp. 434–445. i, 208, 215, 221 [83] Skyum S. & Valiant L. A complexity theory based on Boolean algebra, J. Assoc. Comp. Mach., 32/2, 1985, pp. 484–502. 321 [84] Souriau J.-M. Une méthode pour la décomposition spectrale et l’inversion des matrices, C.R. Acad. Sciences, 227, 1948, pp. 1010–1011. 83, 84 [85] Spira P. On Time hardware Complexity Tradeoffs for Boolean Functions, Proceedings of Fouth Hawaii International Symposium on System Sciences, 1971, pp. 525–527. 325 [86] Strassen V. Gaussian elimination is not optimal, Numerische Mathematik 13, 1969, pp. 354–356. i, 186, 191 [87] Strassen V. Vermeidung von divisionen, Crelle J. Reine Angew. Math., 264, 1973, pp. 184–202. 120, 199 [88] Strassen V. Polynomials with rational coefficients which are hard to compute, Siam J. Comp., 3, 1974, pp. 128–149. 315 Bibliographie 369 [89] Strassen V. The work of Valiant, Proc. International Congress of Mathematicians, Berkeley, USA, 1986. [90] Strassen V. Relative bilinear complexity and matrix multiplication, Crelle J. Reine Angew. Math., 375/376, 1987, pp. 406– 443. i, 187, 199 [91] Strassen V. Algebraic complexity theory, in Handbook of Theoretical Computer Science (ed. J. van Leeuwen) Vol A. Chap. 11, Elsevier Science Publishers B.V., 1990, pp. 634–672. 199 [92] Valiant L. Completeness classes in algebra, in : Proc. 11th ACM STOC, 1979, pp. 249–261. 303 [93] Valiant L. The complexity of computing the permanent, Theoretical Computer Science 8, 1979, pp. 189–201. 141, 303 [94] Valiant L. Reducibility by algebraic projections, in : Logic and Algorithmic, Symposium in honour of Ernst Specker, Enseign. Math 30, 1982, pp. 365–380. 303 [95] Valiant L., Skyum S., Berkowitz S. & Rackoff C. Fast parallel computation of polynomials using few processors, SIAM J. Comput., 12/4, 1983, pp. 641–644. 271, 312 [96] Wiedemann D. Solving sparse linear equations over finite fields, I.E.E.E. Trans. Inf. Theory 32, 1986, pp. 54–62. 109, 110 [97] Winograd S. On the multiplication of 2 by 2 matrices, Linear Algebra Appl., 4, 1971, pp. 381–388. 186 Index des termes affectation sans scalaires, 116 A – module, 5 anneau des développements limités à l’ordre n, 94, 121 anneau des polynômes non commutatifs, 199 application bilinéaire, 197 booléenne, 322 quadratique, 205 approximation d’ordre q d’une application bilinéaire, 211 centre d’élimination des divisions, 122 Chistov algorithme de, 94 circuit arithmétique, 116 avec divisions, 116 homogène, 118 sans division, 116 booléen, 118, 322 code d’un k-uple d’entiers, 139 coefficient de Gram d’une matrice, 37 généralisé, 45 comatrice, 2 compagnon matrice, 16 complexité arithmétique, 142 arithmétique d’une famille de circuits , 142 bilinéaire, 199 binaire, 143 binaire d’une famille de circuits , 144 multiplicative, 205 conjecture addititve, 224 Cramer, 7 identifés de, 7 Berkowitz algorithme de, 91 Berlekamp/Massey algorithme de, 108 bien parallélisé algorithme, 147 bilinéaire application, 197 calcul, 199 complexité, 199 binaire complexité, 144 calcul bilinéaire, 199 bilinéaire approximatif, 211 quadratique, 205 Cayley-Hamilton théorème de, 12 degré de parallélisme, 160 description 371 372 d’un polynôme, 308 d’une fonction booléenne, 323 instantanée, 139 Dodgson-Jordan-Bareiss formule de, 67 élémentaire matrice, 54 transformation, 54 élimination des divisions (Strassen), 122 éliminer les divisions à la Strassen dans un circuit arithmétique, 122 entier bâton, 139 essentielle multiplication, 116 exposant acceptable pour la multiplication des matrices carrées , 204 de la multiplication des matrices carrées , 204 expression arithmétique, 304 booléenne, 322 famille uniforme de circuits arithmétiques, 149 de circuits booléens, 150 fonction booléenne, 322 forme algébrique déployée d’une famille de fonctions booléennes, 334 d’une fonction booléenne, 333 forme normale conjonctive, 322 disjonctive, 322 formule de Binet-Cauchy, 4 Index des termes de Samuelson, 13 Frobenius algorithme de, 100 matrice de, 100 Gauss méthode du pivot, 53 Gram coefficient de, 37 coefficient généralisé de, 45 polynôme de, 45 Hadamard inégalité de, 31 Hankel matrice de, 23 Hessenberg algorithme de, 76 Horner expression de, 305 parallélisation de l’expression, 312 schéma de, 12 inverse de Moore-Penrose en rang r, 38 inverse Moore-Penrose généralisé en rang r, 47 Jordan-Bareiss méthode de, 65 méthode modifiée , 70 Kakeya critère de, 258 Krylov sous-espace de, 17 Le Verrier algorithme de, 83 hypothèses de l’algorithme de, 89 Index des termes littéral, 322 longueur d’un programme d’évaluation, 115 multiplicative, 116 stricte, 116 LU -décomposition, 56 LUP -décomposition , 63 matrice adjointe, 2 caractéristique, 11 caractéristique adjointe, 11 compagnon d’un polynôme unitaire, 16 de Frobenius, 100 de Hankel, 23 de Toeplitz, 23 élémentaire , 54 fortement régulière, 5 régulière, 5 rang d’une, 5 singulière, 5 structurée, 23 trace d’une, 2 triangulaire, 53 unimodulaire, 55 unitriangulaire, 54 mineur connexe, 71 d’une matrice, 2 principal, 3 module libre, 6 sur un anneau, 5 Moore-Penrose inverse de, 38 multiplicité algébrique, 14 géométrique, 86 373 Newton relation de, 28 somme de, 26 non déterministe, 137 N P - complet , 138 p-bornée, 307, 323, 326 famille d’applications booléennes, 326 famille d’expressions arithmétiques, 307 famille d’expressions booléennes, 323 famille de circuits arithmétiques, 307 famille de circuits booléens, 323 famille de fonctions booléennes, 323 famille de polynômes, 307 p-calculable, 307, 323 famille de fonctions booléennes, 323 famille de polynômes, 307 p-descriptible, 308, 323 en expressions, 308, 324 p-évaluable, 307 p-exprimable, 307, 323 famille de fonctions booléennes, 323 famille de polynômes, 307 p-famille d’applications booléennes, 326 de fonctions booléennes, 323 de polynômes, 307 p-projection, 316 paramètre d’entrée d’un programme d’évaluation, 115 P̃LUP-décomposition , 63 374 polylogarithmique, 147 polynôme caractéristique, 11 cyclotomique, 181 générateur d’une suite, 21 générateur minimal d’une suite récurrente linéaire, 22 minimal, 17 minimal d’une suite récurrente linéaire, 22 réciproque, 95 polynôme de Gram (généralisé), 45 Preparata&Sarwate algorithme de, 89 produit matriciel à trous, 209 profondeur d’un programme d’évaluation, 115 d’une expression booléenne, 322 multiplicative, 116 stricte, 116 programme d’évaluation arithmétique, 114 booléen, 115 largeur d’un, 115 longueur d’un, 115 paramètre d’entrée d’un, 115 profondeur d’un, 115 taille d’un, 115 variable d’affectation d’un, 114 projection, 316 d’une expression, 316 qp-calculable, 307 qp-évaluable, 307 qp-exprimable, 307 qp-projection, 316 quadratique Index des termes application, 205 calcul, 205 quasi-polynomial, 306 racine de l’unité primitive n - ème, 175 principale n - ème, 175 rang marginal, 211 rang tensoriel d’une application bilinéaire, 199 marginal, 211 relation de Newton, 28 représentation creuse, 115 dense, 115 par expressions, 305 Samuelson, 13 Schönhage inégalité asymptotique, 225 variante de la méthode de Csanky, 258 simulation en évaluation, 330 somme de Newton, 26 somme directe (de deux applications bilinéaires), 221 somme disjointe (de deux applications bilinéaires), 221 Souriau-Faddeev-Frame algorithme de, 85 sous-matrice principale, 3 principale dominante, 3 suite récurrente linéaire, 21 Sylvester identités de, 9 système fondamental de polynômes symétriques, 27 Index des termes de fractions rationnelles symétriques, 27 taille d’un programme d’évaluation, 115 d’une expression artithmétique, 304 d’une expression booléenne, 322 tenseur coordonnées d’un, 199 élémentaire, 198 Théorème chinois, 32 Toeplitz matrice de, 23 transformation élémentaire, 54 unimodulaire, 55 triangulaire matrice, 53 unimodulaire transformation élémentaire, 55 unitriangulaire matrice, 54 valeur propre, 14 multiplicité algébrique d’une, 14 multiplicité géométrique d’une, 86 Wiedemann algorithme de, 109 375
0math.AC
1 Coded Caching Schemes with Reduced Subpacketization from Linear Block Codes arXiv:1706.00101v3 [cs.IT] 19 Feb 2018 Li Tang and Aditya Ramamoorthy Department of Electrical and Computer Engineering Iowa State University Ames, IA 50010 Emails:{litang, adityar}@iastate.edu Abstract—Coded caching is a technique that generalizes conventional caching and promises significant reductions in traffic over caching networks. However, the basic coded caching scheme requires that each file hosted in the server be partitioned into a large number (i.e., the subpacketization level) of non-overlapping subfiles. From a practical perspective, this is problematic as it means that prior schemes are only applicable when the size of the files is extremely large. In this work, we propose coded caching schemes based on combinatorial structures called resolvable designs. These structures can be obtained in a natural manner from linear block codes whose generator matrices possess certain rank properties. We obtain several schemes with subpacketization levels substantially lower than the basic scheme at the cost of an increased rate. Depending on the system parameters, our approach allows us to operate at various points on the subpacketization level vs. rate tradeoff. Index Terms—coded caching, resolvable designs, cyclic codes, subpacketization level I. I NTRODUCTION Caching is a popular technique for facilitating large scale content delivery over the Internet. Traditionally, caching operates by storing popular content closer to the end users. Typically, the cache serves an end user’s file request partially (or sometimes entirely) with the remainder of the content coming from the main server. Prior work in this area [1] demonstrates that allowing coding in the cache and coded transmission from the server (referred to as coded caching) to the end users can allow for significant reductions in the number of bits transmitted from the server to the end users. This is an exciting development given the central role of caching in supporting a significant fraction of Internet traffic. In particular, reference [1] considers a scenario where a single server contains N files. The server connects to K users over a shared link and each user has a cache that allows it to store M/N fraction of all the files in the server. Coded caching consists of two distinct phases: a placement phase and a delivery phase. In the placement phase, the caches of the users are populated. This phase does not depend on the user demands which are assumed to be arbitrary. In the delivery This work was supported in part by the National Science Foundation by grants CCF-1718470, CCF-1320416 and CCF-1149860. This paper was presented in part at the 2016 IEEE Workshop on Network Coding and Applications (NetCod) and at the 2017 IEEE International Symposium on Information Theory (ISIT). phase, the server sends a set of coded signals that are broadcast to each user such that each user’s demand is satisfied. The original work of [1] considered the case of centralized coded caching, where the server decides the content that needs to be placed in the caches of the different users. Subsequent work considered the decentralized case where the users populate their caches by randomly choosing parts of each file while respecting the cache size constraint. Recently, there have been several papers that have examined various facets of coded caching. These include tightening known bounds on the coded caching rate [2], [3], considering issues with respect to decentralized caching [4], explicitly considering popularities of files [5], [6], network topology issues [7], [8] and synchronization issues [9], [10]. In this work, we examine another important aspect of the coded caching problem that is closely tied to its adoption in practice. It is important to note that the huge gains of coded K caching require each file to be partitioned into Fs ≈ KM N non-overlapping subfiles of equal size; Fs is referred to as the subpacketization level. It can be observed that for a fixed cache size M N , Fs grows exponentially with K. This can be problematic in practical implementations. For instance, suppose  64 that K = 64, with M = 0.25 so that F = ≈ 4.8 × 1014 s N 16 with a rate R ≈ 2.82. In this case, it is evident that at the bare minimum, the size of each file has to be at least 480 terabits for leveraging the gains in [1]. It is even worse in practice. The atomic unit of storage on present day hard drives is a sector of size 512 bytes and the trend in the disk drive industry is to move this to 4096 bytes [11]. As a result, the minimum size of each file needs to be much higher than 480 terabits. Therefore, the scheme in [1] is not practical even for moderate values of K. Furthermore, even for smaller values of K, schemes with low subpacketization levels are desirable. This is because any practical scheme will require each of the subfiles to have some header information that allows for decoding at the end users. When there are a large number of subfiles, the header overhead may be non-negligible. For these same parameters (K = 64, M/N = 0.25) our proposed approach in this work allows us obtain, e.g., the following operating points: (i) Fs ≈ 1.07×109 and R = 3, (ii) Fs ≈ 1.6×104 and R = 6, (iii) Fs = 64 and R = 12. For the first point, it is evident that the subpacketization level drops by over five orders of magnitude with only a very small increase in the rate. Point (ii) and (iii) show proposed scheme allows us to operate at various points on the tradeoff between subpacketization level and rate. The issue of subpacketization was first considered in the work of [12], [13] in the decentralized coded caching setting. In the centralized case it was considered in the work of [14]. They proposed a low subpacketization scheme based on placement delivery arrays. Reference [15] viewed the problem from a hypergraph perspective and presented several classes of coded caching schemes. The work of [16] has recently shown that there exist coded caching schemes where the subpacketization level grows linearly with the number of users K; however, this result only applies when the number of users is very large. We elaborate on related work in Section II-A. In this work, we propose low subpacketization level schemes for coded caching. Our proposed schemes leverage the properties of combinatorial structures known as resolvable designs and their natural relationship with linear block codes. Our schemes are applicable for a wide variety of parameter ranges and allow the system designer to tune the subpacketization level and the gain of the system with respect to an uncoded system. We note here that designs have also been used to obtain results in distributed data storage [17] and network coding based function computation in recent work [18], [19]. This paper is organized as follows. Section II discusses the background and related work and summarizes the main contributions of our work. Section III outlines our proposed scheme. It includes all the constructions and the essential proofs. A central object of study in our work are matrices that satisfy a property that we call the consecutive column property (CCP). Section IV overviews several constructions of matrices that satisfy this property. Several of the longer and more involved proofs of statements in Sections III and IV appear in the Appendix. In Section V we perform an in-depth comparison our work with existing constructions in the literature. We conclude the paper with a discussion of opportunities for future work in Section VI. columns correspond to the points and blocks respectively. Let i ∈ X and j ∈ A. Then, ( 1 if i ∈ j, N (i, j) = 0 otherwise. It can be observed that the transpose of an incidence matrix also specifies a design. We will refer to this as the transposed design. In this work, we will utilize resolvable designs which are a special class of designs. Definition 3. A parallel class P in a design (X, A) is a subset of disjoint blocks from A whose union is X. A partition of A into several parallel classes is called a resolution, and (X, A) is said to be a resolvable design if A has at least one resolution. For resolvable designs, it follows that each point also appears in the same number of blocks. Example 1. Consider a block design specified as follows. X = {1, 2, 3, 4}, and A = {{1, 2}, {1, 3}, {1, 4}, {2, 3}, {2, 4}, {3, 4}}. Its incidence matrix is given  1 1 1 0 N = 0 1 0 0 below. 1 0 0 1 0 1 1 0 0 1 0 1  0 0 . 1 1 It can be observed that this design is resolvable with the following parallel classes. P1 = {{1, 2}, {3, 4}}, P2 = {{1, 3}, {2, 4}}, and P3 = {{1, 4}, {2, 3}}. In the sequel we let [n] denote the set {1, . . . , n}. We emphasize here that the original scheme of [1] can be viewed as an instance of the trivial design. For example, consider the setting when t = KM/N is an integer. Let X = [K] and A = {B : B ⊂ [K], |B| = t}. In the scheme of [1], the users are associated with X and the subfiles with A. User i ∈ [K] caches subfile Wn,B , n ∈ [N ] for B ∈ A if i ∈ B. The main message of our work is that carefully constructed resolvable designs can be used to obtain coded caching schemes with low subpacketization levels, while retaining much of the rate gains of coded caching. The basic idea is to associate the users with the blocks and the subfiles with the points of the design. The roles of the users and subfiles can also be interchanged by simply working with the transposed design. II. BACKGROUND , R ELATED W ORK AND S UMMARY OF C ONTRIBUTIONS We consider a scenario where the server has N files each of which consist of Fs subfiles. There are K users each equipped with a cache of size M Fs subfiles. The coded caching scheme is specified by means of the placement scheme and an appropriate delivery scheme for each possible demand pattern. In this work, we use combinatorial designs [20] to specify the placement scheme in the coded caching system. Definition 1. A design is a pair (X, A) such that Example 2. Consider the resolvable design from Example 1. The blocks in A correspond to six users U12 , U34 , U13 , U24 , U14 , U23 . Each file is partitioned into Fs = 4 subfiles Wn,1 , Wn,2 , Wn,3 , Wn,4 which correspond to the four points in X. The cache in user UB , denoted ZB is specified as Zij = N (Wn,i , Wn,j )N n=1 . For example, Z12 = (Wn,1 , Wn,2 )n=1 . We note here that the caching scheme is symmetric with respect to the files in the server. Furthermore, each user caches half of each file so that M/N = 1/2. Suppose that in the delivery phase user UB requests file WdB where dB ∈ [N ]. 1) X is a set of elements called points, and 2) A is a collection of nonempty subsets of X called blocks, where each block contains the same number of points. A design is in one-to-one correspondence with an incidence matrix N which is defined as follows. Definition 2. The incidence matrix N of a design (X, A) is a binary matrix of dimension |X| × |A|, where the rows and 2 the rate benefits of coded caching would be lost if Fs did not scale exponentially in K. Following this work, the authors in [14] introduced a technique for designing low subpacketization schemes in the centralized setting which they called placement delivery arrays. In [14], they considered the setting when M/N = 1/q or M/N = 1 − 1/q and demonstrated a scheme where the subpacketization level was exponentially smaller than the original scheme, while the rate was marginally higher. This scheme can be viewed as a special case of our work. We discuss these aspects in more detail in Section V. In [15], the design of coded caching schemes was achieved through the design of hypergraphs with appropriate properties. In particular, for specific problem parameters, they were able to establish the existence of schemes where the subpacketization √ scaled as exp(c K). Reference [21] presented results in this setting by considering strong edge coloring of bipartite graphs. Very recently, [16] showed the existence of coded caching schemes where the subpacketization grows linearly with the number of users, but the coded caching rate grows as O(K δ ) where 0 < δ < 1. Thus, while the rate is not a constant, it does not grow linearly with K either. Both [15] and [16] are interesting results that demonstrate the existence of regimes where the subpacketization scales in a manageable manner. Nevertheless, it is to be noted that these results come with several caveats. For example, the result of [16] is only valid in the regime when K is very large and is unlikely to be of use for practical values of K. The result of [15] has significant restrictions on the number of users, e.g., in their paper, K needs to be of the form na and q t na . These demands can be satisfied as follows. We pick three blocks, one each from parallel classes P1 , P2 , P3 and generate the signals transmitted in the delivery phase as follows. Wd12 ,3 ⊕ Wd13 ,2 ⊕ Wd23 ,1 , (1) Wd12 ,4 ⊕ Wd24 ,1 ⊕ Wd14 ,2 , Wd34 ,1 ⊕ Wd13 ,4 ⊕ Wd14 ,3 , and Wd34 ,2 ⊕ Wd24 ,3 ⊕ Wd23 ,4 . The three terms in the in eq. (1) above correspond to blocks from different parallel classes {1, 2} ∈ P1 , {1, 3} ∈ P2 , {2, 3} ∈ P3 . This equation has the all-but-one structure that was also exploited in [1], i.e., eq. (1) is such that each user caches all but one of the subfiles participating in the equation. Specifically, user U12 contains Wn,1 and Wn,2 for all n ∈ [N ]. Thus, it can decode subfile Wd12 ,3 that it needs. A similar argument applies to users U13 and U23 . It can be verified that the other three equations also have this property. Thus, at the end of the delivery phase, each user obtains its missing subfiles. This scheme corresponds to a subpacketization level of 4 and a rate of 1. In contrast, the scheme of [1] would require a subpacketization level of 63 = 20 with a rate of 0.75. Thus, it is evident that we gain significantly in terms of the subpacketization while sacrificing some rate gains. As shown in Example 2, we can obtain a scheme by associating the users with the blocks and the subfiles with the points. In this work, we demonstrate that this basic idea can be significantly generalized and several schemes with low subpacketization levels that continue to leverage much of the rate benefits of coded caching can be obtained. B. Summary of Contributions In this work, the subpacketization levels we obtain are typically exponentially smaller than the original scheme. However, they still continue to scale exponentially in K, albeit with much smaller exponents. However, our construction has the advantage of being applicable for a large range of problem parameters. Our specific contributions include the following. • We uncover a simple and natural relationship between a (n, k) linear block code and a coded caching scheme. We first show that any linear block code over GF (q) and in some cases Z mod q (where q is not a prime or a prime power) generates a resolvable design. This design in turn specifies a coded caching scheme with K = nq users where the cache fraction M/N = 1/q. A complementary cache fraction point where M/N = 1 − α/nq where α is some integer between 1 and k + 1 can also be obtained. Intermediate points can be obtained by memory sharing between these points. • We consider a class of (n, k) linear block codes whose generator matrices satisfy a specific rank property. In particular, we require collections of consecutive columns to have certain rank properties. For such codes, we are able to identify an efficient delivery phase and determine the precise coded caching rate. We demonstrate that the subpacketization level is at most q k (k + 1) whereas the coded caching gain scales as k + 1 with respect to an uncoded caching scheme. Thus, different choices of k A. Discussion of Related Work Coded caching has been the subject of much investigation in recent work as discussed briefly earlier on. We now overview existing literature on the topic of low subpacketization schemes for coded caching. In the original paper [1], for given problem parameters K (number of users) and M/N (cache fraction), the authors showed that when N ≥ K, the rate equals R= K(1 − M/N ) 1 + KM/N when M is an integer multiple of N/K. Other points are obtained via memory sharing. Thus, in the regime when KM/N is large, the coded caching rate is approximately N/M − 1, which is independent of K. Crucially, though this K requires the subpacketization level Fs ≈ KM/N . It can be observed that for a fixed M/N , Fs grows exponentially with K. This is one of main drawbacks of the original scheme and for reasons outlined in Section I, deploying this solution in practice may be difficult. The subpacketization issue was first discussed in the work of [12], [13] in the context of decentralized caching. Specifically, [13] showed that in the decentralized setting for any subpacketization level Fs such that Fs ≤ exp(KM/N ) the rate would scale linearly in K, i.e., R ≥ cK. Thus, much of 3 • where u = [u0 , · · · , uk−1 ]. Let a∗ be such that ga∗ b 6= 0. Consider the equation X ua gab = ∆b − ua∗ ga∗ b , allow the system designer significant flexibility to choose the appropriate operating point. We discuss several constructions of generator matrices that satisfy the required rank property. We characterize the ranges of alphabet sizes (q) over which these matrices can be constructed. If one has a given subpacketization budget in a specific setting, we are able to find a set of schemes that fit the budget while leveraging the rate gains of coded caching. a6=a∗ where ∆b is fixed. For arbitrary values of ua , a 6= a∗ , this equation has a unique solution for ua∗ , which implies that for any ∆b , |Bb,∆b | = q k−1 and that Pb forms a parallel class.  Remark 1. A k × n generator matrix over GF (q) where q is a prime power can also be considered as a matrix over an extension field GF (q m ) where m is an integer. Thus, one can obtain a resolvable design in this case as well; the corresponding parameters can be calculated in an easy manner. III. P ROPOSED LOW SUBPACKETIZATION LEVEL SCHEME All our constructions of low subpacketization schemes will stem from resolvable designs (cf. Definition 3). Our overall approach is to first show that any (n, k) linear block code over GF (q) can be used to obtain a resolvable block design. The placement scheme obtained from this resolvable design is such that M/N = 1/q. Under certain (mild) conditions on the generator matrix we show that a delivery phase scheme can be designed that allows for a significant rate gain over the uncoded scheme while having a subpacketization level that is significantly lower than [1]. Furthermore, our scheme can be transformed into another scheme that operates at the point M/N = 1 − k+1 nq . Thus, intermediate values of M/N can be obtained via memory sharing. We also discuss situations under which we can operate over modular arithmetic Zq = Z mod q where q is not necessarily a prime or a prime power; this allows us to obtain a larger range of parameters. Remark 2. We can also consider linear block codes over Z mod q where q is not necessarily a prime or a prime power. In this case the conditions under which a resolvable design can be obtained by forming the matrix T are a little more involved. We discuss this in Lemma 4 in the Appendix. Example 3. Consider a (4, 2) linear with generator matrix  1 0 1 G= 0 1 1 A ={{0, 1, 2}, {3, 4, 5}, {6, 7, 8}, {0, 3, 6}, {1, 4, 7}, {2, 5, 8}, (2) {0, 5, 7}, {1, 3, 8}, {2, 4, 6}, {0, 4, 8}, {2, 3, 7}, {1, 5, 6}}. where the 1 × n vector c` represents the `-th codeword of the code. Let X = {0, 1, · · · , q k − 1} be the point set and A be the collection of all subsets Bi,l for 0 ≤ i ≤ n − 1 and 0 ≤ l ≤ q − 1, where It can be observed that A has a resolution (cf. Definition 3) with the following parallel classes. P0 = {{0, 1, 2}, {3, 4, 5}, {6, 7, 8}}, P1 = {{0, 3, 6}, {1, 4, 7}, {2, 5, 8}}, Bi,l = {j : Ti,j = l}. P2 = {{0, 5, 7}, {1, 3, 8}, {2, 4, 6}}, and P3 = {{0, 4, 8}, {2, 3, 7}, {1, 5, 6}}. Using this construction, we can obtain the following result. Lemma 1. The construction procedure above results in a design (X, A) where X = {0, 1, · · · , q k − 1} and |Bi,l | = q k−1 for all 0 ≤ i ≤ n − 1 and 0 ≤ l ≤ q − 1. Furthermore, the design is resolvable with parallel classes given by Pi = {Bi,l : 0 ≤ l ≤ q − 1}, for 0 ≤ i ≤ n − 1. B. A special class of linear block codes We now introduce a special class of linear block codes whose generator matrices satisfy specific rank properties. It turns out that resolvable designs obtained from these codes are especially suited for usage in coded caching. Consider the generator matrix G of a (n, k) linear block code over GF (q). The i-th column of G is denoted by gi . Let z be the least positive integer such that k + 1 divides nz (denoted by k + 1 | nz). We let (t)n denote t mod n. In our construction we will need to consider various collections of k + 1 consecutive columns of G (wraparounds Proof. Let G = [gab ], for 0 ≤ a ≤ k − 1, 0 ≤ b ≤ n − 1, gab ∈ GF (q). Note that for ∆ = [∆0 ∆1 . . . ∆n−1 ] = uG, we have k−1 X constructed as follows.  2 2 2 0 1 2 . 2 0 1 2 1 0 Using T, we generate the resolvable block design (X, A) where the point set is X = {0, 1, 2, 3, 4, 5, 6, 7, 8}. For instance, block B0,0 is obtained by identifying the column indexes of zeros in the first row of T, i.e., B0,0 = {0, 1, 2}. Following this, we obtain Consider a (n, k) linear block code over GF (q). To avoid trivialities we assume that its generator matrix does not have an all-zeros column. We collect its q k codewords and construct a matrix T of size n × q k as follows. ∆b =  1 . 2 Collecting the nine codewords, T is  0 0 0 1 1 1 0 1 2 0 1 2 T= 0 1 2 1 2 0 0 2 1 1 0 2 A. Resolvable Design Construction T = [cT0 , cT1 , · · · , cTqk −1 ], block code over GF (3) ua gab , a=0 4 over the boundaries are allowed). For this purpose, let Ta = {a(k + 1), · · · , a(k + 1) + k} (a is a non-negative integer) and Sa = {(t)n | t ∈ Ta }. Let GSa be the k × (k + 1) submatrix of G specified by the columns in Sa , i.e., g` is a column in GSa if ` ∈ Sa . Next, we define the (k, k + 1)-consecutive column property that is central to the rest of the discussion. Algorithm 1: Placement Scheme Input : Resolvable design (X, A) constructed from a (n, k) linear block code. Let z be the least positive integer such that k + 1 | nz. k 1 Divide each file Wn , for n ∈ [N ] into q z subfiles. Thus, s k Wn = {Wn,t : t ∈ {0, . . . , q − 1} and s ∈ {0, . . . , z − 1}} ; 2 User UB for B ∈ A caches s ZB = {Wn,t : n ∈ [N ], t ∈ B and s ∈ {0, . . . , z − 1}} ; Output: Cache content of user UB denoted ZB for B ∈ A. Definition 4. (k, k+1)-consecutive column property. Consider zn − 1. the submatrices of G specified by GSa for 0 ≤ a ≤ k+1 We say that G satisfies the (k, k + 1)-consecutive column property if all k × k submatrices of each GSa are full rank. Henceforth, we abbreviate the (k, k+1)-consecutive column property as (k, k + 1)-CCP. Parallel Classes Example 4. In Example 3 we have k = 2, n = 4 and hence z = 3. Thus, S0 = {0, 1, 2}, S1 = {3, 0, 1}, S2 = {2, 3, 0} and S3 = {1, 2, 3}. The corresponding generator matrix G satisfies the (k, k + 1) CCP as any two columns of the each of submatrices GSi , i = 0, . . . , 3 are linearly independent over GF (3). P0 0 We note here that one can also define different levels of the consecutive column property. Let Taα = {aα, · · · , aα+α−1}, Saα = {(t)n | t ∈ Taα } and z is the least positive integer such that α|nz. PS0 Definition 5. (k, α)-consecutive column property Consider the submatrices of G specified by GSaα for 0 ≤ a ≤ zn α − 1. We say that G satisfies the (k, α)-consecutive column property, where α ≤ k if each GSaα has full rank. In other words, the α columns in each GSaα are linearly independent. P1 1 2 0 P2 1 2 PS1 0 1 PS2 P3 2 0 1 2 PS3 Recovery Sets Fig. 1. Recovery set bipartite graph In general, (see Algorithm 1) we have K = |A| = nq users. Each file Wn , n ∈ [N ] is divided into q k z subfiles s s | 0 ≤ t ≤ q k −1, 0 ≤ s ≤ z −1}. A subfile Wn,t Wn = {Wn,t is cached in user UB where B ∈ A if t ∈ B. Therefore, each user caches a total of N q k−1 z subfiles. As each file consists of q k z subfiles, we have that M/N = 1/q. It remains to show that we can design a delivery phase scheme that satisfies any possible demand pattern. Suppose that in the delivery phase user UB requests file WdB where dB ∈ [N ]. The server responds by transmitting several equations that satisfy each user. Each equation allows k + 1 1 users from different parallel classes to simultaneously obtain a missing subfile. Our delivery scheme is such that the set of transmitted equations can be classified into various recovery sets that correspond to appropriate collections of parallel classes. For example, in Fig. 1, PS0 = {P0 , P1 , P2 }, PS1 = {P0 , P1 , P3 } and so on. It turns out that these recovery sets zn − 1 defined correspond precisely to the sets Sa , 0 ≤ a ≤ k+1 earlier. We illustrate this by means of the example below. As pointed out in the sequel, codes that satisfy the (k, α)CCP, where α ≤ k will result in caching systems that have a multiplicative rate gain of α over an uncoded system. Likewise, codes that satisfy the (k, k + 1)-CCP will have a gain of k + 1 over an uncoded system. In the remainder of the paper, we will use the term CCP to refer to the (k, k +1)-CCP if the value of k is clear from the context. C. Usage in a coded caching scenario A resolvable design generated from a linear block code that satisfies the CCP can be used in a coded caching scheme as follows. We associate the users with the blocks. Each subfile is associated with a point and an additional index. The placement scheme follows the natural incidence between the blocks and the points; a formal description is given in Algorithm 1 and illustrated further in Example 5. Example 5. Consider the resolvable design from Example 3, where we recall that z = 3. The blocks in A correspond to twelve users U012 , U345 , U678 , U036 , U147 , U258 , U057 , U138 , U246 , U048 , U237 , U156 . Each file is partitioned into Fs = 9 × z = 27 subfiles, each of which is denoted by s Wn,t , t = 0, · · · , 8, s = 0, 1, 2. The cache in user Uabc , s denoted Zabc is specified as Zabc = {Wn,t | t ∈ {a, b, c}, s ∈ {0, 1, 2} and n ∈ [N ]}. This corresponds to a coded caching system where each user caches 1/3-rd of each file so that M/N = 1/3. Example 6. Consider the placement scheme specified in Example 5. Let each user UB request file WdB . The recovery sets are specified by means of the recovery set bipartite graph shown in Fig. 1, e.g., PS1 corresponds to S1 = {0, 1, 3}. The outgoing edges from each parallel class are labeled arbitrarily with numbers 0, 1 and 2. Our delivery scheme is such that each user recovers missing subfiles with a specific superscript from each recovery set that its corresponding parallel class participates in. For instance, a user in parallel class P1 recovers 5 missing subfiles with superscript 0 from PS0 , superscript 1 from PS1 and superscript 2 from PS3 ; these superscripts are the labels of outgoing edges from P1 in the bipartite graph. It can be verified, e.g., that user U012 which lies in P0 recovers all missing subfiles with superscript 1 from the equations below. Wd1012 ,3 ⊕ Wd1036 ,2 ⊕ Wd0237 ,0 , Wd1012 ,6 ⊕ Wd1036 ,1 ⊕ Wd0156 ,0 , Wd1012 ,8 ⊕ Wd1258 ,0 ⊕ Wd0048 ,2 , Wd1012 ,5 ⊕ Wd1258 ,1 ⊕ Wd0156 ,2 . Wd1012 ,4 ⊕ Wd1147 ,0 ⊕ Wd0048 ,1 , Algorithm 2: Signal Generation Algorithm for PSa Input : For P ∈ PSa , E(P) = label(P − PSa ). Signal set Sig = ∅. 1 while any user UB ∈ Pj , j ∈ Sa does not recover all its missing subfiles with superscript E(Pj ) do 2 Pick blocks Bj,lj ∈ Pj for all j ∈ Sa and lj ∈ {0, . . . , q − 1} such that ∩j∈Sa Bj,lj = ∅; /* Pick blocks from distinct parallel classes in PSa such that their intersection is empty */ Wd1012 ,7 ⊕ Wd1147 ,2 ⊕ Wd0237 ,1 , 3 Each of the equations above benefits three users. They are generated simply by choosing U012 from P0 , any block from P1 and the last block from P3 so that the intersection of all these blocks is empty. The fact that these equations are useful for the problem at hand is a consequence of the CCP. The process of generating these equations can be applied to all possible recovery sets. It can be shown that this allows all users to be satisfied at the end of the procedure. 4 Let ˆls = ∩j∈Sa \{s} Bj,lj for s ∈ Sa ; /* Determine the missing subfile index that the user from Ps will recover */ E(Ps ) Add signal ⊕s∈Sa W to Sig /* User UBs,ls κs,ls ,l̂s demands file Wκs,ls . This equation allows it to recover the corresponding missing subfile index l̂s . The superscript is determined by the recovery set bipartite graph */ In what follows, we first show that for the recovery set PSa it is possible to generate equations that benefit k + 1 users simultaneously. 5 Claim 1. Consider the resolvable design (X, A) constructed as described in Section III.A by a (n, k) linear block code that satisfies the CCP. Let PSa = {Pi | i ∈ Sa } for 0 ≤ a ≤ zn k+1 − 1, i.e., it is the subset of parallel classes corresponding to Sa . We emphasize that |PSa | = k + 1. Consider blocks Bi1 ,li1 , . . . , Bik ,lik (where lij ∈ {0, . . . , q − 1}) that are picked from any k distinct parallel classes of PSa . Then, | ∩kj=1 Bij ,lij | = 1. end Output: Signal set Sig. To see this consider the system of equations in variables u0 , . . . , uk−1 . k−1 X ub gbi1 = li1 , b=0 .. . k−1 X Before proving Claim 1, we discuss its application in the delivery phase. Note that the claim asserts that k blocks chosen from k distinct parallel classes intersect in precisely one point. Now, suppose that one picks k + 1 users from k + 1 distinct parallel classes, such that their intersection is empty. These blocks (equivalently, users) can participate in an equation that benefits k + 1 users. In particular, each user will recover a missing subfile indexed by the intersection of the other k blocks. We emphasize here that Claim 1 is at the core of our delivery phase. Of course, we need to justify that enough equations can be found that allow all users to recover all their missing subfiles. This follows from a natural counting argument that is made more formally in the subsequent discussion. The superscripts s ∈ {0, . . . , z −1} are needed for the counting argument to go through. ub gbik = lik . b=0 By the CCP, the vectors gi1 , gi2 , . . . , gik are linearly independent. Therefore this system of k equations in k variables has a unique solution over GF (q). The result follows.  We now provide an intuitive argument for the delivery phase. Recall that we form a recovery set bipartite graph (see Fig. 1 for an example) with parallel classes and recovery sets as the disjoint vertex subsets. The edges incident on each parallel class are labeled arbitrarily from 0, . . . , z − 1. For a parallel class P ∈ PSa we denote this label by label(P −PSa ). For a given recovery set PSa , the delivery phase proceeds by choosing blocks from distinct parallel classes in PSa such that their intersection is empty; this provides an equation that benefits k + 1 users. It turns out that the equation allows a user in parallel class P ∈ PSa to recover a missing subfile with the superscript label(P − PSa ). The formal argument is made in Algorithm 2. For ease of notation in Algorithm 2, we denote the demand of user UBi,j for 0 ≤ i ≤ n − 1, 0 ≤ j ≤ q − 1 by Wκi,j . Proof. Following the construction in Section III.A, we note that a block Bi,l ∈ Pi is specified by Bi,l = {j : Ti,j = l}. Now consider Bi1 ,li1 , . . . , Bik ,lik (where ij ∈ Sa , lij ∈ {0, . . . , q − 1}) that are picked from k distinct parallel classes of PSa . W.l.o.g. we assume that i1 < i2 < · · · < ik . Let I = {i1 , . . . , ik } and TI denote the submatrix of T obtained by retaining the rows in I. We will show that the vector [li1 li2 . . . lik ]T is a column in TI and only appears once. Claim 2. Consider a user UB belonging to parallel class P ∈ PSa . The signals generated in Algorithm 2 can recover all the missing subfiles needed by UB with superscript E(P). Proof. Let Pα ∈ PSa . In the arguments below, we argue that user UBα,lα that demands file Wκα,lα can recover all its 6 missing subfiles with superscript E(Pα ). Note that |Bα,lα | = q k−1 . Thus, user UBα,lα needs to obtain q k − q k−1 missing subfiles with superscript E(Pα ). Consider an iteration of the while loop where block Bα,lα is picked in step 2. The E(P ) equation in Algorithm 2 allows it to recover Wκ α,l̂ where α,lα α ˆlα = ∩j∈S \{α} Bj,l . This is because ∩j∈S Bj,l = ∅ and j a j a because of Claim 1. Next we count the number of equations that UBα,lα participates in. We can pick k − 1 users from some k − 1 distinct parallel classes in PSa . This can be done in q k−1 ways. Claim 1 ensures that the blocks so chosen intersect in a single point. Next we pick a block from the only remaining parallel class in PSa such that the intersection of all blocks is empty. This can be done in q − 1 ways. Thus, there are a total of q k−1 (q − 1) = q k − q k−1 equations in which user UBα,lα participates in. It remains to argue that each equation provides a distinct subfile. Towards this end, let {i1 , . . . , ik } ⊂ Sa be an index set such that α ∈ / {i1 , . . . , ik }. Suppose that there exist sets of blocks {Bi1 ,li1 , . . . , Bik ,lik } and {Bi1 ,li0 , . . . , Bik ,li0 } 1 k such that {Bi1 ,li1 , . . . , Bik ,lik } 6= {Bi1 ,li0 , . . . , Bik ,li0 }, but 1 k ∩kj=1 Bij ,lij = ∩kj=1 Bij ,li0 = β. This is a contradiction since j T k+1 ∩j=2 Bij ,li0 , which this in turn implies that β ∈ ∩k+1 j=2 Bij ,lij j is impossible since two blocks from the same parallel class have an empty intersection. As the algorithm is symmetric with respect to all blocks in parallel classes belonging to PSa , we have the required result.  D. Obtaining a scheme for M/N = 1 − The construction above works for a system where M/N = 1/q. It turns out that this can be converted into a scheme for M k+1 N = 1 − nq . Thus, any convex combination of these two points can be obtained by memory-sharing. Towards this end, we note that the class of coded caching schemes considered here can be specified by an equationsubfile matrix. This is inspired by the hypergraph formulation and the placement delivery array (PDA) based schemes for coded caching in [15] and [14]. Each equation is assumed to be of the all-but-one type, i.e., it is of the form Wdt1 ,Aj1 ⊕ Wdt2 ,Aj2 ⊕ · · · ⊕ Wdtm ,Ajm where for each ` ∈ [m], we have the property that user Ut` does not cache subfile Wn,Aj` but caches all subfiles Wn,Ajs where {js : s ∈ [m], s 6= `}. The coded caching system corresponds to a ∆×Fs equationsubfile matrix S as follows. We associate each row of S with an equation and each column with a subfile. We denote the i-th row of S by Eqi and j-th column of S by Aj . The value S(i, j) = t if in the i-th equation, user Ut recovers subfile Wdt ,Aj , otherwise, S(i, j) = 0. Suppose that these ∆ equations allow each user to satisfy their demands, i.e., S corresponds to a valid coded caching scheme. It is not too hard to see that the placement scheme can be obtained by examining S. Namely, user Ut caches the subfile corresponding to the j-th column if integer t does not appear in the j-th column. Example 7. Consider a coded caching system in [1] with K = 4, ∆ = 4 and Fs = 6. We denote the four users as U1 , U2 , U3 , U4 . Suppose that the equation-subfile matrix S for this scheme is as specified below. The overall delivery scheme repeatedly applies Algorithm 2 to each of the recovery sets. A1 A2 A3 A4 A5 A6 3 2 0 1 0 0  Eq2   4  Eq3  0 Eq4 0 0 2 0 1  0  .  1  2 Eq1 Lemma 2. The proposed delivery scheme terminates and allows each user’s demand to be satisfied. Furthermore the transmission rate of the server is (q−1)n k+1 and the subpacketization level is q k z. Proof. See Appendix. k+1 nq .  4 3 0 0 0 0 4 3  Upon examining S it is evident for instance that user U1 caches subfiles A1 , . . . , A3 as the number 1 does not appear in the corresponding columns. Similarly, the cache placement of the other users can be obtained. Interpreting this placement scheme in terms of the user-subfile assignment, it can be verified that the design so obtained corresponds to the transpose of the scheme considered in Example 1 (and also to the scheme of [1] for K = 4, M/N = 1/2).  The main requirement for Lemma 2 to hold is that the recovery set bipartite graph be biregular, where multiple edges between the same pair of nodes is disallowed and the degree of each parallel class is z. It is not too hard to see that this follows from the definition of the recovery sets (see the proof in the Appendix for details). In an analogous manner, if one starts with the generator matrix of a code that satisfies the (k, α)-CCP for α ≤ k, then we can obtain the following result which is stated below. The details are quite similar to the discussion for the (k, k+1)-CCP and can be found in the Appendix (Section B). Lemma 3. Consider a ∆×Fs equation-subfile matrix S whose entries belong to the set {0, 1, . . . , K}. It corresponds to a valid coded caching system if the following three conditions are satisfied. • There is no non-zero integer appearing more than once in each column. • There is no non-zero integer appearing more than once in each row. • If S(i1 , j1 ) = S(i2 , j2 ) 6= 0, then S(i1 , j2 ) = S(i2 , j1 ) = 0. Corollary 1. Consider a coded caching scheme obtained by forming the resolvable design obtained from a (n, k) code that satisfies the (k, α)-CCP where α ≤ k. Let z be the least positive integer such that α | nz. Then, a delivery scheme can and be constructed such that the transmission rate is (q−1)n α the subpacketization level is q k z. Proof. The placement scheme is obtained as discussed earlier, i.e., user Ut caches subfiles Wn,Aj if integer t does not appear 7 in column Aj . Therefore, matrix S corresponds to a placement scheme. Next we discuss the delivery scheme. Note that Eqi corresponds to an equation as follows. By memory sharing any convex combination of these points is achievable. In a similar manner for the (n, k) linear block code that satisfies the (k, α)-CCP over GF (q), the caching system where M/N = 1/q can be converted into a system where 0 α α 0 k zn 0 K 0 = nq, M N 0 = 1 − nq , Fs = (q − 1)q α and R = (q−1)n using the equation-subfile technique. The arguments presented above apply with essentially no change. Wdt1 ,Aj1 ⊕ Wdt2 ,Aj2 ⊕ · · · ⊕ Wdtm ,Ajm , where S(i, j1 ) = t1 , · · · , S(i, jm ) = tm . The above equation can allow m users to recover subfiles simultaneously if (a) Ut` does not cache Wn,Aj` and (b) Ut` caches all Wn,Ajs where {js : s ∈ [m], s 6= `}. It is evident that Ut` does not cache Wn,Aj` owing to the placement scheme. Next, to guarantee the condition (b), we need to show that integer t` = S(i, j` ) will not appear in column Ajs in S where {js : s ∈ [m], s 6= `}. Towards this end, t` 6= S(i, js ) because of Condition 2. Next, consider the non-zero entries that lie in the column Ajs but not in the row Eqi . Assume there exists an entry S(i0 , js ) such that S(i0 , js ) = S(i, j` ) = t` and i0 6= i, then S(i, js ) = ts 6= 0, which is a contradiction to Condition 3. Finally, Condition 1 guarantees that each missing subfile is recovered only once.  IV. S OME CLASSES OF LINEAR CODES THAT SATISFY THE CCP At this point we have established that linear block codes that satisfy the CCP are attractive candidates for usage in coded caching. In this section, we demonstrate that there are a large class of generator matrices that satisfy the CCP. For most of the section we work with matrices over a finite field of order q. In the last subsection, we discuss some constructions for matrices over Z mod q when q is not a prime or prime power. We summarize the constructions presented in this section in Table I. Lt t User Ut caches a fraction M N = Fs where Lt is the number of columns of S that do not have the entry t. Similarly, the transmission rate is given by R = F∆s . The crucial point is that the transpose of S, i.e., ST also corresponds to a coded caching scheme. This follows directly from the fact that ST also satisfies the conditions in Lemma 3. In particular, ST corresponds to a coded caching system with K users and ∆0 subfiles. In the placement phase, the M cache size of Ut is Nt = ∆−F∆s +Lt . In the delivery phase, by transmitting Fs equations corresponding to the rows of ST , all missing subfiles can be recovered. Then, the transmission rate is R0 = F∆s . Applying the above discussion in our context, consider the equation-subfile matrix S corresponding to the coded caching 1 k t system with K = nq, M N = q for 1 ≤ t ≤ nq, Fs = q z nz k T and ∆ = q (q − 1) k+1 . Then S corresponds to a system 0 k+1 k zn 0 with K 0 = nq, M N = 1 − nq , Fs = (q − 1)q k+1 , and k+1 transmission rate R0 = F∆s = (q−1)n . The following theorem is the main result of this paper. A. Maximum-distance-separable (MDS) codes (n, k)-MDS codes with minimum distance n − k + 1 are clearly a class of codes that satisfy the CCP. In fact, for these codes any k columns of the generator matrix can be shown to be full rank. Note however, that MDS codes typically need large field size, e.g., q + 1 ≥ n (assuming that the MDS conjecture is true) [22]. In our construction, the value of M/N = 1/q and the number of users is K = nq. Thus, for large n, we will only obtain systems with small values of M/N , or equivalently large values of M/N (by Theorem 1 above). This may be restrictive in practice. B. Cyclic Codes A cyclic code is a linear block code, where the circular shift of each codeword is also a codeword [23]. A (n, k) cyclic code (q) is specified by a monic polynomial g(X) = Pn−kover GF i i=0 gi X with coefficients from GF (q) where gn−k = 1 and g0 6= 0; g(X) needs to divide the polynomial X n − 1. The generator matrix of the cyclic code is obtained as below.   g0 g1 · · · gn−k 0 · · 0  0 g0 g1 · · · gn−k 0 · 0    G=. ..  .  .. .  Theorem 1. Consider a (n, k) linear block code over GF (q) that satisfies the (k, k + 1) CCP. This corresponds to a coded caching scheme with K = nq users, N files in  the server  1 where each user has a cache of size M ∈ q N, 1 −   k+1 N . Let z be the least positive integer such that nq k + 1 | nz. When M N 0 = 1q , we have M N = (1 − k+1 nq ), · 0 g0 g1 · · · gn−k The following claim shows that for verifying the CCP for a cyclic code it suffices to pick any set of k + 1 consecutive columns. (q − 1)n R= , and k+1 Fs = q k z. When 0 Claim 3. Consider a (n, k) cyclic code with generator matrix G. Let GS denote a set of k + 1 consecutive columns of G. If each k × k submatrix of GS is full rank, then G satisfies the (k, k + 1)-CCP. we have k+1 , and (q − 1)n zn Fs = (q − 1)q k . k+1 R= Proof. Let the generator polynomial of the cyclic code be g(X), where we note that g(X) has degree n − k. Let 8 Code type Code construction Notes (n, k) MDS codes Satisfy (k, k + 1)-CCP. Need q + 1 ≥ n. (n, k) Cyclic codes Existence depends on certain properties of the generator polynomials. All cyclic codes satisfy the (k, k)-CCP. Need additional conditions for the (k, k + 1)-CCP. Kronecker product of z × α matrix satisfying the (z, z)-CCP with the identity matrix It×t Satisfy the (k, k)-CCP where k = tz. Kronecker product of Vandermonde and Vandermonde-like matrices with structured base matrices Satisfy the (k, k + 1)-CCP for certain parameters. CCP matrix extension Extends a k × n CCP matrix to a k × (n + s(k + 1)) CCP matrix for integer s. Codes over field GF (q) Codes over ring Z mod q Single parity-check (SPC) code Satisfy the (k, k + 1)-CCP with n = k + 1. Cyclic codes over the ring Require that q = q1 × q2 × · · · × qd where qi ’s are prime. Satisfy the (k, k)-CCP. Kronecker product of z × α matrix satisfying the (z, z)-CCP with the identity matrix It×t Satisfy the (k, k)-CCP property where k = tz. CCP matrix extension Extends a k × n CCP matrix to a k × (n + s(k + 1)) CCP matrix for integer s. TABLE I A SUMMARY OF THE DIFFERENT CONSTRUCTIONS OF CCP MATRICES IN S ECTION IV GS = [g(a)n , g(a+1)n , · · · , g(a+k)n ] where we assume that GS satisfies the (k, k + 1)-CCP. Let • GS\j =[g(a)n , . . . , g(a+j−1)n , g(a+j+1)n , . . . , g(a+k)n ], and GS 0 \j =[g(a+i)n , . . . , g(a+j−1+i)n , g(a+j+1+i)n , . . . , g(a+k+i)n ]. We need to show that if GS\j has full rank, then GS 0 \j has full rank, for any 0 ≤ j ≤ k. As GS\j has full rank, there is no codeword c 6= 0 such that c((a)n ) = · · · = c((a + j − 1)n ) = c((a + j + 1)n ) = · · · = c((a + k)n ) = 0. By the definition of a cyclic code, any circular shift of a codeword results in another codeword that belongs to the code. Therefore, there is no codeword c0 such that c0 ((a + i)n ) = · · · = c0 (a + j − 1 + i)n ) = c0 ((a + j + 1 + i)n ) = · · · = c0 ((a + k + i)n ) = 0. Thus, GS 0 \j has full rank.  • For 0 < j ≤ b k2 c, the submatrices  gn−k−1 gn−k 0  gn−k−2 g g n−k−1 n−k   .. Cj =  .  gn−k−j+1 · · gn−k−j · · · · 0 · · · 0 0 .. . · gn−k · gn−k−1        have full rank. In the above expression, gi = 0 if i < 0. For b k2 c < j < k, the submatrices   g1 g2 · · · · gk−j g0 g1 · · · · gk−j−1     .. ..  Cj =  .  .   0 · · 0 g0 g1 g2  0 · ·· 0 g0 g1 have full rank. Example 8. Consider the polynomial g(X) = X 4 + X 3 + X + 2 over GF (3). Since it divides X 8 − 1, it is the generator polynomial of a (8, 4) cyclic code over GF (3). The generator matrix of this code is given below.   2 1 0 1 1 0 0 0 0 2 1 0 1 1 0 0  G= 0 0 2 1 0 1 1 0 . 0 0 0 2 1 0 1 1 Claim 3 implies a low complexity search algorithm to determine if a cyclic code satisfies the CCP. Instead of checking zn all GSa , 0 ≤ a ≤ k+1 − 1, in Definition 4, we only need to check an arbitrary GS = [g(i)n , g(i+1)n , · · · , g(i+k)n ], for 0 ≤ i < n. To further simplify the search, we choose i = n − b k2 c − 1. For this choice of i, Claim 4 shows that GS is such that we only need to check the rank of a list of small-dimension matrices to determine if each k × k submatrix of GS is full rank (the proof appears in the Appendix). It can be verified that the 4 × 5 submatrix which consists of the two leftmost columns and three rightmost columns of G is such that all 4 × 4 submatrices of it are full rank. Thus, by Claim 3 the (4,5)-CCP is satisfied for G. Claim 4. A cyclic code with generator matrix G satisfies the CCP if the following conditions hold. Remark 3. Cyclic codes form an important class of codes that satisfy the (k, k)-CCP (cf. Definition 5). This is because, 9 it is well-known [23] that any k consecutive columns of the generator matrix of a cyclic code are linearly independent. Proof. The proof again leverages the idea that G can be expressed succinctly by using Kronecker products. The arguments can be found in the Appendix.  C. Constructions leveraging properties of smaller base matrices Consider the case when α = z + 1. We construct a (n, k) linear code satisfy the CCP over GF (q) where q ≥ z. It can be noted that the constraint of field size is looser than the corresponding constraint in Claim 6. It is well recognized that cyclic codes do not necessarily exist for any choice of parameters. This is because of the divisibility requirement on the generator polynomial. We now discuss a more general construction of generator matrices that satisfy the CCP. As we shall see, this construction provides a more or less satisfactory solution for a large range of system parameters. Our first simple observation is that the Kronecker product (denoted by ⊗ below) of a z ×α generator matrix that satisfies the (z, z)-CCP with a t × t identity matrix, It×t immediately yields a generator matrix that satisfies the (tz, tz)-CCP. Claim 7. Consider nz = (z + 1) · (k + 1) . Consider a (n, k) linear block code whose generator matrix (over GF (q)) is specified as follows.   G=  It×t 0t×t 0t×t It×t ··· ··· 0t×t 0t×t 0t×(t−1) 0t×(t−1) 1t 1t .. . b1 It×t b2 It×t  .. .    0t×t 0t×t ··· It×t 0t×(t−1) 1t bz−1 It×t 0(t−1)×t 0(t−1)×t ··· 0(t−1)×t I(t−1)×(t−1) 1t−1 C(c1 ,c2 )(t−1)×t , (4) where t = n − k − 1. If q ≥ z, b1 , b2 , · · · , bz−1 are non-zero and distinct, and c1 + c2 = 0, then G satisfies the CCP. Claim 5. Consider a (n, k) linear block code over GF (q) whose generator matrix is specified as G = A ⊗ It×t where A is a z × α matrix that satisfies the (z, z)-CCP. Then, G satisfies the (k, k)-CCP where k = tz and n = tα.  Proof. See Appendix. Given a (n, k) code that satisfies the CCP, we can use it obtain higher values of n in a simple manner as discussed in the claim below. Proof. The recovery set for A is specified as Saz = {(az)α , · · · , (az+z−1)α } and the recovery set for G is specified as Sak = {(ak)n , · · · , (ak+k−1)n }. Since A satisfies the (z, z)-CCP, ASaz has full rank. Note that GSak = ASaz ⊗ It×t . Then det(GSak ) = det(ASaz ⊗ It×t ) = det(ASaz )t 6= 0. Therefore, G satisfies the (k, k)-CCP.  Claim 8. Consider a (n, k) linear block code over GF (q) with generator matrix G that satisfies the CCP. Let the first k + 1 columns of G be denoted by the submatrix D. Then the matrix G0 of dimension k × (n + s(k + 1)) where s ≥ 0 Remark 4. Let A be the generator matrix of a cyclic code over GF (q), then G = A ⊗ It×t satisfies the (k, k)-CCP by Claim 5. G0 = [D| · · · |D |G] | {z } s also satisfies the CCP. Our next construction addresses the (k, k + 1)-CCP. In what follows, we use the following notation. T • 1a : [1, · · · , 1] ; | {z }  Proof. See Appendix. Claim 8 can provide more parameter choices and more possible code constructions. For example, given n, k, q, where k +1+(n)k+1 ≤ q +1 < n, there may not exist a (n, k)-MDS code over GF (q). However, there exists a (k +1+(n)k+1 , k)MDS code over GF (q). By Claim 8, we can obtain a (n, k) linear block code over GF (q) that satisfies the CCP. Similarly, combining Claim 4, Claim 6, Claim 7 with Claim 8, we can obtain more linear block codes that satisfy the CCP. A result very similar to Claim 8 can be obtained for the (k, α)-CCP. Specifically, consider a (n, k) linear block code with generator matrix G that satisfies the (k, α)-CCP and let D be the first α columns of G. Then, G0 = [D| · · · |D |G] of | {z } a • C(c1 , c2 )a×b : a × b matrix where each row is the cyclic shift (one place to the right) of the row above it and the first row is [c1 c2 0 · · · 0]; and • 0a×b : a × b matrix with zero entries. Consider parameters n, k. Let the greatest common divisor of n and k + 1, gcd(n, k + 1) = t. It is easy to verify that is the smallest integer such that k + 1 | nz. Let z = k+1 t n = tα and k + 1 = tz. Claim 6 below constructs a (n, k) linear code that satisfies the CCP over GF (q) where q > α. Since α = nt , the required field size in Claim 6 is lower than the MDS code considered in Section IV-A. s dimension k × (n + sα) also satisfies the (k, α)-CCP. Claim 6. Consider a (n, k) linear block code over GF (q) whose generator matrix is specified as eq. (3), where   b00 b01 ··· b0(α−1)  b10 b11 ··· b1(α−1)     ..  ..  .  . b(z−1)0 b(z−1)1 · · · b(z−1)(α−1) D. Constructions where q is not a prime or a prime power We now discuss constructions where q is not a prime or a prime power. We attempt to construct matrices over the ring Z mod q in this case. The issue is somewhat complicated by the fact that a square matrix over Z mod q has linear independent rows if and only if its determinant is a unit in the ring [24]. In general, this fact makes it harder to obtain constructions such is a Vandermonde matrix and q > α. Then, G satisfies the (k, k + 1)-CCP. 10 b00 It×t  b10 It×t   .. G= .   b(z−2)0 It×t C(b(z−1)0 , b(z−1)0 )(t−1)×t  b01 It×t b11 It×t ··· ··· b(z−2)1 It×t C(b(z−1)1 , b(z−1)1 )(t−1)×t ··· ··· as those in Claim 6 that exploit the Vandermonde structure of the matrices. Specifically, the difference of units in a ring is not guaranteed to be a unit. However, we can still provide some constructions. It can be observed that Claim 5 and Claim 8 hold for linear block codes over Z mod q. We will use them without proof in this subsection. • (3) Let C denote the code over Z mod q. Let c(i) ∈ C i for i = 1, . . . , d. The codeword c ∈ C is obtained as follows. (1) (d) The j-th component of c, cj = ψ −1 (cj , . . . , cj ) Therefore, there are q1k1 q2k2 · · · qdkd codewords in C. It is also evident that C is cyclic. As discussed in Section III-A, we form the matrix T for the codewords in C. It turns out that using T and the technique discussed in Section III-A, we can obtain a resolvable design. Furthermore, the gain of the system in the delivery phase can be shown to be kmin = min{k1 , k2 , · · · , kd }. We discuss these points in detail in the Appendix (Section C). Claim 9. Let G = [Ik×k |1k ], i.e., it is the generator matrix of a (k + 1, k) single parity check (SPC) code, where the entries are from Z mod q. The G satisfies the (k, k + 1)-CCP and the (k, k)-CCP. It can be used as base matrix for Claim 5. Proof. It is not too hard to see that when G = [Ik×k |1k ], any k × k submatrix of G has a determinant which is ±1, i.e., it is a unit over Z mod q. Thus, the result holds in this case.  V. D ISCUSSION AND C OMPARISON WITH E XISTING S CHEMES A. Discussion Claim 10. The following matrix with entries from Z mod q satisfies the (k, k + 1)-CCP. Here k = 2t − 1 and n = 3t.   It×t 0 1t It×t G= . 0 I(t−1)×(t−1) 1t C(1, −1)(t−1)×t When the number of users is K = nq and the cache 1 fraction is M N = q , we have shown in Theorem 1 that the gain g = k + 1 and Fs = q k z. Therefore, both the gain and the subpacketization level increase with larger k. Thus, for our approach given a subpacketization budget Fs0 , the highest coded gain that can be obtained is denoted by gmax = kmax +1 where kmax is the largest integer such that q kmax z ≤ Fs0 and there exists a (n, kmax ) linear block code that satisfies the CCP. For determining kmax , we have to characterize the collection of values of k such that there exists a (n, k) linear code satisfies the CCP over GF (q) or Z mod q. We use our proposed constructions (MDS code, Claim 4, Claim 6, Claim 7, Claim 8, Claim 9, Claim 10) for this purpose. We call this collection C(n, q) and generate it in Algorithm 3. We note here that it is entirely possible that there are other linear block codes that fit the appropriate parameters and are outside the scope of our constructions. Thus, the list may not be exhaustive. In addition, we note that we only check for the (k, k + 1)-CCP. Working with the (k, α)-CCP where α ≤ k can provide more operating points. Proof. This can be proved by following the arguments in the proof of Claim 7 while treating elements to be from Z mod q and setting z = 2. We need to consider three different k ×(k + 1) submatrices for which we need to check the property. These correspond to simpler instances of the submatrices considered in Types I - III in the proof of Claim 7. In particular, the corresponding determinants will always be ±1 which are units over Z mod q.  Remark 5. We note that the general construction in Claim 7 can potentially fail in the case when the matrices are over Z mod q. This is because in one of the cases under consideration (specifically, Type III, Case 1), the determinant depends on the difference of the bi values. The difference of units in Z mod q is not guaranteed to be a unit, thus there is no guarantee that the determinant is a unit. Remark 6. We can use Claim 8 to obtain higher values of n based on the above two classes of linear block codes over Z mod q. Example 9. Consider a caching system with K = nq = 12 × 1 5 = 60 users and cache fraction M N = 5 . Suppose that the 6 subpacketization budget is 1.5 × 10 . By checking all k < n we can construct C(n, q) (see Table II). As a result, C(n, q) = {1, 2, 3, 4, 5, 6, 7, 8, 9, 11}. Then kmax = 8, Fs ≈ 1.17 × 106 and the maximal coded gain we can achieve is gmax = 9. By contrast, the scheme in [1] can achieve coded gain g = KM N + K 1 = 13 but requires subpacketization level Fs = KM ≈ N 12 1.4 × 10 . We can achieve almost the same rate by performing memory-sharing by using the scheme of [1] in this example. In particular, we divide each file of size Ω into two smaller sub9 files Wn1 and Wn2 , where the size of Wn1 , |Wn1 | = 10 Ω and the While most constructions of cyclic codes are over GF (q), there has been some work on constructing cyclic codes over Z mod q. Specifically, [25] provides a construction where q = q1 × q2 · · · × qd and qi , i = 1, . . . , d are prime. We begin by outlining this construction. By the Chinese remainder theorem any element γ ∈ Z mod q has a unique representation in terms of its residues modulo qi , for i = 1, . . . , d. Let ψ : Z mod q → GF (q1 ) × · · · × GF (qd ) denote this map. •  b0(α−1) It×t  b1(α−1) It×t   ..  .   b(z−2)(α−1) It×t C(b(z−1)(α−1) , b(z−1)(α−1) )(t−1)×t Suppose that (n, ki ) cyclic codes over GF (qi ) exist for all i = 1, . . . , d. Each individual code is denoted C i . 11 k n0 z α Construction Notes 11 12 1 1 (12, 11) SPC code k + 1 = n0 10 12 11 12 - - 9 12 5 6 Claim 7 α = z + 1 and q ≥ z 8 12 3 4 Claim 7 α = z + 1 and q ≥ z 7 12 2 3 Claim 7 6 12 7 12 Claim 4 5 6 1 1 (6,5) SPC code and Claim 8 Extend (6,5) SPC code to (12,5) code 4 7 5 7 Claim 4 Generator polynomial is X 8 + X 7 + 4X 6 + 3X 5 + 2X 3 + X 2 + 4X + 4 3 4 1 1 (4,3) SPC code and Claim 8 Extend (4,3) SPC code to (12,3) code 2 3 1 1 (3,2) SPC code and Claim 8 Extend (3,2) SPC code to (12,2) code 1 2 1 1 (2,1) SPC code and Claim 8 Extend (2,1) SPC code to (12,1) code α = z + 1 and q ≥ z Generator polynomial is X 6 + X 5 + 3X 4 + 3X 3 + X 2 + 4X + 3 TABLE II L IST OF k VALUES FOR E XAMPLE 9. T HE VALUES OF n0 , α AND z ARE OBTAINED BY FOLLOWING A LGORITHM 3. 1 Ω. The scheme of [1] is then applied size of Wn2 , |Wn2 | = 10 2 1 1 separately on Wn and Wn2 with M N1 = 15 (corresponding to M2 13 1 2 Wn ) and N2 = 15 (corresponding to Wn ). Thus, the overall 2 1 cache fraction is 0.9 × 15 + 0.1 × 13 15 ≈ 5 . The overall coded gain of this scheme is g ≈ 9. However, the subpacketization level is FsM N = KMK1 /N1 + KMK2 /N2 ≈ 5 × 109 , which is much greater than the subpacketization budget. In Fig. 2, we present another comparison for system parameters K = 64 and different values of M/N . The scheme of [1] works for all M/N such that KM/N is an integer. In Fig. 2, our plots have markers corresponding to M/N values that our scheme achieves. For ease of presentation, both the rate (left y-axis) and the logarithm of the subpacketization level (right y-axis) are shown on the same plot. We present results corresponding to two of our construction techniques: (i) the SPC code and (ii) a smaller SPC code coupled with Claim 8. It can be seen that our subpacketization levels are several orders of magnitude smaller with only a small increase in the rate. An in-depth comparison for general parameters is discussed next. In the discussion below, we shall use the superscript ∗ to refer to the rates and subpacketization levels of our proposed scheme. Fig. 2. A comparison of rate and subpacketization level vs. M/N for a system with K = 64 users. The left y-axis shows the rate and the right y-axis shows the logarithm of the subpacketization level. The green and the blue curves correspond to two of our proposed constructions. Note that our schemes allow for multiple orders of magnitude reduction in subpacketization level and the expense of a small increase in coded caching rate. determine λ and ∗ K(1 − MN ) K MN R=λ + (1 − λ) ∗ 1 + KM 1 + K(1 − N   M M∗ M∗ =λ + (1 − λ) 1 − . N N N Suppose that for given K, M and N , a given rate R can be achieved by the memory sharing of the scheme in [1] between the corner points (M1 , R1 ), (M2 , R2 ), · · · , (Md , Rd ) Mi that satisfy the following equations. ∗ B. Comparison with memory-sharing within the scheme of [1] K(1− M∗ N ∗ 0 M∗ N ) , and (5) (6) Here, MN ≤ 12 , and M 0 = tKN , where t0 is the least integer such that M 0 ≥ M ∗ . To see this, consider the following argument. Suppose that the above statement is not true. Then, there exists a scheme that operates via memory sharing between points  (M1 , R1 ), · · · , (Md , Rd ) such that Fs < KKM 0 . Note that N K  K  1 1 2 1 2 KM1 < KM if M < M ≤ 12 or M > M 2 N N N N ≥ 2 . By N N the convexity of h(·), we can conclude that (M, R) is not in the convex hull of the corner points (M1 , R1 ), · · · , (Md , Rd ). This is a contradiction. ) N where Mi = tiKN for some integer ti . Then Ri = , KM 1+ N i Pd Pd P d i R = i=1 λi Ri , M/N = i=1 λi M i=1 λi = 1. The N and P d K  MS subpacketization level is Fs = i=1 KMi . In addition, N we note that the function h(x) = K(1 − x)/(1 + Kx) is convex in the parameter 0 ≤ x ≤ 1. This can be verified by a simple second derivative calculation.  K 0 , We first argue that FsM S is lower bounded by KM N where M 0 is obtained as follows. For a given M/N , we first 12 Unfortunately, doing this analytically becomes quite messy and does not yield much intuition. Instead, we illustrate the reduction in subpacketization level by numerical comparisons. Algorithm 3: C(n, q) Construction Algorithm Input : n, q, C(n, q) = ∅ 1 if q is a prime power then 2 for k = 1 : (n − 1) do 3 n0 ← (n)k+1 + k + 1; k+1 4 z ← gcd(n 0 ,k+1) ; 0 5 α ← gcd(nn0 ,k+1) ; 6 if there exists a (n0 + i(k + 1), k) cyclic code which satisfies the condition in Claim 4 for some i such that n0 + i(k + 1) ≤ n then 7 C(n, q) ← k. Corresponding codes are constructed by using Claim 8. 8 else 9 if z ≤ 2 then 10 C(n, q) ← k. Corresponding codes are constructed by SPC code and Claim 8 when z = 1 or Claim 7 and Claim 8 when z = 2. 11 else 12 if q + 1 ≥ n0 then 13 C(n, q) ← k. Corresponding codes are constructed by MDS code and Claim 8. 14 else 15 if α = z + 1 and q ≥ z then 16 C(n, q) ← k. Corresponding codes are constructed by Claim 7 and Claim 8. 17 end 18 if α > z + 1 and q > α then 19 C(n, q) ← k. Corresponding codes are constructed by Claim 6 and Claim 8. 20 end 21 end 22 end 23 end 24 end 25 end 26 if q is not a prime power then 27 for k = 1 : (n − 1) do 28 if z ≤ 2 then 29 C(n, q) ← k. Corresponding codes are constructed by Claim 9 when z = 1 and Claim 8 or Claim 10 and Claim 8 when z = 2. 30 end 31 end 32 end Output: C(n, q) Example 10. Consider a (9, 5) linear block code over GF (2) with generator matrix specified below.   1 0 0 0 0 1 1 0 0 0 1 0 0 0 1 0 1 0    G= 0 0 1 0 0 1 0 0 1 . 0 0 0 1 0 1 1 1 0 0 0 0 0 1 1 0 1 1 It can be checked that G satisfies the (5, 6)-CCP. Thus, it corresponds to a coded caching system with K = 9 × 2 = 18 1 3 1 users. Our scheme achieves the point M N = 2 , R1 = 2 , M2 2 2 ∗ ∗ Fs,1 = 64 and N = 3 , R2 = 3 , Fs,2 = 96. 1 3 1 On the other hand for M N = 2 , R1 = 2 , by numerically M1∗ M10 solving (5) and (6) we obtain N ≈ 0.227 and therefore N =  18 5 MS = 8568, which is much higher than 18 . Then Fs,1 ≥ 5 M∗ ∗ Fs,1 = 64. A similar calculation shows that N2 ≈ 41 and M0 5 MS . Thus Fs,2 is also at least as large as therefore N2 = 18 ∗ 8568, which is still much higher than Fs,2 = 96. The next set of comparisons are with other proposed schemes in the literature. We note here that several of these are restrictive in the parameters that they allow. C. Comparison with [1], [14], [21], [15] and [16] For comparison with [1], denote RM N and FsM N be the rate and the subpacketization level of the scheme of [1], respectively. For the rate comparison, we note that R∗ 1+n M 1 = , for = M N R 1+k N q R∗ nq − k M 1+k = , for =1− , RM N nq − n N nq For the comparison of subpacketization level we have the following results. Claim 11. When K = nq, the following results hold. 1 M • If N = q , we have   1 F MN 1 η lim log2 s ∗ = H2 − log2 q. n→∞ K Fs q q • results can be obtained for M N =1− M N =1− k+1 nq , we have   1 F MN η η log2 s ∗ = H2 − log2 q. n→∞ K Fs q q lim (8) In the above expressions, 0 < η = k/n ≤ 1 and H2 (·) represents the binary entropy function. Proof. results are simple consequences of approximating  Both K KH2 (p) [26]. The derivations can be found in the Kp ≈ 2 Appendix.  Next, we compare this lower bound on FsM S to the subpacketization level of our proposed scheme. In principle, we can solve the system of equations (5) and (6) for R = n(q−1) k+1 1 ∗ 1 and M N = q and obtain the appropriate λ and M values . 1 Similar If (7) It is not too hard to see that Fs∗ is exponentially lower than Thus, our rate is higher, but the subpacketization level is exponentially lower. Thus, the gain in the scaling exponent of with respect to the scheme of [1] depends on the choice of R FsM N . k+1 nq 13 where a,b, m are positive integers and a + b ≤ m and (ii) 1 1 m t t M K= m t q , N = 1 − q t , Fs = q (q − 1) and R = (q−1)t , where q, t, m are positive integers. Their scheme (i), is the special case of scheme in [21] when β = 0. For the second scheme, if we let t = 2, [15] shows that q K √ K ∗ 2q R ≈ R , Fs ≈ q ( q −1)2 and Fs∗ ≈ (q −1)q q −1 , which means Fs is again better than Fs∗ . We emphasize here that these results require somewhat restrictive parameter settings. Finally, we consider the work of [16]. In their work, they leveraged the results of [27] to arrive at coded caching schemes where the subpacketization is linear in K. Specifically, they show that for any constant M/N , there exists a scheme with rate K δ , where δ > 0 can be chosen arbitrarily small by choosing K large enough. From a theoretical perspective, this is a positive result that indicates that regimes where linear subpacketization scaling is possible. However, these results are only valid when the value of K is very large. Specifically, K = C n and the result is asymptotic in the parameter n. For these parameter ranges, the result of [16] will clearly be better as compared to our work. 1 Scaling exponent gain = 0.25 = 0.5 0.8 =0.75 =0.99 0.6 0.4 0.2 0 0 5 10 15 20 q Fig. 3. The plot shows the gain in the scaling exponent obtained using our techniques for different value of M/N = 1/q. Each curve corresponds to a choice of η = k/n. and the value of M/N . In Fig. 3 we plot this value of different values of R and q. The plot assumes that codes satisfying the CCP can be found for these rates and corresponds to the gain in eq. (7). In [14] a scheme for the case when M/N = 1/q or M/N = 1−1/q with subpacketization level exponentially smaller with respect to [1] was presented. This result can be recovered a special case of our work (Theorem 1) when the linear block code is chosen as a single parity check code over Z mod q. In this specific case, q does not need to be a prime power. Thus, our results subsume the results of [14]. In a more recent preprint,  referencem[21],  proposed a caching m system with K = , F = and M/N = 1 − s a b   m a m−a / . The corresponding rate is λ b−β b      m m − (a + b − 2β) a + b − 2β a+b−2β  min , , R= m λ a−β b VI. C ONCLUSIONS AND F UTURE W ORK In this work we have demonstrated a link between specific classes of linear block codes and the subpacketization problem in coded caching. Crucial to our approach is the consecutive column property which enforces that certain consecutive column sets of the corresponding generator matrices are fullrank. We present several constructions of such matrices that cover a large range of problem parameters. Leveraging this approach allows us to construct families of coded caching schemes where the subpacketization level is exponentially smaller compared to the approach of [1]. There are several opportunities for future work. Even though our subpacketization level is significantly lower than [1], it still scales exponentially with the number of users. Of course, the rate of growth with the number of users is much smaller. There have been some recent results on coded caching schemes that demonstrate the existence of schemes where the subpacketization scales sub-exponentially in the number of users. It would be interesting to investigate whether some of these ideas can be leveraged to obtain schemes that work for practical systems with tens or hundreds of users. where m, a, b, β are positive integers and 0 < a < m, 0 < b < m, 0 ≤ β ≤ min{a, b}. While a precise comparison is somewhat hard, we can compare the schemes for certain parameter choices, that were also considered in [21]. Let a = 2, β = 1, m = 2b. This corresponds to a coded b−1 1 caching system with K = b(2b − 1) ≈ 2b2 , M N = 2b−1 ≈ 2 ,  2b 2b Fs = b ≈ 2 , R = b. For comparison with our scheme we keep the transmission rates of both schemes roughly the same and let n = b2 , q = 2, k = b − 1. We assume that the corresponding linear block code exists. Then Fs∗ ≈ 2b , which is better than Fs . On the other hand if we let β = 0, a = 2, m = 2qb, we 1 , M obtain a coded caching system with K = m(m−1) 2 N ≈ q,  m Fs = m ≈ (2q) 2q , RY AN = (2q − 1)2 . For keeping the m R EFERENCES [1] M. Maddah-Ali and U. Niesen, “Fundamental limits of caching,” IEEE Trans. on Info. Th., vol. 60, no. 5, pp. 2856–2867, May 2014. [2] H. Ghasemi and A. Ramamoorthy, “Improved lower bounds for coded caching,” IEEE Trans. on Info. Th., vol. 63, no. 7, pp. 4388–4413, 2017. [3] A. Sengupta, R. Tandon, and T. C. Clancy, “Improved approximation of storage-rate tradeoff for caching via new outer bounds,” in IEEE Intl. Symposium on Info. Th., 2015, pp. 1691–1695. [4] M. Maddah-Ali and U. Niesen, “Decentralized coded caching attains order-optimal memory-rate tradeoff,” IEEE/ACM Trans. Netw., vol. 23, no. 4, pp. 1029–1040, 2015. [5] U. Niesen and M. A. Maddah-Ali, “Coded caching with nonuniform demands,” IEEE Trans. on Info. Th., vol. 63, no. 2, pp. 1146–1158, Feb 2017. [6] J. Hachem, N. Karamchandani, and S. Diggavi, “Multi-level coded caching,” in IEEE Intl. Symposium on Info. Th., 2014, pp. 56–60. [7] L. Tang and A. Ramamoorthy, “Coded caching for networks with the resolvability property,” in IEEE Intl. Symposium on Info. Th., 2016. 2q rates the same, we let n = m(m−1) 4q(2q−1) m2 8q 2 m(m−1) , 2q k= m(m−1) 4q(2q−1) − 1 so that Fs∗ ≈ q ≈ q . In this regime, the subpacketization level of [21] will typically be lower. The work of [15] proposed caching schemes with paramem  M  (m−a (a+b ) m b ) ters (i) K = m a , N = 1 − (m) , Fs = b and R = (m) , b b 14 that there exists a ga∗ b which is relatively prime to qi , i.e., ga∗ b is a unit in the ring Z mod qi . Note that for ∆ = [∆0 ∆1 . . . ∆n−1 ] = uG, we have [8] M. Ji, M. F. Wong, A. M. Tulino, J. Llorca, G. Caire, M. Effros, and M. Langberg, “On the fundamental limits of caching in combination networks,” in IEEE 16th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), June 2015, pp. 695– 699. [9] H. Ghasemi and A. Ramamoorthy, “Asynchronous coded caching,” in IEEE Intl. Symposium on Info. Th., 2017, pp. 2438–2442. [10] U. Niesen and M. A. Maddah-Ali, “Coded caching for delay-sensitive content,” in IEEE Intl. Conf. Comm., 2015, pp. 5559–5564. [11] M. E. Fitzpatrick, “4K Sector Disk Drives: Transitioning to the Future with Advanced Format Technologies,” Toshiba 4K White Paper, 2011, [Online] Available:http://cdaweb01.storage.toshiba.com/docs/ services-support-documents/toshiba 4kwhitepaper.pdf. [12] K. Shanmugam, M. Ji, A. M. Tulino, J. Llorca, and A. G. Dimakis, “Finite length analysis of caching-aided coded multicasting,” in 52nd Annual Allerton Conference on Communication, Control, and Computing, Sept 2014, pp. 914–920. [13] K. Shanmugam, M. Ji, A. M. Tulino, J. Llorca, and A. G. Dimakis., “Finite-length analysis of caching-aided coded multicasting,” IEEE Trans. on Info. Th., vol. 62, no. 10, pp. 5524–5537, 2016. [14] Q. Yan, M. Cheng, X. Tang, and Q. Chen, “On the placement delivery array design for centralized coded caching scheme,” IEEE Trans. on Info. Th., vol. 63, no. 9, pp. 5821–5833, 2017. [15] C. Shangguan, Y. Zhang, and G. Ge, “Centralized coded caching schemes: A hypergraph theoretical approach,” preprint, 2016, [Online] Available: https://arxiv.org/abs/1608.03989. [16] K. Shanmugam, A. M. Tulino, and A. G. Dimakis, “Coded caching with linear subpacketization is possible using Ruzsa-Szeméredi graphs,” in IEEE Intl. Symposium on Info. Th., June 2017, pp. 1237–1241. [17] O. Olmez and A. Ramamoorthy, “Fractional repetition codes with flexible repair from combinatorial designs,” IEEE Trans. on Info. Th., vol. 62, no. 4, pp. 1565 –1591, 2016. [18] A. S. Tripathy and A. Ramamoorthy, “Capacity of sum-networks for different message alphabets,” in IEEE Intl. Symposium on Info. Th., 2015, pp. 606–610. [19] ——, “”Sum-networks from incidence structures: construction and capacity analysis,” IEEE Trans. on Info. Th., 2017 (to appear). [20] D. R. Stinson, Combinatorial Designs: Construction and Analysis. Springer, 2003. [21] Q. Yan, X. Tang, Q. Chen, and M. Cheng, “Placement delivery array design through strong edge coloring of bipartite graphs,” IEEE Communications Letters, 2017 (to appear). [22] R. M. Roth, Introduction to Coding Theory. Cambridge University Press, 2006. [23] S. Lin and D. J. Costello, Error Control Coding, 2nd Ed. Prentice Hall, 2004. [24] D. S. Dummit and R. M. Foote, Abstract algebra. Wiley, 3rd Ed., 2003. [25] I. F. Blake, “Codes over certain rings,” Information and Control, vol. 20, no. 4, pp. 396–404, 1972. [26] R. L. Graham, D. E. Knuth, and O. Patashnik, Concrete mathematics: a foundation for computer science (2nd ed.). Addison-Wesley Professional, 1994. [27] N. Alon, A. Moitra, and B. Sudakov, “Nearly complete graphs decomposable into large induced matchings and their applications,” in Proc. of the 44-th Annual ACM symposium on Theory of computing (STOC), 2012, pp. 1079–1090. [28] R. A. Horn and C. R. Johnson, Topics in matrix analysis. Cambridge University Press, 1991. ∆b = k−1 X ua gab , (9) a=0 where u = [u0 , · · · , uk−1 ]. We consider eq. (9) over the ring Z mod qi and rewrite eq. (9) as X ∆b − ua∗ ga∗ b = ua gab , a6=a∗ For arbitrary ua , a 6= a∗ , this equation has a unique solution for ua∗ since ga∗ b is a unit in Z mod qi . This implies that there are qik−1 distinct solutions for (9) over Z mod qi . Using the Chinese remainder theorem, eq. (9) has q1k−1 × q2k−1 × · · · qdk−1 = q k−1 solutions over Z mod q and the result follows.  Remark 7. From Lemma 4, it can be easily verified that a linear block code over Z mod q can construct a resolvable block design if one of the following conditions for each column gi of the generator matrix is satisfied. • At least one non-zero entry of gi is a unit in Z mod q, or • all non-zero entries in gi are zero divisors but their greatest common divisor is 1. For the SPC code over Z mod q, all the non-zero entries in the generator matrix are 1, which is an unit. Therefore, the construction always results in a resolvable design. Proof of Lemma 2 First, we show that the proposed delivery scheme allows each user’s demand to be satisfied. Note that Claim 2 shows that each user in a parallel class that belongs to the recovery set Sa recovers all missing subfiles with a specified superscript from it. Thus, we only need to show that if signals are generated (according to Claim 2) for each recovery set, we are done. This is equivalent to showing that the bipartite recovery set graph is such that each parallel class has degree z and multiple edges between nodes are disallowed. Towards this end, consider the parallel class and we claim that there exist exactly z solutions (aα , bα ) for integer values of α = 1, . . . , z to the equation aα (k + 1) + bα = j + n(α − 1) (10) such that aα1 6= aα2 for α1 6= α2 and j < n. The existence of the solution for each equation above follows from the division algorithm. Note that aα < nz/(k + 1) as the RHS < nz. Furthermore, note that for 1 ≤ α1 ≤ z and 1 ≤ α2 ≤ z, we cannot have solutions to eq. (10) such that aα1 = aα2 as this would imply that |bα1 − bα2 | ≥ n which is a contradiction. This shows that each parallel class Pj participates in at least z different recovery sets. The following facts follow easily from the construction of the recovery sets. The degree of each recovery set in nz of them; the bipartite graph is k + 1 and there are k+1 multiple edges between a recovery set and a parallel class A PPENDIX A. Resolvable design over Z mod q Lemma 4. A (n, k) linear block code over Z mod q with generator matrix G = [gab ] can construct a resolvable block design by the procedure in Section III-A if gcd(q, g0b , g1b , · · · , g(k−1)b ) = 1 for 0 ≤ b < n. Proof. Assume q = q1 × q2 × · · · × qd where qi , 1 ≤ i ≤ d is a prime or a prime power. If the gcd(q, g0b , g1b , · · · , g(k−1)b ) = 1, then it is evident that gcd(qi , g0b , g1b , · · · , g(k−1)b ) = 1 for 1 ≤ i ≤ d. As qi is either a prime or a prime power, it follows 15 are disallowed. Therefore, the total number of edges in the bipartite graph is nz. As each parallel class participates in at least z recovery sets, by this argument, it participates in exactly z recovery sets. . Finally, we calculate the rate of the delivery phase. In total, zn equations, where the symbol the server transmits q k (q −1) k+1 transmitted has the size of a subfile. Thus, the rate is and  gn−k  gn−k−1  Ej =  ..  . gn−k−b k c+j+1 0 gn−k · 2 · · 0 · · · 0 0 .. .    .  gn−k Matrices Aj and Ej have full rank as they are respectively upper triangular and lower triangular, with non-zero entries on the diagonal (as g0 and gn−k are non-zero in a cyclic code). Therefore, GS\(a+j)n has full rank if Cj has full rank. For b k2 c < j < k, GS\(a+j)n can be partitioned into a similar form and the result in Claim 4 follows. zn 1 R = q (q − 1) k + 1 qk z (q − 1)n = . k+1 k Proof of Claim 4 Proof of Claim 6 The matrix GS is shown below.  g0 0  . . .  0  0  0 . . . 0 g1 g0 · g1 · · gd k e−1 2 gd k e−2 0 0 · · · · 0 0 · · · 0 · · g0 0 0 g1 g0 0 0 gn−k · 0 gn−k−1 gn−k · · 0 0 · · · · 0 0 gn−k−b k c · · · 2 2 We need to argue that all k × k submatrices of GSa where 0 ≤ a < α are full rank. In what follows we argue that all   k × k submatrices of GS0 are full rank. The proof for any   GSa is similar. Note that GS0 can be written compactly as   follows by using Kronecker products.      A ⊗ It  GS0 = ,  B ⊗ C(t−1)×t (1, 1)    where gn−k   b00 ··· b0(z−1)   .. if i is A =  ...  . 0 0 .. . 0 0 0 .. .  In the above expression and the subsequent discussion such that i < 0, we set gi = 0. By Claim 3, a cyclic code with generator matrix G satisfies the CCP if all submatrices b(z−2)0 g(a+j+1)n , · · · , g(a+k)n ], where a = n − b k2 c − 1, 0 ≤ j ≤ k, have full rank. In what follows, we argue that this is true. Note that in the generator matrix of cyclic code, any k consecutive columns are linearly independent [23]. Therefore for j = 0 and k, GS\(a+j)n has full rank, without needing the conditions of Claim 4. For 0 < j ≤ b k2 c, GS\(a+j)n is as eq. (11). Rewriting GS\(a+j)n in block form, we get   Aj Bj GS\(a+j)n =  Cj 0  , Dj Ej where A0 and A00 are the first z − 1 columns and last column of A respectively. Likewise, B0 and B00 are the first z − 1 components and last component of B. The matrices ∆1 and ∆2 are obtained by deleting the j-th column of It and C(t−1)×t (1, 1) respectively. Then, using the Schur determinant identity [28], we have 0 det(GS0 \i ) = det(A0 ⊗ It ) det(B00 ⊗ ∆2 − where  gn−k−1 gn−k−2 .. .    Cj =   gn−k−j+1 gn−k−j g1 g0 · g1 · · · 0 gn−k 0 gn−k−1 gn−k · · · · gd k e−1 2 gd k e−2   2 , ..  .  g0  · · 0 · · · b(z−2)(z−1) and B = [b(z−1)0 , · · · , b(z−1)(z−1) ]. Next, we check the determinant of submatrices GS0 \i obtained by deleting i-th column of GS0 . W.l.o.g, we let i = (z − 1)t + j where 0 ≤ j < t. The block form of the resultant matrix GS0 \i can be expressed as   A0 ⊗ It A00 ⊗ ∆1 GS0 \i = , B0 ⊗ C(t−1)×t (1, 1) B00 ⊗ ∆2 GS\(a+j)n =[g(a)n , g(a+1)n , · · · , g(a+j−1)n ,  g0 0  Aj =  .  .. 0 ··· (1) B0 ⊗ C(t−1)×t (1, 1) · (A0 ⊗ It )−1 · A00 ⊗ ∆1 ) = det(A0 ⊗ It ) det(B00 ⊗ ∆2 − (2) B0 A0−1 A00 ⊗ C(t−1)×t (1, 1)∆1 ) = det(A0 ⊗ It ) det((B00 − B0 A0−1 A00 ) ⊗ ∆2 ), 0 0 .. . · gn−k · gn−k−1 where (1) holds by the properties of the Kronecker product [28] and (2) holds since C(t−1)×t (1, 1)∆1 = ∆2 . Next note that det(∆2 ) 6= 0. This is because ∆2 can be denoted as   A 0 , ∆2 = 0 B     ,   16  g0 0   .  ..  0  0  0  . . .  0 0  0  . . . 0 g1 g0 · · gd k e−1 2 gd k e−2 0 0 · · · · · · · · · · · g0 0 · g1 g0 0 0 gn−k · 0 gn−k−1 gn−k · · 0 · · · · · · · · · · · · 0 0 0 gn−k−j+1 gn−k−j gn−k−j−1 · · · gn−k gn−k−1 gn−k−2 0 0 gn−k · · · · · 0 gn−k−b k c · gn−k−b k c+j−1 gn−k−b k c+j+1 2 2 2 where A is a j × j upper-triangular matrix;   1 1 0 ··· 0 0 0 1 1 · · · 0 0    ..  A =  ... .   0 0 0 · · · 1 1 0 0 0 ··· 0 1 and B is a (t − 1 − j) × (t − 1 − j)  1 0 ··· 0 1 1 · · · 0   B =  ...  0 0 · · · 1 0 0 ··· 0 Next, we define the matrix  b00 b01  b10 b11  F= .  .. b(z−1)0 b(z−1)1 • • lower-triangular matrix;  0 0 0 0  ..  . .  1 0 1 1 2 ·  0 0    ..  .   0   0   0   . .  ..    0  0   0   ..   .  (11) gn−k Type I When a = 0, it is easy to verify that any k × k submatrix of GS0 has full rank since GS0 has the form [Ik×k |1k ], which is the generator matrix of the SPC code. Type II When a = 1, GS1 has the form in eq. (12), Case 1: Suppose that we delete any of first (z − 1)t columns in GS1 (this set of columns is depicted by the underbrace in eq. (12)), say i-th column of GS1 , where z1 t ≤ i < (z1 + 1)t and 0 ≤ z1 ≤ z − 2. Let i1 = i − z1 t, i2 = (z1 + 1)t − i − 1. The resultant matrix GS1 \i can be expressed as follows.   A C , GS1 \i = B D where ··· ··· b0(z−1) b1(z−1) .. . ···  A = Ii×i ,   .  B = 0(k−i)×i ,  0t×(k−t−i)  0t×(k−t−i)   .. C= .   0t×(k−t−i) 0i1 ×(k−t−i) b(z−1)(z−1) Another application of the Schur determinant identity yields det(F) det(A0 ) 6 0, = det(B00 − B0 A0−1 A00 ) = b1 It×t b2 It×t .. . bz1 It×t bz1 +1 Ii1 ×i1 0i1 ×(i2 +1)     ,   and D has the form in eq. (13). Note that if z1 = 0, C = [0i1 ×(k−t−i) b1 Ii1 ×i1 0i1 ×(i2 +1) ] and if z1 = z − 2,   01×i2 01×i1 bz−1 01×i2 0i2 ×(i1 +1) bz−1 Ii2 ×i2  . D =  Ii2 ×i2 0(t−1)×i2 C(c1 , c2 )(t−1)×t 0 since det(F) and det(A ) are both non-zero as their columns have the Vandermonde form. In F, the columns correspond to distinct and non-zero elements from GF (q); therefore, q > z. Note however, that the above discussion focused only GS0 . As the argument needs to apply for all GSa where 0 ≤ a < α, we need q > α. To verify GS1 \i has full rank, we just need to check D has full rank (as A is full rank). Checking that D has full rank can be further simplified as follows. As bz1 +1 6= 0, we can move the corresponding column that has bz1 +1 as its first entry so that it is the first column of D. Following this, consider C(c1 , c2 )(t−1)×t \ ci1 which is obtained by deleting the i1 -th column of C(c1 , c2 )(t−1)×t .   D1 D2 C(c1 , c2 )(t−1)×t \ ci1 = , D3 D4 Proof of Claim 7 Note that the matrix in eq. (4) is the generator matrix of (n, k) linear block code over GF (q) where nz = (z + 1)(k + 1). Since z and z+1 are coprime, z is the least positive integer such that k + 1 | nz. To show G satisfies the CCP, we need to argue that all k × k submatrices of GSa where 0 ≤ a ≤ z are full rank. It is easy to check that Sa = {0, · · · , n − 1} \ {t(z − a), t(z − a) + 1, · · · , t(z − a) + t − 1}. We verify three types of matrix GSa as follows: I. a = 0 II. a = 1 III. a > 1. 17 It×t 0t×t .. . 0t×t 0t×t It×t ··· ··· 0t×t 0t×t 0t×t It×t 0(t−1)×t 0(t−1)×t {z ··· ···  G S1     D=       =     | ··· ··· 01×t 0i2 ×t 0t×t 0(t−1)×t 0(t−1)×i2 where D1 is a i1 × i1 matrix as follows  c1 c2 0 0 ··· 0  0 c1 c2 0 · · · 0   D1 =  ...  0 0 0 ··· 0 c1 0 0 0 ··· 0 0 D4 is a i2 × i2 matrix as follows  c2 0 0 ··· 0 c1 c2 0 · · · 0   D4 =  ...  0 0 ··· 0 c1 0 0 ··· 0 0 0 0 c2 c1 ··· ··· 01×t 0i2 ×t It×t 0(t−1)×t 0 0  ..  , .  c2  c1  0 0  ..  , .  0 c2  A B C D          (12) Case 2 01×i1 bz1 +1 01×i2 0i2 ×(i1 +1) bz1 +1 Ii2 ×i2 .. . bz−1 It×t C(c1 , c2 )(t−1)×t 1        (13) 0 ··· 0 ··· 0 bz−a+1 det(F) = (bz−a+1 −bz1 +1 )bt−1 z−a+1 . Since z1 6= z −a and then bz1 +1 6= bz−a+1 , the above matrix has full rank and det(GSa \i ) = ±(bz−a+1 − bz1 +1 )bt−1 z−a+1 6= 0, so that GSa \i has full rank. Case 2: By deleting i-th column of GSa , where z1 t ≤ i < (z1 + 1)t, z − a ≤ z1 ≤ z − 3, the proof that the resultant matrix has full rank is similar to the case that z1 ≤ z − a − 1 and we omit it here. Case 3: By deleting i-th column of GSa , where (z−2)t ≤ i ≤ (z −1)t−2, i1 = i−(z −2)t and i2 = (z −1)t−2−i, the resultant matrix is as follows,   A C GSa \i = , B D where A = I(z−1)t×(z−1)t , B = 0(t−1)×(z−1)t , C is obtained by deleting the (i − (z − 1)t)-th column of matrix [b1 It×t b2 It×t · · · bz−1 It×t ]T and D is C(c1 , c2 )(t−1)×t \ ci−(z−1)t . Since i−(z−1)t zt−i−1 det(D) = c1 c2 6= 0, det(GS1 \i ) = i−(z−1)t zt−i−1 c2 6= 0 and therefore GS1 \i has full ±c1 rank. Type III when a > 1, GSa has the form in eq. (14). As before we perform a case analysis. Each of the cases is specified by the corresponding underbrace in eq. (14). Case 1: By deleting the i-th column of GSa , where z1 t ≤ i < (z1 + 1)t, z1 ≤ z − a − 1, i1 = i − z1 t, and i2 = (z1 + 1)t − i − 1, the block form of the resultant matrix GSa \i can be expressed as follows, GSa \i = }  C = [0i1 ×i2 0i1 ×t · · · 0i1 ×(t−1) 1i1 b1 Ii1 ×i1 0i1 ×(i2 +1) ] and if z1 = z − a − 1, D has the form in (17). To verify that GSa \i has full rank, we just need to check D has full rank. Owing to the construction of D, we have to check the determinant of the following (t+1)×(t+1) matrix.   1 0 0 · · · bz1 +1 · · · 0 1 bz−a+1 0 ··· 0 ··· 0    1 0 bz−a+1 · · · 0 ··· 0  F= ;   .. ..  . .  and D2 and D3 are i1 × i2 and i2 × i1 all zero matrices respectively. Then det(C(c1 , c2 )(t−1)×t \ ci1 ) = ci11 ci22 and det(GS1 \i ) = ±bz1 +1 ci11 ci22 6= 0. Case 2: By deleting any of last t columns in GS1 , say i-th column of GS1 , where (z − 1)t ≤ i < zt, the block form of resultant matrix GS1 \i can be expressed as follows.   A C , GS1 \i = B D • 0(t−1)×t Case 1 01×i2 Ii2 ×i2 .. . 0t×i2 b1 It×t b2 It×t .. . bz−1 It×t C(c1 , c2 )(t−1)×t | {z } where A = I(z−a)t×(z−a)t B = 0(k−(z−a)t)×(z−a)t  0t×t · · · 0t×(t−2)  .. C= . 0t×t · · ·  0t×t   D=   , where A = Ii×i , B = 0(k−i)×i , C and D has the form in eq. (15) and eq. (16), respectively. Note that if z1 = 0, It×t . . . 0(t−1)×t 0t×(t−2) ··· ··· ··· 1t 1t  b1 It×t  ..  . bz−a It×t 0t×(t−2) 0t×(t−2) Ii1 ×i1 01×i1 0i2 ×i1 0i1 ×i2 01×i2 Ii2 ×i2 1t 1t . . . bz−a+1 It×t bz−a+2 It×t 1t−1 C(c1 , c2 )(t−1)×t To verify GSa \i has full rank, we need to check the determinant of D. Owing to the construction of D, the 18       GSa It×t .. . 0t×t 0t×t 0t×t . .. 0t×t         =        0(t−1)×t | ··· ··· ··· ··· ··· ··· {z 0t×t .. . 0t×t 0t×t It×t . .. 0t×t 0(t−1)×t 0(t−1)×t } Case 1    C=          D=            D=    ··· 0t×t .. . It×t 0t×t 0t×t . .. 0t×t 0t×i2 .. . 0t×i2 0i1 ×i2 ··· ··· ··· Case 2 ··· 0t×t ··· ··· 0t×t 0i1 ×t 1t 0t×(t−1) 0i1 ×(t−1) 1t 1i1 I(t−1)×(t−1) {z } Case 3 Case 4 b1 It×t .. . bz1 It×t bz1 +1 Ii1 ×i1 0i1 ×(i2 +1)  b1 It×t  ..   .   bz−a It×t  bz−a+1 It×t   bz−a+2 It×t   .  ..    bz−1 It×t  C(c1 , c2 )(t−1)×t  {z } |      (15) ··· ··· ··· ··· ··· ··· ··· ··· ··· 0t×t 0t×t ··· ··· 0t×t It×t ··· ··· 0(t−1)×i2 0(t−1)×t ··· 0(t−1)×t ··· I(t−1)×(t−1) 1t−1 C(c1 , c2 )(t−1)×t 01×i2 Ii2 ×i2 0t×i2 0t×i2 . .. 01×t 0i2 ×t 0t×t 0t×t ··· ··· ··· ··· ··· ··· 0t×t It×t ··· ··· ··· ··· 01×(t−1) 0i2 ×(t−1) 0t×(t−1) 0t×(t−1) 1 1i2 1t 1t 0(t−1)×i2 0(t−1)×t ··· 0(t−1)×t ··· I(t−1)×(t−1) 1t−1 01×i2 01×i1 bz−a 0i2 ×(i1 +1) bz−a Ii2 ×i2 bz−a+1 It×t bz−a+2 It×t . .. C(c1 , c2 )(t−1)×t 0 0 0 ··· 0 0  .. .  ,  ··· 0 0 0 ··· bz−a+1 0 c1 c2 0 ··· 0 01×(t−1) 0i2 ×(t−1) 0t×(t−1) .. . 0t×(t−1) 0t×(t−1) (14) Case 5 01×t 0i2 ×t It×t 1 bz−a+1 0 ··· 0 0 0 ··· 1 0 bz−a+1 ··· 0 0 0 ··· 1 1 0t×(t−1) | 1t .. . 1t 1t 1t .. . 1t 1t−1 | {z } 01×i2 Ii2 ×i2 0t×i2 .. . 0t×i2 0t×i2 .. . following matrix is required to be full rank,   1t bz−a+1 It×t 0 D = 1 C(c1 , c2 )(t−1)×t (i1 )   . =  .. ··· · · · 0(t−1)×(t−1) {z } | 0t×(t−1) .. . 0t×(t−1) 0t×(t−1) 0t×(t−1) .. . 0t×(t−1) 0t×t .. . 0t×t 0t×t 0t×t . .. It×t 1 1i2 1t 01×i1 bz1 +1 01×i2 0i2 ×(i1 +1) bz1 +1 Ii2 ×i2 bz1 +2 It×t 1t 1t bz−a+1 It×t bz−a+2 It×t .. .                (16)      .    (17) Case 5: By deleting i-th column of GSa , where (z−1)t ≤ i < zt and i1 = i−(z−1)t, the block form of the resultant matrix GSa \i can be expressed as eq. (19). where bs It×t \ ci1 denotes the submatrix obtained by deleting i1 -th column of bs It×t and C(c1 , c2 )(t−1)×t \ci1 denotes the submatrix obtained by deleting i1 -th column of C(c1 , c2 )(t−1)×t \ ci1 . To verify GSa \i has full rank, we just need to check [1t |bz−a+1 It×t \ ci1 ] has full rank. Since [1t |bz−a+1 It×t ] has the following form,   1 bz−a+1 0 ··· 0 1 0 bz−a+1 · · · 0     .. ..  , . .  1 0 0 · · · bz−a+1 where C(c1 , c2 )(t−1)×t (i1 ) denotes the i1 -th row of C(c1 , c2 )(t−1)×t , 0 ≤ i ≤ t − 2. det D0 = det(bz−a+1 It×t ) · det(1− C(c1 , c2 )(t−1)×t (i1 ) · (b−1 z−a+1 It×t ) · 1t ) =btz−a+1 (1 − b−1 z−a+1 (c1 + c2 )) by deleting any column of above matrix, it is obvious that det([1t |bz−a+1 It×t \ci1 ]) = ±bt−1 z−a+1 and det(GSa \i ) 6= 0. Since bz−a+1 6= 0 and c1 +c2 = 0, det D0 6= 0 and D0 has full rank. Then det(D) = btz−a+1 (1−b−1 z−a+1 (c1 +c2 )) 6= 0 and thus GSa \i is full rank. Case 4: By deleting i-th column of GSa , where i = (z − 1)t − 1, the block form of the resultant matrix GSa \i can be expressed as eq. (18). Evidently, det(GSa \i ) = ±btz−a+1 , so that GSa \i has full rank. Proof of Claim 8 Let z be the least integer such that k + 1 | nz. First, we argue that z is the least integer such that k+1 | (n+s(k+1))z. Assume that this is not true, then there exists z 0 < z such that 19  GSa \i  GSa \i It×t  ..  .   0  t×t  =  0t×t  0  t×t  ..   . 0(t−1)×t It×t .. . 0t×t 0t×t 0t×t .. .       =      0(t−1)×t ··· 0t×t 0t×t ··· 0t×(t−1) ··· ··· ··· It×t 0t×t 0t×t 0t×t 0t×t It×t ··· ··· ··· 0t×(t−1) 0t×(t−1) 0t×(t−1) ··· 0(t−1)×t 0(t−1)×t ··· I(t−1)×(t−1)  b1 It×t  ..  .   bz−a It×t  bz−a+1 It×t   bz−a+2 It×t    ..   . C(c1 , c2 )(t−1)×t ··· 0t×t 0t×t ··· 0t×(t−1) 1t ··· ··· ··· It×t 0t×t 0t×t 0t×t 0t×t It×t ··· ··· ··· 0t×(t−1) 0t×(t−1) 0t×(t−1) 1t 1t 1t ··· 0(t−1)×t 0(t−1)×t ··· I(t−1)×(t−1) 1t−1 k + 1 | (n + s(k + 1))z 0 . As n ≥ k + 1 and k + 1 | s(k + 1)z 0 this implies that k + 1 | nz 0 which is a contradiction. Next we argue that G0 satisfies the CCP, i.e., all k × k submatrices of each G0Sa0 , where Ta0 = {a(k + 1), · · · , a(k + nz 1)+k} and Sa0 = {(t)n+s(k+1) |t ∈ Ta0 } and 0 ≤ a ≤ k+1 +sz, 0 are full rank. Let n = n+s(k +1). We argue it in three cases. 0 • Case 1. The first column of GS 0 lies in the first s(k + 1) a 0 columns of G . Suppose ln0 ≤ a(k + 1) < ln0 + s(k + 1) where 0 ≤ l < z − 1. By the construction of G0 , G0Sa = D. Since D = GS0 , all k × k submatrices of D have full rank and so does G0Sa . 0 • Case 2. The first and last column of GS 0 lie in the last a 0 n columns of G . Suppose ln0 + s(k + 1) ≤ a(k + 1) and a(k + 1) + k < (l + 1)n0 where 0 ≤ l < z − 1. As n0 > s(k + 1), a(k + 1)−(l+1)s(k+1) > 0 and k+1|a(k+1)−(l+1)s(k+1). Let a0 = a − (l + 1)s, then G0Sa = GSa0 and hence all k × k submatrices of G0Sa have full rank. 0 • Case 3. The first column of GS 0 lies in the last n columns a 0 of G but the last column lies in the first (k + 1) columns of G0 . Suppose ln0 + s(k + 1) ≤ a(k + 1) and a(k + 1) + k > (l + 1)n0 where 0 ≤ l < z − 2. Again, we can get k + 1|a(k + 1) − (l + 1)s(k + 1) and let a0 = a − (l + 1)s. Let S 01 = {(a(k + 1))n0 , · · · , (ln0 + n0 − 1)n0 } and S 1 = {(a0 (k+1))n , · · · , (ln+n−1)n }. As (ln0 +n0 −1)−a(k+ 1) = (ln + n − 1) − a0 (k + 1), G0S 01 = GS 1 . Let S 02 = {(ln0 + n0 )n0 , · · · , (a(k + 1) + k)n0 } and S 2 = {(ln + n)n , · · · , (a0 (k + 1) + k)n }. By the construction of G0 , GS 2 = G0S 02 . Then G0Sa = [G0S 01 G0S 02 ] = [GS 1 GS 2 ] = GSa0 and hence all k × k submatrices of G0Sa have full rank.  b1 It×t \ ci1  ..  .   bz−a It×t \ ci1  bz−a+1 It×t \ ci1   bz−a+2 It×t \ ci1    ..   . C(c1 , c2 )(t−1)×t \ ci1 (18) (19) Using the fact that z ≤ k+1 and taking limits as n → ∞, we get that   1 FsM N 1 η lim log2 = H2 − log2 q. ∗ n→∞ K Fs q q • M N =1− k+1 nq . We have   1 F MN 1 K k+1 log2 s ∗ = log2 − log2 q K Fs K k+1 K 1 zn − log2 . K k+1 Using the fact that z ≤ k+1 and taking limits as n → ∞, we get that   1 F MN η η lim log2 s ∗ = H2 − log2 q. n→∞ K Fs q q B. Discussion on coded caching systems constructed by generator matrices satisfying the (k, α)-CCP where α ≤ k Consider the (k, α)-CCP (cf. Definition 5) where α ≤ k. Let z be the least integer such that α | nz, and let Taα = {aα, · · · , aα + α − 1)} and Saα = {(t)n | t ∈ Taα }. Let GSaα = [gi0 , · · · , giα−1 ] be the submatrix of G specified by the columns in Saα , i.e, gij ∈ GSaα if ij ∈ Saα . We demonstrate that the resolvable design generated from a linear block code that satisfies the (k, α)-CCP can also be used in a coded caching scheme. First, we construct a (X, A) resolvable design as described in Section III.A., which can be partitioned into n parallel classes Pi = {Bi,j : 0 ≤ j < q}, 0 ≤ i < n. By the constructed resolvable design, we partition each subfile Wn s into q k z subfiles Wn = {Wn,t | 0 ≤ t < q k , 0 ≤ s < z} and operate the placement scheme in Algorithm 1. In the delivery phase, for each recovery set, several equations are generated, each of which benefit α users simultaneously. Furthermore, the equations generated by all the recovery sets can recover Proof of Claim 11 M 1 all the missing subfiles. In this section, we only show that • N = q . We have for the recovery set PSaα , it is possible to generate equations   1 FsM N 1 K 1 k which benefit α users and allow the recovery of all of missing log2 = log2 − log2 z − log2 q. subfiles with given superscript. The subsequent discussion K Fs∗ K K/q K K 20 By the assumed condition, it is evident that this system of α0 equations in α0 variables has a unique solution for a given vector v = [uα0 , · · · , uk−1 ] over GF (q). Since there are 0 q k−α possible v vectors, the result follows.  exactly mirrors the discussion in the (k, k + 1)-CCP case and is skipped. Towards this end, we first show that picking α users from α distinct parallel classes can always form q k−α+1 − q k−α signals. More specifically, consider blocks Bi1 ,li1 , . . . , Biα ,liα (where lij ∈ {0, . . . , q − 1}) that are picked from α distinct k−α+1 parallel classes of PSaα . Then, | ∩α−1 and j=1 Bij ,lij | = q α k−α | ∩j=1 Bij ,lij | = q . As in the case of the (k, k +1)-CCP, we form a recovery set bipartite graph with parallel classes and recovery sets as the disjoint vertex subsets, and the edges incident on each parallel class are labeled arbitrarily from 0 to z −1. For a parallel class P ∈ PSaα we denote this label by label(P − PSaα ). For a given recovery set PSaα , the delivery phase proceeds by choosing blocks from α distinct parallel classes in PSaα and it provides q k−α+1 −q k−α equations that benefit α users. Note that in the (k, α)-CCP case, randomly picking α blocks from α parallel classes in PSaα will always result in q k−α intersections, which is different from (k, k +1)-CCP. It turns out that each equation allows a user in P ∈ PSaα to recover a missing subfile with superscript label(P − PSaα ). Let the demand of user UBi,j for i ∈ n−1, 0 ≤ j ≤ q−1 by Wκi,j . We formalize the argument in Algorithm 4 and prove that equations generated in each recovery set PSaα can recover all missing subfile with superscript label(P − PSaα ). Claim 12. Consider the resolvable design (X, A) constructed by a (n, k) linear block code that satisfies the (k, α) CCP. Let PSaα = {Pi | i ∈ Saα } for 0 ≤ a < zn α , i.e., it is the set of parallel classes corresponding to Saα . We emphasize that |PSaα | = α ≤ k. Consider blocks Bi1 ,li1 , . . . , Biα0 ,li 0 (where α lij ∈ {0, . . . , q − 1}) that are picked from any α0 distinct 0 parallel classes of PSaα where α0 ≤ α. Then, | ∩α j=1 Bij ,lij | = 0 q k−α . The above argument implies that any α −1 blocks from any α − 1 distinct parallel classes of PSaα have q k−α+1 points in common and any α blocks Bi1 ,li1 , Biα ,liα from any α distinct parallel classes of PSaα have q k−α points in common. These blocks (or users) can participate in q k−α+1 − q k−α equations, each of which benefits α users. In particular, each user will recover a missing subfile indexed by an element belonging to the intersection of the other α − 1 blocks in each equation. A very similar argument to Lemma 2 can be made to justify enough equations can be found that allow all users to recover all missing subfiles. Algorithm 4: Signal Generation Algorithm for PSaα 1 2 Proof. Recall that by the construction in Section III.A, block Bi,l ∈ Pi is specified as follows, /* Pick blocks from distinct parallel classes in PSaα . The cardinality of their intersection is always q k−α */ Bi,l = {j : Ti,j = l}. Let G = [gab ], for 0 ≤ a < k, 0 ≤ b < n. Now consider Bi1 ,li1 , . . . , Biα0 ,li 0 (where ij ∈ Saα , lij ∈ α {0, . . . , q −1}) that are picked from α0 distinct parallel classes of PSaα . W.l.o.g. we assume that i1 < i2 < · · · < iα0 . Let I = {i1 , . . . , iα0 } and TI denote the submatrix of T obtained by retaining the rows in I. We will show that the vector 0 [li1 li2 . . . liα0 ]T is a column in TI and appears q k−α times in it. We note here that by the (k, α)-CCP, the vectors gi1 , gi2 , . . . , giα are linearly independent and thus the subset of these vectors, gi1 , · · · , giα0 are linearly independent. W. l. o. g., we assume that the top α0 × α0 submatrix of the matrix [gi1 gi2 . . . giα0 ] is full-rank. Next, consider the system of equations in variables u0 , . . . , uα0 −1 . 0 αX −1 b=0 0 αX −1 b=0 ub gbi1 = li1 − ub gbi2 = li2 − k−1 X 3 b=0 Find set L̂s = ∩j∈Saα \{s} Bj,lj \ ∩j∈Saα Bj,lj for s ∈ Saα ; /* Determine the missing subfile indices that the user from Psα will recover. Note that |L̂s | = q k−α+1 − q k−α */ 4 E(Ps ) , s,ls ,L̂s [t] k−α Add signals ⊕s∈Saα Wκ 0 ≤ t < q k−α+1 − q , to Sig; /* User UBs,ls demands file Wκs,ls . This equation allows it to recover the corresponding missing subfile index L̂s [t], which is the t-th element of L̂s [t]. The superscript is determined by the recovery set bipartite graph */ 5 ub gbi1 , end Output: Signal set Sig. b=α0 k−1 X For the sake of convenience we argue that user UBβ,lβ that demands Wκβ,lβ can recover all its missing subfiles with superscript E(Pβ ). Note that Bβ,lβ = q k−1 . Thus user UBβ,lβ needs to obtain q k − q k−1 missing subfiles with superscript E(Pβ ). The delivery phase scheme repeatedly picks α users from different parallel classes of PSaα . The equations in AlgoE(P ) rithm 4 allow UBβ,lβ to recover all Wκ β,L̂ [t] where L̂β = ub gbi2 , b=α0 .. . 0 αX −1 Input : For P ∈ PSaα , E(P) = label(P − PSaα ). Signal set Sig = ∅. while any user UB ∈ Pj , j ∈ Saα does not recover all its missing subfiles with superscript E(P) do Pick blocks Bj,lj ∈ Pj for all j ∈ Saα and lj ∈ {0, . . . , q − 1}; ub gbiα0 = liα0 − k−1 X ub gbiα0 . b=α0 β,lβ 21 β ∩j∈Saα \{β} Bj,lj \ ∩j∈Saα Bj,lj and t = 1, · · · , q k−α+1 − q k−α . This is because of Claim 12. Next, we count the number of equations that UBβ,lβ participates in. We can pick α − 1 users from α − 1 parallel classes in PSaα . There are totally q α−1 ways to pick them, each of which generate q k−α+1 − q k−α equations. Thus there are a total of q k − q k−1 equations in which user UBβ,lβ participates in. It remains to argue that each equation provides a distinct file part of user UBβ,lβ . Towards this end, let {i1 , · · · , iα−1 } ⊂ Saα be an index set such that β∈ / {i1 , · · · , iα−1 } but β ∈ Saα . Note that when we pick the same set of blocks {Bi1 ,li1 , · · · , Biα−1 ,liα−1 }, it is impossible E(Pβ ) β,lβ ,L̂β [t1 ] that the recovered subfiles Wκ E(Pβ ) β,lβ ,L̂β [t2 ] and Wκ where each c(i) is a codeword of C i (the cyclic code over GF (qi )). Thus, the b-th component ∆b can be mapped to (1) (2) (d) (cb , cb , . . . , cb ) (i) i Let G = [gab ] represent the generator matrix of the code C i . Based on prior arguments, it is evident that there are qiki −1 Pki −1 (i) distinct solutions over GF (qi ) to the equation a=0 ua gab = (i) cb . In turn, this implies that ∆b appears q1k1 −1 q2k2 −1 · · · qdkd −1 times in the b-th row of T and the result follows. Next we show any α blocks from distinct parallel classes of PS kmin have q1k1 −α q2k2 −α · · · qdkd −α intersections, where α ≤ a kmin and Sakmin = {(akmin )n , (akmin + 1)n , · · · , (akmin + kmin − 1)n } Towards this end consider Bi1 ,li1 , . . . , Biα ,liα (where ij ∈ Sakmin , lij ∈ {0, . . . , q − 1}) that are picked from α distinct parallel classes of PS kmin . W.l.o.g. we assume that i1 < i2 < a · · · < iα . Let I = {i1 , . . . , iα } and TI denote the submatrix of T obtained by retaining the rows in I. We will show that the vector [li1 li2 . . . liα ]T is a column in TI and appears q1k1 −α q2k2 −α · · · qdkd −α times. Let ψm (lij ) for m = 1, . . . , d represent the m-th component of the map ψ. Consider the (n, k1 ) cyclic code over GF (q1 ) and the system of equations in variables u0 , . . . , uα−1 that lie in GF (q1 ). are the same since the points in L̂β are distinct. Next, suppose that there exist sets of blocks {Bi1 ,li1 , · · · , Biα−1 ,liα−1 } and {Bi1 ,li0 , · · · , Biα−1 ,li0 } such that 1 α−1 {Bi1 ,li1 , · · · , Biα−1 ,liα−1 } 6= {Bi1 ,li0 , · · · , Biα−1 ,li0 }, 1 α−1 α−1 0 . but γ ∈ ∩α−1 j=1 Bij ,lij \ Bβ,lβ and γ ∈ ∩j=1 Bij ,li0 j \ Bβ,lβ This is a contradiction T α since this in turn implies that γ ∈ ∩α ∩j=2 Bij ,li0 , which is impossible since j=2 Bij ,lij j two blocks from the same parallel class have an empty intersection. Finally we calculate the transmission rate. In Algorithm 4, for each recovery set, we transmit q k+1 − q k equations and there are totally zn α recovery sets. Since each equation has size equal to a subfile, the rate is given by R = (q k+1 − q k ) × α−1 X b=0 α−1 X zn 1 × k α zq b=0 (1) kX 1 −1 (1) b=α kX 1 −1 ub gbi1 = ψ1 (li1 ) − ub gbi2 = ψ1 (li2 ) − (1) ub gbi1 , (1) ub gbi2 , b=α .. . n(q − 1) . α The (n, k) linear block codes that satisfy the (k, α)-CCP over GF (q) correspond to a coded caching system with K = n(q−1) 1 k nq, M . Thus, the N = q , Fs = zq and have a rate R = α rate of this system is a little higher compared to the (k, k +1)CCP system with almost the same subpacketization level. However, by comparing Definitions 4 and 5 it is evident that the rank constraints of the (k, α)-CCP are weaker as compared to the (k, k + 1)-CCP. Therefore, in general we can find more instances of generator matrices that satisfy the (k, α)-CCP. For example, a large class of codes that satisfy the (k, k)-CCP are (n, k) cyclic codes since any k consecutive columns in their generator matrices are linearly independent [23]. Thus, (n, k) cyclic codes always satisfy the (k, k)-CCP but satisfy (k, k + 1)-CCP if they satisfy the additional constraints discussed in Claim 3. = α−1 X b=0 (1) ub gbiα = ψ1 (liα ) − kX 1 −1 (1) ub gbiα . b=α By arguments identical to those made in Claim 12 it can be seen that this system of equations has q1k1 −α solutions. Applying the same argument to the other cyclic codes we conclude that the vector [li1 , li2 , · · · , liα ] appears q1k1 −α q2k2 −α · · · qdkd −α times in TI and the result follows. C. Cyclic codes over Z mod q [25] First, we show that matrix T constructed by constructed by the approach outlined in Section IV-D still results in a resolvable design. Let ∆ = [∆0 ∆1 · · · ∆n−1 ] be a codeword of the cyclic code over Z mod q, denoted C where q = q1 q2 · · · qd , and qi , i = 1, . . . , d are prime. By using the Chinese remaindering map ψ (discussed in Section IV-D), ∆ can be uniquely mapped into d codewords c(i) , i = 1, . . . , d Li Tang received his B.E. degree in mechanical engineering from Beihang University, Beijing, China in 2011, and M.S. degree in electrical and information engineering from Beihang University, Beijing, China in 2014. He is currently working towards the Ph.D degree in the Department of Electrical and Computer Engineering at Iowa State University, Ames, IA, USA. His research interests include network coding and channel coding. 22 Aditya Ramamoorthy (M’05) received the B.Tech. degree in electrical engineering from the Indian Institute of Technology, Delhi, in 1999, and the M.S. and Ph.D. degrees from the University of California, Los Angeles (UCLA), in 2002 and 2005, respectively. He was a systems engineer with Biomorphic VLSI Inc. until 2001. From 2005 to 2006, he was with the Data Storage Signal Processing Group of Marvell Semiconductor Inc. Since fall 2006, he has been with the Electrical and Computer Engineering Department at Iowa State University, Ames, IA 50011, USA. His research interests are in the areas of network information theory, channel coding and signal processing for bioinformatics and nanotechnology. Dr. Ramamoorthy served as an editor for the IEEE Transactions on Communications from 2011 – 2015. He is currently serving as an associate editor for the IEEE Transactions on Information Theory. He is the recipient of the 2012 Early Career Engineering Faculty Research Award from Iowa State University, the 2012 NSF CAREER award, and the Harpole-Pentair professorship in 2009 and 2010. 23
7cs.IT
Journal of Machine Learning Research X (2017) XX-XX Submitted 12/17; Published XX/XX f -Divergence constrained policy improvement arXiv:1801.00056v1 [cs.LG] 29 Dec 2017 Boris Belousov Jan Peters [email protected] [email protected] Department of Computer Science Technische Universität Darmstadt FG IAS, Hochschulstr. 10, 64289 Darmstadt, Germany Editor: XX Abstract To ensure stability of learning, state-of-the-art generalized policy iteration algorithms augment the policy improvement step with a trust region constraint bounding the information loss. The size of the trust region is commonly determined by the Kullback-Leibler (KL) divergence, which not only captures the notion of distance well but also yields closed-form solutions. In this paper, we consider a more general class of f -divergences and derive the corresponding policy update rules. The generic solution is expressed through the derivative of the convex conjugate function to f and includes the KL solution as a special case. Within the class of f -divergences, we further focus on a one-parameter family of α-divergences to study effects of the choice of divergence on policy improvement. Previously known as well as new policy updates emerge for different values of α. We show that every type of policy update comes with a compatible policy evaluation resulting from the chosen f -divergence. Interestingly, the mean-squared Bellman error minimization is closely related to policy evaluation with the Pearson χ2 -divergence penalty, while the KL divergence results in the soft-max policy update and a log-sum-exp critic. We carry out asymptotic analysis of the solutions for different values of α and demonstrate the effects of using different divergence functions on a multi-armed bandit problem and on common standard reinforcement learning problems. Keywords: Reinforcement Learning, Policy Search, Bandit Problems 1. Introduction Many state-of-the art reinforcement learning algorithms, including natural policy gradients (Kakade, 2001; Bagnell and Schneider, 2003; Peters et al., 2003), trust region policy optimization (TRPO) (Schulman et al., 2015) and relative entropy policy search (REPS) (Peters et al., 2010), impose a Kullback-Leibler (KL) divergence constraint between successive policies during parametric policy iteration to avoid large steps towards unknown regions of the state space. Similar objective functions with an entropy-like term have been proposed in the context of linearly-solvable optimal control (Kappen, 2005; Todorov, 2006) and inverse reinforcement learning (Ziebart et al., 2008). In all these approaches, the objective function has the form of the free energy, therefore they all can be viewed as performing free energy minimization (Still and Precup, 2012). In this paper, we explore the implications of using a generic f -divergence to constrain the policy improvement. The objective function in this case resembles the free energy objective, c 2017 Boris Belousov and Jan Peters. License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/. Attribution requirements are provided at http://jmlr.org/papers/vX/XXX.html. Belousov and Peters commonly encountered in variational methods (Wainwright and Jordan, 2007), but with the KL divergence replaced by an f -divergence. The idea of using f -divergence penalties for general non-linear problems goes back to the early work by Teboulle (1992). Generalizations of the KL divergence—apart from being very useful at providing a unified view of existing algorithms, e.g., statistical inference can be seen as f -divergence minimization (Altun and Smola, 2006) and various message passing algorithms can be understood as minimizing different α-divergences (Minka, 2005),—pave the way to new algorithms that are better suited for particular problems—e.g., the generative adversarial networks (GANs) (Goodfellow et al., 2014) minimize a particular f -divergence, the Jensen-Shannon divergence, which is well-suited for measuring similarity between real-world images (Nowozin et al., 2016). This paper is, to our knowledge, the first to shed light on policy improvement in reinforcement learning from the f -divergence point of view. 2. Background This section provides the background on the f -divergence, the α-divergence, and the convex conjugate function, highlighting the key properties required for our derivations. The f -divergence (Csiszár, 1963; Morimoto, 1963; Ali and Silvey, 1966) generalizes many similarity measures between probability distributions (Sason and Verdu, 2016). For two distributions π and q on a finite set A, the f -divergence is defined as   X π(a) Df (πkq) , q(a)f , q(a) a∈A y-axis where f is a convex function on (0, ∞) such that f (1) = 0. For example, the KL divergence corresponds to fKL (x) = x log x. Note that π must be absolutely continuous with respect to q to avoid division by zero, 4 y = α(α − 1) 2 Neyman χ Pearson χ2 i.e., q(a) = 0 implies π(a) = 0 for all a ∈ A. We addition- 3 ally assume f to be continuously differentiable, which includes 2 all cases of interest for us. The f -divergence can be general1 ized to unnormalized distributions. For example, the generKL alized KL divergence (Zhu and Rohwer, 1995) corresponds to 0 Reverse KL f1 (x) = x log x − (x − 1). The derivations in this paper bene-−1 Hellinger distance 0 1 2 3 fit from employing unnormalized distributions and subsequently −2 −1 Parameter α imposing the normalization condition as a constraint. Figure 1: The α-divergence The α-divergence (Chernoff, 1952; Amari, 1985) is a one- smoothly connects several parameter family of f -divergences generated by the α-function prominent divergences. fα (x) with α ∈ R. The particular choice of the family of functions fα is motivated by generalization of the natural logarithm (Cichocki and Amari, 2010). The α-logarithm logα (x) , (xα−1 − 1)/(α − 1) is a power function for α 6= 1 that turns into the natural logarithm for α → 1. Replacing the natural logarithm in the derivative of the KL divergence f10 = log x by the α-logarithm and integrating fα0 under the condition that fα (1) = 0 yields the α-function fα (x) , (xα − 1) − α(x − 1) . α(α − 1) 2 (1) f -Divergence constrained policy improvement Divergence KL Reverse KL 2 α 1 0 Pearson χ 2 Neyman χ2 −1 Hellinger 1 2 f 0 (x) f (x) x log x − (x − 1) − log x + (x − 1) log x 1 +1 −x 1 (x − 1)2 2 (x−1)2 2x 2 √ (f ∗ )0 (y) x−1 − 12 + 1 2 2x 2 − √2  x−1 2 x y e 1 1−y y+1 √ 1 1−2y 4 (2−y)2 f ∗ (y) dom f ∗ y e −1 − log(1 − y) 1 (y 2 2 R y<1 1 2 + 1) − √ − 1 − 2y + 1 2y 2−y y > −1 y< 1 2 y<2 Table 1: Function fα , its convex conjugate fα∗ , and their derivatives for some values of α The α-divergence generalizes the KL divergence, reverse KL divergence, Hellinger distance, Pearson χ2 -divergence, and Neyman (reverse Pearson) χ2 -divergence. Figure 1 displays well-known α-divergences as points on the parabola y = α(α − 1). For every divergence, there is a reverse divergence symmetric with respect to the point α = 0.5, corresponding to the Hellinger distance. The convex conjugate of f (x) is defined as f ∗ (y) = supx∈dom f {hy, xi − f (x)}, where the angle brackets hy, xi denote the dot product (Boyd and Vandenberghe, 2004). The key property (f ∗ )0 = (f 0 )−1 relating the derivatives of f ∗ and f yields Table 1, which lists common functions fα together with their convex conjugates and derivatives. In the general case (1), the convex conjugate and its derivative are given by α 1 1 (1 + (α − 1)y) α−1 − , αp α (fα∗ )0 (y) = α−1 1 + (α − 1) y, fα∗ (y) = for y(1 − α) < 1. (2) Function fα is convex, non-negative, and attains minimum at x = 1 with fα (1) = 0. Function (fα∗ )0 is positive on its domain with (fα∗ )0 (0) = 1. Function fα∗ has the property fα∗ (0) = 0. The linear inequality constraint (2) on the dom fα∗ follows from the requirement dom fα = (0, ∞). Another result from convex analysis crucial to our derivations is Fenchel’s equality f ∗ (y) + f (x? (y)) = hy, x? (y)i, (3) where x? (y) = arg supx∈dom f {hy, xi − f (x)}. We will occasionally put the conjugation symbol at the bottom, especially for the derivative of the conjugate function f∗0 , (f ∗ )0 . 3. Policy improvement with f -divergence for multi-armed bandits In order to develop intuition regarding the influence of entropic penalties on policy improvement, we first consider a simplified version of the reinforcement learning problem—namely, the stochastic multi-armed bandit problem (Bubeck and Cesa-Bianchi, 2012). The resulting algorithm is closely related to the family of Exp3 algorithms (Auer et al., 2003), which are extremely good on adversarial bandit problems but have fallen behind the state-of-the-art for stochastic bandit problems. We nevertheless focus on the stochastic bandit problems to illustrate crucial effects of entropic penalties on policy improvement in a clean intuitive way. This section is meant to serve as a foundation for the reinforcement learning section. At every time step t ∈ {1, . . . , T }, an agent chooses among K actions a ∈ A and after every choice at = a receives a noisy reward rt = r(at , t ) drawn from a distribution with 3 Belousov and Peters mean Q(a) P = E [r(a, )]. The goal of the agent is to maximize the expected total reward J , E[ Tt=1 rt ]. If the agent knew the true value of each action Q(a), the optimal strategy would be to always choose the action with the highest value, a∗t = arg maxa Q(a). However, since the agent does not know Q in advance, it faces the exploration-exploitation dilemma at every time step. It can either pick the best action according to the current estimate of action values Q̃t or try an exploratory action that may turn out to be better than arg max Q̃t . A generic way to encode the exploration-exploitation trade-off is by introducing a policy πt , that is, a distribution over a ∈ A from which the agent draws an action at ∼ πt . Thus, the question becomes: given the current policy πt and the current estimate of action values Q̃t , what should the policy πt+1 at the next time step be? Unlike the choice of the best action under perfect information, such sampling policies are hard to derive from first principles (Ghavamzadeh et al., 2015). In this section, we formalize the exploration-exploitation trade-off by choosing the next stochastic policy to maximize the expectation of Q̃t while regularizing the change in the policy through the f -divergence. This formalization always yields both a convex optimization problem and, as its solution, the next stochastic policy. For the α-divergence, we obtain both classical policy updates (e.g., -greedy, softmax, etc.) as well as novel ones resulting from different α’s. Empirical evaluations on a simulated multi-armed bandit environment illustrate the differences in policy updates corresponding to various penalty functions. 3.1 f -Divergence constrained policy optimization problem for bandits A policy improvement at time step t is derived by maximizing the expected return J(π) , Ea∼π [Q(a)] while punishing the policy change between the old policy q(a) , πt (a) and the new policy π(a) , πt+1 (a) by an f -divergence as a kind of regularization. This regularization is added to the objective function weighted by a ‘temperature’ η to trade-off exploration vs exploitation. For simplicity, the current estimate of action values is denoted by Q(a) , Q̃t (a). A policy π that achieves a higher expected return than q is a solution of the following optimization problem   X X π(a) max Jη (π) = Q(a)π(a) − η q(a)f , π q(a) a a X (4) s.t. π(a) = 1, a π(a) ≥ 0, ∀a ∈ A. Different formulations of Problem (4) with the KL divergence in place of the f -divergence have been proposed. An inequality constraint (Peters et al., 2010) bounding the information loss by certain fixed amount  can automatically yield an η as a Lagrange multiplier found during optimization. Alternating between maximization of the expected return at fixed information loss and subsequent information loss minimization at constant expected return (Still and Precup, 2012) yields algorithms that allow for automatic adaptation of . In (4), the divergence is added as a penalty, as suggested by Azar and Kappen (2012). Since the treatment of these three mathematical problems differs only in the sets of hyperparameters, our results straightforwardly generalize to the other two formulations. 4 f -Divergence constrained policy improvement Differentiating the Lagrangian of problem (4) Lη (π, λ, κ) = X a Q(a)π(a) − η X a q(a)f (π(a)/q(a)) − λ X a π(a) − 1 ! + X κ(a)π(a) a with respect to π(a) and equating the derivative to zero, we find an expression for the optimal new policy π ? through the derivative of the convex conjugate function   Q(a) − λ + κ(a) ? 0 . (5) π (a) = q(a)f∗ η Substituting π ? back into the Lagrangian and using Fenchel’s equality (3), we arrive at the dual problem   X ∗ Q(a) − λ + κ(a) min g(λ, κ) = η q(a)f + λ, λ, κ η a (6) s.t. κ(a) ≥ 0, ∀a ∈ A, arg f ∗ ∈ rangex ≥ 0 f 0 (x), ∀a ∈ A. The constraint on the argument of the convex conjugate has a particularly simple linear form (2) for the α-function fα (y); see Section 2 for the necessary background. In the very special KL divergence case it completely disappears because range f10 = R, see Table 1 for well-known divergences. In the multi-armed bandit scenario, one is free to choose whether to solve the optimization problem in the primal form (4) or in the dual form (6). However, as we will see later, the dual formulation (6) is much better suited for reinforcement learning. When the Lagrange multipliers κ disappear. When choosing function f , it is important to consider whether 0 ∈ dom f 0 (x), as it implies that the improved policy can put zero mass on some actions. Although f is not required to have a finite value at x = 0 by definition, for many divergences it does (e.g., for any α-divergence for α > 1) or it has a finite limit (e.g., for the KL divergence). However, even those functions f that are defined at zero do not necessarily have a finite derivative at zero (e.g., for the KL-divergence f10 (x) = log x). If 0 ∈ / dom f 0 (x), the new policy π cannot put zero probability mass on actions that were possible under the old policy q. In other words, if q(a) > 0, then π(a) > 0, and the complementary slackness condition κ(a)π(a) = 0 implies κ(a) = 0. Therefore, we can ignore the non-negativity constraint if f 0 has a singularity at x = 0. Thereby, one commonly omits the non-negativity constraint when using the KL divergence or the reverse KL. In general, κ(a) = 0 for any fα with α ≤ 1. On the other hand, if 0 ∈ dom f 0 (x), some actions may get zero probability under the new policy, and κ(a) 6= 0. This case emerges for fα with α > 1. 3.2 Effects of the exploration-exploitation-tradeoff and the divergence type The exploration-exploitation parameter η controls the step size, while the divergence type α affects the search direction. Greedy policy vs no change: effects of the temperature parameter η. Independent of the f -divergence chosen, the temperature parameter η controls the magnitude of deviation of the new policy from the old one. The optimal Lagrange multiplier λ? plays 5 Belousov and Peters the role of the baseline similar as in policy gradient methods (Sutton et al., 2000; Peters and Schaal, 2006). For low temperatures η → 0, the policy π ? (a) → δ(a, arg maxa Q(a)) ? tends towards greedy action selection (Sutton and Barto, 1998) Pwith λ → maxa Q(a). ? ? For η → ∞, both the policy π (a) → q(a) and the baseline λ → a q(a)Q(a) do no longer change. For other values of η, the agent chooses an intermediate solution between focusing on a single best action and remaining close to the old policy. From -greedy to -elimination: effects of α on policy improvement. Given the functional form of the policy update (5), we can find the Lagrange multipliers λ and κ and thus obtain a closed-form solution of Problem (4) in two cases: when f∗0 is exponential or linear, which corresponds to α = 1 and α = 2. For other α’s, we have to solve the optimization problem numerically. Table 2 summarizes the Table 2: Effects of α on effects of α on policy improvement. For α  0, we recover the - the policy ∀η > 0 greedy action selection method (Sutton and Barto, 1998), which Policy π α assigns probability 1− to the best action and spreads the remaining greedy −∞ probability mass uniformly among the rest; parameter η is propor-greedy α0 tional to , see Section 3.2. Values of α ≤ 1 correspond to -soft poli-soft α≤1 soft-max α=1 cies (Sutton and Barto, 1998); parameter α controls the distribution linear α=2 of probability mass among suboptimal actions: large negative values -elimin. α1 of α correspond to more uniform distributions, whereas smaller α’s elimination +∞ distribute the probability mass according to values. When α = 1, we arrive at a form of the soft-max policy (Bridle, 1990) with the log-sum-exp baseline 1 ? π (a) = q(a)e 1 (Q(a)−λ? ) η Q(a) q(a)e η =P , 1 Q(b) η b q(b)e P with λ? = η log a q(a) exp(Q(a)/η), where the regular soft-max arises for a uniform distribution q(a) = U(a) over all arms. That the soft-max policy results from using the KL divergence as a measure of distance has been suggested several times in the literature (Azar and Kappen, 2012; Peters et al., 2010; Still and Precup, 2012). Further increasing α to α = 2, we obtain a linear policy   Q(a) − λ? + κ(a) π ? (a) = q(a) +1 , η X ? λ = q(a)(Q(a) + κ(a)). a As pointed out in Section 3.1, some actions may get zero probability under π ? when α > 1. Therefore, in general one needs to keep track of the Lagrange multipliers κ. However, we can simplify analysis by dropping κ for sufficiently large η. Indeed, if q(a) > 0 for all a ∈ A, there exists a temperature η > ηmin for which π ? (a) > 0, and thus the inequality constraints are inactive. This minimum temperature ηmin = | mina A(a)| is defined in terms of the advantage function A(a) , Q(a) − J(q) = Q(a) − 6 P b q(b)Q(b) f -Divergence constrained policy improvement which measures agent’s gain from taking action a instead of following policy q. The baseline λ? equals the expected return J(q) under policy q when κ = 0. Thus, for any η > ηmin , we obtain a linearly advantage-reweighted policy   1 + A(a) ? π (a) = q(a) . η For α  1, we obtain a new policy, that we call -elimination. Under this policy, all actions get equal probability except for the set of the worst actions that gets probability zero; the size of the set depends on α and η. From Qmax to Qmin : effects of α on the baseline. To complete the picture, we describe the asymptotic behavior of λ? when the divergence type α is varied. Consider the limit α → −∞ of large negative α. As established in Section 3.1, Lagrange multipliers κ vanish for α < 1. For sufficiently large α, the solution hits the inequality constraint in (6), from which the lower bound on λ? Table 3: Effects of α on λ? ≥ Q(a) − η, the baseline ∀η > 0 ∀a ∈ A with  = 1/(1 − α) can be obtained. Given that it holds for all a, it also holds for the maximum over a. Since the solution lies at the constraint, in the limit one obtains n o lim λ? = lim max Q(a) − η = max Q(a). α→−∞ →0 a a Baseline λ α Qmax (Q̄, Qmax ) log-sum-exp Q̄ (Qmin , Q̄] Qmin −∞ α≤1 α=1 α=2 α>1 +∞ Recall from Section 3.2 that for a fixed α the baseline λ? shifts towards the interior of the feasible set when the temperature η is increased, i.e., limη→∞ λ? = Ea∼q [Q(a)] , Q̄. Therefore, the optimal baseline λ? for any divergence α < 1 lies in the range λ? ∈ (Q̄, Qmax ). The same analysis for α > 1 yields λ? ∈ (Qmin , Q̄]. Table 3 summarizes these asymptotic results. 3.3 Empirical evaluation of policy improvement with f -divergence in bandits The effects of the divergence type are demonstrated on a simulated stochastic multi-armed bandit problem. Policy improvement in a single iteration as well as regret over a period of time are compared for different values of α. Regret Effects of α on policy improvement. Figure 3 shows the effects of α-divergence on policy update. We consider a 10-armed bandit problem with arm values Q(a) ∼ N (0, 1). The temperature is kept fixed at η = 2 for all values of α. Initial 150 policy is uniform and the arm values Q(a) are fixed. Several iterations are shown in the figure for comparison. Extremely large 100 α=0 positive and negative values of α correspond to -elimination and α = 20 50 α = −10 -greedy policies respectively. Small values of α, in contrast, α = 10 α = −20 weigh actions according to their values. Policies for α < 1 are UCB 0 0 200 400 600 800 peaked and heavy-tailed, eventually turning into -greedy poliTime step cies when α → −∞. Policies for α ≥ 1 are more uniform, but Figure 2: Average regret they put zero mass on bad actions, eventually turning into - for various values of α. elimination policies when α → ∞. For α ≥ 1, policy iteration may spend a lot of time in the end deciding between two best actions, whereas for α < 1 the final convergence is faster. 7 Belousov and Peters α = 20 1 Arm values Q(a) 1.0 0 −1 0.8 0.0 Action probabilities π(a) α=2 1 0 −1 1 α=1 Iteration 1 0.1 0 −1 1 0.1 0.0 0.2 Iteration 3 α = −10 Iteration 25 0.5 0.1 0.0 0.0 0.0 0.2 0.5 0.0 0.0 0.2 0.5 0.6 0.0 0.0 0.0 0.2 0.2 0.4 0.1 0.0 0.0 0.0 0.0 0.50 0.0 0.2 0.25 0.25 0.5 0.0 0.00 0.00 0.0 1.0 1 2 3 4 5 6 7 8 9100.8 1 2 3 4 5 6 7 8 910 0.2 0.2 1 2 3 4 5 6 7 8 910 Iteration 4 0.1 0.2 0.1 0 −1 Iteration 2 0.0 0.0 0.01 2 3 4 5 6 7 8 910 0.2 1 2 3 4 5 6 7 8 910 0.4 1 2 3 4 5 6 7 8 910 0.6 Arm number a Arm number a Figure 3: Effects of α on policy improvement. Each row corresponds to a fixed α. First four iterations of policy improvement together with iteration 25 are shown in each row. Large positive α’s eliminate bad actions one by one, keeping the exploration level equal among the rest. Small α’s weigh actions according to their values; actions with low value get zero probability for α > 1, but remain possible with small probability for α ≤ 1. Large negative α’s focus on the best action, exploring the remaining ones with equal probability. Regret Pn−1 rt ] is shown in Figure 2 for Effects of α on regret. Average regret Cn = nQmax −E[ t=0 different values of α as a function of the time step n with 95% confidence error bars. We also plot performance of the UCB algorithm (Bubeck and Cesa-Bianchi, 2012) for comparison. The presented results are obtained in a 20-armed bandit environment where rewards have Gaussian distribution r(a) ∼ N (Q(a), σ 2 ) with variance σ 2 = 0.5. Arm values are estimated from observed rewards and the policy is updated every 20 time steps. The temperature parameter η is decreased starting from η = 1 after every policy update according to the schedule η + = βη with β = 0.8. Results are averaged over 400 runs. In general, extreme α’s accumulate more regret. However, they eventually focus on a single action and flatten out. Small α’s accumulate less regret, but they may keep exploring sub-optimal actions longer. Values of α ∈ [0, 2] perform comparably with UCB after around 400 steps, once reliable estimates of values have been obtained. 120 after 50 steps after 100 steps Figure 4 shows the average regret after a given number of 100 after 150 steps after 200 steps time steps as a function of the divergence type α. Best results 80 are achieved for small values of α. Large negative α’s correspond to -greedy policies, which oftentimes prematurely converge to a 60 sub-optimal action, failing to discover the optimal action for a 40 long time if the exploration probability  is small. Large positive −20 −10 0 10 20 α’s correspond to -elimination policies, which may by mistake Parameter α completely eliminate the best action or spend a lot of time de- Figure 4: Regret after a ciding between two options in the end of learning, accumulating fixed time as a function of α. 8 f -Divergence constrained policy improvement more regret. The optimal value of α depends on the time horizon for which one wishes to optimize the policy. The minimum of the curves shifts from slightly negative α’s towards the range α ∈ [0, 2] with increasing time horizon. 4. Policy iteration with state-action f -divergence for ergodic MDPs The methodology described in the previous section can be generalized from the bandit scenario to reinforcement learning. We focus on the average-reward setting (Sutton and Barto, 1998). At every time step, an agent finds itself in a state s ∈ S and takes an action a ∈ A drawn from a stochastic policy π(a|s). Subsequently, the agent transitions from state s to state s0 with probability p(s0 |s, a) and receives a reward r(s, a) ∈ R. The fraction of time the agent spends on average in each state s as a result of following policy π is given by the steady state distribution µ(s), which satisfies the stationarity condition µ(s0 ) = X s,a µ(s)π(a|s)p(s0 |s, a). (7) The steady state distribution is sometimes denoted by µπ (s) to emphasize its dependence on the policy. The agent seeks a policy π that maximizes the expected return X J(π) , µ(s)π(a|s)r(s, a) (8) s,a subject to the constraint (7), provided that both π and µ are probability distributions. 4.1 f -Divergence constrained policy optimization for ergodic MDPs We can generalize the bandit problem (4) by adding a single additional constraint here— namely, the stationarity condition (7). This constraint directly yields the value function (Peters et al., 2010), i.e., the policy evaluation step, as the corresponding dual variable. However, for a more straightforward Lagrangian, we rewrite (7) in terms of both policy and state distribution. Assuming we have the state-action distribution q(s, a) = µπ0 (s)π0 (a|s) under the old policy π0 (a|s) to which we aim to stay similar to with the new distribution µ(s)π(a|s) while achieving a higher expected return, we obtain the following optimization problem   X X µ(s)π(a|s) max Jη (µ, π) = µ(s)π(a|s)r(s, a) − η q(s, a)f µ,π q(s, a) s,a s,a X X s.t. µ(s0 )π(a0 |s0 ) = µ(s)π(a|s)p(s0 |s, a), ∀s0 ∈ S, 0 (9) s,a a X µ(s)π(a|s) = 1, s,a µ(s)π(a|s) ≥ 0, ∀s ∈ S, ∀a ∈ A. A similar Lagrangian as for problem (4) can be obtained where the value function v arises as an additional Lagrangian multiplier. 9 Belousov and Peters The Lagrangian of problem (9) can be written as L(µ, π, v, λ, κ) = X s,a −λ µ(s)π(a|s)Av (s, a) − η X s,a µ(s)π(a|s) − 1 ! + X q(s, a)f s,a X  µ(s)π(a|s) q(s, a)  κ(s, a)µ(s)π(a|s), s,a where A is a function of the dual variables v corresponding to the stationarity constraint (7) Av (s, a) , r(s, a) + X s0 p(s0 |s, a)v(s0 ) − v(s). (10) We note that v can be identified with the value function and A with the advantage function. The solution of Problem (9) can be expressed as a function of the dual variables   Av (s, a) − λ + κ(s, a) ? ? 0 µ (s)π (a|s) = q(s, a)f∗ , (11) η which allows extracting the optimal next policy by Bayes’ rule q(s, a)f∗0 ((Av (s, a) − λ + κ(s, a)) /η) π ? (a|s) = P . 0 b q(s, b)f∗ ((Av (s, b) − λ + κ(s, b)) /η) (12) The optimal values of the dual variables {v, λ, κ} are found by solving the dual problem   X Av (s, a) − λ + κ(s, a) +λ min g(v, λ, κ) = η q(s, a)f ∗ v,λ, κ η s,a (13) s.t. κ(s, a) ≥ 0, ∀s ∈ S, ∀a ∈ A, arg f ∗ ∈ rangex ≥ 0 f 0 (x), ∀s ∈ S, ∀a ∈ A. The constraint on arg f ∗ is linear because derivative of a convex function is monotone (Boyd and Vandenberghe, 2004). Problem (13) altogether is a convex optimization problem, therefore can be solved efficiently. A generic policy iteration algorithm employing an f -divergence penalty proceeds in two steps. Policy evaluation: the dual problem (13) is solved for a given q. Policy improvement: the analytic solution (12) of the primal problem (9) is used to update π. In the following subsection we consider several particular choices of the divergence function in more detail. 4.2 Two important special cases: α = 1 and α = 2 Similar to the bandit scenario (see Section 3.2), there are two special choices of the f divergence for which we can analytically find the Lagrange multipliers λ and κ and thus obtain the policy evaluation and policy improvement steps in the simplest form. KL divergence (α = 1). With f = f1 , policy evaluation (13) turns into   X Av (s, a) ? min g(v) = λ (v) = η log q(s, a) exp v η s,a 10 (14) f -Divergence constrained policy improvement where g(v) , L(µ? , π ? , v, λ? , κ? ) is the Lagrangian upon substitution of all variables except for v. Remarkably, the baseline λ? equals the Lagrangian dual function g, which is only true in the KL divergence case. The policy improvement step (12) takes the form q(s, a) exp (Av? (s, a)/η) π ? (a|s) = P . b q(s, b) exp (Av ? (s, b)/η) (15) Note that the baseline λ? cancels out in the policy but would be included in the state-action distribution. Pearson χ2 divergence (α = 2). When f = f2 , one needs to be careful with the dual variables κ ensuring the non-negativity of probabilities because they are not necessarily all zero (see Section 3.1). For notational simplicity, we employ differential advantage Ãv (s, a) defined as a difference between the advantage (10) and the expected return (8) Ãv (s, a) = Av (s, a) − J(π0 ), following Sutton and Barto (1998). It is straightforward to check that if the temperature η is bigger than the absolute value of the minimum differential advantage, η > ηmin = | mins,a Ãv (s, a)|, then the non-negativity constraint is satisfied and κ ≡ 0. The baseline λ? turns into the average return X λ? = q(s, a)Av (s, a) = J(π0 ), s,a becoming independent of v, in contrast to the KL divergence case. The policy evaluation step (13) corresponds to minimization of the squared differential advantage (scaled by 2η) min g(v) = v 1 X q(s, a)Ã2v (s, a) + J(π0 ), 2η s,a (16) and the policy improvement step (12) corresponds to the linear in the differential advantage reweighting of the old policy   q(s, a) 1 + Ãv? (s, a)/η  . π ? (s, a) = P (17) ? (s, b)/η q(s, b) 1 + Ã v b A careful reader shall notice that the solution for the Pearson χ2 -divergence (16, 17) can be obtained as the first-order approximation of the KL divergence solution (14, 15) in the high-temperature limit η → ∞. It turns out, an even more general statement holds. Solution (12, 13) with any f -divergence turns into the linear-quadratic Pearson χ2 solution in the limit of high temperatures (small policy update steps). The underlying reason for this is that the Pearson χ2 -divergence is a quadratic approximation of any f -divergence around unity. Since pushing η towards infinity puts more weight on the divergence penalty in the optimization objective (9), the distance between the old state-action distribution and the new one becomes smaller, justifying the Taylor expansion. Therefore, one should expect to see pronounced differences between various f -divergence penalties either for big update steps or when approximations of the value function and the policy are used. 11 Belousov and Peters 4.3 Practical algorithm: sample-based policy iteration with f -divergence Solving problem (13) and computing the optimal next policy (12) would require full knowledge of the environment {p(s0 |s, a), r(s, a)}. In practice, a reinforcement learning agent would need to estimate p and r from experience, which is prohibitively expensive in large state-action spaces. Fortunately, we can rephrase the algorithm entirely in terms of sample averages, thus side-stepping model estimation. We replace expectations by sample averages using the transitions (si , ai , s0i , ri ) gathered under the current policy. The agent does not need to visit all states—local information under the current policy suffices to compute the averages. Algorithm 1 summarizes the main steps of the f -divergence constrained policy iteration. Function approximation. If the dimensionality of the state space is large, one can resort to function approximation methods. We note that relaxing the steady state constraint (7) to a “steady features constraint” X X 0 0 µ(s )φ(s ) = µ(s)π(a|s)p(s0 |s, a)φ(s0 ). (18) 0 0 s s,a,s naturally introduces a linear function approximation vθ (s) = θT φ(s) with fixed features φ : S → Rm while the parameters θ are the new Lagrangian multipliers (Peters et al., 2010). To our knowledge, such a constraint is the only way to introduce function approximation in the same way into the primal optimization problem (9), the next policy (12), and the dual optimization problem (13). Implementation details. Several practical improvements make Algorithm 1 faster and robuster. First, the temperature parameter η should be decayed with iterations in order to guarantee convergence to a solution of the original non-penalized problem. In our experiments, simple exponential decay was sufficient; however, more complex adaptive schemes can be devised. Second, for α-divergences with α ≤ 1, one can omit the dual variables κ(s, a) because they are all equal to zero (see Section 3.1). Moreover, one can omit κ(s, a) even for α > 1 if η is sufficiently big. The exact value of ηmin above which κ can be ignored depends on the scale of the rewards; in the special case α = 2, there is an explicit condition on ηmin (see Section 4.2). Third, the estimate of the advantage Av? (s, a) for actions that were not sampled under the current policy can be set to the baseline λ? , which serves as a proxy for the expected reward; in our experiments this strategy performed best. Fourth, introducing a little slack in the linear constraint on the domain of the convex conjugate function improves robustness and helps the optimizer. 4.4 Empirical results on ergodic MDPs We evaluate our policy iteration algorithm with f -divergence on standard grid-world reinforcement learning problems from OpenAI Gym (Brockman et al., 2016). The environments that terminate or have absorbing states are restarted during data collection in order to ensure ergodicity. Figure 5 demonstrates learning dynamics on different environments for various choices of the divergence function. Parameter settings and other implementation details can be found in Appendix A. In summary, one can either promote risk averse behavior by choosing α < 0, which may, however, result in suboptimal exploration, or one can 12 f -Divergence constrained policy improvement Algorithm 1: Policy iteration with any type of f -divergence Input: Initial policy π0 (a|s), divergence function f , temperature η define Dual Function ĝ(v, λ, κ): for every sample i ← 1 to N do Â(si , ai ) ← Â(si , ai ) + (ri + v(s0i ) − v(si )) n(si , ai ) ← n(si , ai ) + 1 for every state-action pair (s, a) ∈ D do Â(s, a) ← Â(s, a)/n(s, a) ŷ(s, a) ← (Â(s, a) − λ + κ(s, a))/η P ∗ return Nη N i=1 f (ŷ(si , ai )) + λ foreach policy update k do Sampling: Gather D = {(si , ai , s0i , ri ), i = 1, N } under current policy πk (a|s) Policy Evaluation: Minimize dual function ĝ defined above {v ? , λ? , κ? } ← arg minv,λ,κ ĝ(v, λ, κ) s.t. κ(s, a) ≥ 0, ŷ(s, a) ∈ rangex ≥ 0 f 0 (x) Policy Improvement: for every state-action pair (s, a) ∈ D do 0 ? ? ? ∗ (ŷ(s,a; v ,λ ,κ )) πk+1 (a|s) ← Pπkπ(a|s)f 0 (ŷ(s,b; v ? ,λ? ,κ? )) (b|s)f ∗ b k Output: Optimal policy π ? (a|s) promote risk seeking behavior with α > 1, which may lead to overly aggressive elimination of options. Our experiments suggest that the optimal balance should be found in the range α ∈ [0, 1]. It should be pointed out that the effect of the α-divergence on policy iteration is not linear and not symmetric with respect to α = 0.5, contrary to what one could have expected given the symmetry of the α-divergence as a function of α pointed out in Section 2. That is, switching from α = −3 to α = −2 may have little effect on policy iteration, whereas switching from α = 3 to α = 4 may have a much more pronounced influence on the learning dynamics. 4.5 Relation to the mean squared Bellman error minimization We have seen in Section 4.2 that policy evaluation with the Pearson χ2 -divergence penalty, corresponding to the dual optimization problem (16), is equivalent to minimization of the mean squared differential advantage (MSDA). Here, we establish the relation between the MSDA objective and the classical mean squared Bellman error (MSBE) minimization (Sutton and Barto, 1998). In order to state precisely how the MSDA and MSBE objectives are related, we need to recall several definitions. Assume that the value function v : S → R is parameterized by a vector θ as discussed in Section 4.3, and let an agent follow a policy π0 which yields a state-action distribution q(s, a) = µπ0 (s)π0 (a|s). In discounted infinite horizon setting, one defines the temporal difference (TD) error as δθ (s, a, s0 ) = r(s, a) + γvθ (s0 ) − vθ (s) where γ ∈ (0, 1) is a discount factor. In the average-reward setting, this TD error is typically replaced by the differential TD error δ̃θ (s, a, s0 ) = r(s, a) − r̄ + vθ (s0 ) − vθ (s) 13 Belousov and Peters Chain 4 2 0 5 -1.0 0.0 0.5 1.0 2.0 -4.0 -2.0 0.0 1.0 3.0 5.0 -10.0 0.0 1.0 10.0 10 15 20 25 30 0 5 10 15 20 25 30 0 5 10 15 20 25 30 Expected reward CliffWalking 5 -1.0 0.0 0.5 1.0 2.0 -4.0 -2.0 0.0 1.0 3.0 5.0 -10.0 0.0 1.0 10.0 0 0 10 20 30 40 0 10 20 30 40 0 10 20 30 40 FrozenLake 8x8 0.06 -10.0 0.0 1.0 10.0 0.04 -4.0 -2.0 0.0 1.0 3.0 5.0 0.02 -1.0 0.0 0.5 1.0 2.0 0.00 0 10 20 30 40 50 0 10 20 30 40 50 0 10 20 30 40 50 Iteration Figure 5: Effects of α-divergence on policy iteration. Each row corresponds to a given environment. Results for different values of α are split into three subplots within each row, from the more extreme α’s on the left to the more refined values on the right. In all cases, more negative values α < 0 initially show faster improvement because they immediately jump to the mode and keep the exploration level low; however, after a certain umber of iterations they get overtaken by moderate values α ∈ [0, 1] that weigh advantage estimates more evenly. Positive α > 1 demonstrate high variance in the learning dynamics because they clamp the probability of good actions to zero if the advantage estimates are overly pessimistic, never being able to recover from such a mistake. Large positive α’s may even fail to reach the optimum altogether, as exemplified by α = 10 in the plots. The most stable and reliable α-divergences lie between the reverse KL (α = 0) and the KL (α = 1), with the Hellinger distance (α = 0.5) outperforming both of them on the FrozenLake environment. that differs from the “usual” TD error in two ways: first, there is no discount factor, and second, the expected reward under the current policy r̄ = X q(s, a)r(s, a) = s,a X µπ0 (s)π0 (a|s)r(s, a) = J(π0 ) s,a is subtracted in order to ensure that the mean of the differential TD error is zero X s,a µπ0 (s)π0 (a|s)p(s0 |s, a)δ̃θ (s, a, s0 ) = 0. 14 f -Divergence constrained policy improvement In the following, we only consider differential versions of the errors. By averaging over the next states s0 in the differential TD error, one obtains the differential advantage X Ãθ (s, a) = p(s0 |s, a)δ̃θ (s, a, s0 ). s0 By integrating out the action a in the differential advantage, one obtains the differential Bellman error X ε̃θ (s) = π0 (a|s)Ãθ (s, a). a In total, there are three different error signals: differential TD error (DTDE), differential advantage (DA), and the differential Bellman error (DBE). Each of them can be used for learning. Creating a mean squared (MS) objective out of each of them, we obtain three objective functions: h i2 X MSDTDE(θ) = µπ0 (s)π0 (a|s)p(s0 |s, a) δ̃θ (s, a, s0 ) , s,a,s0 MSDA(θ) = X s,a MSDBE(θ) = X s π0 µ (s)π0 (a|s) " X s0 0 0 p(s |s, a)δ̃θ (s, a, s ) #2 ,  2 X µπ0 (s)  π0 (a|s)p(s0 |s, a)δ̃θ (s, a, s0 ) . a,s0 Thus, the novel MSDA objective fits in-between the TD error and the Bellman error minimization. Performing stochastic gradient descent (SGD) on these objectives leads to various flavors of the residual gradient (RG) algorithm (Baird, 1995), recently surveyed by Dann et al. (2014). Curiously, all three objectives result in the naive residual gradient algorithm (Sutton and Barto, 1998) when expectations are “naively” replaced by one-sample estimates. We realize that the dual for α = 2, i.e., (16) is exactly the MSDA objective. Interestingly, since the dual objective (13) tends towards the MSDA objective in the limit of high temperatures η → ∞ for any choice of the divergence function f , dual minimization can be viewed as a continuous generalization of the MSDA minimization to finite temperatures; therefore, SGD on the dual objective (13) is a continuous generalization of the RG algorithm to finite temperatures. 5. Conclusion In this paper, we have developed a framework for deriving new and established policy improvement and policy iteration algorithms by constraining policy change using the f divergence. First, we described the key idea in the bandit scenario. Looking at the smooth curve of α-divergences in the space of f -divergences, we were able to see the connection between many classical action selection strategies as well as discover several new ones. The optimal choice of α depends on the time horizon, since different α’s corresponds to different exploration strategies. The soft-max policy update rule, employed by the Exp3 15 Belousov and Peters algorithm (Bubeck and Cesa-Bianchi, 2012) and the gradient bandit algorithm (Sutton and Barto, 1998), is a special case of the f -divergence constrained policy improvement corresponding to the KL divergence. After the bandit case, we considered the average-reward reinforcement learning problem, for which we found both (i) an efficient sample-based solution and (ii) the important new insight that the choice of the f -divergence does not only imply the type of policy improvement step but also the compatible policy evaluation step. In particular, we have shown that employing the soft-max policy for the actor implies that the log-sum-exp function is used for policy evaluation by the critic (somewhat similar to REPS (Peters et al., 2010)). Similarly, in our framework, policy evaluation by minimizing the mean squared differential advantage, which is closely related to the mean squared Bellman error, results from the choice of the α = 2-divergence and comes along with a new, compatible policy update rule. Thus, it is likely that this approach will still yield a larger number of new policy improvements along with their compatible critics derived by just choosing another f -divergence. Acknowledgments This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 640554. 16 f -Divergence constrained policy improvement Appendix A. In all experiments, the temperature parameter η is exponentially decayed ηi+1 = η0 ai in each iteration i = 0, 1, . . . . The choice of η0 and a depends on the scale of the rewards and the number of samples collected per policy update. Tables for each environment list these parameters along with the number of samples per policy update, the number of policy iteration steps, and the number of runs for averaging the results. Where applicable, environment-specific settings are also listed. Parameter Value Number of states Action success probability Small and large rewards Number of runs Number of iterations Number of samples Temperature parameters (η0 , a) 8 0.9 (2.0, 10.0) 10 30 800 (15.0, 0.9) Table 4: Chain environment. Parameter Value Punishment for falling from the cliff Reward for reaching the goal Number of runs Number of iterations Number of samples Temperature parameters (η0 , a) -10.0 100 10 40 1500 (50.0, 0.9) Table 5: CliffWalking environment. Parameter Value Action success probability Number of runs Number of iterations Number of samples Temperature parameters (η0 , a) 0.8 10 50 2000 (1.0, 0.8) Table 6: FrozenLake environment. 17 Belousov and Peters References S. M. Ali and Samuel Daniel Silvey. A General Class of Coefficients of Divergence of One Distribution from Another. Journal of the Royal Statistical Society. Series B (Methodological), 28:131–142, 1966. ISSN 0035-9246. Yasemin Altun and Alex Smola. Unifying Divergence Minimization and Statistical Inference via Convex Duality. Learning Theory, 4005:1–15, 2006. ISSN 03029743. doi: 10.1007/ 11776420 13. Shun-Ichi Amari. Differential-Geometrical Methods in Statistics. Springer New York, 1985. doi: 10.1007/978-1-4612-5056-2. Peter Auer, Nicolo Cesa-Bianchi, Yoav Freund, and Robert Schapire. The Non-Stochastic Multi-Armed Bandit Problem. SIAM Journal on Computing, 32(1):48–77, 2003. Mohammad Gheshlaghi Azar and Bert Kappen. Dynamic Policy Programming. Journal of Machine Learning Research, 13:3207–3245, 2012. ISSN 15324435. J. Andrew Bagnell and Jeff Schneider. Covariant policy search. In IJCAI, pages 1019–1024, 2003. Leemon Baird. Residual Algorithms: Reinforcement Learning with Function Approximation. Proceedings of the 12th International Conference on Machine Learning, (July): 30–37, 1995. ISSN 00043702. doi: 10.1.1.48.3256. Stephen Boyd and Lieven Vandenberghe. Convex Optimization, volume 25. 2004. ISBN 9780511804441. doi: 10.1017/CBO9780511804441. John S. Bridle. Training Stochastic Model Recognition Algorithms as Networks can Lead to Maximum Mutual Information Estimation of Parameters. In NIPS, 1990. ISBN 155860-100-7. Greg Brockman, Vicki Cheung, Ludwig Pettersson, Jonas Schneider, John Schulman, Jie Tang, and Wojciech Zaremba. OpenAI Gym. arXiv preprint arXiv:1606.01540, 2016. Sébastien Bubeck and Nicolò Cesa-Bianchi. Regret Analysis of Stochastic and Nonstochastic Multi-armed Bandit Problems. Foundations and Trends in Machine Learning, 5(1):1–122, 2012. ISSN 9781601986269. doi: 10.1561/2200000024. Herman Chernoff. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. The Annals of Mathematical Statistics, pages 493–507, 1952. Andrzej Cichocki and S. Amari. Families of alpha- beta- and gamma- divergences: Flexible and robust measures of Similarities. Entropy, 12(6):1532–1568, 2010. ISSN 10994300. doi: 10.3390/e12061532. Imre Csiszár. Eine informationstheoretische Ungleichung und ihre Anwendung auf den Beweis der Ergodizität von Markoffschen Ketten. Publ. Math. Inst. Hungar. Acad. Sci., 8:85–108, 1963. 18 f -Divergence constrained policy improvement Christoph Dann, Gerhard Neumann, and Jan Peters. Policy Evaluation with Temporal Differences: A Survey and Comparison. In Journal of Machine Learning Research, volume 15, pages 809–883, 2014. ISBN 1532-4435. Mohammad Ghavamzadeh, Shie Mannor, Joelle Pineau, and Aviv Tamar. Bayesian Reinforcement Learning: A Survey. Foundations and Trends in Machine Learning, 8(5-6): 359–483, 2015. ISSN 1935-8237. doi: 10.1561/2200000049. Ian Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron Courville, and Yoshua Bengio. Generative Adversarial Nets. In NIPS, 2014. ISBN 1406.2661. Sham Machandranath Kakade. A Natural Policy Gradient. In NIPS, pages 1531–1538, 2001. ISBN 9780874216561. doi: 10.1.1.19.8165. Hilbert J Kappen. Path integrals and symmetry breaking for optimal control theory. Journal of Statistical Mechanics: Theory and Experiment, 2005. ISSN 1742-5468. doi: 10.1088/ 1742-5468/2005/11/P11011. Tom Minka. Divergence measures and message passing. Technical report, Microsoft Research, 2005. Tetsuzo Morimoto. Markov processes and the H-theorem. Journal of the Physical Society of Japan, 18(3):328–331, 1963. Sebastian Nowozin, Botond Cseke, and Ryota Tomioka. f-GAN: Training Generative Neural Samplers using Variational Divergence Minimization. In NIPS, pages 271–279, 2016. Jan Peters and Stefan Schaal. Policy gradient methods for robotics. In Intelligent Robots and Systems, 2006 IEEE/RSJ International Conference on, pages 2219–2225. IEEE, 2006. Jan Peters, Sethu Vijayakumar, and Stefan Schaal. Reinforcement Learning for Humanoid Robotics. In Humanoids, 2003. doi: 10.1163/1568553041719519. Jan Peters, Katharina Mülling, and Yasemin Altun. Relative Entropy Policy Search. In AAAI, pages 1607–1612, 2010. Igal Sason and Sergio Verdu. F-divergence inequalities. IEEE Transactions on Information Theory, 62(11):5973–6006, 2016. ISSN 00189448. doi: 10.1109/TIT.2016.2603151. John Schulman, Sergey Levine, Michael Jordan, and Pieter Abbeel. Trust Region Policy Optimization. In ICML, 2015. ISBN 0375-9687. doi: 10.1063/1.4927398. Susanne Still and Doina Precup. An information-theoretic approach to curiosity-driven reinforcement learning. Theory in Biosciences, 131(3):139–148, 2012. ISSN 14317613. doi: 10.1007/s12064-011-0142-z. Richard S Sutton and Andrew G Barto. Reinforcement learning: An introduction. MIT press Cambridge, 1998. 19 Belousov and Peters Richard S Sutton, David A McAllester, Satinder P Singh, and Yishay Mansour. Policy gradient methods for reinforcement learning with function approximation. In Advances in neural information processing systems, pages 1057–1063, 2000. Marc Teboulle. Entropic Proximal Mappings with Applications to Nonlinear Programming. Mathematics of Operations Research, 17(3):670–690, 1992. ISSN 0364-765X. doi: 10. 1287/moor.17.3.670. Emanuel Todorov. Linearly-solvable Markov decision problems. In NIPS, 2006. ISBN 9780262195683. Martin J Wainwright and Michael I Jordan. Graphical Models, Exponential Families, and Variational Inference. Foundations and Trends in Machine Learning, 1(1–2):1–305, 2007. ISSN 19358237. doi: 10.1561/2200000001. Huaiyu Zhu and Richard Rohwer. Information geometric measurements of generalisation. Technical report, Aston University, 1995. Brian D. Ziebart, Andrew Maas, J. Andrew Bagnell, and Anind K. Dey. Maximum entropy inverse reinforcement learning. In AAAI, pages 1433–1438, 2008. 20
2cs.AI
EULERIAN GRADED D-MODULES arXiv:1210.8402v2 [math.AC] 15 Jul 2016 LINQUAN MA AND WENLIANG ZHANG Abstract. Let R = K[x1 , . . . , xn ] with K a field of arbitrary characteristic and D be the ring of differential operators over R. Inspired by Euler formula for homogeneous polynomials, we introduce a class of graded D-modules, called Eulerian graded D-modules. It is proved that a vast class of D-modules, including all local cohomology modules HJi11 · · · HJiss (R) where J1 , . . . , Js are homogeneous ideals of R, are Eulerian. As an application of our theory of Eulerian graded D-modules, we prove that all socle elements of each local i0 i1 cohomology module Hm HJ1 · · · HJiss (R) must be in degree −n in all characteristic. This answers a question raised in [Zha12]. It is also proved that graded F -modules are Eulerian and hence the main result in [Zha12] is recovered. An application of our theory of Eulerian graded D-modules to the graded injective hull of R/P , where P is a homogeneous prime ideal of R, is discussed as well. 1. Introduction Let R = K[x1 , . . . , xn ] be a polynomial ring in n indeterminates over a field K with the standard grading, [j] i.e. deg(xi ) = 1 for each xi and deg(c) = 0 for each nonzero c ∈ K. Let ∂i denote the j-th order j 1 ∂ differential operator · j with respect to xi for each 0 ≤ i ≤ n and j ≥ 1. By [Gro67, Théorème 16.11.2], j! ∂xi [j] D = Rh∂i |1 ≤ i ≤ n, 1 ≤ ji is the ring of K-linear differential operators of R (note if K has characteristic 0, D is the same as the Weyl algebra Rh∂1 , . . . , ∂n i). The ring of K-linear differential operators D has a [j] [j] natural Z-grading given by deg(xi ) = 1, deg(∂i ) = −j, and deg(c) = 0 for each xi , ∂i and each nonzero c ∈ K. The classical Euler formula for homogeneous polynomials says that n X xi ∂i f = deg(f )f i=1 for each homogeneous polynomial f ∈ R. Inspired by Euler formula, we introduce a class of D-modules called Eulerian graded D-modules: the graded D-modules whose homogeneous elements satisfy a series of “higher order Euler formulas” (cf. Definition 2.1). One of our main results concerning Eulerian graded D-modules is the following (proved in Section 2 and Section 5): Theorem 1.1. Let R = K[x1 , . . . , xn ], m = (x1 , . . . , xn ), and J1 , . . . , Js be homogeneous ideals of R. Then (1) R(ℓ) is Eulerian if and only if ℓ = 0. (2) Let ∗ E be the graded injective hull of R/m. Then ∗ E(ℓ) is Eulerian if and only if ℓ = n. (3) Each local cohomology module HJi11 (· · · (HJiss (R))) is Eulerian for all i1 , . . . , is . As an application of our theory of Eulerian graded D-modules, we have the following result on local cohomology (proved in Section 5): i0 Theorem 1.2. Let notations be as in the previous theorem. Then all socle elements of each Hm (HJi11 (· · · (HJiss (R))) i1 is i0 must have degree −n, and consequently each Hm (HJ1 (· · · (HJs (R))) is isomorphic (as a graded D-module) to a direct sum of copies of ∗ E(n). This result is characteristic-free, in particular it gives a positive answer to a question stated in [Zha12] and recovers the main theorem in [Zha12]. The paper is organized as follows. In Section 2, Eulerian graded D-modules are defined over an arbitrary field and some basic properties of these modules are discussed. In Section 3 and Section 4, we consider The second author was partially supported by the NSF grant DMS #1068946. 1 Eulerian graded D-modules in characteristic 0 and characteristic p, respectively; in particular, we show in Section 4 that each graded F -module (introduced in [Zha12]) is Eulerian. In Section 5, we apply our theory of Eulerian graded D-modules to local cohomology modules; Theorem 1.2 is proved in this section. Finally, in Section 6, an application of our theory to graded injecitve hull of R/P , where P is a homogeneous prime ideal, is considered. We finish our introduction by fixing our notation throughout the paper as follows. R = K[x1 , . . . , xn ] 1 ∂j denotes the polynomial ring in n indeterminates over a field K. The j-th order differential operator · j j! ∂xi [j] [j] with respect to xi is denoted by ∂i and D = Rh∂i |1 ≤ i ≤ n, 1 ≤ ji denotes the ring of differential operators over R. It follows from [Lyu11, Corollary 2.2] that every element of D may be uniquely written as a linear combinations of monomials in x’s and ∂’s. The natural Z-grading on R and D is given by [j] deg(xi ) = 1, deg(∂i ) = −j, deg(c) = 0 [j] for each xi , ∂i and nonzero c ∈ K (it is evident that R is a graded D-module). A graded D-module is a left D-module with a Z-grading that is compatible with the natural Z-grading on D. Given any graded D-module M , the module M (ℓ) denotes M with degree shifted by ℓ, i.e. M (ℓ)i = Mℓ+i for each i. The irrelevant maximal ideal (x1 , . . . , xn ) of R is denoted by m. The graded injective hull of R/m is 1 denoted by ∗ E. It may be identified with the K-vector space with a basis { xe1 ···x en |e1 , . . . , en ≥ 1} and it n 1 has a natural D-module structure given by 1 −ej ∂j · e1 = e1 . x1 · · · xenn x1 · · · xej +1 · · · xenn 1 has degree 0 (cf. [BS98, Example 13.3.9]). x1 · · · xn   a · (a − 1) · · · (a − b + 1) a (note For each integer a and a nonnegative integer b, we will use to denote b! b that this number is still well-defined when char(K) = p > 0). ∗ E is graded to the effect that the element Acknowledgement The authors would like to thank Professor Gennady Lyubeznik for carefully reading a preliminary version of the paper and for his valuable suggestions which improved the paper considerably. The authors are also grateful to the anonymous referee for her/his comments on the paper. 2. Eulerian graded D-modules In this section, we introduce Eulerian graded D-modules and discuss some of their basic properties. We begin with the following definition. Definition 2.1. The r-th Euler operator, denoted by Er , is defined as X [i ] Er := xi11 · · · xinn ∂1 1 · · · ∂n[in ] . i1 +i2 +···+in =r,i1 ≥0,...,in ≥0 Pn In particular E1 is the usual Euler operator i=1 xi ∂i . A graded D-module M is called Eulerian, if each homogeneous element z ∈ M satisfies   deg(z) (2.1.1) Er · z = ·z r for every r ≥ 1. We start with an easy lemma. [s] [t] Lemma 2.2. For all positive integers s and t, we have ∂i ∂i = 2   s + t [s+t] . ∂i s Proof. It is easy to check that (in all characteristic)     ∂s ∂t s + t ∂is+t s + t [s+t] [s] [t] ∂i ∂i = i i = = . ∂i s! t! (s + t)! s s  The following lemma is a special case of [Lyu11, Proposition 2.1], which will be needed in the sequel. Lemma 2.3. For all positive integers s and t, we have min{s,t}   X t t−j [s−j] [s] xi ∂i ∂i xti = j j=0 for each i. The following proposition indicates a connection among Euler operators. Proposition 2.4. For every r ≥ 1, we have E1 · Er = (r + 1)Er+1 + rEr . [j+1] [j] Proof. By Lemma 2.2 we know ∂i ∂i = (j + 1)∂i X . Now we have [i ] [i ] E1 · Er = X = X xi11 · · · (xj ∂j xjj ) · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] j X i1 +i2 +···+in =r = X X xi1i · · · (xjj xj ∂j · i1 +i2 +···+in =r j j i1 +i2 +···+in =r + i +1 X [i ] [i ] i ∂j + ij xjj ) · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] by lemma 2.3 X i1 +i2 +···+in =r i +1 xi11 · · · xjj [i ] [i ] · · · xinn ∂1 1 · · · (∂j ∂j j ) · · · ∂n[in ] j X i1 +i2 +···+in =r = [i ] [i ] i i1 +i2 +···+in =r X = xi11 xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] X [i ] ij xi11 · · · xinn ∂1 1 · · · ∂n[in ] j X i +1 (ij + 1)xi11 · · · xjj [i ] [i +1] · · · xinn ∂1 1 · · · ∂j j · · · ∂n[in ] + rEr j = (r + 1)Er+1 + rEr  Some remarks are in order. Remark 2.5. (1) If M is an Eulerian graded D-module, then M (ℓ) is Eulerian if and only if ℓ = 0 (equivalently, for any graded D-module   M, M (ℓ) is Eulerian graded for at most one ℓ). Because a b in any characteristic, we have = for all r ∈ N if and only if a = b. This is trivial in r r characteristic 0 (take r = 1). We give a short argument in characteristic p > 0. If both a and b are positive, then by a theorem of Lucas [Luc78], we have   Y  ai a = ri r P P i i where   a=  ai p and r = ri p are the p-adic decompositions of a and r. In particular, if we apply a b = to r = pi , we get ai = bi for every i, hence a = b. When a and b are both negative, we r r P P look at the p-adic decomposition of −a − 1 = ai pi and −b − 1 = bi pi . Taking r = pi , we get         i i i −a + pi − 1 a b −b + pi − 1 = (−1)p · (ai + 1) = (−1)p = = = (−1)p · (bi + 1). i i i i p p p p 3 Hence again we have ai = bi for every i, −a − 1 = −b − 1 so a = b. Therefore it suffices to j show a and b must have the same sign. But if a > 0 and b < 0, we can − b,  pick  r = p ≫  a a b then direct computation (or using the theorem of Lucas [Luc78]) gives = 0 while = pj pj   j j −b + pj − 1 = (−1)p , which is a contradiction. (−1)p pj (2) Definition 2.1 does not depend on the characteristic of K. However we will see in section 3 that, in characteristic 0, we only need to consider E1 , the usual Euler operator. (3) R is Eulerian and a proof goes as follows. For each monomial xj11 xj22 · · · xjnn , where jn ’s are arbitrary integers (we allow negative integers), we have (for each r ≥ 1) X [i ] [i ] Er · xj11 xj22 · · · xjnn = ( xi11 xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] ) · (xj11 xj22 · · · xjnn ) i1 +i2 +···+in =r     jn j1 · xj11 xj22 · · · xjnn ··· i i n 1 i1 +i2 +···+in =r   j1 + · · · + jn · xj11 xj22 · · · xjnn = r = X We explain the last equality: we use an induction argument. It is clear when r = 1, now suppose we have the equality for r − 1. Then     X jn j1 ··· in i 1 i1 +i2 +···+in =r       r X X jn−1 j1 jn ··· = in−1 in i +i +···+i =r−i i1 in =0 1 2 n−1 n    r X j1 + · · · + jn−1 jn = r − in i n in =0   j1 + · · · + jn = r where the second equality is by induction hypothesis for r − 1, and the last equality is by the Chu-Vandermonde identity (see [Ask75])   X  r   a j a−j = . r k r−k k=0 jn in R  and the Er ’s clearly preserve addition, we can Since xj11 xj22 · · · xjnn clearly has degree j1 + · · ·+ deg(z) see from the computation above that Er · z = · z for every homogenous z ∈ R. Therefore, r R is Eulerian. (4) DPis not Eulerian.PIt is clear that the identity 1 ∈ D is homogeneous with degree 0, but E1 · 1 = ( ni=1 xi ∂i ) · 1 = ni=1 xi ∂i 6= 0. One of the main results in this section is that, to check whether a graded D-module is Eulerian, it suffices to check whether each element of any set of homogeneous generators satisfies (2.1.1). Theorem 2.6. Let M be a graded D-module. Assume that {g1 , g2 , . . . } is a set of homogeneous D-generators of M . Then, M is Eulerian if and only if each gj satisfies Euler formula (2.1.1) for every r. Proof. If M is Eulerian, then it is clear that each gj satisfies Euler formula (2.1.1) for every r. Assume that each gj satisfies Euler formula (2.1.1) for every r and we wish to prove that M is Eulerian. To this end, it suffices to show that, if a homogeneous element z ∈ M satisfies Euler formula (2.1.1) for every r, then so [j] [j ] [j ] does xs11 · · · xsnn ∂1 1 · · · ∂n n · z. And it is clear that it suffices to consider xsi ∂i · z. Without loss of generality, 4 [j] we may assume i = 1. We will prove this in two steps; first we consider ∂1 · z and then xs1 · z (once we finish our first step, we may replace ∂ [j] · z by z and then our second step will finish the proof). [j] First we will use induction on r to show that ∂1 · z satisfies Euler formula (2.1.1) for each r. When r = 1, we compute [j] E1 · (∂1 z) = n X [j] xi ∂i · (∂1 z) i=1 [j] [j] = x1 ∂1 ∂1 z + ∂1 X xi ∂i · z i≥2 [j] [j−1] = ∂1 x1 ∂1 z − ∂1 [j] ∂1 z + ∂1 X xi ∂i · z i≥2 [j] = ∂1 n X [j] xi ∂i · z − j∂1 z i=1 [j] = (deg(z) − j) · ∂1 z [j] Now for general r, suppose we know that Er−k · (∂1 z) =   deg(z) − j [j] · ∂1 z for every 1 ≤ k ≤ r − 1. Then r−k we have ( X [j] [i ] [i ] xi11 xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] ) · (∂1 z) i1 +i2 +···+in =r = [j] [i ] [i ] X (xi11 ∂1 )xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] · z X (∂1 xi11 )xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] · z i1 +i2 +···+in =r (1) = [j] [i ] [i ] i1 +i2 +···+in =r − X i1 +i2 +···+in =r min{i1 ,j}  X k=1  i1 i1 −k [j−k] i2 [i ] [i ] x ∂1 x2 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] · z k 1 min{i1 ,j}   deg(z) [j] = · (∂1 z) − r i X X 1 +i2 +···+in =r (2) k=1 X   deg(z) [j] · (∂1 z) − r i = (4)   j   X deg(z) j [j] = · (∂1 z) − r k 1 +i2 +···+in =r k=1 X [i −k] [i2 ] ∂2 x1i1 −k xi22 · · · xinn ∂1 1 [k] [j−k] · · · ∂n[in ] · (∂1 ∂1 z) k=1 min{i1 ,j} X (3) (6)   i1 [i1 ] [i2 ] [j−k] z) ∂ )∂2 · · · ∂n[in ] · (∂1 k 1 · · · xinn ( min{i1 ,j}   deg(z) [j] = · (∂1 z) − r i 1 +i2 +···+in =r (5) x1i1 −k xi22 X [i −k] [i2 ] ∂2 x1i1 −k xi22 · · · xinn ∂1 1 k=1 i′ X [i′ ] [i ] · · · ∂n[in ] ·   j [j] (∂1 z) k [j] x11 xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] · (∂1 z) i′1 +i2 +···+in =r−k    j   X j deg(z) − j deg(z) [j] [j] = · (∂1 z) · (∂1 z) − k r−k r k=1   deg(z) − j [j] = · (∂1 z) r  [j]  deg(∂1 z) [j] = · (∂1 z) r 5 where (1) follows from Lemma 2.3: [j] [j] xi11 ∂1 = ∂1 xi11 − min{i1 ,j}  X k=1 (2) (4) (5) (6)  i1 i1 −k [j−k] x ∂1 ; k 1 and (3) follow from Lemma 2.2; is obtained by setting i′1 = i1 − k; is true by induction on r; follows from the Chu-Vandermonde identity ([Ask75, page 59])   X  j   a j a−j = . r k r−k k=0 This completes our first step. Next we consider x1 · z and we have X [i ] [i ] xi11 xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] ) · (x1 · z) ( i1 +i2 +···+in =r X =( [i ] [i ] xi11 xi22 · · · xinn (∂1 1 x1 )∂2 2 · · · ∂n[in ] ) · z i1 +i2 +···+in =r X =( [i ] [i −1] xi11 xi22 · · · xinn (x1 ∂1 1 + ∂1 1 [i ] )∂2 2 · · · ∂n[in ] + x1 = x1 ( xi11 xi22 [i ] xi22 · · · xinn ∂2 2 · · · ∂n[in ] ) · z i2 +···+in =r i1 +i2 +···+in =r,i1 ≥1 X X [i ] [i ] · · · xinn ∂1 1 ∂2 2 i1 +i2 +···+in =r · · · ∂n[in ] X + [i −1] [i2 ] ∂2 x1i1 −1 xi22 · · · xinn ∂1 1 · · · ∂n[in ] ) · z i1 +i2 +···+in =r,i1 ≥1     deg(z) deg(z) = x1 ( + )z r r−1   deg(z) + 1 = (x1 · z) r   deg(x1 · z) = (x1 · z) r This finishes our second step in the case when s = 1. Now we consider xs1 · z when s ≥ 2. By an easy induction we may assume x1s−1 z satisfies (2.1.1), now we have     deg(x1 (xs−1 z)) deg(xs1 z) s−1 s s−1 Er (x1 z) = Er (x1 x1 z) = (x1 (x z)) = (xs1 z). r r where the second equality is the case when s = 1 (because we assume x1s−1 z satisfies (2.1.1)). This completes the proof of our theorem.  An immediate consequence of Theorem 2.6 on cyclic D-modules is the following. D Proposition 2.7. Let J be a homogeneous left ideal in D. Then is Eulerian if and only if Er = J X [i ] [i ] xi11 xi22 · · · xinn ∂1 1 ∂2 2 · · · ∂n[in ] ∈ J for every r. i1 +i2 +···+in =r D D Proof. According to Theorem 2.6, is Eulerian if and only if 1 ∈ satisfies Euler’s formula (2.1.1). Since J J D D 1 has degree 0, 1 ∈ satisfies Euler’s formula (2.1.1) if and only if Er · 1 = Er = 0 ∈ , which holds if and J J only if Er ∈ J for every r.  Proposition 2.8. If a graded D-module M is Eulerian, so are each graded submodule of M and each graded quotient of M . 6 Proof. Let N be a graded submodule of M . Since each homogeneous element is also a homogeneous element in M , it is clear that N is also Eulerian. Given a D-linear degree-preserving surjection ψ : M → M ′ and a homogeneous element z ′ ∈ M ′ , there is a homogeneous z ∈ M with the same degree such that ψ(z) = z ′ and hence we have (for every r)     deg(z) deg(z ′ ) ′ Er · z = Er · ψ(z) = ψ(Er · z) = ψ( · z) = · z′. r r This proves that M ′ is also Eulerian.  We end this section with the following result which is one of the key ingredients for our application to local cohomology. Theorem 2.9. (1) The graded D-module R(ℓ) is Eulerian if and only if ℓ = 0. (2) The graded D-module ∗ E(ℓ) is Eulerian if and only ℓ = n. Proof. By Remark 2.5 (1), it suffices to show that R(0) and ∗ E(n) are Eulerian graded. It is clear that R = R(0) is Eulerian by Remark 2.5 (3). Since ∗ E(ℓ) is spanned over K by xj11 xj22 · · · xjnn with each jt ≤ −1. By the computation in Remark 2.5 (3), it is clear that ∗ E(n) is Eulerian graded (because in ∗ E(n), the element xj11 xj22 · · · xjnn has degree j1 + · · · + jn ).  3. Eulerian graded D-module in characteristic 0 Throughout this section K will be a field of characteristic 0. In this section we collect some properties of Eulerian graded D-modules when char(K) = 0. The main result is that, if a graded D-module M is Eulerian, then so is Mf for each f ∈ R. This is one of the ingredients for our application to local cohomology in Section 5. First we observe that, in characteristic 0, if each homogeneous element z in a graded D-module M satisfies (2.1.1) for r = 1 (instead of for all r ≥ 1), then M is Eulerian. Proposition 3.1. Let M be a graded D-module. If E1 · z = deg(z) · z for every homogeneous element z ∈ M . Then M is Eulerian.   deg(z) Proof. We prove by induction that Er · z = · z for every r ≥ 1. When r = 1 this is exactly r   deg(z) E1 · z = deg(z) · z which is given. Now suppose we know Er · z = · z. By Proposition 2.4, we know r 1 that Er+1 = (E1 · Er − rEr ). So we have r+1 1 (E1 · Er − rEr ) · z Er+1 · z = r+1     1 deg(z) deg(z) = (E1 · ·z−r· · z) r+1 r r   deg(z) 1 · · (deg(z) · z − rz) = r+1 r   1 deg(z) = · (deg(z) − r) · z r+1 r   deg(z) = ·z r+1 where the second equality uses the induction hypothesis. This finishes the proof.  Remark 3.2. As we have seen, Lemma 2.4 is quite useful when char(K) = 0. Unfortunately, this is no longer the case once we are in characteristic p. For instance, when r ≡ −1(mod p), we can’t link Er+1 and Er via Lemma 2.4. This is one of the reasons that we treat characteristic 0 and characteristic p separately in two different sections. n X D xi ∂i ∈ J. is Eulerian if and only if Corollary 3.3. Let J be a homogeneous left ideal in D. Then J i=1 7 Proof. This is clear from Proposition 3.1 and (the proof of) Proposition 2.7.  Proposition 3.4. If M is an Eulerian graded D-module, so is S −1 M for each homogeneous multiplicative system S ⊆ R. In particular, Mf is Eulerian for each homogeneous polynomial f ∈ R. z Proof. By Proposition 3.1, it suffices to show for each homogeneous f ∈ S and z ∈ M , we have E1 · t = f z z deg( t ) · t . Now we compute f f E1 · z ft = n X xi ∂i · = n X xi · i=1 i=1 = = = = z ft f t · ∂i (z) − ∂i (f t ) · z f 2t n n X X 1 t xi ∂i (f t ) · z) x ∂ (z) − (f i i f 2t i=1 i=1 1 1 · deg(z) · z − 2t · deg(f t ) · f t · z ft f z (deg(z) − deg(f t )) · t f z z deg( t ) · t f f This finishes the proof.  Remark 3.5. (1) It turns out that Eulerian graded D-modules are not stable under extension because of the following short exact sequence of graded D-modules: P n D D D i=1 xi ∂i 0 → Pn −−− −−−→ Pn → Pn → 0, 2 h i=1 xi ∂i i h( i=1 xi ∂i ) i h i=1 xi ∂i i Pn P D D i=1 xi ∂i is the multiplication by ni=1 xi ∂i , i.e. a 7→ −−− −−−→ Pn where the map Pn h i=1 xi ∂i i h( i=1 xi ∂i )2 i P a · ( ni=1 xi ∂i ). D D (2) Since dim( Pn ) = 2n − 1 and Pn is Eulerian, finitely generated (even cyclic) h i=1 xi ∂i i h i=1 xi ∂i i Eulerian graded D-modules may not be holonomic when n ≥ 2. (3) When n = 1, it is rather straightforward to check that each finitely generated Eulerian graded D-module is holonomic. (4) As we will see in section 5, in characteristic 0, a vast class of graded D-modules (namely local cohomology modules of R) are both Eulerian and holonomic. 4. Eulerian graded D-module in characteristic p > 0 Throughout this section K will be a field of characteristic p > 0. In this section we prove that being Eulerian is preserved under localization. The proof is quite different from that in characteristic 0. We also show that each graded F -module is always an Eulerian graded D-module, which will enable us to recover the main result in [Zha12] in Section 5. Proposition 4.1. If M is an Eulerian graded D-module, so is S −1 M for each homogeneous multiplicative system S ⊆ R. In particular, Mf is Eulerian for each homogeneous polynomial f ∈ R. [j] e Proof. First notice that, ∂i is Rp -linear if pe ≥ j + 1. So we have e e z [j] z [j] [j] ∂i (z) = ∂i (f p · pe ) = f p · ∂i ( pe ) f f 8 [j] This tells us that, if pe ≥ r +1 and f ∈ S, then ∂i ( we have Er · z 1 [j] ∂ (z) for every j ≤ r in S −1 M . In particular e ) = p f f pe i 1 z Er · z e = p f f pe z ∈ S −1 M , we can multiply both the numerator and denominator by a large power ft e z f p −t z of f and write t = for some pe ≥ max{r + 1, t}. So we have f f pe For any homogeneous Er · z ft e = = = = e f p −t z 1 = pe Er · f p −t z e p f f   e e 1 deg(f p −t ) + deg(z) · f p −t z e p f r  e  pe −t f z p · deg(f ) − deg(f t ) + deg(z) · f pe r z   deg( t ) z f · t f r Er · where the last equality is because pe ≥ r + 1 and we are in characteristic p > 0. This finishes the proof.  Recall the definition of a graded F -module as follows. Definition 4.2 (cf. Definitions 2.1 and 2.2 in [Zha12]). For each integer e ≥ 1, let e R denote the R-module that is the same as R as a left R-module and whose right R-module structure is given by r′ · r = rp r′ for all r′ ∈ e R and r ∈ R. An F -module is an R-module M equipped with an R-module isomorphism θ : M → F (M ) = 1 R ⊗R M . An F -module (M, θ) is called a graded F -module if M is graded and θ is degree-preserving. Remark 4.3. It is clear from the definition that, if (M, θ) is an F -module, the map θ F 2 (θ) F (θ) αe : M − → F (M ) −−−→ F 2 (M ) −−−−→ · · · → F e (M ) induced by θ is also an isomorphism. This induces a D-module structure on M . To specify the induced D-module structure, it suffices to [i ] [i ] specify how ∂1 1 · · · ∂n n acts on M . Choose e such that pe ≥ (i1 + · · · + in ) + 1. Given each element z, we P consider αe (z) and we will write it as yj ⊗ zj with yj ∈ e R and zj ∈ M . And we define X [i ] [i ] ∂1 1 · · · ∂n[in ] yj ⊗ zj ). ∂1 1 · · · ∂n[in ] z := α−1 e ( See [KLZ12, §1] for more details. When an F -module (M, θ) is graded, the induced map αe is also degree-preserving. And hence M is naturally a graded D-module. It turns out that each graded F -module is Eulerian as a graded D-module. Theorem 4.4. If M is a graded F -module, then M is Eulerian graded as a D-module.   deg(z) Proof. Pick any homogeneous element z ∈ M , we want to show Er · z = · z for each r ≥ 1. r e Pick e such that p ≥ r + 1. Since M is a graded F -module, we have a degree-preserving isomorphism P αe M are homogeneous and FRe (M ). Assume αe (z) = i yi ⊗ zi where yi ∈ R and zi ∈  M −→    deg(z) = deg(yi ) deg(z) e deg(yi ⊗ zi ) = p deg(zi ) + deg(yi ) for each i. In particular we have = for every i r r 9 (because we are in characteristic p > 0). So we know X (Er · yi ) ⊗ zi ) Er · z = α−1 e ( i = = = X deg(yi ) yi ⊗ zi ) r i   deg(z) X yi ⊗ zi ) αe−1 ( r i   deg(z) ·z r α−1 e ( This finishes the proof.  5. An application to local cohomology Let R be an arbitrary commutative Noetherian ring and I be an ideal of R. We recall that if I is generated by f1 , . . . , fl ∈ R and M is any R-module, we have the Čech complex: M M Mfj → Mfj fk → · · · → Mf1 ···fl → 0 0→M → j j,k whose i-th cohomology module is HIi (M ). Here the map Mfj1 ···fji → Mfk1 ···fki+1 induced by the corresponding differential is the natural localization (up to sign) if {j1 , . . . , ji } is a subset of {k1 , . . . , ki+1 } and is 0 otherwise. When R is graded and I is a homogeneous ideal (i.e.f1 , . . . , fl are homogeneous elements in R) and M is a graded R-module, each differential in the Čech complex is degree-preserving because natural localization is so. It follows that each cohomology module HJi11 (· · · (HJiss (R))) is a graded R-module. When R = K[x1 , . . . , xn ] with K a field of characteristic p > 0 and m = (x1 , . . . , xn ), it is proven in [Zha12] (using the theory of graded F -modules) that Theorem 5.1 (Theorem 3.4 in [Zha12]). Let R = K[x1 , . . . , xn ] be a polynomial ring over a field K of characi0 teristic p > 0 and J1 , . . . , Js be homogeneous ideals of R. Each local cohomology module Hm (HJi11 · · · (HJiss (R))) ∗ i1 1 i0 is isomorphic to a direct sum of copies of E(n) (i.e. all socle elements of Hm (HJ1 · · · (HJiss (R))) must have degree −n). It is a natural question (and is asked in [Zha12]) whether the same result holds in characteristic 0. Using our theory of Eulerian graded D-module, we can give a characteristic-free proof of the same result. In particular we answer the question in characteristic 0 in the affirmative. We begin with the following easy observation. Proposition 5.2. Let J1 , . . . , Js be homogeneous ideals of R, then each local cohomology module HJi11 (· · · (HJiss (R))) is a graded D-module. Proof. Since natural localization map is D-linear (and so is each differential in the Čech complex), our proposition follows immediately from the Čech complex characterization of local cohomology.  Theorem 5.3. Let J1 , . . . , Js be homogeneous ideals of R, then each local cohomology module HJi11 (· · · (HJiss (R))) (considered as a graded D-module) is Eulerian. Proof. This follows immediately from Propositions 3.4, 4.1 and 2.8, and the Čech complex characterization of local cohomology.  Proposition 5.4 (cf. Proposition 2.3 in [Lyu93] in characteristic 0 and Lemma (b) on page 208 in [Lyu00] in characteristic p > 0). Let R = K[x1 , . . . , xn ] and m = (x1 , . . . , xn ). There is a degree-preserving isomorphism D/Dm → ∗ E . 1when s = 1, this is also proved in [Zha11, page 615] 10 Proof. It is proven in Proposition 2.3 in [Lyu93] in characteristic 0 and Lemma (b) on page 208 in [Lyu00] in characteristic p > 0 that the map D/Dm → ∗ E given by (5.4.1) [i ] 1 −1 ∂1 1 · · · ∂n[in ] 7→ (−1)i1 +···+in x−i · · · xn−in −1 1 [i ] [i ] is an isomorphism. The grading on D/Dm is induced by the one on D and hence deg(∂1 1 · · · ∂n n ) = −(i1 + −i1 −1 −1 · · · + in ). Since in ∗ E, the socle element x−1 · · · xn−in −1 ) = 1 · · · xn has degree 0, it follows that deg(x1 −(i1 + · · · + in ). Therefore it follows that (5.4.1) defines a degree-preserving isomorphism D/Dm → ∗ E.  Proposition 5.5 (cf. Theorem 2.4(a) in [Lyu93] in characteristic 0 and Lemma (c) on page 208 in [Lyu00] in characteristic p >L0). Let M be a graded D-module. If SuppR (M ) = {m}, then as a graded D-module L D M∼ (n ) = j Dm j ∼ = j ∗ E(nj ). Proof. M is a graded D-module hence also graded as an R-module. We first claim that the socle of M can be generated by homogeneous elements and we reason Pt as follows. Pick a generator g of the socle, we can write it as a sum of homogeneous elements g = i=1 gi where each gi has a different degree. For every Pt xj ∈ m, we have i=1 xj · gi = xj · g = 0 (since g is killed by m), hence xj · gi = 0 for every i (because each xj · gi has a different degree). Therefore gi is killed by every xj , hence is killed by m, so gi is in the socle for each i. This proves our claim. We also note that since the socle is killed by m, a minimal homogeneous set of generators is actually a homogeneous K-basis. Let {ej } be a homogeneous K-basis of the socle of M with deg(ej ) = −nj . There is a degree-preserving L D homomorphism of D-modules j Dm (nj ) → M which sends 1 of the j-th copy to ej . This map is injective L D because it induces an isomorphism on socles and j Dm (nj ) is supported only at m (as an R-module). L D L L L D ∗ ∼ N where N is some By 5.4, j Dm (nj ) j E(nj ) is an injective R-module. So M = j Dm (nj ) = graded R-module supported only at m. Since the map on the socles is an isomorphism, N = 0, so M = L D L ∗ ∼ E(n ).  (n ) = j j j Dm j Theorem 5.6. Let M be an Eulerian graded D-module. If SuppR (M ) = {m}, then M is isomorphic (as a graded D-module) to a direct sum of copies of ∗ E(n). L Proof. Since M is supported only at m, we know it is isomorphic to j ∗ E(nj ) as a graded D-module by L ∗ Proposition 5.5. By our assumption, M is Eulerian, so is j E(nj ). It follows from Theorem 2.9 that nj = n for each j, i.e. M is isomorphic (as a graded D-module) to a direct sum of copies of ∗ E(n). This finishes the proof.  i0 i1 Corollary 5.7. Let J1 , . . . , Js be homogeneous ideals of R, then Hm HJ1 · · · HJiss (R) is isomorphic (as a ∗ i0 i1 graded D-module) to a direct sum of copies of E(n) (or equivalently, all socle elements of each Hm HJ1 · · · HJiss (R) must have degree −n ). Proof. This follows immediately from Theorems 5.3 and 5.6.  Remark 5.8. It is proven in [Lyu93] (resp, [Lyu97]) that every HJi11 (· · · (HJiss (R))) is holonomic (resp, F finite) as a D-module (resp, F -module) in characteristic 0 (resp, characteristic p > 0). Therefore in any case we know HJi11 (· · · (HJiss (R))) has finite Bass numbers (cf. Theorem 3.4(d) in [Lyu93] and Theorem 2.11 in i0 i1 HJ1 · · · HJiss (R) ∼ [Lyu97]). It follows from this and Corollary 5.7 that Hm = ∗ E(n)c for some integer c < ∞. 6. Remarks on the graded injective hull of R/P when P is a homogeneous prime ideal We have seen in Theorem 2.9 that ∗ E(ℓ) = ∗ E(R/m)(ℓ) is Eulerian graded if and only if ℓ = n. In this section we wish to extend this result to ∗ E(R/P ) where P is a non-maximal homogeneous prime ideal (here ∗ E(R/P ) denotes the graded injective hull of R/P , see cf. [BS98, Chapter 13.2]]). To this end, we will discuss in detail the graded structures of ∗ E(R/P ) as an R-module and as a D-module. The underlying idea is that, there does not exist a canonical choice of grading on ∗ E(R/P ) when it is considered as a graded R-module; however, there is a canonical grading when it is considered as a graded D-module. 11 Remark 6.1. [ ∗ E(R/P ) as a graded R-module] Since P 6= m, there is at least one xi that is not contained in P . Hence the multiplication by xi induces an automorphism on ∗ E(R/P ), and consequently we have a degree-preserving isomorphism ·xi ∗ ∗ E(R/P ). E(R/P )(−1) −−→ It follows immediately that E(R/P ) ∼ = ∗ E(R/P )(m) for each integer m in the category of graded R-modules. In other words, we have ∗ ∼ ∗ E(R/P )(j) E(R/P )(i) = ∗ for all integers i and j. In some sense, this tells us that ∗ E(R/P ) does not have a canonical grading when considered merely as a graded R-module. However, as we will see, ∗ E(R/P ) is equipped with a natural Eulerian graded D-module structure, and from this point of view there is indeed a unique natural grading on ∗ E(R/P ). The D-module structure on ∗ E(R/P ) is obtained via considering HPht P (R)(P ) where (·)(P ) denotes homogeneous localization with respect to P (i.e. inverting all homogeneous elements not in P ), which has a natural grading as follows. Remark 6.2 (Grading on HPht P (R)(P ) ). Choose a set of homogeneous generators f1 , . . . , ft of P and consider the Čech complex M M Rfi1 ···fij → · · · → Rf1 ···ft → 0. Rfi → · · · → C • (P ) : 0 → R → i1 <i2 <···<ij i Then, since each module has a natural grading and each differential is degree-preserving, H h (C • (P )) also has a natural grading (h = ht P ), hence so is H h (C • (P ))(P ) . We will identify HPht P (R)(P ) with H h (C • (P ))(P ) with its natural grading. Proposition 6.3. ∗ E(R/P ) ∼ = HPht P (R)(P ) in the category of graded R-modules. Proof. We have a graded injective resolution of R (or a *-injective resolution of R, cf. [BS98, Chapter 13]) M ∗ (6.3.1) 0 → R → ∗ E(R)(d0 ) → · · · → E(R/Q)(dQ ) → · · · → ∗ E(R/m)(dm ) → 0 ht Q=s where each dQ is an integer depending on Q. Notice that when Q 6= m, ∗ E(R/Q)(i) ∼ = ∗ E(R/Q)(j) for all integers i and j by Remark 6.1. So the above resolution can be written as M ∗ (6.3.2) 0 → R → ∗ E(R) → · · · → E(R/Q) → · · · → ∗ E(R/m)(dm ) → 0 ht Q=s HPh (R)(P ) Let h = ht P . Then is the homogeneous localization of the h-th homology of (6.3.2) when we apply ΓP (·). But when we apply ΓP (·), (6.3.2) becomes M ∗ (6.3.3) 0 → 0 → · · · → ∗ E(R/P ) → ΓP ( E(R/Q)) → · · · → ΓP ( ∗ E(R/m)(dm )) → 0 ht Q=h+1 and when we do homogeneous localization at P to (6.3.3), we get 0 → · · · → 0 → ∗ E(R/P ) → 0 → · · · → 0 n So the h-th homology is exactly ∗ E(R/P ) (and when P = m, we get Hm (R) ∼ = ∗ E(R/m)(dm ), so actually dm = n). This finishes the proof.  Remark 6.4 (D-module structure on ∗ E(R/P )). Since HPh (R)(P ) has a natural graded D-module structure, it follows from Proposition 6.3 that ∗ E(R/P ) also has a natural graded D-module structure. Since ∗ E(R/P ) is a graded D-module, it is natural to ask the following question. Question 6.5. Let P be a homogeneous prime ideal in R. Is there a natural grading on ∗ E(R/P ) making it Eulerian graded? 12 Remark 6.6. HPht P (R)(P ) is always Eulerian graded by Theorem 5.3, Propositions 3.4, and 4.1. From Remark 2.5(1), we know that, in the category of graded D-modules, ∗ E(R/P )(ℓ) is Eulerian graded for exactly one ℓ, we will identify this “canonical” ℓ. Contrary to the case when we consider ∗ E(R/P ) as a graded R-module, we can see that in the category of graded D-modules we have ∗ ∼ ∗ E(R/P )(j) if and only if i = j. E(R/P )(i) = (Otherwise we would have ∗ E(R/P )(ℓ) ∼ = ∗ E(R/P )(ℓ + j − i) for every ℓ, and hence there would be more ∗ than one choice of ℓ such that E(R/P )(ℓ) is Eulerian.) We wish to find the natural grading on ∗ E(R/P ) that makes it Eulerian, and we need the following lemma (which may be well-known to experts). Lemma 6.7. We have a canonical degree-preserving isomorphism (h = ht P ) Exth (R/P, R) ∼ = HomR (R/P, H h (R)) P R Proof. HPh (R) is the h-th homology of (6.3.2) when we apply ΓP (·), which is the h-th homology of (6.3.3), which is the kernel of ∗ E(R/P ) → ΓP (⊕ht Q=h+1 ∗ E(R/Q)). Since HomR (R/P, ·) is left exact, we know that HomR (R/P, HPh (R)) is isomorphic to the kernel of ∗ E(R/P ) → HomR (R/P, ΓP (⊕ht Q=h+1 ∗ E(R/Q))) ∼ = HomR (R/P, ⊕ht Q=h+1 ∗ E(R/Q))) But this is exactly the h-th homology of (6.3.2) when we apply HomR (R/P, ·), which by definition is ExthR (R/P, R). And we want to emphasize here that the isomorphism obtained does not depend on the grading on ∗ E(R/P ) as long as ∗ E(R/P ) is equipped with the same grading when we calculate ExthR (R/P, R) and HomR (R/P, HPh (R)) as above.  Definition 6.8. For a d-dimensional graded K-algebra S with irrelevant maximal ideal m, the a-invariant of S is defined to be d a(S) = max{t ∈ Z|Hm (S)t 6= 0}. Proposition 6.9. We have min{t|(AnnHPht P (R) P )t 6= 0} = −a(R/P )−n. Hence we have a degree-preserving inclusion R/P ֒→ HPht P (R)(−a(R/P ) − n) ֒→ HPht P (R)(P ) (−a(R/P ) − n). Proof. Let h = ht P and let s = min{t|(AnnHPht P (R) P )t 6= 0}. By lemma 6.7, we know ExthR (R/P, R) ∼ = HomR (R/P, HPh (R)) ∼ = AnnHPh (R) P so we know s = min{t|(ExthR (R/P, R)t 6= 0} = min{t|(ExthR (R/P, R(−n))t 6= 0} − n by graded local duality n−h min{t|(ExthR (R/P, R(−n))t 6= 0} = − max{t ∈ Z|Hm (R/P )t 6= 0} = −a(R/P ) Hence we get s = −a(R/P ) − n. The second statement follows from the first one by sending 1 in R/P to any element in AnnHPht P (R) P of degree −a(R/P ) − n.  Remark 6.10. From what we have discussed so far, we can see that HPht P (R)(P ) is a graded injective module (or *-injective module) and there is a degree-preserving inclusion R/P ֒→ HPht P (R)(P ) (−a(R/P )−n), always sending 1 in R/P to the lowest degree element in AnnHPht P (R) P . Therefore we propose a “canonical” grading on ∗ E(R/P ) to the effect that ∗ E(R/P ) can be identified with HPht P (R)(P ) (−a(R/P )−n) (where the grading on HPht P (R)(P ) is obtained via Čech complex). We end with the following proposition. Proposition 6.11 (Compare with Theorem 13.2.10 and Lemma 13.3.3 in [BS98]). Given the grading on ∗ E(R/P ) as proposed in Remark 6.10, we have that (1) ∗ E(R/P )(ℓ) is Eulerian if and only if ℓ = a(R/P ) + n; 13 (2) the minimal graded injective resolution (or *-injective resolution) of R can be written as M ∗ 0 → R → ∗ E(R) → · · · → E(R/P )(a(R/P ) + n) → · · · → ∗ E(R/m)(n) → 0. ht P =j Proof. (1). This is clear by our grading on ∗ E(R/P ) and the fact that there is a unique grading on HPht P (R)(P ) that makes it Eulerian. (2). This follows immediately from the calculation of HPht P (R)(P ) using the minimal *-injective resolution of R (note that a(R) = −n and a(R/m) = 0).  References [Ask75] R. Askey: Orthogonal polynomials and special functions, Society for Industrial and Applied Mathematics, Philadelphia, Pa., 1975. 0481145 (58 #1288) [BS98] M. P. Brodmann and R. Y. Sharp: Local cohomology: an algebraic introduction with geometric applications, Cambridge Studies in Advanced Mathematics, vol. 60, Cambridge University Press, Cambridge, 1998. MR1613627 (99h:13020) [Gro67] A. Grothendieck: Éléments de géométrie algébrique. IV. Étude locale des schémas et des morphismes de schémas IV, Inst. Hautes Études Sci. Publ. Math. (1967), no. 32, 361. MR0238860 (39 #220) [KLZ12] M. Katzman, G. Lyubeznik, and W. Zhang: Two interesting examples of D-modules in characteristic p > 0, Bull. Lond. Math. Soc. 44 (2012), no. 6, 1116–1122. 3007644 [Luc78] E. Lucas: Sur les congruences des nombres eulériens et les coefficients différentiels des functions trigonométriques suivant un module premier, Bull. Soc. Math. France 6 (1878), 49–54. [Lyu93] G. Lyubeznik: Finiteness properties of local cohomology modules (an application of D-modules to commutative algebra), Invent. Math. 113 (1993), no. 1, 41–55. 1223223 (94e:13032) [Lyu97] G. Lyubeznik: F -modules: applications to local cohomology and D-modules in characteristic p > 0, J. Reine Angew. Math. 491 (1997), 65–130. MR1476089 (99c:13005) [Lyu00] G. Lyubeznik: Injective dimension of D-modules: a characteristic-free approach, J.Pure Appl.Algebra 149 (2000), 205–212. [Lyu11] G. Lyubeznik: A characteristic-free proof of a basic result on D-modules, J. Pure Appl. Algebra 215 (2011), no. 8, 2019–2023. 2776441 (2012b:13068) [Zha11] W. Zhang: Lyubeznik numbers of projective schemes, Adv. Math. 228 (2011), no. 1, 575–616. 2822240 [Zha12] Y. Zhang: Graded F -modules and local cohomology, Bull. Lond. Math. Soc. 44 (2012), no. 4, 758–762. 2967243 Department of Mathematics, University of Michigan, Ann Arbor, Michigan 48109 E-mail address: [email protected] Department of Mathematics, University of Nebraska, Lincoln, Nebraska 68588 E-mail address: [email protected] 14
0math.AC
Free Applicative Functors Paolo Capriotti Ambrus Kaposi University of Nottingham, United Kingdom University of Nottingham, United Kingdom [email protected] [email protected] Applicative functors [6] are a generalisation of monads. Both allow the expression of effectful computations into an otherwise pure language, like Haskell [5]. Applicative functors are to be preferred to monads when the structure of a computation is fixed a priori. That makes it possible to perform certain kinds of static analysis on applicative values. We define a notion of free applicative functor, prove that it satisfies the appropriate laws, and that the construction is left adjoint to a suitable forgetful functor. We show how free applicative functors can be used to implement embedded DSLs which can be statically analysed. 1 Introduction Free monads in Haskell are a very well-known and practically used construction. Given any endofunctor f, the free monad on f is given by a simple inductive definition: data Free f a = Return a | Free (f (Free f a)) The typical use case for this construction is creating embedded DSLs (see for example [10], where Free is called Term). In this context, the functor f is usually obtained as the coproduct of a number of functors representing “basic operations”, and the resulting DSL is the minimal embedded language including those operations. One problem of the free monad approach is that programs written in a monadic DSL are not amenable to static analysis. It is impossible to examine the structure of a monadic computation without executing it. In this paper, we show how a similar “free construction” can be realised in the context of applicative functors. In particular, we make the following contributions: • We give two definitions of free applicative functor in Haskell (section 2), and show that they are equivalent (section 5). • We prove that our definition is correct, in the sense that it really is an applicative functor (section 6), and that it is “free” in a precise sense (section 7). • We present a number of examples where the use of free applicative functors helps make the code more elegant, removes duplication or enables certain kinds of optimizations which are not possible when using free monads. We describe the differences between expressivity of DSLs using free applicatives and free monads (section 3). • We compare our definition to other existing implementations of the same idea (section 10). N.R. Krishnaswami and P.B. Levy (Eds.): Mathematically Structured Functional Programming 2014 (MSFP 2014). EPTCS 153, 2014, pp. 2–30, doi:10.4204/EPTCS.153.2 c P. Capriotti & A. Kaposi This work is licensed under the Creative Commons Attribution License. P. Capriotti & A. Kaposi 3 Applicative functors can be regarded as monoids in the category of endofunctors with Day convolution (see for instance [3], example 3.2.2). There exists a general theory for constructing free monoids in monoidal categories [4], but in this paper we aim to describe the special case of applicative functors using a formalism that is accessible to an audience of Haskell programmers. Familiarity with applicative functors is not required, although it is helpful to understand the motivation behind this work. We make use of category theoretical concepts to justify our definition, but the Haskell code we present can also stand on its own. The proofs in this paper are carried out using equational reasoning in an informally defined total subset of Haskell. In sections 8 and 9 we will show how to interpret all our definitions and proofs in a general (locally presentable) cartesian closed category, such as the category of sets. 1.1 Applicative functors Applicative functors (also called idioms) were first introduced in [6] as a generalisation of monads that provides a lighter notation for expressing monadic computations in an applicative style. They have since been used in a variety of different applications, including efficient parsing (see section 1.4), regular expressions and bidirectional routing. Applicative functors are defined by the following type class: class Functor f ⇒ Applicative f where pure :: a → f a ( <*> ) :: f (a → b) → f a → f b The idea is that a value of type f a represents an “effectful” computation returning a result of type a. The pure method creates a trivial computation without any effect, and ( <*> ) allows two computations to be sequenced, by applying a function returned by the first, to the value returned by the second. Since every monad can be made into an applicative functor in a canonical way,1 the abundance of monads in the practice of Haskell programming naturally results in a significant number of practically useful applicative functors. Applicatives not arising from monads, however, are not as widespread, probably because, although it is relatively easy to combine existing applicatives (see for example [7]), techniques to construct new ones have not been thoroughly explored so far. In this paper we are going to define an applicative functor FreeA f for any Haskell functor f, thus providing a systematic way to create new applicatives, which can be used for a variety of applications. The meaning of FreeA f will be clarified in section 7, but for the sake of the following examples, FreeA f can be thought of as the “simplest” applicative functor which can be built using f. 1.2 Example: option parsers To illustrate how the free applicative construction can be used in practice, we take as a running example a parser for options of a command-line tool. For simplicity, we will limit ourselves to an interface which can only accept options that take a single argument. We will use a double dash as a prefix for the option name. For example, a tool to create a new user in a Unix system could be used as follows: 1 To be precise, there are two canonical ways to turn a monad into an applicative functor, with opposite orderings of effects. Free Applicative Functors 4 create_user --username john \ --fullname "John Doe" \ --id 1002 Our parser could be run over the argument list and it would return a record of the following type: data User = User { username :: String , fullname :: String , id :: Int} deriving Show Furthermore, given a parser, it should be possible to automatically produce a summary of all the options that it supports, to be presented to the user of the tool as documentation. We can define a data structure representing a parser for an individual option, with a specified type, as a functor: data Option a = Option { optName :: String , optDefault :: Maybe a , optReader :: String → Maybe a} deriving Functor We now want to create a DSL based on the Option functor, which would allow us to combine options for different types into a single value representing the full parser. As stated in the introduction, a common way to create a DSL from a functor is to use free monads. However, taking the free monad over the Option functor would not be very useful here. First of all, sequencing of options should be independent: later options should not depend on the value parsed by previous ones. Secondly, monads cannot be inspected without running them, so there is no way to obtain a summary of all options of a parser automatically. What we really need is a way to construct a parser DSL in such a way that the values returned by the individual options can be combined using an Applicative interface. And that is exactly what FreeA will provide. Thus, if we use FreeA Option a as our embedded DSL, we can interpret it as the type of a parser with an unspecified number of options, of possibly different types. When run, those options would be matched against the input command line, in an arbitrary order, and the resulting values will be eventually combined to obtain a final result of type a. In our specific example, an expression to specify the command line option parser for create_user would look like this: userP :: FreeA Option User userP = User <$> one (Option "username" Nothing Just) <*> one (Option "fullname" (Just "") Just) <*> one (Option "id" Nothing readInt) readInt :: String → Maybe Int where we need a “generic smart constructor”: P. Capriotti & A. Kaposi 5 one :: Option a → FreeA Option a which lifts an option to a parser. 1.3 Example: web service client One of the applications of free monads, exemplified in [10], is the definition of special-purpose monads, allowing to express computations which make use of a limited and well-defined subset of IO operations. Given the following functor: data WebService a = GET {url :: URL , params :: [String] , result :: (String → a)} | POST {url :: URL , params :: [String] , body :: String , cont :: a} deriving Functor the free monad on WebService allows the definition of an application interacting with a web service with the same convenience as the IO monad, once “smart constructors” are defined for the two basic operations of getting and posting: get :: URL → [String] → Free WebService String get url params = Free (GET url params Return) post :: URL → [String] → String → Free WebService () post url params body = Free (POST url params body (Return ())) For example, one can implement an operation which copies data from one server to another as follows: copy :: URL → [String] → URL → [String] → Free WebService () copy srcURL srcPars dstURL dstPars = get srcURL srcPars >>= post dstURL dstPars For some applications, we might need to have more control over the operations that are going to be executed when we eventually run the embedded program contained in a value of type Free WebService a. For example, a web service client application executing a large number of GET and POST operations might want to rate limit the number of requests to a particular server by putting delays between them, and, on the other hand, parallelise requests to different servers. Another useful feature would be to estimate the time it would take to execute an embedded Web Service application. However, there is no way to achieve that using the free monad approach. In fact, it is not even possible to define a function like: count :: Free WebService a → Int which returns the total number of GET/POST operations performed by a value of type Free WebService a. To see why, consider the following example, which updates the email field in all the blog posts on a particular website: updateEmails :: String → Free WebService () updateEmails newEmail = do entryURLs ← get "myblog.com" ["list_entries"] forM (words entryURLs) $ λ entryURL → post entryURL ["updateEmail"] newEmail Free Applicative Functors 6 Now, the number of POST operations performed by updateEmails is the same as the number of blog posts on myblog.com which cannot be determined by a pure function like count. The FreeA construction, presented in this paper, represents a general solution for the problem of constructing embedded languages that allow the definition of functions performing static analysis on embedded programs, of which count :: FreeA WebService a → Int is a very simple example. 1.4 Example: applicative parsers The idea that monads are “too flexible” has also been explored, again in the context of parsing, by Swierstra and Duponcheel [9], who showed how to improve both performance and error-reporting capabilities of an embedded language for grammars by giving up some of the expressivity of monads. The basic principle is that, by weakening the monadic interface to that of an applicative functor (or, more precisely, an alternative functor), it becomes possible to perform enough static analysis to compute first sets for productions. The approach followed in [9] is ad-hoc: an applicative functor is defined, which keeps track of first sets, and whether a parser accepts the empty string. This is combined with a traditional monadic parser, regarded as an applicative functor, using a generalised semi-direct product, as described in [7]. The question, then, is whether it is possible to express this construction in a general form, in such a way that, given a functor representing a notion of “parser” for an individual symbol in the input stream, applying the construction one would automatically get an Applicative functor, allowing such elementary parsers to be sequenced. Free applicative functors can be used to that end. We start with a functor f, such that f a describes an elementary parser for individual elements of the input, returning values of type a. FreeA f a is then a parser which can be used on the full input, and combines all the outputs of the individual parsers out of which it is built, yielding a result of type a. Unfortunately, applying this technique directly results in a strictly less expressive solution. In fact, since FreeA f is the simplest applicative over f, it is necessarily just an applicative, i.e. it cannot also have an Alternative instance, which in this case is essential. The Alternative type class is defined as follows: class Applicative f ⇒ Alternative f where empty :: f a ( <|> ) :: f a → f a → f a An Alternative instance gives an applicative functor the structure of a monoid, with empty as the unit element, and <|> as the binary operation. In the case of parsers, empty matches no input string, while <|> is a choice operator between two parsers. We discuss the issue of Alternative in more detail in section 11. 2 Definition of free applicative functors To obtain a suitable definition for the free applicative functor generated by a functor f, we first pause to reflect on how one could naturally arrive at the definition of the Applicative class via an obvious generalisation of the notion of functor. Given a functor f, the fmap method gives us a way to lift unary pure functions a → b to effectful functions f a → f b, but what about functions of arbitrary arity? P. Capriotti & A. Kaposi 7 For example, given a value of type a, we can regard it as a nullary pure function, which we might want to lift to a value of type f a. Similarly, given a binary function h :: a → b → c, it is quite reasonable to ask for a lifting of h to something of type f a → f b → f c. The Functor instance alone cannot provide either of such liftings, nor any of the higher-arity liftings which we could define. It is therefore natural to define a type class for generalised functors, able to lift functions of arbitrary arity: class Functor f ⇒ MultiFunctor f where fmap0 :: a → f a fmap1 :: (a → b) → f a → f b fmap1 = fmap fmap2 :: (a → b → c) → f a → f b → f c It is easy to see that a higher-arity fmapn can now be defined in terms of fmap2 . For example, for n = 3: fmap3 :: MultiFunctor f ⇒ (a → b → c → d) →fa→fb→fc→fd fmap3 h x y z = fmap2 ( $ ) (fmap2 h x y) z However, before trying to think of what the laws for such a type class ought to be, we can observe that MultiFunctor is actually none other than Applicative in disguise. In fact, fmap0 has exactly the same type as pure, and we can easily convert fmap2 to ( <*> ) and vice versa: g <*> x = fmap2 ( $ ) g x fmap2 h x y = fmap h x <*> y The difference between ( <*> ) and fmap2 is that ( <*> ) expects the first two arguments of fmap2 , of types a → b → c and f a respectively, to be combined in a single argument of type f (b → c). This can always be done with a single use of fmap, so, if we assume that f is a functor, ( <*> ) and fmap2 are effectively equivalent. Nevertheless, this roundabout way of arriving to the definition of Applicative shows that an applicative functor is just a functor that knows how to lift functions of arbitrary arities. An overloaded notation to express the application of fmapi for all i is defined in [6], where it is referred to as idiom brackets. Given a pure function of arbitrary arity and effectful arguments: h : b1 → b2 → · · · → bn → a x1 : f b1 x2 : f b2 ··· xn : f bn the idiom bracket notation is defined as: J h x1 x2 · · · xn K = pure h <*> x1 <*> x2 <*> · · · <*> xn Free Applicative Functors 8 We can build such an expression formally by using a PureL constructor corresponding to pure and a left-associative infix ( :*: ) constructor corresponding to ( <*> ): PureL h :*: x1 :*: x2 :*: · · · :*: xn The corresponding inductive definition is: data FreeAL f a = PureL a | ∀b.FreeAL f (b → a) :*: f b infixl 4 :*: The MultiFunctor typeclass, the idiom brackets and the FreeAL definition correspond to the left parenthesised canonical form2 of expressions built with pure and ( <*> ). Just as lists built with concatenation have two canonical forms (cons-list and snoc-list) we can also define a right-parenthesised canonical form for applicative functors — a pure value over which a sequence of effectful functions are applied: x : b1 h1 : f (b1 → b2 ) h2 : f (b2 → b3 ) ··· hn : f (bn → a) hn <*> (· · · <*> (h2 <*> (h1 <*> pure x)) · · · ) Replacing pure with a constructor Pure and ( <*> ) by a right-associative infix ( :$: ) constructor gives the following expression: hn :$: · · · :$: h2 :$: h1 :$: Pure x The corresponding inductive type: data FreeA f a = Pure a | ∀b.f (b → a) :$: FreeA f b infixr 4 :$: FreeAL and FreeA are isomorphic (see section 5); we pick the right-parenthesised version as our official definition since it is simpler to define the Functor and Applicative instances: instan e Functor f ⇒ Functor (FreeA f) where fmap g (Pure x) = Pure (g x) fmap g (h :$: x) = fmap (g ◦ ) h :$: x The functor laws can be verified by structural induction, simply applying the definitions and using the functor laws for f. instan e Functor f ⇒ Applicative (FreeA f) where pure = Pure 2 Sometimes called simplified form because it is not necessarily unique. P. Capriotti & A. Kaposi 9 Pure g <*> y = fmap g y (h :$: x) <*> y = fmap uncurry h :$: (( , ) <$> x <*> y) In the last clause of the Applicative instance, h has type f (x → y → z), and we need to return a value of type FreeA f z. Since ( :$: ) only allows us to express applications of 1-argument “functions”, we uncurry h to get a value of type f ((x , y) → z), then we use ( <*> ) recursively (see section 8 for a justification of this recursive call) to pair x and y into a value of type FreeA f (x , y), and finally use the ( :$: ) constructor to build the result. Note the analogy between the definition of ( <*> ) and ( ++ ) for lists. 3 Applications 3.1 Example: option parsers (continued) By using our definition of free applicative, we can compose the command line option parser exactly as shown in section 1.2 in the definition of userP. The smart constructor one which lifts an option (a functor representing a basic operation of our embedded language) to a term in our language can now be implemented as follows: one :: Option a → FreeA Option a one opt = fmap const opt :$: Pure () A function which computes the global default value of a parser can also be defined: parserDefault :: FreeA Option a → Maybe a parserDefault (Pure x) = Just x parserDefault (g :$: x) = optDefault g <*> parserDefault x In section 7 we show that our definition is a free construction which gives us general ways to structure programs. Specifically, we are able to define a generic version of one which works for any functor. By exploiting the adjunction describing the free construction we are able to shorten the definition of parserDefault, define a function listing all possible options and a function parsing a list of command line arguments given in arbitrary order (section 7.1). 3.2 Example: web service client (continued) In section 1.3 we showed an embedded DSL for web service clients based on free monads does not support certain kinds of static analysis. However, we can now remedy this by using a free applicative, over the same functor WebService. In fact, the count function is now definable for FreeA WebService a. Moreover, this is not limited to this particular example: it is possible to define count for the free applicative over any functor. count :: FreeA f a → Int count (Pure ) = 0 count ( :$: u) = 1 + count u Free Applicative Functors 10 Static analysis of the embedded code now also allows decorating requests with parallelization instructions statically as well as rearranging requests to the same server. Of course, the extra power comes at a cost. Namely, the expressivity of the corresponding embedded language is severely reduced. Using FreeA WebService, all the URLs of the servers to which requests are sent must be known in advance, as well as the parameters and content of every request. In particular, what one posts to a server cannot depend on what has been previously read from another server, so operations like copy cannot be implemented. 3.3 Summary of examples Applicative functors are useful for describing certain kinds of effectful computations. The free applicative construct over a given functor specifying the “basic operations” of an embedded language gives rise to terms of the embedded DSL built by applicative operators. These terms are only capable of representing a certain kind of effectful computation which can be described best with the help of the left-parenthesised canonical form: a pure function applied to effectful arguments. The calculation of the arguments may involve effects but in the end the arguments are composed by a pure function, which means that the effects performed are fixed when specifying the applicative expression. In the case of the option parser example userP, the pure function is given by the User constructor and the “basic operation” Option is defining an option. The effects performed depend on how an evaluator is defined over an expression of type FreeA Option a and the order of effects can depend on the implementation of the evaluator. For example, if one defines an embedded language for querying a database, and constructs applicative expressions using FreeA, one might analyze the applicative expression and collect information on the individual database queries by defining functions similar to the count function in the web service example. Then, different, possibly expensive duplicate queries can be merged and performed at once instead of executing the effectful computations one by one. By restricting the expressivity of our language we gain freedom in defining how the evaluator works. One might define parts of an expression in an embedded DSL using the usual free monad construction, other parts using FreeA and compose them by lifting the free applicative expression to the free monad using the following function: liftA2M :: Functor f ⇒ FreeA f a → Free f a liftA2M (Pure x) = Return x liftA2M (h :$: x) = Free (fmap (λ f → fmap f (liftA2M x)) h) In the parts of the expression defined using the free monad construction, the order of effects is fixed and the effects performed can depend on the result of previous effectful computations, while the free applicative parts have a fixed structure with effects not depending on each other. The monadic parts of the computation can depend on the result of static analysis carried out over the applicative part: test :: FreeA FileSystem Int → Free FileSystem () test op = do ... let n = count op -- result of static analysis n′ ← liftA2M op -- result of applicative computation P. Capriotti & A. Kaposi 11 max ← read "max" when (max > n + n′ ) $ write "/tmp/test" "blah" ... The possibility of using the results of static analysis instead of the need of specifying them by hand (in our example, this would account to counting certain function calls in an expression by looking at the code) can make the program less redundant. 4 Parametricity In order to prove anything about our free applicative construction, we need to make an important observation about its definition. The ( :$: ) constructor is defined using an existential type b, and it is clear intuitively that there is no way, given a value of the form g :$: x, to make use of the type b hidden in it. More specifically, any function on FreeA f a must be defined polymorphically over all possible types b which could be used for the existentially quantified variable in the definition of ( :$: ). To make this intuition precise, we assume that some form of relational parametricity [8] [11] holds in our total subset of Haskell. In particular, in the case of the ( :$: ) constructor, we require that: ( :$: ) :: ∀b.f (b → a) → (FreeA f b → FreeA f a) is a natural transformation of contravariant functors. The two contravariant functors here could be defined, in Haskell, using a newtype: newtype F1 f a x = F1 (f (x → a)) newtype F2 f a x = F2 (FreeA f x → FreeA f a) instan e Functor f ⇒ Contravariant (F1 f a) where contramap h (F1 g) = F1 $ fmap ( ◦ h) g instan e Functor f ⇒ Contravariant (F2 f a) where contramap h (F2 g) = F2 $ g ◦ fmap h The action of F1 and F2 on morphisms is defined in the obvious way. Note that here we make use of the fact that FreeA f is a functor. Naturality of ( :$: ) means that, given types x and y, and a function h : x → y, the following holds: ∀g :: f (y → a), u :: FreeA f x. fmap ( ◦ h) g :$: u ≡ g :$: fmap h u (1) where we have unfolded the definitions of contramap for F1 and F2, and removed the newtypes. Note that the results in [8] do not actually imply naturality of ( :$: ) at this generality, since f is a type variable with an arbitrary Functor instance, not a concrete positive type expression together with its canonical instance. However, in the interpretation given in sections 8 and 9, FreeA will be defined in such a way that equation 1 holds automatically. Free Applicative Functors 12 5 Isomorphism of the two definitions In this section we show that the two definitions of free applicatives given in section 2 are isomorphic. First of all, if f is a functor, FreeAL f is also a functor: instan e Functor f ⇒ Functor (FreeAL f) where fmap g (PureL x) = PureL (g x) fmap g (h :*: x) = (fmap (g ◦ ) h) :*: x Again, the functor laws can be verified by a simple structural induction. For the ( :*: ) constructor, a free theorem can be derived in a completely analogous way to deriving equation 1. This equation states that ( :*: ) is a natural transformation: ∀h :: x → y, g :: FreeAL f (y → a), u :: f x. fmap ( ◦ h) g :*: u ≡ g :*: fmap h u (2) We define functions to convert between the two definitions: r2l :: Functor f ⇒ FreeA f a → FreeAL f a r2l (Pure x) = PureL x r2l (h :$: x) = fmap (flip ( $ )) (r2l x) :*: h l2r :: Functor f ⇒ FreeAL f a → FreeA f a l2r (PureL x) = Pure x l2r (h :*: x) = fmap (flip ( $ )) x :$: l2r h We will also need the fact that l2r is a natural transformation: ∀h :: x → y, u :: FreeAL f x. l2r (fmap h u) ≡ fmap h (l2r u) (3) Proposition 1. r2l is an isomorphism, the inverse of which is l2r. Proof. First we prove that ∀u :: FreeA f a.l2r (r2l u) ≡ u. We compute using equational reasoning with induction on u: l2r (r2l (Pure x)) ≡ h definition of r2l i l2r (PureL x) ≡ h definition of l2r i Pure x l2r (r2l (h :$: x)) ≡ h definition of r2l i l2r (fmap (flip ( $ )) (r2l x) :*: h) ≡ h definition of l2r i fmap (flip ( $ )) h :$: l2r (fmap (flip ( $ )) (r2l x)) P. Capriotti & A. Kaposi 13 ≡ h equation 3 i fmap (flip ( $ )) h :$: fmap (flip ( $ )) (l2r (r2l x)) ≡ h inductive hypothesis i fmap (flip ( $ )) h :$: fmap (flip ( $ )) x ≡ h equation 1 i fmap ( ◦ (flip ( $ ))) (fmap (flip ( $ )) h) :$: x ≡ h f is a functor i fmap (( ◦ (flip ( $ ))) ◦ flip ( $ )) h :$: x ≡ h definition of flip and ( $ ) i fmap id h :$: x ≡ h f is a functor i h :$: x Next, we prove that ∀u :: FreeAL f a.r2l (l2r u) ≡ u. Again, we compute using equational reasoning with induction on u: r2l (l2r (PureL x)) ≡ h definition of l2r i r2l (Pure x) ≡ h definition of r2l i PureL x r2l (l2r (h :*: x)) ≡ h definition of l2r i r2l (fmap (flip ( $ )) x :$: l2r h) ≡ h definition of r2l i fmap (flip ( $ )) (r2l (l2r h)) :*: fmap (flip ( $ )) x ≡ h inductive hypothesis i fmap (flip ( $ )) h :*: fmap (flip ( $ )) x ≡ h equation 2 i fmap ( ◦ (flip ( $ ))) (fmap (flip ( $ )) h) :*: x ≡ h FreeAL f is a functor i fmap (( ◦ (flip ( $ ))) ◦ flip ( $ )) h :*: x ≡ h definition of flip and ( $ ) i fmap id h :*: x ≡ h FreeAL f is a functor i h :*: x In the next sections, we will prove that FreeA is a free applicative functor. Because of the isomorphism of the two definitions, these results will carry over to FreeAL. Free Applicative Functors 14 6 Applicative laws Following [6], the laws for an Applicative instance are: pure id <*> u ≡ u (4) pure ( ◦ ) <*> u <*> v <*> x ≡ u <*> (v <*> x) (5) pure f <*> pure x ≡ pure (f x) u <*> pure x ≡ pure ( $ x) <*> u We introduce a few abbreviations to help make the notation lighter: uc = uncurry pair x y = ( , ) <$> x <*> y Lemma 1. For all u :: y → z v :: FreeA f (x → y) x :: FreeA f x the following equation holds: fmap u (v <*> x) ≡ fmap (u ◦ ) v <*> x Proof. We compute: fmap u (Pure v <*> x) ≡ h definition of ( <*> ) i fmap u (fmap v x) ≡ h FreeA f is a functor i fmap (u ◦ v) x ≡ h definition of ( <*> ) i Pure (u ◦ v) <*> x ≡ h definition of fmap i fmap (u ◦ ) (Pure v) <*> x fmap u ((g :$: y) <*> x) ≡ h definition of ( <*> ) i fmap u (fmap uc g :$: pair y x) ≡ h definition of fmap i fmap (u ◦ ) (fmap uc g) :$: pair y x ≡ h f is a functor i fmap (λ g → u ◦ uc g) g :$: pair y x ≡ h f is a functor i fmap uc (fmap ((u ◦ ) ◦ ) g) :$: pair y x ≡ h definition of ( <*> ) i (6) (7) P. Capriotti & A. Kaposi 15 (fmap ((u ◦ ) ◦ ) g :$: y) <*> x ≡ h definition of fmap i fmap (u ◦ ) (g :$: y) <*> x Lemma 2. Property 5 holds for FreeA f, i.e. for all u :: FreeA f (y → z) v :: FreeA f (x → y) x :: FreeA f x, pure ( ◦ ) <*> u <*> v <*> x ≡ u <*> (v <*> x) Proof. Suppose first that u = Pure u0 for some u0 :: y → z: Pure ( ◦ ) <*> Pure u0 <*> v <*> x ≡ h definition of ( <*> ) i Pure (u0 ◦ ) <*> v <*> x ≡ h definition of ( <*> ) i fmap (u0 ◦ ) v <*> x ≡ h lemma 1 i fmap u0 (v <*> x) ≡ h definition of ( <*> ) i Pure u0 <*> (v <*> x) To tackle the case where u = g :$: w, for g :: f (w → y → z) w :: FreeA f w, we need to define a helper function t :: ((w , x → y) , x) → (w , y) t ((w , v) , x) = (w , v x) and compute: pure ( ◦ ) <*> (g :$: w) <*> v <*> x ≡ h definition of pure and ( <*> ) i (fmap (( ◦ ) ◦ ) g :$: w) <*> v <*> x ≡ h definition of composition i (fmap (λ g w v → g w ◦ v) g :$: w) <*> v <*> x ≡ h definition of ( <*> ) i (fmap uc (fmap (λ g w v → g w ◦ v) g) :$: pair w v) <*> x ≡ h f is a functor and definition of uc i (fmap (λ g (w , v) → g w ◦ v) g :$: pair w v) <*> x Free Applicative Functors 16 ≡ h definition of ( <*> ) i fmap uc (fmap (λ g (w , v) → g w ◦ v) g) :$: pair (pair w v) x ≡ h f is a functor and definition of uc i fmap (λ g ((w , v) , x) → g w (v x)) g :$: pair (pair w v) x ≡ h definition of uc and t i fmap (λ g → uc g ◦ t) g :$: pair (pair w v) x ≡ h f is a functor i fmap ( ◦ t) (fmap uc g) :$: pair (pair w v) x ≡ h equation 1 i fmap uc g :$: fmap t (pair (pair w v) x) ≡ h lemma 1 (3 times) and FreeA f is a functor (3 times) i fmap uc g :$: (pure ( ◦ ) <*> fmap ( , ) w <*> v <*> x) ≡ h induction hypothesis for fmap ( , ) w i fmap uc g :$: (fmap ( , ) w <*> (v <*> x)) ≡ h definition of ( <*> ) i (g :$: w) <*> (v <*> x) Lemma 3. Property 7 holds for FreeA f, i.e. for all u :: FreeA f (x → y) x :: x, u <*> pure x ≡ pure ( $ x) <*> u Proof. If u is of the form Pure u0 , then the conclusion follows immediately. Let’s assume, therefore, that u = g :$: w, for some w :: w, g :: f (w → x → y), and that the lemma is true for structurally smaller values of u: (g :$: w) <*> pure x ≡ h definition of ( <*> ) i fmap uc g :$: pair w (pure x) ≡ h definition of pair i fmap uc g :$: (fmap ( , ) w <*> pure x) ≡ h induction hypothesis for fmap ( , ) w i fmap uc g :$: (pure ( $ x) <*> fmap ( , ) w) ≡ h FreeA f is a functor i fmap uc g :$: fmap (λ w → (w , x)) w) ≡ h equation 1 i fmap (λ g w → g (w , x)) (fmap uc g) :$: w ≡ h f is a functor i fmap (λ g w → g w x) g :$: w ≡ h definition of fmap for FreeA f i fmap ( $ x) (g :$: w) P. Capriotti & A. Kaposi 17 ≡ h definition of ( <*> ) i pure ( $ x) <*> (g :$: w) Proposition 2. FreeA f is an applicative functor. Proof. Properties 4 and 6 are straightforward to verify using the fact that FreeA f is a functor, while properties 5 and 7 follow from lemmas 2 and 3 respectively. 7 FreeA as a Left adjoint We are now going to make the statement that FreeA f is the free applicative functor on f precise. First of all, we will define a category A of applicative functors, and show that FreeA is a functor FreeA : F → A , where F is the category of endofunctors of Hask. Saying that FreeA f is the free applicative on f, then, amounts to saying that FreeA is left adjoint to the forgetful functor A → F . Definition 1. Let f and g be two applicative functors. An applicative natural transformation between f and g is a polymorphic function t :: ∀a.f a → g a satisfying the following laws: t (pure x) ≡ pure x (8) t (h <*> x) ≡ t h <*> t x. (9) We define the type of all applicative natural transformations between f and g, we write, in Haskell, type AppNat f g = ∀a.f a → g a where the laws are implied. Similarly, for any pair of functors f and g, we define type Nat f g = ∀a.f a → g a for the type of natural transformations between f and g. Note that, by parametricity, polymorphic functions are automatically natural transformations in the categorical sense, i.e, for all t :: Nat f g h :: a → b x :: f a, t (fmap h x) ≡ fmap h (t x). It is clear that applicative functors, together with applicative natural transformations, form a category, which we denote by A , and similarly, functors and natural transformations form a category F . Free Applicative Functors 18 Proposition 3. FreeA defines a functor F → A . Proof. We already showed that FreeA sends objects (functors in our case) to applicative functors. We need to define the action of FreeA on morphisms (which are natural transformations in our case): liftT :: (Functor f , Functor g) ⇒ Nat f g → AppNat (FreeA f) (FreeA g) liftT (Pure x) = Pure x liftT k (h :$: x) = k h :$: liftT k x First we verify that liftT k is an applicative natural transformation i.e. it satisfies laws 8 and 9. We use equational reasoning for proving law 8: liftT k (pure x) ≡ h definition of pure i liftT k (Pure x) ≡ h definition of liftT i Pure x ≡ h definition of pure i pure x For law 9 we use induction on the size of the first argument of ( <*> ) as explained in section 8. The base cases: liftT k (Pure h <*> Pure x) ≡ h definition of ( <*> ) i liftT k (fmap h (Pure x)) ≡ h definition of fmap i liftT k (Pure (h x)) ≡ h definition of liftT i Pure (h x) ≡ h definition of fmap i fmap h (Pure x) ≡ h definition of ( <*> ) i Pure h <*> Pure x ≡ h definition of liftT i liftT k (Pure h) <*> liftT k (Pure x) liftT k (Pure h <*> (i :$: x)) ≡ h definition of ( <*> ) i liftT k (fmap h (i :$: x)) ≡ h definition of fmap i liftT k (fmap (h ◦ ) i :$: x) ≡ h definition of liftT i k (fmap (h ◦ ) i) :$: liftT k x ≡ h k is natural i P. Capriotti & A. Kaposi 19 fmap (h ◦ ) (k i) :$: liftT k x ≡ h definition of fmap i fmap h (k i :$: liftT k x) ≡ h definition of ( <*> ) i Pure h <*> (k i :$: liftT k x) ≡ h definition of liftT i liftT k (Pure h) <*> liftT k (i :$: x) The inductive case: liftT k ((h :$: x) <*> y) ≡ h definition of ( <*> ) i liftT k (fmap uncurry h :$: (fmap ( , ) x <*> y) ≡ h definition of liftT i k (fmap uncurry h) :$: liftT k (fmap ( , ) x <*> y) ≡ h inductive hypothesis i k (fmap uncurry h) :$: (liftT k (fmap ( , ) x) <*> liftT k y) ≡ h liftT k is natural i k (fmap uncurry h) :$: (fmap ( , ) (liftT k x) <*> liftT k y) ≡ h k is natural i fmap uncurry (k h) :$: (fmap ( , ) (liftT k x) <*> liftT k y) ≡ h definition of ( <*> ) i (k h :$: liftT k x) <*> liftT k y ≡ h definition of liftT i liftT k (h :$: x) <*> liftT k y Now we need to verify that liftT satisfies the functor laws liftT id ≡ id liftT (t ◦ u) ≡ liftT t ◦ liftT u. The proof is a straightforward structural induction. We are going to need the following natural transformation (which will be the unit of the adjunction 11): one :: Functor f ⇒ Nat f (FreeA f) one x = fmap const x :$: Pure () which embeds any functor f into FreeA f (we used a specialization of this function for Option in section 1.2). Lemma 4. g :$: x ≡ one g <*> x Free Applicative Functors 20 Proof. Given h :: a → (() , a) h x = (() , x) it is easy to verify that: ( ◦ h) ◦ uncurry ◦ const ≡ id, (10) so one g <*> x ≡ h definition of one i (fmap const g :$: Pure ()) <*> x ≡ h definition of ( <*> ) and functor law for f i fmap (uncurry ◦ const) g :$: fmap h x ≡ h equation 1 and functor law for f i fmap (( ◦ h) ◦ uncurry ◦ const) g :$: x ≡ h equation 10 i g :$: x Proposition 4. The FreeA functor is left adjoint to the forgetful functor A → F . Graphically: lower −→ HomF (FreeA f, g) ∼ = HomA (f, g) ←− (11) raise Proof. Given a functor f and an applicative functor g, we define a natural bijection between Nat f g and AppNat (FreeA f) g as such: raise :: (Functor f , Applicative g) ⇒ Nat f g → AppNat (FreeA f) g raise (Pure x) = pure x raise k (g :$: x) = k g <*> raise k x lower :: (Functor f , Applicative g) ⇒ AppNat (FreeA f) g → Nat f g lower k = k ◦ one A routine verification shows that raise and lower are natural in f and g. The proof that raise k satisfies the applicative natural transformation laws 8 and 9 is a straightforward induction having the same structure as the proof that liftT k satisfies these laws (proposition 3). To show that f and g are inverses of each other, we reason by induction and calculate in one direction: raise (lower t) (Pure x) ≡ h definition of raise i pure x P. Capriotti & A. Kaposi 21 ≡ h t is an applicative natural transformation i t (pure x) ≡ h definition of pure i t (Pure x) raise (lower t) (g :$: x) ≡ h definition of raise i lower t g <*> raise (lower t) x ≡ h induction hypothesis i lower t g <*> t x ≡ h definition of lower i t (one g) <*> t x ≡ h t is an applicative natural transformation i t (one g <*> x) ≡ h lemma 4 i t (g :$: x) The other direction: lower (raise t) x ≡ h definition of lower i raise t (one x) ≡ h definition of one i raise t (fmap const x :$: Pure ()) ≡ h definition of raise i t (fmap const x) <*> pure () ≡ h t is natural i fmap const (t x) <*> pure () ≡ h fmap h ≡ ((pure h) <*> ) in an applicative functor i pure const <*> t x <*> pure () ≡ h t is natural i pure ( $ ()) <*> (pure const <*> t x) ≡ h applicative law 5 i pure ( ◦ ) <*> pure ( $ ()) <*> pure const <*> t x ≡ h applicative law 6 applied twice i pure id <*> t x ≡ h applicative law 4 i tx 7.1 Example: option parsers (continued) With the help of the adjunction defined above by raise and lower we are able to define some useful functions. In the case of command-line option parsers, for example, it can be used for computing the global default value of a parser: Free Applicative Functors 22 parserDefault :: FreeA Option a → Maybe a parserDefault = raise optDefault or for extracting the list of all the options in a parser: allOptions :: FreeA Option a → [String] allOptions = getConst ◦ raise f where f opt = Const [optName opt] allOptions works by first defining a function that takes an option and returns a one-element list with the name of the option, and then lifting it to the Const applicative functor. The raise function can be thought of as a way to define a “semantics” for the whole syntax of the DSL corresponding to FreeA f, given one for just the individual atomic actions, expressed as a natural transformation from the functor f to any applicative functor g. When defining such a semantics using raise, the resulting function is automatically an applicative natural transformation. In some circumstances, however, it is more convenient to define a function by pattern matching directly on the constructors of FreeA f, like when the target does not have an obvious applicative functor structure that makes the desired function an applicative natural transformation. For example, we can write a function that runs an applicative option parser over a list of command-line arguments, accepting them in any order: matchOpt :: String → String → FreeA Option a → Maybe (FreeA Option a) matchOpt (Pure ) = Nothing matchOpt opt value (g :$: x) | opt ≡ ’-’ : ’-’ : optName g = fmap ( <$> x) (optReader g value) | otherwise = fmap (g :$: ) (matchOpt opt value x) The matchOpt function looks for options in the parser which match the given command-line argument, and, if successful, returns a modified parser where the option has been replaced by a pure value. Clearly, matchOpt opt value is not applicative, since, for instance, equation 8 is not satisfied. runParser :: FreeA Option a → [String] → Maybe a runParser p (opt : value : args) = ase matchOpt opt value p of Nothing → Nothing Just p′ → runParser p′ args runParser p [ ] = parserDefault p runParser = Nothing Finally, runParser calls matchOpt with successive pairs of arguments, until no arguments remain, at which point it uses the default values of the remaining options to construct a result. P. Capriotti & A. Kaposi 8 23 Totality All the proofs in this paper apply to a total fragment of Haskell, and completely ignore the presence of bottom. The Haskell subset we use can be given a semantics in any locally presentable cartesian closed category. In fact, if we assume that all the functors used throughout the paper are accessible, all our inductive definitions can be regarded as initial algebras of accessible functors. For example, to realise FreeA f, assume f is κ -accessible for some regular cardinal κ . Then define a functor: A : Funcκ (C , C ) → Funcκ (C , C ), where Funcκ is the category of κ -accessible endofunctors of C , which is itself locally presentable by proposition 5. The inductive definition of FreeA f above can then be regarded as the initial algebra of A, given by: (AG)a = a + Z b:C F[b, a] × Gb, (12) where [−, −] denotes the internal hom (exponential) in C . Since F and G are locally presentable, and C is cocomplete, the coend exists by lemma 8, and AG is κ -accessible by lemma 7, provided κ is large enough. Furthermore, the functor A itself is accessible by proposition 6, hence it has an initial algebra. Equation 1 is then a trivial consequence of this definition. As for function definitions, most use primitive recursion, so they can be realised by using the universal property of the initial algebra directly. One exception is the definition of ( <*> ): (h :$: x) <*> y = fmap uncurry h :$: (( , ) <$> x <*> y) which contains a recursive call where the first argument, namely ( , ) <$> x, is not structurally smaller than the original one (h :$: x). To prove that this function is nevertheless well defined, we introduce a notion of size for values of type FreeA f a: size :: FreeA f a → N size (Pure ) = 0 size ( :$: x) = 1 + size x To conclude that the definition of ( <*> ) can be made sense of in our target category, we just need to show that the size of the argument in the recursive call is smaller than the size of the original argument, which is an immediate consequence of the following lemma. Lemma 5. For any function f :: a → b and u :: FreeA f a, size (fmap f u) ≡ size u Proof. By induction: size (fmap f (Pure x)) ≡ h definition of fmap i Free Applicative Functors 24 size (Pure (f x)) ≡ h definition of size i 0 ≡ h definition of size i size (Pure x) size (fmap f (g :$: x)) ≡ h definition of fmap i size (fmap (f ◦ ) g :$: x) ≡ h definition of size i 1 + size x ≡ h definition of size i size (g :$: x) In most of our proofs using induction we carry out induction on the size of the first argument of ( <*> ) where size is defined by the above size function. 9 Semantics In this section, we establish the results about accessible functors of locally presentable categories that we used in section 8 to justify the inductive definition of FreeA f. We begin with a technical lemma: Lemma 6. Suppose we have the following diagram of categories and functors: A i  F B K  ⑥ ⑥ ⑥L // C ⑥>> D where B, and C are locally presentable, F is accessible, and i is the inclusion of a dense small full subcategory of compact objects of B. Then the pointwise left Kan extension L of F along K exists and is equal to the left Kan extension of Fi along Ki. If, furthermore, D is locally presentable and K is accessible, then L is accessible. Proof. Let κ be a regular cardinal such that B and C are κ -locally presentable. The pointwise left Kan extension L can be obtained as a colimit: Ld = colim Fb, b:B g:Kb→d (13) Where the indices range over the comma category (K ↓ d). To show that L exists, it is therefore enough to prove that the colimit 13 can be realised as the small colimit: colim Fa. a:A f :Ka→d P. Capriotti & A. Kaposi 25 For any b : B, and g : Kb → d, we can express b as a canonical κ -filtered colimit of compact objects: b∼ = colim a. a:A h:a→b Since F preserves κ -filtered colimits, we then get a morphism: Fb → colim Fa → colim Fa. a:A h:a→b a:A f :Ka→d This gives a cocone for the colimit 13, and a straightforward verification shows that it is universal. As for the second statement, suppose D is also κ -locally presentable. By possibly increasing κ , we can assume that Ka is κ -compact for all a : A (such a κ exists because A is small, and every object of D is λ -compact for some λ ). Then, by the first part: Ld = Z a:A Fa · D(Ka, d). Now, a filtered colimit in d commutes with D(Ka, −) because Ka is compact, it commutes with Fa · − because copowers are left adjoints, and it commutes with coends because they are both colimits. Therefore, L is accessible. From now on, let B and C be categories with finite products, and F, G : B → C be functors. Definition 2. The Day convolution of F and G, denoted F ∗ G, is the pointwise left Kan extension of the diagonal functor in the following diagram: F×G // C ×C ❑❑❑ ❑❑❑ × ❑❑❑ ×  ❑%%  B ❴ ❴ ❴ ❴ ❴// C B × B❑ F∗G Note that the Day convolution of two functors might not exist, but it certainly does if B is small and C is cocomplete. Lemma 7. Suppose that B and C are locally presentable and F and G are accessible. Then the Day convolution of F and G exists and is accessible. Proof. Immediate consequence of lemma 6. Lemma 8. Suppose that B is cartesian closed. Then the Day convolution of F and G can be obtained as the coend: (F ∗ G)b = Z y:B F[y, b] × Gy Free Applicative Functors 26 Proof. By coend calculus: (F ∗ G)b = Z xy:B = Z y:B Fx × Gy · C (x × y, b)   Z y:B Z x:B = Fx · C (x × y, b) × Gy  Z y:B Z x:B = Fx · C (x, [y, b]) × Gy F[y, b] × Gy Proposition 5. Let κ be a regular cardinal, and B and C be locally κ -presentable. Then the category Funcκ (B, C ) of κ -accessible functors is locally κ -presentable. Proof. Let A be a dense small full subcategory of B. The obvious functor Funcκ (B, C ) → Func(A , C ) is an equivalence of categories (its inverse is given by left Kan extensions along the inclusion A → B), and Func(A , C ) is locally κ -presentable (see for example [2], corollary 1.54). Proposition 6. Let κ be a regular cardinal such that B and C are locally κ -presentable, and the Day convolution of any two κ -accessible functors is κ -accessible (which exists by lemma 7). Then the Day convolution operator Funcκ (B, C ) × Funcκ (B, C ) → Funcκ (B, C ) is itself a κ -accessible functor. Proof. It is enough to show that ∗ preserves filtered colimits pointwise in its two variables separately. But this is clear, since filtered colimits commute with finite products, copowers and coends. We can recast equation 12 in terms of Day convolution as follows: AG = Id + F ∗ G. (14) Equation 14 makes precise the intuition that free applicative functors are in some sense lists (i.e. free monoids). In fact, the functor A is exactly the one appearing in the usual recursive definition of lists, only in this case the construction is happening in the monoidal category of accessible endofunctors equipped with Day convolution. We also sketch the following purely categorical construction of free applicative (i.e. lax monoidal) functors, which is not essential for the rest of the paper, but is quite an easy consequence of the machinery developed in this section. The idea is to perform the “list” construction in one step, instead of iterating individual Day convolutions using recursion. Namely, for any category C , let C ∗ be the free monoidal category generated by C . The objects (resp. morphisms) of C ∗ are lists of objects (resp. morphisms) of C . Clearly, C ∗ is accessible if C is. If C has finite products, there is a functor ε :C∗ → C P. Capriotti & A. Kaposi 27 which maps a list to its corresponding product. Note that ε is accessible. Furthermore, the assigment C 7→ C ∗ extends to a 2-functor on Cat which preserves accessibility of functors. Now, the free applicative G on a functor F : C → C is simply defined to be the Kan extension of ε ◦ F ∗ along ε : F∗ // C ∗ ❈❈ ❈❈ ε ❈❈ ε ❈!!   C ❴ ❴ ❴// C C ∗❈ G The functor G is accessible by an appropriate generalisation of lemma 6, and it is not hard to see that it is lax monoidal (see for example [7], proposition 4). We omit the proof that G is a free object, which can be obtained by diagram chasing using the universal property of Kan extensions. 10 Related work The idea of free applicative functors is not entirely new. There have been a number of different definitions of free applicative functor over a given Haskell functor, but none of them includes a proof of the applicative laws. The first author of this paper published a specific instance of applicative functors3 similar to our example shown in section 1.2. The example has later been expanded into a fully-featured Haskell library for command line option parsing.4 Tom Ellis proposes a definition very similar to ours,5 but uses a separate inductive type for the case corresponding to our ( :$: ) constructor. He then observes that law 6 probably holds because of the existential quantification, but does not provide a proof. We solve this problem by deriving the necessary equation 1 as a “free theorem”. Gergő Érdi gives another similar definition6 , but his version presents some redundancies, and thus fails to obey the applicative laws. For example, Pure id <*> x can easily be distinguished from x using a function like our count above, defined by pattern matching on the constructors. However, this is remedied by only exposing a limited interface which includes the equivalent of our raise function, but not the Pure and Free constructors. It is probably impossible to observe a violation of the laws using the reduced interface, but that also means that definitions by pattern matching, like the one for our matchOpt in section 7.1, are prohibited. The free package on hackage7 contains a definition essentially identical to our FreeAL, differing only in the order of arguments. Another approach, which differs significantly from the one presented in the paper, underlies the definition contained in the free-functors package on hackage,8 and uses a Church-like encoding (and the ConstraintKinds GHC extension) to generalise the construction of a free Applicative to any superclass of Functor. 3 http://paolocapriotti.com/blog/2012/04/27/applicative-option-parser 4 http://hackage.haskell.org/package/optparse-applicative 5 http://web.jaguarpaw.co.uk/ ~tom/blog/posts/2012-09-09-towards-free-applicatives.html 6 http://gergo.erdi.hu/blog/2012-12-01-static_analysis_with_applicatives/ 7 http://hackage.haskell.org/package/free 8 http://hackage.haskell.org/package/free-functors Free Applicative Functors 28 The idea is to use the fact that, if a functor T has a left adjoint F, then the monad T ◦ F is the codensity monad of T (i.e. the right Kan extension of T along itself). By taking T to be the forgetful functor A → F , one can obtain a formula for F using the expression of a right Kan extension as an end. One problem with this approach is that the applicative laws, which make up the definition of the category A , are left implicit in the universal quantification used to represent the end. In fact, specializing the code in Data.Functor.HFree to the Applicative constraint, we get: data FreeA′ f a = FreeA′ { runFreeA :: ∀g.Applicative g ⇒ (∀x.f x → g x) → g a} instan e Functor f ⇒ Functor (FreeA′ f) where fmap h (FreeA′ t) = FreeA′ (fmap h ◦ t) instan e Functor f ⇒ Applicative (FreeA′ f) where pure x = FreeA′ (λ → pure x) FreeA′ t1 <*> FreeA′ t2 = FreeA′ (λ u → t1 u <*> t2 u) Now, for law 4 to hold, for example, we need to prove that the term λ u → pure id <*> t u is equal to t. This is strictly speaking false, as those terms can be distinguished by taking any functor with an Applicative instance that does not satisfy law 4, and as t a constant function returning a counterexample for it. Intuitively, however, the laws should hold provided we never make use of invalid Applicative instances. To make this intuition precise, one would probably need to extend the language with quantification over equations, and prove a parametricity result for this extension. Another problem of the Church encoding is that, like Érdi’s solution above, it presents a more limited interface, and thus it is harder to use. In fact, the destructor runFreeA is essentially equivalent to our raise function, which can only be used to define applicative natural transformation. Again, a function like matchOpt, which is not applicative, could not be defined over FreeA′ in a direct way. 11 Discussion and further work We have presented a practical definition of free applicative functor over any Haskell functor, proved its properties, and showed some of its applications. As the examples in this paper show, free applicative functors solve certain problems very effectively, but their applicability is somewhat limited. For example, applicative parsers usually need an Alternative instance as well, and the free applicative construction does not provide that. One possible direction for future work is trying to address this issue by modifying the construction to yield a free Alternative functor, instead. Unfortunately, there is no satisfactory set of laws for alternative functors: if we simply define an alternative functor as a monoid object in A , then many commonly used instances become invalid, like the one for Maybe. Using rig categories and their lax functors to formalise alternative functors seems to be a workable strategy, and we are currently exploring it. Another direction is formalizing the proofs in this paper in a proof assistant, by embedding the total subset of Haskell under consideration into a type theory with dependent types. Our attempts to replicate the proofs in Agda have failed, so far, because of subtle issues in the interplay between parametricity and the encoding of existentials with dependent sums. P. Capriotti & A. Kaposi 29 In particular, equation 1 is inconsistent with a representation of the existential as a Σ type in the definition of FreeA. For example, terms like const () :$: Pure 3 and id :$: Pure () are equal by equation 1, but can obviously be distinguished using large elimination. This is not too surprising, as we repeatedly made use of size restrictions in sections 8 and 9, and those will definitely need to be somehow replicated in a predicative type theory like the one implemented by Agda. A reasonable compromise is to develop the construction only for containers [1], for which one can prove that the free applicative on the functor S ⊲ P is given, using the notation at the end of section 9, by S∗ ⊲ (ε ◦ P∗ ), where S is regarded as a discrete category. Another possible further development of the results in this paper is trying to generalise the construction of a free applicative functor to functors of any monoidal category. In section 9 we focused on categories with finite products, but it is clear that monoidal categories are the most natural setting, as evidenced by the appearance of the corresponding 2-comonad on Cat. Furthermore, an applicative functor is defined in [6] as a lax monoidal functor with a strength, but we completely ignore strengths in this paper. This could be remedied by working in the more general setting of V -categories and V -functors, for some monoidal category V . 12 Acknowledgements We would like to thank Jennifer Hackett, Thorsten Altenkirch, Venanzio Capretta, Graham Hutton, Edsko de Vries and Christian Sattler, for helpful suggestions and insightful discussions on the topics presented in this paper. References [1] Michael Abott, Thorsten Altenkirch & Neil Ghani (2005): Containers - Constructing Strictly Positive Types. Theoretical Computer Science 342, pp. 3–27, doi:10.1016/j.tcs.2005.06.002. Applied Semantics: Selected Topics. [2] J. Adámek & J. Rosický (1994): Locally Presentable and Accessible Categories. Cambridge University Press, doi:10.1017/CBO9780511600579. [3] Brian J. Day (1970): Construction of Biclosed Categories. Ph.D. thesis, University of New South Wales. [4] G. M. Kelly (1980): A unified treatment of transfinite constructions for free algebras, free monoids, colimits, associated sheaves, and so on. Bulletin of the Australian Mathematical Society 22, pp. 1–83, doi:10.1017/ S0004972700006353. [5] Simon Marlow (2010): Haskell 2010 Language Report. [6] Conor McBride & Ross Paterson (2008): Applicative programming with effects. Journal of Functional Programming 18(1), pp. 1–13, doi:10.1017/S0956796807006326. [7] Ross Paterson (2012): Constructing Applicative Functors. In: Mathematics of Program Construction, Lecture Notes in Computer Science 7342, Springer-Verlag, pp. 300–323, doi:10.1007/978-3-642-31113-0_15. [8] John C. Reynolds (1983): Types, Abstraction and Parametric Polymorphism. In: IFIP Congress, pp. 513–523. [9] S. Doaitse Swierstra & Luc Duponcheel (1996): Deterministic, Error-Correcting Combinator Parsers. In: Advanced Functional Programming, Lecture Notes in Computer Science 1129, Springer-Verlag, pp. 184– 207, doi:10.1007/3-540-61628-4_7. [10] Wouter Swierstra (2008): Data types à la carte. Journal of Functional Programming 18(4), pp. 423–436, doi:10.1017/S0956796808006758. 30 Free Applicative Functors [11] Philip Wadler (1989): Theorems for free! In: Functional Programming Languages and Computer Architecture, ACM Press, pp. 347–359, doi:10.1145/99370.99404.
6cs.PL
arXiv:1709.04673v2 [cs.SY] 10 Dec 2017 Conditions for Stability and Convergence of Set-Valued Stochastic Approximations: Applications to Approximate Value and Fixed point Iterations Arunselvan Ramaswamy ∗ Dept. of Electrical Engineering and Information Technology Paderborn University Paderborn - 33908, Germany. Shalabh Bhatnagar † Dept. of Computer Science and Automation Indian Institute of Science Bengaluru - 560012, India. December 12, 2017 Abstract The main aim of this paper is the development of easily verifiable sufficient conditions for stability (almost sure boundedness) and convergence of stochastic approximation algorithms (SAAs) with set-valued meanfields, a class of model-free algorithms that have become important in recent times. In this paper we provide a complete analysis of such algorithms under three different, yet related sets of sufficient conditions, based on the existence of an associated global/local Lyapunov function. Unlike previous Lyapunov function based approaches, we provide a simple recipe for explicitly constructing the Lyapunov function, needed for analysis. Our work builds on the works of Abounadi, Bertsekas and Borkar (2002), Munos (2005), and Ramaswamy and Bhatnagar (2016). An important motivation for the flavor of our assumptions comes from the need to understand dynamic programming and reinforcement learning algorithms, that use deep neural networks (DNNs) for function approximations and parameterizations. These algorithms are popularly known as deep learning algorithms. As an important application of our theory, we provide a complete analysis of the stochastic approximation counterpart of approximate value iteration (AVI), an important dynamic programming method ∗ email:[email protected] † email:[email protected] 1 designed to tackle Bellman’s curse of dimensionality. Further, the assumptions involved are significantly weaker, easily verifiable and truly model-free. The theory presented in this paper is also used to develop and analyze the first SAA for finding fixed points of contractive set-valued maps. 1 Introduction Stochastic approximation algorithms (SAAs) are an important class of iterative schemes that are used to solve problems arising in stochastic optimization, stochastic control, machine learning and financial mathematics, among others. SAAs constitute a powerful tool, due to their model free approach, to solving problems. The first stochastic approximation algorithm was developed by Robbins and Monro [16] in 1951 to solve the root finding problem. Important contributions to modern stochastic approximations theory were made by Benaı̈m (1996) [3], Benaı̈m and Hirsch (1996) [4], Borkar (1997) [8], Borkar and Meyn (1999) [10] and Benaı̈m, Hofbauer and Sorin (2005) [5], to name a few. An important aspect of the analysis of SAAs lies in verifying the almost sure boundedness (stability) of the iterates. This can be hard in many applications. In this paper we present easily verifiable sufficient conditions for both stability and convergence of SAAs with set-valued mean-fields. Specifically, we consider the following iterative scheme: xn+1 = xn + a(n) (yn + Mn+1 ) , (1) where xn ∈ Rd for all n; {a(n)}n≥0 is a step-size sequence; yn ∈ H(xn ) for all n such that H : Rd → {subsets of Rd } is a Marchaud map; and {Mn+1 }n≥0 is the noise sequence. We present three different yet overlapping sets of (easily verifiable) conditions for stability (almost sure boundedness) and convergence (to a closed connected internally chain transitive invariant set of ẋ(t) ∈ H(x(t))) of (1). The reader is referred to Section 4 for the analysis. The problem of stability for SAAs with set-valued mean-fields has been previously studied by Ramaswamy and Bhatnagar [15]. They developed the first set of sufficient conditions for the stability and convergence of (1) by extending the ideas of Borkar and Meyn [10]. Their sufficient conditions are based on the “limiting properties” of an associated scaled differential inclusion. On the contrary, the conditions presented in this paper are based on “local properties” of the associated differential inclusion. We believe that the stability criterion presented here is applicable to scenarios that are in some sense “orthogonal” to those that readily use the stability criterion of [15]. Our work contributes to the literature of SAAs with set-valued mean-fields by presenting the first set of Lyapunov function based sufficient conditions for stability and convergence of (1). These are also the only sets of sufficient conditions for stability and convergence of (1), after the ones presented by us in [15]. In this paper, we present Lyapunov function based stability conditions for the analyses of SAAs with set-valued mean-fields. An important motivation for 2 doing this lies in the proliferation of dynamic programming and reinforcement learning methods based on value iteration and policy gradients that use deep neural networks (DNNs) for function approximations and parameterizations, respectively. The use of DNNs often causes the algorithms to “blow-up”, in finite time, and find sub-optimal solutions. In this paper we present sufficient conditions which guarantee that no finite-time blow-up occurs. Further, these conditions guarantee that the suboptimal solutions found are very close to the optimal solution. The reader is referred to Sections 7 and 8 for details. Our work builds on the work of Abounadi, Bertsekas and Borkar [1] and Ramaswamy and Bhatnagar [15]. Our stability criterion is dependent in part on the possibility of comparing various instances of an algorithm being analyzed. For the exact nature of this comparison, the reader is referred to assumption (A5) of Section 3. As stated earlier, we present three sets of assumptions that are qualitatively different yet overlapping, for stability and convergence. As a consequence, the framework developed herein is semantically rich enough to cover a multitude of scenarios encountered in reinforcement learning, stochastic optimization and other applications. We answer the following important question: Does the mere existence of a Lyapunov function for ẋ(t) ∈ H(x(t)) imply the almost sure boundedness (stability) of (1)? We will show that the existence of a global/local Lyapunov function allows us to construct an “inward directing set”, see Proposition 2 for details. We then use this inward directing set to develop a partner projective scheme (to (1)). This scheme is shown to converge to a point inside the previously constructed inward directing set. In order to show the stability of (1), we compare the same to the aforementioned partner projective scheme. The exact nature of this comparison is outlined in (A5). It is imperative that (1) and it’s partner projective scheme are comparable. In other words, it seems that the mere existence of a Lyapunov function is insufficient to ensure stability. Additional assumptions such as (A5) of Section 3 are needed for this purpose. We demonstrate the verifiability of our assumptions by using our framework to comprehensively analyze two important problems: (i) approximate value iteration methods with possibly biased approximation errors and (ii) SAAs for finding fixed points of contractive set-valued maps. It is worth noting that our analysis of approximate value iteration methods does not distinguish between biased and unbiased approximation errors. In Section 7, as an application of our main results, we present a complete analysis of approximate value iteration methods, an important class of dynamic programming algorithms, under significantly weaker set of assumptions. Value iteration is an important dynamic programming method used to numerically compute the optimal value function of a Markov decision process (MDP). However, it is well known that for many important applications, it suffers from Bellman’s curse of dimensionality. Approximate Value Iteration (AVI) methods endeavor to address Bellman’s curse of dimensionality by introducing an approximation operator that allows for approximations at every step of the classical value iteration method. If the approximation errors are allowed to be unbounded then the algorithm may not converge, see [6] for details. AVIs with bounded approximation errors have been previously studied in [6, 11, 13]. Bert- 3 sekas and Tsitsiklis [6] studied scenarios wherein the approximation errors are uniformly bounded over all states. Munos [13] extended the analysis of [6], allowing for approximation errors that are bounded in the weighted p-norm sense, for the infinite horizon discounted cost problem. However the convergence analysis of [13] requires that the transition probabilities or future state distributions be “smooth”. For a detailed comparison of our results concerning AVI methods to those already present in the literature, see Section 7.2. An important contribution of this paper is in providing a convergence analysis of AVIs without the aforementioned restriction on transition probabilities or future distributions (cf. Section 7). Our analysis encompasses both the stochastic shortest path and the discounted cost infinite horizon problems. When analyzing stochastic iterative AVIs (see (11) in Section 7 for details on stocastic iterative AVIs), stability (almost sure boundedness) of the iterates is normally assumed to hold. As stated before, stability is a hard assumption to verify. Further, it is unclear if the introduction of an approximation operator leads to unstable iterates. Thus, an important contribution of this paper is in showing stability of stochastic iterative AVIs, under weak, verifiable conditions. In Section 7, it is shown that a stochastic iterative AVI converges to a possibly suboptimal cost-to-go vector J∞ which belongs to a “small neighborhood” of the optimal vector, J ∗ . Further it is shown that the size of this neighborhood is directly proportional to the magnitude of the approximation errors, see Theorems 3 and 4 for details. Thus, in Section 7 we provide a complete analysis (stability and convergence) of general AVI methods under weak, easily verifiable, set of sufficient conditions. We eliminate all previous restrictions on the “smoothness” of transition probabilities and future distributions. We also allow for more general “operational noise” as compared to previous literature. An important aspect of our analysis is that it encompasses both stochastic shortest path and infinite horizon discounted cost problems. We provide a unified analysis for stability and convergence of AVI methods wherein the approximation errors are bounded with respect to multiple norms. Finally, we believe that the theory developed herein is useful in providing the theoretical foundation for understanding reinforcement learning and dynamic programming algorithms that use DNNs, an area that has garnered significant interest recently. In Section 8, as another important application of our framework, we develop and analyze, for the first time, general SAAs for finding fixed points of set-valued maps. Fixed point theory is an active area of research due to its applications in a multitude of disciplines. Our contribution on this front is in analyzing stochastic approximation algorithms for finding fixed points of contractive setvalued maps , see Section 8 for details. As mentioned before, we show that such algorithms are bounded almost surely and that they converge to a sample path dependent fixed point of the set-valued map under consideration. To the best of our knowledge ours is the first SAA, complete with analysis, for finding fixed points of set-valued maps. 4 1.1 Organization of this paper In Section 2 we list the definitions and notations used in this paper. In Section 3 we present three sets of sufficient conditions for stability and convergence (to a closed connected internally chain transitive invariant set of the associated DI) of SAAs with set-valued mean-fields. Through Sections 4, 5 and 6 we present our main results, Theorems 1 and 2. In Section 7 we analyze stochastic iterative AVI methods, see Theorems 3 and 4. In Section 8 we develop and analyze a SAA for finding fixed points of contractive set-valued maps, see Theorem 5 for the main result here. A detailed discussion on assumption (A5), which is crucial to our analysis, is provided in Section 9. Finally Section 10 provides the concluding remarks. 2 Definitions and Notations The definitions and notations encountered in this paper are listed in this section. [Upper-semicontinuous map] We say that H is upper-semicontinuous, if given sequences {xn }n≥1 (in Rn ) and {yn }n≥1 (in Rm ) with xn → x, yn → y and yn ∈ H(xn ), n ≥ 1, then y ∈ H(x). [Marchaud Map] A set-valued map H : Rn → {subsets of Rm } is called Marchaud if it satisfies the following properties: (i) for each x ∈ Rn , H(x) is convex and compact; (ii) (point-wise boundedness) for each x ∈ Rn , sup kwk < K (1 + kxk) for some K > 0; (iii) H is upperw∈H(x) semicontinuous. Let H be a Marchaud map on Rd . The differential inclusion (DI) given by ẋ ∈ H(x) (2) is guaranteed to have at least one solution that is absolutely continuous. P The reader is referred to [2] for more details. We say that x ∈ if x is an absolutely continuous map that satisfies (2). The set-valued semiflow d Φ associated with (2) Pis defined on [0, +∞) × R as: Φt (x) = {x(t) | x ∈ , x(0) = x}. Let B × M ⊂ [0, +∞) × Rd and define [ ΦB (M ) = Φt (x). t∈B, x∈M [Limit set of a solution & ω-limit-set] The limit set of a solution x T with x(0) = x is given by L(x) = t≥0 x([t, +∞)). Let M ⊆ Rd , the T ω-limit-set be defined by ωΦ (M ) = t≥0 Φ[t,+∞) (M ). Similarly the limit T set of a solution x is given by L(x) = t≥0 x([t, +∞)). [Invariant set]PM ⊆ Rd is invariant if for every x ∈ M there exists a trajectory, x ∈ , entirely in M with x(0) = x, x(t) ∈ M , for all t ≥ 0. Note that the definition of invariant set used in this paper, is the same as that of positive invariant set in [5] and [9]. 5 [Open and closed neighborhoods of a set] Let x ∈ Rd and A ⊆ Rd , then d(x, A) := inf{ka − yk | y ∈ A}. We define the δ-open neighborhood of A by N δ (A) := {x | d(x, A) < δ}. The δ-closed neighborhood of A is defined by N δ (A) := {x | d(x, A) ≤ δ}. The open ball of radius r around the origin is represented by Br (0), while the closed ball is represented by B r (0). [Internally chain transitive set] M ⊂ Rd is said to be internally chain transitive if M is compact and for every x, y ∈ M , ǫ > 0 and T > 0 we have the following: There exists n and Φ1 , . . . , Φn that are n solutions to the differential inclusion ẋ(t) ∈ H(x(t)), points x1 (= x), . . . , xn+1 (= y) ∈ M and n real numbers t1 , t2 , . . . , tn greater than T such that: Φiti (xi ) ∈ N ǫ (xi+1 ) and Φi[0,ti ] (xi ) ⊂ M for 1 ≤ i ≤ n. The sequence (x1 (= x), . . . , xn+1 (= y)) is called an (ǫ, T ) chain in M from x to y. [Attracting set & fundamental neighborhood] A ⊆ Rd is attracting if it is compact and there exists a neighborhood U such that for any ǫ > 0, ∃ T (ǫ) ≥ 0 with Φ[T (ǫ),+∞) (U ) ⊂ N ǫ (A). Such a U is called the fundamental neighborhood of A. In addition to being compact if the attracting set is also invariant then it is called an attractor. The basin of attraction of A is given by B(A) = {x | ωΦ (x) ⊂ A}. [Lyapunov stable] The above set A is Lyapunov stable if for all δ > 0, ∃ ǫ > 0 such that Φ[0,+∞) (N ǫ (A)) ⊆ N δ (A). 3 Assumptions Consider the following iteration in Rd : xn+1 = xn + a(n) [yn + Mn+1 ] , (3) where yn ∈ H(xn ) for all n ≥ 0 with H : Rd → {subsets of Rd }, {a(n)}n≥0 is the given step-size sequence and {Mn+1 }n≥0 is the given noise sequence. We make the following assumptions 1 : (A1) H : Rd → {subsets of Rd } is a Marchaud map. For all x ∈ Rd sup kzk ≤ z∈H(x) K(1 + kxk), where K > 0 is the given Marchaud constant. (A2) The step-size sequence {a(n)}n≥0 is such that ∀n a(n) ≥ 0, P ∞ and n≥0 a(n)2 < ∞. (A3) P n≥0 a(n) = (i) For all n ≥ 0 kMn+1 k ≤ D, where D > 0 is some constant. (ii) lim mP T (k) k→∞ n=k a(n)Mn+1 = 0 for all T , where mT (k) := min {m ≥ k | Pm n=k 1 Note that assumption (A4a) presents a set of Lyapunov conditions on the associated DI. Two more sets of alternative conditions, viz., (A4b) and (A4c) will also be presented subsequently in this section. 6 a(n) ≥ T }. (A4a) Associated with the differential inclusion (DI) ẋ(t) ∈ H(x(t)) is a compact  set Λ, a bounded open neighborhood U Λ ⊆ U ⊆ Rd and a function V : U → R+ such that (i) ∀t ≥ 0 Φt (U) ⊆ U i.e., U is strongly positively invariant. (ii) V −1 (0) = Λ. (iii) V is a continuous function such that for all x ∈ U \ Λ and y ∈ Φt (x) we have V (x) > V (y), for any t > 0. (A5) Let {xn }n≥0 and {x̂n }n≥0 be two sequences generated by (3) on a common probability space with the same noise sequence {Mn+1 }n≥0 . Then sup kxn − x̂n k < ∞ a.s. n Note that it follows from Proposition 3.25 of Benaı̈m, Hofbauer and Sorin [5] that Λ contains a Lyapunov stable attracting set. Further there exists an attractor contained in Λ whose basin of attraction contains U, with V −1 ([0, r)) as fundamental neighborhoods for small values of r. Note that assumptions on the noise, (A3), will be weakened to include more general noise sequences later, see Section 6. Also, (A5) is similar to an assumption used by Abounadi et. al. [1] in the case of regular SAAs (with point-to-point maps). The reader is referred to Section 9 for more detailed discussions on this assumption. We define open sets Ba and Ca such that the following conditions are satisfied: (a)Λ ⊆ Ba ⊆ Ca (b) Ca ⊆ U and (c) Ca is a fundamental neighborhood of the attractor contained in Λ. Since V is continuous, it follows that Vr := {x | V (x) < r} is T open relative to U , for all r > 0. Further, assumption (A4a)(ii) implies that Vr = Λ and that Vr ⊂ U for small values of r. It may be noted r>0 that the closure of Vr is Vr := {x | V (x) ≤ r}. Let Ba := VRb and Ca := VRc , where 0 < Rb < Rc . Here Rc is chosen small enough to ensure that VRc ⊆ U and the above conditions (b) and (c) hold. Note that condition (a) is automatically satisfied since Rb < Rc . We now present an alternative to assumption (A4a). (A4b) Associated with ẋ(t) ∈ H(x(t)) is a compact set Λ, a bounded open neighborhood U and a function V : U → R+ such that (i) ∀t ≥ 0 Φt (U) ⊆ U i.e., U is strongly positively invariant. (ii) V −1 (0) = Λ. (iii) V is an upper semicontinuous function such that for all x ∈ U \ Λ and y ∈ Φt (x) we have V (x) > V (y), where t > 0. (iv) V is bounded on U. In other words, sup kV (x)k < ∞. x∈U The difference between statements (A4a)(iii) and (A4b)(iii) contributes to the qualitative difference between assumptions (A4a) and (A4b). It follows from 7 Proposition 3.25 of Benaı̈m, Hofbauer and Sorin [5] that Λ contains an attractor set whose basin of attraction contains U. As in the case of (A4a), we define open sets Bb and Cb satisfying the above stated (a) and (b). But first, we prove that sets of the form {x | V (x) < r} are open relative to U, as expected. Proposition 1. For any r < sup V (u), the set Vr = {x | V (x) < r} is open u∈U relative to U . Further, Vr = {x | V (x) ≤ r}. Proof. PROOF: Suppose Vr is not open relative to U, then there exists {xn }n≥0 such that xn → x, as n → ∞, with xn ∈ U \Vr for every n and x ∈ Vr . It follows from the boundedness of V , i.e., (A4b)(iv) that there exists {m(n)}n≥0 ⊆ {n ≥ 0} such that V (xm(n) ) → v as m(n) → ∞ for some v ∈ R+ . Since xm(n) → x, it follows from the upper semicontinuity of V that v = V (x). Since v < r and inf V (xm(n) ) ≥ r, we get a contradiction. m(n) To prove the second part of the proposition, it is enough to show that V (x) = r for every x ∈ ∂Vr . Since Vr is open relative to U and x ∈ ∂Vr , we have V (x) ≥ r. It is left to show that V (x) ≤ r. Since x ∈ ∂Vr , there exists xn ∈ Vr such that xn → x. It follows from the upper semicontinuity and the boundedness of V that V (x) ≤ lim sup V (xn ) ≤ r. n→∞ As in the case of (A4a), we have Λ = T Vr and Vr ⊂ U for small values of r>0 r. We are now ready to define Bb and Cb . Define Cb := Vr such that Vr ⊂ U, possible for small values of r. Further, choose Bb such that Bb is open and Λ ⊂ Bb ⊂ Bb ⊂ Cb . This is possible since Λ is compact and Cb is open. Remark 1. Let us suppose we are given a differential inclusion ẋ(t) ∈ H(x(t)), an associated attractor set A and a strongly positive invariant neighborhood U of A. We define an upper-semicontinuous Lyapunov function V , as found in Remark 3.26, Section 3.8 of [5]. In other words, V : U → R+ given by V (x) := max {d(y, A)g(t) | y ∈ Φt (x), t ≥ 0}, where g is an increasing function such that 0 < c < g(t) < d for all t ≥ 0. We claim that V satisfies (A4b). To verify this claim we consider the following. U is strongly positive invariant and V (x) ≤ sup d(u, A) × d for x ∈ U, hence sup V (u) < ∞. It follows from the u∈U u∈U upper semicontinuity of V that sup V (u) < ∞ i.e., (A4b)(iv) is satisfied. It is u∈U left to show that (A4b)(iii) is also satisfied. Fix x ∈ U and t > 0. It follows from the definition of a semi-flow that Φs (y) ⊆ Φt+s (x) for any y ∈ Φt (x), where s > 0. Further, V (x) ≥ max{d(z, A)g(t + s) | z ∈ Φs (y), s ≥ 0} and max{d(z, A)g(t + s) | z ∈ Φs (y), s ≥ 0} > max{d(z, A)g(s) | z ∈ Φs (y), s ≥ 0}. The RHS of the above equation is V (y) i.e., V (x) > V (y). We consider one final alternative to (A4a) and (A4b) below. (A4c) (i) A is the global attractor of ẋ(t) ∈ H(x(t)). 8 (ii) V : Rd → R+ is an upper semicontinuous function such that V (x) > V (y) for all x ∈ Rd \ A, y ∈ Φt (x) and t > 0. (iii) V (x) ≥ V (y) for all x ∈ A, y ∈ Φt (x) and t > 0. As with (A4a) and (A4b), we define open sets Bc and Cc satisfying conditions (a) and (b), see below the statement of (A4a). Recall that Vr = {x | V (x) < r}. Define Cc := Vr and Bc := Vs for appropriate r and s satisfying sup V (x) > r > x∈Rd s > sup V (x). Suppose we are unable to find such an s then we may choose Bc to x∈A be any open set satisfying the required properties once Cc is fixed as mentioned before. Remark 2. In Remark 1, we explicitly constructed a local Lyapunov function satisfying (A4b). Similarly, here, we construct a global Lyapunov function satisfying (A4c). Define the function V : Rd → R+ as V (x) := max {d(y, A)g(t) | y ∈ Φt (x), t ≥ 0}, where g(· ) is defined in Remark 1. This Lyapunov function, V , satisfies (A4c). The proof is similar to the one found in Remark 1. Inward directing sets: Given a differential inclusion ẋ(t) ∈ H(x(t)), an open set O is said to be an inward directing set with respect to the aforementioned differential inclusion, if Φt (x) ⊆ O, t > 0, whenever x ∈ O. Clearly inward directing sets are invariant. It also follows that any solution starting at the boundary of O is “directed inwards”, into O. Proposition 2. The open sets Ca , Cb and Cc , constructed in accordance to assumptions (A4a), (A4b) and (A4c) respectively, are inward directing sets with respect to ẋ(t) ∈ H(x(t)). Proof. PROOF: Recall that the set Ca is constructed such that V (x) = Rc for every x ∈ ∂Ca and V (y) < Rc for every y ∈ Ca . Since Ca ⊆ U, it follows from (A4a)(iii) that V (x) > V (y), where x ∈ ∂Ca , y ∈ Φt (x) and t > 0. In other words, V (y) < Rc and Φt (x) ⊂ Ca for t > 0 and x ∈ ∂Ca . It is left to show that Φt (x) ⊂ Ca for x ∈ Ca and t > 0. This follows directly from the observation that Rc > V (x) > V (y) for every y ∈ Φt (x) and t > 0. Cb and Cc can be similarly shown to be inward directing. In what follows, we use assumptions (A1)-(A3), (A5) and the existence of an inward directing set with respect to the associated DI, to prove the stability of (3). As a consequence of Proposition 2, we may verify one among (A4a), (A4b) and (A4c) to ensure the existence of such an inward directing set. It may be noted that these assumptions are qualitatively different. However, their primary role is to help us find one of the aforementioned inward directing sets. Depending on the nature of the iteration being analyzed, it may be easier to verify one or the others. 9 4 Analysis of the projective scheme We begin this section with a minor note on notations. Since the roles of (A4a), (A4b) and (A4c) are indistinguishable, we shall refer to them generically as (A4). In a similar manner, Ba/b/c and Ca/b/c are generically referred to as B and C respectively. Note that B ⊆ C. We also define the projection map, d d B,C : R → {subsets of R }, as follows: ( {x}, if x ∈ C . B,C (x) := {y | d(y, x) = d(x, B), y ∈ B}, otherwise ⊓ ⊓ As in [1], in order to prove stability, (3) is compared to the following projective scheme. x̃(n + 1) = xn + a(n) [yn + Mn+1 ] , xn+1 = zn , where zn ∈ (4) ⊓B,C (x̃n+1 ), ⊓ where yn ∈ H(xn ) and x0 ∈ B,C (x̃0 ), with x̃0 ∈ Rd . Note that the initial point x̃0 is first projected before starting the projective scheme. The above equation can be rewritten as xn+1 = xn + a(n) [yn + Mn+1 ] + gn , (5) where gn = zn − (xn + a(n) [yn + Mn+1 ]). Let us construct a linearly interpolated trajectory using (5). We begin by dividing [0, ∞) into diminishing intervals n−1 P a(m) for n ≥ 1. The using the step-size sequence. Let t0 := 0 and tn := m=0 linearly interpolated trajectory Xl (t) is defined as follows: ( xn , for t = tn   Xl (t) :=  t−tn n 1 − t−t a(n) xn + a(n) x̃n+1 , for t ∈ [tn , tn+1 ). . (6) The above constructed trajectory is right continuous with left-hand limits, i.e., Xl (t) = lim Xl (s) and lim Xl (s) exist. Further the jumps occur exactly at those s↓t s↑t tn ’s for which the corresponding gn−1 ’s are non-zero. We also define three piece-wise constant trajectories Xc (· ), Yc (· ) and Gc (· ) as follows: Xc (t) := xn , n−1 P Yc (t) := yn and Gc (t) := gm for t ∈ [tn , tn+1 ). The trajectories Xc (· ), Yc (· ) m=0 and Gc (· ) are also right continuous with left-hand limits. We define a linearly interpolated trajectory associated with {Mn+1 }n≥0 as follows:  n−1   P a(m)Mm+1 for t = tn m=0 . Wl (t) :=       1 − t−tn Wl (tn ) + t−tn Wl (tn+1 ), for t ∈ [tn , tn+1 ) a(n) a(n) We define a few “left-shifted trajectories” using the above constructed trajectories. For t ≥ 0, Xln (t) := Xl (tn + t), 10 Xcn (t) := Xc (tn + t), Ycn (t) := Yc (tn + t), Gnc (t) := Gc (tn + t) − Gc (tn ), Wln (t) := Wl (tn + t) − Wl (tn ). Lemma 1. Xln (t) = Xln (0) + Proof. Rt 0 Ycn (τ ) dτ + Wln (t) + Gnc (t) for t ≥ 0. Fix s ∈ [tm , tm+1 ) for some m ≥ 0. We have the following     s − tm s − tm xm + x̃m+1 , Xl (s) = 1 − a(m) a(m)     s − tn s − tm xm + (xm + a(m) [ym + Mm+1 ]) , Xl (s) = 1 − a(m) a(m) PROOF: Xl (s) = xm + (s − tm ) [ym + Mm+1 ] . Xln (t) Let us express in the form of the above equation. Note that tn + t ∈ [tn+k , tn+k+1 ) for some k ≥ 0. Then we have the following: Xln (t) = xn+k + (tn + t − tn+k ) [yn+k + Mn+k+1 ] . Unfolding xn+k , in the above equation till xn (Xln (0)), yields: Xln (t) = Xln (0)+ n+k−1 X (a(l) [yl + Ml+1 ] + gl )+(tn +t−tn+k ) [yn+k + Mn+k+1 ] . l=n (7) We make the following observations: n+k−1 P Gnc (t) = gl , l=n Wln (tn+k − tn ) = n+k−1 P a(l)Ml+1 , l=n Wln (t) = Wln (tn+k − tn ) + (tn + t − tn+k )Mn+k+1 and n+k−1 Rt n P a(l)yl + (tn + t − tn+k )yn+k . Yc (τ ) dτ = 0 l=n As a consequence of the above observations, (7) becomes: Xln (t) = Xln (0) + Zt Ycn (τ ) dτ + Wln (t) + Gnc (t). 0 Fix T > 0. If {Xln ([0, T ]) | n ≥ 0} and {Gnc ([0, T ]) | n ≥ 0} are viewed as subsets of D([0, T ], Rd) equipped with the Skorohod topology, then we may use the Arzela-Ascoli theorem for D([0, T ], Rd ) to show that they are relatively compact, see Billingsley [7] for details. The Arzela-Ascoli theorem for D([0, T ], Rd) states the following: A set S ⊆ D([0, T ], Rd ), is relatively compact if and only if the following conditions are satisfied: 11 sup sup kx(t)k < ∞, x(·)∈S t∈[0,T ] lim sup sup δ→0 x(·)∈S t1 ≤t≤t2 , t2 −t1 ≤δ lim sup sup δ→0 x(·)∈S t1 ,t2 ∈[0,δ) lim sup sup min {kx(t) − x(t1 )k, kx(t2 ) − x(t)k} = 0, kx(t2 ) − x(t1 )k = 0 and kx(t2 ) − x(t1 )k = 0. δ→0 x(·)∈S t1 ,t2 ∈[T −δ,T ) If {Xln ([0, T ]) | n ≥ 0} and {Gnc ([0, T ]) | n ≥ 0} are point-wise bounded and any two of their discontinuities are separated by at least ∆, for some fixed ∆ > 0, then the above four conditions will be satisfied, see [7] for details. Lemma 2. {Xln ([0, T ]) | n ≥ 0} and {Gnc ([0, T ]) | n ≥ 0} are relatively compact in D([0, T ], Rd) equipped with the Skorohod topology. Proof. PROOF: Recall from (A3)(i) that kMn+1 k ≤ D, n ≥ 0. Since H is Markyk ≤ C1 for some C1 > 0 and that sup kx̃n+1 − chaud, it follows that sup n≥0 x∈C, y∈H(x)   xn k ≤ sup a(m) (C1 + D). Further, gn ≤ kx̃n+1 − xn k + d(xn , ∂B) ≤ C2 m≥0 for some constant C2 that is independent of n. In other words, we have that the sequences {Xln ([0, T ]) | n ≥ 0} and {Gnc ([0, T ]) | n ≥ 0} are point-wise bounded. It remains to show that any two discontinuities are separated. Let d := min d(x, B) and D1 := D + sup sup kyk. Clearly d > 0. Define x∈∂C x∈C y∈H(x) ( m(n) = max j > 0 | n+j X a(k) < d/D1 k=n ) . If there is a jump at tn , then xn ∈ ∂B. It follows from the definition of m(n) that xk ∈ C for n ≤ k ≤ m(n). In other words, there are no discontinuities in d d the interval [tn , tn+m(n) ) and tn+m(n) − tn ≥ 2D . If we fix ∆ := 2D > 0, then 1 1 any two discontinuities are separated by at least ∆. Since T is arbitrary, it follows that {Xln ([0, ∞)) | n ≥ 0} and {Gnc ([0, ∞)) | n ≥ 0} are relatively compact in D([0, ∞), Rd ). Since {Wln ([0, T ]) | n ≥ 0} is pointwise bounded (assumption (A3)(i)) and continuous, it is relatively compact in D([0, T ], Rd). It follows from (A3)(ii) that any limit of {Wln ([0, T ]) | n ≥ 0}, in D([0, T ], Rd), is the constant of ( 0 function. Suppose we consider sub-sequences ) T R {Xln ([0, T ]) | n ≥ 0} and Xln (0) + Ycn (τ ) dτ + Gnc (T ) | n ≥ 0 along which 0 the aforementioned noise trajectories converge, then their limits are identical. m(n) m(n) ([0, T ])}n≥0 and {Xl ([0, T ])}n≥0 Consider {m(n)}n≥0 ⊆ N along which {Gc converge in D([0, T ], Rd ). Further, let gm(n)−1 = 0 for all n ≥ 0. Suppose the 12 m(n) limit of {Gc ([0, T ])}n≥0 is the constant 0 function, then it can be shown that m(n) the limit of {Xl ([0, T ])}n≥0 is X(t) = X(0) + Zt Y (τ )dτ, 0 where X(0) ∈ C and Y (t) ∈ H(X(t)) for t ∈ [0, T ]. The proof of this is along the lines of the proof of Theorem 2 in Chapter 5.2 of Borkar [9]. Suppose every m(n) limit of {Gc ([0, T ])}n≥0 is the constant 0 function whenever gm(n)−1 = 0 m(n) for all n ≥ 0, then every limit of {Xl ([0, T ])}n≥0 is a solution to Ẋ(t) ∈ H(X(t)). Suppose we show that the aforementioned statement is true for every T > 0. Then, along with (A5) the stability of (3) is implied. Note that the set K := {n | gn = 0} has infinite cardinality since any two discontinuities are at least ∆ > 0 apart. Lemma 3. Let K = {n | gn = 0}. Without loss of generality let {Xln ([0, T ])}n∈K and {Gnc ([0, T ])}n∈K be convergent, as n → ∞, in D([0, T ], Rd). Then Xln (t) → Rt Y (s) ds + G(t) for t ∈ [0, T ] and G(· ) ≡ 0. X(0) + τ =0 Proof. PROOF: We begin by making the following observations: (a) X(0) ∈ C. (b) Any two discontinuities of X(· ) are at least ∆ apart. (c) G(0) = 0. (d) Solutions to ẋ(t) ∈ H(x(t)) with starting points in C will not hit the boundary, ∂C, later, i.e., they remain in the interior of C. This observation is a consequence of Proposition 2. It follows from the above observations that (i) X(t) ∈ C for small values of t, (ii) τ := inf{t | t > 0, X(t+ ) 6= X(t− )} and τ > 0. It follows from the nature of convergence that ∃ τn′ > τ > τn , n ≥ 0 such that τn′ − τn → 0, kXln (τn′ ) − X(τ + )k → 0 and kXln (τn ) − X(τ − )k → 0. For large values of n, Xln (· ) has exactly one jump (point of discontinuity) at τ̂n ∈ [τn , τn′ ], let us call this point of discontinuity as τ̂n . Let δ := kX(τ + ) − X(τ − )k > 0, then for large values of n we have kXln (τ̂n+ ) − Xln (τ̂n− )k ≥ δ/2. Also, Xln (τ̂n− ) is not in C and Xln (τ̂n+ ) is in ∂B. Further, since τ̂n− − τn → 0, as n → ∞, it follows that Xln (τ̂n− ) − X(τ − ) → 0. Hence, X(τ − ) ∈ / C. Similarly, we have that X(τ + ) ∈ ∂B. Observe that X([0, τ )) is a solution to ẋ(· ) ∈ H(x(· )) such that X(0) ∈ C, since G(t) = 0 for t ∈ [0, τ ). Further, since C is inward directing, we have that X(t) ∈ C for t ∈ [0, τ ). Since X(t) ∈ C for t < τ and X(τ − ) ∈ / C we have X(τ − ) ∈ ∂C. 13 Since X(0) ∈ C, we have that V (X(0)) ≤ R, for some 0 < R < ∞. As a consequence of our choice of C (C is Ca /Cb /Cc within the context of (A4a)/(A4b)/(A4c)) we have V (x) = V (y) for any x, y ∈ ∂C, hence we may fix R := V (x) for any x ∈ ∂C. Fix τ0 ∈ (0, τ ), it follows from Proposition 2 that V (X(τ0 )) < R. Let tn ↑ τ such that tn ∈ (τ0 , τ ) for n ≥ 1. Without loss of generality, X(tn ) → X(τ − ) and V (X(tn )) → V (X(τ − )), as tn → τ (else we may choose a sub-sequence of {tn }n≥0 along which V (X(tn )) is convergent). Thus, ∃ N such that V (X(tn )) > V (X(τ0 )) for n ≥ N . Since X([τ0 , tn ]) is a solution to ẋ(t) ∈ H(x(t)) with starting point X(τ0 ), the aforementioned conclusion contradicts (A4a)(iii)/(A4b)(iii)/(A4c). In other words, X(τ − ) ∈ C and ∈ / ∂C. Thus we have shown that there is no jump at τ , i.e., X(τ + ) = X(τ − ). Suppose (A4a) / (A4b) holds, then it follows from Proposition 3.25 of Benaı̈m, Hofbauer and Sorin [5] that there is an attracting set A ⊆ Λ such that C a / C b is within the basin of attraction. Suppose (A4c) holds, then A is the globally attracting set of ẋ(t) ∈ H(x(t)). Lemma 4. The projective stochastic approximation scheme given by (4) converges to the attractor A. Proof. PROOF: We begin by noting that T of Lemma 3 is arbitrary. Since G ≡ 0, after a certain number of iterations of (4), there are no projections, i.e., x̃n = xn for n ≥ N . Here N could be sample path dependent. Further, it follows from Lemma 3 that the projective scheme given by (4) tracks a solution to ẋ(t) ∈ H(x(t)). In other words, the projective scheme given by (4) converges to a limit point of the DI, ẋ(t) ∈ H(x(t)). The iterates given by (4) are within C after sometime and they track a solution to ẋ(t) ∈ H(x(t)). Since C is within the basin of attraction of A, the iterates converge to A. 5 Main results: stability and convergence In this section we show that the iterates given by (3) are stable (bounded almost surely) and converge to a closed connected internally chain transitive invariant set associated with ẋ(t) ∈ H(x(t)). We show the stability of (3), by comparing the iterates generated by (3) to those generated by (4). As stated in (A5), we assume that the noise sequence is exactly the same for both (3) and (4). Theorem 1. Under (A1)-(A5), the iterates given by (3) are stable (bounded almost surely) and converge to a closed, connected, internally chain transitive, invariant set associated with ẋ(t) ∈ H(x(t)). Proof. PROOF: For notational convenience we use {x̂n }n≥0 for the iterates generated by the projective scheme and {xn }n≥0 for the iterates generated by (3). Recall that x̂n → A, where A ⊂ B, see Lemma 4. In other words there exists N , possibly sample path dependent, such that x̂n ∈ B for all n ≥ N . In other 14 words, sup kx̂n k ≤ supkxk < ∞. It follows from (A5) that sup kxn k < ∞. Aln≥N x∈B n≥N most surely, there exists N , possibly sample path dependent, such that x̂n ∈ B for all n ≥ N . This directly leads to the stability of (3). The iterates given by (3) satisfy assumptions (A1)-(A3). Further, we have shown above that they are also stable. It follows from Theorem 3.6 and Lemma 3.8 of Benaı̈m [5] that the iterates converge to a closed connected internally chain transitive invariant set associated with ẋ(t) ∈ H(x(t)). 6 General noise sequences The restriction (A3) on the noise sequence, is rather strict since it only allows for “bounded noise”. In this section, we show that Theorem 1 will continue to hold even when the noise sequence is more generally a square integrable Martingale difference sequence. Analysis of regular SAAs has been shown in [1] under this assumption on the noise sequence.  (A3a) (Mn , Fn )n≥1 is a square integrable Martingale difference sequence E[Mn+1 |  2 Fn ] = 0 and EMn+1 < ∞, n ≥ 0 such that   E kMn+1 k2 | Fn ≤ K(1 + kxn k2 ), where n ≥ 0 and K > 0. In the above, F0 := σhx0 i and Fn := σ hx0 , x1 , . . . , xn , M1 , . . . , Mn i for n ≥ 1. Further without loss of generality, we may assume that K in (A3a) and (A1) are equal (otherwise we can use maximum of the two constants). In the analysis of the projective scheme given by (4), assumption (A3) is used in Lemma 2. Specifically, (A3)(i) is used to show that any two discontinuities of {Xnl ([0, T ])}n≥0 and {Gnc ([0, T ])}n≥0 are separated by at least ∆ > 0. We show that the aforementioned property holds when (A3) is replaced by (A3a). First, we prove an auxiliary result. Lemma 5. Let {tm(n) , tl(n) }n≥0 be such that tl(n) > tm(n) , tm(n+1) > tl(n) and lim tl(n) − tm(n) = 0. Fix an arbitrary c > 0 and consider the following: n→∞ l(n)−1 ψn := X a(i)Mi+1 . i=m(n) Then P ({ψn > c} i.o.) = 0 within the context of the projective scheme given by (4). P P (ψn > c) < ∞. It follows from Proof. PROOF: We need to show that n≥0 Chebyshev’s inequality that P (ψn > c) ≤ Eψn2 c2  = E 15 l(n)−1 P 2 a(i)Mi+1 i=m(n) c2   . Since {Mn+1 }n≥0 is a Martingale difference sequence, we get: P (ψn > c) ≤ l(n)−1 P i=m(n)   a(i)2 E kMi+1 k2 . c2 (8) Within the context of the projective scheme given by (4), almost surely ∀ n xin ∈ h 2 C, i.e., sup kxn k ≤ C1 < ∞ a.s. It follows from (A3a) that E kMn+1 k ≤ n≥0 h i   2 K 1 + Ekxn k2 . Hence, E kMn+1 k ≤ K 1 + C12 . Equation (8) becomes P (ψn > c) ≤ l(n)−1 P i=m(n) a(i)2 K 1 + C12 c2 Since tl(n) > tm(n) and tm(n+1) > tl(n) , we have P  . l(n)−1 P a(i)2 ≤ X P (ψn > c) ≤ P 2 a(n) n≥0 ! K 1 + C12 c2 n≥0  a(n)2 . n≥0 n≥0 i=m(n) Finally we get, P < ∞. Let us consider the scenario in which we cannot find ∆, the separation between any two points of discontinuity. In other words, there exists {t(m(n)), t(l(n))}n≥0 such that tl(n) > tm(n) , tm(n+1) > tl(n) and lim tl(n) − tm(n) = 0. Without loss n→∞ of generality we assume that there are no jumps between t(m(n)) and t(l(n)). − Note that Xl (t+ / C for all n ≥ 0. We have m(n) ) ∈ ∂B and Xl (tl(n) ) ∈ l(n)−1 − Xl (tl (n) ) = Xl (tm (n)) + X a(i) (yi + Mi+1 ) . i=m(n) We have that sup kyn k ≤ D′ for some 0 < D′ < ∞. The above equation n≥0 becomes l(n)−1 l(n)−1 kXl (tl (n)− ) − Xl (tm (n))k ≤ X a(i)D′ + i=m(n) X a(i)Mi+1 , i=m(n) l(n)−1  d ≤ kXl (tl (n)− ) − Xl (tm (n))k ≤ tl(n) − tm(n) D′ + Since tl(n) − tm(n) → 0, for large n l(n)−1 P a(i)Mi+1 X a(i)Mi+1 . i=m(n) > d/2. This directly i=m(n) contradicts Lemma 5. Hence we can always find ∆ > 0 separating any two points of discontinuity. 16 In Lemma 4, (A3) is used to ensure the convergence of (4) to the attractor A. In Theorem 1, (A3) is used to ensure the convergence of (3) to a closed connected internally chain transitive invariant set of the associated DI. Specifically, it is n−1 P (A3)(ii) that ensures these convergences. Let us define ζn := a(k)Mk+1 , k=0 n ≥ 1. If {ζn }n≥1 converges, then it trivially follows that the Martingale noise sequence satisfies (A3)(ii). To show convergence, it is enough to show that the corresponding quadratic variation converges almost surely.  P process a(n)2 E kMn+1 k2 |Fn < ∞ a.s or In other words, we need to show that n≥0  P E a(n)2 kMn+1 k2 < ∞. Consider the following: n≥0 X a(n)2 EkMn+1 k2 = n≥0 X n≥0  X   a(n)2 E E kMn+1 k2 | Fn ≤ a(n)2 K(1+Ekxn k2 ). n≥0 (9) Convergence of the quadratic variation process in the context of Lemma 4 follows from (9) and the fact that Ekxn k2 ≤ sup kxk2 . In other words, x∈C X n≥0  X  a(n)2 E kMn+1 k2 ≤ a(n)2 K(1 + sup kxk2 ) < ∞. n≥0 x∈C Similarly, for convergence in Theorem 4, it follows from (9) and stability of the iterates (supkxn k < ∞ a.s.) that n≥0 X n≥0   X a(n)2 E kMn+1 k2 |Fn ≤ a(n)2 K(1 + sup kxn k2 ) < ∞ a.s. n≥0 n≥0 In other words, both in Lemma 4 and Theorem 1, assumption (A3)(ii) is satisfied. The following generalized version of Theorem 1 is a direct consequence of the observations made above. Theorem 2. Under (A1), (A2), (A3a), (A4) and (A5), the iterates given by (3) are stable (bounded almost surely) and converge to a closed connected internally chain transitive invariant set associated with ẋ(t) ∈ H(x(t)). 7 Application: Approximate value iteration methods In this section we present an analysis of the recursion Jn+1 = AT Jn , (10) where Jn ∈ Rd for all n, T is the Bellman operator, and A is the approximation operator. Specifically, we consider the following stochastic approximation counterpart of the above scheme: Jn+1 = Jn + a(n) [T Jn − Jn + ǫn + Mn+1 ] , where (i) T is the Bellman operator. (ii) {a(n)}n≥0 is the step-size sequence, satisfying (A2). 17 (11) (iii) ǫn = AT Jn − T Jn is the approximation error at stage n. (iv) {Mn+1 }n≥0 is the Martingale difference noise sequence. Let us call (11) as a stochastic iterative AVI. It is worth noting that we do not distinguish between stochastic shortest path and infinite horizon discounted cost problems. The definition of the Bellman operator T changes appropriately. We make the following assumptions: (AV1) The Bellman operator T is contractive with respect to some weighted max-norm, k· kν , i.e., kT x − T ykν ≤ αkx − ykν for some 0 < α < 1. (AV2) T has a unique fixed point J ∗ and J ∗ is the unique globally asymptotically ˙ = T J(t) − J(t). stable equilibrium point of J(t) (AV3) kǫn kν ≤ ǫ for some fixed ǫ > 0. Recall the definition of the weighted ν = (ν1 , . . . , νd ) such that o n max-norm: Given |xi | νi > 0 for 1 ≤ i ≤ d, kxkν = max νi | 1 ≤ i ≤ d , where x = (x1 , x2 , . . . , xd ) ∈ Rd . Later in this section, we analyze (11) where the approximation errors are bounded in the general weighted p-norm sense (weighted Euclidean norms). (AV 1) is readily satisfied in many applications, see Section 2.2 of Bertsekas and Tsitsiklis [6] for details. First, let us consider a couple of technical lemmas. Lemma 6. B ǫ := {y | kykν ≤ ǫ} is a convex compact subset of Rd , where ǫ > 0. Proof. PROOF: First we show that B ǫ is convex. Given y1 , y2 ∈ B ǫ and y = λy1 + (1 − λ)y2 , where λ ∈ (0, 1), we need show that y ∈ B ǫ . kykν ≤ λky1 kν + (1 − λ)ky2 kν = λǫ + (1 − λ)ǫ. Now we show that B ǫ is compact. Define νmax := max {νi | 1 ≤ i ≤ d}. Since kyk∞ ≤ νmax kykν , it follows that B ǫ is a bounded set. It is left to show that B ǫ is closed. Let yn → y and yn ∈ B ǫ for every n. Since lim inf kyn kν ≥ n→∞ kykν , it follows that y ∈ B ǫ . Lemma 7. The set-valued map T̃ given by T̃ x 7→ T x + B ǫ is a Marchaud map. Proof. PROOF: Since B ǫ is a compact convex set, it follows that T̃ x is compact and convex. Since T is a contraction map, we have: kT xkν ≤ kT 0kν + kx − 0kν . Let νmin := min {ν1 , ν2 , . . . , νd } and νmax := max {ν1 , ν2 , . . . , νd }, then observe that kzkν ≤ kzk/νmin , where z ∈ Rd and k· k is the standard Euclidean norm. Also, observe that q kzk = z12 + . . . + zd2 ≤ (d νmax ) kzkν . Hence we have kT xk ≤ (d νmax )kT xkν ≤ (d νmax ) (kT 0kν + kxkν ) and that kT xk ≤ K ′ (1 + kxk), 18 (12) where K ′ :=  d νmax νmin  ∨ (d νmax kT 0kν ). We have that sup kzk ≤ kT xk + z∈T̃ x sup kzk. It follows from Lemma 6 that K := K ′ ∨ sup kzk is finite, hence z∈B ǫ z∈B ǫ sup kzk ≤ K(1 + kxk). z∈T̃ x We now show that T̃ is upper semicontinuous. Let xn → x, yn → y and yn ∈ T̃ xn for n ≥ 0. Since T is continuous, we have that T xn → T x. Hence, (yn − T xn ) → (y − T x) and ǫ ≥ lim inf kyn − T xn kν ≥ ky − T xkν . In other n→∞ words, y ∈ T̃ x. Let us define Hν , the Hausdorff metric with respect to the weighted max-norm as follows: Given A, B ⊆ Rd , Hν (A, B) := max dν (x, B) ∨ max dν (y, A), where x∈A y∈B dν (x, B) := min{kx − ykν | y ∈ B} and dν (y, A) := min{kx − ykν | x ∈ A}. Given x, y ∈ Rd , there exist x∗ ∈ T̃ x and y ∗ ∈ T̃ y such that kx∗ − y ∗ kν = Hν (T̃ x, T̃ y). For any x0 ∈ T̃ x and y0 ∈ T̃ y we have kx0 − y0 kν ≤ kx0 − x∗ kν + kx∗ − y ∗ kν + ky ∗ − y0 kν = 2ǫ + H(T̃ x, T̃ y). (13) For any z ∈ Rd we have νmin kzkν ≤ kzk ≤ (d νmax )kzkν . (14) Consider the set of all equilibrium points of T̃ : A := {J | kT J − Jkν ≤ ǫ}. For small values of ǫ, it follows from the above set of inequalities that A belongs to a small neighborhood of J ∗ . Similarly for small values of ǫ, the mean-field T̃ is a minor perturbation of T . Recall that J ∗ is the globally asymptotic ˙ stable equilibrium point of J(t) = T J(t) − J(t). It follows from the upper semicontinuity of attractors that for small values of ǫ there exists A′ within a small neighborhood of J ∗ such that A′ is the global attractor of the perturbed ˙ system J(t) ∈ T̃ J(t) − J(t). We will show that (11) converges to A ∩ A′ and ′ that A ∩ A 6= φ. ˙ ∈ We may construct a global Lyapunov function for the attractor A′ of J(t) T̃ J(t) − J(t) as illustrated in Remark 2. In other words, (11) satisfies (A4c). Hence we can find sets B and C such that A′ ⊆ B and B ⊆ C. Let us consider the following projective approximate value iteration:   Jn+1 = Jˆn + a(n) T Jˆn − Jˆn + ǫ̂n + Mn+1 , Jˆn+1 = ⊓B,C (Jn+1). (15) It is worth noting that the noise sequences in (11) and (15) are identical and that ǫ̂n ≤ ǫ for all n. Following the analysis in Section 4, we conclude that Jˆn → A′ . We are now ready to analyze (11). Theorem 3. Under (AV 1)-(AV 3), (A2), and (A3a), (11) is stable and converges to some point in {J | kT J − Jkν ≤ ǫ}, where ǫ is the norm-bound on the approximation errors. 19 Proof. PROOF: We start by showing that (11) satisfies assumption (A5). Earlier we showed that Jˆn → A′ . This implies that there exists N , possibly sample path dependent, such that Jˆn ∈ B for all n ≥ N . For k ≥ 0 and n ≥ N ,   kJn+k+1 −Jˆn+k+1 kν ≤ Jn+k − Jˆn+k + a(n + k) (T Jn+k + ǫn+k ) − (T Jˆn+k + ǫ̂n+k ) − (Jn+k − Jˆn+k ) ν . Grouping terms of interest in the above inequality we get: kJn+k+1 −Jˆn+k+1 kν ≤ (1−a(n+k))kJn+k −Jˆn+k kν +a(n+k)k(T Jn+k +ǫn+k )−(T Jˆn+k +ǫ̂n+k )kν . As a consequence of (13) the above equation becomes   kJn+k+1 −Jˆn+k+1 kν ≤ (1−a(n+k))kJn+k −Jˆn+k kν +a(n+k) 2ǫ + Hν (T̃ Jn+k , T̃ Jˆn+k ) . (16) We now consider the following two cases: Case 1. 2ǫ ≤ (1 − α)kJn+k − Jˆn+k kν : In this case (16) becomes   kJn+k+1 −Jˆn+k+1 kν ≤ (1−a(n+k))kJn+k −Jˆn+k kν +a(n+k) (1 − α)kJn+k − Jˆn+k kν + αkJn+k − Jˆn+k kν . Simplifying the above equation, we get kJn+k+1 − Jˆn+k+1 kν ≤ kJn+k − Jˆn+k kν . Case 2. 2ǫ > (1 − α)kJn+k − Jˆn+k kν : In this case (16) becomes   2ǫ 2ǫ ˆ . kJn+k+1 − Jn+k+1 kν ≤ (1 − a(n + k)) + a(n + k) 2ǫ + α 1−α 1−α Simplifying the above equation, we get kJn+k+1 − Jˆn+k+1 kν ≤ 2ǫ . 1−α We may thus conclude the following: kJn+k+1 − Jˆn+k+1 kν ≤ kJn+k − Jˆn+k kν ∨  2ǫ 1−α  . Applying the above set of arguments to kJn+k − Jˆn+k kν and proceeding recursively to kJN − JˆN kν we may conclude that for any n ≥ N   2ǫ ˆ ˆ kJn − Jn kν ≤ kJN − JN kν ∨ . (17) 1−α In other words, we have sup kJn − Jˆn kν < ∞ a.s. It follows from (14) that n≥0 sup kJn − Jˆn k < ∞ a.s. (in the Euclidean norm). The above arguments n≥0 are inspired by Abounadi, Bertsekas and Borkar [1] and Jaakkola, Jordan and Singh [12]. 20 We have shown that (11) satisfies (A1), (A2), (A3), (A4c) and (A5). It follows from Theorem 2 that the iterates given by (11) track a solution to ˙ ∈ T̃ J(t) − J(t) and that Jn → S, where S is a closed connected internally J(t) ˙ ∈ T̃ J(t)−J(t). Since A′ is a global attractor chain transitive invariant set of J(t) ˙ ∈ T̃ J(t) − J(t), it follows that S ⊆ A′ . of J(t) Now we show that Jn → A, the set of equilibrium points of T̃ J − J, implying that Jn → A ∩ A′ and A ∩ A′ 6= φ. Before proceeding further, we consider the following theorem from Aubin and Cellina [2]: [Theorem 2, Chapter 6 [2]] Let F be an upper semicontinuous map from a closed subset K ⊂ X to X with compact convex values and x(· ) be a solution trajectory of ẋ(t) ∈ F (x(t)) that converges to some x∗ in K. Then x∗ is an equilibrium of F . We have already shown that supkJn k < ∞ a.s. In other words, there exists n≥0 a large compact convex set K ⊆ Rd , possibly sample path dependent, such that Jn ∈ K for all n ≥ 0. Further, K can be chosen such that the “tracking solution” of ẋ(t) ∈ T̃ J(t) − J(t) is also inside K, asymptotically. It follows that the conditions of the above stated theorem are satisfied, hence every limit point of (11) is an equilibrium point of T̃ J − J. In other words, Jn → {J | kT J − Jkν ≤ ǫ}. Remark 3. As the bound on the approximation errors decreases, the size of the limiting set of the corresponding approximate value iteration given by (11) also decreases. Specifically, as ǫ ↓ 0, {J | kT J − Jkν ≤ ǫ} ↓ J ∗ . 7.1 Approximation errors bounded in the weighted p-norm sense The approximation errors encountered hitherto in this section are bounded in the weighted max-norm sense. As stated earlier, these errors are often a consequence of approximation operators that are used to counter Bellman’s curse of dimensionality. In a model-free setting, typically one is given data of the form (xn , vn ), where vn s are unbiased estimates of the objective function at xn ’s. Note that the role of an approximation operator may be played by a supervised learning algorithm. This algorithm would return a good fit g from within a class of functions T . The objective for these algorithms would be to minimize the approximation errors. Previously, we considered approximation operators that minimize errors in the weighted max-norm sense. This is relevant to largescale applications where it may not be possible to approximate over all the states uniformly. In many applications the approximation operators work by minimizing the errors in the ℓ1 and ℓ2 norms, see Munos [13] for details. In this section, we consider the general case of approximation errors being bounded in the weighted 21 p-norm sense. Specifically, we analyze (11) with kǫn kω,p ≤ ǫ for some fixed ǫ > 0. Recall the definition of the weighted p-norm of a given z ∈ Rd : kzkω,p = d X i=1 |ωi zi | p !1/p , where ω = (ω1 , . . . , ωd ) is such that ωi > 0, 1 ≤ i ≤ d and p ≥ 1. Recall that the Bellman operator T is contractive with respect to k· kν . First, we establish the relationship between the weighted p-norm and the weighted max-norm. Again, fix z ∈ Rd . We have that |zi | ≤ νmax kzkν , where νmax is defined in Lemma 6. Hence kzkω,p ≤ (d ωmax νmax )kzkν , where ωmax := kzkω,p max {ωi | 1 ≤ i ≤ d}. Similarly, kzkν ≤ νmin . We have the following inequality: νmin kzkν ≤ kzkω,p ≤ (d ωmax νmax )kzkν . (18) In this section we consider the following stochastic iterative AVI scheme: Jn+1 = Jn + a(n) (T Jn − Jn + ǫ̃n + Mn+1 ) (19) where kǫ̃n kω,p ≤ ǫ for all n ≥ 0. If we define T J := T J + {x | kxkω,p ≤ ǫ}, as in the previous subsection, we can show that T is a Marchaud map. Further, we may state an identical theorem for (19). Theorem 4. Under (AV 1)-(AV 3), (A2), and (A3a), (19) is stable and converges to some point in {J | kT J − Jkω,p ≤ ǫ}, where ǫ is the norm-bound on the approximation errors. Proof. PROOF: As in the proof of Theorem 3, we need to show that (19) satisfies (A5). It follows from (18) that kǫn kω,p ≤ ǫ =⇒ kǫn kν ≤ ǫ/νmin . We are now in the setting of Theorem 3, and it follows that (19) satisfies (A5). With regards to convergence, using similar arguments, we can show that (19) converges to the set of equilibrium points of T J − J given by {J | kT J − Jkω,p ≤ ǫ}. As in the previous subsection, {J | kT J − Jkω,p ≤ ǫ} ↓ J ∗ as ǫ ↓ 0. 7.2 Comparison with previous literature An important contribution in understanding the convergence of approximate value iteration (AVI) methods has been due to Munos in 2005 [13]. This paper analyzed AVI methods (for the infinite horizon discounted case problem) wherein the approximation errors are bounded in the weighted p-norm sense, a significant improvement over [6] that only considered max norms. However, 22 in [13], the basic procedure considered is a numerical AVI scheme where complete knowledge of the ‘system model’, i.e., the transition probabilities is assumed. In addition, in [13], convergence is shown under one of the following two assumptions on transition probabilities. Let µ be a distribution over the state space. (MA1) ∃C > 0 such that for all states x, y and policy π, we have P π (x, y) ≤ Cµ(y). (MA2) ∃ a distribution ρ and co-efficients c(m) ∀m ≥ 1 and policies π1 , . . . , πm the dissuch that ρP π1 . . . P πm ≤ c(m)µ. The smoothness constand P C of mγ m−1 c(m), counted future state distribution is given by C := (1−γ)2 m≥1 where γ is the discount factor. These smoothness requirements on the transition probabilities are strong and will not hold for a large class of systems. It is worth noting that such smoothness requirements are eliminated in our analysis. We consider a stochastic approximation counterpart of AVI that involves an ‘operational noise’ component in addition, that we model as a general martingale difference noise sequence. An algorithm such as (11) arises for instance in the Q-learning procedure (where the Bellman operator T is in fact the Q-Bellman operator) or when the same is a Bellman operator corresponding to a given stationary policy, see Chapter 5 of [6]. In such a model, no information is assumed known about the system transition probabilities, i.e., the setting in such a case is ‘model-free’. Thus our convergence analysis works in the case of AVI schemes for which (a) information on the transition probabilities is not known, (b) no such restrictions as (MA1) or (MA2) are imposed on the transition probabilities, and (c) there is a measurement error (albeit bounded) that may arise for instance from the use of function approximation. We require that J ∗ ˙ be the unique globally asymptotically stable equilibrium of J(t) = T J(t) − J(t), where T is the Bellman operator that is a contraction map. Since J ∗ is the unique solution to the equation T J = J, it is natural to expect that the aforementioned requirement holds true. It is also important to note that our analysis works for both stochastic shortest path and infinite horizon discounted cost problems. Value iteration is an important reinforcement learning algorithm. As stated in Section 1, in the case of large-scale problems, AVI methods are used to obtain suboptimal solutions (arising from say the use of function approximation techniques). Showing that the stochastic approximation counterpart is bounded almost surely can be hard in many reinforcement learning applications. Thus, one of the most significant contributions of this paper, not addressed in previous literature, lies in the development of easily verifiable sufficient conditions for the almost sure boundedness of AVI methods involving set-valued dynamics. 23 8 Application: Finding fixed points of set-valued maps In Section 7 we showed that the stochastic iterative AVI given by (11) converges to a vector that belongs to a small neighborhood of the optimal cost-to-go vector J ∗ . To do this we started by observing that the fixed points of the perturbed Bellman operator belong to a small neighborhood of J ∗ as a consequence of the upper semicontinuity of attractor sets. Then we showed that (11) converges to a fixed point of the perturbed Bellman operator, thereby showing that (11) converges to a small neighborhood of J ∗ . In this section, we generalize the ideas of Section 7 to develop and analyze a SAA for finding fixed points of contractive set-valued maps. Suppose that we are given a set-valued map T : Rd → {subsets of Rd }. We present sufficient conditions under which the following stochastic approximation algorithm is bounded a.s. and converges to a fixed point of T : xn+1 = xn + a(n) [yn + Mn+1 ] , (20) where (ii) yn ∈ T xn − xn for all n ≥ 0. (ii) {a(n)}n≥0 is the given step-size sequence satisfying (A2). (iii) {Mn+1 }n≥0 is the Martingale difference noise sequence satisfying (A3a). Definitions: Given a metric space (Rd , ρ), we define the Hausdorff metric with respect to ρ as follows:     Hρ (A, B) := min ρ(x, B) ∨ min ρ(y, A) , x∈A y∈B where A, B ⊂ Rd and ρ(u, C) := min{ρ(u, v) | v ∈ C} for any u ∈ Rd and C ⊆ Rd . We call a set-valued map T as contractive if and only if Hρ (T x, T y) ≤ αρ(x, y), where x, y ∈ Rd and 0 < α < 1. We say that T is of bounded diameter if and only if diam(T x) ≤ D, where x ∈ Rd and 0 < D < ∞. We define diam(A) := sup{ρ(z1 , z2 ) | z1 , z2 ∈ A} for any A ⊂ Rd . We impose the following restrictions on (20): (AF1) T is a Marchaud map that is of bounded diameter and contractive with respect to some metric ρ. (AF2) The metric ρ is such that kx − yk ≤ C ρ(x, y) for x, y ∈ Rd , C > 0. (AF3) Let F := {x | x ∈ T x} denote the set of fixed points of T . There exists a compact subset F ′ ⊆ F along with a strongly positive invariant bounded open neighborhood. OR F is the unique global attractor of ẋ(t) ∈ T x(t) − x(t). Since T is assumed to be contractive with respect to ρ, it follows from Theorem 5 24 of Nadler [14] that T has at least one fixed point. Assumption (AF 2) is readily satisfied by the popular metric norms such as the weighted p-norms and the weighted max-norms among others. Assumption (AF 3) is imposed to ensure that (20) satisfies (A4b) or (A4c). Specifically, (AF 3) is imposed to ensure the existence of an inward directing set associated with ẋ(t) ∈ T x(t) − x(t), see Proposition 2 for details. In other words, we can find bounded open sets CF and BF such that CF is inward directing and BF ⊂ CF . As in Section 7, we compare (20) with it’s projective counterpart given by: x̃n+1 = x̂n + a(n) (yn + Mn+1 ) , x̂n+1 ∈ ⊓B (21) F ,CF (x̃n+1 ), where yn ∈ T x̂n − x̂n , {Mn+1 }n≥0 is identical for both (20) and (21) and BF ,CF (· ) is the projection operator defined at the beginning of Section 4. The analysis of the above projective scheme proceeds in an identical manner as in Section 4. Specifically, we may show that every limit point of the projective scheme (21) belongs to BF . The following theorem is immediate. ⊓ Theorem 5. Under (AF 1)-(AF 3) and (A3a), the iterates given by (20) are bounded almost surely. Further, any limit point of (20) (as n → ∞) is a fixed point of the set-valued map T . Proof. PROOF: The proof of this theorem proceeds in a similar manner to that of Theorem 3. We only provide an outline here to avoid repetition. We begin by showing that (20) is bounded almost surely (stable) by comparing it to (21). Since the limit points of (21) belong to BF , there exists N , possibly sample path dependent, such that x̂n ∈ CF for all n ≥ N . For k ≥ 0 we have the following inequality: ρ(xn+k+1 , x̂n+k+1 ) ≤ (1−a(n+k))ρ(xn+k , x̂n+k )+a(n+k) (2D + Hρ (T xn+k , T x̂n+k )) , where diam(T x) ≤ D for every x ∈ Rd . Recall that 0 < α < 1 is the contraction parameter of the set-valued map T . We consider two possible cases. Case 1. 2D ≤ (1 − α)ρ(xn+k , x̂n+k ) : In this case, it can be shown that ρ(xn+k+1 , x̂n+k+1 ) ≤ ρ(xn+k , x̂n+k ). Case 2. 2D > (1 − α)ρ(xn+k , x̂n+k ) : In this case, it can be shown that ρ(xn+k+1 , x̂n+k+1 ) ≤ 2D . 1−α We conclude the following: ρ(xn , x̂n ) ≤  2D 1−α  ∨ ρ(xN , x̂N ), n ≥ N. It follows from the above inequality and (AF 2) that (20) satisfies assumption (A5). Hence, we get that {xn }n≥0 is bounded almost surely (stable). 25 Since the iterates are stable, it follows from [Theorem 2, Chapter 6, [2]] that every limit point of (20) is an equilibrium point of the set-valued map x 7→ T x − x. In other words, if x∗ is a limit point of (20), then 0 ∈ T x∗ − x∗ , i.e., x∗ ∈ T x∗ . Hence we have shown that every limit point of (20) is a fixed point of the set-valued map T . Remark 4. It is assumed that T is of bounded diameter, see (AF 1). The primary task of this assumption is in showing the almost sure boundedness of (20). Specifically, it is used to show that (A5) is satisfied. Depending on the problem at hand, one may wish to do away with this “bounded diameter” assumption. For example, we may have sup diam(T xn ) < ∞ a.s., then the bounded diameter n≥0 assumption can be dispensed with. Since T is Marchaud, it is point-wise bounded, i.e., sup kzk ≤ K(1 + kxk), z∈T x where K > 0. In other words, diam(T x) ≤ 2K(1 + kxk). In theory, the pointwise boundedness of T allows for unbounded diameters, i.e., diam(T x) ↑ ∞ as kxk ↑ ∞. Our bounded diameter assumption prevents this scenario from happening. In applications that use “approximate operators”, it is often reasonable to assume that the errors (due to approximations) are bounded. Then the “associated set-valued map” is naturally of bounded diameter. The reader is referred to Section 7 for an example of this setting. 9 A note on assumption (A5) In this section, we investigate the following question: Under what conditions is the stability of a SAA guaranteed, provided it is known a priori that the corresponding projective scheme is convergent. In Lemma 2.1 of Abounadi et. al. [1] this question is answered for simple iterative schemes. Here, we make an investigation for the setting of SAAs with set-valued mean-fields. We prove the following lemma. Lemma 8. Let B and C be open bounded subsets of Rd such that B ⊂ C. Consider the algorithm xn+1 ∈ Gn (xn , ξn ), n ≥ 0. We make the following assumptions: 1. {ξn }n≥0 is a random sequence that constitutes noise. 2. Gn is of bounded diameter and contractive (in the first co-ordinate with second co-ordinate fixed) with respect to some metric ρ, for n ≥ 0. In other words, Hρ (Gn (x, ξ), Gn (y, ξ)) ≤ αρ(x, y) for some 0 < α < 1 and sup ρ(u, v) ≤ D, where 0 < D < ∞ and x ∈ Rd . u,v∈Gn (x,ξ) 26 3. There exists C > 0 such that kx − yk ≤ C ρ(x, y). 4. The sequence {x̃n }n≥0 generated by  x̃n+1 ∈ Gn converges to some vector x∗ ∈ B. ⊓B,C (x̃n ), ξn  Then {xn }n≥0 is bounded almost surely. Proof. PROOF: Since x̃n → x∗ as n → ∞, there exists N such that x̃n ∈ B for all n ≥ N . For k ≥ 0 we have the following: ρ(xn+k+1 , x̃n+k+1 ) ≤ 2D + ρ(xn+k , x̃n+k ). The details of the above inequality are identical to the inequality given by (13). Unfolding the right hand side down to stage n we get the following:  ρ(xn+k+1 , x̃n+k+1 ) ≤ 1 + α + . . . + αk 2D + ρ(xn , x̃n ), ρ(xn+k+1 , x̃n+k+1 ) ≤ 2D + ρ(xn , x̃n ). 1−α In other words, we have sup ρ(xn , x̃n ) ≤ n≥N +1 2D + ρ(xN , x̃N ). 1−α Hence we have that {xn }n≥0 is bounded almost surely. 10 Conclusions We now briefly provide a summary of our results, hitherto presented. 1. In this paper we developed three sets of sufficient conditions for the stability (almost sure boundedness) and convergence of stochastic approximation algorithms with set-valued mean-fields, under general conditions on noise. 2. The Lyapunov function based assumptions presented here are general, easily verifiable and truly model-free. In previous Lyapunov function based approaches, the verifiability of the assumptions suffers from the need to explicitly construct the said Lyapunov function. However, here, we have provided a recipe to explicitly construct the required Lyapunov function, see Remarks 1 and 2 for details. Moreover our Lyapunov function based stability conditions are the first in literature for stochastic approximations with set-valued maps. 27 3. Our framework lends itself naturally to the analysis of the stochastic iterative counterpart of AVI methods. Such algorithms have become important in recent years due to the proliferation of DNNs for function approximations and parameterizations. As a consequence of our framework, AVI methods can be analyzed under significantly relaxed set of assumptions than previous literature. We showed, in particular, that the stochastic iterative AVI is bounded almost surely and converges to a vector belonging to a small neighborhood of the optimal J ∗ . An interesting consequence of our analysis is the fact that the limiting set of these AVI methods are the fixed points of the perturbed Bellman operator. It is worth noting that our framework can be used to analyze approximate policy gradient methods as well. These will pertain to the case where unlike [17] (that assumes complete knowledge of policy gradients), we only have knowledge of approximate policy gradients, i.e., gradients with errors. 4. Finally we demonstrated the generality of our theory, by developing and analyzing the first SAA for finding fixed points of contractive set-valued maps. To the best of our knowledge there is no prior work in this direction, and ours is the first such algorithm for finding fixed points of set-valued maps. References [1] J. Abounadi, D.P. Bertsekas, and V. Borkar. Stochastic approximation for nonexpansive maps: Application to q-learning algorithms. SIAM Journal on Control and Optimization, 41(1):1–22, 2002. [2] J. Aubin and A. Cellina. Differential Inclusions: Set-Valued Maps and Viability Theory. Springer, 1984. [3] M. Benaı̈m. A dynamical system approach to stochastic approximations. SIAM J. Control Optim., 34(2):437–472, 1996. [4] M. Benaı̈m and M. W. Hirsch. Asymptotic pseudotrajectories and chain recurrent flows, with applications. J. Dynam. Differential Equations, 8:141– 176, 1996. [5] M. Benaı̈m, J. Hofbauer, and S. Sorin. Stochastic approximations and differential inclusions. SIAM Journal on Control and Optimization, pages 328–348, 2005. [6] D.P. Bertsekas and J.N. Tsitsiklis. Neuro-Dynamic Programming. Athena Scientific, 1st edition, 1996. [7] P. Billingsley. Convergence of probability measures. John Wiley & Sons, 2013. [8] V. S. Borkar. Stochastic approximation with two time scales. Syst. Control Lett., 29(5):291–294, 1997. 28 [9] V. S. Borkar. Stochastic Approximation: A Dynamical Systems Viewpoint. Cambridge University Press, 2008. [10] V. S. Borkar and S.P. Meyn. The O.D.E. method for convergence of stochastic approximation and reinforcement learning. SIAM J. Control Optim, 38:447–469, 1999. [11] D.P. De Farias and B. Van Roy. On the existence of fixed points for approximate value iteration and temporal-difference learning. Journal of Optimization theory and Applications, 105(3):589–608, 2000. [12] T. Jaakkola, M. I. Jordan, and S.P. Singh. Convergence of stochastic iterative dynamic programming algorithms. In Advances in neural information processing systems, pages 703–710, 1994. [13] R. Munos. Error bounds for approximate value iteration. In Proceedings of the National Conference on Artificial Intelligence, volume 20, page 1006, 2005. [14] S. Nadler. Multi-valued contraction mappings. Pacific Journal of Mathematics, 30(2):475–488, 1969. [15] A. Ramaswamy and S. Bhatnagar. A generalization of the Borkar-Meyn theorem for stochastic recursive inclusions. Mathematics of Operations Research, 2016. [16] Herbert Robbins and Sutton Monro. A stochastic approximation method. The annals of mathematical statistics, pages 400–407, 1951. [17] R.S. Sutton, D. A. McAllester, S.P. Singh, and Y. Mansour. Policy gradient methods for reinforcement learning with function approximation. In Advances in neural information processing systems, pages 1057–1063, 2000. 29
3cs.SY
1 Sensor Selection for Target Tracking in Wireless Sensor Networks with Uncertainty Nianxia Cao, Student Member, IEEE, Sora Choi, arXiv:1510.01993v1 [cs.SY] 7 Oct 2015 Engin Masazade, Member, IEEE, Pramod K. Varshney, Fellow, IEEE Abstract In this paper, we propose a multiobjective optimization framework for the sensor selection problem in uncertain Wireless Sensor Networks (WSNs). The uncertainties of the WSNs result in a set of sensor observations with insufficient information about the target. We propose a novel mutual information upper bound (MIUB) based sensor selection scheme, which has low computational complexity, same as the Fisher information (FI) based sensor selection scheme, and gives estimation performance similar to the mutual information (MI) based sensor selection scheme. Without knowing the number of sensors to be selected a priori, the multiobjective optimization problem (MOP) gives a set of sensor selection strategies that reveal different trade-offs between two conflicting objectives: minimization of the number of selected sensors and minimization of the gap between the performance metric (MIUB and FI) when all the sensors transmit measurements and when only the selected sensors transmit their measurements based on the sensor selection strategy. Illustrative numerical results that provide valuable insights are presented. Index Terms Target tracking, sensor selection, Fisher information, mutual information, information fusion, multiobjective optimization, wireless sensor networks. N. Cao, S. Choi, and P. K. Varshney are with the Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY, 13244, USA, email: {ncao, schoi101, varshney}@syr.edu E. Masazade is with Department of Electrical and Electronics Engineering, Yeditepe University, Istanbul, 34755, Turkey, email: [email protected] The work of N. Cao, S. Choi, and P. K. Varshney was supported by U.S. Air Force Office of Scientific Research (AFOSR) under Grant No. FA9550-10-1-0458. The work of E. Masazade was supported by the Scientific and Technological Research Council of Turkey (TUBITAK) under Grant 113E220. A preliminary version of this paper appears in the IEEE International Conference on Information Fusion 2013. October 8, 2015 DRAFT 2 I. I NTRODUCTION A wireless sensor network (WSN) is composed of a large number of densely deployed sensors, where sensors are battery-powered devices with limited signal processing capabilities. When programmed and networked properly, WSNs are very useful in many application areas including battlefield surveillance [1], environment monitoring and target tracking [2], industrial processes [3] and health monitoring and control [4]. In our work presented in this paper, the task of the WSN is to track a target emitting or reflecting energy in a given region of interest (ROI), and the sensors send their observations regarding the target to a central node called the fusion center, which is responsible for the final inference. Target tracking problems often require coverage of broad areas and a large number of sensors that can be densely deployed over the ROI. This results in new challenges when the resources (bandwidth and energy) are limited. In such situations, it is inefficient to utilize all the sensors in the ROI including the uninformative ones, which hardly contribute to the tracking task at hand but still consume resources. This issue has been investigated and addressed via the development of sensor selection schemes, whose goal is to select the best non-redundant set of sensors for the tracking task while satisfying some performance and/or resource constraints [5]. The sensor selection problem for target localization and target tracking has been considered in [6]–[16] among others, where the sensor sets are selected to get the desired information gain or reduction in estimation error about the target state. In [6]–[9], the mutual information (MI) or entropy is considered as the performance metric, and in [10], [11], the sensors that have the lowest posterior Cramer-Rao lower bound (PCRLB), which is the inverse of the Fisher information (FI), are selected. In [12], the authors compared the two sensor selection criteria namely MI and PCRLB for the sensor selection problem based on quantized data, and showed that the PCRLB based sensor selection scheme achieves similar mean square error (MSE) with significantly less computational effort. In [13], the sensor selection problem was formulated as an integer programming problem, which was relaxed and solved through convex optimization. In [14], a multi-step sensor selection strategy by reformulating the Kalman filter was proposed, which was able to address different performance metrics and constraints on available resources. In [15], the authors aimed to find the optimal sparse collaboration topologies subject to a certain information or energy constraint in the context of distributed estimation. For a more complete October 8, 2015 DRAFT 3 literature review on sensor management for target tracking, see [16] and references therein. The previous research on sensor selection assumes that the WSNs operate reliably during the target tracking process without any interruptions. The fact is that, in some situations, the sensor observations are quite uncertain [17]–[21]. For example, sensors may have temporary failure, there may be abrupt changes in the operating environment [19], [20], or other interference such as traffic or birds/animals that may change the power received by the sensors. Moreover, some random interruptions may appear over the communication channels in the system, and adversaries may jam wireless communications using different attack strategies [21]. These types of uncertainties would result in the set of sensor observations with insufficient information about the target at the fusion center. In other words, in such an uncertain WSN, sensor observations may contain useful information regarding the target only with a certain probability. It is important to investigate the sensor selection problem in such an uncertain environment. In our work here, we study the uncertainty caused by occlusions, i.e., the sensors may not be able to observe the target when blocked by some obstacles. Regarding the representation of this type of uncertainty, the authors in [17] and [18] introduced a stochastic model for sensor measurements. Furthermore, the work in [19] and [20] generalized the model in [17], [18] to multiple sensors by considering a more realistic viewpoint in that the sensors have different uncertainty at different time instants. For the problems involving uncertain WSNs, even though there are studies about the Kalman filter for target tracking [18], [22]–[24], and about the target localization problem with non-ideal channels [25], [26], the sensor selection problem in WSNs with uncertain sensor observations has not been considered in the literature and is the subject of this paper. In the aforementioned literature, sensor selection schemes require a priori information about the number of sensors to be selected at each time, denoted as A, and computationally efficient algorithms are developed in order to find the optimal A sensors that achieve the maximum performance gain. Realistically, in many applications like target tracking, it is unlikely that the number of sensors that need to be selected at each time step of tracking is known to the system designer before operation begins. Therefore, it is quite necessary and important to investigate sensor selection strategies that determine the optimal number of sensors to be selected as well as which sensors to select based on the WSN conditions. Sensor network design usually involves consideration of multiple conflicting objectives, such as maximization of the lifetime of the network or the inference performance, while minimizing October 8, 2015 DRAFT 4 the cost of resources such as energy, communication or deployment costs [27]–[30]. The problems that investigate the trade-offs among such conflicting objective functions are called Multiobjective Optimization Problems (MOPs). In our preliminary work [31], a sensor selection method utilizing FI as the performance metric in an MOP framework has been presented under the assumption that the sensors in the WSN are all reliable. Our work in [31] optimized two objectives simultaneously: minimization of the total number of sensors selected at each time, and minimization of the information gap between the FI when all the sensors transmit their measurements and the FI when only the selected sensors transmit their measurements. In this work, we investigate the sensor selection problem in an uncertain WSN, and generalize the approach presented in [31] by addressing the issues that arise due to uncertainty. As we will see in the paper, the FI based selection scheme (FISS) tends to select sensors which are relatively close to the target, while the MI based selection scheme (MISS) selects sensors that have high sensing probabilities, and achieves better performance. The better performance of MISS comes along with high computational complexity. Thus, we propose to use a mutual information upper bound (MIUB) as the performance metric for the sensor selection problem. The complexity of computing MIUB is similar to that of evaluating FI, and is much lower than that of computing MI. We also show through simulation experiments that the MIUB based selection scheme (MIUBSS) hardly degrades the tracking performance. Furthermore, we consider our sensor selection problem with uncertainty under the MOP framework, where the Nondominating Sorting Genetic Algorithm-II (NSGA-II) is applied to dynamically select an optimal set of sensors at each time step. Numerical results show that MIUBSS selects more sensors than FISS under the MOP framework. We also compare our framework with some other sensor selection methods, e.g., weighted sum method and convex optimization method, and show that NSGA-II with the compromise solution (to be discussed later in the paper) adaptively decides the optimal number of sensors at each time step of tracking and achieves satisfactory estimation performance while obtaining savings in terms of number of sensors. The rest of this paper is organized as follows: In Section II, we introduce the uncertain WSN system model. The target tracking framework using a particle filter is given in Section III. In Section IV, the performance metric, FI and MI, for sensor selection are introduced, and comparisons are performed through numerical experiments. Then in Section V, we review the fundamentals of MOP and apply NSGA-II to solve the proposed MOP; we also investigate the October 8, 2015 DRAFT 5 performance of the MOP framework through simulations in this section. Section VI is devoted to our conclusions and future research directions. II. S YSTEM MODEL We consider a target tracking problem, where a moving target emitting (or reflecting) a signal over an area of interest is tracked by a WSN consisting of N sensors. The target state is assumed to be a 4-dimensional vector xt = [xt , yt , ẋt , ẏt ] where xt and yt are the target positions, and ẋt and ẏt are the target velocities in the horizontal and vertical directions. Even though the approaches developed in this paper are applicable to more complex dynamic models, here we assume a linear dynamic model xt+1 = Fxt + wt . (1) where F is the state transition matrix and wt is the Gaussian process noise with zero mean and covariance matrix Q:    D3 3 0 D2 2 0     0 1 0 D   0    F= ,Q = q 2  0 0 1 0   D   2  0 0 0 0 1 D3 3 0 D2 2 0 D 1 0 D 0 D2 2 0     , 0   D (2) where D is the sampling interval and q is the process noise parameter. It is assumed that the signal emitted by the target follows a power attenuation model [25]. Thus, the signal power received by sensor i which is located at (xi , yi ) is Pi,t (xt ) = P0 1 + αdni,t (3) where P0 is the emitted signal power from the target at distance zero, n is the signal decay exponent and α is a scaling parameter. In (3), di,t is the distance between the target and the ith p sensor at time step t, i.e., di,t = (xt − xi )2 + (yt − yi )2 . A. Uncertainty Model of Sensor Observations As discussed earlier, sensor observations may be uncertain due to sensor failures, natural interference or some random interruptions. Regarding different uncertainties, there are different probabilistic models [32]. In this paper, we consider the scenario that the sensor observation October 8, 2015 DRAFT 6 uncertainty is caused by some obstacles, and assume the following probabilistic measurement model, which has been proposed in [17] and generalized in [19] and [20]: the sensor observation is assumed to contain only noise if the sensor cannot sense the target due to obstacles, and since such uncertainty may happen at any time for any sensor, the sensing probability may not be identical across the sensors in the WSN, i.e.,   h (x ) + v , with probability p(i) s i,t t i,t zi,t = (i)  vi,t , with probability 1 − ps (i) where ps is the sensing probability of sensor i, hi,t (xt ) = p (4) Pi,t (xt ) represents the signal amplitude received by sensor i at time step t, and vi,t is the measurement noise, which is assumed to be independent across time steps and across sensors, follows a Gaussian distribution with parameters N (0, σ 2). The likelihood function for sensor measurements zt = [zi,t , . . . , zN,t ]T given the target state xt is simply the product of each sensor i’s likelihood function. Given xt , zi,t (i) follows the Gaussian distribution N (hi,t (xt ), σ 2 ) with probability ps , and follows the Gaussian (i) distribution N (0, σ 2 ) with probability 1 − ps , i.e., 2 p(zi,t |xt ) = ps(i) N (hi,t (xt ), σ 2 ) + (1 − p(i) s ) N (0, σ ) (5) For communication between the fusion center and the sensors, we consider the following two practical scenarios: 1) the sensors directly send their analog measurements zt to the fusion center; and, 2) the sensors quantize their analog measurements to M bits, and then transmit the quantized data to the fusion center for tracking. Analog sensor measurements contain complete information about the observation, at the expense of high communication cost; on the other hand, quantized measurements save communication burden, but lose some information about the target. The quantized measurement of sensor i at time step t, Di,t , is defined as: Di,t =              0 η0 ≤ zi,t ≤ η1 1 .. . η1 ≤ zi,t ≤ η2 L−1 (6) η(L−1) ≤ zi,t ≤ ηL where η = [η0 , η1 , . . . , ηL ]T is the set of quantization thresholds with η0 = −∞ and ηL = ∞ October 8, 2015 DRAFT 7 Algorithm 1 SIR Particle Filter for target tracking 1: Set t = 1. Generate initial particles xs0 ∼ p(x0 ) with ∀s , w0s = Ns−1 . 2: 3: 4: while t ≤ Ts do xst = Fxst−1 + υ t (Propagating particles) P s s p(xt |z1:t ) = N1s N s=1 δ(xt − xt ) 5: Obtain sensor data zt 6: wts ∝ p(zt |xst ) (Updating weights through obtained data) 7: wts = ws PNst Ps=1 Ns wts (Normalizing weights) wts xst 8: x̂t = 9: {xst , Ns−1 } = Resampling(xst , wts ) 10: 11: s=1 t=t+1 end while and L = 2M is the number of quantization levels. The probability that Di,t takes the value l is p(Di,t = l|xt ) = Pr(ηl ≤ zi,t ≤ ηl+1 |xt ) = ps(i) Pr(ηl ≤ zi,t ≤ ηl+1 |zi,t ∼ N (hi,t(xt ), σ 2 )) + (1 − ps(i) ) Pr(ηl ≤ zi,t ≤ ηl+1 |zi,t ∼ N (0, σ 2))      ηl+1 − hi,t (xt ) ηl − hi,t (xt ) (i) −Q = ps Q σ σ     η  ηl l+1 + (1 − ps(i) ) Q −Q σ σ (7) where Q(·) denotes the complementary distribution of the standard Gaussian distribution with zero mean and unit variance Q(x) = Z x ∞ 1 y2 √ exp{− }dy 2 2π (8) Since the sensor measurements are conditionally independent, the likelihood function of Dt = [D1,t , D2,t , ..., DN,t ]T can be written as the product of each sensor i’s likelihood function. III. PARTICLE F ILTERING FOR TARGET T RACKING The target tracking problem requires the estimation of the target state using a sequence of sensor measurements. For nonlinear systems, extended Kalman filter (EKF) provides suboptimal October 8, 2015 DRAFT 8 solutions. However, when the sensor measurements are quantized, even for linear and Gaussian systems, the EKF fails to provide an acceptable performance especially when the number of quantization levels is small [33]. Thus, we employ a sequential importance resampling (SIR) particle filter to solve our nonlinear target tracking problem with analog and quantized sensor measurements [34], [35]. The SIR algorithm is based on the Monte Carlo method, and can be used for recursive Bayesian filtering problems under very weak assumptions [35]. The main idea of the particle filter is to find a discrete representation of the posterior distribution p(xt |z1:t ) (p(xt |D1:t )) by using a set of particles xst with associated weights wts , p(xt |z1:t ) ≈ Ns X s=1 wts δ(xt − xst ), (9) where, δ(·) is the Dirac delta measure, and Ns denotes the total number of particles. When the number of particles is large enough, the weighted sum of the particles based on the Monte Carlo characterization will be an equivalent representation of the posterior distribution. The resampling step in the SIR particle filter avoids the situation that all but one of the importance weights are close to zero after a few iterations, which is known as the degeneracy phenomenon in the particle filter. Algorithm 1 provides a summary of the SIR particle filtering algorithm for the target tracking problem with analog data zt , where Ts denotes the number of time steps over which the target is tracked, and zt is replaced by Dt if quantized data is utilized for transmission. IV. S ENSOR S ELECTION C RITERIA FOR U NCERTAIN WSN S In this section, we present and investigate three performance metrics, FI, MI, and MIUB, for the sensor selection problem in an uncertain WSN. After formulating the three performance metrics mathematically for the analog data and quantized data respectively, we compare them with respect to the resulting tracking performance. A. Fisher Information Posterior Cramer-Rao Lower Bound (PCRLB) provides the theoretical performance limit for a Bayesian estimator [36]. Let p(zt , xt ) denote the joint probability density function of the sensor measurements and the target state, and let x̂t denote the estimate of xt . The PCRLB on the estimation error is represented as [36],  E [x̂t − xt ][x̂t − xt ]T October 8, 2015 ≥ Jt−1 (10) DRAFT 9 where Jt is the Fisher information (FI) matrix. It has been shown in [37] that, the FI matrix for Bayesian estimation is composed of two parts: the FI obtained from the sensor measurements and the FI corresponding to a priori information. Furthermore, under the assumption that the sensor measurements are conditionally independent given the target state xt , the FI obtained from the measurements of multiple sensors can be written as the summation of each sensor’s FI plus the FI from the prior information, Jt , N Z X i=1 S Ji,t (xt )p(xt )dxt + JtP (11) xt S where JtP is the FI matrix of the a priori information, and Ji,t (xt ) represents the standard FI of each sensor as a function of the target state xt , S Ji,t (xt ) = Z zi,t ∂p(zi,t |xt ) p(zi,t |xt ) ∂xt 1  2 dzi,t (12) 1) Fisher information for the analog sensor measurement model: The FI for analog data is obtained by substituting the likelihood function p(zi,t |xt ) given in (5) into (12). The derivative of p(zi,t |xt ) is ∂p(zi,t |xt ) ∂xt   (zi,t − h(xt ))2 ∂hi,t (xt ) (i) zi,t − hi,t (xt ) √ = ps exp − 2σ 2 ∂xt σ 2 2πσ 2 (13) where n−2 ∂hi,t (xt ) αn hi,t (xt )di,t = ∂xt 2 1 + αdni,t October 8, 2015  xt − xi   y −y i  t   0  0        (14) DRAFT 10 SA Substituting (5), (13), and (14) into (12) and letting Ji,t (xt ) denote the standard FI matrix for SA analog data, Ji,t (xt ) is obtained as follows: SA Ji,t (xt ) = 2 (p(i) s ) κA i,t (xt )  ∂hi,t (xt ) ∂xt  ∂hi,t (xt ) ∂xt T (i) = κA i,t (xt )  2n−4 (ps )2 α2 n2 h2i,t (xt )di,t 4(1 + αdni,t)2 (xi − xt )2   (x − x )(y − y ) t i t  i ×  0  0 (xi − xt )(yi − yt ) 0 0 (yi − yt )2 0 0  (15)  0 0    0 0   0 0 where κA i,t (xt ) =  Z n (z − h(x ))2 o2 1 zi,t − hi,t (xt ) i,t t √ exp − dzi,t p(zi,t |xt ) σ 2 2πσ 2 2σ 2 (16) zi,t 2) Fisher information for the quantized sensor measurement model: The FI of quantized data is calculated by replacing the likelihood function p(zi,t |xt ) given in (12) with p(Di,t |xt ) in (7). Since the derivative of the likelihood function of the quantized observations is (i) ps  n (η − h (x ))2 o ∂p(Di,t |xt )  l i,t t = √  exp − 2 ∂xt 2σ σ 2π  n (η − h (x ))2 o ∂h (x )  i,t t l+1 i,t t − exp −  2σ 2 ∂xt October 8, 2015 (17) DRAFT 11 we derive the FI for quantized data by substituting (14) into (17) as follows: SQ Ji,t (xt ) = X Di,t ∂p(Di,t |xt ) p(Di,t |xt ) ∂xt 1 κQ i,t (xt )   ∂hi,t (xt ) ∂xt  ∂hi,t (xt ) ∂xt = 2 (p(i) s ) = (i) 2n−4 (ps )2 α2 n2 h2i,t (xt )di,t Q κi,t (xt ) 4(1 + αdni,t)2  (xi − xt )2   (x − x )(y − y ) t i t  i ×  0  0 2 T (18) (xi − xt )(yi − yt ) 0 0 (yi − yt )2 0 0   0 0    0 0   0 0 where κQ i,t (xt ) = X Di,t  n (η − h (x ))2 o 1 l i,t t exp − 2πσ 2 p(Di,t |xt ) 2σ 2 − exp n 2 (ηl+1 − hi,t (xt ))2 o − 2σ 2 (19) Thus, we get the FI for the analog observation model in (15), and for the quantized observation model in (18). B. Mutual Information Information-theoretic sensor management for target tracking seeks to minimize the uncertainty in the estimate of the target state conditioned on the sensor measurements [38]. Entropy, which is defined by Shannon [39], represents the uncertainty or randomness in the estimate of the target state xt . Moreover, because of the relationship between the entropy and the MI [40], the sensor selection problem for target tracking can be solved by maximizing the MI between the target state and the sensor measurements. Given the distribution of the target state and the likelihood function of the sensor measureOctober 8, 2015 DRAFT 12 ments, the MI for the analog data can be written as [8], [12] I(xt , zt ) = H(zt ) − H(zt |xt )    Z  Z   =− p(zt |xt )p(xt )dxt  zt    xt      Z   p(zt |xt )p(xt )dxt  dzt log2    xt   + N Z X i=1  xt   Z zi,t (20)   p(zi,t |xt ) log2 p(zi,t |xt )dzi,t p(xt )dxt where H(zt ) is the entropy of the sensor measurements zt , and H(zt|xt ) is the conditional entropy of the sensor measurements zt given the target state xt . Similarly, the MI for the quantized sensor measurements can be written as I(xt , Dt ) = H(Dt ) − H(Dt |xt )     Z  X p(Dt |xt )p(xt )dxt =−    Dt  xt      Z     log2 p(Dt |xt )p(xt )dxt   xt   + N Z X i=1 xt (21)    X p(Di,t |xt ) log2 p(Di,t |xt )p(xt )dxt  Di,t where the summation over Dt is taken over all possible combinations of the quantized measurements of the set of sensors. C. Mutual Information Upper Bound (MIUB) The computational complexity of evaluating the MI for a set of A sensors increases exponentially with the number of sensors A, so that it becomes impractical to compute the MI in (20) and (21) when the number of sensors to be selected is large [8] [41]. The chain rule October 8, 2015 DRAFT 13 25 20 15 31 0.93 32 0.92 33 0.97 34 0.57 35 0.99 36 0.19 Sensor Target Track 25 0.94 26 0.92 27 0.95 28 0.98 29 0.15 30 0.66 19 0.90 20 0.93 21 0.96 22 0.16 23 0.68 24 0.52 13 0.50 14 0.98 15 0.13 16 0.64 17 0.91 18 0.93 9 0.65 10 0.96 11 0.97 12 0.99 3 0.52 4 0.97 5 0.94 6 0.96 10 5 0 −5 t=8 −10 −15 7 0.96 t=3 −20 −25 8 0.21 1 0.14 t=1 2 0.66 −20 −10 0 10 20 Fig. 1. WSN with 36 unreliable sensors. Numbers above the stars indicate sensor index (left) and its sensing probability (right). for the MI is described as follows (we only show the MI for analog data, results for quantized data are similar): I(zt ; xt ) = N X i=1 I(zi,t ; xt |zi−1,t , · · · , z1,t ) (22) Since z1,t , · · · , zN,t are conditionally independent given the target state xt , zi,t → xt → zj,t (i, j ∈ {1, · · · , N}) form a Markov chain, and we have the following data processing inequality [40]: I(zi,t ; xt |zi−1,t , · · · , z1,t ) ≤ I(zi,t ; xt |zi−1,t , · · · , z2,t ) (23) · · · ≤ I(zi,t ; xt ) Thus, PN i=1 I(zi,t ; xt ) is an upper bound on I(zt ; xt ). We use this mutual information upper bound (MIUB) as the performance metric for our sensor selection problem. It can be easily shown that the computational complexity of evaluating MIUB for selecting A out N sensors increases linearly with A, which is the same with that of computing FI. D. Comparison of Performance Metrics for Sensor Selection by Numerical Experiments In this subsection, we compare the performance of the above three performance metrics, FI, MI, and MIUB, for the sensor selection problem through some numerical experiments. October 8, 2015 DRAFT 14 a) Simulation setting: In our simulations, we consider the WSN shown in Fig. 1, which has N = 6 × 6 = 36 sensors deployed in the ROI of area b2 = 50 × 50 m2 . In the current work, we assume that the sensing probabilities of the sensors are already known to the fusion center, research on how to learn the probabilities iteratively is an interesting problem and can be considered in the future. Generally, if the sensors around the target tracks have higher sensing probabilities compared to other sensors in the WSN, it is highly likely that the algorithm will select those sensors owing to both higher signal power and sensing probability. Our interest is in considering more challenging cases to test the performance of our algorithm. Thus, we assume that the sensors around the target track have relatively low sensing probabilities as shown in the figure. Moreover, the sensing probabilities may be identical for some sensors if they are in the same environment, however, if the sensors have the same sensing probability, the selection results would be similar to our preliminary work [31]. Thus, we consider the scenario in which the sensors in the WSN all have different sensing probabilities. For the linear dynamical model of the target given in (1), the time interval is D = 1.25 seconds and the process noise parameter q = 2.5×10−3 . The source power is P0 = 1000 and the variance of the measurement noise is selected as σ = 0.2. The sensors quantize their observations to M bits for quantized data, and the quantization thresholds [η1 , · · · , ηL−1 ] are selected to be the √ values which evenly partition the interval [−σ, σ + P0 ]. The prior distribution about the state of the target, p(x0 ), is assumed to be Gaussian with mean µ0 = [−23 −24 2 2]T and covariance Σ0 = diag[σx2 σx2 0.01 0.01] where we select σx = 6. The initial Ns = 5000 particles are drawn from p(x0 ). The mean square error (MSE) is used to measure errors between the ground truth and the estimates, and the MSE of the estimation at each time step of tracking is averaged over Ttotal trials as, MSEt = 1 Ttotal TX total tr=1 tr 2 tr tr 2 (x̂tr t (1) − xt (1)) + (x̂t (2) − xt (2)) (24) th where x̂tr trial. t and xt are the estimated and the actual target states at time t of the tr b) Sensors with highest MI or FI at different time steps: We first consider analog and two quantization communication schemes (M = 5 and 2) for one Monte Carlo run. The sensors with highest MI or FI are listed in Table I. Note that, 1) since the FI in our paper is a matrix, we consider the determinant of the FI matrix, which corresponds to the area of the uncertainty ellipsoid [42]; 2) we are interested in the effect of the sensors’ distances from the target and the October 8, 2015 DRAFT 15 TABLE I S ENSORS WITH THE MOST SIGNIFICANT MI OR FI AT DIFFERENT TIME STEPS Quantized data Quantized data M =5 M=2 Sensor 2,7 Sensor 2,7 Sensor 2,7 t = 1 FI Sensor 2,7 Sensor 2,7 Sensor 2,7 t = 3 MI Sensor 8 Sensor 8 Sensor 2,7,14 t = 3 FI Sensor 8 Sensor 8 Sensor 2,7,9 t = 8 MI Sensor 16 Sensor 16 Sensor 10,16,21 t = 8 FI Sensor 15 Sensor 15 Sensor 10,16 Time step Analog data t = 1 MI sensing probabilities on the performance metrics, thus we compute the performance metric for each sensor instead of focusing on different sets of multiple sensors; 3) for individual sensors, the MI and MIUB are identical. Generally, quantized data contains less information compared with the analog data. We first discuss the results for analog data and 5-bit quantized data. We observe from Table I that the sensors with highest MI or FI are identical for Analog data and 5-bit quantized data, which means that 5-bit quantization preserves most information of the analog data as far as sensor selection is concerned. Additionally, we investigate three distinct time steps to compare the results: • At time step 1, the target is relatively close to sensors 2 and 7 with a similar distance from the target, so that sensors 2 and 7 have the most significant MI and FI. Sensors 1 and 8 have very low sensing probabilities though they have similar distance to the target as sensors 2 and 7, and therefore have low MI and FI. • At time step 3, the target is much closer to sensor 8 than the other sensors, so that sensor 8 has the highest MI and FI even though it has a low sensing probability. • At time step 8, sensor 15 is the closest one to the target with very low sensing probability, and sensor 16 is the second closest with higher sensing probability. In this case, sensor 15 has the highest FI while sensor 16 has the highest MI. The 2-bit quantized data contains much less information about the target compared to the analog data and the 5-bit quantized data, so that the sensing probability of sensors affects the FI and MI more with the 2-bit quantized data. Thus, the sensors with relatively higher sensing probabilities October 8, 2015 DRAFT 16 20 16 14 90 Percentage of reliable sensors (%) 18 MSE 12 10 8 6 4 80 70 60 50 40 30 20 2 0 2−bit FI 2−bit MI 5−bit MI Analog−MI 5−bit FI Analog−FI 100 2−bit FI 2−bit MI 5−bit FI 5−bit MI Analog−FI Analog−MI 0 5 10 Time step t 15 20 10 0 (a) Fig. 2. 5 10 Time Step t 15 20 (b) Target tracking performance with analog data, 5-bit quantized data, and 2-bit quantized data, (a) MSE performance; (b) average number of reliable sensors selected. have higher FI and MI than the other sensors for the 2-bit quantized data case as shown in Table I. Therefore, we conclude that for analog data or quantized data with a large number of quantization levels, MI is more affected by the sensing probabilities of the sensors than FI; for quantized data with small number of quantization levels, both MI and FI are considerably affected by the sensing probabilities. Moreover, FISS tends to select sensors which are closer to the target compared to MISS, which can be explained from Equation (15) and (18) with the corresponding parameters, i.e., the distance between the target and the sensors dominates FI. However, such an explanation cannot be found for MI. In other words, the sensor’s distance from the target, sensing probability, and the number of quantization levels are all important factors that determine the tracking performance of the WSNs. c) Tracking performance: In Fig. 2, we show the performance of the WSN given in Fig. 1 when only one sensor is selected at each time step over Ttotal = 500 Monte Carlo runs. Fig. 2(a) shows that MISS has better MSE performance than FISS with both analog data and 5-bit quantized data. We explain the result by investigating the percentage of reliable sensors (the fusion center treats a sensor as unreliable if it’s amplitude is quite close to noise1 ) among 1 In the experiments, we check if it is within the region [−3σ, 3σ]. October 8, 2015 DRAFT 17 1 10 MSE MI MIUB 0 10 −1 Percentage of reliable sensors (%) 10 Fig. 3. 0 5 10 15 20 10 Time Step t 15 20 90 MI MIUB 80 70 60 50 40 0 5 Target tracking performance for MI and MIUB, A = 2. the selected ones over 500 Monte Carlo trials in Fig. 2(b). We observe that, in 500 Monte Carlo trials, around 60% of the sensors selected by MISS are reliable, and only around 40% of the sensors selected by FISS are reliable, which explains the better estimation performance of MISS. Although the sensor selection scheme with 2-bit quantized data selects even more reliable sensors, there is no improvement with respect to the MSE performance because of the significant information loss in the quantization process. As is shown in Fig. 2(a), the sensor selection scheme based on analog data has the best tracking performance; 5-bit quantized data based sensor selection scheme achieves performance that is close to that with the analog data; and 2-bit quantized data based sensor selection scheme performs much worse. We only show simulation results for the 5-bit quantized data in the following simulation experiments. d) Performance of MIUBSS: The complexity of computing MIUB for selecting A out of N sensors is the same as that of computing FI (both increase linearly with A), and is much less than that of evaluating the MI (increases exponentially with A). Fig. 3 shows the results of MISS and MIUBSS when A = 2 sensors are selected, and we observe similar performance for MISS and MIUBSS in terms of both the percentage of reliable sensors selected by the schemes and the MSE performance. In other words, MIUBSS obtains performance similar to MISS but with October 8, 2015 DRAFT 18 much lower computational complexity. Thus, in the next section, we utilize MIUBSS, instead of MISS, in the multiobjective optimization framework, and compare it with FISS. V. M ULTIOBJECTIVE O PTIMIZATION BASED S ENSOR S ELECTION In this section, we utilize the MOP framework to find the sensor selection strategy that can determine the optimal sensor set. The mathematical description of an n-objective optimization problem is given as {f1 (α), f2 (α), . . . , fn (α)} min α (25) subject to a ≤ αi ≤ b, h(α) = 0, g(α) ≤ 0 where α is the vector of decision variables with elements αi , a and b define the bounds on decision variables, functions h(.) and g(.) represent the equality and inequality constraints of the problem respectively. For the MOP, the solutions satisfying the constraints of (25) form the feasible set C. In an optimization problem involving the minimization of all the objectives, the solution α1 dominates the solution α2 (α1 ≻ α2 ) if and only if fu (α1 ) ≤ fu (α2 ) ∀u ∈ {1, 2, . . . n} 1 ∗ (26) 2 fv (α ) < fv (α ) ∃v ∈ {1, 2, . . . n} α is called a Pareto optimal solution if and only if there is no α in C that dominates α∗ , and the set of Pareto optimal outcomes is called the Pareto front. A well-known technique for solving MOPs is to minimize a weighted sum of the objectives, which yields a single solution corresponding to the weights used. With this approach, if a uniform spread of weights is employed to obtain different solutions, it rarely produces a uniform spread of points on the Pareto front. Some of the optimal solutions may become closely spaced and hence reducing the number of design alternatives [43]. In our work, the sensor selection strategies reflect different trade-offs between two objective functions: the estimation performance and the number of selected sensors, which are dependent on the binary decision variables. A. Objective Functions based on Fisher Information (FI) and Mutual Information Upper Bound (MIUB) 1) FI based objective functions: Let αt = [α1,t , . . . , αN,t ] be the sensor selection strategy at time step t. The elements of αt are binary variables, i.e, αi,t = 1, if sensor i is selected and October 8, 2015 DRAFT 19 αi,t = 0 otherwise. Then, A = PN i=1 αi,t is the number of sensors selected at time step t. Based on the sensor selection strategy αt , the FI matrix at time step t can be written as, Jt (αt ) = N X D αi,t Ji,t + JtP (27) i=1 We determine the sensor selection strategy from the solution of the MOP where the objective functions are: minimization of the information gap between the FI based on the measurements of all the sensors and the FI based on the sensor set selected by strategy αt , f1 (αt ) =   P P N N D P D P α J + J J + J − log det log det t t i=1 i,t i,t i=1 i,t  P N D P log det i=1 Ji,t + Jt (28) and minimization of the normalized number of selected sensors, f2 (αt ) = N 1 X αi,t N i=1 (29) 2) MIUB based objective functions: The objective functions based on MIUB are very similar to that with the FI: minimization of the normalized information gap between the total MIUB based on all the sensors and the MIUB based on the sensor selection strategy αt , PN (i) PN I − αi I (i) f1 (αt ) = i=1 PN i=1 (i) i=1 I (30) where I (i) denotes I(zi,t ; xt ) (or I(Di,t ; xt )), and minimization of the normalized number of selected sensors (the same as (29)). B. NSGA-II In this paper, we solve the above MOP which has binary decision variables using a state-of-theart multiobjective evolutionary algorithm, Nondominating sorting genetic algorithm (NSGA)-II [44]. This algorithm yields all the solutions on the Pareto front that explore all the possible tradeoffs between conflicting objectives. NSGA-II [44] first generates an initial population of size P where each solution in the population is a feasible solution of the MOP. In our problem, a solution in the population is represented as a vector of N elements where each element is a binary variable. NSGA-II is an elitist algorithm where good solutions are always preserved in the population. The values of the October 8, 2015 DRAFT 20 objective functions for each solution in the population form the fitness values of the solution. Then all the solutions in the population are sorted based on their non-domination. As an example, solutions with Rank 1 consist of all non-dominated solutions, then solutions with Rank 2 consist of all the solutions which are dominated by only one of the solutions in the population and so on. If two solutions in the population have the same fitness value, then they are sorted based on their crowding distance, which is a closure measure of each solution to its neighbors. NSGA-II uses the rank of a solution to create the mating population. The offspring solutions are generated by using binary tournament selection [44]. If both of the selected solutions have the same fitness value, then the solution with larger crowding distance is selected. In our problem where we have binary decision variables, we use a real-parameter recombination operator called uniform crossover (UX), where offspring solutions c1 and c2 are obtained from parent solutions p1 and p2 according to, c1 = ξp1 + (1 − ξ)p2 (31) c2 = (1 − ξ)p1 + ξp2 where ξ is defined by a random number q between [0, 1] [45] ξ=1 q ≤ 0.5 ξ=0 q > 0.5 (32) Along with UX, the uniform mutation procedure is employed. In uniform mutation, an offspring solution cl is obtained from the parent solution pl according to cl = δ(1 − cl ) + (1 − δ)cl (33) where δ is also determined according to (32). Then the new population with all the parents and offsprings are sorted again based on their non-dominance and the population size is decreased to the original population size P by eliminating all the lower rank solutions. Remaining solutions are then fed to a binary tournament selection operator and so on. After several generations G, the population will preserve solutions near or on the Pareto optimal front. C. Solution Selection from the Pareto-optimal Front Since NSGA-II provides P non-dominated solutions, it is necessary to select one particular solution from the Pareto-front which can yield the desired trade-off between the conflicting October 8, 2015 DRAFT 21 t=3 t=6 0.4 t=3 0.25 0.35 0.2 t=6 1 1 0.9 0.9 0.8 0.8 0.7 0.7 0.3 0.2 0.1 0.15 ← Knee point Sol. 0.6 SMI Gap 0.6 SMI Gap 0.15 FI Gap FI Gap 0.25 ← Knee point Sol. 0.5 0.5 0.4 0.4 0.3 0.3 ← Knee point Sol. 0.1 0.05 0.2 0.05 0 Compromise Sol. and ← Knee point Sol. 0 0.5 Sensor Selection ← Compromise Sol. 1 0 0 0.2 ← Compromise Sol. 0.1 0.5 Sensor Selection 0 1 0 0.5 Sensor Selection (a) Fig. 4. ← Compromise Sol. 0.1 0 1 0 0.5 Sensor Selection 1 (b) Pareto optimal front obtained by using NSGA-II at time step t = 3 and t = 6, (a) FI; (b) MIUB. objectives. In [46], the knee of the trade-off curve is introduced as the solution where a small decrease in one objective is associated with a large increase in the other. Let αa and αb be two adjacent (neighboring) solutions on the Pareto-optimal front where f1 (αa ) > f1 (αb ) and f2 (αa ) < f2 (αb ). Then we can compute the slope of the curve between solutions αa and αb from, f1 (αa ) − f1 (αb ) slope{α } = 180 − arctan f2 (αa ) − f2 (αb ) b    180 π  (34) For our problem, we define α1 as the all zero solution where none of the sensors are selected, so that f1 (α1 ) = 1 and f2 (α1 ) = 0. Similarly, we define αP is the all one solution which yields f1 (αP ) = 0 and f2 (αP ) = 1. We call the Pareto-optimal solution which maximizes (34) as the knee point solution given by, αt = arg max slope{αρ } α2 ,...,αP (35) where αρ (ρ ∈ {2, 3, . . . P }) represents the solutions on or near the Pareto-optimal front. Alternatively, the utopia point F ∗ of a MOP is defined as [43], F ∗ = [f1∗ , . . . , fn∗ ]T (36) where fj∗ is the individual minima of objective fj (j ∈ {1, . . . , n}) defined as, fj∗ = min{fj (α) | α ∈ C} (37) α October 8, 2015 DRAFT 22 MOP−MIUB, Compromise Sol. MOP−FI, Compromise Sol. MOP−MIUB, Knee point Sol. MOP−FI, Knee ponit Sol. 1 MSE 10 0 10 −1 Number of active sensors 10 Fig. 5. 0 5 10 15 20 MOP−MIUB, Compromise Sol. MOP−FI, Compromise Sol. MOP−MIUB, Knee point Sol. MOP−FI, Knee ponit Sol. 10 8 6 4 2 0 0 5 10 Time step t 15 20 Tracking performance at each time step with different solution selection methods. and let F (αρ ) = [f1 (αρ ), . . . , fn (αρ )]T where ρ ∈ {1, 2, . . . , P }. In [43], the point which is closest to the utopia point has been defined as the compromise solution. In this paper, we use the Euclidean distance to find the compromise solution as, v uX u n 2 αt = arg min t fj∗ − fj (αρ ) α1 ,...,αP (38) j=1 In the next section, we present some numerical results. D. Numerical Experiments for the MOP Framework In this section, we conduct some simulation experiments to investigate the performance of the multiobjective optimization method. The WSN considered in this subsection is the same as shown in Fig. 1 in Section IV-D, and the system parameters are also the same as Section IV-D. Note that, for NSGA-II, the population size is chosen as P = 100. We choose the number of generations according to the diversity metric introduced in [44]. The diversity metric measures October 8, 2015 DRAFT 23 MIUB−NSGA−II MIUB−Weighted Sum MIUB−A=2 MIUB−A=9 All 1 1 MSE 10 MSE 10 FI−NSGA−II FI−Weighted Sum FI−A=1 FI−A=4 All 0 0 10 10 −1 10 −1 0 5 10 Time step t 15 10 20 (a) 0 5 10 Time step t 15 20 (b) Fig. 6. Tracking performance for MOP with NSGA-II, convex relaxation, and weighted sum methods (a) MSE for MIUB; (b) MSE for FI. the extent of spread achieved among the obtained solutions, which is defined as PN −1 (E) ¯(E) (E) (E) |di − d | df + dl + i=1 ∆= (E) (E) d + d + (N − 1)d¯(E) f (E) where df (E) and dl (39) l are the Euclidean distances between the extreme solutions and the boundary solutions of the obtained nondominated set. We observe that for both FISS and MIUBSS, the diversity metric converges after 100 generations for all the 20 time steps. Thus, in our simulation experiments, we set the number of generations as G = 100. Also, before running NSGA-II, we include the two extreme solutions, i.e, all zero and all one solutions to the initial population. a) Pareto optimal front: In Fig. 4, we present the Pareto optimal front for our MOP obtained using NSGA-II, where Fig. 4(a) is for FISS and Fig. 4(b) shows the result for MIUBSS. It is interesting to note that at the end of G generations, NSGA-II yields N + 1 different solutions on the Pareto-optimal front where each solution corresponds to the optimal selection of A sensors out of N sensors where A ∈ {0, 1, . . . , N}. We know from (15), (18) and Table I that the distance between the target and the sensor plays a more important role than the sensing probability for FISS. At time step t = 3, the target is relatively close to sensor 8, and sensor 8 itself is able to achieve significant FI gain. At time step t = 6 the target is not relatively close to any of the sensors in the network and the fusion center has relatively large uncertainty about the target location. Thus, the Pareto front for FISS at t = 3 is steeper than that at t = 6. However, compared October 8, 2015 DRAFT 24 with FISS, MIUBSS prefers the sensors with high sensing probability and selects more sensors, so that the Pareto front of MIUBSS at t = 3 or t = 6 is not as steep as that for FISS. Moreover, we observe that the compromise solution and the knee point solution are identical when the Pareto front is relatively steep. b) Solution selection method: The solution, i.e., the sensor selection strategy, that we choose from the Pareto optimal front determines the overall tracking performance. In Fig. 5, we compare the average number of active sensors2 at each time step of tracking and the MSE performance using the knee point solution (35) and the compromise solution (38) with MIUBSS and FISS under the MOP framework. We observe similar results for MIUB and FISS that the knee point solution always selects one sensor for target tracking, and thus gives poorer MSE performance. However, the sensor selection strategy using the compromise solution in (38) selects the sensors which balance the tradeoff between the performance gain (MIUB and FI) and the total number of selected sensors. Thus, in the rest of our simulations, we use the compromise solution to choose the sensor selection strategy from the Pareto optimal front. Recall the results shown in Fig. 2 and Fig. 3 that MIUBSS selects more reliable sensors when the number of sensors to be selected is given. Furthermore, Fig. 5 shows that when the number of sensors to be selected is not known, MIUBSS tends to select more sensors than FISS under the MOP framework, such that the MSE performance of MIUBSS is better than FISS. c) NSGA-II, convex optimization, and weighted sum methods: In Fig. 6, we compare the tracking performance based on NSGA-II and (38) with the convex relaxation based sensor selection method similar to [13], [37] which always chooses A sensors out of N sensors at each time step of tracking. We apply the convex relaxation method to select the minimum and maximum number of sensors selected by NSGA-II with compromise solution in Fig. 5. With the minimum number of sensors, the convex relaxation based sensor selection method gives poor tracking performance. On the other hand, selecting the maximum number of sensors or all the sensors through convex relaxation method negligibly improves the MSE performance compared to the MOP approach. Thus, compared to the convex relaxation method, the multiobjective optimization method gives satisfactory tracking performance while saving in terms of the number 2 We show the number of active sensors (the selected sensors) to investigate the energy cost of each solution selection method, because selecting more sensors for data transmission incurs more energy cost. October 8, 2015 DRAFT 25 1 10 MIUB MSE MIUB, pth=0.5 s th s MIUB, p =0.15 0 10 −1 10 0 5 10 15 20 1 10 FI th MSE FI, ps =0.5 th FI, ps =0.15 0 10 −1 10 Fig. 7. 0 5 10 Time step t 15 20 Turn off sensors with relatively low sensing probabilities. of selected sensors with both MIUBSS and FISS. We also compare the MSE performance of the MOP framework with the weighted sum approach where the sensor selection scheme chooses those sensors which minimize the summation of both objectives, i.e. w1 f1 (αt ) + (1 − w1 )f2 (αt ) with w1 = 0.5. Simulation results show that for MIUBSS (Fig. 6(a)), the NSGA-II method obtains similar MSE performance with weighted sum method, while for FISS (Fig. 6(b)), the weighted sum method achieves much worse MSE performance. d) A Naive strategy: We consider a naive sensor selection method in which the fusion center turns off the sensors with relatively low sensing probabilities before sensor selection. In Fig. 7, we present the results when the fusion center turns off the sensors whose sensing th th probabilities are lower than some threshold pth s , where ps = 0.5 and ps = 0.15 are considered. Note that, for the WSN in Fig. 1, the sensors that are relatively close to the target will be turned off because they have low sensing probabilities. As shown in the previous results, MIUBSS prefers to select more reliable sensors, and FISS selects the sensors that are close to the target. Turning off sensors before selection performs worse for MIUBSS because it reduces the selection alternatives, and it performs better for FISS because more reliable sensors are selected when the closest sensors with low sensing probabilities are no longer available. October 8, 2015 DRAFT 26 FI−With uncertainty MIUB−With uncertainty FI−Without uncertainty MIUB−Without uncertainty MSE 0 10 −2 Number of active sensors 10 Fig. 8. 0 5 10 15 20 FI−With uncertainty MIUB−With uncertainty FI−Without uncertainty MIUB−Without uncertainty 10 8 6 4 2 0 0 5 10 Time step t 15 20 Comparison the performance for WSNs with and without uncertainty. e) Comparison with the performance when there is no uncertainty: In Fig. 8, we present the target tracking performance when the sensors are all reliable, e.g., ps = 1 for all the sensors, and compare with the results with uncertain observations. We observe that, with uncertain observations, both FISS and MIUBSS achieve worse MSE performance though they both tend to select more sensors. Moreover, compared with FISS, MIUBSS selects many more sensors with uncertain observations, and therefore achieves better MSE performance. f) WSN with another instance of sensing probabilities: In Fig. 9, the sensors’ sensing probabilities are distributed in a reverse manner as compared with Fig. 1, i.e., the sensors that are around the target track have relatively high sensing probabilities. In this condition, MIUBSS and FISS select similar number of sensors with similar MSE performance. The reason is that, under this scenario, MIUBSS and FISS both select the sensors around the target track with high sensing probabilities. We also have conducted experiments for the following scenarios: 1) the sensors’ sensing probabilities are all uniformly distributed between 0 and 1; 2) the sensor measurements have higher noise; and 3) the sensor measurements are quantized to 3 bits, since the results do not provide any new insights, we do not show the results in the paper. October 8, 2015 DRAFT 27 MOP−MIUB MOP−FI 0 MSE 10 −1 10 Number of active sensors 0 Fig. 9. 5 10 15 20 8 MOP−MIUB MOP−FI 6 4 2 0 0 5 10 Time step t 15 20 Tracking performance of MIUB and FI, sensors’ sensing probabilities are reversely deployed. VI. C ONCLUSION In this paper, we have proposed a multiobjective optimization method for the sensor selection problem in an uncertain wireless sensor network (WSN) for target tracking. We have considered the three performance metrics, Fisher information (FI), mutual information (MI), and mutual information upper bound (MIUB), as objective functions in characterizing the estimation performance for the multiobjective optimization problem (MOP). Numerical results show that the MIUB based selection scheme (MIUBSS) selects more reliable sensors compared with the FI based selection scheme (FISS) while saving computational cost compared with the MI based selection scheme (MISS). Furthermore, for the MOP framework, we have shown that the compromise solution on the Pareto front of the MOP achieves good estimation performance while obtaining savings in terms of the number of selected sensors. In this work, we were interested in finding the sensor selection strategy with a multiobjective optimization method in uncertain WSNs. Future work will consider the application of the multiobjective optimization method in the multitarget tracking problem in uncertain WSNs. October 8, 2015 DRAFT 28 R EFERENCES [1] T. Bokareva, W. Hu, S. Kanhere, B. Ristic, N. Gordon, T. Bessell, M. Rutten, and S. Jha, “Wireless sensor networks for battlefield surveillance,” in Proc. Conf. Land Warfare, 2006, pp. 1–8. [2] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer networks, vol. 52, no. 12, pp. 2292– 2330, 2008. [3] V. C. Gungor and G. P. Hancke, “Industrial wireless sensor networks: Challenges, design principles, and technical approaches,” IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258–4265, 2009. [4] A. Milenković, C. Otto, and E. Jovanov, “Wireless sensor networks for personal health monitoring: Issues and an implementation,” Computer communications, vol. 29, no. 13, pp. 2521–2533, 2006. [5] H. Rowaihy, S. Eswaran, M. Johnson, D. Verma, A. Bar-Noy, T. Brown, and T. La Porta, “A survey of sensor selection schemes in wireless sensor networks,” in Defense and Security Symposium. International Society for Optics and Photonics, 2007, pp. 65 621A–65 621A. [6] H. Wang, K. Yao, G. Pottie, and D. Estrin, “Entropy-based sensor selection heuristic for target localization,” in Proc. 3rd int. symposium on Information processing in sensor networks. ACM, 2004, pp. 36–45. [7] J. L. Williams, J. W. Fisher, and A. S. Willsky, “Approximate dynamic programming for communication-constrained sensor network management,” IEEE Trans. Signal Process., vol. 55, no. 8, pp. 4300–4311, 2007. [8] G. M. Hoffmann and C. J. Tomlin, “Mobile sensor network control using mutual information methods and particle filters,” IEEE Trans. Autom. Control, vol. 55, no. 1, pp. 32–47, Jan. 2010. [9] F. Zhao, J. Shin, and J. Reich, “Information-driven dynamic sensor collaboration,” IEEE Trans. Signal Process., vol. 19, no. 1, pp. 61–72, May 2002. [10] L. Zuo, R. Niu, and P. K. Varshney, “Posterior CRLB based sensor selection for target tracking in sensor networks,” in IEEE Int. Conf. Acoustics, Speech and Signal Process. (ICASSP), vol. 2, Apr. 2007, pp. 1041–1044. [11] ——, “A sensor selection approach for target tracking in sensor networks with quantized measurements,” in IEEE Int. Conf. Acoustics, Speech and Signal Process. (ICASSP), Mar 31-Apr 4 2008, pp. 2521–2524. [12] E. Masazade, R. Niu, P. K. Varshney, and M. Keskinoz, “Energy aware iterative source localization for wireless sensor networks,” IEEE Trans. Signal Process., vol. 58, no. 9, pp. 4824–4835, 2010. [13] S. Joshi and S. Boyd, “Sensor selection via convex optimization,” IEEE Trans. Signal Process., vol. 57, no. 2, pp. 451 –462, Feb. 2009. [14] Y. Mo, R. Ambrosino, and B. Sinopoli, “Sensor selection strategies for state estimation in energy constrained wireless sensor networks,” Automatica, vol. 47, pp. 1330–1338, Jul. 2011. [15] S. Liu, S. Kar, M. Fardad, and P. K. Varshney, “Sparsity-aware sensor collaboration for linear coherent estimation,” IEEE Trans. Signal Process., vol. 63, no. 10, pp. 2582–2596, 2015. [16] S. Liu, M. Fardad, E. Masazade, and P. Varshney, “Optimal periodic sensor scheduling in networks of dynamical systems,” IEEE Trans. Signal Process., vol. 62, no. 12, pp. 3055–3068, June 2014. [17] N. E. Nahi, “Optimal recursive estimation with uncertain observation,” IEEE Trans. Inf. Theory,, vol. 15, no. 4, pp. 457–462, 1969. [18] M. Hadidi and S. Schwartz, “Linear recursive state estimators under uncertain observations,” IEEE Trans. Autom. Control, vol. 24, no. 6, pp. 944–948, 1979. [19] F. O. Hounkpevi and E. E. Yaz, “Robust minimum variance linear state estimators for multiple sensors with different failure rates,” Automatica, vol. 43, no. 7, pp. 1274–1280, 2007. October 8, 2015 DRAFT 29 [20] H. Zhang, Y. Shi, and A. S. Mehr, “Robust weighted h filtering for networked systems with intermittent measurements of multiple sensors,” Int. J. Adapt. Control and Signal Process., vol. 25, no. 4, pp. 313–330, 2011. [21] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: attack and defense strategies,” IEEE Network, vol. 20, no. 3, pp. 41–47, 2006. [22] M. Mariton, Jump linear systems in automatic control. CRC Press, 1990. [23] O. L. V. Costa and S. Guerra, “Stationary filter for linear minimum mean square error estimator of discrete-time markovian jump systems,” IEEE Trans. Autom. Control, vol. 47, no. 8, pp. 1351–1356, 2002. [24] B. Sinopoli, L. Schenato, M. Franceschetti, K. Poolla, M. I. Jordan, and S. S. Sastry, “Kalman filtering with intermittent observations,” IEEE Trans. Autom. Control, vol. 49, no. 9, pp. 1453–1464, 2004. [25] O. Ozdemir, R. Niu, and P. K. Varshney, “Channel aware target localization with quantized data in wireless sensor networks,” IEEE Trans. Signal Process., vol. 57, no. 3, pp. 1190–1202, 2009. [26] E. Masazade, R. Niu, P. K. Varshney, and M. Keskinoz, “Channel aware iterative source localization for wireless sensor networks,” in Proc. IEEE 13th Int. Conf. Information Fusion (FUSION). IEEE, 2010, pp. 1–7. [27] E. Masazade, R. Rajagopalan, P. K. Varshney, C. Mohan, G. Kiziltas Sendur, and M. Keskinoz, “A multi-objective optimization approach to obtain decision thresholds for distributed detection in wireless sensor networks,” IEEE Trans. Syst., Man, Cybern. - Part B, vol. 40, no. 2, pp. 444–457, Apr. 2010. [28] R. Rajagopalan, C. Mohan, P. K. Varshney, and K. Mehrotra, “Multi-objective mobile agent routing in wireless sensor networks,” in The IEEE Congress on Evolutionary Computation, vol. 2, Sept. 2005, pp. 1730 – 1737 Vol. 2. [29] R. Rajagopalan, “Multi-objective optimization algorithms for sensor network design,” in IEEE Annual Wireless and Microwave Technology Conference (WAMICON), Apr. 2010, pp. 1 –4. [30] M. Nasir, S. Sengupta, S. Das, and P. Suganthan, “An improved multi-objective optimization algorithm based on fuzzy dominance for risk minimization in biometric sensor network,” in IEEE Congress on Evolutionary Computation (CEC), June 2012, pp. 1 –8. [31] N. Cao, E. Masazade, and P. K. Varshney, “A multiobjective optimization based sensor selection method for target tracking in wireless sensor networks,” in Proc. IEEE 16th Int. Conf. Information Fusion (FUSION), 2013, pp. 974–980. [32] W.-C. Lee, “Uncertainty in wireless sensor networks,” in Workshop on AFRL, 2010. [33] Y. Ruan, P. Willett, A. Marrs, F. Palmieri, and S. Marano, “Practical fusion of quantized measurements via particle filtering,” IEEE Trans. Aerosp. Electron. Syst., vol. 44, no. 1, pp. 15 –29, January 2008. [34] N. J. Gordon, D. J. Salmond, and A. F. Smith, “Novel approach to nonlinear/non-gaussian bayesian state estimation,” in IEEE Proceedings F (Radar and Signal Processing), vol. 140, no. 2. IET, 1993, pp. 107–113. [35] M. S. Arulampalam, S. Maskell, N. Gordon, and C. Tim, “A tutorial on particle filters for online nonlinear/ non-gaussian bayesian tracking,” IEEE Trans. Signal Process., vol. 50, no. 2, pp. 174–188, Feb. 2002. [36] H. V. Trees, Detection, Estimation, and Linear Modulation Theory, Part I. Wiley Interscience, 2001. [37] E. Masazade, R. Niu, and P. K. Varshney, “Dynamic bit allocation for object tracking in wireless sensor networks,” IEEE Trans. Signal Process., vol. 60, no. 10, pp. 5048–5063, Sep. 2012. [38] A. Ryan, “Information-theoretic tracking control based on particle filter estimate,” in AIAA Guidance Navigation and Control Conference, 2008, pp. 1–15. [39] C. E. Shannon, “A mathematical theory of communication,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 1, pp. 3–55, 2001. [40] T. M. Cover and J. A. Thomas, Elements of information theory. October 8, 2015 John Wiley & Sons, 2012. DRAFT 30 [41] Y. Zhang and Q. Ji, “Efficient sensor selection for active information fusion,” IEEE Trans. Syst., Man, and Cybern., Part B: Cybern., vol. 40, no. 3, pp. 719–728, 2010. [42] Y. Bar-Shalom, P. K. Willett, and X. Tian, Tracking and Data Fusion: A Handbook of Algorithms. YBS Publishing, Storrs, CT, 2011. [43] R. T. Marler and J. S. Arora, “Survey of multi-objective optimization methods for engineering,” Struct Multidisc Optim, vol. 26, pp. 369–395, 2004. [44] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: Nsga-ii,” IEEE Trans. Evol. Comput., vol. 6, no. 2, pp. 182–197, Apr. 2002. [45] N. Issimakis and M. Adam, “A genetic algorithm for the multidimensional knapsack problem,” Journal of Heuristics, no. 4, pp. 63–86, 1998. [46] S. Boyd and L. Vandenberghe, Convex Optimization. October 8, 2015 Cambridge: Cambridge University Press, 2004. DRAFT
3cs.SY
A norm knockout method on indirect reciprocity to reveal indispensable norms∗ Hitoshi Yamamoto1,* , Isamu Okada2,+ , Satoshi Uchida3,+ , and Tatsuya Sasaki4,+ arXiv:1703.03943v1 [physics.soc-ph] 11 Mar 2017 1 Rissho University, Department of Business Administration, Tokyo, 141-8602, Japan University, Department of Business Administration, Tokyo, 192-8577, Japan 3 RINRI Institute, Research Center for Ethiculture Studies, Tokyo, 102-8561, Japan 4 University of Vienna, Faculty of Mathematics, Vienna, 1090, Austria * [email protected] + these authors contributed equally to this work 2 Soka ABSTRACT Although various norms for reciprocity-based cooperation have been suggested that are evolutionarily stable against invasion from free riders, the process of alternation of norms and the role of diversified norms remain unclear in the evolution of cooperation. We clarify the co-evolutionary dynamics of norms and cooperation in indirect reciprocity and also identify the indispensable norms for the evolution of cooperation. Inspired by the gene knockout method, a genetic engineering technique, we developed the norm knockout method and clarified the norms necessary for the establishment of cooperation. The results of numerical investigations revealed that the majority of norms gradually transitioned to tolerant norms after defectors are eliminated by strict norms. Furthermore, no cooperation emerges when specific norms that are intolerant to defectors are knocked out. Introduction Reciprocity is a fundamental mechanism that underlies all cooperative societies. Theoretically it is well known that direct reciprocity, typified by the “I’ll help you if you help me” attitude, promotes cooperative regimes1, 2 . However, in recent societies that have high relational mobility, indirect reciprocity such as “I’ll help you and somebody else will help me” plays a more important role in promoting cooperation. Indirect reciprocity has therefore been the focus of much research in the interdisciplinary fields in recent decades3–7 . Many theoretical studies on indirect reciprocity have explored norms that become evolutionarily stable against defection and the invasion of free riders, and several typical norms have been proposed8–11 . These approaches have clarified the robust norms that can maintain the cooperative regime. The norms in the studies on the indirect reciprocity are regarded as assessment rules that label the other’s action as either Good or Bad. They include tolerant norms that assess cooperative behaviors toward defectors as good4 and strict norms that assess such behaviors as bad12. Other theoretical studies analysing the global dynamics of norms assume that at most a few robust norms are shared in the population13–15 . Their approaches have clarified the robustness of the norms against invasion of other norms including free riders when the norms are acceptable in the population. However, little is known about a process by which gradual changes toward cooperation occur as new norms emerge and compete, which is to say, the co-evolutionary process of norm-diversity and cooperation. A study on the indirect reciprocity has dealt with co-existing different norms and has analysed their frequencies in the population as a consequence of a dynamical process16 . In the study, each individual keeps a private image of everyone else and errors of perception and implementation are included in a limited strategy space. Although they have considered some action rules and assessment rules, all possible norms in indirect reciprocity have not been studied all-together. How cooperation evolves cannot be fully understood unless the evolution of norms is also considered. It is thus a challenging task to theoretically understand how cooperation can be formed even under a collection of norms in a social system. How is the co-existence of cooperation and diversity possible at all? Are there any indispensable norms needed to facilitate the evolution of cooperation in the melting pot of norms, even though some norms never become dominant? Do norms that could be accepted as a result of the co-evolutionary process have common aspects? These questions can be addressed only if all possible norms are considered, and the combination of norms governing a group can evolve. Here we explore the dynamics of co-evolution of cooperation by using different social norms. The process of the evolution ∗ The final version was published in Scientific Rreports. How to cite this article: Yamamoto, H., Okada, I., Uchida, S., & Sasaki, T. A norm knockout method on indirect reciprocity to reveal indispensable norms. Sci. Rep. 7, 44146; doi: 10.1038/srep44146 (2017). of norms has a transition from stricter to tolerant norms. Additionally, we find a set of norms that seem not to have an impact on promoting cooperation, but are fundamental to allow a transition to a cooperative regime from a defective regime. Results Agent-based simulations17, 18 are an optimal tool to tackle the challenge outlined above. See Methods for the details of our agent-based model described by the ODD protocol19. Using an evolutionary game theoretical framework and constructing an interaction model based on players’ private rules and local information, we model a giving game to elucidate the dynamics of the evolution of cooperation amid the coexistence of diverse norms (Fig. 1). We conducted numerical simulations of all 16 possible norm combinations that could react to the four combinations of assessment criteria to clarify the dynamics of the evolution of cooperation from the melting pot of diverse norms. Figure 2a shows time-series graphs of each norm’s population and cooperation ratio. As shown, the majority undergo an alternation from strict to tolerant norms, mostly in the order of SH → SJ → ST. Figure 3a shows the transition in the norm with the greatest population ratio. In many cases, the majority transitioned from the state where strict SH11 was the majority to SJ5, 12 . Afterwards, the majority norm changed to tolerant ST4, 20, 21 and ALLG. In contrast, as shown in Figs. 2b and 3b, in an environment with errors, alternation from strict norms to tolerant norms was observed. However, the likelihood of going through SJ decreased. Alternation paths through IS22, 23 , which could not be seen in an environment without errors24, increased. It is important to note here that similar paths toward cooperation are observed when only ALLB-individuals are initially assumed. New norms are created during the evolutionary process at the same time cooperation evolves. This indicates that cooperation and diversity of norms jointly evolve in the model. Why does the alternation of norms emerge? For one thing, in states in which defection is dominant, ALLB (BBBB) and SH (GBBB) coexist and jointly form the majority. However, BGBB and IS (GGBB) continue to exist as the minority. The characteristic of these groups is having the evaluation rule of **BB. Evaluation rule **BB assesses donors that took D as B, regardless of the evaluation of the recipient. In states in which defection is dominant, those who adopt **BB strategies consider many partners as B. As a result, cooperation does not occur for the most part. The ALLB and SH norms thus survive because they do not lower their own cost. On the other hand, after cooperation is achieved, ALLG (GGGG), ST (GGBG), IS (GGBB), and GGGB coexist. The common characteristic of these norms is having the evaluation rule of GG**. Thus, reciprocally cooperating norms survive. Because SJ (GBBG), which becomes the majority temporarily when the cooperation ratio rises in an environment without errors, does not belong to either group, it cannot stably exist. Also, it is rare that SJ makes up the majority temporarily in an environment with errors. Meanwhile, because IS belongs to both norm groups with **BB and GG**, IS can constantly exist. We discover several norms that are indispensable to the evolution of cooperation. Reputation-based cooperation cannot emerge without indispensable norms. To elucidate indispensable norms for the evolution of cooperation, we propose a novel analysis using the norm knockout method. This method enables us to determine which norms are indispensable for the evolution of cooperation. The norm knockout method is inspired by the targeted gene knockout technique used in genetic engineering25. Gene knockout, a genetic technique in which one of an organism’s genes is made inoperative, is used to research genes whose sequences are known but whose functions are not well-understood. Researchers infer the gene’s function from differences between the knockout animal and a normal animal. For simulating evolution, we utilized a method that removed only one particular norm from the population to understand whether that norm is an indispensable one that plays a critical role in the evolution of cooperation. Figure 4 shows the cooperation ratio when a particular norm is knocked out. Regardless of whether there is an error, if SH or IS is knocked out, cooperat ion does not evolve at all. We define indispensable norms in the evolution of cooperation as the norms that, when knocked out, have an average cooperation ratio of less than 0.1 after 1,000 generations. In an environment with no errors, SH and IS are indispensable norms. In an environment with errors, SH, IS, and ST are indispensable norms. When an indispensable norm is knocked out, cooperation does not evolve. When cooperation evolves, alternation from strict norms to tolerant norms was observed, as shown in Figs. 2 and 3. To analyse whether alternation also occurs when a norm is knocked out, the population ratio of norms when typical norms are knocked out is displayed as time-series graphs (see Fig. 5). Figure 5 shows the results in the cases where SH or IS were knocked out. We discovered that the first condition for the necessary process when cooperation evolves is whether SH can antagonize ALLB. No norm that resists the invasion of ALLB appears in a society in which SH does not exist. Also, in a society in which IS does not exist, SH cannot antagonize ALLB. We found that IS is a norm indispensable for SH to resist ALLB. 2/15 Discussion Our model offered two major findings on the evolution of cooperation on indirect reciprocity. On the one hand, the most essential contribution is the discovery of indispensable norms by the norm knockout method. By using the norm knockout method, we were able to elucidate the existence of norms indispensable for the evolution of cooperation from a melting pot of norms. Regardless of the existence of errors, SH and IS were indispensable norms. In addition, in an environment with errors, ST is an indispensable norm. Interestingly, SH and IS are reconciled to the minorities after the cooperative regime emerges while they temporarily become major norms in the process of dynamics. We call such minority norms required for the evolution of cooperation “unsung hero norms”. The results clearly illustrate the two roles of norms: one to catalyse a cooperative regime and the other to maintain the regime. Norms having the GG** for the evaluation rule play the latter role. On the other hand, we discovered alternation of norms. Recent analysis of evolutionary stability against the invasion of free riders could identify neither superiority among norms nor the process on the path to cooperation. Among studies on indirect reciprocity, ours is the first exhaustive theoretical analysis on all possible norms, although several studies have addressed the comparison of two types of reciprocal norms14, 15, 26 . Others analyse the alternation of norms in direct reciprocity27–29 . We find the alternation of the norms and also discover the indispensable norms that are required to foster indirect reciprocity. An empirical study30 supports the co-existence of various norms in the cooperative regime and indicates that the ST norm plays a more important role in human cooperation than SJ, which is consistent with our simulation. This is because we show that the SJ norm cannot survive in the cooperative regime, while the ST one can. Our approach may provide deep insight on the evolution of cooperation because several norms absolutely play an essential role in order to evolve cooperation even though, on the surface, it seems as though they are not directly leading to the evolution of the cooperation. The present work considers a single action rule (cooperate with Good, defect with Bad) to stress the role of multiple assessment rules. However, the other papers stress the role of multiple co-existing action rules13, 31–33 . Integrating the multiple assessment and action rules may be a useful extension of this paper. We analyse what happens when one norm is absent from the population; however, we have not analysed all the indispensable combinations of norms yet. Extending the norm knockout method to combinations of norms may also be a useful extension of this paper. Methods In this section, we describe the details of our agent-based model that uses the norm knockout method. The following model description follows the ODD protocol19. Purpose The aim of the model is to understand the dynamics of norms during the evolution of cooperation, and to find indispensable norms without which cooperative societies could never emerge. In particular, we reveal the effect of these indispensable norms on indirect reciprocity using a new methodology we call the ”norm knockout method”. We utilize the giving game framework34 for simulation. Entities, state variables, and scales The entities in the model are agents who play as donor and recipient in the giving game with no spatial structures. The donor chooses cooperation or defection with a recipient using an image that the donor has to the recipient. An image is either Good or Bad. If a donor’s image to a recipient is Good, the donor cooperates with the recipient. If the image is Bad, the donor defects. The group size of the model is N. Each agent has it’s own norm and a list of images to other agents. The agent also has a probability of errors and a payoff of the game. The norm of an agent is denoted as one of four possible ”assessment combinations”, and there are two possible ”alleles (G/B)” at the ”locus” for each of the four assessment combinations. The first locus of the gene represents an assessment rule to an agent who cooperates with a Good recipient. The second locus represents an assessment rule to an agent who cooperates with a Bad recipient. The third locus represents an assessment rule to an agent who defects with a Good recipient. The fourth locus represents an assessment rule to an agent who defects with a Bad recipient. Incidentally, all agents evaluate themselves as Good. For instance, ALLG always assesses others as Good, and thus, its ”genotype” is GGGG using the above mentioned definition of the four loci. Similarly, ALLB is described as BBBB, IS as GGBB, ST as GGBG, and SJ as GBBG. Each agent has two different types of errors: one, the probability that the agent’s updating of its evaluation of others, Good/Bad, is inverted (errors in perception), described as p, and two, the probability to perform an action differently from the one prescribed by its action rule (errors in implementation), described as q. The evolution process of norms involves adopting a genetic algorithm35. State variables and initialization in the simulation are shown in Table 1. 3/15 Process overview and scheduling Our simulation runs throughout G generations. A generation consists of R rounds. The agents play the giving game R times as donor in each generation. At the end of a generation, they evolve their own norms using accumulated payoffs that are obtained in the generation. One round has two phases: (A) a phase to play giving games and (B) a phase to update images. After all agents play giving games in phase (A), all agents update their images in phase (B). In phase (A), each agent becomes a donor and each donor randomly chooses a recipient from N − 1 players excluding itself. The donor chooses whether to give benefits to the recipient or not. At that time, the action of the donor is inverted with the probability q. The donor who cooperates pays cost c and the recipient receives benefit b (b > c > 0). In phase (B), each agent (set to i) evaluates and updates an image to the other agent (set to j). The new image to j from i’s viewpoint depends on j’s action (C/D) as a donor in the last round and depends on the image to k from the viewpoint of i (G/B), where k was a recipient of j in the last round. At that time, the image to j is inverted with the probability p. In the first round in a generation, j’s action (C/D) is regarded as random. After R rounds of the giving game are played in every generation, agents evolve their norm. The evolution process of norms involves adopting the genetic algorithm35. Because each locus of norm has an independent meaning for assessment to others, the adaptive process should contain a combination of these elements rather than a string of norms. We have modeled a process of updating norms not as a string of norms but rather as four different assessment rules, which enables the norms to be interpreted as different situations depending on the norm genotype. The first, second, third, and fourth loci represent the assessment for pro-social behavior, tolerant behavior, anti-social behavior, and justified defection (punishment), respectively. Each agent randomly selects two agents from N agents (including itself) to become its parents. For choosing parents, we adopt a roulette selection method. This roulette selection sets a probability distribution of all agents as Πi = (Ui −Umin )2 / ∑ j (U j −Umin )2 , where Ui denotes the agent i’s accumulated payoff in a generation given by Ui = bW − cV , with W being the number of donations i received in the generation and V the number of donations i gave. Umin means a minimum value of the accumulated payoffs among all. Finally, each agent updates its norm using a uniform crossover technique. With mutation rate m, each locus is inverted for maintaining the diversity of the norm space. Design concepts Basic principles An agent-based simulation is utilized to study indirect reciprocity. We explore how different combinations of norms interact to produce an evolutionary progression towards cooperation. Emergence A cooperative regime in the situation of social dilemma emerges from interactions among agents who have various social norms. Adaptation The agents of the model play the giving game using their images to others. The agents update their images to others using their norms every round. They evolve their own norms using accumulated payoffs that are obtained in the generation. A norm that can obtain a higher payoff can increase the population through the generation. Objectives The objective of all agents is to maximize their own payoff. To maximize payoff, they change their own norm at the end of each generation. Learning The agents change their norms in each generation using a genetic algorithm. The fitness of each agent is calculated from the accumulated payoff in the generation. To select the parents of the agent, the model utilizes a roulette selection method. Interaction The interaction between the agents is one to one interaction. The giving game consists of the donor and the recipient. There are no spatial structures in the society. Stochasticity The interaction between agents is a stochastic process because interaction partners are chosen randomly from the society. At the start of the simulation, each agent is randomly assigned a norm of all 16 norms. Observation Three indexes are used for observation: average cooperation ratio in the society, the transition of norms with the greatest populations, and population ratio of each norm. Initialization At the start of simulation, the norm of each agent is chosen randomly from all 16 possible norm combinations. In the first round of each generation, the evaluation of all agents is initialized as Good11, 23, 36 and payoff of the agents is initialized as 0. Input data After initialization, the model does not include any external inputs, i.e., the number of agents (N), error ratio (p, q), benefit (b), and cost (c) are constant. 4/15 Submodels The norm knockout method The norm knockout method is implemented as follows. When we knock out a particular norm, that norm is removed in the first round of each generation. Concretely, if the norm of an agent evolves into a norm that is knocked out as a result of the adopting process, the norm of the agent is changed to one of the other 15 norms randomly. In other words, the norm that is knocked out will never exist at all in the society. References 1. Trivers, R. L. The evolution of reciprocal altruism. Q. Rev. Biol. 46, 35–57 (1971). 2. Axelrod, R. & Hamilton, W. D. The evolution of cooperation. Science 211, 1390–1396 (1981). 3. Alexander, R. The Biology of Moral Systems (Aldine de Gruyter, New York, 1987). 4. Sugden, R. The Economics of Rights, Cooperation and Welfare (Basil Blackwell, Oxford, 1986). 5. Kandori, M. Social norms and community enforcement. Rev. Econ. Stud. 59, 63–80 (1992). 6. Wedekind, C. & Milinski, M. Cooperation through image scoring in humans. Science 288, 850–852 (2000). 7. Panchanathan, K. & Boyd, R. Indirect reciprocity can stabilize cooperation without the secondorder free rider problem. Nature 432, 499–502 (2004). 8. Ohtsuki, H. & Iwasa, Y. How should we define goodness? -reputation dynamics in indirect reciprocity. J. Theor. Biol. 231, 107–120 (2004). 9. Nowak, M. A. & Sigmund, K. Evolution of indirect reciprocity. Nature 437, 1291–1298 (2005). 10. Ohtsuki, H. & Iwasa, Y. The leading eight: social norms that can maintain cooperation by indirect reciprocity. J. Theor. Biol. 239, 435–44 (2006). 11. Takahashi, N. & Mashima, R. The importance of subjectivity in perceptual errors on the emergence of indirect reciprocity. J. Theor. Biol. 243, 418–36 (2006). 12. Pacheco, J. M., Santos, F. C. & Chalub, F. A. C. Stern-judging: A simple, successful norm which promotes cooperation under indirect reciprocity. PLoS Comput. Biol. 2, e178 (2006). 13. Ohtsuki, H. & Iwasa, Y. Global analyses of evolutionary dynamics and exhaustive search for social norms that maintain cooperation by reputation. J. Theor. Biol. 244, 518 – 531 (2007). 14. Uchida, S. & Sigmund, K. The competition of assessment rules for indirect reciprocity. J. Theor. Biol. 263, 13–19 (2010). 15. Uchida, S. Effect of private information on indirect reciprocity. Phys. Rev. E 82, 036111 (2010). 16. Brandt, H. & Sigmund, K. The logic of reprobation: Assessment and action rules for indirect reciprocation. J. Theor. Biol. 231, 475–486 (2004). 17. Gilvert, N. & Troitzsch, K. Simulation for the Social Scientist (Open University Press, 1999). 18. Roberts, G. Evolution of direct and indirect reciprocity. Proc. R. Soc. Lond. B 275, 173–179 (2008). 19. Grimm, V. et al. The odd protocol: A review and first update. Ecol. Modell. 221, 2760–2768 (2010). 20. Leimar, O. & Hammerstein, P. Evolution of cooperation through indirect reciprocity. Proc. R. Soc. Lond. B 268, 745–753 (2001). 21. Panchanathan, K. A tale of two defectors: the importance of standing for evolution of indirect reciprocity. J. Theor. Biol. 224, 115–126 (2003). 22. Nowak, M. A. & Sigmund, K. Evolution of indirect reciprocity by image scoring. Nature 393, 573–577 (1998). 23. Nowak, M. A. & Sigmund, K. The dynamics of indirect reciprocity. J. Theor. Biol. 194, 561–574 (1998). 24. Lotem, A., Fishman, M. & Stone, L. Evolution of cooperation between individuals. Nature 400, 226–227 (1999). 25. Strepp, R., Scholz, S., Kruse, S., Speth, V. & Reski, R. Plant nuclear gene knockout reveals a role in plastid division for the homolog of the bacterial cell division protein ftsz, an ancestral tubulin. Proc. Natl. Acad. Sci. USA 95, 4368–4373 (1998). 26. Matsuo, T., Jusup, M. & Iwasa, Y. The conflict of social norms may cause the collapse of cooperation: indirect reciprocity with opposing attitudes towards in-group favoritism. J. Theor. Biol. 346, 34–46 (2014). 5/15 27. Lindgren, K. Evolutionary phenomena in simple dynamics. In Langton, C. G., Taylor, C., Farmer, J. D. & Rasmussen, S. (eds.) Artificial Life II, 295–312 (Addison-Wesley, Redwood City, CA, 1992). 28. Zagorsky, B. M., Reiter, J. G., Chatterjee, K. & Nowak, M. A. Forgiver triumphs in alternating Prisoner’s Dilemma. PLoS ONE 8, e80814 (2013). 29. Berg, P. V. D. & Weissing, F. J. The importance of mechanisms for the evolution of cooperation. Proc. R. Soc. Lond. B 282, 20151382 (2015). 30. Swakman, V., Molleman, L., Ule, A. & Egas, M. Reputation-based cooperation: Empirical evidence for behavioral strategies. Evol. Hum. Behav. 37, 230–235 (2016). 31. Brandt, H. & Sigmund, K. Indirect reciprocity, image scoring, and moral hazard. Proc. Natl. Acad. Sci. USA 102, 2666–2670 (2005). 32. Santos, F. P., Santos, F. C. & Pacheco, J. M. Social norms of cooperation in small-scale societies. PLoS Comput. Biol. 12, e1004709 (2016). 33. Sasaki, T., Okada, I. & Nakai, Y. The evolution of conditional moral assessment in indirect reciprocity. Sci. Rep. 7, 41870 (2017). 34. Sigmund, K. The calculus of selfishness (Princeton University Press, 2010). 35. Holland, J. Adaptation in Natural and Artificial Systems (University of Michigan Press, 1975). 36. Ohtsuki, H., Iwasa, Y. & Nowak, M. A. Reputation effects in public and private interactions. PLoS Comput. Biol. 11, e1004527 (2015). Acknowledgements HY acknowledges Grant-in-Aid for Scientific Research (C) 15KT0133 and 26330387. HY also acknowledges Prof. Kurihara (UEC, Japan) for providing the computational resources. IO acknowledges Grant-in-Aid for Scientific Research (B) 16H03120. TS acknowledges the Austrian Science Fund (FWF): P27018-G11. Author contributions statement HY initiated and performed the project. HY, IO, SU and TS designed the project, wrote the paper, and approved the submission. All authors reviewed the manuscript. Additional information The authors declare no competing financial interests. 6/15 Tables Table 1. State variables and initialization in the simulation Variable Agent Norm Image Payoff p q Environment N G R b c m Description Type of variable Norm of agent Images to other agents Accumulated payoff of the giving game Errors in perception Errors in implementation 16 types Binary (G/B) Real Number Constant Constant Number of agents Generations of simulation Times of playing giving game per generation The benefit of giving game The cost of giving game The mutation ratio Constant Constant Constant Constant Constant Constant Initial value chosen randomly G 0 {0, 0.001} {0, 0.001} 500 1000 500 [3.0, 6.0] 1 0.01 7/15 Figures A Giving game B The norms of the giving game (1) Playing giving game phase Donor Recipient C for good recipient or D for bad recipient (2) Updating image phase Recipient Donor Observer Observer updates donor’s image Donor G/B C D D Bad Good Bad Updated donor’s score G/B G/B G/B G/B C C D D Good Bad Good Bad B G G G G G B B B G G G B B B B B G B B G B G G C Typical norms C/D G/B Donor’s action C Recipient’s image from observers in Good last interaction Donor’s action Recipient’s image from observers in last interaction All Bad [ALLB] Shunning [SH] Stern Judging [SJ] Image Scoring [IS] Simple Standing [ST] All Good [ALLG] C/D Recipient Figure 1. The norms of cooperation and simulation framework. a, (1) If the donor’s image of a recipient is Good, the donor gives the recipient something with personal cost c and the recipient receives benefit b. Nothing happens otherwise. (2) In the Updating image phase, the observer updates the evaluation to the donor on the basis of the donor’s action (Cooperation [C] / Defection [D]) and the observer’s evaluation (Good [G] / Bad [B]) of the recipient. b, Each agent adopts an evaluation rule of the donor that depends on the donor’s action and the recipient’s image. This combination of Good/Bad is the norm held by the agent. There are a total of 24 = 16 possible norms. In this phase, each agent evaluates and updates its image to all donors. c, Typical norms can be expressed in the manner shown in this table. Typical norms include Shunning [SH] = GBBB, Stern Judging [SJ] = GBBG, Image Scoring [IS] = GGBB, and Simple Standing [ST] = GGBG. SH is a strict norm where any action for a Bad recipient is assessed as Bad. ST is a tolerant norm where any action for a Bad recipient is assessed as Good. SJ is an intermediately strict norm where cooperation for a Bad recipient is assessed as Bad while defection is Good. In contrast, IS does not use an image to recipient but uses only donor’s action. If the donor’s previous action is C, then IS evaluates the donor as Good, otherwise IS evaluates the donor as Bad. 8/15 A With no error Defective regime Cooperative regime B With errors Defective regime Cooperative regime Figure 2. Time series of typical simulation runs with all norms. With no error (left panel) and with errors (right panel). a, The average frequencies of 16 norms and the cooperation of the overall society. The black dotted line is the cooperation ratio. Parameters: b = 5, c = 1, N = 500, R = 500, G = 1000, p = 0, q = 0. When SH and ALLB coexist, cooperation does not emerge. When ALLB is completely driven out by SH, SJ invades and the cooperation ratio abruptly rises. At the same time, SH is driven out by SJ. After cooperation is completely achieved, SJ permits the invasion of ST, and also coexists with other tolerant norms (IS, ST, GGGB, and ALLG). Finally, strategies whose norm is expressed as GG** (in other words, norms that constantly cooperate if cooperation has been selected in the past by the recipient) coexist. In b, both errors in perception and implementation were introduced, and simulation similar to a was run (b = 5, c = 1, N = 500, R = 500, G = 1000, p = 0.001, q = 0.001). As in a, when SH and ALLB coexist, cooperation does not emerge. However, cooperation is achieved without going through SJ. A With no error B With errors Figure 3. The alternation patterns of the majority of norms with 50 replications. With no error (left panel) and with errors (right panel). a, The panel shows the transition of norms with the greatest populations in a round of 20 generations, before the cooperation ratio exceeds 0.8, and 100 generations, after the cooperation ratio exceeds 0.8 (for a total of 120 generations). For the sake of visibility, in a replication, we stop calculation when ALLG becomes the majority norm. This is because in a state in which tolerant norms coexist, the norms with the greatest population frequently change place. The thickness of the arrows corresponds to the number of times alternation of norms occurred. (See the Supplementary Information for details.) The alternation of norms SH → SJ → ST → ALLG was observed to be stable. In b , both errors in perception and implementation were introduced, and simulations similar to a were run (b = 5, c = 1, N = 500, R = 500, G = 1000, p = 0.001, q = 0.001). As shown in b, the transition of majority norms is not distinct compared to the times when there were no errors. 9/15 A With no error B With errors Figure 4. The cooperation ratio in the norm knockout method. Each graph shows the average cooperation ratio of 50 replications when a typical norm is knocked out. The basic parameter set is c = 1, N = 500, R = 500, G = 1000. To confirm the effects of errors in perception and errors in implementation, two simulations with and without error were executed. See the Supplementary Information for knockout analysis of all norms. a, The case when errors in perception (p) and errors in implementation (q) are 0. When SH or IS is knocked out, cooperation does not evolve at all. Also, when SJ, which becomes the majority for only a brief round during the process of alternation, is knocked out, cooperation evolves to the extent of only 30 percent, even when b is large. Furthermore, when ST is knocked out, the range in which cooperation is achieved becomes narrow. Only when b is sufficiently large can cooperation evolve. b, The case where p = q = 0.001. The indispensable norm is ST in addition to SH and IS. Conversely, when SJ is knocked out, cooperation evolves when b is sufficiently large in the same manner as ST in a. A GBBB [SH] is knocked out B GGBB [IS] is knocked out Figure 5. Time series of typical simulation runs in norm knockout method. The parameters are b = 5, c = 1, N = 500, R = 500, p = q = 0. a, When SH is knocked out, the strategy to eliminate ALLB does not exist. b, When IS is knocked out, SH exists only in a small population and cannot gain superiority over ALLB. 10/15 Supplementary Information This section includes: • Supplementary Text S1 • Supplementary Tables S1 – S6 • Supplementary Figure S1 Text S1 The details of alternation of norms We present the details of alternating the majority of norms, as shown in Fig. 3 (in the Main Text). Table S1 shows the alternation with no error and Table S2 shows with errors. The population of each norm We show the average population ratio at the 1,000th generation (50 replications). As shown in Table S3, persistent norms are able to be described as GG**. The details of results of norm knockout method We comprehensively explore the indispensable norms by knocking out each of the 16 norms. Table S4 shows the cooperation ratio in which each norm is knocked out. Without errors, SH and IS are the indispensable norms. If SJ or ST is knocked out, their standard deviations (S.D.) are larger than other cases. The reason for this is that to knock out SJ or ST produces two contrasting results: cooperation dominant or defection dominant. When indispensable norms are knocked out, no cooperative regime appears at all, and the standard deviation has a very small value. The analysis of the alternation of norms after cooperative regime achieved In this section, we have analysed the transition of norms with the greatest populations after a cooperation ratio exceeds 0.9 until the end of generations. For the sake of understanding the mechanism of co-evolution of norms and cooperation, we have focused on the duration of regime changes from defection to cooperation in the main text. Therefore, we stopped the calculation of the transition of the majority norm when ALLG becomes the majority norm in Fig. 3. Intuitively, it seems impossible to transit from a majority of ALLG to a majority of any other norm; however, it is well-known that a state where everyone cooperates indiscriminately is easily replaced by a state where everyone refuses to cooperate. To clarify whether ALLG is a stable state and what would happen if more generations were considered, we show the transition of norms with the greatest population after a cooperative regime is achieved. The results (Tables S5 and S6, Fig. S1) show that the cooperation regime is maintained robustly and tolerant norms such as ALLG, GGGB, and ST coexist. Although ALLG forms the majority of the population, the other norms including GGGB, ST (GGBG), and IS (GGBB) protect against invasion from defective norms. 11/15 Tables Table S1. The alternation patterns of dominant norms with no error correspond to the left panel of Fig. 3 (in the Main Text). Each row shows the transition of norms with the greatest populations in a period of 20 generations, before the cooperation ratio exceed s 0.8, and 100 generations, after the cooperation ratio exceeds 0.8 (for a total of 120 generations). For the sake of visibility, we stop calculation when ALLG becomes the majority norm. Fifty replications are conducted. During this time, alternation in majority norms for a total of 156 times could be observed. A cooperative regime with a cooperation ratio exceeding 0.8 was achieved in 46 replications. For example, over 50 replications, the number of times the transition of greatest population followed (SH → SJ → ST → ALLG) was 31. Moreover, four (indicated by the dash) never had a cooperation ratio exceeding 0.8. Transition pattern of dominant strategies SH → SJ → ST → ALLC SH → SJ → ST → SJ → ST → ALLC − SH → GBGB → GGGB → ALLC SH → GBGB → SH → SJ → ST → ALLC SH → IS → GGGB → ALLC SH → IS → GGGB → SH → ALLD → SH → ALLD → SH → ALLD SH → GGGB → ALLC SH → GBGB → ST → ALLC No. 31 5 4 3 2 2 1 1 1 Table S2. The alternation patterns of dominant norms with errors correspond to the right panel of Fig. 3 (in the Main Text). The setting of the table is the same as Table S1. Transition pattern of dominant strategies SH → IS → GGGB → ALLC SH → GBGB → GGGB → ALLC SH → SJ → ST → ALLC SH → GGGB → ALLC SH → IS → ST → ALLC SH → ST → ALLC SH → GBGB → GGGB → SH → GBGB → GGGB → SH → IS → GGGB → ALLC SH → IS → ST → IS → GGGB → ALLC SH → GBGB → SH → IS → GGGB → ALLC SH → IS → GGGB SH → GBGB → IS → GGGB → GBGB → GGGB → ALLC SH → SJ → IS → ST → ALLC SH → GBGB → IS → GGGB → ALLC SH → GBGB → SH → IS → ST → ALLC SH → GBGB → GGGB → IS → GGGB → ALLC No. 13 8 7 6 5 2 1 1 1 1 1 1 1 1 1 12/15 Table S3. The average population ratio at the 1,000th generation (b = 5). Each column shows without/with errors. All cells are obtained by averaging the results of 50 replications. These results show the population of each norm in which all norms exist (i.e., the norm knockout method is not used). The second row shows the average cooperation ratio (Cratio ) and standard deviation at the 1,000th generation. Below the fourth row is shown the population of each norm and its standard deviation. The norms described as GG** can coexist stably while any norm that is not GG** can barely exist. SH, which is an indispensable norm, also cannot survive. IS, which is included in four persistent norms GG**, is the most in minority of the four. cratio (S.D.) Norms BBBB [ALLB] BBBG BBGB BBGG BGBB BGBG BGGB BGGG GBBB [SH] GBBG [SJ] GBGB GBGG GGBB [IS] GGBG [ST] GGGB GGGG [ALLG] p=q=0 0.939 (0.187) population (S.D) 0.015 (0.085) 0.001 (0.002) 0.001 (0.003) 0.000 (0.001) 0.003 (0.007) 0.003 (0.003) 0.004 (0.004) 0.005 (0.004) 0.026 (0.109) 0.009 (0.006) 0.020 (0.013) 0.024 (0.012) 0.132 (0.043) 0.165 (0.073) 0.271 (0.093) 0.322 (0.090) p = q = 0.001 0.980 (0.006) population (S.D) 0.000 (0.001) 0.000 (0.000) 0.000 (0.001) 0.000 (0.001) 0.002 (0.002) 0.002 (0.002) 0.004 (0.003) 0.005 (0.003) 0.002 (0.003) 0.005 (0.004) 0.007 (0.005) 0.012 (0.006) 0.148 (0.040) 0.201 (0.071) 0.271 (0.079) 0.341 (0.064) Table S4. Analysis of norm knockout method for each of the 16 norms. The table shows the cooperation ratio at the 1,000th generation in which each of the 16 norms is knocked out (b = 5). Each value shows the average cooperation ratio from 50 replications and standard deviation. The cells in which the average cooperation ratio is less than 0.1 are shown in red. In this paper, we call these norms “indispensable norms”. With no error, SH and IS are indispensable norms. With errors, these two plus ST are indispensable norms. Knockouted norm BBBB [ALLB] BBBG BBGB BBGG BGBB BGBG BGGB BGGG GBBB [SH] GBBG [SJ] GBGB GBGG GGBB [IS] GGBG [ST] GGGB GGGG [ALLG] Without Knockout p=q=0 Mean (S.D.) 0.816 (0.354) 0.980 (0.008) 0.978 (0.012) 0.923 (0.226) 0.920 (0.225) 0.982 (0.008) 0.959 (0.134) 0.979 (0.011) 0.025 (0.004) 0.120 (0.287) 0.982 (0.007) 0.941 (0.188) 0.023 (0.006) 0.412 (0.432) 0.915 (0.225) 0.897 (0.179) 0.939 (0.187) p = q = 0.001 Mean (S.D.) 0.745 (0.399) 0.979 (0.007) 0.979 (0.007) 0.961 (0.134) 0.922 (0.225) 0.977 (0.006) 0.978 (0.007) 0.959 (0.134) 0.026 (0.005) 0.616 (0.457) 0.977 (0.006) 0.978 (0.006) 0.022 (0.004) 0.055 (0.060) 0.961 (0.010) 0.371 (0.431) 0.980 (0.006) 13/15 Table S5. The number of transitions of norms with the greatest populations with no error after a cooperation ratio exceeds 0.9 until the end of generations. The simulation runs 50 replications. The transition is counted when the most majority norm is superseded by other norms. Parameters: b = 5, c = 1, N = 500, R = 500, G = 1000, p = 0, q = 0. For example, the transition from ALLG to GGGB occurs 929 times. During this time, alternation of norms with the greatest populations for a total of 2,324 times could be observed. From ALLG GGGB ST ALLG SJ ST IS SH ALLB ALLG IS ST GGGB GGGB SH GGGB ST IS To GGGB ALLG ALLG ST ST SJ GGGB ALLB SH IS ST IS ST SH SJ IS GGGB ALLG No. 929 920 225 185 35 6 3 3 3 3 3 2 2 1 1 1 1 1 Table S6. The number of transitions of norms with the greatest populations with errors after cooperation ratio exceeds 0.9 until the end of generations. The setting of the table is the same as Table S5. Parameters: b = 5, c = 1, N = 500, R = 500, G = 1000, p = 0.001, q = 0.001. From GGGB ALLG ST ALLG GGGB IS ST GGGB IS ALLG ST IS To ALLG GGGB ALLG ST IS GGGB GGGB ST ST IS IS ALLG No. 968 950 434 426 41 40 15 14 12 10 9 8 14/15 Figure Figure S1. The transition diagram of norms with the greatest populations with no error (A) and with errors (B) after cooperation ratio exceeds 0.9 until the end of generations. Panel A is drawn using the data of Table S5 and panel B is drawn using the data of Table S6. Both panels show that the tolerant norms (such as ALLG, GGGB, and ST) coexist as the majority. 15/15
9cs.NE
ON FEEBLY COMPACT SHIFT-CONTINUOUS TOPOLOGIES ON THE SEMILATTICE expn λ arXiv:1702.06105v2 [math.GN] 5 May 2017 OLEG GUTIK AND OLEKSANDRA SOBOL Abstract. We study feebly compact topologies τ on the semilattice (expn λ, ∩) such that (expn λ, τ ) is a semitopological semilattice and prove that for any shift-continuous T1 -topology τ on expn λ the following conditions are equivalent: (i) τ is countably pracompact; (ii) τ is feebly compact; (iii) τ is d-feebly compact; (iv) (expn λ, τ ) is an H-closed space. Dedicated to the memory of Professor Vitaly Sushchanskyy We shall follow the terminology of [6, 8, 9, 13]. If X is a topological space and A ⊆ X, then by clX (A) and intX (A) we denote the closure and the interior of A in X, respectively. By ω we denote the first infinite cardinal and by N the set of positive integers. A subset A of a topological space X is called regular open if intX (clX (A)) = A. We recall that a topological space X is said to be • quasiregular if for any non-empty open set U ⊂ X there exists a non-empty open set V ⊂ U such that clX (V ) ⊆ U; • semiregular if X has a base consisting of regular open subsets; • compact if each open cover of X has a finite subcover; • countably compact if each open countable cover of X has a finite subcover; • countably compact at a subset A ⊆ X if every infinite subset B ⊆ A has an accumulation point x in X; • countably pracompact if there exists a dense subset A in X such that X is countably compact at A; • feebly compact (or lightly compact) if each locally finite open cover of X is finite [3]; • d-feebly compact (or DFCC ) if every discrete family of open subsets in X is finite (see [12]); • pseudocompact if X is Tychonoff and each continuous real-valued function on X is bounded. According to Theorem 3.10.22 of [8], a Tychonoff topological space X is feebly compact if and only if X is pseudocompact. Also, a Hausdorff topological space X is feebly compact if and only if every locally finite family of non-empty open subsets of X is finite [3]. Every compact space and every sequentially compact space are countably compact, every countably compact space is countably pracompact, and every countably pracompact space is feebly compact (see [2]), and every H-closed space is feebly compact too (see [10]). Also, it is obvious that every feebly compact space is d-feebly compact. A semilattice is a commutative semigroup of idempotents. On a semilattice S there exists a natural partial order: e 6 f if and only if ef = f e = e. For any element e of a semilattice S we put ↑e = {f ∈ S : e 6 f } . A topological (semitopological) semilattice is a topological space together with a continuous (separately continuous) semilattice operation. If S is a semilattice and τ is a topology on S such that (S, τ ) is a topological semilattice, then we shall call τ a semilattice topology on S, and if τ is a topology on S such that (S, τ ) is a semitopological semilattice, then we shall call τ a shift-continuous topology on S. Date: February 26, 2018. 2010 Mathematics Subject Classification. Primary 22A26, 22A15, Secondary 54D10, 54D30, 54H12. Key words and phrases. Topological semilattice, semitopological semilattice, compact, countably compact, feebly compact, H-closed, semiregular space, regular space. 1 2 OLEG GUTIK AND OLEKSANDRA SOBOL For an arbitrary positive integer n and an arbitrary non-zero cardinal λ we put expn λ = {A ⊆ λ : |A| 6 n} . It is obvious that for any positive integer n and any non-zero cardinal λ the set expn λ with the binary operation ∩ is a semilattice. Later in this paper by expn λ we shall denote the semilattice (expn λ, ∩). This paper is a continuation of [11] where we study feebly compact topologies τ on the semilattice expn λ such that (expn λ, τ ) is a semitopological semilattice. Therein, all compact semilattice T1 -topologies on expn λ were described. In [11] it was proved that for an arbitrary positive integer n and an arbitrary infinite cardinal λ every T1 -semitopological countably compact semilattice (expn λ, τ ) is a compact topological semilattice. Also, there we construct a countably pracompact H-closed quasiregular non-semiregular topology τfc2 such that (exp2 λ, τfc2 ) is a semitopological semilattice with the discontinuous semilattice operation and show that for an arbitrary positive integer n and an arbitrary infinite cardinal λ a semiregular feebly compact semitopological semilattice expn λ is a compact topological semilattice. In this paper we show that for any shift-continuous T1 -topology τ on expn λ the following conditions are equivalent: (i) τ is countably pracompact; (ii) τ is feebly compact; (iii) τ is d-feebly compact; (iv) (expn λ, τ ) is an H-closed space. The proof of the following lemma is similar to Lemma 4.5 of [5] or Proposition 1 from [1]. Lemma 1. Every Hausdorff d-feebly compact topological space with a dense discrete subspace is countably pracompact. We observe that by Proposition 1 from [11] for an arbitrary positive integer n and an arbitrary infinite cardinal λ every shift-continuous T1 -topology τ on expn λ is functionally Hausdorff and quasiregular, and hence it is Hausdorff. Proposition 1. Let n be an arbitrary positive integer and λ be an arbitrary infinite cardinal. Then for every d-feebly compact shift-continuous T1 -topology τ on expn λ the subset expn λ \ expn−1 λ is dense in (expn λ, τ ). Proof. Suppose to the contrary that there exists a d-feebly compact shift-continuous T1 -topology τ on expn λ such that expn λ \ expn−1 λ is not dense in (expn λ, τ ). Then there exists a point x ∈ expn−1 λ of the space (expn λ, τ ) such that x ∈ / clexpn λ (expn λ \ expn−1 λ). This implies that there exists an open neighbourhood U(x) of x in (expn λ, τ ) such that U(x) ∩ expn λ \ expn−1 λ = ∅. The definition of the semilattice expn λ implies that every maximal chain in expn λ is finite and hence there exists a point y ∈ U(x) such that ↑y ∩ U(x) = {y}. By Proposition 1(iii) from [11], ↑y is an open-and-closed subset of (expn λ, τ ) and hence ↑y is a d-feebly compact subspace of (expn λ, τ ). It is obvious that the subsemilattice ↑y of expn λ is algebraically isomorphic to the semilattice expk λ for some positive integer k 6 n. This and above arguments imply that without loss of generality we may assume that y is the isolated zero of the d-feebly compact semitopological semilattice (expn λ, τ ). Hence we assume that τ is a d-feebly compact shift-continuous topology on expn λ such that the zero 0 of expn λ is an isolated point of (expn λ, τ ). Next we fix an arbitrary infinite sequence {xi }i∈N of distinct elements of cardinal λ. For every positive integer j we put  aj = xn(j−1)+1 , xn(j−1)+2 , . . . , xnj . Then aj ∈ expn λ and moreover aj is a greatest element of the semilattice expn λ for each positive integer j. Also, the definition of the semilattice expn λ implies that for every non-zero element a of expn λ there exists at most one element aj such that aj ∈ ↑a. Then for every positive integer j by Proposition 1(iii) of [11], aj is an isolated point of (expn λ, τ ), and hence the above arguments imply that {a1 , a2 , . . . , aj , . . .} is an infinite discrete family of open subset in the space (expn λ, τ ). This contradicts the d-feeble compactness of the semitopological semilattice (expn λ, τ ). The obtained contradiction implies the statement of our proposition.  ON FEEBLY COMPACT SHIFT-CONTINUOUS TOPOLOGIES ON THE SEMILATTICE expn λ 3 The following example show that the converse statement to Proposition 1 is not true in the case of topological semilattices. Example 1. Fix an arbitrary cardinal λ and an infinite subset A in λ such that |λ \ A| > ω. By π : λ → exp1 λ : a 7→ {a} we denote the natural embedding of λ into exp1 λ. On exp1 λ we define a topology τdm in the following way: (i) all non-zero elements of the semilattice exp1 λ are isolated points in (exp1 λ, τdm ); and (ii) the family Bdm = {UB = {0} ∪ π(B) : B ⊆ A and A \ B is finite} is the base of the topology τdm at zero 0 of exp1 λ. Simple verifications show that τdm is a Hausdorff locally compact semilattice topology on exp1 λ which is not compact and hence by Corollary 8 of [11] it is not feebly compact. Remark 1. We observe that in the case when λ = ω by Proposition 13 of [11] the topological space (exp1 λ, τdm ) is collectionwise normal and it has a countable base, and hence (exp1 λ, τdm ) is metrizable by the Urysohn Metrization Theorem [14]. Moreover, if |B| = ω then the space (exp1 λ, τdm ) is metrizable for any infinite cardinal λ, as a topological sum of the metrizable space (exp1 ω, τdm ) and the discrete space of cardinality λ. Remark 2. If n is an arbitrary positive integer > 3, λ is any infinite cardinal and τcn is the unique compact semilattice topology on the semilattice expn λ defined in Example 4 of [11], then we construct n on expn λ them τcn in the following way. Fix an arbitrary element x ∈ expn λ more stronger topology τdm such that |x| = n − 1. It is easy to see that the subsemilattice ↑x of expn λ is isomorphic to exp1 λ, and by h : exp1 λ → ↑x we denote this isomorphism. Fix an arbitrary subset A in λ such that |λ \ A| > ω. For every zero element y ∈ expn λ \ ↑x we n n assume that the base Bdm (y) of the topology τdm at the point y coincides with the base of the topology n τc at y, and assume that ↑x is an open-and-closed subset and the topology on ↑x is generated by the n map h : (exp2 λ, τfc2 ) → ↑x. We observe that (expn λ, τdm ) is a Hausdorff locally compact topological space, because it is the topological sum of a Hausdorff locally compact space ↑x (which is homeomorphic to the Hausdorff locally compact space (exp1 λ, τdm ) from Example 1) and an open-and-closed subspace n expn λ\↑x of (expn λ, τcn ). It is obvious that the set expn λ\expn−1 λ is dense in (expn λ, τdm ). Also, since n ↑x is an open-and-closed subsemilattice with zero x of (expn λ, τdm ), the continuity of the semilattice n n operations in (expn λ, τdm ) and (expn λ, τcn ) and the property that the topology τdm is more stronger n n n ) is not them τc , imply that (expn λ, τdm ) is a topological semilattice. Moreover, the space (expn λ, τdm d-feebly compact, because it contains an open-and-closed non-d-feebly compact subspace ↑x. Arguments presented in the proof of Proposition 1 and Proposition 1(iii) of [11] imply the following corollary. Corollary 1. Let n be an arbitrary positive integer and λ be an arbitrary infinite cardinal. Then for every d-feebly compact shift-continuous T1 -topology τ on expn λ a point x is isolated in (expn λ, τ ) if and only if x ∈ expn λ \ expn−1 λ. Remark 3. We observe that the example presented in Remark 2 implies there exists a locally compact n non-d-feebly compact semitopological semilattice (expn λ, τdm ) with the following property: a point x n is isolated in (expn λ, τdm ) if and only if x ∈ expn λ \ expn−1 λ. The following proposition gives an amazing property of the system of neighbourhoodd of zero in a T1 -feebly compact semitopological semilattice expn λ. Proposition 2. Let n be an arbitrary positive integer, λ be an arbitrary infinite cardinal and τ be a shift-continuous feebly compact T1 -topology on the semilattice expn λ. Then for every open neighbourhood U(0) of zero 0 in (expn λ, τ ) there exist finitely many x1 , . . . , xm ∈ λ such that expn λ \ clexpn λ (U(0)) ⊆ ↑x1 ∪ · · · ∪ ↑xm . 4 OLEG GUTIK AND OLEKSANDRA SOBOL Proof. Suppose to the contrary that there exists an open neighbourhood U(0) of zero in a Hausdorff feebly compact semitopological semilattice (expn λ, τ ) such that expn λ \ clexpn λ (U(0)) 6⊆ ↑x1 ∪ · · · ∪ ↑xm for any finitely many x1 , . . . , xm ∈ λ.  We fix an arbitrary y1 ∈ λ such that expn λ \ clexpn λ (U(0)) ∩↑y1 6= ∅. By Proposition 1(iii) of [11] the set ↑y1 is open in (expn λ, τ ) and hence the set expn λ \ clexpn λ (U(0)) ∩ ↑y1 is open in (expn λ, τ ) too. Then by Proposition 1 there exists an isolated point m1 ∈ expn λ \ expn−1 λ in (expn λ, τ ) such that m1 ∈ expn λ \ clexpn λ (U(0)) ∩ ↑y1 . Now, by the assumption there exists y2 ∈ λ such that  expn λ \ clexpn λ (U(0)) ∩ (↑y2 \ ↑y1 ) 6= ∅. Again, since by Proposition 1(iii) of [11] both sets ↑y1 and ↑y2 are open-and-closed in (expn λ, τ ), Proposition 1 implies that there exists an isolated point m2 ∈ expn λ \ expn−1 λ in (expn λ, τ ) such that  m2 ∈ expn λ \ clexpn λ (U(0)) ∩ (↑y2 \ ↑y1 ) . Hence by induction we can construct a sequence {yi : i = 1, 2, 3, . . .} of distinct points of λ and a sequence of isolated points {mi : i = 1, 2, 3, . . .} ⊂ expn λ \ expn−1 λ in (expn λ, τ ) such that for any positive integer k the following conditions hold:  (i) expn λ \ clexpn λ (U(0)) ∩ (↑yk \ (↑y1 ∪ · · · ∪ ↑yk−1 )) 6= ∅; and (ii) mk ∈ expn λ \ clexpn λ (U(0)) ∩ (↑yk \ (↑y1 ∪ · · · ∪ ↑yk−1 )). Then similar arguments as in the proof of Proposition 1 imply that the following family {{mi } : i = 1, 2, 3, . . .} is infinite and locally finite, which contradicts the feeble compactness of (expn λ, τ ). The obtained contradiction implies the statement of the proposition.  Proposition 1(iii) of [11] implies that for any element x ∈ expn λ the set ↑x is open-and-closed in a T1 -semitopological semilattice (expn λ, τ ) and hence by Theorem 14 from [3] we have that for any x ∈ expn λ the space ↑x is feebly compact in a feebly compact T1 -semitopological semilattice (expn λ, τ ). Hence Proposition 2 implies the following proposition. Proposition 3. Let n be an arbitrary positive integer, λ be an arbitrary infinite cardinal and τ be a shift-continuous feebly compact T1 -topology on the semilattice expn λ. Then for any point x ∈ expn λ and any open neighbourhood U(x) of x in (expn λ, τ ) there exist finitely many x1 , . . . , xm ∈ ↑x \ {x} such that ↑x \ clexpn λ (U(x)) ⊆ ↑x1 ∪ · · · ∪ ↑xm . The main results of this paper is the following theorem. Theorem 1. Let n be an arbitrary positive integer and λ be an arbitrary infinite cardinal. Then for any shift-continuous T1 -topology τ on expn λ the following conditions are equivalent: (i) τ is countably pracompact; (ii) τ is feebly compact; (iii) τ is d-feebly compact; (iv) the space (expn λ, τ ) is H-closed. Proof. Implications (i) ⇒ (ii) and (ii) ⇒ (iii) are trivial and implication (iii) ⇒ (i) follows from Proposition 1 of [11], Lemma 1 and Proposition 1. Implication (iv) ⇒ (ii) follows from Proposition 4 of [10]. (ii) ⇒ (iv) We shall prove this implication by induction. By Corollary 2 from [11] every feebly compact T1 -topology τ on the semilattice exp1 λ such that (exp1 λ, τ ) is a semitopological semilattice, is compact, and hence (exp1 λ, τ ) is an H-closed topological space. ON FEEBLY COMPACT SHIFT-CONTINUOUS TOPOLOGIES ON THE SEMILATTICE expn λ 5 Next we shall show that if our statements holds for all positive integers j < k 6 n then it holds for j = k. Suppose that a feebly compact T1 -semitopological semilattice (expk λ, τ ) is a subspace of Hausdorff topological space X. Fix an arbitrary point x ∈ X and an arbitrary open neighbourhood V (x) of x in X. Since X is Hausdorff, there exist disjoint open neighbourhoods U(x) ⊆ V (x) and U(0) of x and zero 0 of the semilattice expk λ in X, respectively. Then clX (U(0)) ∩ U(x) = ∅ and hence by Proposition 2 there exists finitely many x1 , . . . , xm ∈ λ such that expk λ ∩ U(x) ⊆ ↑x1 ∪ · · · ∪ ↑xm . But for any x ∈ λ the subsemilattice ↑x of expk λ is algebraically isomorphic to the semilattice expk−1 λ. Then by Proposition 1(iii) of [11] and Theorem 14 from [3], ↑x is a feebly compact T1 -semitopological semilattice, and the assumption of our induction implies that ↑x1 , · · · , ↑xm are closed subsets of X. This implies that W (x) = U(x) \ (↑x1 ∪ · · · ∪ ↑xm ) is an open neighbourhood of x in X such that W (x) ∩ expk λ = ∅. Thus, (expk λ, τ ) is an H-closed space. This completes the proof of the requested implication.  The following theorem gives a sufficient condition when a d-feebly compact space is feebly compact. Theorem 2. Every quasiregular d-feebly compact space is feebly compact. Proof. Suppose to the contrary that there exists a quasiregular d-feebly compact space X which is not feebly compact. Then there exists an infinite locally finite family U0 of non-empty open subsets of X. By induction we shall construct an infinite discrete family of non-empty open subsets of X. Fix an arbitrary U1 ∈ U0 and an arbitrary point x1 ∈ U1 . Since the family U0 is locally finite there exists an open neighbourhood U(x1 ) ⊆ U1 of the point x1 in X such that U(x1 ) intersects finitely many elements of U0 . Also, the quasiregularity of X implies that there exists a non-empty open subset V1 ⊆ U(x1 ) such that clX (V1 ) ⊆ U(x1 ). Put U1 = {U ∈ U0 : U(x1 ) ∩ U = ∅} . Since the family U0 is locally finite and infinite, so is U1 . Fix an arbitrary U2 ∈ U1 and an arbitrary point x2 ∈ U2 . Since the family U1 is locally finite, there exists an open neighbourhood U(x2 ) ⊆ U2 of the point x2 in X such that U(x2 ) intersects finitely many elements of U1 . Since X is quasiregular, there exists a non-empty open subset V2 ⊆ U(x2 ) such that clX (V2 ) ⊆ U(x2 ). Our construction implies that the closed sets clX (V1 ) and clX (V2 ) are disjoint and hence so are V1 and V2 . Next we put U2 = {U ∈ U1 : U(x2 ) ∩ U = ∅} . Also, we observe that it is obvious that U(x1 ) ∩ U = ∅ for each U ∈ U1 . Suppose for some positive integer k > 1 we construct: (a) a sequence of infinite locally finite subfamilies U1 , . . . , Uk−1 in U0 of non-empty open subsets in the space X; (b) a sequence of open subsets U1 , . . . , Uk in X; (c) a sequence of points x1 , . . . , xk in X and a sequence of their corresponding open neighbourhoods U(x1 ), . . . , U(xk ) in X; (d) a sequence of disjoint non-empty subsets V1 , . . . , Vk in X such that the following conditions hold: (i) Ui is a proper subfamily of Ui−1 ; (ii) Ui ∈ Ui−1 and Ui ∩ U = ∅ for each U ∈ Uj with i 6 j 6 k; (iii) xi ∈ Ui and U(xi ) ⊆ Ui ; (iv) Vi is an open subset of Ui with clX (Vi ) ⊆ U(xi ), for all i = 1, . . . , k, and (v) clX (V1 ), . . . , clX (Vk ) are disjoint. 6 OLEG GUTIK AND OLEKSANDRA SOBOL Next we put Uk = {U ∈ Uk−1 : U(x1 ) ∩ U = . . . = U(xk ) ∩ U = ∅} . Since the family Uk−1 is infinite and locally finite, there exists a subfamily Uk in Uk−1 which is infinite and locally finite. Fix an arbitrary Uk+1 ∈ Uk and an arbitrary point xk+1 ∈ Uk+1 . Since the family Uk is locally finite, there exists an open neighbourhood U(xk+1 ) ⊆ Uk+1 of the point xk+1 in X such that U(xk+1 ) intersects finitely many elements of Uk . Since the space X is quasiregular, there exists a non-empty open subset Vk+1 ⊆ U(xk+1 ) such that clX (Vk+1 ) ⊆ U(xk+1 ). Simple verifications show that the conditions (i) − (iv) hold in the case of the positive integer k + 1. Hence by induction we construct the following two infinite countable families of open non-empty subsets of X: U = {Ui : i = 1, 2, 3, . . .} and V = {Vi : i = 1, 2, 3, . . .} such that clX (Vi ) ⊆ Ui for each positive integer i. Since U is a subfamily of U0 and U0 is locally finite in X, U is locally finite in X as well. Also, above arguments imply that V and V = {clX (Vi ) : i = 1, 2, 3, . . .} are locally finite families in X too. Next we shall show that the family VSis discrete in X. Indeed, since the family V is locally finite S in X, by Theorem 1.1.11 of [8] the union V Sis a closed subset of X, and hence any point x ∈ X \ V has an open neighbourhood O(x) = X \ V which does not intersect the elements of the family V . If x ∈ clX (Vi ) for some positive integer i, then our construction implies that U(xi ) is an open neighbourhood of x which intersects only the set Vi ∈ V . Hence X has an infinite discrete family V of non-empty open subsets in X, which contradicts the assumption that the space X is d-feebly compact. The obtained contradiction implies the statement of the theorem.  We finish this note by some simple remarks about dense embedding of an infinite semigroup of matrix units and a polycyclic monoid into d-feebly compact topological semigroups which follow from the results of the paper [5]. Let λ be a non-zero cardinal. On the set Bλ = (λ × λ) ∪ {0}, where 0 ∈ / λ × λ, we define the semigroup operation “ · ” as follows  (a, d), if b = c; (a, b) · (c, d) = 0, if b 6= c, and (a, b) · 0 = 0 · (a, b) = 0 · 0 = 0 for a, b, c, d ∈ λ. The semigroup Bλ is called the semigroup of λ×λ-matrix units (see [7]). The bicyclic monoid C (p, q) is the semigroup with the identity 1 generated by two elements p and q subjected only to the condition pq = 1 [7]. For a non-zero cardinal λ, the polycyclic monoid Pλ on λ generators is the semigroup with zero given by the presentation: D E  −1 −1 Pλ = {pi }i∈λ , p−1 | p p = 1, p p = 0 for i = 6 j i i i i j i∈λ (see [5]). It is obvious that in the case when λ = 1 the semigroup P1 is isomorphic to the bicyclic semigroup with adjoined zero. By Theorem 4.4 from [5] for every infinite cardinal λ the semigroup of λ×λ-matrix units Bλ does not densely embed into a Hausdorff feebly compact topological semigroup, and by Theorem 4.5 from [5] for arbitrary cardinal λ > 2 there exists no Hausdorff feebly compact topological semigroup which contains the λ-polycyclic monoid Pλ as a dense subsemigroup. These theorems and Lemma 1 imply the following two corollaries. Corollary 2. For every infinite cardinal λ the semigroup of λ×λ-matrix units Bλ does not densely embed into a Hausdorff d-feebly compact topological semigroup. Corollary 3. For arbitrary cardinal λ > 2 there exists no Hausdorff d-feebly compact topological semigroup which contains the λ-polycyclic monoid Pλ as a dense subsemigroup. ON FEEBLY COMPACT SHIFT-CONTINUOUS TOPOLOGIES ON THE SEMILATTICE expn λ 7 The proof of the following corollary is similar to Theorem 5.1(5) from [4]. Corollary 4. There exists no Hausdorff topological semigroup with the d-feebly compact square which contains the bicyclic monoid C (p, q) as a dense subsemigroup. Acknowledgements We acknowledge Alex Ravsky and the referee for their comments and suggestions. References [1] A. V. Arhangel’skii, On spaces with point-countable base, Topological Spaces and Their Mappings, Riga, 1985, P. 3–7 (in Russian). [2] A. V. Arkhangel’skii, Topological Function Spaces, Kluwer Publ., Dordrecht, 1992. [3] R. W. Bagley, E. H. Connell, and J. D. McKnight, Jr., On properties characterizing pseudo-compact spaces, Proc. Amer. Math. Soc. 9:3 (1958), 500–506. [4] T. Banakh, S. Dimitrova, and O. Gutik, Embedding the bicyclic semigroup into countably compact topological semigroups, Topology Appl. 157:18 (2010), 2803–2814. [5] S. Bardyla and O. Gutik, On a semitopological polycyclic monoid, Algebra Discr. Math. 21:2 (2016), 163–183. [6] J. H. Carruth, J. A. Hildebrant and R. J. Koch, The Theory of Topological Semigroups, Vol. I, Marcel Dekker, Inc., New York and Basel, 1983; Vol. II, Marcel Dekker, Inc., New York and Basel, 1986. [7] A. H. Clifford and G. B. Preston, The Algebraic Theory of Semigroups, Vols. I and II, Amer. Math. Soc. Surveys 7, Providence, R.I., 1961 and 1967. [8] R. Engelking, General Topology, 2nd ed., Heldermann, Berlin, 1989. [9] G. Gierz, K. H. Hofmann, K. Keimel, J. D. Lawson, M. W. Mislove, and D. S. Scott, Continuous Lattices and Domains, Cambridge Univ. Press, Cambridge, 2003. [10] O. V. Gutik and O. V. Ravsky, Pseudocompactness, products and topological Brandt λ0 –extensions of semitopological monoids, Math. Methods and Phys.-Mech. Fields 58:2 (2015), 20–37; reprinted version: J. Math. Sci. 223:1 (2017), 18-38. [11] O. Gutik and O. Sobol, On feebly compact topologies on the semilattice expn λ, Mat. Stud. 46:1 (2016), 29–43. [12] M. Matveev, A survey of star covering properties, Topology Atlas preprint, April 15, 1998. [13] W. Ruppert, Compact Semitopological Semigroups: An Intrinsic Theory, Lect. Notes Math., 1079, Springer, Berlin, 1984. [14] P. Urysohn, Zum Metrisationsproblem, Math. Ann. 94 (1925), 309–315. Faculty of Mechanics and Mathematics, National University of Lviv, Universytetska 1, Lviv, 79000, Ukraine E-mail address: o [email protected], [email protected], [email protected]
4math.GR
Unit Interval Editing is Fixed-Parameter Tractable Yixin Cao∗ arXiv:1504.04470v2 [cs.DS] 31 Dec 2016 Abstract Given a graph G and integers k1 , k2 , and k3 , the unit interval editing problem asks whether G can be transformed into a unit interval graph by at most k1 vertex deletions, k2 edge deletions, and k3 edge additions. We give an algorithm solving this problem in time 2O(k log k) · (n + m), where k := k1 + k2 + k3 , and n, m denote respectively the numbers of vertices and edges of G. Therefore, it is fixed-parameter tractable parameterized by the total number of allowed operations. Our algorithm implies the fixed-parameter tractability of the unit interval edge deletion problem, for which we also present a more efficient algorithm running in time O(4k · (n + m)). Another result is an O(6k · (n + m))-time algorithm for the unit interval vertex deletion problem, significantly improving the algorithm of van ’t Hof and Villanger, which runs in time O(6k · n6 ). 1 Introduction A graph is a unit interval graph if its vertices can be assigned to unit-length intervals on the real line such that there is an edge between two vertices if and only if their corresponding intervals intersect. Most important applications of unit interval graphs were found in computational biology [5, 16, 18], where data are mainly obtained by unreliable experimental methods. Therefore, the graph representing the raw data is very unlikely to be a unit interval graph, and an important step before understanding the data is to find and fix the hidden errors. For this purpose various graph modification problems have been formulated: Given a graph G on n vertices and m edges, is there a set of at most k modifications that make G a unit interval graph. In particular, edge additions, also called completion, and edge deletions are used to fix false negatives and false positives respectively, while vertex deletions can be viewed as the elimination of outliers. We have thus three variants, which are all known to be NP-complete [21, 30, 16]. These modification problems to unit interval graphs have been well studied in the framework of parameterized computation, where the parameter is usually the number of modifications. Recall that a graph problem, with a nonnegative parameter k, is fixed-parameter tractable (FPT) if there is an algorithm solving it in time f(k) · (n + m)O(1) , where f is a computable function depending only on k [12]. The problems unit interval completion and unit interval vertex deletion have been shown to be FPT by Kaplan et al. [18] and van Bevern et al. [3] respectively. In contrast, however, the parameterized complexity of the edge deletion version remained open to date, which we settle here. Indeed, we devise single-exponential linear-time parameterized algorithms for both deletion versions. Theorem 1.1. The problems unit interval vertex deletion and unit interval edge deletion can be solved in time O(6k · (n + m)) and O(4k · (n + m)) respectively. Our algorithm for unit interval vertex deletion significantly improves the currently best parameterized algorithm for it, which takes O(6k · n6 ) time [17]. Another algorithmic result of van ’t Hof and Villanger [17] is an O(n7 )-time 6-approximation algorithm for the problem, which we improve to the following. Theorem 1.2. There is an O(nm + n2 )-time approximation algorithm of approximation ratio 6 for the minimization version of the unit interval vertex deletion problem. The structures and recognition of unit interval graphs have been well studied and well understood [11]. It is known that a graph is a unit interval graph if and only if it contains no claw, S3 , S3 , (as depicted in Fig. 1,) or any hole (i.e., an induced cycle on at least four vertices) [26, 29]. Unit interval graphs are thus a subclass of chordal graphs, which are those graphs containing no holes. Modification problems ∗ Department of Computing, Hong Kong Polytechnic University, Hong Kong, China. [email protected]. Supported in part by the Hong Kong Research Grants Council (RGC) under grant 252026/15E, the National Natural Science Foundation of China (NSFC) under grants 61572414 and 61420106009, the Hong Kong Polytechnic University (PolyU) under grant 4-ZZEZ, and the European Research Council (ERC) under grant 280152. 1 u3 v2 u1 (a) claw v3 u3 v1 v3 (b) S3 u2 v1 u1 u2 v2 (d) W5 (c) S3 (e) C∗5 = W5 (f) C6 Figure 1: Small forbidden induced graphs. to chordal graphs and unit interval graphs are among the earliest studied problems in parameterized computation, and their study had been closely related. For example, the algorithm of Kaplan et al. [18] for unit interval completion is a natural spin-off of their algorithm for chordal completion, or more specifically, the combinatorial result of all minimal ways to fill holes in. A better analysis was shortly done by Cai [7], who also made explicit the use of bounded-depth search in disposing of finite forbidden induced subgraphs. This observation and the parameterized algorithm of Marx [24] for the chordal vertex deletion problem immediately imply the fixed-parameter tractability of the unit interval vertex deletion problem: One may break first all induced claws, S3 ’s, and S3 ’s, and then call Marx’s algorithm. Here we are using the hereditary property of unit interval graphs,—recall that a graph class is hereditary if it is closed under taking induced subgraphs. However, neither approach can be adapted to the edge deletion version in a simple way. Compared to completion that needs to add Ω(`) edges to fill a C` (i.e., a hole of length `) in, an arbitrarily large hole can be fixed by a single edge deletion. On the other hand, the deletion of vertices leaves an induced subgraph, which allows us to focus on holes once all claws, S3 ’s, and S3 ’s have been eliminated; however, the deletion of edges to fix holes of a {claw, S3 , S3 }-free graph may introduce new claws, S3 ’s, and/or S3 ’s. Therefore, although a parameterized algorithm for the chordal edge deletion problem has also been presented by Marx [24], there is no obvious way to use it to solve the unit interval edge deletion problem. Direct algorithms for unit interval vertex deletion were later discovered by van Bevern et al. [3] and van ’t Hof and Villanger [17], both using a two-phase approach. The first phase of their algorithms breaks all forbidden induced subgraphs on at most six vertices. Note that this differentiates from the aforementioned simple approach in that it breaks not only claws, S3 ’s, and S3 ’s, but all C` ’s with ` 6 6. Although this phase is conceptually intuitive, it is rather nontrivial to efficiently carry it out, and the simple brute-force way introduces an n6 factor to the running time. Their approaches diverse completely in the second phase. Van Bevern et al. [3] used a complicated iterative compression procedure that has a very high time complexity, while van ’t Hof and Villanger [17] showed that after the first phase, the problem is linear-time solvable. The main observation of van ’t Hof and Villanger [17] is that a connected {claw, S3 , S3 , C4 , C5 , C6 }-free graph is a proper circular-arc graph, whose definition is postponed to Section 2. In the conference presentation where Villanger first announced the result, it was claimed that this settles the edge deletion version as well. However, the claimed result has not been materialized: It appears neither in the conference version [28] (which has a single author) nor in the significantly revised and extended journal version [17]. Unfortunately, this unsubstantiated claim did get circulated. Although the algorithm of van ’t Hof and Villanger [17] is nice and simple, its self-contained proof is excruciatingly complex. We revisit the relation between unit interval graphs and some subclasses of proper circular-arc graphs, and study it in a structured way. In particular, we observe that unit interval graphs are precisely those graphs that are both chordal graphs and proper Helly circular-arc graphs. As a matter of fact, unit interval graphs can also be viewed as “unit Helly interval graphs” or “proper Helly interval graphs,” thereby making a natural subclass of proper Helly circular-arc graphs. The full containment relations are summarized in Fig. 2; the reader unfamiliar with some graph classes in this figure may turn to the appendix for a brief overview. These observations inspire us to show that a connected {claw, S3 , S3 , C4 , C5 }-free graph is a proper Helly circular-arc graph. It is easy to adapt the linear-time certifying recognition algorithms for proper Helly circular-arc graphs [22, 9] to detect an induced claw, S3 , S3 , C4 , or C5 if one exists. Once all of them have been completely eliminated and the graph is a proper Helly circular-arc graph, it is easy to solve the unit interval vertex deletion problem in linear time. Likewise, using the structural properties of proper Helly circular-arc graphs, we can derive a linear-time algorithm for unit interval edge deletion on them. It is then straightforward to use simple branching to develop the parameterized algorithms stated in Theorem 1.1, though some nontrivial analysis is required to obtain the time bound for unit interval edge deletion. Van Bevern et al. [3] showed that the unit interval vertex deletion problem remains NP-hard on 2 Normal Helly Circular-arc Proper Helly Circular-arc Chordal Interval Unit Helly Circular-arc Unit interval = Proper interval Figure 2: Containment relation of related graph classes. Normal Helly circular-arc ∩ Chordal = Interval. Proper Helly circular-arc ∩ Chordal = Unit Helly circular-arc ∩ Chordal = Unit interval. {claw, S3 , S3 }-free graphs. After deriving a polynomial-time algorithm for the problem on {claw, S3 , S3 , C4 , C5 , C6 }-free graphs, van ’t Hof and Villanger [17] asked for its complexity on {claw, S3 , S3 , C4 }free graphs. (It is somewhat intriguing that they did not mention the {claw, S3 , S3 , C4 , C5 }-free graphs.) Note that a {claw, S3 , S3 , C4 }-free graph is not necessarily a proper (Helly) circular-arc graph, evidenced by the W5 (Fig. 1d). We answer this question by characterizing connected {claw, S3 , S3 , C4 }-free graphs that are not proper Helly circular-arc graphs. We show that such a graph must be like a W5 : If we keep only one vertex from each twin class (all vertices in a twin class have the same closed neighborhood) of the original graph, then we obtain a W5 . It is then routine to solve the problem in linear time. Theorem 1.3. The problems unit interval vertex deletion and unit interval edge deletion can be solved in O(n + m) time on {claw, S3 , S3 , C4 }-free graphs. We remark that the techniques we developed in previous work [8] can also be used to derive Theorems 1.1 and 1.2. Those techniques, designed for interval graphs, are nevertheless far more complicated than necessary when applied to unit interval graphs. The approach we used in the current work, i.e., based on structural properties of proper Helly circular-arc graphs, is tailored for unit interval graphs, hence simpler and more natural. Another benefit of this approach is that it enables us to devise a parameterized algorithm for the general modification problem to unit interval graphs, which allows all three types of operations. This formulation generalizes all the three single-type modifications, and is also natural from the viewpoint of the aforementioned applications for de-noising data, where different types of errors are commonly found coexisting. Indeed, the assumption that the input data contain only a single type of errors is somewhat counterintuitive. Formally, given a graph G, the unit interval editing problem asks whether there are a set V− of at most k1 vertices, a set E− of at most k2 edges, and a set E+ of at most k3 non-edges, such that the deletion of V− and E− and the addition of E+ make G a unit interval graph. We show that it is FPT, parameterized by the total number of allowed operations, k := k1 + k2 + k3 . Theorem 1.4. The unit interval editing problem can be solved in time 2O(k log k) · (n + m). By and large, our algorithm for unit interval editing again uses the two-phase approach. However, we are not able to show that it can be solved in polynomial time on proper Helly circular-arc graphs. Therefore, in the first phase, we use brute force to remove not only claws, S3 ’s, S3 ’s, and C4 ’s, also all holes of length at most k3 + 3. The high exponential factor in the running time is due to purely this phase. After that, every hole has length at least k3 + 4, and has to be fixed by deleting a vertex or edge. We manage to show that an inclusion-wise minimal solution of this reduced graph does not add edges, and the problem can then be solved in linear time. The study of general modification problems was initiated by Cai [7], who observed that the problem is FPT if the objective graph class has a finite number of minimal forbidden induced subgraphs. More challenging is thus to devise parameterized algorithms for those graph classes whose minimal forbidden induced subgraphs are infinite. Prior to this paper, the only known nontrivial graph class on which the general modification problem is FPT is the chordal graphs [10]. Theorem 1.4 extends this territory by including another well-studied graph class. As a corollary, Theorem 1.4 implies the fixed-parameter tractability of the unit interval edge editing problem, which allows both edge operations but not vertex deletions [6]. To see this we can simply try every combination of k2 and k3 as long as k2 + k3 does not exceed the given bound. 3 Organization. The rest of the paper is organized as follows. Section 2 presents combinatorial and algorithmic results on {claw, S3 , S3 , C4 }-free graphs. Sections 3 and 4 present the algorithms for unit interval vertex deletion and unit interval edge deletion respectively (Theorems 1.1–1.3). Section 5 extends them to solve the general editing problem (Theorem 1.4). Section 6 closes this paper by discussing some possible improvement and new directions. The appendix provides a brief overview of related graph classes as well as their characterizations by forbidden induced subgraphs. 2 {Claw, S3 , S3 , C4 }-free graphs All graphs discussed in this paper are undirected and simple. A graph G is given by its vertex set V(G) and edge set E(G), whose cardinalities will be denoted by n and m respectively. All input graphs in this paper are assumed to be nontrivial (n > 1) and connected, hence n = O(m). For ` > 4, we use C` to denote a hole on ` vertices; if we add a new vertex to a C` and make it adjacent to no or all vertices in the hole, then we end with a C∗` or W` , respectively. For a hole H, we have |V(H)| = |E(H)|, denoted by |H|. The complement graph G of a graph G is defined on the same vertex set V(G), where a pair of vertices u and v is adjacent if and only if uv 6∈ E(G); e.g., W5 = C∗5 , and depicted in Fig. 1f is the complement of C6 . An interval graph is the intersection graph of a set of intervals on the real line. A natural way to extend interval graphs is to use arcs and a circle in the place of intervals and the real line, and the intersection graph of arcs on a circle is a circular-arc graph. The set of intervals or arcs is called an interval model or arc model respectively, and it can be specified by their 2n endpoints. In this paper, all intervals and arcs are closed, and no distinct intervals or arcs are allowed to share an endpoint in the same model; these restrictions do not sacrifice any generality. In a unit interval model or a unit arc model, every interval or arc has length one. An interval or arc model is proper if no interval or arc in it properly contains another interval or arc. A graph is a unit interval graph, proper interval graph, unit circular-arc graph, or proper circular-arc graph if it has a unit interval model, proper interval model, unit arc model, or proper arc model, respectively. The forbidden induced subgraphs of unit interval graphs have been long known. Theorem 2.1 ([29]). A graph is a unit interval graph if and only if it contains no claw, S3 , S3 , or any hole. Clearly, any (unit/proper) interval model can be viewed as a (unit/proper) arc model leaving some point uncovered, and hence all (unit/proper) interval graphs are always (unit/proper) circular-arc graphs. A unit interval/arc model is necessarily proper, but the other way does not hold true in general. A well-known result states that a proper interval model can always be made unit, and thus these two graph classes coincide [26, 29].1 This fact will be heavily used in the present paper; e.g., most of our proofs consist in modifying a proper arc model into a proper interval model, which represents the desired unit interval graph. On the other hand, it is easy to check that the S3 is a proper circular-arc graph but not a unit circular-arc graph. Therefore, the class of unit circular-arc graphs is a proper subclass of proper circular-arc graphs. An arc model is Helly if every set of pairwise intersecting arcs has a common intersection. A circular-arc graph is proper Helly if it has an arc model that is both proper and Helly. Theorem 2.2 ([27, 22, 9]). A graph is a proper Helly circular-arc graph if and only if it contains no claw, S3 , S3 , W4 , W5 , C6 , or C∗` for ` > 4. The following is immediate from Theorems 2.1 and 2.2. Corollary 2.3. If a proper Helly circular-arc graph is chordal, then it is a unit interval graph. From Theorems 2.1 and 2.2 one can also derive the following combinatorial result. But since we will prove a stronger result in Theorem 2.5 that implies it, we omit its proof here. Proposition 2.4. Every connected {claw, S3 , S3 , C4 , C5 }-free graph is a proper Helly circular-arc graph. Note that in Proposition 2.4, as well as most combinatorial statements to follow, we need the graph to be connected. Circular-arc graphs are not closed under taking disjoint unions. If a (proper Helly) circular-arc graph is not chordal, then it is necessarily connected. In other words, a disconnected (proper) circular-arc graph must be a (unit) interval graph. 1 The reason we choose “unit” over “proper” in the title of this paper is twofold. On the one hand, the applications we are interested in are more naturally represented by unit intervals. On the other hand, we want to avoid the use of “proper interval subgraphs,” which is ambiguous. 4 Proposition 2.4 can be turned into an algorithmic statement. We say that a recognition algorithm (for a graph class) is certifying if it provides a minimal forbidden induced subgraph of the input graph G when G is determined to be not in this class. Linear-time certifying algorithms for recognizing proper Helly circular-arc graphs have been reported by Lin et al. [22] and Cao et al. [9], from which one can derive a linear-time algorithm for detecting an induced claw, S3 , S3 , C4 , or C5 from a graph that is not a proper Helly circular-arc graph. This would suffice for us to develop most of our main results. Even so, we would take pain to prove slightly stronger results (than Proposition 2.4) on F-free graphs, where F denotes the set {claw, S3 , S3 , C4 }. The purpose is threefold. First, they enable us to answer the question asked by van ’t Hof and Villanger [17], i.e., the complexity of unit interval vertex deletion on F-free graphs, thereby more accurately delimiting the complexity border of the problem. Second, as we will see, the disposal of C5 ’s would otherwise dominate the second phase of our algorithm for unit interval edge deletion, so excluding them enables us to obtain better exponential dependency on k in the running time. Third, the combinatorial characterization might be of its own interest. A (true) twin class of a graph G is an inclusion-wise maximal set of vertices in which all have the same closed neighborhood. A graph is called a fat W5 if it has precisely six twin classes and it becomes a W5 after we remove all but one vertices from each twin class.2 By definition, vertices in each twin class induce a clique. The five cliques corresponding to hole in the W5 is the fat hole, and the other clique is the hub, of this fat W5 . Theorem 2.5. Let G be a connected graph. (1) If G is F-free, then it is either a fat W5 or a proper Helly circular-arc graph. (2) In O(m) time we can either detect an induced subgraph of G in F, partition V(G) into six cliques constituting a fat W5 , or build a proper and Helly arc model for G. Proof. We prove only assertion (2) using the algorithm described in Fig. 3, and its correctness implies assertion (1). The algorithm starts by calling the certifying algorithm of Cao et al. [9] for recognizing proper Helly circular-arc graphs (step 0). It enters one of steps 1–4, or 6 based on the outcome of step 0. Here the subscripts of vertices in a hole C` should be understood to be modulo `. If the condition of any of steps 1–4 is satisfied, then either a proper and Helly arc model or a subgraph in F is returned. The correctness of steps 1–3 is straightforward. Step 4.1 can find the path because G is connected; possibly v = x, which is irrelevant in steps 4.2–4.4. Note also that ` > 4 in step 4. By Theorem 2.2, the algorithm passes steps 1–4 only when the outcome of step 0 is a W5 ; let H be its hole and let v be the other vertex. Steps 5–7 either detect an induced subgraph of G in F or partition V(G) into six cliques constituting a fat W5 . Step 6 scans vertices not in the W5 one by one, and proceeds based on the adjacency between x and H. In step 6.1, H and x make a C∗5 , which means that we can proceed exactly the same as step 4. Note that the situation of step 6.4 is satisfied if x is adjacent to four vertices of H. If none of the steps 6.1 to 6.5 applies, then x has precisely three neighbors in H and they have to be consecutive. This is handled by step 6.6. Steps 0 and 4 take O(m) time. Steps 1, 2, 3, 5, and 7 need only O(1) time. If the condition in step 6.1 is true, then it takes O(m) time but it always terminates the algorithm after applying it. Otherwise, step 6.1 is never called, and the rest of step 6 scans the adjacency list of each vertex once, and hence takes O(m) time in total. Therefore, the total running time of the algorithm is O(m). This concludes the proof. Implied by Theorem 2.5, a connected {claw, S3 , S3 , C4 , W5 }-free graph is a proper Helly circular-arc graph, which in turns implies Proposition 2.4. At this point a natural question appealing to us is the relation between connected {claw, S3 , S3 , C4 , C5 }-free graphs and unit Helly circular-arc graphs. Recall that the class of unit interval graphs is a subclass of unit Helly circular-arc graphs, on which we have a similar statement as Corollary 2.3, i.e., a unit Helly circular-arc graph that is chordal is a unit interval graph. However, a connected {claw, S3 , S3 , C4 , C5 }-free graph that is not a unit Helly circular-arc graph can be constructed as follows: Starting from a C` with ` > 6, for each edge hi hi+1 in the hole add a new vertex vi and two new edges vi hi , vi hi+1 . (This is actually the CI(`, 1) graph defined by Tucker [27]; see also [22].) Therefore, Proposition 2.4 and Theorem 2.5 are the best we can expect in this sense. 2 Interestingly, in the study of proper circular-arc graphs that are chordal, Bang-Jensen and Hell [1] showed that if a connected {claw, S3 , C4 , C5 }-free graph contains an S3 , then it must be a fat S3 , which is defined analogously as a fat W5 . 5 Algorithm recognize-F-free(G) Input: a connected graph G. Output: a proper and Helly arc model, a subgraph in F, or six cliques making a fat W5 . 0. call the recognition algorithm for proper Helly circular-arc graphs [9]; 1. if a proper and Helly arc model A is found then return it; 2. if a claw, S3 , or S3 is found then return it; 3. if a W4 , C∗4 , or C6 is found then return a C4 contained in it; 4. if a C∗` with hole H and isolated vertex v is found then 4.1. use breadth-first search to find a shortest path v · · · xyhi from v to H; 4.2. if y has a single neighbor hi in H then return claw {hi , y, hi−1 , hi+1 }; 4.3. if y has only two neighbors on H that are consecutive, say, {hi , hi+1 } then return S3 {x, y, hi−1 , hi , hi+1 , hi+2 }; 4.4. return claw {y, x, hj , hj 0 }, where hj , hj 0 are two nonadjacent vertices in N[y] ∩ H; \\ The outcome of step 0 must be a W5 ; let it be H and v. All subscripts of hi and Ki are modulo 5. 5. K0 ← {h0 };K1 ← {h1 };K2 ← {h2 }; K3 ← {h3 };K4 ← {h4 };Kv ← {v}; 6. for each vertex x not in the W5 do 6.1. if x is not adjacent to H then similar as step 4 (H and x make a C∗5 ); 6.2. if x has a single neighbor hi in H then return claw {hi , x, hi−1 , hi+1 }; 6.3. if x is only adjacent to hi , hi+1 in H then if xv ∈ E(G) then return claw {v, hi−1 , hi+2 , x}; else return S3 {x, hi , hi+1 , hi−1 , v, hi+2 }; 6.4. if x is adjacent to hi−1 , hi+1 but not hi then return xhi−1 hi hi+1 as a C4 ; 6.5. if x is adjacent to all vertices in H then if xy 6∈ E(G) for some y ∈ Kv or Ki then return xhi−1 yhi+1 as a C4 ; else add x to Kv ; \\x is adjacent to all vertices in the six cliques. 6.6. else \\ Hereafter |N(x) ∩ H| = 3; let them be hi−1 , hi , hi+1 . if xy 6∈ E(G) for some y ∈ Ki or Kv then return xhi−1 yhi+1 as a C4 ; if xy 6∈ E(G) for some y ∈ Ki−1 then return claw {v, y, hi+2 , x}; if xy 6∈ E(G) for some y ∈ Ki+1 then return claw {v, hi−2 , y, x}; if xy ∈ E(G) for some y ∈ Ki−2 then return xhi+1 hi+2 y as a C4 ; if xy ∈ E(G) for some y ∈ Ki+2 then return xhi−1 hi−2 y as a C4 ; else add x to Ki ; \\Kv , Ki−1 , Ki , Ki+1 ⊆ N(x) and Ki−2 , Ki+2 ∩ N(x) = ∅. 7. return the six cliques. Figure 3: Recognizing F-free graphs. Note that a C4 is a proper Helly circular-arc graph. Thus, the algorithm of Theorem 2.5 is not yet a certifying algorithm for recognizing F-free graphs. To detect an induced C4 from a proper Helly circulararc graph, we need to exploit its arc model. If a proper Helly circular-arc graph G is not chordal, then the set of arcs for vertices in a hole necessarily covers the circle, and it is minimal. Interestingly, the converse holds true as well—note that this is not true for chordal graphs. Proposition 2.6. [22, 9] Let G be a proper Helly circular-arc graph. If G is not chordal, then at least four arcs are needed to cover the whole circle in any arc model for G. Proposition 2.6 forbids among others two arcs from having two-part intersection.3 Corollary 2.7. Let G be a proper Helly circular-arc graph that is not chordal and let A be an arc model for G. A set of arcs inclusion-wise minimally covers the circle in A if and only if the vertices represented by them induce a hole of G. Therefore, to find a shortest hole from a proper Helly circular-arc graph, we may work on an arc model of it, and find a minimum set of arcs covering the circle in the model. This is another important step of our algorithm for the unit interval editing problem. It has the detection of C4 ’s as a special case, because a C4 , if existent, must be the shortest hole of the graph. 3A model having no such intersection is called normal; see the appendix for more discussion. 6 Lemma 2.8. There is an O(m)-time algorithm for finding a shortest hole of a proper Helly circular-arc graph. Before proving Lemma 2.8, we need to introduce some notation. In an interval model, the interval I(v) for vertex v is given by [lp(v), rp(v)], where lp(v) and rp(v) are its left and right endpoints respectively. It always holds lp(v) < rp(v). In an arc model, the arc A(v) for vertex v is given by [ccp(v), cp(v)], where ccp(v) and cp(v) are its counterclockwise and clockwise endpoints respectively. All points in an arc model are assumed to be nonnegative; in particular, they are between 0 (inclusive) and ` (exclusive), where ` is the perimeter of the circle. We point out that possibly ccp(v) > cp(v); such an arc A(v) necessarily passes through the point 0. Note that rotating all arcs in the model does not change the intersections among them. Thus we can always assume that a particular arc contains or avoids the point 0. We say that an arc model (for an n-vertex circular-arc graph) is canonical if the perimeter of the circle is 2n, and every endpoint is a different integer in {0, 1, . . . , 2n − 1}. Given an arc model, we can make it canonical in linear time: We sort all 2n endpoints by radix sort, and replace them by their indices in the order. Each point α in an interval model I or arc model A defines a clique, denoted by KI (α) or KA (α) respectively, which is the set of vertices whose intervals or arcs contain α. There are at most 2n distinct cliques defined as such. If the model is Helly, then they include all maximal cliques of this graph [15]. Since the set of endpoints is finite, for any point ρ in an interval or arc model, we can find a small positive value  such that there is no endpoint in [ρ − , ρ) ∪ (ρ, ρ + ],—in other words, there is an endpoint in [ρ − , ρ + ] if and only if ρ itself is an endpoint. Note that the value of  should be understood as a function, depending on the interval/arc model as well as the point ρ, instead of a constant. Let G be a non-chordal graph and let A be a proper and Helly arc model for G. If uv ∈ E(G), then exactly one of ccp(v) and cp(v) is contained in A(u) (Proposition 2.6). Thus, we can define a “left-right relation” for each pair of intersecting arcs, which can be understood from the viewpoint of an observer placed at the center of the model. We say that arc A(v) intersects arc A(u) from the left when cp(v) ∈ A(u), denoted by v → u. Any set of arcs whose union is an arc not covering the circle (the corresponding vertices induce a connected unit interval graph) can be ordered in a unique way such that vi → vi+1 for all i. From it we can find the leftmost (most counterclockwise) and rightmost (most clockwise) arcs. For any vertex v, let h(v) denote the length of the shortest holes through v, which is defined to be +∞ if no hole of G contains v. The following is important for the proof of Lemma 2.8. Lemma 2.9. Let A be a proper and Helly arc model for a non-chordal graph G. Let v1 , v2 , . . . , vp be a sequence of vertices such that for each i = 2, . . . , p, the arc A(vi ) is the rightmost of all arcs containing cp(vi−1 ). If v1 is contained in some hole and vi v1 6∈ E(G) for all 2 < i 6 p, then there is a hole of length h(v1 ) containing v1 , v2 , . . . , vp as consecutive vertices on it. Proof. Suppose that there is no such a hole, then there exists a smallest number i with 2 6 i 6 p such that no hole of length h(v1 ) contains v1 , v2 , . . . , vi . By assumption, there is a hole v1 · · · vi−1 ui ui+1 · · · uh(v1 ) of length h(v1 ) with ui 6= vi ; let it be H. In case that i = 2, we assume that H is given in the way that v1 → u2 . By Corollary 2.7, the set of arcs for H cover the circle in A. Since vi−1 → ui and by the assumption on vi , the arc A(vi ) covers [cp(vi−1 ), ccp(ui+1 )] (note that i < h(v1 ) as otherwise vi → v1 ). Therefore, the arcs for V(H) \ {ui } ∪ {vi } cover the circle as well. By Corollary 2.7, a subset of these vertices induces a hole; since vi is not adjacent to v1 from the left, this subset has to contain v1 . But a hole containing v1 cannot be shorter than H, and hence it contains v1 , . . . , vi , a contradiction. Therefore, such an i does not exist, and there is a hole of length h(v1 ) containing v1 , v2 , . . . , vp . Since vj and vj+1 are adjacent for all 1 6 j 6 p − 1, vertices v1 , v2 , . . . , vp have to be consecutive on this hole. Let α be any fixed point in a proper and Helly arc model. According to Corollary 2.7, every hole needs to visit some vertex in KA (α). Therefore, to find a shortest hole in G, it suffices to find a hole of length min{h(x) : x ∈ KA (α)}. Proof of Lemma 2.8. The algorithm described in Fig. 4 finds a hole of length min{h(x) : x ∈ KA (cp(v) + 0.5)}. Step 1 creates |KA (cp(v) + 0.5)| arrays, each starting with a distinct vertex in KA (cp(v) + 0.5), and they are ordered such that their (counter)clockwise endpoints are increasing. The main job of this algorithm is done in step 3. During this step, w is the new vertex to be processed, and U is the current array. Each new vertex is added to at most one array, while each array is either dropped or extended. We use ⊥ as a dummy vertex, which means that no new vertex has been met after the last one has been put into the previous array. Step 3.1 records the last scanned arc. Once the clockwise endpoint of the last vertex z of the current array U is met, w is appended to U (step 3.4); note that A(w) is the most 7 Algorithm shortest-hole(G, A) Input: a proper and Helly arc model A for a non-chordal graph G. Output: a shortest hole of G. 0. make A canonical where 0 is ccp(v) for some v; 1. for i = 1, . . . , cp(v) − 1 do 1.1. if i is ccp(x) then create a new array {x}; \\ these arrays are circularly linked so that the next of the last array is the first one. 2. w ← ⊥; U ← the first array; 3. for i = cp(v) + 1, . . . , 2n − 1 do 3.0. z ← the last vertex of U; 3.1. if i is ccp(x) then w ← x; continue† ; 3.2. if i 6= cp(z) then continue; 3.3. if w = ⊥ then delete U; U ← the next array of U; 3.4. if w 6= ⊥ then append w to U; w ← ⊥; U ← the next array of U; 4. for each U till the last array do 4.1. if the first and last vertices of U are adjacent then return U; 5. return U ∪ {v}. \\U is the last array. †: i.e., ignore the rest of this iteration of the for-loop and proceed to the next iteration. Figure 4: Finding a shortest hole in a proper Helly circular-arc graph. clockwise arc that contains cp(z). On the other hand, if w = ⊥, then we drop this array from further consideration (step 3.3). If after step 3, one of the arrays already induces a hole (i.e., the first and last vertices are adjacent), then it is returned in step 4.1. Otherwise, U does not induces a hole, and step 5 returns the hole induced by U and v. We now verify the correctness of the algorithm. It suffices to show that the length of the found hole is min{h(x) : x ∈ KA (cp(v) + 0.5)}. The following hold for each array U: (1) For any pair of consecutive vertices u, w of U, the arc A(w) is the rightmost of all arcs containing cp(u). (2) At the end of the algorithm, if U is not dropped, then 0 < cp(z) < cp(v), where z is the last vertex of U. Let v1 , v2 , . . . , vp be the vertices in U. From (1) and (2) it can be inferred that for 1 < i < p, the vertex vi is adjacent to only vi−1 , vi+1 in U, while v1 and vp may or may not be adjacent. If v1 vp ∈ E(G), then vertices in U induce a hole of G; otherwise U ∪ {v} induces a hole of G. By Lemma 2.9, this hole has length h(v1 ). Some of the |KA (cp(v) + 0.5)| arrays created in step 1 may be dropped in step 3. Note that step 3 processes arrays in a circular order starting from the first one, and each array is either deleted (step 3.3) or extended by adding one vertex (step 3.4). (3) At any moment of the algorithm, the sizes of any two arrays differ by at most one. In particular, at the end of step 3, if the current array U is not the first, then U, as well as all the succeeding arrays, has one less element than its predecessor(s). This ensures that the hole returned in step 4.1 or 5 is the shortest among all the holes decided by the remaining arrays after step 3. It remains to argue that for any array U deleted in step 3.3, the found hole is not longer than h(x), where x is the first vertex of U. All status in the following is referred at the moment before U is deleted (i.e., before step 3.3 that deletes U). Let z be the last vertex of U. Let U 0 be the array that is immediately preceding U, and let z 0 be its last vertex. Note that there is no arc with a counterclockwise endpoint between cp(z 0 ) and cp(z), as otherwise w 6= ⊥ and U would not be deleted. Therefore, any arc intersecting A(z) from the right also intersects A(z 0 ) from the right. By Lemma 2.9, there is a hole H that has length h(x) and contains U ∪ {z 0 }. We find a hole through U 0 of the same length as follows. If U is not the first array, then |U 0 | = |U| + 1, and we replace U ∪ {z 0 } by U 0 . Otherwise, |U 0 | = |U|, and we replace U ∪ {z 0 } by {v} ∪ U 0 . It is easy to verify that after this replacement, H remains a hole of the same length. 8 We now analyze the running time of the algorithm. Each of the 2n endpoints is scanned once, and each vertex belongs to at most one array. Using a linked list to store an array, the addition of a new vertex can be implemented in constant time. Using a circularly linked list to organize the arrays, we can find the next array or delete the current one in constant time. With the (endpoints of) all arcs given, the adjacency between any pair of vertices can be checked in constant time, and thus step 4 takes O(n) time. It follows that the algorithm can be implemented in O(m) time. 3 Vertex deletion We say that a set V− of vertices is a hole cover of G if G − V− is chordal. The hole covers of proper Helly circular-arc graphs are characterized by the following lemma. Lemma 3.1. Let A be a proper and Helly arc model for a non-chordal graph G. A set V− ⊆ V(G) is a hole cover of G if and only if it contains KA (α) for some point α in A. Proof. For any vertex set V− , the subgraph G − V− is also a proper Helly circular-arc graph, and the set of arcs {A(v) : v ∈ V(G) \ V− } is a proper and Helly arc model for G − V− . For the “if” direction, we may rotate A to make α = 0, and then setting I(v) = A(v) for each v ∈ V(G) \ V− gives a proper interval model for G − V− . For the “only if” direction, note thatS if there is no α with KA (α) ⊆ V− , then we can find a minimal set X of vertices from V(G) \ V− such that v∈X A(v) covers the whole circle in A. According to Corollary 2.7, X induces a hole of G, which remains in G − V− . Noting that any “local” part of a proper and Helly arc model “behaves similarly” as an interval model, Lemma 3.1 is an easy extension of the clique separator property of interval graphs [14]. On the other hand, to get a unit interval graph out of a fat W5 , it suffices to delete a smallest clique from the fat hole. Therefore, Theorem 2.5 and Lemma 3.1 imply the following linear-time algorithm. Corollary 3.2. The unit interval vertex deletion problem can be solved in O(m) time (1) on proper Helly circular-arc graphs and (2) on F-free graphs. We are now ready to prove the main results of this section. Theorem 3.3. There are an O(6k · m)-time parameterized algorithm for the unit interval vertex deletion problem and an O(nm)-time approximation algorithm of approximation ratio 6 for its minimization version. Proof. Let (G, k) be an instance of unit interval vertex deletion; we may assume that G is not a unit interval graph and k > 0. The parameterized algorithm calls first Theorem 2.5(2) to decide whether it has an induced subgraph in F, and then based on the outcome, it solves the problem by making recursive calls to itself, or calling the algorithm of Corollary 3.2. If an induced subgraph F in F is found, it calls itself |V(F)| times, each with a new instance (G − v, k − 1) for some v ∈ V(F); since we need to delete at least one vertex from V(F), the original instance (G, k) is a yes-instance if and only if at least one of the instances (G − v, k − 1) is a yes-instance. Otherwise, G is F-free and the algorithm calls Corollary 3.2 to solve it. The correctness of the algorithm follows from discussion above and Corollary 3.2. On each subgraph in F, which has at most 6 vertices, at most 6 recursive calls are made, all with parameter value k − 1. By Theorem 2.5, each recursive call is made in O(m) time; each call of Corollary 3.2 takes O(m) time. Therefore, the total running time is O(6k · m). The approximation algorithm is adapted from the parameterized algorithm as follows. For the subgraph F found by Theorem 2.5, we delete all its vertices. We continue the process until the remaining graph is F-free, and then we call Corollary 3.2 to solve it optimally. Each subgraph in F has 4 or 6 vertices, and thus at most n/4 such subgraphs can be detected and deleted, each taking O(m) time, hence O(nm) in total. Corollary 3.2 takes another O(m) time. The total running time is thus O(nm) + O(m) = O(nm), and the approximation ratio is clearly 6. 4 Edge deletion Inspired by Lemma 3.1, one may expect a similarly nice characterization—being “local” to some point in an arc model for G—for a minimal set of edges whose deletion from a proper Helly circular-arc graph G makes it chordal. This is nevertheless not the case; as shown in Fig. 5, they may behave in a very strange or pathological way. 9 v3 v2 u3 v4 Figure 5: The set of all 30 edges (both u2 u4 u1 u5 v1 u6 v5 v6 solid and dashed) spans a proper Helly circular-arc graph. After the set of 19 dashed edges deleted (we rely on the reader to verify its minimality), the remaining graph on the 11 solid edges is a unit interval graph. Note that four edges would suffice, e.g., {u2 u3 , u2 v3 , v2 u3 , v2 v3 }. Recall that v → u means arc A(v) intersecting arc A(u) from the left, or cp(v) ∈ A(u). For each point α in a proper and Helly arc model A, we can define the following set of edges: → − E A (α) = {vu : v ∈ KA (α), u 6∈ KA (α), v → u}. (1) → − One may symmetrically view E A (α) as {vu : v 6∈ KA (β), u ∈ KA (β), v → u}, where β := max{cp(x) : x ∈ → − KA (α)} + . It is easy to verify that the following gives a proper interval model for G − E A (0):  [ccp(v), cp(v) + `] if v ∈ KA (0), I(v) := (2) [ccp(v), cp(v)] otherwise, → − where ` is the perimeter of the circle in A; see Fig. 6. For an arbitrary point α, the model G − E A (α) can be given analogously, e.g., we may rotate the model first to make α = 0. α(0) β 0 (a) An arc model for G. ` − → (b) The interval model for G − E A (α) given by (2). Figure 6: Illustration for Proposition 4.1. Proposition 4.1. Let A be a proper and Helly arc model for a non-chordal graph G. For any point α in A, → − the subgraph G − E A (α) is a unit interval graph. The other direction is more involved and very challenging. A unit interval graph G is called a spanning unit interval subgraph of G if V(G) = V(G) and E(G) ⊆ E(G); it is called maximum if it has the largest number of edges among all spanning unit interval subgraphs of G. To prove that all maximum spanning unit interval subgraphs have a certain property, we use the following argument by contradiction. Given a spanning unit interval subgraph G not having the property, we locally modify a unit interval model I for G to a proper interval model I 0 such that the represented graph G 0 satisfies E(G 0 ) ⊆ E(G) and |E(G 0 )| > |E(G)|. Recall that we always select  in a way that there cannot be any endpoint in [ρ − , ρ) ∪ (ρ, ρ + ], and thus an arc covering ρ +  or ρ −  must contain ρ. Lemma 4.2. Let A be a proper and Helly arc model for a non-chordal graph G. For any maximum spanning → − unit interval subgraph G of G, the deleted edges, E(G) \ E(G), are E A (ρ) for some point ρ in A. Proof. Let I be a unit interval model for G, and let E− = E(G) \ E(G), i.e., the set of deleted edges from G. We find first a vertex v satisfying at least one of the following conditions. (C1) The sets NG [v] and KA (ccp(v) − ) are disjoint and all edges between them are in E− . (C2) The sets NG [v] and KA (cp(v) + ) are disjoint and all edges between them are in E− . Recall that a vertex u ∈ KA (ccp(v) − ) if and only if u → v, and a vertex w ∈ KA (cp(v) + ) if and only if v → w; see Fig. 7a. These two conditions imply NG [v] ⊆ KA (cp(v)) and NG [v] ⊆ KA (ccp(v)) 10 w u v cp(v) +  ccp(v) (a) v0 v0 v w u u0 u0 (b) v w (c) w0 w u lp(u) y0 u y v v u u0 w w0 lp(w0 ) rp(u0 ) rp(u) (d) (e) Figure 7: Illustration for the proof of Lemma 4.2. respectively: All edges between v itself, which belongs to NG [v], and KA (ccp(v) − ) or KA (cp(v) + ) are in E− . Let I(v0 ) be the leftmost interval in I. Note that by Proposition 2.6, arcs for NG [v0 ] cannot cover the whole circle. If NG [v0 ] is a separate component in G, then we can take v to be the vertex from NG [v0 ] with the leftmost arc; it satisfies condition (C1). Otherwise, let I(u) be the last interval containing rp(v0 ) and let I(u 0 ) be the next interval (i.e., I(u 0 ) is the leftmost interval that does not intersect I(v0 )). See Fig. 7b. Intervals I(u) and I(u 0 ) intersect (NG [v0 ] is not isolated), but v0 u 0 6∈ E(G) because G is maximum: Moving I(v0 ) to the right to intersect I(u 0 ) would otherwise make a unit interval model that represents a subgraph of G having one more edge than G. • If u 0 → u, then u 0 → u → v0 . We argue by contradiction that there cannot be vertices v 0 ∈ KA (cp(v0 ) + ) and w 6∈ NG (v0 ) with uv 0 , v 0 w ∈ E(G). If uv 0 ∈ E(G) ⊆ E(G), then by the position of A(v0 ), we must have u → v 0 and v0 → v 0 . Then v0 u 0 6∈ E(G) excludes the possibility u 0 → v 0 ; on the other hand, v 0 → u 0 is excluded by Proposition 2.6: The arcs for u 0 , u, v 0 cannot cover the whole circle. Therefore, v 0 u 0 6∈ E(G), and likewise uw 6∈ E(G). They cannot be in E(G) either, but this is impossible; See Fig. 7b. Let v be the vertex in NG [v0 ] such that A(v) is the rightmost; it satisfies condition (C2). • If u → u 0 , then v0 → u → u 0 . Similarly as above, the vertex v in NG [v0 ] such that A(v) is the leftmost satisfies condition (C1). Noting that conditions (C1) and (C2) are symmetric, we assume that the vertex v found above satisfies condition (C2), and a symmetric argument would apply to condition (C1). Note that by the selection of v, which has the leftmost arc among NG [v0 ], we have NG [v] ⊆ NG [v 0 ] for every v 0 satisfying lp(v 0 ) < lp(v); thus setting their intervals to be [lp(v) + , rp(v) + ] would produce another unit interval model for G. In the rest of the proof we may assume without loss of generality that I(v) is the first interval in I. Since the model A is proper and Helly, no arc in A can contain both ccp(v) and cp(v) + . In other → − words, KA (ccp(v)) and KA (cp(v) + ) are disjoint, and E A (ccp(v)) comprises precisely edges between → − them; see Fig. 7a. By Proposition 4.1, |E− | 6 | E A (ccp(v))|. If KA (ccp(v)) is not adjacent to KA (cp(v) + ) → − in G, then E A (ccp(v)) ⊆ E− , and they have to be equal. In this case the proof is complete: ρ = ccp(v). We are hence focused on edges between KA (ccp(v)) and KA (cp(v) + ). Claim 1. Let u ∈ KA (ccp(v)). If u is adjacent to KA (cp(v) + ) in G, then I(u) does not intersect the intervals for NG [v]. 11 Proof. Recall that uv ∈ / E(G) by condition (C2) and the fact that u is adjacent to KA (cp(v) + ) in G. Let u 0 be the vertex in NG [v] with the rightmost interval, and let I(y) be the leftmost interval not intersecting I(v). Note that vy 6∈ E(G): Otherwise moving I(v) to the right to intersect I(y) would make a unit interval model that represents a subgraph of G with one more edge than G. Suppose to the contrary of this claim that I(u) intersects some interval for NG [v], then it intersects I(u 0 ). See Fig. 7c. Since v satisfies condition (C2) and by Proposition 2.6, u 0 → v and y → u, u 0 . Let w be the vertex in KA (cp(v) + ) that has the leftmost interval. Since v satisfies condition (C2), lp(w) > rp(u 0 ); by the assumption that u is adjacent to KA (cp(v) + ) in G, we have lp(w) < rp(u). By Proposition 2.6, yw 6∈ E(G). Let A(y 0 ) be the leftmost arc such that y 0 ∈ KA (ccp(u)) and I(y 0 ) lies in (rp(v), lp(w)); this vertex exists because y itself is a candidate for it. Again by Proposition 2.6, y 0 w 6∈ E(G). Let X denote the set of vertices x with lp(x) < lp(w). We make a new interval model by resetting intervals for these vertices. Since every vertex in X is adjacent to at least one of u and u 0 , by Proposition 2.6, the union of arcs for X do not cover the circle in A. These arcs can thus be viewed as a proper interval model for G[X]. The new intervals for X, adapted from these arcs, are formally specified as follows. The left endpoint of each x ∈ X is set as lp 0 (x) = lp(w) − (ccp(w) − ccp(x)). For each vertex x ∈ X \ NG (w), we set I 0 (x) = [lp(w) − (ccp(w) − ccp(x)), lp(w) − (ccp(w) − cp(x))]. By the selection of w, we have x → w for all x ∈ X ∩ NG (w). Arcs for X ∩ NG (w) are thus pairwise intersecting; by Proposition 2.6, they cannot cover the whole circle. We can thus number vertices in X ∩ NG (w) as u1 , . . . , up such that ui → ui+1 for each i = 1, . . . , p − 1. Their right endpoints are set as  rp 0 (u1 ) = max lp(w) + , rp(u1 ) , and  0 0 rp (ui ) = max rp (ui−1 ) + , rp(ui ) for i = 2, . . . , p. Let I 0 denote the resulting new interval model. To see that I 0 is proper, note that (a) no new interval can contain or be contained by an interval I(z) for z ∈ V(G) \ X; and (b) the left and right endpoints of the intervals for X have the same ordering as the counterclockwise and clockwise endpoints of the arcs {A(x) : x ∈ X}, hence necessarily proper. Let G 0 denote the proper interval graph represented by I 0 . We want to argue that E(G) ⊂ E(G 0 ) ⊆ E(G), which would contradict that G is a maximum unit interval subgraph of G, and conclude the proof of this claim. By construction, G 0 − X is the same as G − X, while G 0 [X] is the same as G[X]. Thus, we focus on edges between X and V(G) \ X, which are all incident to X ∩ NG (w). For each i = 1, . . . , p, we have rp 0 (ui ) > rp(ui ), and thus E(G) ⊆ E(G 0 ); on the other hand, they are not equal because uv ∈ E(G 0 )\E(G). We show by induction that for every i = 1, . . . , p, the edges incident to ui in G 0 is a subset of G. The base case is clear: NG 0 (u1 ) \ X is either {w} or NG (u1 ) \ X. For the inductive step, if rp 0 (ui ) = rp(ui ), then NG 0 (ui ) \ X = NG (ui ) \ X ⊆ NG (ui ); otherwise, NG 0 (ui ) \ X ⊆ NG (ui−1 ) \ X, which is a subset of NG (ui ) because ui−1 → ui . This verifies E(G 0 ) ⊆ E(G). y We consider then edges deleted from each vertex in KA (ccp(v)), i.e., edges in E− that is incident to KA (ccp(v)). Claim 2. Let u ∈ KA (ccp(v)). If u is adjacent to KA (cp(v) + ) in G, then there are strictly more edges → − incident to u in E− than in E A (ccp(v)) (i.e., between u and KA (cp(v) + ).). Proof. The vertices in NG (u) consists of three parts, NG [v], those in KA (cp(v) + ), and others. By Claim 1, → − edges between u and all vertices in NG [v] are in E− ; they are not in E A (ccp(v)). All edges between u → − → − and KA (cp(v) + ) are in E A (ccp(v)). In E A (ccp(v)) there is no edge between u and the other vertices. Therefore, to show the claim, it suffices to show |NG [u] ∩ KA (cp(v) + )| 6 |NG (v)| < |NG [v]|. Let uw be an edge of G with w ∈ KA (cp(v) + ). Since v satisfies condition (C2), both uv and vw are in E− . We show only the case that I(w) intersects I(u) from the right; a similar argument works for the other case: Note that all the intervals used below are disjoint from I(v). Consider first that there exists another vertex w 0 ∈ KA (cp(v) + ) with interval I(w 0 ) intersecting I(u) from the left. See Fig. 7d. Any interval that intersects I(u) necessarily intersects at least one of I(w) and I(w 0 ), and thus by Proposition 2.6, its vertex must be in NG (v). As a result, setting I(v) to [lp(u) − , rp(u) − ] gives another proper interval model and it represents a subgraph of G. Since G is maximum, we can conclude |NG [u]| 6 |NG (v)| < |NG [v]|. In this case the proof of this claim is concluded. In the second case there is no vertex in KA (cp(v) + ) whose interval intersects I(u) from the left. Note that every interval intersecting [lp(w), rp(u)] represents a vertex in NG [v]. Let w 0 be vertex in 12 KA (cp(v)) ∩ KI (rp(u)) that has the leftmost interval, and let u 0 be vertex in KA (ccp(v)) ∩ KI (lp(w)) that has the rightmost interval; these two vertices exist because u and w are candidates for them, respectively. See Fig. 7e. There cannot be any vertex whose interval contains [lp(w 0 ), rp(u 0 )]: Such a vertex, if it exists, is in NG (v), but then it contradicts the selection of u 0 and w 0 . Also by the selection of u 0 and w 0 , no interval contains [lp(w 0 ) − , rp(u 0 ) + ]. Thus, setting I(v) to [lp(w 0 ) − , rp(u 0 ) + ] gives another proper interval model and it represents a subgraph of G. Since G is maximum, we can conclude |NG [u] ∩ KA (cp(v) + )| 6 |NG (v)| < |NG [v]|. y Therefore, for every vertex u ∈ KA (ccp(v)), there are no less edges incident to u in E− than in → − E A (ccp(v)). Moreover, as there is at least one vertex in KA (ccp(v)) adjacent to KA (cp(v)+) in G, (noting → − → − that no edge in E A (ccp(v)) is incident to two vertices in KA (ccp(v)),) it follows that |E− | > | E A (ccp(v))|, contradicting that G is a maximum unit interval subgraph of G. It is worth stressing that a thinnest place in an arc model with respect to edges is not necessarily a thinnest place with respect to vertices; see Fig. 8 for an example. There is a linear number of different places to check, and thus the edge deletion problem can also be solved in linear time on proper Helly circular-arc graphs. The problem is also simple on fat W5 ’s. α β Figure 8: The thinnest points for vertices and edges are α and β respectively: KA (α) = 2 < KA (β) = 3; while → − → − E A (α) = 8 > E A (β) = 6. Theorem 4.3. The unit interval edge deletion problem can be solved in O(m) time (1) on proper Helly circular-arc graphs and (2) on F-free graphs. Proof. For (1), we may assume that the input graph G is not an unit interval graph; according to Corollary 2.3, it is not chordal. We build a proper and Helly arc model A for G; without loss of generality, assume that it is canonical. According to Lemma 4.2, the problem reduces to finding a point α in A such → − that E A (α) is minimized. It suffices to consider the 2n points i + 0.5 for i ∈ {0, . . . , 2n − 1}. We calculate → − → − → − first E A (0.5), and then for i = 1, . . . , 2n − 1, we deduce E A (i + 0.5) from E A (i − 0.5) as follows. If i is a → − → − clockwise endpoint of some arc, then E A (i + 0.5) = E A (i − 0.5). Otherwise, i = ccp(v) for some vertex → − → − v, then the difference between E A (i + 0.5) and E A (i − 0.5) is the set of edges incident to v. In particular, → − → − → − → − {uv : u → v} = E A (i − 0.5) \ E A (i + 0.5), while {uv : v → u} = E A (i + 0.5) \ E A (i − 0.5). Note that → − the initial value E A (0.5) can be calculated in O(m) time, and then each vertex and its adjacency list is scanned exactly once. It follows that the total running time is O(m). For (2), we may assume that the input graph G is connected, as otherwise we work on its components one by one. According to Theorem 2.5(1), G is either a proper Helly circular-arc graph or a fat W5 . The former case has been considered above, and now assume G is a fat W5 . Let K0 , . . . , K4 be the five cliques in the fat hole, and let K5 be the hub. We may look for a maximum spanning unit interval subgraph G of G such that NG [u] = NG [v] for any pair of vertices u, v in Ki , where i ∈ {0, . . . , 5}. We now argue the existence of such a subgraph. By definition, NG [u] = NG [v]. Let G 0 be a maximum spanning unit interval subgraph of G where NG 0 [u] 6= NG 0 [v], and assume without loss of generality, |NG 0 [u]| > |NG 0 [v]|. We may change the deleted edges that are incident to v to make another subgraph where v has the same neighbors as NG 0 [u]; this graph is clearly a unit interval graph and has no less edges than G 0 . This operation can be applied to any pair of u, v in the same twin class, and it will not violate an earlier pair. Repeating it we will finally end with a desired maximum spanning unit interval subgraph. Therefore, there is always some i ∈ {0, . . . , 4} (all subscripts are modulo 5) such that deleting all edges between cliques Ki and Ki+1 together with edges between one of them and K5 leaves a maximum spanning unit interval subgraph. Once the sizes of all six cliques have been calculated, which can be done in O(m) time, the minimum set of edges can be decided in constant time. Therefore, the total running time is O(m). The proof is now complete. 13 Indeed, it is not hard to see that in the proof of Theorems 4.3(2), every maximum spanning unit interval subgraph of a fat W5 keeps its six twin classes, but we are satisfied with the weaker statement that is sufficient for our algorithm. Theorems 4.3 and 2.5 already imply a branching algorithm for the unit interval edge deletion problem running in time O(9k · m). Here the constant 9 is decided by the S3 , which has 9 edges. However, a closer look at it tells us that deleting any single edge from an S3 introduces either a claw or a C4 , which forces us to delete some other edge(s). The disposal of an S3 is similar. The labels for an S3 and a S3 used in the following proof are as given in Fig. 1. Proposition 4.4. Let G be a spanning unit interval subgraph of a graph G, and let F = E(G) \ E(G). (1) For an S3 of G, there must be some i = 1, 2, 3 such that F contains at least two edges from the triangle involving ui . (2) For an S3 of G, the set F contains either an edge ui vi for some i = 1, 2, 3, or at least two edges from the triangle u1 u2 u3 . Proof. (1) We consider the intervals for v1 , v2 , and v3 in a unit interval model I for G. If v1 v2 v3 remains a triangle of G, then the interval I(v1 ) ∪ I(v2 ) ∪ I(v3 ) has length less than 2, and it has to be disjoint from I(ui ) for at least one i ∈ {1, 2, 3}. In other words, both edges incident to this ui are in F. Otherwise, v1 v2 v3 is not a triangle of G. Assume without loss of generality lp(v1 ) < lp(v2 ) < lp(v3 ). Then v1 v3 6∈ E(G) and u2 cannot be adjacent to both v1 and v3 . Therefore, at least two edges from the triangle u2 v1 v3 are in F; other cases are symmetric. (2) If F contains none of the three edges v1 u1 , v2 u2 , and v3 u3 , then it contains at least two edges from the triangle u1 u2 u3 : Otherwise there is a claw. This observation and a refined analysis will yield the running time claimed in Theorem 1.1. The algorithm goes similarly as the parameterized algorithm for unit interval vertex deletion used in the proof of Theorem 3.3. Theorem 4.5. The unit interval edge deletion problem can be solved in time O(4k · m). Proof. The algorithm calls first Theorem 2.5(2) to decide whether there exists an induced subgraph in F, and then based on the outcome, it solves the problem by making recursive calls to itself, or calling the algorithm of Theorem 4.3. When a claw or C4 is found, the algorithm makes respectively 3 or 4 calls to itself, each with a new instance with parameter value k − 1 (deleting one edge from the claw or C4 ). For an S3 , the algorithm branches on deleting two edges from a triangle involving a vertex ui with i = 1, 2, 3. Since there are three such triangles, and each has three options, the algorithm makes 9 calls to itself, all with parameter value k − 2. For an S3 , the algorithm makes 6 calls to itself, of which 3 with parameter value k − 1 (deleting edge vi ui for i = 1, 2, 3), and another 3 with parameter value k − 2 (deleting two edges from the triangle v1 v2 v3 ). To verify the correctness of the algorithm, it suffices to show that for any spanning unit interval subgraph G of G, there is at least one recursive call that generates a graph G 0 satisfying E(G) ⊆ E(G 0 ) ⊆ E(G). This is obvious when the recursive calls are made on a claws or C4 . It follows from Proposition 4.4 when the recursive calls are made on an S3 or S3 . With standard technique, it is easy to verify that O(4k ) recursive calls are made, each in O(m) time. Moreover, the algorithm for Theorem 4.3 is called O(4k ) times. It follows that the total running time of the algorithm is O(4k · m). What dominates the branching step is the disposal of C4 ’s. With the technique the author developed in [23], one may (slightly) improve the running time to O(ck · m) for some constant c < 4. To avoid blurring the focus of the present paper, we omit the details. 5 General editing Let V− ⊆ V(G), and let E− and E+ be a set of edges and a set of non-edges of G − V− respectively. We say that (V− , E− , E+ ) is an editing set of G if the deletion of E− from and the addition of E+ to G − V− create a unit interval graph. Its size is defined to be the 3-tuple (|V− |, |E− |, |E+ |), and we say that it is smaller than (k1 , k2 , k3 ) if all of |V− | 6 k1 and |E− | 6 k2 and |E+ | 6 k3 hold true and at least one inequality is strict. The unit interval editing problem is formally defined as follows. 14 Input: Task: A graph G and three nonnegative integers k1 , k2 , and k3 . Either construct an editing set (V− , E− , E+ ) of G that has size at most (k1 , k2 , k3 ), or report that no such set exists. We remark that it is necessary to impose the quotas for different modifications in the stated, though cumbersome, way. Since vertex deletions are clearly preferable to both edge operations, the problem would be computationally equivalent to unit interval vertex deletion if we have a single budget on the total number of operations. By and large, our algorithm for the unit interval editing problem also uses the same two-phase approach as the previous algorithms. The main discrepancy lies in the first phase, when we are not satisfied with a proper Helly circular-arc graph or an F-free graph. In particular, we also want to dispose of all holes C` with ` 6 k3 + 3, which are precisely those holes fixable by merely adding edges (recall that at least ` − 3 edges are needed to fill a C` in). In the very special cases where k3 = 0 or 1, a fat W5 is F ∪ {C` : ` 6 k3 + 3}-free. It is not hard to solve fat W5 ’s, but to make the rest more focused and also simplify the presentation, we also exclude these cases by disposing of all C5 ’s in the first phase. A graph is called reduced if it contains no claw, S3 , S3 , C4 , C5 , or C` with ` 6 k3 + 3. By Proposition 2.4, a reduced graph G is a proper Helly circular-arc graph. Hence, if G happens to be chordal, then it must be a unit interval graph (Corollary 2.3), and we terminate the algorithm. Otherwise, our algorithm enters the second phase. Now that G is reduced, every minimal forbidden induced subgraph is a hole C` with ` > k3 + 3, which can only be fixed by deleting vertices and/or edges. Here we again exploit a proper and Helly arc model A for G. According to Lemma 3.1, if there exists some point ρ in the model such that |KA (ρ)| 6 k1 , then it suffices to delete all vertices in KA (ρ), which results in a subgraph that is a unit interval graph. Therefore, we may assume hereafter that no such point exists, then G remains reduced and non-chordal after at most k1 vertex deletions. As a result, we have to delete edges as well. Consider an (inclusion-wise minimal) editing set (V− , E− , E+ ) to a reduced graph G. It is easy to verify that (∅, E− , E+ ) is an (inclusion-wise minimal) editing set of the reduced graph G − V− . In particular, E− needs to intersect all holes of G − V− . We use A − V− as a shorthand for {A(v) ∈ A : v 6∈ V− }, an arc model for G − V− that is proper and Helly. One may want to use Lemma 4.2 to find a minimum set E− → − of edges (i.e., E A−V− (α) for some point α) to finish the task. However, Lemma 4.2 has not ruled out the possibility that we delete less edges to break all long holes, and subsequently add edges to fix the incurred subgraphs in {claw, S3 , S3 , C4 , C5 , C` } with ` 6 k3 + 3. So we need the following lemma. Lemma 5.1. Let (V− , E− , E+ ) be an inclusion-wise minimal editing set of a reduced graph G. If |E+ | 6 k3 , then E+ = ∅. Proof. We may assume without loss of generality V− = ∅, as otherwise it suffices to consider the inclusionwise minimal editing set (∅, E− , E+ ) to the still reduced graph G − V− . Let A be a proper and Helly arc 0 0 model for G. Let E− be an inclusion-wise minimal subset of E− such that for every hole in G − E− , the 0 union of arcs for its vertices does not cover the circle of A. We argue the existence of E− by showing that E− itself satisfies this condition. Suppose for contradiction that there exists in G − E− a hole whose arcs cover the circle of A. Then we can find a minimal subset of them that covers the circle of A. By Corollary 2.7, this subset has at least k3 + 4 vertices, and thus the length of the hole in G − E− is at least k3 + 4. But then it cannot be fixed by the addition of the at most k3 edges from E+ . 0 Now for the harder part, we argue that G := G − E− is already a unit interval graph. Together with 0 the inclusion-wise minimality, it would imply E− = E− and E+ = ∅. Suppose for contradiction that G[X] is a claw, S3 , S3 , or a hole for some X ⊆ V(G). We find three 0 vertices u, v, w ∈ X such that uw ∈ E− and uv, vw ∈ E(G) as follows. By Corollary 2.7 and the fact that G is {C4 , C5 }-free, at least six arcs are required to cover the circle. As a result, if the arcs for a set Y of at most six vertices S covers the circle, then G[Y] must be a C6 , and its subgraph G[Y] cannot be a claw, S3 , or S3 . Therefore, v∈X A(v) cannot cover the whole circle when G[X] is a claw, S3 , or S3 . On the other hand, 0 from the selection of E− , this is also true when G[X] is a hole. Thus, G[X] is a unit interval graph, and we 0 can find two vertices x, z from X having xz ∈ E− . We find a shortest x-z path in G[X]. If the path has more than one inner vertex, then it makes a hole together with xz; as G[X] is a unit interval graph, this would 0 0 imply that there exists an inner vertex y of this path such that xy ∈ E− or yz ∈ E− . We consider then the new pair x, y or y, z accordingly. Note that their distance in G[X] is smaller than xz, and hence repeating this argument (at most |X| − 3 times) will end with two vertices with distance precisely 2 in G[X]. They are the desired u and w, while any common neighbor of them in G[X] can be v. 0 By the minimality of E− , in G + uw there exists a hole H such that arcs for its vertices cover the circle in A. This hole H necessarily passes uw, and we denote it by x1 x2 · · · x`−1 x` , where x1 = u and x` = w. 15 Note that A(u) intersects A(w), and since A is proper and Helly, A(u), A(v), A(w) cannot cover the circle; moreover, it cannot happen that A(v) intersects all the arcs A(xi ) for 1 < i < ` simultaneously. From x1 x2 · · · x`−1 x` we can find p and q such that 1 6 p < p + 1 < q 6 ` and vxp , vxq ∈ E(G) but vxi 6∈ E(G) for every p < i < q. Here possibly p = 1 and/or q = `. Then vxp · · · xq makes a hole of G, and the union 0 of its arcs covers the circle, contradicting the definition of E− . This concludes the proof. Therefore, a yes-instance on a reduced graph always has a solution that does not add any edge. By Lemma 4.2, for any editing set (V− , E− , ∅), we can always find some point α in the model and use → − E A−V− (α) to replace E− . After that, we can use the vertices “close” to this point to replace V− . Therefore, the problem again boils down to find some “weak point” in the arc model. This observation is formalized in the following lemma. We point out that this result is stronger than required by the linear-time algorithm, and we present in the current form for its own interest (see Section 6 for more discussions). Lemma 5.2. Given a proper Helly circular-arc graph G and a nonnegative integer p, we can calculate in O(m) time the minimum number q such that G has an editing set of size (p, q, 0). In the same time we can find such an editing set. Proof. We may assume that G is not chordal; otherwise, by Corollary 2.3, G is a unit interval graph and the problem becomes trivial because an empty set will suffice. Let us fix a proper and Helly arc model A for G. The lemma follows from Lemma 3.1 when there is some point ρ satisfying KA (ρ) 6 p. Hence, we may assume that no such point exists, and for any subset V− of at most p vertices, G − V− remains a proper Helly circular-arc graph and is non-chordal. Hence, q > 0. For each point ρ in A, we can ρ ρ define an editing set (V− , Eρ− , ∅) by taking the p vertices in KA (ρ) with the most clockwise arcs as V− and → − ρ ρ E A−V− (ρ) as E− . We argue first that the minimum cardinality of this edge set, taken among all points in A is the desired number q. See Fig. 9. ∗ Let (V− , E∗− , ∅) be an editing set of G with size (p, q, 0). According to Lemma 4.2, there is a point α → − 0 ∗ 0 such that the deletion of E− := E A−V−∗ (α) from G − V− makes it a unit interval graph and |E− | 6 |E∗− |. ∗ We now consider the original model A. Note that a vertex in V− is in either KA (α) or {v 6∈ KA (α) : u → v, u ∈ KA (α)}; otherwise replacing this vertex by any end of an edge in E∗− , and removing this edge from ∗ E∗− gives an editing set of size (p, q − 1, 0). Let V− comprise the |V− ∩ KA (α)| vertices of KA (α) whose ∗ arcs are the most clockwise in them, as well as the first |V− \ KA (α)| vertices whose arcs are immediately → − to the right of α. And let E− := E A−V− (α). It is easy to verify that |E− | 6 |E∗− | = q and (V− , E− , ∅) is also an editing set of G (Lemma 4.1). Note that arcs for V− are consecutive in A. Let v be the vertex in V− with the most clockwise arc, and then ccp(v) +  is the desired point ρ. We give now the O(m)-time algorithm for finding the desired point, for which we assume that A is 0.5 canonical. It suffices to consider the 2n points i + 0.5 for i ∈ {0, . . . , 2n − 1}. We calculate first the V− 0.5 0.5 and E− , and maintain a queue that is initially set to be V− . For i = 1, . . . , 2n − 1, we deduce the new i+0.5 i−0.5 sets V− and Ei+0.5 from V− and Ei−0.5 as follows. If i is a clockwise endpoint of some arc, then − − i+0.5 i−0.5 i+0.5 i−0.5 V− = V− and E− = E− . Otherwise, i = ccp(v) for some vertex v, then we enqueue v, and i+0.5 dequeue u. We set V− to be the vertices in the queue, whose size remains p. The different edges i+0.5 i−0.5 between E− and E− are those incident to u and v. In particular, Ei+0.5 \ Ei−0.5 = {ux : u → x, x 6∈ − − i+0.5 i−0.5 i+0.5 i−0.5 0.5 V− }, while E− \ E− = {xv : x → v, x 6∈ V− }. Note that the initial sets V− and E0.5 − can be found in O(m) time, and then each vertex and its adjacency is scanned exactly once. The total running time is O(m). This concludes the proof. u v β α Figure 9: Illustration for the proof of α Lemma 5.2. Here p = 2 and q = 3. Then V− α consists of the two thick arcs, and |E− | = 3. Moving from point α to β (= α + 1) gives α |Eβ − | = |E− | + 4 − 2 = 5. Again, one should note that in the general case (when both p, q > 0), the point identified by Lemma 5.2 may not be the thinnest point for vertices or the thinnest point for edges, as specified by respectively 16 Lemmas 3.1 and 4.2. Indeed, for different values of p, the thinnest points found by Lemma 5.2 may be different. The mixed hole covers consists of both vertices and edges, and thus the combinatorial characterization given in Lemma 5.2 extends Lemmas 3.1 and 4.2. The algorithm used in the proof is similar as that of Theorem 4.3. Recall that a reduced graph is a proper Helly circular-arc graph. Thus, Lemmas 5.1 and 5.2 have the following consequence: It suffices to call the algorithm with p = k1 , and returns the found editing set if q 6 k2 , or “NO” otherwise. Corollary 5.3. The unit interval editing problem can be solved in O(m) time on reduced graphs. Putting together these steps, the fixed-parameter tractability of unit interval editing follows. Note that to fill a hole, we need to add an edge whose ends have distance 2. Proof of Theorem 1.4. We start by calling Theorem 2.5. If a subgraph in F or W5 is detected, then we branch on all possible ways of destroying it or the contained C5 . Otherwise, we have in our disposal a proper and Helly arc model for G, and we call Lemma 2.8 to find a shortest hole C` . If ` 6 k3 + 3, then we either delete one of its ` vertices and ` edges, or add one of ` edges hi hi+2 (the subscripts are modulo `). One of the three parameters decreases by 1. We repeat these two steps until some parameter becomes negative, then we terminate the algorithm by returning “NO”; or the graph is reduced, and then call the algorithm of Corollary 5.3 to solve it. The correctness of this algorithm follows from Lemma 2.8 and Corollary 5.3. In the disposal of a subgraph of F, at most 21 recursive calls are made, while 3` for a C` , each having a parameter k − 1. Therefore, the total number of instances (with reduced graphs) made in the algorithm is O((3k3 + 21)k ). It follows that the total running time of the algorithm is 2O(k log k) · m. It is worth mentioning that Lemma 5.2 actually implies a linear-time algorithm for the unit interval deletion problem (which allows k1 vertex deletions and k2 edge deletions) on the proper Helly circular-arc graphs and an O(10k1 +k2 · m)-time algorithm for it on general graphs. The constant 10 can be even smaller if we notice that (1) the problem is also easy on fat W5 ’s, and (2) the worst cases for vertex deletions (S3 ’s and S3 ’s) and edge deletions (C4 ’s) are different. 6 Concluding remarks All aforementioned algorithms exploit the characterization of unit interval graphs by forbidden induced subgraphs [29]. Very recently, Bliznets et al. [4] used a different approach to produce a subexponentialtime parameterized algorithm for unit interval completion (whose polynomial factor is however not linear). Using a parameter-preserving reduction from vertex cover [21], one can show that the vertex deletion version cannot be solved in 2o(k) · nO(1) time, unless the Exponent Time Hypothesis fails [7]. Now that the edge deletion version is FPT as well, one may want to ask to which side it belongs. The evidence we now have is in favor of the hard side: In all related graph classes, the edge deletion versions seem to be harder than their vertex deletion counterparts. As said, it is not hard to slightly improve the constant c in the running time O(ck · m), but a significant improvement would need some new observation(s). More interesting would be to fathom their limits. In particular, can the deletion problems be solved in time O(2k · m)? Polynomial kernels for unit interval completion [2] and unit interval vertex deletion [13] have been known for a while. Using the approximation algorithm of Theorem 1.2, we [19] recently developed an O(k4 )-vertex kernel for unit interval vertex deletion, improving from the O(k53 ) one of Fomin et al. [13]. We conjecture that the unit interval edge deletion problem also has a small polynomial kernel. The algorithm for unit interval editing is the second nontrivial FPT algorithm for the general editing problem. The main ingredient of our algorithm is the characterization of the mixed deletion of vertices and edges to break holes. A similar study has been conducted in the algorithm for the chordal editing problem [10]. In contrast to that, Lemmas 5.1 and 5.2 are somewhat stronger. For example, we have shown that once small forbidden subgraphs have been all fixed, no edge additions are further needed. Together with Marx, we had conjectured that this is also true for the chordal editing problem, but we failed to find a proof. Very little study had been done on the mixed deletion of vertices and edges [25]. We hope that our work will trigger more studies on this direction, which will further deepen our understanding of various graph classes. We point out that although we start by breaking small forbidden induced subgraphs, our major proof technique is instead manipulating (proper/unit) interval models. The technique of combining 17 (a) F1 (f) K2,3 (b) F2 (d) † (c) F3 (g) F4 (h) F5 (i) F6 (j) F7 (e) ‡ (k) F8 (l) F9 Figure 10: Forbidden induced graphs. Circular-arc Normal circular-arc Helly circular-arc ∗ claw S3 W5 F1 F2 F6 F7 S3∗ C`∗ C2` C2`−1 F2 F3 F8 F9 K2,3 C6 F4 F5 † ‡ C`∗ W` C` Proper circular-arc Normal Helly circular-arc Chordal W4 S3 {CI(n, k) : n > 2k} claw C` F2 F3 † ‡ Proper Helly circular-arc Unit circular-arc W4 Interval {CI(n, k) : n > 3k} Unit Helly circular-arc claw C` Unit interval = Proper interval Figure 11: Forbidden induced subgraphs and containment relations of related graph classes (` > 4) (constructive) interval models and (destructive) forbidden induced subgraphs is worth further study on related problems. Appendix For the convenience of the reader, we collect related graph classes and their containment relations in Fig. 11, which is adapted from Lin et al. [22] (note that some of these graph classes are not used in the present paper). The CI(n, k) graphs are defined by Tucker [27]; see also [22]. Other subgraphs that have not been introduced in the main text are depicted in Fig. 10. The relations in Fig. 11 can be viewed both from the intersection models, arcs or intervals, and forbidden induced subgraphs, every minimal forbidden induced subgraph of a super-class being a (not necessarily minimal) forbidden induced subgraph of its subclass. For example, Proposition 2.6 and Corollary 2.7 are actually properties of normal Helly circular-arc graphs. For a normal Helly circular-arc graph that is not chordal, every arc model has to be normal and Helly [22, 9]. This is also true for the subclass of proper Helly circular-arc graphs, but an arc model for a proper Helly circular-arc graph may not be proper. A word of caution is worth on the definition of proper Helly circular-arc graphs. One graph might admit two arc models, one being proper and the other Helly, but no arc model that is both proper and 18 Helly, e.g., the S3 and the W4 . Therefore, the class of proper Helly circular-arc graphs does not contain all those graphs being both proper circular-arc graphs and Helly circular-arc graphs, but a proper subclass of it. A similar remark applies to normal Helly circular-arc graphs. For the three classes at the top of Fig. 11, their characterizations by minimal forbidden induced subgraphs are still open. At the third level, the minimal forbidden induced subgraphs for proper circulararc graphs and normal Helly circular-arc graphs are completely determined by Tucker [27] and Cao et al. [9]. For all the classes at lower levels, their forbidden induced subgraphs with respect to its immediate super-classes are given. From them we are able to derive all the minimal forbidden induced subgraphs for each of these classes. For example, the characterization of unit interval graphs (Theorem 2.1) follows from the characterization of interval graphs and that we can find a claw in an F2 , an F3 , a † that is not an S3 , or a ‡ that is not an S3 . Likewise, the minimal forbidden induced subgraphs of proper Helly circular-arc graphs stated in Theorem 2.2 can be derived from those of proper circular-arc graphs and by Corollary 5 of [22]: A proper circular-arc graph that is not a proper Helly circular-arc graph must contain a W4 or S3 . Clearly, S∗3 contains an S3 . To see that each of F1 , F2 , F6 , F7 , and C2` , C∗2`−1 for ` > 4 contain a W4 , it is equivalent to check that each of F1 , F2 , F6 , F7 , and C2` , C∗2`−1 for ` > 4 contains a W4 , i.e., two non-incident edges and another independent vertex v. This can be directly read from Fig. 10 for F1 , F2 , F6 , F7 . Let h1 , h2 , . . . denote the vertices in the hole of C2` and C∗2`−1 . Then edges h1 h2 and h4 h5 are non-incident. In a C∗7 , the vertex not in the hole can be the v, while in all other holes longer than 7, the vertex h7 can be the v. References [1] Jørgen Bang-Jensen and Pavol Hell. On chordal proper circular arc graphs. Discrete Mathematics, 128(1):395– 398, 1994. doi:10.1016/0012-365X(94)90130-9. [2] Stéphane Bessy and Anthony Perez. Polynomial kernels for proper interval completion and related problems. Information and Computation, 231:89–108, 2013. doi:10.1016/j.ic.2013.08.006. [3] René van Bevern, Christian Komusiewicz, Hannes Moser, and Rolf Niedermeier. Measuring indifference: Unit interval vertex deletion. In Dimitrios M. Thilikos, editor, Graph-Theoretic Concepts in Computer Science (WG), volume 6410 of LNCS, pages 232–243. Springer, 2010. doi:10.1007/978-3-642-16926-7_22. [4] Ivan Bliznets, Fedor V. Fomin, Marcin Pilipczuk, and Michał Pilipczuk. A subexponential parameterized algorithm for proper interval completion. SIAM Journal on Discrete Mathematics, 29(4):1961–1987, 2015. A preliminary version appeared in ESA 2014. doi:10.1137/140988565. [5] Hans L. Bodlaender and Babette van Antwerpen-de Fluiter. On intervalizing k-colored graphs for DNA physical mapping. Discrete Applied Mathematics, 71(1-3):55–77, 1996. A preliminary version appeared in ICALP 1995. doi:10.1016/S0166-218X(96)00057-1. [6] Pablo Burzyn, Flavia Bonomo, and Guillermo Durán. NP-completeness results for edge modification problems. Discrete Applied Mathematics, 154(13):1824–1844, 2006. doi:10.1016/j.dam.2006.03.031. [7] Leizhen Cai. Fixed-parameter tractability of graph modification problems for hereditary properties. Information Processing Letters, 58(4):171–176, 1996. doi:10.1016/0020-0190(96)00050-6. [8] Yixin Cao. Linear recognition of almost interval graphs. In Krauthgamer [20], pages 1096–1115. Full version available at arXiv:1403.1515. doi:10.1137/1.9781611974331.ch77. [9] Yixin Cao, Luciano N. Grippo, and Martı́n D. Safe. Forbidden induced subgraphs of normal Helly circular-arc graphs: Characterization and detection. Discrete Applied Mathematics, 216:67–83, 2017. doi:10.1016/j.dam. 2015.08.023. [10] Yixin Cao and Dániel Marx. Chordal editing is fixed-parameter tractable. Algorithmica, 75(1):118–137, 2016. A preliminary version appeared in STACS 2014. doi:10.1007/s00453-015-0014-x. [11] Xiaotie Deng, Pavol Hell, and Jing Huang. Linear-time representation algorithms for proper circular-arc graphs and proper interval graphs. SIAM Journal on Computing, 25(2):390–403, 1996. doi:10.1137/ S0097539792269095. [12] Rodney G. Downey and Michael R. Fellows. Fundamentals of Parameterized Complexity. Undergraduate texts in computer science. Springer, 2013. doi:10.1007/978-1-4471-5559-1. [13] Fedor V. Fomin, Saket Saurabh, and Yngve Villanger. A polynomial kernel for proper interval vertex deletion. SIAM Journal on Discrete Mathematics, 27(4):1964–1976, 2013. A preliminary version appeared in ESA 2012. doi:10.1137/12089051X. [14] Delbert R. Fulkerson and Oliver A. Gross. Incidence matrices and interval graphs. Pacific Journal of Mathematics, 15(3):835–855, 1965. doi:10.2140/pjm.1965.15.835. 19 [15] Fănică Gavril. Algorithms on circular-arc graphs. Networks, 4:357–369, 1974. doi:10.1002/net.3230040407. [16] Paul W. Goldberg, Martin C. Golumbic, Haim Kaplan, and Ron Shamir. Four strikes against physical mapping of DNA. Journal of Computational Biology, 2(1):139–152, 1995. doi:10.1089/cmb.1995.2.139. [17] Pim van ’t Hof and Yngve Villanger. Proper interval vertex deletion. Algorithmica, 65(4):845–867, 2013. doi:10.1007/s00453-012-9661-3. [18] Haim Kaplan, Ron Shamir, and Robert Endre Tarjan. Tractability of parameterized completion problems on chordal, strongly chordal, and proper interval graphs. SIAM Journal on Computing, 28(5):1906–1922, 1999. A preliminary version appeared in FOCS 1994. doi:10.1137/S0097539796303044. [19] Yuping Ke, Yixin Cao, Xiating Ouyang, and Jianxin Wang. Unit interval vertex deletion: Fewer vertices are relevant. arXiv:1607.01162, 2016. [20] Robert Krauthgamer, editor. Proceedings of the 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). SIAM, 2016. doi:10.1137/1.9781611974331. [21] John M. Lewis and Mihalis Yannakakis. The node-deletion problem for hereditary properties is NP-complete. Journal of Computer and System Sciences, 20(2):219–230, 1980. Preliminary versions independently presented in STOC 1978. doi:10.1016/0022-0000(80)90060-4. [22] Min Chih Lin, Francisco J. Soulignac, and Jayme L. Szwarcfiter. Normal Helly circular-arc graphs and its subclasses. Discrete Applied Mathematics, 161(7-8):1037–1059, 2013. doi:10.1016/j.dam.2012.11.005. [23] Yunlong Liu, Jianxin Wang, Jie You, Jianer Chen, and Yixin Cao. Edge deletion problems: Branching facilitated by modular decomposition. Theoretical Computer Science, 573:63–70, 2015. doi:10.1016/j.tcs.2015.01.049. [24] Dániel Marx. Chordal deletion is fixed-parameter tractable. Algorithmica, 57(4):747–768, 2010. A preliminary version appeared in WG 2006. doi:10.1007/s00453-008-9233-8. [25] Dániel Marx, Barry O’Sullivan, and Igor Razgon. Finding small separators in linear time via treewidth reduction. ACM Transactions on Algorithms, 9(4):30.1–30.35, 2013. A preliminary version appeared in STACS 2010. doi:10.1145/2500119. [26] Fred S. Roberts. Indifference graphs. In Frank Harary, editor, Proof Techniques in Graph Theory (Proc. Second Ann Arbor Graph Theory Conf., 1968), pages 139–146. Academic Press, New York, 1969. [27] Alan C. Tucker. Structure theorems for some circular-arc graphs. Discrete Mathematics, 7(1-2):167–195, 1974. doi:10.1016/S0012-365X(74)80027-0. [28] Yngve Villanger. Proper interval vertex deletion. In Venkatesh Raman and Saket Saurabh, editors, Parameterized and Exact Computation - IPEC 2010, volume 6478 of LNCS, pages 228–238. Springer, 2010. doi:10.1007/ 978-3-642-17493-3_22. [29] Gerd Wegner. Eigenschaften der Nerven homologisch-einfacher Familien im Rn . PhD thesis, Universität Göttingen, 1967. [30] Mihalis Yannakakis. Computing the minimum fill-in is NP-complete. SIAM Journal on Algebraic and Discrete Methods, 2(1):77–79, 1981. doi:10.1137/0602010. 20
8cs.DS
arXiv:1709.07565v1 [cs.CV] 22 Sep 2017 NOVEL EVALUATION METRICS FOR SEAM CARVING BASED IMAGE RETARGETING Tam V. Nguyen Guangyu Gao Department of Computer Science University of Dayton Email: [email protected] School of Software Beijing Institute of Technology Email: [email protected] ABSTRACT Image retargeting effectively resizes images by preserving the recognizability of important image regions. Most of retargeting methods rely on good importance maps as a cue to retain or remove certain regions in the input image. In addition, the traditional evaluation exhaustively depends on user ratings. There is a legitimate need for a methodological approach for evaluating retargeted results. Therefore, in this paper, we conduct a study and analysis on the prominent method in image retargeting, Seam Carving. First, we introduce two novel evaluation metrics which can be considered as the proxy of user ratings. Second, we exploit salient object dataset as a benchmark for this task. We then investigate different types of importance maps for this particular problem. The experiments show that humans in general agree with the evaluation metrics on the retargeted results and some importance map methods are consistently more favorable than others. Fig. 1. The flowchart of Seam Carving on a given image with the importance map from different methods, namely, edge detector, human fixation predictor, and salient object detector. The removal map is later generated by highlighting the least important seams. The red lines are represented the removal seams. The accordingly retargeted images are finally constructed by removing the red lines to reach the desired size. Index Terms— Seam Carving, Image Retargeting, Visual Saliency 1. INTRODUCTION Image retargeting, sometimes referred as image cropping, thumbnailing, or resizing, is beneficial for some practical scenarios, i.e., facilitating large image viewing in small size displays, particularly on mobile devices. This is a very challenging task since it requires preserving the relevant information while maintaining an aesthetically pleasing image for viewers. The premise of this task is to remove indistinct regions and retain the context with the most salient regions. In the pioneering work, Setlur et al. [1] propose using an importance map of the source image obtained from saliency and face detection. In the importance map, the pixels with higher values are most likely preserved and vice versa. If the specified size contains all the important regions, the source image is simply cropped. Otherwise, the important regions are removed from the image, and fill the resulting “holes” using the background creation technique. Later, Avidan et al. [2] propose the Seam Carving method based on the importance map computed from gradient magnitude. Seam Carving functions by constructing a number of seams (paths of least importance) in an image and automatically removes seams to reduce image size. Zhang et al. [3] present an image resizing method that attempts to ensure that important local regions undergo a geometric similarity transformation, and at the same time, image edge structure is preserved. Suh et al. [4] propose a general thumbnail cropping method based on a saliency model that finds the informative portion of images and cuts out the non-core part of images. Marchesotti et al. [5] propose a framework for image thumbnailing based on visual similarity. Their underlying assumption is that images sharing their global visual appearance are likely to share similar saliency values. While other works are dedicated to still images, Chamaret and Le Meur [6] propose a video retargeting algorithm. Meanwhile, Rubinstein et al. [7] extend Seam Carving [2] into video retargeting. To date, the existing evaluation scheme mostly depends on user ratings. However, it is not always feasible to recruit a large pool of participants for the evaluation. Also, there is mostly impossible to get the same participant pool of a previous work to make a fair comparison. Thus there is a legitimate need of an automatic way to evaluate these retargeting methods. In this paper, we revisit and further analyze Fig. 2. The two novel metrics, namely, Mean Area Ratio, and Mean Sum of Squared Distances. From left to right: Original image, (a) the ground truth saliency map, (b) the shape points of the ground truth map, (c) the retargeted ground truth map from COV [8], (d) the shape points of the retargeted ground truth map, (e) the mean area ratio map, (f) the mapping between two correspondence sets. the most popular method, Seam Carving, for image retargeting. Our contribution is two-fold. First, we propose two novel metrics to systematically evaluate the retargeting algorithms, namely, Mean Area Ratio (MAR) and Mean Sum of Squared Distances (MSSD). Our novel metrics focus on how much shape of the salient object(s) is distorted after the retargeting process. Second, we evaluate various types of importance map, namely, fixation prediction map, salient object map, and edge map, with the newly proposed metrics. 2. SEAM CARVING REVISIT AND PROPOSED EVALUATION METRICS 2.1. Seam Carving Revisit Seam Carving, the most popular method in image retargeting, aims to automatically retarget the images into a certain size to facilitate the viewing purpose as aforementioned. Let I be an m × n image. As illustrated in Figure 1, the first step is the computation of an importance map S, which quantifies the importance of every pixel in the image. Every pixel in the importance map is assigned a value within [0, 1], where higher values mean higher importance. Assume I is a landscape image where n > m, we aim to reduce its width. The vertical seam s, an 8-connected path in the image from the top to the bottom containing one pixel per row, is defined as below: m s = {si }m i=1 = {(i, y(i))}i=1 , s.t.∀i, |y(i) − y(i − 1)| ≤ 1, (1) where y(i) is the corresponding column of row i within the seam. Our goal is to find the optimal seam that minimizes: s∗ = min s m X S(si ), (2) i=1 where S(si ) is the importance value of one seam pixel. Eqn. (2) can be solved by dynamic programming. This optimal seam is later removed out of the input image. This process repeats until the image reaches its desired dimension. It is worth noting that the recent years witness the rapid popularity of smartphones and tablets that equips people with imaging capabilities. In fact, people are taking photos in different ways. Traditional filmmakers take more photos about the landscape than human figures. However, on a mobile phone, people prefer to take pictures in the portrait mode. Due to this difference in people’s preferences, applications like Instagram have been developed which meets the demands of both groups of people by asking them to crop the image to the square size. In the social media, most of profile images are in the square form, i.e., Facebook and Twitter. One reasonable explanation is that squared photos display well in a feed format. In this work, we utilize the Seam Carving method into an application, so called Make-It-Square, which automatically retargets images into the square size. In particular, the Seam Carving process loops for n − m times until the landscape image reaches its expected square size. For the portrait image, we transpose the image and use the same function to find the optimal vertical seam. 2.2. Proposed Evaluation Metrics In order to mitigate the dependency of user ratings, we propose two additional metrics to systematically evaluate the retargeting algorithms, namely, Mean Area Ratio and Mean Sum of Squared Distances. Our motivation is that the users prefer the shape of the salient object(s) is preserved after the image retargeting process as discussed in [2]. As shown in Fig. 1, the distorted boxes in the first two rows (retargeted images) are not entertained by the viewers. Our first metric, the Mean Area Ratio, measures how much the salient object(s) can be preserved after the image retargeting. We simultaneously remove seams on both the original image and its ground truth saliency map. Obviously, the retargeted groundtruth map has the exactly same size with the retargeted image. For each input image, the area ratio is computed as the ratio between the salient regions in the retargeted ground truth map and the ground truth salient areas, as Fig. 3. From left to right: Original image, and importance maps from 6 different methods: (a) Sobel edge map [9], (b) Structured edge map [10], (c) boolean map based saliency (BMS [11]), (d) saliency based on region covariance (COV [8]), (e) high-dimensional color transform (HDCT [12]), (f) discriminative regional feature integration (DRFI [13]). shown in Fig. 2e. The area ratio is 1 when the whole salient regions are retained. The Mean Area Ratio, MAR, for a set of input images is computed over the area ratios of all images. Our second metric, the Mean Sum of Squared Distances, evaluates the shape similarity of the salient regions before and after the image retargeting. We adopt Shape Contexts [14] to measure the shape similarity. For each image, Shape Contexts compute the shape correspondences of two given silhouettes (the ground truth map and the retargeted ground truth maps as shown in Fig. 2b, d). Next, the distances between two correspondence sets are summed as illustrated in Fig. 2f. The sum of squared distances is 0 when two shapes are identical. Eventually the Mean Sum of Squared Distances, MSSD, is computed across over all images. Actually, the two proposed evaluation metrics are complementary to each other. MAR measures how much salient object(s) are maintained, whereas MSSD measures the amount of distortion after the image retargeting process. 2.3. Selection of Importance Map In literature, the edge map is first introduced as the importance map for image retargeting problem [2]. Additionally, the importance level can be measured by visual saliency values. There exist two popular outputs of visual saliency prediction, namely, the predicted human fixation map for fixation prediction, and the salient object map for salient object/region detection. In literature, there also exist many efforts to predict visual saliency with different cues, i.e., depth matters [15], audio source [16], touch behavior [17], object proposals [18, 19], and semantic priors [20]. In this paper, we consider three types of importance maps as follows. Edge map is retrieved from the edge detection process, a fundamental task in computer vision since the early 1970’s [21, 22]. Early works [9, 23] focused on the detection of intensity or color gradients. For example, the popular Sobel detector [9] computes an approximation of the gradient of the image intensity function. Recently, Dollar et al. [10] proposed structured edge detection (SE) by formulating the problem of edge detection as predicting local segmentation masks given input image patches. In this work, we consider different edge detectors [9, 10]. Fixation prediction map is obtained from trained models which are constructed originally to understand human viewing patterns. Actually, these models aim to predict points that people look at (freeviewing of natural scenes usually for 35 seconds). The typical ground-truth fixation map includes several fixation points smoothened by a Gaussian kernel. We consider using two state-of-the-art models, namely, Boolean Map based Saliency (BMS [11]) and saliency based on region covariance (COV [8]) for the later evaluation. Salient object map is computed from models which aim to detect and segment the most salient object(s) as a whole. Note that a typical pixel-accurate ground-truth map usually contains several regions marked by humans. As recommended in the extensive survey [24], we consider two state-of-the-art models, namely, saliency based on Discriminative Regional Feature Integration (DRFI [13]) and HighDimensional Color Transform (HDCT [12]). Fig. 3 shows the importance maps generated from different computational methods. Note that edge maps and fixation prediction maps are of low resolution and highlight edges whereas the salient object maps focus on the entire objects. 3. EVALUATION It is obvious that the benchmark of image retargeting task requires a set of input images with their corresponding saliency map. This requirement elegantly fits the settings of salient object datasets. Therefore, we exploit the popular MSRA-1000 dataset [25], which contains 1, 000 images with the annotated pixel-wise ground truth of salient regions, for the evaluation. We first show the visual comparison of retargeted images from different importance maps. As observed from Fig. 4, the retargeted results from salient object detection methods well preserve the main salient objects without distortion. Though fixation prediction is in general biologically plausible and suggests important regions as the way as humans look at, their retargeted images lose details. Meanwhile, the retargeted images from edge-based importance map lose both details and layout structure. Next, we conduct a user study to evaluate the performance of retargeted images from different input saliency maps on previously mentioned MSRA-1000 dataset [25]. We run Make-It-Square on the dataset to obtain 1, 000 retargeted squared images. 40 participants (14 are female) who are Fig. 4. Visual comparison of retargeted images from different importance maps on MSRA-1000 dataset [25]. From left to right: Original image, the ground truth saliency map, the pairs of retargeted image and the retargeted groundtruth saliency map with the importance maps from Sobel, Structured Edge (SE), BMS, VOC, HDCT, DRFI, respectively. (Please view in high 400% resolution for best visual effect). Table 1. The performance of different importance maps on image retargeting. Importance Map Sobel [9] Structured Edge [10] COV [8] BMS [11] HDCT [12] DRFI [13] User Ratings 1.3 1.9 3.5 3.2 5.4 5.7 MAR 0.8976 0.9132 0.9581 0.9638 0.9840 0.9877 MSSD 0.0406 0.0402 0.0395 0.0395 0.0387 0.0389 university staff/students are involved in this experiment, and a set of images is provided to each participant. Note that every image set contains 50 random images and six other retargeted results where each method is randomly labeled from 1 to 6 to hide identities. The participant is requested to rate all methods with the scores (1-6), where 1 means bad viewing experience and 6 means excellent viewing experience. As shown in Table 1, users prefer the salient object map methods, HDCT [12] and DRFI [13], whereas the retargeted results from edge map, Sobel [9], Structured Edge [10], receive the least rating. We then compute two evaluation metrics, MAR and MSSD, and the results are generally similar with user ratings. Also shown in Table 1, the retargeted images obtained from the salient object map source are consistently more favorable than others, namely, achieving the highest MAR and the lowest MSSD. On the contrary, the retargeted results of edge maps receive the lowest MAR and the highest MSSD. In addition, we further compute the Pearson coefficient correlations (CC) (defined in [24]) between user ratings and the two novel metrics. Note that the correlation of one met- Table 2. The Pearson coefficient correlation [24] among three metrics, user ratings, MAR and MSSD. User Ratings MAR - MSSD User Ratings 1 0.955 0.977 MAR 0.955 1 0.981 - MSSD 0.977 0.981 1 ric score and itself is 1. As shown in Table 2, the CCs between user ratings and MAR and negative MSSD are 0.955 and 0.977, respectively. This demonstrates those two metrics are highly correlated with users’s responses. Hence, the proposed metrics can be used as the proxy of user ratings. 4. CONCLUSION AND FUTURE WORK In this paper, we introduce two novel metrics to automatically evaluate Seam Carving for the image retargeting task. We utilized salient object dataset as a benchmark and showed that the newly proposed metrics are highly correlated with the user ratings across six different importance maps. We also found that the retargeted results, with the salient object map used as the importance map, are consistently more favorable than others. We believe that the new benchmark type and our evaluation measures will lead to improved retargeting algorithms, as well as better understanding of image retargeting problem. For future work, we aim to investigate other image retargeting operators apart from Seam Carving. We also would like to extend our work by considering additional cues, e.g., the depth in RGBD images or motion information in videos. 5. REFERENCES [1] Vidya Setlur, Saeko Takagi, Ramesh Raskar, Michael Gleicher, and Bruce Gooch, “Automatic image retargeting,” in International Conference on Mobile and Ubiquitous Multimedia, 2005, pp. 59–68. [2] Shai Avidan and Ariel Shamir, “Seam carving for content-aware image resizing,” ACM Trans. Graph., vol. 26, no. 3, pp. 10, 2007. [3] Guo-Xin Zhang, Ming-Ming Cheng, Shi-Min Hu, and Ralph R Martin, “A shape-preserving approach to image resizing,” in Computer Graphics Forum, 2009, vol. 28, pp. 1897–1906. [4] Bongwon Suh, Haibin Ling, Benjamin B Bederson, and David W Jacobs, “Automatic thumbnail cropping and its effectiveness,” in ACM UIST, 2003, pp. 95–104. [5] Luca Marchesotti, Claudio Cifarelli, and Gabriela Csurka, “A framework for visual saliency detection with applications to image thumbnailing,” in International Conference on Computer Vision, 2009, pp. 2232–2239. [6] Christel Chamaret and Olivier Le Meur, “Attentionbased video reframing: validation using eye-tracking,” in International Conference on Pattern Recognition, 2008, pp. 1–4. [7] Michael Rubinstein, Ariel Shamir, and Shai Avidan, “Improved seam carving for video retargeting,” ACM TOG., vol. 27, no. 3, 2008. [8] Erkut Erdem and Aykut Erdem, “Visual saliency estimation by nonlinearly integrating features using region covariances,” Journal of Vision, vol. 13, no. 4, pp. 1–20, 2013. [9] I. Sobel and G. Feldman, “A 3x3 Isotropic Gradient Operator for Image Processing,” 1968. [10] Piotr Dollár and C. Lawrence Zitnick, “Fast edge detection using structured forests,” Transactions on Pattern Analysis and Machine Intelligence, vol. 37, no. 8, pp. 1558–1570, 2015. [11] Jianming Zhang and Stan Sclaroff, “Saliency detection: A boolean map approach,” in International Conference on Computer Vision, 2013, pp. 153–160. [12] Jiwhan Kim, Dongyoon Han, Yu-Wing Tai, and Junmo Kim, “Salient region detection via high-dimensional color transform,” in Conference on Computer Vision and Pattern Recognition, 2014, pp. 883–890. [13] Huaizu Jiang, Zejian Yuan, Ming-Ming Cheng, Yihong Gong, Nanning Zheng, and Jingdong Wang, “Salient object detection: A discriminative regional feature integration approach,” in Conference on Computer Vision and Pattern Recognition, 2013, pp. 2083–2090. [14] Serge J. Belongie, Jitendra Malik, and Jan Puzicha, “Shape matching and object recognition using shape contexts,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 4, pp. 509–522, 2002. [15] Congyan Lang, Tam V. Nguyen, Harish Katti, Karthik Yadati, Mohan S. Kankanhalli, and Shuicheng Yan, “Depth matters: Influence of depth cues on visual saliency,” in European Conference on Computer Vision, 2012, pp. 101–115. [16] Yanxiang Chen, Tam V. Nguyen, Mohan S. Kankanhalli, Jun Yuan, Shuicheng Yan, and Meng Wang, “Audio matters in visual attention,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 24, no. 11, pp. 1992–2003, 2014. [17] Bingbing Ni, Mengdi Xu, Tam V. Nguyen, Meng Wang, Congyan Lang, ZhongYang Huang, and Shuicheng Yan, “Touch saliency: Characteristics and prediction,” IEEE Transactions on Multimedia, vol. 16, no. 6, pp. 1779– 1791, 2014. [18] Tam V. Nguyen, “Salient object detection via objectness proposals,” in AAAI Conference on Artificial Intelligence, 2015, pp. 4286–4287. [19] Tam V. Nguyen and Jose Sepulveda, “Salient object detection via augmented hypotheses,” in International Joint Conference on Artificial Intelligence, 2015, pp. 2176–2182. [20] Tam V. Nguyen and Luoqi Liu, “Salient object detection with semantic priors,” in International Joint Conference on Artificial Intelligence, 2017. [21] Richard O Duda, Peter E Hart, et al., Pattern classification and scene analysis, vol. 3, Wiley New York, 1973. [22] Guner Robinson, “Color edge detection,” in 20th Annual Technical Symposium. International Society for Optics and Photonics, 1976, pp. 126–133. [23] John Canny, “A computational approach to edge detection,” Transactions on Pattern Analysis and Machine Intelligence, vol. 8, no. 6, pp. 679–698, 1986. [24] Ali Borji, Ming-Ming Cheng, Huaizu Jiang, and Jia Li, “Salient object detection: A benchmark,” Transactions on Image Processing, vol. 24, no. 12, pp. 5706–5722, 2015. [25] Radhakrishna Achanta, Sheila S. Hemami, Francisco J. Estrada, and Sabine Süsstrunk, “Frequency-tuned salient region detection,” in Conference on Computer Vision and Pattern Recognition, 2009, pp. 1597–1604.
1cs.CV
The inflation technique solves completely the classical inference problem Miguel Navascués1 and Elie Wolfe2 1 Institute for Quantum Optics and Quantum Information (IQOQI) Vienna, Austrian Academy of Sciences, Boltzmanngasse 3, 1090 Vienna, Austria 2 Perimeter Institute for Theoretical Physics, 31 Caroline St. N, Waterloo, Ontario, Canada, N2L 2Y5 arXiv:1707.06476v1 [quant-ph] 20 Jul 2017 The causal inference problem consists in determining whether a probability distribution over a set of observed variables is compatible with a given causal structure. In (Wolfe et al., 2016), one of us introduced a hierarchy of necessary linear programming constraints which all the observed distributions compatible with the considered causal structure must satisfy. In this work, we prove that the inflation hierarchy is complete, i.e., any distribution of the observed variables which does not admit a realization within the considered causal structure will fail one of the inflation tests. More quantitatively, we show that any distribution of measurable events satisfying the nth   1 √ -close in Euclidean norm to a distribution realizable within the given causal inflation test is O n structure. In addition, we show that the corresponding nth -order relaxation of thedual problem 2 consisting in maximizing a kth degree polynomial on the observed variables is O kn -close to the optimal solution. I. INTRODUCTION A Bayesian network or causal structure is a directed acyclic graph where vertices represent random variables, each of which is generated by a non-deterministic function depending on the value of its parents. Nowadays, causal structures are commonly used in bioinformatics, medicine, image processing, sports betting, risk analysis and experiments of quantum nonlocality. It is important to remark that, while some of these variables may be directly observable, some others are not. Those are called hidden or latent variables. Due to the presence of latent variables, determining whether a causal structure may be behind the statistics of the set of observable events, the so-called inference problem, is a very difficult mathematical question. Given a function on the probabilities of the measurable events, the dual of the causal inference problem is the task of computing its maximum value when evaluated over probability distributions compatible with the considered causal structure. While there are a number of more or less effective heuristics to search for probabilistic models compatible with our causality assumptions or optimizing functionals thereof (Koller and Friedman, 2009), the problem of proving the impossibility to accommodate experimental data within a given network or bounding the values of a function of such data is still open. In recent years, though, there have been many advances, see (Fritz, 2012; Fritz and Chaves, 2013; Chaves et al., 2014; Chaves et al., 2014; Chaves, 2016; Bohr Brask and Chaves, 2017). In (Wolfe et al., 2016), the authors presented the inflation technique, a hierarchy of necessary constraints, verifiable via linear programming, which any distribution realizable within the considered causal structure must satisfy. Notably, the inflation technique allowed the authors to derive polynomial inequalities for the triangle scenario (Fritz and Chaves, 2013), one of the simplest causal structures for which the inference problem is not solved. More generically, the inflation technique’s versatiliy and practical performance make it a prominent tool to attack the causal inference problem. The inflation technique also leads naturally to a simple sequence of linear programming relaxations of the dual problem when the function to evaluate is a polynomial on the probabilities of the observed variables. In this paper, we will first study the performance of the inflation method on a particular type of causal structures called causal networks. For these structures, we will show that the hierarchies of relaxations on the inference and the dual problems provided by the inflation technique are complete. In other words: any distribution of observed variables that passes all inflation tests must be realizable within the considered causal network, and the sequence of upper bounds obtained via inflation on the solution f ? of the dual problem converges to f ? asymptotically. Next, we will show that any inference (dual) problem in an arbitrary causal structure can be mapped to an inference (dual) problem in a causal network. Put together, these two results imply that the inflation technique, far from being a relaxation, is an alternative way of understanding general causal structures. This paper is organized as follows: in Section II, we will formulate the concepts of causal networks and causal structures, and introduce the inference and dual problems. In Section III, we will review the inflation technique to solve the causal inference and dual problems. In Section IV we will prove an extension of the finite de Finetti theorem (Diaconis and Freedman, 1980) for distributions admitting an “inflated” extension.  This theorem will allow us, in Section V, to prove that any distribution P passing the nth inflation test is O √1n -close in Euclidean norm to a feasible distribution within the considered causal network. From this theorem it will also follow straightforwardly  2 that the nth inflation relaxation of the dual problem differs from the optimal value on at most O kn , where k is 2 FIG. 1 A generic causal network. The independent latent variables λ1 , λ2 , ... influence the observed variables A1 , A2 , .... FIG. 2 The triangle scenario. the degree of the considered polynomial. In Section VI we will describe the mapping from causal structures to causal networks, hence extending our results to general causal structures. Finally, we will present our conclusions. II. CAUSAL NETWORKS, CAUSAL STRUCTURES AND THE CAUSAL INFERENCE PROBLEM A causal network is a type of causal structure with just two layers: a bottom layer of independently distributed latent random variables {λ1 , λ2 , ..., λL } and a top layer of observable random variables {A1 , A2 , ...}, see Figure 1. The observable distribution P (A1 , A2 , ..., Am ) is generated via non-deterministic functions Ax = Ax (λ̄Lx ), with λ̄ = (λ1 , ..., λL ) and Lx ⊂ {1, ..., L}. Here (and in the following) the notation v̄ S , where v̄ is a vector with N entries and S ⊂ {1, ..., N }, will represent the vector with entries v s , s ∈ S. Consider, for example, the causal network dubbed “the triangle scenario”, with m = L = 3, see Figure 2. Denoting A1 , A2 , A3 respectively by A, B, C, we have that a probability distribution P (A, B, C) is realizable in the triangle scenario if A, B, C are generated via the non-deterministic functions A(λ1 , λ2 ), B(λ2 , λ3 ), C(λ3 , λ1 ). Alternatively, P (A, B, C) is realizable in the triangle scenario iff it admits a decomposition of the form: P (A, B, C) = X P (λ1 )P (λ2 )P (λ3 )P (A|λ1 , λ2 )P (B|λ2 , λ3 )P (C|λ3 , λ1 ). (1) λ1 ,λ2 ,λ3 In a general causal structure, the non-deterministic functions giving rise to the observed variables can also depend on other observed variables. An example is given by the instrumental scenario (Figure 3, left), where A and λ are, respectively, a free observable and a latent variable, and the observed variables B and C are generated via the non-deterministic functions B = B(A, λ), C = C(B, λ). 3 FIG. 3 Left: the instrumental scenario. re-parenting. Right: the instrumental scenario after re-wiring, unpacking and The causal inference problem consists in, given the observable distribution P (A1 , ..., Am ), determine whether it admits a realization within the considered causal structure. More formally: Definition 1. The causal inference problem Given a causal structure C and a probability distribution over the observed variables P (A1 , ..., Am ), decide if there exists a probability distribution Q for all the random variables in C (observed or latent), compatible with this causal structure and such that the marginal distribution Q(A1 , ..., Am ) coincides with P (A1 , ..., Am ). The above definition of the causal inference problem is different from the conventional one, where, given a probability distribution over observed variables, one asks which causal models can/cannot accommodate it. However, both problems are oracle-wise equivalent. In the following, we will hence stick to Definition 1. For illustration, consider this example: if P (A, B, C) is the input of the problem and the causal structure to test is the triangle scenario, then the causal inference problem is solved either by providing probability distributions P (λ1 ), P (λ2 ), P (λ3 ), P (A|λ1 , λ2 )P (B|λ2 , λ3 )P (C|λ3 , λ1 ) such that eq. (1) holds, or by proving that no such distributions exist. In contrast, what we will call the dual inference problem consists in, given a function F on the probabilities of the observed events, to maximize its value among all distributions compatible with a given causal structure C. That is: Definition 2. The dual inference problem Given a causal structure C and a real function F of the distribution P over observed variables A1 , ..., Am , solve the optimization problem f ? = max F (P ), s.t. P admits a realization in C, (2) Note that this definition does not coincide with the standard one in the literature of probabilistic graphical models. There the dual problem consists in, given a causal structure C, identifying the set of all restrictions which affect any distribution over observed variables compatible with C. Even for the simplest causal structures, the output of such a problem can be too large to store in a normal computer. Thus in this paper we will focus on the above restricted notion of dual. Coming back to the triangle scenario, an instance of the dual problem (as defined in this paper) would be maximizing −(P (000)−1/2)2 −(P (111)−1/2)2 over all distributions P (A, B, C) with A, B, C ∈ {0, 1}, realizable within the triangle scenario. There exist a number of variational algorithms to solve problem (2) (Koller and Friedman, 2009). Similarly, there exist many heuristics which scan possible causal realizations of a given distribution of observed variables. However, general practical tools to demonstrate the irrealizability of a probability distribution or to derive upper bounds on the solution of the dual problem are scarce. One of them is the inflation technique, which we describe next. III. A QUICK OVERVIEW OF THE INFLATION TECHNIQUE Let P (A, B, C) be a distribution realizable in the triangle scenario, and suppose that we generate n independently distributed copies of λ1 , λ2 , λ3 , that is, the variables {λ1i , λ2i , λ3i : i = 1, ..., n}. Then we could define the random variables Ai,j ≡ A(λ1i , λ2j ), Bi,j ≡ B(λ2i , λ3j ), Ci,j ≡ C(λ3i , λ1j ). These variables follow a probability distribution Qn ({Ai,j }, {Bk,l }, {Cp,q }) with the property (3) 4 FIG. 4 A second-order inflation of the triangle scenario. Qn ({Aij = aij , Bkl = bkl , Cpq = cpq }) = Qn ({Aij = aπ(i)π0 (j) , Bkl = bπ0 (k)π00 (l) , Cpq = cπ00 (p)π(q) }), (4) for all permutations of n elements π, π 0 , π 00 . Moreover, the marginal distribution over the “diagonal variables” {Aii , Bii , Cii }i also satisfies the identities Qn ({Aii = ai , Bii = bi , Cii = Ci }i ) = n Y P (ai , bi , ci ). (5) i=1 See Figure 4 for the resulting causal network when n = 2. Given an arbitrary distribution P (A, B, C), the inflation technique consists in demanding the existence of a distribution Qn satisfying (4) and (5). Any such Qn will be called an nth order inflation of P . Clearly, if P (A, B, C) does not admit a nth order inflation for some n, then it cannot be realizable in the triangle scenario. Deciding the existence of an nth order inflation can be cast as a linear program (Alevras, 2001). Notice that, for any distribution Qn satisfying (4), Qn ({Aπ(i)π0 (i) = ai , Bπ0 (i)π00 (i) = bi , Cπ00 (i)π(i) = ci }i ) = Qn ({Aii = ai , Bii = bi , Cii = Ci }i ) holds for all permutations π, π 0 , π 00 . Therefore, any distribution Qn subject to the constraints (4), (5) must be such that Qn ({Aπ(i)π0 (i) = ai , Bπ0 (i)π00 (i) = bi , Cπ00 (i)π(i) = ci }i ) = n Y i=1 P (ai , bi , ci ), (6) 5 FIG. 5 The bilocality scenario. for all permutations π, π 0 , π 00 of n elements. Actually, the original description of the inflation technique in (Wolfe et al., 2016) imposes the constraints (6) rather than (4), (5) over the distribution Qn . Demanding the existence of a distribution Qn satisfying condition (6) can be shown to enforce over P (A, B, C) exactly the same constraints as demanding the existence of a distribution satisfying (4) and (5). Indeed, as noted in (Wolfe et al., 2016), any distribution Qn satisfying (6) can be twirled or symmetrized (see below) to a distribution Q̃n satisfying eqs. (4), (5). For convenience, from now on we will just refer to the formulation of the inflation technique involving the symmetries (4). This formulation has the added advantage that the symmetry constraints can be exploited to reduce the time and memory complexity of the corresponding linear program, see (Gent et al., 2006). The inflation technique is easy to generalize to relax the property of admitting an explanation in terms of arbitrary causal networks (remember, though, that causal networks are just a particular type of causal structures). Namely, one just adds to each observable variable as many subindices as latent variables it depends on, and makes the total probability distribution invariant under independent permutations of the same type of indices. The symmetry condition to impose is m 1 1 L1 m m Lm Qn ({A1ī1 = a1 (ī1 ), ...., Am (īm )) : ī1 , ..., īm }), īm = a (īm ) : ī1 , ..., īm }) = Qn ({Aī1 = a (π̄ (ī1 )), ...., Aīm = a (π̄ (7) for all vectors π̄ = (π 1 , ..., π L ) of L independent permutations (one for each latent variable or index type). Here īx denotes the tuple of subindices on which variable Ax depends. In addition, one must enforce that Qn satisfies the compatibility conditions m Qn ({A1i...i = a1i , ..., Am i...i = ai }i ) = n Y P (a1i , ..., am i ). (8) i=1 For further elucidation, consider another causal network. In the bilocality scenario, Fig. 5, we again have three random variables A, B, C which are defined, respectively, via the non-deterministic functions A(λ1 ), B(λ1 , λ2 ), C(λ2 ). As before, we assume that the latent variables λ1 , λ2 are independently distributed. In this scenario, an nth -order inflation corresponds to a distribution Qn over the variables Ai , Bjk , Cl , where i, j, k, l range from 1 to n. Qn must satisfy the linear constraints: Qn ({Ai = ai , Bjk = bjk , Cl = cl }) = Qn ({Ai = aπ(i) , Bjk = bπ(j)π0 (k) Cl = cπ0 (l) }), (9) for all permutations of n elements π, π 0 . It is also subject to the identities Qn ({Ai = ai , Bii = bi , Ci = ci }i ) = n Y P (ai , bi , ci ). (10) i=1 Note that the inflation technique also suggests a simple method to solve the dual problem, see Definition 2. Indeed, for any probability distribution q(X), let q ⊗k (X1 , ..., Xk ) represent the k-variate distribution gen1 m erated by k independent samples of q(X), and let Qkn (a11 , ..., am 1 , ..., ak , ..., ak ) denote the marginal probability 6 Qn ({Axi,...,i = axi : x = 1, ..., m, i = 1, ..., k}). Now, let F be a polynomial of degree k on the probabilities of measurable events, and consider the problem f ? ≡ maxP F (P ), where the maximization is understood over the set of all distributions P realizable in the considered causal network. From (8), we can relax this problem to f n = max F̃ (Qkn ), s.t. Qn , satisfies (7), (11) where F̃ is any linear functional such that F̃ (q(X)⊗k ) = F (q). It is immediate that f n ≥ f ? for all n and that the above can be cast as a linear program. In fact, as shown in (Wolfe et al., 2016), the inflation technique partially solves as well the conventional dual problem, where one asks which constraints any distribution compatible with the considered causal network is subject to. This is achieved by deriving, via combinatorial tools, the facets or linear inequalities which define the set of diagonal marginals of all distributions Qn satisfying eq. (9). When applied to a distribution of the form P ⊗n , each of such linear inequalities translates to a polynomial inequality to be satisfied by any distribution P (A1 , ..., Am ) over the observed variables admitting an nth -order inflation. In the next two sections, we will  prove  that, conversely, any distribution P for the set of measurable events that 1 th admits an n -order inflation is O √n -close in Euclidean norm to a distribution realizable in the considered causal  2 network. Similarly, we will show that f n = f ? + O kn . IV. A GENERALIZATION OF THE DE FINETTI THEOREM The purpose of this section is to prove the following result: 1 m Theorem 3. Let Qn be any distribution satisfying the symmetry constraints (7), and call Qkn (a11 , ..., am 1 , ..., ak , ..., ak ) x x the marginal probability Qn ({Ai,...,i = ai : x = 1, ..., m, i = 1, ..., k}). Then, there exist normalized probability P distributions Qµ (a1 , ..., am ), achievable in the considered causal network, and probabilities pµ ≥ 0, µ pµ = 1 such that ! D Qkn , X pµ Q⊗k µ µ  ≤O Lk 2 n  , (12) where D(q, r) denotes the statistical distance between the probability distributions q(X), r(X), i.e., D(q, r) = P |q(x) − r(x)|. x Proof. We will prove the result for the triangle scenario; the generalization will be obvious. Given an arbitrary distribution of 3n2 variables Qn ({Ai,j , Bk,l , Cp,q }), consider its symmetrization Q̃n , defined by Q̃n ({Aij = aij , Bkl = bkl , Cpq = cpq }) = 1 n!3 X Qn ({Aij = aπ(i)π0 (j) , Bkl = bπ0 (k)π00 (l) , Cpq = cπ00 (p)π(q) }). π,π 0 ,π 00 ∈Sn (13) ˜ Note that Q̃n = Q̃n . In addition, any distribution Qn satisfying the symmetry condition (4) fulfills Q̃n = Qn and any symmetrized distribution satisfies (4). Let δ({â(i, j), b̂(k, l), ĉ(p, q)}) be the deterministic distribution assigning the values â(i, j), b̂(k, l), ĉ(p, q) to the random variables Ai,j , Bk,l , Cp,q , for i, j, k, l, p, q ∈ {1, ..., n}. Since any distribution is a convex combination of deterministic points, it follows that any distribution satisfying eq. (4) can be expressed as a convex combination of symmetric distributions of the form δ({â(i, j), ^ b̂(k, l), ĉ(p, q)}). For ease of notation, we will assume from now on that the values {â(i, j), b̂(k, l), ĉ(p, q)} are fixed and denote the latter distribution simply by Q̃. Call Q̃1 the marginal Q̃(A1,1 , B1,1 , C1,1 ). It can be verified, by symmetry, that it is given by the formula: Q̃1 (a, b, c) = n 1 X δ(â(i, j), a)δ(b̂(j, k), b)δ(ĉ(k, i), c). n3 i,j,k=1 (14) 7 Notice that Q̃1 (a, b, c) can be reproduced in the triangle scenario. Indeed, the latent variables are i, j, k, they can take values in {1, ..., n} and are uniformly distributed. Consider now the marginal distribution Q̃k ≡ Q̃(A1,1 , B1,1 , C1,1 , ..., Ak,k , Bk,k , Ck,k ). By symmetry, it is expressed as: Q̃k (a1 , b1 , c1 , ..., ak , bk , ck ) = k X Y 1 δ(â(ix , jx ), ax )δ(b̂(jx , kx ), bx )δ(ĉ(kx , ix ), cx ), n3 (n − 1)3 ...(n − k + 1)3 x=1 (15) hī,j̄,k̄i where the sum is taken over all tuples ī, j̄, k̄ ∈ {1, ..., n}k such that ix = iy (jx = jy ) [kx = ky ] implies x = y. That is, there are no repeated indices when we move from one block of variables (ax , bx , cx ) to another. Now, compare Q̃k with (Q̃1 )⊗k . It is straightforward that (Q̃1 )⊗k (a1 , b1 , c1 , ..., ak , bk , ck ) = k Y Q̃1 (ax , bx , cx ) = x=1 k 1 XY δ(â(ix , jx ), ax )δ(b̂(jx , kx ), bx )δ(ĉ(kx , ix ), cx ), (16) n3k x=1 ī,j̄,k̄ where, this time, the sum contains all possible tuples ī, j̄, k̄ ∈ {1, ..., n}k . The statistical distance between the two 1 1 distributions is bounded by n3 (n−1)3 ...(n−k+1) 3 − n3k times the number of tuples with non-repeated indices (namely, 3 3 3 3k n (n − 1) ...(n − k + 1) ), plus 1/n times the number of tuples with repeated indices (namely, n3k − n3 (n − 1)3 ...(n − k + 1)3 ). The result is     n3 (n − 1)3 ...(n − k + 1)3 D Q̃k , (Q̃1 )⊗k ≤ 2 1 − . n3k (17) P P Finally, let Qn be any distribution satisfying eq. (4). Then, Qn = µ pµ Q̃µ , where pµ ≥ 0, µ pµ = 1 and Q̃µ is a distribution of the form δ({â(i, j),^ b̂(i, j), ĉ(p, q)}) for every µ. By convexity of the statistical distance, we have that ! D Qkn , X µ pµ (Q̃1µ )⊗k ≤ X µ pµ D  Q̃kµ , (Q̃1µ )⊗k  n3 (n − 1)3 ...(n − k + 1)3 ≤2 1− n3k    =O 3k 2 n  . (18) Extending this result to general causal networks is straightforward, so we will just sketch the proof. First, the action of the corresponding symmetrization over a deterministic distribution equals a distribution Q̃ whose 1marginal Q̃1 (a1 , ..., am ) is a uniform mixture over the tuple of indices ī of deterministic distributions of the form Qm x x Lx 1 k x=1 δ(a , a (ī )). It thus follows that Q̃ is realizable within the causal network. The k-site marginal Q̃ is also a uniform mixture of deterministic distributions of a similar type, but where no repeated indices are allowed between the different blocks of variables. The statistical difference between Q̃k and (Q̃1 )⊗k is thus bounded by nL (n − 1)L ...(n − k + 1)L 2 1− nkL    =O Lk 2 n  . (19) V. PROOF OF CONVERGENCE OF THE INFLATION TECHNIQUE Now we are ready to prove our first main result. Let P be a probability distribution over the observed P variables, and suppose that P admits an nth -order inflation Qn . Define the second-degree polynomial N (R) = ā (R(ā) − P (ā))2 , and let Ñ be a linear functional such that Ñ (q ⊗2 ) = N (q) for all distributions q. Note that, due to conditions (8), Ñ (Q2n ) = N (P ) = 0. Invoking the theorem in the previous section, we have that 8 ! 0 = N (P ) =Ñ (Q2n ) = Ñ X pµ Q⊗2 µ +O µ   L = n   L = n µ   X L pµ N (Qµ ) + O , n µ X pµ Ñ (Q⊗2 µ )+O (20) where {Qµ }µ are The above implies that, for some µ,  distributions realizable within the considered causal structure. th N (Qµ ) ≤ O L . In other words: for any distribution P admitting an n -order inflation, there exists a realizable n q  L distribution Q that is O n -close to P in the Euclidean norm. Since the set of compatible distributions is closed (Rosset et al., 2016), taking the limit n → ∞ it follows that any distribution P passing all inflation tests must be realizable. Finally, notice that the previous argument can also be used to prove the convergence of the sequence of linear programs (11). In effect, let F be a polynomial of degree k, with f ? = maxP F (P ), and let f n be defined as in (11). Then, by the extended de Finetti theorem, we have that  2  2 X Lk Lk ? n ? f ≤f = pµ F (Qµ ) + O ≤f +O . (21) n n µ In certain practical cases, we may not know the full probability distribution of the observable variables, but only the probabilities of a restricted set E of measurable events. To apply the inflation technique to those cases, rather than fixing the value of all probability products, like in eq. (8), we would impose the constraint n X X m Qn ({A1i...i = a1i , ..., Am i...i = ai }i ) = i=1 ~ ai ∈ei n Y P (ei ), (22) i=1 where e1 , ..., en ∈ E. Any distribution Qn satisfying both (7) and (22) will also be dubbed an nth order inflation of the distribution of measurable events. For example, consider again the triangle scenario (Fig. 2), and assume that our experimental setup just allows us to detect events of the form e(a) ≡ {(A, B, C) : A = B = C = a}. Then our set of measurable events is E = ∪a {e(a)} and the input of the causal inference problem is the distribution {P (e), e ∈ E}. An nth order inflation Qn of P (e) would satisfy eq. (4) and the linear conditions Qn ({Aii = ai , Bii = ai , Cii = ai }i ) = n Y P (e(ai )). (23) i=1 The proofs P of convergence presented above easily extend to this scenario. Indeed, choosing the polynomial N such that N (R) = e∈E (P (e) − R(e))2 , and following the same derivation as in eq. (20), we conclude that a distribution q  L of measurable events admitting an nth order inflation is O n -close in Euclidean norm to a realizable distribution. Similarly, one can bound the speed convergence of the inflation technique when applied to maximize polynomials of a probability distribution of measurable events. VI. EXTENSION OF OUR RESULTS TO GENERAL CAUSAL STRUCTURES So far we have been just referring to causal networks, i.e., those causal structures where all observed variables just depend on a number of independent latent variables. However, in a general causal structure, the value of a given variable can depend, not only on latent variables, but also on the values of other observed variables. Can the inflation technique solve the inference and dual problems for these general structures as well? In the following, we will show that any causal (dual) inference problem in an arbitrary causal structure can be mapped to an inference 9 (dual) problem with a non-trivial set of measurable events in an extended causal network. Hence we can solve it via the inflation technique. To go from general causal structures to causal networks, we will follow the following three steps. FIG. 6 First step: re-wiring. The first step is called re-wiring, see Figure 6. Note that, if in the original structure there is an edge from variable X to the latent variable λ, if we delete the edge and replace it by edges from variable X to the direct successors of λ we obtain a causal structure with the same predictive power. Indeed, in the first structure λ could carry a copy of X to each of its direct successors: this implies that any probability distribution of observed variables realizable in the re-wired causal structure can also be realized in the original causal structure. Conversely, suppose that in the original causal structure λ depends on the variables X̄ (we group them all in a vector) as λ = λ(X̄, µ), where λ is a deterministic function and µ is an internal random variable. Then one can simulate the same probability distribution of observed variables in the re-wired causal structure by distributing µ to the direct successors of λ and making them compute locally the value of λ, given X̄. Sequentially re-wiring the edges pointing to a latent variable, we end up with an equivalent causal structure where the latent variables just have edges pointing from them and not to them. FIG. 7 Second step: unpacking. For the second step, unpacking (Figure 7), we will draw inspiration from the notion of interruption, described in (Wolfe and Sainz, 2017). Let X be an observed variable depending on the latent variables λ̄ and the observed variables Ȳ , and suppose that Ȳ can take d different values, e.g.: Ȳ ∈ {1, ..., d}. In this step, we will break the edges between Ȳ and X and “unpack” variable X into the observed variables X(1), ..., X(d), defined via the expression X(s) ≡ X(s, λ̄). Unpacking all the variables, we arrive at a causal structure with a few disconnected random variables Ā, the observable parents of the causal graph, and a number of observed variables B̄ depending on just the latent variables, which by the previous step are independent from each other. The probabilities of the observed variables in the original causal structure can be obtained from the probabilities of a set of measurable events in this new causal structure via the relation A B P (Ā = ā, B̄ = b̄) = P ({Ā = ā} ∩ {B i (āIi , b̄Ii ) = bi }i ), (24) where IiA , IiB are, respectively, the superindices of the variables Ā, B̄ who are direct predecessors of B i in the original causal structure. 10 FIG. 8 Third step: re-parenting. In the last step, re-parenting (Figure 8), we will introduce a new latent variable λA for each observable parent A of the original graph, and an edge from λA to A. At the end of this step, we have a layer of observed variables depending only on the another layer of independent latent variables. This is none other but a causal network! The original causal inference (dual) problem is hence mapped to an inference (dual) problem in a causal network with a set E of measurable events given by n o A B E = {Ā = ā} ∩ {B i (āIi , b̄Ii ) = bi }i . (25) ā,b̄ When dealing with an inference problem with observable parents Ā, an alternative to the re-parenting step is simply to erase the observed parents from the structure and consider the resulting causal network with constraints A B P ({B i (āIi , b̄Ii ) = bi }i ) = P (B = b|Ā = ā). (26) Applying the inflation technique to this second network is computationally cheaper, since it has less observed variables. Note though that this mapping does not allow us to optimize polynomials of P (Ā, B̄), but of P (B̄|Ā), so one cannot use it to solve the causal dual problem. For illustration, consider again the instrumental scenario, see Fig. 3. Suppose that the random variables A, B can just take two possible values, 0 or 1. Then we can define the vector variable (B(0), B(1)) via the non-deterministic function (B(0, λ), B(1, λ)). Similarly, we can unpack C into the vector (C(0), C(1)) ≡ (C(0, λ), C(1, λ)). The resulting causal network after re-wiring, unpacking and re-parenting is depicted on the right-hand side of Fig. 7. Let P̂ (A, B(0), B(1), C(0), C(1)) be the distribution of the observed variables of the new network. Then, our set of measurable events is {A = a, B(a) = b, C(b) = c}a,b,c , and the correspondence with the original distribution is P (A = a, B = b, C = c) = P̂ (A = a, B(a) = b, C(b) = c). Alternatively, we can erase variable A from the causal network and take the distribution P̃ (B(0), B(1), C(0), C(1)) of observed variables to be our fundamental object. Then, the set of measurable events is {B(a) = b, C(b) = c}a,b,c , and the corresponding probabilities are P (B = b, C = c|A = a) = P̃ (B(a) = b, C(b) = c). VII. CONCLUSION In this paper we have proven that the hierarchy of tests proposed in (Wolfe et al., 2016) to bound the set of distributions admitting a representation in a given causal network is complete, in the sense that any distribution that does not admit such a representation will fail one of the tests. More quantitatively, we showed that any distribution   1 th P passing the n test is O √n -close in Euclidean norm to a distribution Q realizable within the considered causal network. We also proved that the nth linear programming relaxation provided by the inflation technique to the solution of the dual problem is O n1 away from optimality. To top it up, we showed that any causal inference (dual) problem in a general causal structure can be mapped to a causal inference (dual) problem in an extended causal network with a non-trivial set of measurable events. This is a regime for which we also proved the convergence of the inflation technique. Put together, these two results thus show that the inflation technique is much more than a useful machinery to derive statistical limits. It is an alternative way to define causal structures! For future work, it would be interesting to adapt our results to the quantum case, for which the inflation technique can also be applied (Wolfe et al., 2016). That would require an extension of the finite quantum de Finetti 11 theorem (Koenig and Renner, 2005) that held for certain positive-semidefinite structures subject to certain symmetry constraints. An arduous task! Acknowledgements This work was not supported by the European Research Council. This research was supported in part by Perimeter Institute for Theoretical Physics. Research at Perimeter Institute is supported by the Government of Canada through the Department of Innovation, Science and Economic Development Canada and by the Province of Ontario through the Ministry of Research, Innovation and Science. References E. Wolfe, R. W. Spekkens, and T. Fritz, “The Inflation Technique for Causal Inference with Latent Variables,” arXiv:1609.00672 (2016). D. Koller and N. Friedman, Probabilistic Graphical Models: Principles and Techniques - Adaptive Computation and Machine Learning (The MIT Press, 2009). T. Fritz, “Beyond Bell’s theorem: correlation scenarios,” New J. Phys. 14, 103001 (2012). T. Fritz and R. Chaves, “Entropic Inequalities and Marginal Problems,” IEEE Trans. Info. Theo. 59, 803 (2013). R. Chaves, L. Luft, and D. Gross, “Causal structures from entropic information: geometry and novel scenarios,” New J. Phys. 16, 043001 (2014). R. Chaves, L. Luft, T. O. Maciel, D. Gross, D. Janzing, and B. Schölkopf, “Inferring latent structures via information inequalities,” in Proc. of the 30th Conference on Uncertainty in Artificial Intelligence (AUAI, 2014) pp. 112–121. R. Chaves, “Polynomial Bell inequalities,” Phys. Rev. Lett. 116, 010402 (2016). J. Bohr Brask and R. Chaves, “Bell scenarios with communication,” J. Phys. A 50, 094001 (2017). P. Diaconis and D. Freedman, “Finite exchangeable sequences,” Annals of Probability 8, 745764 (1980). P. M. W. Alevras, Dimitris, Linear Optimization and Extensions (Springer Berlin Heidelberg, 2001). I. P. Gent, K. E. Petrie, and J.-F. Puget, “Chapter 10 - Symmetry in Constraint Programming,” in Handbook of Constraint Programming, Foundations of Artificial Intelligence, Vol. 2, edited by F. Rossi, P. van Beek, and T. Walsh (Elsevier, 2006) pp. 329 – 376. D. Rosset, N. Gisin, and E. Wolfe, “All n-local set are semialgebraic,” unpublished (2016). E. Wolfe and A. B. Sainz, “Interruption Technique for Causal Inference and the Quantum Instrumental Scenario,” unpublished (2017). R. Koenig and R. Renner, “A de finetti representation for finite symmetric quantum states,” J. Math. Phys. 46, 122108 (2005).
10math.ST
June 2015 (revised September 2015) Report LIDS - 3176 Incremental Aggregated Proximal and Augmented Lagrangian Algorithms arXiv:1509.09257v2 [cs.SY] 4 Nov 2015 Dimitri P. Bertsekas† Abstract We consider minimization of the sum of a large number of convex functions, and we propose an incremental aggregated version of the proximal algorithm, which bears similarity to the incremental aggregated gradient and subgradient methods that have received a lot of recent attention. Under cost function differentiability and strong convexity assumptions, we show linear convergence for a sufficiently small constant stepsize. This result also applies to distributed asynchronous variants of the method, involving bounded interprocessor communication delays. We then consider dual versions of incremental proximal algorithms, which are incremental augmented Lagrangian methods for separable equality-constrained optimization problems. Contrary to the standard augmented Lagrangian method, these methods admit decomposition in the minimization of the augmented Lagrangian, and update the multipliers far more frequently. Our incremental aggregated augmented Lagrangian methods bear similarity to several known decomposition algorithms, most of which, however, are not incremental in nature: the augmented Lagrangian decomposition algorithm of Stephanopoulos and Westerberg [StW75], and the related methods of Tadjewski [Tad89] and Ruszczynski [Rus95], and the alternating direction method of multipliers (ADMM) and more recent variations. We compare these methods in terms of their properties, and highlight their potential advantages and limitations. We also address the solution of separable inequality-constrained optimization problems through the use of nonquadratic augmented Lagrangiias such as the exponential, and we dually consider a corresponding incremental aggregated version of the proximal algorithm that uses nonquadratic regularization, such as an entropy function. We finally propose a closely related linearly convergent method for minimization of large differentiable sums subject to an orthant constraint, which may be viewed as an incremental aggregated version of the mirror descent method. 1. INCREMENTAL GRADIENT, SUBGRADIENT, AND PROXIMAL METHODS We consider optimization problems with a cost function that consists of additive components: minimize def F (x) = m X i=1 subject to x ∈ X, fi (x) (1.1) † Dimitri Bertsekas is with the Dept. of Electr. Engineering and Comp. Science, and the Laboratory for Infor- mation and Decision Systems, M.I.T., Cambridge, Mass., 02139. 1 where fi : ℜn 7→ ℜ, i = 1, . . . , m, are convex real-valued functions, and X is a closed convex set. We focus on the case where the number of components m is very large, and there is an incentive to use incremental methods that operate on a single component fi at each iteration, rather than on the entire cost function F . Problems of this type arise often in various practical contexts and have received a lot of attention recently. Suitable algorithms include the incremental subgradient method (abbreviated IS), where a cost com˜ i (xk ) of fi is used in place of a full ponent fik is selected at iteration k, and an arbitrary subgradient ∇f k k subgradient of F at xk :†  ˜ i (xk ) , xk+1 = PX xk − αk ∇f k (1.2) where αk is a positive stepsize, and PX (·) denotes projection on X. It is important here that all components are taken up for iteration with equal long-term frequency, using either a cyclic or a random selection scheme. Methods of this type and their properties have been studied for a long time, and the relevant literature, beginning in the 60’s, is too voluminous to list here. The author’s survey [Ber10] discusses the history of this algorithm, its convergence properties, and its connections with stochastic approximation methods. Generally, a diminishing stepsize αk is needed for convergence, even when the components fi are differentiable. Moreover the convergence rate properties are generally better when the index ik is selected by randomization over the set {1, . . . , m} than by a deterministic cyclic rule, as first shown by Nedić and Bertsekas [NeB01]; see also [BNO03]. Another method, introduced by the author in [Ber10] and further studied in [Ber11], [Ber12], is the incremental proximal method (abbreviated IP),   1 kx − xk k2 . xk+1 ∈ arg min fik (x) + x∈X 2αk (1.3) This method relates to the proximal algorithm (Martinet [Mar70], Rockafellar [Roc76a]) in the same way that the IS method (1.2) relates to the classical nonincremental subgradient method. Similar to the IS method, it is important that all components are taken up for iteration with equal long-term frequency. The theoretical convergence properties of the IS and IP algorithms are similar, but it is generally believed that IP is more robust, a property inherited from its nonincremental counterpart. It turns out that the structures of the IS and IP methods (1.2) and (1.3) are quite similar. An important fact in this regard is that the IP method (1.3) can be equivalently written as  ˜ i (xk+1 ) , xk+1 = PX xk − αk ∇f k (1.4) † Throughout the paper, we will operate within the n-dimensional space ℜn with the standard Euclidean norm, denoted k · k. All vectors are considered column vectors and a prime denotes transposition, so x′ x = kxk2 . The scalar coordinates of an optimization vector such as x are denoted by superscripts, x = (x1 , . . . , xn ), while sequences of ˜ (x) to denote a subgradient of a convex function f at a vector x ∈ ℜn , iterates are indexed by subscripts. We use ∇f ˜ (x)′ (z − x) for all z ∈ ℜn . The choice of ∇f ˜ (x) from within the set of all i.e, a vector such that f (z) ≥ f (x) + ∇f ˜ (x) is the gradient ∇f (x). subgradients at x will be clear from the context. If f is differentiable at x, ∇f 2 ˜ i (xk+1 ) is a special subgradient of fi at the new point xk+1 (see Bertsekas [Ber10], Prop. 2.1, where ∇f k k [Ber11], Prop. 1, or [Ber15], Prop. 6.4.1). This special subgradient is determined from the optimality conditions for the proximal maximization (1.3). For example if X = ℜn , we have ˜ i (xk+1 ) = xk − xk+1 , ∇f k αk ˜ i (xk+1 ) may be a difficult which is consistent with Eq. (1.4). Thus determining the special subgradient ∇f k problem, and in most cases it is preferable to implement the iteration in the proximal form (1.3) rather than the projected form (1.4). However, the equivalent form of the IP iteration (1.4), when compared with the IS iteration (1.2), suggests the close connection between the IS and IP iterations. In fact this connection is the basis for a combination of the two methods to provide flexibility for the case where some of the cost components fi are well suited for the proximal minimization of Eq. (1.3), while others are not; see [Ber10], [Ber11], [Ber12]. Incremental Aggregated Gradient and Subgradient Methods Incremental aggregated methods aim to provide a better approximation of a subgradient of the entire cost function F , while preserving the economies accrued from computing a single component subgradient at each iteration. In particular, the aggregated subgradient method (abbreviated IAS), has the form ! m X ˜ i (xℓ ) , ∇f xk+1 = PX xk − αk i (1.5) i=1 ˜ i (xℓ ) is a “delayed” subgradient of fi at some earlier iterate xℓ . We assume that the indexes ℓi where ∇f i i satisfy k − b ≤ ℓi ≤ k, ∀ i, k, (1.6) where b is a fixed nonnegative integer. Thus the algorithm uses outdated subgradients from previous iterations for the components fi , i 6= ik , and need not compute a subgradient of these components at iteration k. The IAS method was first proposed, to our knowledge, by Nedić, Bertsekas, and Borkar [NBB01]. It was motivated primarily by distributed asynchronous solution of dual separable problems, similar to the ones to be discussed in Section 2 (in a distributed asynchronous context, it is natural to assume that subgradients are used with some delays). A convergence result was shown in [NBB01] assuming that the stepsize sequence {ak } is diminishing, and satisfies the standard conditions ∞ X k=0 ∞ X αk = ∞, k=0 α2k < ∞. (1.7) This result covers the case of iteration (1.5) for the case X = ℜn ; the more general case where X 6= ℜn admits a similar analysis. We note that distributed algorithms that involve bounded delays in the iterates 3 have a long history, and are common in various distributed asynchronous computation contexts, including gradient-like and coordinate descent methods; see [Ber89], Sections 7.5-7.8. ˜ i (xℓ ), Note a limitation of this iteration over the IS iteration: one has to store the past subgradients ∇f i i 6= ik . Moreover, whatever effect the use of previously computed subgradients has, it will not be fully manifested until a subgradient of each component has been computed; this is significant when the number of components m is large. We note also that there are other approaches for approximating a full subgradient of the cost function, which aim at computational economies, such as ǫ-subgradient methods (see Nedić and Bertsekas [NeB10] and the references quoted there), and surrogate subgradient methods (see Bragin et. al [BLY15] and the references quoted there). The IAS method (1.5) contains as a special case the incremental aggregated gradient method (abbreviated IAG) for the case where the components fi are differentiable: xk+1 = xk − αk m X i=1 ∇fi (xℓi ), (1.8) where ℓi ∈ [k − b, k] for all i and k. This method has attracted considerable attention thanks to a particularly interesting convergence result. For the favorable case where the component gradients ∇fi are Lipschitz continuous and F is strongly convex, it has been shown that the IAG method is linearly convergent to the solution with a sufficiently small but constant stepsize αk ≡ α. This result was first given by Blatt, Hero, and Gauchman [BHG08], for the case where the cost components fi are quadratic and the delayed indexes ℓi satisfy certain restrictions that are consistent with a cyclic selection of components for iteration (see also [AFB06]). The linear convergence result has been subsequently extended for nonquadratic problems and for various forms of the method by several other authors, including Schmidt, Le Roux, and Bach [SLB13], Mairal [Mai13], [Mai14], and Defazio, Caetano, and Domke [DCD14]. Several schemes have been proposed ˜ i (xℓ ), i 6= ik . Moreover, several to address the limitation of having to store the past subgradients ∇f i experimental studies have confirmed the theoretical convergence rate advantage of the IAG method over the corresponding incremental gradient method under the preceding favorable conditions. The use of arbitrary indexes ℓi ∈ [k − b, k] in the IAG method was introduced in the paper by Gurbuzbalaban, Ozdaglar, and Parillo [GOP15], who gave an elegant and particularly simple linear convergence analysis. Incremental Aggregated Proximal Algorithm In this paper, we consider an incremental aggregated proximal algorithm (abbreviated IAP), which has the form xk+1 ∈ arg min x∈X    fik (x) + X i6=ik   1 2 ˜ i (xℓ )′ (x − xk ) + , kx − x k ∇f k i  2αk (1.9) ˜ i (xℓ ) is a “delayed” subgradient of fi at some earlier iterate xℓ . We assume that the indexes ℓi where ∇f i i 4 satisfy the boundedness condition ℓi ∈ [k − b, k], cf. Eq. (1.6). Intuitively, the idea is that the term X i6=ik ˜ i (xℓ )′ (x − xk ) ∇f i in the proximal minimization (1.9) is a linear approximation to the term X fi (x) i6=ik [minus the constant P i6=ik fi (xk )], which would be used in the standard proximal algorithm xk+1  1 2 kx − xk k . ∈ arg min F (x) + x∈X 2αk  It is straightforward to verify the following equivalent form of the IAP iteration (1.9):   1 xk+1 ∈ arg min fik (x) + kx − zk k2 , x∈X 2αk (1.10) (1.11) where zk = xk − αk X i6=ik ˜ i (xℓ ). ∇f i (1.12) In this form the algorithm is executed as a two-step process: first use xk and preceding subgradients to compute zk via Eq. (1.12), and then execute an IP iteration starting from zk . Note a limitation of this iteration over the IP iteration, which is shared with other incremental aggregated methods: to keep updating ˜ i (xℓ ), i 6= ik . the vector zk , one has to store the past subgradients ∇f i Similar to the IP iteration (1.4), the IAP iteration (1.9) and its equivalent form (1.11)-(1.12) can be written as   ˜ i (xk+1 ) , xk+1 = PX zk − αk ∇f k (1.13) ˜ i (xk+1 ), which can be used in so when executing the iteration, we typically can obtain the subgradient ∇f k subsequent IAP iterations. For example, in the unconstrained case where X = ℜn , from Eq. (1.13), we see that ˜ i (xk+1 ) = zk − xk+1 . ∇f k αk It is possible to prove various convergence results for the IAP iteration (1.9), or its equivalent forms (1.11)-(1.12) and (1.12)-(1.13), for the case where the stepsize αk is diminishing and satisfies the standard conditions (1.7). These results are in line with similar results for the IP method, given in [Ber10], [Ber11], and for the IAS method (1.5), given in [NBB01]. Since the difference between the IAP and IAS methods ˜ i (xk+1 ) in IAP in place of ∇f ˜ i (xℓ ) in IAS, intuitively, for a diminishing stepsize, the is the use of ∇f k k i k asymptotic performance of the two methods should be similar, and indeed the convergence proofs for the two methods are fairly similar, under comparable assumptions. We will thus not go into this convergence analysis. 5 Incremental Aggregated Proximal Algorithm for Unconstrained Problems In the unconstrained case where X = ℜn and the component functions fi are differentiable, the IAP iteration (1.13) can be written as  xk+1 = xk − αk ∇fik (xk+1 ) + X i6=ik  ∇fi (xℓi ) . (1.14) In this case, one may expect similar convergence behavior for the IAP and IAG methods, under favorable conditions which allow the use of a constant stepsize αk ≡ α. In particular, we prove the following for the IAP method. Proposition 1.1: Assume that X = ℜn and that the functions fi are convex and differentiable, and satisfy ∇fi (x) − ∇fi (z) ≤ Li kx − zk, for some constants Li . Assume further that the function F = ∀ x, z ∈ ℜn , Pm i=1 fi is strongly convex with unique minimum denoted x∗ . Then there exists α > 0 such that for all α ∈ (0, α], the sequence {xk } generated by the IAP iteration (1.14) with constant stepsize αk ≡ α converges to x∗ linearly, in the sense that kxk − x∗ k ≤ γρk for some scalars γ > 0 and ρ ∈ (0, 1), and all k. The proof, given in Section 3, follows closely the one of [GOP15] for the IAG iteration, and relies on the similarity of the iterations (1.14) and (1.8) [the use of the term ∇fik (xk+1 ) in place of the term ∇fik (xℓi )]. k A key idea is to view the IAP iteration (1.14) as a gradient method with errors in the calculation of the gradient, i.e., where ∇F (xk ) = Pm i=1 ∇fi (xk ), and  xk+1 = xk − αk ∇F (xk ) + ek , ek = ∇fik (xk+1 ) − ∇fik (xk ) + X i6=ik  ∇fi (xℓi ) − ∇fi (xk ) , (1.15) (1.16) and then to appropriately bound the size of the errors ek . This is similar to known lines of convergence proofs for gradient and subgradient methods with errors. The proof of Section 3 applies also to a diagonally scaled version of IAP, where a separate but constant stepsize is used for each coordinate. We note that the line of proof of Prop. 1.1 does not readily extend to the constrained case when X 6= ℜn , nor is it clear whether and under what conditions linear convergence can be proved. In Section 4, however, we will consider an incremental aggregated proximal algorithm that uses a nonquadratic regularization term and seems to cope better with the case of nonnegativity constraints, i.e., X = {x | x ≥ 0}. 6 We finally return to the similarity of the IAP method (1.9) with the IAS method (1.5), and note that the two methods admit similar distributed asynchronous implementations, which was described in the paper [NBB01]. In this context, we have a central processor executes the proximal iteration (1.9) for some selected component fik , while other processors compute subgradients for other components fi at points xℓi , which are supplied by the central processor. These subgradients involve a “delay” that may be unpredictable, hence the asynchronous character of the computation. Local Versions of Proximal Algorithms While the analysis of this paper requires that fi and X are convex, there is a straightforward way to extend our incremental proximal methods to nonconvex problems involving twice differentiable functions, which we will describe briefly. The idea is to use a local version of the proximal algorithm, proposed in the author’s paper [Ber79] and based on a local version of the Fenchel duality framework given in [Ber78]. The algorithm applies to the problem minimize f (x) (1.17) subject to g(x) = 0, where f : ℜn 7→ ℜ and g : ℜn 7→ ℜr are twice continuously differentiable functions, such that f is “locally  convex” over the set x | g(x) = 0 (this is defined in terms of assumptions that relate to second order sufficiency conditions of nonlinear programming; see [Ber78], [Ber79]). The local proximal algorithm has the form xk+1 ∈ arg min g(x)=0   1 2 kx − xk k , f (x) + 2αk (1.18) where αk is sufficiently small to ensure that the function minimized in Eq. (1.18) is convex over ℜn [not just  locally over the set x | g(x) = 0 ]. A Newton-like version of this algorithm was also given in [Ber79]. There is an incremental version of the local proximal iteration (1.18) for problems involving sums of functions. In particular, consider the problem m X minimize fi (x) i=1 (1.19) subject to g(x) = 0, where fi : ℜn 7→ ℜ and g : ℜn 7→ ℜr are twice continuously differentiable functions, such that each fi is  “locally convex” over the set x | g(x) = 0 , for all i. This incremental local proximal iteration is   1 fik (x) + kx − xk k2 , 2αk g(x)=0 xk+1 ∈ arg min (1.20) where ik is the index of the cost component that is iterated on. One may also consider an aggregated form of this incremental iteration. The convergence properties of these algorithms are an interesting subject for investigation, which lies, however, outside the scope of the present paper. 7 There is also another way to combine local proximal and incremental ideas for the case of the (nonconvex) separable problem in the vector x = (x1 , . . . , xm ), minimize m X def f (x) = fi (xi ) i=1 m X def subject to g(x) = (1.21) gi (xi ) = 0, i=1 where fi : ℜni 7→ ℜ and gi : ℜni 7→ ℜr are twice continuously differentiable functions, and are such that the problem admits a solution-Lagrange multiplier pair (x∗ , λ∗ ) satisfying standard second order sufficiency conditions. In this approach, also developed in [Ber78], [Ber79], the problem (1.21) is converted to the equivalent problem minimize def φγ (z) = min g(x)=0  1 f (x) + kx − zk2 2γ subject to z ∈ ℜn1 +···+nm , where γ is sufficiently small so that for fixed z, f (x) + 1 2γ kx suitably small neighborhood of x∗ , i.e., γ should be such that  (1.22) − zk2 is convex in x locally, for all x in a 1 γI + ∇2 f (x∗ ) is positive definite. Since the minimization problem (1.22), which defines φγ (z), is separable of the form  m  X 1 i i 2 i kx − z k fi (x ) + 2γ i=1 minimize subject to x ∈ ℜn1 +···+nm , m X (1.23) gi (xi ) = 0, i=1 and locally convex in x, for fixed z and suitably small values of γ, it can be solved using the augmented Lagrangian-based methods of the next section. Denoting x(z, γ) the optimal solution of this problem for given z and γ, it is shown in [Ber79] (Prop. 2.1) (see also [Ber78], Prop. 2) that φγ is differentiable and ∇φγ (z) =  1 z − x(z, γ) . γ Thus the gradient algorithm zk+1 = zk − γ∇φγ (zk ), (1.24) can be written as zk+1 = x(zk , γ) or equivalently, using Eqs. (1.22) and (1.23), in the (local) proximal form xk+1 (m  ) X 1 fi (xi ) + ∈ arg Pm min . kxi − xik k2 2γ gi (xi )=0 i=1 (1.25) i=1 Note that the above minimization is amenable to decomposition, including solution using the incremental aggregated augmented Lagrangian and ADMM methods of the next section, assuming γ is sufficiently small to induce the required amount of convexification to make problem (1.25) convex (locally within a neighborhood of x∗ ). 8 The convergence properties of this algorithm are developed in [Ber79], based on a local theory of conjugate functions and Fenchel duality developed in [Ber78]. We refer to these papers for a discussion of the local aspects of the minimization (1.25), as well as for the implementation of the Newton iteration −1 zk+1 = zk − ∇2 φγ (zk ) ∇φγ (zk ), (1.26) in analogy with the gradient method (1.24). A further analysis is again outside the scope of the present paper, and is an interesting subject for investigation. 2. INCREMENTAL AUGMENTED LAGRANGIAN METHODS A second objective of this paper is to consider the application of the IP and IAP methods in a dual setting, where they take the form of incremental augmented Lagrangian algorithms for the separable constrained optimization problem minimize m X hi (y i ) i=1 subject to y i ∈ Yi , i = 1, . . . , m, m X i=1 (2.1) (Ai y i − bi ) = 0, as shown in [Ber15], Section 6.4.3. Here hi : ℜni 7→ ℜ are convex functions (ni is a positive integer, which may depend on i), Yi are nonempty closed convex subsets of ℜni , Ai are given r × ni matrices, and bi ∈ ℜr are given vectors. The optimization vector is y = (y 1 , . . . , y m ), and our objective is to consider algorithms that allow decomposition in the minimization of the augmented Lagrangian, so that m separate augmented Lagrangian minimizations are performed, each with respect to a single component y i . Note that the problem Pm (2.1) is unaffected by redefinition of the scalars bi , as long as i=1 bi is not changed. It may be beneficial to adjust the scalars bi so that the residuals Ai y i − bi are small near the optimal, and this may in fact be attempted in the course of some algorithms as a form of heuristic. Following a standard analysis, the dual function for problem (2.1) is given by ) (m X  hi (y i ) + λ′ (Ai y i − bi ) , Q(λ) = inf y i ∈Yi , i=1,...,m (2.2) i=1 where λ ∈ ℜr is the dual vector. By decomposing the minimization over the components y i , Q can be expressed in the additive form Q(λ) = m X qi (λ), i=1 where qi is the concave function qi (λ) = inf y i ∈Y i  hi (y i ) + λ′ (Ai y i − bi ) , 9 i = 1, . . . , m. (2.3) Dual Gradient-Like Methods for Separable Problems Assuming that the dual function components qi are real-valued (which is true for example if Yi is compact), the dual function Q(λ) can be minimized with the classical subgradient method.† This method takes the form λk+1 = λk + αk m X i=1 ˜ i (λk ), ∇q (2.4) ˜ i (λk ) are obtained as where αk > 0 is the stepsize and the subgradients ∇q ˜ i (λk ) = Ai y i − bi , ∇q k+1 i = 1, . . . , m, with all components y i updated according to  i yk+1 ∈ arg min hi (y i ) + λ′k (Ai y i − bi ) , y i ∈Yi i = 1, . . . , m. The additive form of the dual function Q makes it suitable for application of incremental methods, including the IAS method described in Section 1, which in fact was proposed in [NBB01] with the separable problem (2.1) in mind. In the case where the components qi are differentiable [which is true if the infimum in the definition (2.3) is attained uniquely for all λ], one may also use the IAG method with a constant but sufficiently small stepsize. This is an incremental aggregated version of a classical dual gradient method proposed in the 60s and often attributed to Everett [Eve63]. It takes the form  λk+1 = λk + α ∇qik (λk ) + X i6=ik  ∇qi (λℓi ) ; (2.5) cf. Eq. (1.8). The gradient of the dual function component qi is given by ∇qi (λ) = Ai y i (λ) − bi , where y i (λ) is the minimizer over Yi of fi (y i ) + λ′ Ai y i , which is assumed to be unique for differentiability of qi . By streamlining the computations using the preceding relations, we see that the iteration has the following form. † In the case where qi is not real-valued, the dual function can be maximized over the set ∩m i=1 Λi , where Λi =  λ | qi (λ > −∞ . This can be done by using incremental constraint projection methods involving projection or proximal maximization over a single set Λi at a time. Methods of this type have been proposed in [Ber11], [Ned11], [WaB13], [WaB15], but their discussion is beyond the scope of the present paper. 10 Incremental Aggregated Dual Gradient Iteration (IADG) Select a component index ik , and update the single component y ik according to i k yk+1 ∈ arg min y ik ∈Yi k  hik (y ik ) + λ′k Aik y ik , (2.6) i while keeping the others unchanged, yk+1 = yki for all i 6= ik . Then update λ according to λk+1 = λk +  ik α Aik yk+1 + X i6=ik  Ai yℓii − b . (2.7) The convergence properties of the method are governed by the known results for the IAG method, which were noted in Section 1. In particular, we obtain linear convergence with a constant sufficiently small stepsize α, assuming Lipschitz continuity of ∇qi and strong convexity of Q, and that the long-term frequency of updating y i is the same for all i. Note, however, that this linear convergence result cannot be used when the primal problem (2.1) has additional convex inequality constraints, because then the corresponding dual problem involves nonnegativity constraints. Augmented Lagrangian-Based Algorithms for Separable Problems The nonincremental and incremental subgradient and gradient methods just described are convenient for the purposes of decomposition, but their convergence properties tend to be fragile. On the other hand, the more stable augmented Lagrangian methods have a major drawback: when a quadratic penalty term is added to the Lagrangian function, the resulting augmented Lagrangian m X i=1 m  αk X hi (y i ) + λ′ (Ai y i − bi ) + (Ai y i − bi ) 2 i=1 2 is not separable any more, and is not amenable to minimization by decomposition. This is a well-known limitation of the augmented Lagrangian approach that has been addressed by a number of authors with various algorithmic proposals, which we will now survey. The first proposal of this type was the paper by Stephanopoulos and Westerberg [StW75], which was based on enforced decomposition: minimizing the augmented Lagrangian separately with respect to each component vector y i , while holding the other components fixed at some estimated values. Minimization over the components y i is followed by a multiplier update (using the standard augmented Lagrangian formula). 11 The decomposition method of [StW75] attracted considerable attention and motivated further research, including the similarly structured methods by Tadjewski [Tad89] and by Ruszczynski [Rus95], which include convergence analyses and give references to earlier works. Our incremental aggregated proximal algorithm bears similarity with the methods of [StW75], [Tad89], and [Rus95]. We note, however, that the methods of [StW75] and [Tad89] were motivated by nonconvex separable problems for which there is a duality gap, while our analysis requires a convex programming structure, where there is no duality gap. The method of [Rus95] is applied to convex separable problems, including linear programming. Another method for convex separable problems that uses augmented Lagrangian minimizations is given by Deng, Lai, Peng, and Yin [DLP14], who give several related references, including the paper by Chen and Teboulle [ChT94]. The method is based on the use of primal proximal terms in the augmented Lagrangian (in addition to the quadratic penalty term). This is in the spirit of Rockafellar’s proximal method of multipliers [Roc76b], and involves two separate penalty parameters, which for convergence should satisfy certain restrictions. The papers by Hong and Luo [HoL13], and Robinson and Tappenden [RoT15] also propose algorithms that use primal proximal terms and two penalty parameters, but differ from the algorithm of [DLP14] in that they update the primal variables in Gauss-Seidel rather than Jacobi fashion, while requiring additional assumptions (see also Dang and Lan [DaL15] for a related algorithm). GaussSeidel updating is somewhat similar to the incremental mode of iteration of this paper, and based on the results of experiments in [WHM13] and [RoT15], it appears to be beneficial. A different possibility to deal with nonconvex separable problems is based on the convexification provided by the local proximal algorithm that was discussed at the end of the preceding section. Its application to nonconvex separable problems is described in [Ber79]; see also Tanikawa and Mukai [TaM85], who proposed a method that aims at improved efficiency relative to the approach of [Ber79]. A discussion of additional proposals of decomposition methods that use augmented Lagrangians is given in the recent paper by Hamdi and Mishra [HaM11]. Still another approach that has been used to exploit the structure of the separable problem (2.1) is the alternating direction method of multipliers (ADMM), a popular method for convex programming, first proposed by Glowinskii and Morocco [GIM75], and Gabay and Mercier [GaM76], and further developed by Gabay [Gab79], [Gab83]. This method applies to the problem minimize f1 (x) + f2 (z) (2.8) subject to x ∈ ℜn , z ∈ ℜm , Ax = z, where f1 : ℜn 7→ (−∞, ∞] and f2 : ℜm 7→ (−∞, ∞] are closed convex functions, and A is a given m × n matrix. The method is better suited than the augmented Lagrangian method for exploiting special structures, including separability, and is capable of decoupling the vectors x and z in the augmented Lagrangian f1 (x) + f2 (z) + λ′ (Ax − z) + 12 α kAx − zk2 . 2 For a discussion of the properties and the many applications of the method, we refer to its extensive literature, including the books [BeT89], Section 3.4.4, [Ber15], Section 5.4, and [BPC11], which give many references. The form of the ADMM for separable problems to overcome the coupling of variables in the augmented Lagrangian minimization was first derived in Bertsekas and Tsitsiklis [BeT89], Section 3.4, pp. 249-254 (see also [Ber15], Section 5.4.2). We will describe the form of this specialized ADMM later in this section. We will now consider the incremental proximal methods IP [cf. Eq. (1.3)] and IAP [cf. Eq. (1.9)] for Pm maximizing the dual function i=1 qi (λ). Taking into account the concavity of the components qi , the IP method takes the form   1 λk+1 ∈ arg maxr qik (λ) − kλ − λk k2 , λ∈ℜ 2αk (2.9) where ik is the index of the component chosen for iteration and αk is a positive parameter. This method was given in [Ber15], Section 6.4.3, where it was shown that it can be implemented through the use of decoupled augmented Lagrangian minimizations, each involving a single component vector y i . The IAP method takes the form λk+1 ∈ arg maxr λ∈ℜ    qik (λ) + X i6=ik   ˜ i (λℓ )′ (λ − λk ) − 1 kλ − λk k2 , ∇q i  2αk (2.10) and has not been considered earlier within the dual separable constrained optimization context of this section. The convergence results noted in Section 1 apply to this method. In particular, by Prop. 1.1, the IAP method (2.10) is convergent with a sufficiently small constant stepsize, assuming that each qi is differentiable with Lipschitz continuous gradient and Q is strongly concave. Of course, the differentiability of qi is a restrictive assumption, and it amounts to attainment of the minimum at a unique point y i ∈ Yi in the definition (2.3) of qi (λ) for all λ ∈ ℜr . We will now describe how the incremental proximal methods IP and IAP can be implemented in terms of augmented Lagrangian minimizations, which decompose with respect to components y i and have an incremental character. To this end, we will review the well-known Fenchel duality relation between proximal and augmented Lagrangian iterations, given first by Rockafellar [Roc73], [Roc76b], and subsequently in many sources, including the author’s monograph and textbook accounts [Ber82], Chapter 5, and [Ber15], Section 5.2.1. Duality Between Proximal and Augmented Lagrangian Iterations Given a proper convex function P : ℜr 7→ (−∞, ∞], let Q : ℜr 7→ [−∞, ∞) be the closed proper concave function defined by†  Q(λ) = inf r P (u) + λ′ u . u∈ℜ (2.11) † Here and later, for concave functions Q, we use terminology used for convex functions as applied to −Q. 13 This is a conjugacy relation, since Q(λ) = −P ⋆ (−λ), where P ⋆ is the conjugate convex function of P . Moreover, if P is closed, it can be recovered from Q using the conjugacy theorem, P (u) = P ⋆⋆ (u) = sup λ∈ℜr  λ′ u + Q(−λ) , (2.12) where P ⋆⋆ is the conjugate convex function of P ⋆ (see, e.g., [Ber09], Prop. 1.6.1). A key fact, assuming that P is closed, is that the proximal iteration λk+1   1 2 kλ − λk k , ∈ arg maxr Q(λ) − λ∈ℜ 2αk (2.13) can be equivalently implemented in two steps as n o αk uk+1 ∈ arg minr P (u) + λ′k u + kuk2 , u∈ℜ 2 (2.14) λk+1 = λk + αk uk+1 ; (2.15) followed by see, e.g., [Ber15], Section 5.2.1. Moreover, uk+1 is a subgradient of Q at λk+1 : ˜ uk+1 = ∇Q(λ k+1 ). (2.16) These relations are shown by straightforward application of the Fenchel duality theorem to the maximization of Eq. (2.13), which involves the sum of the concave functions Q and −(1/2αk )kλ − λk k2 . The closedness of P is used both to ensure that the duality relation (2.12) holds, and to guarantee that the minimum in Eq. (2.14) is attained. Note that Eq. (2.14) has the form of an augmented Lagrangian minimization relating to the (somewhat contrived) problem of minimizing P subject to the equality constraint u = 0. Augmented Lagrangian Method We will now translate the duality between the proximal and augmented Lagrangian iterations just described to the constrained optimization context, setting the stage for using this duality in an incremental context. Consider a generic convex programming problem of the form minimize H(y) (2.17) subject to y ∈ Y, Ay − b = 0, where H : ℜn 7→ ℜ is a convex function, Y is a convex set, A is an r × n matrix, and b ∈ ℜr . Consider also the corresponding primal and dual functions P (u) = inf y∈Y, Ay−b=u H(y), Q(λ) = inf y∈Y 14  H(y) + λ′ (Ay − b) , which are convex and concave, respectively. We assume that P is closed and proper, and that the optimal value of the problem is finite, so that Q is also closed proper and concave, and there is no duality gap (see [Ber09], Section 4.2). There is a well-known relation between the primal and dual functions. In particular, Q has the equivalent form Q(λ) = inf r inf u∈ℜ y∈Y, Ay−b=u   H(y) + λ′ (Ay − b) = inf r P (u) + λ′ u , u∈ℜ so P and Q satisfy the conjugacy relation (2.11). Based on the preceding discussion [cf. (2.11)-(2.16)], it follows that the proximal iteration (2.13) can be equivalently written as the two-step process (2.14)-(2.15) n o αk uk+1 ∈ arg minr P (u) + λ′k u + kuk2 , u∈ℜ 2 (2.18) λk+1 = λk + αk uk+1 . (2.19) followed by Moreover, from Eqs. (2.15) and (2.16), we have uk+1 = λk+1 − λk ˜ = ∇Q(λ k+1 ). αk (2.20) We will now write the iteration (2.18)-(2.19) in terms of the augmented Lagrangian, and obtain the classical (first order) augmented Lagrangian method. Using the definition of the primal function P , we see that the minimization in Eq. (2.18) can be written as n o αk inf r P (u) + λk ′ u + kuk2 u∈ℜ 2    αk ′ 2 inf H(y) + λk u + = inf r kuk y∈Y, Ay−b=u u∈ℜ 2 o n αk kAy − bk2 H(y) + λ′k (Ay − b) + = inf r inf u∈ℜ y∈Y, Ay−b=u 2 n o α k = inf H(y) + λ′k (Ay − b) + kAy − bk2 y∈Y 2 = inf Lαk (y, λk ), y∈Y where for any α > 0, Lα is the augmented Lagrangian function Lα (y, λ) = H(y) + λ′ (Ay − b) + α kAy − bk2 , 2 y ∈ ℜn , λ ∈ ℜr . (2.21) From the preceding calculation it also follows that for any yk+1 ∈ Y that minimizes the augmented Lagrangian over Y : yk+1 ∈ arg min Lαk (y, λk ), y∈Y (2.22) we have uk+1 = Ayk+1 − b, and the iteration (2.19) can be equivalently written as the multiplier iteration λk+1 = λk + αk (Ayk+1 − b). 15 (2.23) This is precisely the (first order) augmented Lagrangian method. It is equivalent to the proximal iteration   1 λk+1 ∈ arg maxr Q(λ) − kλ − λk k2 , λ∈ℜ 2αk [cf. Eq. (2.13)]. In view of Eqs. (2.20) and (2.23), it can also be written in the gradient-like form ˜ λk+1 = λk + αk ∇Q(λ k+1 ), (2.24) ˜ where ∇Q(λ k+1 ), the special subgradient of Q at λk+1 , is given by ˜ ∇Q(λ k+1 ) = Ayk+1 − b. (2.25) Note that the minimizing yk+1 in Eq. (2.22) need not exist or be unique. Its existence must be assumed in some way, e.g., by assuming that H has compact level sets. As an example, it can be verified that for 1 the two-dimensional/single constraint problem of minimizing H(y) = ey , subject to y 1 + y 2 = 0, y 1 ∈ ℜ, y 2 ≥ 0, the dual optimal solution is λ∗ = 0, but there is no primal optimal solution. For this problem, the augmented Lagrangian algorithm will generate sequences {λk } and {yk } such that λk → 0 and yk → −∞. Incremental Augmented Lagrangian Methods The duality between the proximal and augmented Lagrangian minimizations outlined above is generic, and holds in other related contexts, based on a similar use of the Fenchel duality theorem. In the context of the separable problem (2.1), it holds in an incremental form where Q(λ) is replaced by qik (λ), as in the IP iteration (2.9), or is replaced by qik (λ) + X i6=ik ˜ i (λℓ )′ (λ − λk ), ∇q i as in the IAP iteration (2.10). We refer to these two methods as the incremental augmented Lagrangian method (abbreviated IAL), and the incremental aggregated augmented Lagrangian method (abbreviated IAAL). Based on the discussion of the algorithm (2.22)-(2.24), the IAL method,   1 kλ − λk k2 , λk+1 ∈ arg maxr qik (λ) − λ∈ℜ 2αk can be implemented as follows, as already noted in [Ber15], Section 6.4.3. 16 Incremental Augmented Lagrangian Iteration (IAL) Select a component index ik , and update the single component y ik according to i k yk+1 ∈ arg min y ik ∈Yi k n o αk hik (y ik ) + λ′k (Aik y ik − bik ) + kAik y ik − bik k2 , 2 (2.26) i while keeping the others unchanged, yk+1 = yki for all i 6= ik . Then update λ according to i k λk+1 = λk + αk (Aik yk+1 − bik ). (2.27) As in the IP method, all component indexes should be selected for iteration in Eq. (2.26) with equal long-term frequency. Note that the augmented Lagrangian minimization is decoupled with respect to the components y i , thus overcoming the major limitation of the augmented Lagrangian approach for separable problems. To derive the IAAL method, we use the equivalent form (1.11)-(1.12) of the IAP algorithm. We see then that the method has similar form to the IAL method, except that λk is first translated by a multiple of the sum of the delayed subgradients. In particular, the IAAL iteration takes the form   1 kλ − νk k2 , λk+1 ∈ arg maxr qik (λ) − λ∈ℜ 2αk where νk = λk + αk X i6=ik ˜ i (λℓ ). ∇q i (2.28) Applying the relations (2.22)-(2.24), it follows that we can write the IAAL iteration in two steps: Select a component index ik , and update the single component y ik according to i k yk+1 ∈ arg min y ik ∈Yi k n hik (y ik ) + νk′ (Aik y ik − bik ) + o αk kAik y ik − bik k2 , 2 (2.29) i while keeping the others unchanged, yk+1 = yki for all i 6= ik . Then update λ according to i k λk+1 = νk + αk (Aik yk+1 − bik ). (2.30) ˜ i (λℓ ), needed for the computation of νk in Eq. (2.28), are generated by Note that the subgradients ∇q i ˜ i (λℓ ) = Ai y i − bi , ∇q i ℓi 17 ∀ i 6= ik , [cf. Eq. (2.25)]. Thus by streamlining the preceding relations, we see that the IAAL updates are written as   2     X αk ik yk+1 ∈ arg min hik (y ik ) + λ′k (Aik y ik − bik ) + Aik y ik − bik + (Ai yℓii − bi ) ,  2 y ik ∈Yi   i6=ik k   If we denote b = Pm i=1 bi , i k − bik + λk+1 = λk + αk Aik yk+1 X i6=ik  (Ai yℓii − bi ) . and neglect the constant term −λ′k bik from the augmented Lagrangian, we can write the iteration in a way that it depends on the scalars bi only through their sum b. Incremental Aggregated Augmented Lagrangian (IAAL) Iteration Select a component index ik , and update the single component y ik according to    X αk ik yk+1 ∈ arg min hik (y ik ) + λ′k Aik y ik + Aik y ik + Ai yℓii − b 2 y ik ∈Yi  i6=ik k    2 , (2.31)   i while keeping the others unchanged, yk+1 = yki for all i 6= ik . Then update λ according to  i k + λk+1 = λk + αk Aik yk+1 X i6=ik  Ai yℓii − b . (2.32) By comparing the IAL method (2.26)-(2.27) with the IAAL method (2.31)-(2.32), we see that they require comparable computations per iteration. While the IAL method requires a diminishing stepsize αk for convergence, the IAAL method can converge with a constant stepsize, assuming that the dual function components have Lipschitz continuous gradients, and the dual function is strongly concave (cf. Prop. 1.1). Intuitively, if it can use a constant stepsize, the IAAL method should be asymptotically more effective than the IAL method. Of course, if Q is not strongly convex (as for example in the important case where Q is polyhedral, which arises in integer programming), our analysis guarantees the convergence of the IAAL method only if the stepsize αk is diminishing. In this case it is unclear which of the IAL and IAAL methods is more effective on a given problem. Both the IAL and IAAL algorithms require an initial multiplier λ0 . Regarding the delayed indexes ℓi in the IAAL algorithm, if the iteration is executed at a single processor, it is most appropriate to choose ℓi to be the iteration index at which the component y i was last changed prior to the current index k, so ℓi ≤ k (if a component y i has not yet been updated prior to k, we take ℓi = 0 and let y0i be some initial choice 18 for y i ). In this case, the formal statement of the IAAL method is again given by Eqs. (2.29)-(2.30), with ℓi replaced by k for all i 6= ik . However, a different value of ℓi may apply if the iteration is executed in a distributed asynchronous computing environment, as in the corresponding IAS method of [NBB01]. Note that the multiplier λk is updated each time a component y i is updated, which suggests that the stepsize αk should be chosen carefully, possibly through some experimentation. Moreover, the strong convexity assumption of Q is essential for the convergence of the method with a constant stepsize. Indeed a three-dimensional example by Chen, He, Ye, and Yuan [CHH14] can be used to show that the IAAL algorithm need not converge for any value of constant stepsize if the strong convexity assumption is violated.† An alternative possibility is to perform a batch of component updates y i of the form (2.29) between multiplier updates of the form (2.30). For example, one may restructure the IAAL iteration so that it consists of a full i cycle of updates of y 1 , . . . , y m , sequentially according to Eq. (2.31), to obtain yk+1 , i = 1, . . . , m, and only then to update λ according to λk+1 = λk + αk m X i=1 Note that this sequential update of y1, . . . , ym ! i Ai yk+1 −b . according to Eq. (2.31) amounts to a cycle of coordinate descent iterations for minimizing the augmented Lagrangian. Therefore, this variant of the IAAL iteration may be viewed as an implementation of the augmented Lagrangian method with approximate minimization of the augmented Lagrangian using coordinate descent. An algorithm of this type may be interesting and has been suggested in the past (see Bertsekas and Tsitsiklis [BeT89], Example 4.4, and Eckstein [Eck12]). Its linear convergence has been shown under certain assumptions by Hong and Luo [HoL13]. The algorithm is worthy of further investigation, particularly in view of favorable computational results given by Wang, Hong, Ma, and Luo [WHM13]. Let us also note that the work by Hong, Chang, Wang, Razaviyayn, Ma, and Luo [HCW14] derives an algorithm for the separable problem (2.1) that is quite similar to the IAAL algorithm, using different assumptions and line of development. The paper [HCW14] proves convergence but not a linear convergence rate result. Comparison with ADMM We will now compare the IAAL iteration with the ADMM. We note that there is a well-known connection of the ADMM and augmented Lagrangian methods, which was clarified long ago through a series of papers. In particular, Lions and Mercier [LiM79] proposed a splitting algorithm for finding a zero of the sum of two maximal monotone operators, known as the Douglas-Ratchford algorithm. It turns out that this algorithm † While the paper [CHH14] is entitled “The Direct Extension of ADMM for Multi-Block Convex Minimization Problems ...,” it considers an algorithm that is not a special case of ADMM, so a convergence counterexample is possible. A correct specialization of ADMM for separable problems (dating from 1989 but unknown to the authors of [CHH14]) will be given shortly, and is convergent under the same broadly applicable conditions as ADMM. 19 contains as a special case the ADMM, as shown in [Gab83]. The paper by Eckstein and Bertsekas [EcB92] showed that the general form of the proximal algorithm for finding a zero of maximal monotone operator, proposed by Rockafellar [Roc76a], [Roc76b], contains as a special case the Douglas-Ratchford algorithm and hence also the ADMM. Thus the ADMM and the augmented Lagrangian method have a common ancestry: they are both special cases of the general form of the proximal algorithm for finding a zero of a maximal monotone operator. The common underlying structure of the two methods is reflected in similar formulas, but ADMM has the advantage of flexibility to allow decomposition, at the expense of a typically slower practical convergence rate. A convenient decomposition-based form of ADMM for the separable problem (2.1) was derived (together with the corresponding coordinate descent version of the augmented Lagrangian method) in [BeT89], Section 3.4 and Example 4.4 (see also [Ber15], Section 5.4.2). Wang, Hong, Ma, and Luo [WHM13], apparently unaware of this form of ADMM, give related algorithms (referred to as Algorithms 2 and 3 in their paper), which, however, involve updating m multiplier vectors in place of the single multiplier update of the following algorithm. At iteration k, and given λk , the ADMM algorithm of [BeT89] generates λk+1 as follows. ADMM Iteration for Separable Problems Perform a separate augmented Lagrangian minimization over y i , for each i = 1, . . . , m,    2   m   X 1  α j i i ′ i i i  , i = 1, . . . , m, Aj yk − b Ai y − Ai yk + yk+1 ∈ arg min hi (y ) + λk Ai y +  2 m j=1 y i ∈Yi    (2.33) and then update λk according to λk+1 α = λk + m m X i=1 i Ai yk+1 ! −b . (2.34) Note that contrary to the augmented Lagrangian method, where the best strategy for adjusting α is usually clear, see e.g., [Ber82], there is no clear way to adjust the parameter α to improve performance in ADMM. As a result for efficiency α is often determined by trial and error. A closely related but more refined form of ADMM, also derived in [BeT89a], Section 3.4, Example 4.4, aims to improve the parameter selection by exploiting the structure of the matrices Ai . It uses a coordinate-dependent parameter α mj in iteration (2.34), in place of α/m, where mj is the number of submatrices Ai that have nonzero jth row. In this version, the multiplier update essentially involves diagonal scaling. The iteration maintains additional vectors zki ∈ ℜr , i = 1, . . . , m, which represent estimates of Ai y i at the optimum, and has the following form, 20 where Aji denotes the jth row of the matrix Ai . Diagonally Scaled ADMM Iteration for Separable Problems Perform a separate augmented Lagrangian minimization over y i , for each i = 1, . . . , m, n α hi (y i ) + λ′k Ai y i + Ai y i − zki i 2 y ∈Yi i yk+1 ∈ arg min 2 o , i = 1, . . . , m, (2.35) and then update λk and zk according to λjk+1 = λjk α + mj m X i=1 i i zk+1 = Ai yk+1 + i Aji yk+1 − bj ! λk − λk+1 , α , j = 1, . . . , r, i = 1, . . . , m. (2.36) (2.37) Note that the preceding two ADMM iterations coincide when there is no nonzero row in any of the matrices Ai , i.e., mj = m for all j. In comparing the IAAL iteration (2.31)-(2.32), and the ADMM iterations (2.33)-(2.34) and (2.35)-(2.37), we note that they involve fairly similar operations. In particular, the ADMM mutiplier update (2.34) approximates an average (over a full cycle of m components) of the IAAL multiplier updates (2.32), and is executed m times less frequently; this is reminiscent of the difference between the proximal and incremental proximal iterations. The different multiplier update frequencies of IAAL and ADMM suggests that assuming IAAL converges, its stepsize αk should be chosen much smaller than the stepsize α in ADMM, say αk ∈ α i , m m2 hα , as a crude approximation, for comparable performance. There are also two other major differences: (a) The ADMM iterations have guaranteed convergence for any constant stepsize α, and under weaker conditions (differentiability of qi and strong convexity of Q are not required). On the other hand the IAAL method requires a diminishing stepsize in general, or (under Lipschitz continuity of ∇qi and strong convexity of Q) a constant stepsize that is not arbitrary, but must be sufficiently small. (b) In the IAAL method a single component y i is updated at each iteration, while in the ADMM all components y i are updated. For some problems, this may work in favor of IAAL, particularly for large m, a case that generally seems to favor incremental methods. Thus for the separable problems of this section, one may roughly view the IAAL method as an incremental variant of ADMM, where the advantage of incrementalism may be offset by less solid convergence properties. 21 A computational comparison of the two methods will be helpful in clarifying their relative merits. The diagonally scaled ADMM iteration (2.35)-(2.37) suggests also a similar diagonal scaling for the IAAL iteration. The simplest way to accomplish this is to use the IAAL method (2.31)-(2.32) after scaling the constraints, i.e., after multiplying the r constraint equations with different scaling factors, which in turn will introduce diagonal scaling for the dual variables. Proposition 1.1 will still apply under this form of scaling, assuming Lipschitz continuity of ∇qi and strong convexity of Q. Comparison with the Methods of Tadjewski [Tad89] and Ruszczynski [Rus95] The methods of [Tad89] and [Rus95] are motivated by the earlier algorithm of [StW75], and apply to the separable constrained optimization problem of this section. They are similar to each other, but use different assumptions. The method of [Tad89] requires differentiability and second order sufficiency assumptions, but applies to nonconvex separable problems that may have a duality gap, while the method of [Rus95] applies to separable problems with convex, possibly nondifferentiable cost function. These methods are also similar to our IAAL method (2.29)-(2.30), but they use different approximations of the quadratic penalty terms. In particular, instead of the vectors yℓii that appear in Eqs. (2.29) and (2.30), they use other terms that are iteratively adjusted, with the aim to improve the approximation of the quadratic penalty terms of the standard augmented Lagrangian. Both papers [Tad89] and [Rus95] provide a convergence analysis, involving suitable choices of various parameters, although the convergence results obtained are not as strong as the ones for ADMM. A major difference of the methods of [Tad89] and [Rus95] from our IAAL method is that, like the ADMM, they update all the components y i simultaneously at each iteration, so they are not incremental in character. 3. PROOF OF PROPOSITION 1.1 Similar to other convergence proofs of incremental gradient methods, including the one of [GOP15] for the IAG method that we follow, the proof of Prop. 1.1 is based on viewing the IAP iteration with constant stepsize αk ≡ α,  xk+1 = xk − α ∇fik (xk+1 ) + X i6=ik  ∇fi (xℓi ) , (3.1) as a gradient method with errors in the calculation of the gradient [cf. Eqs. (1.15), (1.16)]. To deal with the delays in the iterates, we use the following lemma, due to Feyzmahdavian, Aytekin, and Johansson [FAJ14] (which is also used in the convergence proof of [GOP15]): 22 Lemma 3.1: Let {βk } be a nonnegative sequence satisfying βk+1 ≤ pβk + q max max{0,k−d}≤ℓ≤k βℓ , ∀ k = 0, 1, . . . , for some positive integer d and nonnegative scalars p and q such that p + q < 1. Then we have βk ≤ ρk β0 , ∀ k = 0, 1, . . . , 1 where ρ = (p + q) 1+d . In the following proof we take the stepsize α as small as is needed for the various calculations to be valid. Also for convenience in expressing various formulas involving delays, we consider the algorithm for large enough iteration indexes, so that all the delayed iteration indexes in the following calculations are larger than 0 (for this it will be sufficient to consider the algorithm as starting at an iteration k ≥ 2b). Note that the Lipschitz condition on ∇fi implies a Lipschitz condition and a bound on ∇F . In particular, denoting L= m X Li , i=1 we have for all x, z ∈ ℜn , ∇F (x)−∇F (z) = m X i=1 ∇fi (x) − m X i=1 ∇fi (z) ≤ m X i=1 ∇fi (x)−∇fi (z) ≤ m X i=1 Li kx−zk = Lkx−zk. (3.2) As a special case, for z = x∗ , where x∗ is the unique minimum of F , we have ∇F (xℓ ) = ∇F (xℓ ) − ∇F (x∗ ) ≤ Lkxℓ − x∗ k, ∀ ℓ ≥ 0. (3.3) We break down the proof of Prop. 1.1 in steps, first writing the iteration (3.1) as a gradient iteration with errors, then carrying along the errors in a standard line of linear convergence analysis of gradient methods without errors, then bounding the errors, and finally using Lemma 3.1: (a) We write the iteration (3.1) as a gradient method with errors  xk+1 = xk − α ∇F (xk ) + ek , (3.4) where the error term ek is given by ek = ∇fik (xk+1 ) − ∇fik (xk ) + 23 X i6=ik  ∇fi (xℓi ) − ∇fi (xk ) . (3.5) (b) We relate the gradient error ek to the distance kxk − x∗ k by verifying the relation kxk+1 − x∗ k2 = kxk − x∗ k2 − 2α∇F (xk )′ (xk − x∗ ) + α2 ∇F (xk ) 2 + Ek , (3.6) where ′ Ek = α2 kek k2 − 2α xk − α∇F (xk ) − x∗ ek . (3.7) This is done by subtracting x∗ from both sides of Eq. (3.4), norm-squaring both sides, and carrying out the straightforward calculation. (c) We use Eq. (3.7) to bound |Ek | according to |Ek | ≤ α2 kek k2 + 2αkek k xk − x∗ , (3.8) for all sufficiently small α. In particular, from Eq. (3.7), we have |Ek | ≤ α2 kek k2 + 2αkek k xk − x∗ − α∇F (xk ) , and Eq. (3.8) is obtained from the preceding relation by using the inequality xk − x∗ − α∇F (xk ) ≤ kxk − x∗ k. which holds for α sufficiently small; this is a consequence of the fact that under the gradient Lipschitz assumption, a gradient iteration (with no error) reduces the distance to x∗ for α ∈ (0, 1/L] (see e.g., [Ber15], Prop. 6.1.6). (d) We use the strong convexity assumption ′ ∇F (x) − ∇F (y) (x − y) ≥ σkx − yk2 , ∀ x, y ∈ ℜn , (3.9) where σ is the coefficient of strong convexity and the Lipschitz condition (3.2), to invoke the relation ∇F (xk )′ (xk − x∗ ) ≥ σL 1 kxk − x∗ k2 + ∇F (xk ) σ+L σ+L 2 ; (3.10) see e.g., [Nes14], Th. 2.1.22, or [Ber15], Prop. 6.1.9(b). This will be used to bound the term ∇F (xk )′ (xk −x∗ ) of Eq. (3.6). (e) We show that for α ≤ 2 σ+L , we have   σL ∗ 2 kxk − x∗ k2 + |Ek |. kxk+1 − x k ≤ 1 − 2α σ+L In particular, using the relations (3.6) and (3.10), we have   σL 1 2 ∗ 2 ∗ 2 ∗ 2 + α2 ∇F (xk ) kxk+1 − x k ≤ kxk − x k − 2α ∇F (xk ) kxk − x k + σ+L σ+L     σL 2 2 ∗ 2 ≤ 1 − 2α kxk − x k + α α − ∇F (xk ) + |Ek |, σ+L σ+L 24 (3.11) 2 + |Ek | from which Eq. (3.11) follows. (f) We prove that the error ek is proportional to the stepsize α, and to the maximum distance of the iterates from x∗ over the past 2b iterates: kek k ≤ O(α) max k−2b≤ℓ≤k kxℓ − x∗ k. (3.12) This is straightforward, using the Lipschitz assumption on ∇fi and the bound (3.3) on ∇F . In particular, from Eq. (3.5), we have kek k ≤ ∇fik (xk+1 ) − ∇fik (xk ) + ≤ Lik kxk+1 − xk k + ≤ Lik kxk+1 − xk k + X i6=ik X i6=ik X i6=ik ∇fi (xℓi ) − ∇fi (xk ) Li kxk − xℓi k (3.13)  Li kxk − xk−1 k + · · · + kxℓi +1 − xℓi k . Moreover from Eqs. (3.3) and (3.4), kxℓ+1 − xℓ k = α ∇F (xℓ ) + αkeℓ k ≤ αLkxℓ − x∗ k + αkeℓ k, ∀ ℓ ≥ 0. (3.14) Using this relation for ℓ in the range [k − b, k] in Eq. (3.13), we obtain k X (1 − αLik )kek k ≤ O(α) ℓ=k−b kxℓ − x∗ k + k−1 X ℓ=k−b ! keℓ k , where for p ≥ 1, we generically use O(αp ) to denote any function of α such that for some scalar γ > 0, we have O(αp ) ≤ γαp for all α in some bounded open interval containing the origin. Thus, kek k ≤ O(α) k X ℓ=k−b kxℓ − x∗ k + k−1 X ℓ=k−b ! keℓ k . (3.15) From Eq. (3.5), we also have keℓ k ≤ Liℓ kxℓ+1 − xℓ k +  ≤ L kxℓ+1 − x∗ k X i6=iℓ Li kxℓ − xℓi k + kxℓ − x∗ k + X i6=iℓ   Li kxℓ − x∗ k + kxℓi − x∗ k  . (3.16) Since for ℓ in the range [k − b, k − 1], ℓi lies in the range [k − 2b, k − 1], it follows that keℓ k ≤ c max k−2b≤ℓ≤k kxℓ − x∗ k, ∀ ℓ ∈ [k − b, k − 1], where c is some constant that is independent of k and ℓ. Combining this with Eq. (3.15), we obtain Eq. (3.12). 25 (g) We use Eqs. (3.8), (3.11), and (3.12) to obtain kxk+1 − x∗ k2   σL ≤ 1 − 2α kxk − x∗ k2 + O(α2 ) max kxℓ − x∗ k2 . k−2b≤ℓ≤k σ+L (3.17) In particular, the two terms bounding |Ek | in Eq. (3.8) are α2 kek k2 and αkek k xk − x∗ , which in view of Eq. (3.12) are bounded by terms that are O(α4 ) and O(α2 ) times maxk−2b≤ℓ≤k kxℓ − x∗ k2 , respectively. σL (h) We use Eq. (3.17) and Lemma 3.1, with d = 2b, βk = kxk − x∗ k2 , p = 1 − 2α σ+L , and q = O(α2 ), √ so that p + q < 1 for sufficiently small α. This shows that βk = kxk − x∗ k converges linearly to 0, and completes the proof. Q.E.D. Convergence Rate Comparison for Small Stepsizes Note that Eq. (3.17) provides a more refined rate of convergence estimate. While this estimate is not very precise, because of the second order term on the right in Eq. (3.17), it shows that the ratio σL L = σ+L 1 + L/σ where L = Pm i=1 Li and σ is the coefficient of strong convexity, plays an important role, and in particular the convergence rate is improved when the “condition number” L/σ is small. The role of the ratio L/σ in determining the convergence rate of gradient methods (without error) is well-known; see e.g., [Nes04], [Ber15]. Convergence rate estimates like the one of Eq. (3.17) can also be similarly derived for IAG (as shown in [GOP15]), and for the standard nonincremental gradient method [for which the error term |Ek | in Eq. (3.11) is equal to 0]. These estimates, to first order [i.e., after neglecting the second order term in the right-hand side of Eq. (3.17)], are identical for IAP, IAG, and for the standard nonincremental gradient method. This suggests that for very small values of α, IAP and IAG perform comparably, while the nonincremental gradient method performs much worse because it requires m times as much overhead per iteration to calculate the full gradient of the cost function. 4. NONQUADRATIC INCREMENTAL PROXIMAL AND AUGMENTED LAGRANGIAN METHODS The augmented Lagrangian methods of Section 2 apply to linear equality constrained problems for which the multiplier vector λ is unconstrained. This allows the application of the linear convergence result of Prop. 1.1. We will now consider convex inequality constraints, whose multipliers must be nonnegative. As a result the dual problem involves an orthant constraint, and the linear convergence result of Prop. 1.1 does not apply. 26 Unfortunately, when there is an orthant constraint [i.e., X = {x | x ≥ 0} instead of X = ℜn in Eq. (1.9)], the proof of Prop. 1.1 breaks down because the critical inequality (3.3) fails. In fact, to our knowledge, a linear convergence rate result for the IAG method (1.8) applied with an orthant constraint is not currently available. Moreover, the convergence of the augmented Lagrangian-like methods discussed in Section 2 has been analyzed only for the equality-constrained case. In this section we will try to address this difficulty by using a different (nonquadratic) proximal approach. In particular, we will introduce incremental augmented Lagrangian methods for convex inequality constraints, where the quadratic penalty in the augmented Lagrangian is replaced by a suitable nonquadratic penalty. One of our objectives is to develop linearly convergent methods that can exploit separability, similar to the ones of Section 2. A second objective is to develop corresponding dual linearly convergent incremental aggregated gradient and proximal methods for differentiable minimization subject to nonnegativity constraints. Nonquadratic Augmented Lagrangian Methods for Inequality Constraints Consider the convex programming problem minimize H(y) (4.1) subject to y ∈ Y, Gj (y) ≤ 0, j = 1, . . . , r, where H : ℜn 7→ (−∞, ∞) and Gj : ℜn 7→ (−∞, ∞) are convex functiona, and Y is a convex set. The corresponding dual problem is maximize Q(µ) (4.2) subject to µ ≥ 0, where Q : ℜr 7→ [−∞, ∞) is the concave function of the multiplier vector µ = (µ1 , . . . , µr ), given by Q(µ) = inf y∈Y   H(y) +  r X j=1   µj Gj (y) ,  µ ∈ ℜr . (4.3) We will apply an augmented Lagrangian method, first proposed by Kort and Bertsekas [KoB72], and further developed in a number of subsequent works, including the monograph [Ber82] (Chapter 5). The method makes use of a nonquadratic penalty function ψ : ℜ 7→ ℜ with the following properties: (i) ψ is twice differentiable and ∇2 ψ(t) > 0 for all t ∈ ℜ, (ii) ψ(0) = 0, ∇ψ(0) = 1, (iii) limt→−∞ ψ(t) > −∞, (iv) limt→−∞ ∇ψ(t) = 0 and limt→∞ ∇ψ(t) = ∞. 27 The most common and interesting special case is the exponential ψ(s) = exp(s) − 1, s ∈ ℜ. (4.4) The corresponding exponential augmented Lagrangian method and its dual, a proximal algorithm known as the entropy minimization algorithm, has been analyzed first in [KoB72] and [Ber82], and then by Tseng and Bertsekas [TsB93]. Related classes of methods, which also contain the exponential and entropy methods as special cases, were proposed and analyzed later by Iusem, Svaiter, and Teboulle [IST94]; see also the survey by Iusem [Ius99], which contains followup work and many references. The augmented Lagrangian algorithm corresponding to ψ and problem (4.2) maintains multipliers µjk > 0, j = 1, . . . , r, for the inequality constraints, and consists of finding   r   X  µjk j yk+1 ∈ arg min H(y) + , ψ α G (y) j k y∈Y   αjk (4.5) j=1 where αjk > 0, j = 1, . . . , r, are penalty parameters, followed by the multiplier iteration  µjk+1 = µjk ∇ψ ajk Gj (yk+1 ) , j = 1, . . . , r. (4.6) Alternatively and equivalently, based on the Fenchel duality theorem, one may show that the multiplier iteration can be written in the proximal form µk+1 ∈ arg maxr µ∈ℜ    Q(µ) − r X µjk j=1 αjk ψ⋆ µj !  µjk  , (4.7) where Q is the dual function given by Eq. (4.3), and ψ ⋆ is the convex conjugate of ψ. To see the equivalence of the expressions (4.6) and (4.7), let us write ujk+1 = Gj (yk+1 ), j = 1, . . . , r, and note that the augmented Lagrangian minimization (4.5) yields   r   X µjk j j uk+1 ∈ arg min P (u) + ψ(α u ) , k  u=(u1 ,...,ur )∈ℜr  αjk (4.8) j=1 where P is the primal function P (u) = inf y∈Y, Gj (y)≤uj , j=1,...,r H(y). Then the minimization in Eq. (4.8) is the Fenchel dual to the maximization (4.7). By applying the Fenchel duality theorem, we have that the maximizing vector in Eq. (4.7) is equal to the gradient   r j X µk j j  , ∇ j ψ(αk u ) j=1 αk u=u k+1 28 so it is given by the formula (4.6). Note that while the dual problem is to maximize Q(µ) subject to µ ≥ 0, the proximal maximization (4.7) is unconstrained. The reason is that the conjugate ψ ⋆ takes the value ∞ outside the nonnegative orthant, and has the character of a barrier function within the nonnegative orthant. As an example, for the exponential function (4.4) the conjugate is the entropy function     t ln(t) − 1 + 1 ψ ⋆ (t) = 1   ∞ if t > 0, (4.9) if t = 0, if t < 0. An important advantage of the nonquadratic augmented Lagrangian method versus its quadratic counterpart, is that it leads to twice differentiable augmented Lagrangians. This advantage also carries over to the incremental augmented Lagrangian methods to be presented next. Nonquadratic Incremental Augmented Lagrangian Methods for Inequality Constraints Consider now the separable constrained optimization problem minimize m X hi (y i ) i=1 subject to yi ∈ Yi , i = 1, . . . , m, m X (4.10) gji i=1 (y i ) ≤ 0, where hi and gji are convex real-valued functions, and Yi are convex sets. Similar to the development of Section 2, the corresponding incremental aggregated augmented Lagrangian method, which parallels IAAL, maintains a vector µk > 0 and operates as follows. Incremental Aggregated Augmented Lagrangian Iteration for Inequalities (IAALI) Select a component index ik , and update the single component y ik according to     r j   X X µk  j  ik i ) ik ) + ψ α g (y g (y , yk+1 ∈ arg min hik (y ik ) + jik ji ℓi k  αjk y ik ∈Yi  (4.11) i6=ik j=1 k i while keeping the others unchanged, yk+1 = yki for all i 6= ik . Then update µ according to µjk+1 =  µjk ∇ψ ajk  gji (y ik ) k k+1 + m X i6=ik 29  gji (yℓii ) , j = 1, . . . , r. (4.12) Note that the minimization (4.11) is of low dimension, but involves the nonquadratic penalty function ψ. Thus even when the component y ik is one-dimensional, this minimization will likely require some form of iterative line search. Note also that the update formula (4.12) can equivalently be written as  ! r j  X X j  µ µ k ⋆ µk+1 ∈ arg maxr qik (µ) + ψ ∇qi (µℓi )′ (µ − µk ) − , µ∈ℜ  αjk µjk  i6=ik (4.13) j=1 where qi are the dual function components, given by   r   X qi (µ) = inf hi (y i ) + µj gij (y i ) ,  y i ∈Y i  µ ∈ ℜr , j=1 i = 1, . . . , m. The form (4.13) of the method can be viewed as an incremental aggregated proximal method for maximizing Pm Q(µ) = i=1 qi (µ) over µ ≥ 0, where   r   X µj gji (y i ) , i = 1, . . . , m; (4.14) qi (µ) = inf hi (y i ) +  y i ∈Yi  j=1 cf. Eq. (2.3). The convergence properties of the IAALI and the corresponding incremental aggregated proximal method (4.13) for solving the dual problem maximize m X qi (µ) i=1 subject to µ ≥ 0, are interesting research subjects, as we will now discuss. Nonquadratic Incremental Aggregated Proximal Algorithm for Nonnegativity Constraints Consider the minimization problem minimize def F (x) = m X fi (x) (4.15) i=1 subject to x ≥ 0, where fi : ℜn 7→ ℜ, i = 1, . . . , m, are convex real-valued functions. When translated to this minimization context, the algorithm (4.13) maintains a vector xk > 0 that is updated as follows. Nonquadratic Incremental Aggregated Proximal Iteration for X = {x | x ≥ 0} Select a component index ik , and obtain xk+1 as xk+1 ∈ arg minn x∈ℜ    fik (x) + X i6=ik ∇fi (xℓi )′ (x − xk ) + 30 n X xjk j=1 αjk ψ⋆ xj !  xjk  . (4.16) The analysis of the convergence properties of this algorithm is beyond the scope of this paper, and will be the subject of a separate publication. In particular, it is interesting to investigate the linear convergence of the method (4.16) when the parameters ajk are constant (but sufficiently small), under the appropriate Lipschitz continuity and strong convexity assumptions, similar to Prop. 1.1. Note that by differentiating the cost function in the minimization of Eq. (4.16), we obtain the optimality condition, which can be written as  1   1  xk+1 ⋆ ∇ψ 1 α1 x k  k  X   .. ∇fik (xk+1 ) + ∇fi (xℓi ) +  (4.17)  = 0. .   xm   i6=ik 1 k+1 ⋆ αm ∇ψ xm k k This expression may be used in the line of proof of Section 3 in place of the corresponding formula (1.14) for the unconstrained IAP algorithm (1.14), which can be written in the form ∇fik (xk+1 ) + X i6=ik ∇fi (xℓi ) + xk+1 − xk = 0. α (4.18) When ψ (and hence also ψ ⋆ ) is quadratic and αjk ≡ α, the two preceding formulas coincide. However, contrary to iteration (4.18), the iteration (4.17) preserves the strict positivity of the iterates (xk > 0 for all k), and addresses the orthant-constrained problem (4.15). Entropy-Based Incremental Aggregated Proximal Algorithm for Nonnegativity Constraints For an illustration of the algorithm (4.16), consider the special case where ψ is the exponential function and ψ ⋆ is the entropy function, so that ψ(s) = exp(s) − 1,   t ln(t) − 1 + 1 if t > 0,   ψ ⋆ (t) = 1 if t = 0,   ∞ if t < 0, ∇ψ ⋆ (t) = ( ln(t) if t > 0, does not exist if t ≤ 0, [cf. Eqs. (4.4) and (4.9)]. Then by using a constant stepsize αj for each coordinate, Eq. (4.17) takes the form ln xjk+1 xjk !  X ∂f (x ) ∂f (x ) i ℓi i k+1 , + = −αj  k j ∂x ∂xj  j = 1, . . . , n, (4.19) i6=ik where ik is the component index selected for iteration k. We can write this iteration as ln xjk+1 xjk ! = −αj   ∂F (xk ) j + ek , ∂xj (4.20) where ek = (e1k , . . . , enk ) is the error vector ek = ∇fik (xk+1 ) − ∇fik (xk ) + 31 X i6=ik  ∇fi (xℓi ) − ∇fi (xk ) , (4.21) that played an important role in the proof of Prop. 1.1 [cf. Eq. (3.5)]. We will use the line of analysis of Section 3 to speculate about the linear convergence of iteration (4.19) and its equivalent form (4.20)-(4.21). Assume that the minimum x∗ satisfies the strict complementary slackness condition ∂F (x∗ ) > 0, ∂xj ∀ j ∈ J 0, (4.22)  where J 0 = j | (xj )∗ = 0 , and speculate on the behavior of {xk } in a small neighborhood around x∗ . Consider first the iterates xjk , j ∈ J 0 , in a small neighborhood around x∗ . We note that the errors ejk ∂F (xk ) , for all ∂xj j j the logarithms ln(xk+1 /xk ), j ∈ J 0 , so the sequences {xjk }, j ∈ J 0 , are of Eq. (4.21) are near 0 and by Eq. (4.22), are negligible relative to the gradient components j ∈ J 0 . In view of the form of iteration (4.20) and the condition (4.22), are negative, and hence the ratios xjk+1 /xjk , j ∈ J 0 , are within [0, 1), linearly decreasing towards 0. Consider next the iterates xjk , j ∈ / J 0 , in a small neighborhood around x∗ . They are close to the corresponding positive numbers (xj )∗ , j ∈ / J 0 , and they are iterated according to ln(xjk+1 ) = ln(xjk ) − αj   ∂F (xk ) j + e k , ∂xj j∈ / J 0, (4.23) [cf. Eq. (4.20)]. This looks like an incremental aggregated gradient iteration in the logarithms ln(xj ), j ∈ / J 0. Indeed by making the transformation of variables z j = ln(xj ), j = 1, . . . , n, for xj > 0, and introducing the function  H(z 1 , . . . , z n ) = F exp(z 1 ), . . . , exp(z n ) , and its gradient, which is related to the gradient of F through the relation  ∂F exp(z 1 ), . . . , exp(z n ) ∂F (x) ∂H(z) j) = exp(z = xj , ∂z j ∂xj ∂xj j = 1, . . . , n, we see that the iteration (4.23) can be written as j zk+1 = zkj − αj xjk  ∂H(zk ) ∂z j  + αj ejk , j∈ / J 0, where xjk = exp(zkj ). Thus, neglecting the effect of the coordinates xj , j ∈ J 0 , that are fast diminishing to 0, the iteration behaves like the IAP method restricted to the space of the coordinate logarithms z j = ln(xj ), j∈ / J 0 , with coordinate-dependent stepsizes near x∗ . αj j xk that are close to the positive constants αj , (xj )∗ j ∈ J 0 , for xk By combining the preceding argument with the proof of Prop. 1.1, we can show that the method converges to x∗ locally, i.e., when started sufficiently close to x∗ , assuming the strict complementarity condition (4.22), and the appropriate stepsize, Lipschitz continuity, and strong convexity conditions. The  proof is long and will be deferred to a future publication. Moreover, for j ∈ / J 0 , ln(xjk ) converges to 32  ln (xj )∗ linearly, while for j ∈ J 0 , {xjk } also converges to (xj )∗ linearly. However, a more sophisticated argument is needed to show global and linear convergence of {xk } to x∗ , by combining the line of proof of Prop. 1.1 with the existing convergence proofs of the entropy minimization algorithm and its dual, the exponential method of multipliers. Entropy-Based Incremental Aggregated Gradient Algorithm for Nonnegativity Constraints Finally let us note the analog of the IAG method for nonnegativity constraints. In analogy with Eq. (4.19) it has the form ln xjk+1 xjk ! = −αj m X ∂fi (xℓi ) , ∂xj i=1 j = 1, . . . , n, or equivalently xjk+1 = xjk exp −αj [the difference from Eq. (4.19) is the use of m X ∂fi (xℓi ) ∂xj i=1 ∂fi (xℓ k ∂xj ik ) ! , j = 1, . . . , n, (4.24) ∂fi (xk+1 ) k ]. ∂xj This iteration should be in place of compared with the IAS method (1.5), for the case where the functions fi are differentiable, and the stepise αk is a constant α: " xk+1 = xk − α m X i=1 #+ ∇fi (xℓi ) , (4.25) where [·]+ denotes projection onto the nonnegative orthant. We may view the method (4.25) as the constrained version of the IAG method (1.8) with constant stepsize for which, however, no linear convergence proof is presently available.† The iteration (4.24) may also be viewed as an incremental version of the mirror descent method; see Beck and Teboulle [BeT03], the surveys by Juditsky and Nemirovski [JuN11a], [JunN11b], and the references quoted there, and the author’s presentation in [Ber15], Section 6.6. Using similar arguments to the case of iteration (4.19), we can show that the iteration (4.24) converges linearly to x∗ , when started sufficiently close to x∗ , assuming the strict complementarity condition (4.22), and the appropriate constant stepsize, and other conditions. Note that the iteration (4.24) may be implemented more conveniently than the proximal iteration (4.16), as it does not require a proximal minimization. However, the iteration (4.24) is not suitable as the basis for the development of an incremental augmented Lagrangian method, such as IAALI [cf. Eqs. (4.11)-(4.12)]. † A local linear convergence result for the constrained IAG method (4.25) is possible, assuming the strict complementarity condition (4.22). In particular, it can be shown that there is a sphere centered at x∗ such that if x0 belongs to that sphere, then the sequence generated by iteration (4.25) stays within that sphere and converges linearly to x∗ . The idea of the proof is that after the first iteration, all the iterates satisfy xjk = 0 for all indices j ∈ J 0 , so the method essentially reduces to the IAG method in the space of variables xj , j ∈ / J 0. 33 A final comment relates to the choice of the stepsizes αj in iteration (4.24). For the coordinates that P ∂fi (xℓ ) i are bounded away from 0 (i.e., for j ∈ / J 0 ) we have asymptotically m ≈ 0, so from a Taylor i=1 ∂xj expansion of the exponential in Eq. (4.24), we obtain  ! m X ∂f (x ) 1 i ℓ j j  i + xk+1 = xk 1 + −αj j ∂x 2 i=1 m X ∂fi (xℓi ) −αj ∂xj i=1 !2  + · · · . By discarding the second and higher order terms for j ∈ / J 0 , we see that approximately, xjk+1 ≈ xjk − αj xjk m X ∂fi (xℓi ) , ∂xj i=1 j∈ / J 0. This suggests scaling the stepsizes αj for j ∈ / J 0 , so that αj is inversely proportional to the optimal value (xj )∗ . On the other hand, for j ∈ J 0 , it makes sense to choose αj large (subject to a positive lower bound) in order to accelerate the convergence of xjk to (xj )∗ = 0. Thus a reasonable heuristic is to set αj = α , max{x̄j , δ} j = 1, . . . , n, where x̄j is an estimate for the optimal coordinate value (xj )∗ , α is some positive scalar, which corresponds to the stepsize of the constrained IAG iteration (4.25), and δ is a small positive constant. One may also consider updating the values αj in the course of the algorithm, as better estimates x̄j are obtained. 5. CONCLUDING REMARKS In this paper we have proposed IAP, an incremental aggregated proximal method, and we have shown that under favorable assumptions, it attains a linear convergence rate, using a constant (but sufficiently small) stepsize. The application of this method in a dual context, to separable constrained optimization problems, yields the IAAL method, an incremental augmented Lagrangian method that preserves and exploits the separable structure. The principal difference of our method relative to the several alternative augmented Lagrangian-based proposals, is its incremental character and its high update frequency of the multiplier λk ; the alternative methods, except Algorithm 1 of [WHM13] and the one of [RoT15], but including the proper version of ADMM for separable problems, update all the primal variables y i , i = 1, . . . , m, simultaneously rather than sequentially, so they are not incremental in nature. Moreover, the alternative methods update the multipliers m times less frequently than IAAL. A systematic computational comparison of our methods with the nonincremental alternatives will be helpful in clarifying what advantages our incremental approach may hold. There are several analytical issues relating to the IAAL method, which require further investigation. For example a more refined convergence rate analysis may point the way to adaptive stepsize adjustment schemes, and/or forms of scaling based on second derivatives of the cost function and the matrices Ai . There 34 are analyses of this type for ADMM; see the paper by Giselsson and Boyd [GiB15], and the references cited there. Another possibility is to use a momentum term in the updating formula for the multiplier λ. A third possibility is to control the degree of incrementalism by “batching” multiple augmented Lagrangian iterations involving multiple components. We have also proposed linearly converging extensions of IAAL for problems with convex inequality constraints. These are based on a nonquadratic augmented Lagrangian approach such as the exponential, and its dual version, which is an incremental aggregated entropy algorithm (4.19). The fuller investigation of this method, as well as the method (4.24), which is the exponential analog of the IAG method for nonnegativity constraints, are important subjects for investigation. 6. REFERENCES [AFB06] Ahn, S., Fessler, J., Blatt, D., and Hero, A. O., 2006. “Convergent Incremental Optimization Transfer Algorithms: Application to Tomography,” IEEE Transactions on Medical Imaging, Vol. 25, pp. 283-296. [BLY15] Bragin, M. A., Luh, P. B., Yan, J. H., Yu, N., and Stern, G. A., 2015. “Convergence of the Surrogate Lagrangian Relaxation Method,” J. of Optimization Theory and Applications, Vol. 164, pp. 173-201. [BNO03] Bertsekas, D. P., Nedić, A., and Ozdaglar, A. E., 2003. Convex Analysis and Optimization, Athena Scientific, Belmont, MA. [BPC11] Boyd, S., Parikh, N., Chu, E., Peleato, B., and Eckstein, J., 2011. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers, Now Publishers Inc, Boston, MA. [BeT89] Bertsekas, D. P., and Tsitsiklis, J. N., 1989. Parallel and Distributed Computation: Numerical Methods, Prentice-Hall, Englewood Cliffs, N. J. [BeT03] Beck, A., and Teboulle, M., 2003. “Mirror Descent and Nonlinear Projected Subgradient Methods for Convex Optimization,” Operations Research Letters, Vol. 31, pp. 167-175. [Ber78] Bertsekas, D. P., 1978. “Local Convex Conjugacy and Fenchel Duality,” Preprints of 7th Triennial World Congress of IFAC, Helsinki, Finland, Vol. 2, pp. 1079-1084. [Ber79] Bertsekas, D. P., 1979. “Convexification Procedures and Decomposition Methods for Nonconvex Optimization Problems,” J. of Optimization Theory and Applications, Vol. 29, pp. 169-197. [Ber82] Bertsekas, D. P., 1982. Constrained Optimization and Lagrange Multiplier Methods, Academic Press, NY; republished in 1996 by Athena Scientific, Belmont, MA. On line at http://web.mit.edu/dimitrib/www/lagrmult.html. [Ber09] Bertsekas, D. P., 2009. Convex Optimization Theory, Athena Scientific, Belmont, MA. [Ber10] Bertsekas, D. P., 2010. “Incremental Gradient, Subgradient, and Proximal Methods for Convex Optimization: A Survey,” Lab. for Information and Decision Systems Report LIDS-P-2848, MIT; arXiv:1507.01030. [Ber11] Bertsekas, D. P., 2011. “Incremental Proximal Methods for Large Scale Convex Optimization,” Math. Programming, Vol. 129, pp. 163-195. [Ber15] Bertsekas, D. P., 2015. Convex Optimization Algorithms, Athena Scientific, Belmont, MA. 35 [CHH14] Chen, C., He, B., Ye, Y., and Yuan, X., 2014. “The Direct Extension of ADMM for Multi-Block Convex Minimization Problems is not Necessarily Convergent,” Mathematical Programming, published on line. [ChT94] Chen, G., and Teboulle, M., 1994. “A Proximal-Based Decomposition Method for Convex Minimization Problems,” Mathematical Programming, Vol. 64, pp. 81-101. [DLP14] Deng, W., Lai, M. J., Peng, Z., and Yin, W., 2014. “Parallel Multi-Block ADMM with O (1/k) Convergence,” arXiv preprint arXiv:1312.3040v2. [DaL15] Dang, C., and Lan, G., (2015). “Randomized First-order Methods for Saddle Point Optimization,” arXiv preprint arXiv:1409.8625v3. [EcB92] Eckstein, J., and Bertsekas, D. P., 1992. “On the Douglas-Rachford Splitting Method and the Proximal Point Algorithm for Maximal Monotone Operators,” Math. Programming, Vol. 55, pp. 293-318. [Eck12] Eckstein, J., 2012. “Augmented Lagrangian and Alternating Direction Methods for Convex Optimization: A Tutorial and Some Illustrative Computational Results,” RUTCOR Research Report RRR 32-2012, Rutgers, Univ. [Eve63] Everett, H., 1963. “Generalized Lagrange Multiplier Method for Solving Problems of Optimal Allocation of Resources,” Operations Research, Vol. 11, pp. 399-417. [FAJ14] Feyzmahdavian, H. R., Aytekin, A., and Johansson, M., 2014. “A Delayed Proximal Gradient Method with Linear Convergence Rate,” in Prop. of 2014 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), pp. 1-6. [GOP15] Gurbuzbalaban, M., Ozdaglar, A., and Parrilo, P., 2015. “On the Convergence Rate of Incremental Aggregated Gradient Algorithms,” arXiv preprint arXiv:1506.02081. [GaM76] Gabay, D., and Mercier, B., 1976. “A Dual Algorithm for the Solution of Nonlinear Variational Problems via Finite-Element Approximations,” Comp. Math. Appl., Vol. 2, pp. 17-40. [Gab79] Gabay, D., 1979. Methodes Numeriques pour l’Optimization Non Lineaire, These de Doctorat d’Etat et Sciences Mathematiques, Uni. Pierre at Marie Curie (Paris VI). [Gab83] Gabay, D., 1983. “Applications of the Method of Multipliers to Variational Inequalities,” in M. Fortin and R. Glowinski, eds., Augmented Lagrangian Methods: Applications to the Solution of Boundary-Value Problems, North-Holland, Amsterdam. [GiB15] Giselsson, P., and Boyd, S., 2015. “Metric Selection in Douglas-Rachford Splitting and ADMM,” arXiv preprint arXiv:1410.8479v4. [GlM75] Glowinski, R. and Marrocco, A., 1975. “Sur l’ Approximation par Elements Finis d’ Ordre un et la Resolution par Penalisation-Dualite d’une Classe de Problemes de Dirichlet Non Lineaires” Revue Francaise d’Automatique Informatique Recherche Operationnelle, Analyse Numerique, R-2, pp. 41-76. [HCW14] Hong, M., Chang, T.-H., Wang, X., Razaviyayn, M., Ma, S., and Luo, Z.-Q., 2013. “A Block Successive Upper Bound Minimization Method of Multipliers for Linearly Constrained Convex Optimization,? arXiv preprint arXiv:1401.7079v1. [HaM11] Hamdi, A., and Mishra, S. K., 2011. “Decomposition Methods Based on Augmented Lagrangians: A Survey,” 36 in Topics in Nonconvex Optimization, Springer, N. Y., pp. 175-203. [HoL13] Hong, M., and Luo, Z. Q., 2013. “On the Linear Convergence of the Alternating Direction Method of Multipliers,” arXiv preprint arXiv:1208.3922v3. [IST94] Iusem, A. N., Svaiter, B. F., and Teboulle, M., 1994. “Entropy-Like Proximal Methods in Convex Programming,” Math. of Operations Research, Vol. 19, pp. 790-814. [Ius99] Iusem, A. N., 1999. “Augmented Lagrangian Methods and Proximal Point Methods for Convex Minimization,” Investigacion Operativa, Vol. 8, pp. 11-49. [JuN11a] Juditsky, A., and Nemirovski, A., 2011. “First Order Methods for Nonsmooth Convex Large-Scale Optimization, I: General Purpose Methods,” in Optimization for Machine Learning, by Sra, S., Nowozin, S., and Wright, S. J. (eds.), MIT Press, Cambridge, MA, pp. 121-148. [JuN11b] Juditsky, A., and Nemirovski, A., 2011. “First Order Methods for Nonsmooth Convex Large-Scale Optimization, II: Utilizing Problem’s Structure,” in Optimization for Machine Learning, by Sra, S., Nowozin, S., and Wright, S. J. (eds.), MIT Press, Cambridge, MA, pp. 149-183. [KoB72] Kort, B. W., and Bertsekas, D. P., 1972. “A New Penalty Function Method for Constrained Minimization,” Proc. 1972 IEEE Confer. Decision Control, New Orleans, LA, pp. 162-166. [LiM79] Lions, P. L., and Mercier, B., 1979. “Splitting Algorithms for the Sum of Two Nonlinear Operators,” SIAM J. on Numerical Analysis, Vol. 16, pp. 964-979. [Mai13] Mairal, J., 2013. “Optimization with First-Order Surrogate Functions,” arXiv preprint arXiv:1305.3120. [Mai14] Mairal, J., 2014. “Incremental Majorization-Minimization Optimization with Application to Large-Scale Machine Learning,” arXiv preprint arXiv:1402.4419. [Mar70] Martinet, B., 1970. “Regularisation d’ Inéquations Variationelles par Approximations Successives,” Revue Fran. d’Automatique et Infomatique Rech. Opérationelle, Vol. 4, pp. 154-159. [NBB01] Nedić, A., Bertsekas, D. P., and Borkar, V., 2001. “Distributed Asynchronous Incremental Subgradient Methods,” Proc. of 2000 Haifa Workshop “Inherently Parallel Algorithms in Feasibility and Optimization and Their Applications,” by D. Butnariu, Y. Censor, and S. Reich, Eds., Elsevier, Amsterdam. [NeB01] Nedić, A., and Bertsekas, D. P., 2001. “Incremental Subgradient Methods for Nondifferentiable Optimization,” SIAM J. on Optimization, Vol. 12, 2001, pp. 109-138. [NeB10] Nedić, A., and Bertsekas, D. P., 2010. “The Effect of Deterministic Noise in Subgradient Methods,” Math. Programming, Ser. A, Vol. 125, pp. 75-99. [Ned11] Nedić, A., 2011. “Random Algorithms for Convex Minimization Problems,” Math. Programming, Ser. B, Vol. 129, pp. 225-253. [Nes04] Nesterov, Y., 2004. Introductory Lectures on Convex Optimization, Kluwer Academic Publisher, Dordrecht, The Netherlands. [RoT15] Robinson, D. P., and Tappenden, R. E., 2015. “A Flexible ADMM Algorithm for Big Data Applications,” arXiv preprint arXiv:1502.04391. 37 [Roc73] Rockafellar, R. T., 1973. “A Dual Approach to Solving Nonlinear Programming Problems by Unconstrained Optimization,” Math. Programming, pp. 354-373. [Roc76a] Rockafellar, R. T., 1976. “Monotone Operators and the Proximal Point Algorithm,” SIAM J. on Control and Optimization, Vol. 14, pp. 877-898. [Roc76b] Rockafellar, R. T., 1976. “Augmented Lagrangians and Applications of the Proximal Point Algorithm in Convex Programming,” Math. of Operations Research, Vol. 1, pp. 97-116. [Rus95] Ruszczynski, A., 1995. “On Convergence of an Augmented Lagrangian Decomposition Method for Sparse Convex Optimization,” Math. of Operations Research, Vol. 20, pp. 634-656. [SLB13] Schmidt, M., Le Roux, N., and Bach, F., 2013. “Minimizing Finite Sums with the Stochastic Average Gradient,” arXiv preprint arXiv:1309.2388. [TaM85] Tanikawa, A., and Mukai, M., 1985. “A New Technique for Nonconvex Primal-Dual Decomposition of a Large-Scale Separable Optimization Problem,” IEEE Trans. Autom. Control, Vol. AC-30, pp. 133-143 [Tad89] Tatjewski, P., 1989. “New Dual-Type Decomposition Algorithm for Nonconvex Separable Optimization Problems,” Automatica, Vol. 25, pp. 233-242. [TsB93] Tseng, P., and Bertsekas, D. P., 1993. “On the Convergence of the Exponential Multiplier Method for Convex Programming,” Math. Programming, Vol. 60, pp. 1-19. [WHM13] Wang, X., Hong, M., Ma, S., Luo, Z. Q., 2013. “Solving Multiple-Block Separable Convex Minimization Problems Using Two-Block Alternating Direction Method of Multipliers,” arXiv preprint arXiv:1308.5294. [WaB13] Wang, M., and Bertsekas, D. P., 2013. “Incremental Constraint Projection-Proximal Methods for Nonsmooth Convex Optimization,” Lab. for Information and Decision Systems Report LIDS-P-2907, MIT, to appear in SIAM J. on Optimization. [WaB15] Wang, M., and Bertsekas, D. P., 2015. “Incremental Constraint Projection Methods for Variational Inequalities,” Mathematical Programming, Vol. 150, pp. 321-363. 38
3cs.SY
arXiv:1511.00954v1 [math.CO] 3 Nov 2015 EFFECTIVE INVARIANT THEORY OF PERMUTATION GROUPS USING REPRESENTATION THEORY NICOLAS BORIE Abstract. Using the theory of representations of the symmetric group, we propose an algorithm to compute the invariant ring of a permutation group. Our approach have the goal to reduce the amount of linear algebra computations and exploit a thinner combinatorial description of the invariant ring. Computational Invariant Theory, representation theory, permutation group This is a drafty old version : full corrected text are available at : http://www.springer.com/ 1. Introduction Invariant theory has been a rich and central area of algebra ever since the eighteenth theory, with practical applications [6, § 5] in the resolution of polynomial systems with symmetries (see e.g. [4], [10], [20, § 2.6], [7]), in effective Galois theory (see e.g. [5], [1], [11]), or in discrete mathematics (see e.g. [22, 16] for the original motivation of the second author). The literature contains deep and explicit results for special classes of groups, like complex reflection groups or the classical reductive groups, as well as general results applicable to any group. Given the level of generality, one cannot hope for such results to be simultaneously explicit and tight in general. Thus the subject was effective early on: given a group, one wants to calculate the properties of its invariant ring. Under the impulsion of modern computer algebra, computational methods, and their implementations, have largely expanded in the last twenty years [12, 20, 23, 6, 13, 14]. However much progress is still needed to go beyond toy examples and enlarge the spectrum of applications. Classical approaches solving the problem of computing invariant ring use elimination techniques in vector spaces of too high dimensions. Gröbner basis become impracticable when the number of variables goes up (around 10 for modern computers). The evaluation approach proposed by the author in [3] required a permutation group whose index in the symmetric group is relatively controlled (around 1000 for modern computers). Each approaches localize the algebra reduction in vector spaces still of too large dimensions. Gröbner basis approaches works with monomials of degree d over n variables and linear reduction over a space spanned by these monomials is costly. The evaluation approach, proposed by the author in his thesis, does the linear algebra in a free module spanned by the cosets of the symmetric group by a permutation group (i.e. it have the index for dimension). In both case, as linear reduction globally cost the cube of the dimension of the space, one cannot hope to go so much further with classical approaches even with the progress of computer. We propose in this article an approach following the idea that adding more combinatorics in invariant theory help to produce more efficient algorithms whose outputs could perhaps reveal some combinatorics also ; the long time goal being 1 2 NICOLAS BORIE having a combinatorial description of invariant ring (generators or couple of primary secondary invariants families). Since Hilbert, This problem have been solve only in very restrictive and special cases (for example, [9] give secondary invariants for Young subgroups of symmetric groups). We focus on the problem of computing secondary invariants of finite permutation groups in the non modular case. Assuming that, we will shows how to localize computations inside selected irreducible representations of the symmetric group. These spaces are smaller than the ones used in classical approaches and we can largely take advantages of the combinatorial results coming from the theory of representations of the symmetric group. 2. Invariant ring and representations of the symmetric group For any set S, we will denote |S| the cardinality of the set S. 2.1. Invariant ring of permutation group and application to combinatorics. Our approach start from a result in one key article of invariant theory written by Stanley [18, proposition 4.9] mixing invariant of finite group and combinatorics. We recall this general result: Proposition 2.1. Let θ1 , . . . , θn be an homogeneous set of parameters for K[x]G , where G is any finite subgroup of GL(Kn ) of order |G|. Set di = deg(θi ) and t = d1 . . . dn /|G|. Then the action of G on the quotient ring S = K[x]/(θ1 , . . . , θn ) is isomorphic to t times the regular representation of G. Applying this result to Sn the symmetric group of degree n with θi = ei (elementary symmetric polynomial) Y X ( xi ), (1) ei := P ⊂{1,...,n} i∈P we recover the well known result that the ring K[x]/(e1 , . . . , en ) is isomorphic the n! = 1). This regular representation RR(Sn ) of the symmetric group (here t = n! well known quotient K[x]/(e1 , . . . , en ) is called the coinvariant ring of the symmetric group in the algebraic combinatorics world and several basis of this ring have been explicitly built (Harmonic polynomials, Schubert Polynomials, Descents monomials and more [2, 15, 9]). (2) K[x]/(e1 , . . . , en ) ∼Sn RR(Sn ) Let G a group of permutations, subgroup of Sn , we know reapply the result of Stanley to G with the same homogeneous set of parameters formed with the elementary symmetric polynomials. Then, the ring of coinvariant of the symmetric group is now also isomorphic to t = n!/|G| time the regular representation of the group G. n!/|G| (3) K[x]/(e1 , . . . , en ) ∼G M RR(G) i=1 We know that for any permutation group G, in the non modular case, the ring of invariant under the action of G is a Cohen-Macaulay algebra. This imply that there exist a family of generator ηi making the ring of invariant under the action of G a free module of rank n!/|G| over the ring of symmetric polynomials. EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 3 n!/|G| (4) K[x]G = M ηi K[e1 , . . . , en ] i=1 Taking the quotient on both side by the ideal (e1 , . . . , en ) and keeping ηi as representative of its equivalent class in the quotient, we have n!/|G| (5) K[x]G /(e1 , . . . , en ) = M K · ηi i=1 As K[x]G is, by definition, the subspace of K[x] on which the action of G is trivial, the result of Stanley imply in particular that the polynomials ηi span the subspace of the coinvariant of the symmetric group on which the action of G is trivial. A way to construct the ηi is thus to search them as G-fixed point inside the ring of coinvariant of the symmetric group and that could be done irreducible representation by irreducible representation. The theory of representations of the symmetric group has been largely studied, this bring us to formulate the following problem: Problem 2.2. Let n a positive integer and G a permutation group, subgroup of Sn . Construct an explicit basis of the trivial representations of G appearing in each irreducible subrepresentation of Sn inside the quotient K[x]/(e1 , . . . , en ). A first step to solve this problem constitute in having a basis of the coinvariant for the symmetric group respecting the action of Sn such that it can be partitioned by irreducible representations. We expose this basis in the next section. 2.2. Representations of the symmetric group. We recall in this section some results describing the irreducible representations of the symmetric group. For a positive integer n, we will call λ partition of n (denoted λ ⊢ n) a non increasing sequence of integers λ = (λ1 , . . . , λr ) whose entries sum up to n. sage: sage: sage: P = Partitions(4); P Partitions of the integer 4 P.list() [[4], [3, 1], [2, 2], [2, 1, 1], [1, 1, 1, 1]] Partitions(8).random_element() [3, 2, 2, 1] For a positive integer n, irreducible representations of the symmetric group Sn are indexed by the Partitions of n. Since we have a finite group, the multiplicity of an irreducible representation inside the regular representation equal its dimension. This information can be collected studying standard tableaux. Let n a positive integer and λ = (λ1 , . . . , λr ) a partition of n. A tableau of shape λ is a diagram of square boxes disposed in raw such that the first raw contains λ1 boxes, on top of its, a second raw contains λ2 boxes and so on. A standard tableau of shape λ is a filled tableau of shape λ with integer from 1 to n such that integers are increasing in column and raw. We will denote ST ab(λ) the set of standard tableaux of shape λ. We can ask Sage to display a such object. 4 NICOLAS BORIE sage: T = StandardTableaux([3,2,2,1]).random_element(); T [[1, 2, 3], [4, 5], [6, 8], [7]] sage: latex(T) 7 6 8 4 5 1 2 3 We can also iterate or generate all tableaux of a given shape. sage: S = StandardTableaux([2,2,1]); S sage: for T in S: latex(T) 3 2 5 1 4 4 2 5 1 3 Standard tableaux of shape [2, 2, 1] 4 3 5 1 2 5 2 4 1 3 5 3 4 1 2 The number f λ of standard tableaux of a given shape λ can be easily computed using the hook-length formula [2, formula 2.1]. As standard tableaux of shape λ constitute a basis indexing of the vector space associated to the irreducible representation of the symmetric group indexed by λ, and because this same representation must have for multiplicity its dimension inside the regular representation of Sn , we have X (6) (f λ )2 = |Sn | = n! λ⊢n The following computation illustrate this equality and check that hook-length formula is well implemented in Sage. sage: ....: ....: ....: ....: sage: def check_multiplicities(n): dim = 0 for p in Partitions(n): dim = dim + StandardTableaux(p).cardinality()**2 return dim for i in range(1, 9) : print i, " : ", check_multiplicities(i) 1 : 1 2 : 2 3 : 6 4 : 24 5 : 120 6 : 720 7 : 5040 8 : 40320 We know describe a last useful object for our algorithmic to come which gather information about all irreducible representations of the symmetric group : the character table. We recall that character of a representation is a map which associate the trace of matrices for each group element. Such map are constant on conjugacy classes and conjugacy classes of the symmetric group are indexed also by partitions. Any permutation τ ∈ Sn have a single disjoint cycles representation and it belong to EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 5 the conjugacy class indexed by the partition µ = (µ1 , . . . , µr ) if its disjoint cycles representation contains r cycles of size respectively µ1 , µ2 , . . . , µr . The character table of the symmetric group gather in a square matrices the value of characters of irreducible representations on each conjugacy classes of the symmetric group. sage: G = SymmetricGroup(3); G sage: G.character_table() Symmetric group of order 3! as a permutation group  1  2 1 sage: ....: −1 0 1  1 −1  1 for C in G.conjugacy_classes(): Permutation(C.representative()).cycle_type() [ 1, 1, 1 ] [ 2, 1 ] [ 3 ] 3. Higher Specht polynomials for the symmetric group Algorithmic in invariant theory must, at some point, construct invariant polynomials. Most current approaches use the Reynolds operator or an orbit sum over a group of a special monomial. When the group become large, such invariant become very large even they are stored in a sparse manner inside a computer, the number of terms can easily fit with n! when G is a permutation group with a small index in Sn . For our approach, with focuses on the combinatorics of the quotient K[x]/(e1 , . . . , en ), the higher specht polynomials will constitute the perfect family to get explicit answer to Problem 2.2. The quotient K[x]/(e1 , . . . , en ) is isomorphic to the regular representation of Sn in which we have several copies of irreducible representation following their dimension. The Specht polynomials, which are associated standard tableaux, allows to construct explicit subspace of K[x] isomorphic to an irreducible representation of the symmetric group. For λ ⊢ n a partition, the span of Specht polynomials associated to standard tableaux of shape λ realize explicitly the irreducible representation of Sn indexed by λ. Now, we will see that the higher Specht polynomial take care of multiplicities of irreducible representation inside the coinvariant. They are indexed by pair of standard tableaux of the same shape and they constitute a basis of the Sn -module K[x]/(e1 , . . . , en ). Among all known basis of the coinvariants for the symmetric group (Harmonic, Schubert, monomials under the staircase, descents monomials, ...), the higher Specht polynomial constitute a basis which can be partitioned by irreducible Sn -module by construction. let λ ⊢ n a partition and S, T two standard tableaux of shape λ. We define the word w(S) by reading the tableau S from the top to the bottom in consecutive columns, starting from the left. The number 1 in the word w(S) as for index 0. Now, recursively, if the number k in the word has index p, then k + 1 has index p + 1 if it lies to the left of k in the word, it has index p otherwise. For example, 6 NICOLAS BORIE with the two tableaux T = 2 4 S= 3 5 1 2 4 1 3 5 The reading of the Tableau S give 31524, now placing step by step the indices, we get 3 10 5 2 4 initialization 3 10 5 20 4 right : 0 → 0 31 10 5 20 4 lef t : 0 → 1 31 10 5 20 41 right : 1 → 1 w(S) = 31 10 52 20 41 lef t : 1 → 2 Filling the index in corresponding cell of the tableau S, We obtain i(S), the index tableau of S. i(S) = 1 2 0 0 1 Now, using the tableaux T and i(S), cells of T giving variable index and correi(S) sponding cell of i(S) giving exponent, we build monomials xT as follow. T = 2 4 1 3 5 i(S) xT i(S) = 1 2 0 0 1 = x01 x12 x03 x24 x15 Here are all the monomials in three variables. i(S) S T i(S) xT 1 2 3 1 2 3 0 0 0 1 3 1 2 3 1 2 1 0 0 x3 3 1 2 2 1 3 1 0 0 x2 2 1 3 3 1 2 1 0 1 x2 x3 2 1 3 2 1 3 1 0 1 x2 x3 3 2 1 3 2 1 2 1 0 x2 x23 For T a standard tableaux of shape λ, let R(T ) and C(T ) denote the row stabilizer and the column stabilizer of T respectively and consider the Young symmetrizer X X sign(τ )τ σ (7) ǫT := σ∈R(T ) τ ∈C(T ) which is an element of the group algebra Q[Sn ]. We know define the polynomial FTS by (8) i(S) FTS (x1 , . . . , xn ) := ǫT (xT ). EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 7 Theorem 3.1. Let n a positive integer, the family of n! polynomials FTS for S, T running over standard tableaux of the same shape form a basis of the Sym(x)module K[x]. Terasoma and Yamada proved it using the usual bilinear form in its context : the divided difference associated to the longest element of the symmetric group [21]. In Three variable, here is the basis of K[x1 , x2 , x3 ] as a Sym(x1 , x2 , x3 )-module. i(S) xT FTS S T 1 2 3 1 2 3 1 6 3 1 2 3 1 2 x3 2(x3 − x1 ) 3 1 2 2 1 3 x2 2(x2 − x1 ) 2 1 3 3 1 2 x2 x3 x2 (x3 − x1 ) 2 1 3 2 1 3 x2 x3 x3 (x2 − x1 ) 3 2 1 3 2 1 x2 x23 (x3 − x1 )(x3 − x2 )(x2 − x1 ) We will know try to solve Problem 2.2 by searching linear combination of higher Specht polynomials stabilized by the action of a permutation group. 4. Combinatorial description of the invariant ring We now try to slice the invariant ring finer than degree by degree. As irreducible representations of the symmetric group are homogeneous, we will build format series mixing degree statistic and partitions. 4.1. A refinement of the Moliens series. Let G ⊂ Sn a permutation group. Any module Sn -stable is also G-stable, thus any representation of Sn is also a representation of G. Usually, An irreducible representation of Sn will not stay irreducible when restricted to G. We are searching trivial representations of G inside irreducible representation of Sn and that can be done with a scalar product of character. For G a permutation group, we will denote C(G) the set of conjugacy classes of G. The usual scalar product between two characters χ and ψ of G is given by 1 X (9) hχ, ψi = |C|χ(σ)ψ(σ) (σ chosen arbitrary ∈ C) |G| C∈C(G) Proposition 4.1. Let λ ⊢ n a partition of the positive integer n. Let G ⊂ Sn a permutation group. The multiplicity of the trivial representation of G inside the irreducible representation of Sn indexed by λ is given by mλ (G, Sn ) with 1 X |C|M(λ,cycle type(σ)) , (σ chosen arbitrary ∈ C) (10) mλ (G, Sn ) := |G| C∈C(G) 8 NICOLAS BORIE where M(λ,cycletype(σ)) is the coefficient of the character table of Sn indexed by the partitions λ and cycle type(σ). Proof. This just consist in using the usual scalar product of characters for G with the trivial character of G. Thus we can remark that value of characters can be read on the character table of Sn because conjugacy classes of G are subset of conjugacy classes of Sn and traces of matrices do not change when a representation of Sn is viewed as a representation of G.  Definition 4.2. Let G ⊂ Sn a permutation group. Using a formal set of variable t = (tλ )λ⊢n indexed by partitions of n, we define the trivial multiplicities enumerator P (G, t) as follow X (11) P (G, t) := mλ (G, Sn )tλ λ⊢n P (G, t) count the multiplicities of the trivial representation of G inside the irreducible representations of the symmetric group of degree n themselves indexed by the partitions of the integer n. For G = h(1, 2)(3, 4), (1, 4)(2, 3)i. sage: G = PermutationGroup([[(1,2),(3,4)],[(1,4),(2,3)]]); G Permutation Group with generators [(1,2)(3,4), (1,4)(2,3)] sage: ....: ....: ....: for C in G.conjugacy_classes(): card = C.cardinality() ct = Permutation(C.representative()).cycle_type() print card, ct 1 [1, 1, 1 [2, 1 [2, 1 [2, sage: 1, 1] 2] 2] 2] trivial_representations_in_symmetric_representations(G) {[1, 1, 1, 1]: 1, [2, 1, 1]: 0, [2, 2]: 2, [3, 1]: 0, [4]: 1} For this group, we thus have P (G, t) = t[1,1,1,1] + 2t[2,2] + t[4] Definition 4.3. Let λ ⊢ n a partition of a positive integer n and z a formal variable. The will denote φ(λ, z) the representation appearance polynomial defined as follow X z cocharge(T ) (12) φ(λ, z) := T ∈ST ab(λ) Where the sum run over all standard tableaux T of shape λ. φ(λ, z) make the link between the degree z and the irreducible representations of Sn isomorphic the abstract one indexed by λ appearing inside the quotient K[x]/Sym+ (x). φ(λ, 1) = |ST ab(λ)| give the multiplicities of the irreducible representation indexed by λ. Generally, if φ(λ, z) has coefficient an integer k for a term in z d , this means that k Sym(x)-module isomorphic to the irreducible representation of Sn indexed by λ can be built inside the graded quotient K[x]/Sym+ (x) at degree d. The higher Specht Polynomials realize explicitly these representations EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 9 because the cocharge is exactly the sum of the entries of tableau i(S) (or the degree of the corresponding Specht). Proposition 4.4. Let G ⊂ Sn a permutation group. The trivial multiplicities enumerator P (G, t) and the Hilbert series H(G, z) are related by (13) H(G, z) = P (G, tλ → φ(λ, z)) (1 − z)(1 − z 2 ) · · · (1 − z n ) Proof. This result is a consequence of some statements about the combinatorics of standard tableaux. As discussed previously, once we have the dimension of Gtrivial space inside each irreducible representation, it remains to know at which degree copies of irreducible representation lies into the quotient K[x]/Sym+ (x). The cocharge of standard tableaux is the right statistic partitioning the occurrences of Sn -spaces along the degree.  Back with the example G = h(1, 2)(3, 4), (1, 4)(2, 3)i, sage: G = PermutationGroup([[(1,2),(3,4)],[(1,4),(2,3)]]); G Permutation Group with generators [(1,2)(3,4), (1,4)(2,3)] sage: G.molien_series() (x2 − x + 1)/(x6 − 2x5 − x4 + 4x3 − x2 − 2x + 1) sage: S4 = SymmetricGroup(4); S4 sage: S4.molien_series() Symmetric group of order 4! as a permutation group 1/(x10 − x9 − x8 + 2x5 − x2 − x + 1) sage: G.molien_series() / S4.molien_series() x6 + 2x4 + 2x2 + 1 On the other side, we had (14) P (G, t) = t[1,1,1,1] + 2t[2,2] + t[4] Let us now list standard tableaux of shape [1, 1, 1, 1], [2, 2]and[4]. S i(S) cocharge(S) 1 2 3 4 0 0 0 0 0 3 4 1 2 1 1 0 0 2 2 4 1 3 1 2 0 1 4 4 3 2 1 3 2 1 0 6 We have φ([1, 1, 1, 1], z) = 1, φ([2, 2], z) = z 2 + z 4 and φ([4], z) = z 6 . Injecting these evaluations inside the trivial multiplicities enumerator, we recover (15) P (G, tλ → φ(λ, z)) = 1 + 2z 2 + 2z 4 + z 6 10 NICOLAS BORIE which give the number of secondary invariants degree by degree when elementary symmetric polynomials are taken as primary invariants. This polynomials is also the quotient of the two Hilbert series that can be computed in GAP [8] using Molien’s Formula. 4.2. Secondary invariants built from higher Specht polynomial. Let G ∈ Sn a permutation group, λ ⊢ n a partition of n. Let us suppose that we have calculated mλ (G, Sn ) and we now want to build explicitly the secondary invariant polynomials. We are in the case in which we have an homogeneous G-stable space inside which we want to construct a finite and known number of independent invariant polynomials under the action of G. The usual way to dealt with this problem is to built an explicit family spanning the concerned space by generating polynomials forming a basis. Then basis element by basis element, we apply the Reynolds operator and some linear algebra to get a free family of the wanted dimension. knowing this dimension give a stopping criteria often very important since computations are extremely heavy even for small number of variables. In our context, even the usual approach would work, as permutation are often given by a list of generators, we can even forget the Reynolds operator. Proposition 4.5. Let G ∈ Sn a permutation group given by some generator : G = hσ1 , . . . , σr i. Let λ ⊢ n a partition. The G-trivial abstract space inside the abstract representation of Sn indexed by λ is given by the intersection of the eigenspace of the representation matrices of σ1 , . . . , σr associated the eigenvalue 1. Proof. We view here representation indexed by λ as the formal free module generated by the standard tableaux of shape λ. We know that a subspace of dimension mλ (G, Sn ) have its elements invariant under the action of G. Being invariant under G is equivalent to be stabilized by the Reynolds operator but is also equivalent (by definition in fact) to be stabilized by the action of the generators of G. Since we are working inside a representation of Sn , each permutation have an associated matrix and the kernel of this matrix characterize the formal subspace stabilized  5. Algorithm building secondary invariants We now present an effective algorithm exploiting the approach using the representation of the symmetric group. Computation dependencies : • • • • Character table of the symmetric group Conjugacy classes of the group G (cardinalities and representatives) Matrices of irreducible representation of the symmetric group Some linear algebra The returned set is composed by linear combinations of higher Specht polynomials. These polynomials can be easily evaluated but, as they contains a lot of Vandermonde factors, there expansion on a set of n formal variables is an heavy computation. EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 11 Compute secondary invariant using Sn representations Input : σ1 , σ2 , . . . σn a set of permutations of size n generating a group G. def SecondaryInvariants(σ1, σ2 , . . . σn ) : G ← P ermutationGroup(σ1 , σ2 , . . . σn ) Sn ← SymmetricGroup(n) S ← {} for λ ∈ P artition(n) : if mλ (G, Sn ) 6= 0 : G ← V ectorSpace(Q, fλ ) for i ∈ {1, 2, . . . , n} : G ← G ∩ kernel(Mλ (σi ) − Id) abstract secondary ← basis(G) for µ ∈ StandardT ableaux(λ) : for P ∈ abstract secondary : S ← S ∪ HigherSpecthP olynomials(P, µ) return S 5.1. A large trace of the algorithm. A teen years computational challenge consist in computing a generating family of the ring of invariants of the group acting on the edges of graphs over 5 nodes. This group is a subgroup of the symmetric  group of degree 10 = 52 and has for cardinality 5! = 120. As far as we know, no computer algebra system has already handle a such computation. After 12 hours of computation, Magma, Singular and the evaluation approach written in Sage did not finish (in Sage, more precisely, around 5 percent of this computation(linear algebra) was done after 24 hours). We tried our approach on this group and we got the following verbose : The trace have should be read has the following pattern [partition] ambient dimension --> (number of standard tableaux for this shape) rank in S_n repr : (dimension of the G-trivial space) sage: load("invariants.py") sage: G = TransitiveGroup(10,12) sage: Specht_basis_of_trivial_representations(G, verbose=True) [3, 2, 2, 1, 1, 1] ambient dimension --> 315 rank in S_n repr : 2 [6, 1, 1, 1, 1] ambient dimension --> 126 rank in S_n repr : 3 [6, 4] ambient dimension --> 90 rank in S_n repr : 3 [4, 3, 1, 1, 1] ambient dimension --> 525 rank in S_n repr : 5 [5, 2, 2, 1] ambient dimension --> 525 rank in S_n repr : 4 [5, 2, 1, 1, 1] ambient dimension --> 448 rank in S_n repr : 4 [3, 2, 1, 1, 1, 1, 1] ambient dimension --> 160 rank in S_n repr : 1 [6, 2, 1, 1] ambient dimension --> 350 rank in S_n repr : 2 [4, 4, 2] ambient dimension --> 252 rank in S_n repr : 5 12 NICOLAS BORIE [2, 1, 1, 1, 1, 1, 1, 1, 1] ambient dimension --> 9 rank in S_n repr : 1 [3, 3, 2, 2] ambient dimension --> 252 rank in S_n repr : 2 [4, 4, 1, 1] ambient dimension --> 300 rank in S_n repr : 2 [4, 2, 2, 2] ambient dimension --> 300 rank in S_n repr : 5 [4, 2, 2, 1, 1] ambient dimension --> 567 rank in S_n repr : 3 [2, 2, 2, 1, 1, 1, 1] ambient dimension --> 75 rank in S_n repr : 2 [3, 2, 2, 2, 1] ambient dimension --> 288 rank in S_n repr : 3 [4, 2, 1, 1, 1, 1] ambient dimension --> 350 rank in S_n repr : 3 [3, 1, 1, 1, 1, 1, 1, 1] ambient dimension --> 36 rank in S_n repr : 1 [7, 1, 1, 1] ambient dimension --> 84 rank in S_n repr : 1 [5, 1, 1, 1, 1, 1] ambient dimension --> 126 rank in S_n repr : 3 [2, 2, 2, 2, 2] ambient dimension --> 42 rank in S_n repr : 3 [6, 3, 1] ambient dimension --> 315 rank in S_n repr : 1 [8, 2] ambient dimension --> 35 rank in S_n repr : 2 [3, 3, 3, 1] ambient dimension --> 210 rank in S_n repr : 2 [3, 3, 1, 1, 1, 1] ambient dimension --> 225 rank in S_n repr : 1 [5, 4, 1] ambient dimension --> 288 rank in S_n repr : 3 [5, 3, 2] ambient dimension --> 450 rank in S_n repr : 3 [10] ambient dimension --> 1 rank in S_n repr : 1 [4, 3, 2, 1] ambient dimension --> 768 rank in S_n repr : 6 [7, 2, 1] ambient dimension --> 160 rank in S_n repr : 1 [6, 2, 2] ambient dimension --> 225 rank in S_n repr : 3 [5, 3, 1, 1] ambient dimension --> 567 rank in S_n repr : 5 [3, 3, 2, 1, 1] ambient dimension --> 450 rank in S_n repr : 4 total : 30240 n! / |G| : 30240 TOTAL CPU TIME : 414.837207 Our algorithm took 414 seconds to generated the 30240 secondary invariants as linear combinations of higher Specht polynomials. We still believe that the computation of a couple primary and secondary invariants for this group is unreachable for Magma, Singular and the evaluation approach in less than 24 hours. EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 13 For example, inside the symmetric representation associated with the partition (4, 3, 2, 1). The algorithm making the Gauss reduction build a space of dimension 6 inside an ambient space of dimension 768. Using the Hook-length formula, on can check that there exist 768 standard tableaux of shape (4, 3, 2, 1) (16) 1 3 1 5 3 1 7 5 3 1 10! = 768 7·5·5·3·3·3 5.2. Implementation details. Our approach involves a lot a technology around representation theory and symbolic computation, most of the required prerequisites are available in current computer algebras system. For our problem, dependencies have been implemented in GAP [8] or Sage [19]. We implemented a first version in Sage (400 lines of code with tests and documentation) to test the efficienty of this approach. Here are the main steps of computation. • Compute the character table of the symmetric group. This task is done by GAP [8]. The Murnaghan-Nakayama rule is an example of working algorithm. This is a small part of computations and it can also be precomputed and store for all small symmetric group (for degree at most 20). • Enumerate cardinality and a representative of each conjugacy class of G. Also handled by GAP [8] and interfaced in Sage [19]. The general problem of enumerating conjugacy classes of finite group is not simple but there are efficient algorithms for permutation group. • Compute the trivial multiplicities enumerator of G. We computed a short function which just iterate over all partitions and compute a simple scalar product (see Formula 10). • Calculate the matrices of σ1 , σ2 , . . . , σn inside the irreducible representations of Sn . Once we have identified a G-trivial space inside an irreducible of Sn , we build the matrices of the generators of G using the Sage [19] object : SymmetricGroupRepresentation which admits as argument a partition. The returned object is able to build matrices of the abstract representation from a permutation given in line notation. • Compute the intersection of stabilized subspace of these matrices. We use in a loop the method intersection of Sage VectorSpace and the method kernel of Sage Matrix class. Our linear algebra is thus handle by Sage [19]. • Transcript abstract combinations of standard tableaux in term of higher Specht polynomials. Sage and especially Sage-Combinat [17] contains the combinatorial family of standard tableaux. A lot of combinatorial statistic are availlable on such objects like the cocharge. We implemented the higher Specht polynomials as Sage polynomials computed from a pair of Sage StandardTableaux of the same shape. Our code is completely not optimized. Since most of computations in invariants (minimal generating set, secondary invariants, Hironaka decomposition) present 14 NICOLAS BORIE large theoretical exponential complexity, we believe that, before code source refinement, we need new algorithms with better asymptotically behavior. However, a huge factor of execution time can easily be wined from our code with cache remember, better interface between GAP and Sage, parralelisation (each computer core can echelonize matrices for a special irreducible representation), we wanted to benchmarks our approach using the current available (and open source) technology. Therefore, anyone (even a student) can reproduce our experience rapidly and for free. 5.3. Complexity. The rich literature about effective invariant theory does not provide a lot a fin complexity bound for algorithms. Gröbner basis admit very O(n) general complexity bounds (in worst case 22 for n variables) which appears to be overestimated compared to their effective behavior. The thesis [3] of the author present an evaluation approach to compute the invariants inside a quotient of a reduced dimension. The algorithm computing secondary with this technique has a 3 complexity in O((n!)2 + (n!) |G|2 ). Using the representation of the symmetric group, it is still very hard to establish a fin bound. However, we can produce better bounds. Theorem 5.1. Let G a permutation group, subgroup of Sn , given by r generators. The complexity of the linear algebra reduction in algorithm computing the secondary invariants of G in Section 5 is bounded by X (17) r·( mλ (|G|, Sn )(fλ )2 ) λ⊢n where fλ is the number of standard tableaux of shape λ and p(n) is the number of partition of size n. Proof. This is just a straightforward counting of the reductions the r matrices of permutation for each irreducible representation of the symmetric group. For each partition λ of n, we have to construct a free family of mλ (|G|, Sn ) vectors (i.e. the rank) inside a space of dimension f λ (i.e. number of indeterminates) from r · f λ equations (the vertical concatenation of the r matrices). Summing these operations give the announced bound.  Corollary 5.2. Let G a permutation group, subgroup of Sn , given by r generators. The complexity of the algorithm computing the secondary invariants in Section 5 3 has a complexity in O(r · (n!) 2 ). Proof. Let us denote fmax := max{f λ }. We thus have λ⊢n (18) r·( X mλ (|G|, Sn )(fλ )2 ) 6 r · ( λ⊢n X fmax (fλ )2 ) λ⊢n since, at worse, the irreducible representation of Sn is composed only by element stabilized point wise by G. The fmax term can go out the sum and using formula 6 we get the bound (19) r · fmax · n! 2 Using the triangular inequality, we roughly have fmax 6 n! and that give the result.  EFFECTIVE INVARIANT THEORY USING REPRESENTATION THEORY 15 6. Further developments Even the impressive algorithmic efficiently of this approach using the representation of the symmetric group, it has also the advantage of putting a lot of combinatrics inside this problem often classed inside effective algebraic geometry. acknowledgements This research was driven by computer exploration using the open-source mathematical software Sage [19]. In particular, we perused its algebraic combinatorics features developed by the Sage-Combinat community [17], as well as its group theoretical features provided by GAP [8]. References [1] I. Abdeljaouad. Théorie des Invariants et Applications à la Théorie de Galois effective. PhD thesis, Université Paris 6, 2000. [2] F. Bergeron. Algebraic combinatorics and coinvariant spaces. CMS Treatises in Mathematics. 2009. [3] N. Borie. Calcul des invariants des groupes de permutations par transformée de Fourier. PhD thesis, Laboratoire de Mathématiques, Université Paris Sud, 2011. [4] A. Colin. Solving a system of algebraic equations with symmetries. J. Pure Appl. Algebra, 117/118:195–215, 1997. Algorithms for algebra (Eindhoven, 1996). [5] A. Colin. Théorie des invariants effective; Applications à la théorie de Galois et à la résolution de systèmes algébriques; Implantation en AXIOM. PhD thesis, École polytechnique, 1997. [6] H. Derksen and G. Kemper. Computational invariant theory. Springer-Verlag, Berlin, 2002. [7] J. Faugère and S. Rahmany. Solving systems of polynomial equations with symmetries using SAGBI-Gröbner bases. In Proceedings of the 2009 international symposium on Symbolic and algebraic computation, pages 151–158, 2009. [8] The GAP Group, Lehrstuhl D für Mathematik, RWTH Aachen, Germany and SMCS, U. St. Andrews, Scotland. GAP – Groups, Algorithms, and Programming, 1997. [9] A. Garsia and D. Stanton. Group actions on stanley-reisner rings and invariants of permutation groups. Advances in Mathematics, 51(2):107 – 201, 1984. [10] K. Gatermann. Symbolic solution of polynomial equation systems with symmetry. KonradZuse-Zentrum für Informationstechnik Berlin, 1990. [11] K. Geissler and J. Klüners. Galois group computation for rational polynomials. J. Symbolic Comput., 30(6):653–674, 2000. Algorithmic methods in Galois theory. [12] G. Kemper. The invar package for calculating rings of invariants. IWR Preprint 93-94, University of Heidelberg, 1993. [13] S. King. Fast Computation of Secondary Invariants. Arxiv preprint math/0701270, 2007. [14] S. King. Minimal generating sets of non-modular invariant rings of finite groups. Arxiv preprint math/0703035, 2007. [15] A. Lascoux and M.-P. Schützenberger. Polynômes de Schubert. C. R. Acad. Sci. Paris Sér. I Math., 294(13):447–450, 1982. [16] M. Pouzet and N. M. Thiéry. Invariants algébriques de graphes et reconstruction. C. R. Acad. Sci. Paris Sér. I Math., 333(9):821–826, 2001. [17] T. Sage-Combinat community. Sage-Combinat: enhancing Sage as a toolbox for computer exploration in algebraic combinatorics, 2008. [18] R. P. Stanley. Invariants of finite groups and their applications to combinatorics. Bull. Amer. Math. Soc. (N.S.), 1(3):475–511, 1979. [19] W. Stein et al. Sage Mathematics Software (Version 3.3). The Sage Development Team, 2009. http://www.sagemath.org. [20] B. Sturmfels. Algorithms in invariant theory. Springer-Verlag, Vienna, 1993. [21] T. Terasoma and H. Yamada. Higher Specht polynomials for the symmetric group. Proc. Japan Acad. Ser. A Math. Sci., 69(2):41–44, 1993. [22] N. M. Thiéry. Algebraic invariants of graphs: a study based on computer exploration. SIGSAM Bulletin, 34(3):9–20, Sept. 2000. 16 NICOLAS BORIE [23] N. M. Thiéry. Computing minimal generating sets of invariant rings of permutation groups with SAGBI-Gröbner basis. In Discrete models (Paris, 2001), pages 315–328 (electronic). 2001. Univ. Paris Est Marne-La-Vallée, Laboratoire d’Informatique Gaspard Monge, Cité Descartes, Bât Copernic – 5, bd Descartes Champs sur Marne 77454 Marne-la-Vallée Cedex 2, France
0math.AC
Zero-Shot Deep Domain Adaptation Kuan-Chuan Peng, Ziyan Wu, Jan Ernst Siemens Corporate Technology Princeton, NJ, USA arXiv:1707.01922v2 [cs.CV] 16 Nov 2017 {kuanchuan.peng, ziyan.wu, jan.ernst}@siemens.com Abstract The existing methods of domain adaptation (DA) work under the assumption that the task-relevant target-domain training data is given. However, such assumption can be violated, which is often ignored by the prior works. To tackle this issue, we propose zero-shot deep domain adaptation (ZDDA), which uses the privileged information from the task-irrelevant dual-domain pairs. ZDDA learns a sourcedomain representation which is not only tailored for the task of interest (TOI) but also close to the target-domain representation. Therefore, the source-domain TOI solution (e.g. the classifier for classification tasks) which is jointly trained with the source-domain representation can be applicable to both the source and target representations. Using the MNIST, Fashion-MNIST, NIST, EMNIST, and SUN RGB-D datasets, we show that ZDDA can perform DA in classification tasks without the access to the task-relevant targetdomain training data. We also extend ZDDA to perform sensor fusion in the SUN RGB-D scene classification task by simulating the task-relevant target-domain representations with the task-relevant source-domain data. To the best of our knowledge, ZDDA is the first DA and sensor fusion method which needs no task-relevant target-domain data. Figure 1: We propose zero-shot deep domain adaptation (ZDDA) for domain adaptation and sensor fusion. ZDDA learns from the task-irrelevant dual-domain pairs when the task-relevant targetdomain training data is unavailable. In this example domain adaptation task (MNIST [25]→MNIST-M [12]), the task-irrelevant gray-RGB pairs are from the Fashion-MNIST [41] dataset and the Fashion-MNIST-M dataset (the colored version of the FashionMNIST [41] dataset with the details in Sec. 4.1). The goal of a DA task is to derive solution(s) of the TOI for both the source and target domains. The state-of-the-art DA methods such as [5, 13–15, 23, 26, 31, 33, 35–39, 42, 45] are proposed to solve DA tasks under the assumption that the task-relevant data, the data directly applicable and related to the TOI (regardless of whether it is labeled or not), in the target domain is available at training time, which is not always true in practice. For instance, in real business use cases, acquiring the taskrelevant target-domain training data can be infeasible due to the combination of the following reasons: 1) Unsuitable tools at the field. 2) Product development timeline. 3) Budget limitation. 4) Data import/export regulations. Such impractical assumption is also assumed true in the existing works of sensor fusion such as [27, 43], where the goal is to obtain a dual-domain (source and target) TOI solution which is robust to noise in either domain. This unsolved issue motivates us to propose zero-shot deep domain adap- 1. Introduction The useful information to solve practical tasks often exists in different domains captured by various sensors, where a domain can be either a modality or a dataset. For instance, the 3-D layout of a room can be either captured by a depth sensor or inferred from the RGB images. In real-world scenarios, it is highly likely that we can only access limited amount of data in certain domain(s). The performance of the solution (e.g. the classifier for classification tasks) we learn from one domain often degrades when the same solution is applied to other domains, which is caused by domain shift [16] in a typical domain adaptation (DA) task, where source-domain training data, targetdomain training data, and a task of interest (TOI) are given. 1 tation (ZDDA), a DA and sensor fusion approach which learns from the task-irrelevant dual-domain training pairs without using the task-relevant target-domain training data, where we use the term task-irrelevant data to refer to the data which is not task-relevant. We illustrate what ZDDA is designed to achieve in Figure 1 using an example DA task (MNIST [25]→MNISTM [12]). We recommend that the readers view all the figures and tables in color. In Figure 1, the source and target domains are gray scale and RGB images respectively, and the TOI is digit classification with both the MNIST [25] and MNIST-M [12] testing data. We assume that the MNIST-M [12] training data is unavailable. In this example, ZDDA aims at using the MNIST [25] training data and the task-irrelevant gray-RGB pairs from the FashionMNIST [41] dataset and the Fashion-MNIST-M dataset (the colored version of the Fashion-MNIST [41] dataset with the details in Sec. 4.1) to train digit classifiers for MNIST [25] and MNIST-M [12] images. Specifically, ZDDA achieves this by simulating the RGB representation using the gray scale image and building a joint network with the supervision of the TOI in the gray scale domain. We present the details of ZDDA in Sec. 3. We make the following contributions: 1) To the best of our knowledge, our proposed method, ZDDA, is the first deep learning based method performing domain adaptation between different image modalities (instead of just different datasets in the same modality such as the Office dataset [28]) without using the task-relevant target-domain training data. We show ZDDA’s efficacy using the MNIST [25], Fashion-MNIST [41], NIST [17], EMNIST [10], and SUN RGB-D [32] datasets with cross validation. 2) Given no task-relevant target-domain training data, we show that ZDDA can perform sensor fusion and that ZDDA is more robust to noisy testing data in either source or target or both domains compared with a naive fusion approach in the scene classification task from the SUN RGB-D [32] dataset. can be unavailable in reality. In contrast, we propose ZDDA to learn from the task-irrelevant dual-domain pairs without using the task-relevant target-domain training data. One part of ZDDA includes simulating the target-domain representation using the source-domain data, and similar concepts have been mentioned in [18, 20]. However, both of [18, 20] require the access to the task-relevant dualdomain training pairs, but ZDDA needs no access to the task-relevant target-domain data. The name “zero-shot domain adaptation” has already been used by Blitzer et al. [7] and Yang et al. [44]. However, both methods require additional prerequisites. Blitzer’s method [7] needs access to the task-relevant target-domain data. Requiring that the domain descriptor is always observed and accurate, Yang’s method [44] shows its efficacy using only different datasets in the same modality (specifically, the Office dataset [28]) instead of the data in different modalities. ZDDA requires none of these two prerequisites, and we show the efficacy of ZDDA with the data in different modalities. In terms of sensor fusion, Ngiam et al. [27] define the three components for multimodal learning (multimodal fusion, cross modality learning, and shared representation learning) based on the modality used for feature learning, supervised training, and testing, and experiment on audiovideo data with their proposed deep belief network and autoencoder based method. Targeting on the temporal data, Yang et al. [43] follow the setup of multimodal learning in [27], and validate their proposed encoder-decoder architecture using video-sensor and audio-video data. Although certain progress about sensor fusion is achieved in the previous works [27, 43], we are unaware of any existing sensor fusion method which overcomes the issue of lacking task-relevant target-domain training data, which is the issue that ZDDA is designed to solve. 3. Our proposed method — ZDDA Given a task of interest (TOI), a source domain Ds , and a target domain Dt , our proposed method, zero-shot deep domain adaptation (ZDDA), is designed to achieve the following two goals: 1) Domain adaptation: Derive the solutions of the TOI for both Ds and Dt when the taskrelevant training data in Dt is unavailable. We assume that we have access to the task-relevant labeled training data in Ds and the task-irrelevant dual-domain pairs in Ds and Dt . 2) Sensor fusion: Given the previous assumption, derive the solution of TOI when the testing data in both Ds and Dt is available. The testing data in either Ds or Dt can be noisy. We assume that there is no prior knowledge available about the type of noise and which domain gives noisy data at testing time. For convenience, we use a scene classification task in RGB-D as an example TOI to explain ZDDA, but ZDDA 2. Related work Domain adaptation (DA) has been extensively studied in computer vision and applied to various applications such as image classification [5, 13–15, 23, 26, 31, 33, 35– 39, 42, 45], semantic segmentation [40, 46], and image captioning [9]. With the advance of deep neural networks in recent years, the state-of-the-art methods successfully perform DA with (fully or partially) labeled [9, 14, 23, 26, 35] or unlabeled [5, 13–15, 31, 33, 35–40, 42, 45] taskrelevant target-domain data. Although different strategies such as the domain adversarial loss [36] and the domain confusion loss [35] are proposed to improve the performance in the DA tasks, most of the existing methods need the task-relevant target-domain training data, which 2 Figure 2: An overview of the ZDDA training procedure. We use the images from the SUN RGB-D [32] dataset for illustration. ZDDA simulates the target-domain representation using the source-domain data, builds a joint network with the supervision from the source domain, and trains a sensor fusion network. In step 1, we choose to train s1 and fix t, but we can also train t and fix s1 to simulate the target-domain representation. In step 2, t can also be trainable instead of being fixed, but we choose to fix it to make the number of trainable parameters manageable. The details are explained in Sec. 3. can be applied to other TOIs/domains. In this example, Ds and Dt are depth and RGB images respectively. According to the our previous assumption, we have access to the taskrelevant labeled depth data and task-irrelevant RGB-D pairs at training time. The training procedure of ZDDA is illustrated in Figure 2, where we simulate the RGB representation using the depth image, build a joint network with the supervision of the TOI in depth images, and train a sensor fusion network in step 1, step 2, and step 3 respectively. We use the ID marked at the bottom of each convolutional neural networks (CNN) in Figure 2 to refer to each CNN. In step 1, we create two CNNs, s1 and t, to take the depth and RGB images of the task-irrelevant RGB-D pairs as input. The purpose of this step is to find s1 and t such that feeding the RGB image into t can be approximated by feeding the corresponding depth image into s1. We achieve this by fixing t and enforcing the L2 loss on top of s1 and t at training time. We choose to train s1 and fix t here, but training t and fixing s1 can also achieve the same purpose. The L2 loss can be replaced with any suitable loss functions which encourage the similarity of the two input representations, and our selection is inspired by [18, 20]. The design in step 1 is similar to the hallucination architecture [20] and the supervision transfer [18], but we require no taskrelevant dual-domain training pairs. Instead, we use the task-irrelevant dual-domain training pairs. After step 1, we add another CNN, s2 (with the same network architecture as that of s1), and a classifier to the network (as shown in step 2) to learn from the label of the training depth images. The classifier in our experiment is a fully connected layer for simplicity, but other types of classifiers can also be used. The newly added CNN takes the task-relevant depth images as input, and shares all the weights with the original source CNN, so we use s2 to refer to both of them. t is the same as that in step 1. At training time, we pre-train s2 from s1 and fix t. Our choice of fixing t is inspired by the adversarial adaptation step in ADDA [36]. t can also be trainable in step 2, but given our limited amount of data, we choose to fix it to make the number of trainable parameters manageable. s2 and the source classifier are trained such that the weighted sum of the softmax loss and L2 loss are minimized. The softmax loss can be replaced with other losses suitable for the TOI. After step 2, we expect to obtain a depth representation which is close to the RGB representation in the feature space and performs reasonably well with the trained classifier in the scene classification. Step 1 and step 2 can be done in one step with properly designed curriculum learning, but we separate them not only because of clarity but also because of the difficulty of designing the learning curriculum before training. After step 2, we can form the scene classifier in depth/RGB (denoted as CD /CRGB ) by concatenating s2/t and the trained source classifier (as shown in Figure 3a), which meets our first goal, domain adaptation. We use the notation ZDDA2 to refer to the method using the training procedure in Figure 2 up to step 2 and the testing procedure in Figure 3a. To perform sensor fusion, we propose step 3, where we train a joint classifier for RGB-D input using only the task-relevant depth training data. We create two CNNs, s3 and s4 (each with the same network architecture as that of CN Ns1 ), and add a concatenation layer on top of them to 3 can form three scene classifiers in RGB, depth, and RGB-D domains (one classifier per domain), and our trained RGBD classifier is expected to be able to handle noisy input with reasonable performance degradation. We use the notation ZDDA3 to refer to the method using the training procedure in Figure 2 up to step 3 and the testing procedure in Figure 3b. 4. Experiment setup (a) testing source-/target-domain data 4.1. Datasets For domain adaptation (DA), we validate the efficacy of ZDDA under classification tasks using the MNIST [25], Fashion-MNIST [41], NIST [17], EMNIST [10], and SUN RGB-D [32] datasets. For sensor fusion, we experiment on the SUN RGB-D [32] dataset. We summarize the statistics of these datasets in Table 1, where we list the dataset IDs which we use to refer to these datasets. For DM , DF , DN , and DE , we create the colored version of these datasets (DM -M, DF -M, DN -M, and DE -M) according to the procedure proposed in Ganin’s work [12] — blending the gray scale images with the patches randomly extracted from the BSDS500 dataset [6]. These colored datasets and the original ones are used to construct four DA tasks adapting from gray scale to RGB images. For each DA task, we use one of the other three pairs of the datasets (original and colored ones) as the task-irrelevant data. For example, for the DA task DM → DM -M, DF and DF -M together are one possible choice as the task-irrelevant data. The DA task DM → DM -M is acknowledged as one of the standard experiments to test the efficacy of the DA methods in recent works [5, 8, 13, 19, 29, 30], so we adopt this experiment and extend it to DF , DN , and DE . DS contains 10335 RGB-D pairs belonging to 45 different scenes. For each RGB-D pair, both the raw (noisy) depth image and post-processed clean depth image are provided, and we choose to use the raw depth image to simulate the real-world scenarios. Out of the 45 scenes, we select the following 10 scenes: computer room (0), conference room (1), corridor (2), dining room (3), discussion area (4), home office (5), idk (6), lab (7), lecture theatre (8), and study space (9), where the number after each scene is the scene ID we use to refer to each scene. The 8021 RGBD pairs belonging to the other scenes are used as the taskirrelevant training data. The 10 scenes are selected based on the following two constraints: 1) Each scene contains at least 150 RGB-D pairs in DS , which ensures a reasonable amount of task-relevant data. 2) The total number of the RGB-D pairs belonging to the selected 10 scenes is minimized, which maximizes the amount of the task-irrelevant training data. We empirically find that the amount and diversity of the task-irrelevant training data are important for ZDDA. To avoid the bias toward the scene with more (b) testing sensor fusion Figure 3: An overview of the ZDDA testing procedure. We use the SUN RGB-D [32] images for illustration. concatenate their output representations. The concatenated representation is connected to a joint classifier. At training time, we pre-train s3 and s4 from s2 and s1 respectively and fix s4. Both s3 and s4 take the task-relevant depth images as the input. To train a more robust RGB-D scene classifier, we randomly select some inputs of s3 and s4, and optionally add noise to them independently. We supervise the entire network with the label of the depth training data for the scene classification, which is done by the softmax loss enforced on top of the joint classifier. According to step 1, the output of s4 is expected to simulate the RGB representation as if we feed the taskrelevant RGB image to t. This expectation is based on the assumption that the relationship between the dual-domain pairwise data is similar, regardless of whether the data is task-relevant or task-irrelevant. Given the simulated RGB representation, s3 is trained to learn a depth representation suitable for the RGB-D scene classification without the constraint of the L2 loss in step 2. At testing time, s4 is replaced with t which takes the task-relevant RGB testing images as input with optional noise added to test the ZDDA’s performance given noisy RGB-D testing data (as shown in Figure 3b). In Figure 3b, we also test replacing “RGB images and t” with “depth images and s4” to evaluate the performance of ZDDA in step 3 given only testing depth images. After the training procedure in Figure 2, we 4 original dataset dataset ID classification subject MNIST [25] DM digit Fashion-MNIST [41] DF clothing NIST [17] DN letter EMNIST [10] DE letter SUN RGB-D [32] DS scene original image size # classes # training images # testing images class labels balanced class? example images 28×28 10 60000 10000 0-9 N 28×28 10 60000 10000 dress, coat, etc. Y 128×128 52 387361 23941 A-Z, a-z N 28×28 26 124800 20800 Aa-Zz Y ∼VGA 45 see Sec. 4.1 for details see Sec. 4.1 for details corridor, lab, etc. N colored dataset [12] example images MNIST-M Fashion-MNIST-M NIST-M EMNIST-M N/A N/A Table 1: The statistics of the datasets we use. For NIST, we use the “by class” dataset, remove the digits, and treat uppercase and lowercase letters as different classes. For EMNIST, we use the “EMNIST Letters” split which only contains the letters. We create the colored datasets from the original ones using Ganin’s method [12] (see Sec. 4.1 for details). We refer to each dataset by the corresponding dataset ID (e.g. DN and DN -M refer to the NIST and the NIST-M datasets, respectively). wards. For example, when using DF and DF -M as the taskirrelevant data in the DA task DM → DM -M, we train a CNN (denoted as CN Nref ) with the LeNet [3] architecture from scratch using the images and labels of DF -M, and pre-train the target CNNs in Figure 2 from CN Nref . We follow similar procedures for other DA tasks and taskirrelevant datasets involving DM , DF , DN , and DE . For the experiment involving DS , we mostly use GoogleNet [34] as the BNA, but we also use AlexNet [24] and SqueezeNet v1.1 [21] in the cross validation experiment with respect to different BNAs. Since only limited amount of RGB-D pairs are available in DS , we pre-train all the CNNs in Figure 2 from the BVLC GoogleNet model [2], BVLC AlexNet model [1], and the reference SqueezeNet model [4] when the BNA is GoogleNet [34], AlexNet [24], and SqueezeNet v1.1 [21], respectively. These pre-trained models are trained for the ImageNet [11] classification task. For the optionally added noise in ZDDA3 , we experiment on training/testing with noise-free data and noisy data. In the latter case, given that no prior knowledge about the noise is available, we use the black image as the noisy image to model the extreme case where no information in the noisy image is available. We train ZDDA3 step 3 with the augmented training data formed by copying the original task-relevant source-domain training data 10 times and replacing ptrain % of the images selected randomly with the black images. We follow this procedure twice independently and use the two augmented training datasets as the inputs of the two source CNNs in step 3. We empirically set ptrain = 20. The testing data in Figure 3b is constructed by replacing ptest % of the original testing images selected randomly with the black images, and we evaluate ZDDA under different ptest s. For all the experiments, the number base network source/target CNN architecture architecture (BNA) (up to where in BNA (inclusive)) LeNet [3] GoogleNet [34] AlexNet [24] SqueezeNet v1.1 [21] ip1 pool5/7x7 s1 fc7 fire9/concat Table 2: The base network architecture (BNA) we use in our experiments. For each BNA, We specify the layer separating the source/target CNN and the source classifier in Figure 2. The layer name in the right column is based on the official Caffe [22] and SqueezeNet v1.1 [21] implementation of each BNA. data, for each of the selected 10 scenes, we randomly select 89/38 RGB-D pairs as the task-relevant training/testing data. When experimenting on different scene classification tasks using different selections of scenes, we only use the training/testing data associated with those selected scenes as the task-relevant data. 4.2. Training details We use Caffe [22] to implement ZDDA. Table 2 lists the base network architecture (BNA) we use and the layer separating the source/target CNN and the source classifier in Figure 2. For instance, in the case when the BNA is LeNet [3], the architecture of each source/target CNN in Figure 2 is the LeNet [3] architecture up to the “ip1” layer, and the rest of the LeNet [3] architecture is used as the source classifier. For the DA tasks involving DM , DF , DN , and DE , we use the LeNet [3] as the BNA and train all the CNNs in Figure 2 from scratch except that the target CNN is pre-trained from the task-irrelevant dataset and fixed after5 task-irrelevant data DM → DM -M → DF → DF -M → DN → DN -M → DE → DE -M → none (source only) 39.04 / 39.31 33.77 / 33.77 8.59 / 8.79 33.70 / 33.70 DM , DM -M DF , DF -M DN , DN -M DE , DE -M N/A 73.15 / 72.96 91.99 / 92.00 94.84 / 94.82 51.55 / 51.55 N/A 43.87 / 43.87 65.30 / 65.30 34.25 / 33.35 21.93 / 21.24 N/A N/A 71.20 / 71.20 46.93 / 46.93 N/A N/A target only 97.33 / 97.34 84.44 / 84.44 62.13 / 61.99 89.52 / 89.52 Table 3: The overall / average per class accuracy (%) of the domain adaptation tasks (gray scale images → RGB images) formed by the datasets in Table 1, where we introduce the dataset IDs and use them to refer to the datasets here. The middle four rows show the performance of ZDDA2 . The color of each cell reflects the performance ranking in each column, where darker is better. of the output nodes of the source/joint classifiers is set to be the number of classes in the TOI, and these classifiers are trained from scratch. For the joint classifiers, we use two fully connected layers unless otherwise specified, where the first fully connected layer of the joint classifier has 1024 output nodes. The visualization of the network architectures of the source CNN, source classifier, and joint classifier for each BNA is shown in the supplementary material. In terms of the training parameters used in Figure 2 for the task involving DS when the BNA is GoogleNet [34], we use a batch size of 32 and a fixed learning rate 10−5 /10−6 /10−3 for step 1/2/3. The learning rate is chosen such that the trained network can converge under a reasonable amount of time. We set the weight of the softmax loss and the L2 loss in step 2 to be 103 and 1 respectively such that both losses have comparable numerical values. Step 1/2/3 are trained for 104 /103 /103 iterations. For the other training parameters, we adopt the default ones used in training the BVLC GoogleNet model [2] for the ImageNet [11] classification task unless otherwise specified. The details of the training parameters for all the other experiments are in the supplementary material. In general, we adopt the default training parameters used in training each BNA for either the MNIST [25] or ImageNet [11] classification tasks in the Caffe [22] and SqueezeNet v1.1 [21] implementation unless otherwise specified. method [13] [30] [19] [29] [8] accuracy (%) 76.66 86.70 89.53 94.20 98.20 ZDDA2 94.84 Table 4: The performance comparison of the domain adaptation task MNIST→MNIST-M. For ZDDA2 , we report the best overall accuracy from Table 3. All the listed methods except ZDDA2 use the MNIST-M training data. Without the access to the MNISTM training data, ZDDA2 can still achieve the accuracy comparable to those of the competing methods (even outperform some of them) in this task. the performance without applying any DA method. For the baseline of sensor fusion, we compare ZDDA3 with a naive fusion method by predicting the label with the highest probability from CRGB and CD in Sec. 3. 5. Experimental result We first compare ZDDA2 with the baseline in four domain adaptation (DA) tasks (adapting from gray scale to RGB images) involving DM , DF , DN , and DE , and the result is summarized in Table 3, where the numbers represent the overall/average per class accuracy (%). Darker cells in each column represent better classification accuracy in each task. In Table 3, the middle four rows represent the performance of ZDDA2 . {DN , DN -M} and {DE , DE -M} cannot be the task-irrelevant data for each other because they are both directly related to the letter classification tasks. Table 3 shows that regardless of which task-irrelevant data we use, ZDDA2 significantly outperforms the baseline (source only). We find that the similarity between the DA task and the task-irrelevant data is related to ZDDA2 ’s performance improvement over the baseline. For example, in the DA task DM → DM -M, using {DE , DE M} as the task-irrelevant data outperforms using {DF , DF M}, which is consistent with our intuition that letters are semantically more similar to digits compared with clothing. Second, in Table 4, we compare ZDDA2 with the 4.3. Performance references and baselines To obtain the performance references of the fully supervised methods, we train a classifier with the BNA in Table 2 in each domain using the task-relevant training data and labels in that domain. When the BNA is LeNet [3], we train the classifier from scratch. For the other BNAs, we pre-train the classifier in the same way as that described in Sec. 4.2. After training, for each DA task, we get two fully supervised classifiers Cf s,s and Cf s,t in the source and target domains respectively. For the baseline of the DA task, we directly feed the target-domain testing images to Cf s,s to obtain 6 exp. ID method training modality testing modality 2 3 4 number of classes 5 6 7 1 2 3 GoogleNet ZDDA2 ZDDA3 D D+PRGB-D D+PRGB-D D D D 85.53 88.16 88.16 83.33 85.96 86.84 82.89 83.55 84.87 70.00 77.89 77.89 67.11 70.18 72.37 4 5 6 GoogleNet ZDDA2 GoogleNet D D+PRGB-D RGB RGB RGB RGB 68.42 80.26 88.16 57.02 78.07 85.09 56.58 76.32 84.87 48.95 67.37 79.47 7 ZDDA3 D+PRGB-D RGB-D 88.16 85.96 85.53 selected scene IDs (introduced in Sec. 4.1) 0∼1 0∼2 0∼3 8 9 10 59.02 66.92 66.92 54.28 64.80 64.47 50.88 62.28 64.33 51.84 59.74 63.16 42.11 57.89 78.07 45.11 53.76 68.80 40.46 47.37 70.07 34.50 45.03 69.88 31.58 43.16 63.68 76.32 72.81 68.42 65.13 63.16 63.16 0∼4 0∼5 0∼6 0∼7 0∼8 0∼9 Table 5: Performance comparison with different numbers of classes in scene classification. The reported numbers are classification accuracy (%). The color of each cell reflects the performance ranking in each column, where darker color means better performance. PRGB-D represents the task-irrelevant RGB-D pairs. existing DA methods because the DA task DM → DM M is considered as one of the standard experiments in recent works [8, 13, 19, 29, 30]. Although this is not a fair comparison (because ZDDA2 has no access to the taskrelevant target-domain training data), we find that ZDDA2 can reach the accuracy comparable to those of the stateof-the-art methods (even outperform some of them), which supports that ZDDA2 is a promising DA method when the task-relevant target-domain training data is unavailable. Third, we test the efficacy of ZDDA on the DA tasks constructed from DS (adapting from depth to RGB images). We compare ZDDA with the baseline under different scene classification tasks by changing the number of scenes involved. The result is summarized in Table 5, where we list the training and testing modalities for each method. We also list the scene IDs (introduced in Sec. 4.1) involved in each task. Darker cells represent better accuracy in each column. For simplicity, we use Ei to refer to the experiment specified by exp. ID i in this section. For the fully supervised methods in depth domain, ZDDA (E2 , E3 ) outperforms the baseline (E1 ) due to the extra information brought by the task-irrelevant RGB-D pairs. We find that for most listed tasks, ZDDA3 (E3 ) outperforms ZDDA2 (E2 ), which is consistent with our intuition because the source representation in ZDDA2 is constrained by the L2 loss, while the counterpart in ZDDA3 is learned without the L2 constraint given the simulated target representation. The fully supervised method in RGB domain (E6 ) outperforms the baseline of the domain adaptation (E4 ) and ZDDA2 (E5 ) because E6 has access to the task-relevant RGB training data which is unavailable for E4 and E5 . The performance improvement from E4 to E5 is caused by ZDDA2 ’s training procedure as well as the extra task-irrelevant RGB-D training pairs. E3 and E7 perform similarly, which supports that the simulated target representation in ZDDA3 is similar to the real one. To test the consistency of the performance of ZDDA training testing validation on validation on method modality modality train/test splits class choices GN D ZDDA2 D+PRGB-D ZDDA3 D+PRGB-D D D D 52.63±1.76 56.89±2.13 58.37±3.08 53.98±1.68 62.05±1.97 62.49±1.74 GN D RGB ZDDA2 D+PRGB-D RGB GN RGB RGB 31.26±1.76 44.47±2.50 66.26±1.60 32.60±2.37 45.47±2.57 67.95±2.20 ZDDA3 D+PRGB-D RGB-D 58.68±3.10 62.13±1.50 10 / 5 9 / 10 # of classes / # of folds Table 6: Validation of ZDDA’s performance (in mean classification accuracy (%)) with different training/testing splits and choices of classes in scene classification. GN stands for GoogleNet [34]. The definition of PRGB-D and the representation of the cell color in each column are the same as those in Table 5. compared to that of the baseline, we perform the following three experiments. First, we conduct 5-fold cross validation with different training/testing splits for the 10-scene classification. Second, we perform 10-fold validation with different selections of classes for the 9-scene classification (leave-one-class-out experiment out of the 10 selected scenes introduced in Sec. 4.1). Third, we validate ZDDA’s performance with different base network architectures. The results of the first two experiments are presented in Table 6 (the extended version is in the supplementary material), and the result of the third experiment is shown in Table 7. The results of all the experiments are consistent with our observations from Table 5. In Table 5, Table 6, and Table 7, the classification accuracy is reported under the condition of noise-free training and testing data. To let ZDDA be more robust to noisy 7 (a) naive fusion (b) ZDDA3 (c) accuracy improvement from (a) to (b) Figure 4: Performance comparison between the two sensor fusion methods with black images as the noisy images. We compare the classification accuracy (%) of (a) naive fusion and (b) ZDDA3 under different noise levels in both RGB and depth testing data. (c) shows that ZDDA3 outperforms the naive fusion under most conditions. method training modality testing modality GN BNA AN data in the RGB domain, we can still train an RGB-D fusion model, and that the performance degrades smoothly when the noise increases. In addition to using black images as the noise model, we evaluate the same trained joint classifier in ZDDA3 using another noise model (adding a black rectangle with a random location and size to the clean image) at testing time, and the result (in the supplementary material) also supports that ZDDA3 outperforms the naive fusion method. Although we only use black images as the noise model for ZDDA3 at training time, we expect that adding different noise models can improve the performance and robustness of ZDDA3 . SN BNA D ZDDA2 D+PRGB-D ZDDA3 D+PRGB-D D D D 51.84 49.74 48.68 59.74 51.05 56.32 63.16 51.05 56.32 BNA D ZDDA2 D+PRGB-D BNA RGB RGB RGB RGB 31.58 30.26 26.58 43.16 40.00 35.79 63.68 59.47 57.37 ZDDA3 D+PRGB-D RGB-D 63.16 51.84 56.05 Table 7: Validation of ZDDA’s performance with different base network architectures (BNA) in scene classification. The reported numbers are classification accuracy (%). GN, AN, and SN stand for GoogleNet [34], AlexNet [24], and SqueezeNet v1.1 [21], respectively. The definition of PRGB-D and the representation of the cell color in each column are the same as those in Table 5. 6. Conclusion and future work We propose zero-shot deep domain adaptation (ZDDA), a novel approach to perform domain adaptation (DA) and sensor fusion with no need of the task-relevant targetdomain training data which can be inaccessible in reality. Our key idea is to use the task-relevant source-domain data to simulate the task-relevant target-domain representations by learning from the task-irrelevant dual-domain pairs. Experimenting on the MNIST [25], Fashion-MNIST [41], NIST [17], EMNIST [10], and SUN RGB-D [32] datasets, we show that ZDDA outperforms the baselines in DA and sensor fusion even without the task-relevant target-domain training data. In the task adapting from MNIST [25] to MNIST-M [12], ZDDA can even outperform several stateof-the-art DA methods which require access to the MNISTM [12] training data. We believe that ZDDA can be straightforwardly extended to handle other tasks of interest by modifying the loss functions in Figure 2 step 2/3, and we share a template of ZDDA’s training procedure and two examples of such extensions in the supplementary material. input, we train ZDDA3 step 3 with noisy training data (we use ptrain = 20 as explained in Sec. 4.2), and evaluate the classification accuracy under different noise conditions for both RGB and depth testing data. The result is presented in Figure 4, where ZDDA3 (Figure 4b) outperforms the naive fusion method (Figure 4a) under most conditions, and the performance improvement is shown in Figure 4c. Both Figure 4a and Figure 4b show that the performance degradation caused by the noisy depth testing data is larger than that caused by the noisy RGB testing data, which supports that the trained RGB-D classifier relies more on the depth domain. Traditionally, training a fusion model requires the task-relevant training data in both modalities. However, we show that without the task-relevant training 8 References [19] P. Haeusser, T. Frerix, A. Mordvintsev, and D. Cremers. Associative domain adaptation. In ICCV, pages 2765–2773, 2017. [20] J. Hoffman, S. Gupta, and T. Darrell. Learning with side information through modality hallucination. In CVPR, pages 826–834, 2016. [21] F. N. Iandola, S. Han, M. W. Moskewicz, K. Ashraf, W. J. Dally, and K. Keutzer. SqueezeNet: AlexNet-level accuracy with 50x fewer parameters and <0.5MB model size. arXiv preprint arXiv: 1602.07360, 2016. [22] Y. Jia, E. Shelhamer, J. Donahue, S. Karayev, J. Long, R. B. Girshick, S. Guadarrama, and T. Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv: 1408.5093, 2014. [23] P. Koniusz, Y. Tas, and F. Porikli. Domain adaptation by mixture of alignments of second- or higher-order scatter tensors. In CVPR, pages 4478–4487, 2017. [24] A. Krizhevsky, I. Sutskever, and G. E. Hinton. ImageNet classification with deep convolutional neural networks. In NIPS, pages 1097–1105, 2012. [25] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner. Gradientbased learning applied to document recognition. Proceedings of the IEEE, 86(11):2278–2324, 1998. [26] S. Motiian, M. Piccirilli, D. A. Adjeroh, and G. Doretto. Unified deep supervised domain adaptation and generalization. In ICCV, pages 5715–5725, 2017. [27] J. Ngiam, A. Khosla, M. Kim, J. Nam, H. Lee, and A. Y. Ng. Multimodal deep learning. In ICML, pages 689–696, 2011. [28] K. Saenko, B. Kulis, M. Fritz, and T. Darrell. Adapting visual category models to new domains. In ECCV, pages 213–226, 2010. [29] K. Saito, Y. Ushiku, and T. Harada. Asymmetric tri-training for unsupervised domain adaptation. In ICML, 2017. [30] O. Sener, H. O. Song, A. Saxena, and S. Savarese. Learning transferrable representations for unsupervised domain adaptation. In NIPS, pages 2110–2118, 2016. [31] K. Sohn, S. Liu, G. Zhong, X. Yu, M.-H. Yang, and M. Chandraker. Unsupervised domain adaptation for face recognition in unlabeled videos. In ICCV, pages 3210–3218, 2017. [32] S. Song, S. Lichtenberg, and J. Xiao. SUN RGB-D: A RGBD scene understanding benchmark suite. In CVPR, pages 567–576, 2015. [33] B. Sun and K. Saenko. Deep CORAL: Correlation alignment for deep domain adaptation. In ECCV Workshops, pages 443–450, 2016. [34] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. E. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich. Going deeper with convolutions. In CVPR, pages 1–9, 2015. [35] E. Tzeng, J. Hoffman, T. Darrell, and K. Saenko. Simultaneous deep transfer across domains and tasks. In ICCV, pages 4068–4076, 2015. [36] E. Tzeng, J. Hoffman, K. Saenko, and T. Darrell. Adversarial discriminative domain adaptation. In CVPR, pages 7167– 7176, 2017. [37] H. Venkateswara, J. Eusebio, S. Chakraborty, and S. Panchanathan. Deep hashing network for unsupervised domain adaptation. In CVPR, pages 5018–5027, 2017. [38] Y. Wang, W. Li, D. Dai, and L. V. Gool. Deep domain adaptation by geodesic distance minimization. In ICCV, pages 2651–2657, 2017. [1] BAIR/BVLC AlexNet model. http://dl. caffe.berkeleyvision.org/bvlc_alexnet. caffemodel. Accessed: 2017-03-02. [2] BAIR/BVLC GoogleNet model. http://dl.caffe. berkeleyvision.org/bvlc_googlenet. caffemodel. Accessed: 2017-03-02. [3] Lenet architecture in the Caffe tutorial. https: //github.com/BVLC/caffe/blob/master/ examples/mnist/lenet.prototxt. [4] SqueezeNet v1.1 model. https://github. com/DeepScale/SqueezeNet/blob/master/ SqueezeNet_v1.1/squeezenet_v1.1. caffemodel. Accessed: 2017-02-11. [5] R. Aljundi and T. Tuytelaars. Lightweight unsupervised domain adaptation by convolutional filter reconstruction. In ECCV Workshops, pages 508–515, 2016. [6] P. Arbelaez, M. Maire, C. Fowlkes, and J. Malik. Contour detection and hierarchical image segmentation. TPAMI, 33:898–916, 2011. [7] J. Blitzer, D. P. Foster, and S. M. Kakade. Zero-shot domain adaptation: A multi-view approach. In Technical Report TTITR-2009-1. Technological institute Toyota, 2009. [8] K. Bousmalis, N. Silberman, D. Dohan, D. Erhan, and D. Krishnan. Unsupervised pixel-level domain adaptation with generative adversarial networks. In CVPR, pages 3722– 3731, 2017. [9] T.-H. Chen, Y.-H. Liao, C.-Y. Chuang, W.-T. Hsu, J. Fu, and M. Sun. Show, adapt and tell: Adversarial training of crossdomain image captioner. In ICCV, pages 521–530, 2017. [10] G. Cohen, S. Afshar, J. Tapson, and A. van Schaik. EMNIST: An extension of MNIST to handwritten letters. arXiv preprint arXiv: 1702.05373, 2017. [11] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. FeiFei. ImageNet: A large-scale hierarchical image database. In CVPR, pages 248–255, 2009. [12] Y. Ganin and V. Lempitsky. Unsupervised domain adaptation by backpropagation. In ICML, volume 37, pages 1180–1189, 2015. [13] Y. Ganin, E. Ustinova, H. Ajakan, P. Germain, H. Larochelle, F. Laviolette, M. Marchand, and V. Lempitsky. Domainadversarial training of neural networks. Journal of Machine Learning Research, 17(59):1–35, 2016. [14] T. Gebru, J. Hoffman, and F.-F. Li. Fine-grained recognition in the wild: A multi-task domain adaptation approach. In ICCV, pages 1349–1358, 2017. [15] M. Ghifary, W. B. Kleijn, M. J. Zhang, D. Balduzzi, and W. Li. Deep reconstruction - classification networks for unsupervised domain adaptation. In ECCV, pages 597–613, 2016. [16] A. Gretton, A. J. Smola, J. Huang, M. Schmittfull, K. M. Borgwardt, and B. Schölkopf. Covariate shift and local learning by distribution matching, pages 131–160. MIT Press, Cambridge, MA, USA, 2009. [17] P. Grother and K. Hanaoka. NIST special database 19 handprinted forms and characters. U.S. Department of Commerce, 2016. [18] S. Gupta, J. Hoffman, and J. Malik. Cross modal distillation for supervision transfer. In CVPR, pages 2827–2836, 2016. 9 [39] C. Wu, W. Wen, T. Afzal, Y. Zhang, Y. Chen, and H. Li. A compact DNN: Approaching GoogLeNet-level accuracy of classification and domain adaptation. In CVPR, pages 5668– 5677, 2017. [40] M. Wulfmeier, A. Bewley, and I. Posner. Addressing appearance change in outdoor robotics with adversarial domain adaptation. In IROS, 2017. [41] H. Xiao, K. Rasul, and R. Vollgraf. Fashion-MNIST: A novel image dataset for benchmarking machine learning algorithms. arXiv preprint arXiv: 1702.05374, 2017. [42] H. Yan, Y. Ding, P. Li, Q. Wang, Y. Xu, and W. Zuo. Mind the class weight bias: Weighted maximum mean discrepancy for unsupervised domain adaptation. In CVPR, pages 2272– 2281, 2017. [43] X. Yang, P. Ramesh, R. Chitta, S. Madhvanath, E. A. Bernal, and J. Luo. Deep multimodal representation learning from temporal data. In CVPR, pages 5447–5455, 2017. [44] Y. Yang and T. M. Hospedales. Zero-shot domain adaptation via kernel regression on the grassmannian. In BMVC Workshop on Differential Geometry in Computer Vision, 2015. [45] J. Zhang, W. Li, and P. Ogunbona. Joint geometrical and statistical alignment for visual domain adaptation. In CVPR, pages 1859–1867, 2017. [46] Y. Zhang, P. David, and B. Gong. Curriculum domain adaptation for semantic segmentation of urban scenes. In ICCV, pages 2020–2030, 2017. 10
1cs.CV
EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS∗ arXiv:1801.05521v1 [math.OC] 17 Jan 2018 MASASHI WAKAIKI AND HIDEKI SANO† Abstract. We consider the event-triggered control of continuous-time linear infinite-dimensional systems. We show that an event trigger that measures the difference of a control input leads to the positive minimum inter-event time if a feedback operator is compact. Moreover, under certain natural assumptions on the infinite-dimensional system, we show that there exists an event trigger such that the closed-loop system is exponentially stable. Key words. event-triggered control, infinite-dimensional systems, stabilization AMS subject classifications. 34G10, 93C62, 93C25, 93D15 1. Introduction. Event-triggered control is one of resource-aware control methods, and its intervals of data transmissions are determined by a predefined condition on the data. As a result, network and energy resources are consumed only when the data is necessary for control. In addition to such networked-control applications, the analysis and synthesis of event-triggered control is interesting from a theoretical viewpoint, because event triggering interacts continuous-time and discrete-time dynamics in a way different from the usual periodic sampled-data control schemes. Most of the existing studies on event-triggered control have been developed for finite-dimensional systems, but some researchers have recently extended to infinite-dimensional systems, e.g., systems with output delays [12], first-order hyperbolic systems [6], and secondorder parabolic systems [11, 21]. In this paper, we consider the following system with state space X and input space U : ẋ(t) = Ax(t) + Bu(t), where A is the generator of a strongly continuous semigroup T (t) on X and B is a bounded linear operator from U into the extrapolation space X−1 . To infinitedimensional systems described by this abstract evolution equation, the results of periodic sampled-data control for finite-dimensional systems have been generalized in a number of papers; see [13–15, 18–20]. Instead of periodic control updating, we here generate the control input u(t) by an event-triggered scheme based on the difference of u(t) such as  (1.1a) tk+1 = inf t > tk : kF x(t) − u(tk )kU > εkx(tk )kX ∀k ∈ N0 (1.1b) u(t) = F u(tk ) ∀t ∈ [tk , tk+1 ), ∀k ∈ N0 , where ε is a positive constant and F is a bounded linear operator from X to U . Since a small ε leads to frequent updates of the control input, we would expect that the eventtriggered feedback system is exponentially stable for a sufficiently small ε if A + BF generates an exponentially stable semigroup. One of the fundamental problems we consider is whether or not this intuition is correct. In addition to closed-loop stability, the minimum inter-event time inf (tk+1 − tk ) k∈N0 ∗ Submitted to the editors DATE. Funding: This work was supported by JSPS KAKENHI Grant Numbers JP17K14699. † Graduate School of System Informatics, Kobe University, Nada, Kobe, Hyogo 657-8501, Japan ([email protected], [email protected]). 1 2 MASASHI WAKAIKI AND HIDEKI SANO should be guaranteed to be positive; otherwise, infinitely many events might occur in finite time. This phenomenon is called the Zeno behavior (see [7]) and makes eventtriggered control schemes infeasible for practical implementation. To guarantee the Zeno freeness is the unique theoretical specification of event-triggered control, and for finite-dimensional systems, the minimum inter-event time has been extensively investigated; see [1, 4, 22]. For example, in the finite-dimensional case, it was shown in [22] that the event-trigger  tk+1 = inf t > tk : kx(t) − x(tk )kX > εkx(t)kX } ∀k ∈ N0 satisfies inf k∈N0 (tk+1 − tk ) > 0. However, this is not true for the infinite-dimensional case, which is illustrated in Example 2.2. This is the reason why we use the eventtrigger (1.1a) based on the difference of the control input, and we see in Section 2 that the time sequence {tk }∞ k=0 constructed by (1.1a) satisfies inf k∈N0 (tk+1 − tk ) > 0 if the feedback operator F is compact. After the discussion on the minimum inter-event time in Section 2, we analyze the exponential stability of the event-triggered feedback system in Section 3 for the case where the input operator B is bounded. Introducing a norm on the state space with respect to which the semigroup generated by A + BF is a contraction, we provide a sufficient condition on the event trigger parameter ε for the exponential stability of the feedback system. Moreover, under a certain assumption on the semigroup T (t), we obtain another sufficient condition for exponential stability. While we obtain the former result via a trajectory-based approach, a key element in the latter result is the application of the Lyapunov stability theorem. In Section 4, we study the case of unbounded input operators. We first focus on a system with a finite-dimensional unstable part and a feedback operator that stabilizes the unstable part but does not act on the residual stable part. In this case, the feedback operator has a specific structure, but we can achieve the exponential stability of the feedback system by using less conservative event triggers for the finitedimensional part. Second we assume that the semigroups generated by A and A+BF with suitable domains are analytic and exponentially stable, respectively. Under these assumptions, we show that for every compact feedback operator, there exist periodic event triggers [8, 9] achieving exponential stability. Notation and terminology. We denote by N0 the set of nonnegative integers. For α ∈ R, we define Cα := {s ∈ C : Res > α}. Let X and Y be Banach spaces. Let us denote the space of all bounded linear operators from X to Y by B(X, Y ), and set B(X) := B(X, X). Let A be an operator from X to Y . The domain of A is denoted by D(A) and the spectrum of A by σ(A). For a subset S ⊂ X, let A|S denote the restriction of A to S, namely, A|S x = Ax ∀x ∈ D(A) ∩ S. For a strongly continuous semigroup T (t) on X, the exponential growth bound of T (t) is denoted by ω(T ), that is, ω(T ) := limt→∞ ln kT (t)k/t. We say that the strongly continuous semigroup T (t) is exponentially stable if ω(T ) < 0. 2. Event-triggered feedback system. 2.1. Infinite-dimensional system. Let a time sequence {tk }∞ k=0 satisfy t0 = 0 and (2.1) inf (tk+1 − tk ) > 0. k∈N0 EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 3 Let us denote by X and U the state space and the input space, and both of them are Hilbert spaces. Let k · k and h·, ·i denote the norm and the inner product of X, respectively. The space X−1 stands for the completion of X in the norm kxk−1 = k(λI − A)−1 xk, where λ ∈ C is any element in the resolvent set of A. Clearly, X ,→ X−1 and B(U, X) ⊂ B(U, X−1 ). Consider the following infinite-dimensional system: (2.2a) ẋ(t) = Ax(t) + Bu(t) ∀t ≥ 0; (2.2b) u(t) = F x(tk ) x(0) = x0 ∈ X ∀t ∈ [tk , tk+1 ), ∀k ∈ N0 . where x(t) ∈ X, u(t) ∈ U , A is the generator of a strongly continuous semigroup T (t) on X, and the input operator B and the feedback operator F satisfy B ∈ B(U, X−1 ) and F ∈ B(X, U ). We say that B is bounded if B ∈ B(U, X); otherwise B is unbounded. The semigroup T (t) can be extended to a strongly continuous semigroup on X−1 , and its generator on X−1 is an extension of A to X. We shall use the same symbols T (t) and A for the original ones and the associated extensions. For the the abstract evolution equation (2.2), we define a function x recursively by (2.3a) x(0) = x0 Z (2.3b) τ T (s)BF x(tk )ds ∀τ ∈ (0, tk+1 − tk ], ∀k ∈ N0 x(tk + τ ) = T (τ )x(tk ) + 0 as in the periodic sampled-data case [14]. Considering T (t) as a semigroup on X−1 , we find from the standard theory of strongly continuous semigroups that x given by (2.3) satisfies (2.4) x ∈ C(R+ , X) and x|[tk ,tk+1 ] ∈ C 1 ([tk , tk+1 ], X−1 ) ∀k ∈ N0 . Additionally, the following differential equation in X−1 holds: (2.5) ẋ(t) = Ax(t) + BF x(tk ) ∀t ∈ (tk , tk+1 ), ∀k ∈ N0 . Since only x defined by (2.3) satisfies the properties (2.4) and (2.5), we can say that this x is the unique solution of the abstract evolution equation (2.2). Definition 2.1 (Exponential stability). The system (2.2) is exponential stable if there exist M ≥ 1 and γ > 0 such that x given by (2.3) satisfies kx(t)k ≤ M e−γt kx0 k ∀x0 ∈ X, ∀t ≥ 0. We call the constant γ (an upper bound on) the decay rate of the system (2.2). 2.2. Minimum inter-event times. We call inf k∈N0 (tk+1 − tk ) the minimum inter-event time. If this value is zero, then the event trigger may update the input infinitely fast, which cannot be realized in digital platform. In this section, we show that the following event triggers guarantee the positive inter-event time under certain assumptions:  (2.6) tk+1 := inf t > tk : kF x(t) − u(tk )kU > εkx(tk )k ∀k ∈ N0  (2.7) tk+1 := inf t > tk : kF x(t) − u(tk )kU > εkx(t)k ∀k ∈ N0 . 4 MASASHI WAKAIKI AND HIDEKI SANO Whereas we here use the event triggers (2.6) and (2.7) that measure the difference of the inputs, the commonly-used event triggers for finite-dimensional systems [22] are based on the difference of the state such as  (2.8) tk+1 := inf t > tk : kx(t) − x(tk )k > εkx(t)k} ∀k ∈ N0 . If the semigroup T (t) is uniformly continuous, then one can show that the inter-event time of the event trigger (2.8) is positive. However, systems described by uniformly continuous semigroups do not contain practical infinite-dimensional systems. On the other hand, in the following simple example, event triggers based on the difference of the state lead to inf k∈N0 (tk+1 − tk ) = 0 in finite time. Example 2.2. Let X = L2 (0, ∞), the Hilbert space of square integrable functions on (0, ∞) with the usual inner product, and consider the shift operator ∀x ∈ L2 (0, ∞), ∀s > 0. (T (t)x)(s) = x(t + s) Then T (t) is a strongly continuous semigroup on L2 (0, ∞), and as discussed in Remark 7 in [2], T (t) is strongly stable but T ∗ (t) is not. Set an initial state x0 ∈ L2 (0, ∞) to be ( 1 s≤1 x0 (s) = 0 s > 1, and x(t) = T (t)x0 for all t > 0. Assume that ε < 1, and define a time sequence {tk }∞ k=0 by t0 = 0 and  (2.9) tk+1 := inf t > tk : kx(t) − x(tk )kL2 > εkx(tk )kL2 }. If tk ∈ [0, 1), then kx(tk )k2L2 = 1 − tk and Z 1−tk 2 kT (τ )x(tk ) − x(tk )kL2 = 1dτ = τ ∀τ ∈ [0, 1 − tk ]. 1−(tk +τ ) It follows that tk+1 = tk + ε(1 − tk ) Similarly, if we define ∀k ∈ N0 . {tk }∞ k=0 tk+1 by t0 = 0 and (2.8), then ε (1 − tk ) ∀k ∈ N0 . = tk + 1+ε Both of the time sequences {tk }∞ k=0 are monotonically increasing and converge to 1. Thus the minimum inter-event time inf k∈N0 (tk+1 − tk ) is zero.  For τ ≥ 0, define the operator Sτ : U → X by Z τ Sτ u := T (s)Buds. 0 The following lemma is useful for the discussion on the minimum inter-event time: Lemma 2.3 ([14]). For any τ ≥ 0, Sτ ∈ B(U, X), and for any θ > 0, sup kSτ kB(U,X) < ∞. 0≤τ ≤θ Moreover, if F ∈ B(X, U ) is compact, then (2.10) lim kSτ F kB(X) = 0. τ →0 EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 5 For compact operators, the next lemma is also known: Lemma 2.4 ([14]). Let X, Y , and Z be Hilbert spaces and let Γ : [0, 1] → B(X, Y ) be given. If limt→0 Γ∗ (t)y = 0 for all y ∈ Y and if Λ ∈ B(Y, Z) is compact, then lim kΛΓ(t)kB(X,Z) = 0. t→0 From these lemmas, we obtain the following result: Lemma 2.5. Assume that F ∈ B(X, U ) is compact. Set x(τ ) = (T (τ ) + Sτ F )x0 (2.11) ∀τ > 0; x0 ∈ X. For every ε > 0, there exists θ > 0 such that kF x(τ ) − F x0 kU ≤ εkx0 k ∀x0 ∈ X, ∀τ ∈ [0, θ). Proof. Since (2.11) leads to x(τ ) − x(0) = (T (τ ) − I)x(0) + Sτ F x(0) ∀τ ≥ 0, it follows that (2.12) kF x(τ ) − F x(0)kU ≤ kF (T (τ ) − I) + F Sτ F kB(X,U ) · kx(0)k ∀τ ≥ 0. From Lemma 2.3, lim kF Sτ F kB(X,U ) = 0. τ →0 Since T ∗ (t) is strongly continuous, we obtain lim k(T ∗ (τ ) − I)xk = 0 τ →0 ∀x ∈ X, and hence it follows from Lemma 2.4 that lim kF (T (τ ) − I)kB(X,U ) = 0. τ →0 Thus, for every ε > 0, there exists θ > 0 such that kF (T (τ ) − I) + F Sτ F kB(X,U ) ≤ kF (T (τ ) − I)kB(X,U ) + kF Sτ F kB(X,U ) (2.13) <ε ∀τ ∈ [0, θ). Combining (2.12) and (2.13), we obtain the desired result. From Lemma 2.5, we see that the minimum inter-event time inf k∈N0 (tk+1 − tk ) is positive under the event trigger (2.6). Theorem 2.6. Assume that F ∈ B(X, U ) is compact. For the system (2.2), set the time sequence {tk }∞ k=0 recursively satisfying t0 = 0 and (2.6). Then for every ε > 0, the time sequence {tk }∞ k=0 satisfies inf k∈N0 (tk+1 − tk ) > 0. Proof. From (2.4), it follows that x(tk ) ∈ X for every k ∈ N0 . Therefore, we see from (2.3) and Lemma 2.5 that, for every ε > 0, there exists θ > 0 such that kF x(tk + τ ) − F x(tk )kU ≤ εkx(tk )k ∀τ ∈ [0, θ), ∀k ∈ N0 . Since u(tk ) = F x(tk ) for every k ∈ N0 , the time sequence {tk }∞ k=0 satisfies inf (tk+1 − tk ) ≥ θ > 0. k∈N0 This completes the proof. 6 MASASHI WAKAIKI AND HIDEKI SANO We next investigate the minimum inter-event time of the other event trigger (2.7). In addition to Lemma 2.5, we need the following estimate: Lemma 2.7. Assume that F ∈ B(X, U ) is compact, and set x(t) as in (2.11). There exist c1 > 0 and s1 > 0 such that the semigroup T (t) satisfies kT (s1 )x0 k ≥ c1 kx0 k (2.14) ∀x0 ∈ X if and only if there exist c2 > 0 and θ > 0 such that (2.15) kx0 k ≤ c2 kx(τ )k ∀x0 ∈ X, ∀τ ∈ [0, θ). Proof. Suppose first that (2.14) holds for some c1 > 0 and s1 > 0. Since there exists M ≥ 1 such that kT (t)kB(X) ≤ M ∀t ∈ [0, s1 ], it follows from (2.14) that c1 kx0 k ≤ kT (s1 )x0 k ≤ kT (s1 − t)T (t)x0 k ≤ M kT (t)x0 k ∀x0 ∈ X, ∀t ∈ [0, s1 ]. Therefore, (2.16) kT (t)x0 k ≥ c1 0 kx k M ∀x0 ∈ X, ∀t ∈ [0, s1 ]. From (2.10), there exists s2 ∈ [0, s1 ] such that (2.17) kSt F x0 k ≤ kSt F kB(X) · kx0 k < c1 kx0 k 2M ∀x0 ∈ X, ∀t ∈ [0, s2 ]. Combining (2.16) and (2.17), we obtain (2.18) k(T (t) + St F )x0 k ≥ kT (t)x0 k − kSt F x0 k ≥ c1 kx0 k 2M ∀x0 ∈ X, ∀t ∈ [0, s2 ]. Therefore, (2.15) holds with c2 := 2M/c1 and θ := s2 . Conversely, if (2.15) holds for some θ > 0 and c2 > 0, then kx0 k ≤ c2 kT (τ )x0 k + c2 kSτ F x0 k ∀x0 ∈ X, ∀τ ∈ [0, θ). Using (2.10) as in the discussion above, we find that there exists s1 ∈ (0, θ) such that kT (s)x0 k ≥ 1 kx0 k 2c2 ∀x0 ∈ X, ∀s ∈ [0, s1 ]. This completes the proof. Remark 2.8. Suppose that B is bounded, i.e., B ∈ B(U, X). Then lim kSτ k = 0, τ →0 and hence the compactness of F is not required in Lemma 2.7. Remark 2.9. The condition (2.14) appears also in Theorem 2 of [16] for the applicability of the Lyapunov stability theorem, and it is shown in Corollary 1 of [16] that T (t) satisfies (2.14) and its range is dense in X if and only if T (t) can be extended to a strongly continuous group on X. EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 7 We see from Lemmas 2.5 and 2.7 that the event trigger (2.6) leads to the positive minimum inter-event time for a strongly continuous semigroup T (t) satisfying (2.14). Theorem 2.10. Assume that F ∈ B(X, U ) is compact and that the semigroup T (t) satisfies (2.14) for some c1 > 0 and s1 > 0. For the system (2.2), set the time sequence {tk }∞ k=0 recursively satisfying t0 = 0 and (2.7). Then for every ε > 0, the time sequence {tk }∞ k=0 satisfies inf k∈N0 (tk+1 − tk ) > 0. Proof. Combining Lemmas 2.5 and 2.7, we have that, for every ε > 0, there exists θ > 0 such that kF x(tk + τ ) − u(tk )kU ≤ εkx(t)k, ∀τ ∈ [0, θ), ∀k ∈ N0 . Thus the time sequence {tk }∞ k=0 satisfies inf k∈N0 (tk+1 − tk ) ≥ θ > 0. 3. Stability analysis under bounded control. In this section, we analyze closed-loop stability in the case in which the input operator B is bounded. If the feedback operator F is compact and if the semigroup generated by A + BF is exponentially stable, then the event-triggered feedback system is exponentially stable provided the event-triggered parameter ε is sufficiently small. Fixing τM > 0, we first set a time sequence {tk }∞ k=0 recursively satisfying t0 = 0 and n o  (3.1) tk+1 := min tk + τM , inf t > tk : kF x(t) − u(tk )kU > εkx(tk )k ∀k ∈ N0 . Theorem 3.1. Assume that A generates a strongly continuous semigroup T (t) on X, B ∈ B(U, X), and F ∈ B(U, X) is compact. Assume that there exists M ≥ 1 and ω > 0 such that the semigroup TBF (t) generated by A + BF satisfies kTBF (t)k ≤ M e−ωt (3.2) ∀t ≥ 0. If we set the time sequence {tk }∞ k=0 to be t0 = 0 and (3.1) with a parameter ε > 0 satisfying (3.3) ε< ω , M kBkB(U,X) then the system (2.2) is exponentially stable with decay rate γ defined by  log (1 − ε0 )e−ωτ + ε0 (3.4) γ := min , τm ≤τ ≤τM −τ where ε0 := ε M kBkB(U,X) , ω τm := inf (tk+1 − tk ). k∈N0 Proof. As in Theorem 5.2 on p. 19 in [17] and Theorem 3.1 in [14], we introduce a new norm | · | on X, which is defined by |x| := sup keωt TBF (t)xk. t≥0 It follows from (3.2) that keωt TBF (t)xk ≤ eωt · M e−ωt kxk = M kxk ∀x ∈ X, ∀t ≥ 0. 8 MASASHI WAKAIKI AND HIDEKI SANO On the other hand, kxk = keω0 TBF (0)xk ≤ sup keωt TBF (t)xk ∀x ∈ X. t≥0 Hence we have kxk ≤ |x| ≤ M kxk (3.5) ∀x ∈ X. Moreover, |TBF (t)x| = sup keωs TBF (s + t)xk = sup keω(s−t) TBF (s)xk s≥0 (3.6) =e s≥t −ωt ωs sup ke TBF (s)xk s≥t ≤ e−ωt sup keωs TBF (s)xk = e−ωt |x| ∀x ∈ X, ∀t ≥ 0. s≥0 Noting (3.7) ẋ(t) = (A + BF )x(t) − B(F x(t) − F x(tk )) ∀t ∈ (tk , tk+1 ), ∀k ∈ N0 , we see from a routine calculation (see, e.g., Exercise 3.3 in [3] and Appendix A) that x(tk + τ ) in (2.3) can be written as (3.8) Z τ x(tk +τ ) = TBF (τ )x(tk )− TBF (τ −s)B(F x(tk +s)−F x(tk ))ds ∀τ ∈ (0, tk+1 −tk ]. 0 Since the event-trigger condition in (3.1) leads to sup kF x(tk + s) − F x(tk )kU ≤ εkx(tk )k, 0≤s<tk+1 −tk using the properties (3.5) and (3.6), we obtain Z τ |x(tk + τ )| ≤ |TBF (τ )x(tk )| + |TBF (τ − s)B(F x(tk + s) − F x(tk ))|ds Z τ0 ≤ e−ωτ |x(tk )| + e−ω(τ −s) |B(F x(tk + s) − F x(tk ))|ds 0 1 − e−ωτ M kBkB(U,X) · sup kF x(tk + s) − F x(tk )kU ≤e |x(tk )| + ω 0≤s≤τ  −ωτ ≤ (1 − ε0 )e + ε0 · |x(tk )| ∀τ ∈ (0, tk+1 − tk ], ∀k ∈ N0 −ωτ where ε0 is defined as in (3.4) and satisfies 0 < ε0 < 1 from (3.3). Since f (τ ) := (1 − ε0 )e−ωτ + ε0 satisfies f (0) = 1 and f 0 (τ ) = (ε0 − 1)ωe−ωτ < 0 for all τ ≥ 0, it follows that (1 − ε0 )e−ωτ + ε0 < 1 ∀τ > 0. Therefore, γ ∈ R defined by (3.4) satisfies γ > 0, and |x(tk + τ )| ≤ e−γτ |x(tk )| ∀τ ∈ (0, tk+1 − tk ], ∀k ∈ N0 . EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 9 In particular, |x(tk+1 )| ≤ e−γτ |x(tk )| (3.9) ∀k ∈ N0 . Using (3.9) recursively, we obtain |x(t)| ≤ e−γt |x0 | ∀x0 ∈ X, ∀t ≥ 0. Thus we see from (3.5) that kx(t)k ≤ |x(t)| ≤ e−γt |x0 | ≤ M e−γt kx0 k ∀x0 ∈ X, ∀t ≥ 0. This completes the proof. Remark 3.2. In general, it is difficult to find a constant M ≥ 1 satisfying (3.2). If TBF can be expanded in a Riesz basis, then we can characterize such a constant M in the following way. Let A + BF be a Riesz spectral operator in Definition 2.3.4 on p. 41 in [3] and have simple eigenvalues {λn }n∈N and corresponding eigenvectors {fn }n∈N . Then there exist positive constants α and β such that for every N ∈ N and every scalars ρ1 , . . . , ρN such that α N X n=1 2 |ρn | ≤ N X 2 ρn fn ≤β n=1 N X |ρn |2 . n=1 Let {gn }n∈N be the eigenvectors (A + BF )∗ such that {fn }n∈N and {gn }n∈N are biorthogonal. As shown in the proof of Theorem 2.3.5 on p.p. 41–45 in [3], TBF (t) satisfies r β −ω(TBF )t kTBF (t)k ≤ e ∀t ≥ 0. α p Thus a constant M ≥ 1 satisfying (3.2) is given by M = β/α. In particular, if {fn }n∈N is an orthogonal basis, then α = β = 1, and hence M = 1. The following example illustrates the result in Theorem 3.1: Example 3.3. Consider a metal rod of length one that can be heated along its length: ∂z ∂2z (ξ, t) = 2 (ξ, t) + v(ξ, t) ∂t ∂ξ z(0, t) = 0, z(1, t) = 0, ∀t ≥ 0 where z(ξ, t) and v(ξ, t) are the temperature of the rod and the addition of heat along the bar at time t ≥ 0 and position ξ, respectively. We can reformulate this equation as an abstract evolution equation (2.2a) with X = U = L2 (0, 1), the Hilbert space of square integrable functions on (0, 1) with the usual inner product, and x(t) = z(·, t), u(t) = v(·, t). We also introduce operators Ah = d2 h dξ 2 with domain D(A) = {h ∈ W 2,2 (0, 1) : h(0) = 0, h(1) = 0}, 10 MASASHI WAKAIKI AND HIDEKI SANO and B = I. Similarly to Example 6.2.8 on p. 299 in [3], the optimal control with cost functional Z ∞Z 1  kz(x, t)k2L2 + kv(x, t)k2L2 dxdt 0 0 is given by u(t) = ∞  X −n2 π 2 + p  n4 π 4 + 1 hx(t), φn iL2 φn =: F x(t), n=1 where φn (ξ) := √ 2 2 sin(nπξ) and {φn }∞ n=1 is an orthonormal basis of L (0, 1). Since p ∀n ∈ N, −n2 π 2 + n4 π 4 + 1 ≤ 1 it follows that the feedback operator F is bounded. Moreover, we can show that F is compact. Indeed, define the finite-rank operator FN ∈ B(L2 (0, 1)) by FN x = N  X −n2 π 2 + p  n4 π 4 + 1 hx, φn iL2 φn ∀x ∈ L2 (0, 1), n=1 Then, we find from the Parseval equality that kF x − FN xk2L2 ∞   p X −n2 π 2 + n4 π 4 + 1 hx, φn iL2 φn = n=N +1 ∞  X L2  p −n2 π 2 + n4 π 4 + 1 hx, φn iL2 = 2 2 n=N +1 ∞ 2 X  p 2 |hx, φn iL2 | ≤ −(N + 1)2 π 2 + (N + 1)4 π 4 + 1 n=N +1 2 p ≤ −(N + 1)2 π 2 + (N + 1)4 π 4 + 1 kxk2L2  ∀x ∈ L2 (0, 1). We therefore obtain kF − FN kB(L2 ) ≤ −(N + 1)2 π 2 + and since  lim N →∞ −(N + 1)2 π 2 + p p (N + 1)4 π 4 + 1,  (N + 1)4 π 4 + 1 = 0, it follows that the finite-rank operator FN uniformly converges to F . Hence the feedback operator F is compact. Using the expansion of A: Ax = ∞ X  −n2 π 2 hx, φn iL2 φn n=1 with domain ( D(A) = x ∈ L2 (0, 1) : ∞ X n=1 ) |n2 π 2 |2 · |hx, φn iL2 |2 < ∞ , EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 11 we see that ω(TBF ) = −2π 2 + p π 4 + 1. It follows from the discussion in Remark 3.2 that the semigroup TBF (t) satisfies kTBF (t)kB(L2 ) ≤ e−(2π 2 √ − π 4 +1)t ∀t ≥ 0. It follows from Theorem 3.1 that if the event-trigger parameter ε > 0 satisfies p ε < 2π 2 − π 4 + 1, then the closed-loop system with the event trigger (3.1) is exponential stable.  {tk }∞ k=0 We next set a time sequence recursively as in (2.7) with t0 = 0 and show the exponential stability of the closed-loop system under such an event trigger. Instead of the trajectory-based approach in Theorem 3.1, we here apply the Lyapunov stability theorem. Theorem 3.4. Assume that A generates a strongly continuous semigroup T (t) on X, B ∈ B(U, X) and that F ∈ B(U, X) is compact. Assume further that the semigroup T (t) satisfies (2.14) for some c1 > 0 and s1 > 0 and that the semigroup TBF (t) generated by A+BF is exponential stable. If we set the time sequence {tk }∞ k=0 to be t0 = 0 and (2.7) with a parameter ε > 0 satisfying Z ∞ 1 ∗ (3.11) ε< , where P x := TBF (t)TBF (t)xdt ∀x ∈ X, 2kP BkB(U,X) 0 then the infinite-dimensional system (2.2) is exponentially stable with decay rate γ defined by (3.12) 1 − 2εkP BkB(U,X) R∞ . 2 0 kTBF (t)k2 dt γ := Proof. For all s1 > 0, there exists M ≥ 1 such that kT (t)kB(X) ≤ M, (3.13) kTBF (t)kB(X) ≤ M ∀t ∈ [0, s1 ], and we obtain (2.16) from (2.14). Since TBF (t) satisfies the following identity (see Theorem 3.2.1 on p. 110 in [3]): Z (3.14) t TBF (t − s)BF T (s)xds TBF (t)x = T (t)x + ∀x ∈ X, 0 it follows from (2.14) and (3.13) that Z t kTBF (t)xk ≥ kT (t)xk − kTBF (t − s)BF T (s)xkds 0 c  1 − tM 2 kBF kB(X) kxk ∀x ∈ X, ∀t ∈ [0, s1 ]. ≥ M Therefore, (3.15) kTBF (t)xk ≥ c1 kxk 2M ∀x ∈ X, ∀t ∈ [0, s3 ], 12 MASASHI WAKAIKI AND HIDEKI SANO where  c1 s3 := min s1 , 3 2M kBF kB(X)  > 0. Since TBF is exponential stable, it follows from Theorem 5.1.3 in [3] that there exists a positive operator P ∈ B(X) such that the following Lyapunov inequality holds: (3.16) h(A + BF )x, P xi + hP x, (A + BF )xi = −kxk2 ∀x ∈ X, and such an operator P is given as in (3.11). Using (3.15), we have from Theorem 2 in [16] that there exist α, β > 0 such that (3.17) αkxk2 ≤ hP x, xi ≤ βkxk2 Since Z hP x, xi = ∞ kTBF (t)xk2 dt ≤ Z ∀x ∈ X. ∞ kTBF (t)k2 dt · kxk2 , 0 0 it follows that we can choose β > 0 so that Z ∞ β≤ kTBF (t)k2 dt. 0 Assume that x0 ∈ D(A) := {x ∈ X : Ax ∈ X}. Then the mild solution of (2.3) is also a classical solution, namely, x satisfies the differential equation (2.5) in X. Moreover, if we define the implementation-induced error e(t) := u(t) − F x(t), then ke(t)kU < εkx(t)k under the event trigger (2.7). Therefore, using (3.7) and (3.16), we find that for every t ∈ (tk , tk+1 ) and every k ∈ N0 , V (t) := hP x(t), x(t)i satisfies dV (t) = hP ẋ(t), x(t)i + hẋ(t), P x(t)i dt = hP ((A + BF )x(t) + Be(t)), x(t)i + hx(t), P ((A + BF )x(t) + Be(t))i ≤ −kx(t)k2 + hP Be(t), x(t)i + hx(t), P Be(t)i ≤ −kx(t)k2 + 2kP BkB(U,X) · kx(t)k · ke(t)kU ≤ −(1 − 2εkP BkB(U,X) )kx(t)k2 ≤ −2γV (x(t)), where γ > 0 is defined as in (3.12). We see from the positive definiteness (3.17) that αkx(t)k2 ≤ V (t) ≤ e−2γt V (x0 ) ≤ βe−2γt kx0 k2 ∀t ≥ 0, and hence r (3.18) kx(t)k ≤ β −γt 0 e kx k α ∀x0 ∈ D(A), ∀t ≥ 0. Finally, we show the exponential stability for all initial states in X. Fix x0 ∈ X and te ≥ 0 arbitrarily, and let x(t) be the solution of the abstract evolution equation (2.3) with the initial state x0 . Since Sτ ∈ B(U, X) for every τ ≥ 0 by Lemma 2.3, x(t) EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 13 depends continuously on the initial state x0 in the sense that there exists a constant L = L(te ) ≥ 1 such that kx(t)k ≤ Lkx0 k ∀x0 ∈ X, ∀t ∈ [0, te ]. Moreover, since D(A) is dense in X, it follows that for every ε > 0, there exists ζ 0 ∈ D(A) such that the solution ζ(t) of the abstract evolution equation (2.3) with the initial state ζ 0 satisfies kx(t) − ζ(t)k ≤ ε ∀t ∈ [0, te ]. Therefore we have from (3.18) that kx(t)k ≤ kx(t) − ζ(t)k + kζ(t)k ≤ r r ! β β −γt 0 ε+ e kx k 1+ α α Since ε > 0 was arbitrary, we obtain r β −γt 0 e kx k kx(t)k ≤ α ∀t ∈ [0, te ]. ∀t ∈ [0, te ]. Thus the feedback system (2.2) is exponentially stable with decay rate γ. Remark 3.5. If M ≥ 1 and ω > 0 satisfy kTBF (t)kB(X) ≤ M e−ωt for all t ≥ 0, then we obtain M2 kP kB(X) ≤ . 2ω Therefore, (3.11) and (3.12) can be rewritten as ε< ω , M 2 kBkB(U,X) γ≥ ω − εM 2 kBkB(U,X) . M2 4. Stability analysis under unbounded control. Throughout this section, we consider the unbounded input operator B ∈ B(U, X−1 ). We provide two eventtriggered control schemes for the exponential stabilization of the feedback system. The first approach is based on system decomposition, and the second one employs a periodic event trigger developed in [8, 9] 4.1. Event-triggered control based on system decomposition. 4.1.1. System decomposition. In what follows, we shall place a number of assumptions on the infinite-dimensional system (2.2) and recall the decomposition of infinite-dimensional systems under unbounded control used in [13–15]. Assumption 4.1. There exists α < 0 such that σ(A) ∩ Cα consists of finitely many eigenvalues of A with finite algebraic multiplicities. If Assumption 4.1 holds, then we can decompose X by a standard technique (see, e.g., Lemma 2.5.7 in [3]) as follows. There exists a rectifiable, closed, simple curve Γ in C not intersecting σ(A) and containing σ(A) ∩ Cα in its interior and σ(A) ∩ (C \ Cα ) in its exterior. The operator Π : X → X, defined by Z 1 (4.1) Π := (sI − A)−1 ds, 2πi Γ 14 MASASHI WAKAIKI AND HIDEKI SANO where Γ is traversed once in the counterclockwise direction, is a projection operator, and we can decompose X to be (4.2) X = X + ⊕ X −, where X + := ΠX and X − := (I − Π)X. This decomposition satisfies dim X + < ∞ and X + ⊂ D(A), and X + , X − are T (t)invariant for all t ≥ 0. Define (4.3) A+ := A|X + , A− := A|X − , T + (t) := T (t)|X + , T − (t) := T (t)|X − . Then σ(A− ) = σ(A) ∩ (C \ Cα ). σ(A+ ) = σ(A) ∩ Cα , Note that A+ and A− generate the semigroups T + (t) on X + and T − (t) on X − , respectively. The semigroup T − (t) can be extended to a strongly continuous semigroup on the extrapolation space (X − )−1 , and its generator on (X − )−1 is an extension of A− to X − . The same symbols T − (t) and A− will be used to denote these extensions. Since the spectrum of the operator A on X is equal to the spectrum of the operator A on X−1 , the projection operator Π on X defined by (4.1) can be extended to a projection Π−1 on X−1 . If λ ∈ ρ(A) and if λI − A is considered as an operator in B(X, X−1 ), then Π−1 is similar to Π: Π−1 = (λI − A)Π(λI − A)−1 and satisfies Π−1 X−1 = ΠX = X + . Using the extended projection operator Π−1 , we can decompose the control operator B ∈ B(U, X−1 ): B + := Π−1 B, B − := (I − Π−1 )B. Since (X − )−1 and (X−1 )− := (I − Π−1 )X−1 are both completions of X − endowed with the norm k · k−1 , we can identify (X − )−1 and (X−1 )− (see, e.g., the footnote 3 of p. 1213 in [13]). We also decompose the feedback operator F ∈ B(X, U ): F + := F |X + , F − := F |X − . In addtion to Assumption 4.1, we impose the following assumptions: Assumption 4.2. The exponential growth ω(T − ) satisfies ω(T − ) < 0. Assumption 4.3. (A+ , B + ) is controllable. Remark 4.4. Define the operator ABF : D(ABF ) ⊂ X → X by (4.4) ABF x = (A + BF )x with domain D(ABF ) := {x ∈ X : (A + BF )x ∈ X}. It is shown in [14] that if A generates an analytic semigroup and if there exists a compact operator F ∈ B(X, U ) such that the semigroup generated by ABF is exponentially stable, then Assumptions 4.1–4.3 hold. EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 15 4.1.2. Event-triggered control. For every x ∈ X, define x+ := Πx and x− := (I − Π)x. We set a feedback operator F ∈ B(X, U ) to be F − = 0. Then the control input is given by (4.5) u(t) = F x(tk ) = F + x+ (tk ) ∀t ∈ [tk , tk+1 ), ∀k ∈ N0 . In this section, we set the time sequence {tk }∞ k=0 so that the finite-dimensional system (4.6a) x+ (0) = (x0 )+ ∈ X + (4.6b) ẋ+ (t) = A+ x+ (t) + B + F + x+ (tk ) ∀t ∈ (tk , tk+1 ), ∀k ∈ N0 . is exponentially stable with decay rate β ≥ −ω(T − ). For example, as in Theorem 3.1, we can set a time sequence {tk }∞ k=0 recursively satisfying (4.7) n o  ∀k ∈ N0 . tk+1 := min tk + τM , inf t > tk : kF + x+ (t) − u(tk )kU > εkx+ (tk )k Similarly to Theorem 3.4, we can use the following event trigger: (4.8) n o  tk+1 := min tk + τM , inf t > tk : kF + x+ (t) − u(tk )kU > εkx+ (t)k ∀k ∈ N0 . Since X + is finite dimensional, we obtain less conservative conditions on the event-trigger parameter ε for the feedback system (4.6) to be stable. In particular, we obtain the following result on the event trigger (4.8): Proposition 4.5. Consider the finite-dimensional system (4.6) and the event trigger (4.8) with t0 = 0. Assume that the input space U is finite dimensional and set β > 0. If there exist positive matrices P , Q and a positive scalar κ such that the following linear matrix inequalities are feasible:   Q − ε2 κI −P B + (4.9a) 0 −(B + )∗ P κI (4.9b) (A+ + B + F + )∗ P + P (A+ + B + F + )  −β 2 P − Q, then the finite-dimensional system (4.6) is exponential stable with decay rate β for all τM > 0. Similarly to Theorem III.3 in [5], we can prove Proposition 4.5, of which proof can be found in the Appendix B. Theorem 4.6. Let Assumptions 4.1–4.3 hold, and assume F − = 0. If the feedback gain F + and the time sequence {tk }∞ k=0 are chosen so that the finite-dimensional system (4.6) is exponentially stable with decay rate γ0 ≥ −ω(T − ) and there exist τM ≥ τm > 0 such that τm ≤ tk+1 − tk ≤ τM for all k ∈ N0 , then the infinitedimensional system (2.2) is exponentially stable with decay rate γ ≥ ω(T − ) − ε for every ε > 0. Rτ Rτ Proof. Setting Sτ+ = 0 T + (s)B + ds and Sτ− = 0 T − (s)B − ds, we have from (2.3) that for every τ ∈ (0, tk+1 − tk ] and every k ∈ N0 ,  +   +  +   +    x+ (tk ) x (tk + τ ) T (τ ) 0 x (tk ) Sτ  + F 0 = + (4.10) . x− (tk + τ ) 0 T − (τ ) x− (tk ) Sτ− x− (tk ) 16 MASASHI WAKAIKI AND HIDEKI SANO The above x+ is a unique solution of (4.6), and hence there exists M0 ≥ 1 such that kx+ (t)k ≤ M0 e−γ0 t kx+ (0)k (4.11) ∀t ≥ 0. On the other hand, it follows from (4.10) that for every τ ∈ (0, tk+1 − tk ] and every k ∈ N0 , x− (tk + τ ) = T − (τ )x− (tk ) + Sτ− F + x+ (tk ) = T − (tk + τ )x− (0) + Sτ F + x+ (tk ) + k X T − (tk + τ − t` )St−` −t`−1 F + x+ (t`−1 ). `=1 Since B − ∈ B(U, (X−1 )− ) and since T − (t) is a strongly continuous semigroup on (X − )−1 = (X−1 )− , it follows from Lemma 2.3 that Sτ− ∈ B(U, X − ) for every τ > 0 and that there exists L ≥ 0 such that (4.12) Sτ− F + sup τm ≤τ ≤τM B(X + ,X − ) ≤ L. Therefore, for all τ ∈ (0, tk+1 − tk ] and all k ∈ N0 , kx− (tk + τ )k ≤ kT − (tk + τ )kB(X − ) · kx− (0)k + Lkx+ (tk )k (4.13) + k X kT − (tk + τ − t` )kB(X − ) · Lkx+ (t`−1 )k `=1 Note that k is the number of the events that occur during [0, tk + τ ) for all τ ∈ (0, tk+1 − tk ] and hence satisfies k≤ (4.14) tk + τ τm ∀τ ∈ (0, tk+1 − tk ]. Moreover, for every γ1 ∈ (0, −ω(T − )), there exists M1 ≥ 1 such that kT − (t)kB(X − ) ≤ M1 e−γ1 t (4.15) ∀t ≥ 0. From (4.11)–(4.15), for all τ ∈ (0, tk+1 − tk ] and all k ∈ N0 , kx− (tk + τ )k ≤ M1 e−γ1 (tk +τ ) kx− (0)k + LM0 e−γ1 tk kx+ (0)k + k X M1 e−γ1 (tk +τ −t` ) · LM0 e−γ1 t`−1 kx+ (0)k `=1 −γ1 (tk +τ ) kx− (0)k + (k + 1)LM0 M1 e−γ1 (tk +τ −τM ) kx+ (0)k   tk + τ + 1 LM0 M1 e−γ1 (tk +τ −τM ) kx+ (0)k ≤ M1 e−γ1 (tk +τ ) kx− (0)k + τm ≤ M1 e Note that, for every γ2 ∈ (0, γ1 ), there exists M2 ≥ 1 such that   t ∀t ≥ 0. + 1 e−γ1 t ≤ M2 e−γ2 t τm Then for every τ ∈ (0, tk+1 − tk ] and k ∈ N0 , (4.16) kx− (tk + τ )k ≤ M1 e−γ1 (tk +τ ) kx− (0)k + M3 e−γ2 (tk +τ ) kx+ (0)k, EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 17 where M3 := LM0 M1 M2 eγ1 τM . Since kx+ (0)k ≤ kΠkB(X) · kx0 k,  kx− (0)k ≤ 1 + kΠkB(X) · kx0 k, it follows from (4.11) and (4.16) that kx+ (t)k ≤ M + e−γ0 t kx0 k, kx− (t)k ≤ M − e−γ2 t kx0 k ∀t ≥ 0, where M + := M0 kΠkB(X) , M − := M1 + (M1 + M3 )kΠkB(X) . Thus we obtain kx(t)k = kx+ + x− k ≤ kx+ k + kx− k ≤ (M + + M − )e−γ2 t kx0 k ∀t ≥ 0. Since γ1 ∈ (0, −ω(T − )) and γ2 ∈ (0, γ1 ) were arbitrary, the infinite-dimensional system (2.2) is exponentially stable with decay rate γ ≥ ω(T − ) − ε for every ε > 0. 4.2. Stability under periodic event triggers. In Theorem 4.6, the feedback operator F ∈ B(X, U ) has a specific structure F − = F |X − = 0. In contrast, we here assume that A generates an analytic semigroup, and use a periodic event trigger proposed in [8, 9]. Then we see that for every compact feedback operator F ∈ B(U, X), there exists a periodic event trigger such that the closed-loop system (2.2) is exponential stability. Fixing h > 0, ε > 0, and `M ∈ N, we set the time sequence {tk }∞ k=0 to be t0 = 0 and  (4.17a) ψk := min t > tk : kF x(t) − u(tk )kU > εkx(tk )k ∧ t = `h with ` ∈ N (4.17b) tk+1 := min{tk + `M h, ψk } ∀k ∈ N0 . We call this event trigger a periodic event trigger. The above time sequence {tk }∞ k=0 satisfies tk ∈ {`h : ` ∈ N0 } and τ ≤ tk+1 − tk ≤ `M h for every k ∈ N0 . Theorem 4.7. Assume that A generates an analytic semigroup T (t) on X, B ∈ B(U, X−1 ), and F ∈ B(X, U ) is compact. If the semigroup generated by ABF in (4.4) is exponentially stable, then there exist h∗ > 0 and ε∗ > 0 such that for every h ∈ (0, h∗ ) and every ε ∈ (0, ε∗ ), the infinite-dimensional system (2.2) with periodic event trigger (4.17a) is exponentially stable. Proof. By Theorem 4.8 in [14], there exists h∗ > 0 such that for every h ∈ (0, h∗ ), the operator ∆h ∈ B(X) defined by ∆h := T (h) + Sh F is power stable, i.e., there exist M ≥ 1 and δ < 1 such that k∆kh kB(X) ≤ M δ k ∀k ∈ N0 . Fix h ∈ (0, h∗ ) and let tk = `k h for every k ∈ N0 . Then under the periodic event trigger (4.17a), we have from (2.3) that for all p = 0, . . . , `k+1 − `k and all k ∈ N0 , x((`k + p + 1)h) = T (h)x((`k + p)h) + Sh u((`k + p)h) From Lemma 2.3, it follows that Sh ∈ B(U, X), and hence the proof of Theorem 4.7 is the discrete-time counterpart of Theorem 3.1. 18 MASASHI WAKAIKI AND HIDEKI SANO Define the implementation-induced error e by (4.18) e((`k + p)h)) := u(`k h) − F x((`k + p)h) ∀p = 0, . . . , `k+1 − `k − 1, ∀k ∈ N0 . For every p = 0, . . . , `k+1 − `k − 1 and every k ∈ N0 , x((`k + p + 1)h) = T (h)x((`k + p)h) + Sh F x((`k + p)h) + Sh e((`k + p)h) = ∆h x((`k + p)h) + Sh e((`k + p)h). Hence, for all k ∈ N0 , `k+1 −`k −1 (4.19) ` x(`k+1 h) = ∆hk+1 −`k x(`k h) + X ` ∆hk+1 −`k −p−1 Sh e((`k + p)h). p=0 We introduce a new norm | · |d on X defined by |x|d := sup kδ −` ∆`h xk, `≥0 and as (3.5) and (3.6), this norm has the following properties: (4.20) |∆kh x|d ≤ δ k |x|d kxk ≤ |x|d ≤ M kxk, ∀x ∈ X. Under the periodic event trigger (4.17a), the implementation-induced error e in (4.18) satisfies (4.21) ke((`k + p)h)k ≤ εkx(`k h)k ∀p = 0, . . . , `k+1 − `k − 1, ∀k ∈ N0 . Combining (4.19)–(4.21), we obtain `k+1 −`k −1 |x(`k+1 h)|d ≤ δ `k+1 −`k |x(`k h)|d + M kSh kB(U,X) X δ `k+1 −`k −p−1 |x(`k h)|d p=0 = δ `k+1 −`k  (1 − ε0 ) + ε0 · |x(`k h)|d where ε0 := ε ∀k ∈ N0 , M kSh kB(U,X) . 1−δ Choose the event-trigger parameter ε > 0 so that δ(1 − ε0 ) + ε0 < 1, namely, ε< 1−δ . M kSh kB(U,X) If we define γ ∈ R by γ := min `=1,...,`M − log(δ ` (1 − ε0 ) + ε0 ) , `h then γ > 0, and applying (4.20), we obtain kx(`k+1 h)k ≤ |x(`k+1 h)|d ≤ e−γ(`k+1 −`k )h |x(`k h)|d (4.22) ≤ e−γ`k+1 h |x(0)|d ≤ M e−γ`k+1 h kx0 k ∀k ∈ N0 . EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 19 From Lemma 2.3, there exists L ≥ 1 such that kT (τ )kB(X) + kSτ F kB(X) ≤ L ∀τ ∈ [0, `M h]. Therefore, we see from (2.3) and (4.22) that kx(`k h + τ )k ≤ kT (τ )kB(X) · kx(`k h)k + kSτ F kB(X) · kx(`k h)k ≤ Lkx(`k h)k  ≤ eγ`M h LM · e−γ(`k h+τ ) kx0 k ∀τ ∈ (0, (`k+1 − `k )h], ∀k ∈ N0 . Thus, the infinite-dimensional system (2.2) with periodic event trigger (4.17a) is exponentially stable with decay rate γ > 0. Remark 4.8. As easily seen from the proof of Theorem 4.7, the same conclusion holds for the following event trigger based on the difference of the state:  ψk := min t > tk : kx(t) − x(tk )k > εkx(tk )k ∧ t = `h with ` ∈ N tk+1 := min{tk + `M h, ψk } ∀k ∈ N0 . Remark 4.9. In Theorem 4.7, we assume that A generates an analytic semigroup and that F is compact. These assumptions are used for the existence of sampling periods with respect to which the periodic sampled-data system is exponentially stable, and we can replace it with different assumptions such as those of Corollary 2.3 in [20]. 4.3. Example. We illustrate the event-triggered control method in Theorem 4.6 through an Euler-Bernoulli beam with structural damping [15]. Let ξ ∈ [0, 1] and t ≥ 0 denote the space and time variables. We assume that the Euler-Bernoulli beam is hinged at the one end of the beam ξ = 0 and has a freely sliding clamped end at the other end ξ = 1. Suppose that the shear force u(t) is applied at ξ = 1. The dynamics of the Euler-Bernoulli beam is given by (4.24a) (4.24b) ∂2z ∂3z ∂4z (ξ, t) − 2γ (ξ, t) + (ξ, t) = 0 ∂t2 ∂ξ 2 ∂t ∂ξ 4 ∂2z ∂z z(0, t) = 0, (0, t) = 0, (1, t) = 0, ∂ξ 2 ∂ξ ∀t ≥ 0 − ∂3z (1, t) = u(t), ∂ξ 3 where z(ξ, t) is the lateral deflection of the beam at time t > 0 and location ξ along the beam and γ ∈ (0, 1) is the damping constant. 4.3.1. Abstract evolution equation of Euler-Bernoulli beams. We here recall the results developed in Sec. 5 of [15]: an abstract evolution equation of the form (2.2a) for the Euler-Bernoulli beam (4.24) and the expansions of the generator A and the input operator B with respect to a certain basis. We introduce the operator A0 : D(A0 ) ⊂ L2 (0, 1) → L2 (0, 1), A0 h = d4 h dξ 4 with domain D(A0 ) = {h ∈ W 4,2 (0, 1) : h(0) = 0, h00 (0) = 0, h0 (1) = 0, h000 (1) = 0}. 20 MASASHI WAKAIKI AND HIDEKI SANO 1 We consider the state space X = D(A02 ) × L2 (0, 1), which is a Hilbert space with the inner product     1 1 x1 y1 , = hA02 x1 , A02 y1 iL2 + hx2 , y2 iL2 . x2 y2 Define the operator " 0 A= −A0 # I 1 with domain D(A) = D(A0 ) × D(A02 ) 1 2 −2γA0 and introduce the state vector " # z(·, t) x(t) := ∂z . (·, t) ∂t Then we can rewrite (4.24) in the form ẋ = Ax for the case u = 0. Using the technique of [10], we can set the input operator B ∈ B(R, X−1 ) to be   0 Bu = u , where δ1 denotes the Dirac distribution with support at ξ = 1. δ1 Let us next obtain the expansions of A with respect to a Riesz basis of X. The eigenvalues of A are given by 2   π  p ∀n ∈ N, (4.25) λ±n = −γ ± i 1 − γ 2 · − + nπ 2 and the associate eigenvectors are √ f±n =   2 en /λ±n  2 p en 1 − −γ ∓ i 1 − γ 2 where en ∈ L2 (0, 1) is defined by  π  √ en (ξ) := 2 sin − + nπ ξ 2 ∀n ∈ N, ∀ξ ∈ [0, 1], ∀n ∈ N and is the eigenvector of A0 that associated with the eigenvalue (−π/2 + nπ)4 . Define Z∗ := Z \ {0}. Then we see that the eigenvectors {fn }n∈Z∗ is a Riesz basis of X. Furthermore,   1 −en /λ∓n g±n = √ ∀n ∈ N, en 2 are the eigenvectors of A∗ with associated eigenvalues λ±n such that {fn }n∈Z∗ and {gn }n∈Z∗ are biorthogonal. Thus A is a Riesz spectral operator in Definition 2.3.4 on p. 41 in [3], and it follows from Theorem 2.3.5 on p. 41 in [3] that X (4.26) Ax = λn hx, gn ifn ∀x ∈ D(A). n∈Z∗ and ( D(A) = x∈X: ) X n∈Z∗ 2 2 |λn | · |hx, gn i| < ∞ . EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 21 Moreover, A is the infinitesimal generator of an analytic semigroup T (t) given by X T (t)x = eλn t hx, gn ifn ∀x ∈ X. n∈Z∗ Noting that {fn }n∈Z∗ is also a Schauder basis of X−1 , we can expand B in X−1 in the following way: X (4.27) Bu = u (−1)|n|+1 fn ∀u ∈ R. n∈Z∗ 4.3.2. Numerical simulation. Since σ(A) = {λn : n ∈ Z∗ }, we see that Assumption 4.1 holds for every α < 0. We here set α ∈ (−9γπ 2 /4, −γπ 2 /4) in the system decomposition of Sec. 5.1 and check where or not Assumptions 4.2 and 4.3. In this case, σ(A) ∩ Cα = {λ−1 , λ1 } and ω(T − ) = −9γπ 2 /4 < 0. The subspace X + is spanned by {f−1 , f1 }, and using this basis and the expansions (4.26), (4.27), we can rewrite A+ and B + as     λ 0 1 A+ = −1 , B+ = . 0 λ1 1 Clearly, (A+ , B + ) is controllable. Thus Assumptions 4.2 and 4.3 are satisfied. Let γ = 1/15 and set the feedback gain F to be F + x = F |X + x = − 13 2 γπ (hx, f−1 i + hx, f1 i) , 4 F − = F |X − = 0. Similarly to A+ and B + , we can rewrite F + with respect to the basis {f−1 , f1 } in the following way:   13 F + = − γπ 2 1 1 . 4 We see from Proposition 4.5 that if the event-trigger parameter ε > 0 satisfies ε ≤ 0.54, then this finite-dimensional system (4.6) with the event trigger (4.8) is exponential stable with decay rate β ≥ −ω(T − ) = 9γπ 2 /4. Fig. 1 illustrates the time responses of the Euler-Bernoulli beam with initial states z(ξ, 0) = 1 − cos(πξ), ∂z (ξ, 0) = 0 ∂t ξ ∈ [0, 1]. We apply the event trigger (4.8) with parameters ε = 0.54 and τM = 1 and approximate the state space X by the linear span of {fn : n ∈ Z∗ , |n| ≤ 15} for the computation of the time responses. Fig. 1a shows that the time responses of kz(·, t)kL2 are close between the event-triggered control and the continuous-time control, and we observe from Fig. 1b that the event trigger (4.8) can reduce the number of the control updates. Appendix A. Derivation of (3.8). Assume that u ∈ L1 (0, t; U ), the Hilbert space of integrable vector-valued functions on (0, t) with the usual norm, and consider the equation: ẋ(t) = Ax(t) + Bu(t) with bounded input operator B ∈ B(U, X). Since TBF (t) satisfies Z (A.1) t TBF (t − s)BF T (s)xds TBF (t)x = T (t)x + 0 ∀x ∈ X, 22 MASASHI WAKAIKI AND HIDEKI SANO kz(·, t)kL2 77 66 Event triggered control 55 Continuous-time control No control 44 33 22 11 0 00 0 0.5 1 1.5 1 2 2 2.5 3 3 Time t (a) Position norm kz(·, t)kL2 . 54 Event triggered control u(t) 43 Continuous-time control 32 21 10 0-1 0 0 0.5 1 1.5 1 2 2 2.5 3 3 Time t (b) Input u(t). Fig. 1: Time response. as shown, e.g., in Theorem 3.2.1 on p. 110 in [3], we obtain Z 0 t TBF (t − s)BF x(s)ds  Z t Z = TBF (t − s)BF T (s)x0 + 0 s  T (s − α)Bu(α)dα ds 0 Z tZ s TBF (t − s)BF T (s)x0 ds + TBF (t − s)BF T (s − α)Bu(α)dαds 0 0 0 Z tZ s  = TBF (t)x0 − T (t)x0 + TBF (t − s)BF T (s − α)Bu(α)dαds. Z t = 0 0 EVENT-TRIGGERED CONTROL OF INFINITE-DIMENSIONAL SYSTEMS 23 On the other hand, from (A.1) and Fubini’s theorem, we also have Z 0 t TBF (t − s)Bu(s)ds Z t Z = T (t − s)Bu(s) + 0 Z t−s  TBF (t − s − α)BF T (α)Bu(s)dα ds 0 t Z tZ t TBF (t − β)BF T (β − s)Bu(s)dβds T (t − s)Bu(s)ds + = Z s 0 0 t β Z tZ TBF (t − β)BF T (β − s)Bu(s)dsdβ. T (t − s)Bu(s)ds + = 0 0 0 Therefore, TBF (t)x0 + t Z TBF (t − s)B(u(s) − F x(s))ds 0 0 = T (t)x0 + Z tZ β T (t − s)Bu(s)ds + = T (t)x + Z tZ − 0 t Z 0 s TBF (t − β)BF T (β − s)Bu(s)dsdβ 0 0 TBF (t − s)BF T (s − α)Bu(α)dαds 0 Z t T (t − s)Bu(s)ds. 0 Thus, we obtain (3.8). Appendix B. Proof of Proposition 4.5. For simplicity of notation, we omit the superscript +. Define the implementation-induced error e(t) by e(t) := F x(tk ) − F x(t) ∀t ∈ [tk , tk+1 ), ∀k ∈ N0 . Then we obtain ∀t ∈ (tk , tk+1 ), ∀k ∈ N0 . ẋ(t) = (A + BF )x(t) + Be(t) If we define the Lyapunov function V (t) := x(t)∗ P x(t), then using the Lyapunov inequality (4.9b), we obtain dV (t) ≤ −β 2 V (t) − x∗ (t)Qx(t) + x∗ (t)P Be(t) + e∗ (t)B ∗ P x(t) dt  ∗    x(t) −Q P B x(t) = −β 2 V (t) + ∀t ∈ (tk , tk+1 ), ∀k ∈ N0 . e(t) B∗P 0 e(t) Moreover, we see from (4.9a) that if x(t) and e(t) satisfies (B.1) then  ∗  2 x(t) −ε I e(t) 0  ∗  x(t) −Q e(t) B∗P 0 I   x(t) ≥ 0, e(t) PB 0   x(t) ≥ 0. e(t) 24 MASASHI WAKAIKI AND HIDEKI SANO Since the condition (B.1) holds for all t ≥ 0 under the event-triggered condition (4.8) with arbitrary τM > 0, it follows that dV (t) ≤ −β 2 V (t) dt ∀t ∈ (tk , tk+1 ), ∀k ∈ N0 . Since P is a positive definite matrix, we see that the finite-dimensional feedback system (4.6) is exponential stable with decay rate β. This completes the proof. REFERENCES [1] D. P. Borgers and W. P. M. H. Heemels, Event-separation properties of event-triggered control systems, IEEE Trans. Automat. Control, 59 (2014), pp. 2644–2656. [2] R. F. Curtain and J. C. Oostveen, Necessary and sucient conditions for strong stability of distributed parameter systems, Systems Control Lett., 37 (1999), pp. 11–18. [3] R. F. Curtain and H. J. Zwart, An Introduction to Infinite-Dimensional Linear Systems Theory, New York: Springer, 1995. [4] V. S. Dolk, D. P. Borgers, and W. P. M. H. Heemels, Output-based and decentralized dynamic event-triggered control with guaranteed Lp -gain performance and Zeno-freeness, IEEE Trans. Automat. Control, 62 (2017), pp. 34–49. [5] M. C. F. Donkers and W. P. M. H. Heemels, Output-based event-triggered control with guaranteed L∞ -gain and improved and decentralized event-triggering, IEEE Trans. Automat. Control, 57 (2012), pp. 1362–1376. [6] N. Espitia, A. Girard, N. Marchand, and C. Prieur, Event-based control of linear hyperbolic systems of conservation laws, Automatica, 70 (2016), pp. 275–287. [7] R. Goebel, R. Sanfelice, and A. Teel, Hybrid dynamical systems, IEEE Control Syst. Mag., 29 (2009), pp. 28–93. [8] W. P. M. H. Heemels and M. C. F. Donkers, Model-based periodic event-triggered control for linear systems, Automatica, 49 (2013), pp. 698–711. [9] W. P. M. H. Heemels, M. C. F. Donkers, and A. R. Teel, Periodic event-triggered control for linear systems, IEEE Trans. Automat. Control, 58 (2013), pp. 847–861. [10] L. F. Ho and D. L. Russell, Admissible input elements for systems in Hilbert space and a Carleson measure criterion, SIAM J. Control Optim., 21 (1983), pp. 614–640. [11] Z. Jiang, B. Cui, W. Wu, and B. Zhuang, Event-driven observer-based control for distributed parameter systems using mobile sensor and actuator, Comput. Math. Appl., 72 (2016), pp. 2854–2864. [12] D. Lehmann and J. Lunze, Event-based control with communication delays and packet losses, Int. J. Control, 85 (2012), pp. 563–577. [13] H. Logemann, Stabilization of well-posed infinite-dimensional systems by dynamic sampleddata feedback, SIAM J. Control Optim., 51 (2013), pp. 1203–1231. [14] H. Logemann, R. Rebarber, and S. Townley, Stability of infinite-dimensional sampled-data systems, Trans. Amer. Math. Soc., 355 (2003), pp. 3301–3328. [15] H. Logemann, R. Rebarber, and S. Townley, Generalized sampled-data stabilization of wellposed linear infinite-dimensional systems, SIAM J. Control Optim., 44 (2005), pp. 1345– 1369. [16] A. Pazy, On the applicability of Lyapunov’s theorem in Hiilbert space, SIAM J. Math. Anal., 3 (1972), pp. 291–294. [17] A. Pazy, Semigroups of Linear Operators and Applications to Partial Differential Equations, New York: Springer, 1983. [18] R. Rebarber and S. Townley, Generalized sampled data feedback control of distributed parameter systems, Systems & Control Letters, 34 (1998), pp. 229–240. [19] R. Rebarber and S. Townley, Nonrobustness of closed-loop stability for infinite-dimensional systems under sample and hold, IEEE Trans. Automat. Control, 47 (2002), pp. 1381–1385. [20] R. Rebarber and S. Townley, Robustness with respect to sampling for stabilization of Riesz spectral systems, IEEE Trans. Automat. Control, 51 (2006), pp. 1519–1522. [21] A. Selivanov and E. Fridman, Distributed event-triggered control of diffusion semilinear PDEs, Automatica, 68 (2016), pp. 344–351. [22] P. Tabuada, Event-triggered real-time scheduling of stabilizing control tasks, IEEE Trans. Automat. Control, 52 (2007), pp. 1680–1685.
3cs.SY
arXiv:1711.07068v1 [cs.CV] 19 Nov 2017 Diverse and Accurate Image Description Using a Variational Auto-Encoder with an Additive Gaussian Encoding Space Liwei Wang Alexander G. Schwing Svetlana Lazebnik {lwang97, aschwing, slazebni}@illinois.edu University of Illinois at Urbana-Champaign Abstract This paper explores image caption generation using conditional variational autoencoders (CVAEs). Standard CVAEs with a fixed Gaussian prior yield descriptions with too little variability. Instead, we propose two models that explicitly structure the latent space around K components corresponding to different types of image content, and combine components to create priors for images that contain multiple types of content simultaneously (e.g., several kinds of objects). Our first model uses a Gaussian Mixture model (GMM) prior, while the second one defines a novel Additive Gaussian (AG) prior that linearly combines component means. We show that both models produce captions that are more diverse and more accurate than a strong LSTM baseline or a “vanilla” CVAE with a fixed Gaussian prior, with AG-CVAE showing particular promise. 1 Introduction Automatic image captioning [9, 11, 18–20, 24] is a challenging open-ended conditional generation task. State-of-the-art captioning techniques [23, 32, 36, 1] are based on recurrent neural nets with long-short term memory (LSTM) units [13], which take as input a feature representation of a provided image, and are trained to maximize the likelihood of reference human descriptions. Such methods are good at producing relatively short, generic captions that roughly fit the image content, but they are unsuited for sampling multiple diverse candidate captions given the image. The ability to generate such candidates is valuable because captioning is profoundly ambiguous: not only can the same image be described in many different ways, but also, images can be hard to interpret even for humans, let alone machines relying on imperfect visual features. In short, we would like the posterior distribution of captions given the image, as estimated by our model, to accurately capture both the open-ended nature of language and any uncertainty about what is depicted in the image. Achieving more diverse image description is a major theme in several recent works [6, 14, 27, 31, 35]. Deep generative models are a natural fit for this goal, and to date, Generative Adversarial Models (GANs) have attracted the most attention. Dai et al. [6] proposed jointly learning a generator to produce descriptions and an evaluator to assess how well a description fits the image. Shetty et al. [27] changed the training objective of the generator from reproducing ground-truth captions to generating captions that are indistinguishable from those produced by humans. In this paper, we also explore a generative model for image description, but unlike the GAN-style training of [6, 27], we adopt the conditional variational auto-encoder (CVAE) formalism [17, 29]. Our starting point is the work of Jain et al. [14], who trained a “vanilla” CVAE to generate questions given images. At training time, given an image and a sentence, the CVAE encoder samples a latent z vector from a Gaussian distribution in the encoding space whose parameters (mean and variance) come from a Gaussian prior with zero mean and unit variance. This z vector is then fed into a decoder that uses it, together with the features of the input image, to generate a question. The encoder and the decoder are jointly trained to maximize (an upper bound on) the likelihood of the reference questions 31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA. Predicted Object Labels: ‘person’ ‘cup’ ‘donut’ ‘dining table’ Predicted Object Labels: ‘cup’ ‘fork’ ‘knife’ ‘sandwich’ ‘dining table’ ‘mouse’ AG-CVAE: a woman sitting at a table with a cup of coffee a person sitting at a table with a cup of coffee a table with two plates of donuts and a cup of coffee a woman sitting at a table with a plate of coffee a man sitting at a table with a plate of food AG-CVAE: a close up of a plate of food on a table a table with a plate of food on it a plate of food with a sandwich on it a white plate topped with a plate of food a plate of food on a table next to a cup of coffee LSTM Baseline: a close up of a table with two plates of coffee a close up of a table with a plate of food a close up of a plate of food on a table a close up of a table with two plates of food a close up of a table with plates of food LSTM Baseline: a close up of a plate of food on a table a close up of a plate of food with a sandwich a close up of a plate of food a close up of a plate of food on a white plate a close up of a plate of food with a sandwich on it Figure 1: Example output of our proposed AG-CVAE approach compared to an LSTM baseline (see Section 4 for details). For each method, we show top five sentences following consensus re-ranking [10]. The captions produced by our method are both more diverse and more accurate. Object Labels: ‘person’ AG-CVAE sentences: a man and a woman standing in a room a man and a woman are playing a game a man standing next to a woman in a room a man standing next to a woman in a field a man standing next to a woman in a suit Object Labels: ‘person’,‘bus’ AG-CVAE sentences: a man and a woman sitting on a bus a man and a woman sitting on a train a man and woman sitting on a bus a man and a woman sitting on a bench a man and a woman are sitting on a bus Object Labels: ‘person’, ‘remote’ AG-CVAE sentences: a man and a woman playing a video game a man and a woman are playing a video game a man and woman are playing a video game a man and a woman playing a game with a remote a woman holding a nintendo wii game controller Object Labels: ‘person’, ‘train’ AG-CVAE sentences: a man and a woman sitting on a train a woman and a woman sitting on a train a woman sitting on a train next to a train a woman sitting on a bench in a train a man and a woman sitting on a bench Figure 2: Illustration of how our additive latent space structure controls the image description process. Modifying the object labels changes the weight vectors associated with semantic components in the latent space. In turn, this shifts the mean from which the z vectors are drawn and modifies the resulting descriptions in an intuitive way. given the images. At test time, the decoder is seeded with an image feature and different z samples, so that multiple z’s result in multiple questions. While Jain et al. [14] obtained promising question generation performance with the above CVAE model equipped with a fixed Gaussian prior, for the task of image captioning, we observed a tendency for the learned conditional posteriors to collapse to a single mode, yielding little diversity in candidate captions sampled given an image. To improve the behavior of the CVAE, we propose using a set of K Gaussian priors in the latent z space with different means and standard deviations, corresponding to different “modes” or types of image content. For concreteness, we identify these modes with specific object categories, such as ‘dog’ or ‘cat.’ If ‘dog’ and ‘cat’ are detected in an image, we would like to encourage the generated captions to capture both of them. Starting with the idea of multiple Gaussian priors, we propose two different ways of structuring the latent z space. The first is to represent the distribution of z vectors using a Gaussian Mixture model (GMM). Due to the intractability of Gaussian mixtures in the VAE framework, we also introduce a novel Additive Gaussian (AG) prior that directly adds multiple semantic aspects in the z space. If an image contains several objects or aspects, each corresponding to means µk in the latent space, then we require the mean of the encoder distribution to be close to a weighted linear combination of the respective means. Our CVAE formulation with this additive Gaussian prior (AG-CVAE) is able to model a richer, more flexible encoding space, resulting in more diverse and accurate captions, as illustrated in Figure 1. As an additional advantage, the additive prior gives us an interpretable mechanism for controlling the captions based on the image content, as shown in Figure 2. Experiments of Section 4 will show that both GMM-CVAE and AG-CVAE outperform LSTMs and “vanilla” CVAE baselines on the challenging MSCOCO dataset [5], with AG-CVAE showing marginally higher accuracy and by far the best diversity and controllability. 2 Background Our proposed framework for image captioning extends the standard variational auto-encoder [17] and its conditional variant [29]. We briefly set up the necessary background here. Variational auto-encoder (VAE): Given samples x from a dataset, VAEs aim at modeling the data likelihood p(x). To this end, VAEs assume that the data points x cluster around a low-dimensional manifold parameterized by embeddings or encodings z. To obtain the sample x corresponding to an embedding z, we employ the decoder p(x|z) which is often based on deep nets. Since the decoder’s posterior p(z|x) is not tractably computable we approximate it with a distribution q(z|x) which is 2 referred to as the encoder. Taking together all those ingredients, VAEs are based on the identity log p(x) − DKL [q(z|x), p(z|x)] = Eq(z|x) [log p(x|z)] − DKL [q(z|x), p(z)], (1) which relates the likelihood p(x) and the conditional p(z|x). It is hard to compute the KL-divergence DKL [q(z|x), p(z|x)] because the posterior p(z|x) is not readily available from the decoder distribution p(x|z) if we use deep nets. However, by choosing an encoder distribution q(z|x) with sufficient capacity, we can assume that the non-negative KL-divergence DKL [q(z|x), p(z|x)] is small. Thus, we know that the right-hand-side is a lower bound on the log-likelihood log p(x), which can be maximized w.r.t. both encoder and decoder parameters. Conditional variational auto-encoders (CVAE): In tasks like image captioning, we are interested in modeling the conditional distribution p(x|c), where x are the desired descriptions and c is some representation of content of the input image. The VAE identity can be straightforwardly extended by conditioning both the encoder and decoder distributions on c. Training of the encoder and decoder proceeds by maximizing the lower bound on the conditional data-log-likelihood p(x|c), i.e., log pθ (x|c) ≥ Eqφ (z|x,c) [log pθ (x|z, c)] − DKL [qφ (z|x, c), p(z|c)] , (2) where θ and φ, the parameters for the decoder distribution pθ (x|z, c) and the encoder distribution qφ (z|x, c) respectively. In practice, the following stochastic objective is typically used: max θ,φ N 1 X log pθ (xi |z i , ci ) − DKL [qφ (z|x, c), p(z|c)], N i=1 s.t. ∀i z i ∼ qφ (z|x, c). It approximates the expectation Eqφ (z|x,c) [log pθ (x|z, c)] using N samples z i drawn from the approximate posterior qφ (z|x, c) (typically, just a single sample is used). Backpropagation through the encoder that produces samples z i is achieved via the reparameterization trick [17], which is applicable if we restrict the encoder distribution qφ (z|x, c) to be, e.g., a Gaussian with mean and standard deviation output by a deep net. 3 Gaussian Mixture Prior and Additive Gaussian Prior Our key observation is that the behavior of the trained CVAE crucially depends on the choice of the prior p(z|c). The prior determines how the learned latent space is structured, because the KLdivergence term in Eq. (2) encourages qφ (z|x, c), the encoder distribution over z given a particular description x and image content c, to be close to this prior distribution. In the vanilla CVAE formulation, such as the one adopted in [14], the prior is not dependent on c and is fixed to a zero-mean unit-variance Gaussian. While this choice is the most computationally convenient, our experiments in Sec. 4 will demonstrate that for the task of image captioning, the resulting model has poor diversity and worse accuracy than the standard maximum-likelihood-trained LSTM. Clearly, the prior has to change based on the content of the image. However, because of the need to efficiently compute the KL-divergence in closed form, it still needs to have a simple structure, ideally a Gaussian or a mixture of Gaussians. Motivated by the above considerations, we encourage the latent z space to have a multi-modal structure composed of K modes or clusters, each corresponding to different types of image content. Given an image I, we assume that we can obtain a distribution c(I) = (c1 (I), . . . , cK (I)), where the entries ck are nonnegative and sum to one. In our current work, for concreteness, we identify these with a set of object categories that can be reliably detected automatically, such as ‘car,’ ‘person,’ or ‘cat.’ The MSCOCO dataset, on which we conduct our experiments, has direct supervision for 80 such categories. Note, however, our formulation is general and can be applied to other definitions of modes or clusters, including latent topics automatically obtained in an unsupervised fashion. GMM-CVAE: We can model p(z|c) as a Gaussian mixture with weights ck and components with means µk and standard deviations σk : p(z|c) = K X  ck N z |µk , σk2 I , (3) k=1 where ck is defined as the weights above and µk represents the mean vector of the k-th component. In practice, for all components, we use the same standard deviation σ. 3 Decoder Decoder C3 C1 Cz switch C1 C2 C3 C2 Z Z Cluster Vector … Cluster Vector C1 C2 C3 … Encoder Encoder (a) GMM-CVAE (b) AG-CVAE Figure 3: Overview of GMM-CVAE and AG-CVAE models. To sample z vectors given an image, GMM-CVAE (a) switches from one cluster center to another, while AG-CVAE (b) encourages the embedding z for an image to be close to the average of its objects’ means. It is not directly tractable to optimize Eq. (2) with the above GMM prior. We therefore approximate the KL divergence stochastically [12]. In each step during training, we first draw a discrete component k according to the cluster probability c(I), and then sample z from the resulting Gaussian component. Then we have     1 1 σk + 2 Eqφ (z|x,ck ) kz − µk k22 − DKL [qφ (z|x, ck ), p(z|ck )] = log σφ 2σ 2 (4)   2 2 σφ + kµφ − µk k2 σk 1 = log + − , ∀k ck ∼ c(I). σφ 2σk2 2 We plug the above KL term into Eq. (2) to obtain an objective function, which we optimize w.r.t. the encoder and decoder parameters φ and θ using stochastic gradient descent (SGD). In principle, the prior parameters µk and σk can also be trained, but we obtained good results by keeping them fixed (the means are drawn randomly and all standard deviations are set to the same constant, as will be further explained in Section 4). At test time, in order to generate a description given an image I, we first sample a component index k from c(I), and then sample z from the corresponding component distribution. One limitation of this procedure is that, if an image contains multiple objects, each individual description is still conditioned on just a single object. AG-CVAE: We would like to structure the z space in a way that can directly reflect object cooccurrence. To this end, we propose a simple novel conditioning mechanism with an additive Gaussian prior. If an image contains several objects with weights ck , each corresponding to means µk in the latent space, we want the mean of the encoder distribution to be close to the linear combination of the respective means with the same weights: ! K X 2 p(z|c) = N z ck µk , σ I , (5) k=1 PK where σ 2 I is a spherical covariance matrix with σ 2 = k=1 c2k σk2 . Figure 3 illustrates the difference between this AG-CVAE model and the GMM-CVAE model introduced above. In order to train the AG-CVAE model using the objective of Eq. (2), we need to compute the KL-divergence DKL [qφ (z|x, c), p(z|c)] where qφ (z|x, c) = N (z | µφ (x, c), σφ2 (x, c)I) and the prior p(z|c) is given by Eq. (5). Its analytic expression can be derived to be   2 K X 1 1 DKL [qφ (z|x, c), p(z|c)] = log + 2 Eqφ  z − ck µk  − 2σ 2 k=1 P   K σφ2 + kµφ − k=1 ck µk k2 1 σ + − . = log 2 σφ 2σ 2  σ σφ  We plug the above KL-divergence term into Eq. (2) to obtain the stochastic objective function for training the encoder and decoder parameters. We initialize the mean and variance parameters µk and σk in the same way as for GMM-CVAE and keep them fixed throughout training. 4 2 µ 1 , log 2 µ 2 , log( ) Wc1 ) Wc2 2 2 Reconstruction Loss …… µ , log( 1 µ K , log( 2 K ) WcK hT LSTM LSTM LSTM LSTM WI Wc We We …… Image Feature Cluster Vector w1 w2 …… LSTM p0 p1 h0 h1 P(Real/Fake) …… hT LSTM LSTM LSTM LSTM LSTM We WI Wc Wz We We …… We wT Image Feature Cluster Vector z ws w1 …… wT LSTM Figure 4: Illustration of our encoder (left) and decoder (right). See text for details. Next, we need to specify our architectures for the encoder and decoder, which are shown in Fig. 4. The encoder uses an LSTM to map an image I, its vector c(I), and a caption into a point in the latent space. More specifically, the LSTM receives the image feature in the first step, the cluster vector in the second step, and then the caption word by word. The hidden state hT after the last step 2 is transformed into K mean vectors, µφk , and K log variances, log σφk , using a linear layer for each. 2 For AG-CVAE, the µφk and σφk are then summed with weights ck and c2k respectively to generate the desired µφ and σφ2 encoder outputs. Note that the encoder is used at training time only, and the input cluster vectors are produced from ground truth object annotations. The decoder uses a different LSTM that receives as input first the image feature, then the cluster vector, then a z vector sampled from the conditional distribution of Eq. (5). Next, it receives a ‘start’ symbol and proceeds to output a sentence word by word until it produces an ‘end’ symbol. During training, its c(I) inputs are derived from the ground truth, same as for the encoder, and the log-loss is used to encourage reconstruction of the provided ground-truth caption. At test time, ground truth object vectors are not available, so we rely on automatic object detection, as explained in Section 4. 4 Experiments 4.1 Implementation Details We test our methods on the MSCOCO dataset [5], which is the largest “clean” image captioning dataset available to date. The current (2014) release contains 82,783 training and 40,504 validation images with five reference captions each, but many captioning works re-partition this data to enlarge the training set. We follow the train/val/test split released by [23]. It allocates 118, 287 images for training, 4, 000 for validation, and 1, 000 for testing. Features. As image features, we use 4,096-dimensional activations from the VGG-16 network [28]. The cluster or object vectors c(I) are 80-dimensional, corresponding to the 80 MSCOCO object categories. At training time, c(I) consist of binary indicators corresponding to ground truth object labels, rescaled to sum to one. For example, an image with labels ‘person,’ ‘car,’ and ‘dog’ results in a cluster vector with weights of 1/3 for the corresponding objects and zeros elsewhere. For test images I, c(I) are obtained automatically through object detection. We train a Faster R-CNN detector [26] for the MSCOCO categories using our train/val split by fine-tuning the VGG-16 net [28]. At test time, we use a threshold of 0.5 on the per-class confidence scores output by this detector to determine whether the image contains a given object (i.e., all the weights are once again equal). Baselines. Our LSTM baseline is obtained by deleting the z vector input from the decoder architecture shown in Fig. 4. This gives a strong baseline comparable to NeuralTalk2 [1] or Google Show and Tell [33]. To generate different candidate sentences using the LSTM, we use beam search with a width of 10. Our second baseline is given by the “vanilla” CVAE with a fixed Gaussian prior following [14]. For completeness, we report the performance of our method as well as all baselines both with and without the cluster vector input c(I). Parameter settings and training. For all the LSTMs, we use a one-hot encoding with vocabulary size of 11,488, which is the number of words in the training set. This input gets projected into a word embedding layer of dimension 256, and the LSTM hidden space dimension is 512. We found that the same LSTM settings worked well for all models. For our three models (CVAE, GMM-CVAE, and AG-CVAE), we use a dimension of 150 for the z space. We wanted it to be at least equal to the number of categories to make sure that each z vector corresponds to a unique set of cluster weights. The means µk of clusters for GMM-CVAE and AG-CVAE are randomly initialized on the unit ball 5 obj #z std beam B4 B3 B2 B1 C R M S 10 0.413 0.515 0.643 0.790 1.157 0.597 0.285 0.218 LSTM X 10 0.428 0.529 0.654 0.797 1.202 0.607 0.290 0.223 20 0.1 0.261 0.381 0.538 0.742 0.860 0.531 0.246 0.184 CVAE X 20 2 0.312 0.421 0.565 0.733 0.910 0.541 0.244 0.176 20 0.1 0.371 0.481 0.619 0.778 1.080 0.582 0.274 0.209 GMM- X 20 2 0.423 0.533 0.666 0.813 1.216 0.617 0.298 0.233 CVAE X 20 2 2 0.449 0.553 0.680 0.821 1.251 0.624 0.299 0.232 X 100 2 0.494 0.597 0.719 0.856 1.378 0.659 0.325 0.261 X 100 2 2 0.527 0.625 0.740 0.865 1.430 0.670 0.329 0.263 20 0.1 0.431 0.537 0.668 0.814 1.230 0.622 0.300 0.235 X 20 2 0.451 0.557 0.686 0.829 1.259 0.630 0.305 0.243 AGX 20 2 2 0.471 0.573 0.698 0.834 1.308 0.638 0.309 0.244 0.532 0.631 0.749 0.876 1.478 0.682 0.342 0.278 CVAE X 100 2 X 100 2 2 0.557 0.654 0.767 0.883 1.517 0.690 0.345 0.277 Table 1: Oracle (upper bound) performance according to each metric. Obj indicates whether the object (cluster) vector is used; #z is the number of z samples; std is the test-time standard deviation; beam is the beam width if beam search is used. For the caption quality metrics, C is short for Cider, R for ROUGE, M for METEOR, S for SPICE. obj #z std beam B4 B3 B2 B1 C R M 10 0.286 0.388 0.529 0.702 0.915 0.510 0.235 LSTM X 10 0.292 0.395 0.536 0.711 0.947 0.516 0.238 20 0.1 0.245 0.347 0.495 0.674 0.775 0.491 0.217 CVAE X 20 2 0.265 0.372 0.521 0.698 0.834 0.506 0.225 20 0.1 0.271 0.376 0.522 0.702 0.890 0.507 0.231 GMM- X 20 2 0.278 0.388 0.538 0.718 0.932 0.516 0.238 CVAE X 20 2 2 0.289 0.394 0.538 0.715 0.941 0.513 0.235 X 100 2 0.292 0.402 0.552 0.728 0.972 0.520 0.241 X 100 2 2 0.307 0.413 0.557 0.729 0.986 0.525 0.242 20 0.1 0.287 0.394 0.540 0.715 0.942 0.518 0.238 AGX 20 2 0.286 0.391 0.537 0.716 0.953 0.517 0.239 CVAE X 20 2 2 0.299 0.402 0.544 0.716 0.963 0.518 0.237 X 100 2 0.301 0.410 0.557 0.732 0.991 0.527 0.243 X 100 2 2 0.311 0.417 0.559 0.732 1.001 0.528 0.245 Table 2: Consensus re-ranking using CIDEr. See caption of Table 1 for legend. S 0.165 0.170 0.147 0.158 0.166 0.170 0.169 0.174 0.177 0.168 0.172 0.173 0.177 0.179 and are not changed throughout training. The standard deviations σk are set to 0.1 at training time and tuned on the validation set at test time (the values used for our results are reported in the tables). All networks are trained with SGD with a learning rate that is 0.01 for the first 5 epochs, and is reduced by half every 5 epochs. On average all models converge within 50 epochs. 4.2 Results A big part of the motivation for generating diverse candidate captions is the prospect of being able to re-rank them using some discriminative method. Because the performance of any re-ranking method is upper-bounded by the quality of the best candidate caption in the set, we will first evaluate different methods assuming an oracle that can choose the best sentence among all the candidates. Next, for a more realistic evaluation, we will use a consensus re-ranking approach [10] to automatically select a single top candidate per image. Finally, we will assess the diversity of the generated captions using uniqueness and novelty metrics. Oracle evaluation. Table 1 reports caption evaluation metrics in the oracle setting, i.e., taking the maximum of each relevant metric over all the candidates. We compare caption quality using five metrics: BLEU [25], METEOR [7], CIDEr [30], SPICE [2], and ROUGE [21]. These are calculated using the MSCOCO caption evaluation tool [5] augmented by the author of SPICE [2]. For the LSTM baseline, we report the scores attained among 10 candidates generated using beam search (as suggested in [23]). For CVAE, GMM-CVAE and AG-CVAE, we sample a fixed number of z vectors from the corresponding prior distributions (the numbers of samples are given in the table). The high-level trend is that “vanilla” CVAE falls short even of the LSTM baseline, while the upperbound performance for GMM-CVAE and AG-CVAE considerably exceeds that of the LSTM given 6 beam % unique % novel size per image sentences LSTM X 10 0.656 CVAE X 20 2 0.118 0.820 X 20 2 0.594 0.809 GMM- X 20 2 2 0.539 0.716 CVAE X 100 2 0.376 0.767 X 100 2 2 0.326 0.688 X 20 2 0.764 0.795 AGX 20 2 2 0.698 0.707 CVAE X 100 2 0.550 0.745 X 100 2 2 0.474 0.667 Table 3: Diversity evaluation. For each method, we report the percentage of unique candidates generated per image by sampling different numbers of z vectors. We also report the percentage of novel sentences (i.e., sentences not seen in the training set) out of (at most) top 10 sentences following consensus re-ranking. It should be noted that for CVAE, there are 2,466 novel sentences out of 3,006. For GMM-CVAE and AG-CVAE, we get roughly 6,200-7,800 novel sentences. obj #z std Predicted Object Labels: 'bottle' 'refrigerator' Predicted Object Labels: 'person' 'horse' 'bear' AG-CVAE: an open refrigerator filled with lots of food a refrigerator filled with lots of food and drinks a refrigerator filled with lots of food a large open refrigerator filled with lots of food a refrigerator filled with lots of food and other items AG-CVAE: a man standing next to a brown horse a man is standing next to a horse a person standing next to a brown and white horse a man standing next to a horse and a man a man holding a brown and white horse LSTM Baseline: a refrigerator filled with lots of food a refrigerator filled with lots of food on top a refrigerator filled with lots of food inside a refrigerator filled with lots of food inside of it a refrigerator filled with lots of food and other items LSTM Baseline: a close up of a person with a horse a close up of a horse with a horse a black and white photo of a man wearing a hat a black and white photo of a person wearing a hat a black and white photo of a man in a hat (a) (b) Predicted Object Labels: 'person' 'backpack' 'umbrella' Predicted Object Labels: 'person' ‘bed’ AG-CVAE: a person holding an umbrella in front of a building a woman holding a red umbrella in front of a building a person holding an umbrella in the rain a man and woman holding an umbrella in the rain a man holding a red umbrella in front of a building AG-CVAE: a baby laying on a bed with a blanket a woman laying on a bed with a baby a man laying on a bed with a baby a baby laying in a bed with a blanket a baby is laying in bed with a cat LSTM Baseline: a man holding an umbrella on a city street a man holding an umbrella in the rain a man is holding an umbrella in the rain a person holding an umbrella in the rain a man holding an umbrella in the rain with an umbrella LSTM Baseline: a baby is laying on a bed with a blanket a baby is laying on a bed with a stuffed animal a little girl laying in a bed with a blanket a little girl laying on a bed with a blanket a man laying in a bed with a blanket (c) (d) Figure 5: Comparison of captions produced by our AG-CVAE method and the LSTM baseline. For each method, top five captions following consensus re-ranking are shown. the right choice of standard deviation and a large enough number of z samples. AG-CVAE obtains the highest upper bound. A big advantage of the CVAE variants over the LSTM is that they can be easily used to generate more candidate sentences simply by increasing the number of z samples, while the only way to do so for the LSTM is to increase the beam width, which is computationally prohibitive. In more detail, the top two lines of Table 1 compare performance of the LSTM with and without the additional object (cluster) vector input, and show that it does not make a dramatic difference. That is, improving over the LSTM baseline is not just a matter of adding stronger conditioning information as input. Similarly, for CVAE, GMM-CVAE, and AG-CVAE, using the object vector as additional conditioning information in the encoder and decoder can increase accuracy somewhat, but does not account for all the improvements that we see. One thing we noticed about the models without the object vector is that they are more sensitive to the standard deviation parameter and require more careful tuning (to demonstrate this, the table includes results for several values of σ for the CVAE models). Consensus re-ranking evaluation. For a more realistic evaluation we next compare the same models after consensus re-ranking [10, 23]. Specifically, for a given test image, we first find its nearest neighbors in the training set in the cross-modal embedding space learned by a two-branch network proposed in [34]. Then we take all the ground-truth reference captions of those neighbors and calculate the consensus re-ranking scores between them and the candidate captions. For this, we use the CIDEr metric, based on the observation of [22, 30] that it can give more human-consistent evaluations than BLEU. 7 Object Labels: ‘cat’ ‘suitcase’ GMM-CVAE: a black and white cat is sitting in a suitcase a cat that is sitting in a suitcase a cat that is sitting on a suitcase a cat sitting on top of a suitcase a black and white cat sitting on a suitcase a cat sitting in a suitcase on a table AG-CVAE: a small white and black cat sitting on top of a suitcase a cat sitting on a piece of luggage a small gray and white cat sitting in a suitcase a white cat sitting on top of a suitcase a black and white cat sitting in a suitcase a black and white cat sitting on top of a suitcase a cat that is sitting on a table a black and white cat sitting next to a suitcase a cat sitting in front of a suitcase a cat sitting on a wooden bench in the sun a close up of a cat sitting on a suitcase a cat sitting on top of a blue suitcase a large brown and white cat sitting on top of a suitcase a cat sitting on top of a suitcase a white cat with a suitcase Object Labels: ‘cup’ ‘dining table’ ‘teddy bear’ GMM-CVAE: a teddy bear sitting next to a teddy bear a teddy bear sitting on a table next to a table a teddy bear sitting on top of a table a teddy bear sitting on a table next to a cup of coffee a stuffed teddy bear sitting next to a table a stuffed teddy bear sitting on a table a teddy bear sitting next to a table filled with stuffed animals a teddy bear is sitting on a table ateddy bear sitting on a table next to a teddy bear AG-CVAE: a white teddy bear sitting next to a table a couple of stuffed animals sitting on a table a teddy bear sitting next to a bunch of flowers a couple of teddy bears sitting on a table a large teddy bear sitting on a table a bunch of stuffed animals sitting on a table a group of teddy bears sitting on a table a large teddy bear sitting on a table next to a table a teddy bear sitting next to a pile of books a group of teddy bears sitting next to each other a white teddy bear sitting on a wooden table two teddy bears sitting next to each other a couple of teddy bears sitting next to each other a white teddy bear sitting next to a table a teddy bear sitting next to a wooden table a large stuffed animal sitting on top of a table Object Labels: ‘cat’ ‘suitcase’ ‘chair’ GMM-CVAE: a cat that is sitting in a suitcase a cat sitting on top of a suitcase a cat sitting in a suitcase on the floor a black and white cat is sitting in a suitcase a close up of a cat on a suitcase AG-CVAE: a white and black cat sitting in a suitcase a cat that is sitting on a chair a white and black cat sitting on top of a suitcase a black and white cat sitting on a chair a cat sitting on a chair in a room a large brown and white cat sitting on top of a desk a cat sitting on a wooden bench in the sun a close up of a cat sitting on a suitcase a black and white cat sitting next to a piece of luggage a small white and black cat sitting in a chair a black and white cat sitting on top of a suitcase a cat sitting on top of a blue chair a cat sitting on top of a suitcase Object Labels: ‘cup’ ‘dining table’ ‘teddy bear’ ‘sandwich’ ‘cake’ GMM-CVAE: a teddy bear sitting next to a teddy bear a teddy bear sitting on a table next to a cup of coffee a teddy bear sitting on a table with a teddy bear a teddy bear with a teddy bear sitting on top of it a teddy bear sitting on top of a table a teddy bear sitting next to a cup of coffee a table with a teddy bear and a teddy bear a teddy bear sitting on a table next to a glass of coffee two teddy bears sitting on a table next to each other AG-CVAE: a table topped with a cake a couple of cake sitting on top of a table a table with a cake and a bunch of stuffed animals a cake with a bunch of coffee on it a white teddy bear sitting next to a glass of coffee a table with a cake and a bear on it a table with a bunch of teddy bears a table with two plates of food on it a table topped with a variety of food a table with two teddy bears a table with a cake and a plate of food a couple of sandwiches sitting on top of a table a table topped with a cake and two plates of food a table with a bunch of cakes on it a table with a cake and a cup of coffee a white plate of food next to a table a white table topped with lots of food Figure 6: Comparison of captions produced by GMM-CVAE and AG-CVAE for two different versions of input object vectors for the same images. For both models, we draw 20 z samples and show the resulting unique captions. Table 2 shows the evaluation based on the single top-ranked sentence for each test image. While the re-ranked performance cannot get near the upper bounds of Table 1, the numbers follow a similar trend, with GMM-CVAE and AG-CVAE achieving better performance than the baselines in almost all metrics. It should also be noted that, while it is not our goal to outperform the state of the art in absolute terms, our performance is actually better than some of the best methods to date [23, 37], although [37] was trained on a different split. AG-CVAE tends to get slightly higher numbers than GMM-CVAE, although the advantage is smaller than for the upper-bound results in Table 1. One of the most important take-aways for us is that there is still a big gap between upper-bound and re-ranking performance and that improving re-ranking of candidate sentences is an important future direction. Diversity evaluation. To compare the generative capabilities of our different methods we report two indicative numbers in Table 3. One is the average percentage of unique captions in the set of candidates generated for each image. This number is only meaningful for the CVAE models, where we sample candidates by drawing different z samples, and multiple z’s can result in the same caption. For LSTM, the candidates are obtained using beam search and are by definition distinct. From Table 3, we observe that CVAE has very little diversity, GMM-CVAE is much better, but AG-CVAE has the decisive advantage. Similarly to [27], we also report the percentage of all generated sentences for the test set that have not been seen in the training set. It only really makes sense to assess novelty for sentences that are plausible, so we compute this percentage based on (at most) top 10 sentences per image after consensus re-ranking. Based on the novelty ratio, CVAE does well. However, since it generates fewer distinct candidates per image, the absolute numbers of novel sentences are much lower than for GMM-CVAE and AG-CVAE (see table caption for details). 8 Qualitative results. Figure 5 compares captions generated by AG-CVAE and the LSTM baseline on four example images. The AG-CVAE captions tend to exhibit a more diverse sentence structure with a wider variety of nouns and verbs used to describe the same image. Often this yields captions that are more accurate (‘open refrigerator’ vs. ‘refrigerator’ in (a)) and better reflective of the cardinality and types of entities in the image (in (b), our captions mention both the person and the horse while the LSTM tends to mention only one). Even when AG-CVAE does not manage to generate any correct candidates, as in (d), it still gets the right number of people in some candidates. A shortcoming of AG-CVAE is that detected objects frequently end up omitted from the candidate sentences if the LSTM language model cannot accommodate them (‘bear’ in (b) and ‘backpack’ in (c)). On the one hand, this shows that the capacity of the LSTM decoder to generate combinatorially complex sentences is still limited, but on the other hand, it provides robustness against false positive detections. Controllable sentence generation. Figure 6 illustrates how the output of our GMM-CVAE and AG-CVAE models changes when we change the input object vectors in an attempt to control the generation process. Consistent with Table 3, we observe that for the same number of z samples, AG-CVAE produces more unique candidates than GMM-CVAE. Further, AG-CVAE is more flexible than GMM-CVAE and more responsive to the content of the object vectors. For the first image showing a cat, when we add the additional object label ‘chair,’ AG-CVAE is able to generate some captions mentioning a chair, but GMM-CVAE is not. Similarly, in the second example, when we add the concepts of ‘sandwich’ and ‘cake,’ only AG-CVAE can generate some sentences that capture them. Still, the controllability of AG-CVAE leaves something to be desired, since, as observed above, it has trouble mentioning more than two or three objects in the same sentence, especially in unusual combinations. 5 Discussion Our experiments have shown that both our proposed GMM-CVAE and AG-CVAE approaches generate image captions that are more diverse and more accurate than standard LSTM baselines. While GMM-CVAE and AG-CVAE have very similar bottom-line accuracies according to Table 2, AG-CVAE has a clear edge in terms of diversity (unique captions per image) and controllability, both quantitatively (Table 3) and qualitatively (Figure 6). Related work. To date, CVAEs have been used for image question generation [14], but as far as we know, our work is the first to apply them to captioning. In [8], a mixture of Gaussian prior is used in CVAEs for colorization. Their approach is essentially similar to our GMM-CVAE, though it is based on mixture density networks [4] and uses a different approximation scheme during training. Our CVAE formulation has some advantages over the CGAN approach adopted by other recent works aimed at the same general goals [6, 27]. GANs do not expose control over the structure of the latent space, while our additive prior results in an interpretable way to control the sampling process. GANs are also notoriously tricky to train, in particular for discrete sampling problems like sentence generation (Dai et al. [6] have to resort to reinforcement learning and Shetty et al. [27] to an approximate Gumbel sampler [15]). Our CVAE training is much more straightforward. While we represent the z space as a simple vector space with multiple modes, it is possible to impose on it a more general graphical model structure [16], though this incurs a much greater level of complexity. Finally, from the viewpoint of inference, our work is also related to general approaches to diverse structured prediction, which focus on extracting multiple modes from a single energy function [3]. This is a hard problem necessitating sophisticated approximations, and we prefer to circumvent it by cheaply generating a large number of diverse and plausible candidates, so that “good enough” ones can be identified using simple re-ranking mechanisms. Future work. We would like to investigate more general formulations for the conditioning information c(I), not necessarily relying on object labels whose supervisory information must be provided separately from the sentences. These can be obtained, for example, by automatically clustering nouns or noun phrases extracted from reference sentences, or even clustering vector representations of entire sentences. We are also interested in other tasks, such as question generation, where the cluster vectors can represent the question type (‘what is,’ ‘where is,’ ‘how many,’ etc.) as well as the image content. Control of the output by modifying the c vector would in this case be particularly natural. Acknowledgments: This material is based upon work supported in part by the National Science Foundation under Grants No. 1563727 and 1718221, and by the Sloan Foundation. We would like to thank Jian Peng and Yang Liu for helpful discussions. 9 References [1] Neuraltalk2. https://github.com/karpathy/neuraltalk2. [2] P. Anderson, B. Fernando, M. Johnson, and S. Gould. Spice: Semantic propositional image caption evaluation. In ECCV, 2016. [3] D. Batra, P. Yadollahpour, A. Guzman-Rivera, and G. Shakhnarovich. Diverse M-Best Solutions in Markov Random Fields. In ECCV, 2012. [4] C. M. Bishop. Mixture density networks. 1994. [5] X. Chen, H. Fang, T.-Y. Lin, R. Vedantam, S. Gupta, P. Dollár, and C. L. Zitnick. Microsoft coco captions: Data collection and evaluation server. arXiv preprint arXiv:1504.00325, 2015. [6] B. Dai, D. Lin, R. Urtasun, and S. Fidler. Towards diverse and natural image descriptions via a conditional gan. ICCV, 2017. [7] M. Denkowski and A. Lavie. Meteor universal: Language specific translation evaluation for any target language. In Proceedings of the EACL 2014 Workshop on Statistical Machine Translation, 2014. [8] A. Deshpande, J. Lu, M.-C. Yeh, and D. Forsyth. Learning diverse image colorization. CVPR, 2017. [9] J. Devlin, H. Cheng, H. Fang, S. Gupta, L. Deng, X. He, G. Zweig, and M. Mitchell. Language models for image captioning: The quirks and what works. arXiv preprint arXiv:1505.01809, 2015. [10] J. Devlin, S. Gupta, R. Girshick, M. Mitchell, and C. L. Zitnick. Exploring nearest neighbor approaches for image captioning. arXiv preprint arXiv:1505.04467, 2015. [11] A. Farhadi, M. Hejrati, M. Sadeghi, P. Young, C. Rashtchian, J. Hockenmaier, and D. Forsyth. Every picture tells a story: Generating sentences from images. In ECCV, 2010. [12] J. R. Hershey and P. A. Olsen. Approximating the kullback leibler divergence between gaussian mixture models. In ICASSP, 2007. [13] S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780, 1997. [14] U. Jain, Z. Zhang, and A. Schwing. Creativity: Generating diverse questions using variational autoencoders. CVPR, 2017. [15] E. Jang, S. Gu, and B. Poole. Categorical reparameterization with gumbel-softmax. ICLR, 2017. [16] M. J. Johnson, D. Duvenaud, A. Wiltschko, S. Datta, and R. Adams. Structured vaes: Composing probabilistic graphical models and variational autoencoders. NIPS, 2016. [17] D. P. Kingma and M. Welling. Auto-encoding variational bayes. ICLR, 2014. [18] R. Kiros, R. Salakhutdinov, and R. Zemel. Multimodal neural language models. In ICML, 2014. [19] G. Kulkarni, V. Premraj, V. Ordonez, S. Dhar, S. Li, Y. Choi, A. C. Berg, and T. L. Berg. Babytalk: Understanding and generating simple image descriptions. IEEE Transactions on Pattern Analysis and Machine Intelligence, 35(12):2891–2903, 2013. [20] P. Kuznetsova, V. Ordonez, A. C. Berg, T. L. Berg, and Y. Choi. Generalizing image captions for image-text parallel corpus. In ACL, 2013. [21] C.-Y. Lin. Rouge: A package for automatic evaluation of summaries. In Text summarization branches out: Proceedings of the ACL-04 workshop, volume 8. Barcelona, Spain, 2004. [22] S. Liu, Z. Zhu, N. Ye, S. Guadarrama, and K. Murphy. Improved image captioning via policy gradient optimization of spider. ICCV, 2017. [23] J. Mao, W. Xu, Y. Yang, J. Wang, Z. Huang, and A. Yuille. Deep captioning with multimodal recurrent neural networks (m-rnn). ICLR, 2015. [24] M. Mitchell, X. Han, J. Dodge, A. Mensch, A. Goyal, A. Berg, K. Yamaguchi, T. Berg, K. Stratos, and H. Daumé III. Midge: Generating image descriptions from computer vision detections. In Proceedings of the 13th Conference of the European Chapter of the Association for Computational Linguistics, pages 747–756. Association for Computational Linguistics, 2012. [25] K. Papineni, S. Roukos, T. Ward, and W.-J. Zhu. Bleu: a method for automatic evaluation of machine translation. In ACL. Association for Computational Linguistics, 2002. [26] S. Ren, K. He, R. Girshick, and J. Sun. Faster R-CNN: Towards real-time object detection with region proposal networks. In NIPS, 2015. [27] R. Shetty, M. Rohrbach, L. A. Hendricks, M. Fritz, and B. Schiele. Speaking the same language: Matching machine to human captions by adversarial training. ICCV, 2017. [28] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. [29] K. Sohn, H. Lee, and X. Yan. Learning structured output representation using deep conditional generative models. In NIPS, 2015. [30] R. Vedantam, C. Lawrence Zitnick, and D. Parikh. Cider: Consensus-based image description evaluation. In CVPR, 2015. [31] A. K. Vijayakumar, M. Cogswell, R. R. Selvaraju, Q. Sun, S. Lee, D. Crandall, and D. Batra. Diverse beam search: Decoding diverse solutions from neural sequence models. arXiv preprint arXiv:1610.02424, 2016. [32] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan. Show and tell: A neural image caption generator. In CVPR, 2015. [33] O. Vinyals, A. Toshev, S. Bengio, and D. Erhan. Show and tell: Lessons learned from the 2015 mscoco image captioning challenge. IEEE transactions on pattern analysis and machine intelligence, 2016. [34] L. Wang, Y. Li, and S. Lazebnik. Learning deep structure-preserving image-text embeddings. In CVPR, 2016. [35] Z. Wang, F. Wu, W. Lu, J. Xiao, X. Li, Z. Zhang, and Y. Zhuang. Diverse image captioning via grouptalk. In IJCAI, 2016. 10 [36] K. Xu, J. Ba, R. Kiros, K. Cho, A. Courville, R. Salakhudinov, R. Zemel, and Y. Bengio. Show, attend and tell: Neural image caption generation with visual attention. In ICML, 2015. [37] Q. You, H. Jin, Z. Wang, C. Fang, and J. Luo. Image captioning with semantic attention. In CVPR, 2016. 11
1cs.CV
Happy Travelers Take Big Pictures: A Psychological Study with Machine Learning and Big Data Xuefeng Liang, Lixin Fan† , Yuen Peng Loh‡ , Yang Liu, Song Tong ‡ IST, Graduate School of Informatics, Kyoto University, 606-8501 Kyoto, Japan † Nokia Technologies, Tampere 33100, Finland Centre of Image and Signal Processing, University of Malaya, Kuala Lumpur 50603, Malaysia arXiv:1709.07584v1 [cs.CV] 22 Sep 2017 [email protected], [email protected] [email protected], liu.yang.24m, [email protected] (a) (b) (c) (d) (e) (f) Figure 1: Wide view angle (a-c) vs. narrow view angle (d-f). The view angle of a travel photo is influenced by the photographer’s subconscious emotional state, which is a living example of the psychological broaden-and-build theory. Abstract In psychology, theory-driven researches are usually conducted with extensive laboratory experiments, yet rarely tested or disproved with big data. In this paper, we make use of 418K travel photos with traveler ratings to test the influential “broaden-and-build” theory, that suggests positive emotions broaden one’s visual attention. The core hypothesis examined in this study is that positive emotion is associated with a wider attention, hence highly-rated sites would trigger wide-angle photographs. By analyzing travel photos, we find a strong correlation between a preference for wide-angle photos and the high rating of tourist sites on TripAdvisor. We are able to carry out this analysis through the use of deep learning algorithms to classify the photos into wide and narrow angles, and present this study as an exemplar of how big data and deep learning can be used to test laboratory findings in the wild. Introduction Recent advances in AI technologies (especially Deep Learning) in conjunction with big data offer psychologists an unprecedented opportunity to test theories outside the laboratory. Cognitive scientists and psychologists have been increasingly embracing big data and machine learning to significantly further theory-driven understanding of human behavior and cognition. For example, the sequential dependence functions in higher-order cognition were investigated on millions online reviews posted on Yelp (Vinson, Dale, and Jones 2016), a machine learning model trained on a standard corpus of online text resulted in human-like semantic biases (Caliskan, Bryson, and Narayanan 2017), emerging studies demonstrated that big data or naturally occurring data sets (BONDS) can be used as a complement to traditional laboratory paradigms and refine theories (Griffiths 2015; Goldstone and Lupyan 2016; Jones 2016; Paxton and Griffiths 2017). Following in the footsteps of earlier calls to action, we present here an example of leveraging state-of-the-art machine learning techniques and BONDS as a complement to test psychological theories. Concretely we investigate a real world scenario in which the travelers’ photo taking behavior is influenced by a hypothesized psychological mechanism, namely the broaden-and-build theory of positive emotions (Fredrickson 2004; Fredrickson and Branigan 2005). According to Fredrickson’s influential theory, positive emotions broaden (globalize) the attentional scope of the observer and result in processing of a global picture, while negative emotions correlate with a narrowed (localized) attentional focus and induce the processing of local elements. This psychological hypothesis was supported by extensive laboratory experiments (Rowe, Hirsh, and Anderson 2007; Tamir and Robinson 2007; Pourtois, Schettino, and Vuilleumier 2013; Vanlessen et al. 2013). They widely employed a flanker task that required participants to respond to a globallocal visual processing task, in which the visual stimuli were either compatible geometric figures / letters or incompatible ones (see supplementary 1 for details). However, to the best of our knowledge, this theory has not been tested with realworld big data. Moreover, it is imprudent to embrace any of these theories blindly since traditional psychological experiments are often conducted in a restricted laboratory environment with limited number of subjects that may result in a considerable bias. In order to scrutinize the broaden-and-build theory in the travel photo taking scenario, we first develop a deep learning algorithm with a performance in sync with a human, subsequently, cross-check photographers’ behaviors by analyzing big data, and address the confounding factors with a set of carefully designed experiments. The results demonstrate that travel photographers’ inclination to specific camera viewpoint, e.g. wide-angle (figures 1a-1c) vs. narrow-angle (figures 1d-1f) is largely influenced by photographers’ emotion at the time of photo taking. Such kinds of influence, which might be subconscious to photographers themselves, nevertheless, is statistically consistent and significant. Roughly speaking, photographers seem to prefer wider-angle photos to narrow-angle ones at high rating tourist sites, while for lower rating sites, the preference appears to be moderate or even going in the reverse direction (see Fig. 7 and Experiments for details). This finding is in accord with the notion of “positive emotions broaden attention and trigger wide-angle photographs”. Moreover, our study demonstrates a substantial boost of the numbers and diversity of experimental subjects by taking advantages of machine learning techniques and the vast amount of behavior data already available on the internet, which is challenging for traditional laboratory paradigms. It is our hope that the set up of experiments as well as the proposed deep learning algorithm can be a new method added into the psychologists toolbox. In addition, the methods adopted in this work have potential significance to realworld applications, such as discovering obscure but highvalue tourist sites (Zhuang et al. 2014), preventing mental illness of special populations through mining their social media data (Stewart and Davis 2016) and so on. Materials and Methods Here we discuss the data and methods employed to investigate our hypothesis. Specifically, we detail our criteria and procedures in tourist sites selection and photo collection, followed by our proposed machine learning algorithms. Tourist Sites Selection To test the “broaden-and-build” theory using BONDS, we studied the travel photos from selected tourist sites that are hosted on TripAdvisor (https://www.tripadvisor.com). The selection is based on five criteria: (1) Popularity: Recommended by top search engines - TripAdvisor, National Geographic and Travel + Leisure; (2) Objectivity: Having at least 1.5K votes for each site regardless of language, age, gender, nationality, etc; (3) Generality: Located across in Asia, Europe, and Americas; (4) Diversity: Keeping site types as diverse as possible, but avoid religious places; (5) Independence: Having an appropriate distance from other sites to avoid cross-rating. Based on their available locations, 70 sites were selected and travel photos associated with these sites were used as our study targets (see supplementary 2 for more details). Figure 3 illustrates the positions of these 70 sites on the distribution of 12K suitable candidates (the green curve), while Fig. 2 shows geo-locations of 30 samples of these sites. Photo Datasets Table 1: Datasets for the estimation of machine learning methods and psychological experiments. Name 1 Dtrain 1 Dtest D2 D3 # of photos 43,906 8,722 418K 10,000 # of wide-angle 25,776 4,141 – – # of narrow-angle 18,130 4,581 – – Source Flickr TripAdvisor TripAdvisor YFCC100m We used three newly collected datasets in this study, as shown in Table 1. D1 is for the estimation of our proposed 1 machine learning methods, where the training data in Dtrain were collected from Flickr according to the geo-locations of 1 aforementioned sites. Whereas, the testing data, Dtest were made up of evenly distributed amount of photos from 10 tourist sites, that were randomly collected from TripAdvisor. The reason of choosing data from different sources is twofold: (1) to avoid the overlap between the training and testing datasets; (2) photos hosted on TripAdvisor were uploaded by travelers who rated the tourist sites, thus the siteratings and photo contents would be closely related. Due to the second consideration, we created the dataset D2 , which consists of 418K travel photos taken at the 70 tourist sites 1 and collected from TripAdvisor without overlapping Dtest , to test the hypothesized correlation between tourists’ positive emotion and the choice of wide-angle photos. The third set, called D3 , consists of 10K random photos collected from YFCC100m dataset (Thomee et al. 2016) without using geo-tag or any other keywords. These photos were used to test the preferences of photo-taking behaviors in a completely random (or neutral emotion) mode. Nevertheless, raw data collected in a completely uncontrolled manner as such are error-prone. The following rectification procedures have been applied to these photos. Firstly, we scrutinized all photos where the erroneously tagged, meaningless, and duplicated photos, i.e. noises, were filtered from the dataset. Secondly, selfies were eliminated from our datasets due to their intrinsic ambiguities, i.e. the attention of such photos are on both the narrow-angle of one or more persons as well as the wide-angle of the background1 . After rectifying the data, the D1 dataset was then labeled for the estimation of our machine learning algorithms. 1 To build up the training dataset Dtrain and testing dataset 1 Dtest , about 55K photos were manually labeled as either wide-angle or narrow-angle. We recruited five subjects (5 male, mean age = 28) and designed a binary classification task for them. Before the task, 10 wide-angle and 10 narrowangle photos were demonstrated to let all subjects have a correct understanding. In the task, 20 photos (4 rows and 5 columns) were simultaneously shown on the screen to give a better visual comparison, and each subject classified photos into two categories. This procedure was iteratively carried out until all photos were checked. After collecting the batch results, we removed those ambiguous photos that had less 1 The trend of selfies is a relatively recent cultural phenomenon and fast becoming an integral trend in everyday people and also travelers. Though different from the intuition of the current study, it is in our interest to look into it in the future. (a) (b) Figure 2: (a) The 20 samples of tourist sites across the world, and (b) A zoom-in view of 10 samples in California (USA). Figure 3: The 70 selected sites are superimposed on the number distribution of 12K suitable sites w.r.t. site-ratings (the green curve), where the sites with similar ratings are aligned vertically. than 4 consistent votes. By this way, D1 consists of 52,628 photos in total with an almost perfect agreement (Fleiss’ kappa k = 0.873) among five subjects, and was used as the ground truth for the estimation of our proposed methods. Methods In order to effectively test our hypothesis on such large dataset D2 , we developed two task-optimized machine learning models for wide-angle and narrow-angle classification. This section gives a detailed account of our designs, evaluations, and analysis of said models. (a) (b) (c) (d) Figure 4: Example photos of HVS cues to determine view angle. (a) Narrow-angle of focus lens model, (b) Narrowangle of spatially large but conceptually small object, (c) Wide-angle of spatially large and conceptually large object, (d) Wide-angle of spatially small and conceptually small object. HVS Model The first model mimics the basics of human visual system (HVS) in determining viewpoints, and is formulated by two cues: a focus cue and a scale cue. The focus cue is based on the finding that a large number of professionally shot close-up view photos adhere to the focus lens model of HVS (Tsotsos 2011) where it focuses on the center object (focus) while the surrounding background is blurred (fringe), as shown in Fig. 4a. To model it, we transform images into the frequency domain by using the Non-subsampled Contourlet Transform (NSCT) (Da Cunha, Zhou, and Do 2006), in which SURF features (Bay, Tuytelaars, and Van Gool 2006) are extracted and quantized using Fisher Vector (Perronnin, Sánchez, and Mensink 2010). Afterwards, the classification is implemented by a trained support vector machine (SVM). However, many narrow-angle photos shot by low-cost cameras (e.g. smart phones) do not follow the focus model where entire scene appears sharp, such as Fig. 4b. Therefore, the scale cue is derived from observers’ ability to differentiate the views by measuring the size of objects, namely the spatial size (the object size measured in the photo indicated by the boxes in Fig. 4b and 4c are bigger than the one in Fig. 4d) and the conceptual size (the realistic proportion of the object; a person in Fig. 4b is a small object but a building in Fig. 4c is a big object). Referring to Fig. 4b - 4d, a narrow-angle can be determined if the object is spatially large but conceptually small, otherwise, the photo is a wide-angle. We measure the spatial size by an object bounding box proposal method, namely Adobe refined BING boxes (Fang et al. 2016). Whereas, the conceptual size is measured by a fine-tuned convolutional neural network (CNN) (Krizhevsky, Sutskever, and Hinton 2012). Hence, this HVS model built following two specific visual cues of human vision can address distinct photo characteristics. CF-CNN Model We secondly looked into a deep learning technique, by using a single CNN to perform this view angle classification as opposed to the hand-designed HVS model. This is on account of the success shown by CNN at discovering high level features for a variety of tasks (Donahue et al. 2014; Zeiler and Fergus 2014; Yosinski et al. 2015; Lee et al. 2017). However, conventional CNNs only utilize single high level feature after multiple layers of convolution. According to our pilot investigation, features that are crucial for view angle classification may vanish after multiple convolution and pooling operations in the conventional CNNs. Therefore, we designed a cumulative feature CNN (CF-CNN) that extracts features from each stage and ac- Figure 5: The architecture of our proposed cumulative feature CNN (CF-CNN). The features from each convolution layer are cumulated into one representation. cumulates them into one representation, hence incorporating both low and high level features for the classification task. Figure 5 illustrates the architecture of our model, where travel photos are the inputs and the outputs are their respective narrow and wide angle categorization. Specifically, we introduced additional convolution paths (convx) on each existing convolution (conv) layer, to produce 1024-dimension features. The new convx layers are placed after pooling layers (pool), and if the conv is not followed by a pool (conv3conv4), pooling layers are added for them (poolx) before the convx, as shown by the path illustration in Fig. 5. We use the pooling size [3 × 3] for all pool and poolx. The kernel sizes of conv are transfered from the AlexNet architecture (Krizhevsky, Sutskever, and Hinton 2012), while the convx kernel follows the size of the feature map that is to be convolved, e.g. the feature map after pool1 is 27 × 27 × 96, hence the kernel size of convx1 is 27 × 27 × 96 and mapped to 1024 neurons. These convx layers are to be trained endto-end with all the other conv layers, thus the kernels are expected to focus on significant features from different levels. Hence, they are directly summed up to obtain the cumulative feature and proceed to the subsequent fully connected layers for classification. 1 We used 3/4 of wide and narrow angle photos in Dtrain for training while the remaining for validation. During the training process, each training image was augmented by resizing the shorter side to 256 dimensions while maintaining aspect ratio, and then a random cropping and flipping is performed, followed by normalization by subtracting with the average image of the dataset. Finally, a 227 × 227 × 3 dimension image was fed to the network. This model is trained end-to-end using the stochastic gradient descend approach with training batch size of 230, weight decay of 0.0005, and the learning rate that logarithmically reduces from η = 10−5 after every training epoch. Additionally, we transferred ImageNet pre-trained weights from the AlexNet for conv1 - conv5 to improve the generalization of the main feature extraction layers of our model (Yosinski et al. 2014). In order to prevent over-fitting, the training was stopped at 200 epochs where there was no significant reduction in the trend of the validation error. The dif- ference between the validation and training errors was 0.047, an acceptable range of over-fitting as the validation performance achieved over 80%. Thus, we proceed to perform later classification experiments using this CF-CNN model. Performance Evaluation and Analysis The performances of HVS and CF-CNN models were evaluated on 1 dataset Dtest , the travel photos of 10 sites collected from TripAdvisor. The CF-CNN achieved 88.12% overall classification accuracy, a major improvement in comparison to the HVS model that only reached 64.06%. Table 2 shows that CF-CNN outperforms HVS model at all sites. Additionally, we show in Table 3, the ratio of the wide-angle against narrow-angle photos based on CF-CNN’s classification (disregarding accuracy) closely matches the ratio of ground truth. This is an indication that the trained CF-CNN is better than the hand-designed HVS approach with a considerable likeness to a human, therefore, the CF-CNN was used for testing the “broaden-and-build” theory with real world data. Table 2: Classification results of HVS and CNN models on narrow and wide angle photos from the 10 tourist sites. Site 1 2 3 4 5 6 7 8 9 10 Total HVS model Correct/Total Narrow Wide 74/87 237/832 172/240 342/617 246/305 196/518 255/339 233/437 345/439 231/429 343/405 201/425 420/504 145/366 555/689 109/201 502/648 210/269 717/925 18/47 3629/4581 1958/4141 Accuracy 37.76% 59.98% 53.71% 62.89% 66.36% 65.54% 64.94% 74.61% 77.64% 75.62% 64.06% CF-CNN model Correct/Total Narrow Wide 46/87 819/832 129/240 590/617 265/305 465/518 303/339 333/437 353/439 396/429 385/405 313/425 480/504 207/366 654/689 176/201 592/648 244/269 903/925 33/47 4110/4581 3576/4141 Accuracy 94.12% 83.90% 88.70% 81.96% 86.29% 84.10% 78.97% 93.26% 91.17% 96.30% 88.12% Table 3: Comparison of wide-angle and narrow-angle ratio between the ground truth, HVS model, and CF-CNN model. Site GT HVS CF-CNN 1 9:1 3:7 9:1 2 7:3 5:5 8:2 3 6:4 3:7 6:4 4 6:4 4:6 5:5 5 5:5 4:6 6:4 6 5:5 3:7 4:6 7 4:6 3:7 3:7 8 2:8 3:7 2:8 9 3:7 4:6 3:7 10 1:9 2:8 1:9 model as follows: W = βr R + βs S + β0 , Figure 6: Examples of narrow (top) and wide (bottom) angle photos with their high activation regions (bright areas). We also take a further look into the CF-CNN to explore the contributing factors to its performance, by visualizing the last activation maps (highest level features) of the network to find out the spatial location in the photos that is responsible for the classification. The features from lower level layers through convx are not visualized as it has been known that they are less abstract features like edges and high frequency details. Specifically, we extract the activation maps produced by the last pooling operation (pool5) for each test image, where the dimension of the maps are 6 × 6 × 256 as shown in Fig. 5. Max pooling is again performed on the extracted maps in the third dimension to obtain an aggregated map with 6 × 6 dimension, where it is then resized to the size of the original image. This final map is used to mask the luminance channel of the original image to obtain a visualization of the area in which the features are used for classification. This operation has given us an interesting insight of the wide and narrow view angle classification task. Mainly, the border of an image is a major contributor to the classification as opposed to objects only, as we had initially thought. Figure 6 shows several examples where the activations are on the fringe of the image, even though the objects within the image are clearly shown irrespective of the viewpoints. This interesting finding suggests that the strong classification can be achieved by “looking” at the image fringe instead of the objects, which goes beyond the focus cue and scale cue designed in the HVS model. We believe that this is one of the component missing from the HVS model that caused its under-performance. Experiments We hypothesize that prominent tourist sites induces positive emotions to travelers, and subsequently prompt them to capture more wide-angle photos than narrow-angle ones. To test the broaden-and-build theory in photo-taking behaviors, we structure the analysis to lay out a simple linear regression (1) in which W is the proportion of wide-angle photos, R and S are the rating score and the (approximated) size of the tourist site, and βr , βs are respective parameters to be estimated, and β0 is the offset. The model (1) is derived from the “broaden-and-build” theory based on two assumptions: (1) emotions in the experiments reported here are considered to be represented by traveler ratings on TripAdvisor; (2) the scope of attention is naturally or unconsciously manifested by the choice of the view-angle of tourist-taken photos. Note that a competing factor, the site-size S, is included in the model because it might also affect the choice of the view-angle. In this paper we adopt the Pearson correlation coefficients (PCC) to quantify and compare the influences of R and S with respect to W (see Tables 4 and 5 below). First of all, the model (1) is fitted to W , R and S of 70 tourist sites, which are elaborated in the supplementary 2. The optimal fitting is reached with parameters (βr = 0.124, βs = 1.23e−4, β0 = −0.443). Note that the relative low R-squared (R2 = 0.646) of the model indicates a certain amount of data cannot be explained by the model. In order to look for the most influential predictor, we conduct following two experiments. Experiment 1: The test with respect to the site-rating The aim of this experiment is to assess how emotions induced by different tourist sites would affect the choice of the view-angle of travel photos. All 418K travel photos in dataset D2 from 70 tourist sites were classified by the CFCNN. Figure 7 plots the site-rating against the proportion of wide-angle photos at each site. Table 4: The Pearson correlation coefficients (PCCs) between the site-rating and the proportion of wide-angle photos with the P-values. # of sites PCC P-value World-wide 70 0.78 3.0e−15 Asia 18 0.75 5.8e−4 Europe 25 0.75 1.9e−5 Americas 27 0.81 2.7e−7 Results: Figure 7a shows a notable correlation between the site-ratings and the proportions of wide-angle photos across the world. The Pearson correlation coefficient (PCC = 0.78 with P = 3.0e−15) indicates a strong site-ratings dependent preference. Thus, we deem the site-rating R the principal predictor of the model (1). Not surprisingly, this observation is consistent with the broaden-and-build theory. To further investigate the influence of local region and culture, these 70 sites are classified into three subgroups according to their geo-locations, Asia, Europe, and Americas. As shown in Table 4 and Fig. 7b, both the trends of the proportion of wide-angle photos and PCCs of three subgroups are very similar to those of the joint group. Conceivably, the influence of local regions and cultures is negligible. Experiment 2: The test with respect to the site-size The choice of view angle of travel photos may also be affected by (a) (b) (c) Figure 7: (a) A strong correlation between the site-ratings and the proportions of wide-angle photos in the 70 tourist sites from across the world. (b) The analogous correlations appear across Asia, Europe, and Americas. (c) A modest correlation between the site-sizes and the proportions of wide-angle photos. the size of the tourist site, because people are naturally inclined to take wide-angle photos at a location which has an open space or large object of interest and vice versa. Hence, the size of the site could be a confounding factor as shown in the model (1). The aim of this experiment is to assess the relation between the preferences of photo-taking behaviors and site-sizes. To this end, we define the site-size according to the size of the object/region of interest at the location. For the sites that have the obvious object of interest, we refer to their physical sizes in meters (e.g. statues and buildings). If no such object available, we estimate the size of the region of interest in meters. For the sites with extremely open space (e.g. mountains, canyons, and seashores), their sizes are capped to 1km (see supplementary 2 for details). Table 5: The Pearson correlation coefficients (PCCs) between the site-size and the proportion of wide-angle photos with the P-values. # of sites PCC P-value All sites 70 0.62 6.6e−9 Small sites 25 0.44 0.026 Medium sites 14 0.33 0.024 other hand, positive emotions reinforce the tendency for a happy or excited photographer to take wide-angle photos regardless of site-sizes. This “modulation” effect is not only in line with the broaden-and-build theory tested in the laboratory, but also suggests that the visual attention is the result of multiple factors. Experiment 3: The test on random photos While the linear regression model (1) discloses the influences exerted by emotions and site-sizes on photo taking behaviors, the aim of this experiment is to assess the “default” behavior in case of a completely random mode (neutral emotion). Therefore, a site independent dataset D3 was randomly collected from YFCC100m dataset (Thomee et al. 2016) without using geotag or any other keywords, in which 10K photos were classified by the CF-CNN for the statistical analysis. YFCC100m is a subset of Flickr containing 100 million data, which has not only travel photos but a vast diversity (see supplementary 3 for example photos). Large sites 31 0.61 0.002 Results: Figure 7c and Table 5 illustrate a modest correlation (PCC = 0.62) between the size of the site and the proportion of wide-angle photos. This correlation is noticeably weaker, with a margin of 0.16, than the PCC (= 0.78) between the site-rating and the proportion of the wide-angle photos. Since Fig. 7c shows that these sites are unevenly distributed according to the site-size, we further look into this factor and separate them into three subgroups, namely small sites, medium sites, and large sites. Specifically, the sites with size ≤ 10 meters are in the small group, the sites with size > 100 meters are in the large group, and others make up the medium group. We calculate the PCC of each group and list it in Table 5. These results show even weaker correlations in the three subgroups. In our view, the dwarf influence of the site-size with respect to that of the site-rating reinforces our hypothesis under examination. Note that the interplay between the site-size, human emotion and photo-taking behavior is twofold: on the one hand, open spaces or large objects make it easy to take wide-angle photos and vice-versa, but are a secondary factor. On the Figure 8: The proportions of wide-angle photos in lower rating sites (on average), 10K random data, and high rating sites (on average). In order to have a comparison with other emotional states, we choose the sites, whose ratings are higher than 9.0, as high rating sites according to the site distribution in Fig. 3 in line with the three-sigma rule in statistics. Whereas, sites with rating lower than 7.4 are termed lower rating sites. Results: It turns out that, the proportion of the wide-angle photos (the green bar in Fig. 8) in the 10K random data reaches approximately 40%. A close investigation of those random photos revealed that a vast majority of narrow-angle photos are cliché photos of everyday life. The proportion of 40%, although slightly in favour of narrow-angle photos, reveals a statistically “normal behavior” in composing wide vs. narrow angle photos. Since random photos are, supposedly, taken under neural emotion, this particular ratio serves as a reference and is compared against ratios estimated in other mood states. For the high rating sites, the average proportion approximates to 76%, which is not apparent in lower rating sites. Moreover, the average proportion of 41% for the lower rating sites closely resembles the ratio of random photos. We conjecture that this similarity can be ascribed to the neutral emotion associated with lower rating sites, i.e. such sites are unable to induce positive emotions, subsequently, travelers’ photo-taking behaviors are not influenced in a positive manner. On the other hand, the significant high-ratio associated with high rating sites induces photo-taking behavior via broadened visual attention. Another finding is the greater deviation of view proportions in lower rating sites (15.5%) than high rating ones (6%). This signifies that the good sites share a consistent ability to induce positive emotions to tourists, which is lacking for lower rating sites. Conclusion and Discussion In this work, we tested the psychological broaden-and-build theory outside the laboratory by leveraging recent machine learning methods and big data from the internet. Our study revealed a strong correlation between the preference for wide-angle photos and the high rating of tourist sites. This preference is ascribed to the notion that positive emotions broaden visual attention and trigger wide-angle photo compositions. Alternatively, neutral emotion induces a slight favor of narrow-angle photos, which is likely associated with those lower rating sites. In addition, by controlling the condition of site-size, our result suggests that the visual attention is the result of multiple factors. We are able to carry out this analysis through the development of a deep learning algorithm for photo view angle classification, which achieves a performance in sync with a human. We hope that the set up of experiments as well as the proposed algorithm can be a new method added into the psychologists toolbox. Moreover, the methods adopted in this work have potential significance to real-world applications. For example, recent researches have been focusing on discovering new tourism resources through mining text or evaluating picture quality in SNS. However, few of them tried to link tourists’ experiences and mood states with these data, particularly the image data. The broaden-and-build theory with support of real world big data in this study can add a new measure for such task and boost tourism economics. In mental & welfare heathcare filed, researchers are also reviewing big data resources and their use to characterise applications to address mental illness, e.g. suicide prevention. The other side of the broaden-and-build theory (i.e. negative emotions induce a narrowed attention) with our machine learning method can help such special populations to have better lives through mining their SNS data. References [Bay, Tuytelaars, and Van Gool 2006] Bay, H.; Tuytelaars, T.; and Van Gool, L. 2006. Surf: Speeded up robust features. In European Conference on Computer Vision, 404– 417. Springer. [Caliskan, Bryson, and Narayanan 2017] Caliskan, A.; Bryson, J. J.; and Narayanan, A. 2017. Semantics derived automatically from language corpora contain human-like biases. Science 356(6334):183–186. [Da Cunha, Zhou, and Do 2006] Da Cunha, A. L.; Zhou, J.; and Do, M. N. 2006. The nonsubsampled contourlet transform: theory, design, and applications. IEEE Transactions on Image Processing 15(10):3089–3101. [Donahue et al. 2014] Donahue, J.; Jia, Y.; Vinyals, O.; Hoffman, J.; Zhang, N.; Tzeng, E.; and Darrell, T. 2014. Decaf: A deep convolutional activation feature for generic visual recognition. In International Conference on Machine Learning, 647–655. [Fang et al. 2016] Fang, Z.; Cao, Z.; Xiao, Y.; Zhu, L.; and Yuan, J. 2016. Adobe boxes: Locating object proposals using object adobes. IEEE Transactions on Image Processing 25(9):4116–4128. [Fredrickson and Branigan 2005] Fredrickson, B. L., and Branigan, C. 2005. Positive emotions broaden the scope of attention and thought-action repertoires. Cognition & emotion 19(3):313–332. [Fredrickson 2004] Fredrickson, B. L. 2004. The broadenand-build theory of positive emotions. Philosophical Transactions of the Royal Society B: Biological Sciences 359(1449):1367. [Goldstone and Lupyan 2016] Goldstone, R. L., and Lupyan, G. 2016. Discovering psychological principles by mining naturally occurring data sets. Topics in Cognitive Science 8(3):548–568. [Griffiths 2015] Griffiths, T. L. 2015. Manifesto for a new (computational) cognitive revolution. Cognition 135:21–23. [Jones 2016] Jones, M. N. 2016. Developing cognitive theory by mining large-scale naturalistic data. Big Data in Cognitive Science 1–12. [Krizhevsky, Sutskever, and Hinton 2012] Krizhevsky, A.; Sutskever, I.; and Hinton, G. E. 2012. Imagenet classification with deep convolutional neural networks. In Advances in Neural Information Processing Systems, 1097–1105. [Lee et al. 2017] Lee, S. H.; Chan, C. S.; Mayo, S. J.; and Remagnino, P. 2017. How deep learning extracts and learns leaf features for plant classification. Pattern Recognition 71:1–13. [Paxton and Griffiths 2017] Paxton, A., and Griffiths, T. L. 2017. Finding the traces of behavioral and cognitive processes in big data and naturally occurring datasets. Behavior Research Methods 1–9. [Perronnin, Sánchez, and Mensink 2010] Perronnin, F.; Sánchez, J.; and Mensink, T. 2010. Improving the fisher kernel for large-scale image classification. In European Conference on Computer Vision, 143–156. Springer. [Pourtois, Schettino, and Vuilleumier 2013] Pourtois, G.; Schettino, A.; and Vuilleumier, P. 2013. Brain mechanisms for emotional influences on perception and attention: what is magic and what is not. Biological Psychology. [Rowe, Hirsh, and Anderson 2007] Rowe, G.; Hirsh, J. B.; and Anderson, A. K. 2007. Positive affect increases the breadth of attentional selection. Proceedings of the National Academy of Sciences 104(1):383–388. [Stewart and Davis 2016] Stewart, R., and Davis, K. 2016. big datain mental health research: current status and emerging possibilities. Social psychiatry and psychiatric epidemiology 51(8):1055–1072. [Tamir and Robinson 2007] Tamir, M., and Robinson, M. D. 2007. The happy spotlight: Positive mood and selective attention to rewarding information. Personality and Social Psychology Bulletin 33(8):1124–1136. [Thomee et al. 2016] Thomee, B.; Shamma, D. A.; Friedland, G.; Elizalde, B.; Ni, K.; Poland, D.; Borth, D.; and Li, L.-J. 2016. Yfcc100m: The new data in multimedia research. Communications of the ACM 59(2):64–73. [Tsotsos 2011] Tsotsos, J. K. 2011. A computational perspective on visual attention. MIT Press. [Vanlessen et al. 2013] Vanlessen, N.; Rossi, V.; De Raedt, R.; and Pourtois, G. 2013. Positive emotion broadens attention focus through decreased position-specific spatial encoding in early visual cortex: Evidence from erps. Cognitive, Affective, & Behavioral Neuroscience 13(1):60–79. [Vinson, Dale, and Jones 2016] Vinson, D. W.; Dale, R.; and Jones, M. N. 2016. Decision contamination in the wild: Sequential dependencies in yelp review ratings. In Proceedings of the 38th Annual Meeting of the Cognitive Science Society, 1433–1438. [Yosinski et al. 2014] Yosinski, J.; Clune, J.; Bengio, Y.; and Lipson, H. 2014. How transferable are features in deep neural networks? In Advances in Neural Information Processing Systems, 3320–3328. [Yosinski et al. 2015] Yosinski, J.; Clune, J.; Nguyen, A.; Fuchs, T.; and Lipson, H. 2015. Understanding neural networks through deep visualization. arXiv preprint arXiv:1506.06579. [Zeiler and Fergus 2014] Zeiler, M. D., and Fergus, R. 2014. Visualizing and understanding convolutional networks. In European Conference on Computer Vision, 818–833. Springer. [Zhuang et al. 2014] Zhuang, C.; Ma, Q.; Liang, X.; and Yoshikawa, M. 2014. Anaba: An obscure sightseeing spots discovering system. In International Conference on Multimedia and Expo.
1cs.CV
Practical combinations of repetition-aware data structures∗ Djamal Belazzougui1 , Fabio Cunial2 , Travis Gagie3,4 , Nicola Prezza5 , and Mathieu Raffinot6 1 2 CERIST, Algeria. Max Planck Institute of Molecular Cell Biology and Genetics, Dresden, Germany. Department of Computer Science, University of Helsinki, Finland. Helsinki Institute for Information Technology, Finland. Department of Mathematics and Computer Science, University of Udine, Italy. Laboratoire Bordelais de Recherche en Informatique, CNRS, Bordeaux, France. arXiv:1604.06002v2 [cs.DS] 21 Apr 2016 3 4 5 6 Abstract Highly-repetitive collections of strings are increasingly being amassed by genome sequencing and genetic variation experiments, as well as by storing all versions of human-generated files, like webpages and source code. Existing indexes for locating all the exact occurrences of a pattern in a highly-repetitive string take advantage of a single measure of repetition. However, multiple, distinct measures of repetition all grow sublinearly in the length of a highly-repetitive string. In this paper we explore the practical advantages of combining data structures whose size depends on distinct measures of repetition. The main ingredient of our structures is the run-length encoded BWT (RLBWT), which takes space proportional to the number of runs in the Burrows-Wheeler transform of a string. We describe a range of practical variants that combine RLBWT with the set of boundaries of the Lempel-Ziv 77 factors of a string, which take space proportional to the number of factors. Such variants use, respectively, the RLBWT of a string and the RLBWT of its reverse, or just one RLBWT inside a bidirectional index, or just one RLBWT with support for unidirectional extraction. We also study the practical advantages of combining RLBWT with the compact directed acyclic word graph of a string, a data structure that takes space proportional to the number of one-character extensions of maximal repeats. Our approaches are easy to implement, and provide competitive tradeoffs on significant datasets. 1998 ACM Subject Classification E.1 Data structures, F.2.2 Pattern matching. Keywords and phrases repetitive strings, locate, count, run-length encoded BWT, Lempel-Ziv factorization, CDAWG. Digital Object Identifier 10.4230/LIPIcs.CVIT.2016.23 1 Introduction Locating all the exact occurrences of a string in a massive, highly-repetitive collection of similar texts is a fundamental primitive in the post-genome era, in which genomes from multiple related species, from multiple strains of the same species, and from multiple individuals, are being sequenced at an increasing pace. Most data structures designed for ∗ This work was partially supported by Academy of Finland under grant 284598 (Center of Excellence in Cancer Genetics Research). © D. Belazzougui et al.; licensed under Creative Commons License CC-BY 42nd Conference on Very Important Topics (CVIT 2016). Editors: John Q. Open and Joan R. Acces; Article No. 23; pp. 23:1–23:18 Leibniz International Proceedings in Informatics Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 23:2 Practical combinations of repetition-aware data structures such repetitive collections take space proportional to a specific measure of repetition, for example the number z of factors in a Lempel-Ziv parsing [1, 18], or the number r of runs in a Burrows-Wheeler transform [21]. In previous work we showed how to achieve competitive theoretical tradeoffs between space and time in locate queries, by combining data structures that depend on distinct measures of repetition, where all such measures grow sublinearly in the length of a highly-repetitive string [3]. Specifically, we described a data structure that takes approximately O(z + r) words of space, and that reports all the occurrences of a pattern of length m in a string of length n in O(m(log log n + log z) + pocc · log z + socc · log log n) time, where pocc and socc are the number of primary and of secondary occurrences, respectively (see Section 2.2). This compares favorably to the O(m2 h + (m + occ) log z) reporting time of Lempel-Ziv 77 (LZ77) indexes [18], where h is the height of the parse tree. It also compares favorably in space to solutions based on the run-length encoded BWT (RLBWT) and on suffix array samples [21], which take O(n/k + r) words of space to achieve O(m log log n + k · occ · log log n) reporting time, where k is the sampling rate. We also introduced a data structure whose size depends on the number of right-extensions of maximal repeats, and that reports all the occ occurrences of a pattern in O(m log log n + occ) time. The main component of our constructions is the RLBWT, which we use for counting the number of occurrences of a pattern, and which we combine with the CDAWG and with data structures from Lempel-Ziv indexes, rather than with suffix array samples, for answering locate queries. In this paper we engineer a range of practical variants of such approaches, and we compare their space-time tradeoffs to a representative set of state-of-the-art indexes for repetitive collections, including RLCSA [21], a number of LZ77 implementations [17], and a recent implementation of the hybrid index [32]. One of our indexes based on RLBWT and LZ77 factors uses an amount of memory comparable to LZ77 indexes, but it answers count queries between two and four orders of magnitude faster than all LZ77 and hybrid index implementations. For long patterns, our index uses less space than the hybrid index, and it answers locate queries between one and two orders of magnitude faster than a number of LZ77 implementations, and as fast as the fastest LZ77 implementation. With short patterns, our index based on RLBWT and CDAWG answers locate queries between four and ten times faster than a version of RLCSA that uses comparable memory, and with extremely short patterns our index achieves speedups even greater than ten with respect to RLCSA. 2 2.1 Preliminaries Strings Let Σ = [1..σ] be an integer alphabet, let # = 0 ∈ / Σ be a separator, and let T ∈ [1..σ]n−1 be a string. We denote by T the reverse of T , and by PT # (W ) the set of all starting positions of a string W ∈ [0..σ]+ in the circular version of T #. We set ΣrT # (W ) = {a ∈ [0..σ] : |PT # (W a)| > 0} and Σ`T # (W ) = {a ∈ [0..σ] : |PT # (aW )| > 0}. A repeat W ∈ Σ+ is a string that satisfies |PT # (W )| > 1. A repeat W is right-maximal (respectively, left-maximal) iff |ΣrT # (W )| > 1 (respectively, iff |Σ`T # (W )| > 1). A maximal repeat is a repeat that is both left- and right-maximal. We say that a maximal repeat W is rightmost (respectively, leftmost) if no string W V with V ∈ [0..σ]+ is left-maximal (respectively, if no string V W with V ∈ [0..σ]+ is right-maximal). For reasons of space we assume the reader to be familiar with the notion of suffix tree STT # = (V, E) and of suffix-link tree of T #, which we do not define here. We denote by `(γ), or equivalently by `(u, v), the label of edge γ = (u, v) ∈ E, and we denote by `(v) the D. Belazzougui et al. 23:3 string label of node v ∈ V . It is well known that a string W is right-maximal (respectively, left-maximal) in T # iff W = `(v) for some internal node v of STT # (respectively, iff W = `(v) for some internal node v of STT # ). Since left-maximality is closed under prefix operation, there is a bijection between the set of all maximal repeats of T # and the set of all nodes of the suffix tree of T # that lie on paths that start from the root and that end at nodes labelled by rightmost maximal repeats. Symmetrically, since right-maximality is closed under suffix operation, there is a bijection between the set of all maximal repeats and the set of all nodes of the suffix tree of T # that lie on paths that start from the root and that end at nodes labelled by leftmost maximal repeats. The compact directed acyclic word graph of T # (denoted by CDAWGT # in what follows) is the minimal compact automaton that recognizes the set of suffixes of T # [4, 7]. It can be seen as the minimization of STT # in which all leaves are merged to the same node (the sink) that represents T # itself, and in which all nodes except the sink are in one-to-one correspondence with the maximal repeats of T # [29] (the source corresponds to the empty string). The set of accepting nodes consists of the sink and of all maximal repeats that also occur as a suffix of T #. Like in the suffix tree, transitions are labelled by substrings of T #. Since a maximal repeat corresponds to a subset of its right-maximal suffixes, CDAWGT # can be built by putting in the same equivalence class all nodes of STT # that belong to the same maximal unary path of explicit Weiner links. Note also that the subgraph of STT # induced by maximal repeats is isomorphic to a spanning tree of CDAWGT # . For reasons of space we assume the reader to be familiar with the notion and uses of the Burrows-Wheeler transform of T , including the C array, LF mapping, and backward search. In this paper we use BWTT # to denote the BWT of T #, and we use range(W ) = [sp(W )..ep(W )] to denote the lexicographic interval of a string W in a BWT that is implicit from the context. We say that BWTT # [i..j] is a run iff BWTT # [k] = c ∈ [0..σ] for all k ∈ [i..j], and moreover if any substring BWTT # [i0 ..j 0 ] such that i0 ≤ i, j 0 ≥ j, and either i0 6= i or j 0 = 6 j, contains at least two distinct characters. It is well known that repetitions in T # induce runs in BWTT # : for example, the BWT of W k # consists of r ≤ |W | runs of length at least k and of a run of length one. We denote by rT # the number of runs in BWTT # , and we call run-length encoded BWT (denoted by RLBWTT # ) any representation of BWTT # that takes O(rT # ) words of space, and that supports rank and select operations (see e.g. [20, 21, 30]). Since the difference between rT # and rT # is negligible in practice, to simplify notation we denote both of them by r when T is implicit from the context. The Lempel-Ziv 77 factorization of T [34], abbreviated with LZ77 in the rest of the paper, is the greedy decomposition T1 T2 · · · Tz of T defined as follows. Assume that T is virtually preceded by the set of distinct characters in its alphabet, and assume that T1 T2 · · · Ti has already been computed for some prefix of length k of T : then, Ti+1 is the longest prefix of T [k + 1..n] such that there is a j ≤ k that satisfies T [j..j + |Ti+1 | − 1] = Ti+1 . In the rest of the paper we drop subscripts whenever they are clear from the context. 2.2 String indexes The run-length compressed suffix array of T #, denoted by RLCSAT # in what follows, consists of a run-length compressed rank data structure for BWTT # , and of a sampled suffix array, denoted by SSAT # [21]. Given a pattern P ∈ [1..σ]m , we use the rank data structure to find the interval of BWTT # that contains all characters that precede the occurrences of P in T #: the length of this interval, uncompressed, is the number of such occurrences. To locate a specific occurrence, we start at the character that precedes it in BWTT # and we use rank queries to move backward, until we reach a character whose position has been sampled. CVIT 2016 23:4 Practical combinations of repetition-aware data structures Thus, the average time for locating an occurrence is inversely proportional to the size of SSAT # , and fast locating needs a large SSA regardless of the compressibility of the dataset. Mäkinen et al. suggested ways to reduce the size of the SSA [21], but they did not perform well enough in real repetitive datasets for the authors to include them in the software they released. For reasons of space we assume the reader to be familiar with LZ77 indexes (see e.g. [13, 16]). Here we just recall that a primary occurrence of a pattern P in T is one that crosses or ends at a phrase boundary in the LZ77 factorization T1 T2 · · · Tz of T . All other occurrences are called secondary. Once we have computed primary occurrences, locating all socc secondary occurrences reduces to two-sided range reporting, and it takes O(socc · log log n) time with a data structure of O(z) words of space [16]. To locate primary occurrences, we use a data structure for four-sided range reporting on a z × z grid, with a marker at (x, y) if the x-th LZ factor in lexicographic order is preceded in the text by the lexicographically y-th reversed prefix ending at a phrase boundary. This data structure takes O(z) words of space, and it returns all the phrase boundaries that are immediately followed by a factor in the specified range, and immediately preceded by a reversed prefix in the specified range, in O((1 + k) log z) time, where k is the number of phrase boundaries reported [5]. Kärkkäinen and Ukkonen used two PATRICIA trees [22], one for the factors and the other for the reversed prefixes ending at phrase boundaries [16]. To locate primary occurrences, we query the first tree for the range of distinct factors in left-to-right lexicographic order that start with P [i + 1..m], and we query the second tree for the range of reversed prefixes T [1..pi − 1] starting with P [1..i], for all i ∈ [1..m]. The ranges returned by the trees are correct iff any factor starts with P [i + 1..m] and any reversed prefix at a phrase boundary starts with P [1..i]. To check the first range, we choose any factor in the range and compare its first m − i characters to P [i + 1..m]. To check the second range, we choose any reversed prefix in the range and compare its first i characters to P [1..i]. This takes O(m) time for every i, thus O(m2 ) time in total, assuming that T is not compressed. Replacing the uncompressed text by an augmented compressed representation, we can store T in O(z log n) space such that later, given P , we can find all occ occurrences of P in O(m log m + occ · log log n) time [13]. If we know in advance that all patterns will be of length at most M , then we can store in a FM-index the substrings of T consisting of characters within distance M of the nearest phrase boundary, and use that to find primary occurrences. This approach, called hybrid indexing, has been proposed several times recently: see e.g. [32] and references therein for more details. 2.3 Composite repetition-aware string indexes It is possible to combine RLBWTT # with the set of all starting positions p1 , p2 , . . . , pz of LZ factors of T , building a data structure that takes O(z + r) words of space, and that reports all the pocc primary occurrences of a pattern P ∈ [1..σ]m in O(m(log log n+log z)+pocc·log z) time [3]. Since such data structure is at the core of the paper, we summarize how it works in what follows. The same primary occurrence of P in T can cover up to m boundaries between two LZ factors. Thus, we consider every possible way of placing, inside P , the rightmost boundary between two factors, i.e. every possible split of P in two parts P [1..k − 1] and P [k..m] for k ∈ [2..m], such that P [k..m] is either a factor or a proper prefix of a factor. For every such k, we use four-sided range reporting queries to list all the occurrences of P in T that conform to the split, as described in Section 2.2. We encode the sequence p1 , p2 , . . . , pz implicitly, as follows: we use a bitvector last[1..n] such that last[i] = 1 iff SAT # [i] = n − pj + 2 for D. Belazzougui et al. 23:5 some j ∈ [1..z], i.e. iff SAT # [i] is the last position of a factor. We represent such bitvector as a predecessor data structure with partial ranks, using O(z) words of space [33]. Let STT # = (V, E) be the suffix tree of T #, and let V 0 = {v1 , v2 , . . . , vz } ⊆ V be the set of loci in STT # of all LZ factors of T . Consider the list of node labels L = `(v1 ), `(v2 ), . . . , `(vz ), sorted in lexicographic order. It is easy to build a data structure that takes O(z) words of space, and that implements in O(log z) time function I(W, V 0 ), which returns the (possibly empty) interval of W in L (see e.g. [3]). Together with last, RLBWTT # and RLBWTT # , this data structure is the output of our construction. Given P , we first perform a backward search in RLBWTT # to determine the number of occurrences of P in T #: if this number is zero, we stop. During backward search, we store in a table the interval [ik ..jk ] of P [k..m] in BWTT # for every k ∈ [2..m]. Then, we compute 0 the interval [i0k−1 ..jk−1 ] of P [1..k − 1] in BWTT # for every k ∈ [2..m], using backward search 0 in RLBWTT # : if rank1 (last, jk−1 ) − rank1 (last, i0k−1 − 1) = 0, then P [1..k − 1] never ends at the last position of a factor, and we can discard this value of k. Otherwise, we convert 0 0 [i0k−1 ..jk−1 ] to the interval [rank1 (last, i0k−1 − 1) + 1..rank1 (last, jk−1 )] of all the reversed prefixes of T that end at the last position of a factor. Rank operations on last can be implemented in O(log log n) time using predecessor queries. We get the lexicographic interval of P [k..m] in the list of all distinct factors of T using operation I(P [k..m], V 0 ), in O(log z) time. We use such intervals to query the four-sided range reporting data structure. It is also possible to combine RLBWTT # with CDAWGT # , building a data structure that takes O(eT # ) words of space, and that reports all the occ occurrences of P in O(m log log n + occ) time, where eT # is the number of right-extensions of maximal repeats of T # [3]. Specifically, for every node v in the CDAWG, we store |`(v)| in a variable v.length. Recall that an arc (v, w) in the CDAWG means that maximal repeat `(w) can be obtained by extending maximal repeat `(v) to the right and to the left. Thus, for every arc γ = (v, w) of the CDAWG, we store the first character of `(γ) in a variable γ.char, and we store the length of the right extension implied by γ in a variable γ.right. The length γ.left of the left extension implied by γ can be computed by w.length − v.length − γ.right. For every arc of the CDAWG that connects a maximal repeat W to the sink, we store just γ.char and the starting position γ.pos of string W · γ.char in T . The total space used by the CDAWG is O(eT # ) words, and the number of runs in BWTT # can be shown to be O(eT # ) as well [3]. An alternative construction could use CDAWGT # and RLBWTT # . We use the RLBWT to count the number of occurrences of P in T in O(m log log n) time: if this number is not zero, we use the CDAWG to report all the occ occurrences of P in O(occ) time, using a technique already sketched in [6]. Specifically, since we know that P occurs in T , we perform a blind search for P in the CDAWG, as is typically done with PATRICIA trees. We keep a variable i, initialized to zero, that stores the length of the prefix of P that we have matched so far, and we keep a variable j, initialized to one, that stores the starting position of P inside the last maximal repeat encountered during the search. For every node v in the CDAWG, we choose the arc γ such that γ.char = P [i + 1] in constant time using hashing, we increment i by γ.right, and we increment j by γ.left. If the search leads to the sink by an arc γ, we report γ.pos + j and we stop. If the search ends in a node v that is associated with the maximal repeat W , we determine all the occurrences of W in T by performing a depth-first traversal of all nodes reachable from v in the CDAWG , updating variables i and j as described above, and reporting γ.pos + j for every arc γ that leads to the sink. The total number of nodes and arcs reachable from v is O(occ). CVIT 2016 23:6 Practical combinations of repetition-aware data structures 3 Combining RLBWT and LZ factors in practice We implement1 the combination of RLBWT and LZ factorization described in Section 2.3, exploring a range of practical variants of decreasing size. Specifically, in addition to the version described in Section 2.3 (which we call full in what follows), we implement a variant in which we drop RLBWTT # , simulating it with a bidirectional index (we call this variant bidirectional in what follows), a variant in which we drop RLBWTT # , the four-sided range reporting data structure, and the subset of suffix tree nodes (we call this variant light in what follows), and another variant in which we use a sparse version of the LZ parsing (we call this sparse in what follows). Moreover, we design a number of practical optimization to speed up locate queries: see Appendix C. We implement all variants using a representation of the RLBWT that is more spaceefficient than the one described in [30]. Recall that the latter is encoded as follows: they store one character per run in a string H ∈ Σr , they mark with a one the beginning of each run in a bitvector Vall [0..n − 1], and for every c ∈ Σ they store the lengths of all runs of character c consecutively in a bit-vector Vc : specifically, every c-run of length k is represented in Vc as 10k−1 . This representation allows one to map rank and access queries on BWTT # to rank, select and access queries on H, Vall , and Vc . By gap-encoding the bitvectors, this representation takes r(2 log(n/r) + log σ)(1 + o(1)) bits of space. We reduce the multiplicative factor of term log(n/r) by storing in Vall just one out of 1/ ones, where 0 <  ≤ 1 is an arbitrary constant. It is easy to see that we are still able to answer all queries on the RLBWT by using the vectors Vc to reconstruct the positions of the missing ones in Vall , using r (1 + ) log(n/r) + log σ (1 + o(1)) bits of space, but query times are multiplied by a factor 1/. In all our experiments we set  to 1/8. We represent H as a Huffman-encoded string (wt_huff<> in SDSL), and gap-encoded bitvectors with Elias-Fano (sd_vector<> in SDSL). 3.1 Full index The first variant is an engineered version of the data structure described in Section 2.3. We store both RLBWTT # and RLBWTT # . A gap-encoded bitvector end[0..n−1] of z log(n/z)(1+ o(1)) bits marks the rank, among all the suffixes of T #, of every suffix T [i..n − 1]# such that n − i − 2 is the last position of an LZ factor of T . Symmetrically, a gap-encoded bitvector begin[0..n − 1] of z log(n/z)(1 + o(1)) bits marks the rank, among all the suffixes of T #, of every suffix T [i..n − 1]# such that i is the first position of an LZ factor of T . Geometric range data structures (4-sided and 2-sided) are implemented as wavelet trees (wt_int<> in SDSL). The 4-sided range data structure supports locating primary occurrences, by storing the permutation of the z LZ factors of T , sorted lexicographically, in the order induced by the corresponding ones in end: in other words, every character of the wavelet tree is the lexicographic rank of an LZ factor, among all the LZ factors of T . For locating primary occurrences, we need to label every point in the 4-sided range data structure with a text position. We allocate log z bits rather than log n bits to every such label, by using as label the rank of the corresponding one in array begin, thus the data structure takes 2z log z(1 + o(1)) bits of space. The 2-sided range data structure stores z two-dimensional points whose coordinates are both in [1..|T |]. For locating secondary occurrences, every 1 The source code of all our implementations is available at [26, 27], and it is based on the SDSL library [15]. D. Belazzougui et al. 23:7 such point is again labeled with the rank of the corresponding one in array begin. The wavelet tree that implements the 2-sided range data structure can only store points whose set of x coordinates is [1..z]: we map text coordinates to this domain using a gap-encoded bitvector, which takes z log(n/z)(1 + o(1)) bits of space. Some coordinates could be repeated, since two LZ factors could share the same source start point: we keep track of duplicates using a succinct bitvector that takes z + o(z) bits of space, in which a coordinate that is repeated k > 0 times is encoded as 10k−1 . Overall, the 2-sided range data structure takes z(2 log n + 1)(1 + o(1)) bits of space. Finally, we need a way to compute the lexicographic range of a string among all the LZ factors of T . We implement a simpler and more space-efficient strategy than the one proposed in [3]. Specifically, recall that LZ factors are right-maximal substrings of T #, or equivalently they are nodes of the suffix tree of T #. Recall also that the BWT intervals of two nodes of the suffix tree of T # are either disjoint or contained in one another. We sort the BWT intervals of all LZ factors by the order induced by the pre-order traversal of the suffix tree of T #: two distinct nonempty intervals [i0 ..j 0 ] and [i00 ..j 00 ] are such that [i0 ..j 0 ] < [i00 ..j 00 ] iff j 0 < i00 , or iff [i00 ..j 00 ] is contained in [i0 ..j 0 ]. The data structure is just the sorted array V of such intervals, and it takes 2z log n bits of space2 . Given the BWT interval [i..j] of a string W , we find its lexicographic range among all sorted distinct LZ factors, in O(log z) time, as follows: (1) we binary-search V using the order described above, finding all intervals that are strictly smaller than [i..j]; (2) starting from the first interval in V that is greater than or equal to [i..j], we find all intervals in V that equal [i..j] or are contained in it, i.e. all intervals of factors that are either W itself or a right-extension of W . This requires just one binary search, since all such intervals are contiguous in V .  In summary, the full index takes 6z log n + 2(1 + )r log(n/r) + 2r log σ · (1 + o(1)) bits of space, and it supports count queries in O(m · (log(n/r) + log σ)) time and locate queries in O((m + occ) · log n) time. 3.2 Bidirectional index We can drop RLBWTT # and simulate it using just RLBWTT # , by applying the synchronization step performed in bidirectional BWT indexes (see e.g. [2] and references therein). This strategy penalizes the time complexity of locate queries, which becomes quadratic in the length of the pattern. Moreover, since in our implementation we store run-lengths separately for each character, a synchronization step requires σ rank queries to find the number of characters smaller than a given character inside a BWT interval. This operation could be performed in O(log σ) time if the string were represented as a wavelet tree. In summary, the bidirectional variant of the index takes 6z log n + (1 + )r log(n/r) + r log σ · (1 + o(1)) bits of space, it supports count queries in O(m · (log(n/r) + log σ)) time, and it supports locate queries in O(m2 σ log(n/r) + (m + occ) · log n) time. 3.3 Light index with LZ sparsification Once we have computed the interval of the pattern in BWTT # , we can locate all its primary occurrences by just forward-extracting at most m characters for each occurrence inside the 2 The sequence of first positions of all intervals in the sorted array is non-decreasing, thus we use gap encoding to save z log z bits of space. This adds a multiplicative factor of O(log(n/z)) to all query times. For clarity we describe just the simpler version in which intervals are encoded as 2z integers of log n bits each. CVIT 2016 23:8 Practical combinations of repetition-aware data structures range: this is because every primary occurrence of the pattern overlaps with the last position of an LZ factor. We implement forward extraction with select queries on RLBWTT # . This approach requires just RLBWTT # , the 2-sided range data structure, a gap-encoded bitvector endT that marks the last position of every LZ factor in the text, a gap-encoded bitvector endBW T that marks the last position of every LZ factor in BWTT # , and z integers of log z bits each, connecting corresponding ones in endBW T and in endT : this array plays the role of the sparse suffix array sampling used in RLCSA. We can reduce space even further by sparsifying the LZ factorization. Intuitively, the factorization of a highly-repetitive collection of strings T = T1 T2 · · · Tk , where T2 , . . . , Tk are similar to T1 , is much denser inside T1 than it is inside T2 · · · Tk , thus excluding long enough contiguous regions from the factorization (i.e. not outputting factors inside such regions) could reduce the number of factors in dense regions. Formally, let d > 0, and consider the following generalization3 of LZ77, denoted here by LZ77-d: we factor T as X1 Y1 X2 Y2 · · · Xzd Yzd , where zd is the size of the factorization, Yi ∈ Σd for all i ∈ [1..zd ], and Xi is the longest prefix of Xi Yi · · · Xzd Yzd that appears at least twice in X1 Y1 X2 Y2 · · · Xi To make the index described in this section work with LZ77-d, we need to sample the suffix array of T # at the lexicographic ranks that correspond to the last position of every Xi , and we need to redefine primary occurrences as those that are not fully contained inside an Xi . During locate we now need to extract d additional characters before each occurrence of the pattern, in order to locate primary occurrences that start inside a Yi . The 2-sided range data structure must also be built on the (sources of the) factors X1 , . . . , Xzd . This implementation of the index takes zd (3 log n + log(n/zd )) + (1 + )r log(n/r) · (1 + o(1)) bits of space, it answers locate queries in O((occ + 1) · (m + d) · log n) time and count queries in O(m(log(n/r) + log σ)) time. 4 Combining RLBWT and CDAWG in practice We implement4 the combination of RLBWT and CDAWG described in Section 2.3, and we study the effect of two representations of the CDAWG in memory. In the first representation, the graph is encoded as a sequence of variable-length integers: every integer is represented as a sequence of bytes, in which the seven least significant bits of every byte are used to encode the integer, and the most significant bit flags the last byte of the integer. Nodes are stored in the sequence according to their topological order in the graph obtained from the CDAWG by inverting the direction of all arcs: to encode a pointer from a node v to its successor w in the CDAWG, we store the difference between the first byte of v and the first byte of w in the sequence. If w is the sink, such difference is replaced by a shorter code. We choose to store the length of the maximal repeat that corresponds to each node, rather than the offset of `(v) inside `(w) for every arc (v, w), since such lengths are short and smaller than the number of arcs in practice. In the second encoding we exploit the fact that the subgraph of the suffix tree of T # induced by maximal repeats is a spanning tree of CDAWGT # (see Section 2.1). Specifically, we encode such spanning tree with the balanced parenthesis scheme described in [23], and we resolve the arcs of the CDAWG that belong to the tree using corresponding tree operations. Such operations work on node identifiers, thus we need to convert node identifiers to the 3 4 The version of LZ77 considered in this paper is obtained by setting d = 0, and by requiring the text to be virtually preceded by all its distinct characters. The source code of all our implementations is available at [28]. D. Belazzougui et al. 23:9 first byte in the byte sequence of the CDAWG, and vice versa. For this, we encode the monotone sequence of the first byte of all n nodes in the byte sequence using the quasi-succinct representation by Elias and Fano, which uses at most 2 + log(N/n) bits per starting position, where N is the number of bytes in the byte sequence [9]. Finally, we observe that classical CDAWG construction algorithms (e.g. the online algorithm described in [7]) are not space-efficient, and we design linear-time algorithms that build a representation of the CDAWG from BWTT # or BWTT # , using optimal additional space. Specifically, let enumerateLeft(i, j) be a function that returns the set of distinct characters that appear in BWTT # [i..j], not necessarily in lexicographic order. We prove the following lemmas in Appendix A and B: I Lemma 1. Let T ∈ [1..σ]n−1 #, where # = 0. Given a representation of BWTT # that answers enumerateLeft in time tEL per element in its output, and LF in time tLF , we can build the topology of CDAWGT # , as well as the first character and the length of the label of each arc, in randomized O(n(tEL + tLF )) time and zero space in addition to the input and the output. I Lemma 2. Let T ∈ [1..σ]n−1 #, where # = 0. Given a representation of BWTT # that answers enumerateLeft in time tEL per element in its output, and LF in time tLF , we can build the topology of CDAWGT # , as well as the first character and the length of the label of each arc, in randomized O(n(tEL + tLF )) time and O(σ 2 log2 n) bits of space in addition to the input and the output. 5 Experimental results We test our implementations on five DNA datasets from the Pizza&Chili repetitive corpus [11], which include the whole genomes of approximately 36 strains of the same eukaryotic species (“Saccharomyces cerevisiae” and “Saccharomyces paradoxus” in the plots), a collection of 23 and approximately 78 thousand substrings of the genome of the same bacterium (respectively “Escherichia coli” and “Haemophilus influenzae”), and an artificially repetitive string obtained by concatenating a hundred mutated copies of the same substring of the human genome (denoted by “pseudo-real” in the plots)5 . We compare our results to the FM index implementation in SDSL [15] with sampling rate 2i for i ∈ [5..10] (represented by black circles in all plots), to an implementation of RLCSA6 [24] with the same sampling rates (triangles in the plots), to the five variants in the implementation of the LZ77 index described in [17] (squares), and to a recent implementation of the compressed hybrid index [32] (diamonds). The FM index uses RRR bitvectors in its wavelet tree. For brevity, we call LZ1 the implementation of the LZ77 index that uses suffix trie and reverse trie. For each process, and for each pattern length 2i for i ∈ [3..10], we measure the maximum resident set size and the number of CPU seconds that the process spends in user mode7 , both for 5 6 7 Compressing such files with p7zip [25], an implementation of LZ77 with large window, makes the uncompressed files between 21 and 370 times bigger than the corresponding compressed files [11]. We compile the sequential version with PSI_FLAGS and SA_FLAGS turned off (thus, a gap-encoded bitvector rather than a succinct bitvector is used to mark sampled positions in the suffix array). The block size of psi vectors (RLCSA_BLOCK_SIZE) is 32 bytes. We perform all experiments on a single core of a 6-core, 2.50 GHz, Intel Xeon E5-2640 processor, with access to 128GiB of RAM and running CentOS 6.3. We measure resources with GNU Time 1.7, and we compile with GCC 5.3.0. CVIT 2016 23:10 Practical combinations of repetition-aware data structures locate and for count queries, discarding the time for loading the indexes and averaging our measurements over one thousand patterns8 . We observe two distinct regimes for locate queries, corresponding to short patterns (shorter than approximately 64) and to long patterns, respectively (Figures 1 and 3). Our full, bidirectional and light index implementations (red circles in all plots) do not achieve any new useful tradeoff, in any dataset, neither with short nor with long patterns. As expected, the running time per pattern of the bidirectional index depends quadratically on pattern length, but we observe a superlinear growth for the light index as well. The optimizations described in Appendix C (red dots) are effective only for the bidirectional index, their effectiveness increases with pattern length, and they manage to shave up to 80% of running time with patterns of length 1024. The size of the bidirectional index on disk is on average 20% smaller than the size of the full index on disk, and the size of the light index on disk is approximately 20% smaller than the size of the bidirectional index on disk. We experiment with skipping 2i characters before opening a new phrase in the light index with LZ sparsification (green in all plots), where i ∈ [5..10]. The size of the sparse index with skip rate 25 on disk is approximately 35% smaller than the size of the light index on disk. With short patterns, the memory used by the sparse index becomes smaller than RLCSA and comparable to the LZ index, but its running time per occurrence is between one and two orders of magnitude greater than the LZ index and comparable to RLCSA with sampling rates equal to or greater than 2048 (Figure 1, top). With long patterns, however, the sparse index becomes between one and two orders of magnitude faster than all variants of the LZ index, except variant LZ1, while using comparable memory. As a function of pattern length, the running time per occurrence of the sparse index grows more slowly than the running time of LZ1, suggesting that the sparse index becomes as fast as LZ1 for patterns of length between 1024 and 2048 (Figure 3, top). The sparse index is approximately 1.5 orders of magnitude slower than the hybrid index, but since the size of the hybrid index depends on maximum pattern length, the sparse index becomes smaller than the hybrid index for patterns of length between 64 and 128, and possibly even shorter (Figure 4, top). As expected, the sparse index is faster than both the LZ index and the hybrid index in count queries, especially for short patterns: specifically, the sparse index is between two and four orders of magnitude faster than all variants of the LZ index, with the largest difference for patterns of length 8 (Figure 3, bottom). The difference between the sparse index and variant LZ1 shrinks as pattern length increases. Similar trends hold for the hybrid index. The full, bidirectional and light indexes show similar count times as the sparse index. The disk size of the CDAWG is comparable to the disk size of RLCSA with sampling rate between 4 and 8 (Figure 4, bottom). Using the succinct representation of the CDAWG (blue dots in all plots) shaves between 20% and 30% of the disk size and resident set of the non-succinct representation (blue circles). However, using the non-succinct representation shaves between 20% and 80% of the time of the succinct representation, depending on dataset and pattern length. Using the CDAWG to answer locate queries does not achieve any new tradeoff with long patterns (Figure 1, bottom). However, with short patterns the running time per occurrence of the CDAWG is between 4 and 10 times smaller than the running time per occurrence of a version of RLCSA that uses comparable memory, and with patterns of length two the CDAWG achieves speedups even greater than 10. 8 We generate random patterns that contain just characters in {a, c, g, t} using the genpatterns tool from the Pizza&Chili corpus [11]. D. Belazzougui et al. 23:11 Figure 1 Space-time tradeoffs of our indexes (color) and of the state of the art (black). Top row: patterns of length 16. Bottom row: patterns of length 512. For more clarity, RLCSA and sparse index are tested also on additional configurations not mentioned in Section 5. Figure 2 Space-time traeoffs of the CDAWG (blue) compared to RLCSA (triangles) with sampling rate 2i , i ∈ [3..5]. Patterns of length 8, 6, 4, 2 (from left to right). CVIT 2016 23:12 Practical combinations of repetition-aware data structures Figure 3 Locate time per occurrence (top) and count time per pattern (bottom), as a function of pattern length, for the sparse index with skip rate 2i , i ∈ [5..10], the LZ77 index, and the hybrid index. Count plots show also the FM index and RLCSA. Figure 4 (Top) Disk size of the sparse index with skip rate 2i , i ∈ [10..15], compared to the hybrid index with maximum pattern length 2i , i ∈ [3..10], the LZ77 index, and RLCSA with sampling rate 2i , i ∈ [10..15]. (Bottom) Disk size of the CDAWG compared to RLCSA with sampling rate 2i , i ∈ [2..5]. D. Belazzougui et al. 23:13 Acknowledgements. We thank Miguel Ángel Martínez for providing implementations of the variants described in [17], and Daniel Valenzuela for providing the implementation described in [32]. 6 Future work Designing indexes for repetitive texts is an increasingly active field and it is beyond the scope of this paper to review all the recent proposals — see, e.g., [10, 14, 31, 32] — especially since some have not been implemented. We would like to draw attention to an index described simultaneously and independently by Do et al. [8] and Gagie et al. [12], however, because we think it can be improved and made competitive in practice. Their index is intended for collections of many similar strings, such as databases of genomes from the same species. The main idea is to choose one of the strings as a reference and build an FM-index for the Relative Lempel-Ziv parse [19] of the entire dataset with respect to that reference, treating the phrases as meta-characters. Using FM-indexes for the reference and its reverse and some auxiliary data structures, we can apply dynamic programming to quickly compute all the ways any given pattern can be decomposed into the suffix of a phrase (possibly empty), a sequence of complete phrases, and the prefix of a phrase (possibly empty). This is possible because the dictionary of potential phrases — i.e., all the substrings of the reference — is fixed, albeit very large, and does not change while we parse (in contrast to the dictionaries for LZ77 and LZ78). Using the FM-index for the parse and some more auxiliary data structures, we can quickly find whether and where any of the possible decompositions of the pattern occur in the the parse of the dataset. These occurrences correspond to occurrences of the pattern that cross phrase boundaries. We can then quickly find all the other occurrences of the pattern in the dataset. Unfortunately, if there are many distinct phrases in the parse, the FM-index for it may not compress well. This raises the question of how we can reduce the number of distinct phrases without increasing the number of phrases too much. Suppose we build a compressed kth-order de Bruijn graph for the collection of strings (i.e., a kth-order de Bruijn graph in which we have collapsed every maximal path whose internal nodes have in- and out-degree 1); assign each of its edges with a distinct meta-character; consider each string as a walk on the graph and, for each edge the walk crosses, replacing the substring causing us to cross that edge by the edge’s meta-character. This results in a parse in which the number of distinct phrases is the number of edges in the graph (assuming each of the strings in the collection has length at least k). Notice also that, for any pattern of length at least k, the pattern corresponds to at most one walk on the uncompressed graph (which may start and finish in the middle of edges in the compressed graph); if there is no such walk, then the pattern does not occur in the collection. Using a de Bruijn graph also removes the need for choosing a reference and using range reporting. We may be able to improve the compression by, first, removing low-frequency edges in the original de Bruijn graph before compressing it and, second, replacing substrings only when they cause us to cross high-frequency edges with sufficiently long edge labels in the the compressed de Bruijn graph. With this modification, a pattern may appear in the collection even if it does not correspond to a walk on the uncompressed graph. However, if a substring causes us to cross a high-frequency edge with a long edge label in the compressed graph, then we can certainly replace that substring by the edge’s meta-character. It follows that, for any pattern of length at least k, we need perform at most four searches in the FM-index for the parse to determine whether and where that pattern occurs in the collection. CVIT 2016 23:14 Practical combinations of repetition-aware data structures We plan to implement and test this modification of Do et al.’s and Gagie et al.’s index soon and report the results in a future paper. Acknowledgements. We thank Miguel Ángel Martínez for providing implementations of the variants described in [17], and Daniel Valenzuela for providing the implementation described in [32]. References 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Diego Arroyuelo, Gonzalo Navarro, and Kunihiko Sadakane. Stronger Lempel-Ziv based compressed text indexing. Algorithmica, 62(1-2):54–101, 2012. Djamal Belazzougui. Linear time construction of compressed text indices in compact space. In Proceedings of the 46th Annual ACM Symposium on Theory of Computing, pages 148– 193. ACM, 2014. Djamal Belazzougui, Fabio Cunial, Travis Gagie, Nicola Prezza, and Mathieu Raffinot. Composite repetition-aware data structures. In Combinatorial Pattern Matching, pages 26–39. Springer, 2015. Anselm Blumer, Janet Blumer, David Haussler, Ross McConnell, and Andrzej Ehrenfeucht. Complete inverted files for efficient text retrieval and analysis. Journal of the ACM, 34(3):578–595, 1987. Timothy M Chan, Kasper Green Larsen, and Mihai Pătraşcu. Orthogonal range searching on the RAM, revisited. In Proceedings of the twenty-seventh annual symposium on computational geometry, pages 1–10. ACM, 2011. Maxime Crochemore and Christophe Hancart. Automata for matching patterns. In Handbook of formal languages, pages 399–462. Springer, 1997. Maxime Crochemore and Renaud Vérin. Direct construction of compact directed acyclic word graphs. In Alberto Apostolico and Jotun Hein, editors, CPM, volume 1264 of Lecture Notes in Computer Science, pages 116–129. Springer, 1997. Huy Hoang Do, Jesper Jansson, Kunihiko Sadakane, and Wing-Kin Sung. Fast relative lempel-ziv self-index for similar sequences. Theoretical Computer Science, 532:14–30, 2014. Peter Elias and Richard A Flower. The complexity of some simple retrieval problems. Journal of the ACM (JACM), 22(3):367–379, 1975. Hector Ferrada, Travis Gagie, Tommi Hirvola, and Simon J. Puglisi. Hybrid indexes for repetitive datasets. Philosophical Transactions of the Royal Society of London A, 372(2016), 2014. Paolo Ferragina and Gonzalo Navarro. Pizza&Chili repetitive corpus. http://pizzachili. dcc.uchile.cl/repcorpus.html. Accessed: 2016-04-10. Travis Gagie, Pawel Gawrychowski, Juha Kärkkäinen, Yakov Nekrich, and Simon J. Puglisi. A faster grammar-based self-index. In Proceedings of the 6th Conference on Language and Automata Theory and Applications, pages 240–251, 2012. Travis Gagie, Paweł Gawrychowski, Juha Kärkkäinen, Yakov Nekrich, and Simon J Puglisi. LZ77-based self-indexing with faster pattern matching. In LATIN 2014: Theoretical Informatics, pages 731–742. Springer, 2014. Travis Gagie, Pawel Gawrychowski, Juha Kärkkäinen, Yakov Nekrich, and Simon J. Puglisi. Lz77-based self-indexing with faster pattern matching. In Proceedings of the 11th Latin American Symposium on Theoretical Informatics, pages 731–742, 2014. Simon Gog, Timo Beller, Alistair Moffat, and Matthias Petri. From theory to practice: Plug and play with succinct data structures. In 13th International Symposium on Experimental Algorithms, (SEA 2014), pages 326–337, 2014. D. Belazzougui et al. 23:15 16 Juha Kärkkäinen and Esko Ukkonen. Lempel-Ziv parsing and sublinear-size index structures for string matching. In Proc. 3rd South American Workshop on String Processing (WSP’96, pages 141–155, 1996. 17 Sebastian Kreft. Self-index based on lz77. Master’s thesis, Department of Computer Science, University of Chile, 2010. 18 Sebastian Kreft and Gonzalo Navarro. On compressing and indexing repetitive sequences. Theoretical Computer Science, 483:115–133, 2013. 19 Shanika Kuruppu, Simon J. Puglisi, and Justin Zobel. Relative lempel-ziv compression of genomes for large-scale storage and retrieval. In Proceedings of the 17th Symposium on String Processing and Information Retrieval, pages 201–206, 2010. 20 Veli Mäkinen and Gonzalo Navarro. Succinct suffix arrays based on run-length encoding. In Combinatorial Pattern Matching, pages 45–56. Springer, 2005. 21 Veli Mäkinen, Gonzalo Navarro, Jouni Sirén, and Niko Välimäki. Storage and retrieval of highly repetitive sequence collections. Journal of Computational Biology, 17(3):281–308, 2010. 22 Donald R Morrison. Patricia—practical algorithm to retrieve information coded in alphanumeric. Journal of the ACM (JACM), 15(4):514–534, 1968. 23 J. Ian Munro and Venkatesh Raman. Succinct representation of balanced parentheses and static trees. SIAM J. Comput., 31(3):762–776, March 2002. URL: http://dx.doi.org/ 10.1137/S0097539799364092, doi:10.1137/S0097539799364092. 24 Adam Novak. Convenient repository for/fork of the RLCSA library. https://github.com/ adamnovak/rlcsa. Accessed: 2016-04-10. 25 Igor Pavlov. P7ZIP home. http://p7zip.sourceforge.net. Accessed: 2016-04-10. 26 Nicola Prezza. lz-rlbwt: Run-length compressed Burrows-Wheeler transform with LZ77 suffix array sampling. https://github.com/nicolaprezza/lz-rlbwt. Accessed: 2016-0410. 27 Nicola Prezza. lz-rlbwt-sparse: Run-length compressed Burrows-Wheeler transform with sparse LZ77 suffix array sampling. https://github.com/nicolaprezza/ lz-rlbwt-sparse. Accessed: 2016-04-10. 28 Mathieu Raffinot. locate-cdawg: Replacing sampling by CDAWG localisation in BWT indexing approaches. https://github.com/mathieuraffinot/locate-cdawg. Accessed: 2016-04-10. 29 Mathieu Raffinot. On maximal repeats in strings. 80(3):165–169, 2001. 30 Jouni Sirén, Niko Välimäki, Veli Mäkinen, and Gonzalo Navarro. Run-length compressed indexes are superior for highly repetitive sequence collections. In String Processing and Information Retrieval, 15th International Symposium, SPIRE 2008, Melbourne, Australia, November 10-12, 2008., pages 164–175, 2008. 31 Yoshimasa Takabatake, Yasuo Tabei, and Hiroshi Sakamoto. Improved esp-index: A practical self-index for highly repetitive texts. In Proceedings of the 13th Symposium on Experimental Algorithms, pages 338–350, 2014. 32 Daniel Valenzuela. CHICO: A compressed hybrid index for repetitive collections. In Proceedings of the fifteenth International Symposium on Experimental Algorithms (SEA 2016), Lecture Notes in Computer Science. Springer, June 2016. 33 Dan E Willard. Log-logarithmic worst-case range queries are possible in space Theta(n). Information Processing Letters, 17(2):81–84, 1983. 34 Jacob Ziv and Abraham Lempel. A universal algorithm for sequential data compression. IEEE Transactions on information theory, 23(3):337–343, 1977. Information Processing Letters, CVIT 2016 23:16 Practical combinations of repetition-aware data structures A Proof of Lemma 1 We use the algorithm described in [2] to enumerate a representation of every node of STT # by performing a depth-first traversal of the suffix link tree of T #. Such algorithm works in O(n · tEL ) time and in O(σ 2 log2 n) bits of working space9 , and it provides, for each node v, its interval in BWTT # and the length of its label, as well as the list of all its children, and for every such child w, the interval of w in BWTT # and the first character of the label of edge (v, w) in STT # . Since the label of every node of the CDAWG is a maximal repeat of T #, the set of nodes of the CDAWG (excluding the sink Ω) is in one-to-one correspondence with a subset of the nodes of the suffix tree. Specifically, a node v of STT # corresponds to a node v 0 of the CDAWG if and only if `(v) is a left-maximal substring of T #. We can check the left-maximality of `(v) by counting the number of distinct characters in the BWT interval of v. Every time this number is greater than one, we have discovered a new node v 0 of the CDAWG, and we assign to it a unique identifier by incrementing a global counter. Then, we scan every child w of v in STT # , and we store in a hash table a tuple (i, j, v 0 .id, |`(v)|, c), where [i..j] is the interval of w and is used as key, and v 0 .id is the unique number assigned to v 0 . Note that every quadruplet we insert in the hash table has a unique key. If the BWT interval of w is of length one, then w is a leaf, an arc connects v 0 in the CDAWG to the sink Ω with character c, and c is the first character of the label of edge (v, w) in STT # . We compute the starting position of `(v) · c for of all such arcs (v 0 , Ω) in the CDAWG in batch, by inverting BWTT # and querying the hash table. The hash table can be implemented to support both insertion and querying in O(1) randomized time. BWT inversion takes O(n · tLF ) time and an amount of memory that can be charged to the output. To build all arcs of the CDAWG that are not directed to the sink, we perform another traversal of the suffix-link tree, in the same order as the first traversal. Assume that, during this second traversal, we enumerate a node w whose BWT interval is present in the hash table: then, w is the child of a node v of the suffix tree that corresponds to a node v 0 of the CDAWG. If w corresponds to a node w0 of the CDAWG as well, i.e. if `(w) if a left-maximal substring of T #, we add arc (v 0 , w0 ) to the CDAWG. Otherwise w is not left-maximal, thus the CDAWG must contain arc (v 0 , u0 ) where `(u0 ) = W · `(w) is the shortest left-extension of `(w) to be left-maximal, and the corresponding node u in the suffix tree can be reached from w by a unary path in the suffix-link tree. Thus, we keep an auxiliary buffer, initially empty. Every time we encounter a node w of the suffix tree whose interval [i..j] is such that a tuple (i, j, v 0 .id, |`(v 0 )|, c) exists in the hash table, we append to the buffer tuple (v 0 .id, |`(w)|−|`(v 0 )|, c). Moreover, if w is left-maximal, we empty the buffer and we transform every tuple (v 0 .id, k, c) in the buffer into an arc (v 0 .id, w0 .id, k, c) of the CDAWG. The size of such buffer can be charged to the output. B Proof of Lemma 2 We proceed as in Appendix A, traversing the suffix-link tree of T #, and enumerating the intervals in BWTT # of every node of the suffix tree of T #, i.e. of every right-maximal substring of T #. Once we detect that a node v is also left-maximal in T #, we create a 9 The enumeration algorithm described in [2] uses the stack trick to fit the working space in O(σ 2 log2 n) bits. Without such trick, the working space would be proportional to the largest number of left-extensions of maximal repeats that lie in the same path of the suffix-link tree of T #, which can be charged to the output of Lemma 1. D. Belazzougui et al. 23:17 new node v 0 of the CDAWG, we assign a new unique identifier to it, we enumerate all the left-extensions c · `(v) in T #, and we push tuple (i, j, v 0 .id, |`(v)|, c) in a hash table, where [i..j] is the interval of c · `(v) in BWTT # and is used as key, and v 0 .id is the unique number assigned to v 0 . If the BWT interval of c · `(v) is of length one, an arc connects v 0 to the sink Ω with character c in the CDAWG. We compute the starting position in T # of c · `(v) for of all such arcs (v 0 , Ω) in the CDAWG in batch, by inverting BWTT # and querying the hash table. Note that, since we are possibly pushing the intervals in BWTT # of the destinations of implicit Weiner links in the suffix tree of T #, the hash table has to allow the presence of distinct tuples with the same key. To build all arcs of the CDAWG that are not directed to the sink, we perform another traversal of the suffix-link tree of T #, in the same order as the first traversal. Assume that, during this second traversal, we enumerate a node w of the suffix tree of T # whose interval in BWTT # is present in the hash table in a set of tuples T = {(i, j, v 0 .id, |`(v)|, c)}. If w corresponds to a node w0 of the CDAWG as well, i.e. if `(w) if a left-maximal substring of T #, we add arc (v 0 , w0 ) to the CDAWG for every tuple in T . Otherwise w is not left-maximal in T #, thus the CDAWG must contain arc (v 0 , u0 ) for every tuple in T , where `(u0 ) = W · `(w) is the shortest left-extension of `(w) to be left-maximal in T #, and the corresponding node u in the suffix tree of T # can be reached from w by a unary path in the suffix-link tree of T #. Thus, we keep an auxiliary buffer, initially empty. Every time we encounter a node w of the suffix tree of T # whose interval [i..j] is such that a set of tuples T exists in the hash table, we append to the buffer a corresponding set of tuples {(v 0 .id, |`(w)|, c)}. Moreover, if w is left-maximal in T #, we empty the buffer and we transform every tuple (v 0 .id, k, c) in the buffer into an arc (v 0 .id, w0 .id, |`(w)| − k + 1, c) of the CDAWG. The size of such buffer can be charged to the output. C Speeding up locate queries on indexes based on RLBWT and LZ factors On indexes based on RLBWT and LZ factors, locate queries can be further engineered in a number of ways: 1. Thanks to the RLBWT, we know the total number of occurrences of P in T before starting to locate them: thus, we can stop locating as soon as we have found all occurrences. 2. We could add a compressed bitvector first[1..n] that flags a position i iff SAT # [i] = pj for some j ∈ [1..z]. As we backward-search P in BWTT # , we could mark the positions k ∈ [2..m] such that the interval of P [k..m] in BWTT # contains only zeros in first, and discard them in the following steps. For every discarded suffix, this strategy saves a O(m) backward search in the bidirectional index. 3. The four-sided range reporting data structure could use the reversed prefixes T [1..pi ] rather than the reversed prefixes T [1..pi − 1] for all i ∈ [1..z]. This would allow checking, at position k in P , whether P [1..k − 1] ends at a position j of T such that j is the last position of a factor, and such that T [j + 1] = P [k]. To implement an ever more stringent filter, one could store an additional four-sided range reporting data structure that uses the reversed prefixes T [1..pi − 1 + h] for h > 1, reverting to the four-sided data structure for h = 1 when k > m − h. 4. In the bidirectional index, we could quit the synchronized backward search for P [1..k − 1] in BWTT # as soon as we find a suffix P [i..k − 1] which is not right-maximal, and which is not followed by P [k] in T #, or which does not contain a factor as a suffix. Moreover, we could quit the backward search as soon as we detect that P [i..k − 1] is right-maximal, CVIT 2016 23:18 Practical combinations of repetition-aware data structures but it is neither a factor nor the suffix of a factor, and it does not contain a factor as a suffix. Such tests can be implemented e.g. using variations of function I, and by replacing the interval of P [1..k − 1] with the σ + 1 subintervals of P [1..k − 1] · a for all a ∈ [0..σ], as described in [2]. Every backward step would have a O(σ) overhead in this case. 5. In the bidirectional index, we could speed up the backward search that we have to perform for every P [1..k − 1], by precomputing a table of intervals in BWTT # and BWTT # for all strings of length h. This would take at most 4σ h log n bits of additional space, or at most z(h log σ + 4 log n) bits if we just store the h-mers that suffix a factor. Due to lack of space, in the main paper we study just the effects of the first two optimizations.
8cs.DS
The Power of Data Reduction for Matching George B. Mertzios1 , André Nichterlein∗1,2 , and Rolf Niedermeier2 arXiv:1609.08879v2 [cs.DS] 16 Mar 2017 1 School of Engineering and Computing Sciences, Durham University, UK, [email protected] 2 Institut für Softwaretechnik und Theoretische Informatik, TU Berlin, Germany, {andre.nichterlein,rolf.niedermeier}@tu-berlin.de Abstract Finding maximum-cardinality matchings in undirected graphs is arguably one of the most central √ graph primitives. For m-edge and n-vertex graphs, it is well-known to be solvable in O(m n) time; however, for several applications this running time is still too slow. We investigate how linear-time (and almost linear-time) data reduction (used as preprocessing) can alleviate the situation. More specifically, we focus on (almost) linear-time kernelization. We start a deeper and systematic study both for general graphs and for bipartite graphs. Our data reduction algorithms easily comply (in form of preprocessing) with every solution strategy (exact, approximate, heuristic), thus making them attractive in various settings. 1 Introduction “Matching is a powerful piece of algorithmic magic” [18]. In Matching, given a graph, one has to compute a maximum-cardinality set of nonoverlapping edges. Matching is arguably among the most fundamental graph-algorithmic primitives allowing for a polynomial-time algorithm. More √ specifically, on an n-vertex and m-edge graph a maximum matching can be found in O(m n) time [17]. Improving this upper time bound, even for bipartite graphs, resisted decades of research. Recently, however, Duan and Pettie [8] presented a linear-time algorithm that computes a (1 − ǫ)approximate maximum-weight matching, where the running time dependency on ǫ is ǫ−1 log(ǫ−1 ). √ For the unweighted case, the O(m n) algorithm of Micali and Vazirani [17] implies a lineartime (1 − ǫ)-approximation, where in this case the running time dependency on ǫ is ǫ−1 [8]. We take a different route: First, we do not give up the quest for optimal solutions. Second, we focus on efficient data reduction rules—not solving an instance but significantly shrinking its size before actually solving the problem1 . In the context of decision problems, in parameterized algorithmics this is known as kernelization, a particularly active area of algorithmic research on NP-hard problems. The spirit behind our approach is thus closer to the identification of efficiently (i.e. linearly) solvable special cases of Matching. There is quite some body of work in this direction. For instance, since an augmenting path can be found in linear time [10], the standard augmenting path-based algorithm runs in O(s(n + m)) time, where s is the number of edges in the maximum matching. Yuster [20] developed an O(rn2 log n)-time algorithm, where r is the difference between maximum and minimum vertex degree of the input graph. Moreover, there are linear-time algorithms for computing maximum matchings in special graph classes, including convex bipartite [19], strongly chordal [7], and chordal bipartite graphs [6]. All this and the more general spirit of “parameterization for polynomial-time solvable problems” [12] (also referred to as “FPT in P” or “FPTP” for short) forms the starting point of our ∗ Supported by a postdoc fellowship of the German Academic Exchange Service (DAAD) while at Durham University. 1 Doing so, however, we focus here on the unweighted case. Parameter k Table 1: Our kernelization results. running time kernel size Results for Matching Feedback edge number Feedback vertex number O(n + m) time O(kn) time Results for Bipartite Matching Distance to chain graphs O(n + m) time O(k) vertices and edges 2O(k) vertices and edges (Theorem 2.3) (Theorem 2.19) O(k 3 ) vertices (Theorem 3.10) research. Remarkably, Fomin et al. [9] recently developed an algorithm to compute a maximum matching in graphs of treewidth k in O(k 4 n log n) randomized time. Following the paradigm of kernelization, that is, provably effective and efficient data reduction, we provide a systematic exploration of the power of polynomial-time data reduction for Matching. Thus, our aim (fitting within FPTP) is to devise problem kernels that are computable in (almost) linear time. A particular motivation for this is that with such very efficient kernelization algorithms it is possible to transform multiplicative (O(f (k)(n+m)) into additive (O(f ′ (k)+n+m)) “(almost) linear-time FPTP” algorithms. Furthermore, kernelization algorithms (typically based on data reduction rules) can be used as a preprocessing to heuristics or approximation algorithms with the goal of getting larger matchings. As kernelization is usually defined for decision problems, we use in the remainder of the paper the decision version of Matching. In a nutshell, a kernelization of a decision problem instance is an algorithm that produces an equivalent instance whose size can solely be upper-bounded by a function in the parameter (preferably a polynomial). The focus on decision problems is justified by the fact that all our results, although formulated for the decision version, in a straightforward way extend to the corresponding optimization version. (Maximum-Cardinality) Matching Input: An undirected graph G = (V, E) and a nonnegative integer s. Question: Is there a size s subset MG ⊆ E of nonoverlapping (i.e. disjoint) edges? Since solving the given instance and returning a trivial yes- or no-instance always produces a constant-size kernel in polynomial time, we are looking for kernelization algorithms that are faster than the algorithms solving the problem. For NP-hard problems, each kernelization algorithm, since running in polynomial time, is (presumably) faster than any solution algorithm. This is, of course, no longer true when applying kernelization to a polynomial-time solvable problem like Matching. While the focus of classical kernelization for NP-hard problems is mostly on improving the size of the kernel, we particularly emphasize that for polynomially solvable problems it now becomes crucial to also focus on the running time of the kernelization algorithm. Moreover, the parameterized complexity analysis framework can also be applied to the kernelization algorithm itself. For example, a kernelization algorithm running in O(k 5 n) time (k is the “problem specific” parameter) might be preferable to another one running in O(n3 ) time. In this paper, we present kernelization algorithms for Matching which run in linear time (see Sections 2.1 and 3) or in almost linear time (i.e. in O(kn) time, see Section 2.2). Our contributions. In this paper we present three efficiently computable kernels for Matching (see Table 1 for an overview). All our parameterizations can be categorized as “distance to triviality” [13]. They are motivated as follows. First, note that maximum-cardinality matchings be can trivially found in linear time on trees (or forests). So we consider the corresponding edge deletion distance (feedback edge number) and vertex deletion distance (feedback vertex number). Notably, there is a trivial linear-time algorithm for computing the feedback edge number and there is a linear-time factor-4 approximation algorithm for the feedback vertex number [1]. We mention in passing that the parameter vertex cover number, which is lower-bounded by the feedback vertex number, has been frequently studied for kernelization [3, 4]. In particular, 2 Gupta and Peng [14] (implicitly) provided a quadratic-size kernel for Matching with respect to the parameter vertex cover number. Coming to bipartite graphs, note that our parameterization by vertex deletion distance to chain graphs is motivated as follows. First, chain graphs form one the most obvious easy cases for bipartite graphs where Matching can be solved in linear time [19]. Second, we show that the vertex deletion distance of any bipartite graph to a chain graph can be 2-approximated in linear time. Moreover, vertex deletion distance to chain graphs lower-bounds the vertex cover number of a bipartite graph. An overview of our main results is given in Table 1. We study kernelization for Matching parameterized by the feedback vertex number, that is, the vertex deletion distance to a forest (see Section 2). As a warm-up we first show that a subset of our data reduction rules for the “feedback vertex set kernel” also yields a linear-time computable linear-size kernel for the typically much larger parameter feedback edge number (see Section 2.1). As for Bipartite Matching no faster algorithm is known than on general graphs, we kernelize Bipartite Matching with respect to the vertex deletion distance to chain graphs (see Section 3). Seen from a high level, our two main results employ the same algorithmic strategy, namely upper-bounding (as a function of the parameter) the number of neighbors in the appropriate vertex deletion set X; that is, in the feedback vertex set or in the deletion set to chain graphs, respectively. To achieve this we develop new “irrelevant edge techniques” tailored to these two kernelization problems. More specifically, whenever a vertex v of the deletion set X has large degree, we efficiently detect edges incident to v whose removal does not change the size of the maximum matching. Then the remaining graph can be further shrunk by scenario-specific data reduction rules. While this approach of removing irrelevant edges is natural, the technical details and the proofs of correctness can become quite technical and combinatorially challenging. In particular, for the case of feedback vertex number k we could only upper-bound the number of neighbors of each vertex in X by 2O(k) . As a technical side remark, we emphasize that in order to achieve an (almost) linear-time kernelization algorithm, we often need to use suitable data structures and to carefully design the appropriate data reduction rules to be exhaustively applicable in linear time, making this form of “algorithm engineering” much more relevant than in the classical setting of mere polynomial-time data reduction rules. Notation and Observations. We use standard notation from graph theory. In particular all paths we consider are simple paths. Two paths in a graph are called internally vertex-disjoint if they are either completely vertex-disjoint or they overlap only in their endpoints. A matching in a graph is a set of pairwise disjoint edges. Let G = (V, E) be a graph and let M ⊆ E be a matching in G. The degree of a vertex is denoted by deg(v). A vertex v ∈ V is called matched with respect to M if there is an edge in M containing v, otherwise v is called free with respect to M . If the matching M is clear from the context, then we omit “with respect to M ”. An alternating path with respect to M is a path in G such that every second edge of the path is in M . An augmenting path is an alternating path whose endpoints are free. It is well known that a matching M is maximum if and only if there is no augmenting path for it. Let M ⊆ E and M ′ ⊆ E be two matchings in G. We denote by G(M, M ′ ) := (V, M △ M ′ ) the graph containing only the edges in the symmetric difference of M and M ′ , that is, M △ M ′ := M ∪ M ′ \ (M ∩ M ′ ). Observe that every vertex in G(M, M ′ ) has degree at most two. max For a matching M ⊆ E for G we denote by MG (M ) a maximum matching in G with the max largest possible overlap (in number of edges) with M . That is, MG (M ) is a maximum matching ′ max in G such that for each maximum matching M for G it holds that |M △ M ′ | ≥ |M △ MG (M )|. max Observe that, if M is a maximum matching for G, then MG (M ) = M . Furthermore observe max that G(M, MG (M )) consists of only odd-length paths and isolated vertices, and each of these max paths is an augmenting path for M . Moreover the paths in G(M, MG (M )) are as short as possible: max Observation 1.1. For any path v1 , v2 , . . . , vp in G(M, MG (M )) it holds that {v2i−1 , v2j } ∈ /E for every 1 ≤ i < j ≤ p/2. 3 Proof. Assume that {v2i−1 , v2j } ∈ E. Then v1 , v2 , . . . , v2i−2 , v2i−1 , v2j , v2j+1 , . . . , vp is a shorter path which is also an augmenting path for M in G. The corresponding maximum matching M ′ max max satisfies |M △ MG (M )| > |M △ M ′ |, a contradiction to the definition of MG (M ). Observation 1.2. Let G = (V, E) be a graph with a maximum matching MG , let X ⊆ V be a vertex subset of size k, and let MG−X be a maximum matching for G − X. Then, |MG−X | ≤ |MG | ≤ |MG−X | + k. Kernelization. A parameterized problem is a set of instances (I, k) where I ∈ Σ∗ for a finite alphabet Σ, and k ∈ N is the parameter. We say that two instances (I, k) and (I ′ , k ′ ) of parameterized problems P and P ′ are equivalent if (I, k) is a yes-instance for P if and only if (I ′ , k ′ ) is a yes-instance for P ′ . A kernelization is an algorithm that, given an instance (I, k) of a parameterized problem P , computes in polynomial time an equivalent instance (I ′ , k ′ ) of P (the kernel ) such that |I ′ | + k ′ ≤ f (k) for some computable function f . We say that f measures the size of the kernel, and if f (k) ∈ k O(1) , we say that P admits a polynomial kernel. Often, a kernel is achieved by applying polynomial-time executable data reduction rules. We call a data reduction rule R correct if the new instance (I ′ , k ′ ) that results from applying R to (I, k) is equivalent to (I, k). An instance is called reduced with respect to some data reduction rule if further application of this rule has no effect on the instance. 2 Kernelization for Matching on General Graphs In this section, we investigate the possibility of efficient and effective preprocessing for Matching. As a warm-up, we first present in Section 2.1 a simple, linear-size kernel for Matching with respect to the parameter “feedback edge set”. Exploiting the data reduction rules and ideas used for this kernel, we then present in Section 2.2 the main result of this section: an exponential-size kernel for the smaller parameter “feedback vertex number”. 2.1 Warm-up: Parameter feedback edge number We provide a linear-time computable linear-size kernel for Matching parameterized by the feedback edge number, that is, the size of a minimum feedback edge set. Observe that a minimum feedback edge set can be computed in linear time via a simple depth-first search or breadth-first search. The kernel is based on the next two simple data reduction rules due to Karp and Sipser [16]. They deal with vertices of degree at most two. Reduction Rule 2.1. Let v ∈ V . If deg(v) = 0, then delete v. If deg(v) = 1, then delete v and its neighbor and decrease the solution size s by one (v is matched with its neighbor). Reduction Rule 2.2. Let v be a vertex of degree two and let u, w be its neighbors. Then remove v, merge u and w, and decrease the solution size s by one. The correctness was stated by Karp and Sipser [16]. For completeness, we give a proof. Lemma 2.1. Reduction Rules 2.1 and 2.2 are correct. Proof. If v has degree zero, then clearly v cannot be in any matching and we can remove v. If v has degree one, then let u be its single neighbor. Let M be a maximum matching of size at least s for G. Then v is matched in M since otherwise adding the edge {u, v} would increase the size of the matching. Thus, a maximum matching in G′ = G − u − v is of size at least s − 1. Conversely, a maximum matching of size s − 1 in G′ can easily be extended by the edge {u, v} to a maximum matching of size s in G. If v has degree two, then let u and w be its two neighbors. Let M a maximum matching of size at least s. If v is not matched in M , then u and w are matched since otherwise adding the edge {u, v} resp. {v, w} would increase the size of the matching. Thus, deleting v and merging u 4 and w decreases the size of M by one (M looses either the edge incident to v or one of the edges incident to u and w). Hence, the resulting graph G′ has a maximum matching of size at least s− 1. Conversely, let M ′ be a matching of size at least s − 1 for G′ . If the merged vertex vw is free, then M := M ′ ∪ {{u, v}} is a matching of size s in G. Otherwise, vw is matched to some vertex y. Then matching y in G with either v or w (at least one of the two vertices is a neighbor of y) and matching u with the other vertex yields a matching of size s for G. Although Reduction Rules 2.1 and 2.2 are correct, it is not clear whether Reduction Rule 2.2 can be exhaustively applied in linear time. However, for our purpose it suffices to consider the following restricted version which we can exhaustively apply in linear time. Reduction Rule 2.3. Let v be a vertex of degree two and u, w be its neighbors with u and w having degree at most two. Then remove v, merge u and w, and decrease s by one. Lemma 2.2. Reduction Rules 2.1 and 2.3 can be exhaustively applied in O(n + m) time. Proof. We give an algorithm which exhaustively applies Reduction Rules 2.1 and 2.3 in linear time. First, using bucket sort, sort the vertices by degree and keep three lists containing all degree-zero/one/two vertices. Then one applies Reduction Rules 2.1 and 2.3 in a straightforward way. When a neighbor of a vertex is deleted, then check if the vertex has now degree zero, one, or two. If yes, then add the vertex to the corresponding list. We next show that this algorithm runs in linear time. First, observe that the deletion of each each degree-zero vertex can be done in constant time as no further vertices are affected. Second, consider a degree-one vertex v with a neighbor u and observe that deleting u and v can be done O(deg(v)) time since one needs to update the degrees of all neighbors of v. Furthermore, decreasing s by one can be done in constant time for each deleted degree-one vertex. Finally, consider a degree-two vertex v with two neighbors u and w, each of degree at most two. Deleting v takes constant time. To merge u and w iterate over all neighbors of u and add them to the neighborhood of w. If a neighbor u′ of u is already a neighbor of w, then decrease the degree of u′ by one. Then, relabel w to be the new contracted vertex uw. Overall, the worst-case running time to apply Reduction Rules 2.1 and 2.3 exhaustively can P be upper-bounded by O(n + v∈V deg(v)) = O(n + m). Theorem 2.3. Matching admits a linear-time computable linear-size kernel with respect to the parameter “feedback edge number” k. Proof. Apply Reduction Rules 2.1 and 2.3 exhaustively in linear time (see Lemma 2.2). We claim that the reduced graph G = (V, E) has less than 12k vertices and 13k edges. Denote with X ⊆ E a ≥3 1 2 feedback edge set for G, |X| ≤ k. Furthermore, denote with VG−X , VG−X , and VG−X the vertices 1 that have degree one, two, and more than two in the G−X. Thus, |VG−X | ≤ 2k as each leaf in G−X ≥3 1 has to be incident to an edge in X. Next, since G−X is a forest (or tree), we have |VG−X | < |VG−X | ≥3 and thus |VG−X | < 2k. Finally, each degree-two vertex in G needs at least one neighbor of degree 2 at least three since G is reduced with respect to Reduction Rule 2.3. Thus, the vertices in VG−X ≥3 are either incident to an edge in X or adjacent to one of the at most |VG−X | + 2k vertices ≥3 in G that have degree at least three. Since the sum over all degrees of vertices in VG−X is at P ≥3 1 2 most v∈V ≥3 degG−X (v) ≤ 2|VG−X | + |VG−X | < 6k, it follows that |VG−X | ≤ 8k. Thus, the G−X ≥3 1 2 number of vertices in G is |VG−X | + |VG−X | + |VG−X | ≤ 12k. Since G − X is a forest, it follows that G has at most |V | + k ≤ 13k edges. √ Applying the O(m n)-time algorithm for Matching [17] on the kernel yields: Corollary 2.4. Matching can be solved in O(n + m + k 1.5 ) time, where k is the feedback vertex number. 5 2.2 Parameter feedback vertex number We next provide for Matching a kernel of size 2O(k) computable in O(kn) time where k is the “feedback vertex number”. Using a known linear-time factor 4-approximation algorithm [1], we can approximate feedback vertex set and use it in our kernelization algorithm. Roughly speaking, our kernelization algorithm extends the linear-time computable kernel with respect to the parameter “feedback edge set”. Thus, Reduction Rules 2.1 and 2.3 play an important role in the kernelization. Compared to the other kernels presented in this paper, the kernel presented here comes at the price of higher running time O(kn) and bigger kernel size (exponential size). It remains open whether Matching parameterized by the “feedback vertex number” admits a linear-time computable kernel (possibly of exponential size), and whether it admits a polynomial kernel computable in O(kn) time. Subsequently, we describe our kernelization algorithm which keeps in the kernel all vertices in the given feedback vertex set X and shrinks the size of G − X. Before doing so, we need some further notation. In this section, we assume that each tree is rooted at some arbitrary (but fixed) vertex such that we can refer to the parent and children of a vertex. A leaf in G − X is called a bottommost leaf either if it has no siblings or if all its siblings are also leaves. (Here, bottommost refers to the subtree with the root being the parent of the considered leaf.) The outline of the algorithm is as follows (we assume throughout that k < log n since otherwise the input instance is already a kernel of size O(2k )): 1. Reduce G wrt. Reduction Rules 2.1 and 2.3. 2. Compute a maximum matching MG−X in G − X. 3. Modify MG−X in linear time such that only the leaves of G − X are free(Section 2.2.1). 4. Bound the number of free leaves in G − X by k 2 (Section 2.2.2). 5. Bound the number of bottommost leaves in G − X by O(k 2 2k )(Section 2.2.3). 6. Bound the degree of each vertex in X by O(k 2 2k ). Then, use Reduction Rules 2.1 and 2.3 to provide the kernel of size 2O(k) (Section 2.2.4). Whenever we reduce the graph at some step, we also show that the reduction is correct. That is, the given instance is a yes-instance if and only if the reduced one is a yes-instance. The correctness of our kernelization algorithm then follows by the correctness of each step. We discuss in the following some details of each step. 2.2.1 Steps 1 to 3 By Lemma 2.2 we can perform Step 1 in linear time. By Lemma 2.1 this step is correct. A maximum matching in Step 2 can be computed by repeatedly matching a free leaf to its neighbor and by removing both vertices from the graph (thus effectively applying Reduction Rule 2.1 to G − X). By Lemma 2.2, this can be done in linear time. Step 3 can be done in O(n) time by traversing each tree in MG−X in a BFS manner starting from the root: If a visited inner vertex v is free, then observe that all children are matched since MG−X is maximum. Pick an arbitrary child u of v and match it with v. The vertex w that was previously matched to u is now free and since it is a child of u, it will be visited in the future. Observe that Steps 2 and 3 do not change the graph but only the auxiliary matching MG−X , and thus these steps are correct. 2.2.2 Step 4. Recall that our goal is to upper-bound the number edges between vertices of X and V \X, since we can then use a simple analysis as for the parameter “feedback edge set”. Furthermore, recall that by Observation 1.2 the size of any maximum matching in G is at most k plus the size of MG−X . 6 Now, the crucial observation is that if a vertex x ∈ X has at least k neighbors in V \ X that are free wrt. MG−X , then there exists a maximum matching where x is matched to one of these k vertices since at most k − 1 can be “blocked” by other matching edges. This means we can delete all other edges incident to x. Formalizing this idea, we obtain the following reduction rule. Reduction Rule 2.4. Let G = (V, E) be a graph, let X ⊆ V be a subset of size k,and let MG−X be a maximum matching for G − X. If there is a vertex x ∈ X with at least k free neighbors Vx = {v1 , . . . , vk } ⊆ V \ X, then delete all edges from x to vertices in V \ Vx . Lemma 2.5. Reduction Rule 2.4 is correct and can be exhaustively applied in O(n + m) time. Proof. We first discuss the correctness and then the running time. Denote by s the size of a maximum matching in the input graph G = (V, E) and by s′ the size of a maximum matching in the new graph G′ = (V ′ , E ′ ), where some edges incident to x are deleted. We need to show that s = s′ . Since any matching in G′ is also a matching in G, we easily obtain s ≥ s′ . It remains max to show s ≤ s′ . To this end, let MG := MG (MG−X ) be a maximum matching for G with the maximum overlap with MG−X (see ??). If x is free wrt. MG or if x matched to a vertex v that is also in G′ a neighbor of x, then MG is also a matching in G′ (MG ⊆ E ′ ) and thus we have in this case s ≤ s′ . Hence, consider the remaining case where x is matched to some vertex v such that {v, x} ∈ / E ′ , that is, the edge {v, x} was deleted by Reduction Rule 2.4. Hence, x has k neighbors v1 , . . . , vk in V \ X such that each of these neighbors is free wrt. MG−X and none of the edges {vi , x}, i ∈ [k], was deleted. Observe that by the choice of MG , the graph G(MG−X , MG ) (the graph over vertex set V and the edges that are either in MG−X or in MG , see ??) contains exactly s− |MG−X | paths (we do not consider isolated vertices as paths). Each of these paths is an augmenting path for MG−X . By Observation 1.2, we have s − |MG−X | ≤ k. Observe that {v, x} is an edge in one of these augmenting paths; denote this path with P . Thus, there are at most k − 1 paths G(MG−X , MG ) that do not contain x. Also, each of these paths contains exactly two vertices that are free wrt. MG−X : the endpoints of the path. This means that no vertex in X is an inner vertex on such a path. Furthermore, since MG−X is a maximum matching, it follows that for each path at most one of these two endpoints is in V \ X. Hence, at most k − 1 vertices of v1 , . . . , vk are contained in the k − 1 paths of G(MG−X , MG ) except P . Therefore, one of these vertices, say vi , is free wrt. MG and can be matched with x. Thus, by reversing the augmentation along P and ′ ′ adding the edge {vi , x} we obtain another matching MG of size s. Observe that MG is a matching ′ ′ for G and for G and thus we have s ≤ s . This completes the proof of correctness. Now we come to the running time. We exhaustively apply the data reduction rule as follows. First, initialize for each vertex x ∈ X a counter with zero. Second, iterate over all free vertices in G − X in an arbitrary order. For each free vertex v ∈ V \ X iterate over its neighbors in X. For each neighbor x ∈ X do the following: if the counter is less than k, then increase the counter by one and mark the edge {v, x} (initially all edges are unmarked). Third, iterate over all vertices in X. If the counter of the currently considered vertex x is k, then delete all unmarked edges incident to x. This completes the algorithm. Clearly, it only deletes edges incident to a vertex x ∈ X only if x has k free neighbors in V \ X and the edges to these k neighbors are kept. The running time is O(n + m): When iterating over all free vertices in V \ X we consider each edge at most once. Furthermore, when iterating over the vertices in X, we again consider each edge at most once. To finish Step 4, we exhaustively apply Reduction Rule 2.4 in linear time. Afterwards, there are at most k 2 free (wrt. to MG−X ) leaves in G − X that have at least one neighbor in X since each of the k vertices in X is adjacent to at most k free leaves. Thus, applying Reduction Rule 2.1 we can remove the remaining free leaves that have no neighbor in X. However, since for each degree-one vertex also its neighbor is removed, we might create new free leaves and need to again apply Reduction Rule 2.4 and update the matching (see Step 3). This process of alternating application of Reduction Rules 2.1 and 2.4 stops after at most k rounds since the neighborhood of each vertex in X can be changed by Reduction Rule 2.4 at most once. This shows the running time O(k(n + m)). We next show how to improve this to O(n + m) and arrive at the final lemma of this subsection. 7 Algorithm 1: Reduce(G, MG−X ). Input: A matching instance (G = (V, E), s) and a feedback vertex set X ⊆ V for G with |X| = k. Output: An equivalent matching instance (G′ , s′ ) such that X is also a feedback vertex set for G′ and a maximum matching MG′ −X for G′ − X such that only at most k2 leaves in G′ − X are free. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Reduce G wrt. Reduction Rules 2.1 and 2.3 Compute a maximum matching MG−X as described in Step 3 foreach x ∈ X do c(x) ← 0 // c(x) will store the number of free neighbors for x foreach e ∈ E do marked(e) ← False L ← stack containing all free leaves in G − X while L is not empty do u ← pop(L) foreach x ∈ NG (u) ∩ X do // Check whether Reduction Rule 2.4 is applicable for x c(x) ← c(x) + 1, marked({u, x}) ← True // fix u as free neighbor of x if c(x) = k then // x has enough free neighbors: apply Reduction Rule 2.4 foreach y ∈ NG (x) ∩ X do delete {x, y} foreach v ∈ NG (x) \ X do if marked({x, v}) = False then delete {x, v} // Next deal with the case that v becomes a degree-one vertex if degG (v) = 1 and v is free then push v on L if degG (v) = 1 and v is matched then delete v and its neighbor, s ← s − 1 if degG (u) = 1 then // u has no neighbors in x v ← neighbor of u in G − X; w ← matched neighbor of v delete u and v from G MG−X ← MG−X \ {{v, w}}, s ← s − 1 // update MG−X and s if w is now a leaf in G − X then add w to L // w is free, so add w to the list of vertices to check else P ← arbitrary alternating path from w to a leaf u′ in the subtree rooted in w augment MG−X along P // ensure that the only free vertices are leaves push u′ on L // u′ is free, add u′ to the list of vertices to check return (G, s) and MG−X . Lemma 2.6. Given a matching instance (G, s) and a feedback vertex set X, Algorithm 1 computes in linear time an instance (G′ , s′ ) with feedback vertex set X and a maximum matching MG′ −X in G′ − X such that the following holds. • There is a matching of size s in G if and only if there is a matching of size s′ in G′ . • Each vertex that is free wrt. MG′ −X is a leaf in G′ − X. • There are at most k 2 free leaves in G′ − X. Proof. In the following, we explain Algorithm 1 which reduces the graph with respect to Reduction Rules 2.1 and 2.4 and updates the matching MG−X as described in Step 3. The algorithm performs in (Lines 1 and 2) Steps 1 to 3. As described in the previous section, this can be done in linear time. Next, Reduction Rule 2.4 is applied in Lines 8 to 17 using the approach described in the proof of Lemma 2.5: For each vertex in x a counter c(x) is maintained. When iterating over the free leaves in G − X, these counters will be updated. If a counter c(x) reaches k, then the algorithm knows that x has k fixed free neighbors and according to Reduction Rule 2.4 8 the edges to all other vertices can be deleted (see Line 10). Observe that once the counter c(x) reaches k, the vertex x will never be considered again by the algorithm since its only remaining neighbors are free leaves in G − X that already have been popped from stack L. The only difference from the description in the proof of Lemma 2.5 is that the algorithm reacts if the degree of some vertex v in G − X is decreased to one (see Lines 15 to 17). If v is matched, then simply remove v and its matched neighbor from G and MG−X . Otherwise, add v to the list L of unmatched degree-one vertices and defer dealing with v to a latter stage of the algorithm. Observe that the matching MG−X still satisfies the property that each free vertex in G − X is a leaf since only matched vertex pairs were deleted so far. When deleting unmatched degree-one vertices and their respective neighbor, the maximum matching MG−X needs to be updated to satisfy this property. The algorithm does this from Lines 18 to 27: Let u be an entry in L such that u has degree one in Line 18, that is, u is a free leaf in G − X and has no neighbors in X. Then, following Reduction Rule 2.1, delete u and its neighbor v and decrease the solution size s by one (see Lines 20 and 21). Let w denote the previously matched neighbor of v. Since v was removed, w is now free. If w is a leaf in G − X, then we can simply add it to L and in this way deal with it later. If w is not a leaf, then we need to update MG−X since only leaves are allowed to be free. To this end, take an arbitrary alternating path P from w to a leaf u′ of the subtree with root w and augment along P (see Lines 25 and 26). This can be done as follows: Pick an arbitrary child w1 of w. Let w2 be the matched neighbor of w1 . Since w is the parent of w1 , it follows that w2 is a child of w1 . Now, remove {w1 , w2 } from MG−X and add {w1 , w}. If w2 is a leaf, then the alternating path P is found with u′ = w2 and augmented. Otherwise, repeat the above procedure with w2 taking the role of w. This completes the algorithm. Its correctness follows from the fact that it only deletes edges and vertices according to Reduction Rules 2.1 and 2.4. It remains to show the running time of O(n + m). To this end, we prove that the algorithm considers each edge in E only two times. First, consider the edges incident to a vertex x ∈ X. These edges will be inspected at most twice by the algorithm: Once, when it is marked (see Line 9). The second time is when it is deleted. This bounds the running time in the first part (Lines 8 to 17). Now consider the remaining edges within G − X. To this end, observe that the algorithm performs two actions on the edges: deleting the edges (Line 20) and finding and augmenting along an alternating path (Lines 25 and 26). Clearly, after deleting an edge it will no longer be considered, so it remains to show that edge is part of at most one alternating path used in Lines 25 and 26. Assume toward a contradiction that the algorithm augments along an edge twice or more. From all the edges that are augmented twice or more let e ∈ E be one that is closest to the root of the tree e is contained in, that is, there is no edge closer to a root. Let w1 and u′1 be the endpoints of the first augmenting path P1 containing e and w2 and u′2 the endpoints of the second augmenting path P2 containing e. Observe that for each augmenting path chosen in Line 25 it holds that one endpoint is a leaf and the other endpoint is an ancestor of this leaf. Assume without loss of generality that u′1 and u′2 are the leaves and w1 and w2 are their respective ancestors. Let u1 and v1 (u2 and v2 ) be the vertices deleted in Line 20 which in turn made w1 (w2 ) free. Observe that e does not contain any of these four vertices u1 , v1 , u2 , v2 since before augmenting P1 (P2 ) the vertices u1 and v1 (u2 and v2 ) are deleted. Since e is contained in both paths, either w1 is an ancestor of w2 or vice versa: the case w1 = w2 cannot happen since for the second augmenting path the endpoint w2 = w1 would not be matched to v2 ; a contradiction (see Line 19). We next consider the case that w1 is an ancestor of w2 (the other case will be handled subsequently). Denote with w2′ the neighbor of w2 on P ′ . Observe that e = {w2 , w2′ } since e is chosen as being closest to the root. We next distinguish the two cases whether or not e is initially matched. If e is initially free, then e is matched after augmenting along P1 . Then, by choice of P2 , e is not changed until the augmentation along P2 . This, however, is a contradiction since augmenting along P2 only happens after the matched edge {w2 , v2 } is deleted. Since w2′ 6= v2 and e is matched all the time until u2 and v2 are deleted, this means that w2 would be matched to two vertices. Thus, consider the case that e is initially matched. Then, after augmenting along P1 , e is free and w2 is matched to its parent pw2 . As a consequence, v2 is not matched to w2 , neither before 9 nor after the augmentation of P1 . Since the algorithm augments along P2 only after it deleted u2 and v2 where v2 is matched to w2 , it follows that the edge {w2 , v2 } is augmented before the algorithm augments along P2 . Denote with P3 the augmenting path containing the edge {w2 , v2 }. Since w2 is apparently not a free leaf, it follows that P3 needs to contain the matched neighbor of w2 , which is pw2 . This means that the edge {w2 , pw2 } is augmented at least twice (through P1 and P3 ). However, {w2 , pw2 } is closer to the root than e = {w2 , w2′ }, a contradiction to the choice of e. This completes the case that w1 is an ancestor of w2 . We now consider the remaining case where w2 is an ancestor of w1 . In this case we have e = {w1 , w1′ } where w1′ is the neighbor of w1 on P1 . Observe that w1′ is a child of w1 . Furthermore, observe that after the augmentation along P1 the leaf u′1 is free and can be reached by an alternating path from w1 . Hence, before and after the augmentation along P1 it holds that w1 can reach exactly one free leaf via an alternating path (u1 and u′1 ). Observe that this is true even if the algorithm removes u′1 since then a new free leaf will be created. Thus, before deleting u2 and v2 (right before the augmentation along P2 ), there is an augmenting path in G − X from u2 to w1 and to the free leaf reachable from w1 . This is a contradiction to the fact that the matching MG−X is maximum. We conclude that each edge in E will be augmented at most once. Thus, the algorithm considers each edge at most twice (when augmenting it and when deleting it). Hence, the algorithm runs in linear time. Summarizing, in Step 4 we apply Algorithm 1 in order to obtain an instance with at most k 2 free vertices in G − X that are all leaves. By Lemma 2.6 this can be done in linear time. Furthermore, Lemma 2.6 also shows that the step is correct. 2.2.3 Step 5 In this step we reduce the graph in O(kn) time so that at most k 2 (2k + 1) bottommost leaves will remain in the forest G − X. We will restrict ourselves to consider leaves that are matched with their parent vertex in MG−X and that do not have a sibling. We call these bottommost leaves interesting. Any sibling of a bottommost leaf is by definition also a leaf. Thus, at most one of these leaves (the bottommost leaf or its siblings) is matched with respect to MG−X and all other leaves are free. Recall that in the previous step we upper-bounded the number of free leaves with respect to MG−X by k 2 . Hence there are at most k 2 bottommost leaves that are not interesting. Our general strategy for this step is to extend the idea behind Reduction Rule 2.4: We want to keep for each pair of vertices x, y ∈ X at most k different internally vertex-disjoint augmenting paths from x to y. (For ease of notation we keep k paths although keeping k/2 is sufficient.) In this step, we only consider augmenting paths of the form x, u, v, y where v is a bottommost leaf and u is v’s parent in G − X. Assume that the parent u of v is adjacent to some vertex x ∈ X. Observe that in this case any augmenting path starting with the two vertices x and u has to continue to v and end in a neighbor of v. Thus, the edge {x, u} can be only used in augmenting paths of length three. Furthermore, all these length-three augmenting paths are clearly internally vertex-disjoint. If we do not need the edge {x, u} because we kept k augmenting paths from x already, then we can delete {x, u}. Furthermore, if we deleted the last edge from u to X (or u had no neighbors in X in the beginning), then u is a degree-two vertex in G and can be removed by applying Reduction Rule 2.2. As the child v of u is a leaf in G − X, it follows that v has at most k+1 neighbors in G. We show below (Lemma 2.7) that the application of Reduction Rule 2.2 to remove u takes O(k) time. As we remove at most n vertices, at most O(kn) time is spent on Reduction Rule 2.2 in this step. We now show that after a simple preprocessing one application of Reduction Rule 2.2 in the algorithm above can indeed be performed in O(k) time. Lemma 2.7. Let u be a leaf in the tree G − X, v be its parent, and let w be the parent of v. If v has degree two in G, then applying Reduction Rule 2.2 to v (deleting v, contracting u and v, and setting s := s − 1) can be done in O(k) time plus O(kn) time for an initial preprocessing. 10 Algorithm 2: FVS-Kernel Step 5. Input: A matching instance (G = (V, E), s), a feedback vertex set X ⊆ V of size k for G with k < log n, and a maximum matching MG−X for G − X with at most k2 free vertices in G − X that are all leaves. Output: An equivalent matching instance (G′ , s′ ) such that X is also a feedback vertex set for G′ and G − X is a tree with at most k2 (2k + 1) bottommost leaves, and a maximum matching MG′ −X for G′ − X with at most k2 free vertices in G′ − X that are all leaves. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Fix an arbitrary bijection f : 2X → {1, . . . , 2k } foreach v ∈ V \ X do Set fX (v) ← f (N (v) ∩ X) // The number fX (v) < n can be read in constant time. Initialize a table Tab of size k · 2k with Tab[x, f (Y )] ← 0 for all x ∈ X, ∅ ( Y ⊆ X P ← List containing all parents of interesting bottommost leaves while P is not empty do u ← pop(P ) v ← child vertex of u in G − X foreach x ∈ N (u) ∩ X do if Tab[x, fX (v)] < k then Tab[x, fX (v)] ← Tab[x, fX (v)] + 1 else delete {x, u} if u has now degree two in G then Apply Reduction Rule 2.2 to u // This decreases s by one. vw ← vertex resulting from the merge of v and the parent w of u if vw is now an interesting bottommost leaf then add the parent of vw to P return (G, s) and MG−X . Proof. The preprocessing is to simply create a partial adjacency matrix for G with the vertices in X in one dimension and V in the other dimension. This adjacency matrix has size O(kn) and can clearly be computed in O(kn) time. Now apply Reduction Rule 2.2 to v. Deleting v takes constant time. To merge u and w iterate over all neighbors of u. If a neighbor u′ of u is already a neighbor of w, then decrease the degree of u′ by one, otherwise add u′ to the neighborhood of w. Then, relabel w to be the new merged vertex uw. Since u is a leaf in G − X and its only neighbor in G − X, namely v, is deleted, it follows that all remaining neighbors of u are in X. Thus, using the above adjacency matrix, one can check in constant time whether u′ is a neighbor of w. Hence, the above algorithm runs in O(deg(u)) = O(k) time. The above ideas are used in Algorithm 2 which we use for this step (Step 5). The algorithm is explained in the proof of the following lemma stating the correctness and the running time of Algorithm 2. Lemma 2.8. Let (G = (V, E), s) be a matching instance, let X ⊆ V be a feedback vertex set, and let MG−X be a maximum matching for G − X with at most k 2 free vertices in G − X that are all leaves. Then, Algorithm 2 computes in O(kn) time an instance (G′ , s′ ) with feedback vertex set X and a maximum matching MG′ −X in G′ − X such that the following holds. • There is a matching of size s in G if and only if there is a matching of size s′ in G′ . • There are at most k 2 (2k + 1) bottommost leaves in G′ − X. • There are at most k 2 free vertices in G′ − X and they are all leaves. 11 Proof. We start with describing the basic idea of the algorithm. To this end, let {u, v} ∈ E be an edge such that v is an interesting bottommost leaf, that is, without siblings and matched to its parent u by MG−X . Counting for each pair x ∈ N (u) ∩ X and y ∈ N (v) ∩ X one augmenting path gives in a simple worst-case analysis O(k 2 ) time per edge, which is too slow for our purposes. Instead, we count for each pair consisting of a vertex x ∈ N (u) ∩ X and a set Y = N (v) ∩ X one augmenting path. In this way, we know that for each y ∈ Y there is one augmenting path from x to y without iterating through all y ∈ Y . This comes at the price of considering up to k2k such pairs. However, we will show that we can do the computations in O(k) time per considered edge in G − X. The main reason for this improved running time is a simple preprocessing that allows for a bottommost vertex v to determine N (v) ∩ X in constant time. The preprocessing is as follows (see Lines 1 to 3): First, fix an arbitrary bijection f between the set of all subsets of X to the numbers {1, 2, . . . , 2k }. This can be done for example by representing a set Y ⊆ X = {x1 , . . . , xk } by a length-k binary string (a number) where the ith position is 1 if and only if xi ∈ Y . Given a set Y ⊆ X such a number can be computed in O(k) time in a straightforward way. Thus, Lines 1 to 3 can be performed in O(kn) time. Furthermore, since we assume that k < log n (otherwise the input instance is already an exponential kernel), we have that f (Y ) < n for each Y ⊆ X. Thus, reading and comparing these numbers can be done in constant time. Furthermore, in Line 3 the algorithm precomputes for each vertex the number corresponding to its neighborhood in X. After the preprocessing, the algorithm uses a table Tab where it counts an augmenting path from a vertex x ∈ X to a set Y ⊆ X whenever a bottommost leaf v has exactly Y as neighborhood in X and the parent of v is adjacent to x (see Lines 4 to 18). To do this in O(kn) time, the algorithm proceeds as follows: First, it computes in Line 5 the set P which contains all parents of interesting bottommost leaves. Clearly, this can be done in linear time. Next, the algorithm processes the vertices in P . Observe that further vertices might be added to P (see Line 18) during this processing. Let u be the currently processed vertex of P , let v be its child vertex, and let Y be the neighborhood of v in X. For each neighbor x ∈ N (u) ∩ X, the algorithm checks whether there are already k augmenting paths between x and Y with a table lookup in Tab (see Line 10). If not, then the table entry is incremented by one (see Line 11) since u and v provide another augmenting path. If yes, then the edge {x, u} is deleted in Line 13 (we show below that this does not change the maximum matching size). If u has degree two after processing all neighbors of u in X, then by applying Reduction Rule 2.2, we can remove u and contract its two neighbors v and w. It follows from Lemma 2.7 that this application of Reduction Rule 2.2 can be done in O(k) time. Hence, Algorithm 2 runs in O(kn) time. Recall that all vertices in G−X that are free wrt. MG−X are leaves. Thus, the changes to MG−X by applying Reduction Rule 2.2 in Line 15 are as follows: First, the edge {u, v} is removed and second the edge {w, q} is replaced by {vw, q} for some q ∈ V . Hence, the matching MG−X after running Algorithm 2 has still at most k 2 free vertices and all of them are leaves. It remains to prove that (a) the deletion of the edge {x, u} in Line 13 results in an equivalent instance and (b) that the resulting instance has at most O(k2k ) bottommost leaves. First, we show (a). To this end, assume towards a contradiction that the new graph G′ := G − {x, u} has a smaller maximum matching than G (clearly, G′ cannot have a larger maximum matching). Thus, any maximum matching MG for G has to contain the edge {x, u}. This implies that the child v of u in G − X is matched in MG with one of its neighbors (except u): If v is free wrt. MG , then deleting {x, u} from MG and adding {v, u} yields another maximum matching not containing {x, u}, a contradiction. Recall that N (v) = {u} ∪ Y where Y ⊆ X since v is a leaf in G − X. Thus, each maximum matching MG for G contains for some y ∈ Y the edge {v, y}. Observe that Algorithm 2 deletes {x, u} only if there are at least k other interesting bottommost leaves v1 , . . . , vk in G − X such that their respective parent is adjacent to x and N (vi ) ∩ X = Y (see Lines 9 to 13). Since |Y | ≤ k, it follows by the pigeon hole principle that at least one of these vertices, say vi , is not matched to any vertex in Y . Thus, since vi is an interesting bottommost leaf, it is matched to its only remaining neighbor: its parent ui in G − X. This implies that there 12 is another maximum matching ′ MG := (MG \ {{v, y}, {x, u}, {ui, vi }}) ∪ {{vi , y}, {x, ui }, {u, v}}, a contradiction to the assumption that all maximum matchings for G have to contain {x, u}. We next show (b) that the resulting instance has at most k 2 (2k + 1) bottommost leaves. To this end, recall that there are at most k 2 bottommost leaves that are not interesting (see discussion at the beginning of this subsection). Hence, it remains to upper-bound the number of interesting bottommost leaves. Observe that each parent u of an interesting bottommost leaf has to be adjacent to a vertex in X since otherwise u would have been deleted in Line 15. Furthermore, after running Algorithm 2, each vertex x ∈ X is adjacent to at most k2k parents of interesting bottommost leaves (see Lines 10 to 13). Thus, the number of interesting bottommost leaves is at most k 2 2k . Therefore the number of bottommost leaves is upper-bounded by k 2 (2k + 1). 2.2.4 Step 6 In this subsection, we provide the final step of our kernelization algorithm. Recall that in the previous steps we have upper-bounded the number of bottommost leaves in G − X by O(k 2 2k ), we computed a maximum matching MG−X for G − X such that at most k 2 vertices are free wrt. MG−X and all free vertices are leaves in G − X. Using this, we next show how to reduce G to a graph of size O(k 3 2k ). To this end we need some further notation. A leaf in G − X that is not bottommost is called a pendant. We define T to be the pendant-free tree (forest) of G − X, that is, the tree (forest) obtained from G − X by removing all pendants. The next observation shows that G − X is not much larger than T . This allows us to restrict ourselves in the following on giving an upper bound on the size of T . Observation 2.9. Let G − X be as described above with vertex set V \ X and let T be the pendant-free tree (forest) of G − X with vertex set VT . Then, |V \ X| ≤ 2|VT | + k 2 . Proof. Observe that V \ X is the union of all pendants in G − X and VT . Thus, it suffices to show that G − X contains at most |VT | + k 2 pendants. To this end, recall that we have a maximum matching for G − X with at most k 2 free leaves. Thus, there are at most k 2 leaves in G − X that have a sibling which is also a leaf since from two leaves with the same parent at most one can be matched. Hence, all but at most k 2 pendants in G − X have pairwise different parent vertices. Since all these parent vertices are in VT , it follows that the number of pendants in G − X is |VT | + k 2 . We use the following observation to provide an upper bound on the number of leaves of T . Observation 2.10. Let F be a forest, let F ′ be the pendant-free forest of F , and let B be the set of all bottommost leaves in F . Then, the set of leaves in F ′ is exactly B. Proof. First observe that each bottommost leaf of F is a leaf of F ′ since we only remove vertices to obtain F ′ from F . Thus, it remains to show that each leaf v in F ′ is a bottommost leaf in F . We distinguish two cases of whether or not v is a leaf in F : First, assume that v is not a leaf in F . Thus, all of it child vertices have been removed. Since we only remove pendants to obtain F ′ from F and since each pendant is a leaf, it follows that v is in F the parent of one or more leaves u1 , . . . , uℓ . Thus, by definition, all these leaves u1 , . . . , uℓ are bottommost leaves, a contradiction to the fact that they were deleted when creating F ′ . Second, assume that v is a leaf in F . If v is a bottommost leaf, then we are done. Thus, assume that v is not a bottommost leaf and therefore a pendant. However, since we remove all pendants to obtain F ′ from F , it follows that v is not contained in F ′ , a contradiction. From Observation 2.10 it follows that the set B of bottommost leaves in G − X is exactly the set of leaves in T . In the previous step we reduced the graph such that |B| ≤ k 2 (2k + 1). Thus, T has at most k 2 (2k + 1) vertices of degree one and, since T is a tree (a forest), T also has at most k 2 (2k + 1) vertices of degree at least three. Let VT2 be the vertices of degree two in T and 13 w u vs1 vt1 vs2 vt2 v y x Figure 1: The situation in the proof of Lemma 2.11. The augmenting path from u to v intersects the two augmenting paths Pwx and Pwy from w to x and y, respectively. Bold edges indicate edges in the matching, dashed edges indicate odd-length alternating paths starting with the first and last edge not being in the matching. The gray paths in the background highlight the different augmenting paths: the initial paths from u to v, w to x, and x to y as well as the new paths from u to x and w to v as postulated by Lemma 2.11. let VT6=2 be the remaining vertices in T . From the above it follows that |VT6=2 | ≤ 2k 2 (2k + 1). Hence, it remains to bound the size of VT2 . To this end, we will upper-bound the degree of each vertex in X by O(k 2 2k ) and then use Reduction Rules 2.1 and 2.3. We will check for each edge {x, v} ∈ E with x ∈ X and V \ X whether we “need” it. This check will use the idea from the previous subsection where each vertex in X needs to reach each subset Y ∈ X at most k times via an augmenting path. Similarly as in the previous section, we want to keep “enough” of these augmenting paths. However, this time the augmenting paths might be long, while different augmenting paths might overlap. To still use the basic approach, we use the following lemma stating that we can still somehow replace augmenting paths. Lemma 2.11. Let MG−X be a maximum matching in the forest G−X. Let Puv be an augmenting path for MG−X in G from u to v. Let Pwx , Pwy , and Pwz be three internally vertex-disjoint augmenting paths from w to x, y, and z, respectively, such that Puv intersects all of them. Then, there exist two vertex-disjoint augmenting paths with endpoints u, v, w, and one of the three vertices x, y, and z. Proof. Label the vertices in Puv alternating as odd or even with respect to Puv so that no two consecutive vertices have the same label, u is odd, and v is even. Analogously, label the vertices in Pwx , Pwy , and Pwz as odd and even with respect to Pwx , Pwy , and Pwz respectively so that w is always odd. Since all these paths are augmenting, it follows that each edge from an even vertex to its succeeding odd vertex is in the matching MG−X and each edge from an odd vertex to its succeeding even vertex is not in the matching. Observe that Puv intersects each of the other paths at least at two consecutive vertices, since every second edge must be an edge in MG−X . Since G − X is a forest and all vertices in X are free with respect to MG−X , it follows that the intersection of two augmenting paths is connected and thus a path. Since Puv intersects the three augmenting paths from w, it follows that at least two of these paths, say Pwx and Pwy , have a “fitting parity”, that is, in the intersections of Puv with Pwx and with Pwy the even vertices with respect to Puv are either even or odd with respect to both Pwx and Pwy . Assume without loss of generality that in the intersections of the paths the vertices have the same label with respect to the three paths (if the labels differ, then revert the ordering of the vertices in Puv , that is, exchange the names of u and v and change all labels on Puv to its opposite). Denote with vs1 and vt1 the first and the last vertex in the intersection of Puv and Pwx . Analogously, denote with vs2 and vt2 the first and the last vertex in the intersection of Puv and Pwy . Assume without loss of generality that Puv intersects first with Pwx and then with Pwx . Observe that vs1 and vs2 are even vertices and vt1 and vt2 are odd vertices since the intersections have to start and end with edges in MG−X (see Fig. 1 for an illustration). For an arbitrary path P and for two arbitrary vertices p1 , p2 of P , denote by p1 − P − p2 the subpath of P from p1 to p2 . Observe that u − Puv − vt1 − Pwx − x and w − Pwy − vt2 − Puv − v are two vertex-disjoint augmenting 14 Algorithm 3: Algorithm for computing Step 6 of our kernel wrt. the parameter “feedback vertex number”. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 Input: A matching instance (G = (V, E), s), a feedback vertex set X ⊆ V of size k for G with k < log n and at most k2 (2k + 1) bottommost leaves in G − X, and a maximum matching MG−X for G − X with at most k2 free vertices in G − X that are all leaves. Output: An equivalent matching instance (G′ , s′ ) such that G′ contains at most O(k3 2k ) vertices and edges. Fix an arbitrary bijection f : 2X → {1, . . . , 2k } foreach v ∈ V \ X do Set fX (v) ← f (N (v) ∩ X) // The number fX (v) < n can be read in constant time. Initialize a table Tab of size k · 2k with Tab[x, f (Y )] ← 0 for x ∈ X, ∅ ( Y ⊆ X T ← pendant-free tree (forest) of G − X VT≥3 ← vertices in T with degree ≥ 3 foreach x ∈ X do foreach v ∈ N (x) \ X do if Keep-Edge(x, v) = false then // Is {x, v} needed for an augmenting path? delete {x, v} exhaustively apply Reduction Rules 2.1 and 2.3 return (G, s). Function Keep-Edge(x ∈ X, v ∈ V \ X) if v is free wrt. MG−X or v ∈ VT≥3 then return true w ← matched neighbor of v in MG−X if w ∈ VT≥3 or w is adjacent to free leaf in G − X then return true if w has at least one neighbor in X and Tab[x, fX (w)] < 6k2 then Tab[x, fX (w)] ← Tab[x, fX (w)] + 1 return true 21 foreach neighbor u 6= v of w that is matched wrt. MG−X and fulfills {u, x} ∈ / E do if Keep-Edge(u, x) = true then return true 22 return false 20 paths. Algorithm description. We now provide the algorithm for Step 6 (see Algorithm 3 for a pseudocode). The algorithm uses the same preprocessing (see Lines 1 to 3) as Algorithm 2. Thus, the algorithm can determine whether two vertices have the same neighborhood in X in constant time. As in Algorithm 2, Algorithm 3 uses a table Tab which has an entry for each vertex x ∈ X and each set Y ⊆ X. The table is filled in such a way that the algorithm detected for each y ∈ Y at least Tab[x, Y ] internally vertex-disjoint augmenting paths from x to y. The main part of the algorithm is the boolean function ‘Keep-Edge’ in Lines 13 to 22 which makes the decision on whether or not to delete an edge {x, v} for v ∈ V \ X and x ∈ X. The function works as follows for edge {x, v}: Starting at v the graph will be explored along possible augmenting paths until a “reason” for keeping the edge {x, v} is found or further exploration is possible. If the vertex v is free wrt. MG−X , then {x, v} is an augmenting path and we keep {x, v} (see Line 14). Observe that in Step 4 we upper-bounded the number of free vertices by k 2 and all these vertices are leaves. Thus, we keep a bounded number of edges incident to x because the corresponding augmenting paths can end at a free leaf. We provide the exact bound below when discussing the size of the graph returned by Algorithm 3. In Line 14, the algorithm stops exploring the graph and keeps the edge {x, v} if v has degree at least three in T . The reason is to keep the graph exploration simple by following only paths in T . This ensures that the running time for exploring the graph from x does not exceed O(n). Since the number of vertices in T with degree 15 at least three is bounded (see discussion after Observation 2.10), it follows that only a bounded number of such edges {x, v} are kept. If v is not free wrt. MG−X , then it is matched with some vertex w. If w is adjacent to some leaf u in G − X that is free wrt. MG−X , then the path x, v, w, u is an augmenting path. Thus, the algorithm keeps in this case the edge {x, v}, see Line 16. Again, since the number of free leaves is bounded, only a bounded number of edges incident to x will be kept. If w has degree at least three in T , then the algorithm stops the graph exploration here and keeps the edge {x, v}, see Line 16. Again, this is to keep the running time at O(kn) overall. Let Y ⊆ X denote the neighborhood of w in X. Thus the partial augmenting path x, v, w can be extended to each vertex in Y . Thus, if the algorithm did not yet find 6k 2 paths from x to vertices whose neighborhood in X is also Y , then the table entry Tab[x, fX (w)] (where fX (w) encodes the set Y = N (w) ∩ X) is increased by one and the edge {x, v} will be kept (see Lines 18 and 19). (Here we need 6k 2 paths since these paths might be long and intersect with many other augmenting paths, see proof of Lemma 2.15 for the details of why 6k 2 is enough.) If the algorithm already found 6k 2 “augmenting paths” from x to Y , then the neighborhood of w in X is irrelevant for x and the algorithm continues. In Line 20, all above discussed cases to keep the edge {x, v} do not apply and the algorithm extends the partial augmenting part x, v, w by considering the neighbors of w except v. Since the algorithm dealt with possible extensions to vertices in X in Lines 17 to 19 and with extensions to free vertices in G − X in Line 14, it follows that the next vertex on this path has to be a vertex u that is matched wrt. MG−X . Furthermore, since we want to extend a partial augmenting path from x, we require that u is not adjacent to x as otherwise x, u would be another, shorter partial augmenting path from x to u and we do not need the currently stored partial augmenting path. Statements on Algorithm 3. For each edge {x, z} with x ∈ X and z ∈ V \ X we denote by P (x, z) the induced subgraph of G − X on the vertices that are explored in the function KeepEdge when called in Line 9 with x and z. More precisely, we initialize P (x, z) := ∅. Whenever the algorithm reaches Line 14, we add v to P (x, z). Furthermore, whenever the algorithm reaches Line 17, we add w to P (x, z). We next show that P (x, z) is a path or a path with one additional pendant. Lemma 2.12. Let x ∈ X and z ∈ V \ X be two vertices such that {x, z} ∈ E. Then, P (x, z) is either a path or a tree with exactly one vertex z ′ having more than two neighbors in P (x, z). Furthermore, z ′ has degree exactly three and z is a neighbor of z ′ . Proof. We first show that all vertices in P (x, z) except z and its neighbor z ′ have degree at most two in P (x, z). Observe that having more vertices than z and z ′ in P (x, z) requires Algorithm 3 to reach Line 20. Let w be the currently last vertex when Algorithm 3 continues the graph exploration in Line 20. Observe that the algorithm therefore dealt with the case that w has degree at least three in T in Line 16. Thus, w is either a pendant leaf in G − X or w ∈ / VT≥3 (that is, w has degree at most two in T ). In the first case, there is no candidate to continue and the graph exploration stops. In the second case, w has degree at most two in T . We next show that any candidate u for continuing the graph exploration in Line 21 is not a leaf in G − X. Assume toward a contradiction, that u is a leaf in G − X. Since the parent w of u is matched with some vertex v 6= u (this is how w is chosen, see Line 15), it follows that u is not matched. This implies that the function ’Keep-Edge’ would have returned true in Line 16 and would not have reached Line 20, a contradiction. Thus, the graph exploration follows only vertices in T . Furthermore, the above argumentation implies that w is not adjacent to a leaf unless this leaf is its predecessor v in the graph exploration. We now have two cases: Either w is not adjacent to a leaf in G−X or v = z is a leaf and w = z ′ is its matched neighbor. In the first case, w has at most one neighbor u 6= v since w ∈ / VT≥3 . Hence, ′ w has degree two in P (x, z). In the second case, w = z has at most two neighbors u 6= v and u′ 6= v. Thus, z ′ has degree at most three. 16 We set for x ∈ X Px := {P (x, v) | {x, v} ∈ E ∧ v ∈ V \ X} to be the union of all induced subgraphs wrt. x. Lemma 2.13. There exists a partition of Px into Px = PxA ∪ PxB such that all graphs within PxA and within PxB are pairwise disjoint. Proof. Since G − X is a tree (or forest), G − X is also bipartite. Let A and B be its two color classes (so A ∪ B = V \ X). We define the two parts PxA and PxB as follows: A subgraph P ∈ Px is in PxA if the neighbor v of x in P is contained in A, otherwise P is in PxB . We show that all subgraphs in PxA and PxB are pairwise vertex-disjoint. To this end, assume toward a contradiction that two graphs P, Q ∈ PxA share some vertex. (The case P, Q ∈ PxB is completely analogous.) Let p1 and q1 be the first vertex in P and Q respectively, that is, p1 and q1 are adjacent to x in G. Observe that p1 6= q1 . Let u 6= x be the first vertex that is in P and in Q. By Lemma 2.12, P and Q are paths or trees with at most one vertex of degree more than two and this vertex has degree three and is the neighbor of p1 or q1 , respectively. This implies together with q1 , p1 ∈ A that either u = p1 or u = q1 . Assume without loss of generality that u = p1 . Since p1 ∈ A and q1 ∈ A and u is a vertex in Q, it follows that Algorithm 3 followed u in the graph exploration from q1 in Line 21. However, this is a contradiction since the algorithm checks in Line 20 whether the new vertex u in the path is not adjacent to x. Thus, all subgraphs in PxA and PxB are pairwise vertex-disjoint. We next show that if Tab[x, f (Y )] = 6k 2 for some x ∈ X and Y ∈ X (recall that f maps Y to a number, see Line 1), then there exist at least 3k internally vertex-disjoint augmenting paths from x to Y . Lemma 2.14. If in Line 17 of Algorithm 3 it holds for x ∈ X and Y ⊆ X that Tab[x, f (Y )] = 6k 2 , then there exist in G wrt. MG−X at least 3k alternating paths from x to vertices v1 , . . . , v3k2 such that all these paths are pairwise vertex-disjoint (except x) and N (vi ) ∩ X = N (w) ∩ X for all i ∈ [3k 2 ]. Proof. Note that each time Tab[x, f (Y )] is increased by one (see Line 18), the algorithm found a vertex w such that there is an alternating path P from x to w and N (w) ∩ X = Y . Furthermore, since the function Keep-Edge returns true in this case, the edge from x to its neighbor on P is not deleted in Line 10. Thus, there exist at least 6k 2 alternating paths from x to vertices whose neighborhood in X is exactly Y . By Lemma 2.13, it follows that at least half of these 6k 2 paths are vertex-disjoint. The next lemma shows that Algorithm 3 is correct and runs in O(kn) time. Lemma 2.15. Let (G = (V, E), s) be a matching instance, let X ⊆ V be a feedback vertex set of size k with k < log n and at most k 2 (2k + 1) bottommost leaves in G − X, and let MG−X be a maximum matching for G − X with at most k 2 free vertices in G − X that are all leaves. Then, Algorithm 3 computes in O(kn) time an equivalent instance (G′ , s′ ) of size O(k 3 2k ). Proof. We split the proof into three claims, one for the correctness of the algorithm, one for the returned kernel size, and one for the running time. Claim 2.16. The input instance (G, s) is a yes-instance if and only if the instance (G′ , s′ ) produced by Algorithm 3 is a yes-instance. Proof. Observe that the algorithm changes the input graph only in two lines: Lines 10 and 11. By Lemma 2.1, applying Reduction Rules 2.1 and 2.3 yields an equivalent instance. Thus, it remains to show that deleting the edges in Line 10 is correct, that is, it does not change the size of a maximum matching. To this end, observe that deleting edges does not increase the size of a maximum matching. Thus, we need to show that the size of the maximum matching does not decrease. Assume toward a contradiction that it does. 17 Let {x, v} be the edge whose deletion decreased the maximum matching size. Redefine G to be the graph before the deletion of {x, v} and G′ to be the graph after the deletion of {x, v}. Recall that Algorithm 3 gets as additional input a maximum matching MG−X for G − X. Let MG := max MG (MG−X ) be a maximum matching for G with the largest possible overlap with M and let GM := G(MG−X , MG ) = (V, MG−X △ MG ) (cf. ??). Since {x, v} ∈ MG \ MG−X and x is free wrt. MG−X it follows that there is a path P in GM with one endpoint being x. Recall that since P is a path in GM it follows that P is an augmenting path for MG−X . Since all vertices in X are free wrt. MG−X , it follows that all vertices in P except the endpoints are in V \ X. Let z be the second endpoint of this path P . We call a vertex on P an even (odd) vertex if it has an even (odd) distance to x on P . (So x is an even vertex and v and z are odd vertices). Observe that v is the only odd vertex in P adjacent to x since otherwise there would be another augmenting path from x to z which only uses vertices from P implying the existence of another maximum matching that does not use {x, v}, a contradiction. Let u be the neighbor of z in P . Since no odd vertex on P except v is adjacent to x, it follows that the graph exploration in the function Keep-Edge starting from x and v in Line 9 either reached u or returned true before. If z ∈ V \ X, then in both cases, the function Keep-Edge would have returned true in Line 9 and Algorithm 3 would not have deleted {x, v}, a contradiction. Thus, assume that z ∈ X. Therefore, the function Keep-Edge considered the vertex u in Line 17 but did not keep the edge {x, v}. Thus, when considering u, it holds that Tab[x, fX (u)] = 6k 2 , where fX (u) encodes Y := N (u) ∩ X and z ∈ Y . By Lemma 2.14, it follows that there are 3k 2 pairwise vertex-disjoint (except x) alternating paths from x to vertices u1 , . . . , uk with N (ui ) ∩ X = Y . Thus, there are 3k 2 internally vertexdisjoint paths Q from x to y in G. If one of the paths Q ∈ Q does not intersect any path in GM , then reverting the augmentation along P and augmenting along Q would results in another maximum matching not containing {x, v}, a contradiction. Thus, assume that each path in Q intersects at least one path in GM . For each two paths Q1 , Q2 ∈ Q that are intersected by the same path P ′ in GM it holds that each further path P ′′ in GM can intersect at most one of Q1 and Q2 : Assume toward a contradiction that P ′′ does. Since no path in GM except P contains x and z it follows that all intersections between the paths are within G − X. Since P ′ and P ′′ are vertex-disjoint and Q1 and Q2 are internally vertex-disjoint, it follows that there is a cycle in G − X, a contradiction to the fact that X is a feedback vertex set. Since 3k 2 > 3k + k 2 , it follows from the pigeon hole principle that there is a path P ′ ∈ GM that intersects at least three paths Q1 , Q2 , Q3 ∈ Q such that no further path in GM intersects them. We can now apply Lemma 2.11 and obtain two vertex-disjoint augmenting paths Q and Q′ . Thus, reverting the augmentation along P and P ′′ and augment along Q and Q′′ yields another maximum matching for G which does not contain {x, v}, a contradiction.  Claim 2.17. The graph G′ returned by Algorithm 3 has at most O(k 3 2k ) vertices and edges. Proof. We first show that each vertex x ∈ X has degree at most O(k 2 2k ) in G′ . To this end, we need to count the number of neighbors v ∈ N (x) \ X where the function Keep-Edge returns true in Line 9. By Lemma 2.12, the function Keep-Edge explores the graph along one or two paths (essentially growing from one starting point into two directions). Recall that Px denotes the subgraphs induced by the graph exploration of Keep-Edge for the neighbors of x. By Lemma 2.13 there is a partition of Px into PxA and PxB such that within each part the subgraphs are pairwise vertex-disjoint. We consider the two parts independently. We start with bounding the number of graphs in PxA where the function ’Keep-Edge’ returned true (the analysis is completely analog for PxB ). Since all explored subgraphs are disjoint and all free vertices in G − X wrt. MG−X are leaves, it follows that Algorithm 3 returned at most k 2 times true in Line 16 due to w being adjacent to a free leaf in G − X. Also, the algorithm returns at most k 2 times true in Line 14 due to v being free. Furthmore, the algorithm returns at most 6k 2 · 2k times true in Line 19. Finally, we show that the algorithm returns at most k 2 · (2k − 1) times true in Lines 14 and 16, respectively. It follows from the discussion below Observation 2.10 that T , the pendent-free tree of G − X, has at 18 most k 2 (2k + 1) leaves (denoted by VT1 ) and k 2 (2k + 1) vertices of degree at least three (denoted by VT≥3 ). Let VT be the vertices of T . Since T is a tree (or forest), it has more vertices than edges and hence X degT (v) < 2|VT | v∈VT which implies X v∈VT≥3 degT (v) < 2 · |VT≥3 | + |VT1 |. Thus, Algorithm 3 returns at most 2 · |VT≥3 | + |VT1 | < 3k 2 (2k + 1) times true in Line 16 due to w being a vertex in VT≥3 . Also, Algorithm 3 returns at most |VT≥3 | ≤ k 2 (2k + 1) times true in Line 14 due to v being a vertex in VT≥3 . Summarizing, considering the graph explorations in PxA , Algorithm 3 returned at most k 2 + k 2 + 6k 2 · 2k + 2k 2 (2k + 1) ∈ O(k 2 2k ) times true in the function Keep-Edge. Analogously, considering the graph explorations in PxA , Algorithm 3 also returned at most O(k 2 2k ) times true. Hence, each vertex x ∈ X has degree at most O(k 2 2k ) in G′ . We now show that the exhaustive application of Reduction Rules 2.1 and 2.3 indeed results in a kernel of the claimed size. To this end, denote with VG1′ −X , VG2′ −X , and VG≥3 ′ −X the vertices that have degree one, two, and at least three in G′ − X. We have |VG1′ −X | ∈ O(k 3 2k ) since each vertex in X has degree at most O(k 2 2k ) and G′ is reduced wrt. Reduction Rule 2.1. Next, since G′ − X ≥3 1 3 k is a forest (or tree), we have |VG≥3 Finally, each ′ −X | < |VG′ −X | and thus |VG′ −X | ∈ O(k 2 ). ′ degree-two vertex in G needs at least one neighbor of degree at least three since G′ is reduced with respect to Reduction Rule 2.3. Thus, each vertex in VG2′ −X is either incident to a vertex in X or adjacent to one of the at most O(k 2 2k ) vertices in G′ − X that have degree at least three. Thus, |VG2′ −X | ∈ O(k 3 2k ). Summarizing, G′ contains at most O(k 3 2k ) vertices and edges.  Claim 2.18. Algorithm 3 runs in O(kn) time. Proof. First, observe that Lines 1 to 6 can be done in O(kn) time: The preprocessing and table initialization can be done in O(kn) time as discussed in Section 2.2.3. Furthermore, T and VT≥3 can clearly be computed in O(n + m) ≤ O(kn) time. Second, by Lemma 2.2, applying Reduction Rules 2.1 and 2.3 can be done in O(n + m) time. Thus, it remains to show that each iteration of the foreach-loop in Line 7 can be done in O(n) time. By Lemma 2.13, the explored graphs Px from x can be partitioned into two parts such that within each part all subgraphs are vertex-disjoint. Thus, each vertex in G − X is visited only twice during the execution of the function Keep-Edge. Furthermore, observe that in Lines 17 and 18 the table can be accessed in constant time. Thus, the function Keep-Edge only checks once whether a vertex in V \ X has a neighbor in X, namely in Line 20. This single check can be done in constant time. Since the rest of the computation is done on G − X which has less than |V \ X| edges, it follows that each iteration of the foreach-loop in Line 7 can indeed be done in O(n) time.  This completes the proof of Lemma 2.15. Our kernelization algorithm for the parameter “feedback vertex number” essentially calls Steps 1 to 6. Theorem 2.19. Matching parameterized by the feedback vertex number k admits a kernel of size 2O(k) . It can be computed in O(kn) time. Proof. First, using the linear-time factor-four approximation of Bar-Yehuda et al. [1], we compute an approximate feedback vertex set X with |X| ≤ 4k. Then, we apply Steps 1 to 6. Applying the first three steps is rather straightforward, see Section 2.2.1. For the remaining three steps, we use Algorithms 1 to 3. By Lemmas 2.6, 2.8 and 2.15, this can be done in O(kn) time and results in a kernel of size O((4k)3 24k ) = 2O(k) . 19 a1 a2 a3 a4 a5 a6 a7 A b7 b6 b5 b4 b3 b2 b1 B Figure 2: A chain graph. Note that the ordering of the vertices in A is going from left to right while the ordering of the vertices in B is going from right to left. The reason for these two orderings being drawn in different directions is that a maximum matching can be drawn as parallel edges, see e. g. the bold edges. In fact, Algorithm 4 computes such matchings with the matched edges being parallel to each other. √ Applying the O(m n)-time algorithm for Matching [17] on the kernel yields: Corollary 2.20. Matching can be solved in O(kn + 2O(k) ) time, where k is the feedback vertex number. 3 Kernelization for Matching on Bipartite Graphs In this section, we investigate the possibility of efficient and effective preprocessing for Bipartite Matching. In particular, we show a linear-time computable polynomial-size kernel with respect to the parameter “distance k to chain graphs”. In the first part of this section, we provide the definition of chain graphs and describe how to compute the parameter. In the second part, we discuss the kernelization algorithm. Definition and computation of the parameter. We first define chain graphs which are a subclass of bipartite graphs with special monotonicity properties. Definition 1 ([5]). Let G = (A, B, E) be a bipartite graph. Then G is a chain graph if each of its two color classes A, B admits a linear order w.r.t. neighborhood inclusion, that is, A = {a1 , . . . , aα } and B = {b1 , . . . , bβ } where N (ai ) ⊆ N (aj ) and N (bi ) ⊆ N (bj ) whenever i < j. Observe that if the graph G contains twins, then there is more than one linear order w.r.t. neighborhood inclusion. To avoid ambiguities, we fix for the vertices of the color class A (resp. B) in a chain graph G = (A, B, E) one linear order ≺A (resp. ≺B ) such that, for two vertices u, v ∈ A (resp. u, v ∈ B), if u ≺A v (resp. if u ≺B v) then N (u) ⊆ N (v). In the remainder of the section we consider a bipartite representation of a given chain graph G = (A, B, E) where the vertices of A (resp. B) are ordered according to ≺A (resp. ≺B ) from left to right (resp. from right to left), as illustrated in Figure 2. For simplicity of notation we use in the following ≺ to denote the orderings ≺A and ≺B whenever the color class is clear from the context. We next show, that we can approximate the parameter and the corresponding vertex subset in linear time. To this end, we use the following characterization of chain graphs. Lemma 3.1 ([5]). A bipartite graph is a chain graph if and only if it does not contain an induced 2K2 . Lemma 3.2. There is a linear-time factor-4 approximation for the problem of deleting a minimum number of vertices in a bipartite graph in order to obtain a chain graph. Proof. Let G = (A, B, E) be a bipartite graph. We compute a set S ⊆ A ∪ B such that G − S is a chain graph and S is at most four times larger than a minimum size of such a set. The algorithm iteratively tries to find a 2K2 and deletes the four corresponding vertices until no further 2K2 is 20 Algorithm 4: An algorithm that computes a maximum matching M in the chain graph G such that all edges in M are parallel (see Fig. 2 for a visualization.) Input: A chain graph G = (V, E), V = A ∪ B, A = {a1 , . . . , aα } and B = {b1 , . . . , bβ } with N (ai ) ⊆ N (aj ) and N (bi ) ⊆ N (bj ) for i < j. Output: A maximum matching of G where all matched edges are parallel. 1 2 3 Compute the size s of a maximum matching in G using an algorithm of Steiner and Yeomans [19] M ← {{aα−s+1 , bβ }, {aα−s+2 , bβ−1 }, . . . , {aα , bβ−s+1 }} return M . found. Since in each 2K2 , by Lemma 3.1, at least one vertex needs to be removed, the algorithm yields the claimed factor-4 approximation. The details of the algorithm are as follows: First, it initializes S = ∅ and sorts the vertices in A and in B by their degree; the vertices in A = {a1 , . . . , aα } in increasing order and the vertices B = {b1 , . . . , bβ } in decreasing order, that is, deg(a1 ) ≤ . . . ≤ deg(aα ) and deg(b1 ) ≤ . . . ≤ deg(bβ ). Since the degree of each vertex is at most max{α, β}, this can be done in linear time with e. g. Bucket Sort. At any stage the algorithm deletes all vertices of degree zero and all vertices which are adjacent to all vertices in the other partition. The deleted vertices are not added to S since these vertices can not participate in a 2K2 . Next, the algorithm recursively processes the vertices in A in a nondecreasing order of their degrees. Let a ∈ A be a minimum-degree vertex and let b ∈ B be a neighbor of a. Since b is not adjacent to all vertices in A (otherwise b would be deleted), there is a vertex a′ ∈ A that is not adjacent to b. Since deg(a) ≤ deg(a′ ) it follows that a′ has a neighbor b′ that is not adjacent to a. Hence, the four vertices a, a′ , b, b′ induce only two edges: {a, b} and {a′ , b′ } and thus form a 2K2 . Thus, the algorithm adds the four vertices to S, deletes them from the graph, and continues with a vertex in A that has minimum degree. As to the running time, we now show that, after the initial sorting, the algorithm considers each edge only twice: Selecting a and b as described above can be done in O(1) time. To select a′ , the algorithm simply iterates over all vertices in A until it finds a vertex that is not adjacent to b. In this way at most deg(b) + 1 vertices are considered. Similarly, by iterating over the neighbors of a′ , one finds b′ . Hence, the edges incident to a, a′ , b, and b′ are used once to find the vertices and a second time when these vertices are deleted. Thus, using appropriate data structures, the algorithm runs in O(n + m) time. Kernelization. In the rest of this section, we provide a linear-time computable kernel for Bipartite Matching with respect to the parameter vertex deletion distance k to chain graphs. The intuitive description of the kernelization is as follows. First we upper bound by O(k) the number of neighbors of each vertex in the deletion set. Then we mark O(k 2 ) special vertices and we use the monotonicity properties of chain graphs to upper bound the number of vertices that lie between any two consecutive marked edges, thus bounding the total size of the reduced graph to O(k 3 ) vertices. Let G = (A, B, E) be the bipartite input graph, where V = A ∪ B, and let X ⊆ V be a vertex subset such that G − X is a chain graph. By Lemma 3.2, we can compute an approximate X in linear time. The kernelization algorithm is as follows: First, compute a specific maximum matching MG−X ⊆ E in G − X with Algorithm 4 where all edges in MG−X are “parallel” and all matched vertices are consecutive in the ordering ≺A and ≺B , see also Fig. 2. Since in convex graphs matching is linear-time solvable [19] and convex graphs are a super class of chain graphs, this can be done in O(n + m) time. We use MG−X in our kernelization algorithm to obtain some local information about possible augmenting paths. For example, each augmenting path has at least one endpoint in X. Forming this into a data reduction rule, with s denoting the size of a maximum matching, yields the following. Reduction Rule 3.1. If |MG−X | ≥ s, then return a trivial yes-instance; if s > |MG−X | + k, then return a trivial no-instance. 21 The correctness of the above reduction rule follows from Observation 1.2. Without loss of generality, we will be able to assume that each vertex in X is either matched in M with another vertex in X or with a “small-degree vertex” in G − X. This means that an augmenting path starting at some vertex in X will “enter” the chain graph G−X in a small-degree V \X vertex. We now formalize this concept. For a vertex x ∈ X we define Nsmall (x) to be the set of the k neighbors of x in V \ X with the smallest degree, formally, V \X Nsmall (x) := {w ∈ N (x) \ X | k > |{u ∈ N (x) \ X | u ≺ w}|}. Lemma 3.3. Let G = (V, E) be a bipartite graph and let X ⊆ V be a vertex set such that G − X is a chain graph. Then, there exists a maximum matching MG for G such that every matched V \X vertex x ∈ X is matched to a vertex in Nsmall (x) ∪ X. ′ Proof. Assume, towards a contradiction, that there is no such matching MG . Let MG be a maximum matching for G that maximizes the number of vertices x ∈ X that are matched to a V \X V \X ′ ′ vertex in Nsmall (x) ∪ X, that is, let MG maximize |{x ∈ X | {u, x} ∈ MG ∧ u ∈ Nsmall (x) ∪ X}|. V \X Let x ∈ X be a vertex that is not matched with any vertex in Nsmall (x) ∪ X, that is, x is V \X V \X matched to a vertex u ∈ V \ (Nsmall (x) ∪ X). If there is an unmatched vertex w ∈ Nsmall (x) ′ ′′ ′ in MG , then the matching MG := MG ∪ {{x, w}} \ {{u, x}} is a maximum matching with more V \X ′ vertices x ∈ X (compared to MG ) that are matched to a vertex in Nsmall (x) ∪ X, a contradiction. V \X V \X Hence, assume that there is no free vertex in Nsmall (x). Since |Nsmall (x)| = |X| = k, it follows V \X that at least one vertex w ∈ Nsmall (x) is matched to a vertex v ∈ V \ X. Observe that, by V \X definition of Nsmall (x), we have NG−X (w) ⊆ NG−X (u). Thus, we have {u, v} ∈ E and thus, ′′ ′ MG := MG ∪ {{x, w}, {u, v}} \ {{u, x}, {w, v}} is a maximum matching with more vertices in X ′ (compared to MG ) fulfilling the condition of the lemma, a contradiction. Based on Lemma 3.3, we can provide our next data-reduction rule. Reduction Rule 3.2. Let (G, s) be an instance reduced with respect to Reduction Rule 3.1 and V \X let x ∈ X. Then delete all edges between x and V \ Nsmall (x). Clearly, Reduction Rule 3.2 can be exhaustively applied in O(n + m) time by one iteration over A and B in the order ≺. The high-level idea of our kernel is as follows: Keep in the kernel all vertices of X. For each V \X vertex x ∈ X keep all vertices in Nsmall (x) and if a kept vertex is matched, then keep also the vertex with whom it is matched. Denote with K the set of the vertices kept so far in V \ X. Consider an augmenting path P = x, a1 , b1 , . . . , aℓ , bℓ , y from a vertex x ∈ B ∩X to a vertex y ∈ A ∩ X. Observe that if a1 ≺ aℓ , then also {b1 , aℓ } ∈ E and thus P ′ = x, a1 , b1 , aℓ , bℓ , y is an augmenting path. Furthermore, the vertices in the augmenting path P ′ are a subset of K ∪ X and, thus, by keeping these vertices (and the edges between them), we also keep the augmenting path P ′ in our kernel. Hence, it remains to consider the more complicated case that aℓ ≺ a1 . To this end, we next show that in certain “areas” of the chain graph G− X the number of augmenting paths “passing through” such an area is bounded. Definition 2. Let G = (A, B, E) be a chain graph and let M be a matching in G. Furthermore let a ∈ A, b ∈ B with {a, b} ∈ M . Then #lmv(b, M ) (resp. #rmv(a, M )) is the number of neighbors of b (resp. of a) that are to the left of a (resp. to the right of b); formally, #lmv(b, M ) := |{a′ ∈ N (b) | a′ ≺ a}|, #rmv(a, M ) := |{b′ ∈ N (a) | b′ ≺ b}|. In Definition 2 the terms “left” and “right” refer to the ordering of the vertices of A and B in the bipartite representation of G, as illustrated in Figure 2. The abbreviation #rmv (#lmv) stands for “number of vertices right (left) of the matched vertex”. We set #lmv(a, M ) := #lmv(b, M ) and #rmv(b, M ) := #rmv(a, M ). Finally, we define #rmv(a1 , a2 , M ) := mina1 ≺a′ ≺a2 {#rmv(a′ , M )} for a1 , a2 ∈ A and #lmv(b1 , b2 , M ) := minb2 ≺b′ ≺b1 {#lmv(b′ , M )} for b1 , b2 ∈ B. 22 Lemma 3.4. Let G = (A, B, E) be a chain graph and M be a maximum matching for G computed by Algorithm 4. Let a, b ∈ V with {a, b} ∈ M . Then the number of vertex-disjoint alternating paths that (1) start and end with edges not in M and that (2) have endpoints left of a and right of b is at most min{#lmv(b, M ), #rmv(a, M )}. Proof. We prove the case #lmv(b, M ) ≤ #rmv(a, M ), that is, min{#lmv(b, M ), #rmv(a, M )} = #lmv(b, M ). The case #lmv(b, M ) > #rmv(a, M ) follows by symmetry (with switched roles of a and b). Let #aug denote the number of vertex-disjoint alternating paths from {a′ ∈ A | a′ ≺ a} to {b′ ∈ B | b′ ≺ b} such that the first and last edge are not in M . Furthermore, let ab1 , . . . , ab#lmv(b,M) be the neighbors of b that are to the left of a, that is, ab1 ≺ ab2 ≺ . . . ≺ ab#lmv(b,M) ≺ a. Since G is a chain graph it follows that no vertex a′ ∈ A with a′ ≺ ab1 is adjacent to any vertex b′ ∈ B with b′  b. Furthermore, for any edge {a′ , b′ } ∈ E with a ≺ a′ and b ≺ b′ it follows from the construction of M (see Algorithm 4) that {a′ , b′ } ∈ / M . Hence, any of these alternating paths has to contain at least one vertex from ab1 , . . . , ab#lmv(b,M) . Since the alternating paths are vertex-disjoint it follows that #aug ≤ #lmv(b, M ). From the previous lemma, we directly obtain the following. Lemma 3.5. Let G = (A, B, E) be a chain graph and let M be the maximum matching for G computed by Algorithm 4. Let a1 , a2 ∈ A and b1 , b2 ∈ B with {a1 , b1 }, {a2 , b2 } ∈ M with a1 ≺ a2 . Then there are at most #lmv(b1 , b2 , M ) vertex-disjoint alternating paths that (1) start and end with edges not in M and that (2) have endpoints left of a1 and right of b2 . Lemma 3.5 states that the number of augmenting paths passing through the area between a1 and a2 is bounded. Using this, we want to replace this area by a gadget with O(k) vertices. To this end, we need further notation. For each kept vertex v ∈ K, we may also keep some vertices to the right and to the left of v. We call these k vertices the left buffer (right buffer ) of v. Definition 3. Let G = (A, B, E) be a chain graph and let M be the maximum matching for G computed by Algorithm 4. Let a1 , a2 ∈ A and b1 , b2 ∈ B with {a1 , b1 }, {a2 , b2 } ∈ M and a1 ≺ a2 . Then the (at most) #lmv(b1 , b2 , M ) vertices to the right of a1 form the right buffer B r (a1 , M ) of a1 ; formally, B r (a1 , M ) := {a ∈ A | a1 ≺ a ∧ |{a′ ∈ A | a1 ≺ a′ ≺ a}| ≤ min{#lmv(b1 , b2 , M ), k}}. Analogously, B ℓ (a2 , M ) := {a ∈ A | a ≺ a2 ∧ |{a′ ∈ A | a ≺ a′ ≺ a2 }| ≤ min{#lmv(b1 , b2 , M ), k}}, B r (b1 , M ) := {b ∈ B | b ≺ b1 ∧ |{b′ ∈ B | b ≺ b′ ≺ b1 }| ≤ min{#lmv(b1 , b2 , M ), k}}, B ℓ (b2 , M ) := {b ∈ B | b2 ≺ b ∧ |{b′ ∈ B | b2 ≺ b′ ≺ b}| ≤ min{#lmv(b1 , b2 , M ), k}}. Note that in Definition 3 each of the sets B r (a1 , M ), B ℓ (a2 , M ), B r (b1 , M ), and B ℓ (b2 , M ) depends on all four vertices a1 , a2 , b1 , b2 ; we omit these dependencies from the names for the sake of presentation. Reduction Rule 3.3. Let (G, s) be an instance reduced with respect to Reduction Rule 3.1. Let a1 , a2 ∈ K ∩ A with a1 ≺ a2 and {a1 , b1 }, {a2 , b2 } ∈ MG−X such that A′ := {a ∈ A | a1 ≺ a ≺ a2 } is of size at least 2 min{#lmv(b1 , b2 , M ), k} + 1 and A′ ∩ K = ∅. Then delete all vertices in A′ \ (B r (a1 , MG−X ) ∪ B ℓ (a2 , MG−X )) and their matched neighbors in B, add all edges between the vertices in the right buffer of a1 and the vertices in the left buffer of b2 , and decrease s by the number of removed matched vertex pairs. Lemma 3.6. Reduction Rule 3.3 is correct and can be exhaustively applied in O(n + m) time. Proof. We first introduce some notation and provide some general observations. Let a1 , a2 , b1 , and b2 be as stated in Reduction Rule 3.3. Denote by A′ (resp. B ′ ) the set of vertices between a1 23 ′ and a2 (resp. between b1 and b2 ). Further denote by A′D ⊆ A′ and BD ⊆ B ′ the sets of deleted ver′ ′ ′ ′ tices. Note that |A | = |B | and |AD | = |BD | since MG−X was produced by Algorithm 4. Denote x the vertices in the buffers of a1 , a2 , b1 , and b2 by B x (yz , MG−X ) = {y1x , . . . , ymin{#lmv(b } 1 ,b2 ,M),k} for x ∈ {r, ℓ}, y ∈ {a, b}, z ∈ [2], and x = r ⇐⇒ z = 1. Since the input instance is reduced with respect to Reduction Rule 3.1, it follows that s − k ≤ |MG−X | < s. Denote by MG′ −X := MG−X ∩ E ′ the matching obtained from MG−X by deleting all edges not in the reduced graph G′ . Recall that s is reduced by the number of matched edges that are removed. We next show in Claims 3.7 and 3.8 that the input instance (G = (V, E), s) is a yes-instance if and only if the produced instance (G′ = (V ′ , E ′ ), s′ ) is a yes-instance. Before we present these two claims, observe that there is a perfect matching between the vertices in A′D ′ and BD , and thus s − |MG−X | = s′ − |MG′ −X |. (1) Claim 3.7. If (G, s) is a yes-instance, then (G′ , s′ ) is a yes-instance. max max Proof. Recall that MG (MG−X ) for G minimizes the size of MG−X △ MG (MG−X ). max Since (G, s) is a yes-instance it holds that |MG (MG−X )| ≥ s. For brevity we set GM := max max G(MG−X , MG (MG−X )) = (V, MG−X △ MG (MG−X )). Note that GM is a graph that only contains odd-length paths. We will show that there are as many vertex-disjoint augmenting paths for MG′ −X in G′ as there are paths in GM . This will show that G′ contains a matching of size (1) max (MG−X )| − |MG−X | ≥ |MG′ −X | + s − |MG−X | = |MG′ −X | + s′ − |MG′ −X | = s′ . |MG′ −X | + |MG ′ To this end, observe that all paths that do not use vertices in V \ V ′ = A′D ∪ BD are also contained ′ M ′ in G . Thus, consider the paths in G that use vertices in V \ V . Denote by P M the set of all paths in GM using vertices in V \ V ′ and set t := |P M |. Consider now an arbitrary i ∈ [t], and let PiM ∈ P M . Denote by v1i , v2i , . . . , vpi i the vertices in PiM in the corresponding order, that is, i i , v2j+1 } ∈ MG−X for all j ∈ [pi /2]. Observe v1i and vpi i are the endpoints of PiM and we have {v2j M that exactly one endpoint of Pi is in A and the other endpoint is in B, since PiM is an odd-length path. Assume without loss of generality that v1i ∈ A and vpi i ∈ B. Thus, the vertices in PiM with odd (even) index are in A (B). We next show that for any two vertices vji , vℓi of PiM with j < ℓ < pi − 1 and both being in A \ X, it follows that vji ≺ vℓi . First, observe that if j = 1, then vji ∈ A \ X is a free vertex wrt. MG−X . Since vℓi is matched wrt. MG−X and since MG−X is computed by Algorithm 4, it follows that v1i ≺ vℓi . Thus, assume that j > 1 and ℓ > 1 (thus j ≥ 3 and j > 1). Assume toward i a contradiction that vℓi ≺ vji . Since ℓ < pi − 1, we have vℓ+1 ∈ B \ X and since G − X is a chain i i graph, it follows that {vj , vℓ+1 } ∈ E, a contradiction to Observation 1.1. Thus, vji ≺ vℓi . We next show that the path PiM contains at least one vertex vji left of a1 and at least one vertex vℓi right of b2 . Recall that MG−X was computed by Algorithm 4 and, thus, the free vertices are the smallest wrt. the ordering ≺ (see also Fig. 2). Thus, if one endpoint of PiM is in (A∪B)\X, then this vertex is either v1i and left of a1 or it is vpi 1 and right of b2 . Thus, assume that the endpoints of PiM are in X. We showed in the previous paragraph that v3i ≺ v5i ≺ . . . ≺ vpi 1 −3 . Thus, we also have vpi i −2 ≺ vpi i −4 ≺ . . . ≺ v2i since MG−X is computed by Algorithm 4. Since we i assumed that some vertices of PiM to be in V \ V ′ , it follows that for at least one vertex v2j+1 i it holds that a1 ≺ v2j+1 ≺ a2 . Furthermore since by assumption no vertex between a1 and a2 or between b1 and b2 is in K, it follows that v3i ≺ a1 (since v3i ∈ K) and vpi i −2 ≺ b2 (since vpi i −2 ∈ K). M For each i ∈ [t] denote by aPi the last vertex on the path PiM that is not right of a1 , M that is, aPi is the vertex on PiM such that for each vertex a′ ∈ A \ X that is in PiM it holds M M that a1 ≺ a′ or a′  aPi . It follows from the previous paragraph that aPi exists. Analogously M M to aPi , for each i ∈ [t] denote by bPi the first vertex on the path PiM that is not left of b2 , M that is, bPi is the vertex on PiM such that for each vertex b′ ∈ B that is in PiM it holds M that b2 ≺ b′ or b′  bPi . This means that in GM there is for each i ∈ [t] an alternating path 24 M M from aPi to bPi starting and ending with non-matched edges and all these paths are pairwise vertex-disjoint. We show that also in G′ there are pairwise vertex-disjoint alternating paths M M M M M from aPi to bPi . Assume without loss of generality that aP1 ≺ aP2 ≺ . . . ≺ aPt . Since M M in each path PiM , i ∈ [t], the successor of aPi is to the right of b1 , it follows that aPi has at least i neighbors right of b1 . Since the right buffer of b1 contains the #lmv(b1 , b2 , MG−X ) ≥ t (see M M Lemma 3.5) vertices to the right of b1 , we have {aPi , bri } ∈ E. By symmetry, we have {bPi , aℓi } ∈ E. Recall that MG−X forms a perfect matching between B r (b1 , MG−X ) and B r (a1 , MG−X ) as well as between B ℓ (a2 , MG−X ) and B ℓ (b2 , MG−X ). Since Reduction Rule 3.3 added all edges between B r (a1 , MG−X ) and B ℓ (b2 , MG−X ) to E ′ , it follows that each path PiM can be completed M M as follows: aPi , bri , ari , bℓi , aℓi , bPi ; note that exactly the edges {bri , ari } and {bℓi , aℓi } are in MG−X . Thus, each path in P M can be replaced by an augmenting path for MG′ −X in G′ and all these augmenting paths are vertex-disjoint. Thus, there are as many augmenting paths for MG′ −x in G′ as there are paths in GM and therefore (G′ , s′ ) is a yes-instance.  Claim 3.8. If (G′ , s′ ) is a yes-instance, then (G, s) is a yes-instance. Proof. Let MG′ a maximum matching for G′ . Observe that |MG′ | ≥ s′ . We construct a matching MG for G as follows. First, copy all edges from MG′ ∩ E into MG . Second, add all edges ′ ′ from MG−X ∩ V \V , that is, a perfect matching between A′D and BD is added to MG . Observe 2 that if all edges in MG′ are also in E, then MG is a matching of size s in G. Thus, assume that some edges in MG′ are not in E, that is, {ari1 , bℓj1 }, . . . , {arit , bℓjt } ∈ MG′ \ E for some t ∈ [#lmv(b1 , b2 , MG−X )]. Observe that s − |MG | ≤ t. Clearly, the vertices ari1 , . . . , arit , brj1 , . . . , brjt are free with respect to MG . We show that there are t pairwise vertex-disjoint augmenting paths from {ari1 , . . . , arit } to {bℓj1 , . . . , bℓjt }; note, however, that these paths are not necessarily from arir to bℓjr , where r ∈ [t]. To this end, recall that by definition of #lmv(b1 , b2 , MG−X ) each vertex b ∈ B with b2 ≺ b ≺ b1 has at least #lmv(b1 , b2 , MG−X ) neighbors to the left of its matched neighbor. This allows us to iteratively find augmenting paths as follows: To create the q th augmenting path Pq start with some vertex bℓjq . Denote by v the last vertex added to Pq (in the beginning we have v = bℓjq ). If v ∈ A, then add to Pq the neighbor matched to v. If v ∈ B, then do the following: if v is adjacent to a vertex a ∈ {ari1 , . . . , arit }, then add a to Pq , otherwise add the leftmost neighbor of v to Pq . Repeat this process until Pq contains a vertex from {ari1 , . . . , arit }. After we found Pq remove all vertices of Pq from G. If q < t, then continue with Pq+1 . Observe that any two vertices of Pq that are in A have at least #lmv(b1 , b2 , MG−X ) − 1 other vertices of A between them (in the ordering of the vertices of A, see Figure 2). Thus, after a finite number of steps, Pq will reach a vertex in {ari1 , . . . , arit }. Furthermore, it follows that after removing the vertices of Pq it holds that #lmv(b1 , b2 , MG−X ) is decreased by exactly one: Pq contains for each vertex b ∈ B at most one vertex among the #lmv(b1 , b2 , MG−X ) neighbors of b that are directly to the left of its matched neighbor in MG−X . Thus, in each iteration we have #lmv(b1 , b2 , MG−X ) > 0. It follows that the above procedure constructs t vertex-disjoint augmenting paths from {ari1 , . . . , arit }  to {bℓj1 , . . . , bℓjt }. Hence, G contains a matching of size s and thus (G, s) is a yes-instance. The correctness of the data reduction rule follows from the previous two claims. It remains to prove the running time. To this end, observe that the matching MG−X is given. Computing all degrees of G can be done in O(n + m) time. Also #lmv(v, MG−X ) can be computed in linear time: For each vertex b ∈ B one has to check for each neighbor of b whether it is to the left of b’s matched neighbor and to adjust #lmv(b, MG−X ) accordingly. Furthermore, #lmv(b1 , b2 , MG−X ) P computing P ′ and removing the vertices in A′D and BD can be done in O( b∈B ′ deg(b) + a∈A′ deg(a)) time. Thus, Reduction Rule 3.3 can be exhaustively applied in O(n + m) time. We next upper-bound the number of free vertices with respect to MG−X . Let Afree := {a ∈ A | a is free with respect to MG−X } and Akfree := {a ∈ Afree | |{a′ ∈ Afree | a  a′ }| ≤ k}, 25 that is, Akfree contains the k rightmost free vertices in A \ X. Observe that all vertices in Akfree k are left of MG−X . Analogously, denote by Bfree the set containing the k leftmost free vertices in B \ X. Reduction Rule 3.4. to Reduction Rule 3.1. Then  Let (G, s) be an instance   reduced with respect  k k delete all vertices in Afree \ (K ∪ Afree ) ∪ Bfree \ (K ∪ Bfree ) . Lemma 3.9. Reduction Rule 3.4 is correct an can be applied in O(n + m) time. Proof. The running time is clear. It remains to show the correctness. Let (G, s) be the input instance reduced with respect to Reduction Rule 3.1 and let (G′ , s) be the instance produced by Reduction Rule 3.4. We show that deleting the vertices in Afree \ (K ∪ Akfree ) yields an equivalent k instance. It then follows from symmetry that deleting the vertices in Bfree \ (K ∪ Bfree ) yields also an equivalent instance. We first show that if (G, s) is a yes-instance, then also the produced instance (G′ , s) is a yesinstance. Let (G, s) be a yes-instance and MG be a maximum matching for G. Clearly, |MG | ≥ s. Observe that for each removed vertex a ∈ Afree \(K ∪Akfree) it holds that every vertex a′ ∈ Akfree is to the right of a, that is, a ≺ a′ and thus NG−X (a) ⊆ NG−X (a′ ). Since (G, s) is reduced with respect to Reduction Rule 3.1, it follows that |MG−X | ≥ |MG |−k. Thus, there exist at most k augmenting paths for MG−X in G. If none of these augmenting paths ends in a vertex a ∈ Afree \ (K ∪ Akfree ), then all augmenting paths exist also in G′ and thus (G′ , s) is a yes-instance. If one of these augmenting paths, say P , ends in a, then at least one vertex a′ ∈ Akfree is not endpoint of any of these augmenting paths. Since a ∈ / K it follows from Lemma 3.3 that the neighbor b of a on P is indeed in B \X. Since NG−X (a) ⊆ NG−X (a′ ), it follows that {a′ , b} ∈ E and thus we can replace a by a′ in the augmenting path. By exhaustively applying the above exchange argument, it follows that we can assume that none of the augmenting paths uses a vertex in Afree \ (K ∪ Akfree ). Thus, all augmenting paths are also contained in G′ and hence the resulting instance (G′ , s) is still a yes-instance. Finally observe that if (G′ , s) is a yes-instance, then also (G, s) is a yes-instance, since G′ is a subgraph of G. Thus any matching of size s in G′ is also a matching in G. Hence (G, s) is a yes-instance. Theorem 3.10. Matching on bipartite graphs admits a cubic-vertex kernel with respect to the vertex deletion distance to chain graphs. The kernel can be computed in linear time. Proof. Let (G, s) be the input instance with G = (V, E), the two partitions V = A ∪ B, and X ⊆ V such that G − X is a chain graph. If X is not given explicitly, then use the linear-time factor-four approximation provided in Lemma 3.2 to compute X. The kernelization is as follows: First, compute MG−X in linear time with Algorithm 4. Next compute the set K. Then, apply Reduction Rules 3.1, 3.3 and 3.4. By Lemmas 3.6 and 3.9, this can be done in linear time. Let bK ℓ K K the leftmost vertex in K ∩ B and aK r rightmost vertex in A ∩ K. Let aℓ and br be their matched neighbors. Since |K| ≤ k 2 and we reduced the instance with respect to Reduction Rule 3.3, it K K follows that the number of vertices between aK ℓ and ar as well as the number of vertices between bℓ K 3 and br is at most 2k , respectively. Furthermore, there are at most 2k free vertices left in V \ X since we reduced the instance with respect to Reduction Rule 3.4. It remains to uper-bound the K number of matched vertices left of bK ℓ and right of ar . K Observe that all vertices left of bℓ are matched with respect to MG−X . If there are more a b than 2k vertices to the left of bK ℓ , then do the following: Add four vertices aℓ , bℓ , xℓ , xℓ to V . The idea is that {aℓ , bℓ } should be an edge in MG−X such that aℓ ∈ A and bℓ ∈ B are in K and there is no vertex left of bℓ . This means we add these vertices to simulate the situation where the leftmost vertex in B \ X is also in K. To ensure that aℓ and bℓ are in K and that they are not matched with some vertices in G, we add xaℓ and xbℓ to X and make xaℓ respectively xbℓ to their sole neighbors. In this way, we ensure that there is maximum matching in the new graph that is exactly two edges larger than the maximum matching in the old graph. In this new graph we can then apply Reduction Rule 3.3 to reduce the number of vertices between bℓ and bK ℓ . Formally, we add the 26 following edges. Add {aℓ , xaℓ }, {bℓ , xbℓ } to E. Add all edges between bℓ and the vertices in B \ X. Let a be the rightmost vertex in Akfree . Then, add edges between aℓ and NG−X (a). Set b′ ≺ bℓ for each b′ ∈ B \ X, set a ≺ aℓ for each vertex a ∈ Afree , and set aℓ ≺ a′ for each matched vertex in A \ X. Furthermore, add {aℓ , bℓ } to MG−X and add aℓ and bℓ to K. Finally, increase s by two. Next, apply Reduction Rule 3.3 in linear time, then remove aℓ , bℓ , xaℓ , xbℓ and reduce s by two. After this procedure, it follows that there are at most 2k vertices left of bK ℓ . If there are more than 2k vertices right of the rightmost vertex aK in A∩K, then use the same procedure as above. Thus, the r total number of vertices in the remaining graph is at most |X| + 2k + 4k 3 = O(k 3 ). Furthermore, observe that adding and removing the four vertices as well as applying Reduction Rule 3.3 can be done in linear time. Thus, the overall running time of the kernelization is O(n + m). Applying the O(n2.5 )-time algorithm for Bipartite Matching [15] on the kernel yields: Corollary 3.11. Matching can be solved in O(k 7.5 + n + m) time, where k is the vertex deletion distance to chain graphs. 4 Conclusion We focussed on kernelization results for Matching. There remain numerous challenges for future research as discussed in the end of this concluding section. First, however, let us discuss the closely connected issue of FPTP algorithms for Matching. There is a generic augmenting pathbased approach to provide FPTP algorithms for Matching: To begin with, note that one can find an augmenting path in linear time [2, 11, 17]. Now the solving algorithm for Matching parameterized by some vertex deletion distance k works as follows: 1. Use a constant-factor linear-time (approximation) algorithm to compute a vertex set X such that G − X is a “trivial” graph (where Matching is linear-time solvable). 2. Compute in linear time an initial maximum matching M in G − X. 3. Start with M as a matching in G and increase the size at most |X| = k times to obtain in O(k · (n + m)) time a maximum matching for G. From this we can directly derive that Matching can be solved in O(k(n + m)) time, where k is one of the following parameters: feedback vertex number, feedback edge number, vertex cover number. Bipartite Matching can be solved in O(k(n + m)) time, where k is the vertex deletion distance to chain graphs. Using our kernelization results, the multiplicative dependence of the running time on parameter k can now be made an additive one. For instance, in this way the running time for Bipartite Matching parameterized by vertex deletion distance to chain graphs “improves” from O(k(n + m)) to O(k 7.5 + n + m). We conclude with listing some questions and tasks for future research. Can the size or the running time of the kernel with respect to feedback vertex set (see Section 2) be improved? Is there a linear time computable kernel for Matching parameterized by the treewidth t (assuming that t is given)? This would complement the recent randomized O(t4 n log n) time algorithm [9]. Can one extend the kernel of Section 3 from Bipartite Matching to Matching parameterized by the distance to chain graphs? These are only three very concrete questions. There are numerous more, including further parameterizations or any form of kernel lower bound results. Finally, will Matching become the “drosophila” of FPTP studies akin to Vertex Cover for classical FPT studies was? We hope we gave some reasons for believing that. References [1] R. Bar-Yehuda, D. Geiger, J. Naor, and R. M. Roth. Approximation algorithms for the feedback vertex set problem with applications to constraint satisfaction and Bayesian inference. SIAM Journal on Computing, 27(4):942–959, 1998. 27 [2] N. Blum. A new approach to maximum matching in general graphs. In Proceedings of the 17th International Colloquium on Automata, Languages, and Programming (ICALP ’90), volume 443 of LNCS, pages 586–597. Springer, 1990. [3] H. L. Bodlaender, B. M. P. Jansen, and S. Kratsch. Preprocessing for treewidth: A combinatorial analysis through kernelization. SIAM Journal on Discrete Mathematics, 27(4): 2108–2142, 2013. [4] H. L. Bodlaender, B. M. P. Jansen, and S. Kratsch. Kernelization lower bounds by crosscomposition. SIAM Journal on Discrete Mathematics, 28(1):277–305, 2014. [5] A. Brandstädt, V. B. Le, and J. P. Spinrad. Graph Classes: a Survey, volume 3 of SIAM Monographs on Discrete Mathematics and Applications. SIAM, 1999. [6] M. Chang. Algorithms for maximum matching and minimum fill-in on chordal bipartite graphs. In Proceedings of the 7th International Symposium on Algorithms and Computation (ISAAC ’96), volume 1178 of LNCS, pages 146–155. Springer, 1996. [7] E. Dahlhaus and M. Karpinski. Matching and multidimensional matching in chordal and strongly chordal graphs. Discrete Applied Mathematics, 84(1–3):79–91, 1998. [8] R. Duan and S. Pettie. Linear-time approximation for maximum weight matching. Journal of the ACM, 61(1):1:1–1:23, 2014. [9] F. V. Fomin, D. Lokshtanov, M. Pilipczuk, S. Saurabh, and M. Wrochna. Fully polynomialtime parameterized computations for graphs and matrices of low treewidth. In Proceedings of the 28th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA ’17), pages 1419– 1432. SIAM, 2017. [10] H. N. Gabow and R. E. Tarjan. A linear-time algorithm for a special case of disjoint set union. Journal of Computer and System Sciences, 30(2):209–221, 1985. [11] H. N. Gabow and R. E. Tarjan. Faster scaling algorithms for general graph-matching problems. Journal of the ACM, 38(4):815–853, 1991. [12] A. C. Giannopoulou, G. B. Mertzios, and R. Niedermeier. Polynomial fixed-parameter algorithms: A case study for longest path on interval graphs. In Proceedings of the 10th International Symposium on Parameterized and Exact Computation (IPEC ’15), volume 43 of LIPIcs, pages 102–113. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, 2015. [13] J. Guo, F. Hüffner, and R. Niedermeier. A structural view on parameterizing problems: Distance from triviality. In Proceedings of the 1st International Workshop on Parameterized and Exact Computation (IWPEC ’04), volume 3162 of LNCS, pages 162–173. Springer, 2004. [14] M. Gupta and R. Peng. Fully dynamic (1+ e)-approximate matchings. In Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science (FOCS ’13), pages 548–557. IEEE Computer Society, 2013. [15] J. E. Hopcroft and R. M. Karp. An n5/2 algorithm for maximum matchings in bipartite graphs. SIAM Journal on Computing, 2(4):225–231, 1973. [16] R. M. Karp and M. Sipser. Maximum matchings in sparse random graphs. In Proceedings of the 22nd Annual IEEE Symposium on Foundations of Computer Science (FOCS ’81), pages 364–375. IEEE Computer Society, 1981. p [17] S. Micali and V. V. Vazirani. An O( |V ||E|) algorithm for finding maximum matching in general graphs. In Proceedings of the 21st Annual IEEE Symposium on Foundations of Computer Science (FOCS ’80), pages 17–27. IEEE, 1980. [18] S. S. Skiena. The Algorithm Design Manual. Springer, 2010. [19] G. Steiner and J. S. Yeomans. A linear time algorithm for maximum matchings in convex bipartite graphs. Comput. Math. Appl., 31:91–96, 1996. [20] R. Yuster. Maximum matching in regular and almost regular graphs. Algorithmica, 66(1): 87–92, 2013. 28
8cs.DS
Provable quantum state tomography via non-convex methods Anastasios Kyrillidis,1, ∗ Amir Kalev,2, † Dohuyng Park,3, ‡ Srinadh Bhojanapalli,4, § Constantine Caramanis,5, ¶ and Sujay Sanghavi5, ∗∗ 1 arXiv:1711.02524v3 [quant-ph] 19 Nov 2017 IBM T. J. Watson Research Center 2 University of Maryland 3 Facebook 4 Toyota Technological Institute at Chicago 5 University of Texas at Austin With nowadays steadily growing quantum processors, it is required to develop new quantum tomography tools that are tailored for high-dimensional systems. In this work, we describe such a computational tool, based on recent ideas from non-convex optimization. The algorithm excels in the compressed-sensing-like setting, where only a few data points are measured from a lowrank or highly-pure quantum state of a high-dimensional system. We show that the algorithm can practically be used in quantum tomography problems that are beyond the reach of convex solvers, and, moreover, is faster than other state-of-the-art non-convex approaches. Crucially, we prove that, despite being a non-convex program, under mild conditions, the algorithm is guaranteed to converge to the global minimum of the problem; thus, it constitutes a provable quantum state tomography protocol. I. INTRODUCTION Like any other processor, the behavior of a quantum information processor must be characterized, verified, and certified. Quantum state tomography (QST) is one of the main tools for that purpose [1]. Yet, it is generally an inefficient procedure, since the number of parameters that specify quantum states, grows exponentially with the number of sub-systems. This inefficiency has two practical manifestations: (i) without any prior information, a vast number of data points needs to be collected [1]; (ii) once the data is gathered, a numerical procedure should be executed on an exponentially-high dimensional space, in order to infer the quantum state that is most consistent with the observations. Thus, to perform QST on nowadays steadily growing quantum processors [2, 3], we must introduce novel, more efficient, techniques for its completion. Since often the aim in quantum information processing is to coherently manipulate pure quantum states (i.e., states that can be equivalently described with rank-1, positive semi-definite (PSD) density matrices), the use of such prior information is the modus operandi towards making QST manageable, with respect to the amount of data required [4–7]. Compressed sensing (CS) [8, 9] –and its extension to guaranteed low-rank approximation [10– 12]– has been applied to QST [5, 13] within this context. In particular, it has been proven [5, 13–15] that convex programming guarantees robust estimation of pure ∗ † ‡ § ¶ ∗∗ Author to whom correspondence should be addressed; [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] n-qubit states from much less information than common wisdom dictates, with overwhelming probability. These advances, however, leave open the question of how efficiently one can estimate exponentially largesized quantum states, from a limited set of observations. Since convex programming is susceptible of provable performance, typical QST protocols rely on convex programs [5, 7, 13]. Nevertheless, their Achilles’ heel remains the high computational and storage complexity. In particular, due to the PSD nature of density matrices, a key step is the repetitive application of Hermitian eigenproblem solvers. Such solvers include the well-established family of Lanczos methods [16–19], the Jacobi-Davinson SVD type of methods [20], as well as preconditioned hybrid schemes [21], among others; see also the recent article in [22] for a more complete overview. Since –at least once per iteration– a full eigenvalue decomposition is required in such convex programs, these eigensolvers contribute a O((2n )3 ) computational complexity, where n is the number of qubits of the quantum processor. It is obvious that the recurrent application of such eigensolvers makes convex programs impractical, even for quantum systems with a relatively small number n of qubits [5, 23]. Ergo, to improve the efficiency of QST, we need to complement it with numerical algorithms that can efficiently handle large search spaces using limited amount of data, while having rigorous performance guarantees. This is the purpose of this work. Inspired by the recent advances on finding the global minimum in non-convex problems [24–38], we propose the application of alternating gradient descent in QST, that operates directly on the assumed low-rank structure of the density matrix. The algorithm –named Projected Factored Gradient Decent (ProjFGD) and described below in detail– is based on the recently analyzed non-convex method in [29] for PSD matrix factorization problems. The added twist is the inclusion of further constraints in the optimization program, that makes it applicable for tasks such as QST. 2 In general, finding the global minimum in non-convex problems is a hard problem. However, our approach assumes certain regularity conditions –that are, however, satisfied by common CS-inspired protocols in practice [5, 7, 13]– and a good initialization –which we make explicit in the text; both lead to a fast and provable estimation of the state of the system, even with limited amount of data. Our numerical experiments show that our scheme outperforms in practice state-of-the-art approaches for QST. Apart from the QST application, our aim is to broaden the results on efficient, non-convex recovery within the set of constrained low-rank matrix problems. Our developments maintain a connection with analogous results in convex optimization, where standard assumptions are made. However, this work goes beyond convexity, in an attempt to justify recent findings that non-convex methods show significant acceleration, as compared to stateof-the-art convex analogs. δr < 1; i.e., (1 − δr )kρk2F ≤ kM(ρ)k22 ≤ (1 + δr )kρk2F , where k · kF denote the Frobenius norm, is satisfied ∀ρ ∈ n n C2 ×2 such that rank(ρ) ≤ r. An accurate estimation of ρ? is obtained by solving, essentially, a convex optimization problem constrained to the set of quantum states [13], consistent with the measured data. Two such convex program examples are: minimize n n ρ∈C2 For the above setting, we assume that the data is given in the form of expectation values of n-qubit Pauli observables. An n-qubit Pauli observable is given by P = ⊗nj=1 sj where sj ∈ {1, σx , σy , σz }. There are 4n such observables in total. In general, one needs to have the expectation values of all 4n Pauli observables to uniquely reconstruct ρ? ; i.e., performing for many repetitions/shots the same experiment and then taking the expectation of the results (e.g., counts of qubit registers). Since ρ? is a highly-pure density matrix, we apply the CS result on Pauli measurements [5, 15], that guarantees robust estimation, with high probability, from just m = O(r2n n6 ) randomly chosen Pauli observables (in expectation). Key property to achieve this is the restricted isometry property [15]: Definition 1 (Restricted Isometry Property (RIP) for n n Pauli measurements). Let M : C2 ×2 → Rm be a linear n map, such that (M(ρ))i = √2m Tr(Pi ·ρ), for i = 1, . . . , m. Then, with high probability over the choice of m = δc2 · r (r2n n6 ) Pauli observables Pi , where c > 0 is an absolute constant, M satisfies the r-RIP with constant δr , 0 ≤ (1) and, minimize n n ×2 1 2 · ky − M(ρ)k22 subject to ρ  0, Tr(ρ) ≤ 1, QUANTUM STATE TOMOGRAPHY SETUP We begin by describing the problem of QST. We are focusing here on QST of a highly-pure n-qubit state from Pauli measurements. In particular, let yn∈ Rm be the measurement vector with elements yi = √2m Tr(Pi · ρ? ) + ei , i = 1, . . . , m, for some measurement error ei . Here, ρ? denotes the unknown n-qubit densitynmatrix, associated n with the pure quantum state; Pi ∈ C2 ×2 is a randomly n chosen Pauli observable; and the normalization √2m is chosen nto follow the results of [15]. For brevity, we denote n m M : C2 ×2 → R as the linear “sensing” map, such that n 2 (M(ρ))i = √m Tr(Pi · ρ), for i = 1, . . . , m. Tr(ρ) subject to ρ  0, ky − M(ρ)k2 ≤ , ρ∈C2 II. ×2 (2) where ρ  0 captures the positive semi-definite assumption, k · k2 is the vector Euclidean `2 -norm, and  > 0 is a parameter related to the error level in the model. Key in both programs is the combination of the PSD and the trace constraints: combined, they constitute the tightest convex relaxation to the low-rank, PSD structure of the unknown ρ? ; see also [10]. As was discussed in the introduction, the problem with convex programs, such as (1) and (2), is their inefficiency when applied in high-dimensional systems: most practical solvers for (1)-(2) are iterative and handling PSD constraints adds an immense complexity overhead per iteration, especially when n is large; see also Section V. In this work, we propose to use non-convex programming for QST of low-rank density matrices, which leads to higher efficiency than typical convex programs. We achieve this by restricting the optimization over the intrinsic non-convex structure of rank-r PSD matrices. This allow us to “describe” an 2n × 2n PSD matrix  with only O(2n r) space, as opposed to the O (2n )2 ambient space. Even more substantially, our program has theoretical guarantees of global convergence, similar to the guarantees of convex programming, while maintaining faster preformace than the latter. These properties make our scheme ideal to complement the CS methodology for QST in practice. III. PROJECTED FACTORED GRADIENT DECENT ALGORITHM Optimization criterion recast: At its basis, the Projected Factored Gradient Decent (ProjFGD) algorithm transforms convex programs, such as in (1)-(2), by imposing the factorization of a d × d PSD matrix ρ such 3 that ρ = AA† . This factorization, popularized by Burer and Monteiro [39, 40] for solving semi-definite convex programming instances, naturally encodes the PSD constraint, removing the expensive eigen-decomposition projection step. For concreteness, we focus here on the convex program (2), where d = 2n . In order to encode the trace constraint, ProjFGD enforces additional constraints on A. In particular, the requirement that Tr(ρ) ≤ 1 is translated to the convex constraint kAk2F ≤ 1, where k · kF is the Frobenius norm. The above recast the program (2) as a non-convex program: minimize A∈Cd×r 1 2 · ky − M(AA† )k22 subject to kAk2F ≤ 1. (3) Observe that, while the constraint set is convex, the objective is no longer convex due to the bilinear transformation of the parameter space ρ = AA† . Such criteria have been studied recently in machine learning and signal processing applications [24–38]. Here, the added twist is the inclusion of further matrix norm constraints, that makes it proper for tasks such as QST; as we show in Appendices A and B, such addition complicates the algorithmic analysis. The prior knowledge that rank(ρ? ) ≤ r? is imposed in the program by setting A ∈ Cd×r? . In real experiments, the state of the system, ρ? , could be full rank, but often is highly-pure with only few dominant eigenvalues. In this case, ρ? is well-approximated by a low-rank matrix of rank r, which can be much smaller than r? , similar to the CS methodology. Therefore in the ProjFGD protocol we set A ∈ Cd×r . In this form, A contains much less variables to maintain and optimize than a d × d PSD matrix, and thus it is easier to update and to store its iterates. An important issue in optimizing (3) over the factored space is the existence of non-unique possible factorizations for a given ρ. To see this, if ρ = AA† , then for any unitary matrix R ∈ Cr×r such that RR† = I, we have bA b† , where A b = AR. Since we are interested in obρ=A taining a low-rank solution in the original space, we need a notion of distance to the low-rank solution ρ? over the factors. We use the following unitary-invariant distance metric: Definition 2. Let matrices A, A? ∈ Cd×r . Define: Dist (A, A? ) := min kA − A? RkF , R:R∈U where U is the set of r × r unitary matrices. The ProjFGD algorithm: At heart, ProjFGD is a projected gradient descent algorithm over the variable A. The pseudocode is provided in Algorithm 1. Algorithm 1 ProjFGD pseudocode for (3) 1: Input: Function f , target rank r, # iterations T . † 2: Output: ρ = AT AT . 3: 4: 5: 6: 7: 8:  Initialize ρ0 randomly or set ρ0 := 2/Lb · ΠC 0 M† (y) . Set A0 ∈ Cd×r such that ρ0 = A0 A†0 . Set step size η as in (8). for t = 0 to T− 1 do  At+1 = ΠC At − η∇f (At A†t ) · At . end First, some properties of the objective in (3). Denote g(A) = 12 · ky − M(AA† )k22 and f (ρ) = 12 · ky − M(ρ)k22 . Due to the symmetry of f , i.e., f (ρ) = f (ρ† ), the gradient of g(A) with respect to A variable is given by  ∇g(A) = ∇f (ρ) + ∇f (ρ)† · A = 2∇f (ρ) · A, where ∇f (ρ) = −2M† (y − M(ρ)), and M† is the adjoint operator for M. For the Pauli measurements case we consider in this paper, the adjoint operator for an n Pm input vector b ∈ Rm is M† (b) = √2m i=1 bi Pi . d×r Let ΠC (B) denote  the projection a matrix B ∈ C onto the set C = A : A ∈ Cd×r , kAk2F ≤ 1 , as in (3). For this particular C, ΠC (B) = ξ(B) · B, where ξ(·) ∈ (0, 1]; in the case where ξ(·) = 1, B ∈ C already. As an initialization, we compute ΠC 0 (·), which denotes the projection onto the set of PSD matrices with trace bound Tr(ρ) ≤ 1; we discuss later in the text how to complete this step in practice. The main iteration of ProjFGD is in line 7 of Algorithm 1, where it applies a simple update rule over the factors:   At+1 = ΠC At − η∇f (At A†t ) · At , Observe that the input argument in ΠC (·) is: At − η∇f (At A†t ) · At = At − η∇g(At ); i.e., it performs gradient descent over A variable, with step size η. Any constants are “absorbed” in the step size selection, for clarity. Two vital components of our algorithm are: (i) the initialization step and, (ii) step size selection. A. Initialization ρ0 Due to the bilinear structure in (3), at first glance it is not clear whether the factorization ρ = AA† introduces spurious local minima, i.e., local minima that do not exist in (1)-(2), but are “created” after the substitution ρ = AA† . This necessitates careful initialization, in order to obtain the global minimum. Before describing our initialization procedure, we find it helpful to first discuss an initialization procedure for an altered version of (3) where trace constraints are excluded. In this case, (3) transforms to: minimize A∈Cd×r 1 2 · ky − M(AA† )k22 . (4) 4 Under this setting, the following theory stems from [30]: Theorem 3. Suppose the unknown ρ? is a rank-r density matrix with a non-unique factorization ρ? = A? A†? , for A? ∈ Cd×r . Under the noiseless model, the observations satisfy y = M(ρ? ). Assuming that the linear map M satisfies the restricted isometry property in Definition 1, with constant δ4r / 0.0363, any critical point A satisfying first- and second-order optimality conditions is a global minimum. Corollary 4. Suppose the unknown ρ? is a full rank density matrix and let ρ?,r denote its best rank-r approximation, in the Eckart-Young-Minsky-Steward sense [41, 42]. Let ρ?,r have a non-unique factorization ρ?,r = A? A†? , for A? ∈ Cd×r . Under the noiseless model, the observations satisfy y = M(ρ? ). Assuming that the linear map M satisfies the restricted isometry property in Definition 1, with constant δ4r ≤ 1/200, any critical point A satisfying first- and second-order optimality conditions satisfy: Dist(A, A? ) ≤ 1250 3σr (ρ? ) · kM (ρ? − ρ?,r )k2 . In plain words, under the noiseless model and with high probability (that depends on the random structure of the sensing map M), Theorem 3 states that the nonconvex change of variables ρ = AA† does not introduce any spurious local minima in the low-rank ρ? case, and random initialization is sufficient for Algorithm 1 to find the global minimum, assuming a proper step size selection. Further, when ρ? is not low-rank, there are low-rank solutions ρ?,r , close to ρ? ; how much close is a function of the spectrum of ρ? and its best rank-r approximation residual (Corollary 4). In these cases, Step 3 in Algorithm boils down to random initialization. The above cases hold when M corresponds to a POVM; then the explicit trace constraint is redundant. In the more general case where the trace constraint is present, a different approach is followed. In that case, the initial point ρ 0 is set as ρ0 := 1/Lb · ΠC 0 (−∇f (0)) = 2/L b · ΠC 0 M† (y) , where ΠC 0 (·) denotes the projection onto the set of PSD matrices ρ that satisfy Tr(ρ) ≤ 1. b represents an approximation of L, where L is Here, L such that for all rank-r matrices ρ, ζ: k∇f (ρ) − ∇f (ζ)kF ≤ L · kρ − ζkF . (5) (This also means that f is restricted gradient Lipschitz continuous with parameter L. We defer the reader to the Appendix A for more information). In practice, we set b ∈ (1, 2). L This is the only place in the algorithm where eigenvalue-type calculation is required. The projection ΠC 0 (·) is given in [43]. Given M† (y), it is described with the following criterion: minimize ρ0 ∈Cd×d 1 2 · kρ0 − M† (y) k2F subject to ρ0  0, Tr(ρ0 ) ≤ 1, (6) To solve this problem, we first compute its eigendecomposition M† (y) := ΦΛΦ† , where Φ is a unitary matrix containing the eigenvectors of the input matrix. Due to the fact that the Frobenius norm is invariant under unitary transformations, [43] proves that b > , where Λ b is a diagonal matrix, computed ρ0 = ΦΛΦ via: minimize b Λ subject to b − Λk2F · kΛ X b ii ≤ 1, Λ 1 2 (7) i b  0. Λ The last part can be easily solved using the projection onto the unit simplex [44–46]. Alternatively, in practice, we could just use a standard projection onto the set of PSD matrices ρ0 := 2/L b · Π+ M† (y) ; our experiments show that it is sufficient and can be implemented by any off-the-shelf eigenvalue solver. In that case, the algorithm generates an initial matrix A0 ∈ Cd×r by truncating the computed eigendecomposition, followed by a projection onto the convex set, C, defined by set of constraints in the program, e0 ). In our case C = {A ∈ Cd×r : kAk2 ≤ 1}. A0 = ΠC (A F Note again that the projection operation is a simple entry-wise scaling, for A ∈ / C, ΠC (A) = ξ(A) · A, where ξ(A) = kAk−1 . F Apart from the procedure mentioned above, we could also use more specialized spectral methods for initialization [26, 47] or, alternatively, run convex algorithms, such as (2) for only a few iterations. However, this choice often leads to an excessive number of full or truncated eigenvalue decompositions [28], which constitutes it a nonpractical approach. The discussion regarding the step size and what type of guarantees we obtain is discussed next. B. Step size selection and theoretical guarantees Focusing on (3), we provide theoretical guarantees for ProjFGD. Our theory dictates a specific constant step size selection that guarantees convergence to the global minimum, assuming a satisfactory initial point ρ0 is provided. Let us first describe the local convergence rate guarantees of ProjFGD. Theorem 5 (Local convergence rate for QST). Let ρ? be a rank-r quantum state density matrix of an n-qubit system with a non-unique factorization ρ? = A? A†? , for 2n ×r A? ∈ C . Let y ∈ Rm be the measurement vector of m = O(rn6 2n ) random n-qubit Pauli observables, and M be the corresponding sensing map, such that yi = (M(ρ? ))i + ei , ∀i = 1, . . . , m. Let the step η in ProjFGD satisfy: η≤ 1 b 1 (ρ0 )+σ1 (∇f (ρ0 ))) , 128(Lσ (8) 5 where σ1 (ρ) denotes the leading singular value of ρ. Here, b ∈ (1, 2) and ρ0 = A0 A† is the initial point such that: L 0 Dist(A0 , A? ) ≤ γ 0 σr (A? ), σr (ρ? ) 1 4r ) for γ 0 := c · (1−δ (1+δ4r ) · σ1 (ρ? ) , c ≤ 200 , where δ4r is the RIP constant. Let At be the estimate of ProjFGD at the t-th iteration.; then, the new estimate At+1 satisfies Dist(At+1 , A? )2 ≤ α · Dist(At , A? )2 , (9) (1−δ4r )·σr (ρ? ) where α := 1 − 550((1+δ < 1. Further, At+1 4r )σ1 (ρ? )+kek2 ) satisfies Dist(At+1 , A? ) ≤ γ 0 σr (A? ), ∀t. The above theorem provides a local convergence guarantee: given an initialization point ρ0 = A0 A†0 close enough to the optimal solution –in particular, where Dist(A0 , A? ) ≤ γ 0 σr (A? ) is satisfied– our algorithm converges locally with linear rate. In particular, in or2 der to obtain Dist(A  T , A? ) ≤ ε, ProjFGD requires 0 T = O log γ ·σrε(A? ) number of iterations. We conjecture that this further translatespinto linear convergence √ √ in the infidelity metric, 1 − Tr( ρT ρ? ρT ) 2 . The per-iteration complexity of ProjFGD is dominated by the application of the linear map M and by matrix-matrix multiplications. We note that, while both eigenvalue decomposition and matrix multiplication are known to have O((2n )2 r) complexity in Big-Oh notation, the latter is at least two-orders of magnitude faster than the former on dense matrices [33]. The proof of Theorem 5 is provided in the Appendix A. We believe that our result, as stated in its most generality, complements recent results from the machine learning and optimization communities, where different assumptions were made [26], or where constraints on A cannot be accommodated [29]. So far, we assumed ρ0 is provided such that Dist(A0 , A? ) ≤ γ 0 σr (A? ). The next theorem shows that our initialization could achieve this guarantee (under assumptions) and turn the above local convergence guarantees to convergence to the global minimum. † Lemma 6. Let  A0 be such that ρ0 = A0 A0 = −1 ΠC 0 L · ∇f (0) . Consider the problem in (3) where M satisfies the RIP property for some constant δ4r ∈ (0, 1). Further, assume the optimum point ρ? satisfies rank(ρ? ) = r. Then, A0 computed as above satisfies: where γ 0 srank(ρ) = Dist(A0 , A? ) ≤ γ 0 · σr (A? ), r 1−δ p 1− 1+δ4r √ 4r · τ (ρ? ) · = srank(ρ? ) and 2( 2−1) kρkF σ1 (ρ) . This initialization introduces further restrictions on ?) the condition number of ρ? , τ (ρ? ) = σσr1 (ρ (ρ? ) , and the condition number of the objective function, which is pro1+δ4r portional to ∝ 1−δ . In particular, the initialization 4r assumptions in Theorem 5 are satisfied by Lemma 6 if and only if M satisfies RIP with constant δ4r fulfilling the following expression: √ √ q 1 + δ4r 1 2( 2−1) 4r ≤ . · 1 − 1−δ ·√ 1+δ 200 4r 1 − δ4r r · τ 2 (ρ? ) While such conditions are hard to check a priori, our experiments showed that our initialization, as well as the random initialization, work well in practice, and this behavior has been observed repeatedly in all the experiments we conducted. Thus, the method returns the exact solution of the convex programming problem, while being orders of magnitude faster. IV. RELATED WORK We focus on efficient methods for QST; for a broader set of citations that go beyond QST, we defer the reader to [33] and references therein. The use of non-convex algorithms in QST is not new [48, 49], and dates before the introduction of the CS protocol in QST settings [5]. Assuming a multinomial distribution, [48] focus on the normalized negative log-likelihood objective (see Eq. (2) in [48]) and propose an diluted non-convex iterative algorithm for its solution. The suggested algorithm exhibits good convergence and monotonic increase of the likelihood objective in practice; despite its success, there is no argument that guarantees its performance, neither a provable setup for its execution. [50, 51] use the reparameterization ρ = AA† in a Lagrange augmented maximum log-likelihood (ML) objective (see Eq. (3) in [50] and Eq. (9) in [51]), under the multinomial distribution assumption. The authors state that such a problem can be solved by standard numerical procedures for searching the maximum of the ML objective [50], and use the downhill simplex method for its solution, over the parameters of the matrix A [52]. Albeit [50, 51] rely on the uniqueness of the ML solution before the reformulation ρ = AA† (due to the convexity of the original problem), there are no theoretical results on the non-convex nature of the transformed objective (e.g., the presence of spurious local minima). [53] consider the case of maximum likelihood quantum state tomography, under additive Gaussian noise, in the informationally complete case. Assuming the measurement operators are traceless, simple linear inversion techniques are shown to work accurately to infer the constrained ML state in a single projection step, from the unconstrained ML state. As an extension, [54] present a GPU implementation of the algorithm that recovers a simulated 14-qubit density matrix within four hours; however, implementations of a linear system inversion could increase dramatically the computational and storage complexity, as the dimension of the problem grows. Based on the extremal equations for the multinomial ML objective, [49] propose a fixed-point iteration 6 steepest-ascent method on A (with user-defined hyperparameters, such as the step size of the ascent). How many iterations required and how to set up initial conditions are heuristically defined. Typically these methods, as discussed in [55], lead to ill-conditioned optimization problems, resulting in slow convergence. [55] propose a hybrid algorithm that (i) starts with a conjugate-gradient (CG) algorithm in the A space, in order to get initial rapid descent, and (ii) switch over to accelerated first-order methods in the original ρ space, provided one can determine the switchover point cheaply. Under the multinomial ML objective, in the initial CG phase, the Hessian of the objective is computed per iteration (i.e., a d2 × d2 matrix), along with its eigenvalue decomposition. Such an operation is costly, even for moderate values of d, and heuristics are proposed for its completion. In the later phase, the authors exploit “momentum” techniques from convex optimization, that lead to provable acceleration when the objective is convex; as we state in the Conclusions section, such acceleration techniques have not considered in the factored space A, and constitute an interesting research direction. From a theoretical perspective, [55] provide no convergence or convergence rate guarantees. [56] use in practice the general parameterization of AA† density matrices, ρ = Tr(AA † ) , that ensures jointly positive definiteness and unity in the trace. There, in order to attain the maximum value of the log-likehoood objective, a steepest ascent method is proposed over A variables, where the step size η is an arbitrarily selected but sufficient small parameter. There is no discussion regarding convergence and convergence rate guarantees, as well as any specific set up of the algorithm (step size, initialization, etc.). [43] study the QST problem in the original parameter space, and propose a projected gradient descent algorithm. The proposed algorithm applies both in convex and non-convex objectives, and convergence only to stationary points could be expected. [57] extend the work in [43] with two first-order variants, using momentum motions, similar to the techniques proposed by Polyak and Nesterov for faster convergence in convex optimization [58]. The above algorithms operate in the informationally complete case. Similar ideas in the informationally incomplete case can be found in [59, 60]. Very recently, [61] presented an experimental implementation of CS tomography of a n = 7 qubit system, where only 127 Pauli basis measurements are available. To achieve recovery in practice –within a reasonable time frame over hundreds of problem instances– the authors proposed a computationally efficient estimator, based on the factorization ρ = AA† . The resulting method resembles the gradient descent on the factors A, as the one presented in this paper. However, the authors focus only on the experimental efficiency of the method and provide no specific results on the optimization efficiency of the algorithm, what are its theoretical guarantees, and how its components (such as initialization and step size) affect its performance (e.g., the step size is set to a sufficiently small constant). One of the first provable algorithmic solutions for the QST problem was through convex approximations [10]: this includes nuclear norm minimization approaches [5], as well as proximal variants, as the one that follows: minimize ρ0 kM(ρ) − yk2F + λTr(ρ). (10) See also [5] for the theoretical analysis. Within this context, we mention the work of [62]: there, the AccUniPDGrad algorithm is proposed –a universal primaldual convex framework with sharp operators, in lieu of proximal low-rank operators– where QST is considered as an application. AccUniPDGrad combines the flexibility of proximal primal-dual methods with the computational advantages of conditional gradient (Frank-Wolfelike) methods. We will use this algorithm for comparisons in the experimental section. [63] presents SparseApproxSDP algorithm that solves the QST problem in (2), when the objective is a generic gradient Lipschitz smooth function, by updating a putative low-rank solution with rank-1 refinements, coming from the gradient. This way, SparseApproxSDP avoids computationally expensive operations per iteration, such as full eigen-decompositions. In theory, at the r-th iteration, SparseApproxSDP is guaranteed to compute a 1r approximate solution, with rank at most r, i.e., achieves  a sublinear O 1ε convergence rate. However, depending on ε, SparseApproxSDP might not return a low rank solution. Finally, [60] propose Randomized Singular Value Projection (RSVP), a projected gradient descent algorithm for QST, which merges gradient calculations with truncated eigen-decompositions, via randomized approximations for computational efficiency. Overall, our program is tailored for tomography of highly-pure quantum states, by incorporating this constraint into the structure of A. This has two advantages. First, it results in a faster algorithm that enables us to deal many-qubit state reconstruction in a reasonable time; and, second, it allows us prove the accuracy of the ProjFGD estimator under model errors and experimental noise, similar to the CS results. V. NUMERICAL EXPERIMENTS We conducted experiments in an Matlab environment, installed in a Linux-based system with 256 GB of RAM, and equipped with two Intel Xeon E5-2699 v3 2.3GHz, 45M Cache, 9.60GT/s. In all the experiments, the error reported in the Frobenius metric, kb ρ−ρ? kF /kρ? kF , where ρb is the estimation of the true state ρ? . Note that for a pure state ρ, kρkF = 1. For some experiments we also p √ √ 2 report the infidelity metric 1−Tr ρ? ρb ρ? . We will also use Sd to denote the set of d × d density matrices Sd = {% : % ∈ Cd×d , %  0, Tr(%) = 1}. 7 d = 27 σ=0 Algorithm Time [s] (1) (2) ProjFGD 46.01 77.12 0.28 d = 213 σ = 0.05 kb ρ−ρ? kF kρ? kF Time [s] 5.3538e-07 3.0645e-04 3.2224e-08 58.48 65.53 0.30 kb ρ−ρ? kF kρ? kF σ=0 Infidelity 6.0405e-02 3.0394e-02 6.1407e-02 3.0559e-02 2.3540e-02 1.3820e-04 σ = 0.05 Time [s] kb ρ−ρ? kF kρ? kF Time [s] 1314.01 6.8469e-08 1487.22 kb ρ−ρ? kF kρ? kF Infidelity 3.1104e-02 1.9831e-03 TABLE I. All values are median values over 10 independent Monte Carlo iterations. As a first set of experiments, we compare the efficiency of ProjFGD with second-order cone convex programs. State of the art solvers within this class of solvers are the SeDuMi [64] and SDPT3 [65] methods; for their use, we rely on the off-the-shelf Matlab wrapper CVX [66]. In our experiments, we observed that SDPT3 was faster and we select it for our comparison. The setting is as described in Section II: we consider rank-1 normalized density matrices ρ? ∈ S2n , from wen which we obtain Pauli measurements such that yi = √2m Tr(Pi · ρ? ) + ei , i = 1, . . . , m, for some i.i.d. Gaussian measurement error ei , with variance σ, i.e., ∼ CN (0, σ · I). We consider both convex formulations (1)-(2) and compare it to the ProjFGD estimator with r = 1; in figures we use the notation CVX 1 and CVX 2 for simplicity. We consider two cases: (i) n = 7, and (ii) n = 13. Table I shows median values of 10 independent experimental realizations for m = 37 rd log d; this selection of m was made so that all algorithms return a solution close to the optimum ρ? . Empirically, we have observed that ProjFGD succeeds even for cases m = O(rd). We consider both noiseless σ = 0 and noisy σ = 0.05 settings. In order to accelerate the execution of convex programs, we set the solvers in CVX to low precision. From Table I, we observe that our method is two orders of magnitude faster than second-order methods for n = 7: ProjFGD achieves better performance (in both error metrics, and in both noisy/noiseless cases), faster. For the higher n = 13 qubit case, we could not complete the experiments for (1)-(2) due to system crash (RAM overflow). Contrariwise, our method was able to complete the task with success within about 22 minutes of CPU time. Figures 1-2 show graphically how second-order convex vs. our first-order non-convex schemes scale, as a function of time. In Figure 1, we fix the dimension to d = 27 and study how increasing the number of observations m affects the performance of the algorithms. We observe that, while in the ProjFGD, more observations lead to faster convergence [67], the same does not hold for the second-order cone programs. In Figure 2, we fix the number data points to m = 37 rd log d, and we scale the dimension d. It is obvious that the convex solvers do not scale easily beyond n = 7, whereas our method handles cases up to n = 13, within reasonable time. 10 3 2.1e-04 1.7e-04 1.7e-04 10 2 Time (sec.) Comparison of ProjFGD with second-order methods 6.5e-04 2.6e-06 3.8e-04 2.8e-04 3.1e-04 2.9e-04 4.0e-07 3.7e-07 9.8e-07 7.3e-07 1.9e-04 1.8e-04 5.4e-07 4.3e-07 3.4e-07 2.6e-07 3.9e-07 CVX 1 CVX 2 ProjFGD 10 1 10 0 1.8e-07 7.2e-08 10 -1 500 5.0e-08 1000 3.2e-08 3.1e-08 2.2e-08 1.9e-08 2.1e-08 1.6e-08 1.5e-08 1500 2000 2500 3000 3500 Number of data points FIG. 1. Dimension fixed to d = 27 with rank(ρ? ) = 1. The figure depicts the noiseless setting, σ = 0. Numbers within figure are the error in Frobenius norm achieved (median values). 10 4 10 3 Time (sec.) A. 10 2 CVX 1 CVX 2 ProjFGD 10 1 10 0 10 -1 10 -2 1 10 10 2 10 3 10 4 Dimension d FIG. 2. Number of data points set to m = 73 rd log d. Rank of optimum point is set to rank(ρ? ) = 1. The figure depicts the noiseless setting. 8 B. Comparison of ProjFGD with first-order methods Here, we compare our method with more efficient firstorder methods, both convex (AccUniPDGrad [62]) and non-convex (SparseApproxSDP [63] and RSVP [60]). We consider two settings: ρ? ∈ Sd is (i) a pure state (i.e., rank(ρ? ) = 1) and, (ii) a nearly low-rank state. In the latter case, we construct ρ? = ρ?,r + ζ, where ρ?,r is a rank-deficient PSD satisfying rank(ρ?,r ) = r, and ζ ∈ Cd×d is a full-rank PSD noise term with a fast decaying eigen-spectrum, significantly smaller than the leading eigenvalues of ρ?,r . In other words, we can wellapproximate ρ? with ρ?,r . For all cases, we model the measurement vector as y = M(ρ? ) + e; here, the noise is such that kek = 10−3 . The number of data points m satisfy m = Csam · rd, for various values of Csam > 0. For all algorithms, we assumed r = rank(ρ?,r ) is known and use it to reconstruct a rank-r approximation of ρ? . All methods that require an SVD routine use lansvd(·) from the PROPACK software package. Experiments and algorithms are implemented in a Matlab environment; we used non-specialized and non-mexified code parts for all algorithms. For initialization, we use the same starting point for all algorithms, which is either specific (Section III A) or random. As a stopping criterion, we use kρt+1 −ρt kF ≤ tol; we set the tolerance parameter to kρt+1 kF tol := 5 · 10−6 . Convergence plots. Figure 3 (two-leftmost plots) illustrates the iteration and timing complexities of each algorithm under comparison, for a pure state recovery setting (r = 1) of a highly-pure ρ? . Here, n = 12 which corresponds to a d2 = 16, 777, 216 dimensional problem; moreover, we assume Csam = 3 and thus the number of data points are m = 12, 288. For initialization, we use the proposed initialization in Section III A for all algorithms: we compute −M† (y), extract factor A0 as the best-r PSD approximation of −M† (y), and project A0 onto C. It is apparent that ProjFGD converges faster to a vicinity of ρ? , compared to the rest of the algorithms; observe also the sublinear rate of SparseApproxSDP in the inner plots, as reported in [63]. Table II contains recovery error and execution time results for the case n = 13 (d = 8096); in this case, we solve a d2 = 67, 108, 864 dimensional problem. For this case, RSVP and SparseApproxSDP algorithms were excluded from the comparison, due to excessive execution time. Appendix C provides extensive results, where similar performance is observed for other values of d = 2n and Csam . Figure 3 (rightmost plot) considers the more general case where ρ? is nearly low-rank: i.e., it can be wellapproximated by a density matrix ρ?,r where r = 20 (lowrank density matrix). In this case, n = 12, m = 245, 760 for Csam = 3. As the rank in the model, r, increases, algorithms that utilize an SVD routine spend more CPU time on singular value/vector calculations. Certainly, the Algorithm kb ρ−ρ? kF kρ? kF Time [s] AccUniPDGrad ProjFGD 7.4151e-02 8.6309e-03 2354.4552 1214.0654 TABLE II. Comparison results for reconstruction and efficiency, for n = 13 qubits and Csam = 3. same applies for matrix-matrix multiplications; however, in the latter case, the complexity scale is milder than that of the SVD calculations. Further metadata are also provided in Table III. Setting: r = 5. Algorithm kb ρ−ρ?,r kF kρ?,r kF SparseApproxSDP RSVP AccUniPDGrad ProjFGD 3.17e-02 5.15e-02 2.01e-02 1.20e-02 Setting: r = 20. Time [s] kb ρ−ρ?,r kF kρ?,r kF Time [s] 3.74 0.78 0.36 0.06 5.49e-02 1.71e-02 1.54e-02 7.12e-03 4.38 0.38 0.33 0.04 TABLE III. Results for reconstruction and efficiency. Time reported is in seconds. For all cases, Csam = 3 and n = 10. For completeness, in Appendix C we provide results that illustrate the effect of random initialization: Similar to above, ProjFGD shows competitive behavior by finding a better solution faster, irrespective of initialization point. Timing evaluation (total and per iteration). Figure 4 highlights the efficiency of our algorithm in terms of time complexity, for various problem configurations. Our algorithm has fairly low per iteration complexity (where the most expensive operation for this problem is matrixmatrix and matrix-vector multiplications). Since our algorithm shows also fast convergence in terms of the number of iterations, this overall results into faster convergence towards a good approximation of ρ? , even as the dimension increases. Figure 4 shows how the total execution time scales with parameters n and r. Overall performance. ProjFGD shows a substantial improvement in performance, as compared to the stateof-the-art algorithms; we would like to emphasize also that projected gradient descent schemes, such as in [60], are also efficient in small- to medium-sized problems, due to their fast convergence rate. Further, convex approaches might show better sampling complexity performance (i.e., as Csam decreases). Nevertheless, one can perform accurate MLE reconstruction for larger systems in the same amount of time using our methods for such small- to medium-sized problems. We defer the reader to Appendix C, due to space restrictions. 9 Rank r = 1 - Data points m = 3 " d " r Rank r = 1 - Data points m = 3 " d " r AccUniPDGrad ProjFGD 0.2 200 10 10 -2 0 0.5 400 600 10 20 -1 10 SparseApproxSDP 0 10 -1 1 800 30 2000 4000 6000 8000 100001200014000 2000 4000 6000 8000 10000 12000 1000 Number of iterations 0 10 10 -1 ;!;?;r kF kb k;?;r kF 0.4 0 RSVP SparseApproxSDP ;!;?;r kF kb k;?;r kF 0.6 10 -2 -1 ;!;? kF kb k;? kF ;!;? kF kb k;? kF 0.8 10 -1 10 RSVP SparseApproxSDP 1 -2 AccUniPDGrad ProjFGD 10 0 0 ;!;? kF kb k;? kF 10 -1 ;!;? kF kb k;? kF 10 Rank r = 20 - Data points m = 3 " d " r AccUniPDGrad ProjFGD Cumulative time (sec) 10-2 0 40 200 400 Cumulative time (sec) Number of iterations Cumulative time (sec) 10-2 600 0 100 200 300 400 Cumulative time (sec) Total time (log-scale) Total time (log-scale) FIG. 3. Left and middle panels: Convergence performance of algorithms under comparison w.r.t. error in Frobenius norm vs. (i) the total number of iterations (left) and (ii) the total execution time. Both cases correspond to Csam = 3, r = 1 (pure state) and n = 12 (i.e., d = 4096). Right panel: Nearly low-rank state case—we approximate ρ? with ρ?,r , with r = 20. In this setting, n = 12 (i.e., d = 4096) and Csam = 3. 10 8 6 4 RSVP SparseApproxSDP AccUniPDGrad ProjFGD 2 0 -2 -4 6 8 10 n-qubit (d = 2n ) 12 10 8 6 4 RSVP SparseApproxSDP AccUniPDGrad ProjFGD 2 0 1 5 20 Rank r FIG. 4. Timing bar plot.y-axis shows total execution time in (log10 -scale) while x-axis corresponds to different n values. Top panel corresponds to r = 1 and Csam = 6; bottom panel corresponds to n = 10 and Csam = 3. All cases are noiseless. VI. SUMMARY AND CONCLUSIONS In this work, we propose a non-convex algorithm, dubbed as ProjFGD, for estimating a highly-pure quantum state, in a high-dimensional Hilbert space, from relatively small number of data points. We showed empirically that ProjFGD is orders of magnitude faster than state-of-the-art convex and non-convex programs, such as [62],[63], and [60]. More importantly, we prove that under proper initialization and step-size, the ProjFGD is guaranteed to converge to the global minimum of the problem, thus ensuring a provable tomography proce- dure; see Theorem 5 and Lemma 6. In our setting, we model the state as a low-rank PSD matrix. This, in turn, means that the estimator is biased towards low-rank states. However, such bias is inherent to all CS-like QST protocols by the imposition of the positivity constraint [13]. Our techniques and proofs can be applied –in some cases under proper modifications– to scenaria beyond the ones considered in this work. We restricted our discussions to a measurement model of random Pauli observables, that satisfies RIP. We conjecture that our results apply for other “sensing” settings, that are informationally complete for low-rank states; see e.g., [7]. The results presented here are independent of the noise model and could be applied for non-Gaussian noise models, such as those stemming from finite counting statistics. Lastly, while here we focus on state tomography, it would be interesting to explore similar techniques for the problem of process tomography. We conclude with a short list of interesting future research directions. Our immediate goal is the application of ProjFGD in real-world scenaria; this could be completed by utilizing the infrastructure at the IBM T.J. Watson Research Center [3]. This could complement the results found in [61] for a different quantum system. Beyond this practical implementation, we identify the following interesting open questions. First, the ML estimator is one of the most frequently-used methods for QST experiments. Beyond its use as point estimator, it is also used as a basis for inference around the point estimate, via confidence intervals [68] and credible regions [69]. However, there is still no rigorous analysis when the factorization ρ = AA† is used. The work of [55] considers accelerated gradient descent methods for QST in the original parameter space ρ: Based on the seminal work of Polyak and Nesterov [58] on convex optimization first-order methods, one can achieve orders of magnitude acceleration (both in theory and practice), by exploiting the momentum from previous iterates. It remains an open question how our ap- 10 proach could exploit acceleration techniques that lead to faster convergence in practice, along with rigorous approximation and convergence guarantees. Further, distributed/parallel implementations, like the one in [54], remain widely open using our approach, in order to accelerate further the execution of the algorithm. Research along these directions is very interesting and is left for future work. Finally, while we saw numerically that a random initialization under noisy and constrained settings works well, a careful theoretical treatment for this case is an open problem. To shed some light on the notions of (restricted) strong convexity and smoothness and how they relate to the QST objective, consider the restricted isometry property, which holds with high probability under Pauli measurements for low rank ρ? [11, 15]; here, we present a simplified version of the definition in the main text: Definition 9 (Restricted Isometry Property (RIP)). A linear map M satisfies the r-RIP with constant δr , if (1 − δr )kρk2F ≤ kM(ρ)k22 ≤ (1 + δr )kρk2F , is satisfied for all matrices ρ ∈ Cd×d such that rank(ρ) ≤ r. According to the quadratic loss function in QST: f (ρ) = 12 ky − M(ρ)k22 , ACKNOWLEDGMENTS Anastasios Kyrillidis is supported by the IBM Goldstine Fellowship and Amir Kalev is supported by the Department of Defense. Appendix A: Theory  Notation. For matrices ρ, ζ ∈ Cd×d , hρ, ζi = Tr ρ† ζ represents their inner product. We use kρkF and σ1 (ρ) for the Frobenius and spectral norms of a matrix, respectively. We denote as σi (ρ) the i-th singular value of ρ. ρr denotes the best rank-r approximation of ρ. 1. Problem generalization, notation and definitions To expand the generality of our scheme, we re-state the problem setting for a broader set of objectives. The following arguments hold for both real and complex matrices. We consider criteria of the following form: its Hessian is given by M† M(·). Then, (restricted) strong convexity suggests that: kM(ρ)k22 ≥ C · kρk2F , for a restricted set of directions ρ, where C > 0 is a small constant. Then, the correspondence of restricted strong convexity and smoothness with the RIP is obvious: both lower and upper bound the quantity kM(ρ)k22 , where ρ is drawn from a restricted (low-rank) set. It turns out that linear maps that satisfy the RIP for low rank matrices, also satisfy the restricted strong convexity; see Theorem 2 in [71]. By assuming RIP, the condition number κ of f depends on the RIP constants of the linear map M; in particular, 1+δ ∝ 1−δ , since the eigenvalues of one can show that κ = L µ † M M lie between 1−δ and 1+δ, when restricted to low-rank matrices. Observe that for δ sufficiently small and dimension d sufficiently large, κ ≈ 1, with high probability. We assume the optimum ρ? satisfies rank(ρ? ) = r? . For our analysis, we further assume we know r? and set r? ≡ r. As suggested in the main text, we solve (A1) in the factored space, as follows: minimize A∈Cd×r minimize ρ∈Cd×d f (ρ) subject to ρ  0, ρ ∈ C 0 . (A1) To make connection with the QST objective, set f (ρ) = 1 · ky − M(ρ)k22 , and ρ ∈ C 0 ⇔ Tr(ρ) ≤ 1. Apart from 2 the least-squares objective in QST, our theory extends to applications that can be described by strongly convex functions f with gradient Lipschitz continuity. Further, our ideas can be applied in a similar fashion to the case of restricted smoothness and restricted strong convexity [70]. We state these standard definitions below for the square case. Definition 7. Let f : Cd×d → R be convex and differentiable. f is restricted µ-strongly convex if for all rank-r matrices ρ, ζ ∈ Cd×d , f (ζ) ≥ f (ρ) + h∇f (ρ) , ζ − ρi + µ 2 kζ − ρk2F . (A2) Definition 8. Let f : Cd×d → R be a convex differentiable function. f is restricted gradient Lipschitz continuous with parameter L (or L-smooth) if for all rank-r matrices ρ, ζ ∈ Cd×d , k∇f (ρ) − ∇f (ζ)kF ≤ L · kρ − ζkF . (A3) ρ ∈ Cd×d , f (AA† ) subject to A ∈ C. (A4) In the QST setting, A ∈ C ⇔ kAk2F ≤ 1. In our theory we mostly focus on sets C that satisfy the following assumptions. Assumption 1. For ρ  0, there is A ∈ Cd×r and r ≤ d such that ρ = AA† . Then, C 0 ⊆ Cd×d is endowed with a constraint set C ⊆ Cd×r that (i) for each ρ ∈ C 0 , there is an subset in C where each A ∈ C satisfies ρ = AA† and (ii) its projection operator, say ΠC (B) = argminA∈C 12 kA − Bk2F for B ∈ Cd×r , is an entrywise scaling operation on the input B. We also require the following faithfulness assumption [26]: Assumption 2. Let E denote the set of equivalent facd×d torizations that lead to a rank-r ; i.e., n o matrix ρ? ∈ C † E := A? ∈ Cd×r : ρ? = A? A? . Then, we assume E ⊆ C, i.e., the resulting convex set C in (A4) (from C 0 in (A1)) respects the structure of E. Summarizing, by faithfulness of C (Assumption 2), we assume that E ⊆ C. This means that the feasible set C in (A4) contains all matrices A? that lead to ρ? = A? A†? in (A1). Moreover, we assume both C, C 0 are convex sets and 11 there exists a “mapping” from C 0 to C, such that the two constraints are “equivalent”: i.e., ∀A ∈ C, we are guaranteed that ρ = AA† ∈ C 0 . We restrict our discussion on norm-based sets for C such that Assumption 1 is satisfied. As a representative example, consider the QST case where, for any ρ = AA† , Tr(ρ) ≤ 1 ⇔ kAk2F ≤ 1. For our analysis, we will use the following step sizes: ηb = η? = 1    , 128 Lσ1 (ρt ) + σ1 QAt Q†At ∇f (ρt ) 1 . 128 (Lσ1 (ρ? ) + σ1 (∇f (ρ? ))) Here, L is the Lipschitz constant in (5) and QAt Q†At represents the projection onto the column space of At . In our algorithm, as described in the main text, we use the following step size: η≤ 1 128 (Lσ1 (ρ0 ) + σ1 (∇f (ρ0 ))) for given initial ρ0 . While different, by Lemma A.5 in [29], we know that ηb ≥ 65 η 11 and 10 η ≤ η ≤ 10 η? . Thus, in our proof, we will work 11 ? with step size ηb, which is equivalent –up to constants– to the original step size η in the proposed algorithm. For ease of exposition, we re-define the sequence of updates: At is the current estimate in the factored space, et+1 = At − ηb∇f (ρt )At is the putative solution after the A et+1 might not belong in C), gradient step (observe that A e and At+1 = ΠC (At+1 ) is the projection step onto C. Observe that for the constraint cases we consider in this paper, et+1 ) = ξt (A et+1 ) · A et+1 , where ξt (·) ∈ (0, 1); in At+1 = ΠC (A the case ξt (·) = 1, the algorithm simplifies to the algorithm in [29]. For simplicity, we drop the subscript and the parenthesis of the ξ parameter; these values are apparent from the context. An important issue in optimizing f over the factored space is the existence of non-unique possible factorizations. We use the following rotation invariant distance metric: Definition 10. Let matrices A, B ∈ Cd×r . Define: Dist (A, B) := min kA − BRkF , Theorem 11. Let C ⊆ Cd×r be a convex, compact, and faithful set, with projection operator satisfying the assumptions described above. Let f be a convex function satisfying Definitions 7 and 8. Let At ∈ C be the current estimate and ρt = At A†t . Assume current point At satisfies Dist(At , A? ) ≤ γ 0 σr (A? ), (ρ? ) µ 1 · σσr1 (ρ , c ≤ 200 , and given ξt (·) & for γ 0 := c · L ?) 0.78 per iteration, the new estimate of ProjFGD, At+1    = † † ΠC At − ηb∇f (At At ) · At = ξt · At − ηb∇f (At At ) · At satisfies Dist(At+1 , A? )2 ≤ α · Dist(At , A? )2 , (A5) r (ρ? ) < 1. Further, At+1 where α := 1 − 550(Lσ1 (ρµ·σ ? )+σ1 (∇f (ρ? ))) 0 satisfies Dist(At+1 , A? ) ≤ γ σr (A? ). When applied to the QST setting, we obtain the following variation of the above theorem: Theorem 12 (Local convergence rate for QST). Let ρ? be the quantum state of an n-qubit system, y ∈ Rm be the measurement vector of m = O(rn6 2n ) random n-qubit Pauli observables, and M be the corresponding sensing map, such that yi = (M(ρ? ))i + ei , ∀i = 1, . . . , m. Let At be the current estimate of ProjFGD. Assume At satis4r ) σr (ρ? ) · , c≤ fies Dist(At , A? ) ≤ γ 0 σr (A? ), for γ 0 := c · (1−δ (1+δ4r ) σ1 (ρ? ) 1 , where δ is the RIP constant. Then, the new estimate 4r 200 At+1 satisfies Dist(At+1 , A? )2 ≤ α · Dist(At , A? )2 , (1−δ4r )·σr (ρ? ) where α := 1 − 550((1+δ < 1. Further, At+1 4r )σ1 (ρ? )+kek2 ) satisfies Dist(At+1 , A? ) ≤ γ 0 σr (A? ). 3. Proof of Theorem 11 For our analysis, we make use of the following lemma [72, Chapter 3], which characterizes the effect of projections onto convex sets w.r.t. to inner products, as well as provides a type-of triangle inequality for such projections; see also Figure 5 for a simple illustration. R:R∈U where U is the set of r × r unitary matrices R. We assume that ProjFGD is initialized with a “good” starting point ρ0 = A0 A†0 , such that: (A1) Lemma 13. Let U ∈ C ⊆ Cd×r and V ∈ Cd×r where V ∈ / C. Then, hΠC (V ) − U, V − ΠC (V )i ≥ 0. A0 ∈ C and Dist(A0 , A? ) ≤ γ 0 σr (A? ) for γ 0 := (ρ? ) µ 1 , where c ≤ 200 · σσr1 (ρ . c· L ?) Here, σr (·) denotes the r-singular value of the input matrix, in descending order. Later in the text, we present an initialization that, under assumptions, leads further to global convergence results. 2. Generalized theorem Next, we present the full proof of the following generalization of Theorem 5: C U ⇧C (V ) V FIG. 5. Illustration of Lemma 13 (A6) 12 We start with the following series of (in)equalities: 2 Dist (At+1 , A? ) = min kAt+1 − R∈U A? Rk2F (i) ? ≤ kAt+1 − A? RA k2 t F (ii) ? et+1 + A et+1 − A? RA = kAt+1 − A k2 t F ? et+1 k2F + kA et+1 − A? RA = kAt+1 − A k2 t F D E ? et+1 , A et+1 − A? RA + 2 At+1 − A , t ? where (i) is due to the fact RA := argminR∈U kAt − A? Rk2F , t et+1 . (ii) is obtained by adding and subtracting A Focusing on the second term of the right hand side, we et+1 to obtain: substitute A   ? ? et+1 − A? RA k2 kA k2 = kAt − ηe∇f At A†t At − A? RA t F t F   ? = kAt − A? RA k2 + ηe2 k∇f At A†t At k2F t F D   E ? − 2e η ∇f At A†t At , At − A? RA t Then, our initial equation transforms into: et+1 k2F Dist (At+1 , A? )2 ≤ kAt+1 − A   + Dist (At , A? )2 + ηe2 k∇f At A†t At k2F D   E ? − 2e η ∇f At A†t At , At − A? RA t D E ? et+1 , A et+1 − A? RA + 2 At+1 − A t Focusing further on the last term of the expression above, we obtain: D E ? et+1 , A et+1 − A? RA At+1 − A t D E ? et+1 , A et+1 − At+1 + At+1 − A? RA = At+1 − A t D E et+1 , A et+1 − At+1 = At+1 − A E D ? et+1 , At+1 − A? RA + At+1 − A t et+1 ≡ At+1 for all Observe that, in the special case where A t, i.e., the iterates are always within C before the projection step, the above equation equals to zero and the recursion is identical to that of [29][Proof of Theorem 4.2]. Here, we are et+1 6≡ At+1 for some t— more interested in the case where A et+1 6∈ C. By faithfulness (Assumption 2), observe that thus A † ? ? ? A? RA ∈ C and ρ? = A? RA A? RA = A? A†? . Moreover, t t t et+1 ): Then, according to Lemma 13 and focusAt+1 = ΠC (A ? et+1 , the last ing on eq. (A6), for U := A? RA and V := A t term in the above equation satisfies: D E ? et+1 , At+1 − A? RA At+1 − A ≤ 0, t and, thus, the expression above becomes: D E ? et+1 , A et+1 − A? RA et+1 k2F . At+1 − A ≤ −kAt+1 − A t Therefore, going back to the original recursive expression, we obtain: et+1 k2F Dist (At+1 , A? )2 ≤ −kAt+1 − A   + Dist (At , A? )2 + ηe2 k∇f At A†t At k2F D   E ? − 2e η ∇f At A†t At , At − A? RA t For the last term, we use the following descent lemma 14; its proof is provided in Section A 4. et+1 = At − ηb∇f (ρt ) · Lemma 14 (Descent lemma). Let A At . For f restricted L-smooth and µ-strongly convex, and under the same assumptions with Theorem 11, the following inequality holds true: ? et+1 k2F 2e η ∇f (At A†t ) · At , At − A? RA + kAt+1 − A t ≥ ηe2 k∇f (At A†t )At k2F + 3e ηµ 10 · σr (ρ? ) · Dist(At , A? )2 . Using the above lemma in our expression, we get:   ηµ Dist (At+1 , A? )2 ≤ 1 − 3e · σr (ρ? ) · Dist(At , A? )2 . 10 The expression for α is obtained by observing ηe ≥ 56 η and 11 ≤ η ≤ 10 η? , from Lemma 20 in [29]. Then, for η? ≤ C and C = 1/128, we have: Lσ1 (ρ? )+σ1 (∇f (X? )) 10 η 11 ? 1− 3 · 10 · 56 η? µ 3e ηµ 11 · σr (ρ? ) ≤ 1 − · σr (ρ? ) 10 10 15 η? µ · σr (ρ? ) =1− 66 µ · σr (ρ? ) 15 =1− 66 128(Lσ1 (ρ? ) + σ1 (∇f (ρ? ))) µ · σr (ρ? ) ≤1− =: α 550(Lσ1 (ρ? ) + σ1 (∇f (ρ? ))) where α < 1. Concluding the proof, the condition Dist(At+1 , A? )2 ≤ γ 0 σr (A? ) is naturally satisfied, since α < 1. 4. Proof of Lemma 14 ? et+1 = At −e . Recall A η ∇f (ρt )At and define ∆ := At −A? RA t Before presenting the proof, we need the following lemma that bounds one of the error terms arising in the proof of Lemma 14. This is a variation of Lemma 6.3 in [29]. The proof is presented in Section A 5. Lemma 15. Let f be L-smooth and µ-restricted strongly convex. Then, under the assumptions of Theorem 11 and assum1 ing step size ηb = , the following † 128(Lσ1 (ρt )+σ1 (∇f (ρt )QAt QA )) t bound holds true: D E ∇f (ρt ), ∆∆† ≥ − η5e k∇f (ρt )At k2F − µσr (ρ? ) 10 · Dist(At , A? )2 . (A7) Now we are ready to present the proof of Lemma 14. Proof of Lemma 14. First we rewrite the inner product as shown below. ? h∇f (ρt )At , At − A? RA i t D E ? = ∇f (ρt ), ρt − A? RAt A†t D E ? = 12 h∇f (ρt ), ρt − ρ? i + ∇f (ρt ), 12 (ρt + ρ? ) − A? RA A†t t D E = 12 h∇f (ρt ), ρt − ρ? i + 12 ∇f (ρt ), ∆∆† , (A8) which follows by adding and subtracting 1 ρ . 2 ? 13 Let us focus on bounding the first term on the right hand side of (A8). Consider points ρt = At A†t and ρt+1 = At+1 A†t+1 ; by assumption, both ρt and ρt+1 are feasible points in (A4). By smoothness of f , we get: f (ρt ) ≥ f (ρt+1 ) − h∇f (ρt ), ρt+1 − ρt i − (i) ≥ f (ρ? ) − h∇f (ρt ), ρt+1 − ρt i − L 2 L 2 µ 2 et+1 k2 = kξ · A et+1 − A et+1 k2 kAt+1 − A F F = (1 − ξ)2 · kAt k2F + (1 − ξ)2 ηe2 · k∇f (ρt )At k2F kρt+1 − ρt k2F kρt+1 − ρt k2F , (A9) where (i) follows from optimality of ρ? and since ρt+1 is a feasible point (ρt+1  0, ΠC 0 (ρt+1 ) = ρt+1 ) for problem (A1). Moreover, by the restricted strong convexity of f , we get, f (ρ? ) ≥ f (ρt ) + h∇f (ρt ), ρ? − ρt i + For  thelast term in the above expression and given At+1 = et+1 = ξ · A et+1 for some ξ ∈ (0, 1), we further observe: ΠC A kρ? − ρt k2F . (A10) − 2 (1 − ξ)2 · ηe · h∇f (ρt )At , At i Combining the above equality with the first term on the right hand side in (A13), we obtain the expression in (A14). Focusing on the first term, let Θt := I + 2(1−ξ) · ηe · 3ξ−1 ∇f (ρt )QAt Q†At ; then, σd (Θt ) ≥ 1 − nition of ηe and the fact that ηe ≤ 2(1−ξ) 1 · 128 , by the defi3ξ−1 1  . Then:  † 128σ1 ∇f (ρt )QAt QA t Combining equations (A9), and (A10), we obtain: 3ξ−1 2 h∇f (ρt ), ρt − ρ? i ≥ h∇f (ρt ), ρt − ρt+1 i − L 2 kρt+1 − ρt k2F + µ 2 kρ? − ρt k2F (A11) By the nature of the projection ΠC (·) step, it is easy to verify that   ρt+1 = ξ 2 · ρt − ηe∇f (ρt )ρt Λt − ηeΛ†t ρ†t ∇f (ρt )† , where Λt = I − η2e QAt Q†At ∇f (Xt ) ∈ Cd×d and QAt Q†At denoting the projection onto the column space of At . Notice that, for step size ηe, we have Λt  0, σ1 (Λt ) ≤ 1 + 1/256 and σd (Λt ) ≥ 1 − 1/256. Using the above ρt+1 characterization in (A11), we obtain: h∇f (ρt ), ρt − ρ? i − (i) ≥ ∇f (ρt ), 1 − ξ µ 2  2 kρ? − ρt k2F + L 2 ≥ (3ξ−1)2 4 ≥ (3ξ−1)2 4 ρt + 2e η · ξ 2 · h∇f (ρt ), ∇f (ρt )Xt Λt i − (ii) ≥ ≥ (1 − 2 F · kAt k2F · σd (Θt )2  2 1 · 1 − 2(1−ξ) · · kAt k2F 3ξ−1 128 η eµσr (ρ? ) 10 · Dist(Ut , A? )2   (3ξ−1)2 · 1− 1− (1 − ξ)2 − 4 η eL 2 · 1 128 2  · kAt k2F (A15) Let us focus on the term bounded as follows: η eL 2 2(1−ξ) 3ξ−1 kρt − ρt+1 k2F η eL 2 kρt − ρt+1 k2F ; this can be η eL kAt A†t − At+1 A†t+1 k2F 2 † η eL kAt At − At A†t+1 + At A†t+1 − At+1 A†t+1 k2F 2 η eL kAt (At − At+1 )† + (At − At+1 ) A†t+1 k2F 2 kρt − ρt+1 k2F = = 1/256) k∇f (ρt )At k2 . F · At ? et+1 k2 2e η ∇f (ρt ) · At , At − A? RA + kAt+1 − A F t   2 η eµ 2 2 1 ≥ 255·ξ − · η e k∇f (X )U k + kρ − ρt k2F t t ? F 128 5 2 + = Tr(∇f (ρt )∇f (ρt )At A†t ) − η2e Tr(∇f (ρt )∇f (ρt )At A†t ∇f (ρt ))   ≥ 1 − η2e kQAt Q†At ∇f (ρt )k2 k∇f (ρt )At k2F 3ξ−1 Θt 2 = The above transform (A13) as follows:  Tr(∇f (ρt )∇f (ρt )ρt Λt ) F  et+1 k2F 1 − ξ 2 · ηe h∇f (ρt )At , At i + kAt+1 − A   2   2 2(1−ξ) 1 · kAt k2F · 1 − 1 − · ≥ (1 − ξ)2 − (3ξ−1) 4 3ξ−1 128 − where: (i) follows from symmetry of ∇f (ρt ) and ρt and, (ii) follows from the sequence equalities and inequalites: 2 Combining the above, we obtain the following bound: kρt − ρt+1 k2F  1 − ξ 2 · h∇f (ρt )At , At i + 2e η · ξ 2 · Tr(∇f (ρt )∇f (ρt )ρt ) · σd (Λt )  η ·ξ2 k∇f (ρt )At k2F , (A12) ≥ 1 − ξ 2 · h∇f (ρt )At , At i + 255·e 128 · At + (1 − ξ) · ηe∇f (ρt ) · At = (i)   ≤ ηeL · kAt (At − At+1 )† k2F + k (At − At+1 ) A†t+1 k2F (ii)   ≤ ηeL σ1 (At+1 )2 + σ1 (At )2 · kAt+1 − At k2F . Combining the above in the expression we want to lower ? et+1 k2F , we bound: 2e η ∇f (ρt ) · At , At − A? RA + kAt+1 − A t obtain: ? et+1 k2F 2e η h∇f (ρt ) · At , At − A? RA i + kAt+1 − A t D E et+1 k2F = ηe h∇f (ρt ), ρt − ρ? i + ηe ∇f (ρt ), ∆∆† + kAt+1 − A  η 2 ·ξ2 k∇f (ρt )At k2F ≥ 1 − ξ 2 · ηe h∇f (ρt )At , At i + 255·e 128 + − + η eµ 2 kρ? − ρt k2F − η e2 k∇f (ρt )At k2F 5 et+1 k2F kAt+1 − A η eL 2 − kρt − ρt+1 k2F η eµσr (ρ? ) 10 where (i) is due to the identity kA + Bk2F ≤ 2kAk2F + 2kBk2F and (ii) is due to the Cauchy-Schwarz inequality. By definition of At+1 , we observe that: σ1 (At+1 )2 = σ1 (ξ · (At − ηe∇f (ρt )At ))2  2 (i) ≤ ξ 2 · σ1 (At )2 · σ1 I − ηe∇f (ρt )QAt Q†At (ii) ≤ 1+ · Dist(At , A? )2 (A13) 2 1 128 · σ1 (At )2 . where (i) is due to Cauchy-Schwarz and (ii) is obtained by 1   and since ξ ∈ (0, 1). substituting ηe ≤ † 128σ1 ∇f (ρt )QAt QA t 14  1 − ξ 2 · ηe h∇f (ρt )At , At i + (1 − ξ)2 · kAt k2F + (1 − ξ)2 ηe2 · k∇f (ρt )At k2F − 2 (1 − ξ)2 · ηe · h∇f (ρt )At , At i =  1−ξ 2 − 2 (1 − ξ) 2 · ηe h∇f (ρt )At , At i + (1 − ξ)2 · kAt k2F + (1 − ξ)2 ηe2 · k∇f (ρt )At k2F = (3ξ − 1) (1 − ξ) · ηe h∇f (ρt )At , At i + (1 − ξ)2 · kAt k2F + (1 − ξ)2 ηe2 · k∇f (ρt )At k2F =   2 2 3ξ−1 · At + (1 − ξ) · ηe∇f (ρt ) · At F + (1 − ξ)2 − (3ξ−1) kAt k2F . 2 4 = ηeL  We conjecture that the lower bound on ξt (·) for more generic cases of C could possibly be improved with a different analysis.  2 + 1 · σ1 (At )2 · kAt+1 − At k2F   1 2 + 1 · σ1 (ρt ) · kAt+1 − At k2F 1 + 128 1 128 1+ 1.8  2 1 1+ +1 128 · kAt+1 − At k2F 128  2 1 1+ +1 128 et+1 − At k2 · kξ · A F 128  2 1 1+ +1 128 · k(ξ − 1)At − ξ · ηe∇f (ρt ) · At k2F 128 2  1 +1 1+ 128 (1 − ξ)2 · · kAt k2F 64 2  1 +1 1+ 128 + · ξ 2 · ηe2 · k∇f (ρt ) · At k2F 64 = ≤ " 92 0.4 − kρ? − ρt k2F (1 − ξ)2 · − 1− · ξ2 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 1 2 ) ) 128 " · ηe2 k∇f (ρt )At k2F η eµσr (ρ? ) · Dist(At , A? )2 10 !  2 1 1+ +1 128 64 0.9 0.8 0.7 0.6 0.5 (i) 2 ≥ ηe  · 1− 1− k∇f (ρt )At k2F (1 − ξ)2 · + − (3ξ−1)2 4 (ii)  · + η eµ 2 1− 1 128 · 2 · kAt k2F η eµσr (ρ? ) kρ? − ρt k2F − 10 !  2 1 1+ +1 128 64   1− 1− ≥ ηe2 k∇f (ρt )At k2F + 2(1−ξ) 3ξ−1 η eµ 2 2(1−ξ) 3ξ−1 · 1 128 kρ? − ρt k2F − 2  · Dist(At , A? ) ! η eµσr (ρ? ) 10 1+ 1 128 64 2 · Dist(At , A? )2 (A16) 255·ξ2 128 0.2 0.3 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 9 η eµ 2 Finally, we bound Lemma from [28]: kρ? − ρt k2F using the following − +1  − · ξ 2 ≥ 1; see also Figure 6 (top panel), and (ii) is due to the non-negativity of the constant in front of kAt k2F ; see also Figure 6 (bottom panel). In the special case where C = A ∈ Cd×r : kAk2F ≤ 1 , as in QST, the assumption ξ & 0.78 is always satisfied, according to the following Corollary; the proof is provided in Subsection A 6:  Corollary 16. If C = A ∈ Cd×r : kAkF ≤ 1 , then 128 ProjFGD inherently satisfies 129 ≤ ξt (·) ≤ 1, for every t. I.e., it guarantees (A5) without assumptions on ξt (·). 1 5 0.4 FIG. 6. Behavior of constants, depending on ξ, in expression (A16). · kAt k2F where (i) is due to the assumption ξ & 0.78 and thus  2 1 2 ) +1 (1+ 128 ) 64 − (3ξ−1)2 4 ! (1 ! 9)2 " (1 ! ! + 128 64 0.1 1 2(1!9) 39!1 1 5 0 9 " (1 ! (1 ! + η eµ 2 − 9 : 0:78 % 0.2 -0.2 (39!1)2 4 255·ξ 128 ≥ +1 1 0.8 0 ? et+1 k2 2e η ∇f (ρt ) · At , At − A? RA + kAt+1 − A F t !  2 1 1+ 1.2 0.6 where in the last inequality we substitute ηe; observe that ηe ≤ 128Lσ11 (ρt ) . Combining this result with (A15), we obtain: 2 1.4 1 2 ) +1 (1+ 128 64 = 1.6 ! ≤ 1 5 kρt − ρt+1 k2F ≤ ηeL  ! η eL 2 kρt − ρt+1 k2F can be further bounded as follows: 255"9 2 128 η eL 2 Thus, (A14) Lemma 17. For any A, B ∈ Cd×r , we have: kAA† − BB † k2F ≥ 2 · √  2 − 1 · σr (A)2 · Dist(A, B)2 . In our case, this translates to: η eµ 2 kρ? − ρt k2F ≥ ηeµ · √  2 − 1 · σr (ρ? ) · Dist(At , A? )2 , 15 and we can thus conclude to: ? A? RA t et+1 k2 2e η ∇f (ρt ) · At , At − + kAt+1 − A F √  2 2 ≥ ηe k∇f (ρt )At kF + ηeµ 2 − 1 σr (ρ? ) · Dist(At , A? )2 η eµσr (ρ? ) 10 · Dist(At , A? )2  √ 1 2 − 1 − 10 ηeµσr (ρ? ) · Dist(At , A? )2 = ηe2 k∇f (ρt )At k2F + − = ηe2 k∇f (ρt )At k2F + 3e ηµ 10 and   σ1 (∇f (ρt )At ) = σ1 ∇f (ρt )QAt Q†At A   ≥ σ1 ∇f (ρt )QAt Q†At · σr (At )    1 ≥ σ1 ∇f (ρt )QAt Q†At · 1 − 200 · σr (A? ), · σr (ρ? ) · Dist(At , A? )2 This completes the proof. 5. Finally, (v) is due to the facts:   σ1 (∇f (ρt )A? ) = σ1 ∇f (ρt )QA? Q†A? A?   ≥ σ1 ∇f (ρt )QA? Q†A? · σr (A? ) Proof of Lemma 15 by the proofof (a variant of)Lemma A.3 in [29]. Thus, for the term σ1 ∇f (ρt )QA? Q†A? , we have Proof. We can lower bound ∇f (ρt ), ∆∆† as follows: E (i) D E ∇f (ρt ), ∆∆† = Q∆ Q†∆ ∇f (ρt ), ∆∆†   ≥ − Tr Q∆ Q†∆ ∇f (ρt )∆∆† D   σ1 ∇f (ρt )QA? Q†A? ≤ ≤ 1 σ σr (A? ) 1 (∇f (ρt )A? ) 1 201 σ σr (A? ) 199 1 (∇f (ρt )At )   † 201σ1 (A? ) 201 ≤ 200σ σ 1 ∇f (ρt )QAt QAt . (A ) 199 r ? (ii)   ≥ −σ1 Q∆ Q†∆ ∇f (ρt ) Tr(∆∆† ) (iii) (A18)   ≥ − σ1 QAt Q†At ∇f (ρt )   + σ1 QA? Q†A? ∇f (ρt ) Using (A18) in (A17), we obtain: ! Dist(At , A? )2 . (A17) Note that (i) follows from the fact ∆ = Q∆ Q†∆ ∆ and (ii) follows from |Tr(AB)| ≤ σ1 (A) Tr(B), for PSD matrix B (Von Neumann’s trace inequality [73]). For the transformation in (iii), we use that fact that the column space of ∆, Span(∆), is a subset of Span(At ∪ A? ), as ∆ is a linear combination of ? . At and A? RA t For the second term in the parenthesis above, we first derive the following inequalities; their use is apparent later on: σ1 (∇f (ρt )A? ) (i) E   ≥ − σ1 QAt Q†At ∇f (ρt ) + ≥− 201σ1 (A? ) 201 σ 200σr (A? ) 199 1   QAt Q†At ∇f (ρt ) 21·τ (A? ) kQAt Q†At ∇f (ρt )k2 10 ?) where τ (A? ) := σσr1 (A . (A? ) We remind that ηb = ! · Dist(At , A? )2 · Dist(At , A? )2 1 . † 128(Lσ1 (ρt )+σ1 (QAt QA ∇f (ρt ))) Then, t   · σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2   21·τ (A? ) · ηe · 128L · σ1 (ρt ) σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2 ≤ 10 2  21·τ (A? ) + · ηe · 128 · σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2 10 21·τ (A? ) 10 (iii)   ≤ σ1 (∇f (ρt )At ) + ∇f (ρt )QAt Q†At   + σ1 ∇f (ρt )QA? Q†A? σ1 (∆) (iv) (A19) To bound the first term on the right hand side, we observe that 1 σ (A? ) 200 r   σ1 QAt Q†At ∇f (ρt ) ≤ µσr (ρt ) 21·τ (A? ) ·10 10   σ1 QAt Q†At ∇f (ρt ) ≥ µσr (ρt ) . 21·τ (A? ) ·10 10 or (v) ≤ σ1 (∇f (ρt )At ) + ≤ ∇f (ρt ), ∆∆† we have: ≤ σ1 (∇f (ρt )At ) + σ1 (∇f (ρt )∆)   ≤ σ1 (∇f (ρt )At ) + σ1 ∇f (ρt )Q∆ Q†∆ σ1 (∆) (ii)   ≤ σ1 (∇f (ρt )At ) + ∇f (ρt )QAt Q†At   + σ1 ∇f (ρt )QA? Q†A? D 200 199 · 1 1 (1− 200 ) · 1 σ 200 1 (∇f (ρt )At ) 1 σ1 (∇f (ρt )A? ) + 200 1 σ1 (∇f (ρt )At ) + 200 σ1 (∇f (ρt )A? ) . We use this trivial information to obtain (A20) where κ := ? where (i) is due to triangle inequality on A? RA = At − t ∆, (ii) is due to generalized Cauchy-Schwarz inequality, (iii) is due to triangle inequality and the fact that the column span of ∆ can be decomposed into the column span of At and A? , by construction of ∆, (iv) is due to the assumption Dist(At , A? ) ≤ γ 0 · σr (A? ) and σ1 (∆) ≤ Dist(At , A? ) ≤ 1 σr (ρ? ) 200 σ1 (ρ? ) · σr (A? ) ≤ 1 200 · σr (A? ). L µ and τ (ρ) := σσr1 (ρ) for a rank-r matrix ρ. Combining (A20) (ρ) with (A19), we obtain the expression in (A21) where (i) follows from ηe ≤ 128Lσ11 (ρt ) , (ii) is due to Lemma A.3 in [29] and using the bound Dist(At , A? ) ≤ γ 0 σr (A? ) by the hypothesis of the lemma, (iii) is due to σr (ρ? ) ≤ 1.1σr (ρt ) by Lemma  2 A.3 in [29], due to the facts σr (ρt )σ1 QAt Q†At ∇f (ρt ) ≤ kA†t ∇f (Xt )k2F and (11κτ (ρ? ) · 21·τ (A? ) 10 + 1) ≤ 12κτ (ρ? ) · 16 21·τ (A? ) 10   · ηe · 128L · σ1 (ρt ) σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2  21·τ (A? ) 10 ≤ max ·128·e η ·Lσ1 (ρt )·µσr (ρt ) 21·τ (A? ) ·10 10 128·e η ·Lσ1 (ρt )·µσr (ρt ) 10 ≤ 21·τ (A? ) 10 · Dist(At , A? )2 , ηe · Dist(At , A? )2 + ηe  21·τ (A? ) 10 2 ≤ µσr (ρt ) 10 (ii) ≤ (iii) ≤ (iii) ≤  · Dist(At , A? )2 + 10κτ (ρt ) · µσr (ρt ) 10 21·τ (A? ) 10  · Dist(At , A? )2 + 11κτ (ρ? ) · µσr (ρt ) 10 · Dist(At , A? )2 + 12·212 102 µσr (ρt ) 10 · Dist(At , A? )2 + η e σ 5 1 ≥−  η e k∇f (ρt )At k2F 5 + µσr (ρ? ) 10  · Dist(At , A? )2 . Proof of Corollary 16 et+1 kF ≤ kAt kF + ηb · k∇f (ρt )At kF kA   ≤ kAt kF + ηb · σ1 ∇f (ρt )QAt Q†At · kAt kF    ≤ 1 + ηb · σ1 ∇f (ρt )QAt Q†At ≤ (1 + (A20)  +1 ·  2 · 128 · ηeσ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2 21·τ (A? ) 10  2 · 128 · ηeσ1 QAt Q†At ∇f (ρt ) · (ρ0 )2 σr (ρ? ) 11·(ρ0 )2 10 (A21) For our initialization, we restrict our attention to the full rank (r = d) case; the case of r < d assumes that there is a projection step that projects at the same time onto the PSD cone and C at the same time. In the full rank case, C 0 is a convex set and includes the full-dimensional PSD cone, as well as other norm constraints, as described in the main text. In the particular case of QST, we make no restrictions; [43] provides an efficient projection procedure that satisfies the constraints C 0 and holds for any r. Let us denote ΠC 0 (·) the corresponding projection step, where all constraints are satisfied simultaneously. Then, the initialization we propose follows similar motions with that in [29]: We consider the projection of the weighted negative gradient at 0, i.e., − L1 · ∇f (0), onto C 0 . I.e.,  · ∇f (0) . (B3) ρ0 = A0 A†0 = ΠC 0 −1 L Assuming a first-order oracle model, where we access f only though function evaluations and gradient calculations, (B3) provides a cheap way to find an initial point with some approximation guarantees as follows [74]: 1 ) 128 where the first inequality follows from the triangle inequality, the second holds by the property kABkF ≤ σ1 (A) · kBkF , and the third follows because the step size is bounded above 1 et+1 ) = by ηb ≤ . Hence, we get ξ(A † et+1 kF kA 21·τ (A? ) 10 (∇f (ρt )At )2 We have 1   2 · 128 · 10κτ (ρt )σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2 · κ · τ (ρ? )2 · 128 · ηeσ1 (∇f (ρt )At )2 · This completes the proof. 6.  +1 · 21·τ (A? ) 10 and τ (A? )2 = τ (ρ? ). Finally, (iv) follows from sub1 and using Lemma stituting γ 0 := c · κ1 · τ (ρ1? ) for c = 200 1 A.3 in [29] (due to the factor 200 , all constants above lead to bounding the term with the constant 15 ). Thus, we can conclude: E 2  2 · 128 · 10κτ (ρt )σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2 21·τ (A? ) , 10 ∇f (ρt ), ∆∆† 21·τ (A? ) 10   · σ1 QAt Q†At ∇f (ρt ) · Dist(At , A? )2 (i) D  128σ1 (∇f (ρt )QAt QA ) t 128 . 129 d×r Lemma 18. Let be such that ρ0 = A0 A†0 =  A0 ∈ C −1 ΠC 0 L · ∇f (0) . Consider the problem in (B2) where f is assumed to be L-smooth and µ-strongly convex, with optimum point ρ? such that rank(ρ? ) = r. We apply ProjFGD with A0 as the initial point. Then, in this generic case, A0 satisfies: ≥ Dist(A0 , A? ) ≤ γ 0 · σr (A? ), where γ 0 = Appendix B: Initialization q 1−µ/L √ τ 2 (A? ) 2( 2−1) p srank(ρ? ), srank(ρ) = kρkF . σ1 (ρ) Proof. To show this, we start with: In this section, we present a specific initialization strategy for ProjFGD. For completeness, we repeat the definition of the optimization problem at hand, both in the original space: minimize ρ∈Cd×d f (ρ) subject to ρ ∈ C0. (B1) −1 ∇f (0), ρ0 L and the factored space: minimize A∈Cd×r f (AA† ) kρ0 − ρ? k2F = kρ? k2F + kρ0 k2F − 2 hρ0 , ρ? i . (B4)  Recall that ρ0 = A0 A†0 = ΠC 0 −1 · ∇f (0) by assumption, L where ΠC 0 (·) is a convex projection. Then, by Lemma 13: subject to A ∈ C. (B2) − ρ? ≥ hρ0 , ρ0 − ρ? i . (B5) Observe that 0 ∈ Cd×d is a feasible point, since it is PSD and satisfy any common symmetric norm constraints, as the 17 ones considered in this paper. Hence, using strong convexity of f around 0, we get, f (ρ? ) − µ kρ? k2F ≥ f (0) + h∇f (0), ρ? i 2 (i) = f (0) + h∇f (0), ρ0 i + h∇f (0), ρ? − ρ0 i (ii) ≥ f (0) + h∇f (0), ρ0 i + hL · ρ0 , ρ0 − ρ? i . (B6) where (i) is by adding and subtracting h∇f (0), ρ0 i, and (ii) is due to (B5). Further, using the smoothness of f around 0, we get: In the case of n = 12, for all algorithms, we use as initial point f0 ) such that ρ0 = A e0 A e† where ρ0 = Π+ (−A∗ (y)) U0 = ΠC (A 0 and Π+ (·) is the projection onto the PSD cone. In the case of n = 10, we use random initialization. Configurations are described in the caption of each figure. Table IV contains information regarding total time required for convergence and quality of solution for some of these cases. Results on almost pure density states, i.e., r > 1, are provided in Figure 9. Next, we also provide pseudocode for our approach. Input arguments for ProjFGD is (i) f grad that specifies the gradient operator; in our case, we set 1 f (ρ0 ) ≤ f (0) + h∇f (0), ρ0 i + (i) ≤ f (ρ? ) − ≤ f (ρ0 ) − µ kρ? k2F 2 µ kρ? k2F 2 L kρ0 k2F 2 + hL · ρ0 , ρ? i − + hL · ρ0 , ρ? i − L kρ0 k2F 2 L kρ0 k2F . 2 where (i) follows from (B6) by upper bounding the quantity f (0) + h∇f (0), ρ0 i, (ii) follows from the assumption that f (ρ? ) ≤ f (ρ0 ). Hence, rearranging the above terms, we get: hρ0 , ρ? i ≥ 12 kρ0 k2F + µ kρ? k2F . 2L Combining the above inequality with (B4), we obtain, q µ kρ0 − ρ? kF ≤ 1 − L · kρ? kF . Given, A0 such that ρ0 = A0 A†0 and A? such that ρ? = A? A†? , we use Lemma 17 from [28] to obtain: q √ kA0 A†0 − A? A†? kF ≥ 2( 2 − 1) · σr (A? ) · Dist(A0 , A? ). 0 −ρ? kF · kρ? kF ≤ γ 0 · σr (A? ) Thus: Dist(A0 , A? ) ≤ √ kρ √ 2( 2−1)·σr (A? ) q p µ/L √ where γ 0 = 2(1− · τ 2 (A? ) · srank(ρ? ). 2−1) Such initialization, while being simple, introduces further restrictions on the condition number τ (ρ? ), and the condition number of function f . Finding such simple initializations with weaker restrictions remains an open problem; however, as shown in [26, 28, 29], one can devise specific deterministic initialization for a given application. In practice, the projection ΠC 0 (·) step might not be easy to compute, due to the joint involvement of convex sets. A practical solution would be to sequentially project − L1 ·∇f (0) onto the individual constraint sets. Let Π+ (·) denote the projection onto the PSD cone. Then, we can consider the ape0 A e† = Π+ (e e proximate point: ρe0 = A 0 ρ0 ). Given A0 , we can e perform an additional step: A0 = ΠC A0 , to guarantee that A0 ∈ C. In the special case of QST, one can use the procedure in [43]. Appendix C: Additional experiments and pseudocode Figures 7-8 show further results regarding the QST problem, where r = 1 and n = 10, 12, respectively. For each case, we present both the performance in terms of number of iterations needed, as well as what is the cumulative time required. f_grad = @ ( rho ) - Mt ( y - M ( rho ) ) ; where M denotes the forward linear operator over Pauli observables, and Mt its adjoint. And, (ii) params, a Matlab structure that contains several hyperparameters. Here, params contains .d, the dimension d; .r, the rank of the density matrix; .init, the choice between random or specific initialization; .Ainit, the random initial A0 in case params.init = 0; .stepsize that selects a conservative (theory) versus a practical step size; .iter, the maximum number of iterations; .tol, the tolerance for the stopping criterion. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 function [ rhohat , Ahat ] = ProjFGD ( f_grad , params ) options.tol = 10^ -3; d = params.d ; r = params.r ; % Random initialization if ( params.init == 0) Acur = params.Ainit ; Acur = Acur. / norm ( Acur , ' fro ') ; rhocur = Acur * Acur '; rhoprev = rhocur ; % Use of PROPACK [¬, S1 , ¬] = lansvd ( Acur , 1 , 'L ' , options ) ; norm_grad = f_grad ( rhocur ) ; [¬, S2 , ¬] = lansvd ( norm_grad , 1 , 'L ' , options ) ; grad0 = f_grad ( zeros (d , d ) ) ; grad1 = f_grad ( ones (d , d ) ) ; L_est = 2* norm ( grad0 - grad1 , ' fro ') / d ; % Our initialization elseif ( params.init == 1) % Compute 1/ L * gradf (0) grad0 = f_grad ( zeros (d , d ) ) ; grad1 = f_grad ( ones (d , d ) ) ; L_est = 2* norm ( grad0 - grad1 , ' fro ') / d ; rhocur = -(1/ L_est ) * grad0 ; % P_r ( gradf (0) ) using PROPACK [ Ar , Sr , ¬] = lansvd ( rhocur , r , 'L ' , options ) ; Acur = Ar * sqrt ( Sr ) ; Acur = Acur. / norm ( Acur , ' fro ') ; rhocur = Acur * Acur '; rhoprev = rhocur ; S1 = Sr ; norm_grad = f_grad ( rhocur ) ; [¬, S2 , ¬] = svds ( norm_grad , 1) ; end if ( params.stepsize == 0) % Theory eta = 1/( 128 * ( L_est * S1 (1 ,1) + S2 (1 ,1) ) ) ; elseif ( params.stepsize == 1) % More practical eta = 1/( 10 * L_est * S1 (1 ,1) + S2 (1 ,1) ) ; end ; i = 1; while ( i ≤ params.iters ) f_gradrho = f_grad ( rhocur ) ; gradA = f_gradrho * Acur ; Acur = Acur - eta * gradA ; norm_Acur = norm ( Acur , ' fro ') if ( norm_Acur > 1) Acur = Acur. / norm ( Acur , ' fro ') ; end ; rhocur = Acur * Acur '; % Test stopping criterion if (( i > 1) && ( norm ( rhocur - rhoprev , ' fro ') < params.tol * norm ( rhocur , ' fro ') ) ) break ; end i = i + 1; rhoprev = rhocur ; end rhohat = Acur * Acur '; Ahat = Acur ; ... 18 [1] J. Altepeter, E. Jeffrey, and P. Kwiat, “Photonic state tomography,” Advances in Atomic, Molecular, and Optical Physics 52, 105–159 (2005). [2] J. Zhang, G. Pagano, Hess P. W., A. Kyprianidis, P. Becker, H. Kaplan, A. V. Gorshkov, Z.-X. Gong, and Monroe C., “Observation of a many-body dynamical phase transition with a 53-qubit quantum simulator,” arXiv preprint arXiv:1708.01044 (2017). [3] “IBM-Q: Quantum Computing Research,” https://www.research.ibm.com/ibm-q/. [4] S. Flammia, A. Silberfarb, and C. Caves, “Minimal informationally complete measurements for pure states,” Foundations of Physics 35, 1985–2006 (2005). [5] D. Gross, Y.-K. Liu, S. Flammia, S. Becker, and J. Eisert, “Quantum state tomography via compressed sensing,” Physical review letters 105, 150401 (2010). [6] T. Heinosaari, L. Mazzarella, and M. Wolf, “Quantum tomography under prior information,” Communications in Mathematical Physics 318, 355–374 (2013). [7] C. Baldwin, I. Deutsch, and A. Kalev, “Strictly-complete measurements for bounded-rank quantum-state tomography,” Physical Review A 93, 052105 (2016). [8] D. Donoho, “Compressed sensing,” IEEE Transactions on information theory 52, 1289–1306 (2006). [9] R. Baraniuk, “Compressive sensing,” IEEE signal processing magazine 24, 118–121 (2007). [10] B. Recht, M. Fazel, and P. Parrilo, “Guaranteed minimum-rank solutions of linear matrix equations via nuclear norm minimization,” SIAM review 52, 471–501 (2010). [11] E. Candès and Y. Plan, “Tight oracle inequalities for lowrank matrix recovery from a minimal number of noisy random measurements,” IEEE Transactions on Information Theory 57, 2342–2359 (2011). [12] E. Candès and B. Recht, “Exact matrix completion via convex optimization,” Foundations of Computational mathematics 9, 717 (2009). [13] A. Kalev, R. Kosut, and I. Deutsch, “Quantum tomography protocols with positivity are compressed sensing protocols,” NPJ Quantum Information 1, 15018 (2015). [14] S. Flammia and Y.-K. Liu, “Direct fidelity estimation from few Pauli measurements,” Physical Review Letters 106, 230501 (2011). [15] Y.-K. Liu, “Universal low-rank matrix recovery from Pauli measurements,” in Advances in Neural Information Processing Systems (2011) pp. 1638–1646. [16] E. Kokiopoulou, C. Bekas, and E. Gallopoulos, “Computing smallest singular triplets with implicitly restarted Lanczos bidiagonalization,” Applied numerical mathematics 49, 39–61 (2004). [17] J. Baglama and L. Reichel, “Augmented implicitly restarted Lanczos bidiagonalization methods,” SIAM Journal on Scientific Computing 27, 19–42 (2005). [18] J. Baglama and L. Reichel, “Restarted block Lanczos bidiagonalization methods,” Numerical Algorithms 43, 251–272 (2006). [19] J. Cullum, R. Willoughby, and M. Lake, “A Lanczos algorithm for computing singular values and vectors of large matrices,” SIAM Journal on Scientific and Statistical Computing 4, 197–215 (1983). [20] M. Hochstenbach, “A Jacobi–Davidson type SVD [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] method,” SIAM Journal on Scientific Computing 23, 606–628 (2001). L. Wu and A. Stathopoulos, “A preconditioned hybrid SVD method for accurately computing singular triplets of large matrices,” SIAM Journal on Scientific Computing 37, S365–S388 (2015). A. Stathopoulos, E. Romero, and L. Wu, “Extended functionality and interfaces of the PRIMME eigensolver,” SIAM News Blog (2017). H. Haffner, M. Riebe, C. Becher, C. Roos, P. Schmidt, J. Benhelm, T. Korber, R. Blatt, D. Chek-Al-kar, and W. Dur, “Scalable multi-particle entanglement of trapped ions,” Nature 438, 643–646 (2006). R. Sun and Z.-Q. Luo, “Guaranteed matrix completion via nonconvex factorization,” in IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015 (2015) pp. 270–289. T. Zhao, Z. Wang, and H. Liu, “A nonconvex optimization framework for low rank matrix estimation,” in Advances in Neural Information Processing Systems (2015) pp. 559–567. Y. Chen and M. Wainwright, “Fast low-rank estimation by projected gradient descent: General statistical and algorithmic guarantees,” arXiv preprint arXiv:1509.03025 (2015). P. Jain, C. Jin, S. Kakade, and P. Netrapalli, “Computing matrix squareroot via non convex local search,” arXiv preprint arXiv:1507.05854 (2015). S. Tu, R. Boczar, M. Simchowitz, M. Soltanolkotabi, and B. Recht, “Low-rank solutions of linear matrix equations via Procrustes flow,” in Proceedings of the 33rd International Conference on International Conference on Machine Learning-Volume 48 (JMLR. org, 2016) pp. 964– 973. S. Bhojanapalli, A. Kyrillidis, and S. Sanghavi, “Dropping convexity for faster semi-definite optimization,” in 29th Annual Conference on Learning Theory, Proceedings of Machine Learning Research, Vol. 49, edited by Vitaly Feldman, Alexander Rakhlin, and Ohad Shamir (PMLR, Columbia University, New York, New York, USA, 2016) pp. 530–582. D. Park, A. Kyrillidis, C. Carmanis, and S. Sanghavi, “Non-square matrix sensing without spurious local minima via the Burer-Monteiro approach,” in Artificial Intelligence and Statistics (2017) pp. 65–74. R. Ge, J. Lee, and T. Ma, “Matrix completion has no spurious local minimum,” in Advances in Neural Information Processing Systems (2016) pp. 2973–2981. D. Park, A. Kyrillidis, S. Bhojanapalli, C. Caramanis, and S. Sanghavi, “Provable Burer-Monteiro factorization for a class of norm-constrained matrix problems,” arXiv preprint arXiv:1606.01316 (2016). D. Park, A. Kyrillidis, C. Caramanis, and S. Sanghavi, “Finding low-rank solutions to matrix problems, efficiently and provably,” arXiv preprint arXiv:1606.03168 (2016). Y. Li, Y. Liang, and A. Risteski, “Recovery guarantee of non-negative matrix factorization via alternating updates,” in Advances in Neural Information Processing Systems (2016) pp. 4987–4995. X. Li, Z. Wang, J. Lu, R. Arora, J. Haupt, H. Liu, and 19 [36] [37] [38] [39] [40] [41] [42] [43] [44] [45] [46] [47] [48] [49] [50] [51] [52] [53] T. Zhao, “Symmetry, saddle points, and global geometry of nonconvex matrix factorization,” arXiv preprint arXiv:1612.09296 (2016). Q. Tran-Dinh and Z. Zhang, “Extended Gauss-Newton and Gauss-Newton-ADMM algorithms for low-rank matrix optimization,” arXiv preprint arXiv:1606.03358 (2016). L. Wang, X. Zhang, and Q. Gu, “A universal variance reduction-based catalyst for nonconvex low-rank matrix recovery,” arXiv preprint arXiv:1701.02301 (2017). R. Ge, C. Jin, and Y. Zheng, “No spurious local minima in nonconvex low rank problems: A unified geometric analysis,” arXiv preprint arXiv:1704.00708 (2017). Samuel Burer and Renato D. C. Monteiro, “A nonlinear programming algorithm for solving semidefinite programs via low-rank factorization,” Mathematical Programming 95, 329–357 (2003). Samuel Burer and Renato D. C. Monteiro, “Local minima and convergence in low-rank semidefinite programming,” Mathematical Programming 103, 427–444 (2005). C. Eckart and G. Young, “The approximation of one matrix by another of lower rank,” Psychometrika 1, 211–218 (1936). G. Stewart, “On the early history of the singular value decomposition,” SIAM review 35, 551–566 (1993). D. Gonçalves, M. Gomes-Ruggiero, and C. Lavor, “A projected gradient method for optimization over density matrices,” Optimization Methods and Software 31, 328– 341 (2016). C. Michelot, “A finite algorithm for finding the projection of a point onto the canonical simplex of Rn ,” Journal of Optimization Theory and Applications 50, 195–200 (1986). J. Duchi, S. Shalev-Shwartz, Y. Singer, and T. Chandra, “Efficient projections onto the `1 -ball for learning in high dimensions,” in Proceedings of the 25th international conference on Machine learning (ACM, 2008) pp. 272–279. A. Kyrillidis, S. Becker, V. Cevher, and C. Koch, “Sparse projections onto the simplex,” in International Conference on Machine Learning (2013) pp. 235–243. Qinqing Zheng and John Lafferty, “A convergent gradient descent algorithm for rank minimization and semidefinite programming from random linear measurements,” in Advances in Neural Information Processing Systems (2015) pp. 109–117. J. Řeháček, Z. Hradil, E. Knill, and A. I. Lvovsky, “Diluted maximum-likelihood algorithm for quantum tomography,” Phys. Rev. A 75, 042108 (2007). Y. S. Teo, J. Řeháček, and Z. Hradil, “Informationally incomplete quantum tomography,” Quantum Measurements and Quantum Metrology 1 (2013), 10.2478/qmetro-2013-0006. K. Banaszek, G. D’Ariano, M. Paris, and M. Sacchi, “Maximum-likelihood estimation of the density matrix,” Physical Review A 61, 010304 (1999). M. Paris, G. D’Ariano, and M. Sacchi, “Maximumlikelihood method in quantum estimation,” in AIP Conference Proceedings, Vol. 568 (AIP, 2001) pp. 456–467. J. Nelder and R. Mead, “A simplex method for function minimization,” The computer journal 7, 308–313 (1965). J. Smolin, J. Gambetta, and G. Smith, “Efficient method for computing the maximum-likelihood quantum state from measurements with additive Gaussian noise,” Phys- ical review letters 108, 070502 (2012). [54] Z. Hou, H.-S. Zhong, Y. Tian, D. Dong, B. Qi, L. Li, Y. Wang, F. Nori, G.-Y. Xiang, and C.-F. Li, “Full reconstruction of a 14-qubit state within four hours,” New Journal of Physics 18, 083036 (2016). [55] Jiangwei Shang, Zhengyun Zhang, and Hui Khoon Ng, “Superfast maximum-likelihood reconstruction for quantum tomography,” Phys. Rev. A 95, 062336 (2017). [56] Y. S. Teo, J. Řeháček, and Z. Hradil, “Informationally incomplete quantum tomography,” Quantum Measurements and Quantum Metrology 1, 57–83 (2013). [57] E. Bolduc, G. Knee, E. Gauger, and J. Leach, “Projected gradient descent algorithms for quantum state tomography,” npj Quantum Information 3, 44 (2017). [58] Y. Nesterov, “A method of solving a convex programming problem with convergence rate O(1/k2 ),” in Soviet Mathematics Doklady, Vol. 27 (1983) pp. 372–376. [59] A. Kyrillidis and V. Cevher, “Matrix recipes for hard thresholding methods,” Journal of mathematical imaging and vision 48, 235–265 (2014). [60] S. Becker, V. Cevher, and A. Kyrillidis, “Randomized low-memory singular value projection,” in 10th International Conference on Sampling Theory and Applications (Sampta) (2013). [61] C. Riofrı́o, D. Gross, S.T. Flammia, T. Monz, D. Nigg, R. Blatt, and J. Eisert, “Experimental quantum compressed sensing for a seven-qubit system,” Nature Communications 8 (2017). [62] A. Yurtsever, Quoc T. Dinh, and V. Cevher, “A universal primal-dual convex optimization framework,” in Advances in Neural Information Processing Systems (2015) pp. 3150–3158. [63] E. Hazan, “Sparse approximate solutions to semidefinite programs,” Lecture Notes in Computer Science 4957, 306–316 (2008). [64] J. Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones,” Optimization methods and software 11, 625–653 (1999). [65] R. Tütüncü, K.-C. Toh, and M. Todd, “Solving semidefinite-quadratic-linear programs using SDPT3,” Mathematical programming 95, 189–217 (2003). [66] Inc. CVX Research, “CVX: Matlab software for disciplined convex programming, version 2.0,” http://cvxr. com/cvx (2012). [67] V. Chandrasekaran and M. Jordan, “Computational and statistical tradeoffs via convex relaxation,” Proceedings of the National Academy of Sciences 110, E1181–E1190 (2013). [68] Matthias Christandl and Renato Renner, “Reliable quantum state tomography,” Physical Review Letters 109, 120403 (2012). [69] Jiangwei Shang, Hui Khoon Ng, Arun Sehrawat, Xikun Li, and Berthold-Georg Englert, “Optimal error regions for quantum state estimation,” New Journal of Physics 15, 123026 (2013). [70] A. Agarwal, S. Negahban, and M. Wainwright, “Fast global convergence rates of gradient methods for highdimensional statistical recovery,” in Advances in Neural Information Processing Systems (2010) pp. 37–45. [71] Y. Chen and S. Sanghavi, “A general framework for highdimensional estimation in the presence of incoherence,” in Communication, Control, and Computing (Allerton), 2010 48th Annual Allerton Conference on (IEEE, 2010) pp. 1570–1576. 20 [72] S. Bubeck, “Convex optimization: Algorithms and complexity,” Foundations and Trends® in Machine Learning 8, 231–357 (2015). [73] L. Mirsky, “A trace inequality of John von Neumann,” Monatshefte für mathematik 79, 303–306 (1975). [74] As we show in the experiments section, a random initialization performs well in practice, without requiring the additional calculations involved in (B3). However, a random initialization for the constraint case provides no guarantees whatsoever. 21 Rank r = 1 - Data points m = 6 " d " r 10 0 AccUniPDGrad ProjFGD AccUniPDGrad ProjFGD 0 10 0.4 0.2 0 0 0.5 200 400 600 1 800 1000 20 30 -4 100 0 40 200 300 400 20 40 10 50 -4 60 0 1 250 300 20 40 60 0 AccUniPDGrad ProjFGD 10 0 10 -1 ;!;? kF kb k;? kF 10 200 Rank r = 1 - Data points m = 10 " d " r 10 RSVP SparseApproxSDP ;!;? kF kb k;? kF ;!;? kF kb k;? kF -1 0.5 150 Number of iterations AccUniPDGrad ProjFGD 10-2 0 100 Number of iterations 10 0 RSVP SparseApproxSDP 0.2 10 -3 500 0 10 0 -1 0.4 0 1 Rank r = 1 - Data points m = 6 " d " r 10 AccUniPDGrad ProjFGD ;!;? kF kb k;? kF 0.5 0.6 10 -2 Number of iterations Rank r = 1 - Data points m = 3 " d " r 10 0 Number of iterations Number of iterations 10 0.2 0.8 -1 RSVP SparseApproxSDP -2 10 -2 10 -1 ;!;? kF kb k;? kF 10 0.4 10 -2 RSVP SparseApproxSDP 1 10 ;!;? kF kb k;? kF 0 10 10 0.6 0 Number of iterations 10-2 10 -1 0 -2 ;!;? kF kb k;? kF 0.6 10 -2 10 RSVP SparseApproxSDP 1 0.8 ;!;? kF kb k;? kF ;!;? kF kb k;? kF 10 -1 AccUniPDGrad ProjFGD 0 10-2 RSVP SparseApproxSDP 1 0.8 ;!;? kF kb k;? kF 10 -1 ;!;? kF kb k;? kF 10 Rank r = 1 - Data points m = 10 " d " r 100 ;!;? kF kb k;? kF Rank r = 1 - Data points m = 3 " d " r 10 -2 10 -2 Cumulative time (sec) 10-2 0 200 400 10 -3 10-4 2000 4000 6000 8000 10000 12000 600 5000 10000 15000 Cumulative time (sec) 0 Cumulative time (sec) 500 1000 1500 10 5000 -4 2000 10000 15000 Cumulative time (sec) 0 Cumulative time (sec) 1000 2000 3000 Cumulative time (sec) −ρ? kF FIG. 7. Convergence performance of algorithms under comparison w.r.t. kbρkρ vs. (i) the total number of iterations (top) ? kF and (ii) the total execution time (bottom). First, second and third column corresponds to Csam = 3, 6 and 10, respectively. For e† where ρ0 = Π+ (−A∗ (y)). f0 ) such that ρ0 = A e0 A all cases, r = 1 (pure state setting) and n = 12. Initial point is U0 = ΠC (A 0 10 0 600 20 40 200 10 0 10 0 10 0 10 20 30 Cumulative time (sec) 60 80 400 AccUniPDGrad ProjFGD 10 0 0 10 20 40 20 40 60 Cumulative time (sec) 40 50 10 0 80 RSVP SparseApproxSDP 10 -2 10 -4 10 0 800 1000 AccUniPDGrad ProjFGD Cumulative time (sec) -4 600 Rank r = 1 - Data points m = 10 " d " r 200 400 600 800 10001200 10 30 100 10-2 RSVP SparseApproxSDP 10 -2 600 400 Number of iterations Rank r = 1 - Data points m = 6 " d " r 100 ;!;? kF kb k;? kF ;!;? kF kb k;? kF ;!;? kF kb k;? kF -2 Cumulative time (sec) -4 40 10-2 RSVP SparseApproxSDP 200 20 200 Number of iterations -4 Number of iterations AccUniPDGrad ProjFGD 10 10 -4 800 1000 10 60 Rank r = 1 - Data points m = 3 " d " r 10-2 600 RSVP SparseApproxSDP 10 -2 Number of iterations -4 Number of iterations 100 400 10 0 ;!;? kF kb k;? kF 0 ;!;? kF kb k;? kF 800 1000 AccUniPDGrad ProjFGD ;!;? kF kb k;? kF 10 400 Number of iterations Rank r = 1 - Data points m = 10 " d " r 100 10-2 RSVP SparseApproxSDP 10 -2 ;!;? kF kb k;? kF 200 10 0 ;!;? kF kb k;? kF 10 -2 -4 AccUniPDGrad ProjFGD 10-2 RSVP SparseApproxSDP ;!;? kF kb k;? kF ;!;? kF kb k;? kF 10-2 Rank r = 1 - Data points m = 6 " d " r 100 ;!;? kF kb k;? kF AccUniPDGrad ProjFGD ;!;? kF kb k;? kF Rank r = 1 - Data points m = 3 " d " r 100 500 1000 1500 2000 Cumulative time (sec) -4 0 20 40 60 80 100 Cumulative time (sec) −ρ? kF FIG. 8. Convergence performance of algorithms under comparison w.r.t. kbρkρ vs. (i) the total number of iterations (top) ? kF and (ii) the total execution time (bottom). We consider random initialization for all algorithms. First, second and third column corresponds to Csam = 3, 6 and 10, respectively. For all cases, r = 1 (pure state setting) and n = 10. 22 n = 6, Csam = 3. Algorithm kb ρ−ρ? kF kρ? kF RSVP SparseApproxSDP AccUniPDGrad ProjFGD 5.1496e-05 4.6323e-03 4.0388e-05 2.4116e-05 n = 6, Csam = 6. Total time kb ρ−ρ? kF kρ? kF 0.7848 3.7404 0.3634 0.0599 1.8550e-05 2.2469e-03 2.4064e-05 1.6052e-05 n = 8, Csam = 3. RSVP SparseApproxSDP AccUniPDGrad ProjFGD 1.5774e-04 4.1639e-03 3.5122e-05 2.4388e-05 5.7347 16.1074 1.1006 0.6918 4.6056e-04 3.6310e-03 3.0456e-05 9.2352e-06 5.2470e-05 2.2011e-03 2.4634e-05 1.5431e-05 379.8635 658.7082 33.3585 13.9547 4.7811e-03 3.1717e-03 8.8050e-05 8.4761e-06 Total time 0.3791 4.3775 0.3311 0.0441 6.6328e-06 1.4776e-03 1.9032e-05 1.1419e-05 0.1203 3.8536 0.4911 0.0446 n = 8, Csam = 10. 3.8649 33.7608 1.8428 0.8994 2.9583e-05 1.7631e-03 1.7719e-05 1.0561e-05 n = 10, Csam = 6. 1.8017e-04 2.1911e-03 1.9931e-05 5.8515e-06 n = 12, Csam = 3. RSVP SparseApproxSDP AccUniPDGrad ProjFGD Total time n = 8, Csam = 6. n = 10, Csam = 3. RSVP SparseApproxSDP AccUniPDGrad ProjFGD n = 6, Csam = 10. kb ρ−ρ? kF kρ? kF n = 10, Csam = 10. 331.1315 1326.5374 56.9693 19.3982 9.7585e-05 1.7687e-03 4.5022e-05 1.0460e-05 n = 12, Csam = 6. 14029.1525 13635.4238 461.2084 266.8203 1.0843e-03 3.6954e-03 5.2367e-05 4.7399e-06 4.6548 85.0633 3.9440 1.8804 307.9554 2245.2301 88.2965 49.4528 n = 12, Csam = 10. 15028.2836 15041.6235 904.0507 440.7193 5.6169e-04 5.0197e-03 4.5660e-05 1.1871e-05 15067.7249 15051.4497 1759.6698 1159.2885 TABLE IV. Summary of comparison results for reconstruction and efficiency. As a stopping criterion, we used −6 kρt+1 − ρt k2/kρ , where ρi is the estimate at the i-th iteration. Time reported is in seconds. Initial point is t+1 k2 ≤ 5 · 10 e† where ρ0 = Π+ (−A∗ (y)). f0 ) such that ρ0 = A e0 A U0 = ΠC (A 0 10 -2 400 600 0 100 200 300 400 Number of iterations -2 1000 800 1000 500 2000 3000 Cumulative time (sec) 10-4 0 200 400 Cumulative time (sec) 600 AccUniPDGrad ProjFGD RSVP 10-2 10 0 200 400 600 800 1000 Number of iterations 0 50 100 150 200 Number of iterations AccUniPDGrad ProjFGD RSVP 10-2 SparseApproxSDP 10 -1 10-4 Rank r = 20 - Data points m = 3 " d " r 100 250 10 0 SparseApproxSDP ;!;?;r kF kb k;?;r kF SparseApproxSDP 10 -1 10 200 Number of iterations 10-4 10 0 ;!;?;r kF kb k;?;r kF 10 -1 Rank r = 20 - Data points m = 3 " d " r 100 ;!;?;r kF kb k;?;r kF 10-2 SparseApproxSDP ;!;?;r kF kb k;?;r kF ;!;?;r kF kb k;?;r kF 10 0 AccUniPDGrad ProjFGD RSVP ;!;?;r kF kb k;?;r kF 10-2 Rank r = 5 - Data points m = 3 " d " r 100 ;!;?;r kF kb k;?;r kF AccUniPDGrad ProjFGD RSVP ;!;?;r kF kb k;?;r kF Rank r = 5 - Data points m = 3 " d " r 100 10 -1 10-4 200 400 600 800 1000 Number of iterations 0 50 100 150 200 250 Number of iterations −ρ? kF FIG. 9. Convergence performance of algorithms under comparison w.r.t. kbρkρ vs. (i) the total number of iterations (left) ? kF and (ii) the total execution time (right). The two left plots correspond to the case r = 5 and the two right plots to the case f0 ) such that ρ0 = A e0 A e† where ρ0 = Π+ (−A∗ (y)). r = 20. In all cases Csam = 3 and n = 10. Initial point is U0 = ΠC (A 0
8cs.DS
Fooling Views: A New Lower Bound Technique for Distributed Computations under Congestion Amir Abboud∗ Keren Censor-Hillel† Seri Khoury† Christoph Lenzen‡ arXiv:1711.01623v3 [cs.DS] 13 Dec 2017 December 14, 2017 Abstract We introduce a novel lower bound technique for distributed graph algorithms under bandwidth limitations. We define the notion of fooling views and exemplify its strength by proving two new lower bounds for triangle membership in the Congest(B) model: 1. Any 1-round algorithm requires B ≥ c∆ log n for a constant c > 0. 2. If B = 1, even in constant-degree graphs any algorithm must take Ω(log∗ n) rounds. The implication of the former is the first proven separation between the Local and the Congest models for deterministic triangle membership. The latter result is the first non-trivial lower bound on the number of rounds required, even for triangle detection, under limited bandwidth. All previous known techniques are provably incapable of giving these bounds. We hope that our approach may pave the way for proving lower bounds for additional problems in various settings of distributed computing for which previous techniques do not suffice. ∗ IBM Almaden Research Center. [email protected]. Technion, Department of Computer Science, {ckeren,serikhoury}@cs.technion.ac.il. Supported in part by the Israel Science Foundation (grant 1696/14). ‡ MPI for Informatics, Saarland Informatics Campus, [email protected]. † 1 Introduction In a group of n players with names of O(log n) bits, how many days does it take for someone to find out if there are three players that are all friends with each other? All computation is free, and in the beginning, all players know their friends. Then, on each day, each player can send B = O(log n) bits privately to each of its friends. This multi-party communication puzzle is known as the triangle detection problem in the popular Congest model of distributed computing. Its complexity is poorly understood. In the naive protocol, each player (node) tells all its friends about all its other friends (sends its neighborhood to every neighbor). This takes a single round in the Local model and O(n) rounds in Congest. A clever randomized protocol of Izumi and Le Gall [30] provides a solution with O(n2/3 (log n)2/3 ) rounds in Congest, and this is essentially all we know about the problem. Before our work, it could not be ruled out that the problem can be solved in O(1) rounds, or even a single round, even with a bandwidth of B = 1! Open Question 1. What is the round complexity of triangle detection in the Congest model of distributed computing? Triangle detection is an extensively studied problem in most models of computation. In the centralized setting, the best known algorithm involves taking the cube of the adjacency matrix of the graph. It runs in O(n2.3729 ) time and was found using a complex computer program [39, 62]. If one wishes to avoid the impractical matrix multiplication, the problem can be solved in O(n3 / log4 n) time [8, 19, 65]. Other works have designed algorithms for sparse graphs [6], for real-world graphs (e.g. [60]), for listing all the triangles [12, 29], for approximately counting their number [34], for weighted variants (e.g. [20]), and much more (an exhaustive list is infeasible). Moreover, conjectures about the time complexity of triangle detection and of its variants [1–3, 28, 64] are among the cornerstones of fine-grained complexity (see [63]). Other highly non-trivial algorithms were designed for it in settings such as: distributed models [15, 16, 21, 22, 25, 30, 32], quantum computing [11, 14, 38,40–42,47,61], and Map-Reduce [4,58]. It is truly remarkable that such a basic problem has lead to so much research. From a technical perspective, Open Question 1 is one of the best illustrations of the lack and necessity of new techniques for proving lower bounds in distributed computing. In this work, we present a novel lower bound technique, providing a separation between the Local and Congest(B) models for a problem for which previous techniques are provably incapable of doing so.1 This is the first progress towards answering Open Question 1 from the lower bounds side. 1.1 Prior lower bound techniques and their limits To date, there are essentially two techniques for deriving lower bounds for distributed graph algorithms. The first is the indistinguishability technique of Linial [45], which is the main source for lower bounds in the Local model, where the message size is unrestricted. This technique argues that any r-round algorithm, regardless of message size, can be seen as a function that maps the rhop neighborhood of a node to its output. Here, the topology of the graph is labeled by the unique O(log n)-bit node identifiers and any other input provided to the nodes; for randomized algorithms, we simply give each node an infinite string of unbiased random bits as part of the input. 1 Congest(B) stands for the synchronous model with a bandwidth of B bits. In particular, the standard Local and Congest models correspond to Congest(∞) and Congest(log n), respectively. 1 This technique has resulted in a large number of locality lower bounds, e.g. [13, 36, 44, 45, 50]. For these problems, it is a long-standing open question whether higher lower bounds can be found in the Congest(B) model, see e.g. [52]. Note that part of its appeal is that one can entirely “forget” about the algorithm: for instance, a 2-round coloring algorithm is just interpreted as a function assigning a color to each possible 2-neighborhood, and a correct algorithm must assign distinct colors to any pair of neighborhoods that may belong to adjacent nodes in any feasible input graph; more generally, this gives rise to the so-called r-neighborhood graph, and showing that r rounds are insufficient for coloring with c colors equates to showing that the chromatic number of the r-neighborhood graph is larger than c. Unfortunately, as this technique does not take bandwidth restrictions into account, it cannot show any separation between the Local and Congest(B) models. Triangle detection is possibly one of the most extreme examples for this, as it can be solved in a single round in Local but seems to require nΩ(1) rounds in Congest(log n). Additional examples are symmetry breaking problems, such as Maximal Independent Set (MIS) and (∆ + 1)-Coloring, upon which we elaborate in Section 5. The second tool available for generating distributed lower bounds is the information bottleneck technique, first introduced implicitly by Peleg and Rubinovich [56]. Here, the idea is to reduce a 2party communication complexity problem (typically set disjointness) to a distributed problem, and argue that a fast distributed algorithm under limited bandwidth would imply a protocol exchanging few bits. This approach yields a large number of strong lower bounds for a wide range of global problems, in which there is no bound on the distance up to which a local change in the input may affect the output. Examples are, e.g., [17, 26, 43, 49, 59], but a complete list would justify an entire survey by its own. Lower bounds based on information bottlenecks can also be proven for local problems. For instance, Drucker et al. show an nΩ(1) lower bound for detecting k-cliques or k-cycles for any fixed k > 3 [22]. However, this technique is inherently incapable of proving lower bounds for many problems. In particular, it completely fails for the problem of triangle detection. As discussed by Drucker et al., this is because no matter how we divide the nodes of the graph among the two players, one of them will know about the triangle. One may, in principle, hope for lower bounds based on multi-party communication complexity or information complexity, but to date no such result is known. Intuitively, a lower bound for triangle detection must combine the two techniques. We have to argue that when a small number of bits is sent, the nodes do not have enough information to distinguish between a distance-2 neighborhood in which there is a triangle and one in which there isn’t. Interestingly, Drucker et al. prove that no such technique is possible without breakthroughs in circuit complexity in the related Congested-Clique model [22], where nodes can send messages to all other nodes, not only neighbors.2 Indeed, it is still open whether triangle detection can be solved in no(1) rounds even in this powerful model (it is likely that it is [22]), but now we know that the lack of super-constant lower bounds can be blamed on our inability to prove “computational hardness” results in CS: in a similar vein, we do not know whether 3SAT can be solved in polynomial or even linear time. In contrast, no such barrier is known in the standard Congest(B) model, where communication is limited to the input graph. This is an embarrassing situation, as we have a huge gap, but no well-known barrier to blame it on. 2 This result applies to small output, e.g. the triangle detection problem, which is a decision problem. For listing all triangles in the graph, a tight bound of Ω(n1/3 / log n) holds [21, 30]. 2 With a clever usage of Rusza-Szemerdi graphs, Drucker et al. were also able to prove a strong lower bound for triangle detection [22], under the restriction that each node sends the same message to all of its neighbors in each round (in a broadcast fashion). More specifically, they show that a deterministic protocol in the Clique-Broadcast model (and therefore also Congest√ log n Broadcast) requires Ω(n/e ) rounds, and that (essentially) the same lower bound holds for randomized protocols under the Strong Exponential Time Hypothesis, a popular conjecture about the time complexity of k-SAT. Unfortunately, even under such conjectures, we do not know how to get any non-trivial lower bound in the standard Congest(B) model. Finally, it is worth pointing out a subtlety about the statement that 2-player communication complexity cannot provide any lower bound for triangle detection. This statement is fully accurate only under the assumption that nodes initially know the identifiers of their neighbors, as this renders it trivial to infer from the joint view of two neighbors whether they participate in a triangle. This assumption is known as KT1 , where KTi means Knowledge of Topology up to distance i (excluding edges with both endpoints in distance i), as was first defined in [7]. The difference between KT0 , in which a node knows only its own identifier, and KT1 , in which a node knows also the identifiers of its neighbors, has been a focus of abundant studies, in particular concerning the message complexity of distributed algorithms (see, e.g., [7, 23, 33, 51, 54] and references therein). Note that acquiring knowledge on the neighbors’ identifiers requires no more than sending O(log n) bits over each edge, so the distinction between KT0 and KT1 is insubstantial for the round complexity in Congest(B) for B ∈ Ω(log n); KT1 is therefore the default assumption throughout n wide parts of the literature. However, in KT0 a lower bound of Ω( log B ) on the round complexity of triangle detection follows from a simple counting argument. As, ultimately, the goal is to show lower bounds of ω(log n), we consider KT1 in this work. n1−o(1) 1.2 Our contribution In this paper, we introduce fooling views, a technique for proving lower bounds for distributed algorithms with congestion. We are able to show the first non-trivial round complexity lower bounds on triangle detection in KT1 , separating the Local and Congest(B) models: 1. Triangle membership3 in one round requires B ≥ c∆ log n for a constant c > 0 (Section 3). 2. If B = 1, triangle detection requires Ω(log∗ n) rounds, even if ∆ = 2, and even if the size of the network is constant and n is the size of the namespace (Section 4). We stress that we do not view our main contribution as the bounds themselves: while the bandwidth lower bound for single-round algorithms is tight, it hardly comes as a surprise that such algorithms need to communicate the entire neighborhood. Additionally, we do not believe that with 1-bit messages, extremely fast triangle detection is possible. Rather, we present a novel technique that enables to separate the two models, which is infeasible with prior lower bound techniques. We hope this to be a crucial step towards resolving the large gap between lower and upper bounds, which in contrast to other models is not justified by, e.g., conditional hardness results. The basic idea of fooling views is that they combine reasoning about locality with bandwidth restrictions. Framing this in terms of neighborhood graphs, this would mean to label neighborhoods by the information nodes have initially and the communication the algorithm performs over 3 In the triangle membership problem, every node must indicate whether it participates in a triangle. 3 the edges incident to a node. However, this communication depends on the algorithm and the communication received in earlier rounds, enforcing more challenging inductive reasoning to prove multi-round lower bounds. To capture the intuition for our technique for B = 1, think about a node that receives the same messages from its neighbors regardless of whether it participates in a triangle or not as a fooled node. Intuitively, in a triangle {u, w, v} of a given network, if one of the nodes u, v and w is able to detect the triangle after t rounds of communication, then it may simply inform the other two nodes about the triangle during round number t + 1. Thus, it is crucial to maintain a perpetual state of confusion for all nodes involved in the triangle. However, if the task is to detect whether a specific triple of IDs is connected by a triangle or not, then the nodes can solve this by simply exchanging only one bit of communication. Accordingly, our goal is to keep a large subset of the namespace fooled as long as possible. To this end, think of a triangle {u, v, w} for which none of u, v and w is able to detect the triangle as a fooled triangle. Our main idea is to show that if there are many fooled triangles after t rounds, then there are many triangles among them that are fooled after t + 1 rounds as well. In order to express this intuition, one of our ingredients in the proof is the following extremal combinatorics result by Paul Erdös [24]. Theorem 1 ( [24], Theorem 1). Any k-uniform hypergraph of n nodes which contains at least 1−k nk−` edges, must contain a complete k-partite k-uniform hypergraph such that each part of it is of size `. Using this theorem of Erdös, we are able to show that if there are many fooled triangles after t rounds, then there is a set of nodes such that each triple in the set is a fooled triangle after t + 1 rounds. Blending counting and indistinguishability arguments with this theorem, we can derive our lower bound for multi-round algorithms. Our Ω(log∗ n) bound serves as a proof of concept that our technique has the power to break through the bounds of previous techniques by demonstrating that this is indeed possible. Note that purely information-theoretic reasoning runs into the obstacle that in the KT1 model, Θ(log n) bits have already crossed each edge “before the algorithm starts.” Accordingly, we argue that our approach represents a qualitative improvement over existing techniques. Proving lower bounds higher than log∗ n requires new ideas, but we are hopeful that combining our technique with a more sophisticated analysis will lead to much higher lower bounds, both for triangle detection and for other non-global problems discussed above. As an additional indication that the proposed technique is of wider applicability, we apply it to k-cycle detection for k > 3, for showing lower bounds on the bandwidth of optimal-round algorithms. However, here the information bottleneck technique is applicable again, and we do not obtain stronger bounds using our fooling views. The details of these constructions are given in Appendix A; the main body of the paper focuses on triangle detection. We conclude with open questions in Section 5. 1.3 Further related work Edge-crossings. The basic topology components for our lower bound in Section 4 are triangles and 6-cycles. The main hardness that we show for a node in deciding whether it participates in a triangle or not comes from not knowing the neighbors of its neighbor. That is, a node is unable to distinguish between two triangles and one 6-cycle, because only difference between these two cases 4 is a single edge crossing, which are two node-disjoint edges for which we swap the endpoints from {w, x}, {w0 , x0 } to {w, x0 }, {w0 , x}. Edge crossings have previously aided the construction of lower bounds, such as lower bounds for message complexity of broadcast [7] or of symmetry breaking [51], as well as lower bounds for proof-labeling schemes [10]. The Congest(1) model. While we view our results for the Congest(1) model more as a proof of concept for our technique rather than as a bound that attempts to capture the true complexity, this model has been attracting interest by itself in previous work. It has been shown in [48] that the cornerstone O(log n)-round algorithms for maximal independent set [5,46] can be made to work with even with a bandwidth of B = 1, and this problem was studied also in, e.g., [9, 35]. Using the √ standard framework of reduction from 2-party communication complexity, a Ω( n) lower bound for the number of rounds required for 4-cycle detection can be directly deduced from [22]. In fact, all lower bounds obtained using this framework are with respect to the bandwidth B, and therefore imply lower bounds also for the case of B = 1. 2 Model and Definitions Our model is a network of n nodes, each having an ID in [N ], for some polynomial N in n. Each node starts with knowledge of its ID as well as the IDs of its neighbors. This is known as the KT1 model, and differs from the KT0 model in which each node starts only with knowledge of its own ID. The nodes communicate in synchronous rounds, in which each node can send a B-bit messages to each of its neighbors. The model we consider is the Congest(B) model [55], where B is the bandwidth that is given for each message4 . We will focus on the following problem. Definition 1. [Triangle Membership]. In the triangle membership problem, each node needs to detect whether it is a part of a triangle. We remark that our second lower bound also applies to the triangle detection problem, where it is sufficient that some node learns that there is a triangle, without being able to tell who participates. This is also the guarantee given by the sublinear-round algorithm of Izumi and Le Gall [30]. 3 A Bandwidth Lower Bound for 1-round Triangle Membership In this section we show the following theorem. Theorem 2. The triangle membership problem cannot be solved by a single-round algorithm in n−2 ∆−1 the Congest(B) model unless B ≥ log(( 2(∆−1) ) ). Observe that this implies an Ω(∆ log n) lower bound on B for ∆ = O(n1− ), and an Ω(n) lower bound on B for ∆ = n−2 4 + 1. This lower bound is significantly easier to obtain than the one in Section 4. This has the advantage of demonstrating the technique in a simpler context before delving into the proof of Theorem 3. 4 For simplifying the exposition, we will assume that nodes send B bits in each round and cannot send less bits or remain silent. It is easy to verify that this only affects the constants in our asymptotic notation. 5 n−2 ∆−1 The main line of proof is to show that if the size of the messages is less than log ( 2(∆−1) ) , then there are three nodes u, w, v ∈ V , such that if the only neighbors of u are v and w, then u receives the same messages from v and w during the single communication round regardless of whether v and w are connected (see Figure 1). This is the standard notion of indistinguishability, given here under bandwidth restrictions for the first time. 𝑣 𝑚𝑣→𝑢 𝑤 𝑢 𝑣 𝑚𝑤→𝑢 𝑚𝑣→𝑢 𝑤 𝑢 𝑚𝑤→𝑢 Figure 1: The node u receives the same messages regardless of whether v and w are connected. For simplicity, we assume that each node has exactly ∆ neighbors, except some special node u, which is fixed in the rest of this section, which has only two neighbors. Denote by N (v) the set of neighbors of a node v, and let mv→u (S) denote the message sent from v to u during the single round, given that N (v) = S ∪ {u}. The following two notions of fooling sets of nodes and fooling nodes are what allows us to capture indistinguishability in this setting. These are the specific shapes that our notion of fooling views takes for obtaining this result. Definition 2. Let v ∈ V \ {u}. A set of nodes S is called a (v, u)-fooling set if there is another set of nodes S 0 6= S such that mv→u (S) = mv→u (S 0 ). A node w ∈ V \ {v, u} is called a (v, u)-fooling node if there are two sets of nodes S 6= S 0 , such that w ∈ S and w ∈ / S 0 , and mv→u (S) = mv→u (S 0 ). We denote by Fnodes (v, u) the set of (v, u)-fooling nodes. Our first step towards proving Theorem 2 is to show that for each v ∈ V \ {u} there are many (v, u)-fooling nodes. n−2 ∆−1 Lemma 1 (Many fooling nodes). If B < log(( 2(∆−1) ) ), then for each v ∈ V \ {u} it holds n−2 that |Fnodes (v, u)| ≥ 2 . n−2 0 Proof. Assume towards a contradiction that |Fnodes (v, u)| < n−2 2 . Thus, there are k ≥ 2 non (v, u)-fooling nodes, denote this set of non (v, u)-fooling nodes by N Fnodes (v, u), and denote the family of sets of size ∆ − 1 over nodes in N Fnodes (v, u) by N Fsets (v, u). It holds that    n−2   ∆−1 |N Fnodes (v, u)| n−2 2 |N Fsets (v, u)| = ≥ ≥ ∆−1 ∆−1 2(∆ − 1) Observe that v must send a unique message to u on each of these sets, since otherwise, there are two sets S1 6= S2 ∈ N Fsets (v, u) such that mv→u (S1 ) = mv→u (S2 ), and therefore, by Definition 2, 6 n−2 ∆−1 at least one node in N Fnodes (v, u) is (v, u)-fooling. This implies that B ≥ log(( 2(∆−1) ) ), a contradiction. The strength of having many (v, u)-fooling nodes for every node v is that it implies that there is a node w∗ that is a (v, u)-fooling node for many nodes v. n−2 ∆−1 Lemma 2. If B < log(( 2(∆−1) ) ), then there is a node w∗ ∈ V and a set of nodes Pw∗ of size n−2 ∗ ∗ 2 , such that for each v ∈ Pw , it holds that w ∈ Fnodes (v, u). Proof. For each w, v ∈ V , let Xw,v be an indicator defined as follows: ( 1 if w ∈ Fnodes (v, u) Xw,v = 0 otherwise Since X X Xw,v = w∈V \{u} v∈V \{u} X X Xw,v , v∈V \{u} w∈V \{u} Lemma 1 gives that: X X Xw,v ≥ (n − 1) · w∈V \{u} v∈V \{u} n−2 2 Therefore, there must be a node w∗ and a set of nodes Pw∗ of size it holds that Xw,v = 1. 5 n−2 2 , such that for each v ∈ Pw∗ , Lemma 2 is what allows us to prove that u cannot solve triangle membership, as follows.  w∗ | Proof of Theorem 2: Let w∗ be the node provided by Lemma 2. It holds that |P ≥ ∆−1 n−2 ∆−1 n−2 ∆−1 ∗ ( 2(∆−1) ) . If w sends to u less than log ( 2(∆−1) ) bits, then there are two sets of nodes 0 0 }). } ⊆ Pw∗ , such that mw∗ →u ({v1 , ..., v∆−1 }) = mw∗ →u ({v10 , ..., v∆−1 {v1 , ..., v∆−1 } = 6 {v10 , ..., v∆−1 ∗ ∗ ∗ 0 0 ∗ Let v be a node such that v ∈ {v1 , ..., v∆−1 } and v ∈ / {v1 , ..., v∆−1 }. Since v ∈ Pw∗ , by Definition 2, it holds that there are two sets of nodes S 6= S 0 , such that w∗ ∈ S and w∗ ∈ / S 0 , and mv∗ →u (S) = mv∗ →u (S 0 ). n−2 ∆−1 To summarize, if the size of the messages is less than log ( 2(∆−1) ) , then there are two nodes w, v ∈ V \ {u}, such that if u is connected to both v and w, then u receives the same messages from v and w during the single communication round regardless of whether v and w are connected (see Figure 1). 4 A Round Lower Bound for Triangle Detection with B = 1 Our main goal in this section is to prove the following theorem. Theorem 3. Any algorithm for triangle membership in the Congest(1) model requires Ω(log∗ n) rounds, even for graphs of maximum degree 2. 5 In fact, one can show that there are many such nodes as w∗ , but we do not use this in this section. 7 The hard instances for this setting are as simple as tripartite graphs with degree 2, as follows. ˙ 2 ∪A ˙ 3 , E) | E ⊆ (A1 × A2 ) ∪ (A1 × A3 ) ∪ (A2 × A3 )} be the family of tripartite Let G = {(V = A1 ∪A graphs such that for each G ∈ G, it holds that |A1 | = |A2 | = |A3 | = n/3, and for every i ∈ {1, 2, 3}, each node in Ai has exactly one neighbor in each of Aj and Ak , where j 6= k 6= i ∈ {1, 2, 3}. In a nutshell, we show that there must be 6 nodes that cannot detect whether they constitute a 6cycle or two triangles. Remarkably, this simple intuitive task requires us to develop novel machinery and make use of known results in extremal graph theory. Our approach has the compelling feature that – up to one round – in this setting triangle detection is equivalent to triangle membership, as a node detecting a triangle can infer that it is part of a triangle itself and just needs to inform its neighbors. Thus, we obtain the same lower bound for the, in general, possibly easier problem of triangle detection. Moreover, the lower bound depends only on the set of possible IDs, not the actual number of nodes in the graph. Theorem 4. Any algorithm for triangle detection in the Congest(1) model requires Ω(log∗ N ) rounds, even for graphs of maximum degree 2 with only 6 nodes, given a namespace of size N . The main challenge in proving a lower bound for more than one round is that for t > 1 the communication between the nodes in round t does not depend only on their IDs and their sets of neighbors (as is the case for the first round), but rather it depends also on their views after t − 1 rounds, i.e., on the set of messages that the nodes receive during each of the first t − 1 rounds. The view of a node after t − 1 rounds may depend on all the nodes in its (t − 1)-hop neighborhood. ˙ 2 ∪A ˙ 3 , E) ∈ G, Nevertheless, since the family of graphs G is defined such that, for each G = (A1 ∪A it holds that each node in each part of G has exactly one neighbor in each of the other two parts, any cycle in any G ∈ G must be a connected component. Therefore, if there is a triple (u, w, x) ∈ A1 × A2 × A3 that is connected by a triangle (u, w, x) in G, then the communication between the nodes u, w and x during any round in G depends only on the nodes u, w and x. Similarly, if there is a 6-cycle (u1 , w1 , x1 , u2 , w2 , x2 ) in G, then the communication between the nodes u1 , w1 , x1 , u2 , w2 , x2 during any round in G depends only on the nodes u1 , w1 , x1 , u2 , w2 , x2 . Our main line of proof is to show that for any algorithm for triangle membership with B = ˙ 2 ∪A ˙ 3 such that u1 receives the same messages during 1, there exist u1 , w1 , x1 , u2 , w2 , x2 ∈ A1 ∪A ∗ the first Ω(log n) rounds in two different scenarios, the first of which is a scenario in which u1 participates in a triangle (u1 , x1 , w1 ), and the second is a scenario in which u1 participates in a 6-cycle (u1 , x1 , w2 , u2 , x2 , w1 ). See Figure 2 for an illustration. ˙ 2 ∪A ˙ 3 , we denote by mtw→u ((u, w, x)) the message sent from Given three nodes u, w, x ∈ A1 ∪A w to u during round t, given that u, w and x are connected by a triangle. Similarly, given six nodes ˙ 2 ∪A ˙ 3 , we denote by mtw1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )) the message sent u1 , w1 , x1 , u2 , w2 , x2 ∈ A1 ∪A from w1 to u1 during round t, given that the nodes u1 , w1 , x2 , u2 , w2 , x1 are connected by a 6-cycle (u1 , x1 , w2 , u2 , x2 , w1 ). The structure of the proof for the lower bound on the number of rounds is as follows. In Section 4.1 we present the notion of fooling sets of triangles which shares a similar spirit to Definition 2 and is the basis of our fooling views technique in this section. Next, in section 4.2 we present the connection to 6-cycles and deduce our main result. 4.1 Fooling sets of triangles Definition 3. Fix a pair of nodes (u, w) ∈ (Ai × Aj ) ∩ E, for i 6= j, and let X = {x1 , ..., x|X| } ⊆ Ak for k 6= i, j. A set of triangles {(u, w, x) | x ∈ X} is called a (w, u)t -fooling set of triangles 8 1 2 1 1 2 1 2 1 2 2 1 2 Figure 2: The structures we use are the triangle (u1 , x1 , w1 ) and the 6-cycle (u1 , x1 , w2 , u2 , x2 , w1 ). if w sends the same message to u during each of the first t rounds, in each of the triangles in {(u, w, x) | x ∈ X}. Formally, for each 1 ≤ i ≤ t, miw→u ((u, w, x1 )) = miw→u ((u, w, x2 )) = ... = miw→u ((u, w, x|X| )). We extend the notion of a fooling set of triangles to the notion of a fooling rectangle of triangles: Definition 4. Fix a node u ∈ Ai . A rectangle W × X ⊆ Aj × Ak , for j 6= k 6= i, is called a ut -fooling rectangle of triangles if it satisfies the following properties. 1. For each w ∈ W , it holds that {(u, w, x) | x ∈ X} is a (w, u)t -fooling set of triangles. 2. For each x ∈ X, it holds that {(u, w, x) | w ∈ W } is an (x, u)t -fooling set of triangles. Finally, we extend the notion of a fooling rectangle of triangles to a fooling cube of triangles: Definition 5. A cube U × W × X ⊆ A1 × A2 × A3 is called a t-fooling cube of triangles if: 1. For each u ∈ U , it holds that W × X is a ut -fooling rectangle of triangles. 2. For each w ∈ W , it holds that U × X is a wt -fooling rectangle of triangles. 3. For each x ∈ X, it holds that U × W is a xt -fooling rectangle of triangles. The following observation follows immediately from Definition 5. Observation 1. A1 × A2 × A3 is a 0-fooling cube of triangles. Our next step towards proving Theorem 3 is to show √ that any t-fooling cube of triangles of size s contains a (t + 1)-fooling cube of triangles of size Ω( log log log s). Lemma 3. If there is a t-fooling cube of triangles U × W × X ⊆ A1 × A2 × A3 of size |U | = |W | = |X| = s, then there is a constant β and a (t + 1)-fooling cube of triangles U 0 × W 0 × X 0 ⊆ U × W × X √ of size |U 0 | = |W 0 | = |X 0 | = β log log log s. The key combinatorial ingredient for proving Lemma 3 is the following corollary of Theorem 1. Corollary 1 (of Theorem 1). For every constant α, for sufficiently large s, any s × s × s boolean 2 cube that contains at least e−1/α s3 entries √ that are 1, contains a 1-monochromatic subcube, such that each side of the subcube is of size α log s. 9 To prove Lemma 3, we first prove a weaker claim, which guarantees the existence of a sufficiently large cube of triangles satisfying only the first property in Definition 5. That is, we prove the existence of a cube U 0 × W 0 × X 0 ⊆ U × W × X such that for each u√∈ U 0 , it holds that W 0 × X 0 is a ut+1 -fooling rectangle of triangles and |U 0 | = |W 0 | = |X 0 | = Θ( log n). Then, applying this claim to the 3 different sides of the cube U × W × X gives Lemma 3. Claim 1. If there is a t-fooling cube of triangles U × W × X ⊆ A1 × A2 × A3 of size |U | = |W | = |X| = s, then √ there is a constant γ and a cube U 0 × W 0 × X 0 ⊆ U × W × X of size 0 0 0 |U | = |W | = |X | = γ log s, such that for each u ∈ U 0 , it holds that W 0 × X 0 is a ut+1 fooling rectangle of triangles. Proof. Fix u ∈ U , and consider the messages that u receive from its neighbors in W ∪ X during round t + 1. Since B = 1, for each w ∈ W , it holds that there exist s/2 nodes x1 , ..., xs/2 ∈ X t+1 t+1 such that mt+1 w→u ((u, w, x1 )) = mw→u ((u, w, x2 )) = ... = mw→u ((u, w, xs/2 )). Denote this specific t+1 t+1 for each (w, x) ∈ W × X as message by m̃w→u . Therefore, defining an indicator variable Yu,w,x follows ( t+1 1 if mt+1 w→u ((u, w, x)) = m̃w→u t+1 Yu,w,x = 0 otherwise gives that X X t+1 Yu,w,x = s2 /2, w∈W x∈X which implies X X x∈X w∈W t+1 Yu,w,x = X X t+1 Yu,w,x = s2 /2. w∈W x∈X It follows that there are at least s/4 nodes x1 , ..., xs/4 in X, such that each xi ∈ {x1 , ..., xs/4 } t+1 = 1. has a set of nodes P (xi ) ⊆ W of size s/4, such that for each w ∈ P (xi ), it holds that Yu,w,x i xi xi Furthermore, for each xi , it holds that there are |P (xi )|/2 nodes w1 , ..., w|P (xi )|/2 ∈ P (xi ) such xi xi t+1 1 that mt+1 xi →u ((u, w1 , xi )) = ... = mxi →u ((u, w|P (xi )|/2 , xi )). Denote this specific message by m̃xi →u . t+1 be an indicator defined as follows: For each (u, w, x) ∈ U × W × X, let Zu,w,x ( t+1 t+1 t+1 1 if (mt+1 w→u ((u, w, x)) = m̃w→u ) ∧ (mx→u ((u, w, x)) = m̃x→u ) t+1 Zu,w,x = 0 otherwise t+1 is a boolean cube of size s × s × s, and that the above argument implies that Notice that Zu,w,x it contains at least s3 /32 entries that are 1. t+1 contains a 1-monochromatic subcube such that each Therefore, by Corollary 1, the cube Zu,w,x p side of the subcube is of size log s/ log 32. Denote this subcube by U 0 × W 0 × X 0 , and the claim follows. Proof of Lemma 3: To finish the proof of Lemma 3, we apply Claim 1 on each of the three sides of the t-fooling cube of triangles U × W × X, and we deduce that there is a constant √ β and a (t + 1)fooling cube of triangles U 0 ×W 0 ×X 0 ⊆ U ×W ×X of size |U 0 | = |W 0 | = |X 0 | = β log log log s. 10 What we have so far, by Observation 1 and Lemma 3, is that there are sufficiently many triangles in which the nodes receive the same messages from their neighbors. What remains is to actually capture the two different scenarios of a node participating in a triangle or not, while having the node keep receiving the same messages in both. For this we next discuss 6-cycles. 4.2 Triangles and 6-Cycles Having defined fooling structures of triangles in the previous section, our final step towards proving Theorem 3 is presenting a connection between fooling structures of triangles and 6-cycles. We start with the following definitions. Definition 6. Let (u1 , w1 , x1 ), (u2 , w2 , x2 ) ∈ Ai × Aj × Ak be two disjoint triples, for i 6= j 6= k ∈ {1, 2, 3}. The triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w1 , x2 , u2 , w2 , x1 ) are called (3 ↔ 6, u1 )t fooling, if u1 receives the same messages from w1 and x1 during each of the first t rounds, in the triangle (u1 , w1 , x1 ) and in the 6-cycle (u1 , w1 , x2 , u2 , w2 , x1 ). Formally, for each 1 ≤ i ≤ t, miw1 →u1 ((u1 , w1 , x1 )) = miw1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )) ∧mix1 →u1 ((u1 , w1 , x1 )) = mix1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )). To capture the connection between triangles and 6-cycles, we extend the notion of a t-fooling cube of triangles into the notion of a (3 ↔ 6)t -fooling cube. Definition 7. A cube U × W × X ⊆ A1 × A2 × A3 is called a (3 ↔ 6)t -fooling cube, if: 1. The cube U × W × X is a t-fooling cube of triangles (see Definition 5). 2. For each pair of disjoint triples (u1 , w1 , x1 ), (u2 , w2 , x2 ) ⊆ U × W × X it holds that: (a) The triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w1 , x2 , u2 , w2 , x1 ) are (3 ↔ 6, u1 )t -fooling (see Definition 6). (b) The triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w1 , x1 , u2 , w2 , x2 ) are (3 ↔ 6, w1 )t fooling. (c) The triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w2 , x2 , u2 , w1 , x1 ) are (3 ↔ 6, x1 )t -fooling. ∗ Our goal next is to show that there is a (3 ↔ 6)Ω(log n) -fooling cube U × W × X of size |U | = |W | = |X| ≥ 2. The following observation follows immediately from definition 7. Observation 2. A1 × A2 × A3 is a (3 ↔ 6)0 -fooling cube of size n/3. In general, in life, it is good to know that there is a (3 ↔ 6)0 -fooling cube somewhere in the wild. However, as we are interested in a lower bound on the number of rounds, we need to show that the amazing (3 ↔ 6)0 -fooling cube contains sufficiently large sets of fooling cubes during many rounds. For this, we need to prove the following lemma. Lemma 4. If there is a (3 ↔ 6)t -fooling cube U ×W ×X ⊆ A1 ×A2 ×A3 of size |U | = |W | = |X| = s, t+1 0 0 0 0 0 0 then √ there is a (3 ↔ 6) -fooling cube U × W × X ⊆ U × W × X of size |U | = |W | = |X | = Ω( log log log s). 11 Proof. By the first property of Definition 7, the cube U × W × X is a t-fooling cube of triangles. Therefore, by Lemma 3, there U 0 × W 0 × X 0 ⊆ U × W × X of √ is a (t + 1)-fooling cube of triangles 0 0 0 0 0 size |U | = |W | = |X | = Ω( log log log s). We show that U × W × X 0 is also a (3 ↔ 6)t+1 -fooling cube. That is, we show that each pair of disjoint triples (u1 , w1 , x1 ), (u2 , w2 , x2 ) ∈ U 0 × W 0 × X 0 satisfies Properties 2a, 2b and 2c of Definition 7. We start with Property 2a. That is, we first prove that for each pair of disjoint triples (u1 , w1 , x1 ), (u2 , w2 , x2 ) ∈ U 0 × W 0 × X 0 it holds that the triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w1 , x2 , u2 , w2 , x1 ) are (3 ↔ 6, u1 )t+1 -fooling. Observe that since U 0 × W 0 × X 0 is a (3 ↔ 6)t fooling cube, by Property 2a of Definition 7, it holds that for each 1 ≤ i ≤ t, miw1 →u1 ((u1 , w1 , x1 )) = miw1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )) ∧mix1 →u1 ((u1 , w1 , x1 )) = mix1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )). Therefore, in order to show that the triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w1 , x2 , u2 , w2 , x1 ) are (3 ↔ 6, u1 )t+1 -fooling, it remains to show that the above holds also for t + 1. That is, we need to show that t+1 mt+1 w1 →u1 ((u1 , w1 , x1 )) = mw1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )) t+1 ∧mt+1 x1 →u1 ((u1 , w1 , x1 )) = mx1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )). Observe that since U 0 × W 0 × X 0 is a (t + 1)-fooling cube of triangles, it holds that t+1 mt+1 w1 →u1 ((u1 , w1 , x1 )) = mw1 →u1 ((u1 , w1 , x2 )) ∧mt+1 x1 →u1 ((u1 , w1 , x1 )) = mt+1 x1 →u1 ((u1 , w2 , x1 )). (1) (2) Furthermore, Since U 0 × W 0 × X 0 is also a (3 ↔ 6)t -fooling cube, by Property 2b of Definition 7, for the two triples (u1 , w1 , x2 ), (u2 , w2 , x1 ), it holds that for each 1 ≤ i ≤ t, miu1 →w1 ((u1 , w1 , x2 )) = miu1 →w1 ((u1 , w1 , x2 , u2 , w2 , x1 )) ∧mix2 →w1 ((u1 , w1 , x2 )) = mix2 →w1 ((u1 , w1 , x2 , u2 , w2 , x1 )), which means that w1 has the same view after t rounds both in the case that it participates in a triangle ((u1 , w1 , x2 )), and in the case that it participates in a 6-cycle ((u1 , w1 , x2 , u2 , w2 , x1 )). This, in turn, implies that it sends the same message to u1 during round t + 1, in these two scenarios, that is: t+1 mt+1 w1 →u1 ((u1 , w1 , x2 )) = mw1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )). Combining this with Equation (1), gives that t+1 mt+1 w1 →u1 ((u1 , w1 , x1 )) = mw1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )). Similarly, by Property 2c of Definition 7, for the two triples (u1 , w2 , x1 ), (u2 , w1 , x2 ), it holds that for each 1 ≤ i ≤ t, miu1 →x1 ((u1 , w2 , x1 )) = miu1 →x1 ((u1 , w1 , x2 , u2 , w2 , x1 )) ∧miw2 →x1 ((u1 , w2 , x1 )) = miw2 →x1 ((u1 , w1 , x2 , u2 , w2 , x1 )), 12 which implies that t+1 mt+1 x1 →u1 ((u1 , w2 , x1 )) = mx1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )). Combining this with Equation (2), gives that t+1 mt+1 x1 →u1 ((u1 , w1 , x1 )) = mx1 →u1 ((u1 , w1 , x2 , u2 , w2 , x1 )), which completes the proof that for each pair of disjoint triples (u1 , w1 , x1 ), (u2 , w2 , x2 ) ∈ U 0 ×W 0 ×X 0 it holds that the triangle (u1 , w1 , x1 ) and the 6-cycle (u1 , w1 , x2 , u2 , w2 , x1 ) are (3 ↔ 6, u1 )t+1 fooling, i.e., the cube U 0 × W 0 × X 0 satisfies Property 2a of Definition 7. By symmetric arguments, U 0 × W 0 × X 0 also satisfies Properties 2b and 2c of Definition 7. ∗ Proof of Theorem 3: Observe that it is sufficient to prove that there is a (3 ↔ 6)Ω(log n) -fooling cube U × W × X ⊆ A1 × A2 × A3 of size |U | = |W | = |X| ≥ 2. By Observation 2, A1 × A2 × A3 is a (3 ↔ 6)0 -fooling cube of size n/3. Furthermore, by Lemma 4, for any t ≥ 0, if there is a (3 ↔ 6)t fooling cube U t × W t × X t of size |U t | = |W t | = |X t | = s, then there is √ a (3 ↔ 6)t+1 -fooling cube U t+1 ×W t+1 ×X t+1 ⊆ U t ×W t ×X t of size |U t+1 | = |W t+1 | = |X t+1 | = Ω( log log log s). Therefore, ∗ applying Lemma 4 repeatedly Ω(log∗ n) times implies that there is a (3 ↔ 6)Ω(log n) -fooling cube U × W × X ⊆ A1 × A2 × A3 of size |U | = |W | = |X| ≥ 2. 5 Discussion and Open Questions Being a first-step type of contribution, this work would not be complete without pointing out many additional open questions for which our fooling views technique is a possible candidate as the road for making progress. First, we raise the question of whether our specification of the triangle membership problem has an inherently different complexity than that of triangle detection. The latter is the standard way of phrasing decision problems in distributed computing (everyone outputs NO for a no instance, someone outputs YES for a yes instance). We believe that the bound we give for single-round algorithms in Section 3 should hold also for triangle detection, but this seems to require a deeper technical analysis. Our lower bound for the number of rounds in Congest(1) does hold also for triangle detection as explained in Section 4. Note that the sublinear algorithm of [30] solves triangle detection but it is not clear how to make it solve triangle membership. A closely-related problem is that of triangle listing, where all triangles need to be output. The work of [30] also gives the first sublinear algorithm for triangle listing, completing in O(n3/4 log n) rounds in the Congest model, as well as an Ω(n1/3 / log n) lower bound (see also [53]). Open Question 2. Do the triangle membership, triangle detection, and triangle listing problems have different complexities in the Congest model? Our results in this paper are for deterministic algorithms, but we do not see a technical obstacle in making them work for randomized algorithms as well. Open Question 3. Is the deterministic complexity of triangle membership/detection strictly larger than that of its randomized complexity in the Congest model? 13 Section 3 gives a tight bound on the bandwidth required for an optimal-round algorithm. In Appendix A we address the bandwidth of optimal-round algorithms for k-cycles. This question can be asked about further problems, even those for which we do not know yet what the exact round complexity is, such as various symmetry breaking problems. Open Question 4. What is the bandwidth complexity of optimal-round distributed algorithms for various problems? Whether gaps between the Local and Congest models occur for symmetry breaking problems is a central open question, which we hope our technique can shed light upon. Prime examples are MIS and (∆ + 1)-Coloring, but it is not known whether there is indeed a gap. The reason that reductions from 2-party communication problems are provably incapable of proving lower bounds for these problems is that any partial solution that is obtained by a greedy algorithm is extendable into a valid solution for the entire graph, which means that one player can solve the problem for its set of nodes and deliver only the state of nodes on the boundary to the other player, for completing the task. Another way to see why arguing about communication only will not suffice here is to notice that simulating the sequential greedy algorithm requires in fact very little communication in total, despite taking many rounds. Open Question 5. For various symmetry breaking problems, is the complexity in the Congest model strictly higher than its counterpart in the Local model? Acknowledgements: We are grateful to Michal Dory, Eyal Kushilevitz, and Merav Parter for stimulating discussions. We are also grateful to Ivan Rapaport, Eric Remila, and Nicolas Schabanel, a point that was made by them helped in significantly simplifying Section 3. References [1] A. Abboud, A. Backurs, and V. V. Williams. If the current clique algorithms are optimal, so is Valiant’s parser. In FOCS, pages 98–117, 2015. [2] A. Abboud and V. Vassilevska Williams. Popular conjectures imply strong lower bounds for dynamic problems. In FOCS, pages 434–443, 2014. [3] A. Abboud, V. Vassilevska Williams, and H. Yu. Matching triangles and basing hardness on an extremely popular conjecture. In STOC, pages 41–50, 2015. [4] F. N. Afrati, D. Fotakis, and J. D. Ullman. Enumerating subgraph instances using mapreduce. In Data Engineering (ICDE), 2013 IEEE 29th International Conference on, pages 62–73. IEEE, 2013. [5] N. Alon, L. Babai, and A. Itai. A fast and simple randomized parallel algorithm for the maximal independent set problem. J. Algorithms, 7(4):567–583, 1986. [6] N. Alon, R. Yuster, and U. Zwick. Color-coding. Journal of the ACM (JACM), 42(4):844–856, 1995. [7] B. Awerbuch, O. Goldreich, D. Peleg, and R. Vainish. A trade-off between information and communication in broadcast protocols. J. ACM, 37(2):238–256, 1990. 14 [8] N. Bansal and R. Williams. Regularity lemmas and combinatorial algorithms. Theory of Computing, 8(1):69–94, 2012. [9] A. Bar-Noy, J. Naor, and M. Naor. One-bit algorithms. Distributed Computing, 4:3–8, 1990. [10] M. Baruch, P. Fraigniaud, and B. Patt-Shamir. Randomized proof-labeling schemes. In Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing (PODC), pages 315–324, 2015. [11] A. Belovs. Span programs for functions with constant-sized 1-certificates. In STOC, pages 77–84. ACM, 2012. [12] A. Björklund, R. Pagh, V. V. Williams, and U. Zwick. Listing triangles. In International Colloquium on Automata, Languages, and Programming, pages 223–234. Springer, 2014. [13] S. Brandt, O. Fischer, J. Hirvonen, B. Keller, T. Lempiäinen, J. Rybicki, J. Suomela, and J. Uitto. A lower bound for the distributed lovász local lemma. In STOC, pages 479–488, 2016. [14] H. Buhrman, C. Durr, M. Heiligman, P. Hoyer, F. Magniez, M. Santha, and R. De Wolf. Quantum algorithms for element distinctness. In CCC, pages 131–137. IEEE, 2001. [15] K. Censor-Hillel, E. Fischer, G. Schwartzman, and Y. Vasudev. Fast distributed algorithms for testing graph properties. In DISC, pages 43–56. Springer, 2016. [16] K. Censor-Hillel, P. Kaski, J. H. Korhonen, C. Lenzen, A. Paz, and J. Suomela. Algebraic methods in the congested clique. In PODC, pages 143–152. ACM, 2015. [17] K. Censor-Hillel, T. Kavitha, A. Paz, and A. Yehudayoff. Distributed construction of purely additive spanners. In Proceedings of the 30th International Symposium on Distributed Computing (DISC), Paris, France, September 27-29, 2016, pages 129–142, 2016. [18] K. Censor-Hillel, S. Khoury, and A. Paz. Quadratic and near-quadratic lower bounds for the CONGEST model. DISC 2017. Also in CoRR, abs/1705.05646, 2017. [19] T. M. Chan. Speeding up the four russians algorithm by about one more logarithmic factor. In SODA, pages 212–217, 2015. [20] A. Czumaj and A. Lingas. Finding a heaviest vertex-weighted triangle is not harder than matrix multiplication. SIAM Journal on Computing, 39(2):431–444, 2009. [21] D. Dolev, C. Lenzen, and S. Peled. ” tri, tri again”: Finding triangles and small subgraphs in a distributed setting. In DISC, pages 195–209. Springer, 2012. [22] A. Drucker, F. Kuhn, and R. Oshman. On the power of the congested clique model. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC), pages 367–376, 2014. [23] M. Elkin. A simple deterministic distributed MST algorithm, with near-optimal time and message complexities. In PODC, pages 157–163. ACM, 2017. 15 [24] P. Erdös. On extremal problems of graphs and generalized graphs. Israel Journal of Mathematics, 2(3):183–190, Sep 1964. [25] P. Fraigniaud, I. Rapaport, V. Salo, and I. Todinca. Distributed testing of excluded subgraphs. In DISC, pages 342–356. Springer, 2016. [26] S. Frischknecht, S. Holzer, and R. Wattenhofer. Networks cannot compute their diameter in sublinear time. In Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1150–1162, 2012. [27] J. Håstad and A. Wigderson. The randomized communication complexity of set disjointness. Theory of Computing, 3(1):211–219, 2007. [28] M. Henzinger, S. Krinninger, D. Nanongkai, and T. Saranurak. Unifying and strengthening hardness for dynamic problems via the online matrix-vector multiplication conjecture. In STOC, pages 21–30. ACM, 2015. [29] A. Itai and M. Rodeh. Finding a minimum circuit in a graph. SIAM Journal on Computing, 7(4):413–423, 1978. [30] T. Izumi and F. L. Gall. Triangle finding and listing in CONGEST networks. In Proceedings of the ACM Symposium on Principles of Distributed Computing, (PODC), pages 381–389, 2017. [31] S. Jukna. Extremal Combinatorics - With Applications in Computer Science. Texts in Theoretical Computer Science. An EATCS Series. Springer, 2001. [32] J. Kari, M. Matamala, I. Rapaport, and V. Salo. Solving the induced subgraph problem in the randomized multiparty simultaneous messages model. In SIROCCO, pages 370–384. Springer, 2015. [33] V. King, S. Kutten, and M. Thorup. Construction and impromptu repair of an MST in a distributed network with o(m) communication. In PODC, pages 71–80. ACM, 2015. [34] M. N. Kolountzakis, G. L. Miller, R. Peng, and C. E. Tsourakakis. Efficient triangle counting in large graphs via degree-based vertex partitioning. Internet Mathematics, 8(1-2):161–185, 2012. √ [35] K. Kothapalli, C. Scheideler, M. Onus, and C. Schindelhauer. Distributed coloring in Õ( log n) bit rounds. In Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS), 2006. [36] F. Kuhn, T. Moscibroda, and R. Wattenhofer. Local computation: Lower and upper bounds. J. ACM, 63(2):17, 2016. [37] E. Kushilevitz and N. Nisan. Communication complexity. In Cambridge University Press, 1997. [38] F. Le Gall. Improved quantum algorithm for triangle finding via combinatorial arguments. In FOCS, pages 216–225. IEEE, 2014. 16 [39] F. Le Gall. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th international symposium on symbolic and algebraic computation, pages 296–303. ACM, 2014. [40] F. Le Gall and S. Nakajima. Multiparty quantum communication complexity of triangle finding. In TQC, to appear, 2017. [41] F. Le Gall and S. Nakajima. Quantum algorithm for triangle finding in sparse graphs. Algorithmica, 79(3):941–959, 2017. [42] T. Lee, F. Magniez, and M. Santha. Improved quantum query algorithms for triangle finding and associativity testing. In SODA, pages 1486–1502. SIAM, 2013. [43] C. Lenzen and B. Patt-Shamir. Improved distributed steiner forest construction. In PODC, pages 262–271, 2014. [44] N. Linial. Distributive graph algorithms global solutions from local data. In Proceedings of the 28th Annual Symposium on Foundations of Computer Science, FOCS, pages 331–335, 1987. [45] N. Linial. Locality in distributed graph algorithms. SIAM J. Comput., 21(1):193–201, 1992. [46] M. Luby. A simple parallel algorithm for the maximal independent set problem. SIAM J. Comput., 15(4):1036–1053, 1986. [47] F. Magniez, M. Santha, and M. Szegedy. Quantum algorithms for the triangle problem. SIAM Journal on Computing, 37(2):413–424, 2007. [48] Y. Métivier, J. M. Robson, N. Saheb-Djahromi, and A. Zemmari. An optimal bit complexity randomized distributed MIS algorithm. Distributed Computing, 23(5-6):331–340, 2011. [49] D. Nanongkai, A. D. Sarma, and G. Pandurangan. A tight unconditional lower bound on distributed randomwalk computation. In PODC, pages 257–266. ACM, 2011. [50] M. Naor. A lower bound on probabilistic algorithms for distributive ring coloring. SIAM J. Discrete Math., 4(3):409–412, 1991. [51] S. Pai, G. Pandurangan, S. V. Pemmaraju, T. Riaz, and P. Robinson. Symmetry breaking in the congest model: Time- and message-efficient algorithms for ruling sets. In DISC 2017. Also in CoRR, abs/1705.07861, 2017. [52] S. Pai, G. Pandurangan, S. V. Pemmaraju, T. Riaz, and P. Robinson. Symmetry breaking in the congest model: Time-and message-efficient algorithms for ruling sets. In PODC, to appear, 2017. [53] G. Pandurangan, P. Robinson, and M. Scquizzato. Tight bounds for distributed graph computations. CoRR, abs/1602.08481, 2016. [54] G. Pandurangan, P. Robinson, and M. Scquizzato. A time- and message-optimal distributed algorithm for minimum spanning trees. In STOC, pages 743–756. ACM, 2017. [55] D. Peleg. Distributed Computing: A Locality-Sensitive Approach. Society for Industrial and Applied Mathematics, 2000. 17 [56] D. Peleg and V. Rubinovich. A near-tight lower bound on the time complexity of distributed minimum-weight spanning tree construction. SIAM J. Comput., 30(5):1427–1442, 2000. [57] A. A. Razborov. On the distributional complexity of disjointness. Theor. Comput. Sci., 106(2):385–390, 1992. [58] A. D. Sarma, F. N. Afrati, S. Salihoglu, and J. D. Ullman. Upper and lower bounds on the cost of a map-reduce computation. In VLDB, volume 6, pages 277–288. VLDB Endowment, 2013. [59] A. D. Sarma, S. Holzer, L. Kor, A. Korman, D. Nanongkai, G. Pandurangan, D. Peleg, and R. Wattenhofer. Distributed verification and hardness of distributed approximation. SIAM J. Comput., 41(5):1235–1265, 2012. [60] T. Schank and D. Wagner. Finding, counting and listing all triangles in large graphs, an experimental study. In WEA, pages 606–609. Springer, 2005. [61] M. Szegedy. On the quantum query complexity of detecting triangles in graphs. arXiv preprint quant-ph/0310107, 2003. [62] V. V. Williams. Multiplying matrices faster than coppersmith-winograd. In STOC, pages 887–898. ACM, 2012. [63] V. V. Williams. Hardness of easy problems: basing hardness on popular conjectures such as the strong exponential time hypothesis (invited talk). In LIPIcs-Leibniz International Proceedings in Informatics, volume 43, 2015. [64] V. V. Williams and R. Williams. Subcubic equivalences between path, matrix and triangle problems. In FOCS, pages 645–654, 2010. [65] H. Yu. An improved combinatorial algorithm for boolean matrix multiplication. In ICALP, pages 1094–1105. Springer, 2015. A k-Cycle Membership for k ≥ 4 An immediate question is whether we can get lower bounds on the bandwidth for additional roundoptimal algorithms. We show here how to generalize our lower bound technique to apply for detecting membership in larger cycles. However, curiously, as we show in Section A.1 for the sake of comparison, for cycles that are larger than 3, the standard approach of reductions from 2-party communication complexity problems allows for stronger lower bounds. An optimal-round algorithm for solving k-cycle membership completes within exactly b(k−1)/2c rounds, by a simple (standard) indistinguishability argument (this is even with unlimited bandwidth). This is because after t rounds of communication a node may have information only about nodes at distance at most t + 1 from it. Therefore, after b(k − 1)/2c − 1 rounds of communication, a node cannot distinguish whether it participates in a k-cycle or not. To see how we generalize our technique, observe first that the lower bound given in Theorem 2 holds even when a specific node u is given as input to all the nodes, and only u needs to solve the triangle membership problem. This is helpful in extending our lower bound to the case of k-cycles when k ≥ 4, and hence we define this problem formally. 18 ( )/ ( )/ Figure 3: Constructing G0 out of G. Definition 8. (Fixed-Node Triangle Membership). In the Fixed-Node Triangle Membership problem, all nodes are given the identity of a specific node u, and node u needs to detect whether it is a part of a triangle. The proof of Theorem 2 actually proves the following theorem. Theorem 5. The fixed-node triangle membership problem cannot be solved by a single-round algon−2 ∆−1 rithm in the Congest(B) model unless B ≥ log(( 2(∆−1) ) ). We formally extend the membership problem to larger cycles, as follows. Definition 9. (k-Cycle Membership). In the k-Cycle Membership problem, each node needs to detect whether it is a part of a k-cycle. Now, Theorem 5 can be used to prove the following. Theorem 6. Let k ∈ O(n1− ), for some constant 0 <  < 1. The k-cycle membership problem cannot be solved by an optimal b(k − 1)/2c-round algorithm in the Congest(B) model unless n−2 ∆−1 B ≥ c log(( 2(∆−1) ) ), for some constant c ≥ 0. We prove Theorem 6 by showing a reduction from the fixed-node triangle membership problem, given in Definition 8. That is, we show that an algorithm for solving the k-cycle membership problem can be used to solve the fixed-node triangle membership problem. Proof of Theorem 6: First, we show how to construct an appropriate instance for the k-cycle membership problem, given an instance for the fixed-node triangle membership problem. We start with describing the construction for an odd value of k, and then show how to tweak it to handle even values of k as well. Let (G = (V, E), u) be an instance of the fixed-node triangle membership problem where |V | = n e, and let E(u) be the set of edges incident to the node u. For an odd k, we define an instance of the k-cycle membership problem, G0 = (V 0 , E 0 ), where |V 0 | = n, as follows. We replace each edge (u, v) ∈ E(u) with a path Puv of length (k − 3)/2 + 1, going through (k − 3)/2 new nodes, denoted uv1 , . . . , uv(k−3)/2 , containing the edges (u, uv1 ), (uv1 , uv2 ), . . . , (uv(k−3)/2−1 , uv(k−3)/2 ), (uv(k−3)/2 , v). For example, for k = 7, we replace each edge (u, v) by a path of three edges (u, uv1 ), (uv1 , uv2 ), (uv2 , v), going through two new intermediate nodes uv1 and uv2 (see Figure 3). Formally, the new graph 19 G0 = (V 0 , E 0 ) is defined as: V 0 = V ∪ {uvi | (u, v) ∈ E(u), 1 ≤ i ≤ (k − 3)/2} E 0 = (E \ E(u)) ∪ {(u, uv1 )), (uv1 , uv2 ), . . . , (uv(k−3)/2−1 , uv(k−3)/2 ), (uv(k−3)/2 , v) | (u, v) ∈ E(u)} The following observation follows directly from the construction above. Observation 3. For an odd k, the node u participates in a k-cycle in G0 if and only if it participates in a triangle in G. Since an algorithm may use the IDs of the nodes, we need to also assign unique IDs to nodes in G0 . We can do this in any consistent arbitrary manner, say, by assigning IDG0 (x) = IDG (x) if x ∈ V , and ID(uvi ) = ID(v) ◦ bin(i) for nodes in V 0 \ V , where bin(i) is the binary representation of i. Notice that ∆(G0 ) = ∆(G). Next, assume towards a contradiction, that there is an algorithm A0 that solves the k-cycle membership problem in an optimal number of (k−1)/2 rounds in the Congest(B) model with B < n e−2 log(( 2e(∆−1) )∆−1 ). We show an algorithm A that solves the fixed-node triangle membership problem n e−2 on (G = (V, E), u) in a single round of the Congest(B) model with B < log(( 2e(∆−1) )∆−1 ). As this contradicts Theorem 5, and n = ke n, this completes the proof for all values of k in O(n1− ) for any constant 0 ≤  ≤ 1. We construct A such that nodes in G simulate the nodes in G0 running algorithm A0 , as follows. In A, each node in V , sends to its neighbors in G the message it sends in the first round of A0 on G0 . If v ∈ V is a neighbor of u in G, then it sends to u the message it sends to uv(k−3)/2 in A0 . Then, for each of its neighbors v, the node u has all the messages that the node uv(k−3)/2 receives in the first round of A0 . Now, by backwards induction, for each i, 1 ≤ i ≤ (k − 3)/2, by local simulation at the node u, it knows the view of the node uvi at the end of the first (k − 3)/2 − i + 1 rounds of A0 . This implies that u knows the message sent to it by uv1 in round (k − 3)/2 + 1 = (k − 1)/2 of A0 . Since in (k − 1)/2 rounds of A0 the node u knows whether it is in a k-cycle in G0 , by Observation 3, it thus knows in a single round whether it is in a triangle in G. To handle even value of k, we construct G0 in a similar manner of replacing each edge (u, v) ∈ E(u) by a path of (k − 4)/2 nodes. In addition, each edge (v, w) ∈ E \ E(u), is replaced by a path of length two which consists of an additional node vw. Similarly to Observation 3, the node u participates in a k-cycle in G0 if and only if it participates in a triangle in G. As in the case for odd k, given an algorithm A0 for k-cycle membership in G0 , the simulation of (k − 4)/2 + 1 = (k − 2)/2 = b(k − 1)/2c rounds of it in G requires only a single round of communication. Therefore, the reduction carries over for even values of k as well. Observe that here n = ke n+n e2 , therefore, as in the case of odd k, we achieve the same asymptotic lower bound as in the triangle membership problem, for any value of k in O(n1− ). A.1 k-Cycle membership for k ≥ 4 using communication complexity Here we show a lower bound on the bandwidth needed for any optimal-round algorithm for solving k-cycle membership for k ≥ 4 by using the standard framework of reduction from a 2-party communication complexity problem. For simplicity, we will show this for even values of k, but a similar construction works for odd values as well. For k > 4, the bound is larger compared with our proof of Section A. 20 Theorem 7. The k-cycle membership problem cannot be solved by a deterministic optimal-round k−4 algorithm in the Congest(B) model unless B ≥ Ω(∆ 2 +1 log(n)), and it cannot be solved by a randomized optimal-round algorithm, which succeeds with high probability6 , in the Congest(B) k−4 model unless B ≥ Ω(∆ 2 +1 ), for any integers n, ∆, k such that (∆ − 1) k−4 +1 2 = O(n1− ), for some constant 0 <  < 1. In order to prove Theorem 7, we show a reduction from the 2-party communication complexity problem DISJK,S . A 2-party communication complexity problem [37] consists of a function f : {0, 1}K ×{0, 1}K → {TRUE, FALSE}, and two strings, x, y ∈ {0, 1}K , that are given as inputs for two players, Alice and Bob, respectively. The players exchange bits of communication in order to compute f (x, y), according to a protocol π. The communication complexity CC(π) of a protocol π for computing f is the maximal number of bits, taken over all input pairs (x, y), exchanged between Alice and Bob. The communication complexity CC(f ) of f is the minimum, taken over all protocols π that compute f , of CC(π). In the S-Disjointness problem (DISJK,S ), each of the players Alice and Bob receives a K-bits input string containing exactly S ones, and the function f is DISJK,S (x, y), whose output is FALSE if there is an index i ∈ {0, ..., K − 1} such that xi = yi = 1, and TRUE otherwise. Observe that for S > K2 , the function is constant. For S ≤ K2 The deterministic communication complexity of  7 DISJK,S is known to be Ω(log K S ) [31, 37] , while its randomized communication complexity is known to be Ω(S) [27,57]. For the reduction, we adapt the formalization of Family of Lower Bound Graphs given in [18] to our setting. Definition 10 (Definition 1 (simplified) of [18]: Family of Lower Bound Graphs). Fix an integer K, a function f : {0, 1}K × {0, 1}K → {TRUE, FALSE}. The family of graphs {Gx,y = (V, Ex,y ) | x, y ∈ {0, 1}K }, is said to be a family of lower bound graphs w.r.t. f and k-cycle membership if the following properties hold: ˙ A ∪V ˙ B ∪˙ Ve a fixed (1) The set of nodes V is the same for all graphs, and we denote by V = {u}∪V partition of it; (2) Only the existence of edges in VA × Ve may depend on x; (3) Only the existence of edges in VB × Ve may depend on y; (4) The node u participates in a k-cycle in Gx,y iff f (x, y) = FALSE. Observe that given a family of lower bound graphs {Gx,y = (V, Ex,y ) | x, y ∈ {0, 1}K } w.r.t. to DISJK,S and k-cycle membership, if Alice and Bob can simulate an algorithm for k-cycle membership on u, then by checking the output of u at the end of the algorithm they can solve DISJK,S (x, y). 6 We say that an event occurs with high probability if it occurs with probability 1 − n1c , for some constant c ≥ 1. It can be proved by the rank method for proving lower bounds for deterministic protocols in communication complexity. To read more about the rank method, see for example [37] section 1.4. For the proof of the lower bound on the rank of S-Disjointness, see [31], page 175. 7 21 ... ... ... ... ... ... ... ... Δ−1 − ℎ ( − 4)/2 Figure 4: The reduction from Communication Complexity to k-cycle membership. The proof of Theorem 7 is organized as follows. First, we construct a family of lower bound graphs, and next, we show that given an algorithm ALG for k-cycle membership with messages of size B, Alice and Bob can simulate ALG on Gx,y by exchanging only O(B) bits. We now construct the following family of lower bound graphs, by describing a fixed graph construction G = (V, E), which we then generalize to a family of graphs {Gx,y = (V, Ex,y ) | x, y ∈ {0, 1}K }, which we show to be a family lower bound graphs w.r.t. to DISJK,S and k-cycle membership. The fixed graph construction: The fixed graph construction (Figure 4) consists of a tree T and a path P of size n − |T |. The tree T is a tree in which the root node of T , denoted by u, is connected to two nodes w and v, such that each of w and v is a root of a (∆ − 1)-regular tree of depth k−4 2 . Denote by leaves(w) and leaves(v) the set of leaves of the tree rooted at w and the set of leaves of the tree rooted at v, respectively. We define VA and VB to be leaves(w) and leaves(v) respectively. Adding edges corresponding to the inputs: Each of the players Alice and Bob receives as k−4 the input a set of nodes in P of size (∆ − 1) 2 +1 . Alice connects the nodes in her input to the k−4 (∆ − 1) 2 leaves of the tree rooted at v, such that each leaf is connected to ∆ − 1 nodes in P . k−4 Similarly, Bob connects the nodes in his input to the (∆ − 1) 2 leaves of the tree rooted at w, such that each leaf in connected to ∆ − 1 nodes in P . The following observation follows directly from the construction. Observation 4. The node u participates in a cycle of length k in Gx,y if and only if the two sets of Alice and Bob are not disjoint. Therefore, given an algorithm ALG for k-cycle membership, if Alice and Bob can simulate ALG k−4 on u then they can solve S-Disjointness, where S = (∆ − 1) 2 +1 and the size of the input stings is   k−4 ! k−4 2 +1 X 2 (∆ − 1) − 1 K = n − |T | ≥ n − 1 + 2 (∆ − 1)i  ≥ n − 1 + 2 ∆−2 i=0 Observe that for (∆ − 1) k−4 +1 2 22 = O(n1− )  k−4 +1 2 for some constant 0 <  < 1, it holds that K = Θ(n), and log K log(n)). It remains S = Ω(∆ to show that given an algorithm for k-cycle membership with messages of size B, Alice and Bob can simulate ALG on u by exchanging only O(B) bits. Proof of Theorem 7: Let ALG be a (k/2 − 1)-round algorithm for solving the k-cycle memk/2−1 k/2−1 bership problem. Let {m1v→u , ..., mv→u } and {m1w→u , ..., mw→u } be the two sets of messages sent from v and w to u during the k/2 − 1 rounds, where, e.g., miv→u is the message sent from v to u in round i. The crucial observation is that Alice and Bob can simulate the nodes v, w, and u during the first k/2 − 2 rounds without any communication, because the k/2 − 2 neighborhoods of these nodes are fixed. Therefore, in order for the players to compute the output of u after k/2 − 1 rounds, it k/2−1 suffices for Alice to send to Bob the message mv→u , and for Bob to send to Alice the message k/2−1 mw→u . By Observation 4, this implies that 2B bits suffice for the players to correctly compute DISJK,S . Therefore, by the lower bounds on DISJK,S , any deterministic optimal-round algorithm for k-cycle  k−4 +1 2 membership requires messages of size Ω(log K log(n)), and any randomized optimalS ) = Ω(∆ round algorithm which succeeds with high probability requires Ω(S) = Ω(∆ n, ∆, k such that k−4 (∆ − 1) 2 +1 = O(n1− ) k−4 +1 2 ), for any integers for some constant 0 <  < 1. We mention that one can use the set-disjointness function instead of DISJK,S to obtain a lower k−4 bound of (∆ − 1) 2 , by simply connecting each leaf to a single node on the path, based on the inputs. However, this gives a rather strong bound on ∆ with respect to n because then the number of leaves must be also linear in n. Such a bound for ∆ does not occur in our given construction. 23
8cs.DS
TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION ANDREAS KREIENBUEHL arXiv:1509.01572v3 [gr-qc] 28 Dec 2016 Center for Computational Sciences and Engineering, Lawrence Berkeley National Laboratory, 1 Cyclotron Road, Berkeley CA 94720, United States of America PIETRO BENEDUSI Institute of Computational Science, Faculty of Informatics, Università della Svizzera italiana, Via Giuseppe Buffi 13, 6904 Lugano, Switzerland DANIEL RUPRECHT School of Mechanical Engineering, University of Leeds, Woodhouse Lane, Leeds LS2 9JT, United Kingdom ROLF KRAUSE Institute of Computational Science, Faculty of Informatics, Università della Svizzera italiana, Via Giuseppe Buffi 13, 6904 Lugano, Switzerland Abstract. This article demonstrates the applicability of the parallel-in-time method Parareal to the numerical solution of the Einstein gravity equations for the spherical collapse of a massless scalar field. To account for the shrinking of the spatial domain in time, a tailored load balancing scheme is proposed and compared to load balancing based on number of time steps alone. The performance of Parareal is studied for both the sub-critical and black hole case; our experiments show that Parareal generates substantial speedup and, in the super-critical regime, can reproduce Choptuik’s black hole mass scaling law. 1. Introduction Einstein’s field equations of general relativity (GR) consist of ten coupled, non-linear, hyperbolic-elliptic partial differential equations (PDEs). Because gravity couples to all forms of energy, there is an enormous dynamic range of spatiotemporal scales in GR. Hence, usually only the application of advanced numerical methods can provide solutions and in numerical relativity [2, 4] extensive use of high-performance computing (HPC) is made [28, 34]. Today, almost all HPC architectures are massively parallel systems connecting large numbers of compute nodes by a high-speed interconnect. In numerical simulations, the power of these systems can only be harnessed by algorithms that feature a high degree of concurrency; every algorithm with strong serial dependencies can only provide inferior performance on massively parallel computers. For the solution of PDEs, parallelization strategies have been developed mainly for spatial solvers. However, in light of the E-mail addresses: [email protected], [email protected], [email protected], [email protected]. Date: December 30, 2016. 2010 Mathematics Subject Classification. 35Q76, 65M25, 65Y05, 83C57. Key words and phrases. Einstein-Klein-Gordon gravitational collapse, Choptuik scaling, Parareal, spatial coarsening, load balancing, speedup. 1 2 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION rapid increase in the number of cores in supercomputers, methods that offer additional concurrency along the temporal axis have recently begun to receive more attention. The idea of parallelization-in-time was introduced in 1964 [37]. In the 1980s and 1990s, time and spacetime multigrid methods were studied [24–26]. More recently, the now widely used time parallel method Parareal was proposed [33]. Other recently introduced parallel-in-time methods are PFASST [13, 35], RIDC [10], or MGRIT [14]. A historical overview is offered in [19]. Given the demonstrated potential of parallel-in-time integration methods for large-scale parallel simulations [44], these methods could be beneficial for the numerical relativity community. However, their application is not straightforward and often it is unclear a priori if good performance can be achieved. In this article, we therefore investigate the principal applicability of the time parallel Parareal method to solving Einstein’s equations describing spherical, gravitational collapse of a massless scalar field. The system is also referred to as an Einstein-Klein-Gordon system because it is equivalent to a Klein-Gordon equation expressed in the context of GR, i.e. on a back-reacting, curved geometry. It defines a basic gravitational field theory and is of interest therefore not only in numerical relativity but also in, e.g., quantum gravity [27, 31, 46]. A summary of numerically derived results is given in [23]; the work by Choptuik [8] brought forward novel, physical results and is of particular interest here because we will show that Parareal correctly reproduces the expected mass scaling law. Mathematical theory shows that Parareal performs well for diffusive problems with constant coefficients [21]. For diffusive problems with space- or time-dependent coefficients, numerical experiments show that Parareal can converge quickly too [32]. However, given the theory for basic constant-coefficient hyperbolic PDEs [21], it can be expected that Parareal applied to convection dominated problems converges too slowly for meaningful speedup to be possible. Special cases with reasonable performance are discussed in [17] and for certain hyperbolic PDEs it was found that some form of stabilization is required for Parareal to provide speedup [7, 12, 20, 42]. Surprisingly, no stabilization is required for the equations describing gravitational collapse; we demonstrate that plain Parareal can achieve significant speedup. A detailed analytical investigation of why this is the case would definitely be of interest but is left out for future work. One reason could be that we solve in characteristic coordinates for which the discretization is aligned with the directions of propagation [18, 30]. The article is structured as follows: In Section 2 we define the system of Einstein field equations that we solve using Parareal. In addition, we give details on the numerical approach and discuss the interplay between Parareal and the particular structure of the spatial mesh. In Section 3 we discuss the Parareal method. Then, in Section 4 numerical results are presented. Finally, in Section 5 we conclude with a summary and discussion. 2. Equations 2.1. Gravitational collapse. The Einstein field equations in Planck units normalized to 4πG/c4 = 1 are (2.1.1) Gµν = 2Tµν , where µ, ν ∈ {0, 1, 2, 3} index time (via 0) and space (via 1, 2, and 3).1 Once the non-gravitational matter content is specified by a definition of the energy-momentum tensor Tµν , possibly along with equations of state that together satisfy the continuity equations ∇µ Tµν = 0, Equation (2.1.1) defines a set of ten partial differential equations for ten unknown metric tensor field components gµν .2 In all generality, the equations are coupled, non-linear, and hyperbolic-elliptic in nature. Six of the ten equations are hyperbolic evolution equations, while the remaining four are elliptic constraints on the initial data; they represent the freedom to choose spacetime coordinates. For the matter content, we consider a minimally coupled massless scalar field φ with energy-momentum tensor 1 (2.1.2) Tµν = ∇µ φ∇ν φ − gµν g αβ ∇α φ∇β φ. 2 For the metric tensor field gµν in spherical symmetry it is natural to introduce a parametrization in terms of Schwarzschild coordinates (t, r). Here, t is the time coordinate of a stationary observer at infinite radius r, 1We omit the addition of the cosmological constant term Λg µν on the left-hand side in Equation (2.1.1) because observations suggest 0 < Λ  1 (see, e.g., [29]); the term’s impact on black hole formation as studied here can be neglected. 2We use the Einstein summation convention. TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 3 which measures the size of spheres centered at r = 0. In [8] the resulting Einstein field equations are analyzed numerically. In particular, adaptive mesh refinement [5] is used to resolve the black hole formation physics. In [22] the same investigation is carried out in double null or characteristic coordinates (τ, ρ) without mesh refinement (see, however, [41, 45]). Finally, in [31] the effect of quantum gravity modifications on the collapse is studied in adjusted characteristic coordinates. Here we use characteristic coordinates (τ, ρ) as well but exclude quantum gravity modifications. Also, for simplicity, we will refer to τ as a time coordinate and to ρ as a space coordinate. Making the ansatz (2.1.3) gµν dxµ dxν = −2∂ρ rHdτ dρ + r2 (dϑ2 + [sin(ϑ)dϕ]2 ) for the metric tensor field and using an auxiliary field h for the spacetime geometry along with an auxiliary field Φ for the matter content, the complete field equations are (H − h)(Φ − φ) h ∂τ Φ = , (2.1.4) ∂τ r = − , 2 2r for r and Φ, and ∂ρ r ∂ρ r ∂ρ r (2.1.5) ∂ρ φ = (Φ − φ), ∂ρ H = H(Φ − φ)2 , (H − h), ∂ρ h = r r r for φ, H, and h (see [22]). Overall the system can be seen as a wave equation for the massless scalar field φ on a back-reacting, curved geometry. Boundary conditions at (τ, ρ = τ ) are r = 0 and regularity of Φ, φ, H, and h, which implies Φ = φ and H = h at the boundary [11, 30]. Consistent initial data at (τ = 0, ρ) are ρ (2.1.6) r= , Φ = (1 + ρ∂ρ )φ, 2 where we choose for φ the Gaussian wave packet  2 ! ρ − ρ0 ρ3 exp − (2.1.7) φ(0, ρ) = φ0 . 1 + ρ3 δ0 We also performed tests for initial data similar in shape to the hyperbolic tangent function much like Choptuik did in [8] for purely serial time stepping. Since in this case we found Parareal’s performance to resemble strongly that for the case of the Gaussian wave packet we do not include these results here. The initial scalar field configuration is thus characterized by an amplitude φ0 , mean position ρ0 , and width δ0 . Depending on the value of these parameters, the solution to Equations (2.1.4) and (2.1.5) can describe a bounce of the wave packet or black hole formation near the boundary at r = 0. A black hole appears when the outward null expansion r 1 2h + (2.1.8) Θ = , r H which measures the relative rate of change of a cross-sectional area element of a congruence of out-going null curves, approaches zero [38]. The black hole mass is r (2.1.9) M= , 2 evaluated at the point (τ + , ρ+ ) toward which Θ+ vanishes. 2.2. Numerical solution. The numerical grid is depicted in Figure 1a. It is parametrized by the characteristic coordinates τ and ρ, which are used for numerical integration; τ is used as coordinate representing time and ρ as coordinate representing space. Integration thus takes place on a right triangle with initial data defined along the lower right-hand leg. Clearly, the spatial domain becomes smaller as the solution is advanced in τ . Note that the domain is not exactly a right triangle because at the upper-most corner a small sub-triangle is missing. This “buffer” zone of extent λ is needed for the spatial part of the numerical stencil to fit. The computational domain thus consists of all points (τ, ρ) ∈ [0, L − λ] × [0, L] with L = 80, λ = 0.625, and ρ ≥ τ . As a time stepping method for the solution of the equations in (2.1.4), we use a second-order LaxWendroff Richtmyer two-step method on a fine spacetime grid (see [30]). To employ the time parallel method Parareal (see Section 3), we need a second, computationally cheap, time integration method. Here, 4 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION t 0.2 ρ τ r Field φ 0 −0.2 −0.4 τ τ τ τ −0.6 0 20 40 60 ≈ 45.352 = 20 ≈ 16.758 =0 80 Coordinate ρ (a) The numerical domain. It is parametrized by the characteristic coordinates τ and ρ. (b) Scalar field solution snapshots for a black hole-free setting. The peak of the Gaussian evolves along the constant coordinate value ρ ≈ 20, which is also when the bounce occurs in τ . Figure 1. The computational domain (left) and sub-critical gravitational scalar field evolution (right). we choose the explicit first-order Euler method on a coarse spacetime mesh. For Parareal to be efficient, the cost of the coarse method has to be small compared to that of the fine one: by choosing a simple first-order method on the coarse grid for C we obtain a good coarse-to-fine ratio (see Section 3.4). For optimal speedup, the right balance between the difference in accuracy and difference in cost between C and F has to be found. For the integration in space of the equations in (2.1.5) we use a second-order Runge-Kutta method [30]. Snapshots of scalar field evolution resulting from the chosen fine grid discretization are shown in Figure 1b, where φ evolves along constant lines of ρ until a bounce occurs at r = 0. The figure also shows how the size of the domain decreases during the evolution: for τ = 0 the left boundary is at ρ = 0 while for τ = 20 it is at ρ = 20. 2.3. Mass scaling. In practice, the simulation terminates when a black hole forms because H grows without bound in this case (see [11] for details). Figure 2a provides a simplified illustration of a black hole region (dotted portion) and shows where the simulation comes to a halt (dashed line). Thus, to determine the black hole mass M , we record minimal expansion values via the scalar (rΘ+ )mi = minρ {rΘ+ } derived from Equation (2.1.8). The last such recorded minimal value before the termination of the simulation defines a characteristic coordinate (τ + , ρ+ ) (see again Figure 2a), which we can use to define an r and M via Equation (2.1.9). The scalar (rΘ+ )mi approaches 0 when (τ, ρ) nears (τ + , ρ+ ), as is shown in the lower portion of Figure 2b. Based on numerical experiments, Choptuik presents, among other things, a relation between the amplitude φ0 of the Gaussian in Equation (2.1.7) and the black hole mass M [8]. He shows that there is a critical value φ?0 such that for φ0 < φ?0 there is a bounce (sub-critical case), while for φ0 > φ?0 there is a black hole (super-critical case). Based thereon, he demonstrates that the black hole mass scales with φ0 − φ?0 > 0 according to the law M ∝ (φ0 − φ?0 )γ with γ being a positive constant of the same value for various initial data profiles. We demonstrate that Parareal can correctly capture this black hole mass scaling law although our coarse level Euler method alone cannot. Also, Parareal requires less wall-clock time than F, which can be beneficial for the investigation of the high-accuracy demanding critical solution [8, 23] that requires the simulation of numerous black holes [22]. This analysis however is omitted in this article and left for future work. TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 5 τ r (τ + ,ρ + ) • Scalar (rΘ+ )mi ρ 1.5 Scalar (rΘ+ )mi t 1.5 1 0.5 0 1 0.5 0 0 20 40 60 80 Coordinate τ (a) The simulation terminates at τ + , when a black hole forms at ρ+ . (b) Minimal weighted outward null expansion indicating a bounce (top) and black hole formation (bottom) are shown. Figure 2. Illustrations to clarify super-critical gravitational collapse. 3. Parareal 3.1. Algorithm. Parareal [33] is a method for the solution of initial value problems (3.1.1) ∂τ u(τ ) = f (τ, u(τ )), u(0) = u0 , 0 ≤ τ ≤ T. Here, as is outlined in the previous section, f comes from discretizing Equations (2.1.4) and (2.1.5), and T = L − λ marks the end time. Parareal starts with a decomposition of the time domain into Npr temporal subintervals (TSs) defined in terms of times τ p such that (3.1.2) [τ 1 , τ 2 ] ∪ ... ∪ [τ Npr −1 , τ Npr ] = [0, L − λ]. Now denote by F some serial time integration method of high accuracy and cost (in our case this is the second-order Lax-Wendroff Richtmyer two-step method), and by C a cheap and possibly much less accurate method (in our case this is the explicit first-order Euler method). Instead of running the fine method subinterval by subinterval serially in time, Parareal performs the iteration       p p (3.1.3) up+1 = C u − C u + F up[i] , [i+1] [i+1] [i] where super-scripts index time or process number p ∈ {1, ..., Npr } and sub-scripts iterations i ∈ {1, ..., Nit }. The advantage is that the expensive computation of the fine method can be performed in parallel over all TSs at once. Here, we assume that the number of TSs is equal to the number Npr of cores (or processes) used for the time direction. Good speedup can be obtained if C is fast in comparison to F but still accurate enough for Parareal to converge rapidly. See Section 3.4 for a more detailed discussion of Parareal’s speedup. In Section 2.2 we hinted at the interchangeability of the characteristic coordinates τ and ρ for the numerical integration. Therefore, theoretically, Parareal could also be used for the spatial integration to simultaneously parallelize both time and space. However, such an interweaving of two Parareal iterations is not discussed in this article; it is put aside for future work. 3.2. Spatial coarsening in Parareal. In order to make C cheaper and improve speedup, we not only use a less accurate time stepper for C but also employ a coarsened spatial discretization with a reduced number of degrees-of-freedom. Therefore, we need a spatial interpolation I and restriction R operator. In this case (see, e.g., [15]), the Parareal algorithm is given by       p p p (3.2.1) up+1 [i+1] = IC Ru[i+1] − IC Ru[i] + F u[i] . 6 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION As restriction operator R we use point injection. For the interpolation operator I we use polynomial (i.e. Lagrangian) interpolation of order 3, 5, and 7.3 It has been shown that, even for simple toy problems, convergence of Parareal can deteriorate if spatial coarsening with low-order interpolation is used. As demonstrated in Section 4.1, this also holds true for the here studied problem. 3.3. Implementation. We have implemented two different realizations of Parareal. In a “standard” version Pst (see Listing 3a), the Parareal correction is computed on each TS up to a uniformly prescribed iteration number. In contrast, in the “modified” implementation Pmo (see Listing 3b), Parareal corrections are only performed on TSs where the solution may not yet have converged. Because Parareal always converges at a rate of at least one TS per iteration, we only iterate on a TS if its assigned MPI rank is greater than or equal to the current Parareal iteration number (see line 8 in Listing 3b). Otherwise, no further iterations are needed and performed, and the process remains idle. Thus, as the iteration progresses, more and more processes enter an idle state. In an implementation to be realized in future work, the criterion for convergence used here will be replaced by a check for some residual tolerance [3]. This could negatively affect the observed performance since it requires essentially one more iteration to compute the residual.4 It also bears mentioning that it has very recently been demonstrated that parallel-in-time integration methods are good candidates to provide algorithm-based fault tolerance [36, 43]. Another difference between the standard and modified implementation is that in the former, after each time parallel fine evolution, a copy of the fine grid solution has to be created (see line 10 in Listing 3a). In the modified Listing 3b this copying is circumvented by the use of two alternating indices “j” and “k” in lines 9 and 10, respectively. The iteration number determines their value which, in turn, determines the fine grid solution buffer that is used to send or receive data by means of the corresponding MPI routines (see lines 14 and 22 in Listing 3b). The two implementations also have slightly different requirements in terms of storage. As can be seen in line 15 in Listing 3a, in Pst on the first TS or, equivalently, for the first MPI rank, the fine grid solution has to be assigned initial data at the beginning of each iteration. This requires one additional buffer to be held in storage. Other than that both implementations need one coarse grid solution buffer and three fine grid buffers for each TS. 3.4. Speedup. We denote by Rco the coarse and by Rfi the fine time stepper’s runtime. Recalling that Nit denotes the number of iterations required for Parareal to converge given Npr processes, Parareal’s theoretically achievable speedup is  −1    Nit Npr Rfi Nit Rco + ≤ min , , (3.4.1) S= 1+ Npr Rfi Npr Nit Rco as is discussed, e.g., in [35]. The estimate is valid only for the ideal case, where runtimes across subintervals are perfectly balanced. In the presence of load imbalances in time however, i.e. differences in the runtimes of C and F across TSs, maximum speedup is reduced [32]. Because the spatial domain we consider is shrinking in time, a tailored decomposition of the time axis has to be used to provide well balanced computational load, as is discussed in the next section. 3.5. Load balancing. Because we integrate over a triangular computational spacetime domain (see Figure 1a), a straight forward, uniform partitioning of the time axis results in imbalanced computational load in time. The first load balancing (LB) strategy, which henceforth we will refer to as LB1, is based on this straight forward, basic decomposition of the time axis. It assigns to each TS the same number of time steps without regard to their computational cost. Because of the shrinking domain, TSs at later times carry fewer p spatial degrees-of-freedom so that the per-process runtimes Rco and Rfip of the coarse and fine time stepper, respectively, are larger for the earlier TSs than for the later ones. Figure 4a shows how this partition leads to an imbalanced computational load in time because the portion extending across the “early-middle” TS [e, m] covers a larger area and thus a larger number of grid points than the portion over the “middle-late” TS [m, l]. 3We also tested barycentric interpolation [6, 16] but found the performance in terms of runtimes and speedup (see Sections 3.4 and 4) to be inferior. 4In [3] a version of Parareal is discussed that can be used to proceed the integration beyond a given end time. It is based on an optimized scheduling of those tasks which become idle in our implementation. TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 i f p > 1 then // In itializa tion Coarse ( co ; τ 1 → τ p ) I n t e r p ( co 7→ f i [ 0 ] ) i f p < Npr then // Prediction Coarse ( co ; τ p → τ p+1 ) I n t e r p ( co 7→ f i [ 2 ] ) f o r i = 1 : Nit do // Iteration i f p < Npr then F i n e ( f i [ 0 ] ; τ p → τ p+1 ) fi [1] = fi [0] f i [ 1 ] −= f i [ 2 ] i f p > 1 then MPI Recv ( f i [ 0 ] ; p ⇐ p − 1 ) else Init ( fi [0]) R e s t r i c t ( f i [ 0 ] 7→ co ) i f p < Npr then Coarse ( co ; τ p → τ p+1 ) I n t e r p ( co 7→ f i [ 2 ] ) f i [ 1 ] += f i [ 2 ] i f p < Npr then MPI Send ( f i [ 1 ] ; p ⇒ p + 1 ) i f p > 1 then // Ini tializa tion Coarse ( co ; τ 1 → τ p ) I n t e r p ( co 7→ f i [ 0 ] ) i f p < Npr then // Prediction Coarse ( co ; τ p → τ p+1 ) I n t e r p ( co 7→ f i [ 2 ] ) f o r i = 1 : Nit do // Iteration i f p >= i then j = ( i +1) % 2 k = i % 2 i f p < Npr then F i n e ( f i [ j ] ; τ p → τ p+1 ) i f p > i then MPI Recv ( f i [ k ] ; p ⇐ p − 1 ) f i [ j ] −= f i [ 2 ] R e s t r i c t ( f i [ k ] 7→ co ) i f p < Npr then Coarse ( co ; τ p → τ p+1 ) I n t e r p ( co 7→ f i [ 2 ] ) f i [ j ] += f i [ 2 ] i f p < Npr then MPI Send ( f i [ j ] ; p ⇒ p + 1 ) 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 (a) The standard Parareal implementation Pst . 7 (b) The modified Parareal implementation Pmo . Figure 3. Pseudo code for the standard and modified Parareal implementation. The variable “co” denotes the coarse grid solution and “fi” an array of three fine grid buffers. t t τ =l τ =l ρ τ r r τ = m τ = m τ ρ τ =e (a) Imbalanced load in time from load balancing LB1. τ =e (b) Balanced load in time from load balancing LB2. Figure 4. Illustration of two different approaches for the decomposition of the time domain, i.e. LB1 (left) and LB2 (right). Figure 4 suggests that early in time TSs should have a shorter extent in time than later ones. Thus, in the second strategy, which in the following we will refer to as LB2, we also consider the cost of time p steps in order to balance the runtime Rco + Rfip over all processes p. We use a decomposition of the time axis in TSs such that the sum of the total coarse and fine runtime is balanced over all TSs, i.e. such that p Rco + Rfi = Npr (Rco + Rfip ) for any process p. This is done by a bisection approach, making use of the fact the we use explicit rather than implicit time integrators (cf. the discussion in [32]), and thus that the cost of a time step from τ to τ + ∆τ is directly proportional to the number of spatial degrees-of-freedom at τ . Therefore, the total spacetime domain is first divided into two parts of roughly equal number of grid points 8 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION as is sketched in Figure 4b. Then, each part is divided again and again until the required number of TSs is reached. Note that this limits the possible numbers of TSs to powers of 2. Figure 5 shows Vampir5 traces for one simulation featuring LB1 (Figure 5a) and one LB2 (Figure 5b). The horizontal axes correspond to runtime, while the vertical axes depict MPI rank numbers from 1 (lower) to 8 (upper). In each case, three Parareal iterations are performed. Green regions indicate the coarse and fine integrators carrying out work. Time spent in MPI receives (including waiting time) is shown in red. We observe how LB1 leads to load imbalance and incurs significant wait times in processes handling later TS. In contrast, the processes’ idle times (shown in red) in MPI receives are almost invisible in the case of LB2. Elimination of wait times leads to a significant reduction in runtime and increase in speedup, as will be shown in Section 4. (a) Vampir trace for LB1. The Parareal runtime is Rpa = 7.964 (s). (b) Vampir trace for LB2. The Parareal runtime is Rpa = 5.436 (s). Figure 5. Vampir traces for the implementation Pmo with (Npr , Nit ) = (8, 3) for two different load balancing strategies. 4. Results Speedup and runtime measurements were performed on the Cray XC40 supercomputer Piz Dora6 at the Swiss National Supercomputing Centre (CSCS) in Lugano, Switzerland. It features 1,256 compute nodes, which all hold two 12-core Intel Xeon E5-2690v3 processors. This results in a total of 30,144 compute cores and a peak performance of 1.254 PFlops; it occupies position 56 in the Top500 November, 2014 list.7 On Piz Dora, we used the GNU compiler collection8 version 4.9.2 and the runtimes we provide do not include the cost of I/O operations. Some simulations measuring convergence were performed on a machine located at the Università della Svizzera italiana that is maintained by members of the Institute of Computational Science of the Faculty of Informatics.9 For the results presented in the following we use a coarse grid resolution of (∆τ )co = (∆ρ)co = ∆co = L/2,048 ≈ 0.039 and a fine grid resolution of ∆fi = ∆co /8 ≈ 0.005. We have also determined a reference solution to approximately measure the serial fine stepper’s discretization error. For this we have used again the serial fine time stepper but with a step size of ∆re = ∆fi /4 ≈ 0.001. 4.1. Sub-critical. First we consider the sub-critical case, where no black holes form. Figure 6 shows for Npr = 256 and two different sets of initial data parameters the relative defect (4.1.1) D[i] = kr[i] − rfi k2 , krfi k2 5https://www.vampir.eu/ 6http://user.cscs.ch/computing systems/piz dora/ 7http://www.top500.org/list/2014/11 8https://gcc.gnu.org 9https://www.ics.usi.ch/index.php/ics-research/resources TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 9 which measures the difference between the Parareal solution r[i] after i iterations and the serial fine solution rfi as a function of the characteristic coordinate τ . In Figure 6a we use the initial data parameters (φ0 , ρ0 , δ0 ) = (0.035, 20, 1), which results in an “early” bounce of the wave packet at about τ = 20. For the simulations in Figure 6b, the values are (φ0 , ρ0 , δ0 ) = (0.01, 75, 1), which leads to a “late” bounce at about τ = 75. Defects are plotted for Nit ∈ {1, 2, 3, 4} along with the serial coarse and fine solution’s estimated discretization error krco − rre k2 /krfi k2 and krfi − rre k2 /krfi k2 labeled “Coarse” and “Fine”, respectively. We observe that in Figure 6a, the data for Nit = 3 is somewhat jagged because for LB2 there are various start and end times of TSs near the bounce region. In any case, Parareal converges in two iterations: for Nit = 2, the defect is below the discretization error for all τ . In fact, without the bounce region near τ = 20, only one iteration would be required for convergence. For the late bounce scenario in Figure 6b, we also observe that the rate of convergence at the final time τ = L − λ gives an indication of the convergence at all τ . In the following we thus focus on convergence at the final time. Convergence for the other evolved field Φ is not shown but was found to be at least as good as for r.10 10−2 10−6 10−9 Nit = 1 Nit = 2 Nit = 3 Nit = 4 Coarse Fine 10−12 10−15 0 20 40 60 80 Coordinate τ (a) Parareal’s defect over time for an early bounce scenario. Defect D[i] for Npr = 256 Defect D[i] for Npr = 256 10−3 Nit = 1 Nit = 2 Nit = 3 Nit = 4 Coarse Fine 10−5 10−8 10−11 10−14 0 20 40 60 80 Coordinate τ (b) Defect of Parareal over time for a late bounce situation. Figure 6. Defect in r between Parareal and the fine method over time for fixed Npr = 256. Figures 7a and 7b illustrate the defect of Parareal at the end of the simulation at τ = L − λ for various values of Npr with third-order interpolation (left) and fifth-order interpolation (right). For third-order interpolation, Parareal does not converge at all. The configuration stalls at a defect of about 10−2 until the iteration count equals Npr . There, Parareal converges by definition but cannot provide any speedup. In contrast, Parareal shows good convergence behavior for fifth-order interpolation. For Npr less than 64, the defect of Parareal falls below the approximate discretization error of the fine method after a single iteration. Otherwise, for Npr ≥ 64 up to Npr = 512, two iterations are required. The resulting speedups with correspondingly adjusted values for Nit are shown in Figure 7c for both load balancing strategies (see the discussion in Section 3.5). In addition, the projected speedup according to Equation (3.4.1) is shown. The fine-to-coarse ratio Rfi /Rco was determined experimentally and found to be about 74. Up to Npr = 64, for the advanced load balancing, speedup closely mirrors the theoretical curve while the basic load balancing performs significantly worse. For Npr ≥ 64, measured speedups fall short of the theoretical values, peak at Npr = 256, and then start to decrease. Note that the theoretical model (blue line in Figure 7c) does take into account the scaling limit from the serial correction step according to Amdahl’s law. The difference between theory and measured speedup is therefore due to other overheads (communication and transfer between meshes) as analysed below. 10Convergence seems to be unaffected by the load balancing. In tests not documented here we found that for LB1 it takes two iterations for Parareal to converge as well. 10 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION Although the load balancing strategy LB2 results in significantly better speedup than the basic approach LB1, the peak value provided by both schemes is essentially the same. This is because for increasingly large numbers of cores, the computational load per TS eventually becomes small and imbalances in computational load insignificant. Instead, runtime is dominated by overhead from, e.g., communication in time. The communication load is independent of the chosen load balancing and depends solely on the number of TSs; for every TS one message has to be sent and received once per iteration (save for the first and last TS). Therefore, it can be expected that ultimately both approaches to load balancing lead to comparable peak values. Below we demonstrate that the saturation in speedup is related to a significant increase in time spent in MPI routines; eventually, communication cost starts to dominate over the computational cost left on each time slice and the time parallelization saturates just as spatial parallelization does. Defect D[i] at τ = L − λ Defect D[i] at τ = L − λ 10−3 10−5 10−8 Npr = 2 Npr = 8 Npr = 32 Npr = 128 Npr = 512 Coarse Fine 10−11 10−14 1 8 10−6 10−9 10−12 Theory LB2 LB1 90 75 Speedup S Npr = 2 Npr = 8 Npr = 32 Npr = 128 Npr = 512 Coarse Fine 10−2 60 45 30 15 0 64 512 10−15 1 Iterations Nit (a) Defect for late bounce and interpolation order 3. 8 64 512 Iterations Nit (b) Defect for late bounce and interpolation order 5. 2 8 32 128 Cores Npr 512 (c) Parareal speedup for fifth-order interpolation. Figure 7. Parareal’s performance for the sub-critical case in terms of convergence for polynomial interpolation orders 3 and 5, and in terms of speedup. Figure 8 illustrates the reason behind the drop-off in speedup beyond Npr = 256. First, define X p p p (4.1.2) Rpa = Rco + Rfip + Rst , st p where Rst denotes runtime spent in stages that are different from coarse and fine integration on the TS assigned to process p. For now, we consider only overhead from sending and receiving data as well as from interpolation; other overheads are not further analyzed here. Next, we introduce the total overhead on a TS as the sum of all stage-runtimes or X p p (4.1.3) Oto = Rst , st which is also the runtime spent neither in the coarse nor fine integrator for a given p. The average overhead p is now defined as the geometric mean value of Oto over all TSs, which is PNpr p p=1 Oto . (4.1.4) Oav = Npr Finally, we define the relative overhead for individual stages on a TS as p Rst p , Rpa p where Rpa is the runtime of Parareal at processor p. Ideally, as is assumed for the derivation of the speedup p p p model given in Equation (3.4.1), Rco and Rfip are the dominant costs. In this case, Rco + Rfip ≈ Rpa so that p according to Equation (4.1.2) we have Oto ≈ 0 and therefore Oav ≈ 0 by definition. However, as can be seen in Figure 8a, Oav is small only for small values of Npr . For Npr ≥ 32 it increases rapidly, which indicates (4.1.5) p Ost = TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 11 that the overhead from communication and other sources starts to play a more dominant role when Npr is increased. Figure 8b shows the relative overhead from Equation (4.1.5) for Npr ∈ {32, 512} and p ∈ {1, ..., Npr } for the three different stages st ∈ {Interpolation, Send, Receive}; “Send” and “Receive” refer to the corresponding MPI routines. There is a significant increase in relative overhead in all three stages as the number of cores grows, causing the eventual drop-off in speedup for increasing Npr . 101 p Overhead Ost for Npr ∈ {32, 512} Overhead Oav 0.9 0.6 0.3 0 2 8 32 128 Cores Npr (a) Average overhead. 512 10−2 Receive, Npr = 512 Receive, Npr = 32 Interpolate, Npr = 512 Interpolate, Npr = 32 Send, Npr = 512 Send, Npr = 32 10−5 10−8 2 8 32 128 512 Core p (b) Overhead caused by three different Parareal stages. Figure 8. Overhead from communication and other sources increases with Npr , which leads to Parareal’s speedup decay. 4.2. Super-critical. We consider now the more complex case in which a black hole forms at some time during the simulation. The goal is to compute the black hole’s position via Equation (2.1.8) so that its mass can be determined from Equation (2.1.9) (see Section 2.3). Because the characteristic coordinates (τ, ρ) do not allow us to continue the simulation past the black hole formation event, we need a way to keep the simulation from terminating when Θ+ approaches 0 (see Figure 2b). To avoid the need to adaptively modify the decomposition of the time domain, we carry out the supercritical case study using initial data parameter values near (φ0 , ρ0 , δ0 ) = (0.01, 75, 1), which we have also used for the results in Figure 6b. With these parameters and in particular for φ0 ≥ 0.01, for all investigated partitions of the time axis with Npr ≤ 256, the black hole generated by the fine time integrator forms in the last TS unless φ0 becomes too large (ρ0 and δ0 are fix). Thus, Parareal can be used over all TSs except for the last one, where only the fine method is executed to compute the black hole’s position. The C++ implementation uses a try-throw-catch approach to prevent complete termination of the simulation; if the radicand in the definition of Θ+ in Equation (2.1.8) fails to be non-negative, an exception is thrown such that the Parareal iteration can continue. As the Parareal iteration converges and better and better starting values are provided for F on the last TS, the accuracy of the computed black hole position improves. A more general implementation aiming at production runs would need to allow for black hole formation in TSs before the last one but this is left for future work. In this article, the focus lies on investigating the principal applicability of Parareal to the simulation of gravitational collapse. Figure 9a depicts the Choptuik scaling that results from solutions computed with Parareal for Npr = 256 after the first three iterations. Table 1 lists the generated values of φ?0 and γ (see Section 2.3), and errors compared to the value provided by the fine integrator, which agrees with the result in [22]. As can be seen in Figure 9a, the coarse integrator C alone cannot adequately resolve black holes with φ0 − φ?0 . 10−9 (they are too small for C to be “visible”) and its γ is wrong by about 20%. This means that the coarse method is too “coarse” in the sense that, on its own, it cannot correctly capture the physics underlying the investigated problem. Nonetheless, Parareal is not only capable of generating the correct black hole physics but can do so after only one iteration. 12 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION Theory LB2 90 10−1 75 Mass M Speedup S 10−2 10−3 Coarse Nit = 1 Nit = 2 Nit = 3 Fine 10−4 60 45 30 15 0 2 10−12 10−10 10−8 10−6 10−4 8 Criticality φ0 − φ?0 (a) Choptuik scaling from Parareal. 32 128 Cores Npr 512 (b) Parareal speedup. Figure 9. Parareal’s performance for the super-critical case. φ?0 Value Coarse Nit = 1 Nit = 2 Nit = 3 Fine γ Error (%) Value Error (%) −1 0.458 0.377 0.370 0.381 0.381 20.21 1.05 2.89 0 0 0.01057748 7.25 · 10 0.01055915 5.51 · 10−1 0.01050240 1.01 · 10−2 0.01050135 9.52 · 10−5 0.01050134 0 Table 1. Approximate values and relative errors for the critical amplitude φ?0 and resulting straight line slope γ. Figure 9b visualizes the speedup achieved in the super-critical case including the theoretical estimate according to Equation (3.4.1). The numbers of iterations required for Parareal to converge are derived from an analysis just like the one plotted in Figure 7b for the sub-critical case and basically the values are identical. Up to 64 processes, good speedup close to the theoretical bound is observed. For larger core numbers however, speedup reaches a plateau and performance is no longer increasing. As in the sub-critical case, as Npr increases, the computing times per TS eventually become too small and Parareal’s runtime becomes dominated by, e.g., communication (see Figure 8). Even though the temporal parallelization eventually saturates, substantial acceleration of almost a factor of 30 using 128 cores in time is possible, corresponding to a parallel efficiency of about 23%. 5. Conclusion The article assesses the performance of the parallel-in-time integration method Parareal for the numerical simulation of gravitational collapse of a massless scalar field in spherical symmetry. It gives an overview of the dynamics and physics described by the corresponding Einstein field equations and presents the employed numerical methods to solve them. Because the system is formulated and solved in characteristic coordinates, the computational spacetime domain is triangular so that later time steps carry fewer spatial degrees-of-freedom. A strategy for balancing computational cost per subinterval instead of just number of steps is discussed and its benefits are demonstrated by traces using the Vampir tool. Numerical experiments are presented for both the sub- and super-critical case. Parareal converges rapidly for both and, for the latter, correctly reproduces Choptuik’s mass scaling law after only one iteration despite the fact that the used coarse integrator alone generates a strongly flawed mass scaling law. This underlines the capability of Parareal to quickly correct a coarse method that does not resolve the dynamics of the problem. The results TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 13 given here illustrate that Parareal and presumably other parallel-in-time methods as well can be used to improve utilization of parallel computers for numerical studies of black hole formation. Multiple directions for future research emerge from the presented results. Evaluating performance gains for computing the critical solution [8, 23] would be valuable. Next, complexer collapse scenarios such as in the Einstein-Yang-Mills system [9], axial symmetry [39], or binary black hole spacetimes [40] could be addressed. An extended implementation of Parareal could utilize a more sophisticated convergence criterion [3], a more flexible black hole detection, and parallelism in space via, e.g., again Parareal. The latter would be possible because the integration along the characteristic we took to represent space is for the solution of initial value problems just like in the temporal direction. Another topic of interest is that of adaptive mesh refinement [1]: how it can be used efficiently in connection with Parareal or other time parallel methods seems to be an open problem. As discussed in the introduction, a mathematical analysis of the convergence behavior of Parareal for Einstein’s equations would be of great interest as well, particularly since the good performance is unexpected in view of the negative theoretical results for basic hyperbolic problems. Finally, incorporating a parallel-in-time integration method into a software library widely used for black hole or other numerical relativity simulations would be the ideal way to make this new approach available to a large group of domain scientists.11 Acknowledgments We would like to thank Matthew Choptuik from the University of British Columbia in Vancouver, Canada and Jonathan Thornburg from the Indiana University in Bloomington (IN), United States of America for providing feedback and suggestions on an earlier version of the manuscript. We would also like to thank Jean-Guillaume Piccinali and Gilles Fourestey from the Swiss National Supercomputing Center (CSCS) in Lugano, Switzerland and Andrea Arteaga from the Swiss Federal Institute of Technology Zurich (ETHZ), Switzerland for discussions concerning the hardware at CSCS. This research is funded by the Deutsche Forschungsgemeinschaft (DFG) as part of the “ExaSolvers” project in the Priority Programme 1648 “Software for Exascale Computing” (SPPEXA) and by the Swiss National Science Foundation (SNSF) under the lead agency agreement as grant SNSF-145271. The research of A.K., D.R., and R.K. is also funded through the ”FUtuRe SwIss Electrical InfraStructure” (FURIES) project of the Swiss Competence Centers for Energy Research (SCCER) at the Commission for Technology and Innovation (CTI) in Switzerland. References [1] Private communication with Jonathan Thornburg from the Indiana University in Bloomington (IN), United States of America. [2] M. Alcubierre. Introduction to 3+1 Numerical Relativity, volume 140 of International Series of Monographs on Physics. Oxford University Press, Oxford, UK, 1st edition, Jun 2008. ISBN 9780199205677. [3] E. Aubanel. Scheduling of tasks in the parareal algorithm. Parallel Computing, 37(3):172–182, Mar 2011. DOI 10.1016/j.parco.2010.10.004. [4] T. W. Baumgarte and S. L. Shapiro. Numerical Relativity. Solving Einstein’s Equations on the Computer. Cambridge University Press, Cambridge, UK, 1st edition, Aug 2010. ISBN 9780521514071. [5] M. J. Berger and J. Oliger. Adaptive mesh refinement for hyperbolic partial differential equations. Journal of Computational Physics, 53(3):484–512, Mar 1984. DOI 10.1016/0021-9991(84)90073-1. URL http://www.sciencedirect.com/science/article/pii/0021999184900731. [6] J.-P. Berrut and L. N. Trefethen. Barycentric Lagrange Interpolation. SIAM Review, 46(3):501–517, Sep 2004. DOI 10.1137/S0036144502417715. [7] F. Chen, J. S. Hesthaven, and X. Zhu. On the Use of Reduced Basis Methods to Accelerate and Stabilize the Parareal Method. In A. Quarteroni and G. Rozza, editors, Reduced Order Methods for Modeling and Computational Reduction, volume 9 of MS&A - Modeling, Simulation and Applications, pages 187–214. Springer International Publishing, 2014. URL http://dx.doi.org/10.1007/978-3-319-02090-7_7. 11A copy of the library Lib4PrM for the Parareal method can be obtained by cloning the Git repository https://scm.tiedu.ch/repogit/lib4prm. 14 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION [8] M. W. Choptuik. Universality and scaling in gravitational collapse of a massless scalar field. Physical Review Letters, 70(1):9–12, Jan 1993. DOI 10.1103/PhysRevLett.70.9. [9] M. W. Choptuik, E. W. Hirschmann, and R. L. Marsa. New critical behavior in Einstein-Yang-Mills collapse. Physical Review D, 60(12):124011, Nov 1999. DOI 10.1103/PhysRevD.60.124011. URL http://arxiv.org/abs/gr-qc/9903081. [10] A. J. Christlieb, C. B. Macdonald, and B. W. Ong. Parallel high-order integrators. SIAM Journal on Scientific Computing, 32(2):818–835, 2010. URL http://dx.doi.org/10.1137/09075740X. [11] D. Christodoulou. Bounded variation solutions of the spherically symmetric Einstein-scalar field equations. Communications on Pure and Applied Mathematics, 46(8):1131–1220, 1993. DOI 10.1002/cpa.3160460803. [12] X. Dai and Y. Maday. Stable Parareal in Time Method for First- and Second-Order Hyperbolic Systems. SIAM Journal on Scientific Computing, 35(1):A52–A78, 2013. URL http://dx.doi.org/10.1137/110861002. [13] M. Emmett and M. L. Minion. Toward an Efficient Parallel in Time Method for Partial Differential Equations. Communications in Applied Mathematics and Computational Science, 7:105–132, 2012. URL http://dx.doi.org/10.2140/camcos.2012.7.105. [14] R. D. Falgout, S. Friedhoff, T. V. Kolev, S. P. MacLachlan, and J. B. Schroder. Parallel time integration with multigrid. SIAM Journal on Scientific Computing, 36:C635–C661, 2014. URL http://dx.doi.org/10.1137/130944230. [15] P. F. Fischer, F. Hecht, and Y. Maday. A parareal in time semi-implicit approximation of the Navier-Stokes equations. In R. Kornhuber and et al., editors, Domain Decomposition Methods in Science and Engineering, volume 40 of Lecture Notes in Computational Science and Engineering, pages 433–440, Berlin, 2005. Springer. URL http://dx.doi.org/10.1007/3-540-26825-1_44. [16] M. S. Floater and K. Hormann. Barycentric Rational Interpolation with no Poles and High Rates of Approximation. Numerische Mathematik, 107(2):315–331, Aug 2007. DOI 10.1007/s00211-007-0093-y. [17] M. J. Gander. Analysis of the Parareal Algorithm Applied to Hyperbolic Problems using Characteristics. Bol. Soc. Esp. Mat. Apl., 42:21–35, 2008. [18] M. J. Gander. Analysis of the Parareal algorithm applied to hyperbolic problems using charateristics. Boletı́n de la Sociedad Española de Matemática Aplicada, (42):21–35, Mar 2008. URL http://www.sema.org.es/ojs/index.php?journal=sema&page=article&op=view&path%5B%5D=19. [19] M. J. Gander. 50 years of Time Parallel Time Integration. In Multiple Shooting and Time Domain Decomposition. Springer, 2015. URL http://dx.doi.org/10.1007/978-3-319-23321-5_3. [20] M. J. Gander and M. Petcu. Analysis of a Krylov Subspace Enhanced Parareal Algorithm for Linear Problem. ESAIM: Proc., 25:114–129, 2008. URL http://dx.doi.org/10.1051/proc:082508. [21] M. J. Gander and S. Vandewalle. Analysis of the Parareal Time-Parallel Time-Integration Method. SIAM Journal on Scientific Computing, 29(2):556–578, 2007. URL http://dx.doi.org/10.1137/05064607X. [22] D. Garfinkle. Choptuik scaling in null coordinates. Physical Review D, 51(10):5558–5561, May 1994. DOI 10.1103/PhysRevD.51.5558. URL http://arxiv.org/abs/gr-qc/9412008. [23] C. Gundlach and J. M. Martı́n-Garcı́a. Critical phenomena in gravitational collapse. Living Reviews in Relativity, 10(5), Dec 2007. DOI 10.12942/lrr-2007-5. URL http://arxiv.org/abs/0711.4620. [24] W. Hackbusch. Parabolic multi-grid methods. Computing Methods in Applied Sciences and Engineering, VI, pages 189–197, 1984. URL http://dl.acm.org/citation.cfm?id=4673.4714. [25] G. Horton. The time-parallel multigrid method. Communications in Applied Numerical Methods, 8 (9):585–595, 1992. URL http://dx.doi.org/10.1002/cnm.1630080906. [26] G. Horton, S. Vandewalle, and P. Worley. An Algorithm with Polylog Parallel Complexity for Solving Parabolic Partial Differential Equations. SIAM Journal on Scientific Computing, 16(3):531–541, 1995. URL http://dx.doi.org/10.1137/0916034. [27] V. Husain. Critical Behavior in Quantum Gravitational Collapse. Advanced Science Letters, 2(2): 214–220(7), Jun 2009. DOI 10.1166/asl.2009.1028. URL http://arxiv.org/abs/0808.0949. TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION 15 [28] L. E. Kidder, M. A. Scheel, S. A. Teukolsky, E. D. Carlson, and G. B. Cook. Black hole evolution by spectral methods. Physical Review D, 62(8):084032, Sep 2000. DOI 10.1103/PhysRevD.62.084032. URL http://arxiv.org/abs/gr-qc/0005056. [29] E. Komatsu, J. Dunkley, M. R. Nolta, C. L. Bennett, B. Gold, G. Hinshaw, N. Jarosik, D. Larson, M. Limon, L. Page, D. N. Spergel, M. Halpern, R. S. Hill, A. Kogut, S. S. Meyer, G. S. Tucker, J. L. Weiland, E. Wollack, and E. L. Wright. Five-Year Wilkinson Microwave Anisotropy Probe Observations: Cosmological Interpretation. The Astrophysical Journal Supplement Series, 180(2):330, Feb 2009. DOI 10.1088/0067-0049/180/2/330. URL http://arxiv.org/abs/0803.0547. [30] A. Kreienbuehl. Quantum Cosmology, Polymer Matter, and Modified Collapse. PhD thesis, University of New Brunswick, Fredericton Campus, Department of Mathematics and Statistics, Aug 2011. [31] A. Kreienbuehl, V. Husain, and S. S. Seahra. Modified general relativity as a model for quantum gravitational collapse. Classical and Quantum Gravity, 29(9):095008, May 2012. DOI 10.1088/0264-9381/29/9/095008. URL http://arxiv.org/abs/1011.2381. [32] A. Kreienbuehl, A. Naegel, D. Ruprecht, R. Speck, G. Wittum, and R. Krause. Numerical simulation of skin transport using Parareal. Computing and Visualization in Science, 17:99 – 108, 2015. URL http://dx.doi.org/10.1007/s00791-015-0246-y. [33] J.-L. Lions, Y. Maday, and G. Turinici. A ”parareal” in time discretization of PDE’s. Comptes Rendus de l’Acadmie des Sciences - Series I - Mathematics, 332:661–668, 2001. URL http://dx.doi.org/10.1016/S0764-4442(00)01793-6. [34] F. Loeffler, J. Faber, E. Bentivegna, T. Bode, P. Diener, R. Haas, I. Hinder, B. C. Mundim, C. D. Ott, E. Schnetter, G. Allen, M. Campanelli, and P. Laguna. The Einstein Toolkit: a community computational infrastructure for relativistic astrophysics. Classical and Quantum Gravity, 29(11): 115001, May 2012. DOI 10.1088/0264-9381/29/11/115001. URL http://arxiv.org/abs/1111.3344. [35] M. L. Minion. A Hybrid Parareal Spectral Deferred Corrections Method. Communications in Applied Mathematics and Computational Science, 5(2):265–301, 2010. URL http://dx.doi.org/10.2140/camcos.2010.5.265. [36] A. S. Nielsen and J. S. Hesthaven. Fault tolerance in the parareal method. In Proceedings of the ACM Workshop on Fault-Tolerance for HPC at Extreme Scale, FTXS ’16, pages 1–8, New York, NY, USA, 2016. ACM. ISBN 978-1-4503-4349-7. DOI 10.1145/2909428.2909431. URL http://dx.doi.org/10.1145/2909428.2909431. [37] J. Nievergelt. Parallel methods for integrating ordinary differential equations. Commun. ACM, 7(12): 731–733, 1964. URL http://dx.doi.org/10.1145/355588.365137. [38] E. Poisson. A Relativist’s Toolkit. The Mathematics of Black-Hole Mechanics. Cambridge University Press, Cambridge, UK, 2004. [39] F. Pretorius. Numerical Simulations of Gravitational Collapse. PhD thesis, The University of British Columbia, 2002. [40] F. Pretorius. Evolution of Binary Black-Hole Spacetimes. Physical Review Letters, 95(12):121101, Sep 2005. DOI 10.1103/PhysRevLett.95.121101. URL http://arxiv.org/abs/gr-qc/0507014. [41] F. Pretorius and L. Lehner. Adaptive mesh refinement for characteristic codes. Journal of Computational Physics, 198(1):10–34, 2004. DOI 10.1016/j.jcp.2004.01.001. URL http://arxiv.org/abs/gr-qc/0302003. [42] D. Ruprecht and R. Krause. Explicit parallel-in-time integration of a linear acoustic-advection system. Computers & Fluids, 59(0):72–83, 2012. URL http://dx.doi.org/10.1016/j.compfluid.2012.02.015. [43] R. Speck and D. Ruprecht. Toward fault-tolerant parallel-in-time integration with {PFASST}. Parallel Computing, pages –, 2016. DOI 10.1016/j.parco.2016.12.001. URL http://dx.doi.org/10.1016/j.parco.2016.12.001. [44] R. Speck, D. Ruprecht, R. Krause, M. Emmett, M. L. Minion, M. Winkel, and P. Gibbon. A massively space-time parallel N-body solver. In Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis, SC ’12, pages 92:1–92:11, Los Alamitos, CA, USA, 2012. IEEE Computer Society Press. URL http://dx.doi.org/10.1109/SC.2012.6. 16 TIME PARALLEL GRAVITATIONAL COLLAPSE SIMULATION [45] J. Thornburg. Adaptive mesh refinement for characteristic grids. General Relativity and Gravitation, 43(5):1211–1251, May 2011. DOI 10.1007/s10714-010-1096-z. URL http://arxiv.org/abs/0909.0036. [46] J. Ziprick and G. Kunstatter. Dynamical singularity resolution in spherically symmetric black hole formation. Physical Review D, 80(2):024032, Jul 2009. DOI 10.1103/PhysRevD.80.024032. URL http://arxiv.org/abs/0902.3224.
5cs.CE
Toward Depth Estimation Using Mask-Based Lensless Cameras M. Salman Asif arXiv:1711.03527v1 [cs.CV] 9 Nov 2017 Department of Electrical and Computer Engineering University of California, Riverside Email: [email protected] Abstract—Recently, coded masks have been used to demonstrate a thin form-factor lensless camera, FlatCam, in which a mask is placed immediately on top of a bare image sensor. In this paper, we present an imaging model and algorithm to jointly estimate depth and intensity information in the scene from a single or multiple FlatCams. We use a light field representation to model the mapping of 3D scene onto the sensor in which light rays from different depths yield different modulation patterns. We present a greedy depth pursuit algorithm to search the 3D volume and estimate the depth and intensity of each pixel within the camera field-of-view. We present simulation results to analyze the performance of our proposed model and algorithm with different FlatCam settings. I. I NTRODUCTION Lens-based cameras are standard vision sensors in system that records visual information. However, lens-based cameras are bulky, heavy, and rigid—partly because of the size and material of a lens. The shape of a lens-based camera is also fixed in a cube-like form because of the physical constraints on placing the lens at a certain distance from the sensor. A lensless camera can potentially be very thin and lightweight, can operate over a large spectral range, can provide an extremely wide field of view, and can have curved or flexible shape. Recently, a new lensless imaging system, called FlatCam, was proposed in [1]. FlatCam consists of a coded binary mask placed at a small distance from a bare sensor. FlatCam can be viewed as an example of a coded aperture system in which the mask was placed extremely close to the sensor [2]. The mask pattern was selected in a way that the image formation model takes a linear separable form. Image reconstruction from the sensor measurements requires solving a linear inverse problem. One limitation of the imaging model in [1] is that it assumes a 2D scene that consists of a single plane at a fixed distance from the camera. In this paper, we present a new imaging model for FlatCam in which the scene consists of multiple planes at different (unknown) depths. We use a light field representation in which light rays from different depths yield different modulation patterns. We use the lightfield representation to analyze the sensitivity of FlatCam to the sampling pattern and depth mismatch. We present a greedy algorithm that jointly estimates the depths and intensity of each pixel. We present simulation results to demonstrate the performance of our algorithm under different settings. Fig. 1: 3D imaging with a mask-based lensless camera that consists of a bare sensor with a fixed, binary mask on top of it. Every light source from within the camera field-of-view casts a shadow of the mask on sensor, resulting in a multiplexed image on the sensor. The shadow of any light source depends on its 3D location with respect to the mask-sensor assembly. A depth-selective pursuit algorithm reconstructs the 3D image of the scene. II. BACKGROUND AND RELATED WORK A pinhole camera is a classical example of a lensless camera in which an opaque mask with a single pinhole is placed in front of a light-sensitive surface. A pinhole camera can potentially take an arbitrary shape. However, a major drawback of a pinhole camera is that it only allows a tiny fraction of the ambient light to pass through the single pinhole; therefore, it typically requires very long exposure times. Coded aperture imaging systems extend the idea of a pinhole camera by using a mask with multiple pinholes [3], [2], [4], [5], [6], [7]. However, the image formed on the sensor is a linear superposition of images from multiple pinholes. We need to solve an inverse problem to recover the underlying scene image from sensor measurements. The primary purpose of the coded aperture is to increase the amount of light recorded at the sensor. A coded aperture system offers another advantage by virtue of encoding light from different directions and depths differently. Note that a bare sensor can provide the intensity of a light source but not its spatial location. A mask in front of the sensor encodes directional information of the source in the sensor measurements. In a coded aperture system, every light source in the scene casts a unique shadow of the mask onto the sensor. Therefore, sensor measurements encode information about locations and intensities of all the light sources in the scene. Consider a single light source with a dark background; the image formed on the sensor will be a shadow of the mask. If we change the angle of the light source, the mask shadow on the sensor will shift. Furthermore, if we change the depth of the light source, the size of the shadow will change (see Figure 2). Thus, we can represent the relationship between (a) (c) Pinhole mask Sensor Coded mask Sensor (b) (d) Pinhole mask Sensor Coded mask Sensor Fig. 2: Examples of imaging with pinhole and coded mask-based cameras. Light rays from all direction hit the mask; rays can only pass through transparent regions (holes). (a,b) Pinhole cameras preserve angular information but lose depth information as points along the same angle yield identical images, irrespective of their depths. (c,d) Coded aperture-based cameras record coded combination of light from different directions and better preserve depth information. all the points in the scene and the sensor measurements as a linear system, which depends on the pattern and the placement of the mask. We can solve this system using an appropriate computational algorithm to recover the image of the scene. The depth-dependent imaging capability in coded aperture systems is known since the pioneering work in this domain [8], [2]. The following excerpt in [2] summarizes it well: ”One can reconstruct a particular depth in the object by treating the picture as if it was formed by an aperture scaled to the size of the shadow produced by the depth under consideration.” However, the classical methods assume that the scene consists of a single plane at known depth. In this paper, we assume that the depth scene consists of multiple depth planes and the true depth map is unknown at the time of reconstruction. Coded-aperture cameras have traditionally been used for imaging wavelengths beyond the visible spectrum (e.g., Xray and gamma-ray imaging), for which lenses or mirrors are expensive or infeasible [3], [2], [4], [5], [6], [7]. Maskbased lensless designs have been proposed for flexible field-ofview selection in [9], compressive single-pixel imaging using a transmissive LCD panel [10], and separable coded masks [11]. In recent years, coded masks and light modulators have been added to lens-based cameras in different configurations to build novel imaging devices that can capture image and depth [12] or 4D light field [13], [14] from a single coded image. Light field imaging by moving a lensless cameras has been demonstrated in [15] and 3D imaging with a single-shot diffuser-based lensless camera was recently demonstrated in [16]. III. F LAT C AM : R EPLACING LENSES WITH CODED MASKS AND COMPUTATIONS FlatCam is a coded aperture system that consists of a bare, planar sensor and a binary mask [1]. Coded-aperture cameras have traditionally been used for imaging wavelengths beyond the visible spectrum (e.g., X-ray and gamma-ray imaging), for which lenses or mirrors are expensive or infeasible [3], [2], [6]. A bare sensor can provide information about the intensity of a light source but not its spatial location. By adding a mask in front of the sensor, we can encode directional information of the source in the sensor measurements. The imaging model in [1] assumes that the scene consists of a single plane parallel to mask-sensor planes. Let us consider a 1D imaging system, shown in Fig. 3a, in which a 1D mask is placed at a distance d in front of a 1D sensor array with M pixels, and the scene consists of a single plane at distance D from the sensor with N scene pixels. Let us denote a scene pixel as l(θ), where θ is uniformly distributed along an angular interval [θ− , θ+ ]. We can represent the measurement at sensor pixel s as I(s) = θ+ X ϕ(s, θ)l(θ), (1) θ=θ− where ϕ(θ, s) denotes the modulation coefficient of the mask for a light ray between scene pixel l(θ) and the sensor pixel at location s. We can write (1) in a compact form as I = Φl, (2) where Φ denotes an M × N system matrix that maps N scene pixels to M sensor pixels. This is a linear system that we can solve using an appropriate computational algorithm to recover the image of the scene (more details can be found in [1]). IV. D EPTH ESTIMATION USING F LAT C AMS A. Imaging model The model in (1) assumes a 2D scene that consists of a single plane at some fixed depth. The system matrix Φ encodes mapping of scene points from that plane to the sensor pixels. In our new model, we consider a 3D scene that consists of multiple planes, each of which contribute to the sensor measurements. Without loss of generality, we consider a 1D imaging system in Fig. 3a and assume that the sensor plane is centered at the origin and the mask plane is placed in front of it at distance d. The scene consists of K planes at depths [D1 , . . . , DK ] and the scene pixels are distributed uniformly along angles in interval [θ− , θ+ ], as before. We can describe the measurement at sensor pixel s as I(s) = θ+ DK X X ϕ(s, θ, D)l(θ, D), (3) D=D1 θ=θ− where ϕ(s, θ, D) denotes modulation coefficient of the mask for a light ray between light source l(θ, D) and the sensor pixel at location s. We can write (3) in a compact form as I= DK X ΦD lD , (4) D=D1 where each lD denotes intensity of N pixels in a plane at depth D and ΦD is an M × N matrix that represents the mapping of lD onto the sensor. For the case of 3D imaging, let us represent the light distribution as L(θx , θy , z) for z > d. Measurements for a sensor pixel located at (su , sv ) can then be described using (a) Imaging system geometry. Mask and sensor planes are separated by distance d. Each point in the scene (at any angle θ and distance D) contributes to the sensor measurements. Our goal is to jointly estimate depth and intensity of each pixel within the field-of-view. (b) Lightfield representation of the system. Angle and depth of a scene point encode intercept and depth of the respective line in lightfield. Horizontal lines denote mask patten. Lightfield is first modulated by the mask pattern and then integrated at the sensor plane. Fig. 3: Geometry of the imaging system in 1D and the corresponding light field representation. the following system of linear equations: I(su , sv ) = X L(θx , θy , z)× θx ,θy ,z  mask 1− d z     d su + d sin θx , 1 − sv + d sin θy , z (5) where mask[u, v] denotes the transparency value of the mask at location (u, v) within the mask plane. If the mask pattern is symmetric and separable in (θx , θy ) space, then we can write the 2D measurements in (5) as I= DK X ΦD LD ΦTD , (6) D=D1 where ΦD is an M × N matrix and LD denotes N × N light distribution corresponding to plane at depth D. Furthermore, we can include multiple cameras at different locations and orientations with respect to a reference frame. Such a system will provide us multiple sensor measurements of the form DK X Ic = ΦD,c LD ΦTD,c , (7) D=D1 where Ic denotes sensor measurements at camera c and ΦD,c is matrix that represents mapping of LD onto camera c. B. Joint image and depth reconstruction We estimate the depth and intensity of each pixel within the field-of-view of our cameras using a greedy depth-selective algorithm, in which we assume a sparse prior that L(θx , θy , D) has nonzero value only for one depth. Our proposed algorithm is inspired by structured sparse recovery algorithms in modelbased compressive sensing [17]. To simplify the presentation, let us represent (6) or (7) as the following general linear system: I = A(L), (8) where L is an N × N × K light distribution with N × N spatial resolution and K depth planes, A denotes the linear measurement operator in (6) or (7), and I denotes the sensor measurements. Suppose our current estimate of L is L̃ with exactly one depth assigned to each pixel. Let us denote the initial depth map as Ω. In our experiments, we initialize the depth estimate with the farthest plane in the scene. Our proposed depthselective pursuit algorithm is an iterative method that performs the following three main steps at every iteration: Compute proxy depth estimate. We first select new candidate depth for each pixel by picking the maximum magnitude in the following proxy map corresponding to each pixel: P = AT [I − A(L̃)]. Let us denote the new depth map as Ω̃. Merge depths and estimate image. We first merge the original depth estimate with the proxy depth estimate. Let us denote the merged depth support as T = {Ω ∪ Ω̃}. Then we solve a least-squares problem over the merged depth support as L̂ = arg minL kIT − AT Lk22 . Prune depth and threshold image. We prune the depth estimate at every spatial location by picking the depth corresponding to higher pixel intensity in L̂. Finally, we threshold L̂ to L̃ that has only one nonzero depth per spatial location. C. Depth sampling and sensitivity For a single camera, sensor measurements for a single point source at location (θ, D) can be described as    d s + d sin θ . (9) I(s) ∝ mask 1 − D From this lightfield expression we note that the slope of a line corresponding to any light source is inversely proportional to its depth. As a light source moves farther from the mask-sensor assembly, its line would rotate around the center. As a light source moves along a plane at a fixed depth, its line would shift with the same slope. Therefore, in our imaging model, we select depth planes in a given range by sampling lightfield at uniform angles, which results in planes at non-uniform depths. V. E XPERIMENTAL RESULTS To validate the performance of our proposed imaging model and reconstruction algorithm, we performed extensive simulations under different settings of FlatCam parameters. First, we show results of a simple simulation in which our scene consists of three depth planes as shown in Fig. 4. We simulated an imaging system in which a binary mask is placed at 1mm distance from the sensor. We simulated a 3D voxel space with ten depth planes within a depth range of 100mm and 3m. We chose the ten depth planes by uniformly sampling the lightfield representation. We simulated a scene with 128 × 128 spatial resolution, a mask with a binary random sequence, and a sensor with 256 × 256 pixels. To generate sensor measurements, we assumed that the 3D scene consists of three planes chosen at random out of ten fixed planes. We added a small amount of Gaussian noise Number of imaging depth planes (K) 5 10 15 20 25 Single camera 33.83 33.58 31.27 30.5 30.99 Three cameras 39.07 39.09 40 39.54 39.58 TABLE I: PSNR (in dB) comparison of reconstructed images for different number of depth planes and different number of cameras. (a) Test scene with three cards placed at three different depths picked out of K = 10 depth planes at random. (b) Image reconstructed by assuming that the scene consists of a single plane at a fixed depth. PSNR = 15 dB number of tilted planes. The simulation results of three camera system are also summarized in Table I. An example of image reconstruction for this case is shown in Fig. 4(d). R EFERENCES (c) Image reconstructed using depth-selective algorithm that jointly estimates the depth and intensity of each pixel. PSNR = 33.5 dB (d) Image reconstructed with three cameras via depth-selective algorithm that jointly estimates the depth and intensity of each pixel. PSNR = 39 dB Fig. 4: Simulation results to demonstrate the effect of depth sensitivity and a result for our joint depth and intensity reconstruction algorithm. in the true measurements. To reconstruct the 3D scene, we solved the depth-selective pursuit algorithm described in the previous section. The results are presented in Fig. 4, where (a) denotes pixel intensities for three planes in a 3D scene, (b) denotes image reconstructed by assuming that all pixels belong to a plane at fixed depth, and (c) denotes images reconstructed by solving the depth-pursuit algorithm on the same measurements. Next we discuss an experiment that demonstrates the robustness of our proposed model and method against mismatch in the locations of the original depth planes and those used for reconstruction. In this experiment, we simulated imaging system with K = {5, 10, 15, 20, 25} depth planes chosen uniformly in the lightfield representation. We selected the three depth planes for the scene at random and calculated the peak signal to noise ratio (PSNR) for the recovered images. We present PSNR for each test (averaged over ten instances) in Table I. We see that the quality of reconstruction remains almost the same as we increase the number of depth planes in our model. The computational complexity, however, slightly increases as we increase the number of depth planes. Finally, we present an experiment in which we simulated a system with three lensless cameras in a convex geometry, where one camera is used as a reference to generate depth planes in the scene. The other two cameras see tilted planes in their field of view. An advantage of such a configuration is that the depth information of the pixels is converted into angular information. However, this configuration also makes a strong assumption that the scene only consists of the finite [1] M. S. Asif, A. Ayremlou, A. Sankaranarayanan, A. Veerarghavan, and R. Baraniuk, “Flatcam: Thin, bare-sensor cameras using coded aperture and computation,” IEEE Transactions on Computational Imaging, vol. 3, no. 3, pp. 384–397, Sept 2017. 1, 2 [2] E. Fenimore and T. Cannon, “Coded aperture imaging with uniformly redundant arrays,” Applied optics, vol. 17, no. 3, pp. 337–347, 1978. 1, 2 [3] R. Dicke, “Scatter-hole cameras for x-rays and gamma rays,” The Astrophysical Journal, vol. 153, p. L101, 1968. 1, 2 [4] T. Cannon and E. Fenimore, “Coded aperture imaging: Many holes make light work,” Optical Engineering, vol. 19, no. 3, pp. 193–283, 1980. 1, 2 [5] P. Durrant, M. Dallimore, I. Jupp, and D. Ramsden, “The application of pinhole and coded aperture imaging in the nuclear environment,” Nuclear Instruments and Methods in Physics Research Section A: Accelerators, Spectrometers, Detectors and Associated Equipment, vol. 422, no. 1, pp. 667–671, 1999. 1, 2 [6] D. J. Brady, Optical imaging and spectroscopy. John Wiley & Sons, 2009. 1, 2 [7] A. Busboom, H. Elders-Boll, and H. Schotten, “Uniformly redundant arrays,” Experimental Astronomy, vol. 8, no. 2, pp. 97–123, 1998. 1, 2 [8] H. H. Barrett and F. A. Horrigan, “Fresnel zone plate imaging of gamma rays; theory,” Appl. Opt., vol. 12, no. 11, pp. 2686–2702, Nov 1973. [Online]. Available: http://ao.osa.org/abstract.cfm?URI=ao-12-11-2686 2 [9] A. Zomet and S. K. Nayar, “Lensless imaging with a controllable aperture,” in IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, 2006, pp. 339–346. 2 [10] G. Huang, H. Jiang, K. Matthews, and P. Wilford, “Lensless imaging by compressive sensing,” in 20th IEEE International Conference on Image Processing, 2013, pp. 2101–2105. 2 [11] M. J. DeWeert and B. P. Farm, “Lensless coded-aperture imaging with separable doubly-Toeplitz masks,” Optical Engineering, vol. 54, no. 2, pp. 023 102–023 102, 2015. 2 [12] A. Levin, R. Fergus, F. Durand, and W. T. Freeman, “Image and depth from a conventional camera with a coded aperture,” in ACM Transactions on Graphics (TOG), vol. 26, no. 3. ACM, 2007, p. 70. 2 [13] A. Veeraraghavan, R. Raskar, A. Agrawal, A. Mohan, and J. Tumblin, “Dappled photography: Mask enhanced cameras for heterodyned light fields and coded aperture refocusing,” ACM Transactions on Graphics (TOG), vol. 26, no. 3, p. 69, 2007. 2 [14] K. Marwah, G. Wetzstein, Y. Bando, and R. Raskar, “Compressive light field photography using overcomplete dictionaries and optimized projections,” ACM Transactions on Graphics (TOG), vol. 32, no. 4, p. 46, 2013. 2 [15] C. Zhang and T. Chen, “Light field capturing with lensless cameras,” in IEEE International Conference on Image Processing (ICIP), vol. 3. IEEE, 2005, pp. III–792. 2 [16] N. Antipa, G. Kuo, R. Heckel, B. Mildenhall, E. Bostan, R. Ng, and L. Waller, “Diffusercam: Lensless single-exposure 3d imaging,” arXiv preprint arXiv:1710.02134, 2017. 2 [17] R. G. Baraniuk, V. Cevher, M. F. Duarte, and C. Hegde, “Modelbased compressive sensing,” IEEE Transactions on Information Theory, vol. 56, no. 4, pp. 1982–2001, 2010. 3
1cs.CV
M ODULAR C ONTINUAL L EARNING IN A U NIFIED V ISUAL E NVIRONMENT Blue Sheffer Department of Psychology Stanford University Stanford, CA 94305 [email protected] arXiv:1711.07425v2 [cs.LG] 12 Dec 2017 Kevin T. Feigelis Department of Physics Stanford Neurosciences Institute Stanford University Stanford, CA 94305 [email protected] Daniel L. K. Yamins Departments of Psychology and Computer Science Stanford Neurosciences Institute Stanford University Stanford, CA 94305 [email protected] A BSTRACT A core aspect of human intelligence is the ability to learn new tasks quickly and switch between them flexibly. Here, we describe a modular continual reinforcement learning paradigm inspired by these abilities. We first introduce a visual interaction environment that allows many types of tasks to be unified in a single framework. We then describe a reward map prediction scheme that learns new tasks robustly in the very large state and action spaces required by such an environment. We investigate how properties of module architecture influence efficiency of task learning, showing that a module motif incorporating specific design principles (e.g. early bottlenecks, low-order polynomial nonlinearities, and symmetry) significantly outperforms more standard neural network motifs, needing fewer training examples and fewer neurons to achieve high levels of performance. Finally, we present a meta-controller architecture for task switching based on a dynamic neural voting scheme, which allows new modules to use information learned from previouslyseen tasks to substantially improve their own learning efficiency. I NTRODUCTION In the course of everyday functioning, people are constantly faced with real-world environments in which they are required to shift unpredictably between multiple, sometimes unfamiliar, tasks (Botvinick & Cohen, 2014). They are nonetheless able to flexibly adapt existing decision schemas or build new ones in response to these challenges (Arbib, 1992). How humans support such flexible learning and task switching is largely unknown, both neuroscientifically and algorithmically (Wagner et al., 1998; Cole et al., 2013). We investigate solving this problem with a neural module approach in which simple, task-specialized decision modules are dynamically allocated on top of a largely-fixed underlying sensory system (Andreas et al., 2015; Hu et al., 2017). The sensory system computes a general-purpose visual representation from which the decision modules read. While this sensory backbone can be large, complex, and learned comparatively slowly with significant amounts of training data, the task modules that deploy information from the base representation must, in contrast, be lightweight, quick to be learned, and easy to switch between. In the case of visually-driven tasks, results from neuroscience and computer vision suggest the role of the fixed general purpose visual representation may be played by the ventral visual stream, modeled as a deep convolutional neural network (Yamins & DiCarlo, 2016; Razavian et al., 2014). However, the algorithmic basis for how to efficiently learn and dynamically deploy visual decision modules remains far from obvious. 1 controller agent ReMaP module A fixed visual backbone xt W H rt TouchStream environment W H policy at Figure 1: Modular continual learning in the TouchStream environment The TouchStream environment is a touchscreen-like GUI for continual learning agents, in which a spectrum of visual reasoning tasks can be posed in a large but unified action space. On each timestep, the environment (cyan box) emits a visual image (xt ) and a reward (rt ). The agent recieves xt and rt as input and emits an action at . The action represents a “touch” at some location on a two-dimensional screen e.g. at ∈ {0, . . . , H − 1} × {0, . . . , W − 1}, where H and W are the screen height and width. The environment’s policy is a program computing xt and rt as a function of the agent’s action history. The agent’s goal is to learn how to choose optimal actions to maximize the amount of reward it recieves over time. The agent consists of several component neural networks including a fixed visual backbone (yellow inset), a set of learned neural modules (grey inset), and a meta-controller (red inset) which mediates the deployment of these learned modules for task solving. The modules use the ReMaP algorithm § 2 to learn how to estimate reward as a function of action (heatmap), conditional on the agent’s recent history. Using a sampling policy on this reward map, the agent chooses an optimal action to maximize its aggregate reward. In standard supervised learning, it is often assumed that the output space of a problem is prespecified in a manner that just happens to fit the task at hand – e.g. for a classification task, a discrete output with a fixed number of classes might be determined ahead of time, while for a continuous estimation problem, a one-dimensional real-valued target might be chosen instead. This is a very convenient simplification in supervised learning or single-task reinforcement learning contexts, but if one is interested in the learning and deployment of decision structures in a rich environment defining tasks with many different natural output types, this simplification becomes cumbersome. To go beyond this limitation, we build a unified environment in which many different tasks are naturally embodied. Specifically, we model an agent interacting with a two-dimensional touchscreenlike GUI that we call the TouchStream, in which all tasks (discrete categorization tasks, continuous estimation problems, and many other combinations and variants thereof) can be encoded using a single common and intuitive – albeit large – output space. This choice frees us from having to hand-design or programmatically choose between different output domain spaces, but forces us to confront the core challenge of how a naive agent can quickly and emergently learn the implicit “interfaces” required to solve different tasks. We then introduce Reward Map Prediction (ReMaP) networks, an algorithm for continual reinforcement learning that is able to discover implicit task-specific interfaces in large action spaces like those of the TouchStream environment. We address two major algorithmic challenges associated with learning ReMaP modules. First, what module architectural motifs allow for efficient task interface learning? We compare several candidate architectures and show that those incorporating certain intuitive design principles (e.g. early visual bottlenecks, low-order polynomial nonlinearities and symmetry-inducing concatenations) significantly outperform more standard neural network motifs, needing fewer training examples and fewer neurons to achieve high levels of performance. Second, what system architectures are effective for switching between tasks? We present a meta-controller architecture based on a dynamic neural voting scheme, allowing new modules to use information learned from previously-seen tasks to substantially improve their own learning efficiency. In § 1 we formalize the TouchStream environment. In § 2, we introduce the ReMaP algorithm. In § 3, we describe and evaluate comparative performance of multiple ReMaP module architectures on a variety of TouchStream tasks. In § 4, we describe the Dynamic Neural Voting meta-controller, and evaluate its ability to efficiently transfer knowledge between ReMaP modules on task switches. 2 a stimulus-response b c match-to-sample MS-COCO MTS d localization image: or sample then match sample then match then reward map: Figure 2: Exemplar TouchStream tasks. Illustration of several task paradigms explored in this work using the TouchStream Environment. The top row depicts observation xt and the bottom shows the ground truth reward maps (with red indicating high reward and blue indicating low reward). a. Binary Stimulus-Response task. b. stereotyped Match-To-Sample task. c. The Match-To-Sample task using the MS-COCO dataset. d. Object localization. R ELATED W ORK Modern deep convolutional neural networks have had significant impact on computer vision and artificial intelligence (Krizhevsky et al., 2012), as well as in the computational neuroscience of vision (Yamins & DiCarlo (2016)). There is a recent but growing literature on convnet-based neural modules, where they have been used for solving compositional visual reasoning tasks (Andreas et al., 2015; Hu et al., 2017). In this work we apply the idea of modules to solving visual learning challenges in a continual learning context. Existing works rely on choosing between a menu of pre-specified module primitives, using different module types to solve subproblems involving specific input-output datatypes, without addressing how these modules’ forms are to be discovered in the first place. In this paper, we show a single generic module architecture is capable of automatically learning to solve a wide variety of different tasks in a unified action/state space, and a simple controller scheme is able to switch between such modules. Our results are also closely connected with the literature on lifelong (or continual) learning (Kirkpatrick et al., 2016; Rusu et al., 2016). A part of this literature is concerned with learning to solve new tasks without catastrophically forgetting how to solve old ones (Zenke et al., 2017; Kirkpatrick et al., 2016). The use of modules obviates this problem, but instead shifts the hard question to one of how newly-allocated modules can be learned effectively. The continual learning literature also directly addresses knowlege transfer to newly allocated structures (Chen et al., 2015; Rusu et al., 2016; Fernando et al., 2017), but largely addresses how transfer learning can lead to higher performance, rather than addressing how it can improve learning speed. Aside from reward performance, we focus on issues of speed in learning and task switching, motivated by the remarkably efficient adaptability of humans in new task contexts. Existing work in continual learning also largely does not address which specific architecture types learn tasks efficiently, independent of transfer. By focusing first on identifying architectures that achieve high performance quickly on individual tasks (§ 3), our transfer-learning investigation then naturally focuses more on how to efficiently identify when and how to re-use components of these architectures (§ 4). Most of these works also make explicit a priori assumptions about the structure of the tasks to be encoded into the models (e.g. output type, number of classes), rather than address the more general question of emergence of solutions in an embodied case, as we do. Meta-reinforcement learning approaches such as Wang et al. (2016); Duan et al. (2016), as well as the schema learning ideas of e.g. Arbib (1992); McClelland (2013) typically seek to address the issue of continual learning by having a complex meta-learner extract correlations between tasks over a long timescale. In our context most of the burden of environment learning is placed on the individual modules, so our meta-controller can thus be comparatively light-weight compared to typical meta-reinforcement approaches. Unlike our case, meta-learning has mostly been limited to small state or action spaces. Some recent work in general reinforcement learning (e.g. Ostrovski et al. (2017); Dulac-Arnold et al. (2015)) has addressed the issue of large action spaces, but has not sought to address multitask transfer learning in these large action spaces. 1 T HE T OUCH S TREAM E NVIRONMENT Agents in a real-world environment are exposed to many different implicit tasks, arising without predefined decision structures, and must learn on the fly what the appropriate decision interfaces are 3 for each situation. Because we are interested in modeling how agents can do this on-the-fly learning, our task environment should mimic the unconstrained nature of the real world. Here, we describe the TouchStream environment, which attempts to do this in a simplified two-dimensional domain. Our problem setup consists of two components, an “environment” and an “agent,” interacting over an extended temporal sequence (Fig. 1). At each timestep t, the environment emits an RGB image xt of height H and width W , and a scalar reward rt . Conversely, the agent accepts images and rewards as input and chooses an action at in response. The action space A available to the agent consists of a two-dimensional pixel grid {0, . . . , H − 1} × {0, . . . , W − 1} ⊂ Z2 , of the same height and width as its input image. The environment is equipped with a policy (unknown to the agent) that on each time step computes image xt and reward rt as a function of the history of agent actions {a0 , . . . , at−1 }, images {x0 , . . . , xt−1 } and rewards {r0 , . . . , rt−1 }. In this work, the agent is a neural network, composed of a visual backbone with fixed weights, together with a meta-controller module whose parameters are learned by interaction with the environment. The agent’s goal is to learn to enact a policy that maximizes its reward obtained over time. Unlike an episodic reinforcement learning context, the TouchStream environment is continuous: throughout the course of learning the agent is never signaled when it should reset to some “initial” internal state. However, unlike the traditional continuous learning context of e.g. Sutton & Barto (1998), a TouchStream may implicitly define many different tasks, each of which is associated with its own characteristic reward schedule. The agent experiences a continual stream of tasks, and any implicit association between reward schedule and state reset must be discovered by the agent. By framing the action space A of the agent as all possible pixel locations and the state space as any arbitrary image, a very wide range of possible tasks are unified in this single framework, at the cost of requiring the agents’ action space to be congruent to its input state space, and thus be quite large. This presents two core efficiency challenges for the agent: on any given task, it must be able to both quickly recognize what the “interface” for the task is, and transfer such knowledge across tasks in a smart way. Both of these goals are complicated by the fact that both the large size of agent’s state and action spaces. Although we work with modern large-scale computer vision-style datasets and tasks in this work, e.g. ImageNet (Deng et al. (2009)) and MS-COCO (Lin et al. (2014)), we are also inspired by visual psychology and neuroscience, which have pioneered techniques for how controlled visual tasks can be embodied in real reinforcement learning paradigms (Horner et al., 2013; Rajalingham et al., 2015). Especially useful are three classes of task paradigms that span a range of the ways discrete and continuous estimation tasks can be formulated – including Stimulus-Response, Match-To-Sample, and Localization tasks (Fig. 2). Stimulus-Response Tasks: The Stimulus-Response (SR) paradigm is a common approach to physically embodying discrete categorization tasks (Gaffan & Harrison, 1988). For example, in the simple two-way SR discrimination task shown in Fig. 2a, the agent is rewarded if it touches the left half of the screen after being shown an image of a dog, and the right half after being shown a butterfly. SR tasks can be made more difficult by increasing the number of image classes or the complexity of the reward boundary regions. In our SR experiments, we use images and classes from the ImageNet dataset (Deng et al., 2009). Match-To-Sample Tasks: The Match-to-Sample (MTS) paradigm is another common approach to assessing visual categorization abilities (Murray & Mishkin, 1998). In the MTS task shown in Fig. 2b, trials consist of a sequence of two image frames – the “sample” screen followed by the “match” screen – in which the agent is expected to remember the object category seen on the sample frame, and then select an onscreen “button” (really, a patch of pixels) on the match screen corresponding to the sample screen category. Unlike SR tasks, MTS tasks require some working memory and more localized spatial control. More complex MTS tasks involve more sophisticated relationships between the sample and match screen. In Fig. 2c, using the MS-COCO object detection challenge dataset (Lin et al., 2014), the sample screen shows an isolated template image indicating one of the 80 MS-COCO classes, while the match screen shows a randomly-drawn scene from the dataset containing at least one instance of the sample-image class. The agent is rewarded if its chosen action is located inside the boundary of an instance (e.g. the agent “pokes inside”) of the correct class. This MS-COCO MTS task is a “hybrid” of categorical and continuous elements, meaning that if phrased as a standard 4 supervised learning problem, both categorical readout (i.e. class identity) and a continous readout (i.e. object location) would be required. Localization: Fig. 2d shows a two-step continuous localization task in which the agent is supposed to mark out the bounding box of an object by touching opposite corners on two successive timesteps, with reward proportionate to the Intersection over Union (IoU) value of the predicted bounding box GT ∩B̂) relative to the ground truth bounding box IoU = Area(B . In localization, unlike the SR and Area(BGT ∪B̂) MTS paradigms, the choice made at one timestep constrains the agent’s optimal choice on a future timestep (e.g. picking the upper left corner of the bounding box on the first step contrains the lower right opposite corner to be chosen on the second). Although these tasks can become arbitrarily complex along certain axes, the tasks presented here require only fixed-length memory and future prediction. That is, each task requires only knowledge of the past kb timesteps, and a perfect solution always exists within kf timesteps from any point. The minimal required values of kb and kf are different across the various tasks in this work. However, in the investigations below, we set these to the maximum required values across tasks, i.e. kb = 1 and kf = 2. Thus, the agent is required to learn for itself when it is safe to ignore information from the past and when it is irrelevant to predict past a certain point in the future. We will begin by considering a restricted case where the environment runs one semantic task indefinitely, showing how different architectures learn to solve such individual tasks with dramatically different levels of efficiency (§ 2-3). We will then expand to considering the case where the environment’s policy consists of a sequence of tasks with unpredictable transitions between tasks, and exhibit a meta-controller that can cope effectively with this expanded domain (§ 4). 2 R EWARD M AP P REDICTION The TouchStream environment necessarily involves working with large action and state spaces. Methods for handling this situation often focus on reducing the effective size of action/state spaces, either via estimating pseudo-counts of state-action pairs, or by clustering actions (Ostrovski et al., 2017; Dulac-Arnold et al., 2015). Here we take another approach, using a neural network to directly approximate the (image-state modulated) mapping between the action space and reward space, allowing learnable regularities in the state-action interaction to implicitly reduce the large spaces into something manageable by simple choice policies. We introduce an off-policy algorithm for efficient multitask reinforcement learning in large action and state spaces: Reward Map Prediction, or ReMaP. 2.1 R E M A P N ETWORK A LGORITHM As with any standard reinforcement learning situation, the agent seeks to learn an optimal policy π = p(at | xt ) defining the probability density p over actions given image state xt . The ReMaP algorithm is off-policy, in that π is calculated as a simple fixed function of the estimated reward. A ReMaP network MΘ is a neural network with parameters Θ, whose inputs are a history over previous timesteps of (i) the agent’s own actions, and (ii) an activation encoding of the agent’s state space; and which explicitly approximates the expected reward map across its action space for some number of future timesteps. Mathematically: h i k MΘ : [Ψt−kb :t , ht−kb :t−1 ] 7−→ m1t , m2t , . . . , mt f where kb is the number of previous timesteps considered; kf is the length of future horizon to be considered; Ψt−kb :t is the history [ψ(xt−kb ), . . . , ψ(xt )] of state space encodings produced by fixed backbone network ψ(·), ht−kb :t−1 is the history [at−kb . . . , at−1 ] of previously chosen actions, and each mi ∈ map(A, R) – that is, a map from action space to reward space. The predicted reward maps are constructed by computing the expected reward obtained for a subsample of actions drawn randomly from A: Z j mt : at 7→ E [rt+j | at , ht−kb :t−1 , Ψt−kb :t ] = rt+j p(rt+j | at , ht−kb :t−1 , Ψt−kb :t ). (1) R where rt+j is the predicted reward j steps into the future horizon. Having produced kf reward prediction maps, one for each timestep of its future horizon, the agent needs to determine what 5 h i k it believes will be the single best action over all the expected reward maps m1t , m2t , . . . , mt f . The ReMaP algorithm formulates doing so by normalizing the predictions across each of these kf maps into separate probability distributions, and sampling an action from the distribution which has maximum variance. That is, the agent computes its policy π as follows: k f π = VarArgmaxj=1 {Dist[Norm[mjt ]]}, (2) N orm[m] = m − min m(x) (3) where x∈A is a normalization that removes the minimum of the map, f (m) f (m(x)) A Dist[m] = R (4) ensures it is a probability distribution parameterized by functional family f (·), and VarArgmax is an operator which chooses the input with largest variance. The sampling procedure described in equation (2) uses two complementary ideas to exploit spatial and temporal structure to efficiently explore a large action space. Since rewards in real physical tasks are spatially correlated, the distribution-based sampler in Equation (4) allows for more effective exploration of potentially informative actions than would the single-point estimate of an apparent optimum (e.g. an -greedy policy). Further, in order to reduce uncertainty, the ReMaP algorithm explores timesteps with greatest reward map variance. The VarArgmax function nonlinearly upweights the timeframe with highest variance to exploit the fact that some points in time carry disproportianate relevance for reward outcome, somewhat analagously to how max-pooling operates in convolutional networks. Although any standard action selection strategy can be used in place of the one in (2) (e.g. pseudo -greedy over all kf maps), we have empirically found that this policy is effective at efficiently exploring our large action space. The parameters Θ of a ReMaP network are learned by gradient descent on the loss of the reward prediction error Θ∗ = argminΘ L [mt (at ), rt , ; Θ] with map mjt compared to the true reward rt+j . Only the reward prediction in mt corresponding to the action chosen at timestep t participates in loss calculation and backpropagation of error signals. A minibatch of maps, rewards, and actions is collected over several consecutive inference passes before performing a parameter update. The ReMaP algorithm is summarized in 1. Algorithm 1: ReMaP – Reward Map Prediction Initialize ReMaP network M Initialize state and action memory buffers Ψt−kb :t and ht−kb :t−1 for timestep t = 1,T do Observe xt , encode with state space network ψ(·), and append to state buffer Subsample set of potential action choices at uniformly from A Produce kf expected reward maps of at from eq. (1) Select action according to policy π as in (2) Execute action at in environment, store in action buffer, and receive reward rt Calculate loss for this and previous kf − 1 timesteps if t ≡ 0 mod batch size then Perform parameter update Throughout this work, we take our fixed backbone state space encoder to be the VGG-16 convnet, pretrained on ImageNet (Simonyan & Zisserman, 2014). Because the resolution of the input to this network is 224x224 pixels, our action space A = {0, . . . , 223} × {0, . . . , 223}. By default, the functional family f used in the action selection scheme in Eq. (4) is the identity, although on tasks benefiting from high action precision (e.g. Localization or MS-COCO MTS), it is often optimal to sample a low-temperature Boltzmann distribution with f (x) = e−x/T . Reward prediction errors are calculated using the cross-entropy loss (where logits are smooth approximations to the Heaviside function in analogy to eq. (5)). 6 3 E FFICIENT N EURAL M ODULES FOR TASK L EARNING The main question we seek to address in this section is: what specific neural network structure(s) should be used in ReMaP modules? The key considerations are that such modules (i) should be easy to learn, requiring comparatively few training examples to discover optimal parameters Θ∗ , and (ii) easy to learn from, meaning that an agent can quickly build a new module by reusing components of old ones. Intuitive Example: As an intuition-building example, consider the case of a simple binary StimulusResponse task, as in Fig. 2a (“if you see a dog touch on the right, if a butterfly touch on the left"). One decision module that is a “perfect” reward predictor on this task is expressed analytically as: M [Ψt ](ax , ay ) = H(ReLU(W Ψt ) · ReLU(ax ) + ReLU(−W Ψt ) · ReLU(−ax )) (5) where H is the Heaviside function, ax and ay are the x and y components of the action a ∈ A relative to the center of the screen, and W is a 1 × |Ψt | matrix expressing the class boundary (bias term omitted for clarity). If W Ψt is positive (i.e. the image is of a dog) then ax must also be positive (i.e. touch is on the right) to predict positive reward; conversly, if W Ψt is negative (i.e. butterfly), ax must be negative (i.e. left touch) to predict reward. If neither of these conditions hold, both terms are equal to zero, so the formula predicts no reward. Since vertical location of the action does not affect reward, ay is not involved in reward calculation on this task. Equation (5) has three basic ideas embedded in its structure: • there is an early visual bottleneck, in which the high-dimensional general purpose feature representation Ψt is greatly reduced in dimension (in this case, from the 4096 features of VGG’s FC6 layer, to 1) prior to combination with action space, • there is a multiplicative interaction between the action vector and (bottlenecked) visual features, and • there is symmetry, e.g. the first term of the formula is the sign-antisymmetric partner of the second term, reflecting something about the spatial structure of the task. In the next sections, we show these three principles can be generalized into a parameterized family of networks from which the visual bottleneck (the W parameters), and decision structure (the form of equation (5)) can emerge naturally and efficienty via learning for any given task of interest. 3.1 T HE EMS M ODULE In this section we define a generic ReMaP module which is lightweight, encodes all three generic design principles from the “perfect” formula, and uses only a small number of learnable parameters. Define the concatenated square nonlinearity as Sq : x 7−→ x ⊕ x2 and the concatenated ReLU nonlinearity (Shang et al. (2016)) as CReLU : x 7−→ ReLU(x) ⊕ ReLU(−x) where ⊕ denotes vector concatenation. The CReS nonlinearity is then defined as the composition of CReLU and Sq, e.g. CReS(x) : x 7−→ ReLU(x) ⊕ ReLU(−x) ⊕ ReLU2 (x) ⊕ ReLU2 (−x). The CReS nonlinearity introduces multiplicative interactions between its arguments via its Sq component and symmetry via its use of CReLU. Definition. The (n0 , n1 , . . . , nk )-Early Bottleneck-Multiplicative-Symmetric (EMS) module is the ReMaP module given by B = CReLU(W0 Ψ + b0 ) l1 = CReS(W1 (B ⊕ a) + b1 ) li = CReS(Wi li−1 + bi ) for i > 1 where Wi and bi are learnable parameters, Ψ are features from the fixed visual encoding network, and a is the action vector in A. 7 Sample Match Reward Maps a 4 6 18 83 125 96 115 140 1536 b 64 Training episode (in thousands) Figure 3: Decision interfaces emerge naturally over the course of training. The ReMaP modules allow the agent to discover the implicit interfaces for each task. We observe that learning generally first captures the emergence of natural physical constructs before learning task-specific decision rules. Examples of this include: a. onscreen “buttons” appearing on the match screen of an MTS task before the specific semantic meaning of each button is learned (arrows indicate random motion), and b. the general discovery of objects and their boundaries before the task-specific category rule is applied. This image is best viewed in color. The EMS structure builds in each of the three principles described above. The B stage represents the early bottleneck in which visual encoding inputs are bottlenecked to size n0 before being combined with actions, and then performs k CReS stages, introducing multiplicative symmetric interactions between visual features and actions. From this, the “perfect” module definition for the binary SR task in eq. (5) then becomes a special case of a two-layer EMS module. Note that the visual features to be bottlenecked can be from any encoder; in practice, we work with both fully connected and convolutional features of the VGG-16 backbone. In the experiments that follow, we compare the EMS module to a wide variety of alternative control motifs, in which the early bottleneck, multiplicative, and symmetric features are ablated. Multiplicative nonlinearity and bottleneck ablations use a spectrum of more standard activation functions, including ReLU, tanh, sigmoid, elu (Clevert et al., 2015), and CReLU forms. In late bottleneck (fully-ablated) architectures – which are, effectively, “standard” multi-layer perceptrons (MLPs) – action vectors are concatenated directly to the output of the visual encoder before being passed through subsequent stages. In all, we test 24 distinct architectures. Detailed information on each can be found in the Supplement. 3.2 E XPERIMENTS We compared each architecture across 12 variants of visual SR, MTS, and localization tasks, using fixed visual encoding features from layer FC6 of VGG-16. Task variants ranged in complexity from simple (e.g. a binary SR task with ImageNet categories) to more challenging (e.g. a many-way ImageNet MTS task with result buttons appearing in varying positions on each trial). The most complex tasks are two variants of localization, either with a single main salient object placed on a complex background (similar to images used in Yamins & DiCarlo (2016)), or complex scenes from MS-COCO (see Fig. 3b). Details of the tasks used in these experiments can be found in the Supplement. Module weights were initialized using a normal distribution with µ = 0.0, σ = 0.01, and optimized using the ADAM algorithm (Kingma & Ba (2014)) with parameters β1 = 0.9, β2 = 0.999 and  = 1e−8. Learning rates were optimized on a per-task, per-architecture basis in a cross-validated fashion. For each architecture and task, we ran optimizations from five different initialization seeds to obtain mean and standard error due to initial condition variability. For fully-ablated “late-bottleneck” modules, we measured the performance of modules of three different sizes (small, medium, and large), where the smallest version is equivalent in size to the EMS module, and the medium and large versions are much larger (Table S1). Emergence of Decision Structures: A key feature of ReMaP modules is that they are able to discover de novo the underlying output domain spaces for a variety of qualitatively distinct tasks (Fig. 3; more examples in Fig. S2). The emergent decision structures are highly interpretable and reflect the true interfaces that the environment implicitly defines. The spatiotemporal patterns of learning are robust across tasks and replicable across initial seedings, and thus might serve as a candidate model of interface use and learning in humans. In general, we observe that the modules typically discover 8 Reward a b 1.0 0.9 0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 0.4 0.4 0.3 0.3 0.2 Reward c 1.0 0.9 e TA-N-AUC 0.2 20 40 60 80 100 120 140 d 1.0 50 0.9 0.8 0.8 0.7 0.7 0.6 0.6 0.5 0.5 0.4 0.4 0.3 0.3 0.2 0.2 100 200 300 400 500 150 200 1.0 0.9 Training episodes (in thousands) 100 200 400 600 800 Module 0.997 ± 0.006 EMS 0.944 ± 0.059 No symm 0.818 ± 0.122 No mult 0.717 ± 0.127 None (large) 0.566 ± 0.184 No mult/symm 0.522 ± 0.213 None (medium) 0.403 ± 0.170 None (small) 1000 Training episodes (in thousands) Figure 4: EMS modules as components of an efficient visual learning system. Validation reward obtained over the course of training for modules on a. 4-way stimulus-response with a reward map split into four quadrants, b. 2-way MTS with randomly moving match templates, c. 4-way MTS with two randomly moving class templates shown at a time, and d. 4-way MTS with four randomly positioned images shown at a time. Lines indicate mean reward over five different weight initializations. For clarity, seven of the total 24 tested architectures are displayed (see results for remaining architectures in Supplement). e. The TA-N-AUC metric is the area under the learning curve, normalized to the highest performing module within a task (over all 24 modules), averaged across all 12 tasks. Error values are standard deviations from the mean TA-N-AUC. the underlying “physical structures” needed to operate the task interface before learning the specific decision rules needed to solve the task. For example, in the case of a discrete MTS categorization task (Fig. 3a), this involves the quick discovery of onscreen “buttons” corresponding to discrete action choices before these buttons are mapped to their semantic meaning. In the case of in the MS-COCO MTS task (Fig. 3b), we observe the initial discovery of high salience object boundaries, and followed by category-specific refinement. It is important to note that the visual backbone was trained on a categorization task, quite distinct from the localization task in MS-COCO MTS. Thus, the module had to learn this very different decision structure, as well as the class boundaries of MS-COCO, from scratch during training. Efficiency of the EMS module: The efficiency of learning was measured by computing the taskaveraged, normalized area under the learning curve (TA-N-AUC) for each of the 24 modules tested, across all 12 task variants. Fig. 4a-d shows characteristic learning curves for several tasks, summarized in the table in Fig. 4e. Results for all architectures for all tasks are shown in Supplement Figure S1. We find that the EMS module is the most efficient across tasks (0.997 TA-N-AUC). Moreover, the EMS architecture always achieves the highest final reward level on each task. Increasing ablations of the EMS structure lead to increasingly poor performance, both in terms of learning efficiency and final performance. Ablating the low-order polynomial interaction (replacing Sq with CReLU) had the largest negative effect on performance (0.818 TA-N-AUC), followed in importance by the symmetric structure (0.944 TA-N-AUC). Large fully-ablated models (no bottleneck, using only ReLU activations) performed significantly worse than the smaller EMS module and the single ablations (0.717 TA-N-AUC), but better than the module with neither symmetry nor multiplicative interactions (0.566 TA-N-AUC). Small fully-ablated modules with the same number of parameters as EMS were by far the least efficient (0.403 TA-N-AUC) and oftentimes achieved much lower final reward. In summary, the main conceptual features by which the special-case architecture in eq. (5) solves the binary SR task are both individually helpful, combine usefully, and can be parameterized and efficiently learned for a variety of visual tasks. These properties are critical to achieving effective task learning compared to standard MLP structures. In a second experiment focusing on localization tasks, we tested an EMS module using convolutional features from the fixed VGG-16 feature encoder, reasoning that localization tasks could benefit from finer spatial feature resolution. We find that using visual features with explicit spatial information 9 a b 0.6 0.5 0.7 0.6 Convolutional EMS EMS No symmetry No multiplication No multiplication/symmetry None (large) None (medium) None (small) SVM baseline Reward IOU 0.4 0.3 0.2 0.5 0.4 0.3 0.1 1000 2000 3000 4000 5000 6000 Training episodes (in thousands) 10000 20000 30000 40000 50000 Training episodes (in thousands) Figure 5: Convolutional bottlenecks allow for fine resolution localization and detection in complex scenes. a. Mean Intersection over Union (IoU) obtained on the localization task. b. Reward obtained on the MS-COCO match-to-sample variant. Both of these require their visual systems to accomodate for finer spatial resolution understanding of the scene, and more precise action placement than the SR or (non-COCO) MTS tasks. The convolutional variant of the EMS module uses skip connections from the conv5 and FC6 layers of VGG-16 as input, whereas the standard EMS uses only the FC6 layer as input. substantially improves task performance and learning efficiency on these tasks (Fig. 5). To our knowledge, our results on MS-COCO are the first demonstrated use of reinforcement learning to achieve instance-level object segmentations. Reward curves (measuring bounding box IoU) in Fig. 5a show little difference between any of the late bottleneck modules at any size. The only models to consistently achieve an IoU above 0.4 are the EMS-like variants, especially with convolutional features. For context, a baseline SVR trained using supervised methods to directly regress bounding boxes using the same VGG features results in an IoU of 0.369. 4 DYNAMIC N EURAL VOTING FOR TASK S WITCHING So far, we’ve considered the case where the TouchStream consists of only one task. However, agents in real environments are often faced with having to switch between tasks, many of which they may be encountering for the first time. Ideally, such agents would repurpose knowledge from previously learned tasks when it is relevant to a new task. Formally, we now consider environment policies consisting of sequences of tasks T = {τ1 , τ2 , ..., τΩ }, each of which may last for an indeterminate period of time. Consider also a set of modules M, where each module corresponds to a task-specific policy πω (a | x) = p (at | xt , τω ). When a new task begins, we cue the agent to allocate a new module MΩ+1 which is added to the set of modules M. In the learning that follows allocation, the weights in old modules are held fixed while the parameters in the new module MΩ+1 are trained. However, the output of the system is not merely the output of the new module, but instead is a dynamically allocated mixture of pathways through the computation graphs of the old and new modules. This mixture is determined by a meta-controller (Fig. 6). The meta-controller is itself a neural network which learns a dynamic distribution over (parts of) modules to be used in building the composite execution graph. Intuitively, this composite graph is composed of a small number of relevant pathways that mix and match parts of existing modules to solve the new task, potentially in combination with new module components that need to be learned. 4.1 DYNAMIC N EURAL VOTING We define a meta-controller that assigns weights to each layer in each module in M. Let piω be the weight associatedP with the ith layer in module ω. These weights are probabilistic on a per layer basis, e.g. piω ≥ 0 and ω piω = 1 and can be interpreted as the probability of the controller selecting the ith layer lωi for use in the execution graph, with distribution πi = {piω }. For such an assignment of weights, the composite execution graph defined by the meta-controller is generated by computing the sum of the activations of all the components at layer i weighted by the probabilities piω . These values are then passed on to the next layer where this process repeats. Mathematically, the composite layer at stage i can be expressed as h i X i i ˜i−1 i ˜i−1 ˜li = p M ( l ) = E M ( l ) . (6) π ω ω M ω M M i ω 10 controller p1ω Mω1 p2ω Mω2 p1ω Mω1 p2ω Mω2 + + visual input ˜l0 M composite layer ˜l1 M A = fixed parameters ˜l2 M Figure 6: The Dynamic Neural Voting Controller. Dynamic Neural Voting solves new tasks by computing a composite execution graph through previously learned and newly allocated modules. Shown here is an agent with two existing modules (yellow and green), as one newly allocated module is being learned (blue). For each layer, the controller takes as input the activations of all three modules and outputs a set of “voting results” — probabilistic weights to be used to scale activations within the corresponding components. Voting can be done on either a per-layer basis or a per-unit basis, for clarity only the layer voting method is depicted. The weighted sum of these three scaled outputs is used as input to the next stage in the computation graph. If the new task can be solved through a combination of existing module components, these will be weighted highly, while the new module will be effectively unused e.g. is assigned low weights. If however the task is quite different than previously solved tasks, the new module will play a larger role in the execution graph as it learns to solve the task. where Mωi (·) is the operator that computes the ith layer of module ω, and ˜l0 := ψ(xt ) is the original encoded input state. The question now is, where do these probabilistic weights come from? The core of our procedure is a dynamic neural voting process in which the controller network learns a Boltzmann distribution over module activations to maximize reward prediction accuracy. This process is performed at each module layer, where the module weightings for a given layer are conditioned on the results of voting at the previous layer. That is, " ! # M i i i ˜i−1 i p = softmax W M (l ) + b (7) ω ω M where p i = (pi0 , pi1 , ..., piΩ ) are the module weights at layer i, ⊕ is concatenation, and W i ∈ 1 1 R(Ω·L)×Ω is a learnable weight matrix of the controller. This voting procedure operates in an online fashion, such that the controller is continously learning 1 1 its meta-policy while the agent is taking actions. As defined, the meta-controller constitutes a fully-differentiable neural network and is learned by gradient descent online. 1 mechanism involves voting across the units of M. Specifically, the A useful refinement of the above i,j 1 meta-controller now assigns probabilistic weights pi,j ω to neuron nω (the jth unit in layer i of module ω). In contrast to the layer-voting scheme, the dynamically generated execution graph computed 1by the meta controller now becomes composite neurons with activations: h i X i,j ˜i−1 i,j ˜i−1 ñi,j pi,j (8) ω Mω (lM ) = Eπi ,j Mω (lM ) . M = ω i which are concatenated to form the composite layer ˜lM . The generalization of equation (7) to the single-unit voting scheme then becomes: " ! # M i,j i,j i,j ˜i−1 i,j p = softmax W Mω (lM ) + b (9) ω i,j i,j i,j where p i,j = (pi,j ∈ RΩ×Ω . 0 , p1 , ..., pΩ ) are the unit-level weights across modules, and W 11 Empirically, we find that the initialization schemes of the learnable controller parameters are an important consideration in the design, and that two specialized transformations also contribute slightly to its overall efficiency. For details on these, please refer to the Supplement. The dynamic neural voting mechanism achieves meta-control through a neural network optimized online via gradient descent while the modules are solving tasks, rather than a genetic algorithm that operates over a longer timescale as in the work of Fernando et al. (2017). Moreover, in contrast to the work of Rusu et al. (2016) the voting mechanism eliminates the need for fully-connected adaptation layers between modules, thus substantially reducing the number of parameters required for transfer. Reward 4.2 S WITCHING E XPERIMENTS 1.0 0.8 0.6 0.4 From Scratch After Switch Reuse Fraction 0.2 1.0 0.8 0.6 20 30 40 Batch Updates Figure 7: Dyanmic Neural Voting quickly corrects for “no-switch” switches. Although a new module is allocated for each task transition, if the new task is identitcal to the original task, the controller quickly learns to reuse the old module components. Top: postswitching learning curve for the EMS module on a binary stimulus-response task, after being trained on the same task. For clarity, only the Layer Voting method is compared against a baseline module trained from scratch. Bottom: fraction of the original module reused over the course of post-switch learning, calculated by averaging the voting weights of each layer in the original module. 0 10 “No-switch” switches: Our first experiments tested how the dynamic neural voting mechanism would respond to “no-switch” switches, i.e. ones in which although a switch cue was given and a new module allocated, the environment policy’s task did not actually change (Fig 7). We find that in such cases, performance almost instantly approaches pre-switch levels (e.g. there is very little penalty in attempting an uneccessary switch). Moreover, we find that the weightings the controller applies to the new module is low: in other words, the system recognizes that no new module is needed and acts accordingly by concentrating its weights on the existing module. These results show that, while we formally assume that the agent is cued as when task switches occurs, in theory it could implement a completely autonomous monitoring policy, in which the agent simply runs the allocation procedure if a performance “anomoly” occurs (e.g. a sustained drop in reward). If the system determines that the new module was unneeded, it could simply reallocate the new module for a later task switch. In future work, we plan to implement this policy explicitly. “Real” switches: We next tested how the dynamic voting controller handled switches in which the environment policy substantially changed after the switching cue. Using both the EMS module and (for control) the large fully-ablated module as described in § 3.2, the dynamic neural voting controller was evaluated on 15 switching experiments using multiple variants of SR and MTS tasks. Specifically, these 15 switches cover a variety of distinct (but not mutually exclusive) switching types including: • • • • • • addition of new classes to the dataset (switch indexes 2, 7, 11 in the table of Fig. 8) replacing the current class set entirely with a new non-overlapping class set (switch ids. 1, 3) addition of visual variability to a previously less variable task (switch id. 6) addition of visual interface elements e.g. new buttons (switch id. 8) transformation of interface elements e.g. screen rotation (switch ids. 12, 13, 14, 15) transitions between different task paradigms e.g. SR to MTS tasks and vice-versa (switch ids. 4, 5, 9, 10). Controller hyperparameters were optimized in a cross-validated fashion (see Appendix G.1), and optimizations for three different initialization seeds were run to obtain mean and standard error. Figures 8a and b show characteristic post-switch learning curves for the EMS module for both the Layer Voting and Single-Unit Voting methods. Additional switching curves can be found in the Supplement. Cumulative reward gains relative to learning from scratch were quantified by Relative switch )−AU C(M ) Gain in AUC: RGain = AU C(M AU C(M , where M is the module trained from scratch on ) 12 a b Reward 0.8 0.6 EMS Single-Unit Voting Layer Voting 0.4 0.2 10 20 30 40 50 10 20 EMS c d Layer Voting Single-Unit Voting Relative AUC Gain 0.5 40 50 Layer Voting Single-Unit Voting 1.4 1.2 0.4 1.0 0.3 0.8 0.2 0.6 0.1 0.4 0.0 e 30 None (Large) 0.2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0.5 Transfer Gain 0.4 0.3 0.2 0.1 0.0 1 1. 2. 3. 4. 5. 6. 7. 8. 2 3 Base Task 2-way SR 2-way SR 2-way stationary MTS 2-way SR 2-way stationary MTS 2-way stationary MTS 2-way vert-motion horiz-flip MTS 4-way 2-shown vert-motion MTS 4 5 6 7 8 Switch Task 2-way SR new classes 4-way double-binary SR 2-way stationary MTS new classes 2-way stationary MTS 2-way SR 2-way vert-motion horiz-flip MTS 4-way 2-shown vert-motion MTS 4-way 4-shown permuted MTS 9 9. 10. 11. 12. 13. 14. 15. 10 11 12 Base Task 4-way double-binary SR 4-way 4-shown stationary MTS t 2-way SR 4-way double-binary SR 2-way SR 2-way SR 2-way SR 13 14 15 Switch Task 4-way 4-shown stationary MTS 4-way quadrant SR 4-way quadrant SR 4-way quadrant SR class reversal squeezed map 90◦ map rotation Task switching with Dynamic Neural Voting. Post-Switching learning curves for the EMS module on the 4-way Quadrant SR task after learning a. 2-way SR task and b. a 4-way MTS task with 4 match screen class templates. Both the Layer Voting method and Single-Unit Voting method are compared against a baseline module trained on the second task from scratch. Across all twelve task switches, we evaluate the Relative Gain in AUC over baseline (RGain) using both voting methods for c. the EMS module and d. the large-sized fully-ablated late bottleneck MLP. e. Transfer Gain (TGain) metrics are compared for both module types for each of the voting mechanisms. Colors are as in c. (EMS module) and d. (fully-ablated module). Figure 8 13 the second task, and M switch is the module transferred from an initial task using the dynamic voting controller. We find that the dynamic voting controller allows for rapid positive transfer of both module types across all 15 task switches, and the general Single-Unit voting method is a somewhat better transfer mechanism than the Layer Voting method (Fig. 8c). Both the EMS module and the large fully-ablated module, which was shown to be inefficient on single-task performance in § 3.2, benefit from dynamic neural voting (Fig. 8 d). EMS modules are more “switchable”: To quantify how fast switching gains are realized, we use Transfer Gain: T Gain = T∆∆max , where T∆max = argmax(∆t ) is the time where the maximum max amount of reward difference between M switch and M occurs, and ∆max is the reward difference at that time. Qualitatively, a high score on the Transfer Gain metric indicates that a large amount of relative reward improvement has been achieved in a short amount of time (see Figure S7 for a graphical illustration of the relationship between the RGain and T Gain metrics). While both the EMS and large fully-ablated modules have positive Transfer Gain, EMS scores significantly higher on this metric, i.e. is significantly more “switchable” than the large fully-ablated module (Fig. 8e). We hypothesize that this is due to the EMS module being able to achieve high task performance with significantly fewer units than the larger fully-ablated module, making the former easier for the dynamic neural voting controller to operate on. 5 C ONCLUSION AND F UTURE D IRECTIONS In this work, we introduce the TouchStream environment, a continual reinforcement learning framework that unifies a wide variety of spatial decision-making tasks within a single context. We describe a general algorithm (ReMaP) for learning light-weight neural modules that discover implicit task interfaces within this large-action/state-space environment. We show that a particular module architecture (EMS) is able to remain compact while retaining high task performance, and thus is especially suitable for flexible task learning and switching. We also describe a simple but general dynamic task-switching architecture that shows substantial ability to transfer knowledge when modules for new tasks are learned. A crucial future direction will be to expand insights from the current work into a more complete continual-learning agent. We will need to show that our approach scales to handle dozens or hundreds of task switches in sequence. We will also need to address issues of how the agent determines when to build a new module and how to consolidate modules when appropriate (e.g. when a series of tasks previously understood as separate can be solved by a single smaller structure). It will also be critical to extend our approach to handle visual tasks with longer horizons, such as navigation or game play with extended strategic planning, which will likely require the use of recurrent memory stores as part of the feature encoder. From an application point of view, we are particularly interested in using techniques like those described here to produce agents that can autonomously discover and operate the interfaces present in many important real-world two-dimensional problem domains, such as on smartphones or the internet (Grossman, 2007). We also expect many of the same spatially-informed techniques that enable our ReMaP/EMS modules to perform well in the 2-D TouchStream environment will also transfer naturally to a three-dimensional context, where autonomous robotics applications (Devin et al., 2016) are very compelling. R EFERENCES Jacob Andreas, Marcus Rohrbach, Trevor Darrell, and Dan Klein. Deep compositional question answering with neural module networks. CoRR, abs/1511.02799, 2015. URL http://arxiv. org/abs/1511.02799. Michael A Arbib. Schema theory. The Encyclopedia of Artificial Intelligence, 2:1427–1443, 1992. Matthew M Botvinick and Jonathan D Cohen. The computational and neural basis of cognitive control: charted territory and new frontiers. Cognitive science, 38(6):1249–1285, 2014. Tianqi Chen, Ian Goodfellow, and Jonathon Shlens. Net2net: Accelerating learning via knowledge transfer. arXiv preprint arXiv:1511.05641, 2015. 14 Djork-Arné Clevert, Thomas Unterthiner, and Sepp Hochreiter. Fast and accurate deep network learning by exponential linear units (elus). CoRR, abs/1511.07289, 2015. URL http://arxiv. org/abs/1511.07289. Michael W Cole, Jeremy R Reynolds, Jonathan D Power, Grega Repovs, Alan Anticevic, and Todd S Braver. Multi-task connectivity reveals flexible hubs for adaptive task control. Nat. Neurosci., 16 (9):1348–1355, sep 2013. J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei. ImageNet: A Large-Scale Hierarchical Image Database. In IEEE CVPR, 2009. Coline Devin, Abhishek Gupta, Trevor Darrell, Pieter Abbeel, and Sergey Levine. Learning modular neural network policies for multi-task and multi-robot transfer. CoRR, abs/1609.07088, 2016. URL http://arxiv.org/abs/1609.07088. Yan Duan, John Schulman, Xi Chen, Peter L. Bartlett, Ilya Sutskever, and Pieter Abbeel. Rl$ˆ2$: Fast reinforcement learning via slow reinforcement learning. CoRR, abs/1611.02779, 2016. URL http://arxiv.org/abs/1611.02779. Gabriel Dulac-Arnold, Richard Evans, Peter Sunehag, and Ben Coppin. Reinforcement learning in large discrete action spaces. CoRR, abs/1512.07679, 2015. URL http://arxiv.org/abs/ 1512.07679. Chrisantha Fernando, Dylan Banarse, Charles Blundell, Yori Zwols, David Ha, Andrei A. Rusu, Alexander Pritzel, and Daan Wierstra. Pathnet: Evolution channels gradient descent in super neural networks. CoRR, abs/1701.08734, 2017. URL http://arxiv.org/abs/1701.08734. David Gaffan and Susan Harrison. Inferotemporal-frontal disconnection and fornix transection in visuomotor conditional learning by monkeys. Behavioural Brain Research, 31(2):149 – 163, 1988. ISSN 0166-4328. doi: https://doi.org/10.1016/0166-4328(88)90018-6. URL http: //www.sciencedirect.com/science/article/pii/0166432888900186. Lev Grossman. Invention of the year: The iphone. Time Magazine Online, 1, 2007. Alexa E Horner, Christopher J Heath, Martha Hvoslef-Eide, Brianne A Kent, Chi Hun Kim, Simon RO Nilsson, Johan Alsiö, Charlotte A Oomen, Andrew Holmes, Lisa M Saksida, et al. The touchscreen operant platform for testing learning and memory in rats and mice. Nature protocols, 8(10): 1961–1984, 2013. R. Hu, J. Andreas, M. Rohrbach, T. Darrell, and K. Saenko. Learning to Reason: End-to-End Module Networks for Visual Question Answering. ArXiv e-prints, April 2017. Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. abs/1412.6980, 2014. URL http://arxiv.org/abs/1412.6980. CoRR, James Kirkpatrick, Razvan Pascanu, Neil C. Rabinowitz, Joel Veness, Guillaume Desjardins, Andrei A. Rusu, Kieran Milan, John Quan, Tiago Ramalho, Agnieszka Grabska-Barwinska, Demis Hassabis, Claudia Clopath, Dharshan Kumaran, and Raia Hadsell. Overcoming catastrophic forgetting in neural networks. CoRR, abs/1612.00796, 2016. URL http://arxiv.org/abs/ 1612.00796. A Krizhevsky, I Sutskever, and G Hinton. ImageNet classification with deep convolutional neural networks. Advances in Neural Information Processing Systems, 2012. Tsung-Yi Lin, Michael Maire, Serge J. Belongie, Lubomir D. Bourdev, Ross B. Girshick, James Hays, Pietro Perona, Deva Ramanan, Piotr Dollár, and C. Lawrence Zitnick. Microsoft COCO: common objects in context. CoRR, abs/1405.0312, 2014. URL http://arxiv.org/abs/ 1405.0312. James L McClelland. Incorporating rapid neocortical learning of new schema-consistent information into complementary learning systems theory. Journal of Experimental Psychology: General, 142 (4):1190, 2013. 15 Elisabeth A. Murray and Mortimer Mishkin. Object recognition and location memory in monkeys with excitotoxic lesions of the amygdala and hippocampus. Journal of Neuroscience, 18(16):6568–6582, 1998. ISSN 0270-6474. URL http://www.jneurosci.org/content/18/16/6568. Georg Ostrovski, Marc G. Bellemare, Aäron van den Oord, and Rémi Munos. Count-based exploration with neural density models. CoRR, abs/1703.01310, 2017. URL http://arxiv.org/abs/ 1703.01310. R. Rajalingham, K. Schmidt, and J. J. DiCarlo. Comparison of object recognition behavior in human and monkey. J. Neurosci., 35(35), 2015. Ali S Razavian, Hossein Azizpour, Josephine Sullivan, and Stefan Carlsson. Cnn features offthe-shelf: an astounding baseline for recognition. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2014 IEEE Conference on, pp. 512–519. IEEE, 2014. Andrei A. Rusu, Neil C. Rabinowitz, Guillaume Desjardins, Hubert Soyer, James Kirkpatrick, Koray Kavukcuoglu, Razvan Pascanu, and Raia Hadsell. Progressive neural networks. CoRR, abs/1606.04671, 2016. URL http://arxiv.org/abs/1606.04671. Wenling Shang, Kihyuk Sohn, Diogo Almeida, and Honglak Lee. Understanding and improving convolutional neural networks via concatenated rectified linear units. CoRR, abs/1603.05201, 2016. URL http://arxiv.org/abs/1603.05201. Karen Simonyan and Andrew Zisserman. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556, 2014. Richard S. Sutton and Andrew G. Barto. Introduction to Reinforcement Learning. MIT Press, Cambridge, MA, USA, 1st edition, 1998. ISBN 0262193981. Anthony D Wagner, Daniel L Schacter, Michael Rotte, Wilma Koutstaal, Anat Maril, Anders M Dale, Bruce R Rosen, and Randy L Buckner. Building memories: remembering and forgetting of verbal experiences as predicted by brain activity. Science, 281(5380):1188–1191, 1998. Jane X. Wang, Zeb Kurth-Nelson, Dhruva Tirumala, Hubert Soyer, Joel Z. Leibo, Rémi Munos, Charles Blundell, Dharshan Kumaran, and Matt Botvinick. Learning to reinforcement learn. CoRR, abs/1611.05763, 2016. URL http://arxiv.org/abs/1611.05763. D Yamins, H Hong, C F Cadieu, E A Solomon, D Seibert, and J J DiCarlo. Performance-optimized hierarchical models predict neural responses in higher visual cortex. Proceedings of the National Academy of Sciences, 2014. Daniel LK Yamins and James J DiCarlo. Using goal-driven deep learning models to understand sensory cortex. Nature neuroscience, 19(3):356–365, 2016. Friedemann Zenke, Ben Poole, and Surya Ganguli. Improved multitask learning through synaptic intelligence. arXiv preprint arXiv:1703.04200, 2017. S UPPLEMENTARY M ATERIAL A TASK VARIANTS The EMS module and all ablation controls were evaluated on a suite of 13 stimulus-response, match-to-sample, localization, and MS-COCO MTS variants: 1. 2-way SR - standard binary SR task 2. 4-way double binary SR - four class variant of SR, where each class is assigned either to the right or left half of the action space 3. 4-way quadrant SR - four class variant of SR, where each class is assigned to only a quadrant of the action space 4. 2-way stationary MTS - standard binary MTS task with stereotyped and non-moving match screens 16 5. 2-way stationary horiz-flip MTS - two class variant MTS task where the match templates’ horizontal placement is randomly chosen, but confined within the same vertical plane 6. 2-way stationary vert-motion MTS - two class variant MTS task where the match templates’ vertical position is randomly chosen, but each class is confined to a specific side 7. 2-way stationary vert-motion horiz-flip MTS - two class variant MTS task where the match templates’ positions are completely random 8. 4-way 2-shown MTS - four class variant MTS task where only two class templates are shown on the match screen (appearing with random horizontal location as well) 9. 4-way 2-shown vert-motion MTS - same as above, but with random vertical motion for the templates 10. 4-way 4-shown stationary MTS - four class variant MTS task where all four class templates are shown on the match screen, but with fixed positions. 11. 4-way 4-shown permuted MTS - same as above, but with randomly permuted locations of all match templates 12. Localization - Localization task 13. MS-COCO MTS - 80-way MTS task using the MS-COCO detection challenge dataset, where match screens are randomly samples scenes from the dataset B E XPERIMENT DETAILS AND DATASETS Stimulus-Response Experiment Details: Image categories used are drawn from the Image-Net 2012 ILSVR classification challenge dataset Deng et al. (2009). Four unique object classes are taken from the dataset: Boston Terrier, Monarch Butterfly, Race Car, and Panda Bear. Each class has 1300 unique training instances, and 50 unique validation instances. Match-To-Sample Experiment Details: Sample screen images drawn from the same Image-Net class set as the Stimulus-Response tasks. One face-centered, unobstructed class instance is also drawn from the Image-Net classification challenge set and used as a match screen template image for that class. Class template images for the match screen were held fixed at 100x100 pixels. For all variants of the MTS task, we keep a six pixel buffer between the edges of the screen and the match images, and a twelve pixel buffer between the adjascent edges of the match images themselves. Variants without vertical motion have the match images vertically centered on the screen. Localization Experiment Details: The Localization task uses synthetic images containing a single main salient object placed on a complex background (similar to images used in Yamins & DiCarlo (2016); Yamins et al. (2014)). There are a total of 59 unique classes in this dataset. In contrast to other single-class localization datasets (e.g. Image-Net) which are designed to have one large, face-centered, and centrally-focused object instance and for which a trivial policy of “always poke in image corners” could be learned, this synthetic image set offers larger variance in instance scale, position, and rotation so the agent is forced into learning non-trivial policies requiring larger precision in action selection. MS-COCO MTS Experiment Details This task uses the entire MS-COCO detection challenge dataset Lin et al. (2014). On every timestep, a sample screen chosen from one of the 80 MS-COCO classes. These are constructed to be large, unobstructed, face centered representations of the class. For the match screen, we sample a random scene from MS-COCO containing any number of objects, but containing at least a single instance of the sample class. The agent is rewarded if its action is located inside any instance of the correct class. Both modules use sample actions from a low-temperature Boltzmann policy from eq. (4), which was empirically found to result in more precise reward map prediction. C C.1 M ODULES U NITS P ER L AYER Table S1 aggregates the number of units per layer for the EMS and ablated modules which was used when conducting single-task and task-switching experiments. Only fully-connected modules’ layer sizes are shown here. For details on the convolutional bottleneck EMS module, please refer to C.2. 17 Table S1: Number of units per layer for investigated modules Base-task EMS SR MTS LOC 8 32 128 No symm 8 32 128 No Mult 8 32 128 No None- None- Nonemult/symm Small Med Large 8 8 128 512 32 32 128 512 128 128 512 1024 Normalized Validation AUC 2-way SR 1.0 4-way double binary SR 4-way quadrant SR 0.9 2-way stationary MTS 0.8 2-way vert. motion MTS 0.7 2-way horiz. flip MTS 2-way motion/flip MTS 0.6 4-way 2-shown MTS 0.5 4-way 2-shown vert-motion MTS 0.4 4-way 4-shown stationary MTS 0.3 4-way 4-shown permuted MTS Pa rtia EM S l sy mm No sym No m sym m/p atia l mu lt No Non mult eC ReL u (la rge) Non eR eLu (larg e) Non e eL u (la Non rge) eC ReL u (m ediu No m) mult /sym me No Lu mult /sym mR Non e Lu e eL u (m ediu Non m) eR eLu (me dium Non eC ) ReL u (s mall Non ) e ta nh ( larg No e) mult /sym m ta n h Non e sig (larg No e ) mult /sym ms Non ig eR eLu (sm all) Non e eL u (s mall Non ) e sig (me dium Non e ta ) nh ( med ium Non ) e ta nh ( sma ll) Non e sig (sm all) Localization Figure S1: Exhaustive module performance study of the EMS module and 23 ablation control modules, measured as the Area Under the Curve for all SR, MTS, and LOC task variants. Shown is the AUC normalized to the highest performing module in a task. Results in fig. 4 have further averaged this over the vertical task axis, and report only a salient subset of the ablations. C.2 T HE C ONVOLUTIONAL -EMS M ODULE This is a "Convolutional Bottleneck" extension of the EMS module shown in the paper, where skip connections link the conv5 and the FC6 representation of the visual backbone. Here, the "scenelevel" representation stored in the FC6 ReMaP memory buffer is tiled spatially to match the present convolution dimensions (here 14x14), and concatenated onto its channel dimension. A series of 1x1 convolutions plays the role of a shallow visual bottleneck, before the activations are vectorized and concatenated with A as input to the CReS layers of the standard EMS module. The results in the paper are shown for a bottleneck consisting of a single tanh and two CReS convolutions, with 128 units each. The Downstream layers use 128 units each as well. The motivation for the convolutional bottleneck is that lower-level features are useful for complex spatial tasks such as Localization and Object Detection, and hence may result in a more precise policy. By tiling the entire scene-level representation along the convolution layer’s channel dimension, a form of multiplicative template-matching is possible between objects that must be memorized (e.g. MS-COCO MTS templates) and what is inside the present scene. D E XHAUSTIVE A BLATION S TUDY In all, we investigated 23 distinct ablations on the EMS module, across all twelve task variants outlined in sec A (Fig. S1). Symmetry ablations replace CReS with the activation x 7→ ReLU(x) ⊕ x2 Multiplicative ablations are denoted by specifying the nonlinearity used in place of CReS (where this is one of ReLU, tanh, sigmoid, elu Clevert et al. (2015), or CReLU Shang et al. (2016)). This additionally includes one partial symmetry ablation (denoted “partial symm”) where only the visual bottleneck is symmetric, and one which ablates the ReLU from the “no symm” module (denoted “no symm/partial-mult”). 18 Table S2: Module learning rates EMS Partial symm No symm No symm/partial mult No mult/symm ReLU No mult/symm tanh No mult/symm sig No mult/symm eLU No mult/symm CReLU None ReLU(small) None ReLU(medium) None ReLU(large) None tanh(small) None tanh(medium) None tanh(large) None sig(small) None sig(medium) None sig(large) None eLU(small) None eLU(medium) None eLU(large) None CReLU(small) None CReLU(medium) None CReLU(large) D.1 2-way SR 4-way double binary SR 4-way stationary SR 2-way stationary MTS 2-way vertmotion MTS 2-way horiz flip MTS 2-way motion/flip MTS 4-way 2-shown MTS 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−3 10−3 10−3 10−3 10−3 10−4 5·10−4 5·10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−4 10−4 10−3 10−4 10−4 5·10−4 5·10−4 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−4 10−4 10−3 10−4 10−4 5·10−4 5·10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−4 10−4 10−4 10−4 10−4 5·10−4 5·10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−4 10−4 10−3 10−4 10−4 5·10−4 5·10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−4 10−4 10−3 10−4 10−4 4-way 2-shown vertmotion MTS 5·10−4 5·10−4 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 10−3 10−4 10−4 10−3 10−4 10−4 4-way 4-shown stationary MTS 5·10−4 5·10−4 10−3 10−3 10−3 10−4 10−4 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−3 10−3 10−4 10−3 10−3 10−4 4-way 4-shown permuted MTS LOC 5·10−4 5·10−4 2·10−4 2·10−4 10−3 10−4 10−4 10−3 10−3 10−3 10−4 10−4 10−4 10−4 10−4 10−3 10−4 10−4 10−3 10−4 10−4 10−3 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 10−4 H YPERPARAMETERS Learning rates for the ADAM optimizer were chosen on a per-task basis through cross-validation on a grid between [10−4 ,10−3 ] for each architecture. Values used in the present study may be seen in Table S2. E A DDITIONAL MS-COCO R EWARD M APS Five additional reward map examples for the MS-COCO MTS task are provided in in Figure S2. Examples are plotted over the course of learning. F F.1 A DDITIONAL L EARNING C URVES S INGLE -TASK A BLATION E XPERIMENTS Learning trajectories for seven additional tasks are provided in Figure S3. Modules capable of convergence on a task were run until this was acheived, but AUC values for a given task are calculated at the point in time when the majority of models converge. F.2 DYNAMIC VOTING C ONTROLLER AND EMS MODULE TASK -S WITCHING E XPERIMENTS Additional trajectories for ten unshown switching curves are provided in Figure S4. G G.1 DYNAMIC VOTING C ONTROLLER AUGMENTATIONS L EARNABLE PARAMETER I NITIALIZATIONS Here we describe the weight initialization scheme that was found to be optimal for use with the dynamic voting controller. For simplicity, consider the layer-voting mechanism, with learnable 19 Sample Match Reward Maps 64 128 704 1344 1984 64 128 704 1344 1984 64 704 1984 2624 3904 64 704 1344 2176 3904 64 704 1344 6016 Training episode (in thousands) 8384 Figure S2: Examples of the emergence of decision interfaces in MSCOCO MTS Reward map predictions over the course of training for 5 different object classes. 20 Reward 2-way SR 4-way double binary SR 2-way stationary MTS 2-way horiz-flip MTS 2-way vert-motion MTS 4-way 2-shown MTS 4-way 4-shown stationary MTS EMS No symm No mult None (large) No mult/symm None (medium) None (small) Training Episodes Figure S3: Additional Single-task performance ablation Learning curves. Seven learning curves shown for task variants not seen in the main text body. Shown are the same ablations as the main text. 21 2-way SR to 4-way double binary SR 2-way stationary MTS to 2-way stationary MTS new classes 2-way SR to 2-way stationary MTS 2-way stationary MTS to 2-way SR 2-way stationary MTS to 2-way vert-motion horiz-flip MTS 2-way vert-motion horiz-flip MTS to 4-way 2-shown vert-motion MTS 4-way 2-shown vert-motion MTS to 4-way 4-shown permuted MTS 4-way double binary SR to 4-way 4-shown stationary MTS 4-way double binary SR to 4-way quadrant SR Reward 2-way SR to 2-way SR new classes EMS Single-Unit Voting Layer Voting 22 Training Episodes weight matricies W i and biases bi . The intended biasing scheme is achieved through initializing the elements of these parameters to:  0 if i = 1, ω < Ω  |N (µ , 0.001)| i 1 Wω ∼ |N (µ , 0.001)| if i > 1, ω < Ω   |N (0.01, 0.001)| if ω = Ω  0  b biω = b1   0.1 (10) if i = 1, ω < Ω if i > 1, ω < Ω if ω = Ω (11) This initialization technique was also generalized for use with the single-unit voting mechanism. For the switching experiments presented in section § 4.2, we sweep the hyperparameters on a narrow band around the default scheme. The ranges for these are: µ0 ∈ [0.01, 0.005] , b0 ∈ [0.1, 0.01] , µ1 ∈ [0.01, 0.02] , and b1 ∈ [0.1, 0.2, 0.5, 1.0]. G.2 TARGETED T RANSFORMATIONS Two additional switching mechanisms were added to the controller to augment its ability to switch between taks which are remappings of the action space or reward policy of a preexisting module. G.2.1 ACTION T RANSFORMATIONS we note that efficient modules are those which can effectively produce a minimal representation of the interaction between action space A and observation xt . If the agent’s optimal action space shifts to A0 while the remainder of the task context remains fixed, the controller should allow for rapid targeted remapping A 7→ A0 . Since we formulate the modules as ReMaP Networks, and A is an input feature basis, we can achieve remappings of this form through a fully-connected transformation: a0τ = f (Wa aτ + b) (12) where aτ = [ht−kb:t−1 , at ] is the vector of action histories, and Wa and b embed aτ into new action space A0 using only a small number of learnable parameters. Pseudo Identity-Preserving Transformation In practice, we initialize the parameters in eq. (12) such that the transformation is pseudo identity-preseving, meaning that the representation learned at this level in the original module is not destroyed prior to transfer. This is done by initializing Wa to be an identity matrix I|aτ | with a small amount of Gaussian noise  ∼ N (0.0, σ 2 ) added to break symmetry. b is initialized to be a vector of ones of size |aτ |. G.2.2 R EWARD M AP T RANSFORMATIONS Each of the kf maps mt (x) reflects the agent’s uncertainty in the environment’s reward policy. If the task context remains stationary, but the environment transitions to new reward schedule R0 that no longer aligns with the module’s policy π, the controller could to this transition by e.g. containing a mechanism allowing for targeted transformation of m(x) and hence also π. One complication that arises under ReMaP is that since each task-module learns its optimal action space internally, m(x) are in the basis of R rather than A. Therefore, transformations on the map distribution must also re-encode A before mapping to R0 . In this work, we investigate a shallow “adapter” neural network that lives on top of the existing module and maps R 7→ R0 . Its first and second layers are defined by l1 (x) = f (W1 [m(x) g(aτ ), aτ ] + b1 m(x)0 ∝ W2 l1 + b2 23 (13) (14) where g(aτ ) is a similar transformation on A as above, denotes elementwise multiplication, W1 is a 0 learnable matrix embedding into a hidden state, and W2 ∈ R|l1 |×|R | is a learnable matrix embedding into R0 Pseudo Identity-Preserving Transformation Similar to the transformation on the action space, we modify the reward-map transformation to be pseudo identity-preserving as well. This is done by modifying eq. (13) such that the original maps are concatenated on to the beginning of the transformation input vector: l1 (x) = f (W1 [m(x), m(x) g(aτ ), aτ ] + b1 The intended map-preserving transformation is accomplished via initializing W1 and W2 as:  1.0 + N (0.0, ) if i = j, i < R W (i,j) ∼ N (0.0, ) otherwise G.3 (15) (16) TARGETED T RANSFORMATION H YPERPARAMETERS Both of the targeted transformations have several hyperparameters. We conducted a grid search to optimize these in a cross-validated fashion, on a set of test task switches designed to be solved by one of the targeted transformations (Fig. S5). Each was conducted independently of the dynamic voting controller, and independently of the other transformation. Optimal hyperparameters found in these experiments were fixed for use in the integrated dynamic voting controller, and were not further optimized afterwards. Action Transformation Hyperparameters We conducted three tests using the stimulus-response paradigm: class reversal (in which the left class becomes the right class and vice-versa), a horizontal rotation of the reward boundaries (such that right becomes up and left becomes down), and a “switch” to the original task (intended to test the identity-preserving component). In this work, we find that a single, non-activated linear transformation (f in (12)) is optimal for this new state-space embedding, using kb ∗ 2 units, and initialized such that the idendity-preserving transformation weights have σ = 0.01. The learning rate for this transformation was found to be optimal at 0.1. Reward Map Transformation Hyperparameters We conducted two tests using the stimulusresponse paradigm: a “squeezing” task (where there is no longer any reward dispensed on the lower half of the screen), and a “switch” to the original task (intended to test the identity-preserving component). In this work, we find the optimal activations in eq. (15) to be f (·) = CReS and g(·) = ReLU, with 4 units in the hidden layer.  in the weight initialization scheme was found optimal at 0.001, and an initial bias of 0.01. The optimal learning rate for this transformation was found to be 0.01. G.4 T RANSFORM A BLATION A study was conducted to determine the relative benefit of the targeted transformations (Fig. S6), where it was determined that the primary contribution of the dynamic neural controller was in fact the voting mechanism (although the transformations did supplement this as well). G.5 D EPLOYMENT SCHEME OF TASK MODULES When cued into task transition, the controller freezes the learnable parameters of the old task-module, and deploys a new unitialized task-module. The controller then initializes the action and reward map transformation networks as described in G.2 on top of the old module. These transformations are also voted on inside the dynamic neural controller at every timestep. H S WITCHING M ETRICS Figure S7 graphically illustrates the metrics used inside the paper to quantify switching performance: RGain and T Gain. 24 a Environment Reward Policy Reversal Stimulus-Response image: Task Switch reward map: Training Trials b Environment Reward Policy Rotation Stimulus-Response image: Task Switch reward map: Training Trials c Environment Reward Policy Squeeze Stimulus-Response image: Task Switch reward map: Training Trials Figure S5: Action and reward map transformation switch examples. Three task switching experiments were performed to optimize the hyperparameters of the targeted transformations that augment the dynamic neural voting controller. These switches are also retested in the fully-integrated meta-controller and shown in the original switching result figure. a. Binary stimulus-response class reversals, where the left class becomes the right class, and vice-versa. b. Rotations of the binary stimulus-response reward boundaries. c. A “squeezing” of the binary stimulus-response reward boundaries, where no reward is given on the new task on the bottom half of the screen, regardless of class shown. 25 Relative AUC Gain 0.5 0.4 0.3 0.2 0.1 0.0 −0.1 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Figure S6: Targeted controller transform ablation. Relative AUC Gain for the EMS module over the same switching snearios in the paper, but with the targeted transformations ablated. 1.0 0.9 Reward 0.8 TGain = Δmax Δmax tΔ max 0.7 RGain = 0.6 0.5 tΔ AUC( t) AUC(Bt ) max 5 10 15 20 25 30 40 Training episodes Figure S7: Illustration of switching performance metrics. We quantify the switching performance of the dynamic neural controller and task-modules by two metrics: “relative gain in AUC” (ratio of green to purple shaded regions), and “transfer” gain (difference of reward at T∆max ). Relative AUC measures the overall gain relative to scratch, and the transfer gain measures the speed of transfer. Curve shown is the EMS module with Single-Unit voting method evaluated on a switch from a 4-way MTS task with two randomly moving class templates to a 4-way MTS task with four randomly moving templates. 26
2cs.AI
Smooth backfitting of proportional hazards – A new approach projecting survival data Munir Hiabu Cass Business School, City University London, U.K. arXiv:1707.04622v1 [math.ST] 14 Jul 2017 E-mail: [email protected] Enno Mammen Heidelberg University, Germany E-mail: [email protected] Marı́a Dolores Martı́nez-Miranda Cass Business School, City University London, U.K. E-mail: [email protected] Jens Perch Nielsen Cass Business School, City University London, U.K. E-mail: [email protected] Summary. Smooth backfitting has proven to have a number of theoretical and practical advantages in structured regression. Smooth backfitting projects the data down onto the structured space of interest providing a direct link between data and estimator. This paper introduces the ideas of smooth backfitting to survival analysis in a proportional hazard model, where we assume an underlying conditional hazard with multiplicative components. We develop asymptotic theory for the estimator and we use the smooth backfitter in a practical application, where we extend recent advances of in-sample forecasting methodology by allowing more information to be incorporated, while still obeying the structured requirements of in-sample forecasting. Keywords: Aalen’s multiplicative model; Local linear kernel estimation; Survival data; In-sample forecasting. 1. Introduction Purely unconstrained nonparametric models suffer from the curse of dimensionality in high dimensional data spaces. Most often, some structure has to be introduced to stabilize the system and to allow to visualize, interpret, extrapolate and forecast the properties of the underlying data. The smooth backfitting algorithm of Mammen et al. (1999) considered the simplest nonparametric structure in the regression context - the additive structure - and it has been a successful update of kernel smoothing regression backfitting algorithms with many theoretical and practical advantages to earlier approaches of regression backfitting. The still to this day popular regression backfitting algorithms of Hastie and Tibshirani (1990) are numerical iterating-procedures estimating one component given the estimates of 2 Hiabu et al. the rest. In contrast the smooth backfitter is a direct projection of the data down onto the structured space of interest. This direct relationship between data and estimates gives a more solid grip on what is being estimated and the theoretical properties underlying it, see also Nielsen and Sperlich (2005). The purpose of this paper is to introduce smooth backfitting to the field of survival analysis and nonparametric smooth hazard estimation. While the additive structure is the most natural and most widely used in regression, the multiplicative structure seems more natural in hazard estimation. The omnipresent Cox regression model is a proportional hazard model and many extensions and alternatives to the Cox hazard model have been formulated in a multiplicative framework. We have therefore chosen the multiplicative hazard structure as the natural place to start when introducing smooth backfitting to survival analysis. Smooth multiplicative backfitting is theoretically more challenging than additive smooth backfitting. The smooth backfitting multiplicative regression structure was analysed in detail by Yu et al. (2008) as a special case of general additive models. Yu et al. (2008) proved that the multiplicative structure - in contrast to the simpler additive regression models - provides asymptotic theory with a number of non-trivial interactions between exposure available in different directions. Naturally, the asymptotics provided here for smooth backfitting of multiplicative hazards contain similar interactive components in the asymptotic theory. We are able to provide a simple algorithm first projecting the data down onto an unconstrained estimator, and then further projecting the unconstrained estimator down onto the multiplicative space of interest. Our numerical algorithms are greatly simplified by a new principle of weighting the projection according to the final estimates. Let Z = (Z1 , . . . , Zd ) be a d-dimensional covariate process observed as long as our observed object is under exposure. We are interested in the conditional hazard of a nonnegative random variable T α(t|Z) = lim h−1 Pr [T ∈ [t, t + h)| T ≥ t, {Z(s), s ≤ t}] . (1) α(t|Z) = α(t, Z(t)), (2) h↓0 We assume that where α is some unknown smooth function depending on the time t and the value of the covariate at only the time point t. In many cases, T might be subject to some filtering. Filtered observations are present in a vast variety of topics including right censoring in experimental studies like clinical trials or left truncation in insurance loss data. A first version of the non-parametric model (2) was introduced in Beran (1981) where the author only considered time independent covariates and a filtering scheme of only right censoring. Dabrowska (1987) showed weak convergence of the estimator presented there. The more general model with time dependent covariates and also more general filtering patterns were analysed in McKeague and Utikal (1990) and Nielsen and Linton (1995) as part of a counting process model. The estimator of Nielsen and Linton (1995) was identified as the natural local constant estimator in this context and also generalized to the local linear estimator in Nielsen (1998). We observe n independent and identically distributed copies of the process (N, Y, Z), where Y is a predictable process and N a counting process with intensity λ(t) = α(t, Z(t))Y (t), (3) Smooth backfitting of proportional hazards 3 The multiplicative intensity assumption (3) of the counting process is known as Aalen’s multiplicative intensity model. Andersen et al. (1993) give a comprehensive overview of how to embed various survival data models into this counting process formulation. In Section 2.1, we show how to embed left truncation and right censoring. Non-parametric approaches like (2) and (3) are attractive because of the minimal assumptions on the underlying model compared to for example a fully parametric approach. However, estimation accuracy decreases rapidly with the number of dimensions - also known as curse of dimensionality - a weakness that can be overcome by introducing assumptions of separable structures on the underlying hazard, see also Stone (1985). In this paper we assume that the conditional hazard is multiplicative i.e. α(t, z) = α0 (t)α1 (z1 ) · · · αd (zd ). (4) Algorithms for kernel smoothing of (4) have been provided in Hastie and Tibshirani (1990) and Fan et al. (1997) and most recently in Lin et al. (2016). Kernel smoothing within the model framework (4) was first analysed in the filtered survival context in Linton et al. (2003) who based their approach on the principle of marginal integration Linton and Nielsen (1995). Marginal integration, however, requires a rectangular support of the data. The data example of this paper is taken from the non-life insurance challenge of estimating outstanding liabilities. This data has triangular support and the approach of Linton et al. (2003) is therefore not feasible. We show in Section 4 that our smooth projection approach - that directly links the data to the underlying multiplicative structure - also works on triangle support as our data example requires. In Section 2 the underlying survival model is set up. In Section 3 it is first pointed out that unconstrained multidimensional hazard estimators can be considered to be ratios of smooth occurrence and smooth exposure. This is unlike regression, where only the local constant Nadaraya-Watson estimator exhibits this simple structure. Secondly, the smooth backfitting estimator is defined as a projection of any unconstrained hazard estimator that enjoys the simple ratio structure. In section 4 the asymptotic properties are given for the smooth backfitting estimator defined in Section 3 and general sufficient conditions are given for the asymptotic properties of the unconstrained smooth occurrence and unconstrained smooth exposure that our smooth backfitter is based on. In Section 5 we consider a sophisticated version of in-sample forecasting enabled by our new smooth backfitter. We introduce a smooth extension of the popular actuarial chain ladder model. In-sample forecasting is possible because of the imposed multiplicative structure. In the concluding Section 6 we point out that while multiplicative hazard estimation is a natural place to start, other hazard structures might be interesting to consider in the future. Martinussen and Scheike (2006) for example consider a rich class of additive and combined additive and multiplicative structures that could be interesting to explore in future work. Most of the proofs are deferred to the Appendix. 2. Aalen’s multiplicative intensity model We consider Aalen’s multiplicative intensity model that allows for very general observations schemes. It covers filtered observations arising from left truncation and right censoring but also more complicated patterns of occurrence and exposure. In the next section we describe 4 Hiabu et al. how to embed left truncation and right censoring into this framework. In contrast to Linton et al. (2003) we will hereby allow the filtering to be correlated to the survival time and be represented in the covariate process. We briefly summarize the general model we are assuming. We observe n iid copies of the stochastic processes (N (t), Y (t), Z(t)), t ∈ [0, R0 ], R0 > 0. Here, N denotes a right-continuous counting process which is zero at time zero and has jumps of size one. The process Y is left-continuous and takes values in {0, 1} where the value 1 indicates that the individual is under risk. Finally, Z is a d-dimensional left-continuous Q covariate process with values in a rectangle dj=1 [0, Rj ] ⊂ Rd .The multivariate process ((N1 , Y1 , Z1 ), . . . , (Nn , Yn , Zn )), i = 1, . . . , n, is adapted to the filtration Ft which satisfies the usual conditions. Now we assume that Ni satisfies Aalen’s multiplicative intensity model, that is λi (t) = lim h−1 E[Ni ((t + h)−) − Ni (t−)| Ft− ] = α(t, Zi (t))Yi (t). h↓0 (5) The deterministic function α(t, z) is called hazard function and it is the failure rate of an individual at time t given the covariate Z(t) = z. 2.1. Left truncation and right censoring time as covariates The most prominent example for Aalen’s multiplicative intensity model is filtered observation due to left truncation and right censoring. We now show how to embed model (2) with covariate, Z, possibly carrying truncation and censoring information into Aalen’s multiplicative intensity model. Every covariate coordinate can carry individual truncation information as long as it corresponds to left truncation. That is, we observe (T, Z) if and only if (T, Z(T )) ∈ I, where the set I is compact and it holds that if (t1 , Z(t1 )) ∈ I and t2 ≥ t1 , then (t2 , Z(t2 )) ∈ I, a.s. The set I is allowed to be random but is independent of T given the covariate process Z. Furthermore, T can be subject to right censoring with censoring time C. We assume that also T and C are conditional independent given the covariate process Z. This includes the case where the censoring time equals one covariate coordinate. In conclusion, we observe n iid copies of (Te, Z ∗ , I, δ), where δ = 1(T ∗ < C), Te = min(T ∗ , C), and (T ∗ , Z ∗ ) is the truncated version of (T, Z), i.e, (T ∗ , Z ∗ ) arises from (T, Z) by conditioning on the event (T, Z(T )) ∈ I. Then, for each subject, i = 1, . . . , n, we can define a counting process Ni as n o Ni (t) = 1 Tei ≤ t, δi = 1 ,    ∗ e with respect to the filtration Fi,t = σ Ti ≤ s, Zi (s), Ii , δi : s ≤ t ∪ N , where N is a class of null-sets that completes the filtration. After straightforward computations one can conclude that under the setting above, including (2), Aalen’s multiplicative intensity model is satisfied with αz (t) = α(t, z) = lim h−1 Pr{Ti ∈ [t, t + h)| Ti ≥ t, Zi (t) = z}, h↓0  ∗ Yi (t) = 1 (t, Zi (t)) ∈ Ii , t ≤ Tei . Smooth backfitting of proportional hazards 3. 5 The smooth backfitting estimator of multiplicative hazards We describe the smooth backfitting problem in two steps. First the data is projected down onto an unconstrained space resulting in an unconstrained estimator. Secondly this unconstrained estimator is projected down onto the multiplicative space of interest. We first show that both a local constant and a local linear projection in the first step lead to estimators that are simple ratios of smoothed occurrence and smoothed exposure. This resembles the simple structure known from the local constant Nadaraya-Watson estimator in regression, however, local linear regression does not satisfy this simple structure. This is the background for our approach of being able to derive general underlying conditions for our smooth backfitter to work the encompass both local constant and local linear estimators. In fact it encompasses all estimators with the simple ratio structure including all local polynomial kernel hazard estimators and other situations, where the unconstrained estimator can be expressed as such simple ratio. 3.1. First step: projecting the data down onto the unstructured space resulting in an unconstrained estimator In this section we concentrate on the local constant and local linear estimators defined inNielsen (1998) as a projection of the data down onto the unconstrained space. We notice that both these two estimators can be expressed as a ratio of a smoothed occurrence and a smoothed exposure. This will be important in the next section where the unconstrained estimator is projected further down to the multiplicative space of interest. We introduce the notation Xi (t) = (t, Zi (t)). We also set x = (t, z), with coordinates x0 = t, x1 = z1 , . . . , xd = zd , and write the hazard as α(t, z) = α(x). To estimate the components of the structured hazard in (7) below, we will need an unstructured pilot estimator of the hazard α first. We propose the local linear kernel estimator, α̂LL (x), based on least squares (cf. Nielsen (1998)). Its value in x is defined as the solution θb0 in the equation θb0 θb1 ! n Z X " Z 2 1 s+ε T dNi (u) − θ0 − θ1 (x − Xi (s)) = arg min lim ε s θ0 ∈R,θ1 ∈Rd+1 ε→0 i=1  Z s+ε 2 # 1 − Kb (x − Xi (s))Yi (s) ds. dNi (u) ε s (6) Q In the following, we restrict ourselves to a multiplicative kernel K(u0 , . . . , ud ) = dj=0 k(uj ), Q and a one-dimensional bandwidth b, with Kb (u) = dj=0 b−1 k(b−1 uj ), where for simplicity of notation the bandwidth b does not depend on j. More general choices would have been possible with the cost of extra notation. The local linear estimator includes boundary corrections so that the bias is of same order at the boundary as in the interior of the support, namely O(b2 ), or for the more general case of varying bandwidths we do not consider here, O(max1≤j≤d+1 b2j ). The local constant estimator achieves only slower rates at the boundary region and local polynomial estimators of higher order, like in regression, have the usual 6 Hiabu et al. drawback known from higher order kernels, that they perform poorly as long as sample sizes are not very large. The solution of the least square minimisation (6) can be rewritten as the ratio of smooth estimators of the number of occurrence and the exposure, see Gámiz et al. (2013) for details. b LL (x) = n−1 O n Z X  1 − (x − Xi (s))D(x)−1 c1 (x) Kb (x − Xi (s))dNi (s), i=1 b LL (x) = n E n Z X  −1 1 − (x − Xi (s))D(x)−1 c1 (x) Kb (x − Xi (s))Yi (s)ds, i=1 where the components of the (d + 1)−dimensional vector c1 are c1j (x) = n −1 n Z X Kb (x − Xi (s))(xj − Xij (s))Yi (s)ds, j = 0, . . . , d, i=1 and the entries (djk ) of the (d + 1) × (d + 1)−dimensional matrix D(x) are given by djk (x) = n −1 n Z X Kb (x − Xi (s))(xj − Xij (s))(xk − Xik (s))Yi (s)ds. i=1 b LL (x)/E b LL (x). Compare this The local linear estimator is then defined as α bLL (x) = O estimator with the local constant version that can be defined as a similar ratio, α bLC (x) = b LC (x)/E b LC (x), but with smoothed occurrence and smoothed exposure given by O b LC (x) = κn (x) O b LC (x) = κn (x) E n Z X i=1 n Z X Kb (x − Xi (s))dNi (s), Kb (x − Xi (s))Yi (s)ds, i=1 Z κn (x) = −1 Kb (x − u) du . Under standard smoothing conditions, if b is chosen of order n−1/(4+d+1) , then the bias of and α bLC (x) is of order n−2/(4+d+1) and the variance is of order n−4/(4+d+1) , which is the optimal rate of convergence in the corresponding regression problem, see Stone (1982). For an asymptotic theory of these estimators see Linton et al. (2003). α bLL (x) 3.2. Structured smooth backfitting estimator via solution-weighted minimization In this section we will project the unconstrained estimator of the previous section down onto the multiplicative space of interest. Due to filtering, observations are assumed to Q be only available on a subset of the full support, X ⊆ R = dj=0 [0, Rj ]. Our estimators are restricted to this set and assumptions on X and the data generating functions are Smooth backfitting of proportional hazards 7 given in the next section. Our calculations simplify via a new principle we call solutionweighted minimization. We assume that we have the solution and use it strategically in the least squares weighting. While the procedure is not directly feasible to compute, it is made feasible by defining it as an iterative procedure. In the sequel we will assume a multiplicative structure of the hazard α, i.e., α(x) = α∗ d Y αj (xj ), (7) j=0 where αj , j = 0, . . . , d, are some functions and α∗ is a constant. For identifiability of the components, we make the following further assumption: Z αj (xj )wj (xj ) dxj = 1, j = 0, . . . , d, where wj is some weight function. We also need the following notation: Ft (z) = P r (Z1 (t) ≤ z| Y1 (t) = 1) , y(t) = E[Y1 (t)]. By denoting ft (z) the density corresponding to Ft (z) with respect to the Lebesgue measure, we also define E(x) = ft (z)y(t) and O(x) = E(x)α(x). We define the estimators α b∗ and α b = (α b0 , . . . , α bd ) of the hazard components in (7) as solution of the following system of equations: R b Xxk O(x)dx−k k = 0, . . . , d, (8) α bk (xk ) = R Q b b∗ j6=k α bj (xj )E(x)dx −k Xxk α Z α bk (xk )wk (xk ) dxk = 1, k = 0, . . . , d. (9) Here Xxk denotes the set {(x0 , . . . , xk−1 , xk+1 , . . . , xd )| (x0 , . . . , xd ) ∈ X }, and b and O b are some full-dimensional esx−k = (x0 , . . . , xk−1 , xk+1 , . . . , xd ). Furthermore, E timators of E and O. We will discuss below that the system above has a solution with probability tending to one. In the next section we will show asymptotic properties of the b and estimator. We will see that we do not require that the full-dimensional estimators E b O are consistent. We will only need asymptotic consistency of marginal averages of the estimators, see below. This already highlights that our estimator efficiently circumvents the curse of dimensionality. In practice, system (8) can be solved by the following iterative procedure: R b Xxk O(x)dx−k (r+1) , k = 0, . . . , d (10) α bk (xk ) = R Qk−1 (r+1) Q (r) b α b (xj ) d+1 α b (xj )E(x)dx −k Xxk j=0 j j=k+1 j 8 Hiabu et al. After a finite number of cycles or after a termination criterion applies, the last values of (r+1) α bk (xk ), k = 0, ..., d, are multiplied by a factor such that the constraint (9) is fulfilled with the above choice of wk (xk ). This can always be achieved by multiplication with constants. This gives the backfitting approximations of α bk (xk ) for k = 0, ..., d. The estimator α b can be motivated as a weighted least squares estimator with random data-adaptive weights. To see this consider the estimator α = (α∗ , α0 , . . . , αd ) that minimizes  2 Z  d  Y min αj (xj ) w(x)dx, α e(x) − α∗ (11) α  X  j=0 b b where w(x) is some weighting and α e(x) = O(x)/ E(x) is an unconstrained full-dimensional estimator of α. This gives R Q e(x) dj=0 αj (xj )w(x)dx X α ∗ α = R nQ , o2 d w(x)dx j=0 αj (xj ) X and (α0 , . . . , αd ) can be described via the backfitting equation R Q e(x) j6=k αj (xj )w(x)dx−k Xxk α , k = 0, . . . , d. αk (xk ) = R nQ o2 ∗ w(x)dx−k j6=k αj (xj ) Xx α (12) k The asymptotic variance of kernel estimators of α is proportional to α(x)/E(x), see e.g. Linton and Nielsen (1995). This motivates the choice w(x) = E(x)/α(x). However, this choice is not possible because E(x) and α(x) are unknown. One could use w(x) = Ě(x)/α̌(x) where Ě(x) and α̌(x) are some pilot estimators of E and α. We follow another idea and we propose to weight the minimization (11) with its solution. We choose b E(x) w(x) = Q , bi (x) iα (13) and heuristically, by putting αj = α bj and by plugging (13) into (12), we get (8). The next section discusses existence and asymptotic properties of the solution α bj of (8). 4. Asymptotic properties of the smooth backfitter of multiplicative hazards The estimator α bj is defined as solution of a nonlinear operator equation. We are going to approximate this equation by a linear equation that can be interpreted as equation that arises in nonparametric additive regression models, and then show that the solution of the linear equation approximates α bj . The linear equation and its solution is well understood from the theory of additive models. This will be our essential step to arrive at an asymptotic understanding of our estimator α bj . Assumptions [A1]-[A7] below and [B1]-[B7] are of standard nature in marker dependent hazard papers and can be verified for the local constant Smooth backfitting of proportional hazards 9 and local linear estimators we are interested, see in particular Nielsen and Linton (1995), Nielsen (1998) and Linton et al. (2003) for related calculations. However, one should notice that the conditions are not restricted to the local constant or local linear smoothers. They are not even tight to kernel smoothers. Any smoother could be used as long as it obeys the structure of being a ratio of a smoothed occurrence and a smoothed exposure. For our main theorem we make the following assumptions. We hereby do not make assumptions on the full support R but only on a subset X ⊆ R. We will make use of the following notations: Xxj has been defined after equation (8) and Xxj ,xk denotes the set {(xl : l ∈ {0, ..., d}\{j, k})| (x0 , . . . , xd ) ∈ X }. Furthermore, we define Xk = {xk | (x0 , . . . , xd ) ∈ X for some values of (xl : l 6= k)}, Xj,k = {(xj , xk )| (x0 , . . . , xd ) ∈ X for some values of (xl : l 6∈ {j, k})}, and Xj(xk ) = {xj | (x0 , . . . , xd ) ∈ X for some values of (xl : l 6∈ {j, k})}. A1 The function E(x) is two times continuously differentiable for x ∈ X and inf x∈X E(x) > 0. A2 The hazard α is two times continuously differentiable for x ∈ X and inf x∈X α(x) > 0. A3 The kernel K has compact support which is without loss of generality supposed to be [−1, 1]. Furthermore it is symmetric and continuous. A4 It holds that nb5 → cb for a constant 0 < cb < ∞ as n → ∞. A5 It holds that Z 1 dxj dxk < ∞ Xj,k Oj (xj )Ok (xk ) R Q for j, k = 0, ..., d, j 6= k, where Oj (xj ) = O(x) dx−j and O(x) = α∗ dj=0 αj (xj )E(x). R A6 It holds that the two-dimensional marginal occurences Oj,k (xj , xk ) = O(x) dx−(j,k) are bounded from above and bounded away from 0. A7 For some δ > 0 it holds that for j, k = 0, ..., d, j 6= k Z 1 dxj dxk < ∞, 1+δ (xj )Ok (xk ) Xj,k Oj Z 1 sup dxj < ∞, 1−δ (xj )Ok (xk ) xk ∈Xk Xj(xk ) Oj Z 1 sup dxj < ∞. 1/2 1/2 xk ∈Xk Xj(xk ) O j (xj )Ok (xk ) Note that assumptions [A1]-[A4] are standard in kernel smoothing theory. In Assumptions [A5] and [A6] we only assume that the two-dimensional marginal occurrences of O are bounded from above and bounded away from 0, but we do not make the assumption that the one-dimensional marginal occurrences have this property. This allows that the support of a two-dimensional marginal density Ojk has a triangular shape {(xj , xk ) : xj +xk ≤ c; xj , xk ≥ 0} for some constant c > 0. This can be easily seen. Suppose for simplicity that Ojk is the 10 Hiabu et al. uniform density on the triangle. Then Oj (xj ) = 2c−2 (c − xj )+ and Ok (xk ) = 2c−2 (c − xk )+ and we have Z Z 1 1 π2 2 dx dx = < ∞. dxj dxk = j k 2 Oj (xj )Ok (xk ) 3c2 xj +xk ≤c; xj ,xk ≥0 c (c − xj )(c − xk ) Thus, our assumption [A5] on one-dimensional marginals is fulfilled. One can easily verify that also [A7] holds for this example. This discussion can be extended to other shapes of two-dimensional marginals that differ from rectangular supports. Note also that [A5] and [A7] trivially hold if the one-dimensional marginal Oj are bounded away from zero. The solutions α b0 , . . . , α bd of (8) can be rewritten as solutions of Z Z b O(x)dx −k − Xxk Xxk α b ∗ d Y b α bj (xj )E(x)dx −k = 0, k = 0, . . . , d. j=0 R R Q Since, Xx O(x)dx−k − Xx α∗ dj=0 αj (xj )E(x)dx−k = 0, the difference of those two zerok k terms is zero as well, and we have   Z d d   Y Y b b k (xk ) − αj (xj ) E(x)dx α bj (xj ) − α∗ α b∗ 0=∆ −k  Xxk  j=0 j=0   Z d d Y Y ∗ ∗ b b b b   αj (xj )E(x)dx (14) = ∆k (xk ) − (1 + δ ) {1 + δj (xj )} − 1 α −k , Xxk j=0 j=0 where Z Z n o b O(x) − O(x) dx−k − b k (xk ) = ∆ Xxk Xxk α ∗ d Y b αj (xj ){E(x) − E(x)}dx−k , j=0 α bj (xj ) − αj (xj ) δbj (xj ) = , αj (xj ) α b ∗ − α∗ δb∗ = . α∗ Note that δb is defined as a root of a non-linear operator. Motivated by (14), we define an ∗ approximation, δ and δ j (xj ) (0 ≤ j ≤ d), as solution of the linear equation   Z d d X Y ∗ b b δ + δ j (xj ) α∗ αj (xj )E(x)dx (15) −k = ∆k (xk ) Xxk under the constraint R j=0 j=0 δ k (xk )ωk (xk )dxk = 0 where ωk (xk ) = Z Y d j=0 b αj (xj )E(x)dx −k . Smooth backfitting of proportional hazards 11 R Qd b This is equal to the constraint (9) for the choice wk (xk ) = j=0 αj (xj )E(x)dx−k /(αk (xk ) R Qd b j=0 αj (xj )E(x)dx). Under this constraint one has that o R n R Q b b − E(x)}dx O(x) − O(x) dx − X α∗ dj=0 αj (xj ){E(x) X ∗ . δ = R Q b α∗ d αj (xj )E(x)dx j=0 X Note that the norming of the constraint cannot be used in practice because α is unknown but it will simplify the theoretical discussion and the results can be carried over to feasible weighting. Equation (15) can be rewritten as an integral equation of the second kind XZ ∗ δ k (xk ) + π bk,j (xk , xj )δ j (xj )dxj = µ bk (xk ) − δ , j6=k Xj(xk ) with e O(x) = α∗ d Y αj (xj )Ê(x), j=0 Z e e Oj,k (xj , xk ) = O(x) dx−(j,k) , Z ek (xk ) = O(x) e O dx−k , π bk,j (xk , xj ) = µ bk (xk ) = ej,k (xj , xk ) O , ek (xk ) O b k (xk ) ∆ . ek (xk ) O Note that all these functions depend on n. The integral equation can also be simply written ∗ bδ = µ b − δ with δ = (δ 0 , ..., δ d )| , where π b is the integral operator with kernel π bk,j . as δ + π b Before we come to this point we state a proposition We will show that δ approximates δ. that gives the asymptotics for δ . b and O. b We decompose For the next results we need some conditions on the estimators E A B C µ bk into three terms, µ bk = µ bk + µ bk + µ bk , which depend on n. For some deterministic functions O∗ (x) and E ∗ (x) these terms are defined as: n o n o R R Q b b − Xx α∗ dj=0 αj (xj ) E(x) − E ∗ (x) dx−k + Xx O(x) − O∗ (x) dx−k k k , µ bA k (xk ) = ek (xk ) O R R Q − Xx α∗ dj=0 αj (xj ) {E ∗ (x) − E(x)} dx−k + Xx {O∗ (x) − O(x)} dx−k k k µ bB , k (xk ) = Ok (xk ) # " O (x ) k k µ bC −1 µ bB k (xk ) = k (xk ). ek (xk ) O 12 Hiabu et al. ∗ ∗ Note that µ bB k are deterministic functions. Typical choices of O (x) and E (x) are the A b b expectations of E(x) and O(x). Then µ bk (xk ) is the stochastic part of a one-dimensional B smoother and µ bk (xk ) is its bias. Both terms are well understood and can be easily treated by standard smoothing theory. We now want to develop an asymptotic theory for the estimators α̂j where their asymptotic properties are described by the properties of µ bA k (xk ) R r ∗,r B bk (xk )Ok (xk ) dxk and µ bk (xk ). We use the following normings of these quantities: µk = µ R r ek (xk ) dxk for r ∈ {A, B, C}. for r ∈ {A, B, C} and µ∗,r,n = µ bk (xk )O k We assume that with R Qd l=0 αl (xl )E(x)dx−(k,j) πk,j (xk , xj ) = R Q d l=0 αl (xl )E(x)dx−k the following assumptions hold: R e 2 dx = OP (1) and B1 It holds that O(x) ej,k (xj , xk ) − Oj,k (xj , xk ) = oP ((log n)−1 ) O R uniformly over 0 ≤ j < k ≤ d and xj , xk , where Oj,k (xj , xk ) = O(x) dx−(j,k) . B2 1/2 −1/5 sup |Oj (xj )µ bA ) j (xj )| = oP (n xj and 1/2 −1/5 sup |Oj (xj )µ bB ) j (xj )| = oP (n xj for 0 ≤ j ≤ d, where Oj (xj ) = R O(x) dx−j . B3 For xj with Oj (xj ) > 0 it holds that 2 n2/5 µ bA j (xj ) → N(0, σj (xj )) for 0 ≤ j ≤ d with some function σj2 (xj ) > 0. B4 Z and Z 2 −4/5 µ bA ) j (xj ) Oj (xj ) dxj = OP (n 2 −4/5 µ bB ) j (xj ) Oj (xj ) dxj = O(n for 0 ≤ j ≤ d. B5 It holds that sup xj ∈Xj 1/2 Oj (xj ) Z Xk(xj ) Oj,k (xj , xk ) A µ bk (xk )dxk = oP (n−2/5 (log n)−1 ). Oj (xj ) Smooth backfitting of proportional hazards B6 It holds for 0 ≤ j ≤ d that Z sup xj ∈Xj x∈X 1 Q k∈{0,...,d}\{j} Ok (xk ) Z sup xj ∈Xj x∈X 1/2 e O(x)dx −j = OP (1), 1/2 O(x)dx−j = O(1). 1 Q k∈{0,...,d}\{j} Ok (xk ) 13 B7 It holds that µ∗,B,n − µ∗,B = op (n−2/5 ). We shortly discuss these assumptions. Condition [B1] is a mild consistency assumption for a two-dimensional smoother. Also [B2] is a weak condition because in our setting one-dimensional smoothers are typically OP (n−2/5 )-consistent. [B3] is a standard limit result for many one-dimensional smoothers and [B4] assumes rates for L2 -norms of the stochastic part and the bias part of a nonparametric one-dimensional smoother that are standard under our smoothness assumptions. For the interpretation of [B5] note that the integral on the left hand side in the formula is a global average of µ bA bA k . Because µ k is a local average this is a global weighted average of mean zero random varibales. Thus one expects a OP (n−1/2 ) rate for the integral. For the supremum of the integrals one expects a OP ((log n)1/2 n−1/2 ) rate which is faster than the required rate. [B6] states a bound for the total number of occurrences. It can be easily verified under the assumption that the one dimensional marginals Ol are bounded from below. Furthermore, one can easily check it if the one-dimensional marginals Ol are bounded from below for l 6∈ {j, k} and if the twodimensional marginal Oj,k has the properties discussed in the example after assumption [A7]. The following proposition states a stochastic expansion for δ. Proposition 1. Make the assumptions [A1]–[A7], [B1]–[B7]. Then the function δ = (δ 0 , ..., δ d ), introduced in (15), exists and is uniquely defined, with probability tending to one. Moreover, it has the following expansion: δ−µ bA − (I − π)−1 (µ bB − µ∗,B ) O,∞ = op (n−2/5 ), where, for a function f (x) = (f0 (x0 ), ..., fd (xd ))| , we define 1/2 kf kO,∞ = sup max |Oj (xj )fj (xj )|. x∈X 0≤j≤d R P Furthermore, the function π : L → L is defined as πk (f )(xk ) = j6=k πkj (xk , xj )fj (xj )dxj R R for f ∈ L = L1 ×...×Ld with Lj = {δj : Xj → R : Xj δj2 (xj )Oj (xj ) dxj < ∞, Xj δj (xj )Oj (xj ) dxj = 0}. From the proposition we get as a corollary the asymptotic distribution of δ j (xj ). Proposition 2. Make the assumptions [A1]–[A7], [B1]–[B7]. Then for xj (0 ≤ j ≤ d) with Oj (xj ) > 0 it holds that n2/5 {δ j (xj ) − [(I − π)−1 (µ bB − µ∗,B )]j (xj )} → N(0, σj2 (xj )), −2/5 ) we have that the bias in distribution. Under the additional assumption µ bB j (xj ) = O(n [(I − π)−1 (µ bB − δ B,∗ )]j (xj ) is of order O(n−2/5 ). 14 Hiabu et al. The following theorem states that δ is indeed a good approximation of the relative b estimation error δ. Theorem 3. Under assumptions [A1]–[A7], [B1]–[B7] it holds that with probability tending to one there exists a solution δb∗ and δb = (δb0 , . . . , δbd ) that solves equation (14) with δb − δ O,∞ = op (n−2/5 ), ∗ δb∗ − δ = op (n−2/5 ). For this solution we get that n2/5 {(α bj − αj )(xj ) − αj (xj )[(I − π)−1 (µ bB − µ∗,B )]j (xj )} → N(0, αj2 (xj )σj2 (xj )), in distribution, for xj (0 ≤ j ≤ d) with Oj (xj ) > 0. 5. In-sample forecasting of outstanding loss liabilities The so-called chain ladder method is a popular approach to estimate outstanding liabilities. It started off as a deterministic algorithm, and it is used today for almost every single insurance policy over the world in the business of non-life insurance. In many developed countries, the non-life insurance industry has revenues amounting to around 5%. It is therefore comparable to - but smaller than - the banking industry. In every single product sold, the chain ladder method (because actuaries hardly use other methods) comes in, estimating the outstanding liabilities that eventually aggregate to the reserve - the single biggest number of most non-life insurers balance sheets. The insurers liabilities often amount to many times the underlying value of the company. In Europe alone those outstanding liabilities are estimated to accumulate to around e 1trn. It is therefore of obvious importance that this estimate is not too far from the best possible estimate. We describe in this section how the methodology introduced in this paper can be applied to provide a solution to this challenging problem. We analyze reported claims from a motor business line in Cyprus. The same data set has been used by Hiabu et al. (2016) and it consists of the number of claims reported between 2004 and 2013. During these 10 years (3654 days), n = 58180 claims were reported. The data are given as {(T1 , Z1 ), . . . , (Tn , Zn )}, where Zi denotes the underwriting date of claim i, and Ti the time between underwriting date and the date of report of a claim in days, also called reporting delay. Hence, in the notation of the previous sections, the covariate underwriting date, Z(t) = Z, does not depend on time and has dimension d = 1. The data exist on a triangle, with Ti + Zi ≤ 31 December 2013 = R0 , which is a subset of the full support R = [0, R0 ]2 (0 = 1 January 2004). The aim is to forecast the number of future claims from contracts written in the past which have not been reported yet. Figure 1 shows the observed data that lie on a triangle, while the forecasts are required on the triangle that added to the first completes a square. Here it is implicitly assumed that the maximum reporting delay of a claim is 10 years. Actuaries call this assumption that the triangle is fully run off. In our data set, this is a reasonable assumption looking at Figure 1. Smooth backfitting of proportional hazards 15 70 60 50 60 40 40 20 0 120 30 100 120 100 80 80 60 t 20 60 40 40 20 z 20 10 0 Fig. 1. Histogram of claim numbers of a motor business line between 2004 and 2013. Axis z represents the underwriting time (in months) and axis t the reporting delay (in months). 16 Hiabu et al. The classical chain ladder method is able to provide a simple solution to the above problem. Recently, Martı́nez-Miranda et al. (2013) have pointed out that this method can be viewed as a multiplicative density method: the original, un-truncated random variable (T, Z) having density f (t, z) = f1 (t)f2 (z); and the authors suggested to embed the method in a more standard mathematical statistical vocabulary to engage mathematical statisticians in future developments. In particular, Martı́nez-Miranda et al. (2013) showed that one could consider the traditional chain ladder estimator as a multiplicative histogram in a continuous framework, and presented an alternative by projecting an unconstrained local linear density down onto a multiplicative subspace. This approach was called continuous chain ladder and it has been further analyzed by Mammen et al. (2015); Lee et al. (2015, 2017), providing full asymptotic theory of the underlying density components. A related approach by Hiabu et al. (2016) (see also Hiabu (2017)) proposes to transform the two-dimensional multiplicative continuous chain ladder problem to two one-dimensional continuous hazard estimation problems via an elegant time-reverting trick. The application considered in this paper generalizes the most important of these reversed hazards to a two-dimensional multiplicatively structured hazard. In this way the continuous chain ladder is improved and generalized allowing more flexibility for the estimation of outstanding liabilities in the insurance business. In Hiabu et al. (2016) it is assumed that T and Z are independent, which means that the underwriting date of a claim has no effect on the reporting delay. We are not going to impose such a strong restriction. In order to discuss the independence assumption, consider Figure 2. The points in the plots are derived by first transforming the data into a triangle with dimension 3654 × 3654, n X  Nt,z = I Ti = t, Zi = z , (t, z) ∈ {1, 2, . . . , 3654}2 , t + z ≤ 3654 i=1 Q ), with dimension 40 × 40, see and then aggregating the data into a quarterly triangle, (Nt,z also Hiabu (2017). Then, for t = 2, . . . , 5, one derives the quarterly hazard rate as ratio Q Pz Q / l=1 Nt,l . These values are then scaled by an of occurrence and exposure, α(t, z) = Nt,z eye-picked norming factor, α0 (t), t = 2, . . . , 5, letting α(t, z) start at around 1 as a function of z with fixed t. The final values, α1 (t, z) = α0 (t)α(t, z), are displayed in Figure 2. We only show plots for t ≤ 5 since almost all claims are reported after five quarters. If the independence assumption of Hiabu et al. (2016) is satisfied, the points should lie around a horizontal line in each plot. If the multiplicative hazard assumption of this paper is satisfied, then any smooth shape is allowed, but all four graphs must be equal after correction for noise. This is because under the model which will be defined below, the graphs, α1 (·, ·), with the first component fixed, mimic a quarterly version of α1 . Inspecting the four plots, one can argue to see a negative drift of similar magnitude in each graph, the values decaying from around 1 to 0.8. This indicates that the approach of this paper should give a better fit to the data compared to the model of Hiabu et al. (2016). From this discussion we now continue with embedding our observations in the proportional hazard framework. Afterwards we will show how the hazard estimate can be used to forecast the number of outstanding claims. First note that we cannot apply the approach of this paper directly, since in this application we only observe T if T ≤ R0 − Z, Smooth backfitting of proportional hazards α1(2,z) 1.2 1.2 1.1 1.1 1.0 α1(3,z) 0.9 0.8 1.0 0.9 0.8 0.7 0.7 0 5 10 15 20 25 30 39 0 z; 1=Q1 2004, 39=Q3 2013 α1(4,z) 17 5 10 15 20 25 30 38 z; 1=Q1 2004, 38=Q2 2013 1.2 1.2 1.1 1.1 1.0 α1(5,z) 0.9 0.8 1.0 0.9 0.8 0.7 0.7 0 5 10 15 20 25 30 z; 1=Q1 2004, 37=Q1 2013 37 0 5 10 15 20 25 30 36 z; 1=Q1 2004, 36=Q4 2012 Fig. 2. Scaled quarterly hazard rates of the first four development quarters. which is a right truncation. Analogue to Hiabu et al. (2016), we transform the random variable T to T R = R0 − T . This has the result that the right truncation truncation becomes left truncation, T R ≥ Z. Thus we consider the random variable T R as our variable of interest. With the notation considered in Section 2.1, we now have T = T R , d = 1, Z(t) = Z, δ = 1, I = {(tR , z) ∈ R|0 ≤ z ≤ tR }. We conclude that the counting process Ni (tR ) = 1 TiR ≤ tR , satisfies Aalen’s multiplicative intensity model with respect to the filtration given in Section 2.1 and αz (tR ) = α(tR , z) = lim h−1 Pr{T R ∈ [tR , tR + h)| T R ≥ tR , Z = z}, h↓0  R R Yi (t ) = 1 (t , Zi ) ∈ I, tR ≤ TiR,∗ . We can therefore estimate the unstructured hazard using the local linear estimator estimator described in Section 3.1. Note that we have X = I. The components of the multiplicative conditional hazard are then computed as in (10). These estimators require the choice of the bandwidth parameter, which was assumed to be scalar in order to simplify the notation in this paper. In this application we generalize this restriction allowing for different smoothing levels in each dimension, namely reporting delay and underwriting time. The bandwidth parameter is then a vector b = (b0 , b1 ) and we estimate it using cross-validation (see further details in Appendix A). To alleviate the computational burden of cross-validation we aggregated the data triangle Nt,z considering bins of two days when applying a discrete version of the estimators described in Appendix C. After several trials we run the cross-validation minimization over b0 ∈ {1300, 1400, 1500, 1600, 1700, 1800} and Hiabu et al. 1500 1000 500 0 2000 1500 1000 500 0 differences between hazard estimates −0.05 2000 −0.10 underwriting 0.00 0.05 0.10 18 development Fig. 3. Difference between structured and unstructured hazard estimator, α e(x) − α b(x), on a 2-day grid. b1 ∈ {2, 3, 4, 5}. The cross-validated bandwidth components were b0 = 1600 and b1 = 3 (unit=2 days). The results of the estimation procedure are given in Figure 4 and Figure 3. The first figure shows the estimated components of the multiplicatively structured hazard estimator, and the latter shows the difference, α e(x)−α b(x), between the structured and the unstructured estimators. Finally the total number of outstanding claims, i.e. the reserve, can be estimated as R R0  Z R0 −t  n b X R0 −Zi fZi (t)dt b Reserve = , fz (t) = α b0 (R0 − t)α b1 (z) exp − α b0 (s)α b1 (z)ds . R R0 −Zi fbZi (t)dt 0 i=1 0 Note that fbz (t) is an estimator of the conditional density of the survival time T . The reserve can be also decomposed further to provide the ’cash flow’ of the next periods. If the future is divided into M periods, each of them with length δ = R0 /M , then the amount of claims 19 50 α1(t) 150 0.95 0 0.85 α2(z) Smooth backfitting of proportional hazards 0 2 4 6 8 Underwriting year z: 0=01/Jan/2004, 10=31/Dec/2013 10 0 2 4 6 8 10 t; T−t=Reporting delay in years Fig. 4. The estimated multiplicative hazard components . Table 1. Number of outstanding claims for future quarters; 1 = 2014 Q1, . . . , 39 = 2022 Q3. The backfitting approach in this paper (PH) is compared with the chain ladder method (CLM) and the approach in Hiabu et al. (2016). Future quarter 1 2 3 4 5 6 7 8 9 10 11 12 – 39 Tot. Hiabu et al. 2016 970 684 422 166 14 5 3 2 1 1 1 0 2270 CLM 948 651 387 148 12 5 3 2 1 1 1 0 2160 PH 872 621 400 130 53 7 4 3 2 1 1 1 2193 forthcoming in the ath (a = 1, 2, . . . , M ) period can be estimated by R (R0 −Zi +aδ)∧R0 n b X (R0 −Zi +aδ−1)∧R0 fZi (t)dt ReserveP (a) = . R R0 −Zi bZ (t)dt f i i=1 0 Table 1 shows the estimated number of of outstanding claims for future quarters. We compare the approach of this paper with the results derived by Hiabu et al. (2016) and the traditional chain ladder method. The two latter approaches have in common that they assume independence between underwriting date, Z, and reporting delay, T . We see that while all approaches estimate a similar total number of outstanding claims (reserve), those two approaches have distributions over the quarters that are very different from the results obtained by the method proposed in this paper. It seems that the violation of the independence assumption has not a big influence on the reserve, since it balances the different development patterns arising from different periods out. However, the problem becomes quite serious if one is interested in more detailed estimates like the cash flow. 6. Conclusion This paper provided a first introduction of smooth backfitting into survival analysis and hazard estimation. The starting point has been the popular proportional hazard model with fully nonparametric components. One could imagine that smooth backfitting could play a role in a long list of structured problems in semiparametric and nonparametric survival analysis. One could for example imagine that smooth backfitting can provide useful extensions of some of the practical dynamic survival models of Martinussen and Scheike (2006) and one can also think of applications to many of known extensions of the Cox regression model where the understanding of the link between data and estimators is improved via the direct projection approach of smooth backfitting. 20 A. Hiabu et al. Bandwidth selection A crucial problem in practice is finding the right amount of smoothing when using nonparametric approaches. In the application described in this paper we have considered the maybe most straightforward way to estimate the optimal bandwidth – the data-driven cross-validation method. The data-driven cross-validation method in density estimation goes back to Rudemo (1982) and Bowman (1984). Nowadays, a slightly modified version (see Hall (1983)) is used which aims to minimize the integrated squared error. In our framework, the cross-validation bandwidth has been proposed in Nielsen and Linton (1995). Cross-validation arises from the idea to minimize the integrated squared error n −1 n Z X i=1 R0 0 [α b{Xi (s)} − α{Xi (s)}]2 Yi (s)ds. By expanding the square, only two of the three terms depend on P theRbandwidth and are thus R considered. While α b(Xi (s))2 ds is feasible, we have to estimate i α b(Xi (s))α(Xi (s))Yi (s)ds. In cross-validation this is done by the unbiased leave-one-out estimator Z α b[i] {Xi (s)}dNi (s), where α b[i] is the leave-one-out version, which arises from the definition of structured estimator α b by setting Ni = 0. Finally we define the cross-validated bandwidth, bCV , as bCV = arg min b n Z X i=1 α b(Xi (s))2 ds − 2 n Z X α b[i] {Xi (s)}dNi (s). (16) i=1 Theoretical properties of cross-validation in hazard estimation in the one dimensional case are derived in Mammen et al. (2015). To our knowledge there is no theoretical analysis of cross-validation in the multivariate hazard case of this paper. An extensive simulation study of the multivariate case can be found in Gámiz et al. (2013). B. Proofs B.1. Proof of Proposition 1 The proof of this proposition follows the lines of the proof of Theorem 1 in Mammen et al. (1999) but it needs some major modifications in the last steps of the proof because we have weaker assumptions than the ones assumed in the latter theorem. We outline that the first part of the proof in Mammen et al. (1999) also goes through under our weaker assumptions and we show how additional arguments can be used in theRlast part. Note that under our assumptions [A5], [A6] we get that Ojk (xj , xk )2 Oj (xj )−1 Ok (xk )−1 dxj dxk < ∞. As in Lemma 1 in Mammen et al. (1999) this implies that for some constants c, C > 0 c max kδj k ≤ kδ0 + ... + δd k ≤ C max kδj k (17) 0≤j≤d 0≤j≤d Smooth backfitting of proportional hazards 21 for δj ∈ Lj where k...k denotes the norm km(x)k2 = m(x)2 O(x) dx. Furthermore, one gets that kT k = sup{kT (δ0 + ... + δd )k : δj ∈ Lj with kδ0 + ... + δd k < 1} < 1, where here T is the operator T = Ψd · ... · Ψ0 with R Ψj (δ ∗ + δ0 + ... + δd )(x) = δ ∗ + δ0 (x0 ) + ... + δj−1 (xj−1 ) +δj∗ (xj ) + δj+1 (xj+1 ) + ... + δd (xd ), XZ ∗ δj (xj ) = − δk (xk )πj,k (xj , xk ) dxk k6=j for (δ ∗ , δ0 , ..., δd ) ∈ L. Furthermore, note that for j 6= k it holds that ej (xj ) − Oj (xj ) O = oP (1), Oj (xj ) Z Z ej,k (xj , xk ) Oj,k (xj , xk ) O − Oj (xj )Ok (xk ) Oj (xj )Ok (xk ) ej,k (xj , xk ) Oj,k (xj , xk ) O − ej (xj )Ok (xk ) Oj (xj )Ok (xk ) O !2 Oj (xj )Ok (xk )dxj dxk = oP (1), !2 Oj (xj )Ok (xk )dxj dxk = oP (1). These equations follow from [A5], [A6] and [B1]. To see this note that [A6] and [B1] imply ej,k (xj , xk )−Oj,k (xj , xk ) = oP ((log n)−1 )Oj,k (xj , xk ). that, uniformly for xj , xk it holds that O This gives that ej (xj )/Oj (xj )] − 1 = oP ((log n)−1 ), [O (18) uniformly for xj ∈ Xj and 0 ≤ j ≤ d. Together with [A5] and [B1], this implies the three equations. As in Lemma 2 in Mammen et al. (1999) we conclude from these equations that kT̂ kn < γ b j , Lej and for some γ < 1 with probability tending to one. Here, we define T̂ , k...kn , Xn,j , Ψ ej , π Le as T , k...k, Xj , Ψj , Lj and L but with Oj , πjk replaced by O bjk (0 ≤ j, k ≤ d; j 6= k). In R R 2 e e ej (xj ) dxj = particular, we put Lj = {δj : Xj → R : Xj δj (xj )Oj (xj ) dxj < ∞, Xj δj (xj )O 0}, Le = Le1 × ... × Led , and kT kn = sup{kT (δ0 + ... + δd )kn : δj ∈ Lej with kδ0 + ... + δd kn < 1}. Arguing as in the first part of Lemma 3 in Mammen et al. (1999) this gives that δ k (x) = B C r + δ k (x) + δ k (x), where for r ∈ {A, B, C} the functions δ k ∈ Lek are defined by A δ k (x) r r δ 0 (x0 ) + ... + δ d (xd ) = s X br,[s] (x) Tbl τbr (x) + R l=0 with br,[s] k kR ≤ Cγ s with probability tending to one for some constant C > 0. Here we put b d (µ b d · ... · Ψ b 1 (µ ) + ... + Ψ brd−1 − µ∗,r,n brd − µ∗,r,n ), τbr = Ψ br0 − µ∗,r,n 0 d−1 ) + (µ d ∞ X br,[s] (x) = R Tbl τbr (x). l=s+1 22 Hiabu et al. Up to this point we followed closely the arguments in the proof of Theorem 1 in Mammen et al. (1999). The arguments of the further parts of the proof of the latter theorem would need that, in our notation, Z e 2 (xj , xk ) O j,k sup dxk (19) 2 e xj ∈Xj Xk(xj ) Oj (xj )Ok (xk ) is bounded by a constant, with probability tending to one. This would imply that with probability tending to one for some constant C > 0 for all functions g : Xk(xj ) → R Z ej,k (xj , xk ) O sup g(xk )dxk ≤ Ckgk, (20) ej (xj ) xj ∈Xj O Xk(xj ) as can be seen by application of the Cauchy-Schwarz inequality. The proof of Theorem 1 in r,[s] Mammen et al. (1999) shows that this can be used to show that supx∈X ,0≤j≤d |Rj (x)| ≤ Cγ s with probability tending to one for some constant C > 0. Unfortunately in our setting (19) does not hold and thus we cannot follow that (20) holds in our setting. Indeed, one can check that in general (20) does not hold under our assumptions. Consider e.g. the set-up discussed after the statement of assumption [A7]. Thus we do not have that T and T̂ map a function with bounded L2 -norm into a function with bounded L∞ -norm. This also does not hold if we replace the L∞ -norm by our weighted norm k..kO,∞ . We now argue that after twice application of T or T̂ a function with bounded k..k-norm is transformed into a function with bounded k..kO,∞ -norm. This follows from the following two estimates for functions g : Xk → R with some constant C > 0 !2 Z Z Z Oj,k (xj , xk ) 1−δ Ok (xk )g 2 (xk )dxk , (21) g(xk )dxk Oj (xj )dxj ≤ C Oj (xj ) Xk Xj Xk(xj ) Z 1/2 Z Oj,k (xj , xk ) 1/2 1−δ 2 sup Oj (xj ) g(xk )dxk ≤ C Ok (xk )g (xk )dxk .(22) Oj (xj ) xj ∈Xj Xk(xj ) Xk Furthermore, it holds with probability tending to one, that !2 Z Z Z ej,k (xj , xk ) O Ok (xk )g 2 (xk )dxk , (23) g(xk )dxk Oj1−δ (xj )dxj ≤ C e Oj (xj ) Xk Xj Xk(xj )  1/2 Z Z ej,k (xj , xk ) O 1/2 1−δ 2 sup Oj (xj ) g(xk )dxk ≤ C Ok (xk )g (xk )dxk .(24) ej (xj ) xj ∈Xj O Xk(xj ) Xk Below we will also use that a function with bounded k..kO,∞ -norm is mapped by T and T̂ into a function with bounded k..kO,∞ -norm. This follows from Z Oj,k (xj , xk ) 1/2 1/2 sup Oj (xj ) g(xk )dxk ≤ C ∗ sup Ok (xk )|g(xk )|, (25) Oj (xj ) xj ∈Xj xk ∈Xk Xk(xj ) Z ej,k (xj , xk ) O 1/2 1/2 sup Oj (xj ) g(xk )dxk ≤ C ∗ sup Ok (xk )|g(xk )| (26) ej (xj ) xj ∈Xj xk ∈Xk O Xk(xj ) Smooth backfitting of proportional hazards 23 with probability to one. We now show (21)–(26). The bound (25) follows directly from the last inequality in Condition A7. For the proof of (21) note that the left hand side of (21) can be bounded by a constant times Z Xxj ,xk 1 dxj dxk 1+δ Oj (xj )Ok (xk ) Z Ok (xk )g 2 (xk )dxk . Xk Thus, (21) follows by application of the first inequality in Condition A7. For the proof of (22) note that the left hand side of (22) can be bounded by a constant times Z sup xk ∈Xk Xj(xk ) 1 dxj 1−δ Oj (xj )Ok (xk ) Z Xk !1/2 Ok1−δ (xk )g 2 (xk )dxk . Here, (22) follows by application of the second inequality in Condition A7. For the proof of (23), (24) and (26) one uses (18) to show that the left hand sides of the equations in ej and O ek , respectively. Condition A7 are of order OP (1) if one replaces Oj and Ok by O Thus, one can show (23), (24) and (26) by using the same arguments as in the proofs of (21), (22) and (25). We now want to show that r r kδ 0 (x0 ) + ... + δ d (xd ) − ∞ X T l τ r (x)kO,∞ = oP (n−2/5 ), (27) l=0 where brd−1 − µ∗,r brd − µ∗,r τ r = Ψd · ... · Ψ1 (µ br0 − µ∗,r 0 ) + ... + Ψd (µ d−1 ) + (µ d ) and where for δ = (δ ∗ , δ0 , ..., δd )| ∈ R×L we define kδ ∗ +δ0 +...+δd kO,∞ as k(δ0 , ..., δd )| kO,∞ ∨ |δ ∗ |. Using (21)–(26), kT k < 1 and the fact that kT̂ kn < γ for some γ < 1 with probability tending to one, one gets that for (27) it suffices to show that for all choices of c > 0 k cX log n Tbl τbr (x) − T l τ r (x)kO,∞ = oP (n−2/5 ). (28) l=0 For the proof of this claim it suffices to show that the norm of each summand is of order oP (n−2/5 (log n)−1 ). This can be shown by using condition B1, (21)–(26), and 24 Hiabu et al. # !2 ej,k (xj , xk ) O ej,k (xj , xk ) O − g(xk )dxk Oj1−δ (xj )dxj ej (xj ) ej (xj ) O O Xk(xj ) Xj Z −1 = oP ((log n) ) Ok (xk )g 2 (xk )dxk , Xk # " Z ej,k (xj , xk ) ej,k (xj , xk ) O O 1/2 g(xk )dxk sup Oj (xj ) − ej (xj ) ej (xj ) xj ∈Xj O O Xk(xj ) Z 1/2 Ok1−δ (xk )g 2 (xk )dxk = oP ((log n)−1 ) , Xk # " Z e e O (x , x ) O (x , x ) j j j,k k j,k k 1/2 − g(xk )dxk sup Oj (xj ) ej (xj ) ej (xj ) xj ∈Xj O O Xk(x ) Z Z " (29) (30) (31) j 1/2 = oP ((log n)−1 ) sup Ok (xk )|g(xk )|. xk ∈Xk Claims (29)–(31) can be shown similarly as (21)–(26) by using additionally condition B1. −2/5 ) because of [B1] and [B4], see also − µ∗,r For r = B we note that µ∗,r,n k k = oP (n P l B (18) and that the sum of the elements of (I − π)−1 (µ bB − µB,∗ ) is equal to ∞ l=0 T τ (x). P∞ l C −2/5 For r = C one checks easily that k l=0 T τ kO,∞ = oP (n ). For the statement of the P∞ l A −2/5 proposition it remains to show that k l=1 T τ kO,∞ = oP (n ) and that kτ r − (µ br0 − ∗,r ∗,r r −2/5 µ0 + ... + µ bd − µd )kO,∞ = oP (n ). For the proof of these two claims one applies condition B5. B.2. Proof of Proposition 2 The statement of Proposition 2 follows immediately from [B3] and Proposition 1. B.3. Proof of Theorem 3 The main tool to prove this theorem is the Newton-Kantorovich theorem, see for example Deimling (1985). Since this theorem is central in our considerations we will state it here. Theorem 4 (Newton-Kantorovich theorem). Consider Banach spaces X , Y and a map F : Br (x0 ) = {x : kx − x0 k ≤ r} ⊂ X 7→ Y for x0 ∈ X and r > 0. We assume that the Fréchet derivative F 0 exists for x ∈ Br (x0 ), that it is invertible and that the following conditions are satisfied (a) kF 0 (x0 )−1 F (x0 )k ≤ γ, (b) kF 0 (x0 )−1 k ≤ β, (c) kF 0 (x) − F 0 (x∗ )k ≤ lkx − x∗ k for all x, x∗ ∈ Br (x0 ), (d) 2γβl < 1 and 2γ < r. Smooth backfitting of proportional hazards 25 Then the equation F (x) = 0 has a unique solution x∗ in B 2γ (x0 ) and furthermore, x∗ can be approximated by Newtons iterative method xk+1 = xk − F 0 (xk )−1 F (xk ), and it holds that kxk − x∗ k ≤ γ 2k−1 q2 k −1 , with q = 2γβl < 1. We come now to the proof of Theorem 3. Proof (of Theorem 3). Equation (14) can be rewritten as b δb∗ , δb0 , . . . , δbd ) = 0, F( where   b ∗ , f0 , . . . , fd )(x) = Fbk (f ∗ , f0 , . . . , fd )(x) F(f k=∗,0,...,d . with Fb∗ (f ∗ , f0 , . . . , fd )(x) =  Z  d Y ∗ (1 + f ) {1 + fj (xj )} − 1 X × d Y j=0 Z b αj (xj )E(x)dx − j=0 Fbk (f ∗ , f0 , . . . , fd )(x) = Z Xxk × d Y b k (xk )dxk , ∆ Xk   d Y ∗ (1 + f ) {1 + fj (xj )} − 1 j=0 b b b ∗ αj (xj )E(x)dx −k − ∆k (xk ) − F∗ (f , f0 , . . . , fd )(x) j=0 R b k (xk )dxk does not depend on k. for k = 0, . . . , d. Note that Xk ∆ We define an additional operator F by the following equations F(f ∗ , f0 , . . . , fd )(x) = (Fk (f ∗ , f0 , . . . , fd )(x))k=∗,0,...,d 26 Hiabu et al. with  F∗ (f ∗ , f0 , . . . , fd )(x) = Z X × d Y {1 + f ∗ } d Y  {1 + fj (xj )} − 1 j=0 αj (xj )E(x)dx, j=0  Fk (f ∗ , f0 , . . . , fd )(x) = Z Xxk × d Y {1 + f ∗ } d Y  {1 + fj (xj )} − 1 j=0 αj (xj )E(x)dx−k − F∗ (f ∗ , f0 , . . . , fd )(x) j=0 for k = 0, . . . , d. Note that F(0) = 0. The Fréchet derivatives of Fb and F in 0 are   Z d X b f ∗ + fj (xj ) α(x)E(x)dx, Fb∗0 (0)(f ) = X j=0  F∗0 (0)(f ) = Z X f ∗ + d X Fbk0 (0)(f ) = Xxk − f ∗ + Fk0 (0)(f ) = Xxk − d X  b fj (xj ) α(x)E(x)dx −k j=0 Fb∗0 (0)(f ),  Z fj (xj ) α(x)E(x)dx, j=0  Z  f ∗ + d X  fj (xj ) α(x)E(x)dx−k j=0 F∗0 (0)(f ) for k = 0, . . . , d. The main idea of our proof is to apply the Newton-Kantorovich theorem, Theorem 4, with the mapping F = Fb and norm k(f0 , ..., fd )kO,∞ ∨|f ∗ | which in abuse of notation we also ∗ denote by k(f ∗ , f0 , ..., fd )kO,∞ . As starting point x0 we choose x0 = (δ , δ). In our application of Theorem 4, the spaces X and Y are equal to R × {(f0 , ..., fd )| : k(f0 , ..., fd )| kO,∞ < R ej (xj )dxj = 0 for j = 0, ..., d}. We consider F and Fb as operators from X to ∞, fj (xj )O X . Note that FX ⊂ X because of [B6] and the last assumption of [A7]. Note that we get from [B6] and the last assumption of [A7] that Z 1 O(x)dx = O(1). Qd 1/2 x∈X k=0 Ok (xk ) Smooth backfitting of proportional hazards 27 b ⊂ X , with Similarly, one uses [B6] and the last assumption of [A7] to show that FX probability tending to one. We will show that   ∗ Fb (δ , δ) = op (n−2/5 ), (32) O,∞ and that Fb0 is locally Lipschitz around 0, i.e., that there exist constants r∗ , C such that with probability tending to one Fb0 (g)(f ) − Fb0 (g ∗ )(f ) O,∞ ≤ C kg − g ∗ kO,∞ kf kO,∞ for all g, g ∗ ∈ Br∗ (0). (33) Furthermore, we will show, that F 0 (0) is invertible, with F 0 (0)−1 O,∞ < C ∗, for some C ∗ > 0. (34) We now argue that by application of the Newton-Kantorovich theorem (32)-(34) imply that ∗ b (δ , δ) − (δb∗ , δ) O,∞ = op (n−2/5 ). (35) This implies the statement of the theorem. ∗ = oP (1), the inequality (33) We now show that (32)-(34) imply (35). Since (δ , δ)   O,∞ ∗ also holds with a constant r for all g, g ∗ ∈ Br (δ , δ) with probability tending to one. This gives condition (c) of the Newton-Kantorovich theorem. Furthermore, by application of (18) we get that Fb0 (0) − F 0 (0) = oP (1). This O,∞ ∗ together with (δ , δ) O,∞ = oP (1) and (33) gives   ∗ Fb0 (δ , δ) − F 0 (0) O,∞ = op (1). Therefore with probability tending to one, condition (34) also holds if F 0 (0) is replaced by   ∗ Fb0 (δ , δ) . Thus, we get from (32)-(34) that conditions (a)–(d) of the Newton-Kantorovich theorem are fulfilled with probability tending to one, with γ = oP (n−2/5 ). This shows (35). ∗ It remains to show (32), (33) and (34). For the proof of (32) note that (δ , δ) = O,∞ op (n−1/5 ) and that Fb0 is Lipschitz. A first order Taylor expansion yields   ∗ b b F(δ) = F(0) + Fb0 (0) (δ , δ) + op (n−2/5 ).   ∗ 0 b b b b Equation (32) follows from F(0) + F (0) (δ , δ) = F(0) − F(0) = 0. Claim (33) follows directly from assumption [B6]. For the proof of (34) we have to show that F 0 (0) is invertible. For the proof of this claim we start by showing that it is bijective. For the proof of injectivity, assume that 28 Hiabu et al. F 0 (0)(f ) = 0 for some f = (f ∗ , f0 , ..., fd )| ∈ X . We will show that this implies that f = 0. It holds that   Z d X f ∗ + fj (xj ) α(x)E(x)dx = 0, X j=0  Z Xxk f ∗ + d X  fj (xj ) α(x)E(x)dx−k = 0, for all k = 0, . . . , d. j=0 R R P With f¯j (xj ) = fj (xj ) − fj (uj )v(u)du and f¯∗ = f ∗ + dj=0 fj (uj )v(u)du for v(u) = R α(u)E(u)/ α(s)E(s)ds this implies that f¯∗ Z α(x)E(x)dx = 0 X and thus it holds that f¯∗ = 0. Furthermore, we get that for k = 0, . . . , d     Z Z Z d d X X  f¯j (xj ) α(x)E(x)dx−k dxk = f¯k (xk )  f¯j (xj ) α(x)E(x)dx. 0= f¯k (xk ) Xk Xxk X j=0 j=0 By summing these terms up over k, we get that  Z X d X  j=0 2  f¯j (xj ) α(x)E(x)dx = 0,  which implies that d X f¯j (xj ) = 0, a.e. on X . j=0 By application of (17) this implies that f¯j and fj are constant functions. Because of R b fj (uj )α(u)E(u)du = 0 this implies f = 0. Now we check that F 0 (0) is surjective. Consider g = (g ∗ , g0 , ..., gd )| ∈ X such that 0 hF (0)(f ), gi = F∗0 (0)(f )g ∗ + d Z X k=0 Xk Fk0 (0)(f )(xk )gk (xk )dxk = 0 (36) for all f = (f ∗ , f0 , ..., fd )| ∈ X . We will show that then g = 0. This implies that g = 0 is the only element in Y that is perpendicular to the range space of F 0 (0). Since F 0 (0) is linear, this shows that F 0 (0) is surjective. Smooth backfitting of proportional hazards 29 From (36) one gets with the choice fk = gk and f ∗ = g ∗ that   Z Z d Z d X X  0 = (g ∗ )2 α(x)E(x)dx + gk (xk ) gj (xj ) α(x)E(x)dx−k dxk X k=0 Xk Xxk j=0  2 Z Z d X  = (g ∗ )2 α(x)E(x)dx + gj (xj ) α(x)E(x)dx. X X j=0 With exactly the same arguments as for the injectivity we conclude that g = 0 and that g ∗ = 0. Thus, we have shown that F 0 (0) is invertible. It remains to show that F 0 (0)−1 is bounded. By the bounded inverse theorem for this claim it suffices to show that F 0 (0) is bounded. Boundedness of F 0 (0) can be shown by application of (26). This concludes the proof of Theorem 3. C. Discrete data Data is given as Nr0 ,r , with (r0 , r) ∈ Idisc , Idisc = {(r0 , r)| r0 = 1, . . . , R0 ; r = 0, . . . , R0 − 1 and r0 ≤ r}. We define occurrence Or0 ,r and exposure Er0 ,r . nr0 Z r+1 X 0 dNr0 ,j (s) = Nr0 ,(R0 −r) , Or ,r = Er0 ,r = j=1 r nr0 Z r+0.5 X j=1 Yr0 ,j (s)ds = Yr0 ,j (r + 0.5) = r−0.5 X Nr0 ,k . k≤(R0 −r) Then the unstructured local linear hazard estimator, α e, becomes  P 0 −1 0 r0 ,r∈Idisc 1 − (x − (r + 0.5, r ))Ddisc (x) c1,disc (x) Kb (x − (r + 0.5, r ))Or0 ,r , α e(x) = P 0 −1 0 r0 ,r∈Idisc {1 − (x − (r + 0.5, r ))Ddisc (x) c1,disc (x)} Kb (x − (r + 0, 5, r ))Er0 ,r where Ddisc and c1,disc are the discrete versions of D and c1 , respectively: X c11,disc (x) = n−1 Kb (x − (r + 0.5, r0 ))(t − r + 0.5)Er0 ,r , r0 ,r∈Idisc X c12,disc (x) = n−1 Kb (x − (r + 0.5, r0 ))(t − r0 )Er0 ,r , r0 ,r∈Idisc d00,disc (x) = X Kb (x − (r + 0.5, r0 ))(t − r + 0.5)2 Er0 ,r , r0 ,r∈Idisc d01,disc (x) = X Kb (x − (r + 0.5, r0 ))(t − r + 0.5)(z − r0 )Er0 ,r , r0 ,r∈Idisc d11,disc (x) = X r0 ,r∈Idisc Kb (x − (r + 0.5, r0 ))(z − r0 )2 Er0 ,r . 30 Hiabu et al. The cross-validation criterion can be written as X  Q(b) = n−1 α b(r, r0 ) − α(r, r0 ) 2 Er0 ,r , 0 r ,r∈Idisc and thus b b = n−1 Q X  α b(r, r0 ) 2 Er0 ,r − 2 r0 ,r∈Idisc X 0 α b[r,r ] (r, r0 )Or0 ,r . r0 ,r∈Idisc Finally,  Z b fz (t) = α b0 (R0 − t)α b1 (z) exp − R0 −t 0  α b0 (s)α b1 (z)ds . Acknowledgements The research of the second author was supported by the Deutsche Forschungsgemeinschaft through the Research Training Group RTG 1953. Third author acknowledges the support from the Spanish Ministry of Economy and Competitiveness, through grant number MTM2013- 41383P, which includes support from the European Regional Development Fund (ERDF). References Andersen, P., O. Borgan, R. Gill, and N. Keiding (1993). Statistical Models Based on Counting Processes. New York: Springer. Beran, R. (1981). Nonparametric regression with randomly censored survival data. Technical report, Dept. Statist., Univ. California, Berkeley. Bowman, A. W. (1984). An alternative method of cross-validation for the smoothing of density estimates. Biometrika 71, 353–360. Dabrowska, D. M. (1987). Non-parametric regression with censored survival time data. Scand. Actuar. J. 14, 181–197. Deimling, K. (1985). Nonlinear functional analysis. Berlin: Springer. Fan, J., I. Gijbels, and M. King (1997). Local likelihood and local partial likelihood in hazard regression. Ann. Stat. 25, 1661–1690. Gámiz, M. L., L. Janys, M. D. Martı́nez-Miranda, and J. P. Nielsen (2013). Bandwidth selection in marker dependent kernel hazard estimation. Comput. Stat. Data An. 68, 155–169. Hall, P. (1983). Large sample optimality of least squares cross-validation in density estimation. Ann. Stat. 11, 1156–1174. Hastie, T. J. and R. J. Tibshirani (1990). Generalized Additive Models. London: Chapman and Hall. Smooth backfitting of proportional hazards 31 Hiabu, M. (2017). On the relationship between classical chain ladder and granular reserving. Scand. Actuar. J. To appear. Hiabu, M., E. Mammen, M. D. Martı́nez-Miranda, and J. P. Nielsen (2016). In-sample forecasting with local linear survival densities. Biometrika 103, 843–859. Lee, Y. K., E. Mammen, J. P. Nielsen, and B. U. Park (2015). Asymptotics for in-sample density forecasting. Ann. Stat. 43, 620–651. Lee, Y. K., E. Mammen, J. P. Nielsen, and B. U. Park (2017). Operational time and in-sample density forecasting. Ann. Stat. To appear. Lin, H., Y. He, and J. Huang (2016). A global partial likelihood estimation in the additive cox proportional hazards model. J. Statist. Plann. Inference 169, 71–87. Linton, O. B. and J. P. Nielsen (1995). A kernel method of estimating structured nonparametric regression based on marginal integration. Biometrika 82, 93–100. Linton, O. B., J. P. Nielsen, and S. Van de Geer (2003). Estimating multiplicative and additive hazard functions by kernel methods. Ann. Stat. 31, 464–492. Mammen, E., O. B. Linton, and J. P. Nielsen (1999). The existence and asymptotic properties of a backfitting projection algorithm under weak conditions. Ann. Stat 27, 1443–1490. Mammen, E., M. D. Martı́nez-Miranda, and J. P. Nielsen (2015). In-sample forecasting applied to reserving and mesothelioma. Insurance Math. Econom. 61, 76–86. Martı́nez-Miranda, M. D., J. P. Nielsen, S. Sperlich, and R. Verrall (2013). Continuous chain ladder: Reformulating and generalising a classical insurance problem. Expert. Syst. Appl. 40, 5588–5603. Martinussen, T. and T. H. Scheike (2006). Dynamic regression models for survival data. New York: Springer. McKeague, I. W. and K. J. Utikal (1990). Inference for a nonlinear counting process regression model. Ann. Stat. 18, 1172–1187. Nielsen, J. P. (1998). Marker dependent kernel hazard estimation from local linear estimation. Scand. Actuar. J. 1998, 113–124. Nielsen, J. P. and O. B. Linton (1995). Kernel estimation in a non-parametric marker dependent hazard model. Ann. Stat. 23, 1735–1748. Nielsen, J. P. and S. Sperlich (2005). Smooth backfitting in practice. J. Roy. Statist. Soc. Ser. B 67, 43–61. Rudemo, M. (1982). Empirical choice of histograms and kernel density estimators. Scand. J. Stat. 9, 65–78. Stone, C. J. (1982). Optimal global rates of convergence for nonparametric regression. Ann. Stat. 10, 1040–1053. 32 Hiabu et al. Stone, C. J. (1985). Additive regression and other nonparametric models. Ann. Stat. 13, 689–705. Yu, K., B. U. Park, and E. Mammen (2008). Smooth backfitting in generalized additive models. Ann. Stat. 36, 228–260.
10math.ST
To appear in Theory and Practice of Logic Programming. 1 arXiv:1210.2297v2 [cs.PL] 9 Oct 2012 Diagrammatic confluence for Constraint Handling Rules∗ Rémy Haemmerlé Technical University of Madrid Abstract Confluence is a fundamental property of Constraint Handling Rules (CHR) since, as in other rewriting formalisms, it guarantees that the computations are not dependent on rule application order, and also because it implies the logical consistency of the program declarative view. In this paper we are concerned with proving the confluence of nonterminating CHR programs. For this purpose, we derive from van Oostrom’s decreasing diagrams method a novel criterion on CHR critical pairs that generalizes all preexisting criteria.We subsequently improve on a result on the modularity of CHR confluence, which permits modular combinations of possibly non-terminating confluent programs, without loss of confluence. KEYWORDS: CHR, confluence, decreasing diagrams, modularity of confluence. 1 Introduction Constraint Handling Rules (CHR) is a committed-choice constraint logic programming language, introduced by Frühwirth (1998) for the easy development of constraint solvers. It has matured into a general-purpose concurrent programming language. Operationally, a CHR program consists of a set of guarded rules that rewrite multisets of constrained atoms. Declaratively, a CHR program can be viewed as a set of logical implications executed on a deduction principle. Confluence is a basic property of rewriting systems. It refers to the fact that any two finite computations starting from a common state can be prolonged so as to eventually meet in a common state again. Confluence is an important property for any rule-based language, because it is desirable for computations to not be dependent on a particular rule application order. In the particular case of CHR, this property is even more desirable, as it guarantees the correctness of a program (Abdennadher et al. 1999; Haemmerlé et al. 2011): any program confluent has a consistent logical reading. Confluence of a CHR program is also a fundamental prerequisite for logical completeness results (Abdennadher et al. 1999; Haemmerlé 2011a), ∗ The research leading to these results has received funding from the Programme for Attracting Talent / young PHD of the MONTEGANCEDO Campus of International Excellence (PICD), the Madrid Regional Government under the CM project P2009/TIC/1465 (PROMETIDOS), and the Spanish Ministry of Science under the MEC project TIN-2008-05624 (DOVES). 2 Rémy Haemmerlé makes possible program parallelization (Frühwirth 2005; Meister 2006), and may simplify program equivalence analyses (Abdennadher and Frühwirth 1999; Haemmerlé 2011b). Following the pioneering research of Abdennadher et al. (1996), most existing work dealing with the confluence of CHR limits itself to terminating programs (see for instance the works by Abdennadher (1997) and Duck et al. (2007)). Nonetheless, proving confluence without global termination assumptions is still a worthwhile objective. From a theoretical point of view, this is an interesting topic, because, as illustrated by the following example typical CHR programs fail to terminate on the level of abstract semantics, even if they do terminate on more concrete levels. Indeed, number of analytical results for the language rest on the notion of confluence, but only when programs are considered with respect to abstract semantics. For instance, in the current state of knowledge, even a result as important as the guarantee of correction by confluence only holds when programs are considered with respect to the most general operation semantics for CHR, namely the very abstract semantics. Example 1 (Partial order constraint) Let P1 be the classic CHR introductory example, namely the constraint solver for partial order. This consists of the following four rules, which define the meaning of the user-defined symbol ≤ using the built-in equality constraint = : duplicate reflexivity antisymmetry transitivity @ @ @ @ x ≤ y \ x ≤ y ⇐⇒ > x ≤ x ⇐⇒ > x ≤ y, y ≤ x ⇐⇒ x = y x ≤ y, y ≤ z =⇒ x ≤ z The duplicate rule implements so-called duplicate removal. In other words, it states that if two copies of the same user-defined atom are present, then one of them can be removed. The reflexivity and transitivity rules respectively state that any atom of the form x ≤ x can be removed, and that two atoms x ≤ y and x ≤ y can be substituted with the built-in constraint x = y. Finally, the transitivity rule is a propagation rule. It states that if x ≤ y and y ≤ z are present, then the atom x ≤ z may be added. It is well know that this program, like any other program using propagation rules, faces the so-called trivial non-termination problem when considered with respect to the very abstract semantics. Indeed, for these semantics, a propagation rule applies to any state it produces, leading to trivial loops. In order to solve this problem, Abdennadher (1997) proposed a token-based semantics in which propagation rules may be applied only once to the same combination of atoms. Nonetheless, such a proposal does not solve all the problems of termination. Indeed the transitivity rule may loop on queries containing a cycle in a chain of inequalities when considered against Abdennadher’s semantics. Consider, for instance, the query x ≤ y, y ≤ x. In fact, in order for P1 to be terminating, the rules of reflexivity, antisymmetry, and transitivity must have priority over the transitivity rule. This behaviour can be achieved by considering concrete semantics, such as the refined semantics of Diagrammatic confluence for Constraint Handling Rules 3 Duck et al. (2005). These semantics reduce the non-determinism of the CHR execution model by applying the rules in textual order. In exchange for gaining termination, the most concrete semantics lose a number of analytical results. For instance, as explained by Frühwirth (2009), although any CHR program can be run in parallel in abstract semantics, one can obtain incorrect results for programs written with the refined semantics in mind. Indeed, if the result of a program relies on a particular rule application order, parallel execution will garble this order, leading to unexpected results. Interestingly, confluence on an abstract (but possibly non-terminating) level may come to the rescue of the most concrete semantics: If a program is confluent on a semantic level where the rule application order is not specified, then the result will not be dependent on the particular application order. Similar considerations have been discussed for equivalences of CHR programs (Haemmerlé 2011b). From a more practical point of view, proving confluence without the assumption of termination is important, because it may be desirable to prove the confluence of a program for which termination cannot be inferred. Indeed, there exist very simple programs, such as the Collatz function, for which termination is only a conjecture (Guy 2004). Furthermore, since CHR is now a general-purpose language, analytical tools for the language must handle programs that do not terminate on any semantic level—for instance, interpreters for a Turing-complete language (Sneyers et al. 2009), or typical concurrent programs (see the numerous examples of concurrent systems given by Milner (1999)). We have also recently demonstrated that non-terminating execution models for CHR yield elegant frameworks for programming with coinductive reasoning (Haemmerlé 2011a). As a motivating example for the class of intrinsically non-terminating programs, we will use the following solution for the seminal dining philosophers problem. Example 2 (Dining philosophers) Consider the following CHR program P2 that implements a solution to the dining philosophers problem extended to count the number of times a philosopher eats: eat thk @ @ t(x, y, i), f(x), f(y) e(x, y, i) ⇐⇒ ⇐⇒ e(x, y, i + 1) f(x), f(y), t(x, y, i) The atom f(x) represents the fork x, the atom e(x, y, i) (resp. t(x, y, i)) represents an eating (thinking) philosopher seated between forks x and y, who has already eaten i times. On the one hand, the rule eat, states that if a thinking philosopher is seated between two forks lying on the table, then he may start eating once he has picked up both forks. On the other hand, the rule thk states that a philosopher may stop eating if he puts down the forks he has been using. The initial state corresponding to n dining philosophers seated around a table can be encoded by the set of atoms f(1), t(1, 2, 0), f(2), t(2, 3, 0), · · · f(n), t(n, 1, 0). Despite the fact that this program is intrinsically non-terminating, we may be interested in its confluence, for example, so that we may make use of one of the previously mentioned applications (e.g. confluence simplifies observational equivalence (Haemmerlé 2011b)). Confluence of P2 may also simplify the proofs of funda- 4 Rémy Haemmerlé mental properties of concurrent systems, such as, for instance, the absence of deadlock: Starting from the initial state, one can easily construct a derivation where the ith philosopher (i ∈ 1, . . . , n) has eaten an arbitrary number of times. Hence if P2 is confluent, we can then infer that it is possible to extend any finite derivation such that the ith philosopher eats strictly more, i.e. no derivation leads to a deadlock. To the best of our knowledge, the only existing principle for proving confluence of non-terminating programs is the so-called strong confluence criterion (Haemmerlé and Fages 2007; Raiser and Tacchella 2007). However this criterion appears to be too weak to apply to common CHR programs, such as Examples 1 and 2. In this paper, we are concerned with extending CHR confluence theory to be able to capture a large class of possibly non-terminating programs. For this purpose we derive from the so-called decreasing diagrams technique a novel criterion that generalizes all existing confluence criteria for CHR. The decreasing diagrams technique is a method developed by van Oostrom (1994) which subsumes all sufficient conditions for confluence. Applying this method requires that all local rewrite peaks (i.e. points where the rewriting relation diverges because of non-determinism) can be completed into so-called decreasing diagrams. The present paper presents two main contributions. In Sect. 4, we present a particular instantiation of the decreasing diagrams technique to CHR, and show that in the context of this particular instantiation, the verification of decreasingness can be restricted to the standard notion of critical pairs. Then in Sect. 5, we extend the so-called modularity of confluence (Frühwirth 2009) so as to be able to combine programs which have independently been proven confluent, without losing confluence. 2 Preliminaries on abstract confluence In this section, we gather some required notations, definitions, and results on the confluence of abstract rewriting systems. Terese’s compendium (2003) can be referred to for a more detailed presentation. A rewrite relation (or rewrite for short) is a binary relation on a set of objects E. For any rewrite →, the symbol ← will denote its converse, →≡ its reflexive closure, →+ its transitive closure, and  its transitive-reflexive closure. We will use →α ·→β to denote the left-composition of all rewrites →α and →β . A family of rewrites is a set (→α )α∈I of rewrites indexed by a set I of labels. For such a family and any set S K, →K will denote the union α∈(K∩I) (→α ). P P A reduction is a finite sequence of rewriting steps of the form (e0 − → → α 1 e1 − α2 P P ··· − → → αn en ). Such a reduction would be abreviated as e0 − ᾱ en with ᾱ = α1 , α2 , . . . , αn when the intermediary states e1 , . . . , en−1 are not relevant. A peak P P is a pair of reductions el ← −ᾱ e − → β̄ er from a common element e. A local peak is a peak formed by two one-step reductions. A valley is a pair of reductions P P P 0 P el − → −β̄ er ending in a common element e0 . A peak el ← −ᾱ e − → ᾱ e ← ᾱ0 er P P P P is joinable by − → −β 0 if it is true that el − → − β 0 er . β ·← β ·← ≡ Fig. 1. Confluence Fig. 2. Local Confluence 5 ≡ Diagrammatic confluence for Constraint Handling Rules Fig. 3. Strong confluence A rewrite → is terminating if there is no infinite sequence of the form e0 → e1 → e2 . . . Furthermore, we will say that → is confluent if (·) ⊆ (·) holds, locally confluent if (←·→) ⊆ (·) holds, and strongly confluent1 if (←·→) ⊆ (→≡ ·←≡ ) holds. Figures 1, 2 and 3 graphically represent these definitions. Following standard diagrammatic notation, solid edges stand for universally quantified rewrites, while dashed edges represent existentially quantified rewrites. By the seminal lemma of Newman (1942), we know that a terminating and locally confluent rewrite is confluent. Another famous result due to Huet (1980) ensures that strong confluence implies confluence. We now present a slight variation due to Hirokawa and Middeldorp (2010) of the so-called decreasing diagrams technique, which is more suitable for our purposes. The interest of the decreasing diagrams method (van Oostrom 1994) is that it reduces problems of general confluence to problems of local confluence. In exchange, the method requires the confluence diagrams (i.e. the way peaks close) to be decreasing with respect to a labeling provided with a wellfounded preorder. The method is complete in the sense that any countable confluence rewrite can be equipped with such a labeling. But because confluence is an undecidable property, finding such labeling may be difficult. In the rest of this paper, we will say that a preorder < is wellfounded, if the strict preorder  associated with < (i.e. α  β iff α < β but not β < α) is a terminating relation. Let (→α )α∈I be a family of rewrites and < be a wellfounded preorder on I. A local peak el ←α e →β er (α, β ∈ I) is decreasing with respect to < if the following holds: · ←≡ {α} ·  {β}  {α,β} < e0   {α,β}  · →≡ {β} ·  < {α}  el  er (?) 1  < where for any set K of labels, K stands for {γ ∈ I | ∃δ ∈ K.δ < γ} and K for {γ ∈ I | ∃δ ∈ K.δ  γ}. A family (→α )α∈I of rewrites is (locally) decreasing if all local peaks of the form u ←α · →β v (α, β ∈ I) are decreasing with respect to a common wellfounded preorder on I. A rewrite is (locally) decreasing if it is the union of some decreasing families of rewrites. Property (?) is graphically represented in Figure 4. For the sake of simplicity, we use a definition weaker than the one of Huet (1980). It is worth noting, that the counterexamples given in introduction stay relevant for the general definition. Rémy Haemmerlé β α 6 {β }  {α  } < {β {α ≡ ≡ }  } < {α ,β  } ,β {α } Fig. 4. Local decreasingness Theorem 3 (Decreasing Diagram (van Oostrom 1994)) A countable rewrite is confluent if and only if it is locally decreasing. We recall now some other state-of-the-art results which will be used later. Lemma 4 (Terese 2003) (i) For all rewrites →1 , →2 if (←1 · 2 ) ⊆ (2 · 1 ), then (1 · 2 ) ⊆ (2 · 1 ). (ii) For all rewrites →1 ,→2 s.t. →1 ⊆ →2 ⊆ 1 , →2 is confluent iff →1 is confluent. 3 Preliminaries on Constraint Handling Rules In this section, we recall the syntax and the semantics of CHR. Frühwirth’s book (2009) can be referred to for a more general overview of the language. 3.1 Syntax The formalization of CHR assumes a language of (built-in) constraints containing equality over some theory C, and defines (user-defined) atoms using a different set of predicate symbols. In the following, R will denote an arbitrary set of identifiers. By a slight abuse of notation, we allow confusion of conjunctions and multiset unions, omit braces around multisets, and use the comma for multiset union. We use fv(φ) to denote the set of free variables of a formula φ. The notation ∃ -ψ φ denotes the existential closure of φ with the exception of free variables of ψ. A (CHR) program is a finite set of eponymous rules of the form: (r @ K\H ⇐⇒ G | B; C) where K (the kept head), H (the removed head), and B (the user body) are multisets of atoms, G (the guard) and C (the built-in body) are conjunctions of constraints and, r ∈ R (the rule name) is an identifier assumed unique in the program. Rules in which both heads are empty are prohibited. An empty guard > (resp. an empty kept head) can be omitted with the symbol | (resp. with the symbol \). Rules are Diagrammatic confluence for Constraint Handling Rules 7 divided into two classes: simplification rules2 if the removed head is non-empty and propagation rules otherwise. Propagation rules can be written using the alternative syntax: (r @ K =⇒ G | B; C) 3.2 Operational semantics In this section, we recall the equivalence-based operational semantics ωe of Raiser et al. (2009). It is equivalent to the very abstract semantics ωva of Frühwirth (1998), which is the most general operational semantics of CHR. We prefer the former because it includes an rigorous notion of equivalence, which is an essential component of confluence analysis. A (CHR) state is a tuple hC; E; x̄i, where C (the user store) is a multiset of atoms, E (the built-in store) is a conjunction of constraints, and x̄ (the global variables) is a finite set of variables. Unsurprisingly, the local variables of a state are those variables of the state which are not global. When no confusion can occur, we will syntactically merge user and built-in stores. We may futhermore omit the global variables component when states have no local variables. In the following, we use Σ to denote the set of states. Following Raiser et al., we will always implicitly consider states modulo a structural equivalence. Formally, this state equivalence is the least equivalence relation ≡ over states satisfying the following rules: • • • • hE; C; x̄i ≡ hE; D; x̄i if C  ∃ -(E,x̄) C ↔ ∃ -(E,x̄) D hE; ⊥; x̄i ≡ hF; ⊥; ȳi hA, c; C, c=d; x̄i ≡ hA, d; C, c=d; x̄i hA; C; x̄i ≡ hA; C; {y} ∪ x̄i if y ∈ / fv(A, C). Once states are considered modulo equivalence, the operation semantics of CHR can be expressed by a single rule. Formally the operational semantcs of a program P P is given by the least relation − → on states satisfying the rule: (r @ K\H ⇐⇒ G|B; C) ∈ Pρ lv(r) ∩ fv(E, D, x̄) = ∅ P hK, H, E; G, D; x̄i − → hK, B, E; G, C, D; x̄i P where ρ is a renaming. A program P is confluent (resp. terminating) if − → is confluent (resp. terminating). Before going further, we recall an important property of CHR semantics. This property, monotonicity, means that if a transition is possible in a state, then the same transition is possible in any larger state. To help reduce the level of verbosity we introduce the notion of the quantified conjunction of states (Haemmerlé and Fages 2007). This operator allows the composition of states with disjoint local variables while quantifying some of their global variables (i.e. changing global variables 2 Unlike standard presentations, our definition does not distinguish between simplification rules form the so-called simpagation rules. 8 Rémy Haemmerlé into local ones). Formally, the quantified conjunction is a binary operator on states parametrized by a set of variables z̄ satisfying: hE; C; x̄i ⊕z̄ hF; D; ȳi = hE, F; C, D; (x̄ȳ) \ z̄i if (fv(E, C) ∩ fv(F, D)) ⊆ (x̄ ∩ ȳ) Note the side condition is not restrictive, as local variables can always be renamed using the implicit state equivalence. Proposition 5 (Monotonicity of CHR) Let P be a CHR program, S, S1 , S2 be CHR states, and x̄ be a set of variables. P P If S1 − → S2 , then S1 ⊕x̄ S − → S2 ⊕x̄ S 3.3 Declarative semantics Owing to its origins in the tradition of CLP, the CHR language features declarative semantics through direct interprestation in first-order logic. Formally, the logical reading of a rule of the form: K\H ⇐⇒ G | B; C is the guarded equivalence: ∀ (K ∧ G) → H ↔ ∃ -(K,H) (G ∧ C ∧ B)  The logical reading of a program P within a theory C is the conjunction of the logical readings of its rules with the constraint theory C. It is denoted by CP. Operational semantics is sound and complete with respect to this declarative semantics (Frühwirth 1998; Abdennadher et al. 1999). Furthermore, any program confluent with respect to ωe has a consistent logical reading (Abdennadher et al. 1999; Haemmerlé et al. 2011). 4 Diagrammatic confluence for Constraint Handling Rules In this section, we are concerned with proving confluence of a large class of CHR programs. Indeed, as explained in the introduction, existing criteria are not sufficiently powerful to infer confluence of common non-terminating programs. (See Examples 13 and 14 for concrete examples). To avoid this limitation, we will derive from the decreasing diagrams technique a novel csriterion on CHR critical pairs that generalizes both local and strong confluence criteria. An analogue criterion has been developed for linear Term Rewriting Systems (TRS) (Jouannaud and van Oostrom 2009). 4.1 Labels for Constraint Handling Rules In order to apply the decreasing diagram technique to CHR, we will need first to label CHR transitions. In this work, we will use two labelings proposed by van Oostrom (2008) for TRS. The first one is the so-called rule-labeling. It consists of P labeling each transition a − → b with the name of the applied rule. This labeling Diagrammatic confluence for Constraint Handling Rules 9 is ideal for capturing strong confluence-like properties for linear TRS. Within the proof of our main result, we will also use the so-called self-labeling which consists P of labeling each transition a − → b with its source a. This second labeling captures the confluence of terminating rewrites. In practice, we will assume that the set R of rule identifiers is defined as a disjoint union Ri ] Rc . For a given program P, we denote by P i (resp. P c ) the set of rules form P built with Ri (resp. Rc ). We call P i the inductive part of P, because we will subsequently assume that P i is terminating, while P c will be called coinductive, as it will be typically non-terminating. Definition 6 (Rule-labeling) P The rule-labeling of a CHR program P is the family of rewrites (− → r )r∈R indexed {r} P by rule identifiers, where − → −→. A preorder < on rule identifiers is admissible, r =− if any inductive rule identifier is strictly smaller than any coinductive one (i.e. for any ri ∈ Ri and any rc ∈ Rc , rc  ri holds). 4.2 Critical peaks In TRS, the basic techniques used to prove confluence consist of showing various confluence criteria on a finite set of special cases, called critical pairs. Critical pairs are generated by a superposition algorithm, in which one attempts to capture the most general way the left-hand sides of the two rules of the system may overlap. The notion of critical pairs has been successfully adapted to CHR by Abdennadher et al. (1996). Here, we introduce a slight extension of the notion that takes into account the rule-labeling we have just defined. Definition 7 (Critical peak ) Let us assume that r1 and r2 are CHR rules renamed apart: (r1 @ K1 \H1 ⇐⇒ G1 | B1 ; C1 ) ∈ P1 (r2 @ K2 \H2 ⇐⇒ G2 | B2 ; C2 ) ∈ P2 A critical ancestor (state) Sc for the rules r1 and r2 is a state of the form: ∩ ∆ Sc = hH∆ 1 , H1 , H2 ; D; x̄i satisfying the following properties: • • • • ∩ ∩ ∩ ∩ (K1 , H1 )=(H ˙ ∆ ˙ ∆ 1 , H1 ), (K2 , H2 )=(H 2 , H2 ), H1 6= ∅, and H2 6= ∅; x¯1 = fv(K1 , H1 ), x¯2 = fv(K2 , H2 ) and x̄ = x¯1 ∪ x¯2 ; D = (H∩ ˙ ∩ 1 =H 2 , G1 , G2 ) and ∃D is C-satisfiable; ∩ H1 6⊆ K1 or H∩ 2 6⊆ K2 . Then the following tuple is called a critical peak between r1 and r2 at Sc : P P ∆ hK1 , B1 , H∆ −r1 Sc − → r2 hK2 , B2 , H1 ; D, C2 ; x̄i 2 ; D, C1 ; x̄i ← A critical peak between a program P and a program Q is a critical peak between a rule of P and a rule of Q. A critical peak of a program P is a critical peak between P and itself. A critical peak is inductive if it involves only inductive rules (i.e. a critical peak of P i ), or coinductive if it involves at least one coinductive rule (i.e. a critical peak between P c and P). 10 Rémy Haemmerlé Example 8 Consider the solver partial order P1 , given in Example 1. The following ciritial peak stems from overlapping the heads of the rules antisymmetry and transitivity: P P 1 1 hx = yi ←−− −→ anti. hx ≤ y, y ≤ xi − trans. hx ≤ y, y ≤ x, x ≤ xi 4.3 Rule-decreasingness We now come to our main result, showing that the study of decreasingness with respect to the rule-labeling can be restricted to critical peaks without loss of generality. Definition 9 (Critical rule-decreasingness) A program P is (critically) rule-decreasing w.r.t. an admissible preorder < if: • the inductive part of P is terminating, Pi Pi • all inductive critical peaks of P are joinable by − · −, and • all coinducitve critical peaks of P are decreasing w.r.t. <. A program is rule-decreasing if it is rule-decreasing with respect to some admissible preorder. A rule-decreasing program is strongly rule-decreasing if it is purely coinductive (i.e. without inductive rules). Theorem 10 Rule-decreasing programs are confluent. Proof Let us assume that P is a rule-decreasing program w.r.t. a given preorder <R . Now P let (− → α )α∈(Σ∪Rc ) , the family of rewrites indexed by rule or state, be defined as P − →α = ( i −P−→ ∩({α} × Σ) {α} −−→ if α ∈ Σ (self-labeling on inductive part) if α ∈ Rc (rule-labeling on coinductive part) i P Let < be the union of <R , − → + , and {(r, α) | r ∈ R & α ∈ I}. By assuming without loss of generality that R is finite (i.e. <R is trivially wellfounded), we obtain that < is wellfounded. With the help of Theorem 3, it suffices to prove that P P each peak Sα ← −α S − → β Sβ (α, β ∈ (Rc ∪ Σ)) is decreasing w.r.t. <. We distinguish two cases: 1 The rules rα and rβ used to respectively produce Sα and Sβ apply to different parts {rβ } {rα } of S. By monotonicity of CHR transitions, we infer Sα −−−→ S 0 ←−−− Sβ . We have to show this valley respects property (?) within the definition of the decreasing diagrams. We proceed by cases on the types of the rules rα and rβ : i P + P 0 1.1 rα is inductive. We have α = S, α − → Sα , and Sβ − → Sβ S . i P P 0 i 1.1.1 rβ is inductive. We have β = S, β − → Sβ , and Sα − → Sα S . Since P is P 0 P terminating, we infer α  Sα and β  Sβ . We conclude Sα − →Sα S ← −Sβ Sβ , i.e. the peak is decreasing w.r.t. <. Diagrammatic confluence for Constraint Handling Rules 11 P 0 1.1.2 rβ is coinductive. We have β ∈ Rc , Sα − → β S , and β  Sα . We conclude P P 0 −β Sβ , i.e. the peak is decreasing w.r.t. <. Sα − →Sα S ← P 0 1.2 rα is coinductive. We have α ∈ Rc and Sβ − → α S . 1.2.1 rβ is inductive. The case is symmetric with case 1.1.2. P P 0 1.2.2 rβ is coinductive. We have β ∈ Rc and Sα − → → β S . We conclude Sα − α P −β Sβ , i.e. the peak is decreasing w.r.t. <. S0 ← 2 The applications of the rules rα and rβ used to respectively produce Sα and Sβ P P overlap. There should exist a critical peak Rα ← −rα Sc − → rβ Rβ , a state R, and a set of variables ȳ, such that S ≡ Sc ⊕x̄ R, Sα ≡ Rα ⊕x̄ R, and Rβ ≡ Rβ ⊕x̄ R. We proceed by cases on the types of rules rα and rβ : 2.1 Both rules are inductive: We have β = α = S, and by hypothesis we have i i i i P P 0 P 1 P Rα ≡ Rα −→ Rα −→ · · · Sαm ≡ S 0 ≡ Rβn · · · ← − Rβ1 ← − Rβ0 ≡ Rβ By monotony of CHR we infer: i i i i P P P P Sα ≡ Sα0 − → Sα1 − → · · · Sαm ≡ S ≡ Sβn · · · ← − Sβ1 ← − Sβ0 ≡ Sβ i where Sαi = Rα ⊕x̄ R (for i ∈ 0, . . . m), Sβi = Rβi ⊕x̄ R (for i ∈ 0, . . . n), and P S = S 0 ⊕ R. By construction of (− → α )α∈Σ×Rc we get: P P P 1 P 0 S Sα − → → Sα1 · · · Sαm ≡ S ≡ Sβn · · · ← −Sβ1 Sβ1 ← −Sβ0 Sβ Sα α −  To conclude about the discussion of the decreasingness of the peak, it is just P + necessary to notice that for any i ∈ 0, . . . m and any j ∈ 0, . . . n, both S − → Sαi j j P + i and S − → Sβ hold, i.e. Sα , Sβ ∈ {α, β}. 2.2 One of the rules is coinductive. By hypothesis we have · ←≡ {r1 } ·  {r1 ,r2 } · ←≡ {r1 } ·  {r2 } Rβ {r2 } Sβ  {r1 ,r2 } < ·  {r1 ,r2 }  · →≡ {r2 } ·  < {r1 }  Rα  or equivalently by monotony of CHR:  < ·  {r1 ,r2 }  · →≡ {r2 } ·  < {r1 }  Sα  Theorem 10 strictly subsumes all the criteria for proving confluence of CHR programs we are aware of, namely the local confluence (Abdennadher et al. 1999) and the strong confluence (Haemmerlé and Fages 2007) criteria. Corollary 11 (Local confluence) P P A terminating program P is confluent if its critical peaks are joinable by − ·  −. Corollary 12 (Strong confluence) P ≡ P ≡ A program P is confluent if its critical peaks are joinable by − → ·← − . The following examples show that the rule-decreasingness criterion is more powerful than both local and strong confluence criteria. 12 Rémy Haemmerlé hx ≤ x, x ≤ yi trans. anti. hx ≤ xi hx ≤ y, y ≤ z, z ≤ yi hx ≤ x, x ≤ y, x ≤ xi hx ≤ y, y = zi ref lex. anti. trans. anti. hx ≤ y, y ≤ z, z ≤ y, x ≤ zi dupl. hx ≤ y, y ≤ xi anti. hx ≤ y, x ≤ z, y = zi Fig. 5. Some rule-decreasing critical peaks for P1 Example 13 Consider the solver P1 for partial order given in Example 1. Since P1 is trivially non-terminating one cannot apply local confluence criterion. Strong confluence does not apply either, because of some non-strongly joinable critical peaks. For instance, considere the peak given at Example 8: P P 1 1 hx = yi ←−− −→ anti. hx ≤ y, y ≤ xi − trans. hx ≤ y, y ≤ x, x ≤ xi It can be seen that hx = yi may not be reduced, and that the right-hand side cannot be rewritten into the left-hand side in less than two steps (e.g. by using reflexivity and antisymmetry rules). Nonetheless, confluence of P1 can be deduced using the full generality of Theorem 10. For this purpose, assume that all rules except transitivity are inductive and take any admissible preorder. Clearly the inductive part of P1 is terminating. Indeed the application of any one of the three first rules strictly reduces the number of atoms in a state. Then by a systematic analysis of all critical peaks of P1 , we prove that each peak can be closed while respecting the hypothesis of ruledecreasingness. In fact all critical peaks can be closed without using transitivity. Some rule-decreasing diagrams involving the transitivity rule are given as examples in Figure 5. Example 14 Consider the program P2 implementing the dining philosophers problem, as given in Example 2. The confluence of P2 cannot be inferred by either local or strong confluence. On the one hand, P2 is obviously non-terminating, and hence prevents the application of the local confluence criterion. On the other hand, P2 has critical P2 P2 peaks which are not in (−− · −−). Consider as an example the peak given in Figure 6. It is critical for the rule eating with itself, but it is not joinable by P2 ≡ P2 ≡ (−−→ · ←−− ). However, the figure shows that it is joinable by P P P P P P 2 ≡ 2 ≡ 2 ≡ 2 ≡ 2 ≡ 2 ≡ −−→ −→ −→ −− −− −− thk · − eat · − thk · ← thk · ← eat · ← thk i.e. the peak is decreasing. In fact, all the critical peaks of P2 involve only the rule eat and may be closed in a similar manner. Thus, by assuming that the eat rule is coinductive and strictly greater than thk, we can infer, using Theorem 10, that P2 is confluent. Diagrammatic confluence for Constraint Handling Rules 13 hf(x), f(y), f(z), t(x, y, i), t(y, z, j)i eat hf(z), e(x, y, i + 1), t(y, z, j)i eat hf(x), t(x, y, i), e(y, z, j + 1)i thk thk hf(x), f(y), f(z), t(x, y, i + 1), t(y, z, j)i hf(x), f(y), f(z), t(x, y, i), t(y, z, j + 1)i eat eat hf(x), t(x, y, i + 1), e(y, z, j + 1)i thk hf(z), e(x, y, i + 1), t(y, z, j + 1)i thk hf(x), f(y), f(z), t(x, y, i + 1), t(y, z, j + 1)i Fig. 6. A rule-decreasing critical peak of P2 4.4 On program partitioning The rule-decreasingness criterion is based on the division of the program into a terminating part and a possibly non-terminating one. Since a program can be partitioned in multiple ways, it may be the case that the rule-decreasingness of a program depends on the splitting used (see Example 16). From a purely theoretical point of view, this is not a particular drawback, since the property we aim at proving (i.e. the confluence of program) is undecidable. From a more pragmatical point of view, it appears that the classic examples of CHR programs can be proved to be rule-decreasing without any assumption of termination. In particular, we were unable to find a counterexample of a confluent but non-strongly rule-decreasing program in Frühwirth’s book (2009). Example 15 Consider the CHR solver for partial order given in Example 1. Assuming that any rule is coinductive, P can be shown strongly rule-decreasing with respect the order < satisfying: transitivity  duplicate  antisymmetry  reflexivity As illustrated by Figure 5, critical peaks involving transitivity rules may be closed using only rules that are strictly smaller. Similarly, one can verify that any critical peak between a given rule α and a smaller (or equal) one can be closed using only rules strictly smaller than α (i.e. all the peaks are trivialy decreasing). The choice of a good partition may simplify proofs of rule-decreasingness: by maximizing the inductive part of a program, the number of peaks which must be proved decreasing (i.e. the coinductive critical peaks) is reduced. Indeed, while the joinability of a peak with respect to the inductive part of program – which must 14 Rémy Haemmerlé be terminating – is a decidable problem and can be efficiently automatized,3 the rule-decreasingness of a peak with respect to a possibly non-terminating program is likely to be undecidable.4 Consequently, a good partition will limit the use of heuristics or human interactions necessary to infer a rule-decreasing diagram for each coinductive critical peak. Since termination is also an undecidable property, we cannot expect to fully automatize the search for the optimal partition, and we must content ourselves with heuristic procedures. Despite the fact that the formal development of such procedures is beyond the scope of this paper, our practical experience suggests that a trivial partitioning may be interesting. This partition consists of considering as inductive only those rules that strictly reduce the number of atoms in a state. Even if this choice is not necessarily optimal and may even produce bad partitions, it does seem to produce relevant partitions for typical CHR solvers, as illustrated by Example 13. We now give two counterexamples. The first shows that rule-decreasingness can be dependent on particular splittings, while the second presents a confluent program which is not rule-decreasing. Example 16 Consider the following CHR rules: duplicate @ p(x)\p(x) ⇐⇒ > s− @ p(s(x)) ⇐⇒ p(x) s+ @ p(x) ⇐⇒ p(s(x)) − + We denote by P16 the program built from the duplicate and s− rules, and by P16 + the program built from the duplicate and s rules. − P16 is clearly terminating: the duplicate rule strictly reduces the number of atoms in a state, while s− leaves the number of atoms unchanged, but strictly reduces the − size of the argument of one of them. We can also verify that P16 has a single critical peak. Figure 7 shows the only way this peak may be closed. Thus, by assuming that all rules are inductive, we can infer that the program is rule-decreasing. However if − s− is assumed to be coinductive, we can verify that the sole critical peak of P16 is decreasing with respect to no admissible order. − + As in the case of P16 , P16 yields only one critical peak which is decreasing with respect to no admissible order (see Figure 8). However, this time s+ is not terminat+ ing, and so cannot been assumed inductive. Consequently P16 cannot be inferred to be confluent using Theorem 10. 5 Modularity of CHR confluence In this section, we are concerned with proving the confluence of union of confluent programs in a modular way (in particular of those programs proved confluent using the rule-decreasing criterion). In practice, we improve on a result of 3 4 See the works about CHR local confluence (Abdennadher et al. 1999; Abdennadher 1997). Decreasingness of a peak for a given order seems a more difficult problem than joinability without termination assumption—which is itself undecidable. Diagrammatic confluence for Constraint Handling Rules hp(s(x)), p(s(x))i p s− hp(s(x))i hp(x)i hp(x), p(x)i p hp(s(x)), p(x)i s− s− p hp(x), p(x)i − Fig. 7. Critical peak of P16 15 s+ hp(x)i hp(s(x)), p(x)i s+ hp(s(x))i s+ p hp(s(x)), p(s(x))i − Fig. 8. Critical peak of P16 Frühwirth (2009) which states that a terminating union of confluent programs which do not overlap (i.e. which do not have a critical peak) is confluent. In particular, we allow some overlapping and we drop the termination hypotheses. Theorem 17 (Modularity of confluence) Let P and Q be two confluent CHR programs. If any critical peak between P and Q P ≡ Q is joinable by − ·← − , then PQ is confluent. Before formally proving the theorem, it is worth noting that, despite the fact that modularity of confluence and the rule-decreasing theorem have similar flavors, both results have different scopes. Indeed, on the one hand modularity of confluence does not assume anything about the way in which P and Q are confluent. For instance, if P and Q are two rule-decreasing programs, Theorem 17 does not require the union of the inductive parts of P and Q to be terminating, while Theorem 10 does. This is important since, termination is not a modular property: even if two terminating programs do not share any user-defined atoms, one cannot be sure that their union is terminating. (See Section 5.4 of Frühwirth’s book (2009) for more details.) On the other hand, the rule-decreasing criterion allows the critical peaks to be closed in a more complex way than Theorem 17 permits. The proof of the theorem rests on the following lemma, which states that under Q P the hypotheses of Theorem 17, − → “strongly commutes” with − →. Lemma 18 Q Q Q P ≡ P P ≡ If critical peaks between P and Q are in − · ← − , then (← −· − ) ⊆ (− · ← − ). Proof Q We prove by induction on the length of the derivation Sc −  S 0 that for any peak Q Q P P ≡ 0 0 S ← − Sc −  S , the property S −  · ← − S holds. The base case Sc ≡ S 0 is Q Q P immediate. For the inductive case S ← − Sc −  S 00 − → S 0 , we know by the induction Q P ≡ hypothesis that there exists a state R, such that S −  R ← − S 00 . From here, Q P ≡ it is sufficient to prove that R −  · ← − S 0 and to use the definition of relation Q Q P composition in order to conclude. We assume that S 00 − → R, otherwise R − ·← − ≡ 0 S holds trivially. We distinguish two cases: either the rules involved in the local Q P peak R ← − S 00 − → S 0 apply to different parts of S 00 , or else their applications 16 Rémy Haemmerlé Q P overlap. In the first case, we use CHR monotonicity to infer R − →·← − S 00 . In the Q P 000 00 −·− → S , a state R0 , and a set second case, there must exist a critical peak R ← 00 0 000 0 of variables x̄, such that R ⊕x̄ R ≡ R, S ⊕x̄ R ≡ S 0 . Then by the hypotheses Q P ≡ and CHR monotonicity, we obtain the results that R − ·← − S0. Proof of Theorem 17 Q P Let →1 = − , →2 = − . On one hand, by the confluence of P and Q, we have (←1 · →1 ) ⊆ (→1 · ←1 ) and (←2 · →2 ) ⊆ (→2 · ←2 ). (Note that 1 = →1 and 2 = →2 .) On the other hand, by combining Lemma 18 and case (i) of Lemma 4, we infer (←1 · →2 ) ⊆ (→2 · ←1 ). By a trivial application of Theorem 3, we find that PQ PQ →{1,2} is confluent. We conclude by noting −−→ ⊆ →{1,2} ⊆ −−, and apply case PQ PQ (ii) of Lemma 4. (It is worth noting that →{1,2} equals neither −−→ nor −−.) 6 Conclusion By employing the decreasing diagrams technique in CHR, we have established a new criterion for CHR confluence that generalizes local and strong confluence criteria. The crux of this novel criterion rests on the distinction between the terminating part (the so-called inductive part) and non-terminating part (the so-called coinductive part) of a program, together with the labeling of transitions by rules. Importantly, we demonstrate that in the particular case of the proposed application of the decreasing diagrams, the check on decreasingness can be restricted to the sole critical pairs, hence making it possible to automatize the process. We also improve on a result about the so-called modularity of confluence, which allows a modular combination of rule-decreasing programs, without loss of confluence. It is worth saying that all the diagrammatic proofs sketched in the paper have been systematically verified by a prototype of a diagrammatic confluence checker. In practice, this checker automatically generates all the critical pairs of a program provided with an admissible order, then using user-defined tactics (finit sets of reductions) tries to join these while respecting rule-decreasingness. Current work involves investigating the development of heuristics to automatically infer rule-decreasingness without human interaction. We also plan to develop a new completion procedure based on the criterion presented here. Because duplicate removal is an important programming idiom of CHR, the development of new confluence-proof techniques capable of dealing with confluent but non-ruledecreasing programs, like those given in Example 16, is also worth investigating. Diagrammatic confluence for Constraint Handling Rules 17 References Abdennadher, S. 1997. Operational semantics and confluence of constraint propagation rules. In Proceedings of the International Conference on Principles and Practice of Constraint Programming (CP). LNCS, vol. 1330. Springer, Berlin, Germany, 252–266. Abdennadher, S. and Frühwirth, T. 1999. Operational equivalence of CHR programs and constraints. In Proceedings of the International Conference on Principles and Practice of Constraint Programming (CP). LNCS, vol. 1713. Springer, Berlin, Germany, 43–57. Abdennadher, S., Frühwirth, T., and Meuss, H. 1996. On confluence of Constraint Handling Rules. In Proceedings of the International Conference on Principles and Practice of Constraint Programming (CP). LNCS, vol. 1118. Springer, Berlin, Germany, 1–15. Abdennadher, S., Frühwirth, T. W., and Meuss, H. 1999. Confluence and semantics of constraint simplification rules. Constraints 4, 2, 133–165. Duck, G. J., Stuckey, P. J., Garcı́a de la Banda, M., and Holzbaur, C. 2005. The refined operational semantics of Constraint Handling Rules. In Proceedings of the International Conference on Logic Programming (ICLP). LNCS, vol. 3668. Springer, Berlin, Germany, 90–104. Duck, G. J., Stuckey, P. J., and Sulzmann, M. 2007. Observable confluence for constraint handling rules. In Proceedings of the International Conference on Logic Programming (ICLP). LNCS, vol. 4670. Springer, Berlin, Germany, 224–239. Frühwirth, T. 1998. Theory and practice of Constraint Handling Rules. J. Logic Programming, Special Issue on Constraint Logic Programming 37, 1–3, 95–138. Frühwirth, T. 2005. Parallelizing union-find in Constraint Handling Rules using confluence. In Proceedings of the International Conference on Logic Programming (ICLP). LNCS, vol. 3668. Springer, Berlin, Germany, 113–127. Frühwirth, T. 2009. Constraint Handling Rules. Cambrige University Press, Cambrige, UK. Guy, R. 2004. Unsolved Problems in Number Theory. Problem Books in Mathematics. Springer, Berlin, Germany. Haemmerlé, R. 2011a. (Co)-Inductive semantics for Constraint Handling Rules. Theory and Practice of Logic Programming, 27th Int’l. Conference on Logic Programming (ICLP’11) Special Issue 11, 4–5, 593–609. Haemmerlé, R. 2011b. Observational equivalences for linear logic concurrent constraint languages. Theory and Practice of Logic Programming, 27th Int’l. Conference on Logic Programming (ICLP’11) Special Issue 11, 4–5, 469–485. Haemmerlé, R. and Fages, F. 2007. Abstract critical pairs and confluence of arbitrary binary relations. In Proceedings of the International Conference on Rewriting Techniques and Applications (RTA). Number 4533 in LNCS. Springer, Berlin, Germany, 214–228. Haemmerlé, R., López, P., and Hermenegildo, M. 2011. CLP projection for Constraint Handling Rules. In International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (PPDP). ACM Press, New York, NY, USA, 137–148. Hirokawa, N. and Middeldorp, A. 2010. Decreasing diagrams and relative termination. In IJCAR. LNCS, vol. 6173. Springer, Berlin, Germany, 487–501. Huet, G. 1980. Confluent reductions: Abstract properties and applications to term rewriting systems: Abstract properties and applications to term rewriting systems. Journal of the ACM 27, 4, 797–821. Jouannaud, J.-P. and van Oostrom, V. 2009. Diagrammatic confluence and completion. In Proceedings of 36th Internatilonal Collogquium on Automata, Languages and Programming: ICALP 2009. LNCS, vol. 5556. Springer, Berlin, Germany, 212–222. 18 Rémy Haemmerlé Meister, M. 2006. Fine-grained parallel implementation of the preflow-push algorithm in CHR. In Workshop on Logic Programming (WLP). INFSYS Research report 184306-02. T.U.Wien, Vienna, Austria, 172–181. Milner, R. 1999. Communicating and mobile systems - the Pi-calculus. Cambrige University Press, Cambrige, UK. Newman, M. H. A. 1942. On theories with a combinatorial definition of ”equivalence”. Annals of mathematics 43, 2. Raiser, F., Betz, H., and Frühwirth, T. 2009. Equivalence of CHR states revisited. In Proceedings of the International Workshop on Constraint Handling Rules (CHR). Report CW 555. Kath. Univ. Leuven, Leuven, Belgium, 34–48. Raiser, F. and Tacchella, P. 2007. On confluence of non-terminating CHR programs. In Proceedings of the International Workshop on Constraint Handling Rules (CHR). 63–76. Sneyers, J., Schrijvers, T., and Demoen, B. 2009. The computational power and complexity of Constraint Handling Rules. ACM Trans. Program. Lang. Syst. 31, 2. Terese. 2003. Term Rewriting Systems. Cambrige University Press, Cambrige, UK. van Oostrom, V. 1994. Confluence by decreasing diagrams. Theor. Comput. Sci. 126, 2, 259–280. van Oostrom, V. 2008. Confluence by decreasing diagrams converted. In Proceedings of the International Conference on Rewriting Techniques and Applications (RTA). LNCS. Springer, Berlin, Germany, 306–320.
6cs.PL
1 Design Exploration of Hybrid CMOS-OxRAM Deep Generative Architectures arXiv:1801.02003v1 [cs.ET] 6 Jan 2018 Vivek Parmar, Member, IEEE, and Manan Suri, Member, IEEE Indian Institute of Technology-Delhi, Hauz Khas, New Delhi-110016, email: [email protected] Abstract—Deep Learning and its applications have gained tremendous interest recently in both academia and industry. Restricted Boltzmann Machines (RBMs) offer a key methodology to implement deep learning paradigms. This paper presents a novel approach for realizing hybrid CMOS-OxRAM based deep generative models (DGM). In our proposed hybrid DGM architectures, HfOx based (filamentary-type switching) OxRAM devices are extensively used for realizing multiple computational and non-computational functions such as: (i) Synapses (weights), (ii) internal neuron-state storage, (iii) stochastic neuron activation and (iv) programmable signal normalization. To validate the proposed scheme we have simulated two different architectures: (i) Deep Belief Network (DBN) and (ii) Stacked Denoising Autoencoder for classification and reconstruction of hand-written digits from a reduced MNIST dataset of 6000 images. Contrastivedivergence (CD) specially optimized for OxRAM devices was used to drive the synaptic weight update mechanism of each layer in the network. Overall learning rule was based on greedylayer wise learning with no back propagation which allows the network to be trained to a good pre-training stage. Performance of the simulated hybrid CMOS-RRAM DGM model matches closely with software based model for a 2-layers deep network. Top-3 test accuracy achieved by the DBN was 95.5%. MSE of the SDA network was 0.003, lower than software based approach. Endurance analysis of the simulated architectures show that for 200 epochs of training (single RBM layer), maximum switching events/per OxRAM device was ∼ 7000 cycles. Index Terms—Deep Learning, Stacked Denoising Autoencoder (SDA), Deep Belief Network (DBN), RRAM, Deep Generative Models, Restricted Boltzmann Machine (RBM) I. I NTRODUCTION HE neurons in our brain have a capacity to process a large amount of high dimensional data from various sensory inputs while still focusing on the most relevant components for decision making [1] [2]. This implies that the biological neural networks have a capacity to perform dimensionality reduction to facilitate decision making. In the field of machine learning, artificial neural networks also require a similar capability because of the availability of massive amounts of high dimensional data being generated everyday through various sources for digital information. Thus it becomes imperative to derive an efficient method for dimensionality reduction to facilitate tasks like classification, feature learning, storage, etc. Deep generative networks such as Autoencoders have been shown to perform better than many commonly used statistical techniques such as PCA (principal component analysis), ICA (Independent Component Analysis) for encoding and decoding of high dimensional data [3]. These networks are traditionally trained using gradient descent based on back-propagation. However it is observed that for deep networks, gradient T descent doesn’t converge and gets stuck in a local minima in case of purely randomized initialization [4]. A solution to this problem is, weight initialization by utilizing a generative layerby-layer training procedure based on Contrastive Divergence (CD) algorithm [5]. To maximize the performance of this algorithm, a dedicated hardware implementation is required to accelerate computation speed. Traditionally CMOS based designs have been used for this by utilizing commonly available accelerator like GPUs [6], FPGAs [7], ASICs [8] [9], etc. Recently with the introduction of the emerging non-volatile memory devices such as PCM, CBRAM, OxRAM, MRAM, etc, there is further optimization possible in design of a dedicated hardware accelerators given the fact that they allow replacement of certain large CMOS blocks while simultaneously emulating storage and compute functionalities [10] [11] [12] [13] [14] [15], [16] [17] [18]. Recent works that present designs of Contrastive Divergence based learning using resistive memory devices are [19], [20]. In [19] the authors propose the use of a two-memristor model as a synapse to store one synaptic weight. In [20] the authors have experimentally demonstrated a 45-synapse RBM realized with 90 resistive phase change memory (PCM) elements trained with a bio-inspired variant of the contrastive divergence algorithm, implementing Hebbian and anti-Hebbian weight update. Both these designs justify the use of RRAM devices as dense non-volatile synaptic arrays. Also both make use of a spike based programming mechanism for gradually tuning the weights. Negative weights have been implemented by using two devices in place of a single device per synapse. It is apparent that in order to implement more complex learning rules with larger and deeper networks the hardware complexity and area footprint increases considerably while using this simplistic design strategy. As a result, there is a need to increase further increase the functionality of the RRAM devices in the design beyond simple synaptic weight storage. In [21] we have described a design exploiting the intrinsic device-to-device variability as a substitute for the randomly distributed hidden layer weights in order to gain both area and power savings. In [22], we have made use of another property of the RRAM devices by exploiting the cycle-to-cycle variability in device switching to create a stochastic neuron as a basic building block for a hybrid CMOS-OxRAM based Restricted Boltzmann Machines (RBM) circuit. In this paper we build upon our previous work on hybrid CMOS-OxRAM RBM with the following novel contributions: • Design of deep generative models (DGM) that utilize the hybrid CMOS-RRAM RBM as a building block. 2 Design of programmable output normalization block for stacking multiple hybrid RBMs. • Simulation and performance analysis of two types of DGM architectures at 8-bit synaptic weight resolution: (i) Deep Belief Networks (DBN) and (ii) Stacked Denoising Autoencoders (SDA) • Analysis of learning performance (accuracy, MSE) while using only greedy layer-wise training (without backprop). • Analysis of learning impact on RRAM device endurance. In our hybrid CMOS-OxRAM DGM implementation the OxRAM devices have been exploited for four different storage and compute functions: (i) Synaptic weight matrix, (ii) neuron internal state storage, (iii) stochastic neuron firing and (iv) programmable gain control block. Section II discusses the basics of OxRAM and deep generative networks. Section III describes the implementation details of our proposed hybrid CMOS-OxRAM DGM architectures. Section IV discusses simulation results and Section V gives the conclusions. • II. BASICS OF OX RAM AND DGM A RCHITECTURES A. OxRAM Working Fig. 2. Cycle-to-Cycle ON/OFF-state resistance distribution for HfOx device presented in [22]. by using an optional selector device (i.e. 1R-1T/1D configuration). OxRAM devices are known to demonstrate cycle-tocycle (C2C) (shown in Fig. 2), and device-to-device (D2D) variability [25] [26], [27]. In our proposed architecture, we exploit OxRAM (a) C2C switching variability for realization of stochastic neuron circuit, (b) binary resistive switching for realization of synaptic weight arrays/neuron internal state storage and (c) SET-state resistance modulation for normalization block. B. Restricted Boltzmann Machines (RBM) Fig. 1. Basic IV characteristics for HfOx OxRAM device with switching principle indicated. Experimental data corresponding to device presented in [22]. OxRAM devices are two-terminal MIM-type structures (metal-insulator-metal) sandwiching an active metal-oxide based insulator layer, between metallic electrodes (see Fig. 1). The active layer exhibits reversible non-volatile switching behavior on application of appropriate programming current/voltage across the device terminals. In the case of filamentary- OxRAM devices, formation of a conductive filament in the active layer, leads the device to a low-resistance (LRS/On) SET-state, while dissolution of the filament puts the device in a high-resistance (HRS/Off) RESET-state. The conductive filament is composed of oxygen vacancies and defects [23]. SET-state resistance (LRS) level can be defined by controlling the dimensions of the conductive filament [24] [23], which depends on the amount of current flowing through the active layer. Current flowing through the active layer is controlled either by externally imposed current compliance or Unsupervised learning based on generative models has gained importance with use of deep neural networks. Besides being useful for pre-training a supervised predictor, unsupervised learning in deep architectures can be of interest to learn a distribution and generate samples from it [28]. RBMs in particular, are widely used as building blocks for deep generative models such as DBN and SDA. Both these models are made by stacking RBM blocks on top of each other. Training of such models using traditional back-propagation based approaches is a computationally intensive problem. Hinton et.al. [5] showed that such models can be trained very fast through greedy layerwise training making the task of training deep networks based on stacking of RBMs more feasible. Each RBM block consists of two layers of fully connected stochastic sigmoid neurons as shown in Fig. 3. The input or the first layer of the RBM is called the visible layer and the second (feature detector) layer is called the hidden layer. Each RBM is trained using Fig. 3. Graphical representation of RBM hidden/visible nodes. 3 CD algorithm as described in [29]. The output layer of the bottom RBM acts as the visible layer for the next RBM. C. Stacked Denoising Autoencoder (SDA) An autoencoder network is a deep learning framework mostly used for denoising corrupted data [30], dimensionality reduction [3] and weight initialization applications. In recent years random weight initialization techniques have been preferred over use of generative training networks [31], however DGMs continue to be the ideal candidate for dimensionality reduction and denoising applications. Autoencoder network is basically realized using two networks: 1) An ’encoder’ network which has layers of RBMs stacked on the top of one another. 2) A mirrored ’decoder’ network with same weights as that of the encoder layer for data reconstruction. The stack of RBMs in autoencoder are trained layer-wise one after the other. An ’unrolled’ autoencoder network with the encoder and decoder is shown in Fig. 4. D. Deep Belief Network (DBN) DBNs are probabilistic generative models that are composed of multiple layers of stochastic, latent variables [32]. The latent variables typically have binary values and are often called hidden units or feature detectors. The top two layers have undirected, symmetric connections between them and form an associative memory. The lower layers receive top-down, directed connections from the layer above. The states of the units in the lowest layer represent a data vector. A typical DBN is shown in Fig. 5 which uses a single RBM as the first two layers followed by a sigmoid belief network (logistic regression layer) for the final classification output. The two most significant DBN properties are: 1) There is an efficient, layer-by-layer procedure for learning the top-down, generative weights that determine how the variables in one layer depend on the variables in the layer above. 2) After learning, the values of the latent variables in every layer can be inferred by a single, bottom-up pass that starts with an observed data vector in the bottom layer and uses the generative weights in the reverse direction. DBNs have been used for generating and recognizing images [5], [33], [4], video sequences [34], and motion-capture data [35]. With low number of units in the highest layer, DBNs perform non-linear dimensionality reduction and can learn short binary codes, allowing very fast retrieval of documents or images [36]. III. I MPLEMENTATION OF P ROPOSED A RCHITECTURES Basic building block of both SDA and DBN is the RBM. In our simulated architectures, within a single RBM block OxRAM devices are used for multiple functionalities. The basic RBM block (shown in Fig. 6(a)) is replicated, with the hidden layer memory states of the first RBM acting as visible layer memory for the next RBM block and so on (Fig. 6(b)). All RBM blocks have a common weight update module described in Section III-C. Post training, the learned synaptic weights along with the sigmoid block can be used for reconstructing the test data. Architecture sub-blocks consist of: A. Synaptic Network Synaptic network of each RBM block was simulated using a 1T-1R HfOx OxRAM matrix. Each synaptic weight is digitally encoded in a group of binary switching OxRAM devices, where the number of devices used per synapse depends on the required weight resolution. For all architectures simulated in this work we have used 8-bit resolution (i.e. 8 OxRAM devices/per synapse). B. Stochastic Neuron Block Fig 6(d), shows the stochastic sigmoid neuron block. Each neuron (hidden or visible) has a sigmoid response, which was Fig. 4. (a) Basic RBM blocks stacked to form a deep autoencoder. (b) Denoising noisy image using autoencoder. Fig. 5. DBN architecture comprising of stacked RBMs 4 Fig. 6. (a) Individual RBM training layer architecture. RBM training block symbols, ’H’, ’V’ and ’S’ represent hidden layer memory, visible layer memory, and synaptic network respectively. (b) Cascaded RBM blocks for realizing the proposed deep autoencoder with shared weight update module (c) Fully digital CD based weight update module. (d) Block level design of single stochastic sigmoid neuron implemented using a low-power 6-T sigmoid circuit ( [37]). Gain of the sigmoid circuit can be tuned by optimizing the scaling of the six transistors. Voltage output of the sigmoid circuit is compared with the voltage drop across the OxRAM device, with the help of a comparator. The HfOx based device is repeatedly cycled ON/OFF. C2C intrinsic RON and ROF F variability of the OxRAM device leads to a variable reference voltage for the comparator. This helps to translate the deterministic sigmoid output to a neuron output, which is effectively stochastic in nature. At any given moment, a specific neuron’s output determines it’s internal state, which needs to be stored for RBM driven learning. Neuron internal state is stored using individual OxRAM devices placed after the comparator. Single OxRAM/per neuron is sufficient for state storage, since RBM requires each neuron to only have a binary activation state. C. CD Weight Update Block The weight update module is a purely digital circuit that reads the synaptic weights and internal neuron states. It updates the synaptic weights during learning based on the CD RBM algorithm ( [29]). The block consists of an array of weight update circuits, one of which is shown in Fig 6(c). Synaptic weight is updated by 4Wij 1, based on the previous (v, h) and current (v, h) internal neuron states of the mutually connected neurons in the hidden and visible layers. CD is is realized using two AND gates and a comparator (having outputs -1, 0, +1). Input to the first AND gate is previous internal neuron states, while the input to second AND gate is the current internal neuron states. Based on the comparator output,  (learning rate) will either be added, subtracted, or not applied to the current synaptic weight (Wij). 0 0 4 Wij = (vhT − v h T ) (1) D. Output Normalization block In order to chain the mixed-signal design of RBM we need to ensure the signal output at each layer is having an enhancement in the dynamic range so that the signal doesn’t deteriorate as the network depth increases. For this purpose we proposed a hybrid CMOS-OxRAM programmable normalization circuit (see Fig. 7) whose gain and bias can be tuned based on OxRAM resistance programming. The circuit schematic of the programmable normalization block is shown in Fig. 7(a)). In order to check variation in gain, we have considered programming the OxRAM in three different SET states (∼ 3.2 kΩ, 6.6 kΩ, and 22.6 kΩ). The differential amplifier consisting of a DC gain control circuit and a biasing circuit is used to implement the normalization function. A two stage amplifier consisting of transistors N3, N4, N5, N6, P3, P4, P5, P6, and P7 is used. DC gain of the circuit is controlled using a constant gm circuit whose output is fed into N3. The constant gm circuit consists of transistors N1, N2, P1, P2 and one OxRAM. Based on the OxRAM resistance, gm of the circuit can be changed thereby changing the output potential. This affects Vgs of N3 thereby controlling the gain of the circuit. To validate the design, we performed simulation of the circuit using an OxRAM device compact model ( [26]) and 90 nm CMOS design kit. The simulated variation in the gain of the circuit based on the resistance state of the OxRAM is shown in Fig. 7(b). Gain control through OxRAM programming was found to be more prominent at higher operating frequencies. Bias control is implemented by a potential divider circuit (Rf and the OxRAM). The potential divider circuit determines the potential across Vg of P6. Input V2 is swept from 0 V to 1 V. If the potential across P6 increases for a fixed V2 the output switching voltage also increases thereby controlling the bias 5 Fig. 7. Programmable normalization circuit: (a) Circuit Schematic, (b) Gain variation w.r.to variation in OxRAM resistance state of the output. IV. D EEP L EARNING S IMULATIONS AND R ESULTS Simulations of the proposed architectures (DBN, SDA) were performed in MATLAB. Both generative networks with CD algorithm and behavioral model of all blocks described in section III were simulated. Stochastic sigmoid neuron activation and normalization circuits were simulated in Cadence Virtuoso using 90 nm CMOS design kit and Verilog-A OxRAM compact model [26]. A. Stacked Denoising Autoencoder performance analysis We trained two autoencoder networks each having the same number of neurons in the final encoding layer, but varying levels of depth, and compared their denoising performance (see Fig. 8). In each network a single synaptic weight was realized using 8 OxRAM devices (8-bit resolution). All neurons have a logistic activation except for the last ten units in the classification layer, which are linear. The networks were trained on a reduced MNIST dataset of 5000 images and tested for denoising 1000 new salt-and-pepper noise corrupted images (see Fig. 8). TABLE I P ROPOSED AUTOENCODER PERFORMANCE FOR REDUCED MNIST Network 784x100x784 784x100x40x100x784 Implementation MSE Software 0.010 Hybrid OxRAM SDA 0.003 Software 0.049 Hybrid OxRAM SDA 1.095 Table I presents the learning performance of the proposed SDA-1 and SDA-2. Increasing depth in the network was not useful with the current learning algorithm and tuning parameters. Fig. 8. (a) 3-layer deep SDA-1, (b) 5-layer deep SDA-2. Denoising results of 100 corrupted MNIST images for: (c) SDA1 and (d) SDA2. B. Deep Belief Network performance analysis We simulated two deep belief network architectures shown in Fig. 9. (4 and 5 layer variants) Performance of the network was measured by testing on 1000 samples from the reduced MNIST dataset. The results for the same are shown in Table II. We measured test accuracy using 3 parameters : 1) Top 1 accuracy : correct class corresponds to output neuron with highest response. 2) Top 3 accuracy : correct class corresponds to the top 3 output neurons with highest response. 3) Top 5 accuracy : correct class corresponds to the top 5 output neurons with highest response. From Table II, the performance of simulated Hybrid CMOSOxRAM DBN matches closely with software based accuracy (2-3% lower) for a DBN formed with 2 RBMs. There is a significant drop in test accuracy for the DBN with 3 RBMs. This is acceptable as the goal of the greedy layer-wise training is to pre-train the network to a good state before using back-propagation to allow faster convergence. Thus lower 6 TABLE III M AXIMUM OX RAM SWITCHING ACTIVITY FOR 5 LAYER SDA ( TRAINING ) Device placement L1-784 L2-100 L3-40 W1 W2 Max Switching activity 596 3074 542 6808 5000 TABLE IV M AXIMUM OX RAM SWITCHING ACTIVITY FOR 5 LAYER DBN ( TRAINING ) Fig. 9. Simulated 4 and 5 layer DBN architecture. accuracy after layer-wise training for a deeper network is acceptable as the weights would be further optimized using back-propagation. TABLE II P ROPOSED DBN P ERFORMANCE FOR R EDUCED MNIST Device placement L1-784 L1-784 L2-160 L3-80 L4-40 W1 W2 W3 W4 Max Switching activity 596 428 2069 3026 420 6798 5000 2500 2500 Test accuracy Network 784x100x40x10 784x160x80x40x10 Implementation Top-1 Top-3 Top-5 Software 93.10% 98.70% 99.40% Hybrid OxRAM DBN 78.70% 95.50% 98.80% Software 93.70% 98.50% 99.40% Hybrid OxRAM DBN 21.30% 61.40% 79.60% C. Tuning VOxRAM amplifying gain The sigmoid activation circuits in the network use a gain factor in order to balance for the low current values obtained as a result of the OxRAM device resistance values. If the amplification is low it will lead to saturation and the network will not learn a proper reconstruction of the data. This necessitates proper tuning of the amplifier gain for effective learning. In our architecture, amplifier gain for VOxRAM is an important hyper-parameter along with the standard ones (momentum, decay rate, learning rate, etc.) and is different for each consecutive pair of layers. A higher dimensional input to a layer will require a lower amplifying gain for VOxRAM and vice-versa. D. Switching activity analysis for the Proposed architecture Resistive switching of OxRAM devices is observed in following sections of the architecture: 1) Synaptic matrix 2) Stochastic neuron activation 3) Internal neuron state storage. RRAM devices suffer from limited cycling endurance (∼ 0.1 million cycles) [38].For stochastic neuron activation, the OxRAM device is repeatedly cycled to OFF state and the voltage drop across the device is used to generate the stochastic signal fed to one of the comparator inputs. Thus the neuron activation block related switching activity depends on the number of data samples as well as number of epochs. The maximum switching per device for any layer can be estimated by using (2): Nevents = Nepochs ∗ Nsamples ∗ Nbatch (2) Another part of the architecture where the OxRAM device may observe a significant number of switching events is the synaptic matrix. Since we are interested in device endurance, we consider the worst case, i.e. the of maximum number of hits a particular OxRAM device will take during the entire weight update procedure. For worst case analysis we make the following assumptions• While bit encoding the synaptic weight (4 or 8 or 16), there exists an OxRAM device that is switched every single time. Thus the maximum possible number of hits a device would take during the synaptic weight update procedure can be estimated using (3): Nswitchevents = Nbatch ∗ Nepochs (3) Simulated switching activity for reduced MNIST training for each neuron layer and synaptic matrix is shown in Table III and Table IV corresponding to both SDA and DBN architectures respectively. Key observations can be summarized as: • Increasing depth of the network increases amount of switching for hidden layers. • Increasing depth of the network doesn’t have significant impact on the the switching events in the synaptic matrix. 7 V. C ONCLUSION In this paper we proposed a novel methodology to realize DGM architectures using mixed-signal type hybrid CMOSRRAM design framework. We achieve deep generative models by proposing a strategy to stack multiple RBM blocks. Overall learning rule used in this study is based on greedy-layer wise learning with no back propagation which allows the network to be trained to a good pre-training stage. RRAM devices are used extensively in the proposed architecture for multiple computing and storage actions. Total RRAM requirement for the largest simulated network was 139 kB for DBN and 169 kB for SDA. Simulated architectures show that the performance of the proposed DGM models matches closely with software based models for 2 layers deep network. The top-3 test accuracy achieved by the DBN for reduced MNIST was ∼ 95.5%. MSE of SDA network was 0.003. Endurance analysis shows resonable maximum switching activity. Future work would focus on realizing an optimal strategy to implement backpropagation with the proposed architecture to enable complete training of the DGM on the hybrid DGM architecture. ACKNOWLEDGEMENT This research activity under the PI Prof. M. Suri is partially supported by the Department of Science & Technology (DST), Government of India and IIT-D FIRP Grant. Authors would like to express gratitude to S. Chakraborty. The authors would like to thank F. Alibart and D. Querlioz for the HfOx device data. A PPENDIX Code for all simulations discussed in the paper is available at https://gitlab.com/vivekp312/oxram-sda-sim.git. Any interested researchers can contact the authors for access to the code repository. R EFERENCES [1] J. W. Pillow and E. P. Simoncelli, “Dimensionality reduction in neural models: an information-theoretic generalization of spike-triggered average and covariance analysis,” Journal of vision, vol. 6, no. 4, pp. 9–9, 2006. [2] J. P. Cunningham and M. Y. Byron, “Dimensionality reduction for largescale neural recordings,” Nature neuroscience, vol. 17, no. 11, pp. 1500– 1509, 2014. [3] G. E. Hinton and R. S. Zemel, “Autoencoders, minimum description length, and helmholtz free energy,” Advances in neural information processing systems, pp. 3–3, 1994. [4] Y. Bengio, P. Lamblin, D. Popovici, and H. Larochelle, “Greedy layerwise training of deep networks,” in Advances in neural information processing systems, 2007, pp. 153–160. [5] G. E. Hinton, S. Osindero, and Y. W. Teh, “A fast learning algorithm for deep belief nets,” Neural computation, vol. 18, no. 7, pp. 1527–1554, 2006. [6] R. Raina, A. Madhavan, and A. Y. Ng, “Large-scale deep unsupervised learning using graphics processors,” in Proceedings of the 26th annual international conference on machine learning. ACM, 2009, pp. 873– 880. [7] S. K. Kim, L. C. McAfee, P. L. McMahon, and K. Olukotun, “A highly scalable restricted boltzmann machine fpga implementation,” in Field Programmable Logic and Applications, 2009. FPL 2009. International Conference on. IEEE, 2009, pp. 367–372. [8] P. Merolla, J. Arthur, F. Akopyan, N. Imam, R. Manohar, and D. S. . Modha, “September),” A digital neurosynaptic core using embedded crossbar memory with, vol. 45, pp. 1–4, 2011. [9] E. Stromatias, D. Neil, M. Pfeiffer, F. Galluppi, S. B. Furber, and S.-C. Liu, “Robustness of spiking deep belief networks to noise and reduced bit precision of neuro-inspired hardware platforms,” Frontiers in neuroscience, vol. 9, 2015. [10] M. Suri, O. Bichler, D. Querlioz, O. Cueto, L. Perniola, V. Sousa, D. Vuillaume, C. Gamrat, and B. DeSalvo, “Phase change memory as synapse for ultra-dense neuromorphic systems: Application to complex visual pattern extraction, electron devices meeting (iedm), 2011 ieee international, vol., no,” pp., vol. 4, no. 4, pp. 5–7, December 2011. [11] F. Alibart, E. Zamanidoost, and D. B. Strukov, “Pattern classification by memristive crossbar circuits using ex situ and in situ training,” Nature communications, vol. 4, p. 2072, 2013. [12] J. J. Yang, D. B. Strukov, and D. R. Stewart, “Memristive devices for computing,” Nature nanotechnology, vol. 8, no. 1, pp. 13–24, 2013. [13] B. De Salvo, Silicon non-volatile memories: paths of innovation. John Wiley & Sons, 2013. [14] B. L. Jackson, B. Rajendran, G. S. Corrado, M. Breitwisch, G. W. Burr, R. Cheek, K. Gopalakrishnan, S. Raoux, C. T. Rettner, A. Padilla et al., “Nanoscale electronic synapses using phase change devices,” ACM Journal on Emerging Technologies in Computing Systems (JETC), vol. 9, no. 2, p. 12, 2013. [15] A. F. Vincent, J. Larroque, W. S. Zhao, N. B. Romdhane, O. Bichler, C. Gamrat, J. o. Klein, S. Galdin-Retailleau, and D. Querlioz, “Spintransfer torque magnetic memory as a stochastic memristive synapse,” In Circuits and Systems (ISCAS), vol. 2014, pp. 1074–1077, 2014. [16] H.-S. P. Wong and S. Salahuddin, “Memory leads the way to better computing,” Nature nanotechnology, vol. 10, no. 3, pp. 191–194, 2015. [17] G. W. Burr, R. M. Shelby, S. Sidler, C. Di Nolfo, J. Jang, I. Boybat, R. S. Shenoy, P. Narayanan, K. Virwani, E. U. Giacometti et al., “Experimental demonstration and tolerancing of a large-scale neural network (165 000 synapses) using phase-change memory as the synaptic weight element,” IEEE Transactions on Electron Devices, vol. 62, no. 11, pp. 3498–3507, 2015. [18] V. Milo, G. Pedretti, R. Carboni, A. Calderoni, N. Ramaswamy, S. Ambrogio, and D. Ielmini, “Demonstration of hybrid cmos/rram neural networks with spike time/rate-dependent plasticity,” in Electron Devices Meeting (IEDM), 2016 IEEE International. IEEE, 2016, pp. 16–8. [19] A. M. Sheri, A. Rafique, W. Pedrycz, and M. Jeon, “Contrastive divergence for memristor-based restricted boltzmann machine,” Engineering Applications of Artificial Intelligence, vol. 37, pp. 336–342, 2015. [20] S. B. Eryilmaz, E. Neftci, S. Joshi, S. Kim, M. BrightSky, H. L. Lung, C. Lam, G. Cauwenberghs, and H. S. P. Wong, “Training a probabilistic graphical model with resistive switching electronic synapses,” IEEE Transactions on Electron Devices, vol. 63, no. 12, pp. 5004–5011, Dec 2016. [21] M. Suri and V. Parmar, “Exploiting intrinsic variability of filamentary resistive memory for extreme learning machine architectures,” IEEE Transactions on Nanotechnology, vol. 14, no. 6, pp. 963–968, Nov 2015. [22] M. Suri, V. Parmar, A. Kumar, D. Querlioz, and F. Alibart, “Neuromorphic hybrid rram-cmos rbm architecture,” in 2015 15th Non-Volatile Memory Technology Symposium (NVMTS), Oct 2015, pp. 1–6. [23] H.-S. P. Wong, H.-Y. Lee, S. Yu, Y.-S. Chen, Y. Wu, P.-S. Chen, B. Lee, F. T. Chen, and M.-J. Tsai, “Metal–oxide rram,” vol. 100, no. 6. IEEE, 2012, pp. 1951–1970. [24] M. Suri, D. Querlioz, O. Bichler, G. Palma, E. Vianello, D. Vuillaume, C. Gamrat, and B. DeSalvo, “Bio-inspired stochastic computing using binary cbram synapses,” Electron Devices, IEEE Transactions on, vol. 60, no. 7, pp. 2402–2409, 2013. [25] C. Baeumer, R. Valenta, C. Schmitz, A. Locatelli, T. O. Mente, S. P. Rogers, A. Sala, N. Raab, S. Nemsak, M. Shim et al., “Subfilamentary networks cause cycle-to-cycle variability in memristive devices,” ACS nano, vol. 11, no. 7, pp. 6921–6929, 2017. [26] H. Li, Z. Jiang, P. Huang, Y. Wu, H.-Y. Chen, B. Gao, X. Liu, J. Kang, and H.-S. Wong, “Variation-aware, reliability-emphasized design and optimization of rram using spice model,” in Design, Automation & Test in Europe Conference & Exhibition (DATE), 2015. IEEE, 2015, pp. 1425–1430. [27] D. Ielmini, “Resistive switching memories based on metal oxides: mechanisms, reliability and scaling,” Semiconductor Science and Technology, vol. 31, no. 6, p. 063002, 2016. [28] Y. Bengio et al., “Learning deep architectures for ai,” Foundations and trends R in Machine Learning, vol. 2, no. 1, pp. 1–127, 2009. [29] G. Hinton, “A practical guide to training restricted boltzmann machines,” Momentum, vol. 9, no. 1, p. 926, 2010. [30] H. Vincent, P.and Larochelle, I. Lajoie, Y. Bengio, and P. Manzago, “Stacked denoising autoencoders: Learning useful representations in a 8 [31] [32] [33] [34] [35] [36] [37] [38] deep network with a local denoising criterion,” Journal of Machine Learning Research, no. 11, pp. 3371–3408, 2010. X. Glorot and Y. Bengio, “Understanding the difficulty of training deep feedforward neural networks,” In Proc. AISTATS, vol. 9, pp. 249–256, 2010. G. E. Hinton, “Deep belief networks,” Scholarpedia, vol. 4, no. 5, p. 5947, 2009. F. J. Huang, Y.-L. Boureau, Y. LeCun et al., “Unsupervised learning of invariant feature hierarchies with applications to object recognition,” in Computer Vision and Pattern Recognition, 2007. CVPR’07. IEEE Conference on. IEEE, 2007, pp. 1–8. I. Sutskever and G. Hinton, “Learning multilevel distributed representations for high-dimensional sequences,” in Artificial Intelligence and Statistics, 2007, pp. 548–555. G. W. Taylor, G. E. Hinton, and S. T. Roweis, “Modeling human motion using binary latent variables,” in Advances in neural information processing systems, 2007, pp. 1345–1352. G. E. Hinton and R. R. Salakhutdinov, “Reducing the dimensionality of data with neural networks,” science, vol. 313, no. 5786, pp. 504–507, 2006. D. Pan and B. M. Wilamowski, “A vlsi implementation of mixed-signal mode bipolar neuron circuitry,” In Neural Networks, Proceedings of the International Joint Conference on, vol. 2, pp. 971–976, 2003. S. Balatti, S. Ambrogio, Z.-Q. Wang, S. Sills, A. Calderoni, N. Ramaswamy, and D. Ielmini, “Pulsed cycling operation and endurance failure of metal-oxide resistive (rram),” in Electron Devices Meeting (IEDM), 2014 IEEE International. IEEE, 2014, pp. 14–3.
9cs.NE
Sympiler: Transforming Sparse Matrix Codes by Decoupling Symbolic Analysis arXiv:1705.06575v1 [cs.PL] 18 May 2017 Kazem Cheshmi Adobe Research Cambridge, MA, US [email protected] Michelle Mills Strout Maryam Mehri Dehnavi University of Arizona Tucson, AZ, US [email protected] ABSTRACT Sympiler is a domain-specific code generator that optimizes sparse matrix computations by decoupling the symbolic analysis phase from the numerical manipulation stage in sparse codes. The computation patterns in sparse numerical methods are guided by the input sparsity structure and the sparse algorithm itself. In many real-world simulations, the sparsity pattern changes little or not at all. Sympiler takes advantage of these properties to symbolically analyze sparse codes at compile-time and to apply inspector-guided transformations that enable applying low-level transformations to sparse codes. As a result, the Sympiler-generated code outperforms highly-optimized matrix factorization codes from commonly-used specialized libraries, obtaining average speedups over Eigen and CHOLMOD of 3.8× and 1.5× respectively. KEYWORDS Matrix computations, sparse methods, loop transformations, domainspecific compilation 1 Shoaib Kamil Rutgers University Piscataway, NJ, US [email protected] INTRODUCTION Sparse matrix computations are at the heart of many scientific applications and data analytics codes. The performance and efficient memory usage of these codes depends heavily on their use of specialized sparse matrix data structures that only store the nonzero entries. However, such compaction is done using index arrays that result in indirect array accesses. Due to these indirect array accesses, it is difficult to apply conventional compiler optimizations such as tiling and vectorization even for static index array operations like sparse matrix vector multiply. A static index array does not change during the algorithm; for more complex operations with dynamic index arrays such as matrix factorization and decomposition, the nonzero structure is modified during the computation, making conventional compiler optimization approaches even more difficult to apply. The most common approach to accelerating sparse matrix computations is to identify a specialized library that provides a manuallytuned implementation of the specific sparse matrix routine. A large number of sparse libraries are available (e.g., SuperLU [22], MUMPS [2], CHOLMOD [11], KLU [20], UMFPACK [15]) for different numerical kernels, supported architectures, and specific kinds of matrices. Rutgers University Piscataway, NJ, US [email protected] While hand-written specialized libraries can provide high performance, they must be manually ported to new architectures and may stagnate as architectural advances continue. Alternatively, compilers can be used to optimize code while providing architecture portability. However, indirect accesses and the resulting complex dependence structure run into compile-time loop transformation framework limitations. Compiler loop transformation frameworks such as those based on the polyhedral model use algebraic representations of loop nests to transform code and successfully generate highly-efficient dense matrix kernels [5, 10, 41, 54, 65, 67]. However, such frameworks are limited when dealing with non-affine loop bounds and/or array subscripts, both of which arise in sparse codes. Recent work has extended polyhedral methods to effectively operate on kernels with static index arrays by building run-time inspectors that examine the nonzero structure and executors that use this knowledge to transform code execution [63, 66, 68–70]. However, these techniques are limited to transforming sparse kernels with static index arrays. Sympiler addresses these limitations by performing symbolic analysis at compile-time to compute fill-in structure and to remove dynamic index arrays from sparse matrix computations. Symbolic analysis is a term from the numerical computing community. It refers to phases that determine the computational patterns that only depend on the nonzero pattern and not on numerical values. Information from symbolic analysis can be used to make subsequent numeric manipulation faster, and the information can be reused as long as the matrix nonzero structure remains constant. For a number of sparse matrix methods such as LU and Cholesky, it is well known that viewing their computations as a graph (e.g., elimination tree, dependence graph, and quotient graph) and applying a method-dependent graph algorithm yields information about dependences that can then be used to more efficiently compute the numerical method [14]. Most high-performance sparse matrix computation libraries utilize symbolic information, but couple this symbolic analysis with numeric computation, further making it difficult for compilers to optimize such codes. This work presents Sympiler, which generates high-performance sparse matrix code by fully decoupling the symbolic analysis from numeric computation and transforming code to utilize the symbolic information. After obtaining symbolic information by running a symbolic inspector, Sympiler applies inspector-guided transformations, such as variable-sized blocking, resulting in performance ,, 1 • • L: {n,Lp,Li,Lx} b x x1 2 x2 • 3 x3 x4 4 • 5 x5 * x6 = • • • • 6 x7 7 x8 • • 8 x9 • • • • 9 x10 • • 10 1 • Kazem Cheshmi, Shoaib Kamil, Michelle Mills Strout, and Maryam Mehri Dehnavi x=b; // copy RHS to x for(j=0;j<n;j++){ x[j]/=Lx[Lp[j]]; Dependence Graph (DGL ) for(p=Lp[j]+1;p<Lp[j+1];p++){ β = {i|bi 6= 0} = {1, 6} x[Li[p]]-=Lx[p]*x[j];}} ReachL (β) = {1, 6, 7, 8, 9, 10} 1 2 • 9 3 4 7 10 8 5 6 (a) x=b; for(j=0;j<n;j++){ if(x[j] != 0){ x[j]/=Lx[Lp[j]]; for(p=Lp[j]+1;p<Lp[j+1];p++) x[Li[p]]-=Lx[p]*x[j];}} x=b; for(px=0;px<reachSetSize;px++){ j=reachSet[px]; x[j]/=Lx[Lp[j]]; for(p=Lp[j]+1;p<Lp[j+1];p++){ x[Li[p]]-=Lx[p]*x[j];}} (c) Library implementation (d) Decoupled code (b) Forward substitution x=b; x[0] /= Lx[0]; // Peel col 0 for(p = 1; p < 3; p++) x[Li[p]] -= Lx[p] * x[0]; for(px=1;px<3;px++){ j=reachSet[px];x[j]/=Lx[Lp[j]]; for(p=Lp[j]+1;p<Lp[j+1];p++) x[Li[p]]-=Lx[p]*x[j];} x[7] /= Lx[20]; // Peel col 7 for(p = 21; p < 23; p++) x[Li[p]] -= Lx[p] * x[7]; for(px=4;px<reachSetSize;px++){ j=reachSet[px];x[j]/=Lx[Lp[j]]; for(p=Lp[j]+1;p<Lp[j+1];p++) x[Li[p]]-=Lx[p]*x[j];} (e) Sympiler-generated Figure 1: Four different codes for solving the linear system in (a). In all four code variants, the matrix L is stored in compressed sparse column (CSC) format, with {n,Lp,Li,Lx} representing {matrix order, column pointer, row index, nonzeros} respectively. The dependence graph DG L is the adjacency graph of matrix L; the vertices of DG L correspond to columns of L and its edges show dependencies between columns in triangular solve. Vertices corresponding to nonzero columns are colored blue, and columns that must participate in the computation due to dependence structure are colored red; the white vertices can be skipped during computation. The boxes around columns show supernodes of different sizes. (b) is a forward substitution algorithm. (c) is a library implementation that skips iterations when the corresponding entry in the x is zero. (d) is the decoupled code that uses symbolic information given in reachSet, which is computed by performing a depth-first search on DG L . (e) is the Sympiler-generated code which peels iterations corresponding to columns within the reach-set with more than 2 nonzeros. equivalent to hand-tuned libraries. But Sympiler goes further than existing numerical libraries by generating code for a specific matrix nonzero structure. Because matrix structure often arises from properties of the underlying physical system that the matrix represents, in many cases the same structure reoccurs multiple times, with different values of nonzeros. Thus, Sympiler-generated code can combine inspector-guided and low-level transformations to produce even more efficient code. The transformations applied by Sympiler improves the performance of sparse matrix codes through applying optimizations for a single-core such as vectorization and increased data locality which should extend to improve performance on shared and distributed memory systems. 1.1 Motivating Scenario Sparse triangular solve takes a lower triangular matrix L and a righthand side (RHS) vector b and solves the linear equation Lx = b for x. It is a fundamental building block in many numerical algorithms such as factorization [14, 44], direct system solvers [13], and rank update methods [18], where the RHS vector is often sparse. A naïve implementation visits every column of matrix L to propagate the contributions of its corresponding x value to the rest of x (see Figure 1b). However, with a sparse b, the solution vector is also sparse, reducing the required iteration space of sparse triangular solve to be proportional to the number of nonzero values in x. Taking advantage of this property requires first determining the nonzero pattern of x. Based on a theorem from Gilbert and Peierls [34], the dependence graph DG L = (V , E) for matrix L with nodes V = {1, ..., n} and edges E = {(j, i)|Li j , 0} can be used to compute the nonzero pattern of x, where n is the matrix rank and numerical cancellation is neglected. The nonzero indices in x are given by Reach L (β) which is the set of all nodes reachable from any node in β = {i |bi , 0}, and can be computed with a depth-first search of the directed graph DG L staring with β. An example dependence graph is illustrated in Figure 1a. The blue colored nodes correspond to set β and the final reach-set Reach L (β) contains all the colored nodes in the graph. Figure 1 shows four different implementations of sparse triangular solve. Most solvers assume the input matrix L is stored in a compressed sparse column (CSC) storage format. While the naïve implementation in Figure 1b traverses all columns, the typical library implementation shown in Figure 1c skips iterations when the corresponding value in x is zero. The implementation in Figure 1d shows a decoupled code that uses the symbolic information provided by the pre-computed reachset. This decoupling simplifies numerical manipulation and reduces the run-time complexity from O(|b | +n+ f ) in Figure 1c to O(|b | + f ) in Figure 1d, where f is the number of floating point operations and |b| is the number of nonzeros in b. Sympiler goes further by Sympiler: Transforming Sparse Codes building the reach-set at compile-time and leveraging it to generate code specialized for the specific matrix structure and RHS. The Sympiler-generated code is shown in Figure 1e, where the code only iterates over reached columns and peels iterations where the number of nonzeros in a column is greater than some threshold (in the case of the figure, this threshold is 2). These peeled loops can be further transformed with vectorization to speed up execution. This shows the power of fully decoupling the symbolic analysis phase from the code that manipulates numeric values: the compiler can aggressively apply conventional optimizations, using the reachset to guide the transformation. On matrices from the SuiteSparse Matrix Collection, the Sympiler-generated code shows speedups between 8.4× to 19× with an average of 13.6× compared to the forward solve code (Figure 1b) and from 1.2× to 1.7× with an average of 1.3× compared to the library-equivalent code (Figure 1c). 1.2 Static Sparsity Patterns A fundamental concept that Sympiler is built on is that the structure of sparse matrices in scientific codes is dictated by the physical domain and as such does not change in many applications. For example, in power system modeling and circuit simulation problems the sparse matrix used in the matrix computations is often a Jacobian matrix, where the structure is derived from interconnections among the power system and circuit components such as generation, transmission, and distribution resources. While the numerical values in the sparse input matrix change often, a change in the sparsity structure occurs on rare occasions with a change in circuit breakers, transmission lines, or one of the physical components. The sparse systems in simulations in domains such as electromagentics [24, 28, 29, 47], computer graphics [33], and fluid mechanics [6] are assembled by discretizing a physical domain and approximating a partial differential equation on the mesh elements. A sparse matrix method is then used to solve the assembled systems. The sparse structure originates from the physical discretization and therefore the sparsity pattern remains the same except where there are deformations or if adaptive mesh refinement is used. Sparse matrices in many other physical domains exhibit the same behavior and benefit from Sympiler. 1.3 Contributions This work describes Sympiler, a sparsity-aware code generator for sparse matrix algorithms that leverages symbolic information to generate fast code for a specific matrix structure. The major contributions of this paper are: • A novel approach for building compile-time symbolic inspectors that obtain information about a sparse matrix, to be used during compilation. • Inspector-guided transformations that leverage compile-time information to transform sparse matrix code for specific algorithms. • Implementations of symbolic inspectors and inspectorguided transformations for two algorithms: sparse triangular solve and sparse Cholesky factorization. ,, • A demonstration of the performance impact of our code generator, showing that Sympiler-generated code can outperform state-of-the-art libraries for triangular solve and Cholesky factorization by up to 1.7× and 6.3× respectively. 2 SYMPILER: A SYMBOLIC-ENABLED CODE GENERATOR Sympiler generates efficient sparse kernels by tailoring sparse code to specific matrix sparsity structures. By decoupling the symbolic analysis phase, Sympiler uses information from symbolic analysis to guide code generation for the numerical manipulation phase of the kernel. In this section, we describe the overall structure of the Sympiler code generator, as well as the domain-specific transformations enabled by leveraging information from the symbolic inspector. 2.1 Sympiler Overview Sparse triangular solve and Cholesky factorization are currently implemented in Sympiler. Given one of these numerical methods and an input matrix stored using compressed sparse column (CSC) format, Sympiler utilizes a method-specific symbolic inspector to obtain information about the matrix. This information is used to apply domain-specific optimizations while lowering the code for the numerical method. In addition, the lowered code is annotated with additional low-level transformations (such as unrolling) when applicable based on domain- and matrix-specific information. Finally, the annotated code is further lowered to apply low-level optimizations and output to C source code. Code implementing the numerical solver is represented in a domain-specific abstract syntax tree (AST). Sympiler produces the final code by applying a series of phases to this AST, transforming the code in each phase. An overview of the process is shown in Figure 2. The initial AST for triangular solve is shown in Figure 2a prior to any transformations. 2.2 Symbolic Inspector Different numerical algorithms can make use of symbolic information in different ways, and prior work has described run-time graph traversal strategies for various numerical methods [12, 14, 45, 52]. The compile-time inspectors in Sympiler are based on these strategies. For each class of numerical algorithms with the same symbolic analysis approach, Sympiler uses a specific symbolic inspector to obtain information about the sparsity structure of the input matrix and stores it in an algorithm-specific way for use during later transformation stages. We classify the used symbolic inspectors based on the numerical method as well as the transformations enabled by the obtained information. For each combination of algorithm and transformation, the symbolic inspector creates an inspection graph from the given sparsity pattern and traverses it during inspection using a specific inspection strategy. The result of the inspection is the inspection set, which contains the result of running the inspector on the inspection graph. Inspection sets are used to guide the transformations in Sympiler. Additional numerical algorithms and transformations can be added to Sympiler, as long as the required inspectors can be described in this manner as well. ,, Kazem Cheshmi, Shoaib Kamil, Michelle Mills Strout, and Maryam Mehri Dehnavi Sparsity Pattern Symbolic Inspector Numerical Method VS-Block VI-Prune Low-Level Transformations Code Generation Inspector-Guided Transformations (a) Initial AST (b) After VI-Prune VI-Prune for sol.j0 in 0..Lsp.n VS-Block x[bspj0 ]/=Lx[Lsp.diag(j0 )]; VS-Block for sol.j1 in Lsp.colj0 ..Lsp.colj0 +1 x[Lsp.rowj1 ]-=Lx[j1 ]*x[bspj0 ]; peel(0,3) for sol.p0 in 0..pruneSetSize j0 =pruneSetp0 ; x[bspj0 ]/=Lx[Lsp.diag(j0 )]; vec(0) for sol.j1 in Lsp.colj0 ..Lsp.colj0 +1 x[Lsp.rowj1 ]-=Lx[j1 ]*x[bspj0 ]; (c) After Low-Level Transformations s0 =pruneSet0 ; x[bsps0 ]/=Lx[Lsp.diag(s0 )]; for sol.j1 in Lsp.cols0 ..Lsp.cols0 +1 x[Lsp.rowj1 ]-=Lx[j1 ]*x[bsps0 ]; for sol.p0 in 0..pruneSetSize j0 =pruneSetp0 ; x[bspj0 ]/=Lx[Lsp.diag(j0 )]; for sol.j1 in Lsp.colj0 ..Lsp.colj0 +1 x[Lsp.rowj1 ]-=Lx[j1 ]*x[bspj0 ]; 1 Figure 2: Sympiler lowers a functional representation of a sparse kernel to imperative code using the inspection sets. Sympiler constructs a set of loop nests and annotates them with some domain-specific information that is later used in inspectorguided transformations. The inspector-guided transformations use the lowered code and inspection sets as input and apply transformations. Inspector-guided transformations also provide hints for further low-level transformations by annotating the code. For instance, the transformation steps for the code in Figure 1 are: (a) Initial AST with annotated information showing where the VI-Prune and VS-Block transformations apply. (b) The symbolic inspector sends the reach-set as pruneSet, which VI-Prune uses to add hints to further steps— in this case, peeling iterations 0 and 3. (c). The hinted low-level transformations are applied and final code generated (peeling is only shown for the iteration zero). 1 2 3 4 5 6 7 8 9 10 11 1 for(I 1 ){ . . for(I k < m) { . . for(I n (I k , ..., I n−1 )) { a[idx(I 1 ,...,I k ,...,I n )]; } } } 2 3 4 5 6 7 8 9 10 11 12 (a) Before for(I 1 ) { . . for(Ip < pruneSetSize) { I k0 = pruneSet[Ip ]; . . for(I n (I k0 , ..., I n−1 )) { a[idx(I 1 ,...,I k0 ,...,I n )]; } } } (b) After Variable Iteration Space Pruning, loop[k].VI-Prune(pruneSet,pruneSetSize) 1 1 2 3 4 5 for(I) { for(J) { B[idx1(I,J)] op1= a[idx2(I,J)]; } } 2 3 4 5 6 7 (c) Before for(b < blockSetSize) { for( J1 < blockSet[b].x) { for( J2 < blockSet [b].y ) { B[idx1(b, J1 , J2 )] op1 = A[idx2(b, J1 , J2 )]; } } } (d) After 2D Variable-Sized Blocking, loop[I].VS-Block(blockSet,blockSetSize) Figure 3: The inspector-guided transformations. Top: The loop over Ik with iteration space m in (a) transforms to a loop over Ip with iteration space pruneSetSize in (b). Any use of the original loop index Ik is replaced with its corresponding value from pruneSet i.e., Ik0 . Bottom: The two nested loops in (c) are transformed into loops over variable-sized blocks in (d). Sympiler: Transforming Sparse Codes For our motivating example, triangular solve, the reach-set can be used to prune loop iterations that perform work that is unnecessary due to the sparseness of matrix or the right hand side. In this case, the inspection set is the reach-set, and the inspection strategy is to perform a depth-first search over the inspection graph, which is the directed dependency graph DG L of the triangular matrix. For the example linear system shown in Figure 1, the symbolic inspector generates the reach-set {6, 1, 7, 8, 9, 10}. 2.3 ,, inputs in sparse kernels make blocking optimizations challenging. The symbolic inspector identifies sub-kernels with similar structure in the sparse matrix methods and the sparse inputs to provide the VS-Block stage with “blockable” sets that are not necessarily of the same size or consecutively located. These blocks are similar to the concept of supernodes [44] in sparse libraries. VS-Block must deal with a number of challenges: • The block sizes are variable in a sparse kernel. • Due to using compressed storage formats, the block elements may not be in consecutive memory locations. • The type of numerical method used may need to change after applying this transformation. For example, applying VSBlock to Cholesky factorization requires dense Cholesky factorization on the diagonal segment of the blocks, and the off-diagonal segments of the blocks must be updated using a set of dense triangular solves. Inspector-guided Transformations The initial lowered code along with the inspection sets obtained by the symbolic inspector are passed to a series of passes that further transform the code. Sympiler currently supports two transformations guided by the inspection sets: Variable Iteration Space Pruning and 2D Variable-Sized Blocking, which can be applied independently or jointly depending on the input sparsity. As shown in Figure 2a, the code is annotated with information showing where inspectorguided transformations may be applied. The symbolic inspector provides the required information to the transformation phases, which decide whether to transform the code based on the inspection sets. Given the inspection set and annotated code, transformations occur as illustrated in Figure 3. 2.3.1 Variable Iteration Space Pruning. Variable Iteration Space Pruning (VI-Prune) prunes the iteration space of a loop using information about the sparse computation. The iteration space for sparse codes can be considerably smaller than that for dense codes, since the computation needs to only consider iterations with nonzeros. The inspection stage of Sympiler generates an inspection set that enables transforming the unoptimized sparse code to a code with a reduced iteration space. Given this inspection set, the VI-Prune transformation can be applied at a particular loop-level to the sparse code to transform it from Figure 3a to Figure 3b. In the figure, the transformation is applied to the k t h loop nest in line 4. In the transformed code the iteration space is pruned to pruneSetSize, which is the inspection set size. In addition to the new loop, all references to Ik (the loop index before transformation) are replaced by its corresponding value from the inspection set, pruneSet[Ip ]. Furthermore, the transformation phase utilizes inspection set information to annotate specific loops with further low-level optimizations to be applied by later stages of code generation. These annotations are guided by thresholds that decide when specific low-level optimizations result in faster code. In our running example of triangular solve, the generated inspection set from the symbolic inspector enables reducing the iteration space of the code. The VI-Prune transformation elides unnecessary iterations due to zeros in the right hand side. In addition, depending on the number of iterations the loops will run (which is known thanks to the symbolic inspector), loops are annotated with directives to unroll and/or vectorize during code generation. 2.3.2 2D Variable-Sized Blocking. 2D Variable-Sized Blocking (VS-Block) converts a sparse code to a set of non-uniform dense subkernels. In contrast to the conventional approach of blocking/tiling dense codes, where the input and computations are blocked into smaller uniform sub-kernels, the unstructured computations and To address the first challenge, the symbolic inspector uses an inspection strategy that provides an inspection set specifying the size of each block. For the second challenge, the transformed code allocates temporary block storage and copies data as needed prior to operating on the block. Finally, to deal with the last challenge, the synthesized loops/instructions in the lowering phase contain information about the block location in the matrix, and when applying this transformation, the correct operation is chosen for each loop/instruction. As with the VI-Prune transformation, VS-Block also annotates loops with further low-level transformations such as tiling to be applied during code generation. By leveraging specific information about the matrix when applying the transformation, Sympiler is able to mitigate all of the difficulties of applying VSBlock to sparse numerical methods. An off-diagonal version of the VS-Block transformation is shown in Figures 3c and 3d. As shown, a new outer loop is made that provides the block information to the inner loops using the given blockSet. The inner loop in Figure 3c transforms to two nested loops (lines 2–6) that iterate over the block specified by the outer loop. The diagonal version VS-Block heavily depends on domain information. More detailed examples of applying this transformation to triangular solve and Cholesky factorization is described in Section 3. 2.4 Enabled Conventional Low-level Transformations While applying inspector-guided transformations, the original loop nests are transformed into new loops with potentially different iteration spaces, enabling the application of conventional low-level transformations. Based on the applied inspector-guided transformations as well as the properties of the input matrix and right-hand side vectors, the code is annotated with some transformation directives. An example of these annotations are shown in Figure 2b where loop peeling is annotated within the VI-Pruned code. To decide when to add these annotations, the inspector-guided transformations use sparsity-related parameters such as the average block size. The main sources of enabling low-level transformations are: ,, Kazem Cheshmi, Shoaib Kamil, Michelle Mills Strout, and Maryam Mehri Dehnavi (1) Symbolic information provides dependency information at compile-time, allowing Sympiler to apply more transformations such as peeling based on the reach-set in Figure 1; (2) Inspector-guided transformations remove some of the indirect memory accesses and annotate the code with potential conventional transformations; (3) Sparsity-specific code generation enables Sympiler to know details such as loop boundaries at compile-time. Thus, several customized transformations are applied such vectorization of loops with iteration counts greater than a threshold; Figure 1e shows how some of the iterations in the triangular solve code after VI-Prune can be peeled. In this example, the inspection set used for VI-Prune is the reach-set {1, 6, 8, 9, 10}. Because the reach-set is created in topological order, iteration ordering dependencies are met and thus code correctness is guaranteed after loop peeling. As shown in Figure 2b, the transformed code after VIPrune is annotated with the enabled peeling transformation based on the number of nonzeros in the columns (the column count). The two selected iterations with column count greater than 2 are peeled to replace them with a specialized kernel or to apply another transformation such as vectorization. 3 CASE STUDIES 1 2 3 4 5 6 7 8 9 10 11 for(column j = 0 to n){ f = A(:,j) PruneSet = The sparsity pattern of row j for(every row r in PruneSet){ // Update f -= L(j:n,r) * L(j,r); } L(k,k) = sqrt(f(k)); // Diagonal for(off-diagonal elements in f){ // Off-diagonal L(k+1:n,k) = f(k+1:n) / L(k,k); } } Figure 4: The pseudo-code of the left-looking Cholesky. Sympiler currently supports two important sparse matrix computations: triangular solve and Cholesky factorization. This section discusses some of the graph theory and algorithms used in Sympiler’s symbolic inspector to extract inspections sets for these two matrix methods. The run-time complexity of the Symbolic inspector is also presented to evaluate inspection overheads. Finally, we demonstrate how the VI-Prune and VS-Block transformations are applied using the inspection sets. Table 1 shows a classification of the inspection graphs, strategies, and resulting inspection sets for the two studied numerical algorithms in Sympiler. As shown in Table 1, the symbolic inspector performs a set of known inspection methods and generates some sets which includes symbolic information. The last column of Table 1 shows the list of transformations enabled by each inspector-guided transformation. We also discuss extending Sympiler to other matrix methods. 3.1 Sparse Triangular Solve Theory: In the symbolic inspector, the dependency graph DG L is traversed using depth first search (DFS) to determine the inspection A 1 • • 2 • • 3 4 • • • 5 • 6 • • • • • • • • • • T L • • • • • • • • −→ • • 7 • 8 • 9 • • • • 10 1 10 2 • 3 9 4 • 5 • • • • 6 • • • 7 • • • • • 8 • • • • • • • 9 • • • • 10 8 7 1 6 3 5 2 4 1 Figure 5: An example matrix A and its L factor from Cholesky factorization. The corresponding elimination tree (T ) of A is also shown. Nodes in T and columns in L highlighted with the same color belong to the same supernode. The red nonzeros in L are fill-ins. set for the VI-Prune transformation, which in this case is the reachset from DG L and the right-hand side vector. The graph DG L can also be used to detect blocks with similar sparsity patterns, also known as supernodes, in sparse triangular solve. The block-set, which contains columns of L grouped into supernodes, are identified by inspecting DG L using a node equivalence method. The node equivalence algorithm first assumes nodes vi and v j are equivalent and then compares their outgoing edges. If the outgoing edges go to the same destination nodes then the two nodes are equal and are merged. Inspector-guided Transformations: Using the reach-set,VIPrune limits the iteration spaces of the loops in triangular solve to only those that operate on the necessary nonzeros. The VS-Block transformation changes the loops to apply blocking as shown in Figure 2a in triangular solve. The diagonal block of each columnblock, which is a small triangular solve, is solved first. The solution of the diagonal components is then substituted in the off-diagonal segment of the matrix. Symbolic Inspection: The time complexity of DFS on graph DG L is proportional to the number of edges traversed and the number of nonzeros in the RHS of the system. The time complexity for the node equivalence algorithm is proportional to the number of nonzeros in L. We provide overheads for these methods for the tested matrices in Section 4.3. 3.2 Cholesky Factorization Cholesky factorization is commonly used in direct solvers and is used to precondition iterative solvers. The algorithm factors a Hermitian positive definite matrix A into LLT , where matrix L is a lower triangular matrix. Figure 5 shows an example matrix A and the corresponding L matrix after factorization. Theory: The elimination tree (etree) [17] is one of the most important graph structures used in the symbolic analysis of sparse factorization algorithms. Figure 5 shows the corresponding elimination tree for factorizing the example matrix A. The etree of A is a spanning tree of G + (A) satisfying parent[j] = min{i > j : Li j , 0} where G + (A) is the graph of L + LT . The filled graph or G + (A) results at the end of the elimination process and includes all edges of the original matrix A as well as fill-in edges. In-depth discussions of the theory behind the elimination tree, the elimination process, and the filled graph can be found in [14, 52]. Sympiler: Transforming Sparse Codes ,, Table 1: Inspection and transformation elements in Sympiler for triangular solve and Cholesky. DG: dependency graph, SP (RHS): sparsity patterns of the right-hand side vector, DFS: depth-first search, SP(A): sparsity patterns of the coefficient A, SP (L j ): sparsity patterns of the j t h row of L, unroll: loop unrolling, peel: loop peeling, dist: loop distribution, tile: loop tiling. Transformations VI-Prune VS-Block Inspection Graph DG + SP(RHS) DG Triangular Solve Inspection Inspection Set Strategy DFS Prune-set (reach-set) Node Block-set equivalence (supernodes) Figure 4 shows the pseudo-code of the left-looking sparse Cholesky, which is performed in two phases of update (lines 3–6) and column factorization (lines 7–10). The update phase gathers the contributions from the already factorized columns on the left. The column factorization phase calculates the square root of the diagonal element and applies it to the off-diagonal elements. To find the prune-set that enables the VI-Prune transformation, the row sparsity pattern of L has to be computed; Figure 4 shows how this information is used to prune the iteration space of the update phase in the Cholesky algorithm. Since L is stored in column compressed format, the etree and the sparsity pattern of A are used to determine the L row sparsity pattern. A non-optimal method for finding the row sparsity pattern of row i in L is that for each nonzero Ai j the etree of A is traversed upwards from node j until node i is reached or a marked node is found. The row-count of i is the visited nodes in this subtree. Sympiler uses a similar but more optimized approach from [14] to find row sparsity patterns. Supernodes used in VS-Block for Cholesky are found with the L sparsity pattern and the etree. The sparsity pattern of L is different from A because of fill-ins created during factorization. However, the elimination tree T along with the sparsity pattern of A are used to find the sparsity pattern of L prior to factorization. As a result, memory for L can be allocated ahead of time to eliminate the need for dynamic memory allocation. To create the supernodes, the fillin pattern should be first determined. Equation (1) is based on a theorem from [31] and computes the sparsity pattern of column j in L, L j , where T (s) is the parent of node s in T and “\" means exclusion. The theorem states that the nonzero pattern of L j is the union of the nonzero patterns of the children of j in the etree and the nonzero pattern of column j in A. Ø© Ø ª Ls \{s}® (1) ­ «j=T (s) ¬ When the sparsity pattern of L is obtained, the following rule is used to merge columns to create basic supernodes: when the number of nonzeros in two adjacent columns j and j − 1, regardless of the diagonal entry in j − 1, is equal, and j − 1 is the only child of j in T , the two columns can be merged. Inspector-guided transformations: The VI-Prune transformation applies to the update phase of Cholesky. With the row sparsity pattern information, when factorizing column i Sympiler only iterates over dependent columns instead of all columns smaller than i. The VS-Block transformation applies to both update and column L j = Aj Ø {j} Inspection Graph etree + SP(A) etree + ColCount(A) Cholesky Inspection Strategy Single-node up-traversal Up-traversal Inspection Set Prune-set (SP(L j )) Block-set (supernodes) Enabled Low-level dist, unroll, peel, vectorization tile, unroll, peel, vectorization factorization phases. Therefore, the outer loop in the Cholesky algorithm in Figure 4 is converted to a new loop that iterates over the provided block-set. All references to the columns j in the inner loops will be changed to the blockSet[j]. For the diagonal part of the column factorization, a dense Cholesky needs to be computed instead of the square root in the non-supernodal version. The resulting factor from the diagonal elements applies to the off-diagonal rows through a sequence of dense triangular solves. VS-Block also converts the update phase from vector operations to matrix operations. Symbolic Inspection: The computational complexity for building the etree in sympiler is nearly O(|A|). The run-time complexity for finding the sparsity pattern of row i is proportional to the number of nonzeros in row i of A. The method is executed for all columns which results in a run-time of nearly O(|A|).The inspection overhead for finding the block-set for VS-Block includes the sparsity detection which is done in nearly O(|A| + 2n) and the supernode detection which has a run-time complexity of O(n) [14]. 3.3 Other Matrix Methods The inspection graphs and inspection strategies supported in the current version of Sympiler can support a large class of commonlyused sparse matrix computations. The applications of the elimination tree go beyond the Cholesky factorization method and extend to some of the most commonly used sparse matrix routines in scientific applications such as LU, QR, orthogonal factorization methods [46], and incomplete and factorized sparse approximate inverse preconditioner computations [40]. Inspection of the dependency graph and proposed inspection strategies that extract reach-sets and supernodes from the dependency graph are the fundamental symbolic analyses required to optimize algorithms such as rank update and rank increase methods [18], incomplete LU(0) [49], incomplete Cholesky preconditioners, and up-looking implementations of factorization algorithms. Thus, Sympiler with the current set of symbolic inspectors can be made to support many of these matrix methods. We plan to extend to an even larger class of matrix methods and to support more optimization methods. 4 EXPERIMENTAL RESULTS We evaluate Sympiler by comparing the performance to two stateof-the-art libraries, namely Eigen [36] and CHOLMOD [11], for the Cholesky factorization method and the sparse triangular solve algorithm. Section 4.1 discusses the experimental setup and experimental methodology. In Section 4.2 we demonstrate that the ,, Kazem Cheshmi, Shoaib Kamil, Michelle Mills Strout, and Maryam Mehri Dehnavi Table 2: Matrix set: The matrices are sorted based on the number of nonzeros in the original matrix; nnz refers to number of nonzeros, n is the rank of the matrix. Sympiler: VS-Block Sympiler: VS-Block+VI-Prune Sympiler: VS-Block+VI-Prune+Low-Level Eigen Problem Name ID 1 cbuckle 2 Pres_Poisson 3 gyro 4 gyro_k 5 Dubcova2 6 msc23052 7 thermomech_dM 8 Dubcova3 9 parabolic_fem 10 ecology2 11 tmt_sym n 13.7 14.8 17.4 17.4 65.0 23.1 204 147 526 1000 727 nnz (A) (106 ) 0.677 0.716 1.02 1.02 1.03 1.14 1.42 3.64 3.67 5.00 5.08 transformations enabled by Sympiler generate highly-optimized codes for sparse matrix algorithms compared to state-of-the-art libraries. Although symbolic analysis is performed only once at compile-time for a fixed sparsity pattern in Sympiler, we analyze the cost of the symbolic inspector in Section 4.3 and compare it with symbolic costs in Eigen and CHOLMOD. 4.1 Methodology We selected a set of symmetric positive definite matrices from [19], which are listed in Table 2. The matrices originate from different domains and vary in size. All matrices have real numbers and are in double precision. The testbed architecture is a 3.30GHz Intel®Core™i7-5820K processor with L1, L2, and L3 cache sizes of 32KB, 256KB, and 15MB respectively and turbo-boost disabled. We use OpenBLAS.0.2.19 [71] for dense BLAS (Basic Linear Algebra Subprogram) routines when needed. All Sympiler-generated codes are compiled with GCC v.5.4.0 using the -O3 option. Each experiment is executed 5 times and the median is reported. We compare the performance of the Sympiler-generated code with CHOLMOD [11] as a specialized library for Cholesky factorization and with Eigen [36] as a general numerical library. CHOLMOD provides one of the fastest implementations of Cholesky factorization on single-core architectures [35]. Eigen supports a wide range of sparse and dense operations including sparse triangular solve and Cholesky. Thus, for Cholesky factorization we compare with both Eigen and CHOLMOD while results for triangular solve are compared to Eigen. Both libraries are installed and executed using the recommended default configuration. Since Sympiler’s current version does not support node amalgamation [26], this setting is not enabled in CHOLMOD. For the Cholesky factorization both libraries support the more commonly used left-looking (supernodal) algorithm which is also the algorithm used by Sympiler. Sympiler applies either both or one of the inspector-guided transformations as well as some of the enabled low-level transformations; currently, Sympiler implements unrolling, scalar replacement, and loop distibution from among the possible low-level transformations. Triangular Solve GFLOP/s 2 (103 ) 1 1 2 3 4 5 6 7 8 9 10 11 Figure 6: Sympiler’s performance compared to Eigen for triangular solve. The stacked-bars show the performance of the Sympiler (numeric) code with VS-Block and VI-Prune. The effects of VS-Block, VI-Prune, and low-level transformations on Sympiler performance are shown separately. 4.2 Performance of Generated Code This section shows how the combination of the introduced transformations and the decoupling strategy enable Sympiler to outperform two state-of-the-art libraries for sparse Cholesky and sparse triangular solve. Triangular solve: Figure 6 shows the performance of Sympilergenerated code compared to the Eigen library for a sparse triangular solve with a sparse RHS. The nonzero fill-in of the RHS in our experiments is selected to be less than 5%. The sparse triangular system solver is often used as a sub-kernel in algorithms such as left-looking LU [14] and Cholesky rank update methods [18] or as a solver after matrix factorizations. Thus, typically the sparsity of the RHS in sparse triangular systems is close to the sparsity of the columns of a sparse matrix. For the tested problems, the number of nonzeros for all columns of L was less than 5%. The average improvement of Sympiler-generated code, which we refer to as Sympiler (numeric), over the Eigen library is 1.49×. Eigen implements the approach demonstrated in Figure 1c, where symbolic analysis is not decoupled from the numerical code. However, the Sympiler-generated code only manipulates numerical values which leads to higher performance. Figure 6 also shows the effect of each transformation on the overall performance of the Sympilergenerated code. In the current version of Sympiler the symbolic inspector is designed to generate sets so that VS-Block can be applied before VI-Prune. Our experiments show that this ordering often leads to better performance mainly because Sympiler supports supernodes with a full diagonal block. As support for more transformations are added to Sympiler, we will enable it to automatically decide the best transformation ordering. Whenever applicable, the vectorization and peeling low-level transformations are also applied after VS-Block and VI-Prune. Peeling leads to higher performance if applied after VS-Block where iterations related to single-column supernodes are peeled. Vectorization is always applied after VS-Block and does not lead to performance if only VI-Prune is applied. Sympiler: Transforming Sparse Codes 2.0 Sympiler: VS-Block Sympiler: VS-Block+Low-Level Eigen (Numeric) CHOLMOD (Numeric) Triangular Solve Time / (Eigen Time) Cholesky GFLOP/s 10 ,, 5 1 2 3 4 5 6 7 8 9 10 1.5 1.0 0.5 11 Figure 7: The performance of Sympiler (numeric) for Cholesky compared to CHOLMOD (numeric) and Eigen (numeric). The stacked-bar shows the performance of the Sympiler-generated code. The effect of VS-Block and lowlevel transformations are shown separately. The VI-Prune transformation is already applied to the baseline code so it is not shown here. Matrices 3, 4, 5, and 7 do not benefit from the VS-Block transformation so their Sympiler run-times in Figure 6 are only for VI-Prune. Since small supernodes often do not lead to better performance, Sympiler does not apply the VS-Block transformation if the average size of the participating supernodes is smaller than a threshold.This parameter is currently hand-tuned and is set to 160. VS-Block is not applied to matrices 3, 4, 5, and 7 since the average supernode size is too small and thus does not improve performance. Also, since these matrices have a small column count vectorization does not payoff. Cholesky: We compare the numerical manipulation code of Eigen and CHOLMOD for Cholesky factorization with the Sympilergenerated code. The results for CHOLMOD and Eigen in Figure 7 refer to the numerical code performance in floating point operations per second (FLOP/s). Eigen and CHOLMOD both execute parts of the symbolic analysis only once if the user explicitly indicates that the same sparse matrix is used for subsequent executions. However, even with such an input from the user, none of the libraries fully decouple the symbolic information from the numerical code. This is because they can not afford to have a separate implementation for each sparsity pattern and also do not implement sparsity-specific optimizations. For fairness, when using Eigen and CHOLMOD we explicitly tell the library that the sparsity is fixed and thus report only the time related to the the library’s numerical code (which still contains some symbolic analysis). As shown in Figure 7, for Cholesky factorization Sympiler performs up to 2.4× and 6.3× better than CHOLMOD and Eigen respectively. Eigen uses the left-looking non-supernodal approach therefore, its performance does not scale well for large matrices. CHOLMOD benefits from supernodes and thus performs well for large matrices with large supernodes. However, CHOLMOD does not perform well for some small matrices and large matrices with small supernodes. Sympiler provides the highest performance for almost all tested matrix types which demonstrates the power of sparsity-specific code generation. Sympiler (Numeric) Sympiler (Symbolic) Eigen 1 2 3 4 5 6 7 8 9 10 11 Figure 8: The figure shows the sparse triangular solve symbolic+numeric time for Sympiler and Eigen’s runtime normalized over the Eigen time (lower is better). The application of kernel-specific and aggressive optimizations when generating code for dense sub-kernels enables Sympiler to generate fast code for any sparsity pattern. Since BLAS routines are not well-optimized for small dense kernels they often do not perform well for the small blocks produced when applying VSBlock to sparse codes [61]. Therefore, libraries such as CHOLMOD do not perform well for matrices with small supernodes. Sympiler has the luxury to generate code for its dense sub-kernels; instead of being handicapped by the performance of BLAS routines, it generates specialized and highly-efficient codes for small dense sub-kernels. If the average column-count for a matrix is below a tuned threshold, Sympiler will call BLAS routines [71] instead. Since the column-count directly specifies the number of dense triangular solves, which is the most important dense sub-kernel in Cholesky, the average column-count is used to decide when to switch to BLAS routines [71]. For example, the average column-count of matrices 3, 4, 6, and 8 are less than the column-count threshold. Decoupling the prune-set calculation from the numerical manipulation phase also improves the performance of the Sympilergenerated code. As discussed in subsection 3.2, the sparse Cholesky implementation needs to obtain the row sparsity pattern of L. The elimination tree of A and the upper triangular part of A are both used in CHOLMOD and Eigen to find the row sparsity pattern. Since A is symmetric and only its lower part is stored, both libraries compute the transpose of A in the numerical code to access its upper triangular elements. Through fully decoupling symbolic analysis from the numerical code, Sympiler has the L row sparsity information in the prune-set ahead of time and therefore, both the reach function and the matrix transpose operations are removed from the numeric code. 4.3 Symbolic Analysis Time All symbolic analysis is performed at compile-time in Sympiler and its generated code only manipulates numerical values. Since symbolic analysis is performed once for a specific sparsity pattern, its overheads amortize with repeat executions of the numerical code. However, as demonstrated in Figures 8 and 9 even if the numerical code is executed only once, which is not common in Kazem Cheshmi, Shoaib Kamil, Michelle Mills Strout, and Maryam Mehri Dehnavi scientific applications, the accumulated symbolic+numeric time of Sympiler is close to Eigen for the triangular solve and faster than both Eigen and CHOLMOD for Cholesky. Triangular solve: Figure 8 shows the time Sympiler spends to do symbolic analysis at compile-time, Sympiler (symbolic), for the sparse triangular solve. No symbolic time is available for Eigen since as discussed, Eigen uses the code in Figure 1c for its triangular solve implementation. Figure 8 shows the symbolic analysis and numerical manipulation time of Sympiler normalized over Eigen’s run-time. Sympiler’s numeric plus symbolic time is on average 1.27× slower than the Eigen code. In addition, code generation and compilation in Sympiler costs between 6–197× the cost of the numeric solve, depending on the matrix. It is important to note that since the sparsity structure of the matrix in triangular solve does not change in many applications, the overhead of the symbolic inspector and compilation is only paid once. For example, in preconditioned iterative solvers a triangular system must be solved per iteration, and often the iterative solver must execute thousands of iterations [8, 42, 50] until convergence since the systems in scientific applications are not necessarily well-conditioned. Cholesky: Sparse libraries perform symbolic analysis ahead of time which can be re-used for same sparsity patterns and improves the performance of their numerical executions. We compare the analysis time of the libraries with Sympiler’s symbolic inspection time. Figure 9 provides the symbolic analysis and numeric manipulation times for both libraries normalized to Eigen time. The time spent by Sympiler to perform symbolic analysis is referred to as Sympiler symbolic. CHOLMOD (symbolic) and Eigen (symbolic) refer to the partially decoupled symbolic code that is only run once if the user indicates that sparsity remains static. In nearly all cases Sympiler’s accumulated time is better than the other two libraries. Code generation and compilation, which are not shown in the chart, add a very small amount of time, costing at most 0.3× the cost of numeric factorization. Also, like the triangular solve example, the matrix with a fixed sparsity pattern must be factorized many times in scientific applications. For example, in Newton-Raphson (NR) solvers for nonlinear systems of equations, a Jacobian matrix is factorized in each iteration and the NR solvers require tens or hundreds of iterations to converge [21, 51]. 5 RELATED WORK Compilers for general languages are hampered by optimization methods that either give up on optimizing sparse codes or only apply conservative transformations that do not lead to high performance. This is due to the indirection required to index and loop over the nonzero elements of sparse data structures. Polyhedral methods are limited when dealing with non-affine loop nests or subscripts [5, 10, 41, 54, 65, 67] which are common in sparse computations. To make it possible for compilers to apply more aggressive loop and data transformations to sparse codes, recent work [63, 66, 68– 70] has developed compile-time techniques for automatically creating inspectors and executors for use at run-time. These techniques use an inspector to analyze index arrays in sparse codes at run-time and an executor that uses this run-time information to execute code with specific optimizations. These inspector-executor techniques 2.0 Cholesky Time / (Eigen Time) ,, Sympiler (Numeric) Sympiler (Symbolic) Eigen (Numeric) Eigen (Symbolic) CHOLMOD (Numeric) CHOLMOD (Symbolic) 1.5 1.0 0.5 1 2 3 4 5 6 7 8 9 10 11 Figure 9: The figure shows the symbolic+numeric time for Sympiler, CHOLMOD, and Eigen for the Cholesky algorithm. All times are normalized over the Eigen’s accumulated symbolic+numeric time (lower is better). are limited in that they only apply to sparse codes with static index arrays; such codes require the matrix structure to not change during the computation. The aforementioned approach performs well for methods such as sparse incomplete LU(0) and Gauss-Seidel methods where additional nonzeros/fill-ins are not introduced during computation. However, in a large class of sparse matrix methods, such as direct solvers including Cholesky, LU, and QR decompositions, index arrays dynamically change during computation since the algorithm itself introduces fill-ins. In addition, the indirections and dependencies in sparse direct solvers are tightly coupled with the algorithm, making it difficult to apply inspector-executor techniques. Domain-specific compilers integrate domain knowledge into the compilation process, improving the compiler’s ability to transform and optimize specific kinds of computations. Such an approach has been used successfully for stencil computations [39, 55, 64], signal processing [53], dense linear algebra [37, 62], matrix assembly and mesh analysis [1, 48], simulation [9, 43], and sparse operations [16, 56]. Though the simulations and sparse compilers use some knowledge of matrix structure to optimize operations, they do not build specialized matrix solvers. Specialized Libraries are the typical approach for sparse direct solvers. These libraries differ in (1) which numerical methods are implemented, (2) the implementation strategy or variant of the solver, (3) the type of the platform supported, and (4) whether the algorithm is specialized for specific applications. Each numerical method is suitable for different classes of matrices; for example, Cholesky factorization requires the matrix be symmetric (or Hermitian) positive definite. Libraries such as SuperLU [22], KLU [20], UMFPACK [12], and Eigen [36] provide optimized implementations for LU decomposition methods. The Cholesky factorization is available through libraries such as Eigen [36], CSparse [14], CHOLMOD [11], MUMPS [2–4], and PARDISO [57, 58]. QR factorization is implemented in SPARSPAK[30, 32], SPLOOES [7], Eigen [36], and CSparse [14]. The optimizations and algorithm variants used to implement sparse matrix methods differ between libraries. For example LU decomposition can be implemented using Sympiler: Transforming Sparse Codes multifrontal methods [12, 15, 38], left-looking [20, 22, 27, 30], rightlooking [25, 45, 59], and up-looking [13, 60] methods. Libraries are developed to support different platforms such as sequential implementations [11, 14, 20], shared memory [15, 23, 57], and distributed memory [3, 23]. Finally, some libraries are designed to perform well on matrices arising from a specific domain. For example, KLU [20] works best for circuit simulation problems. In contrast, SuperLUMT applies optimizations with the assumption that the input matrix structure leads to large supernodes; such a strategy is a poor fit for circuit simulation problems. 6 CONCLUSION In this paper we demonstrated how decoupling symbolic analysis from numerical manipulation can enable the generation of domainspecific highly-optimized sparse codes with static sparsity patterns. Sympiler, the proposed domain-specific code generator, takes the sparse matrix pattern and the sparse matrix algorithm as inputs to perform symbolic analysis at compile-time. It then uses the information from symbolic analysis to apply a number of inspector-guided and low-level transformations to the sparse code. The Sympilergenerated code outperforms two state-of-the-art sparse libraries, Eigen and CHOLMOD, for the sparse Cholesky and the sparse triangular solve algorithms. REFERENCES [1] Martin S Alnæs, Anders Logg, Kristian B Ølgaard, Marie E Rognes, and Garth N Wells. 2014. Unified form language: A domain-specific language for weak formulations of partial differential equations. ACM Transactions on Mathematical Software (TOMS) 40, 2 (2014), 9. [2] Patrick R Amestoy, Iain S Duff, and J-Y L’Excellent. 2000. Multifrontal parallel distributed symmetric and unsymmetric solvers. Computer methods in applied mechanics and engineering 184, 2 (2000), 501–520. [3] Patrick R Amestoy, Iain S Duff, Jean-Yves L’Excellent, and Jacko Koster. 2001. A fully asynchronous multifrontal solver using distributed dynamic scheduling. SIAM J. Matrix Anal. Appl. 23, 1 (2001), 15–41. [4] Patrick R Amestoy, Abdou Guermouche, Jean-Yves LâĂŹExcellent, and Stéphane Pralet. 2006. Hybrid scheduling for the parallel solution of linear systems. Parallel computing 32, 2 (2006), 136–156. [5] Corinne Ancourt and François Irigoin. 1991. Scanning polyhedra with DO loops. In ACM Sigplan Notices, Vol. 26. ACM, 39–50. [6] Dale Arden Anderson, John C Tannehill, and Richard H Pletcher. 1984. Computational fluid mechanics and heat transfer. (1984). [7] Cleve Ashcraft and Roger G Grimes. 1999. SPOOLES: An Object-Oriented Sparse Matrix Library.. In PPSC. [8] Michele Benzi, Jane K Cullum, and Miroslav Tuma. 2000. Robust approximate inverse preconditioning for the conjugate gradient method. SIAM Journal on Scientific Computing 22, 4 (2000), 1318–1332. [9] Gilbert Louis Bernstein, Chinmayee Shah, Crystal Lemire, Zachary Devito, Matthew Fisher, Philip Levis, and Pat Hanrahan. 2016. Ebb: A DSL for Physical Simulation on CPUs and GPUs. ACM Trans. Graph. 35, 2, Article 21 (May 2016), 12 pages. DOI:https://doi.org/10.1145/2892632 [10] Chun Chen. 2012. Polyhedra scanning revisited. ACM SIGPLAN Notices 47, 6 (2012), 499–508. [11] Yanqing Chen, Timothy A Davis, William W Hager, and Sivasankaran Rajamanickam. 2008. Algorithm 887: CHOLMOD, supernodal sparse Cholesky factorization and update/downdate. ACM Transactions on Mathematical Software (TOMS) 35, 3 (2008), 22. [12] Timothy A Davis. 2004. Algorithm 832: UMFPACK V4. 3—an unsymmetricpattern multifrontal method. ACM Transactions on Mathematical Software (TOMS) 30, 2 (2004), 196–199. [13] Timothy A Davis. 2005. Algorithm 849: A concise sparse Cholesky factorization package. ACM Transactions on Mathematical Software (TOMS) 31, 4 (2005), 587– 591. [14] Timothy A Davis. 2006. Direct methods for sparse linear systems. Vol. 2. Siam. [15] Timothy A Davis. 2011. Algorithm 915, SuiteSparseQR: Multifrontal multithreaded rank-revealing sparse QR factorization. ACM Transactions on Mathematical Software (TOMS) 38, 1 (2011), 8. ,, [16] Timothy A Davis. 2013. Algorithm 930: FACTORIZE: An object-oriented linear system solver for MATLAB. ACM Transactions on Mathematical Software (TOMS) 39, 4 (2013), 28. [17] Timothy A Davis and William W Hager. 2005. Row modifications of a sparse Cholesky factorization. SIAM J. Matrix Anal. Appl. 26, 3 (2005), 621–639. [18] Timothy A Davis and William W Hager. 2009. Dynamic supernodes in sparse Cholesky update/downdate and triangular solves. ACM Transactions on Mathematical Software (TOMS) 35, 4 (2009), 27. [19] Timothy A Davis and Yifan Hu. 2011. The University of Florida sparse matrix collection. ACM Transactions on Mathematical Software (TOMS) 38, 1 (2011), 1. [20] Timothy A Davis and Ekanathan Palamadai Natarajan. 2010. Algorithm 907: KLU, a direct sparse solver for circuit simulation problems. ACM Transactions on Mathematical Software (TOMS) 37, 3 (2010), 36. [21] Ailson P de Moura and Adriano Aron F de Moura. 2013. Newton–Raphson power flow with constant matrices: a comparison with decoupled power flow methods. International Journal of Electrical Power & Energy Systems 46 (2013), 108–114. [22] James W Demmel, Stanley C Eisenstat, John R Gilbert, Xiaoye S Li, and Joseph WH Liu. 1999. A supernodal approach to sparse partial pivoting. SIAM J. Matrix Anal. Appl. 20, 3 (1999), 720–755. [23] James W Demmel, John R Gilbert, and Xiaoye S Li. 1999. An asynchronous parallel supernodal algorithm for sparse gaussian elimination. SIAM J. Matrix Anal. Appl. 20, 4 (1999), 915–952. [24] Richard C Dorf. 2006. Electronics, power electronics, optoelectronics, microwaves, electromagnetics, and radar. CRC press. [25] Iain S Duff, Nick IM Gould, John K Reid, Jennifer A Scott, and Kathryn Turner. 1991. The factorization of sparse symmetric indefinite matrices. IMA J. Numer. Anal. 11, 2 (1991), 181–204. [26] Iain S Duff and John K Reid. 1983. The multifrontal solution of indefinite sparse symmetric linear. ACM Transactions on Mathematical Software (TOMS) 9, 3 (1983), 302–325. [27] Iain S Duff and John Ker Reid. 1996. The design of MA48: a code for the direct solution of sparse unsymmetric linear systems of equations. ACM Transactions on Mathematical Software (TOMS) 22, 2 (1996), 187–226. [28] Yousef El-Kurdi, Maryam Mehri Dehnavi, Warren J. Gross, and Dennis Giannacopoulos. 2015. Parallel finite element technique using Gaussian belief propagation. Computer Physics Communications 193, Complete (2015), 38–48. DOI: https://doi.org/10.1016/j.cpc.2015.03.019 [29] Gonzalo Exposito-Dominguez, Jose-Manuel Fernandez Gonzalez, Pablo Padilla de La Torre, and Manuel Sierra-Castaner. 2012. Dual circular polarized steering antenna for satellite communications in X band. Progress In Electromagnetics Research 122 (2012), 61–76. [30] Alan George and Joseph WH Liu. 1979. The design of a user interface for a sparse matrix package. ACM Transactions on Mathematical Software (TOMS) 5, 2 (1979), 139–162. [31] Alan George and Joseph W. Liu. 1981. Computer Solution of Large Sparse Positive Definite. Prentice Hall Professional Technical Reference. [32] Alan George and Joseph W Liu. 1981. Computer solution of large sparse positive definite. (1981). [33] Sarah FF Gibson and Brian Mirtich. 1997. A survey of deformable modeling in computer graphics. Technical Report. Citeseer. [34] John R Gilbert and Tim Peierls. 1988. Sparse partial pivoting in time proportional to arithmetic operations. SIAM J. Sci. Statist. Comput. 9, 5 (1988), 862–874. [35] Nicholas IM Gould, Jennifer A Scott, and Yifan Hu. 2007. A numerical evaluation of sparse direct solvers for the solution of large sparse symmetric linear systems of equations. ACM Transactions on Mathematical Software (TOMS) 33, 2 (2007), 10. [36] Gaël Guennebaud and Benoit Jacob. 2010. Eigen. URl: http://eigen. tuxfamily. org (2010). [37] John A Gunnels, Fred G Gustavson, Greg M Henry, and Robert A Van De Geijn. 2001. FLAME: Formal linear algebra methods environment. ACM Transactions on Mathematical Software (TOMS) 27, 4 (2001), 422–455. [38] Anshul Gupta, George Karypis, and Vipin Kumar. 1997. Highly scalable parallel algorithms for sparse matrix factorization. IEEE Transactions on Parallel and Distributed Systems 8, 5 (1997), 502–520. [39] Justin Holewinski, Louis-Noël Pouchet, and P. Sadayappan. 2012. Highperformance Code Generation for Stencil Computations on GPU Architectures. In Proceedings of the 26th ACM International Conference on Supercomputing (ICS ’12). ACM, New York, NY, USA, 311–320. DOI:https://doi.org/10.1145/2304576. 2304619 [40] Carlo Janna, Massimiliano Ferronato, and Giuseppe Gambolati. 2015. The use of supernodes in factored sparse approximate inverse preconditioning. SIAM Journal on Scientific Computing 37, 1 (2015), C72–C94. [41] Wayne Kelly. 1998. Optimization within a unified transformation framework. (1998). [42] David S Kershaw. 1978. The incomplete CholeskyâĂŤconjugate gradient method for the iterative solution of systems of linear equations. J. Comput. Phys. 26, 1 (1978), 43–65. ,, Kazem Cheshmi, Shoaib Kamil, Michelle Mills Strout, and Maryam Mehri Dehnavi [43] Fredrik Kjolstad, Shoaib Kamil, Jonathan Ragan-Kelley, David IW Levin, Shinjiro Sueda, Desai Chen, Etienne Vouga, Danny M Kaufman, Gurtej Kanwar, Wojciech Matusik, and Saman Amarasinghe. 2016. Simit: A language for physical simulation. ACM Transactions on Graphics (TOG) 35, 2 (2016), 20. [44] Xiaoye S Li. 2005. An overview of SuperLU: Algorithms, implementation, and user interface. ACM Transactions on Mathematical Software (TOMS) 31, 3 (2005), 302–325. [45] Xiaoye S Li and James W Demmel. 2003. SuperLU_DIST: A scalable distributedmemory sparse direct solver for unsymmetric linear systems. ACM Transactions on Mathematical Software (TOMS) 29, 2 (2003), 110–140. [46] Joseph W. H. Liu. 1990. The Role of Elimination Trees in Sparse Factorization. SIAM J. Matrix Anal. Appl. 11, 1 (Jan. 1990), 134–172. DOI:https://doi.org/10. 1137/0611010 [47] José A Zevallos Luna, Alexandre Siligaris, Cédric Pujol, and Laurent Dussopt. 2013. A packaged 60 GHz low-power transceiver with integrated antennas for short-range communications.. In Radio and Wireless Symposium. 355–357. [48] Fabio Luporini, David A Ham, and Paul HJ Kelly. 2016. An algorithm for the optimization of finite element integration loops. arXiv preprint arXiv:1604.05872 (2016). [49] Maxim Naumov. 2012. Parallel incomplete-LU and Cholesky factorization in the preconditioned iterative methods on the GPU. NVIDIA Technical Report NVR-2012-003 (2012). [50] M Papadrakakis and N Bitoulas. 1993. Accuracy and effectiveness of preconditioned conjugate gradient algorithms for large and ill-conditioned problems. Computer methods in applied mechanics and engineering 109, 3-4 (1993), 219–232. [51] Roger P Pawlowski, John N Shadid, Joseph P Simonis, and Homer F Walker. 2006. Globalization techniques for Newton–Krylov methods and applications to the fully coupled solution of the Navier–Stokes equations. SIAM review 48, 4 (2006), 700–721. [52] Alex Pothen and Sivan Toledo. 2004. Elimination Structures in Scientific Computing. (2004). [53] Markus Püschel, José M. F. Moura, Jeremy Johnson, David Padua, Manuela Veloso, Bryan Singer, Jianxin Xiong, Franz Franchetti, Aca Gacic, Yevgen Voronenko, Kang Chen, Robert W. Johnson, and Nicholas Rizzolo. 2005. SPIRAL: Code Generation for DSP Transforms. Proceedings of the IEEE, special issue on “Program Generation, Optimization, and Adaptation” 93, 2 (2005), 232– 275. [54] Fabien Quilleré, Sanjay Rajopadhye, and Doran Wilde. 2000. Generation of efficient nested loops from polyhedra. International Journal of Parallel Programming 28, 5 (2000), 469–498. [55] Jonathan Ragan-Kelley, Connelly Barnes, Andrew Adams, Sylvain Paris, Frédo Durand, and Saman Amarasinghe. 2013. Halide: a language and compiler for optimizing parallelism, locality, and recomputation in image processing pipelines. ACM SIGPLAN Notices 48, 6 (2013), 519–530. [56] Hongbo Rong, Jongsoo Park, Lingxiang Xiang, Todd A Anderson, and Mikhail Smelyanskiy. 2016. Sparso: Context-driven optimizations of sparse linear algebra. In Proceedings of the 2016 International Conference on Parallel Architectures and Compilation. ACM, 247–259. [57] Olaf Schenk and Klaus Gärtner. 2004. Solving unsymmetric sparse systems of linear equations with PARDISO. Future Generation Computer Systems 20, 3 (2004), 475–487. [58] Olaf Schenk, Klaus Gärtner, and Wolfgang Fichtner. 2000. Efficient sparse LU factorization with left-right looking strategy on shared memory multiprocessors. BIT Numerical Mathematics 40, 1 (2000), 158–176. [59] Kai Shen, Tao Yang, and Xiangmin Jiao. 2000. S+: Efficient 2D sparse LU factorization on parallel machines. SIAM J. Matrix Anal. Appl. 22, 1 (2000), 282–305. [60] Andrew H Sherman. 1978. Algorithms for sparse Gaussian elimination with partial pivoting. ACM Transactions on Mathematical Software (TOMS) 4, 4 (1978), 330–338. [61] Jaewook Shin, Mary W Hall, Jacqueline Chame, Chun Chen, Paul F Fischer, and Paul D Hovland. 2010. Speeding up Nek5000 with autotuning and specialization. In Proceedings of the 24th ACM International Conference on Supercomputing. ACM, 253–262. [62] Daniele G Spampinato and Markus Püschel. 2014. A basic linear algebra compiler. In Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization. ACM, 23. [63] Michelle Mills Strout, Alan LaMielle, Larry Carter, Jeanne Ferrante, Barbara Kreaseck, and Catherine Olschanowsky. 2016. An approach for code generation in the sparse polyhedral framework. Parallel Comput. 53 (2016), 32–57. [64] Yuan Tang, Rezaul Alam Chowdhury, Bradley C Kuszmaul, Chi-Keung Luk, and Charles E Leiserson. 2011. The pochoir stencil compiler. In Proceedings of the twenty-third annual ACM symposium on Parallelism in algorithms and architectures. ACM, 117–128. [65] Ananta Tiwari, Chun Chen, Jacqueline Chame, Mary Hall, and Jeffrey K Hollingsworth. 2009. A scalable auto-tuning framework for compiler optimization. In Parallel & Distributed Processing, 2009. IPDPS 2009. IEEE International Symposium on. IEEE, 1–12. [66] Harmen LA Van Der Spek and Harry AG Wijshoff. 2010. Sublimation: expanding data structures to enable data instance specific optimizations. In International Workshop on Languages and Compilers for Parallel Computing. Springer, 106–120. [67] Nicolas Vasilache, Cédric Bastoul, and Albert Cohen. 2006. Polyhedral code generation in the real world. In International Conference on Compiler Construction. Springer, 185–201. [68] Anand Venkat, Mary Hall, and Michelle Strout. 2015. Loop and data transformations for sparse matrix code. In Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, 521–532. [69] Anand Venkat, Mahdi Soltan Mohammadi, Jongsoo Park, Hongbo Rong, Rajkishore Barik, Michelle Mills Strout, and Mary Hall. 2016. Automating wavefront parallelization for sparse matrix computations. In Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. IEEE Press, 41. [70] Anand Venkat, Manu Shantharam, Mary Hall, and Michelle Mills Strout. 2014. Non-affine extensions to polyhedral code generation. In Proceedings of Annual IEEE/ACM International Symposium on Code Generation and Optimization. ACM, 185. [71] Z Xianyi. 2016. OpenBLAS: an optimized BLAS library. (2016).
6cs.PL
arXiv:1506.00716v1 [cs.CE] 2 Jun 2015 Tackling Exascale Software Challenges in Molecular Dynamics Simulations with GROMACS Szilárd Páll1,2,† Carsten Kutzner3 Mark James Abraham1,2,† Berk Hess1,2 Erik Lindahl1,2,4 Feb 12, 2015 1 Science for Life Laboratory, Stockholm and Uppsala, 171 21 Stockholm, Swe- den, 2 Dept. Theoretical Physics, KTH Royal Institute of Technology, 10691 Stockholm, Sweden, 3 Theoretical and Computational Biophysics Dept., Max Planck Institute for Biophysical Chemistry, Am Fassberg 11, 37077 Göttingen, Germany 4 Center for Biomembrane Research, Dept. Biochemistry & Biophysics, Stockholm University, SE-10691 Stockholm, Sweden Address correspondence to: Erik Lindahl, [email protected] The final publication is available at http://link.springer.com/chapter/10.1007%2F978-3-319-15976-8_1 † The authors contributed equally. 1 Abstract GROMACS is a widely used package for biomolecular simulation, and over the last two decades it has evolved from small-scale efficiency to advanced heterogeneous acceleration and multi-level parallelism targeting some of the largest supercomputers in the world. Here, we describe some of the ways we have been able to realize this through the use of parallelization on all levels, combined with a constant focus on absolute performance. Release 4.6 of GROMACS uses SIMD acceleration on a wide range of architectures, GPU offloading acceleration, and both OpenMP and MPI parallelism within and between nodes, respectively. The recent work on acceleration made it necessary to revisit the fundamental algorithms of molecular simulation, including the concept of neighborsearching, and we discuss the present and future challenges we see for exascale simulation - in particular a very fine-grained task parallelism. We also discuss the software management, code peer review and continuous integration testing required for a project of this complexity. 2 Introduction Molecular Dynamics simulation of biological macromolecules has evolved from a narrow statistical-mechanics method into a widely applied biophysical research tool that is used outside theoretical chemistry. Supercomputers are now as important as centrifuges or test tubes in chemistry. However, this success also considerably raises the bar for molecular simulation implementations - it is no longer sufficient to reproduce experimental results or e.g. show proof-of-concept relative scaling. To justify the substantial supercomputing resources required by many computational chemistry projects the most important focus today is simply absolute simulation performance and the scientific results achieved. Exascale computing has potential to take simulation to new heights, but the combination of challenges that face software preparing for deployment at the exascale to deliver these results are unique in the history of software. The days of simply buying new hardware with a faster clock rate and getting shorter times to solution with old software are gone. The days of running applications on a single core are gone. The days of heterogeneous processor design to suit floating-point computation are back again. The days of performance being bounded by the time taken for floating-point computations are ending fast. The need to design with multi-core and multi-node parallelization in mind at all points is here to stay, which also means Amdahl’s law 3 is more relevant than ever.1 A particular challenge for biomolecular simulations is that the computational 1 Amdahl’s law gives a model for the expected (and maximum) speedup of a program when parallelized over multiple processors with respect to the serial version. It states that the achievable speedup is limited by the sequential part of the program. 2 problem size is fixed by the geometric size of the protein and the atomic-scale resolution of the model physics. Most life science problems can be reduced to this size (or smaller). It is possible to simulate much larger systems, but it is typically not relevant. Second, the timescale of dynamics involving the entire system increases much faster than the length scale, due to the requirement of sampling the exponentially larger number of ensemble microstates. This means that weak scaling is largely irrelevant for life science; to make use of increasing amounts of computational resources to simulate these systems, we have to rely either on strong-scaling software engineering techniques, or ensemble simulation techniques. The fundamental algorithm of molecular dynamics assigns positions and velocities to every particle in the simulation system, and specifies the model physics that governs the interactions between particles. The forces can then be computed, which can be used to update the positions and velocities via Newton’s second law, using a given finite time step. This numerical integration scheme is iterated a large number of times, and it generates a series of samples from the thermodynamic ensemble defined by the model physics. From these samples, observations can be made that confirm or predict experiment. Typical model physics have many components to describe the different kinds of bonded and non-bonded interactions that exist. The non-bonded interactions between particles model behaviour like van der Waals forces, or Coulomb’s law. The non-bonded interactions are the most expensive aspects of computing the forces, and the subject of a very large amount of research, computation and optimization. Historically, the GROMACS molecular dynamics simulation suite has aimed at being a general-purpose tool for studying biomolecular systems, such as shown in Fig. 1. The development of the simulation engine focused heavily on maximizing single-core floating-point performance of its innermost compute kernels for non-bonded interactions. These kernels typically compute the electrostatic and van der Waals forces acting on each simulation particle from its interactions with all other inside a given spherical boundary. These kernels were first written in C, then FORTRAN, and later optimized in assembly language, mostly for commodity x86-family processors, because the data dependencies of the computations in the kernels were too challenging for C or FORTRAN compilers (then or now). The kernels were also specialized for interactions within and between water molecules, because of the prevalence of such interactions in biomolecular simulations. From one point-of-view, this extensive use of interaction-specific kernels can be seen as a software equivalent of applicationspecific integrated circuits. Recognizing the need to build upon this good work by coupling multiple processors, GROMACS 4.0 14 introduced a minimal-communication neutral territory domain-decomposition (DD) algorithm, 7,8 with fully dynamic load balancing. This spatial decomposition of the simulation volume created high-level 3 Figure 1: A typical GROMACS simulation system, featuring the ligand-gated ion-channel membrane protein GLIC (colored), embedded in a lipid membrane (grey). The whole system is solvated in water (not shown), giving a total of around 145,000 atoms. Image created with VMD. 15 data parallelism that was effective for near-linear scaling of the computation at around 400 atoms per core. The DD implementation required the use of MPI for message-passing parallel constructs. However, the needs of many simulation users can be met within a single node, 23 and in that context the implementation overhead of MPI libraries was too high, not to mention it is difficult to employ in distributed computing. In GROMACS 4.5, 20 we implemented a multithreaded MPI library with the necessary subset of the MPI API. The library has both POSIX and Windows threads back-ends (hence called thread-MPI) and uses highly efficient hardware-supported atomic and lock-free synchronization primitives. This allows the existing DD implementation to work across multiple cores of a single node without depending on any external MPI library. However, the fundamental limitation remained of a one-to-one mapping of MPI ranks to cores, and to domains. On the one hand, there is always a limit to how small a spatial domain can be, which will limit the number of domains the simulation box can be decomposed into, which in turn limits the number of cores that a parallelization with such a mapping can utilize. On the other hand, the one-to-one domains to cores mapping is cache-friendly as it creates independent data sets so that cores sharing caches can act without conflict, but the size of the volume of data that must be communicated so that neighboring domains act coherently grows rapidly with the number of domains. This approach is only scalable for a fixed problem size if the latency of communication between all cores is comparable and the communication book-keeping overhead grows only linearly with the number of cores. Neither is true, because network latencies 4 are orders of magnitude higher than shared-cache latencies. This is clearly a major problem for designing for the exascale, where many cores, many nodes and non-uniform memory and communication latencies will be key attributes. The other important aspect of the target simulations for designing for strong scaling is treating the long-range components of the atomic interactions. Many systems of interest are spatially heterogeneous on the nanometer scale (e.g. proteins embedded in membranes and solvated in water), and the simulation artefacts caused by failing to treat the long-range effects are well known. The de facto standard for treating the long-range electrostatic interactions has become the smooth particle-mesh Ewald (PME) method, 12 whose cost for N atoms scales as N log( N ). A straightforward implementation where each rank of a parallel computation participates in an equivalent way leads to a 3D Fast Fourier Transform (FFT) that communicates globally. This communication quickly limits the strong scaling. To mitigate this, GROMACS 4.0 introduced a multiple-program multiple-data- (MPMD) implementation that dedicates some ranks to the FFT part; now only those ranks do all-to-all FFT communication. GROMACS 4.5 improved further by using a 2D pencil decomposition 11,16 in reciprocal space, within the same MPMD implementation. This coarse-grained task parallelism works well on machines with homogeneous hardware, but it is harder to port to accelerators or combine with RDMA constructs. The transformation of GROMACS needed to perform well on exascale-level parallel hardware began after GROMACS 4.5. This requires radical algorithm changes, and better use of parallelization constructs from the ground up, not as an afterthought. More hands are required to steer the project, and yet the old functionality written before their time must generally be preserved. Computer architectures are evolving rapidly, and no single developer can know the details of all of them. In the following sections we describe how we are addressing some of these challenges, and our ongoing plans for addressing others. 3 3.1 Handling exascale software challenges: algorithms and parallelization schemes Multi-level parallelism Modern computer hardware is not only parallel, but exposes multiple levels of parallelism depending on the type and speed of data access and communication capabilities across different compute elements. For a modern superscalar CPU such as Intel Haswell, even a single core is equipped with 8 different execution ports, and it is not even possible to buy a single-core chip. Add hardware threads, complex communication crossbars, memory hierarchies, and caches larger than hard disks from the 1990s. This results in a complex hierarchical organization of compute and communication/network elements from SIMD 5 units and caches to network topologies, each level in the hierarchy requiring a different type of software parallelization for efficient use. HPC codes have traditionally focused on only two levels of parallelism: intra-node and inter-node. Such codes typically rely solely on MPI parallelization to target parallelism on multiple levels: both intra-socket, intra-node, and inter-node. This approach had obvious advantages before the multi-core and heterogeneous computing era when improvements came from CPU frequency scaling and evolution of interconnect. However, nowadays most scientific problems require complex parallel software architecture to be able use petaflop hardware efficiently and going toward exascale this is becoming a necessity. This is particularly true for molecular dynamics which requires reducing the wall-time per iteration to improve simulation performance. On the lowest level, processors typically contain SIMD (single instruction multiple data) units which offer fine-grained data-parallelism through silicon dedicated to executing a limited set of instructions on multiple, currently typically 4-16, data elements simultaneously. Exploiting this low-level and finegrained parallelism has become crucial for achieving high performance, especially with new architectures like AVX and Intel MIC supporting wide SIMD. One level higher, multi-core CPUs have become the standard and several architectures support multiple hardware threads per core. Hence, typical multi-socket SMP machines come with dozens of cores capable of running 2-4 threads each (through simultaneous multi-threading, SMT, support). Simply running multiple processes (MPI ranks) on each core or hardware thread is typically less efficient than multi-threading. Achieving strong scaling in molecular dynamics requires efficient use of the cache hierarchy, which makes the picture even more complex. On the other hand, a chip cannot be considered a homogeneous cluster either. Accelerator coprocessors like GPUs or Intel MIC, often referred to as many-core, add another layer of complexity to the intra-node parallelism. These require fine-grained parallelism and carefully tuned data access patterns, as well as special programming models. Current accelerator architectures like GPUs also add another layer of interconnect in form of PCIe bus (Peripheral Component Interconnect Express) as well as a separate main memory. This means that data movement across the PCIe link often limits overall throughput. Integration of traditional latency-oriented CPU cores with throughput-oriented cores like those in GPUs or MIC accelerators is ongoing, but the cost of data movement between the different units will at least for the foreseeable future be a factor that needs to be optimized for. Typical HPC hardware exhibits non-uniform memory access (NUMA) behavior on the node level: accessing data from different CPUs or cores of CPUs has a non-uniform cost. We started multithreading trials quite early with the idea of easily achieving load balancing, but the simultaneous introduction of NUMA suddenly meant a processor resembled a cluster internally. Indiscriminately accessing memory across NUMA nodes will frequently lead to performance that 6 is lower than for MPI. Moreover, the NUMA behavior extends to other compute and communication components: the cost of communicating with an accelerator or through a network interface typically depends on the intra-node bus topology and requires special attention. On the top level, the interconnect links together compute nodes into a network topology. A side-effect of the multi-core evolution is that, while the network capacity (latency and bandwidth) per compute node has improved, the typical number of CPU cores they serve has increased faster; the capacity available per core has decreased substantially. In order to exploit the capabilities of each level of hardware parallelism, a performance-oriented application needs to consider multiple levels of parallelism: SIMD parallelism for maximizing single-core/thread performance; multithreading to exploit advantages of multi-core and SMT (e.g. fast data sharing); inter-node communication-based parallelism (e.g. message passing with MPI); and heterogeneous parallelism by utilizing both CPUs and accelerators like GPUs. Driven by this evolution of hardware, we have initiated a re-redesign of the parallelization in GROMACS. In particular, recent efforts have focused on improvements targeting all levels of parallelization: new algorithms for wide SIMD and accelerator architectures, a portable and extensible SIMD parallelization framework, efficient multi-threading throughout the entire code, and an asynchronous offload-model for accelerators. The resulting multi-level parallelization scheme implemented in GROMACS 4.6 is illustrated in Fig. 2. In the following sections, we will give an overview of these improvements, highlighting the advances they provide in terms of making efficient use of current petascale hardware, as well as in paving the road towards exascale computing. 3.2 SIMD parallelism All modern CPU and GPU architectures use SIMD-like instructions to achieve high flop rates. Any computational code that aims for high performance will have to make use of SIMD. For very regular work, such as matrix-vector multiplications, the compiler can generate good SIMD code, although manually tuned vendor libraries typically do even better. But for irregular work, such as shortrange particle-particle non-bonded interactions, the compiler usually fails since it cannot control data structures. If you think your compiler is really good at optimizing, it can be an eye-opening experience to look at the raw assembly instructions actually generated. In GROMACS, this was reluctantly recognized a decade ago and SSE and Altivec SIMD kernels were written manually in assembly. These kernels were, and still are, extremely efficient for interactions involving water molecules, but other interactions do not parallelize well with SIMD using the standard approach of unrolling a particle-based Verlet-list. 25 It is clear that a different approach is needed in order to use wide SIMD execution units like AVX or GPUs. We developed a novel approach, where particles 7 short-ranged interactions • cluster-pair search • bonded interactions • integration of forces SIMD floating-point operations OpenMP threads CPU cores serial FFT library Nvidia GPUs PP nodes • spread/gather • 3D-FFT • solve MPI ranks PME nodes OpenMP threads LCD-Pro READER AUDIO PHONE MIC LINE-IN CARD SATA USB EJECT DVD-RW POWER MENU F7 F8 Esc ` ! F4 F3 F1 F2 ~ 1 @ Tab 2 # + SELECT F11 F12 F9 F10 + _ - ScrollLock PrintScrn SysRq Pause NumLock Break Insert = | \ } Home ScrollLock CapsLock NumLock PageUp Delete End PageDown / * 7 Shift 8 Home ] ) 0 { [ ( 9 F5 F6 " ' * 8 O P & 7 L : ; ? ^ 6 U I % 5 J K M < , > . / $ T Y 3 4 E R G H N D F C V B Q W A S CapsLock Z X 9 4 PgUp + 6 5 1 End 2 3 0 PgDn Ins . Enter Del Ctrl Alt Gr Alt Shift Ctrl workstations ensembles of simulations compute clusters simulations Figure 2: Illustration of multi-level parallelism in GROMACS 4.6. This exploits several kinds of finegrained data parallelism, a multiple-program multiple-data (MPMD) decomposition separating the shortrange particle-particle (PP) and long-range Particle Mesh Ewald (PME) force calculation algorithms, coarsegrained data parallelism with domain-decomposition (DD) over MPI ranks (implemented either on singlenode workstations or compute clusters), and ensembles of related simulations scheduled e.g. by a distributed computing controller. are grouped into spatial clusters containing fixed number of particles. 17 First, the particles are placed on a grid in the x and y dimensions, and then binned in the z dimension. This efficiently groups particles that are close in space, and permits the construction of a list of clusters, each containing exactly M particles. A list is then constructed of all those cluster pairs containing particles that may be close enough to interact. This list of pairs of interacting clusters is reused over multiple successive evaluations of the non-bonded forces. The list is constructed with a buffer to prevent particle diffusion corrupting the implementation of the model physics. The kernels that implement the computation of the interactions between two clusters i and j use SIMD load instructions to fill vector registers with copies of the positions of all M particles in i. The loop over the N particles in j is unrolled according to the SIMD width of the CPU. Inside this loop, SIMD load instructions fill vector registers with positions of all N particles from the j cluster. This permits the computation of N interactions between an i and all j particles simultaneously, and the computation of M × N interactions in the inner loop without needing to load particle data. With wide SIMD units it is efficient to process more than one j cluster at a time. M, N and the number of j clusters to process can be adjusted to suit the underlying characteristics of the hardware. Using M=1 and N=1 recovers the original Verlet-list algorithm. On CPUs, GROMACS uses M=4 and N=2, 4 or 8 8, depending on the SIMD width. On NVIDIA GPUs, we use M=8 and N=4 to calculate 32 interactions at once with 32 hardware threads executing in lockstep. To further improve the ratio of arithmetic to memory operations when using GPUs, we add another level of hierarchy by grouping 8 clusters together. Thus we store 64 particles in shared memory and calculate interactions with about half of these for every particle in the cluster-pair list. The kernel implementations reach about 50% of the peak flop rate on all supported hardware, which is very high for MD. This comes at the cost of calculating about twice as many interactions as required; not all particle pairs in all cluster pairs will be within the cut-off at each time step, so many interactions are computed that are known to produce a zero result. The extra zero interactions can actually be put to use as an effective additional pair list buffer additionally to the standard Verlet list buffer. As we have shown here, this scheme is flexible, since N and M can be adapted to current and future hardware. Most algorithms and optimization tricks that have been developed for particle-based pair lists can be reused for the cluster-pair list, although many will not improve the performance. The current implementation of the cluster-based non-bonded algorithm already supports a wide range of SIMD instruction sets and accelerator architectures: SSE2, SSE4.1, AVX (256-bit and 128-bit with FMA), AVX2, BG/Q QPX, Intel MIC (LRBni), NVIDIA CUDA. An implementation on a field-programmable gate array (FPGA) architecture is in progress. 3.2.1 Multi-threaded parallelism Before GROMACS 4.6, we relied mostly on MPI for both inter-node and intranode parallelization over CPU cores. For MD this has worked well, since there is little data to communicate and at medium to high parallelization all data fits in L2 cache. Our initial plans were to only support OpenMP parallelization in the separate Particle Mesh Ewald (PME) MPI ranks. The reason for using OpenMP in PME was to reduce the number of MPI ranks involved in the costly collective communication for the FFT grid transpose. This 3D-FFT is the only part of the code that involves global data dependencies. Although this indeed greatly reduced the MPI communication cost, it also introduced significant overhead. GROMACS 4.6 was designed to use OpenMP in all compute-intensive parts of the MD algorithm.2 Most of the algorithms are straightforward to parallelize using OpenMP. These scale very well, as Fig. 3 shows. Cache-intensive parts of the code like performing domain decomposition, or integrating the forces and velocities show slightly worse scaling. Moreover, the scaling in these parts tends to deteriorate with increasing number of threads in an MPI rank – especially with 2 At the time of that decision, sharing a GPU among multiple MPI ranks was inefficient, so the only efficient way to use multiple cores in a node was with OpenMP within a rank. This constraint has since been relaxed. 9 large number of threads in a rank, and when teams of OpenMP threads cross NUMA boundaries. When simulating at high ratios of cores/particles, each MD step can take as little as a microsecond. There are many OpenMP barriers used in the many code paths that are parallelized with OpenMP, each of which takes a few microseconds, which can be costly. 80 OpenMP MPI 70 MPI+OpenMP (two ranks) performance (ns/day) 60 50 40 30 20 10 0 0 2 4 6 8 10 12 14 16 #cores Figure 3: Comparison of single-node simulation performance using MPI, OpenMP, and combined MPI+OpenMP parallelization. The OpenMP multi-threading (blue) achieves the highest performance and near linear scaling up to 8 threads. It only deteriorates when threads on OpenMP regions need to communicate across the system bus. In contrast, the MPI-only runs (red) that require less communication scale well across sockets. Combining MPI and OpenMP parallelization with two ranks and varying the number of threads (green) results in worse performance due to the added overhead of the two parallelization schemes. Simulations were carried out on a dual-socket node with 8-core Intel Xeon E5-2690 (2.9 GHz Sandy Bridge). Input system: RNAse protein solvated in a rectangular box, 24k atoms, PME electrostatics, 0.9 nm cut-off. Accordingly, the hybrid MPI + OpenMP parallelization is often slower than an MPI-only scheme as Fig. 3 illustrates. Since PP (particle-particle) ranks only do low-volume local communication, the reduction in MPI communication from using the hybrid scheme is apparent only at high parallelization. There, MPIonly parallelization (e.g. as in GROMACS 4.5) puts a hard upper limit on the number of cores that can be used, due to algorithmic limits on the spatial domain size, or the need to communicate with more than one nearest neighbor. With the hybrid scheme, more cores can operate on the same spatial domain assigned to an MPI rank, and there is no longer a hard limit on the parallelization. Strong scaling curves now extend much further, with a more gradual loss of parallel efficiency. An example is given in Fig. 4, which shows a membrane protein system scaling to twice as many cores with hybrid parallelization and reach double the peak performance of GROMACS 4.5. In some cases, OpenMP-only parallelization can be much faster than MPI-only parallelization if the load for each stage of the force computation can be balanced individually. A typical example is a solute in solvent, where the solute has bonded interactions but the solvent does not. With OpenMP, the bonded interactions can be distributed equally over all threads in a straightforward manner. 10 ns/day 300 200 MPI only MPI + 2 OpenMP MPI + 4 OpenMP GMX4.5, MPI only 100 0 0 192 384 576 #cores 768 960 Figure 4: Improvements in strong scaling performance since GROMACS 4.5, using the M × N kernels and OpenMP parallelization in GROMACS 4.6. The plot shows simulation performance in ns/day for different software versions and parallelization schemes. Performance with one core per MPI rank is shown for GROMACS 4.5 (purple) and 4.6 (black). Performance with GROMACS 4.6 is shown using two (red) and four (green) cores per MPI rank using OpenMP threading within each MPI rank. Simulations were carried out on the Triolith cluster at NSC, using two 8-core Intel E5-2660 (2.2 GHz Sandy Bridge) processors per node and FDR Infiniband network. The test system is the GLIC membrane protein shown in Fig. 1 (144,000 atoms, PME electrostatics.) Heterogeneous parallelization Heterogeneous architectures combine multiple types of processing units, typically latency- and throughput-oriented cores – most often CPUs and accelerators like GPUs, Intel MIC, or FPGAs. Many-core accelerator architectures have been become increasingly popular in technical and scientific computing mainly due to their impressive raw floating point performance. However, in order to efficiently utilize these architectures, a very high level of fine-grained parallelism is required. The massively parallel nature of accelerators, in particular GPUs, is both an advantage as well as a burden on the programmer. Since not all tasks are well suited for execution on the accelerators this often leads to additional challenges for workload distribution and load balancing. Moreover, current heterogeneous architectures typically use a slow PCIe bus to connect the hardware elements like CPUs and GPUs and move data between the separate global memory of each. This means that explicit data management is required. This adds a further latency overhead to challenge algorithms like MD that already face this as a parallelization bottle-neck. GPU accelerators were first supported experimentally in GROMACS with the OpenMM library, 10 which was used as a black box to execute the entire simulation on the GPU. This meant that only a fraction of the diverse set of GROMACS algorithms were supported and simulations were limited to singleGPU use. Additionally, while OpenMM offered good performance for implicitsolvent models, the more common type of runs showed little speedup (and in some cases slowdown) over the fast performance on multi-core CPUs, thanks to the highly tuned SIMD assembly kernels. With this experience, we set out to provide native GPU support in GRO- 11 MACS 4.6 with a few important design principles in mind. Building on the observation that highly optimized CPU code is hard to beat, our goal was to ensure that all compute resources available, both CPU and accelerators, are utilized to the greatest extent possible. We also wanted to ensure that our heterogeneous GPU acceleration supported most existing features of GROMACS in a single code base to avoid having to reimplement major parts of the code for GPU-only execution. This means that the most suitable parallelization is the offload model, which other MD codes have also employed successfully. 9,18 As Fig. 5 illustrates, we aim to execute the compute-intensive short-range non-bonded force calculation on GPU accelerators, while the CPU computes bonded and long-range electrostatics forces, because the latter are communication intensive. The newly designed future-proof SIMD-oriented algorithm for evaluating non-bonded interactions with accelerator architectures in mind has been discussed already. It is highly efficient at expressing the fine-grained parallelism present in the pair-force calculation. Additionally, the atom cluster-based approach is designed for data reuse which is further emphasized by the supercluster grouping. As a result, our CUDA implementation is characterized by a high ratio of arithmetic to memory operations which allows avoiding memory bottlenecks. These algorithmic design choices and the extensive performance tuning led to strongly instruction-latency bound CUDA non-bonded kernels, in contrast to most traditional particle-based GPU algorithms which are reported to be memory bound 4,9 . Our CUDA GPU kernels also scale well, reaching peak pair-force throughput already around 20,000 particles per GPU. In contrast to typical data-parallel programming for homogeneous CPU-only machines, heterogeneous architectures require additional code to manage task scheduling and concurrent execution on the different compute elements, CPU cores and GPUs in the present case. This is a complex component of our heterogeneous parallelization which implements the data- and control-flow with the main goal of maximizing the utilization of both CPU and GPU by ensuring optimal CPU-GPU execution overlap. We combine a set of CPU cores running OpenMP threads with a GPU. As shown in Fig. 5, the pair-lists required for the non-bonded computation are prepared on the CPU and transferred to the GPU where a pruning step is carried out after which the lists are reused for up to 100 iterations. The extreme floatingpoint power of GPUs makes it feasible to use the much larger buffers required for this. The transfer of coordinates, charges, and forces as well as compute kernels are launched asynchronously as soon as data becomes available on the CPU. This ensures overlap of CPU and GPU computation. Additional effort has gone into maximizing overlap by reducing the wall-time of CPU-side nonoverlapping program parts through SIMD parallelization (in pair search and constraints) and efficient multi-threaded algorithms allowing GROMACS to achieve a typical CPU-GPU overlap of 60-80%. This scheme naturally extends to multiple GPUs by using the existing ef- 12 CPU GPU CUDA Pair search, transfer list Domain decomp. transfer x, q Bonded F MD step Pair search & domain-decomposition: every 20-100 iterations OpenMP threads offload Non-bonded F Non-bonded F & Pair-list pruning PME Integration transfer F, E Constraints Figure 5: GROMACS heterogeneous parallelization using both CPU and GPU resources during each simulation time-step. The compute-heavy non-bonded interactions are offloaded to the GPU, while the CPU is responsible for domain-decomposition book-keeping, bonded force calculation, and lattice summation algorithms. The diagram shows tasks carried out during a GPU-accelerated normal MD step (black arrows) as well as a step which includes the additional pair-search and domain-decomposition tasks are carried out (blue arrows). The latter, as shown above in blue, also includes an additional transfer, and the subsequent pruning of the pair list as part of the non-bonded kernel. Source: http://dx.doi.org/10.6084/m9.figshare.971161. Reused under CC-BY; retrieved 22:15, March 23, 2014 (GMT). 13 ficient neutral-territory do main-decomposition implemented using MPI parallelization. By default, we assign computation on each domain to a single GPU and a set of CPU cores. This typically means decomposing the system into as many domains as GPUs used, and running as many MPI ranks per node as GPUs in the node. However, this will often require to run a large number of OpenMP threads in a rank (8-16 or even more with a single GPU per node), potentially spanning across multiple NUMA domains. As explained in the previous section, this will lead to suboptimal multi-threaded scaling – especially affecting cache-intensive algorithms outside the CPU-GPU overlap region. To avoid this, multiple MPI ranks can share a GPU, which reduces the number of OpenMP threads per rank. The heterogeneous acceleration in GROMACS delivers 3-4x speedup when comparing CPU only with CPU-GPU runs. Moreover, advanced features like arbitrary simulation box shapes and virtual interaction sites are all supported (Fig. 6). Even though the overhead of managing an accelerator is non-negligible, GROMACS 4.6 shows great strong scaling in GPU accelerated runs reaching 126 atoms/core (1260 atoms/GPU) on common simulation systems (Fig. 7). Based on a similar parallelization design, the upcoming GROMACS version will also support the Intel MIC accelerator architecture. Intel MIC supports native execution of standard MPI codes using the so-called symmetric mode, where the card is essentially treated as a general-purpose multi-core node. However, as MIC is a highly parallel architecture requiring fine-grained parallelism, many parts of typical MPI codes will be inefficient on these processors. Hence, efficient utilization of Xeon Phi devices in molecular dynamics – especially with typical bio-molecular simulations and strong-scaling in mind - is only possible by treating them as accelerators. Similarly to GPUs, this means a parallelization scheme based on offloading only those tasks that are suitable for wide SIMD and highly thread-parallel execution to MIC. 3.3 Ensemble simulations The performance and scaling advances in GROMACS (and many other programs) have made it efficient to run simulations that simply were too large only a few years ago. However, infrastructures such as the European PRACE provide access only to problems that scale to thousands of cores. This used to be an impossible barrier for biomolecular dynamics on anything but ridiculously large systems when an implementation could only run well with hundreds of particles per core. Scaling has improved, but the number of computational units in supercomputers is growing even faster. There are now multiple machines in the world that reach roughly a million cores. Under ideal conditions, GROMACS can scale to levels where each PP rank handles 40 atoms, but there are few if any concrete biological problems that require 40 million atoms without corresponding increases in the number of samples generated. Even in the theoretical case 14 Xeon X5650 Xeon X5650+Tesla C2075 2x Xeon X5650 2x (Xeon X5650+Tesla C2075) 21.2 53.5 cubic box 38.0 84.8 20.5 56.3 cubic box, NPT 35.9 88.6 28.4 77.3 dodec box 49.3 100.7 63.7 169.1 dodec box + vsites 110.0 202.4 20.8 cubic RF 1.1 40.7 38.9 70.0 30.4 55.4 55.6 cubic RF 0.9 91.2 0 50 100 150 200 250 ns/day Figure 6: An important feature of the current heterogeneous GROMACS GPU implementation is that it works, and works efficiently, in combination with most other features of the software. GPU simulations can employ domain decomposition, non-standard boxes, pressure scaling, and virtual interaction sites to significantly improve the absolute simulation performance compared to the baseline. Simulation system: RNAse protein solvated in rectangular (24 K atoms) and rhombic dodecahedron (16.8 k atoms) box, PME electrostatics, cutoff 0.9 nm. Hardware: 2x Intel Xeon E5650 (2.67 GHz Westmere), 2x NVIDIA Tesla C2070 (Fermi) GPU accelerators. Figure 7: Strong scaling of GROMACS 4.6 on the HYDRA heterogeneous GPU-equipped machine in Garching, Germany. Grey lines indicate linear scaling. The hybrid version of GROMACS scales very well and achieves impressive absolute performance for both small and large systems. For the smaller systems, peak performance is achieved with 150 atoms per core, and the larger systems achieve sustained effective flop rate of 0.2 petaflops (only counting the number of useful floating-point operations, not the total). Simulation systems: typical production systems of 81k atoms (circles), 2M atoms (stars), and 12M atoms (triangles) in size. Hardware (per node): 2 10-core Xeon E5-2680v2 (2.8 GHz Ivy Bridge), 2 NVIDIA K20X, InfiniBand FDR14 (4 x 14 Gb/s) network. 15 where we could improve scaling to the point where each core only contains a single atom, the simulation system would still be almost an order of magnitude larger than the example in Fig. 1. To adapt to this reality, researchers are increasingly using large ensembles of simulations, either to simply sample better, or new algorithms such as replica exchange simulation, 24 Markov state models, 22 or milestoning 13 that analyze and exchange data between multiple simulations to improve overall sampling. In many cases, this achieves as much as two-fold superscaling, i.e., an ensemble of 100 simulations running on 10 nodes each might provide the same sampling efficiency as a single simulation running on 2000 cores. To automate this, GROMACS has been co-developed with a new framework for Parallel Adaptive Molecular Dynamics called Copernicus. 19 Given a set of input structures and sampling settings, this framework automatically starts a first batch of sampling runs, makes sure all simulations complete (with extensive support for checkpointing and restarting of failed runs), and automatically performs the adaptive step data analysis to decide what new simulations to start in a second generation. The current ensemble sampling algorithms scale to hundreds or thousands of parallel simulations (each using up to thousands of cores even for small systems). For the first time in many years, molecular dynamics might actually be able to use all the cores available on next-generation supercomputers rather than constantly being a generation or two behind. 3.4 Multi-level load balancing Achieving strong scaling to a higher core count for a fixed-size problem requires careful consideration of load balance. The advantage provided by spatial DD is one of data locality and reuse, but if the distribution of computational work is not homogeneous then more care is needed. A typical membrane protein simulation is dominated by • water, which is usually treated with a rigid 3-point model, • a lipid membrane, whose alkyl tails are modeled by particles with zero partial charge and bonds of constrained length, and • a protein, which is modeled with a backbone of fixed-length bonds that require a lengthy series of constraint calculations, as well as partial charge on all particles. These problems are well known, and are addressed in the GROMACS DD scheme via automatic dynamic load balancing that distributes the spatial volumes unevenly according to the observed imbalance in compute load. This approach has limitations because it works at the level of DD domains that must map to MPI ranks, so cores within the same node or socket have unnecessary 16 copies of the same data. We have not yet succeeded in developing a highly effective intra-rank decomposition of work to multiple cores. We hope to address this via intra-node or intra-socket task parallelism. One advantage of the PME algorithm as implemented in GROMACS is that it is possible to shift the computational workload between the real- and reciprocalspace parts of the algorithm at will. This makes it possible to write code that can run optimally at different settings on different kinds of hardware. The performance of the compute, communication and bookkeeping parts of the overall algorithm vary greatly with the characteristics of the hardware that implements it, and with the properties of the simulation system studied. For example, shifting compute work from reciprocal to real space to make better use of an idle GPU increases the volume that must be communicated during DD, while lowering the required communication volume during the 3D FFTs. Evaluating how best to manage these compromises can only happen at runtime. The MPMD version of PME is intended to reduce the overall communication cost on typical switched networks by minimizing the number of ranks participating in the 3D FFTs. This requires generating a mapping between PME and non-PME ranks and scheduling data transfer to and from them. However, on hardware with relatively efficient implementations of global communication, it can be advantageous to prefer the SPMD implementation because it has more regular communication patterns. 2 The same may be true on architectures with accelerators, because the MPMD implementation makes no use of the accelerators on the PME ranks. The performance of both implementations is limited by lack of overlap of communication and computation. Attempts to use low-latency partitioned global address space (PGAS) methods that require single-program multiple-data (SPMD) approaches are particularly challenged, because the gain from any decrease in communication latency must also overcome the overall increase in communication that accompanies the MPMD-to-SPMD transition. 21 The advent of implementations of non-blocking collective (NBC) MPI routines is promising if computation can be found to overlap with the background communication. The most straightforward approach would be to revert to SPMD and hope that the increase in total communication cost is offset by the gain in available compute time, however, the available performance is still bounded by the overall cost of the global communication. Finding compute to overlap with the NBC on the MPMD PME ranks is likely to deliver better results. Permitting PME ranks to execute kernels for bonded and/or nonbonded interactions from their associated non-PME ranks is the most straightforward way to achieve this overlap. This is particularly true at the scaling limit, where the presence of bonded interactions is one of the primary problems in balancing the compute load between the non-PME ranks. The introduction of automatic ensemble computing introduces another layer of decomposition, by which we essentially achieve MSMPMD parallelism: Multiplesimulation (ensemble), multiple-program (direct/lattice space), and multiple- 17 data (domain decomposition). 3.5 Managing the long-range contributions at exascale A promising candidate for exascale-level biomolecular simulations is the use of suitable implementations of fast-multipole methods such as ExaFMM. 6,27 At least one implementation of FMM-based molecular dynamics running on 100,000 cores has been reported, 5 but so far the throughput on problems of comparable size is only equivalent to the best PME-based implementations. FMM-based algorithms can deliver linear scaling of communication and computation with both the number of MPI ranks and the number of particles. This linear scaling is expected to be an advantage when increasing the number of processing units in the exascale era. Early tests showed that the iteration times of ExaFMM doing only long-range work and GROMACS 4.6 doing only short-range work on homogeneous systems of the same size were comparable, so we hope we can deploy a working version in the future. 3.6 Fine-grained task parallelism for exascale We plan to address some of the exascale-level strong-scaling problems mentioned above through the use of a more fine-grained task parallelism than what is currently possible in GROMACS. Considerable technical challenges remain to convert OpenMP-based data-parallel loop constructs into series of tasks that are coarse enough to avoid spending lots of time scheduling work, and yet fine enough to balance the overall load. Our initial plan is to experiment with the cross-platform Thread Building Blocks (TBB) library, 1 which can coexist with OpenMP and deploy equivalent loop constructs in the early phases of development. Many alternatives exist; those that require the use of custom compilers, runtime environments, or language extensions are unattractive because that increases the number of combinations of algorithm implementations that must be maintained and tested, and compromises the high portability enjoyed by GROMACS. One particular problem that might be alleviated with fine-grained task parallelism is reducing the cost of the communication required during the integration phase. Polymers such as protein backbones are modeled with fixed-length bonds, with at least two bonds per particle, which leads to coupled constraints that domain decomposition spreads over multiple ranks. Iterating to satisfy those constraints can be a costly part of the algorithm at high parallelism. Because the spatial regions that contain bonded interactions are distributed over many ranks, and the constraint computations cannot begin until after all the forces for their atoms have been computed, the current implementation waits for all forces on all ranks to be computed before starting the integration phase. The performance of post-integration constraint-satisfaction phase is bounded by 18 the latency for the multiple communication stages required. This means that ranks that lack atoms with coupled bonded interactions, such as all those with only water molecules,literally have nothing to do at this stage. In an ideal implementation, such ranks could contribute very early in each iteration to complete all the tasks needed for the forces for the atoms involved in coupled bond constraints. Integration for those atoms could take place while forces for interactions between unrelated atoms are being computed, so that there is computation to do on all nodes while the communication for the constraint iteration takes place. This kind of implementation would require considerably more flexibility in the book-keeping and execution model, which is simply not present today. 4 4.1 Handling exascale software challenges: process and infrastructure Transition from C to C++98 The major part of the GROMACS code base has been around 1-1.5 million lines of C code since version 4.0 (http://www.ohloh.net/p/gromacs). Ideally, software engineering on such moderately large multi-purpose code bases would take place within the context of effective abstractions. 26 For example, someone developing a new integration algorithm should not need to pay any attention to whether the parallelization is implemented by constructs from a threading library (like POSIX threads), a compiler-provided threading layer (like OpenMP), an external message-passing library (like MPI), or remote direct memory access (like SHMEM). Equally, she/he should not need to know whether the kernels that compute the forces they are using as inputs are running on any particular kind of accelerator or CPU. Implementing such abstractions generally costs some developer time, and some compute time. These are necessary evils if the software is to be able to change as new hardware, new algorithms or new implementations emerge. Considerable progress has been made in modularizing some aspects of the code base to provide effective abstraction layers. For example, once the main MD iteration loop has begun, the programmer does not need to know whether the MPI layer is provided by an external library because the computation is taking place on multiple nodes, or the internal thread-based implementation is working to parallelize the computation on a single node. Portable abstract atomic operations have been available as a side-effect of the thread-MPI development. Integrators receive vectors of positions, velocities and forces without needing to know the details of the kernels that computed the forces. The dozens of non-bonded kernels can make portable SIMD function calls that compile to the correct hardware operations automatically. However, the size of the top-level function that implements the loop over time 19 steps has remained at about 1800 code and comment lines since 4.0. It remains riddled with special-case conditions, comments, and function calls for different parallelization conditions, integration algorithms, optimization constructs, housekeeping for communication and output, and ensemble algorithms. The function that computes the forces is even worse, now that both the old and new non-bonded kernel infrastructures are supported! The code complexity is necessary for a general-purpose multi-architecture tool like GROMACS. However, needing to be aware of dozens of irrelevant possibilities is a heavy barrier to participation in the project, because it is very difficult to understand all side effects of a change. To address this, we are in the process of a transition from C99 to C++98 for much of this high-level control code. While we remain alert to the possibility that HPC compilers will not be as effective at compiling C++98 as they are for C99, the impact on execution time of most of this code is negligible and the impact on developer time is considerable. Our expectation is that the use of virtual function dispatch will eliminate much of the complexity of understanding conditional code (including switch statements over enumerations that must be updated in widely scattered parts of the code), despite a slightly slower implementation of the actual function call. After all, GROMACS has long used a custom vtable-like implementation for run-time dispatch of the non-bonded interaction kernels. Objects managing resources via RAII exploiting compiler-generated destructor calls for doing the right thing will lead to shorter development times and fewer problems because developers have to manage fewer things. Templated container types will help alleviate the burden of manual memory allocation and deallocation. Existing C++ testing and mocking libraries will simplify the process of developing adequate testing infrastructure, and existing task-parallelism support libraries such as Intel TBB 1 will be beneficial. It is true that some of these objectives could be met by re-writing in more objected-oriented C, but the prospect of off-loading some tedious tasks to the compiler is attractive. 4.2 Best practices in open-source scientific software development Version control is widely considered necessary for successful software development. GROMACS used CVS in its early days and now uses Git (git clone git://git.gromacs.org/gromacs.git). The ability to trace when behavior changed and find some metadata about why it might have changed is supremely valuable. Coordinating the information about desires of users and developers, known problems, and progress with current work is an ongoing task that is difficult with a development team scattered around the world and thousands of users 20 who rarely meet. GROMACS uses the Redmine issue-tracking system3 to discuss feature development, report and discuss bugs, and to monitor intended and actual progress towards milestones. Commits in the git repository are expected to reference Redmine issues where appropriate, which generates automatic HTML cross-references to save people time finding information. Peer review of scientific research is the accepted gold standard of quality because of the need for specialist understanding to fully appreciate, value, criticize and improve the work. Software development on projects like GROMACS is comparably complex, and our experience has been that peer review has worked well there. Specifically, all proposed changes to GROMACS – even from the core authors – must go through our Gerrit code-review website4 , and receive positive reviews from at least two other developers of suitable experience, before they can be merged. User- and developer-level documentation must be part of the same change. Requiring this review to happen before acceptance has eliminated many problems before they could be felt. It also creates social pressure for people to be active in reviewing others’ code, lest they have no karma with which to get their own proposals reviewed. As features are implemented or bugs fixed, corresponding Redmine issues are automatically updated. Gerrit also provides a common venue for developers to share work in progress, either privately or publicly. Testing is one of the least favourite activities of programmers, who would much rather continue being creative in solving new problems. The standard procedure in software engineering is to deploy continuous integration, where each new or proposed change is subjected to a range of automatic tests. In the GROMACS project, we use Jenkins5 to build the project on a wide range of operating systems (MacOS, Windows, flavours of Linux), compilers (GNU, Intel, Microsoft, clang; and several versions of each), and build configurations (MPI, thread-MPI, OpenMP, different kinds of SIMD), and then automatically test the results for correctness. This immediately finds problems such as programmers using POSIX constructs that are not implemented on Windows. Most of our tests detect regressions, where a change in the code leads to an unintended change in behavior. Unfortunately, many of these tests are still structured around executing a whole MD process, which makes it difficult to track down where a problem has occurred, unless the code change is tightly focused. This motivates the discipline of proposing changes that only have one logical effect, and working towards adding module-level testing. New behaviors are expected to be integrated alongside tests of that behavior, so that we continue to build upon the test infrastructure for the future. All tests are required to pass before code changes can be merged. Testing regularly for changes in execution speed is an unsolved problem that 3 http://redmine.gromacs.org 4 http://gerrit.gromacs.org 5 http://jenkins.gromacs.org 21 is particularly important for monitoring our exascale software developments. It is less suited for deployment via continuous integration, because of the quantity of computation required to test the throughput of code like GROMACS with proper load-balancing, at-scale, and on a range of hardware and input conditions. It would be good to be able to execute a weekly end-to-end test run that shows that unplanned performance regressions have not emerged, but we have not prioritized it yet. Waiting to do these tests until after feature stability is achieved in the software-development life cycle is not appropriate, because that requires extra work in identifying the point in time (ie. the git commit) where the problem was introduced, and the same work identifying the correct way to manage the situation. This is much better done while the change is fresh in developers’ minds, so long as the testing procedure is reasonably automatic. Also, in the gap between commit and testing, a regression may be masked by some other improvement. More extensive human-based testing before releases should still be done; but avoiding protracted bug hunts just before releases makes for a much happier team. Cross-platform software requires extensive configuration before it can be built. The system administrator or end user needs to be able to guide what kind of GROMACS build takes place, and the configuration system needs to verify that the compiler and machine can satisfy that request. This requires searching for ways to resolve dependencies, and disclosing to the user what is being done with what is available. It is important that compilation should not fail when configuration succeeded, because the end user is generally incapable of diagnosing what the problem was. A biochemist attempting to install GROMACS on their laptop generally does not know that scrolling back through 100 lines of output from recursive make calls is needed to find the original compilation error, and even then they will generally need to ask someone else what the problem is and how to resolve it. It is far more efficient for both users and developers to detect during configuration that compilation will fail, and to provide suggested solutions and guidance at that time. Accordingly, GROMACS uses the CMake build system (http://www.cmake.org), primarily for its cross-platform support, but makes extensive use of its high-level constructs, including sub-projects and scoped variables. 4.3 Profiling Experience has shown that it is hard to optimize software, especially an HPC code, based on simple measurements of total execution speed. It is often necessary to have a more fine-grained view of the performance of individual parts of the code, details of execution on the individual compute units, as well as communication patterns. There is no value in measuring the improvement in execution time of a non-bonded kernel if the execution time of the FFTs is dominant! Standard practice is to use a profiling/tracing tool to explore which func- 22 tions or code lines consume important quantities of time, and to focus effort on those. However, if the measurement is to provide useful information, the profiler should perturb the execution time by a very small amount. This is particularly challenging with GROMACS because in our case an MD iteration is typically in the range of a millisecond or less wall clock time around the current scaling limit, and the functions that are interesting to profile might execute only for microseconds. Overhead introduced by performance measurement that is acceptable in other kinds of applications often leads to incorrect conclusions for GROMACS. Statistical sampling from periodically interrupting the execution to observe which core is doing which task could work in principle, but (for example) Intel’s VTune 3 Amplifier defaults to a 10 ms interval, which does not create confidence that use of the tool would lead to accurate observations of events whose duration is a thousand times shorter. Reducing the profiling overhead to an acceptable level while still capturing enough information to be able to easily interpret the performance measurements has proved challenging. Additionally, this often required expert knowledge, assistance of the developers of the respective performance measurement tool. This makes it exceptionally hard to use in-depth or large-scale profiling as part of the regular GROMACS development workflow. However, we have not been optimizing in the dark; the main mdrun simulation tool has included a built-in tracing-like functionality for many years. This functionality relies on manual instrumentation of the entire source code-base (through inlined start/stop timing functions) as well as low-overhead timing measurements based on processor cycle counters. The great benefit is that the log output of every GROMACS simulation contains a breakdown of detailed timing measurements of the different code parts. However, this internal tracing functionality does not reach its full potential because the collected data is typically displayed and analyzed through time-averages across MPI ranks and time-steps, often hiding useful details. To realize more of this potential, we have explored the possibility of more detailed MPI rank-based statistics, including minimum and maximum execution times across ranks as well as averages. However, this information is still less detailed than that from a classical trace and profile visualizer. We are exploring combining our internal instrumentation with a tracing library. By adding API calls to various tracing libraries to our instrumentation calls, we can provide native support for detailed trace-generation in GROMACS just by linking against a tracing library like Extrae6 . This will make it considerably easier to carry out performance analysis without the need for expert knowledge on collecting performance data while avoiding influencing the program behavior by overhead. 6 http://www.bsc.es/computer-sciences/extrae 23 5 Future directions GROMACS has grown from an in-house simulation code into a large international software project, which now also has highly professional developer, testing and profiling environments to match it. We believe the code is quite unique in the extent to which it interacts with the underlying hardware, and while there are many significant challenges remaining this provides a very strong base for further extreme-scale computing development. However, scientific software is rapidly becoming very dependent on deep technical computing expertise: Many amazingly smart algorithms are becoming irrelevant since they cannot be implemented efficiently on modern hardware, and the inherent complexity of this hardware makes it very difficult even for highly skilled physicists and chemists to predict what will work. It is similarly not realistic to expect every research group to afford a resident computer expert, which will likely require both research groups and computing centers to increasingly join efforts to create large open source community codes where it is realistic to fund multiple full time developers. In closing, the high performance and extreme-scale computing landscape is currently changing faster than it has ever done before. It is a formidable challenge for software to keep up with this pace, but the potential rewards of exascale computing are equally large. Acknowledgments This work was supported by the European research Council (258980, BH), the Swedish e-Science research center, and the EU FP7 CRESTA project (287703). Computational resources were provided by the Swedish National Infrastructure for computing (grants SNIC 025/12-32 & 2013-26/24) and the Leibniz Supercomputing Center. References [1] Intel Thread Building Blocks, https://www.threadingbuildingblocks. org [2] Abraham, M.J., Gready, J.E.: Optimization of parameters for molecular dynamics simulation using Smooth Particle-Mesh Ewald in GROMACS 4.5. J. Comput. Chem. 32(9), 2031–2040 (JUL 15 2011) [3] Amdahl, G.M.: Validity of the single processor approach to achieving large scale computing capabilities. In: Proceedings of the April 1820, 1967, Spring Joint Computer Conference. pp. 483–485. AFIPS ’67 (Spring), ACM, New York, NY, USA (1967), http://doi.acm.org/10.1145/ 1465482.1465560 24 [4] Anderson, J.A., Lorenz, C.D., Travesset, A.: General purpose molecular dynamics simulations fully implemented on graphics processing units. J. Comput. Phys. 227, 5324–5329 (2008) [5] Andoh, Y., Yoshii, N., Fujimoto, K., Mizutani, K., Kojima, H., Yamada, A., Okazaki, S., Kawaguchi, K., Nagao, H., Iwahashi, K., Mizutani, F., Minami, K., Ichikawa, S.i., Komatsu, H., Ishizuki, S., Takeda, Y., Fukushima, M.: MODYLAS: A Highly Parallelized General-Purpose Molecular Dynamics Simulation Program for Large-Scale Systems with Long-Range Forces Calculated by Fast Multipole Method (FMM) and Highly Scalable Fine-Grained New Parallel Processing Algorithms. Journal of Chemical Theory and Computation 9(7), 3201–3209 (2013), http://pubs.acs.org/doi/abs/10.1021/ ct400203a [6] Arnold, A., Fahrenberger, F., Holm, C., Lenz, O., Bolten, M., Dachsel, H., Halver, R., Kabadshow, I., Gähler, F., Heber, F., Iseringhausen, J., Hofmann, M., Pippig, M., Potts, D., Sutmann, G.: Comparison of scalable fast methods for long-range interactions. Phys. Rev. E 88, 063308 (Dec 2013), http:// link.aps.org/doi/10.1103/PhysRevE.88.063308 [7] Bowers, K.J., Dror, R.O., Shaw, D.E.: Overview of neutral territory methods for the parallel evaluation of pairwise particle interactions. Journal of Physics: Conference Series 16(1), 300 (2005), http://stacks.iop.org/ 1742-6596/16/i=1/a=041 [8] Bowers, K.J., Dror, R.O., Shaw, D.E.: Zonal methods for the parallel execution of range-limited n-body simulations. J. Comput. Phys. 221(1), 303–329 (Jan 2007), http://dx.doi.org/10.1016/j.jcp.2006.06.014 [9] Brown, W.M., Wang, P., Plimpton, S.J., Tharrington, A.N.: Implementing molecular dynamics on hybrid high performance computers - short range forces. Comp. Phys. Comm. 182, 898–911 (2011) [10] Eastman, P., Pande, V.S.: Efficient nonbonded interactions for molecular dynamics on a graphics processing unit. J. Comput. Chem. 31, 1268–72 (2010) [11] Eleftheriou, M., Moreira, J.E., Fitch, B.G., Germain, R.S.: A volumetric FFT for BlueGene/L. In: Pinkston, T.M., Prasanna, V.K. (eds.) High Performance Computing - HiPC 2003, Lecture Notes in Computer Science, vol. 2913, pp. 194–203. Springer Berlin Heidelberg (2003) [12] Essmann, U., Perera, L., Berkowitz, M.L., Darden, T., Lee, H., Pedersen, L.G.: A smooth particle mesh Ewald method. J. Chem. Phys. 103(19), 8577– 8593 (1995) 25 [13] Faradjian, A., Elber, R.: Computing time scales from reaction coordinates by milestoning. J. Chem. Phys. 120, 10880–10889 (2004) [14] Hess, B., Kutzner, C., van der Spoel, D., Lindahl, E.: GROMACS 4: Algorithms for highly efficient, load-balanced, and scalable molecular simulation. J. Chem. Theory Comput. 4(3), 435–447 (2008) [15] Humphrey, W., Dalke, A., Schulten, K.: VMD: Visual molecular dynamics. J. Mol. Graph. 14(1), 33–38 (1996) [16] Jagode, H.: Fourier transforms for the BlueGene/L communication network. Ph.D. thesis, The University of Edinburgh, Edinburgh, UK (2005) [17] Páll, S., Hess, B.: A flexible algorithm for calculating pair interactions on SIMD architectures. Computer Physics Communications 184(12), 2641 – 2650 (2013), http://www.sciencedirect.com/science/article/ pii/S0010465513001975 [18] Phillips, J.C., Braun, R., Wang, W., Gumbart, J., Tajkhorshid, E., Villa, E., Chipot, C., Skeel, R.D., Kale, L., , Schulten, K.: Scalable molecular dynamics with NAMD 26, 1781–1802 (2005) [19] Pronk, S., Larsson, P., Pouya, I., Bowman, G.R., Haque, I.S., Beauchamp, K., Hess, B., Pande, V.S., Kasson, P.M., Lindahl, E.: Copernicus: A new paradigm for parallel adaptive molecular dynamics. In: Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis. pp. 60:1–60:10. SC ’11, ACM, New York, NY, USA (2011), http://doi.acm.org/10.1145/2063384.2063465 [20] Pronk, S., Páll, S., Schulz, R., Larsson, P., Bjelkmar, P., Apostolov, R., Shirts, M.R., Smith, J.C., Kasson, P.M., van der Spoel, D., Hess, B., Lindahl, E.: GROMACS 4.5: a high-throughput and highly parallel open source molecular simulation toolkit. Bioinformatics 29(7), 845–854 (2013), http: //bioinformatics.oxfordjournals.org/content/29/7/845.abstract [21] Reyes, R., Turner, A., Hess, B.: Introducing SHMEM into the GROMACS molecular dynamics application: experience and results. In: M Weiland, A.J., Johnson, N. (eds.) Proceedings of the 7th International Conference on PGAS Programming Models. The University of Edinburgh (October 2013), http://www.pgas2013.org.uk/sites/default/ files/pgas2013proceedings.pdf [22] Schütte, C., Winkelmann, S., Hartmann, C.: Optimal control of molecular dynamics using Markov state models. Math. Program. (Series B) 134, 259– 282 (2012) 26 [23] Shirts, M., Pande, V.S.: Screen savers of the world unite! Science 290(5498), 1903–1904 (2000), http://www.sciencemag.org/content/290/5498/1903. short [24] Sugita, Y., Okamoto, Y.: Replica-exchange molecular dynamics method for protein folding. Chem. Phys. Lett. 314, 141–151 (1999) [25] Verlet, L.: Computer ”Experiments” on Classical Fluids. I. Thermodynamical Properties of Lennard-Jones Molecules. Phys. Rev. 159, 98–103 (Jul 1967), http://link.aps.org/doi/10.1103/PhysRev.159.98 [26] Wilson, G., Aruliah, D.A., Brown, C.T., Chue Hong, N.P., Davis, M., Guy, R.T., Haddock, S.H.D., Huff, K.D., Mitchell, I.M., Plumbley, M.D., Waugh, B., White, E.P., Wilson, P.: Best Practices for Scientific Computing. PLoS Biol 12(1), e1001745 (01 2014), http://dx.doi.org/10.1371/ journal.pbio.1001745 [27] Yokota, R., Barba, L.A.: A tuned and scalable fast multipole method as a preeminent algorithm for exascale systems. International Journal of High Performance Computing Applications 26(4), 337–346 (2012), http://hpc. sagepub.com/content/26/4/337.abstract 27
5cs.CE
Feeding Hand-Crafted Features for Enhancing the Performance of Convolutional Neural Networks arXiv:1801.07848v1 [cs.CV] 24 Jan 2018 Sepidehsadat Hosseini Seoul National University [email protected] Seok Hee Lee Seoul Nat’l Univ. [email protected] Abstract Nam Ik Cho Seoul National University [email protected] and extract the features from the training data without human intervention. In this paper, we show that feeding some effective hand-crafted features to the CNN, along with the input images, can enhance the performance of CNN at least in the case of some face related tasks that we focus on. In other words, enforcing the CNN to use the domain knowledge can increase the performance or can save the computations by reducing the depth. To be specific with the age/gender estimation problem, since the most important features are the angle and depth of the wrinkles in our faces, we believe that the bio-inspired multi-scale Gabor filter responses [7] are the right features for this problem. Hence, we propose a method to get the benefits of BIF, together with the features that are learned by the CNN with the input images. Precisely, we extract several Gabor filter responses and concatenate them with the input image, which forms a tensor input like a multi-channel image. The tensor input can be directly fed to the CNN, like we feed the multichannel image to the CNN. In addition to this scheme, we let the first layer of the CNN to be a 1 × 1 convolution such that a matrix is obtained at the first layer, which is actually a weighted sum of the input image and Gabor responses. This can also be considered a fusion of input image and filter bank responses, which looks like an image with enhanced trextures, and the fused image is fed to the CNN. Since the convolutional neural network (CNN) is believed to find right features for a given problem, the study of hand-crafted features is somewhat neglected these days. In this paper, we show that finding an appropriate feature for the given problem may be still important as they can enhance the performance of CNN-based algorithms. Specifically, we show that feeding an appropriate feature to the CNN enhances its performance in some face related works such as age/gender estimation, face detection and emotion recognition. We use Gabor filter bank responses for these tasks, feeding them to the CNN along with the input image. The stack of image and Gabor responses can be fed to the CNN as a tensor input, or as a fused image which is a weighted sum of image and Gabor responses. The Gabor filter parameters can also be tuned depending on the given problem, for increasing the performance. From the extensive experiments, it is shown that the proposed methods provide better performance than the conventional CNN-based methods that use only the input images. 1. Introduction The CNNs are gaining more and more attention as they are successfully applied to many image processing and computer vision tasks, providing better performance than the non-CNN approaches. Face related tasks are not the exceptions, for example, the CNNs in [18, 33, 38] provide better face detection performance than the conventional methods such as Haar-like feature based face detector [30], local binary pattern (LBP) based method [1] and deformable part model based ones [?, 25]. In the case of age/gender classification, the CNN estimators [16, 32] give more accurate results than the method based on the bio-inspired features (BIF) [7], which is one of the best methods among the nonCNN approaches. Most of CNNs from low to high-level vision problems use the image (not the features) as the input, and they learn Analysis of feature maps from some of convolution layers shows that the wrinkle features and face shapes are more enhanced in our CNN than the conventional one that uses only the pixel values as the input. As a result, the accuracy of age/gender estimation is much improved compared to the state-of-the-art image-domain CNNs [16, 32]. Moreover, we test our approach on face detection and emotion recognition and also obtain some gains over the existing CNN based methods [18, 33, 38]. In other tasks where some of the hand-crafted features are apparently effective, we hope that feeding such features along with the image may bring better results. 1 2. Related work the influence of race and gender by proposing a multi-task network. Gaobr filters. Nobel prize winners Hubel and Wiesel discovered that there are simple cells in the primary visual cortex, where its receptive field is divided into subregions that are layers covering the whole field [11]. Also in [21], Petkov proposed the Gabor filter, as a suitable approximation of mammal’s visual cortex receptive field. The 2D Gabor filter is a Gaussian kernel function adjusted by a sinusoidal wave, consisting of both imaginary and real parts where the real part can be described as:     0 x0 x + γy 02 cos 2π + φ gλ,θ,σ,γ (x, y) = exp − 2σ 2 λ (1) where x0 = x cos θ + y sin θ, y 0 = −x sin θ + y cos θ, and λ, θ, φ , γ and σ are the wavelength of the real part of Gabor filter kernel, the orientation of the normal to the stripes of function, phase offset, spatial ratio and standard deviation of the Gaussian envelope representatives respectively. Fig. 1 is an example of Gabor filter response to a face image, which shows that they find the textures that correspond to the given θ very well. Hence the Gabor filter responses have been used in the applications where the (orientational) textures play an important role such as fingerprint recognition [6], face detection [10], facial expression recognition [14], age/gender estimation [7], text segmentation [26], super resolution [24], and texture description. Face detection. There are a large number of face detection methods, as it is also a very important topic. For details, refer to a complete survey on face detection done by Zafeiriou et al.[37]. Like other computer vision problems, the CNNs are now effectively used for face detection [33, 34, ?]. Facial Expression Recognition Emotion classification is a relatively young and complicated task among many facerelated tasks. Since the facial expression recognition (FER) plays an important role in human-machine interaction, recently more researches are being performed on this subject. For some examples of conventional methods, Tang used support vector machine (SVM) for this problem [29]. Ionwscu et al. also used SVM to improve Bag of Visual words (BOW) approach [12]. Hassani et al. used the advantage of facial landmarks along with CNNs [8]. More recent studies are focused on using the CNNs for the FER [36, 17, 22]. 3. Preparation of Input We attempt our approach to several face related works such as age/gender estimation, face detection, and emotion recognition. Each of them needs different CNN architecture, but they are all fed with the Gabor filter responses as the input along with the image. As can be seen from the eq. (1), there are several parameters which induce different filter responses. In all the applications, we prepare eight filter banks by combining the cases of four θ = 0, π/4, π/2, 3π/4 and two φ = 0, π/2. The rest of parameters σ, λ and γ are changed depending on the application. For the age and gender estimation problem, we set σ = 2, λ = 2.5, and γ = 0.3. Let Nf (=8 in all the experiments in this paper as stated above) be the number of Gabor filters, and let Fgk be the response of k-th Gabor filter. Normally, we may just concatenate the input image and Nf responses as W ×H ×(Nf +1) tensor input to a CNN as illustrated in Fig. 2(a). On the other hand, we may consider fusing the input and Gabor responses as a single input and feed the matrix to the CNN as shown in Fig. 2(b). The figure also shows that fusing the input image and Gabor responses can be interpreted as convolving the W × H × (Nf + 1) tensor input with 1 × 1 × (Nf + 1) filter. If we denote the coefficients of this filter as [wi , w1 , w2 , · · · , wNf ], where wi is multiplied to the input image and the rest are multiplied to Gabor responses, then the fused input is represented as Figure 1: Demonstration of Gabor filter bank responses with kernel size = 5 applied to an image. Responses for four orientations (θ = 0, π/4, π/2, 3π/4) are shown. Age/Gender Estimation. Predicting the age of a person from a single image is one of the hardest tasks, which even humans sometimes have difficulties in doing that. The reason is that aging depends on several factors such as living habits, races, genetics, etc. The studies without using the CNN are well summarized in Fu et al.’s survey [?]. Recent works are mostly based on the CNN, for some examples, Levi and Hassner’s work [16] was the first to adopt the CNN for age/gender estimation, and Xing et al. [32] considered F in = wi I + Nf X wk Fgk (2) k=1 which is similar to the weighted fusion method in [28],[32]. Fig. 2(c) is an example of fused input, which can be con2 sidered a “wrinkle-enhanced” image. Both of concatenation and fusion approaches inject the Gabor responses as the input to the CNN. From the extensive experiments, the fusion approach in Fig. 2(b) shows slightly better performance (about 1%p increase in the case of gender estimation and similarly to other tasks) while requiring slightly less number of parameters. as stated previously, and the GF CNN outperforms the existing methods by at least 3.1 %p on Aidence dataset and 1.3%p on Gallagher dataset. For gender estimation, our method outperforms all the other ones on Adience as shown in Table 2. The Table also shows that the proposed network shows almost the same performance as VGG hybrid on Webface dataset, while it has ten times less number of parameters than the VGG. For the analysis of the effects of feeding the Gabor responses, we compare some feature maps in Fig. 3. Specifically, Fig. 3(a) shows the feature maps from our GF CNN and Fig. 3(b) from the CNN with only image input at the same layer. It can be seen that the features from the GF CNN contain more strong facial features and wrinkle textures than the original network, which is believed to be the cause of better performance. 4. Networks for face related problems We apply the Gabor responses to the CNNs for the age/gender estimation, face detection, and emotion recognition problems in the following subsections. At each subsection, we show that the performance is improved by feeding the Gabor responses as compared to the case of feeding only the image input. 4.1. Age/Gender classification A Table 1: Age estimation (classification) results on Adience & Gallagher datasets. Network The gender estimation is just a binary classification, while the age estimation is implemented as a classification or regression problem. In the case of age estimation as a classification problem (segmenting the age into several ranges), the network shown in Fig. 2(a) or (b) is used. Each convolution block consists of convolution layer, Relu, and Max pooling, and each fully connected block consists of fully connected layer, Relu and drop-out with the drop ratio 0.5. B Method LBP [31] LBP+FPLBP+Droupout 0.8 [31] Eidinger [3] Best from Levi [16] Resnet[9] PTP [13] DAPP [13] GT CNN[Ours] GF CNN[Ours] Gallagher 58.0 66.6 N.A. N.A. 68.1 68.6 69.91 69.1 71.4 Dataset description We perform age classification on two popular datasets, Adience [3] and Gallagher dataset [4]. Both are from flickr.com, including the pictures with large variations in poses, appearances, lighting condition, unusual facial expressions, etc. Adience has approximatively 26K images of 2k subjects in 8 classes (0-2, 4-6, 8-13, 15-20, 25-32, 3842, 48-53, 60+), Gallagher dataset has 5K images with 28K labeled faces, being divided into 7 classes (0-2, 3-7,8-12, 13-19, 20-36, 37-65, 66+). For gender estimation, we used Adience and CASIA Webface [35]. It has 450K images of 10K subjects, which is obtained from the pictures on IMDB and most of the pictures in the dataset are celebrities. C Adience 41.1 45.1 45.1 50.7 52.2 53.27 54.9 57.2 59.3 Table 2: Gender estimation results on Adience & Webface datasets. Method BIF [7] Eidinger [3] Best from Levi [16] Resnet[9] GG N etVHybrid [32] GT CNN[Ours] GF CNN[Ours] Adience N.A 77.8 86.8 88.5 N.A 89.2 90.1 Webface 79.3 N.A. N.A. 89.2 92.3 91.0 92.1 Test and result We perform the experiments based on the standard fivefold, subject-exclusive cross-validation protocol for fair comparison. Table 1 shows the results for age estimation, where GT CNN means our method that use Gabor responses as tensor input and GF CNN as fused input. It can be observed that GF CNN is slightly better than GT CNN 4.2. Age regression A Network Age estimation can also be implemented as a regression problem when we wish to tell a person’s exact age, rather 3 Figure 2: Illustration of two input feeding methods. (a) The tensor input is directly fed to the CNN, (b) The tensor input is fused to be an image and fed to the CNN. (c) Example of a fused image which is the weighted sum of image and Gabor responses. defined as (a) L(x) = − M 1 X |yˆi − yi | M i=1 (4) where M is the maximum age that we set, and yˆi is the estimate of true age yi . (b) Figure 3: Comparison of feature maps after the first convolution layer in two networks. Features from (a) GF CNN and (b) original CNN with image input. Figure 4: Age regression network architecture. than as a classification problem which tells the range (class) of ages. We use the network shown in Fig. 4 for this problem. One of the main differences between the age classification and regression problem is that they need different loss functions. For the classification problem above, we use the Softmax loss defined as: L(x) = − N 1 X Yiyi log piyi N i=1 B Dataset description For age regression task, we perform the experiments on two widely used datasets for age estimation in literature. We choose CASIA-Webface dataset [35] as it consists of a large amount of pictures, and also we used FG-Net database which contains 1002 images of 82 subjects, where subjects’ ages range from 0 to 69. (3) where N is the number of classes, Yiyi is the one-hot encoding of sample’s age label, and piyi is the yi -th element of predicted probability vector for xi . For the regression, we use Mean Squared Error (MSE) or Mean Absolute Error (MAE) as the loss function. To be precise, the MAE is C Test and result We used four-fold cross-validation protocol for Webface dataset and the Leave-One-Person-Out (LOPO) test strategy while working on FG-Net because the number of pictures in 4 FG-Net is small. Table 3 shows the result of age estimation. It can be seen that our network shows better performance than the state of the art method. Table 3: Age estimation error on Adience and Gallagher datasets. GF CNNresent means that we use residual learning. Method BIF[7] RF[19] EBIF[2] GG N etVHybrid GF CNN[ours] GT CNNresent [ours] GF CNNresent [ours] Casia Webface Dataset 10.65 9.38 N.A. 5.75 5.83 5.66 5.61 FG-net 4.77 4.21 3.17 N.A. 3.13 3.15 3.08 Figure 5: Illustration of three stages of face detection network architecture (GP-Net, GR-Net ,GO-Net). C For the bounding box regression and face classification, we use the same loss as [38]. Specifically, we use crossentropy loss: 4.3. Face detection A Network det det Ldet i (xi ) = −(yi log(pi ) + (1 − yi )(1 − log(pi ))) (5) Our face detector is a three-stage cascaded CNN which is the same as Zhang et al.’s network [38], except that we use the fusion of input and Gabor responses as shown in Fig. 5. At stage 1, which is called P-Net, possible facial windows along with their bonding box regression vectors are obtained. Then the bounding boxes are calibrated, and the highly overlapped ones are merged to others using non-maximum suppression (NMS). In the second and third stages (called R-Net and O-Net respectively) the candidates are refined again using the calibration and NMS. For all these three step networks we feed our Gabor fusion image. About the Gabor filter parameters, it is noted that finding the facial components such as nose, mouse, eyes, etc. are more important than the relatively straight and sometimes long wrinkles that were important in the previous age/gender estimation. Hence we reduce the kernel size of Gabor filter and also the parameters σ, λ and γ to 0.75, 2, and 0.05 respectively. B Test and result where pi is the probability of xi being a face and yidet is the ground truth. For the bonding box we use: LB.Box (xi ) = ||ŷiB.box − yiB.box ||22 i (6) where ŷiB.box andyiB.box are the network output and ground truth respectively. Table 4 shows that we can get better performance with almost same number parameters as MTCNN. Figs. 6(a)-(c) show in all three stages using hand crafted features can improve the performance and help increase the network convergence speed. To evaluate our face detection method we compare our method with other six sate- of-the-art methods on FDDB and our method outperform all of them as shown in Fig. 6(d). At last, we compare our method’s run time with other CNN based methods and results are in 5 as it can be seen while purposed method has better performance than MTCNN and cascade CNN it is almost as fast as them. 4.4. Facial expression recognition Dataset description A In this section, we evaluate our network on Face Detection Dataset and Benchmark (FDDB) [15] which contains 2,845 images with 5K annotated faces taken in the wild. There are two types of evaluation available on FDDB: discontinuous score which counts the number of detected faces versus the number of false positives, and continuous score which evaluates how much is the overlap of bounding boxes on the faces between the ground truth and detected. Network The baseline network for FER is VGG-19 [27], and we just add one more drop out after the last fully connected layer to decrease the overlapping, as shown in Fig. 7. For the FER, we think that the wrinkles again play an important role here, and hence that we set the bandwith larger than the previous case, specifically set σ = 1.4. Also, λ becomes large to 2.5, and set γ = 0.1. 5 (a) (b) (c) (d) Figure 6: (a)-(c) Comparision between the three stages of MTCNN [38] (in orange) and our method (in Green). (d) Comparison of our performance with MTCNN [38], DP2MDF[25], cascade CNN [18], Faceness[33], Joint fasterRCNN [23] and head hunter [20], where the numbers in the parentheses are the area under curve. Table 4: Comparison of Validation Accuracy of Ours, CascadeCNN and MTCNN. Group Group1 Group2 Group3 CNN 12-Net[18] P-Net[38] GP-Net[ours]. 24-Net[18] R-Net[38] GR-Net[ours] 48-Net[18] O-Net[38] GO-Net[ours] Table 5: Runtime Comparison on the same GPU. Method Faceness [33] MTCNN [38] Cascade CNN [18] GF-MTCNN[Ours] Validation Accuracy 94.4% 94.6% 94.83% 95.1% 95.4% 95.61% 93.2% 95.4% 95.72% B Speed 20 FPS 99 FPS 100 FPS 99 FPS Dataset description We evaluate our network on FER 2013 dataset [5], which is being labeled in seven classes(0=Angry, 1=Disgust, 2=Fear, 3=Happy, 4=Sad, 5=Surprise, and 6=Neutral). It contains about 32K images, 28.5K for training and 3.5K for the test. C Test and result Table 6 shows our result, where we compare our results with the FER 2013 competition winners and other state of the art methods. It can be seen that our network shows better performance than others. While VGGNet can also reach to Figure 7: Illustration GF-VGG network for the FER. 6 69.8 %, adding our fusion module at the input of the network can increase the performance by 2.098%p. Table 6: Results of FER. Method Radu + Marius + Cristi [12] Unsupervised[5] Maxim Milakov [5] SVM [29] VGGNet [27] GF-VGGNet[Ours] Accuracy on FER 2013 67.484% 69.267% 68.821% 71.162% 69.08% 72.198% [6] [7] 5. Conclusion [8] Most of CNNs for image understanding use the image as the input, with the belief that the CNN will automatically find the appropriate features from the data. In this paper, we have shown that feeding appropriate hand-crafted features can lead to the improved results. Hence the domain knowledge and study of appropriate features are important for improving the CNN-based algorithms. Specifically, we have shown that feeding the Gabor filter response to the CNN leads to better performances in face related problems such as age/gender estimation, face detection, and emotion recognition. We hope there can be more applications that can be benefited by our approach, i.e., there can be more CNN-based image processing and vision algorithms that can have gains by taking the appropriate features as the input. [9] [10] [11] [12] [13] References [1] O. Bilaniuk, E. Fazl-Ersi, R. Laganire, C. Xu, D. Laroche, and C. Moulder. Fast lbp face detection on low-power simd architectures. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, pages 616–622, 2014. [2] M. E. Deeb and M. El-Saban. Human age estimation using enhanced bio-inspired features (ebif). In ICIP, 2010. [3] E. Eidinger, R. Enbar, and T. Hassner. Age and gender estimation of unfiltered faces. IEEE Transactions on Information Forensics and Security, 9(12):2170– 2179, 2014. [4] A. C. Gallagher and T. Chen. Understanding images of groups of people. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages 256–263. IEEE, 2009. [5] I. Goodfellow, D. Erhan, P.-L. Carrier, A. Courville, M. Mirza, B. Hamner, W. Cukierski, Y. Tang, [14] [15] [16] [17] 7 D. Thaler, D.-H. Lee, Y. Zhou, C. Ramaiah, F. Feng, R. Li, X. Wang, D. Athanasakis, J. Shawe-Taylor, M. Milakov, J. Park, R. Ionescu, M. Popescu, C. Grozea, J. Bergstra, J. Xie, L. Romaszko, B. Xu, Z. Chuang, and Y. Bengio. Challenges in representation learning: A report on three machine learning contests, 2013. C. Gottschlich. Curved-region-based ridge frequency estimation and curved gabor filters for fingerprint image enhancement. IEEE Transactions on Image Processing, 21(4):2220–2227, 2011. G. Guo, G. Mu, Y. Fu, and T. S. Huang. Human age estimation using bio-inspired features. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 2009. B. Hassani and M. H. Mahoor. Facial expression recognition using enhanced deep 3d convolutional neural networks. CoRR, abs/1705.07871, 2017. K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. arXiv preprint arXiv:1512.03385, 2015. L.-L. Huang, A. Shimizu, and H. Kobatake. Robust face detection using gabor filter features. Pattern Recognition Letters, 26(11):1641–1649, 2005. D. H. Hubel and T. Wiese. Receptive fields, binocular interaction and functional architecture in the cat’s visual cortex. Journal of Physiology, 160(1):106,154, 1962. R. T. Ionescu and C. Grozea. Local learning to improve bag of visual words model for facial expression recognition. 2013. M. T. B. Iqbal, M. Shoyaib, B. Ryu, M. Abdullah-AlWadud, and O. Chae. Directional age-primitive pattern (dapp) for human age group recognition and age estimation. IEEE Transactions on Information Forensics and Security, 12:2505–2517, 2017. M. J. Lyons, S. Akamatsu, M. G. Kamachi, and J. Gyoba. Coding facial expressions with gabor wavelets. In Automatic Face and Gesture Recognition, 1998. Proceedings. Third IEEE International Conference on. IEEE, 1998. V. Jain and E. Learned-Miller. Fddb: A benchmark for face detection in unconstrained settings. Technical Report UM-CS-2010-009, University of Massachusetts, Amherst, 2010. G. Levi and T. Hassner. Age and gender classification using convolutional neural network. In Computer Vision and Pattern Recognition Workshops (CVPRW), 2015 IEEE Conference on, pages 34–42. IEEE, 2015. G. Levi and T. Hassner. Emotion recognition in the wild via convolutional neural networks and mapped binary patterns. In Proc. ACM International Conference on Multimodal Interaction (ICMI), November 2015. [30] P. Viola and M. J. Jones. Robust real-time face detection. International journal of computer vision, 57(2):137–154, 2004. [18] H. Li, Z. Lin, X. Shen, J. Brandt, and G. Hua. A convolutional neural network cascade for face detection. In Computer Vision and Pattern Recognition (CVPR), 2015 IEEE Conference on, pages 5325–5334, 2015. [31] T. Wu and R. Chellappa. Age invariant face verification with relative craniofacial growth model. In European Conference on Computer Vision ECCV 2012: Computer Vision, ECCV 2012, volume 7577, pages 58–71, 2012. [19] S. Li, S. Shan, and X. Chen. Relative Forest for Attribute Prediction, pages 316–327. Springer Berlin Heidelberg, Berlin, Heidelberg, 2013. [32] J. Xing, K. Li, W. Hu, C. Yuan, and H. Ling. Diagnosing deep learning models for high accuracy age estimation from a single image. Pattern Recognit, 66:106–116, 2017. [20] M. Mathias, R. Benenson, M. Pedersoli, and L. Van Gool. Face detection without bells and whistles. In ECCV, 2014. [33] S. Yang, P. Luo, and X. Change Loy, Chenand Tang. From facial parts responses to face detection: A deep learning approach. In IEEE International Conference on Computer Vision, pages 3676–3684. IEEE, 2015. [21] N. Petkov. Biologically motivated computationally intensive approaches to image pattern recognition. Future Generation Computer Systems, 11(4–5):451,465, 1995. [34] S. Yang, P. Luo, and X. Change Loy, Chenand Tang. Wider face: A face detection benchmark. In Computer Vision and Pattern Recognition (CVPR), 2016 IEEE Conference on. IEEE, 2016. [22] C. Pramerdorfer and M. Kampel. Facial expression recognition using convolutional neural networks: State of the art. CoRR, abs/1612.02903, 2016. [35] D. Yi, Z. Lei, S. Liao, and S. Z. Li. Learning face representation from scratch. CoRR, abs/1411.7923, 2014. [23] H. Qin, J. Yan, X. Li, and X. Hu. Joint training of cascaded cnn for face detection. In Computer Vision and Pattern Recognition (CVPR), 2016 IEEE Conference on, 2016. [36] Z. Yu and C. Zhang. Image based static facial expression recognition with multiple deep network learning. November 2015. [24] S. Ram Dogiwal, Y. Shishodia, and A. Upadhyaya. Super resolution image reconstruction using wavelet lifting schemes and gabor filters. In Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference. IEEE, 2014. [37] S. Zafeiriou, C. Zhang, and Z. Zhang. A survey on face detection in the wild: Past, present and future. Computer Vision and Image Understandings, 138:1– 24, 2015. [38] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao. Joint face detection and alignment using multi-task cascaded convolutional networks. IEEE Signal Processing Letters, 23(10):1499–1503, 2016. [25] R. Ranjan and R. Patel, Vishal M.and Chellappa. A deep pyramid deformable part model for face detection. In Biometrics Theory, Applications and Systems (BTAS), 2015 IEEE 7th Int. Conf, pages 1–8, 2015. [26] S. Sabari Raju, P. Basa Pati, and A. Ramakrishnan. Gabor filter based block energy analysis for text extraction from digital document images. In Document Image Analysis for Libraries, 2004. Proceedings. First International Workshop on. IEEE, 2004. [27] K. Simonyan and A. Zisserman. Very deep convolutional networks for large-scale image recognition. CoRR, abs/1409.1556, 2014. [28] C. Szegedy, V. Vanhoucke, S. Ioffe, J. Shlens, and Z. Wojna. Rethinking the inception architecture for computer vision. In The IEEE Conference on Computer Vision and Pattern Recognition (CVPR), June 2016. [29] Y. Tang. Deep learning using support vector machines. CoRR, abs/1306.0239, 2013. 8
1cs.CV
arXiv:1508.01290v1 [math.AC] 6 Aug 2015 TORIC RINGS, INSEPARABILITY AND RIGIDITY MINA BIGDELI, JÜRGEN HERZOG AND DANCHENG LU Abstract. Let K be a field, H an affine semigroup and R = K[H] its toric ring over K. In this paper we give an explicit description of the ZH-graded components of the cotangent module T 1 (R) which classifies the infinitesimal deformations of R. In particular, we are interested in unobstructed deformations which preserve the toric structure. Such deformations we call separations. Toric rings which do not admit any separation are called inseparable. We apply the theory to the edge ring of a finite graph. The coordinate ring of a convex polyomino may be viewed as the edge ring of a special class of bipartite graphs. It is shown that the coordinate ring of any convex polyomino is inseparable. We call a bipartite graph G semi-rigid if T 1 (R)a = 0 for all a with −a ∈ H. Here R is the edge ring of G. A combinatorial description of semi-rigid graphs is given. The results are applied to show that for n = 3, Gn is semi-rigid but not rigid, while Gn is rigid for all n ≥ 4. Here Gn is the complete bipartite graph Kn,n with one edge removed. Introduction In this paper we study infinitesimal deformations and unobstructed deformations of toric rings which preserve the toric structure, and apply this theory to edge ideals of bipartite graphs. Already in [1] and [2], infinitesimal and homogeneous deformations of toric varieties have been considered from a geometric point of view. The view point of this paper is more algebraic and does not exclude non-normal toric rings, having in mind toric rings which naturally appear in combinatorial contexts. This aspect of deformation theory has also been pursued in the papers [4],[5] and [3] where deformations of Stanley-Reisner rings attached to simplicial complexes were studied. Let K be a field. The infinitesimal deformations of a finitely generated K-algebra R are parameterized by the elements of the cotangent module T 1 (R) which in the case that R is a domain is isomorphic to Ext1R (ΩR/K , R), where ΩR/K denotes the module of differentials of R over K. The ring R is called rigid if T 1 (R) = 0. We refer the reader to [12] for the theory of deformation. Let H be an affine semigroup and K[H] its affine semigroup ring. We are interested in the module T 1 (K[H]). This module is naturally ZH-graded. Here ZH denotes the associated group of H which for an affine semigroup is a free group of 2010 Mathematics Subject Classification. Primary 13D10, 05E40; Secondary 13C13. Key words and phrases. Deformation, Toric ring, Rigid, Inseparable, Bipartite graph, Convex Polyomino. The paper was written while the third author was visiting the Department of Mathematics of University Duisburg-Essen. He wants to express his thanks for the hospitality. 1 finite rank. For each a ∈ ZH, the a-graded component T 1 (K[H])a of T 1 (K[H]) is a finite dimensional K-vector space. In Section 1 we describe the vector space T 1 (K[H])a and provide a method how to compute its dimension. Let H ⊂ Zm with generators h1 , . . . , hn . Then the associated group ZH of H is a subgroup of Zm , and K[H] is the K-subalgebra of the ±1 h1 hn ring K[t±1 1 , . . . , tm ] of Laurent polynomials generated by the monomials t , . . . , t . a(1) a(m) Here ta = t1 · · · tm for a = (a(1), . . . , a(m)) ∈ Zm . Let S = K[x1 , . . . , xn ] be the polynomial ring over K in the indeterminates x1 , . . . , xn . Then S may be viewed as a ZH-graded ring with deg xi = hi , and the K-algebra homomorphism S → K[H] with xi 7→ thi is a homomorphism of ZH-graded K-algebras. We denote by IH the kernel of this homomorphism. The ideal IH is called the toric ideal associated with H. It is generated by homogeneous binomials. To describe these binomials, consider the group homomorphism Zn → Zm with εi 7→ hi , where ε1 , . . . , εn is the canonical basis of Zn . The kernel L of this group homomorphism is a lattice of Zn and is called the relation lattice of H. For v = (v(1), . . . , v(n)) ∈ Zn we define the Q Q v(i) −v(i) binomial fv = fv+ − fv− with fv+ = i, v(i)≥0 xi and fv− = i, v(i)≤0 xi , and let IL be the ideal generated by the binomials fv with v ∈ L. P It is well known that IH = IL . Each fv ∈ IH is homogeneous of degree h(v) = i, v(i)≥0 v(i)hi . Let fv1 , . . . , fvs be a system of generators of IH . We consider the (s × n)-matrix   v1 (1) v1 (2) . . . v1 (n)  v2 (1) v2 (2) . . . v2 (n)  AH =  . .. ..   ... . .  vs (1) vs (2) . . . vs (n) Summarizing the results of Section 1, dimK T 1 (K[H])a can be computed as follows: let l = rank AH , la be the rank of the submatrix of AH whose rows are the ith rows of AH for which a + h(vi ) 6∈ H, and let da be the rank of the submatrix of AH whose columns are the jth columns of AH for which a + hj ∈ H. Then dimK T 1 (K[H])a = l − la − da . In Section 2 we introduce the concept of separation for a torsionfree lattice L ⊂ Zn . Note that a lattice L ⊂ Zn is torsionfree if and only if it is the relation lattice of some affine semigroup. Given an integer i ∈ [n] = {1, 2, . . . , n}, we say that L admits an i-separation if there exists a torsionfree lattice L′ ⊂ Zn+1 of the same rank as L such that πi (IL′ ) = IL , where πi : S[xn+1 ] → S is the K-algebra homomorphism which identifies xn+1 with xi . An additional condition makes sure that this deformation which induces an element in T 1 (K(H))−hi is non-trivial, see 2.1 for the precise definition. We say that L is inseparable, if for all i, the lattice L admits no i-separation, and we call H and its toric ring inseparable if its relation lattice is inseparable. In particular, if the generators of H belong to a hyperplane of Zm , so that K[H] also admits a natural standard grading, then H is inseparable if T 1 (K[H])−1 = 0. In general, the converse is not true since the infinitesimal deformation given by nonzero element of T 1 (K[H])−1 may be obstructed. We demonstrate this theory and 2 show that a numerical semigroup generated by three elements which is not a complete intersection is i-separable for i = 1, 2, 3, while if it is a complete intersection it is i-separable for at least two i ∈ {1, 2, 3}. For the proof of this fact we use the structure theorem of such semigroups given in [8]. The last Section 3 is devoted to the study of T 1 (R) when R is the edge ring of a bipartite graph. This class of rings has been well studied in combinatorial commutative algebra, see e.g. [11] and [13]. For a given simple graph G of the vertex set [n] one considers the edge ring R = K[G] which is the toric ring generated over K by the monomials ti tj for which {i, j} is an edge of G. Viewing the edge ring a semigroup ring K[H], the edges ei of G correspond the generators hi of the semigroup H. We say that G is inseparable if the corresponding semigroup is inseparable. The main result of the first part of this section is a combinatorial criterion for G being inseparable. Let C be a cycle of G and e a chord of G. Then e splits C into two disjoint connected components C1 and C2 which are obtained by restricting C to the complement of e. A path P of G is called a crossing path of C with respect to e if one end of P belongs to C1 and the other end to C2 . Now the criterion (Corollary 3.5) says that a bipartite graph G is inseparable if and only if for any cycle C which has a unique chord e, there exists a crossing path of C with respect to e. In particular, if no cycle has a chord, then G is inseparable. By using this criterion we show in Theorem 3.6 that the coordinate ring of any convex polyomino, which may be interpreted as a special class of edge rings, is inseparable. For the rest of this section we consider the semi-rigidity and rigidity of bipartite graphs. We call H semi-rigid if T 1 (K(H))−a = 0 for all a ∈ H, and characterize in Theorem 3.10 semi-rigidity of bipartite graphs in terms of the non-existence of certain constellations of edges and cycles of the graph. To classify rigidity of bipartite graphs is much more complicated, and we do not have a general combinatorial criterion for when a bipartite graph is rigid. Instead we consider for each n ≥ 3 the graph Gn which is obtained by removing an edge from the complete bipartite graph Kn,n . It is shown in Proposition 3.12 that for n = 3, Gn is not rigid while for n ≥ 4, Gn is rigid. It remains a challenging problem to classify all rigid bipartite graphs. 1. T 1 for toric rings Let H be an affine semigroup, that is, a finitely generated subsemigroup of Zm for some m > 0. Let h1 , . . . , hn be the minimal generators of H, and fix a field K. The ±1 toric ring K[H] associated with H is the K-subalgebra of the ring K[t±1 1 , . . . , tm ] of a(1) a(m) Laurent polynomials generated by the monomials th1 , . . . , thn . Here ta = t1 · · · tm for a = (a(1), . . . , a(m)) ∈ Zm . Let S = K[x1 , . . . , xn ] be the polynomial ring over K in the variables x1 , . . . , xn . The K-algebra R = K[H] has a presentation S → R with xi 7→ thi for i = 1, . . . , n. The kernel IH ⊂ S of this map is called the toric ideal attached to H. Corresponding to this presentation of K[H] there is a presentation Nn → H of H which can be extended to the group homomorphism Zn → Zm with εi 7→ hi for i = 1, . . . , n, where ε1 , . . . , εn denotes the canonical basis of Zn . Let L ⊂ Zn be the kernel of this 3 group homomorphism. The lattice L is called the relation lattice of H. Note that L is a free abelian group and Zn /L is torsion-free. For a vector v ∈ Zn with v = (v(1), . . . , v(n)), we set X X v+ = v(i)εi and v− = −v(i)εi . i, v(i)≥0 i, v(i)≤0 Then v = v+ −v− . It is a basic fact and well-known (see e.g. [7]) that IH is generated by the binomials fv with v ∈ L, where fv = xv+ − xv− . We define an H-grading on S by setting deg xi = hi . Then IH is a graded ideal with deg fv = h(v), where X X (1) h(v) = v(i)hi (= −v(i)hi ). i, v(i)≥0 i, v(i)≤0 Let v1 , . . . , vr be a basis of L. Since IH is a prime ideal we may localize S with respect to this prime ideal and obtain IH SIH = (fv1 , . . . , fvr )SIH . In particular, we see that (2) height IH = rank L. Let ΩR/K be the module of differentials of R over K. Since R is a domain, the cotangent module T 1 (R) is isomorphic to Ext1R (ΩR/K , R), and since R is H-graded it follows that ΩR/K is H-graded as well, and hence Ext1R (ΩR/K , R) and T 1 (R) are ZHgraded. Here ZH denotes the associated group of H, that is, the smallest subgroup of Zm containing H. It is our goal to compute the graded components T 1 (R)a of T 1 (R) for a ∈ ZH. The module of differentials has a presentation ΩR/K = ( n M Rdxi )/U, i=1 L where U is the submodule of the free R-module ni=1 Rdxi generated by the elements dfv with v ∈ L, where n X dfv = (∂fv /∂xi )dxi . i=1 Here ∂fv /∂xi stands for partial derivative of fv with respect to xi , evaluated modulo IH . One verifies at once that n X dfv = v(i)th(v)−hi dxi . (3) i=1 L For i ∈ [n], the basis element dxi of ΩS/K ⊗S R = ni=1 Rdxi is given the degree hi . Then U is an H-graded submodule of ΩS/K ⊗S R, and deg dfv = deg fv = h(v). 4 For any ZH-graded R-module M we denote by M ∗ the graded R-dual HomR (M, R). Then the exact sequence of H-graded R-modules 0 → U → ΩS/K ⊗S R → ΩR/K → 0 gives rise to the exact sequence (ΩS/K ⊗S R)∗ → U ∗ → T 1 (R) → 0 of ZH-graded modules. This exact sequence may serve as the definition of T 1 (R), namely, to be the cokernel of (ΩS/K ⊗S R)∗ → U ∗ . Let fv1 , . . . , fvs be a system of generators of IH , where we may assume that for r ≤ s, the elements v1 , . . . , vr form a basis of L. In general s is much larger than r. Observe that the elements dfv1 , . . . , dfvs form a system of generators of U. We let F be a free graded R-module with basis g1 , . . . , gs such that deg gi = deg dfvi for i = 1, . . . , s, and define the R-module epimorphism F → U by gi 7→ dfvi for i = 1, . . . , s. The kernel of F → U we denote by C. The composition F → ΩS/K ⊗S R of the epimorphism F → U with the inclusion map U → ΩS/K ⊗S R will be denoted by δ. We identify U ∗ ⊂ F ∗ with its image in F ∗ . Then T 1 (R) = U ∗ / Im δ ∗ and U ∗ is the submodule of F ∗ consisting of all ϕ ∈ F ∗ with ϕ(C) = 0. We first describe the ZH-graded components of U ∗ . Let a ∈ ZH. We denote by KL the K-subspace of K n spanned by v1 , . . . , vs and by KLa the K-subspace of KL spanned by the vectors vi with i ∈ / Fa . Here the set Fa is defined to be Fa = {i ∈ [s] : a + h(vi ) ∈ H}. Then we have Theorem 1.1. For all a ∈ ZH, we have dimK (U ∗ )a = dimK KL − dimK KLa . Proof. Let σ1 , . . . , σs be the canonical basis of K s and W ⊂ K s be the kernel of the K-linear map K s → KL with σi 7→ vi for i = 1, . . . , s. We will show that (4) (U ∗ )a ∼ = {µ ∈ K s : µ(i) = 0 for i ∈ [s] \ Fa and hµ, λi = 0 for all λ ∈ W }, as K-vector space. Assuming this isomorphism has been proved, let Xa be the image of W ⊂ K s L under the canonical projection K s → Va = i∈Fa Kσi . Then (4) implies that (U ∗ )a is isomorphic to the orthogonal complement of Xa in Va . Thus, (5) dimK (U ∗ )a = |Fa | − dimK Xa . 5 L Let Za = i6∈Fa Kσi and Ya the cokernel of Xa → Va . Then we obtain a commutative diagram with exact rows and columns 0   y 0 −−−→ W ∩ Za −−−→   y 0 −−−→ 0 −−−→ W   y Xa   y 0   y 0   y Za −−−→ KLa −−−→ 0     y y −−−→ K s −−−→ KL −−−→ 0     y y −−−→ Va −−−→ Ya     y y −−−→ 0 0 0 0 ∗ Now (5) implies that dimK (U )a = dimK Ya , and the diagram shows that dimK Ya = dimK KL − dimK KLa . It remains to prove the isomorphism (4). Observe that (U ∗ )a =P {ϕ ∈ (F ∗ )a : ϕ(C) = ∗ 0}, where C is the kernel of F → U. Let ϕ ∈ (F )a . Then ϕ = si=1 ϕ(gi )gi∗ , where g1∗ , . . . , gs∗ is the basis of F ∗ dual to g1 , . . . , gs . Since deg gi∗ = − deg dfvi = −h(vi ), it follows that ϕ ∈ (F ∗ )a if and only if ϕ(gi ) = µ(i)ta+h(vi ) with µ(i) ∈ K and µ(i) = 0 if a + h(vi ) 6∈ H. Hence X µ(i)ta+h(vi ) gi∗ )(C) = 0}. (U ∗ )a ∼ = {µ ∈ K s : µ(i) = 0 for i ∈ [s] \ Fa and ( i∈Fa In order to complete the proof of (4) we only need to prove the following statement: (6) ( s X µ(i)ta+h(vi ) gi∗ )(C) = 0 if and only if hµ, λi = 0 for all λ ∈ W. i=1 P Let z ∈ Cb for some b ∈ H. Then z = i∈[s] λ(i)tb−h(vi ) gi with λ(i) ∈ K for i = 1, . . . , s and λ(i) = 0 if b−h(vi ) ∈ / H since z ∈ Fa . Moreover, since z ∈ Ker(F → U) b−h(v1 ) it follows that λ(1)t dfv1 + · · · + λ(s)tb−h(vs ) dfvs = 0. This implies that X X X X λ(i)vi (j)tb−hj )dxj = 0. λ(i)tb−h(vi ) vi (j)th(vi )−hj dxj = ( i∈[s] b−h(vi )∈H j∈[n] j∈[n] i∈[s] b−h(vi )∈H Note that if b − hj ∈ / H, then for all i ∈ [s] with b − h(vi ) ∈ H, one has h(vi ) − h ∈ / H and so v (j) = 0. Here we use the definition of P h(vi ), see (1). Therefore, i Pj i∈[s],b−h(vi )∈H λ(i)vi (j) = 0 for j = 1, . . . , n. This implies i∈[s],b−h(vi )∈H λ(i)vi = 0. In conclusion we see that X X λ(i)tb−h(vi ) gi ∈ Cb if and only if λ(i)vi = 0. i∈[s],b−h(vi )∈H i∈[s],b−h(vi )∈H 6 P This particularly implies that if z = i∈[s] λ(i)tb−h(vi ) gi ∈ Cb , then λ = (λ(1), . . . , λ(s)) ∈ W. Since s s X X X a+h(vi ) ∗ b−h(vi ) ( µ(i)t gi )( λ(i)t gi ) = ( µ(i)λ(i))ta+b , i=1 i=1 i∈[s],b−h(vi )∈H Ps / H or hµ, λi = it that ( i=1 µ(i)ta+h(vi ) gi∗)(Cb ) = 0 if and only if either a+b ∈ Pfollows s all i with b − h(vi ) ∈ / H. In i=1 µ(i)λ(i) = 0 for all λ ∈ W satisfying λ(i) = 0 forP particular, we have if hµ, λi = 0 for all λ ∈ W , then ( si=1 µ(i)ta+h(vi ) gi∗ )(C) = 0. P a+h(vi ) ∗ gi )(C) = 0. Write a = a+ −a− For the converse, we assume that ( si=1 µ(i)t Ps with a+ ∈ H and a− ∈ H, and set b0 = Pi=1 h(vi ) + a− . Since a + b0 ∈ H and b0 − h(vi ) ∈ H for all i ∈ [s], and since ( si=1 µ(i)ta+h(vi ) gi∗ )(Cb0 ) = 0, it follows that (µ, λ) = 0 for all λ ∈ W . Therefore the statement (6) has been proved and this completes the proof.  Now for any a ∈ ZH we want to determine the dimension of (Im δ ∗ )a . We observe that the ZH-graded R-module Im δ ∗ is generated by the elements s s X X ∗ ∗ ∗ δ ((dxi ) ) = (∂fvj /∂xi )gj = vj (i)th(vj )−hi gj∗ . j=1 ∗ j=1 ∗ Note that deg δ ((dxi ) ) = −hi for i = 1, . . . , n. For i = 1, . . . , n we set wi = (v1 (i), . . . , vs (i)), and for a ∈ ZH we let KDa be the K-subspace of K s spanned by the vectors wi for which i ∈ Ga . Here the set Ga is defined to be Ga = {i ∈ [n] : a + hi ∈ H}. Proposition 1.2. Let a ∈ ZH. Then dimK (Im δ ∗ )a = dimK KDa . Proof. The K-subspace (Im δ ∗ )a ⊂ (F ∗ )a is spanned by the vectors s X a+hi ∗ ∗ t δ ((dxi ) ) = vj (i)ta+h(vj ) gj∗ j=1 with i ∈ Ga . The desired formula dimK (Im δ ∗ )a follows once we have shown that X X µ(i)wi = 0. µ(i)ta+hi δ ∗ ((dxi )∗ ) = 0 if and only if i∈Ga i∈Ga Here µ(i) ∈ K for any i ∈ Ga . To prove it we notice that s s X X X X X a+h(vj ) ∗ a+hi ∗ ∗ µ(i)vj (i)ta+h(vj ) gj∗). µ(i)( vj (i)t gj ) = ( µ(i)t δ ((dxi ) ) = i∈Ga P i∈Ga j=1 j=1 i∈Ga P Thus i∈Ga µ(i)ta+hi δ ∗ ((dxi )∗ ) = 0 if and only if P i∈Ga µ(i)vj (i) = 0 for j = 1, . . . , s. Since vj (i) = wi (j), this is the case if and only if i∈Ga µ(i)wi = 0.  7 Corollary 1.3. Let a ∈ ZH. Then dimK KDa + dimK KLa ≤ dimK KL. Equality holds if and only if T 1 (R)a = 0. Summarizing our discussions of this section we observe that all information which is needed to compute dimK T 1 (R)a can be obtained from the (s × n)-matrix   v1 (1) v1 (2) . . . v1 (n)  v2 (1) v2 (2) . . . v2 (n)  . AH =  ..  ..  ... .  . vs (1) vs (2) . . . vs (n) Indeed, dimK T 1 (K[H])a can be computed as follows: let l = rank AH , ra the rank of the submatrix of AH whose rows are the ith rows of AH for which a + h(vi ) 6∈ H, and let ca be the rank of the submatrix of AH whose columns are the jth columns of AH for which a + hj ∈ H. Then dimK T 1 (K[H])a = l − la − da . (7) Corollary 1.4. Suppose a ∈ H. Then T 1 (R)a = 0. Proof. Since a ∈ H, it follows that G(a) = [n] and dimK Da = dimK KL = rank AH . Thus the assertion follows from Corollary 1.3.  The inequality of Corollary 1.3 can also be deduced from the following lemma. Lemma 1.5. Fix a ∈ ZH. Then vi (j) = 0 for every pair i, j with i ∈ / Fa and j ∈ Ga . Proof. Assume on the contrary that vi (j) 6= 0, say vi (j) < 0, for some i ∈ / Fa and j ∈ Ga . Then X X −vi (k)hk + (−vi (j) − 1)hj ∈ H. vi (k)hk = hj + b, where b = h(vi ) = − k6=j vi (k)<0 k vi (k)<0 Since j ∈ Ga , we have a + hj ∈ H and so a + h(vi ) = (a + hj ) + b ∈ H. Consequently, i ∈ Fa , a contradiction.  2. Separable and inseparable saturated lattices In this section we study conditions under which an affine semigroup ring K[H] is obtained from another affine semigroup ring K[H ′ ] by specialization, that is, by reduction modulo a regular element. Of course we can always choose H ′ = H × N in which case K[H ′ ] is isomorphic to the polynomial ring K[H][y] over K[H] in the variable y, and K[H] is obtained from K[H ′ ] by reduction modulo the regular element y. This trivial case we do not consider as a proper solution of finding an K[H ′ ] that specializes to K[H]. If no non-trivial K[H ′ ] exists, which specializes to K[H], then H will be called inseparable and otherwise separable. It turns out that the separability of H is naturally phrased in terms of the relation lattice L of H. 8 Let L ⊂ Zn be a subgroup of Zn . Such a subgroup is often called a lattice. The ideal IL generated by all binomials fv with v ∈ L is called the lattice ideal of L. The following properties are known to be equivalent: (i) Zn /L is torsionfree; (ii) IL is a prime ideal; (iii) there exists a semigroup H such that IL = IH . A proof of these facts can be found for example in [7]. A lattice L for which Zn /L is torsionfree is called a saturated lattice. Let ε1 , . . . , εn be the canonical basis of Zn and ε1 , . . . , εn , εn+1 the canonical basis of Zn+1 . Let i ∈ [n]. We denote by πi : Zn+1 → Zn the group homomorphism with πi (εj ) = εj for j = 1, . . . , n and πi (εn+1 ) = εi . For convenience we denote again by πi the K-algebra homomorphism S[xn+1 ] → S with πi (xj ) = xj for j = 1, . . . , n and πi (xn+1 ) = xi . Definition 2.1. Let L ⊂ Zn be a saturated lattice. We say that L is i-separable for some i ∈ [n], if there exists a saturated lattice L′ ⊂ Zn+1 such that (i) rank L′ = rank L; (ii) πi (IL′ ) = IL ; (iii) there exists a minimal system of generators fw1 , . . . , fws of IL′ such that the vectors (w1 (n + 1), . . . , ws (n + 1)) and (w1 (i), . . . , ws (i)) are linearly independent. The lattice L is called i-inseparable if it is not i-separable, and L is called inseparable if it is i-inseparable for all i. Moreover, the lattice L′ satisfying (i)-(iii) is called an i-separation lattice for L. We also call a semigroup H and its toric ring inseparable if the relation lattice of H is inseparable. Remark 2.2. Suppose that L′ ⊂ Zn+1 is an i-separation lattice for L. Let IL′ ⊂ S[xn+1 ] be the lattice ideal of L′ . It is easily seen that xn+1 − xi 6∈ IL′ because rank L = rank L′ . Indeed, if xn+1 − xi ∈ IL′ , then S[xn+1 ]/IL′ ∼ = S/IL , and so rank L′ = height IL′ = height IL + 1 = rank L + 1, contradicting Definition 2.1(i). Moreover, xn+1 − xi is a non-zerodivisor of S[xn+1 ]/IL′ since S[xn+1 ]/IL′ is a domain. In particular, if fw1 , . . . , fws is a minimal system of generators of IL′ , then πi (fw1 ), . . . , πi (fws ) is a minimal system of generators of IL , (see Lemma 2.5 for the details). This implies that wj (i)wj (n + 1) ≥ 0 for j = 1, . . . , s. Indeed, xi divides πi (fwj ) if wj (i)wj (n + 1) < 0. Since πi (fwj ) is a minimal generator of IL and since IL is a prime ideal, the polynomial πi (fwj ) must be irreducible. So, wj (i)wj (n + 1) < 0 is not possible. Let vj = πi (wj ) for j = 1, . . . , s. Since wj (i)wj (n + 1) ≥ 0 for j = 1, . . . , s, for all j we have πi (fwj ) = fvj . Hence fv1 . . . , fvs is a minimal system of generators of IL . For an affine semigroup H ⊂ Zm the semigroup ring K[H] is standard graded, if and only if there exists a linear form ℓ = a1 z1 + a2 z2 + · · · + am zm in the polynomial ring Q[z1 , . . . , zm ] such that ℓ(hi ) = 1 for all minimal generators hi of H. 9 The following result provides a necessary condition of i-inseparability. Recall from [6] that an affine semigroup H is called positive if H0 = {0}, where H0 is the set of invertible elements of H. Theorem 2.3. Let H be a positive affine semigroup which is minimally generated by h1 , . . . , hn , L ⊂ Zn the relation lattice of H. Suppose that L is i-separable. Then T 1 (K[H])−hi 6= 0. In particular, if K[H] is standard graded, then L is inseparable, if T 1 (K[H])−1 = 0. Proof. Since L is i-separable, there exists a saturated lattice L′ satisfying the conditions (i) and (ii) as given in Definition 2.1. Since xn+1 − xi is a non-zerodivisor on R′ = S[xn+1 ]/IL′ it follows that R′′ = R′ /(xn+1 − xi )2 R′ is an infinitesimal deformation of R (which is isomorphic to R′′ /((xn+1 − xi )R′′ ). Let vj = πi (wj ) for j = 1, . . . , s. By Remark 2.2, we have πi (fwj ) = fvj for j = 1, . . . , s and fv1 , . . . , fvs is a minimal system of generators of IL . Note that S[xn+1 ] = S[xn+1 − xi ]. We set ε to be the residue class of xn+1 − xi in S[xn+1 − xi ]/(xn+1 − xi )2 . Then S[xn+1 − xi ]/(xn+1 − xi )2 = S[ε]. Let σ : S[xn+1 ] → S[ε] the canonical epimorphism and let J be the image of IL′ in S[ε]. Then R′′ = S[ε]/J. In order to determine the generators of J, we fix a j with 1 ≤ j ≤ s, and may assume that w(n + 1) ≥ 0 and w(i) ≥ 0. Then modulo (xn+1 − xi )2 , we obtain Y w (k) w (n+1) Y w (k) j fwj = − xk j xn+1 xk j 1≤k≤n wj (k)≥0 = Y 1≤k≤n wj (k)<0 w (k) xk j w (n+1) (xi j 1≤k≤n wj (k)≥0 = fvj + [wj (n + 1)( Y w (n+1)−1 + wj (n + 1)xi j ε) − Y w (k) xk j 1≤k≤n wj (k)<0 v (k) xkj )/xi ]ε. 1≤k≤n vj (k)≥0 For the second equality we used that xn+1 = ε+xi and ε2 = 0, and the third equality is due to the fact vj (i) = wj (i) + wj (n + 1). The homomorphism ϕ : IL /IL2 → R corresponding to the infinitesimal deformation S[ε]/J is given by Y v (k) xkj )/xi + IL = wj (n + 1)th(vj )−hi for j = 1, . . . , s, ϕ(fvj + IL2 ) = wj (n + 1)( 1≤k≤n vj (k)≥0 which induces the element α= X wj (n + 1)th(vj )−hi gj∗ ∈ (U ∗ )−hi . 1≤j≤s Since it follows that G−hi = {i}, and this implies that (Imδ ∗ )−hi = P H is positive K 1≤j≤s vj (i)th(vj )−hi gj∗ , see Proposition 1.2. Assume α ∈ (Imδ ∗ )−hi . Then there exists λ ∈ K such that (w1 (n + 1), . . . , ws (n + 1)) = λ(v1 (i), . . . , vs (i)). 10 Since vj (i) = wj (i) + wj (n + 1) for j = 1, . . . , s, and since by condition (iii) of Definition 2.1 the vectors (w1 (n+1), . . . , ws (n+1) and (w1 (i), . . . , ws (i)) are linearly independent, we obtain a contradiction. Hence T 1 (R)−hi 6= 0, as required.  As a first example of a separable lattice we consider the relation lattice of a numerical semigroup. Discussion 2.4. Let H ⊂ N be the numerical semigroup minimally generated by h1 , h2 , h3 with gcd(h1 , h2 , h3 ) = 1. Recall some facts from [8]. For i = 1, 2, 3 let ci be the smallest integer such that ci hi ∈ Nhk + Nhℓ , where {i, k, ℓ} = [3], and let rik and riℓ be nonnegative integers such that ci hi = rik hk + riℓ hℓ . Denote by L the relation lattice of H. Then the three vectors v1 = (c1 , −r12 , −r13 ), v2 = (−r21 , c2 , −r23 ), v3 = (−r31 , −r32 , c3 ) generate L. We have v1 + v2 + v3 = 0 if (1) all rij 6= 0, or (2) v1 = (c1 , −c2 , 0), v2 = (0, c2 , −c3 ) and v3 = (−c1 , 0, c3). In case (1), fv1 , fv2 , fv3 is the unique minimal system of generators of IL . In case (2), fv1 + fv2 + fv3 = 0, so that any two of the fvi ’s minimally generate IL . An example for (1) is the semigroup with generators 3, 4 and 5, and example for (2) is the semigroup with generators 6, 10 and 15. (3) If v1 + v2 + v3 6= 0, then there exist distinct integers k, ℓ ∈ [3] such that vk + vℓ = 0 and rij 6= 0 for i ∈ [3] \ {k, ℓ} and j ∈ {k, ℓ}. In this case IL is minimally generated by xci i − xrkik xrl il and xckk − xcℓℓ . An example for (3) is the semigroup with generators 4, 5 and 6. It is known and easy to prove that R P = K[H] is not rigid. Indeed, since R is quasi-homogeneous, the Euler relations ni=1 (∂f /∂xi )xi = (deg f )f imply that there is an epimorphism χ : ΩR/K → m with χ(dxi ) 7→ thi where m = (th1 , th2 , th3 ) is the graded maximal ideal of R. Since rank ΩR/K = rank m = 1, it follows that C = Ker χ is a torsion module. Thus we obtain the following exact sequence 0 → C → ΩR/K → m → 0, which induces the long exact sequence HomR (C, R) → Ext1R (m, R) → Ext1R (ΩR/K , R). Since R is a 1-dimensional domain, R is Cohen-Macaulay, HomR (C, R) = 0 and Ext1R (m, R) ∼ = m−1 /R 6= 0. It follows that Ext1R (ΩR/K , R) 6= 0. In other words, R is not rigid. Of course the same argument can be applied to any numerical semigroup generated by more than 1 element. We have seen that K[H] is not rigid. The next result shows that the relation lattice of H is even i-separable for i ∈ [3] with T 1 (R)−hi 6= 0. To prove this we need Lemma 2.5. Let L ⊂ Zn and L′ ⊂ Zn+1 be saturated lattices which satisfy the conditions (i) and (ii) as given in Definition 2.1. Then (a) IL and IL′ have the same number of minimal generators; 11 (b) fw1 , . . . , fws is a minimal system of generators of IL′ if and only if πi (fw1 ), . . . , πi (fws ) is a minimal system of generators of IL . Proof. (a) For any S[xn+1 ]/IL′ -module M we denote by M its reduction modulo xn+1 − xi . The conditions (i) and (ii) of Definition 2.1 guarantee that xn+1 − xi is a non-zerodivisor on S[xn+1 ]/IL′ and that S/IL ∼ = S[xn+1 ]/IL′ . From these facts (a) follows. (b) Suppose that fw1 , . . . , fws is a minimal system of generators of IL′ . Then IL is generated by πi (fw1 ), . . . , πi (fws ) since πi (IL′ ) = IL . By (a), πi (fw1 ), . . . , πi (fws ) is a minimal system of generators of IL . Conversely, assume that πi (fw1 ), . . . , πi (fws ) is a minimal system of generators of IL . We want to show that IL′ = (fw1 , . . . , fws ). Set J = (fw1 , . . . , fws ). Then we obtain the following short exact sequence: α 0 → IL′ /J → S[xn+1 ]/J → S[xn+1 ]/IL′ → 0 Here α is the natural epimorphism. By [6, Proposition 1.1.4], we obtain the exact sequence α 0 → IL′ /J → S[xn+1 ]/J −→ S[xn+1 ]/IL′ → 0. Since πi (J) = πi (IL′ ) = IL it follows that α is an isomorphism, and so IL′ /J = 0.  Nakayama’s Lemma implies that IL′ /J = 0. Hence J = IL′ , as desired. Proposition 2.6. Let H be a numerical semigroup as above and set R = K[H]. Let L ⊂ Z3 be the relation lattice of H. With the notation of Discussion 2.4 we have: (a) If v1 +v2 +v3 = 0, then dimK T 1 (R)−hi = 1 and L is i-separable for i = 1, 2, 3. (b) If v1 + v2 + v3 6= 0, then there exists i ∈ [3] such that IL = (xci i − xrkik xrl il , xckℓ − xcℓk ) with {i, k, l} = [3] and rik , ril 6= 0. In this case, T 1 (R)−hi = 0, and for j 6= i we have that T 1 (R)−hj 6= 0 and that L is j-separable. Proof. (a) We consider the case (1), where rij > 0 for all i and j, see Discussion 2.4. Fix i ∈ [3]. Since all rij > 0 it follows that F−hi = {1, 2, 3}, and since H is a positive semigroup we have G−hi = {i}. It follows from Corollary 1.1 and Proposition 1.2 ∗ that dimK (U ∗ )−hi = 2 and dimK (Im(δ−h ) = 1. Hence dimK T 1 (R)−hi = 1. i Consider the vectors w1 = (c1 − 1, −r12 , −r13 , 1), w2 = (−r21 + 1, c2 , −r23 , −1), w3 = (−r31 , −r32 , c3 , 0) in Z4 , and set L′ = Zw1 + Zw2 + Zw3 . We will prove that L′ is a 1-separation of L. First we show that L′ is saturated. Indeed, if aw ∈ L′ for some 0 6= a ∈ Z and some w ∈ Z4 , then aw = a1 w1 + a2 w2 + a3 ws for some ai ∈ Z, and it follows that av = a1 v1 +a2 v2 +a3 v3 , where v = π1 (w). This implies that v = k1 v1 +k2 v2 +k3 v3 for some ki ∈ Z, since L is saturated. Thus (a1 −ak1 )v1 + (a2 −ak2 )v2 + (a3 −ak3 )v3 = 0 and so a1 − ak1 = a2 − ak2 = a3 − ak3 . It follows that (a1 − ak1 )w1 + (a2 − ak2 )w2 + (a3 − ak3 )w3 = 0. Thus w = k1 w1 + k2 w2 + k3 w3 . Hence L′ is saturated. Next we show π1 (IL′ ) = IL . It is clear that IL ⊆ π1 (IL′ ) since π1 (fwi ) = fvi for i = 1, 2, 3. 12 For the converse direction, we only need to note that π1 (L′ ) = L and that fπ1 (w) divides π1 (fw ) for all w ∈ L′ . Now, applying Lemma 2.5 we conclude that fw1 , fw2 , fw3 is a minimal system of generators of IL′ satisfying condition (iii) of Definition 2.1. Consequently, L′ is a 1-separation of L. Similar arguments work for i = 2, 3. In case (2), L is generated by any two of the vectors v1 = (c1 , −c2 , 0), v2 = (0, c2 , −c3 ) and v3 = (−c1 , 0, c3 ). Let L′ ⊂ Z4 be a lattice generated by w1 = (c1 − 1, c2 , 0, 1) and w2 = (−c1 , 0, c3 , 0). We claim that L′ is a 1-separation of L. Indeed, the ideal of 2-minors I2 (W ) of the matrix W whose row vectors are w1 and w2 contains the elements c1 and c3 . By the choice of the ci ’s it follows that gcd(c1 , c3 ) = 1. Thus, I2 (W ) = Z. This shows that L′ is saturated. Since π1 (fwi ) = fvi for i = 1, 2 and since IL = (fv1 , fv2 ), Lemma 2.5 implies that IL′ = (fw1 , fw2 ) and π1 (IL′ ) = IL . Since L′ satisfies also condition (iii) of Definition 2.1, it follows that L is 1-separable. In the same way it is shown that L is i-separable for i = 2, 3. (b) This is case (3) of Discussion 2.4 and we have IH = (xci i − xrkik xrl kl , xckk − xcℓℓ ) with {i, k, l} = [3]. Thus IH is a complete intersection and the exponents c1 , c2 and c3 are all > 1. Without loss of generality we may assume that i = 2, k = 1 and l = 3. Since the lattice L ⊂ Z3 with basis v1 = (−r21 , c2 , −r23 ), v2 = (−c3 , 0, c1 ) is saturated, it follows that the ideal of 2-minors (c1 c2 , c2 c3 , c1 r21 + c3 r23 ) of   −r21 c2 −r23 −c3 0 c1 is equal to Z. Consider the lattice L′ ⊂ Z4 whose basis w1 , w2 consists of the row vectors of   −r21 + 1 c2 r23 −1 . −c3 0 c1 0 The ideal of 2-minors of this matrix contains (c1 c2 , c2 c3 , c1 r21 + c3 r23 ), and hence is again equal to Z. Thus L′ is saturated. Furthermore we have π2 (fw1 ) = fv1 , π2 (fw2 ) = fv2 and π2 (L′ ) = L. This implies that π2 (IL′ ) = IL . Since rank L′ = rank L = 2, the conditions (i) and (ii) of Definition 2.1 are satisfied. Applying Lemma 2.5 we obtain IL′ = (fw1 , fw2 ). Since the condition (iii) of Definition 2.1 is also satisfied we see that L is 1-separable. Similarly, one shows that L is 3-separable.  3. Edge rings of bipartite graphs Let G be a finite simple graph on the vertex set [m], and let K a field. The Kalgebra R = K[G] = K[ti tj : {i, j} ∈ E(G)] is called the edge ring of G. Here E(G) denotes the set of edges of G. We let n = |E(G)|, and denote by S the polynomial ring over K in the indeterminates xe with e ∈ E(G). Let ϕ : S → K[G] be the K-algebra homomorphism with xe 7→ ti tj for e = {i, j}. The toric ideal Ker ϕ will be denoted by IG . In this section we will discuss inseparability, semi-rigidity and rigidity of the edge ring of a bipartite graph, which may as well be considered as the toric ring associated with the affine semigroup H generated by the elements δi + δj with {i, j} ∈ E(G), 13 where δ1 , . . . , δm is a canonical basis of Zm . Let G be a bipartite graph. The generators of IG are given in terms of even cycles of G. Recall that a walk in G is a sequence C : i0 , i1 , . . . , iq such that {ik , ik+1 } is an edge of G for k = 0, 1, . . . , k − 1. C is called a closed walk, if iq = i0 . The closed walk C is called a cycle if ij 6= ik for all j 6= k with j, k < q, and it is called an even closed walk if q is even. Observe that any cycle of bipartite graph is an even cycle. Given any even cycle (more generally an even closed walk) C : i0 , i1 , . . . , i2q . The edges of C are ekj = {ij , ij+1 } for j = 0, 1, . . . , 2q − 1 together with the edge ek2q−1 = {i2q−1 , i0 }. We associate to C the vector v(C) ∈ Zn which defined as (8) v(C) = q−1 X εk2i − q−1 X εk2i+1 i=0 i=0 Here ε1 , . . . , εn denotes the canonical basis of Zn . Note that v(C) is determined by C only up to sign. We call v(C) as well as −v(C) the vector corresponding to C. For simplicity we write fC for fv(C) . Recall from [11] that the toric ideal IG of a finite bipartite graph is minimally generated by indispensable binomials, that is, by binomials, which up to sign, belong to any system of generators of IG . Furthermore, a binomial f ∈ IG is indispensable if and only if f = fC , where C is an induced cycle, that is, a cycle without a chord. In particular, if G′ is the graph obtained from G by deleting all edges which do not belong to any cycle, then IG = IG′ S. Therefore we may assume throughout this section that each edge of G belongs to some cycle. Now for the rest of this section we let G be a bipartite graph on the vertex set [m] with edge set E(G) = {e1 , . . . , en }. With the edge ek = {i, j} we associate the vector hk = δi + δj . Here δ1 , . . . , δm is the canonical basis of Zm . The semigroup generated by h1 , . . . , hn we denote by H(G) or simply by H. Note that K[H(G)] = K[G]. Let {C1 , . . . , Cs } be the set of cycles of G and vi = v(Ci ) the vector corresponding to Ci . We may assume that for i = 1, . . . , s1 ≤ s, the cycles Ci are the induced cycles of G. Then IG is minimally generated by fv1 , . . . , fvs1 , see [11]. Of course, IG is also generated by fv1 , . . . , fvs . In particular, if L is the relation lattice of H, then KL is the vector space spanned by v1 , . . . , vs . Let a ∈ ZH. As in Section 1 we set Fa = {1 ≤ i ≤ s : a + h(vi ) ∈ H}, and KLa = SpanK {vi : i ∈ [s] \ Fa }. In addition we now also set Fa′ = {1 ≤ i ≤ s1 : a + h(vi ) ∈ H}, and KL′a = SpanK {vi : i ∈ [s1 ] \ Fa′ }. In general, Fa′ is a proper subset of Fa . However, we have Lemma 3.1. KL′a = KLa for all a ∈ ZH. Proof. Since [s1 ] \ Fa′ ⊆ [s] \ Fa , we have KL′a ⊆ KLa . Let i ∈ ([s] \ Fa ) \ ([s1] \ Fa′ ). Then a + h(vi ) ∈ / H and Ci is a cycle with chords. In the following we describe a process to obtain the induced cycles with vertex set contained in V (Ci ). Choose a chord of Ci and note that this chord divides Ci into two cycles. If both cycles are 14 induced, then the process stops. Otherwise we divide as before, those cycles which are not induced. Proceeding in this way, we obtain induced cycles of G, denoted by Ci1 , . . . , Cik , such that E(Cij ) consists of at least one chord of Ci . Moreover, the edges of Cij which are not chords of Ci , are edges of Ci . In general, if C is a cycle and v = v(C), then X h(v) = δj . j∈V (C) Hence it follows from the construction of the induced cycles Cij that h(vi ) − h(vij ) is the sum of certain terms δk1 + δk2 , where {k1 , k2 } is an edge of Ci , and hence h(vi ) − h(vij ) ∈ H. Since a + h(vi ) ∈ / H it follows that a + h(vij ) ∈ / H for all j. This ′ ′ implies that vij ∈ KLa for all j, and so vi ∈ KLa since vi is a linear combination of the vij .  For the discussion on separability we need to know when T 1 (K[G])−hj vanishes, see Theorem 2.3. For that we need to have the interpretation of F−hj for edge rings which is given by the following formula: (9) F−hj = {i ∈ [n] : V (ej ) ⊂ V (Ci )}. For the proof of this equation note that if V (ej ) ⊆ V (Ci ), then without loss of generality we assume that Ci : 1, 2, . . . , 2t and that ej = {1, k} with k ∈ [2t]. Note that k is even, since G contains no odd cycle. It follows that −hj + h(vi ) = (δ2 + δ3 ) + · · · + (δk−2 + δk−1 ) + (δk+1 + δk+2 ) + · · · + (δ2t−1 + δ2t ) ∈ H, and so i ∈ F−hj by definition. Conversely, assume that V (ej ) * V (Ci ) and let k ∈ V (ej ) \ V (Ci ). Then −hj + h(vi ) is a vector in Zm with the kth entry negative and thus it does not belong to H. Therefore i ∈ / F−hj . Later we also shall need Lemma 3.2. Let W : i1 , i2 , . . . , i2k , i1 be an even closed walk in G and let ej be an edge of G with the property that ej 6= {ia , ib } with 1 ≤ a < b ≤ 2k. Then the vector w = v(W ) ∈ KL belongs to KL−hj . Proof. We may view W as a bipartite graph with bipartition {i1 , i3 , . . . , i2k−1 } and {i2 , i4 , . . . , i2k }. Then we see that w belongs to the space spanned by the vectors corresponding to the induced cycles of G with edges in W . This vector space is a subspace of KL−hj , since ej is not an edge of any cycle with edges in W , as follows from (9).  We call the space KL which is spanned by the vectors v1 , . . . , vs the cycle space of G (with respect to K). Usually the cycle space is only defined over Z2 . For bipartite graphs the dimension of the cycle space does not depend on K and is known to be (10) |E(G)| − |V (G)| + c(G). where c(G) is the number of connected components of G, see [13, Corollary 8.2.13]. Inseparability. In this subsection we present some characterizations of bipartite graphs G for which K[G] is inseparable. 15 Note that (9) says that i ∈ F−hj if and only if ej is an edge or a chord of Ci . Accordingly, we split the set F−hj into the two subsets (11) Aj = {i ∈ [s] : ej is an edge of Ci }, and (12) Bj = {i ∈ [s] : ej is a chord of Ci }. We also set V−hj = SpanK {vi : i ∈ [s] \ Aj }. Then, since by assumption all edges of G belong to a cycle, we obtain (13) dimK V−hj = dimK KL − 1 for j = 1, . . . , n. Indeed, let G\{ej } be the graph obtained from G by deleting the edge ej and leaving vertices unchanged. Then V−hj is the cycle space of G \ {ej }. Lemma 3.3. T 1 (R)−hj = 0 if and only if for all i ∈ Bj , one has vi ∈ KL−hj . Proof. Since −hj + hi ∈ H if and only if i = j it follows that dim(Im δ ∗ )−hj = 1, see Proposition 1.2. Thus, since KL−hj ⊆ V−hj , it follows from (13) that T 1 (R)−hj = 0 if and only if V−hj = KL−hj . Since V−hj = KL−hj + SpanK {vi : i ∈ Bj }, the assertion follows.  For stating the next result we have first to introduce some concepts. Let C be a cycle. Then the path P : i1 , i2 , i3 , . . . , ir−1 , ir (with r ≥ 2 and with ij 6= ik for all j 6= k) is called a path chord of C if i1 , ir ∈ V (C) and ij 6∈ V (C) for all j 6= i1 , ir . The vertices i1 and ir are called the ends of P . Note that any chord of C is a path chord. Let P be a path chord of C. We may assume that {i, i + 1} for i = 1, . . . , t together with {1, 2t} are the edges of C and that i1 = 1 and ir = k with k 6= 1. Let P ′ be another path chord of C. Then we say that P and P ′ cross each other if one end of P ′ belongs to the interval [2, k − 1] and the other end of P ′ belongs to [k + 1, 2t]. In particular, if P is a chord and P ′ crosses P , we say that P ′ is a crossing path chord of C with respect to the chord P . Theorem 3.4. Let G be a bipartite graph with edge set {e1 , . . . , en }, and let R = K[G] be the edge ring of G. Then the following conditions are equivalent: (a) T 1 (R)−hj 6= 0. (b) There exists a cycle C of G for which ej is a chord, and there is no crossing path chord P of C with respect to ej . (c) The relation lattice of H(G) is j-separable. Proof. (a) ⇒ (b): Assume that (b) does not hold. Let i ∈ Bj with Bj as defined in 12. By our assumption, Ci admits a path chord, denoted by P , which crosses ej . Denote by i1 , i2 the two ends of P . Then C is the union of two paths P1 and P2 which both have ends i1 , i2 . Since P1 ∪ P and P2 ∪ P are cycles and ej is neither an edge nor a chord of them, it follows from Lemma 3.2 that the vectors w1 = v(P1 ∪P ) and w2 = v(P2 ∪ P ) belong to KL−hj . Therefore, vi ∈ KL−hj because it is a linear combination of w1 and w2 . Now applying Lemma 3.3, we obtain T 1 (R)−hj = 0, a contradiction. 16 (b) ⇒ (c): We may assume that the cycle C as given in (b) has the edge set E(C) = {e1 = {1, 2}, . . . , eℓ = {ℓ, ℓ + 1}, . . . , e2t = {2t, 1}}, and that ej = {1, k} with 2 < k < 2t − 1. We let X be the set of all a ∈ [m] \ V (C) for which there is a path P from a to some vertex of [2, k − 1], and we set Y = [m] \ (V (C) ∪ X). We now define a graph G′ = G1 ∪ G2 , where G1 and G2 are disjoint graphs, that is, V (G1 ) ∩ V (G2 ) = ∅. The graph G2 is the subgraph of G induced on X ∪ [k]. Next e1 as the subgraph of G induced on Y ∪ [k + 1, 2t] ∪ {1, k}. Then we first define G e 1 by renaming 1 as m + 1 and k as m + 2. We claim that G1 G1 is obtained from G and G2 are disjoint. Indeed, V (G1 ) ∩ V (G2 ) ⊆ [k + 1, 2t] ∩ X. Condition (b) implies that [k + 1, 2t] ∩ X = ∅. Now we claim that if we identify in G′ the vertex m + 1 with 1 and the vertex m + 2 with k, then we obtain G. Indeed, let G′′ be the graph which is obtained from G′ after this identification. We have to show that G′′ = G. Obviously, we have V (G′′ ) = V (G) and E(G′′ ) ⊆ E(G). Let e ∈ E(G) \ E(G′′ ). Then e = {k1 , k2} with k1 ∈ [k + 1, 2t] ∪ Y and k2 ∈ X ∪ [2, k − 1]. If k2 ∈ [2, k − 1], then k1 ∈ [1, k] ∩ X by the definition of X. This is impossible since (X ∪ [1, k]) ∩ ([k + 1, 2t] ∪ Y ) = ∅; If k2 ∈ X, then again by the definition of X it follows that k1 ∈ X ∪ [1, k], which is impossible again in the same reason. Thus we have proved the claim. Now the edge ring of G′ is of the form R′ = S ′ /IG′ = S ′ /(IG1 + IG2 )S ′ , where S ′ = S[xn+1 ] and where the variable xn+1 corresponds to the edge en+1 = {m + 1, m + 2}. The variable xj corresponds to the edge ej if ej ∈ G, and to e ∈ E(G1 ) if e ∈ E(G1 ) \ {m + 1, m + 2} and e is mapped to ej by the identification map G′ → G′′ = G. Let L be the relation lattice of H(G) and L′ be the relation lattice of H(G′ ). Then L ⊂ Zn and L′ ⊂ Zn+1 are saturated lattices. We claim that L and L′ satisfy the conditions (i), (ii) and (iii) with respect to πj , see Definition 2.1. We first show that πj (IL′ ) = IL . Let f be a minimal generator of IL . Then there exists an e1 ) induced cycle D of G such that f = fD . Since G = G′′ it follows that V (D) ⊂ V (G ′ ′ or V (D) ⊂ V (G2 ). Hence there is an induced cycle D in G whose image under the identification map is D. Therefore, πj (fD′ ) = fD . This proves the condition (ii). Since (ii) is satisfied, it follows that R′ /(xn+1 − xj )R′ ∼ = R. Moreover, xn+1 − xj is a ′ ′ non-zerodivisor on R , since R is a domain. This implies that height IL′ = height IL . In particular, rank L′ = rank L. Thus the condition (i) is also satisfied. Finally, by the definition of G1 and G2 , there exist an induced cycle of G1 with en+1 as an edge, say C1 , and an induced cycle of G2 with ej as an edge, say C2 . Let w1 = v(C1 ) and w2 = v(C2 ). Then w1 (n + 1) 6= 0, w1 (j) = 0, w2 (n + 1) = 0 and w2 (j) 6= 0. This implies the condition (iii). The implication (c) ⇒ (a) follows from Theorem 2.3.  Corollary 3.5. Let G be a bipartite graph. Then K[G] is inseparable if and only for any cycle C which has a unique chord e, there exists a crossing path chord of C with respect to e. In particular, if no cycle of G has chord, then G is inseparable. 17 Proof. By Theorem 3.4, G is inseparable if and only if for any cycle C with a chord e, there exists a crossing path chord of C with respect to e. Assume first that K[G] is inseparable. Then, by what we just said, each cycle of G with a chord has the desired property. Conversely, assume that each cycle with a unique chord has a crossing path chord, and let C be a cycle with a chord e. Suppose C has another chord, say e′ . If e′ crosses e, then we are done. Otherwise e′ divides C into two smaller cycles C1 and C2 , and we may assume that e is a chord of C1 . Since C1 has less chords than C, we may apply induction on the number of chords of a cycle and deduce that there exists a crossing path chord of C1 with respect to e. Then this path chord is also a crossing path chord of C with respect to e.  As an example of the theory which we developed so far we consider coordinate rings of convex polyominoes. First we recall from [9] the definitions and some facts about convex polyominoes. Let R2+ = {(x, y) ∈ R : x, y ≥ 0}. We consider (R+ , ≤) as a partially ordered set with (x, y) ≤ (z, w) if x ≤ z and y ≤ w. Let a, b ∈ Z2+ . Then the set [a, b] = {c ∈ Z2+ : a ≤ c ≤ b} is called an interval. A cell C is an interval of the form [a, b], where b = a + (1, 1). The elements of C are called vertices of C. We denote the set of vertices of C by V (C). The intervals [a, a + (1, 0)], [a + (1, 0), a + (1, 1)], [a + (0, 1), a + (1, 1)] and [a, a + (0, 1)] are called edges of C. The set of edges of C is denoted by E(C). Let P be a finite collection of cells of Z2+ . Then two cells C and D are called connected if there exists a sequence C : C = C1 , C2 , . . . , Ct = D of cells of P such that for all i = 1, . . . , t − 1 the cells Ci and Ci+1 intersect in an edge. If the cells in C are pairwise distinct, then C is called a path between C and D. A finite collection of cells P is called a polyomino if every S two cells of P are connected. The vertex set of P, denoted V (P), S is defined to be C∈P V (C) and the edge set of P, denoted E(P), is defined to be C∈P E(C). A polyomino is said to be vertically or column convex if its intersection with any vertical line is convex. Similarly, a polyomino is said to be horizontally or row convex if its intersection with any horizontal line is convex. A polyomino is said to be convex if it is row and column convex. Figure 1 shows two polyominos whose cells are marked by gray color The right hand side polyomino is convex while the left one is not. Figure 1. 18 Let P be a polyomino, and let K be a field. We denote by S the polynomial over K with variables xij with (i, j) ∈ V (P). A 2-minor xij xkl − xil xkj ∈ S with i < k and j < l is called an inner minor of P if all the cells [(r, s), (r + 1, s + 1)] with i ≤ r ≤ k − 1 and j ≤ s ≤ l − 1 belong to P. The ideal IP ⊂ S generated by all inner minors of P is called the polyomino ideal of P. We also set K[P] = S/IP . It has been shown in [9] that K[P] is a domain, and hence a toric ring, if P is convex. A toric parametrization of K[P] will be given in the following proof. Theorem 3.6. Let P be a convex polyomino. Then k[P] is inseparable. Proof. Set AP = {hi : (i, j) ∈ V (P) for some j ∈ Z+ } and BP = {vj : (i, j) ∈ V (P) for some i ∈ Z+ }. We associate with P a bipartite graph G(P) such that V (G(P)) = AP ∪ BP and E(G(P)) = {{hi , vj } : (i, j) ∈ V (P)}. Figure 2 shows a polyomino and its associated bipartite graph. h1 (4,4) (5,4) (2,3) L(3,3) (4,3) h2 h3 h4 h5 (5,3) (1,2) (2,2) J (1,1) (2,1) (3,2) (4,2) (5,2) v1 (3,1) v2 v3 v4 Figure 2. We let K[G(P)] be the subring of the polynomial ring T = K[AP ∪ BP ] generated by the monomials hi vj with {hi , vj } ∈ E(G(P)). In other words, K[G(P)] is the edge ring of the bipartite graph G(P). Let, as above, S = K[xij : (i, j) ∈ V (P)]. As shown in [9], IP is the kernel of the K-algebra homomorphism S → K[G(P)] with xij 7→ hi vj . Thus K[P] ∼ = K[G(P)], and K[G(P)] is the desired toric parametrization. It is known from [11] that IP is generated by the binomials corresponding to the cycles in G(P). By using Corollary 3.5 it is enough to show that for any cycle C of G(P) which has a unique chord, say e = {hi , vj }, there is a crossing path chord of C with respect to e. Since G(P) is a bipartite graph, C is an even cycle, and also |C| > 4 because C has a chord. Since every induced cycle of G(P) is a 4-cycle and since C has only one chord, C must be a 6-cycle. Assume that the vertices of C are hi , vk1 , hℓ1 , vj , hℓ2 , vk2 , listed counterclockwise, and the chord of C is e = (hi , vj ) as above. With the notation introduced, it follows that (i, j), (i, k2 ), (ℓ2 , k2 ), (ℓ2 , j), (ℓ1, j), (ℓ1 , k1 , ), (i, k1) are vertices of P. We consider the following cases. Suppose first that (ℓ1 − i)(ℓ2 − i) > 0. Without loss of generality, we may assume ℓ2 > ℓ1 > i. Then, since P is convex and (i, k2 ) and (ℓ2 , k2 ) are both vertices of P, we have (ℓ1 , k2 ) is a vertex of P. It follows that {hℓ1 , vk2 } is an edge of G(P) which 19 is a chord of C, contradicting our assumption that C has a unique chord. Similarly the case that (k1 − j)(k2 − j) > 0 is also not possible. It remains to consider the case when (ℓ1 − i)(ℓ2 − i) < 0 and (k1 − j)(k2 − j) < 0. Without loss of generality we may assume that ℓ1 < i < ℓ2 and k1 < j < k2 . Then either (i−1, j +1) or (i+1, j −1) is a vertex of P by the connectedness and convexity of P. We may assume that (i − 1, j + 1) ∈ V (P). Note that (i − 1, k1 ) and (ℓ2 , j + 1) belong to V (P). Thus we obtain the path vk1 , hi−1 , vj+1 , hℓ2 in G(P) which is a crossing path chord of C with respect to e.  Semi-rigidity. We say that R is semi-rigid if T 1 (R)a = 0 for all a ∈ ZH with −a ∈ H. In this subsection we consider this weak form of rigidity which however is stronger than inseparability. We again let G be a finite bipartite graph on the vertex set [m] with edge set E(G) = {e1 , e2 , . . . , enP }. The edge ring of G is the toric ring K[H] whose generators are the elements hi = j∈V (ei ) δj , i = 1, . . . , n. Here δ1 , . . . , δm is the canonical basis of Zm . As above we may assume that each edge of G belongs to a cycle and that C1 , C2 , . . . Cs is the set of cycles of G and where C1 , . . . , Cs1 is the set of induced cycles of G. Let Ci be one of these cycles with edges ei1 , ei2 , . . . , ei2t labeled counterclockwise. Two distinct edges e and e′ of Ci are said to be of the same parity in Ci if e = eij and e′ = eik with j − k an even number. Lemma 3.7. Let a = −hj − hk , and let i ∈ [s1 ]. Then i ∈ Fa′ , if and only if ej and ek have the same parity in Ci . Moreover, if Fa′ 6= ∅, then KLa = KL−hj + KL−hk . Proof. Since i ∈ [s1 ], the cycle Ci is an induced cycle. , . . . , ei2t be the P Let ei1 , ei2P edges of Ci labeled counterclockwise. Then h(vi ) = tk=1 hi2k−1 = tk=1 hi2k . Thus if ej and ek have the same parity in Ci , it follows that hj and hk belong to either one of the above summands, so that a + h(vi ) ∈ H. This shows that i ∈ Fa′ . Conversely, suppose that i ∈ Fa′ . Let hj = δj1 + δj2 and hk = δk1 + δk2 . For simplicity, we may assume that δ1 , . . . , δ2t correspond to the vertices of Ci and that the edges of Ci correspond to the elements δ2t + δ1 and δi + δi+1 for i = 1, . . . , 2t − 1. Then h(vi ) = δ1 + · · · + δ2t and a + h(vi ) = −δj1 − δj2 − δk1 − δk2 + δ1 + . . . + δ2t ∈ H. P In general, let h ∈ H, h = m i=1 zi δi with zi ∈ Z. Then it follows that zi ≥ 0 for all i. Hence it follows from (14) that ej and ek are edges of Ci with V (ej ) ∩ V (ek ) = ∅ (that is, the vertices j1 , j2 , k1 , k2 are pairwise different), and that a + h(vi ) is the sum of all δi , i = 1, . . . , 2t with i 6= j1 , j2 , k1, k2 . Suppose the edges ej and ek do not have the same parity in Ci . Then a + h(vi ) is the sum of S1 and S2 , where each of S1 and S2 consists of an odd sum of δi . Hence none of these summands belongs to H. Since S1 + S2 ∈ H, there exists a summand δr1 in S1 and a summand δr2 in S2 such that δr1 + δr2 ∈ H. This implies that {r1 , r2 } ∈ E(Ci ) because Ci has no chord. However this is not possible. Indeed, if {r1 , r2 } ∈ E(Ci ), then r2 ≡ r1 + 1 mod 2t. But this is not the case. (14) 20 ′ ′ , Next we show that KLa = KL−hj +KL−hk if Fa′ 6= ∅. Note that Fa′ ⊆ F−h ∩F−h j k we have KL−hj + KL−hk ⊆ KLa by Lemma 3.1. In order to obtain the desired ′ equality, we only need to show that vi ∈ KL−hj + KL−hk for each i ∈ (F−h ∩ j ′ ′ F−hk ) \ Fa . ′ ′ ) \ Fa′ . Since Fa′ 6= ∅, there exists an induced cycle, say C, Let i ∈ (F−h ∩ F−h j k such that ej and ek have the same parity in C. We may assume that V (C) = [2t] and E(C) = {{1, 2}, {2, 3}, . . . , {2t − 1, 2t}, {2t, 1}}, and that ej = {1, 2} and ek = {2k − 1, 2k} with 1 < k ≤ t. Since ej , ek do not have the same parity in Ci , we can assume without loss of generality that E(Ci ) is {{1, 2}, {2, i1}, {i1 , i2 }, . . . , {i2h , i2h+1 }, {i2h+1 , 2k}, {2k, 2k − 1}} ∪{{2k − 1, i2h+2 }, . . . , {i2ℓ , i2ℓ+1 }, {i2ℓ+1 , 1}}. Then we have even closed walks W1 : 2, 3, . . . , (2k − 1), 2k, i2h+1 , i2h . . . , i1 , 2 and W2 : 1, 2, 3, . . . , (2k − 1), i2h+2 , . . . , i2ℓ+1 , 1. Let w1 = v(W1 ) and w2 = v(W2 ). Since the vertex 1 belongs to ej but is not a vertex of W1 , Lemma 3.2 implies that w1 ∈ KL−hj . Similarly it follows that w2 ∈ KL−hk . Since vi differs at most by a sign from either w1 − w2 or w1 + w2 , it follows that vi ∈ KL−hj + KL−hk , as required.  ′ ′ . Then KL−hj 6= KL−hk . 6= F−h Lemma 3.8. Suppose that F−h j k ′ ′ Proof. Let i ∈ F−h \ F−h . Then vi ∈ KL−hk and vi (j) 6= 0, since ej is an edge of j k Ci . However the vectors v which belong to KL−hj have the property that v(j) = 0. Hence vi ∈ KL−hk \ KL−hj , and this implies KL−hj 6= KL−hk .  Corollary 3.9. Assume that K[G] is inseparable. Let a = −hj − hk . Then ′ ′ ′ dimK KLa = dimK KL − 1 if F−a 6= ∅ and F−h = F−h . j k Otherwise, dimK KLa = dimK KL. Proof. Since we assume that G is inseparable, it follows from Corollary 1.1 and Proposition 1.2 that dimK KL − dimK KL−hj = dimK (Im δ ∗ )−hj . Since by assumption each edge of G belongs to a cycle, it follows that dimK (Im δ ∗ )−hj = 1. Thus dimK KL−hj = dimK KL − 1. Similarly, dimK KL−hk = dimK KL − 1. If F ′ −hj = F ′ −hk , then KL−hj = KL−hk , and if moreover, F ′−a 6= ∅, then together with Lemma 3.7 we have dimK KLa = dimK KL − 1, as desired. Otherwise, there are two cases to consider. If F ′ −a = ∅, then KLa = KL, by the definition of KLa and by Lemma 3.1. If F ′ −a 6= ∅ and F ′ −hj 6= F ′ −hk , then KLa = KL−hj + KL−hk = KL, using Lemma 3.7 together with Lemma 3.8.  Theorem 3.10. Let G be a bipartite graph such that R = K[G] is inseparable. Then the following statements are equivalent: (a) K[G] is not semi-rigid; 21 (b) there exist edges e, f and an induced cycle C such that e, f have the same parity in C and for any other induced cycle C ′ , e ∈ E(C ′ ) if and only if f ∈ E(C ′ ). Proof. (b) ⇒ (a): Let a = −g − h, where g and h are vectors in H corresponding to the edges e and f respectively. Then dimK KLa = dimK KL − 1 by Corollary 3.9. Note that Ga = ∅, we have (Im δ ∗ )a = 0. Therefore T 1 (R)a 6= 0 by Corollary 1.3, and in particular, R is not semirigid. P (a) ⇒ (b): By assumption, there exists a = i∈[n] −ai hi ∈ ZH with ai ≥ 0 for i = 1, · · · , n such that T 1 (R)a 6= 0. Note that ai ∈ {0, 1}, for otherwise, Fa′ = ∅ and so KLa = KL. In particular T 1 (R)a = 0, a contradiction. Since R is inseparable, it follows that |{i : ai 6= 0}| ≥ 2. If |{i : ai 6= 0}| = 2, then a = −hk − hj for ′ ′ some 1 ≤ i 6= j ≤ n. Therefore, Fa′ 6= ∅ and F−h = F−h by Corollary 1.1 and j k Corollary 3.9. Let e and f be the edges corresponding to the vectors hj and hk , respectively. Then, since Fa′ 6= ∅, there exists an induced cycle C of G such that e and f have ′ ′ implies that for any the same parity in C, by Lemma 3.7. Moreover, F−h = F−h j k ′ ′ ′ induced cycle C of G, e ∈ E(C ) if and only if f ∈ E(C ). Now suppose that |{i : ai 6= 0}| ≥ 3. Then there exists j and k with aj 6= 0 and ak 6= 0, and we set b = −hj −hk . Note that Fa′ ⊆ Fb′ . This implies that KLb ⊆ KLa . Therefore, since (Im δ ∗ )a = (Im δ ∗ )b = 0, we have T 1 (R)b 6= 0, and we are in the previous case.  Corollary 3.11. Let P be a convex polyomino. Then K[P] is semi-rigid if and only if P contains more than one cell. Proof. Assume that P contains a unique cell. Then G(P) is a square and it is not semi-rigid by Theorem 3.10. Conversely, assume that K[P] is not semi-rigid. Then there exist two edges e, f and an induced cycle C of G(P) satisfying the condition (b) in Theorem 3.10. Let (i, j) and (k, ℓ) be vertices of P corresponding to the edge e and f , respectively. Then the two edges of C other than e and f correspond to the vertices (i, ℓ) and (k, j) of P. It follows that k 6= i and ℓ 6= j. Without loss of generality, we may assume that k > i and ℓ > j. Then (i + 1, j + 1) ∈ V (P). Let C ′ be the induced cycle of G(P) corresponding to the cell [(i, j), (i + 1, j + 1)] of P. Since C ′ contains the edge e, C ′ must contain f by the condition (b) and thus k = i + 1 and ℓ = j + 1. We claim that [(i, j), (i + 1, j + 1)] is the only cell of P. Suppose that this is not the case. Then we let Ct , t = 1, 2, 3, 4 be four cells which share a common edge with the cell [(i, j), (i + 1, j + 1)]. Note that P contains at least one of the Ct . Indeed, since P is connected and since by assumption P contains a cell C different from [(i, j), (i + 1, j + 1)], there exists a path in P between the cell [(i, j), (i + 1, j + 1)] and C. This path must contain one of the Ct . However V (Ct ) contains exactly one of the two vertices (i, j) and (i + 1, j + 1) for t = 1, . . . , 4. In other words, there exists an induced cycle of G(P) which contains exactly one of the edges e and f . This is contradicted to the condition (b) and thus our claim has been proved.  22 Classes of bipartite graphs which are semi-rigid or rigid. Let Gn be the bipartite graph on vertex set [2n] with edge set E(Gn ) = {{i, j} : i, j ∈ [2n], i − j is odd and {i, j} = 6 {1, 2n}}. Thus Gn is obtained from the complete bipartite graph Kn,n by deleting one of its edges. We observe that for n ≥ 3, Gn = G(Pn ) where Pn is the polyomino with V (Pn ) = {(i, j) : 1 ≤ i, j ≤ n, (i, j) 6= (n, n)}. For any edge e = {i, j} ∈ E(G) we use h(e) to denote the vector δi + δj ∈ Z2n . Let C be a cycle. Then, as before, v(C) stands for the vector corresponding to C and V (C) denotes the set of vertices of C. Our main result of this subsection is the following: Proposition 3.12. Let R be the edge ring of Gn . (a) If n = 3, then R is semirigid, but not rigid. (b) If n ≥ 4, then R is rigid. We need some preparations. First, we introduce some notation. P Let a = i∈[2n] ai δi ∈ Z2n with ai ∈ Z for i = 1, . . . , 2n. We set X X ai and ao = ai . ae = i is even i is odd We also set X ℓ(a) = a1 + a2n and r(a) = ai . i∈{1,2n} / Lemma 3.13. Let a = P i∈[2n] ai δi and H = H(Gn ). Then (a) a ∈ ZH if and only if ae = ao . (b) The following conditions are equivalent: (i) a ∈ H; (ii) ae = ao , ℓ(a) ≤ r(a) and ai ≥ 0 for all i = 1, . . . , 2n. Proof. (a) First note that if i is even and j is odd, then δi + δj ∈ ZH. Indeed, if {i, j} = 6 {1, 2n}, then δi + δj ∈ H; if {i, j} = {1, 2n}, then δ1 + δ2n = (δ1 + δ2 ) + (δ3 + δ2n ) − (δ2 + δ3 ) ∈ ZH. Suppose that ae = ao . We prove that a ∈ ZH by induction on |ae |. If ae = 0 then a = 0, and the assertion is trivial. Suppose that |ae | > 0. We only consider the case when ae > 0 since the other case is similar. In this case there exist i, j ∈ [2n] such that i is even, j is odd, ai > 0 and aj > 0. Let b = a − (δi + δj ). Then be = ae − 1 = ao − 1 = bo , and so b ∈ ZH by induction. This implies that a = b + (δi + δj ) ∈ ZH. Conversely, it is obvious that ae = ao if a ∈ ZH. (b) (i) ⇒ (ii): Note that ℓ(h(e)) / E(G). P ≤ r(h(e)) for any e ∈ E(G) since {1, 2n} ∈ Now given a ∈ H. Then a = e∈E(G) ce h(e), where ce is a non-negative integer for P P each e ∈ E(G). It follows that ℓ(a) = e∈E(G) ce ℓ(h(e)) ≤ e∈E(G) ce r(h(e)) = r(a), as required. 23 (ii) ⇒ (i): We use induction on ℓ(a). If ℓ(a) = 0, we see that a ∈ H by induction on ae as in the proof of (a). Assume that ℓ(a) > 0. Without restriction we may further assume that a1 ≥ a2n . Then X ae − a2n = ai > 0, i∈even, i6=2n for otherwise ae = a2n ≤ a1 < ao , a contradiction. (For the inequality a1 < ao we used that 0 < ℓ(a) ≤ r(a) = a3 + a5 + · · · + a2n−1 .) Hence there exists an even number j 6= 2n with aj > 0. Set b = a − (δ1 + δj ). Then b ∈ H by induction and so a = b + (δ1 + δj ) ∈ H.  Corollary 3.14. Let a ∈ ZH with ai ≥ 0 for all i ∈ [2n]. Then either a ∈ H or a = b + k(δ1 + δ2n ), where k ≥ 1 and b ∈ H with ℓ(b) = r(b). Proof. Suppose that a ∈ / H. Then ℓ(a) > r(a), by Lemma 3.13. Note that by Lemma 3.13 we have ae = ao , and hence ℓ(a) −r(a) = a1 + a2nP −(ae −a2n ) −(ao −a1 ) is an even number, say 2k. Set b = (a1 − k)δ1 + (a2n − k)δ2n + i∈{1,2n} ai δi . Suppose / that a1 < k. Then X X a2n = 2k − a1 + ai > a1 + ai ≥ ao , i∈{1,2n} / i∈{1,2n} / a contradiction, because ae = ao . Therefore a1 ≥ k. Similarly, a2n ≥ k. Since ℓ(b) = r(b), Lemma 3.13 implies that b ∈ H. Moreover, a = b + k(δ1 + δ2n ) by the choices of k and b.  Lemma 3.15. Let a ∈ ZH such that E(Gn ) \ {e : a + h(e) ∈ H} contains no cycle. Then dimK KL = dimK Da . In particular, T 1 (R)a = 0. Proof. Let Γ′ be the graph with E(Γ′ ) = E(Gn ) \ {e : a + h(e) ∈ H}, and let Γ be the graph obtained from Γ′ by adding all vertices of Gn which do not belong to V (Γ′ ). Then Γ is a graph with no cycle and V (Γ) = [2n]. If Γ is a tree, then Γ is a spanning tree of Gn . If Γ is not a tree, we choose a connected component Γ0 of Γ and let Γ1 be the induced graph of Γ on the set [2n] \ V (Γ0 ). Since Gn is connected there exists an edge e of Gn with one end in V (Γ0 ) and the other end in V (Γ1 ). We let Γ′′ be the graph obtained from Γ by adding the edge e. Since neither Γ0 nor Γ1 contains a cycle, it follows that Γ′′ has also no cycle, but one more edge than Γ. Proceeding in this way we obtain after finitely many steps a spanning tree T of Gn which contains E(Gn ) \ {e : a + h(e) ∈ H}. In particular, there exists a subset of {e : a + h(e) ∈ H}, say {e1 , . . . , ek } such that E(T ) = E(Gn ) \ {e1 , e2 , . . . , ek }. Since all spanning trees have the same number of edges, namely, 2n − 1, it follows that k = n2 − 2n. For each i = 1, . . . , k, T + ei contains a unique induced cycle, say Ci . Then for all i = 1, . . . , k we have vi (i) ∈ {±1} and vi (j) = 0 if j 6= i and 1 ≤ j ≤ k. Here vi = v(Ci ), the vector corresponding to the cycle Ci , for i = 1, . . . , k. It follows that dimK Da ≥ k since (v1 (i), . . . , vk (i), . . . , vs1 (i)) ∈ Da for i = 1, . . . , k. Here s1 is the number of induced cycles of Gn . On the other hand, dimK Da ≤ dimK KL and 24 dimk KL = |E(Gn )| − |V (Gn )| + 1 which is equal to k = n2 − 2n. It follows that dimK KL = dimK Da , completing the proof by Proposition 1.2.  Proof of Proposition 3.12. (a) Since G3 is associated with a polyomino containing 8 vertices, we have R(= K[G3 ]) is semi-rigid by Corollary 3.11. Let a = δ6 −δ1 −δ2 −δ4 . Then KLa is spanned by the vectors corresponding to the cycles C1 : 3, 2, 5, 4, C2 : 3, 4, 5, 6 and C3 : 3, 2, 5, 6. This implies that dimK KLa = 2. Since dimK Da = 0 and dimK KL = 3, we have T 1 (R)a 6= 0. In particular, R is not rigid, as required. P (b) Let a = i∈[2n] ai δi ∈ ZH. We want to prove that T 1 (R)a = 0. There are following cases to consider. Case 1 : ai ≥ 0 for all i. By Corollary 3.14, either a ∈ H or a = b+k(δ1 +δ2n ), where k ≥ 1 and b ∈ H with ℓ(b) = r(b). If a ∈ H, then T 1 (R)a = 0, see Corollary 1.4. If a = b + k(δ1 + δ2n ) with k = 1, then for any edge e = {i, j} with e ∩ {1, 2n} = ∅, we have a + δi + δj ∈ H by Lemma 3.13. It follows that E(G) \ {e : a + h(e) ∈ H} contains no cycle, and so T 1 (R)a = 0 by Lemma 3.15. If k = 2, then for any induced cycle C, a + h(v(C)) ∈ H if and only if V (C) ∩ {1, 2n} = ∅. This follows from Lemma 3.13 and the fact that any induced cycle of Gn is a 4-cycle. To prove KL = KLa , we have to show if V (C) ∩ {1, 2n} = ∅, then v(C) ∈ KLa . Given an induced cycle C : i1 , i2 , i3 , i4 with V (C) ∩ {1, 2n} = ∅, where i1 , i3 are even and i2 , i4 are odd. Then we obtain two cycles C1 : i1 , i2 , i3 , 1 and C2 : i3 , i4 , i1 , 1. Note that v(C1 ), v(C2 ) ∈ KLa and v(C) is a linear combination of v(C1 ), v(C2), we have KL = KLa and so T 1 (R)a = 0. If k ≥ 3, then for any induced cycle C, one has a + h(v(C)) ∈ / H by Lemma 3.13 and so KLa = KL. In particular, T 1 (R)a = 0. Case 2: There exists a unique i ∈ [2n] with ai < 0. If ai ≤ −2, then Fa′ = ∅ and so KLa = KL. In particular T 1 (R)a = 0. Hence we assume ai = −1. By symmetry, we only need to consider the cases when i = 1 and when i = 3. We first assume that i = 1. Since ae = ao , there exists an odd integer j 6= 1 such that aj > 0, and so a = b + δj − δ1 , where be = bo and bℓ ≥ 0 for each ℓ ∈ [2n]. By Corollary 3.14, either b ∈ H or b = c + k(δ1 + δ2n ) with c ∈ H and k > 0. The second case cannot happen because a1 = −1. Hence for any e ∈ E(G), a + h(e) ∈ H if and only if 1 ∈ e. In other words, a + h(e) ∈ H if and only if e ∈ {{1, 2}, {1, 4}, . . . , {1, 2n − 2}}. Denote {1, 2i} by ei for i = 1, . . . , n − 1. Let Ci be the cycle 1, 2i, 3, 2n − 2 and let vi = v(Ci ) for i = 1, . . . , n − 2. Then for i = 1, . . . , n − 2, we have vi (i) ∈ {±1} and vi (j) = 0 for j 6= i and j = 1, . . . , n − 2. This implies that dimK Da ≥ n − 2. To compute dimK KLa , we notice that if C is an induced cycle with 1 ∈ / V (C), then a + h(v(C)) ∈ / H and thus KLa contains the cycle space of the complete bipartite graph with bipartition {3, 5, . . . , 2n − 1} and {2, . . . , 2n}, which has the dimension (n − 1)n − n − (n − 1) + 1 = n2 − 3n + 2, see (10). Thus T 1 (R)a = 0 because dimK Da = n2 − 2n. Next we assume that i = 3. Then a = b + δj − δ3 , where bℓ ≥ 0 for all ℓ ∈ [2n] and be = bo , j 6= 3 and j is odd. Moreover by Corollary 3.14, we have either b ∈ H or b = c + k(δ1 + δ2n ) for some k ≥ 1 and with c ∈ H and ℓ(c) = r(c). Suppose first that b ∈ / H and k ≥ 2. Then for any cycle C, a + h(v(C)) ∈ H 25 implies V (C) ∩ {1, 2n} = ∅. Thus, similarly as in Case 1 we see that KLa = KL and T 1 (R)a = 0. Suppose next that j 6= 1 and that b ∈ H or b ∈ / H and k = 1. Then a + h(e) ∈ H for any e ∈ {{3, 2}, . . . , {3, 2n − 2}}. Denote {3, 2t} by et for t = 1, . . . , n−1. For t = 1, . . . , n−1, let Ct be the cycle 3, 2t, 5, 2n and let vt = v(Ct ), the vector corresponding to Ct . Then vt (t) ∈ {±1} for t = 1, . . . , n − 1 and vt (k) = 0 for k 6= t. This implies that dimK Da = n − 1. On the other hand, KLa contains the cycle space of the subgraph of Gn induced on {1, 5, . . . , 2n − 1} ∪ {2, 4, . . . , 2n}, which has the dimension n2 − 3n + 1. Thus T 1 (R)a = 0. Finally suppose that j = 1 and that and also k = 1 if b ∈ / H. If b ∈ H, then we check that a + h(e) ∈ H for any e ∈ {{3, 2}, . . . , {3, 2n − 2}} and deduce that T 1 (R)a = 0, in the same process as in the last case. If b ∈ / H and k = 1, then for any induced cycle C, we have a + h(v(C)) ∈ H if and only if 3 ∈ V (C) and {1, 2n} ∩ V (C) = ∅. We claim that KLa = KL. Given an induced cycle C : 3, i1 , i2 , i3 with a + h(v(C)) ∈ H. Here i1 and i3 are even and i2 is odd. We let C1 : 3, i1 , i2 , 2n and C2 : i2 , i3 , 3, 2n. Then v(C1) and v(C2 ) belong to KLa and v(C) is a linear combination of v(C1 ) and v(C2 ). Thus KLa = KL, as claimed. In particular, T 1 (R)a = 0. Case 3: |{k : ak < 0}| = 2. Without restriction we may assume ai = aj = −1 for some i 6= j. Indeed, if some ak ≤ −2, then Fa′ = ∅ by Lemma 3.13 and so T 1 (R)a = 0. Assume first that both i and j are even. Then for any induced cycle C such that {i, j} * V (C), we have v(C) ∈ KLa . Let C : k, i, ℓ, j be a cycle with {i, j} ⊆ V (C). We choose an even number d ∈ [2n] \ {i, j, 2n}. Then we obtain two cycles C1 :k, i, ℓ, d and C2 :ℓ, j, k, d. Since v(C) is a linear combination of v(C1) and v(C2 ) and since v(Ct ) ∈ KLa for t = 1, 2, we have v(C) ∈ KLa and thus KLa = KL. In particular T 1 (R)a = 0. Next assume that i is even and j is odd and {i, j} = 6 {1, 2n}. Notice that we can write a as a = b + k(δ1 + δ2n ) − (δi + δj ), where b ∈ H and k ≥ 0. Moreover, if k > 0 then ℓ(b) = r(b). If k = 0, then dimK Da = 1, and KLa contains the cycle space of the graph which is obtained from Gn by deleting the edge {i, j}. Hence dimK KLa ≥ dimK KL − 1, and so T 1 (R)a = 0. If k = 1, then for any induced cycle C, we have a + h(v(C)) ∈ H if and only if {i, j} ⊆ V (C) and V (C) ∩ {1, 2n} = ∅. Let C : i, j, k, ℓ be an induced cycle such that a + h(v(C)) ∈ H. Then the vectors v1 , v2 which correspond to cycles j, k, ℓ, 2n and ℓ, i, j, 2n respectively belong to KLa and v(C) is a linear combination of v1 , v2 . It follows that KL = KLa and T 1 (R)a = 0. If k ≥ 2, we first note that {i, j} ∩ {1, 2n} = ∅. Indeed, if {i, j} ∩ {1, 2n} = 6 ∅, ′ then either ai ≥ 1 or aj ≥ 1, a contradiction. Thus Fa = ∅ by Lemma 3.13 and it follows that KL = KLa . In particular T 1 (R)a = 0. Finally assume that {i, j} = {1, 2n}. Then a = b − δ1 − δ2n with b ∈ H and so Fa′ = ∅. It follows that KLa = KL and T 1 (R)a = 0. Case 4: |{k : ak < 0}| = 3. We may assume that ai = aj = ak = −1. We only need to consider the case when Fa′ 6= ∅. So we may assume i, k are even and j is odd, and {1, 2n} * {i, j, k}. Let C : i, j, k, ℓ be an induced cycle such that 26 a+h(v(C)) ∈ H. We choose an even number d ∈ [2n]\{i, k, 2n} and let C1 : j, k, ℓ, d and C2 : ℓ, i, j, d be two cycles in Gn . Then v(C1 ) and v(C2 ) belong to KLa and v(C) is a linear combination of v(C1 ) and v(C2 ). This implies KLa = KL, and in particular, T 1 (R)a = 0. Case 5: |{k : ak < 0}| ≥ 4. If |{k : ak < 0}| = 4, we may assume that ai = aj = ak = aℓ = −1. Then for any induced cycle C, a + h(v(C)) ∈ H implies that V (C) = {i, j, k, ℓ}. We may assume that i and k are even numbers. Let t be an odd number in [2n] \ {j, ℓ}, and let C1 : i, j, k, t and C2 : k, l, i, t be 4-cycles of Gn . Since v(C) is a linear combination of v(C1 ) and v(C2 ), we have KLa = KL, and consequently, T 1 (R)a = 0. If |{k : ak < 0}| > 4, then Fa′ = ∅ and so T 1 (R)a = 0. Thus we have shown that T 1 (R)a = for all a, and this shows that R is rigid, as desired.  References [1] K. Altmann, Computation of the vector space T 1 for affine toric varieties, J. Pure Appl. Algebra 95 (1994) 239–259 [2] K. Altmann, Minkowski sums and homogeneous deformations of toric varieties, Tóhoku Math. J. 47 (1995) 151–184 [3] K. Altmann, M. Bigdeli, J. Herzog, D. Lu, Algebraically rigid simplicial complexes and graphs, arXiv:1503.08080 [4] K. Altmann, J. A. Christophersen, Deforming Stanley-Reisner schemes, Math. Ann. 348 (2010), 513–537. [5] K. Altmann, J. A. Christophersen, Cotangent cohomology of Stanley-Reisner rings. Manuscripta Math. 115 (2004), 361–378. [6] W. Bruns, J. Herzog, Cohen-Macaulay rings, Cambridges Studies in Advanced Mathematics, 39, 1993. [7] V. Ene, J. Herzog, Gröbner bases in Commutative Algebra, Graduate Studies in Mathematics 130, AMS 2012. [8] J. Herzog, Generators and relations of abelian semigroups and semigroup rings, Manuscripta Math. 3 (1970), 175–193. [9] A. A. Qureshi, Ideals generated by 2-minors, collections of cells and stack polyominoes, J. Algebra, 357 (2012), 279–303. [10] H. Ohsugi, T. Hibi, Koszul bipartite graphs, Advances in Applied Mathematics, 22 (1999) 25–28. [11] H. Ohsugi, T. Hibi, Toric ideals generated by quadratic binomials, J. Algebra. 218 (1999), 509–527. [12] J. Stevens, Deformations of singularities, Lecture Notes in Mathematics (1811), Berlin: Springer, 2003. [13] R. Villarreal, Monomial Algebras, Pure and Applied Mathematics, Marcel Dekker, 2001. Mina Bigdeli, Faculty of Mathematics, Institute for Advanced Studies in Basic Sciences (IASBS), 45195-1159 Zanjan, Iran E-mail address: [email protected] Jürgen Herzog, Fakultät für Mathematik, Universität Duisburg-Essen, 45117 Essen, Germany E-mail address: [email protected] 27 Dancheng Lu, Department of Mathematics, Soochow University, 215006 Suzhou, P.R.China E-mail address: [email protected] 28
0math.AC
A New Approach to Probabilistic Programming Inference arXiv:1507.00996v2 [stat.ML] 9 Jul 2015 Frank Wood Department of Engineering University of Oxford Jan Willem van de Meent Vikash Mansinghka Department of Statistics Computer Science & AI Lab Columbia University Massachusetts Institute of Technology Abstract We introduce and demonstrate a new approach to inference in expressive probabilistic programming languages based on particle Markov chain Monte Carlo. Our approach is simple to implement and easy to parallelize. It applies to Turing-complete probabilistic programming languages and supports accurate inference in models that make use of complex control flow, including stochastic recursion. It also includes primitives from Bayesian nonparametric statistics. Our experiments show that this approach can be more efficient than previously introduced single-site Metropolis-Hastings methods. 1 Introduction Probabilistic programming differs substantially from traditional programming. In particular, probabilistic programs are written with parts not fixed in advance that instead take values generated at runtime by random sampling procedures. Inference in probabilistic programming characterizes the conditional distribution of such variables given observed data assumed to have been generated by executing the probabilistic program. Exploring the joint distribution over program execution traces that could have generated the observed data using Markov chain sampling techniques is one way to produce such a characterization. We propose a novel combination of ideas from probabilistic programming [3] and particle Markov chain Monte Carlo (PMCMC) [1] that yields a new scheme for exploring and characterizing the set of probable execution traces. As our approach is based on repeated simulation of the probabilistic program, it is easy to implement and parallelize. We show that our approach supports accurate inference in models that make use of complex control flow, including stochastic recursion, as well as primitives from nonparametric Bayesian statistics. Our experiments also show that this approach can be more efficient than previously introduced single-site Metropolis-Hastings (MH) samplers [12]. 2 Language The probabilistic programming system Anglican1 exists in two versions. The results in this paper were obtained using what is now called interpreted Anglican2 which employed an interpreted execution model and a language syntax derived from the Venture3 modeling language. Since the time of original publication, both the syntax and execution model have been changed. The Venture style syntax is now deprecated, with the new version using a syntax much closer to that of Anglican’s host language Clojure. This new Anglican version4 , simply called Anglican, is a compiled language; a continuation-passing style (CPS) transformation compiles Anglican programs into Clojure programs that are then subsequently compiled to Java Virtual Machine (JVM) bytecode by the Clojure justin-time compiler. The change in language execution model and syntax affect neither the substance or the claims of this paper, however, readers wishing to experiment with the language starting from the code examples appearing in Section 4 would do well to note this evolution. What does change is the absolute time required to perform inference in the given models. In general, the latest compiled version of Anglican is ten to one hundred times faster than its interpreted ancestor. 1 This paper, which originally appeared in the Proceedings of the 17th International Conference on Artificial Intelligence and Statistics (AISTATS) 2014, has been updated to reflect changes in the latest version of the Anglican language. http://www.robots.ox.ac.uk/~fwood/anglican/ http://bitbucket.org/probprog/ interpreted-anglican 3 http://probcomp.csail.mit.edu/venture/ 4 http://bitbucket.org/probprog/anglican 2 A New Approach to Probabilistic Programming Inference 2.1 Original Venture-Style Syntax The original, deprecated Anglican syntax is a Scheme/Lisp-dialect that is extended with three toplevel special forms that we refer to as directives [ assume symbol < expr >] [ observe < expr > < const >] [ predict < expr >] Here, each <expr> is a Scheme/Lisp-syntax expression, symbol is a unique symbol, and <const> is a constantvalued deterministic expression. Semantically assume’s are (random) variable (generative) declarations, observe’s condition the distribution of assume’d variables by (noisily) constraining the output values of (random) functions of assume’d variables to match observed data, and predict’s are “watches” which report on (via print out) the values of variables in program traces as they are explored. In Anglican, probabilistic program interpretation is taken to be a forever-continuing exploration of the space of execution traces that obey (where hard) or reflect (where soft) the observe’d constraints in order to report functions (via predict’s) of the conditional distribution of subsets of the assume’d variables. Like Scheme/Lisp, Anglican eagerly and exchangeably recursively “evaluates” subexpressions, for instance of <expr> = (<proc> <arg> . . . <arg>), before “applying” the procedure (which may be a random procedure or special form) resulting from evaluating the first expression <proc> to the value of its arguments. Anglican counts applications, reported as a computational cost proxy in Sec 4. Anglican supports several special forms, notably (lambda (<arg> . . . <arg>) <body>)) which allows creation of new procedures and (if <pred> <cons> <alt>) which supplies branching control flow; also begin, let, define, quote, and cond. Anglican exposes eval and apply. Built-in deterministic procedures include list, car, cdr, cons, mem, etc., and arithmetic procedures +, -, \, etc. All randomness in the language originates from builtin “random primitives” of which there are two types. Elementary random primitives, such as poisson, gamma, flip, discrete, categorical, and normal, generate independent and identically distributed (i.i.d.) samples when called repeatedly with the same arguments. Exchangeable random primitives, such as crp or beta-bernoulli, return a random procedure with internal state that generates an exchangeably distributed samples when called repeatedly. In the interpreted version of Anglican the outer <proc> in all observe <expr>’s must be a built-in random primitive, which guarantees that likelihood of output given arguments can be computed exactly. 2.2 New Clojure-Style Syntax The compiled version of Anglican now supports a syntax that more closely integrates with the host language Clojure. The macro defquery defines an Anglican program from within Clojure ( defquery symbol [ arg1 arg2 ...] < body >) Here symbol is the name of the program, and the arguments may be used to pass values of parameters or observed variables to the program. The set of allowable body expressions <body> is a subset of the Clojure language, in which all basic Clojure language forms and first order primitives are supported. Macros and higher-order functions are not inherited from Clojure, although a subset of macros5 and higher-order functions6 has been implemented. In the CPS version of Anglican, random primitives such as normal and discrete return first class distribution objects, rather than sampled values, and, furthermore, are user programmable without requiring modifications to the Anglican compiler. The special forms sample and observe associate values with random variables drawn from a distribution ( sample < dist >) ( observe < dist > < value >) The language additionally provides a data type for sequences of random variables that are not i.i.d., which we refer to as a random process. A random process implements two operations ( produce < process >) ( absorb < process > < value >) The produce primitive returns a distribution object for the next random variable in the sequence. The absorb primitive returns an updated random process instance, in which a value has been associated with the next random variable in the sequence. A random process is most commonly used to represent an exchangeably distributed sequence of random variables, but it may be used to represent any sequence of random variables for which it is possible to construct a distribution on the next variable given preceding variables. Random process constructors are customarily identified with uppercase names (e.g. CRP) and, in the same manner as before, are user programmable. Finally, the predict form may be used at any point in the program to generate labeled output values ( predict < label > < expr >) 5 when, cond map, reduce, filter, some, repeatedly, comp, partial 6 Frank Wood, Jan Willem van de Meent, Vikash Mansinghka Given a previously defined query, inference may be performed using the doquery macro ( doquery algorithm < symbol > [ < arg1 > < arg2 > ...] < opt1 > < opt2 > ...) The inference algorithm may be specified using an algorithm keyword, and any options to the inference algorithm can be supplied as arguments as well. The doquery macro constructs a lazy sequence of program execution states that contain predicted values and optionally an importance weight, which may then be consumed and analyzed by, for instance, an outer Clojure or Java program. 3 Inference An execution trace is the sequence of memory states resulting from the sequence of function applications performed during the interpretation of a program. In probabilistic programming systems like Anglican any variable may be declared as being the output of a random procedure. Such variables can take different values in independent interpretations of the program. This leads to a “many-worlds” computational trace tree in which, at interpretation time, there is a branch at every random procedure application. To define the probability of a single execution trace, first fix an ordering of the exchangeable lines of the program and index the observe lines by n. Let p(yn |θtn , xn ) be the likelihood of the observe’d output yn where tn is a random procedure type (i.e. gamma, poisson, etc.), θtn is its argument (possibly multidimensional), and xn is the set of all random procedure application results computed before the likelihood of observation yn is evaluated. Both the type tn and the parameter θtn can be functions of any in-scope subset of xn . We can then define the probability of an execution trace to be p̃(y, x) ≡ N Y p(yn |θtn , xn )p̃(xn |xn−1 ) (1) n=1 where y is the set of all observe’d quantities, x is the set of all random procedure application results, and ∼ marks distributions which we can only sample. The number and type of all random procedure applications performed before the nth observe may vary in one program trace to the next. We define the probability of the sequence of their outputs xn to be p̃(xn |xn−1 ) (2) |xn \xn−1 | = Y k=1 p(xn,k |θtn,k , xn,1:(k−1) , xn−1 ). Here x0 = ∅ is the empty set and xn,j:k are the j to kth values generated by random procedure applications in the trace up to observation likelihood computation n. The cardinality of the set xn \ xn−1 , notated | · |, arises implicitly as the total number of random procedure applications in a given execution trace. As before, θtn,k are the arguments to, and tn,k the type of, the (n, k)th random procedure – both of which may be functions of subsets of in-scope subsets of variables xn:1,(k−1) ∪xn−1 . Note that xn−1 ⊆ xn . Also note that variable referencing defines a directed conditional dependency structure for the probability model encoded by the program, i.e. xn,k need not (and often cannot due to variable scoping) depend on the outputs of all previous random procedure applications. We use sampling to explore and characterize the distribution p̃(x|y) ∝ p̃(y, x), i.e. the distribution of all random procedure outputs that lead to different program execution traces, conditioned on observed data. Related approaches include rejection sampling [3], singlesite MH [3, 12]. All members of the set of all directed probabilistic models with fixed-structure joint distributions can be expressed as probabilistic programs that “unroll” in all possible execution traces into an equivalent joint distribution. As Church-like probabilistic programming frameworks, Anglican included, support recursive procedures and branching on the values returned by random procedures, the corresponding set of models is a superset of the set of all directed graphical models. Other related efforts eschew Turing-completeness and operate on a restricted set of models [11, 9, 7, 10] where inference techniques other than sampling can more readily be employed. 3.1 A New Approach Towards our new approach to probabilistic programming inference, first consider a standard sequential Monte Carlo (SMC) recursion for sampling from a sequence of intermediate distributions that terminates in p̃(x|y) ∝ p̃(y, x) where x and y are as before, and the joint is given by Eq.’s 1 and 2. Note that a sequence of intermediate approximating distributions can be constructed from any syntactically allowed reordering of p̃(x1 )p̃(x2 |x1 ) · · · p̃(xn |xn−1 )p(y1 |x1 ) · · · p(yn |xn ). Assume that observation likelihoods are pushed as far left in this sequence of approximating distributions as possible; however it is clear how to proceed if this is not the case. Assume we have 1 ≤ ` ≤ L unweighted (`) samples xn−1 ∼ p̃(xn−1 |y1:(n−1) ) and that from these we will produce approximate samples from p̃(xn |y1:n ). A New Approach to Probabilistic Programming Inference To do so via importance sampling we may choose any proposal distribution q(xn |xn−1 , y1:n ). Sampling from this and weighting by the discrepancy between it and the distribution of interest, p̃(xn , y1:n ), we ar(`) rive at samples with unnormalized weights w̃n = (`) (`) (`) p̃(x̂n , y1:n )/q(x̂n |xn−1 , y1:n ). Here hats notate the difference between weighted and unweighted samples, those with being weighted and vice versa. This expression simplifies substantially in the “propose from the prior” case where the proposal distribution is defined to be the continued interpretation of the program from observation likelihood evaluation n − 1 (`) (`) (`) (`) to n, i.e. q(x̂n |xn−1 , y1:n ) ≡ p(x̂n |xn−1 ). In this case (`) (`) the weight simplifies to w̃n = p(yn |x̂n ). Sampling P (`) (`) an unweighted particle set xn ∼ ` wn δx̂(`) , where n P (`) (`) (j) wn = w̃n / j w̃n , completely describes SMC for probabilistic program inference. The SMC procedure described is, to first approximation, the inner loop of PMCMC. It corresponds to a procedure whereby the probabilistic program is interpreted in parallel (possibly each particle in its own thread or process) between observation likelihood calculations. Unfortunately, SMC with a finite set of particles is not itself directly viable for probabilistic programming inference for all the familiar reasons: particle degeneracy, inefficiency in models with global, continuous parameters, etc. PMCMC, on the other hand, is directly viable. PMCMC for probabilistic programming inference is a MH algorithm for exploring the space of execution traces that uses SMC proposals internally. This, unlike prior art, allows sampling of execution traces with changes to potentially many more than one variable at a time. The particular variant of PMCMC we discuss in this paper is Particle-Gibbs (PG) although we have developed engines based on other PMCMC variants including particle independent Metropolis Hastings and conditional sequential Monte Carlo too. PG works by iteratively re-running SMC, with, on all but the first sweep, reinsertion of a “retained” particle trace into the set of particles at every stage of SMC. PG is theoretically justified as an MH transition operator that, like the Gibbs operator, always accepts [1, 4]. In this paper we describe PMCMC for probabilistic programming inference algorithmically in Alg.1 and experimentally demonstrate its relative efficacy for probabilistic programming inference. In Alg. 1 the function r(N, S) stands for multinomial sample N items from the set of pairs S = {{w1 , θ1 }, . . . , {wM , θM }}, where each element of S consists of an unnormalized weight wm and interpreter memory states θm . For each sample value θm returned, the function r also returns the original, corresponding unnormalized weight wm . This kind of weight bookkeeping retains, for all particles, the results of the outermost observe likelihood function applications so that the unnormalized weights are available in the retained particle {w∗ , x∗ } in the next sweep. Algorithm 1 PMCMC for Prob. Prog. Inference L ← number of particles S ← number of sweeps (`) (`) {w̃N , xN } ← Run SMC for s < S do (`) {·, x∗N } ← r(1, {1/L, xN }) (`) {·, x0 } ← initialize L − 1 interpreters for d ∈ ordered lines of program do for ` < L − 1 do (`) (`) x̄n−1 ← fork(xn−1 ) end for if directive(d) == “assume” then for ` < L − 1 do (`) (`) x̄n ← interpret(d, x̄n−1 ) end for (`) (`) {xn } ← {x̄n } ∪ x∗n else if directive(d) == “predict” then for ` < L − 1 do (`) interpret(d, x̄n−1 ) end for interpret(d, x∗n−1 ) else if directive(d) == “observe” then for ` < L − 1 do (`) (`) (`) {w̄n , x̄n } ← interpret(d, x̄n−1 ) end for (`) (`) T ← r(L − 1, {w̄n , x̄n } ∪ {w̃n∗ , x∗n }) (`) (`) {w̃n , xn } ← T ∪ {w̃n∗ , x∗n } end if end for end for In Alg. 1 “Run SMC” means running one sweep of the s loop with L particles and no retained particle, d is a program line, and fork(·) means to copy the entire interpreter memory datastructure (efficient implementations have characteristics similar to POSIX fork() [8]). The command interpret(d, ·) means execute line d in the given interpreter. Only when interpreting an observe must the interpreter return a weight, that being result of the outermost apply of the observe statement. Bars indicate temporary data structures, not averages. All sets are ordered with unions implemented by append operations. Note that there are more efficient PMCMC algorithms for probabilistic programming inference. In particular, there is no reason to fork unless an observe has just Frank Wood, Jan Willem van de Meent, Vikash Mansinghka been interpreted. Alg. 1 is presented in this form for expositional purposes. 3.2 proposal density can now be expressed in a similar fashion in terms of x\x0 and x ∩ x0 = x0 ∩ x, allowing the full acceptance probability to be written as Random Database We refer to the MH approach to sampling over the space of all traces proposed in [12] as “random database” (RDB). A RDB sampler is a MH sampler where a single variable drawn in the course of a particular interpretation of a probabilistic program is modified via a standard MH proposal, and this modification is accepted by comparing the value of the joint distribution of old and new program traces. For completeness we review RDB here, noting a subtle correction to the acceptance ratio proposed in the original reference which is proper for a larger family of models. The RDB sampler employs a data structure that holds all random variables x associated with an execution trace, along with the parameters and log probability of each draw. Note that interpretation of a program is deterministic conditioned on x. A new proposal trace is initialized by picking a single variable xm,j from the |x| random draws, and resampling its value using a reversible kernel κ(x0m,j |xm,j ). Starting from this initialization, the program is rerun to generate a new set of variables x0 that correspond to a new valid execution trace. In each instance where the random procedure type remains the same, we reuse the existing value from the set x, rescoring its log probability conditioned on the preceding variables where necessary. When the random procedure type has changed, or a new random variable is encountered, its value is sampled in the usual manner. Finally, we compute the probability p(y|x0 ) by rescoring each observe as needed, and accept with probability   p(y|x0 )p(x0 )q(x|x0 ) . (3) min 1, p(y|x)p(x)q(x0 |x) In order to calculate the ratio of the proposal probabilities q(x0 |x) and q(x|x0 ), we need to account for the variables that were resampled in the course of constructing the proposal, as well as the fact that the sets x0 and x may have different cardinalities |x0 | and |x|. We will use the (slightly imprecise) notation x0 \x to refer to the set of variables that were resampled, and let x0 ∩ x represent the set of variables common to both execution traces. The proposal probability is now given by q(x0 |x) = κ(x0m,j |xm,j ) p(x0 \x | x0 ∩ x) . |x| p(x0m,j |x0 ∩ x) (4) In our implementation, the initialization x0m,j is simply resampled conditioned on the preceding variables, such that κ(x0m,j |xm,j ) = p(x0m,j |x0 ∩ x). The reverse p(y|x0 ) p(x0 ) |x| p(x\x0 | x ∩ x0 ) . p(y|x) p(x) |x0 | p(x0 \x | x0 ∩ x) 4 (5) Testing Programming probabilistic program interpreters is a non-trivial software development effort, involving both the correct implementation of an interpreter and the correct implementation of a general purpose sampler. The methodology we employ to ensure correctness of both involves three levels of testing; 1) unit tests, 2) measure tests, and 3) conditional measure tests. 4.1 Unit and Measure Tests In the context of probabilistic programming, unit testing includes verifying that the interpreter correctly interprets a comprehensive set of small deterministic programs. Measure testing involves interpreting short revealing programs consisting of assume and predict statements (producing a sequence of ancestral, unconditioned samples, i.e. no observe’s). Interpreter output is tested relative to ground truth, where ground truth is computed via exhaustive enumeration, analytic derivation, or some combination, and always in a different, well-tested independent computational system like Matlab. Various comparisons of the empirical distribution constructed from the accumulating stream of output predicts’s and ground truth are computed; Kulback-Leibler (KL) divergences for discrete sample spaces and Kolmogorov Smirnov (KS) test statistics for continuous sample spaces. While it is possible to construct distribution equality hypothesis tests for some combinations of test statistic and program we generally are content to accept interpreters for which there is clear evidence of convergence towards zero of all test statistics for all measure tests. Anglican passed all unit and measure tests. 4.2 Conditional Measure Tests Measure tests involving conditioning provide additional information beyond that provided by measure and unit tests. Conditioning involves endowing programs with observe statements which constrain or weight the set of possible execution traces. Interpreting observe statements engages the full inference machinery. Conditional measure test performance is measured in the same way as measure test performance. They are also how we compare different probabilistic programming inference engines. A New Approach to Probabilistic Programming Inference 24 2 4 22 2 2 2 0 -2 2 2-4 2 6 2 4 2 2 2 0 101 102 Simulation 2 -4 2 104 103 -2 2 2 -4 2 -6 5 10 6 10 randomdb -6 10 1 10 2 10 2-10 0 10 3 pmcmc randomdb 1 10 2 3 10 10 Simulation 24 2-4 2-6 pmcmc randomdb 2-8 105 104 Apply 10 3 10 Simulation 4 10 2 2 0 2 -2 2 -4 2 -6 2 -8 2 -10 2 -12 pmcmc randomdb 104 105 Apply 106 10 1 10 2 10 3 0.5 marginal 0.4 randomdb pmcmc 0.3 0.2 1 10 10 1 100 10 0 pmcmc randomdb pmcmc randomdb 10 1 10 2 10 10-2 0 10 3 Time [s] 1 10 101 2 4 6 8 10 12 2 4 3 10 10 10 Simulation 100 150 pmcmc 10-1 10 15 r 20 10-2 randomdb 10 0 102 103 10 1 Time [s] posterior randomdb pmcmc 0.6 0.4 0.2 pmcmc randomdb randomdb 5 10 -2 0.8 200 enumerated -1 1.0 KS 50 10 pmcmc 100 0 randomdb -10 Number of Components 10-1 0 pmcmc KS 2 -8 0 CDF 10 2 4 2 0.0 107 106 KS KL 1 2 Prior 26 24 22 20 2-2 2-4 2-6 2-8 2-10 2-12 pmcmc randomdb 2 -6 (d) Marsaglia Posterior KL KL 2 24 22 20 2-2 2-4 2-6 2-8 2-10 2-12 0 10 2 0.1 (c) Branching 6 -4 Time [s] 2 2 2 0.6 -2 Apply 6 10 20 -10 2 -2 2 4 22 2 1 0 7 0 2 pmcmc Random DB 10 2 -8 2 1 0 4 20 2 2 1 0 10 2 2-4 Time [s] randomdb 2 2 Forward-Backward pmcmc 2 -6 PMCMC -2 4 -2 KL KL* 2-6 0 10 pmcmc randomdb 2 2 2 KL 20 2 6 KL 2 (b) DP Mixture 4 Frequency 26 KL* KL* (a) HMM 104 Apply 105 0.0 2 4 6 8 10 12 μ Figure 1: Comparative conditional measure test performance: PMCMC with 100 particles vs. RDB. 5 Inference Engine Comparison We compare PMCMC to RDB measuring convergence rates for an illustrative set of conditional measure test programs. Results from four such tests are shown in Figure 1 where the same program is interpreted using both inference engines. PMCMC is found to converge faster for conditional measure test programs that cor- respond to expressive probabilistic graphical models with rich conditional dependencies. The four test programs are: 1) a program that corresponds to state estimation in a hidden Markov model (HMM) with continuous observations (HMM: Program 5.1, Figure 1a), 2) a program that corresponds to learning an uncollapsed Dirichlet process (DP) mix- Frank Wood, Jan Willem van de Meent, Vikash Mansinghka ture of Gaussians with fixed hyperparameters (DP Mixture: Program 5.2, Figure 1b), 3) a multimodal branching with deterministic recursion program that cannot be represented as a graphical model in which all possible execution paths can be enumerated (Branching: Program 5.3, Figure 1c), and 4) a program that corresponds to inferring the mean of a univariate normal generated via an Anglican-coded Marsaglia [6] rejection-sampling algorithm that halts with probability one and generates an unknown number of internal random variables (Marsaglia: Program 5.4, Figure 1d). We refer to 1) and 2) as “expressive” models because they have complex conditional dependency structures and 3) and 4) as simple models because the programs encode models with very few free parameters. 1) and 2) illustrate our claims; 3) and 4) are included to document the correctness and completeness of the Anglican implementation while also demonstrating that the gains illustrated in 1) and 2) do not come at too great a cost even for simple programs for which, a priori, PMCMC might be reasonably be expected to underperform. In Figures 1a-d there are three panels that report similar style findings across test programs and a fourth that is specific to the individual test program. In all, PMCMC results are reported for a single-threaded interpreter with 100 particles. The choice of 100 particles is largely arbitrary; our results are stable for a large range of values. PMCMC is dark blue while RDB is light orange. We report the 25% (lower dashed) median (solid) and 75% (upper dashed) percentiles over 25 runs with differing random number seeds. We refer to KL/KL∗ /KS as distances and compute each via a running average of the empirical distribution of predict statement outputs to ground truth starting at the first predict output. Note that lower is better. We define the number of simulations to be the number of times the program is interpreted in its entirety. For RDB this means that the number of simulations is exactly the number of sampler sweeps; for PMCMC it is the number of particles multiplied by the number of sampler sweeps. The time horizontal axes report wall clock time; the apply axes report the number of function applications performed by the interpreter. In the distance vs. time plots, observed single-threaded PMCMC wall-clock times are reported via filled circles; the left-ward dotted lines illustrate hypothetically what should be achievable via parallelism. Carefully note that PMCMC requires completing a number of simulations equal to the number of particles (here 100) before emitting batched predict outputs. This means that single-threaded implementations of PMCMC suffer from latency that RDB does not. Still, for some programs both the quality of PMCMC’s predict outputs and PMCMC’s convergence rate is faster even in direct wall clock time comparison to RDB. PMCMC appears to converge faster for some programs than RDB even relative to the number of function applications. Equivalent results were obtained relative to eval counts. 5.1 HMM New ( defquery hmm [ observations init-dist trans-dists obs-dists ] ( predict : states ( reduce ( fn [ states obs ] ( let [ state ( sample ( get trans-dists ( peek states )))] ( observe ( get obs-dists state ) obs ) ( conj states state ))) [( sample init-dist )] observations ))) Original (deprecated) [ assume in it i al -s t at e -d is t ( list (/ 1 3) (/ 1 3) (/ 1 3))] [ assume g e t - s t a t e - t r a n s i t i o n - d i s t ( lambda ( s ) ( cond ((= s 0) ( list .1 .5 .4)) ((= s 1) ( list .2 .2 .6)) ((= s 2) ( list .15 .15 .7))))] [ assume transition ( lambda ( prev-state ) ( discrete ( g e t - s t a t e - t r a n s i t i o n - d i s t prev-state )))] [ assume get-state ( mem ( lambda ( index ) ( if ( <= index 0) ( discrete in i ti a l- st a te - di st ) ( transition ( get-state (- index 1))))))] [ assume g e t - s t a t e - o b s e r v a t i o n - m e a n ( lambda ( s ) ( cond ((= s 0) -1) ((= s 1) 1) ((= s 2) 0)))] [ observe ( normal ( g et -s t at e -o bs - me a n ( get-state 1)) 1) .9] [ observe ( normal ( g et -s t at e -o bs - me a n ( get-state 2)) 1) .8] . . . [ observe ( normal ( g et -s t at e -o bs - me a n ( get-state 16)) 1) -1] [ predict ( get-state 0)] [ predict ( get-state 1)] . . . [ predict ( get-state 16)] The HMM program corresponds to a latent state inference problem in an HMM with three states, onedimensional Gaussian observations (.9, .8, .7, 0, -.025, 5, 2, 0.1, 0, .13, .45, 6, .2, .3, -1, -1), with known means and variances, transition matrix, and initial state distribution. The lines of the program were organized with the observe’s in “time” sequence. The KL∗ axis reports the sum of the Kulback-Leibler divergences between the running sample average state occupancy across all states of a HMM including the initial state and one trailing predictive state KL∗S = P PS 1 i DKL ( S s=1 δzi(s) ||γi ). Here δzi(s) (k) returns one if simulation s has latent state z at time step i equal to k and γi (k) is the true marginal probability of the latent state indicator zi taking value k at time step i. The vertical red line in the apply plot indicates the time and number of applies it takes to run forwardbackward in the Anglican interpreter. The fourth plot shows the learned posterior distribution over the latent state value for all time steps including both the initial state and a trailing predictive time step. While RDB produces a reasonable approximation to the true posterior, it does so more slowly and with greater residual error. A New Approach to Probabilistic Programming Inference 5.2 DP Mixture New ( defquery crp-mixture [ observations alpha mu beta a b ] ( let [ precision-prior ( gamma a b )] ( loop [ observations observations state-proc ( CRP alpha ) obs-dists {} states []] ( if ( empty ? observations ) ( do ( predict : states states ) ( predict : num-clusters ( count obs-dists ))) ( let [ state ( sample ( produce state-proc )) obs-dist ( get obs-dists state ( let [ l ( sample precision-prior ) s ( sqrt (/ (* beta l ))) m ( sample ( normal mu s ))] ( normal m ( sqrt (/ l )))))] ( observe obs-dist ( first observations )) ( recur ( rest observations ) ( absorb state-proc state ) ( assoc obs-dists state obs-dist ) ( conj states state ))))))) Original (deprecated) [ assume class-generator ( crp 1.72)] [ assume class ( mem ( lambda ( n ) ( class-generator )))] [ assume var ( mem ( lambda ( c ) (* 10 (/ 1 ( gamma 1 10)))))] [ assume mean ( mem ( lambda ( c ) ( normal 0 ( var c ))))] [ assume u ( lambda () ( list ( class 1) ( class 2) . . . ( class 9) ( class 10)))] [ assume K ( lambda () ( count ( unique ( u ))))] [ assume means ( lambda ( i c ) ( if (= i c ) ( list ( mean c )) ( cons ( mean i ) ( means (+ i 1) c ) )))] [ assume stds ( lambda ( i c ) ( if (= i c ) ( list ( sqrt (* 10 ( var c )))) ( cons ( var i ) ( stds (+ i 1) c ) )))] [ observe ( normal ( mean ( class 1)) ( var ( class 1))) 1.0] [ observe ( normal ( mean ( class 2)) ( var ( class 2))) 1.1] . . . [ observe ( normal ( mean ( class 10)) ( var ( class 10))) 0] [ predict ( u )] [ predict ( K )] [ predict ( means 1 ( K ))] [ predict ( stds 1 ( K ))] The DP mixture program corresponds to a clustering with unknown mean and variance problem modelled via a Dirichlet process mixture of one-dimensional Gaussians with unknown mean and variance (normalgamma priors). The KL divergence reported is between the running sample estimate of the distribution over the number of clusters in the data and the ground truth distribution over the same. The ground truth distribution over the number of clusters was computed for this model and data by exhaustively enumerating all partitions of the data (1.0, 1.1, 1.2, -10, -15, -20, .01, .1, .05, 0), analytically computing evidence terms by exploiting conjugacy, and conditioning on partition cardinality. The fourth plot shows the posterior distribution over the number of classes in the data computed by both methods relative to the ground truth. This program was written in a way that was intentionally antagonistic to PMCMC. The continuous likelihood parameters were not marginalized out and the observe statements were not organized in an optimal ordering. Despite this, PMCMC outperforms RDB per simulation, wall clock time, and apply count. 5.3 Branching New ( defn fib [ n ] ( loop [ a 0 b 1 m 0] ( if (= m n ) a ( recur b (+ a b ) ( inc m ))))) ( w i t h - p r i m i t i v e - p r o c e d u r e s [ fib ] ( defquery branching [] ( let [ count-prior ( poisson 4) r ( sample count-prior ) l ( if ( < 4 r ) 6 (+ ( fib (* 3 r )) ( sample count-prior )))] ( observe ( poisson l ) 6) ( predict : r r )))) Original (deprecated) [ assume fib ( lambda ( n ) ( cond ((= n 0) 1) ((= n 1) 1) ( else (+ ( fib (- n 1)) ( fib (- n 2))))))] [ assume r ( poisson 4)] [ assume l ( if ( < 4 r ) 6 (+ ( fib (* 3 r )) ( poisson 4)))] [ observe ( poisson l ) 6] [ predict r ] The branching program has no corresponding graphical model. It was designed to test for correctness of inference in programs with control logic and execution paths that can vary in the number of sampled values. It also illustrates mixing in a model where, as shown in the fourth plot, there is a large mismatch between the prior and the posterior, so rejection and importance sampling are likely to be ineffective. Because there is only one observation and just a single named random variable PMCMC and RDB should and does achieve essentially indistinguishable performance normalized to simulation, time and apply count. 5.4 Marsaglia New ( defm marsaglia-normal [ mu std ] ( let [ u ( u ni f or m- c on t in uo u s -1.0 1.0)] ( loop [ x ( sample u ) y ( sample u )] ( let [ s (+ (* x x ) (* y y ))] ( if ( < s 1.0) (+ mu (* std (* x ( sqrt (* -2.0 (/ ( log s ) s )))))) ( recur ( sample u ) ( sample u ))))))) ( defquery g au ss i an - ma rs a gl i a [ observations sigma mu0 sigma0 ] ( let [ mu ( marsaglia-normal mu0 sigma0 ) likelihood ( normal mu sigma )] ( reduce ( fn [ _ obs ] ( observe likelihood obs )) nil observations ) ( predict : mu mu ))) Original (deprecated) [ assume marsaglia-normal ( lambda ( mu std ) ( define x ( u n if o rm -c o nt i nu ou s -1.0 1.0)) ( define y ( u n if o rm -c o nt i nu ou s -1.0 1.0)) ( define s (+ (* x x ) (* y y ))) ( if ( < s 1) (+ mu (* std (* x ( sqrt (* -2.0 (/ ( log s ) s )))))) ( marsaglia-normal mu std )))] [ assume std ( sqrt 2)] [ assume mu ( marsaglia-normal 1 ( sqrt 5))] [ observe ( normal mu std ) (+ 8 1)] [ observe ( normal mu std ) 8] [ predict mu ] Frank Wood, Jan Willem van de Meent, Vikash Mansinghka Marsaglia is a test program included here for completeness. It is an example of a type of program for which PMCMC sometimes may not be more efficient. Marsaglia is the name given to the rejection form of the Box-Muller algorithm [2] for sampling from a Gaussian [6]. The Marsaglia test program corresponds to an inference problem in which observed quantities are drawn from a Gaussian with unknown mean and this unknown mean is generated by an Anglican implementation of the Marsaglia algorithm for sampling from a Gaussian. The KS axis is a Kolmogorov-Smirnov test statistic [5] computed by finding the maximum deviation between the accumulating sample and analytically derived ground truth cumulative distribution functions (CDF). Equal-cost PMCMC, RDB, and ground truth CDFs are shown in the fourth plot. Because Marsaglia is a recursive rejection sampler it may require many recursive calls to itself. We conjecture that RDB may be faster than PMCMC here because, while PMCMC pays no statistical cost, it does pay a computational cost for exploring program traces that include many random procedure calls that lead to rejections whereas RDB, due to the implicit geometric prior on program trace length, effectively avoids paying excess computational costs deriving from unnecessarily long traces. 26 24 4 22 2 20 20 KL KL* 22 2-2 2-4 2-6 2-4 2-8 -6 2 2-2 100 101 102 2-10 0 10 104 103 Simulation (a) HMM 101 102 104 103 Simulation (b) DP Mixture 2 6 2 4 2 4 2 2 2 0 2 2 2 0 2 -2 2 -4 2 -6 10 KL KL* Figure 2: Effect of program line permutations 0 10 1 10 2 10 3 Simulation (a) HMM 10 4 2 -2 2 -4 2 -6 2 -8 2 5.5 Line Permutation Syntactically and semantically observe and predict’s are mutually exchangeable (so too are assume’s up to syntactic constraints). Given this and the nature of PMCMC it is reasonable to expect that line permutations could effect the efficiency of inference. We explored this by randomly permuting the lines of the HMM and DP Mixture programs. The results are shown in Fig. 2 where blue lines correspond to median (out of twenty five) runs of PMCMC for each of twenty five program line permutations (including unmodified (dark) and reversed (light)) and orange are the same for RDB. For the HMM we found that the natural, time-sequence ordering of the lines of the program resulted in the best performance for PMCMC relative to RDB. This is because in this ordering the observe’s cause re-weighting to happen as soon as possible in each SMC phase of PMCMC. The effect of permuting code lines interpolates inference performance between optimal where PMCMC is best and adversarial orderings where RDB is instead. RDB performance is demonstrated here to be independent of the program line ordering. The DP Mixture results show PMCMC outperforming RDB on all program reorderings. Further, it can be seen that the original program ordering was not optimal with respect to PMCMC inference. While PMCMC presents the opportunity for significant gains in inference efficiency, it does not prevent programmers from seeking to further optimize performance manually. Programmers can influence inference performance by reordering program lines, in particular pushing observe statements as near to the front of the program as syntactically allowed, or restructuring programs to lazily rather than eagerly generate latent variables. Efficiency gains via automatic transformations or online adaptation of the ordering may be possible. 5.6 Number of Particles Fig. 3 shows the number of particles in the PMCMC inference engine affects performance. Performance improves as a function of the number of particles. In this plot the red line indicates 100 particles. Increasing from dark to light the number of particles plotted is 2, 5, 10, 20, 50, (red, 100), 200, and 500. -10 10 0 10 1 10 2 10 3 10 4 Simulation (b) DP Mixture Figure 3: Effect of particle count on performance 6 Discussion The PMCMC approach to probabilistic program interpretation appears to converge faster to the true conditiona distribution over program execution traces A New Approach to Probabilistic Programming Inference for programs that correspond to expressive models with dense conditional dependencies than single-site Metropolis-Hastings methods. That PMCMC converges faster in our tests even after normalizing for computational time is, to us, both surprising and striking. To reiterate, this includes all the computation done in all the particle executions. Current versions of Anglican include a multi-threaded inference core but work remains to achieve optimal parallelism due, in particular, to memory organization sub-optimality leading to excessive locking overhead. Using just a single thread, PMCMC surprisingly sometimes outperforms RDB per simulation anyway in terms of wall clock time. Our specific choice of syntactically forcing observe’s to be noisy requires language and interpreter level restrictions and checks. Hard constraint observe’s can be supported in Anglican by exposing a Dirac likelihood to programmers. Persisting in not doing so should help programmers avoid writing probabilistic programs where finding even a single satisfying execution trace is NP-hard or not-computable, but also could be perceived as requiring a non-intuitive programming style. As explored in concurrent work on Venture, there may be opportunities to improve inference performance by partitioning program variables, either automatically or via syntax constructs, and treating them differently during inference. Then, for instance, some could be sampled via plain MH, some via conditional SMC. One simple way to do this would be to combine conditional SMC and RDB MH. Acknowledgments We thank Xerox and Google for their generous support. We also thank Arnaud Doucet, Brooks Paige, and Yura Perov for helpful discussions about PMCMC and probabilistic programming in general. References [1] Christophe Andrieu, Arnaud Doucet, and Roman Holenstein. Particle Markov chain Monte Carlo methods. Journal of the Royal Statistical Society: Series B (Statistical Methodology), 72(3):269–342, 2010. [2] George EP Box and Mervin E Muller. A note on the generation of random normal deviates. The Annals of Mathematical Statistics, 29(2):610–611, 1958. [3] Noah Goodman, Vikash Mansinghka, Daniel Roy, Keith Bonawitz, and Daniel Tarlow. Church: a language for generative models. arXiv preprint arXiv:1206.3255, 2012. [4] Roman Holenstein. Particle Markov Chain Monte Carlo. PhD thesis, The University of British Columbia, 2009. [5] Hubert W Lilliefors. On the Kolmogorov-Smirnov test for normality with mean and variance unknown. Journal of the American Statistical Association, 62(318): 399–402, 1967. [6] George Marsaglia and Thomas A Bray. A convenient method for generating normal variables. Siam Review, 6(3):260–264, 1964. [7] Tom Minka, J Winn, J Guiver, and D Knowles. Infer.NET 2.4, 2010. Microsoft Research Cambridge. [8] The Open Group. IEEE Std 1003.1, 2004 Edition, 2004. URL http://pubs.opengroup.org/ onlinepubs/009695399/functions/fork.html. [9] Avi Pfeffer. IBAL: A probabilistic rational programming language. In IJCAI, pages 733–740. Citeseer, 2001. [10] David Spiegelhalter, Andrew Thomas, Nicky Best, and Wally Gilks. Bugs 0.5: Bayesian inference using Gibbs sampling manual (version ii). MRC Biostatistics Unit, Institute of Public Health, Cambridge, UK, 1996. [11] Stan Development Team. Stan modeling language user’s guide and reference manual. http://mcstan.org/, 2013. [12] David Wingate, Andreas Stuhlmueller, and Noah D Goodman. Lightweight implementations of probabilistic programming languages via transformational compilation. In Proceedings of the 14th international conference on Artificial Intelligence and Statistics, page 131, 2011.
6cs.PL
From Clarity to Efficiency for Distributed Algorithms ∗ Yanhong A. Liu Scott D. Stoller Bo Lin arXiv:1412.8461v4 [cs.PL] 12 Mar 2017 Computer Science Department, Stony Brook University, Stony Brook, NY 11794, USA {liu,stoller,bolin}@cs.stonybrook.edu Abstract 1. Introduction This article describes a very high-level language for clear description of distributed algorithms and optimizations necessary for generating efficient implementations. The language supports high-level control flows where complex synchronization conditions can be expressed using high-level queries, especially logic quantifications, over message history sequences. Unfortunately, the programs would be extremely inefficient, including consuming unbounded memory, if executed straightforwardly. We present new optimizations that automatically transform complex synchronization conditions into incremental updates of necessary auxiliary values as messages are sent and received. The core of the optimizations is the first general method for efficient implementation of logic quantifications. We have developed an operational semantics of the language, implemented a prototype of the compiler and the optimizations, and successfully used the language and implementation on a variety of important distributed algorithms. Distributed algorithms are at the core of distributed systems. Yet, developing practical implementations of distributed algorithms with correctness and efficiency assurances remains a challenging, recurring task. • Study of distributed algorithms has relied on either pseu- docode with English, which is high-level but imprecise, or formal specification languages, which are precise but harder to understand, lacking mechanisms for building real distributed systems, or not executable at all. • At the same time, programming of distributed systems has mainly been concerned with program efficiency and has relied mostly on the use of low-level or complex libraries and to a lesser extent on built-in mechanisms in restricted programming models. What’s lacking is (1) a simple and powerful language that can express distributed algorithms at a high level and yet has a clear semantics for precise execution as well as for verification, and is fully integrated into widely used programming languages for building real distributed systems, together with (2) powerful optimizations that can transform high-level algorithm descriptions into efficient implementations. This article describes a very high-level language, DistAlgo, for clear description of distributed algorithms, combining advantages of pseudocode, formal specification languages, and programming languages. Categories and Subject Descriptors D.1.3 [Programming Techniques]: Concurrent Programming—Distributed programming; D.3.2 [Programming Languages]: Language Classifications—Very high-level languages; D.3.4 [Programming Languages]: Processors—Code generation, Compilers, Optimization; F.3.1 [Logics and Meanings of Programs]: Specifying and Verifying and Reasoning about Programs—Specification techniques; F.3.2 [Logics and Meanings of Programs]: Semantics of Programming Languages—Operational semantics; I.2.4 [Computing Methodologies]: Knowledge Representation Formalisms and Methods—Predicate logic General Terms mance • The main control flow of a process, including sending messages and waiting on conditions about received messages, can be stated directly as in sequential programs; yield points where message handlers execute can be specified explicitly and declaratively. Algorithms, Design, Languages, Perfor- • Complex synchronization conditions can be expressed using high-level queries, especially quantifications, over message history sequences, without manually writing message handlers that perform low-level incremental updates and obscure control flows. Keywords distributed algorithms, high-level queries and updates, incrementalization, logic quantifications, message histories, synchronization conditions, yield points DistAlgo supports these features by building on an objectoriented programming language. We also developed an operational semantics for the language. The result is that distributed algorithms can be expressed in DistAlgo clearly at a high level, like in pseudocode, but also precisely, like in ∗ This work was supported in part by NSF under grants CCF1414078, CCF-1248184, CCF-0964196, CNS-0831298, and CCF0613913; and ONR under grants N000141512208, N000140910651 and N000140710928. 1 2017/3/14 formal specification languages, facilitating formal verification, and can be executed as part of real applications, as in programming languages. Unfortunately, programs containing control flows with synchronization conditions expressed at such a high level are extremely inefficient if executed straightforwardly: each quantifier can introduce a linear factor in running time, and any use of the history of messages sent and received may cause space usage to be unbounded. We present new optimizations that allow efficient implementations to be generated automatically, extending previous optimizations to distributed programs and to the most challenging quantifications. We have implemented a prototype of the compiler and the optimizations and experimented with a variety of important distributed algorithms, including Paxos, Byzantine Paxos, and multi-Paxos. Our experiments strongly confirm the benefits of the language and the effectiveness of the optimizations. This article is a revised version of Liu et al. [56]. The main changes are revised and extended descriptions of the language and the optimization method, a new formal operational semantics, an abridged and updated description of the implementation, and a new description of our experience of using DistAlgo in teaching. 2. Expressing distributed algorithms • Our method transforms sending and receiving of mes- sages into updates to message history sequences, incrementally maintains the truth values of synchronization conditions and necessary auxiliary values as those sequences are updated, and finally removes those sequences as dead code when appropriate. Even when a distributed algorithm appears simple at a high level, it can be subtle when necessary details are considered, making it difficult to understand how the algorithm works precisely. The difficulty comes from the fact that multiple processes must coordinate and synchronize to achieve global goals, but at the same time, delays, failures, and attacks can occur. Even determining the ordering of events is nontrivial, which is why Lamport’s logical clock [43] is so fundamental for distributed systems. • To incrementally maintain the truth values of general quantifications, our method first transforms them into aggregations, also called aggregate queries. In general, however, translating nested quantifications simply into nested aggregations can incur asymptotically more space and time overhead than necessary. Our transformations minimize the nesting of the resulting queries. Running example. We use Lamport’s distributed mutual exclusion algorithm [43] as a running example. Lamport developed it to illustrate the logical clock he invented. The problem is that n processes access a shared resource, and need to access it mutually exclusively, in what is called a critical section (CS), i.e., there can be at most one process in a critical section at a time. The processes have no shared memory, so they must communicate by sending and receiving messages. Lamport’s algorithm assumes that communication channels are reliable and first-in-first-out (FIFO). Figure 1 contains Lamport’s original description of the algorithm, except with the notation < instead of −→ in rule 5 (for comparing pairs of timestamps and process ids using lexical ordering: (a,b) < (a2,b2) iff a < a2 or a = a2 and b < b2) and with the word “acknowledgment” added in rule 5 (for simplicity when omitting a commonly omitted [29, 59] small optimization mentioned in a footnote). This description is the most authoritative, is at a high level, and uses the most precise English we found. The algorithm satisfies safety, liveness, and fairness, and has a message complexity of 3(n − 1). It is safe in that at most one process can be in a critical section at a time. It is live in that some process will be in a critical section if there are requests. It is fair in that requests are served in the order of the logical timestamps of the request messages. Its message complexity is 3(n − 1) in that 3(n − 1) messages are required to serve each request. • Quantified order comparisons are used extensively in nontrivial distributed algorithms. They can be incrementalized easily when not mixed with other conditions or with each other. We systematically extract single quantified order comparisons and transform them into efficient incremental operations. Overall, our method significantly improves time complexities and reduces the unbounded space used for message history sequences to the auxiliary space needed for incremental computation. Systematic incrementalization also allows the time and space complexity of the generated programs to be analyzed easily. There has been a significant amount of related research, as discussed in Section 7. Our work contains three main contributions: • A simple and powerful language for expressing dis- tributed algorithms with high-level control flows and synchronization conditions, an operational semantics, and full integration into an object-oriented language. • A systematic method for incrementalizing complex syn- chronization conditions with respect to all sending and receiving of messages in distributed programs. • A general and systematic method for generating effi- Challenges. To understand how this algorithm is carried out precisely, one must understand how each of the n processes acts as both Pi and Pj in interactions with all other pro- cient implementations of arbitrary logic quantifications together with general high-level queries. 2 2017/3/14 in Figure 1; the simplified algorithm can be expressed using basically two send statements, a receive definition, and an await statement. The results on the running example are shown in Figures 2–5, with details explained later. Figure 2 shows Lamport’s original algorithm expressed in DistAlgo; it also includes configuration and setup for running 50 processes each trying to enter critical section at some point during its execution. Figures 3 and 4 show two alternative optimized programs after incrementalization; all lines with comments are new except that the await statement is simplified. Figure 5 shows the simplified algorithm. The algorithm is then defined by the following five rules. For convenience, the actions defined by each rule are assumed to form a single event. 1. To request the resource, process Pi sends the message Tm :Pi requests resource to every other process, and puts that message on its request queue, where Tm is the timestamp of the message. 2. When process Pj receives the message Tm :Pi requests resource, it places it on its request queue and sends a (timestamped) acknowledgment message to Pi . 3. To release the resource, process Pi removes any Tm :Pi requests resource message from its request queue and sends a (timestamped) Pi releases resource message to every other process. 4. When process Pj receives a Pi releases resource message, it removes any Tm :Pi requests resource message from its request queue. 5. Process Pi is granted the resource when the following two conditions are satisfied: (i) There is a Tm :Pi requests resource message in its request queue which is ordered before any other request in its queue by the relation <. (To define the relation < for messages, we identify a message with the event of sending it.) (ii) Pi has received an acknowledgment message from every other process timestamped later than Tm . Note that conditions (i) and (ii) of rule 5 are tested locally by Pi . 3. DistAlgo Language To support distributed programming at a high level, four main concepts can be added to commonly used high-level programming languages, especially object-oriented languages, such as Python and Java: (1) distributed processes, and sending messages, (2) control flows with yield points and waits, and receiving messages, (3) synchronization conditions using high-level queries of message history sequences, and (4) configuration of processes and communication mechanisms. DistAlgo supports these concepts, with options and generalizations for ease of programming, as described below. A formal operational semantics for DistAlgo is presented in Appendix A. Figure 1. Original description in English. Processes and sending of messages. Distributed processes are concurrent executions of programmed instructions, like threads in Java and Python, except that each process has its private memory, not shared with other processes, and processes communicate by message passing. Three main constructs are used, for defining processes, creating processes, and sending messages. A process definition is of form (1) below. It defines a type p of processes, by defining a class p that extends class process. The process_body is a set of method definitions and handler definitions, to be described. cesses. Each process must have an order of handling all the events according to the five rules, trying to reach its own goal of entering and exiting a critical section while also responding to messages from other processes. It must also keep testing the complex condition in rule 5 as events happen. State machine based formal specifications have been used to fill in such details precisely, but at the same time, they are lower-level and harder to understand. For example, a formal specification of Lamport’s algorithm in I/O automata [59, pages 647-648] occupies about one and a fifth pages, most of which is double-column. To actually implement distributed algorithms, details for many additional aspects must be added, for example, creating processes, letting them establish communication channels with each other, incorporating appropriate logical clocks (e.g., Lamport clock or vector clock [60]) if needed, guaranteeing the specified channel properties (e.g., reliable, FIFO), and integrating the algorithm with the application (e.g., specifying critical section tasks and invoking the code for the algorithm as part of the overall application). Furthermore, how to do all of these in an easy and modular fashion? class p extends process: process_body (1) A special method setup may be defined in process_body for initially setting up data in the process before the process’s execution starts. A special method run() may be defined in process_body for carrying out the main flow of execution. A special variable self refers to the process itself. A process creation statement is of form (2) below. It creates n new processes of type p at each node in the value of expression node_exp, and returns the resulting process or set of processes. A node is a running DistAlgo program on a machine, and is identified by the host name of the machine plus the name of the running DistAlgo program that can be specified when starting the program. Our approach. We address these challenges with the DistAlgo language, compilation to executable programs, and especially optimization by incrementalization of expensive synchronizations, described in Sections 3, 4, and 5, respectively. An unexpected result is that incrementalization led us to discover simplifications of Lamport’s original algorithm n new p at node_exp 3 (2) 2017/3/14 The number n and the at clause are optional; the defaults are 1 and the local node, respectively. A new process can be set up by calling its setup method. A call start() on the process then starts the execution of its run() method. A statement for sending messages is of form (3) below. It sends the message that is the value of expression mexp to the process or set of processes that is the value of expression pexp. send mexp to pexp multiple yield points without using method definition and invocations. As syntactic sugar, a receive that is handled at only one yield point can be written at that point. Synchronization and associated actions can be expressed using general, nondeterministic await statements. A simple await statement is one of the two forms in (6) below. It waits for the value of Boolean-valued expression bexp to become true, for the first form, or waits for a timeout after time period t, for the second form. (3) await bexp await timeout t A message can be any value but is by convention a tuple whose first component is a string, called a tag, indicating the kind of the message. A general, nondeterministic await statement is of form (7) below. It waits for any of the values of expressions bexp1 , ..., bexpk to become true or a timeout after time period t, and then nondeterministically selects one of statements stmt1 , ..., stmtk , stmt whose corresponding conditions are satisfied to execute. The or and timeout clauses are optional. Control flows and handling of received messages. The key idea is to use labels to specify program points where control flow can yield to handling of messages and resume afterwards. Three main constructs are used, for specifying yield points, handling of received messages, and synchronization. A yield point preceding a statement is of form (4) below, where identifier l is a label. It specifies that point in the program as a place where control yields to handling of unhandled messages, if any, and resumes afterwards. -- l (6) await bexp1 : stmt1 or ... or bexpk : stmtk timeout t: stmt (7) An await statement must be preceded by a yield point, for handling messages while waiting; if a yield point is not specified explicitly, the default is that all message handlers can be executed at this point. These few constructs make it easy to specify any process that has its own flow of control while also responding to messages. It is also easy to specify any process that only responds to messages, for example, by writing just receive definitions and a run() method containing only await false. (4) The label l is optional; it can be omitted when this yield point is not explicitly referred to in any handler definitions, defined next. A handler definition, also called a receive definition, is of form (5) below. It handles, at yield points labeled l1 , ..., lj , un-handled messages that match some mexpi sent from pexpi , where mexpi and pexpi are parts of a tuple pattern; previously unbound variables in a pattern are bound to the corresponding components in the value matched. The handler_body is a sequence of statements to be executed for the matched messages. Synchronization conditions using high-level queries. Synchronization conditions and other conditions can be expressed using high-level queries—quantifications, comprehensions, and aggregations—over sets of processes and sequences of messages. High-level queries are used commonly in distributed algorithms because (1) they make complex synchronization conditions clearer and easier to write, and (2) the complexity of distributed algorithms is measured by round complexity and message complexity, not time complexity of local processing. Quantifications are especially common because they directly capture the truth values of synchronization conditions. We discovered a number of errors in our initial programs that were written using aggregations in place of quantifications before we developed the method to systematically optimize quantifications. For example, we regularly expressed “v is larger than all elements of s” as v > max s and either forgot to handle the case that s is empty or handled it in an ad hoc fashion. Naive use of aggregation operators like max may also hinder generation of more efficient implementations. receive mexp1 from pexp1 , ..., mexpk from pexpk at l1 , ..., lj : (5) handler_body The from and at clauses are optional; the defaults are any process and all yield points, respectively. If the from clause is used, each message is automatically extended with the process id of the sender. A tuple pattern is a tuple in which each component is a non-variable expression, a variable possibly prefixed with "=", a wildcard, or recursively a tuple pattern. A non-variable expression or a variable prefixed with “=” means that the corresponding component of the tuple being matched must equal the value of the non-variable expression or the variable, respectively, for pattern matching to succeed. A variable not prefixed with “=” matches any value and becomes bound to the corresponding component of the tuple being matched. A wildcard, written as “_”, matches any value. Support for receive mimics common usage in pseudocode, allowing a message handler to be associated with 4 2017/3/14 We define operations on sets; operations on sequences are the same except that elements are processed in order, and square brackets are used in place of curly braces. agg sexp (10) agg { exp: v1 in sexp1 , ..., vk in sexpk | bexp } • In the query forms above, each vi can also be a tuple • A quantification is a query of one of the two forms in pattern ti . Variables in ti are bound to the corresponding components in the matched elements of the value of sexpi . We omit | bexp when bexp is true. (8) below, called existential and universal quantifications, respectively, plus a set of parameters—variables whose values are bound before the query. For a query to be well-formed, every variable in it must be reachable from a parameter—be a parameter or recursively be the leftside variable of a membership clause whose right-side variables are reachable. Given values of parameters, the query returns true iff for some or all, respectively, combinations of values of variables that satisfy all membership clauses vi in sexpi , expression bexp evaluates to true. When an existential quantification returns true, all variables in the query are also bound to a combination of values, called a witness, that satisfy all the membership clauses and condition bexp. We use {} for empty set; use s.add(x) and s.del(x) for element addition and deletion, respectively; and use x in s and x not in s for membership test and its negation, respectively. We assume that hashing is used in implementing sets, and the expected time of set initialization, element addition and removal, and membership test is O(1). We consider operations that involve iterations over sets and sequences to be expensive; each iteration over a set or sequence incurs a cost that is linear in the size of the set or sequence. All quantifications, comprehensions, and aggregations are considered expensive. DistAlgo has built-in sequences received and sent, containing all messages received and sent, respectively, by a process. some v1 in sexp1 , ..., vk in sexpk | bexp (8) each v1 in sexp1 , ..., vk in sexpk | bexp For example, the following query returns true iff each element in s is greater than each element in s2. • Sequence received is updated only at yield points; after a message arrives, it will be handled when execution reaches the next yield point, by adding the message to received and running matching receive definitions, if any, associated with the yield point. We use received m from p interchangeably with m from p in received to mean that message m from process p is in received; from p is optional, but when specified, each message in received is automatically extended with the process id of the sender. each x in s, x2 in s2 | x > x2 For another example, the following query, containing a nested quantification, returns true iff some element in s is greater than each element in s2. Additionally, when the query returns true, variable x is bound to a witness—an element in s that is greater than each element in s2. some x in s | each x2 in s2 | x > x2 • A comprehension is a query of form (9) below. Given values of parameters, the query returns the set of values of exp for all combinations of values of variables that satisfy all membership clauses vi in sexpi and condition bexp. { exp: v1 in sexp1 , ..., vk in sexpk | bexp } (9) • Sequence sent is updated at each send statement; each message sent to a process is added to sent. We use sent m to p interchangeably with m to p in sent to mean that message m to process p is in sent; to p is optional, but when specified, p is the process to which m was sent as specified in the send statement. If implemented straightforwardly, received and sent can create a huge memory leak, because they can grow unboundedly, preventing their use in practical programming. Our method can remove them by maintaining only auxiliary values that are needed for incremental computation. For example, the following query returns the set of products of x in s and x2 in s2 where x is greater than x2. {x*y: x in s, x2 in s2 | x > x2} We abbreviate {v: v in sexp | bexp} as {v in sexp | Configuration. One can specify channel types, handling of messages, and other configuration items. Such specifications are declarative, so that algorithms can be expressed without unnecessary implementation details. We describe a few basic kinds of configuration items. First, one can specify the types of channels for passing messages. For example, the following statement configures all channels to be FIFO. bexp}. • An aggregation, also called an aggregate query, is a query of one of the two forms in (10) below, where agg is an aggregation operator, including count, sum, min, and max. Given values of parameters, the query returns the value of applying agg to the set value of sexp, for the first form, or to the multiset of values of exp for all combinations of values of variables that satisfy all membership clauses vi in sexpi and condition bexp, for the second form. configure channel = fifo 5 2017/3/14 1 class P extends process: 2 def setup(s): 3 self.s := s 4 self.q := {} Other options for channel include reliable and {reliable, fifo}. When either fifo or reliable is included, TCP is used for process communication; otherwise, UDP is used. In general, channels can also be configured separately for messages from any set of processes to any set of processes. One can specify how much effort is spent processing messages at yield points. For example, 5 6 7 8 9 12 13 14 15 def mutex(task): # run task with mutual exclusion -- request self.t := logical_time() # 1 in Fig 1 send (’request’, t, self) to s # q.add((’request’, t, self)) # # wait for own req < others in q # and for acks from all in s await each (’request’, t2, p2) in q | # 5 in Fig 1 (t2,p2) != (t,self) implies (t,self) < (t2,p2) and each p2 in s | # some received(’ack’, t2, =p2) | t2 > t task() # critical section -- release q.del((’request’, t, self)) # 3 in Fig 1 send (’release’, logical_time(), self) to s # 16 17 18 receive (’request’, t2, p2): q.add((’request’, t2, p2)) send (’ack’, logical_time(), self) to p2 # 2 in Fig 1 # # 19 20 21 receive (’release’, _, p2): for (’request’, t2, =p2) in q: q.del((’request’, t2, p2)) # 4 in Fig 1 # # 22 def run(): ... def task(): ... mutex(task) ... 10 configure handling = all 11 configures the system to handle all un-handled messages at each yield point; this is the default. For another example, one can specify a time limit. One can also specify different handling effort for different yield points. Logical clocks [27, 43, 60] are used in many distributed algorithms. One can specify the logical clock, e.g., Lamport clock, that is used: configure clock = Lamport 23 24 It configures sending and receiving of messages to update the clock appropriately. A call logical_time() returns the current value of the logical clock. Overall, a DistAlgo program consists of a set of process definitions, a method main, and possibly other, conventional program parts. Method main specifies the configurations and creates, sets up, and starts a set of processes. DistAlgo language constructs can be used in process definitions and method main and are implemented according to the semantics described; other, conventional program parts are implemented according to their conventional semantics. # set of all other processes # set of pending requests # # # # # 25 def main(): # ... # 26 configure channel = {reliable, # 27 configure clock = Lamport # 28 ps := 50 new P # 29 for p in ps: p.setup(ps-{p}) # 30 for p in ps: p.start() # ... # main method for the process do non-CS tasks of the process define critical section task run task with mutual exclusion do non-CS tasks of the process main method for the application do other tasks of the application fifo} use reliable and FIFO channel use Lamport clock create 50 processes of P class pass to each process other processes start the run method of each process do other tasks of the application Figure 2. Original algorithm (lines 6-21) in a complete program in DistAlgo. Other language constructs. For other constructs, we use those in high-level object-oriented languages. We mostly use Python syntax (indentation for scoping, ’:’ for elaboration, ’#’ for comments, etc.) for succinctness, except with v := exp for assignment and with a few conventions from Java (keyword extends for subclass, keyword new for object creation, and omission of self, the equivalent of this in Java, when there is no ambiguity) for ease of reading. 4. Compiling to executable programs Compilation generates code to create processes on the specified machine, take care of sending and receiving messages, and realize the specified configuration. In particular, it inserts appropriate message handlers at each yield point. Processes and sending of messages. Process creation is compiled to creating a process on the specified or default machine and that has a private memory space for its fields. Each process is implemented using two threads: a main thread that executes the main flow of control of the process, and a helper thread that receives and enqueues messages sent to this process. Constructs involving a set of processes, such as n new P, can easily be compiled into loops. Sending a message m to a process p is compiled into calls to a standard message passing API. If the sequence sent is used in the program, we also insert sent.add(m to p). Calling a method on a remote process object is compiled into a remote method call. Example. Figure 2 shows Lamport’s algorithm expressed in DistAlgo. The algorithm in Figure 1 corresponds to the body of mutex and the two receive definitions, 16 lines total; the rest of the program, 14 lines total, shows how the algorithm is used in an application. The execution of the application starts with method main, which configures the system to run (lines 25-30). Method mutex and the two receive definitions are executed when needed and follow the five rules in Figure 1 (lines 5-21). Recall that there is an implicit yield point before the await statement. Note that Figure 2 is not meant to replace Figure 1, but to realize Figure 1 in a precisely executable manner. Figure 2 is meant to be high-level, compared with lowerlevel specifications and programs. Control flows and handling of received messages. Each yield point l is compiled into a call to a message han6 2017/3/14 dler method l() that updates the sequence received, if received is used in the program, and executes the bodies of the receive definitions whose at clause includes l. Pre- and quantifications are dominantly used in writing synchronization conditions and assertions in specifications and very high-level programs. Unfortunately, if implemented straightforwardly, each quantification introduces a cost factor that is linear in the size of the collection quantified over. Optimizing expensive quantifications in general is difficult, which is a main reason that they are not used in practical programs, not even logic programs, and programmers manually write more complex and error-prone code. The difficulty comes from expensive enumerations over collections and complex combinations of join conditions. We address this challenge by converting quantifications into aggregations that can be optimized systematically using previously studied methods. However, a quantification can be converted into multiple forms of aggregations. Which one to use depends on what kinds of updates must be handled, and on how the query can be incrementalized under those updates. Direct conversion of nested quantifications into nested aggregations can lead to much more complex incremental computation code and asymptotically worse time and space complexities for maintaining the intermediate query results. Note that, for an existential quantification, we convert it to a more efficient aggregation if a witness is not needed; if a witness is needed, we incrementally compute the set of witnesses. cisely: • Each receive definition is compiled into a method that takes a message m as argument, matches m against the message patterns in the receive clause, and if the match- ing succeeds, binds the variables in the matched pattern appropriately, and executes the statement in the body of this receive definition. • Method l() compiled for yield point l does the following: for each un-handled message m from p to be handled, (1) execute received.add(m from p) if received is used in the program, (2) call the methods generated from the receive definitions whose at clause includes l, and (3) remove m from the message queue. An await statement can be compiled into a synchronization using busy-waiting or blocking. We use blocking to wait until a new message arrives or the timeout specified in await is reached. Configuration. Configuration options are taken into account during compilation in a straightforward way. Libraries and modules are used as much as possible. For example, when fifo or reliable channel is specified, the compiler can generate code that uses TCP sockets. Converting quantifications to aggregations.We present all converted forms here and describe which forms to use after we discuss the updates that must be handled. The correctness of all rules presented have been proved, manually, using first-order logic and set theory. These rules ensure that the value of a resulting query expression equals the value of the original quantified expression. Table 1 shows general rules for converting single quantifications into equivalent aggregations that use aggregation operator count. For converting universal quantifications, either rule 2 or 3 could be used. The choice does not affect the asymptotic cost, but only small constant factors: rule 2 requires maintaining count s, and rule 3 requires computing not; the latter is generally faster unless count s is already needed for other purposes, and is certainly faster when not bexp can be simplified, e.g., when bexp is a negation. The rules in Table 1 are general because bexp can be any Boolean expression, but they are for converting single quantifications. Nested quantifications can be converted one at a time from inside out, but the results may be much more complicated than necessary. For example, 5. Incrementalizing expensive synchronizations Incrementalization transforms expensive computations into efficient incremental computations with respect to updates to the values on which the computations depend. It (1) identifies all expensive queries, (2) determines all updates that may affect the query result, and (3) transforms the queries and updates into efficient incremental computations. Much of incrementalization has been studied previously, as discussed in Section 7. The new method here is for (1) systematic handling of quantifications for synchronization as expensive queries, especially nested alternating universal and existential quantifications and quantifications containing complex order comparisons and (2) systematic handling of updates caused by all sending, receiving, and handling of messages in the same way as other updates in the program. The result is a drastic reduction of both time and space complexities. Expensive computations using quantifications. Expensive computations in general involve repetition, including loops, recursive functions, comprehensions, aggregations, and quantifications over collections. Optimizations were studied most for loops, less for recursive functions, comprehensions, and aggregations, and least for quantifications, basically corresponding to how frequently these constructs have traditionally been used in programming. However, high-level queries are increasingly used in programming, each x in s | some x2 in s2 | bexp would be converted using rule 1 to each x in s | count {x2 in s2 | bexp} != 0 and then using rule 2 to count {x in s | count {x2 in s2 | bexp} != 0} = count s 7 2017/3/14 A simpler conversion is possible for this example, using a rule in Table 2, described next. from the parameter values. The most basic updates are assignments to query parameters, v := exp, where v is a query parameter. Other updates are to objects and collections used in the query. For objects, all updates can be expressed as field assignments, o.f := exp. For collections, all updates can be expressed as initialization to empty and element additions and removals, s.add(x) and s.del(x). For distributed algorithms, a distinct class of important updates are caused by message passing. Updates are caused in two ways: Table 1. Rules for converting single quantifications. Quantification Aggregation 1 some x in s | bexp count {x in s | bexp} != 0 2 count {x in s | bexp} = count s each x in s | bexp 3 count {x in s | not bexp} = 0 Table 2 shows general rules for converting nested quantifications into equivalent, but non-nested, aggregations that use aggregation operator count. These rules yield much simpler results than repeated use of the rules in Table 1. For example, rule 2 in this table yields a much simpler result than using two rules in Table 1 in the previous example. More significantly, rules 1, 4, and 5 generalize to any number of the same quantifier, and rules 2 and 3 generalize to any number of quantifiers with one alternation. We have not encountered more complicated quantifications than these in the algorithms we found. It is well known that more than one alternation is rarely used, so commonly used quantifications can all be converted to non-nested aggregations. For example, in twelve different algorithms expressed in DistAlgo [56], there are a total of 50 quantifications but no occurrence of more than one alternation. Table 3 shows general rules for converting single quantifications with a single order comparison, for any linear order, into equivalent queries that use aggregation operators max and min. These rules are useful because max and min can in general be maintained incrementally in O(log n) time with O(n) space overhead. Additionally, when there are only element additions, max and min can be maintained most efficiently in O(1) time and space. Table 4 shows general rules for decomposing Boolean combinations of conditions in quantifications, to obtain quantifications with simpler conditions. In particular, Boolean combinations of order comparisons and other conditions can be transformed to extract quantifications each with a single order comparison, so the rules in Table 3 can be applied, and Boolean combinations of inner quantifications and other conditions can be transformed to extract directly nested quantifications, so the rules in Table 2 can be applied. For example, 1. Sending and receiving messages updates the sequences sent and received, respectively. Before incrementalization, code is generated, as described in Section 4, to explicitly perform these updates. 2. Handling of messages by code in receive definitions updates variables that are parameters of the queries for computing synchronization conditions, or that are used to compute the values of these parameters. Once these are established, updates can be determined using previously studied analysis methods, e.g., [33, 51]. Incremental computation. Given expensive queries and updates to the query parameters, efficient incremental computations can be derived for large classes of queries and updates based on the language constructs used in them or by using a library of rules built on existing data structures [51, 53, 54, 65]. For aggregations converted from quantifications, algebraic properties of the aggregation operators are exploited to efficiently handle possible updates. In particular, each resulting aggregate query result can be obtained in O(1) time and incrementally maintained in O(1) time per update to the sets maintained and affected plus the time for evaluating the conditions in the aggregation once per update. The total maintenance time at each element addition or deletion to a query parameter is at least a linear factor smaller than computing the query result from scratch. Additionally, if aggregation operators max and min are used and there are only element additions, the space overhead is O(1). Note that if max and min are used naively when there are element deletions, there may be an unnecessary overhead of O(n) space and O(log n) maintenance time per update from using more sophisticated data structures to maintain the max or min under element deletion [21, 84, 85]. Incremental computation improves time complexity only if the total time of repeated expensive queries is larger than that of repeated incremental maintenance. This is generally true for incrementalizing expensive synchronization conditions because (1) expensive queries in the synchronization conditions need to be evaluated repeatedly at each relevant update to the message history, until the condition becomes true, and (2) incremental maintenance at each such update is at least a linear factor faster for single message updates and no slower generally than computing from scratch. each x in s | bexp implies y < x can be converted using rule 8 in Table 4 to each x in {x in s | bexp} | y < x which can then be converted using rule 13 of Table 3 to {x in s | bexp} = {} or y < min {x in s | bexp} Updates caused by message passing. Recall that the parameters of a query are variables in the query whose values are bound before the query. Updates that may affect the query result include not only updates to the query parameters but also updates to the objects and collections reachable 8 2017/3/14 Table 2. Rules for converting nested quantifications. Nested Quantifications 1 some x in s | some x2 in s2 | bexp count 2 each x in s | some x2 in s2 | bexp count 3 some x in s | each x2 in s2 | bexp count count 4 each x in s | each x2 in s2 | bexp count 5 count {(x,x2): {x: x in {x: x in {(x,x2): {(x,x2): {(x,x2): 9 10 11 12 13 14 15 16 some some some some some some some some each each each each each each each each Existential x in s | x in s | x in s | x in s | x in s | x in s | x in s | x in s | Universal x in s | x in s | x in s | x in s | x in s | x in s | x in s | x in s | Aggregation y x y x y x y x <= x >= y >= x <= y < x > y > x < y • For non-nested quantifications, if the conditions contain s != {} and y <= max s no order comparisons or there are deletions from the sets or sequences whose elements are compared, the rules in Table 1 are used. The space overhead is linear in the sizes of the sets maintained and being aggregated over. s != {} and y >= min s s != {} and y < max s • For non-nested quantifications, if the conditions contain order comparisons and there are only additions to the sets or sequences whose elements are compared, the rules in Table 4 are used to extract single quantified order comparisons, and then the rules in Table 3 are used to convert the extracted quantifications. In this case, the space overhead is reduced to constant. s != {} and y > min s Aggregation y x y x y x y x <= x >= y >= x <= y < x > y > x < y s = {} or y <= min s s = {} or y >= max s • For nested quantifications with one level of nesting, the rules in Table 4 are used to extract directly nested quantifications, and then the rules in Table 2 are used. If the resulting incremental maintenance has constant-time overhead maintaining a linear-space structure, we are done. If it is linear-time overhead maintaining a quadratic-space structure, and if the conditions contain order comparisons, then the rules in Table 4 are used to extract single quantified order comparisons, and then the rules in Table 3 are used. This can reduce the overhead to logarithmic time and linear space. s = {} or y < min s s = {} or y > max s Table 4. Rules for decomposing conditions to extract quantified comparisons. 1 2 3 4 5 6 7 8 Quantification some x in s | not e some x in s | e1 and e2 some x in s | e1 or e2 some x in s | e1 implies e2 each x in s | not e each x in s | e1 and e2 each x in s | e1 or e2 each x in s | e1 implies e2 Decomposed Quantifications • In general, multiple ways of conversion may be possible, besides small constant-factor differences between rules 2 and 3 in Table 1 and rules 4 and 5 in Table 2. In particular, for nested quantifications with two or more alternations, one must choose which two alternating quantifiers to transform first, using rule 2 or 3 in Table 2. We have not encountered such queries and have not studied this aspect further. Our general method is to transform in all ways possible, obtain the time and space complexities for each result, and choose one with the best time and then space. Complexities are calculated using the cost model of the set operations given in Section 3. The number of possible ways is exponential in the worst case in the size of the query, but the query size is usually a small constant. not each x in s | e some x in {x | e2 (some x in s (some x in s (some x in s (some x in s in s | e1} | | | | e1) or e2) not e1) or e2) not some x in s | e (each x in s (each x in s each x in {x | e2 each x in {x | e2 s2 | bexp} != 0 bexp} = count s not bexp} != count s s2 | bexp} = s2} s2 | not bexp} = 0 To allow the most efficient incremental computation under all given updates, our method transforms each top-level quantification as follows: Table 3. Rules for single quantified order comparison. 1 2 3 4 5 6 7 8 Aggregation x in s, x2 in s, x2 in s2 | s, x2 in s2 | x in s, x2 in x in s, x2 in x in s, x2 in | e1) and | e2) in s | not e1} in s | e1} Table 5 summarizes well-known incremental computation methods for these aggregate queries. The methods are expressed as incrementalization rules: if a query in the program 9 2017/3/14 matches the query form in the table, and each update to a parameter of the query in the program matches an update form in the table, then transform the query into the corresponding replacement and insert at each update the corresponding maintenance; fresh variables are introduced for each different query to hold the query results or auxiliary data structures. In the third rule, data structure ds stores the argument set s of max and supports priority queue operations. Example. In the program in Figure 2, three quantifications are used in the synchronization condition in the await statement, and two of them are nested. The condition is copied below, except that (’ack’,t2,=p2) in received is used in place of received(’ack’,t2,=p2). Table 5. Incrementalization rules for count and for max. Converting quantifications into aggregations as described using Tables 1 through 4 proceeds as follows. In the first conjunct, the universal quantification is converted using rule 2 or 3 in Table 1, because it contains an order comparison with elements of q and there are element deletions from q; rule 3 is used here because it is slightly simpler after the negated condition is simplified. In the second conjunct, the nested quantification is converted using rule 2 in Table 2. The resulting expression is: Query count s Updates s := {} s.add(x) s.del(x) Replacement number Inserted Maintenance number := 0 if x not in s: number +:= 1 if x in s: number -:= 1 Cost O(1) Cost O(1) O(1) O(1) Query max s Updates s := {x} s.add(x) Replacement maximum Inserted Maintenance maximum := x if x > maximum: maximum := x Cost O(1) Cost O(1) O(1) each (’request’, t2, p2) in q | (t2,p2) != (t,self) implies (t,self) < (t2,p2) and each p2 in s | some (’ack’, t2, =p2) in received | t2 > t count {(’request’, t2, p2) in q | (t,self) > (t2,p2)} = 0 and count {p2: p2 in s, (’ack’, t2, p2) in received | t2 > t} = count s Query Replacement Cost max s ds.max() O(1) Updates Inserted Maintenance Cost s := {} ds := new DS() O(1) s := {x} ds := new DS(); ds.add(x) O(1) s.add(x) if x not in s: ds.add(x) O(log |s|) s.del(x) if x in s: ds.del(x) O(log |s|) The rule for min is similar to the rule for max. Updates to parameters of the first conjunct are additions and removals of requests to and from q, and also assignment to t. Updates to parameters of the second conjunct are additions of ack messages to received, and assignment to t, after the initial assignment to s. Incremental computation [51, 53, 54, 65] introduces variables to store the values of all three aggregations in the converted query, transforms the aggregations to use the introduced variables, and incrementally maintains the stored values at each of the updates, as follows, yielding Figure 3. The overall incrementalization algorithm [51, 53, 65] introduces new variables to store the results of expensive queries and subqueries, as well as appropriate additional values, forming a set of invariants, transforms the queries and subqueries to use the stored query results and additional values, and transforms updates to query parameters to also do incremental maintenance of the stored query results and additional values. In particular, if queries are nested, inner queries are transformed before outer queries. Note that a comprehension such as {x in s | bexp} is incrementalized with respect to changes to parameters of Boolean expression bexp as well as addition and removal of elements of s; if bexp contains nested subqueries, then after the subqueries are transformed, incremental maintenance of their query results become additional updates to the enclosing query. At the end, variables and computations that are dead in the transformed program are eliminated. In particular, sequences received and sent will be eliminated when appropriate, because queries using them have been compiled into message handlers that only store and maintain values needed for incremental evaluation of the synchronization conditions. • For the first conjunct, store the set value and the count value in two variables, say earlier and number1, respectively, so first conjunct becomes number1 = 0; when t is assigned a new value, let earlier be q and let number1 be its size, taking O(|earlier |) time, amortized to O(1) time when each request in earlier is served; when a request is added to q, if t is defined and (t,self) > (t2,p2) holds, add the request to earlier and increment number1 by 1, taking O(1) time; similarly for deletion from q. A test of definedness, here t != undefined, is inserted for any variable that might not be defined in the scope of the maintenance code. Note that when (’request’,t,self) in particular is added to or removed from q, earlier and number1 are not updated, because (t,self) > (t,self) is trivially false. • For the second conjunct, store the set value and the two count values in three variables, say responded, number2, and total, respectively, so the conjunct becomes number2 = total; when s is initialized in setup, 10 2017/3/14 1 class P extends process: 2 def setup(s): 3 self.s := s 4 self.total := count s 5 self.q := {} assign total the size of s, taking O(|s|) time, done only once for each process; when t is assigned a new value, let responded be {}, and let number2 be 0, taking O(1) time; when an ack message is added to received, if the associated conditions hold, increment number2 by 1, taking O(1) time. A test of definedness of t is omitted in the maintenance for receiving ack messages, because t is always defined there; this small optimization is incorporated in an incrementalization rule, but it could be done with a data-flow analysis that covers distributed data flows. 6 7 8 9 10 11 12 13 14 15 Note that incrementalization uses basic properties about primitives and libraries. These properties are incorporated in incrementalization rules. For the running example, the property used is that a call to logical_time() returns a timestamp larger than all existing timestamp values, and thus at the assignment to t in method mutex, we have that earlier is q and responded is {}. So, an incrementalization rule for maintaining earlier specifies that at update t := logical_time(), the maintenance is earlier := q; similarly for maintaining responded. These simplifications could be facilitated with data-flow analyses that determine variables holding logical times and sets holding certain element types. Incrementalization rules can use any program analysis results as conditions [54]. Figure 3 shows the optimized program after incrementalization of the synchronization condition on lines 10-11 in Figure 2. All lines with comments are new except that the synchronization condition in the await statement is simplified. The synchronization condition now takes O(1) time, compared with O(|s|2 ) if computed from scratch. The tradeoff is the amortized O(1) time overhead at updates to t and q and on receiving of ack messages. Using based representation for sets [17, 34, 64], maintaining earlier and responded can each be done using one bit for each process. Note that the sequence received used in the synchronization condition in Figure 2 is no longer used after incrementalization. All values needed for evaluating the synchronization condition are stored in new variables introduced: earlier, number1, responded, number2, and total, a drastic space improvement from unbounded for received to linear in the number of processes. # total num of other processes 16 17 18 19 def mutex(task): -- request self.t := logical_time() self.earlier := q # self.number1 := count earlier # self.responded := {} # self.number2 := 0 # send (’request’, t, self) to s q.add((’request’, t, self)) await number1 = 0 and number2 = total # task() -- release q.del((’request’, t, self)) send (’release’, logical_time(), 20 21 22 23 24 25 26 27 receive (’request’, t2, p2): if t != undefined: # if t is defined if (t,self) > (t2,p2): # comparison in conjunct 1 if (’request’,t2,p2) not in earlier: # if not in earlier earlier.add((’request’, t2, p2)) # add to earlier number1 +:= 1 # increment number1 q.add((’request’, t2, p2)) send (’ack’, logical_time(), self) to p2 28 29 30 31 32 33 receive (’ack’, t2, p2): if t2 > t: if p2 in s: if p2 not in responded: responded.add(p2) number2 +:= 1 34 35 36 37 38 39 40 41 receive (’release’, _, p2): for (’request’, t2, =p2) in q: if t != undefined: # if t is defined if (t,self) > (t2,p2): # comparison in conjunct 1 if (’request’,t2,p2) in earlier: # if in earlier earlier.del((’request’, t2, p2)) # delete from earlier number1 -:= 1 # decrement number1 q.del((’request’, t2, p2)) # # # # # # set num set num of of of of pending earlier requests pending earlier requests responded processes responded processes use maintained results self) to s new message handler comparison in conjunct 2 membership in conjunct 2 if not responded already add to responded increment number2 Figure 3. Optimized program after incrementalization. Definitions of run and main are as in Figure 2. Consider the first conjunct in the synchronization condition in the await statement in Figure 2, copied below: each (’request’, t2, p2) in q | (t2,p2) != (t,self) implies (t,self) < (t2,p2) One might have written the following instead, because it seems natural, especially if universal quantification is not supported: Example with naive use of aggregation operator min. Note that the resulting program in Figure 3 does not need to use a queue at all, even though a queue is used in the original description in Figure 1; the variable q is simply a set, and thus element addition and removal takes O(1) time. We show that if min is used naively, a more sophisticated data structure [21, 84, 85] supporting priority queue is needed, incurring an O(log n) time update instead of the O(1) time in Figure 3. Additionally, for a query using min to be correct, special care must be taken to deal with the case when the argument to min is empty, because then min is undefined. (t,self) < min {(t2,p2): (’request’, t2, p2) in q | (t2,p2) != (t,self)} However, that is incorrect, because the argument of min may be empty, in which case min is undefined. Instead of resorting to commonly used special values, such as maxint, which is ad hoc and error prone in general, the empty case can be added as the first disjunct of a disjunction: 11 2017/3/14 1 class P extends process: 2 def setup(s): 3 self.s := s 4 self.total := count s 5 self.q := {} 6 self.ds := new DS() {(t2,p2): (’request’, t2, p2) in q | (t2,p2) != (t,self)} = {} or (t,self) < min {(t2,p2): (’request’, t2, p2) in q | (t2,p2) != (t,self)} 15 16 17 18 # # def mutex(task): -- request self.t := logical_time() self.responded := {} # self.number := 0 # send (’request’, t, self) to s q.add((’request’, t, self)) await (ds.is_empty() or (t,self) and number = total # task() -- release q.del((’request’, t, self)) send (’release’, logical_time(), 19 20 21 22 receive (’request’, t2, p2): ds.add((t2,p2)) # add to data structure q.add((’request’, t2, p2)) send (’ack’, logical_time(), self) to p2 23 24 25 26 27 28 receive (’ack’, t2, p2): if t2 > t: if p2 in s: if p2 not in responded: responded.add(p2) number +:= 1 29 30 31 32 receive (’release’, _, p2): for (’request’, t2, =p2) in q: ds.del((t2,p2)) # delete from data structure q.del((’request’, t2, p2)) 7 8 9 10 11 12 13 14 In fact, the original universal quantification in the first conjunct in the await statement can be converted exactly to this disjunction by using rule 8 in Table 4 and then rule 13 in Table 3. Our method does not consider this conversion because it leads to a worse resulting program. Figure 4 shows the resulting program after incrementalization of the synchronization condition that uses the disjunction above, where ds stores the argument set of min and supports priority queue operations. All commented lines are new compared to Figure 2 except that the synchronization condition in the await statement is simplified. The program appears shorter than Figure 3 because the long complex code for maintaining the data structure ds is not included; it is in fact similar to Figure 3 except that ds is used and maintained instead of earlier and number1. The program in Figure 4 is still a drastic improvement over the original program in Figure 2, with the synchronization condition reduced to O(1) time and with received removed, just as in Figure 3. The difference is that maintaining ds for incrementalizing min under element addition to and deletion from q takes O(log |s|) time, as opposed to O(1) time for maintaining earlier and number1 in Figure 3. # total num of other processes # # # # # # data structure for maintaining requests by other processes set of responded processes num of responded processes < ds.min()) use maintained results self) to s new message handler comparison in conjunct 2 membership in conjunct 2 if not responded already add to responded increment number Figure 4. Optimized program with use of min after incrementalization. Definitions of run and main are as in Figure 2. Simplifications to the original algorithm. Consider the original algorithm in Figure 2. Note that incrementalization determined that there is no need for a process to update auxiliary values for its own request, in both Figures 3 and 4. Based on this, we discovered, manually, that updates to q for a process’s own request do not affect the two uses of q, on lines 9 and 35, in Figure 3 and the only use of q, on line 30, in Figure 4. So we can remove them in Figures 3 and 4. In addition, we can remove them on lines 9 and 14 in Figure 2 and remove the test (t2,p2) != (t,self), which becomes always true, in the synchronization condition, yielding a simplified original algorithm. Furthermore, note that the remaining updates to q in Figure 2 merely maintain pending requests by others, so we can remove lines 4, 17, 20, 21, and the entire receive definition for release messages, by using, for the first conjunct in the await statement, clock and FIFO channels. The incrementalization rules for maintaining the result of the new condition incorporate this property in a similar way as described for Figure 3, except it could be facilitated with also a data-flow analysis that determines the component of a received message holding the sender of the message. 1 class P extends process: 2 def setup(s): 3 self.s := s 4 5 6 7 8 10 11 12 def mutex(task): -- request self.t := logical_time() send (’request’, t, self) to s await each received(’request’, t2, p2) | not (some received(’release’, t3, =p2) | t3 > t2) implies (t,self) < (t2,p2) and each p2 in s | some received(’ack’, t2, =p2) | t2 > t task() -- release send (’release’, logical_time(), self) to s 13 14 receive (’request’, _, p2): send (’ack’, logical_time(), self) to p2 9 each received(’request’, t2, p2) | not (some received(’release’, t3, =p2) | t3 > t2) implies (t,self) < (t2,p2) Figure 5. Simplified algorithm. Definitions of run and main are as in Figure 2. Figure 5 shows the resulting simplified algorithm. Incrementalizing this program yields essentially the same programs as in Figures 3 and 4, except that it needs to use the property that when a message is added to received, all messages from the same process in received have a smaller timestamp. This property follows from the use of logical 6. Implementation and experiments We have developed a prototype implementation of the compiler and optimizations for DistAlgo and evaluated it in im12 2017/3/14 plementing a set of well-known distributed algorithms, as described previously [56]. We have also used DistAlgo in teaching distributed algorithms and distributed systems, and students used the language and system in programming assignments and course projects. We summarize results from the former and describe experience with the latter, after an overview and update about the implementation. Our DistAlgo implementation takes DistAlgo programs written in extended Python, applies analyses and optimizations, especially to the high-level queries, and generates executable Python code. It optionally interfaces with an incrementalizer to apply incrementalization before generating code. Applying incrementalization uses the methods and implementation from previous work: a library of incrementalization rules was developed, manually but mostly following a systematic method [51, 53], and applied automatically using InvTS [33, 54]. A set of heuristics are currently used to select the best program generated from incrementalizing differently converted aggregations. A more extensive implementation of DistAlgo than the first prototype [56] has been released and is being gradually improved [25]. Improved methods and implementation for incrementalization are also being developed [57], to replace manually written incrementalization rules, and to better select the best transformed programs. for the incremental program, but grows linearly with the number of requests for the original program. • Compared with running times of our best, manually writ- ten programs in programming languages, all running on a single machine, our generated DistAlgo takes about twice as long as our Python version, which takes about twice as long as our Java version, which takes about twice as long as our C version, which takes about four times as long as our Erlang version. Python is well known to be slow compared Java and C, and we have not focused on optimizing constant factors. Erlang is significantly faster than C and the rest because of its use of light-weight threads to implement processes that is facilitated by its being a functional language. However, among all our programs for Lamport’s distributed mutual exclusion, Erlang is the only one besides un-incrementalized DistAlgo whose memory usage for a fixed number of processes grows linearly with the number of requests. Programming distributed algorithms at a high level has also allowed us to discover several improvements to correctness and efficiency aspects of some of the algorithms [55]. For example, in the pseudocode for multi-Paxos [82], in process Commander, waiting for p2b messages containing ballot b from a majority of acceptors is expressed by starting with a waitfor set initialized to acceptors and then, in a for ever loop, repeatedly updating waitfor and testing |waitfor| < |acceptors|/2 as each p2b message containing ballot b arrives. The test is incorrect if implemented directly in commonly used languages such as Java, and even Python until Python 3, because / is integer division, which discards any fractional part; for example, test 1 < 3/2 becomes false but should be true. In DistAlgo, the entire code can simply be written as Evaluation in implementing distributed algorithms. We have used DistAlgo to implement a variety of well-known distributed algorithms, including twelve different algorithms for distributed mutual exclusion, leader election, and atomic commit, as well as Paxos, Byzantine Paxos, and multiPaxos, as summarized previously [56]; results of evaluation using these programs are as follows: • DistAlgo programs are consistently small, ranging from 22 to 160 lines, and are much smaller than specifications or programs written in other languages, mostly 1/2 to 1/5 of the size; also we were able to find only a few of these algorithms written in other languages. Our own best effort to write Lamport’s distributed mutual exclusion in programming languages resulted in 272 lines in C, 216 lines in Java, 122 lines in Python, and 99 lines in Erlang, compared with 32 lines in DistAlgo. await count {a: received (’p2b’,=b) from a} > (count acceptors)/2 using the standard majority test, and it is correct whether / is for integer or float. Experience in teaching distributed algorithms. DistAlgo has also helped us tremendously in teaching distributed algorithms, because it makes complex algorithms completely clear, precise, and directly executable. Students learn DistAlgo quickly through even a small programming assignment, despite that most did not know Python before, thanks to the power and clarity of Python. In particular, students in distributed systems courses have used DistAlgo in dozens of course projects, implementing the core of network protocols and distributed graph algorithms [59]; distributed coordination services Chubby [16] and Zookeeper [38]; distributed hash tables Kademlia [61], Chord [79], Pastry [74], Tapestry [87], and Dynamo [24]; distributed file systems GFS [32] and HDFS [78]; distributed databases Bigtable [19], Cassandra [42], and Mega- • Compilation times without incrementalization are all un- der 0.05 seconds on an Intel Core-i7 2600K CPU with 16GB of memory; and incrementalization times are all under 30 seconds. Generated code size ranges from 1395 to 1606 lines of Python, including 1300 lines of fixed library code. • Execution time and space confirm the analyzed asymp- totic time and space complexities. For example, for Lamport’s distributed mutual exclusion, total CPU time is linear in the number of processes for the incrementalized program, but superlinear for the original program; for a fixed number of processes, the memory usage is constant 13 2017/3/14 of the code is devoted to distributed systems aspects. The numbers of teams that chose various other languages are: Java 15, C++ 3, Go 3, Erlang 2, Node.js 2, Elixir (a variant of Erlang) 1, JavaScript 1. store [12]; distributed processing platform MapReduce [23]; and others. All distributed programming features were used extensively in students’ programs—easy process creation and setup and sending of messages, high-level control flows with receive definitions as well as await for synchronization, and declarative configurations—with the exception of queries over message histories, because students had been trained in many courses to handle events imperatively; we have not evaluated incrementalization on students’ programs, because execution efficiency has not been a problem. Overall, students’ experience helps confirm that DistAlgo allows complex distributed algorithms and services to be implemented much more easily than commonly used languages such as C++ and Java. We summarize two specific instances below. In a graduate class in Fall 2012, most of the 28 students initially planned to use Java or C++ for their course projects, because they were familiar with those and wanted to strengthen their experience of using them instead of using DistAlgo in implementing distributed systems. However, after doing one programming assignment using DistAlgo, all those students switched to DistAlgo for their course projects, except for one student, who had extensive experience with C++, including several years of internship at Microsoft Research programming distributed systems. • In the last assignment, teams implemented an extension to the banking service in one language of their choice. 59% of the teams chose DistAlgo for this, even though most students (about 80%) did not know Python, and none knew DistAlgo, at the beginning of the class. In other words, a majority of students decided that implementation of this type of system is better in DistAlgo, even compared to languages with which they had more experience and that are more widely used. • We asked each team to compare their experiences with the two languages. Teams consistently reported that development in DistAlgo was faster and easier than development in the other language (even though most students did not know Python before the project), and that the DistAlgo code was significantly shorter. It is no surprise that Java and C++ require more code, even when students used existing networking libraries, which they were encouraged to do. Comparison with Erlang and Go is more interesting, because they are high-level languages designed to support distributed programming. For the teams that chose Erlang, the average DistAlgo and Erlang code sizes, measured as non-empty non-comment line of code, are 586 and 1303, respectively. For the teams that chose Go, the average DistAlgo and Go code sizes are 465 and 1695, respectively. • This student wrote about 3000 lines of C++, compared to about 300 lines of DistAlgo written by several other students who chose the same project of implementing multi-Paxos and several optimizations. Furthermore, his C++ program was incomplete, lacking some optimizations that other students’ DistAgo programs included. 7. Related work and conclusion • The student did a re-implementation in DistAlgo quickly A wide spectrum of languages and notations have been used to describe distributed algorithms, e.g., [7, 29, 41, 44, 45, 59, 70–72, 81]. At one end, pseudocode with English is used, e.g., [41], which gives a high-level flow of the algorithms, but lacks the details and precision needed for a complete understanding. At the other end, state machine based specification languages are used, e.g., I/O automata [39, 59], which is completely precise, but uses low-level control flows that make it harder to write and understand the algorithms. There are also many notations in between these extremes, some being much more precise or completely precise while also giving a high-level control flow, e.g., Raynal’s pseudocode [70–72] and Lamport’s PlusCal [45]. However, all of these languages and notations lack concepts and mechanisms for building real distributed applications, and most of the languages are not executable. Many programming languages support programming of distributed algorithms and applications. Most support distributed programming through messaging libraries, ranging from relatively simple socket libraries to complex libraries such as MPI [62]. Many support Remote Procedure Call (RPC) or Remote Method Invocation (RMI), which allows after the course1 , confirming that it took about 300 lines. His biggest surprise was that his C++ program was an order of magnitude slower than his DistAlgo program. After several weeks of debugging, he found that it was due to an improper use of some C++ library function. The main contrast that the student concluded was the huge advantage of DistAlgo over C++ in ease of programming and program understanding, not to mention the unexpected performance advantage. In a graduate class in Fall 2014, each team of two students first implemented a fault-tolerant banking service in two languages: DistAlgo and another language of their choice other than Python. We excluded Python as the other language, because implementing the same service in such closely related languages would be less educational. The service uses chain replication [83] to tolerate crash failures. The service offers only a few simple banking operations (get balance, deposit, withdrawal, intra-bank transfer, inter-bank transfer), so most 1 The student wanted to do research on DistAlgo and so was asked to reimplement his project in DistAlgo. 14 2017/3/14 a process to call a subroutine in another process without the programmer coding the details for this. Many also support asynchronous method invocation (AMI), which allows the caller to not block and get the reply later. Some programming languages, such as Erlang [26, 46], which has an actor-like model [2], have support for message passing and process management built into the language. There are also other well-studied languages for distributed programming, e.g., Argus [47], Lynx [76], SR [5], Concert/C [8], and Emerald [15]. These languages all lack constructs for expressing control flows and complex synchronization conditions at a much higher level; such high-level constructs are extremely difficult to implement efficiently. DistAlgo’s construct for declaratively and precisely specifying yield points for handling received messages is a new feature that we have not seen in other languages. So is DistAlgo’s support of history variables in high-level synchronization conditions in non-deterministic await with timeout in a programming language. Our simple combination of synchronous await and asynchronous receive allows distributed algorithms to be expressed easily and clearly. There has been much work on producing executable implementations from formal specifications, e.g., from process algebras [37], I/O automata [31], Unity [35], and Seuss [40], as well as from more recently proposed high-level languages for distributed algorithms, e.g., Datalog-based languages Meld [6], Overlog [4], and Bloom [13], a Prologbased language DAHL [58], and a logic-based language EventML [14, 67]. An operational semantics was studied recently for a variant of Meld, called Linear Meld, that allows updates to be encoded more conveniently than Meld by using linear logic [22]. Compilation of DistAlgo to executable implementations is easy because it is designed to be so and DistAlgo is given an operational semantics. Highlevel queries and quantifications used for synchronization conditions can be compiled into loops straightforwardly, but they may be extremely inefficient. None of these prior works study powerful optimizations of quantifications. Efficiency concern is a main reason that similar high-level language constructs, whether for queries or assertions, are rarely used, if supported at all, in commonly used languages. Incrementalization has been studied extensively, e.g., [48, 69], both for doing it systematically based on languages, and in applying it in an ad hoc fashion to specific problems. However, all systematic incrementalization methods based on languages have been for centralized sequential programs, e.g., for loops [3, 30, 52], set languages [36, 53, 65], recursive functions [1, 49, 68], logic rules [50, 75], and objectoriented languages [51, 57, 63, 73]. This work is the first to extend incrementalization to distributed programs to support high-level synchronization conditions. This allows the large body of previous work on incrementalization, especially on sets and sequences, to be used for optimizing distributed programs. Quantifications are the centerpiece of first-order logic, and are dominantly used in writing synchronization conditions and assertions in specifications, but there are few results on generating efficient implementations of them. In the database area, despite extensive work on efficient implementation of high-level queries, efficient implementation of quantification has only been studied in limited scope or for extremely restricted query forms, e.g., [9–11, 20]. In logic programming, handling of universal quantification is based on variants of brute-force Lloyd-Topor transformations, e.g., [28, 66]; even state-of-the-art logic programming systems, e.g., [80], do not support universal quantification. Our method is the first general and systematic method for incrementalizing arbitrary quantifications. Although they are much more challenging to optimize than set queries, our method combines a set of general transformations to transform them into aggregations that can be most efficiently incrementalized using the best previous methods. To conclude, this article presents a powerful language and method for programming and optimizing distributed algorithms. There are many directions for future work, from formal verification on the theoretical side, to generating code in lower-level languages on the practical side, with many additional analyses and optimizations in between. In particular, a language with a high level of abstraction also faciliates formal verification, of not only the high-level programs, but also the generated efficient implementations when they are generated through systematic optimizations. Besides developing systematic optimizations, we have started to study formal verification of distributed algorithms [18] and their implementations by starting with their high-level, concise descriptions in DistAlgo. APPENDIX A. Semantics of DistAlgo We give an abstract syntax and operational semantics for a core language for DistAlgo. The operational semantics is a reduction semantics with evaluation contexts [77, 86]. A.1 Abstract Syntax The abstract syntax is defined in Figures 6 and 7. We use some syntactic sugar in sample code, e.g., we use infix notation for some binary operators, such as and and is. Notation. • A symbol in the grammar is a terminal symbol if it starts with a lower-case letter. • A symbol in the grammar is a non-terminal symbol if it starts with an upper-case letter. • In each production, alternatives are separated by a line- break. • * after a non-terminal means “0 or more occurrences”. • + after a non-terminal means “1 or more occurrences”. 15 2017/3/14 Program ::= Configuration ProcessClass* Method ProcessClass ::= class ClassName extends ClassName: Method * ReceiveDef * ReceiveDef ::= receive ReceivePattern+ at Label + : Statement receive ReceivePattern+ : Statement ReceivePattern ::= Pattern from InstanceVariable Method ::= def MethodName(Parameter *) Statement defun MethodName(Parameter *) Expression Statement ::= InstanceVariable := Expression InstanceVariable := new ClassName InstanceVariable := { Pattern : Iterator * | Expression } Statement ; Statement if Expression: Statement else: Statement for Iterator : Statement while Expression: Statement Expression.MethodName(Expression*) send Tuple to Expression Label await Expression : Statement AnotherAwaitClause* Label await Expression : Statement AnotherAwaitClause* timeout Expression skip Expression ::= Literal Parameter InstanceVariable Tuple Expression.MethodName(Expression*) UnaryOp(Expression) BinaryOp(Expression,Expression) isinstance(Expression,ClassName) and(Expression,Expression) / / conjunction (short-circuiting) or(Expression,Expression) / / disjunction (short-circuiting) each Iterator | Expression some Iterator | Expression Tuple ::= (Expression*) Figure 6. Abstract syntax, Part 1. • tθ denotes the result of applying substitution θ to t. We Constructs whose semantics is given by translation. represent substitutions as functions from variables to expressions. 1. Constructors for all classes, and setup() methods for process classes, are eliminated by translation into ordinary methods that assign to the fields of the objects. Well-formedness requirements on programs. 2. A method call or field assignment that does not explicitly specify the target object is translated into a method call or field assignment, respectively, on self. 1. The top-level method in a program must be named main. It gets executed in an instance of the pre-defined process class when the program starts. 3. An await statement without an explicitly specified label—in other words, the associated label is the empty string—is translated into an await statement with an explicitly specified label, by generating a fresh label name ℓ, replacing the empty label in that await statement with ℓ, and inserting ℓ in every at clause in the class containing the await statement. 2. Each label used in a receive definition must be the label of some statement that appears in the same class as the receive definition. 3. Invocations of methods defined using def appear only in method call statements. Invocations of methods defined using defun appear only in method call expressions. 16 2017/3/14 UnaryOp ::= not isTuple len BinaryOp ::= is plus select / / Boolean negation / / test whether a value is a tuple / / length of a tuple / / identity-based equality / / sum / / select(t,i) returns the i’th component of tuple t Pattern ::= InstanceVariable TuplePattern TuplePattern ::= (PatternElement*) PatternElement ::= Literal InstanceVariable =InstanceVariable Iterator ::= Pattern in Expression AnotherAwaitClause ::= or Expression : Statement Configuration ::= configuration ChannelOrder ChannelReliability ... ChannelOrder ::= fifo unordered ChannelReliability ::= reliable unreliable ClassName ::= ... MethodName ::= ... Parameter ::= ... InstanceVariable ::= Expression.Field Field ::= ... Label ::= ... Literal ::= BooleanLiteral IntegerLiteral ... BooleanLiteral ::= true false IntegerLiteral ::= ... Figure 7. Abstract syntax, Part 2. Ellipses (“...”) are for common syntactic categories whose details are unimportant. 4. The Boolean operators and and each are eliminated as follows: e1 and e2 is replaced with not(not(e1) or not(e2)), and each iter | e is replaced with not(some iter | not(e)). constants and the variables prefixed with “=” in (e1 , . . . , en ). Let ēj denote ej after removing the “=” prefix, if any. The quantification is rewritten as some x in s | isTuple(x) and len(x) is n and (select(x,j1), . . ., select(x,jm)) is (ēj1 , . . ., ējm ) and bθ. 5. An aggregation is eliminated by translation into a comprehension followed by a for loop that iterates over the set returned by the comprehension. The for loop updates an accumulator variable using the aggregation operator. • Consider the loop for (e1 , . . . , en ) in e : s. Let 6. Iterators containing tuple patterns are rewritten as iterators without tuple patterns, as follows. • Consider the existential quantification some (e1 , . . . , en ) in s | b. Let x be a fresh variable. Let θ be the substitution that replaces ei with select(x,i) for each i such that ei is a variable not prefixed with “=”. Let {j1 , . . . , jm } contain the indices of the 17 x and S be fresh variables. Let {i1 , . . . , ik } contain the indices in (e1 , . . . , en ) of variables not prefixed with “=”. Let θ be the substitution that replaces ei with select(x,i) for each i in {i1 , . . . , ik }. Let {j1 , . . . , jm } contain the indices in (e1 , . . . , en ) of the constants and the variables prefixed with “=”. Let ēj denote ej after removing the “=” prefix, if any. Note that e may denote a set or sequence, and duplicate bindings for the tuple of variables (ei1 , . . . , eik ) 2017/3/14 are filtered out if e is a set but not if e is a sequence. The loop is rewritten as the code in Figure 8. ables to a witness. Such existential quantifications could be added as a new form of statement. 7. Comprehensions in which some variables are prefixed with = are translated into comprehensions without such prefixing. Specifically, for a variable x prefixed with = in a comprehension, replace occurrences of =x in the comprehension with occurrences of a fresh variable y, and add the conjunct y is x to the Boolean condition. 7. Object creation and comprehension are statements, not expressions, because they have side-effects. Comprehension has the side-effect of creating a new set. 8. Parameter must include self. The values of method parameters cannot be updated (e.g., using assignment statements). For brevity, local variables of methods are omitted from the core language. Consequently, assignment is allowed only for instance variables. 8. Comprehensions are statically eliminated as follows. The comprehension x := { e | x1 in e1 , . . ., xn in en | b }, where each xi is a pattern, is replaced with 9. Semantically, the for loop copies the contents of a (mutable) sequence or set into an (immutable) tuple before iterating over it, to ensure that changes to the sequence or set by the loop body do not affect the iteration. An implementation could use optimizations to achieve this semantics without copying when possible. x := new set for x1 in e1 : ... for xn in en : if b: x.add(e) 10. For brevity, among the standard arithmetic operations (+, -, *, etc.), we include only one representative operation in the abstract syntax and semantics; others are handled similarly. 9. Wildcards are eliminated from tuple patterns by replacing each occurrence of wildcard with a fresh variable. 10. Remote method invocation, i.e., invocation of a method on another process after that process has been started, is translated into message communication. 11. The semantics below does not model real-time, so timeouts in await statements are simply allowed to occur non-deterministically. 12. We omit the concept of node (process location) from the semantics, and we omit the node argument of the constructor when creating instances of process classes, because process location does not affect other aspects of the semantics. Notes. 1. ClassName must include process. process is a predefined class; it should not be defined explicitly. process has fields sent and received, and it has a method start. 13. We omit configure handling statements from the syntax. The semantics is for configure handling = all. Semantics for other configure handling options can easily be added. 2. The grammar allows receive definitions to appear in classes that do not extend process, but such receive definitions are useless, so it would be reasonable to make them illegal. 14. To support initialization of a process by its parent, a process can access fields of another process and invoke methods on another process before the latter process is started. 3. The grammar does not allow labels on statements other than await. A label ℓ on a statement s other than await is treated as syntactic sugar for label ℓ on await true : skip followed by statement s. 15. We require that all messages be tuples. This is an inessential restriction; it slightly simplifies the specification of pattern matching for matching messages against patterns. 4. ClassName must include set and sequence. Sets and sequences are treated as objects, because they are mutable. These are predefined classes that should not be defined explicitly. Methods of set include add, del, contains, min, max, and size. Methods of sequence include add (which adds an element at the end of the sequence), contains, and length. We give the semantics explicitly for a few of these methods; the others are handled similarly. 16. A process’s sent sequence contains pairs of the form (m, d), where m is a message sent by the process to destination d. A process’s received sequence contains pairs of the form (m, s), where m is a message received by the process from sender s. A.2 Semantic Domains 5. Tuples are treated as immutable values, not as mutable objects. The semantic domains are defined in Figure 9. Notation. 6. All expressions are side-effect free. For simplicity, we treat quantifications as expressions, so existential quantifications do not have the side-effect of binding vari- • D ∗ contains finite sequences of values from domain D. • Set(D) contains finite sets of values from domain D. 18 2017/3/14 S := e if isinstance(S,set): S := { x : x in S | isTuple(x) and len(x) is n and (select(x,j1), . . ., select(x,jm)) is (ēj1 , . . ., ējm ) } for x in S: sθ else: / / S is a sequence for x in S: if (isTuple(x) and len(x) is n and (select(x,j1), . . ., select(x,jm)) is (ēj1 , . . ., ējm ): sθ else: skip Figure 8. Translation of for loop to eliminate tuple pattern. • D1 ⇀ D2 contains partial functions from D1 to D2 . HeapType in the semantics, even though the information in that function is distributed in the same way as the heap itself in an implementation. dom(f ) is the domain of a partial function f . • The MsgQueue associated with a process by the last {true, false} component of a state contains messages, paired with the sender, that have arrived at the process but have not yet ... been handled by matching receive definitions. ... ... A.3 Extended Abstract Syntax ProcessAddress ∪ NonProcessAddress Section A.1 defines the abstract syntax of programs that can Val ∗ be written by the user. Figure 10 extends the abstract syntax Bool ∪ Int ∪ Address ∪ Tuple to include additional forms into which programs may evolve Set(Val ) during evaluation. Only the new productions are shown here; all of the productions given above carry over unchanged. Val ∗ (Field ⇀ Val ) ∪ SetOfVal ∪ SeqOfVal Expression ::= Address Address ⇀ ClassName Address.Field Address ⇀ Object Statement ::= for Variable intuple Tuple: Statement ProcessAddress ⇀ LocalHeap ProcessAddress × ProcessAddress Figure 10. Extensions to the abstract syntax. ⇀ Tuple ∗ ∗ MsgQueue = (Tuple × ProcessAddress) The statement for v intuple t: s iterates over the State = (ProcessAddress ⇀ Statement) elements of tuple t, in the obvious way. ×HeapType × Heap × ChannelStates A.4 Evaluation Contexts ×(ProcessAddress ⇀ MsgQueue) Evaluation contexts, also called reduction contexts, are used to identify the next part of an expression or statement to be evaluated. An evaluation context is an expression or stateFigure 9. Semantic domains. Ellipses are used for semantic ment with a hole, denoted [], in place of the next subdomains of primitive values whose details are standard or expression or sub-statement to be evaluated. Evaluation conunimportant. texts are defined in Figure 11. Bool Int ProcessAddress NonProcessAddress Address Tuple Val SetOfVal SeqOfVal Object HeapType LocalHeap Heap ChannelStates = = = = = = = = = = = = = = Notes. A.5 Transition Relations • We require that ProcessAddress and NonProcessAddress The transition relation for expressions has the form ht : h ⊢ e → e′ , where e and e′ are expressions, ht ∈ HeapType, and h ∈ LocalHeap. The transition relation for statements has the form σ → σ ′ where σ ∈ State and σ ′ ∈ State. Both transition relations are implicitly parameterized by the program, which is needed to look up method definitions be disjoint. • For a ∈ ProcessAddress and h ∈ Heap, h(a) is the local heap of process a. For a ∈ Address and ht ∈ HeapType, ht(a) is the type of the object with address a. For convenience, we use a single (global) function for 19 2017/3/14 Val ::= Literal Address (Val*) C ::= [] (Val*,C ,Expression*) C .MethodName(Expression*) Address.MethodName(Val *,C ,Expression*) UnaryOp(C ) BinaryOp(C ,Expression) BinaryOp(Val,C ) isinstance(C,ClassName) or(C ,Expression) some Pattern in C | Expression C .Field := Expression Address.Field := C InstanceVariable := C C ; Statement if C : Statement else: Statement for InstanceVariable in C : Statement for InstanceVariable intuple Tuple: C send C to Expression send Val to C await Expression : Statement AnotherAwaitClause* timeout C Figure 11. Evaluation contexts. and configuration information. The transition relation for expressions is defined in Figure 12. The transition relation for statements is defined in Figures 13–14. Notation and auxiliary functions. • extends(c1 , c2 ) holds iff class c1 is a descendant of class c2 in the inheritance hierarchy. • For c ∈ ClassName, new (c) returns a new instance of c. new (c) = {} if c = set hi if c = sequence  f0 otherwise • For m ∈ MethodName and c ∈ ClassName, the rela- tion methodDef (c, m, def ) holds iff (1) class c defines method m, and def is the definition of m in c, or (2) c does not define m, and def is the definition of m in the nearest ancestor of c in the inheritance hierarchy that defines m. • For h, h̄, h̄′ ∈ LocalHeap and ht, ht′ ∈ HeapType and v, v̄ ∈ Val , the relation isCopy (v, h, h̄, ht, v̄, h̄′ , ht′ ) holds iff (1) v is a value in a process with local heap h, i.e., addresses in v are evaluated with respect to h, (2) v̄ is a copy of v for a process whose local heap was h̄ before v was copied into it and whose local heap is h̄′ after v is copied into it, i.e., v̄ is the same as v except that, instead of referencing objects in h, it references newly created copies of those objects in h̄′ , and (3) h̄′ and ht′ are versions of h̄ and ht updated to reflect the creation of those objects. As an exception, because process addresses are used as global identifiers, process addresses in v are copied unchanged into v̄, and new copies of process objects are not created. We give auxiliary definitions and then a formal definition of isCopy . For v ∈ Val , let addrs(v, h) denote the set of addresses that appear in v or in any objects or values reachable from v with respect to local heap h; formally, • In the transition rules, a matches an address; v matches a value (i.e., an element of Val); and ℓ matches a label. • For an expression or statement e, e[x := y] denotes e a ∈ addrs(v, h) ⇔ (v ∈ Address ∧ v = a) ∨ (v ∈ dom(h) ∧ h(v) ∈ Field ⇀ Val ∧ (∃f ∈ dom(h(v)). a ∈ addrs(h(v)(f ), h))) ∨ (v ∈ dom(h) ∧ h(v) ∈ SetOfVal ∪ SeqOfVal ∧ (∃v ′ ∈ h(v). a ∈ addrs(v ′ , h))) ∨ (∃v1 , . . . , vn ∈ Val. v = (v1 , . . . , vn ) ∧ ∃i ∈ [1..n]. a ∈ addrs(vi , h)) with all occurrences of x replaced with y. • A function matches the pattern f [x → y] iff f (x) equals y. For example, in transition rules for statements, a function P in ProcessAddress ⇀ Statement matches P [a → s] if P maps process address a to statement s. • For a function f , f [x := y] denotes the function that is the same as f except that it maps x to y. • f0 denotes the empty partial function, i.e., the partial For v, v̄ ∈ Val and f ∈ Address ⇀ Address, the relation subst(v, v̄, f ) holds iff v is obtained from v̄ by replacing each occurrence of an address a in dom(f ) with f (a) (informally, f maps addresses of new objects in v̄ to addresses of corresponding old objects in v); formally, function whose domain is the empty set. • For a (partial) function f , f ⊖ a denotes the function that is the same as f except that it has no mapping for a. • Sequences are denoted with angle brackets, e.g., h0, 1, 2i ∈ Int ∗ . • s@t is the concatenation of sequences s and t. subst(v, v̄, f ) = (v ∈ Bool ∪ Int ∪ (Address \ dom(f )) ∧ v̄ = v) ∨ (v ∈ dom(f ) ∧ f (v̄) = v) ∨ (∃v1 , . . . , vn , v̄1 , . . . , v̄n . v = (v1 , . . . , vn ) ∧ v̄ = (v̄1 , . . . , v̄n ) ∧ (∀i ∈ [1..n]. subst(vi , v̄i , f ))) • first(s) is the first element of sequence s. • rest(s) is the sequence obtained by removing the first element of s. • length(s) is the length of sequence s. 20 2017/3/14 Similarly, for o, ō ∈ Object and f ∈ Address ⇀ Address, the relation subst (o, ō, f ) holds iff o is obtained from ō by replacing each occurrence of an address 1−1 a in dom(f ) with f (a). For sets S and S ′ , let S → S ′ ′ be the set of bijections between S and S . returns {s1 , . . . , sn }. Otherwise, receiveAtLabel ((m, a), ℓ, c, h) returns ∅. A.6 Executions An execution is a sequence of transitions σ0 → σ1 → σ2 → · · · such that σ0 is an initial state. The set of initial states is defined in Figure 15. Intuitively, ap is the address of the initial process, ar is the address of the received sequence of the initial process, and as is the address of the sent sequence of the initial process. Informally, execution of the statement initially associated with a process may eventually (1) terminate (i.e., the statement associated with the process becomes skip, indicating that there is nothing left for the process to do), (2) get stuck (i.e., the statement associated with the process is not skip, and the process has no enabled transitions) due to an unsatisfied await statement or an error (e.g., the statement contains an expression that tries to select a component from a value that is not a tuple, or the statement contains an expression that tries to read the value of a non-existent field), or (3) run forever due to an infinite loop or infinite recursion. Finally, isCopy is defined as follows (intuitively, A contains the addresses of the newly allocated objects): isCopy (v, h, h̄, ht, v̄, h̄′ , ht′ ) ⇔ ∃A ⊂ NonProcessAddress. 1−1 ∃f ∈ A → (addrs(v, h) \ ProcessAddress). A ∩ dom(ht) = ∅ ∧ dom(ht′ ) = dom(ht) ∪ A ∧ dom(h̄′ ) = dom(h̄) ∪ A ∧ (∀a ∈ dom(ht). ht′ (a) = ht(a)) ∧ (∀a ∈ dom(h̄). h̄′ (a) = h̄(a)) ∧ (∀a ∈ A. ht′ (a) = ht(f (a)) ∧ subst(h(a), h̄′ (a), f )) • For m ∈ Val, a ∈ ProcessAddress, ℓ ∈ Label , h ∈ LocalHeap, and a receive definition d, if message m can be received from a at label ℓ by a process with local heap h using receive definition d, then matchRcvDef (m, a, ℓ, h, d) returns the appropriately instantiated body of d. Acknowledgments We thank Michael Gorbovitski for supporting the use of InvTS for automatic incrementalization of DistAlgo programs. We are grateful to the following people for their helpful comments and discussions: Ken Birman, Andrew Black, Jon Brandvein, Wei Chen, Ernie Cohen, Mike Ferdman, John Field, Georges Gonthier, Leslie Lamport, Nancy Lynch, Lambert Meertens, Stephan Merz, Don Porter, Michel Raynal, John Reppy, Emin Gün Sirer, Doug Smith, Gene Stark, and Robbert van Renesse. We thank the anonymous reviewers for their detailed and helpful comments. We first define some auxiliary relations and functions. The relation matchesDefLbl (d, ℓ) holds iff receive definition d either lacks an at clause or has an at clause that includes ℓ. bound(P ) returns the set of variables that appear in pattern P prefixed with “=”. vars(P ) returns the set of variables that appear in P . findSubstPat(m, a, h, P from x) returns the substitution θ with domain vars(P ) ∪ {x} such that m = P θ ∧ θ(x) = a ∧ (∀y ∈ bound (P ). θ(y) = h(y)), if any, otherwise it returns ⊥. findSubst(m, a, h, d) returns findSubstPat(m, a, h, P from x) for the first receive pattern P from x in d such that findSubstPat(m, a, h, P from x) 6= ⊥, if any, otherwise it returns ⊥. References [1] U. A. Acar, G. E. Blelloch, and R. Harper. Adaptive functional programming. ACM Transactions on Programming Languages and Systems, 28(6):990–1034, 2006. [2] G. Agha. Actors: A Model of Concurrent Computation in Distributed Systems. MIT Press, 1986. If matchesDefLbl (d, ℓ) ∧ findSubst(m, a, h, d) 6= ⊥, then matchRcvDef (m, a, ℓ, h, d) returns sθ, where s is the body of d (i.e., the statement that appears in d) and θ = findSubst(m, a, h, d), otherwise it returns ⊥. [3] F. E. Allen, J. Cocke, and K. Kennedy. Reduction of operator strength. In S. S. Muchnick and N. D. Jones, editors, Program Flow Analysis, pages 79–101. Prentice-Hall, 1981. • For m ∈ Val , a ∈ ProcessAddress, ℓ ∈ Label , c ∈ [4] P. Alvaro, T. Condie, N. Conway, J. Hellerstein, and R. Sears. ClassName, and h ∈ LocalHeap, if message m can be I do declare: Consensus in a logic language. ACM SIGOPS received from a at label ℓ in class c by a process with local Operating Systems Review, 43(4):25–30, 2010. heap h, then receiveAtLabel ((m, a), ℓ, c, h) returns a set [5] G. R. Andrews and R. A. Olsson. The SR Programming of statements that should be executed when receiving m Language: Concurrency in Practice. Benjamin Cummings, in that context. 1993. Specifically, if class c contains a receive definition d [6] M. P. Ashley-Rollman, P. Lee, S. C. Goldstein, P. Pillai, and such that matchRcvDef (m, a, ℓ, h, d) is not ⊥, then, letJ. D. Campbell. A language for large ensembles of indepenting d1 , . . . , dn be the receive definitions in c such that dently executing nodes. In Proceedings of the 25th IntermatchRcvDef (m, a, ℓ, h, di ) is not ⊥, and letting si = national Conference on Logic Programming, pages 265–280. Springer, 2009. matchRcvDef (m, a, ℓ, h, di ), receiveAtLabel ((m, a), ℓ, c, h) 21 2017/3/14 / / field access ht : h ⊢ a.f → h(a)(f ) if a ∈ dom(h) ∧ f ∈ dom(h(a)) / / invoke method in user-defined class ht : h ⊢ a.m(v1 , . . . , vn ) → e[self := a, x1 := v1 , . . . , xn := vn ] if a ∈ dom(h) ∧ methodDef (ht(a), m, defun m(x1 , . . . , xn ) e) / / invoke method in pre-defined class (representative examples) ht : h ⊢ a.contains(v1 ) → true if a ∈ dom(h) ∧ ht(a) = set ∧ v1 ∈ h(a) ht : h ⊢ a.contains(v1 ) → false if a ∈ dom(h) ∧ ht(a) = set ∧ v1 6∈ h(a) / / unary operations ht : h ⊢ not(true) → false ht : h ⊢ not(false) → true ht : h ⊢ isTuple(v) → true if v is a tuple ht : h ⊢ isTuple(v) → false if v is not a tuple ht : h ⊢ len(v) → n if v is a tuple with n components / / binary operations ht : h ⊢ is(v1 , v2 ) → true if v1 and v2 are the same (identical) value ht : h ⊢ plus(v1 , v2 ) → v3 if v1 ∈ Int ∧ v2 ∈ Int ∧ v3 = v1 + v2 ht : h ⊢ select(v1 , v2 ) → v3 if v2 ∈ Int ∧ v2 > 0 ∧ (v1 is a tuple with at least v2 components) ∧ (v3 is the v2 ’th component of v1 ) / / isinstance ht : h ⊢ isinstance(a, c) → true if ht(a) = c ht : h ⊢ isinstance(a, c) → false if ht(a) 6= c / / disjunction ht : h ⊢ or(true, e) → true ht : h ⊢ or(false, e) → e / / existential quantification ht : h ⊢ some x in a | e → e[x := v1 ] or · · · or e[x := vn ] if (ht(a) = sequence ∧ h(a) = hv1 , . . . , vn i) ∨ (ht(a) = set ∧ hv1 , . . . , vn i is a linearization of h(a)) Figure 12. Transition relation for expressions. [12] J. Baker, C. Bond, J. C. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. Léon, Y. Li, A. Lloyd, and V. Yushprakh. Megastore: Providing scalable, highly available storage for interactive services. In Proceedings of the Conference on Innovative Database Research, pages 223–234, 2011. [7] H. Attiya and J. Welch. Distributed Computing: Fundamentals, Simulations, and Advanced Topics. Wiley, 2nd edition, 2004. [8] J. S. Auerbach, A. P. Goldberg, G. S. Goldszmidt, A. S. Gopal, M. T. Kennedy, J. R. Rao, and J. R. Russell. Concert/C: A language for distributed programming. In Proceedings of the USENIX Winter 1994 Technical Conference. USENIX Association, 1994. [13] Berkeley Orders of Magnitude. Bloom Programming Language. http://www.bloom-lang.net, 2013. Lastest release April 23, 2013. Accessed January 14, 2017. [14] M. Bickford. Component specification using event classes. In Proceedings of the 12th International Symposium on Component-Based Software Engineering, pages 140–155. Springer, 2009. [9] A. Badia. Question answering and database querying: Bridging the gap with generalized quantification. Journal of Applied Logic, 5(1):3–19, 2007. [10] A. Badia, D. Van Gucht, and M. Gyssens. Query languages with generalized quantifiers. In R. Ramakrishnan, editor, Applications of Logic in Databases. Kluwer Academic, 1995. [15] A. P. Black, N. C. Hutchinson, E. Jul, and H. M. Levy. The development of the Emerald programming language. In Proceedings of the 3rd ACM SIGPLAN Conference on History of Programming Languages, pages 11–1–11–51, 2007. [11] A. Badia, B. Debes, and B. Cao. An implementation of a query language with generalized quantifiers. In Proceedings of the 27th International Conference on Conceptual Modeling, pages 547–548. Springer, 2008. [16] M. Burrows. The Chubby lock service for loosely-coupled distributed systems. In Proceedings of the 7th USENIX Sym- 22 2017/3/14 / / field assignment (P [a → a′ .f := v], ht, h[a → ha[a′ → o]], ch, mq) → (P [a := skip], ht, h[a := ha[a′ := o[f := v]]], ch, mq) / / object creation (P [a → a′ .f := new c], ht, h[a → ha[a′ → o]], ch, mq) → (P [a := skip], ht[a′ := c], h[a := ha[a′ := o[f := ac ], ac := new (c)]], ch, mq) if ac 6∈ dom(ht) ∧ ac ∈ Address ∧ (ac ∈ ProcessAddress ⇔ extends(c, process)) / / sequential composition (P [a → skip; s], ht, h, ch, mq) → (P [a := s], ht, h, ch, mq) / / conditional statement (P [a → if true : s1 else : s2 ], ht, h, ch, mq) → (P [a := s1 ], ht, h, ch, mq) (P [a → if false : s1 else : s2 ], ht, h, ch, mq) → (P [a := s2 ], ht, h, ch, mq) / / for loop (P [a → for x in a′ : s], ht, h, ch, mq) → (P [a := for x intuple (v1 , . . . , vn ) : s], ht, h, ch, mq) if ((ht(a) = sequence ∧ h(a)(a′ ) = hv1 , . . . , vn i) ∨ (ht(a) = set ∧ hv1 , . . . , vn i is a linearization of h(a)(a′ ))) (P [a → for x intuple (v1 , . . . , vn ) : s], ht, h, ch, mq) → (P [a := s[x := v1 ]; for x intuple (v2 , . . . , vn ) : s], ht, h, ch, mq) (P [a → for x intuple () : s], ht, h, ch, mq) → (P [a := skip], ht, h, ch, mq) / / while loop (P [a → while e: s], ht, h, ch, mq) → (P [a := if e: (s; while e: s) else : skip], ht, h, ch, mq) / / invoke method in user-defined class (P [a → a′ .m(v1 , . . . , vn )], ht, h, ch, mq) → (P [a := s[self := a, x1 := v1 , . . . , xn := vn ]], ht, h, ch, mq) if a′ ∈ dom(h(a)) ∧ ht(a′ ) 6∈ {process, set, sequence} ∧ methodDef (ht(a′ ), m, def m(x1 , . . . , xn ) s) / / invoke method in pre-defined class (representative examples) / / process.start allocates a local heap and sent and received sequences for the new process, / / and moves the started process to the new local heap. (P [a → a′ .start()], ht, h[a → ha[a′ → o], ch, mq) → (P [a := skip, a′ := a′ .run()], ht[as := sequence, ar := sequence], h[a := ha ⊖ a′ , a′ := f0 [a′ → o[sent := as , received := ar ], ar := hi, as := hi]], ch, mq) if extends(ht(a′ ), process) ∧ (ht(a′ ) inherits start from process) ∧ ar 6∈ dom(ht) ∧ as 6∈ dom(ht) ∧ ar ∈ NonProcessAddress ∧ as ∈ NonProcessAddress (P [a → a′ .add(v1 )], ht, h[a → ha], ch, mq) → (P [a := skip], ht, h[a := ha[a′ := ha(a′ ) ∪ {v1 }]], ch, mq) if a′ ∈ dom(ha) ∧ ht(a′ ) = set (P [a → a′ .add(v1 )], ht, h[a → ha], ch, mq) → (P [a := skip], ht, h[a := ha[a′ := ha(a′ )@hv1 i]], ch, mq) if a′ ∈ dom(ha) ∧ ht(a′ ) = sequence Figure 13. Transition relation for statements, Part 1. 23 2017/3/14 / / send a message to one process. create copies of the message for the sender’s sent sequence / / and the receiver. (P [a → send v to a2 ], ht, h[a → ha, a2 → ha2 ], ch, mq) → (P [a := skip], ht′′ , h[a := ha′ [as := ha(as )@h(v1 , a2 )i], a2 := ha′2 ], ch[(a, a2 ) := ch((a, a2 ))@hv2 i], mq) if a2 ∈ ProcessAddress ∧ as = ha(a)(sent) ∧ isCopy (v, ha, ha, ht, v1 , ha′ , ht′ ) ∧ isCopy (v, ha′ , ha2 , ht′ , v2 , ha′2 , ht′′ ) / / send to a set of processes (P [a → send v to a′ ], ht, h[a → ha], ch, mq) → (P [a := for x in a′ : send v to x], ht, h[a := ha[as := ha(as )@h(v, a′ )i]], ch, mq) if ht(a′ ) = set ∧ as = ha(a)(sent) ∧ (x is a fresh variable) / / message reordering (P, ht, h, ch[(a, a′ ) → q], mq) → (P, ht, h, ch[(a, a′ ) := q ′ ], mq) if (channel order is unordered in the program configuration) ∧ (q ′ is a permutation of q) / / message loss (P, ht, h, ch[(a, a′ ) → q], mq) → (P, ht, h, ch[(a, a′ ) := q ′ ], mq) if (channel reliability is unreliable in the program configuration) ∧ (q ′ is a subsequence of q) / / arrival of a message from process a at process a′ . remove message from channel, and append / / (message, sender) pair to message queue. (P, ht, h, ch[(a, a′ ) → q], mq) → (P, ht, h, ch[(a, a′ ) := rest(q)], mq[a′ := mq(a′ )@h(first (q), a)i]) if length(q) > 0 / / handle a message at a yield point. remove the (message, sender) pair from the message / / queue, append a copy to the received sequence, and prepare to run matching receive / / handlers associated with ℓ, if any. s has a label hence must be await. (P [a → ℓ s], ht, h[a → ha], ch, mq[a → q]) → (P [a := s′ [self := a]; ℓ s], ht′ , h[a → ha′ [ar → ha(ar )@hcopyi]], ch, mq[a := rest(q)]) if length(q) > 0 ∧ ar = ha(a)(received) ∧ isCopy (first (q), ha, ha, ht, copy, ha′ , ht′ ) ∧ receiveAtLabel (first(q), ℓ, ht(a), ha′ ) = S ∧ s′ is a linearization of S / / await without timeout clause (P [a → ℓ await e1 :s1 or · · · or en :sn ], ht, h, ch, mq) → (P [a := si ], ht, h, ch, mq) if length(mq(a)) = 0 ∧ i ∈ [1..n] ∧ h(a) : ht ⊢ ei → true / / await with timeout clause, terminated by true condition (P [a → ℓ await e1 :s1 or · · · or en :sn timeout v:s], ht, h, ch, mq) → (P [a := si ], ht, h, ch, mq) if length(mq(a)) = 0 ∧ i ∈ [1..n] ∧ h(a) : ht ⊢ ei → true / / await with timeout clause, terminated by timeout (occurs non-deterministically) (P [a → ℓ await e1 :s1 or · · · or en :sn timeout v:s], ht, h, ch, mq) → (P [a := s], ht, h, ch, mq) if length(mq(a)) = 0 ∧ h(a) : ht ⊢ e1 → false ∧ · · · ∧ h(a) : ht ⊢ en → false / / context rule for expressions h(a) : ht ⊢ e → e′ (P [a → C[e]], ht, h, ch, mq) → (P [a := C[e′ ]], ht, h, ch, mq) / / context rule for statements (P [a → s], ht, h, ch, mq) → (P [a := s′ ], ht′ , h′ , ch′ , mq ′ ) (P [a → C[s]], ht, h, ch, mq) → (P [a := C[s′ ]], ht′ , h′ , ch′ , mq ′ ) Figure 14. Transition relation for statements, Part 2. 24 2017/3/14 Init = {(P, ht, h, ch, mq) ∈ State | ∃ ap ∈ ProcessAddress, ar ∈ NonProcessAddress, as ∈ NonProcessAddress. ar 6= as ∧ P = f0 [ap := ap .main()] ∧ht = f0 [ap := process, ar := sequence, as := sequence] ∧ h = f0 [ap := ha] ∧ ch = (λ(a1 , a2 ) ∈ ProcessAddress ×ProcessAddress. hi) ∧ mq = (λa ∈ ProcessAddress. hi) where ha = f0 [ap := op , ar := hi, as := hi] op = f0 [received := ar , sent := as ]} Figure 15. Initial states. [27] C. J. Fidge. Timestamps in message-passing systems that preserve the partial ordering. In Proceedings of the 11th Australian Computer Science Conference, pages 56–66, 1988. [28] F. Fioravanti, A. Pettorossi, M. Proietti, and V. Senni. Program transformation for development, verification, and synthesis of programs. Intelligenza Artificiale, 5(1):119–125, 2011. [29] V. K. Garg. Elements of Distributed Computing. Wiley, 2002. [30] Gautam and S. Rajopadhye. Simplifying reductions. In Conference Record of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages 30–41, 2006. ISBN 1-59593-027-2. [31] C. Georgiou, N. A. Lynch, and P. M. andJoshua A. Tauber. Automated implementation of complex distributed algorithms specified in the IOA language. International Journal on Software Tools for Technology Transfer, 11(2):153–171, 2009. [32] S. Ghemawat, H. Gobioff, and S.-T. Leung. The Google file system. ACM SIGOPS Operating Systems Review, 37(5):29– 43, 2003. posium on Operating Systems Design and Implementation, pages 335–350, 2006. [33] M. Gorbovitski, Y. A. Liu, S. D. Stoller, T. Rothamel, and T. Tekle. Alias analysis for optimization of dynamic languages. In Proceedings of the 6th Symposium on Dynamic Languages, pages 27–42. ACM Press, 2010. [17] J. Cai, P. Facon, F. Henglein, R. Paige, and E. Schonberg. Type analysis and data structure selection. In B. Möller, editor, Constructing Programs from Specifications, pages 126–164. North-Holland, 1991. [34] D. Goyal. A Language Theoretic Approach to Algorithms. PhD thesis, Department of Computer Science, New York University, 2000. [18] S. Chand, Y. A. Liu, and S. D. Stoller. Formal verification of multi-Paxos for distributed consensus. In Proceedings of the 21st International Symposium on Formal Methods, pages 119–136. Springer, 2016. [35] A. Granicz, D. M. Zimmerman, and J. Hickey. Rewriting UNITY. In Proceedings of the 14th International Conference on Rewriting Techniques and Applications, pages 138–147. Springer, 2003. [19] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems, 26(2):4, 2008. [36] A. Gupta, I. S. Mumick, and V. S. Subrahmanian. Maintaining views incrementally. In Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pages 157–166, 1993. [20] J. Claußen, A. Kemper, G. Moerkotte, and K. Peithner. Optimizing queries with universal quantification in object-oriented and object-relational databases. In Proceedings of the 23rd International Conference on Very Large Data Bases, pages 286–295. Morgan Kaufman, 1997. [37] D. Hansel, R. Cleaveland, and S. A. Smolka. Distributed prototyping from validated specifications. Journal of Systems and Software, 70(3):275–298, 2004. [21] T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, 3rd edition, 2009. [38] P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. ZooKeeper: Wait-free coordination for internet-scale systems. In USENIX Annual Technical Conference, page 9, 2010. [22] F. Cruz, R. Rocha, S. C. Goldstein, and F. Pfenning. A linear logic programming language for concurrent programming over graph structures. Theory and Practice of Logic Programming, 14:493–507, 7 2014. [39] D. Kaynar, N. Lynch, R. Segala, and F. Vaandrager. The Theory of Timed I/O Automata. Morgan & Claypool, 2nd edition, 2010. [23] J. Dean and S. Ghemawat. MapReduce: Simplified data processing on large clusters. Communications of the ACM, 51(1): 107–113, 2008. [40] I. H. Krüger. An experiment in compiler design for a concurrent object-based programming language. Master’s thesis, The University of Texas at Austin, 1996. [24] G. DeCandia, D. Hastorun, M. Jampani, G. Kakulapati, A. Lakshman, A. Pilchin, S. Sivasubramanian, P. Vosshall, and W. Vogels. Dynamo: Amazon’s highly available keyvalue store. ACM SIGOPS Operating Systems Review, 41(6): 205–220, 2007. [41] A. Kshemkalyani and M. Singhal. Distributed Computing: Principles, Algorithms, and Systems. Cambridge University Press, 2008. [42] A. Lakshman and P. Malik. Cassandra: A decentralized structured storage system. ACM SIGOPS Operating Systems Review, 44(2):35–40, 2010. [25] DistAlgo. DistAlgo: A Language for Distributed Algorithms. http://github.com/DistAlgo, 2016. Beta release September 27, 2014. 1.0 release November 13, 2016. [43] L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21:558–565, 1978. [26] Erlang. Erlang Programming Language. http://www. erlang.org/, 2015. Last released December 18, 2015. 25 2017/3/14 [60] F. Mattern. Virtual time and global states of distributed systems. In Proceedings of the International Workshop on Parallel and Distributed Algorithms, pages 120–131. NorthHolland, 1989. [44] L. Lamport. Specifying Systems: The TLA+ Language and Tools for Hardware and Software Engineers. AddisonWesley, 2002. [45] L. Lamport. The PlusCal algorithm language. In Proceedings of the 6th International Colloquium on Theoretical Aspects of Computing, pages 36–60. Springer, 2009. [61] P. Maymounkov and D. Mazières. Kademlia: A peer-to-peer information system based on the XOR metric. In Peer-to-Peer Systems, pages 53–65, 2002. [46] J. Larson. Erlang for concurrent programming. Communications of the ACM, 52(3):48–56, 2009. [62] MPI. Message Passing Interface Forum. http://www. mpi-forum.org/, Last released June 4, 2015. [47] B. Liskov. Distributed programming in Argus. Communications of the ACM, 31(3):300–312, Mar. 1988. [63] H. Nakamura. Incremental computation of complex object queries. In Proceedings of the 16th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 156–165, 2001. [48] Y. A. Liu. Systematic Program Design: From Clarity To Efficiency. Cambridge University Press, 2013. [49] Y. A. Liu and S. D. Stoller. Dynamic programming via static incrementalization. Higher-Order and Symbolic Computation, 16(1–2):37–62, 2003. [64] R. Paige. Real-time simulation of a set machine on a RAM. In Proceedings of the International Conference on Computing and Information, pages 69–73. Canadian Scholars Press, 1989. [50] Y. A. Liu and S. D. Stoller. From Datalog rules to efficient programs with time and space guarantees. ACM Transactions on Programming Languages and Systems, 31(6):1–38, 2009. [65] R. Paige and S. Koenig. Finite differencing of computable expressions. ACM Transactions on Programming Languages and Systems, 4(3):402–454, 1982. [51] Y. A. Liu, S. D. Stoller, M. Gorbovitski, T. Rothamel, and Y. E. Liu. Incrementalization across object abstraction. In Proceedings of the 20th ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications, pages 473–486, 2005. [66] V. Petukhin. Programs with universally quantified embedded implications. In Proceedings of the 4th International Conference on Logic Programming and Nonmonotonic Reasoning, pages 310–324. Springer, 1997. [52] Y. A. Liu, S. D. Stoller, N. Li, and T. Rothamel. Optimizing aggregate array computations in loops. ACM Transactions on Programming Languages and Systems, 27(1):91–125, 2005. [67] PRL Project. EventML. http://www.nuprl.org/ software/\#WhatisEventML, 2013. Lastest release September 21, 2012. Accessed January 14, 2017. [53] Y. A. Liu, C. Wang, M. Gorbovitski, T. Rothamel, Y. Cheng, Y. Zhao, and J. Zhang. Core role-based access control: Efficient implementations by transformations. In Proceedings of the ACM SIGPLAN 2006 Workshop on Partial Evaluation and Program Manipulation, pages 112–120, 2006. [68] W. Pugh and T. Teitelbaum. Incremental computation via function caching. In Conference Record of the 16th Annual ACM Symposium on Principles of Programming Languages, pages 315–328, 1989. [69] G. Ramalingam and T. Reps. A categorized bibliography on incremental computation. In Conference Record of the 20th Annual ACM Symposium on Principles of Programming Languages, pages 502–510, 1993. [54] Y. A. Liu, M. Gorbovitski, and S. D. Stoller. A language and framework for invariant-driven transformations. In Proceedings of the 8th International Conference on Generative Programming and Component Engineering, pages 55–64. ACM Press, 2009. [70] M. Raynal. Distributed Algorithms and Protocols. Wiley, 1988. [55] Y. A. Liu, S. D. Stoller, and B. Lin. High-level executable specifications of distributed algorithms. In Proceedings of the 14th International Symposium on Stabilization, Safety, and Security of Distributed Systems, pages 95–110. Springer, 2012. [71] M. Raynal. Communication and Agreement Abstractions for Fault-Tolerant Asynchronous Distributed Systems. Morgan & Claypool, 2010. [72] M. Raynal. Distributed Algorithms for Message-Passing Systems. Springer, 2013. [56] Y. A. Liu, S. D. Stoller, B. Lin, and M. Gorbovitski. From clarity to efficiency for distributed algorithms. In Proceedings of the 27th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages and Applications, pages 395–410, 2012. [73] T. Rothamel and Y. A. Liu. Generating incremental implementations of object-set queries. In Proceedings of the 7th International Conference on Generative Programming and Component Engineering, pages 55–66. ACM Press, 2008. [57] Y. A. Liu, J. Brandvein, S. D. Stoller, and B. Lin. Demanddriven incremental object queries. In Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, pages 228–241. ACM Press, 2016. [74] A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms, Middleware 2001, pages 329–350. Springer, 2001. [58] N. P. Lopes, J. A. Navarro, A. Rybalchenko, and A. Singh. Applying Prolog to develop distributed systems. Theory and Practice of Logic Programming, 10(4-6):691–707, July 2010. [75] D. Saha and C. R. Ramakrishnan. Incremental evaluation of tabled logic programs. In Proceedings of the 19th International Conference on Logic Programming, pages 392–406. Springer, 2003. [59] N. A. Lynch. Distributed Algorithms. Morgan Kaufman, 1996. 26 2017/3/14 [76] M. L. Scott. The Lynx distributed programming language: Motivation, design, and experience. Computer Languages, 16 (3):209–233, 1991. [77] T. F. Serbanuta, G. Rosu, and J. Meseguer. A rewriting logic approach to operational semantics. Information and Computation, 207:305–340, 2009. [78] K. Shvachko, H. Kuang, S. Radia, and R. Chansler. The Hadoop distributed file system. In Proceedings of the 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies, pages 1–10. IEEE CS Press, 2010. [79] I. Stoica, R. Morris, D. Liben-Nowell, D. Karger, M. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11(1):17–32, 2003. [80] T. Swift, D. S. Warren, et al. The XSB System Version 3.7,x, 2016. http://xsb.sourceforge.net. Latest release July 6, 2016. [81] G. Tel. Introduction to Distributed Algorithms. Cambridge University Press, 2nd edition, 2000. [82] R. van Renesse and D. Altinbuken. Paxos made moderately complex. ACM Computing Surveys, 47(3):42:1–42:36, Feb. 2015. [83] R. van Renesse and F. B. Schneider. Chain replication for supporting high throughput and availability. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation, pages 91–104. USENIX Association, 2004. [84] D. E. Willard. Efficient processing of relational calculus expressions using range query theory. In Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, pages 164–175, 1984. [85] D. E. Willard. An algorithm for handling many relational calculus queries efficiently. Journal of Computer and System Sciences, 65:295–331, 2002. [86] A. K. Wright and M. Felleisen. A syntactic approach to type soundness. Information and Computation, 115:38–94, 1994. [87] B. Y. Zhao, L. Huang, J. Stribling, S. C. Rhea, A. D. Joseph, and J. D. Kubiatowicz. Tapestry: A resilient global-scale overlay for service deployment. IEEE Journal on Selected Areas in Communications, 22(1):41–53, 2004. 27 2017/3/14
6cs.PL
Ternary Neural Networks with Fine-Grained Quantization arXiv:1705.01462v3 [cs.LG] 30 May 2017 Naveen Mellempudi1 , Abhisek Kundu1 , Dheevatsa Mudigere1 , Dipankar Das1 , Bharat Kaul1 , and Pradeep Dubey2 1 Parallel Computing Lab, Intel Labs, Bangalore, India Parallel Computing Lab, Intel Labs, Santa Clara, CA 2 Abstract We propose a novel fine-grained quantization (FGQ) method to ternarize pretrained full precision models, while also constraining activations to 8 and 4-bits. Using this method, we demonstrate minimal loss in classification accuracy on state-of-the-art topologies without additional training. We provide an improved theoretical formulation that forms the basis for a higher quality solution using FGQ. Our method involves ternarizing the original weight tensor in groups of N weights. Using N = 4, we achieve Top-1 accuracy within 3.7% and 4.2% of the baseline full precision result for Resnet-101 and Resnet-50 respectively, while eliminating 75% of all multiplications. These results enable a full 8/4-bit inference pipeline, with best reported accuracy using ternary weights on ImageNet dataset, with a potential of 9× improvement in performance. Also, for smaller networks like AlexNet, FGQ achieves state-of-the-art results. We further study the impact of group size on both performance and accuracy. With a group size of N = 64, we eliminate ≈ 99% of the multiplications; however, this introduces a noticeable drop in accuracy, which necessitates fine tuning the parameters at lower precision. We address this by fine-tuning Resnet-50 with 8-bit activations and ternary weights at N = 64, improving the Top-1 accuracy to within 4% of the full precision result with < 30% additional training overhead. Our final quantized model can run on a full 8-bit compute pipeline using 2-bit weights and has the potential of up to 15× improvement in performance compared to baseline full-precision models. 1 Introduction Today’s deep learning models achieve state-of-the-art results on a wide variety of tasks including Computer Vision, Natural Language Processing, Automatic Speech Recognition and Reinforcement Learning [1]. Mathematically, this involves solving a non-convex optimization problem with order of millions or more parameters. Solving this optimization problem - also referred to as training the neural network - is a compute-intensive process that, for current state-of-the-art networks, requires days to weeks. Once trained, the network evaluates a function on specific input data - referred to as inference. While the compute intensity for inference is much lower than that of training, owing to the fact that inference is done on a large number of input data, the total computing resources spent on inference is likely to dwarf those spent on training. The large and somewhat unique compute requirements for both deep learning training and inference operations motivate the use of customized low precision arithmetic [9, 2, 8, 24, 15, 13] and specialized hardware to run these computations as efficiently as possible [5, 25, 21, 19, 11]. Most of these cases requires partial or full training of network in low precision. Training at low-precision allows for the network to implicitly learn the low precision representation (along with the inherent noise); however, it introduces significant resource overheads which can be prohibitive for many resource-constrained applications, specifically those involving edge devices. Reducing precision for both weights and activations has significant power-performance implication on system design. Low-precision not only allows increasing compute density, but also reduce pressure on the memory sub-system. Most of the current solutions are focused on compressing the model [14, 16], going as low as binary weights, which allows storing the model on the limited on-chip local memory. However, activations (input) need to be fetched from external memory or I/O-device (camera). Fetching data contributes to majority of the system power consumption. Hence reducing the size of activations is essential for more efficient utilization of the available computational resources. There have been a few solutions [8, 9] using lower precision representation for activations, however they necessitate specialized hardware for efficient implementation. Further, with widespread adoption of deep learning across various applications, such as autonomous driving, augmented reality etc, there is an increased demand for inference tasks to be done on edge devices efficiently. To address both the aforementioned system and application requirements, there is a general trend to move towards a full lower precision inference pipeline [11]. This is evident from the advent of 8-bit and sub 8-bit hardware such as Google’s TPU [11] and other main stream GPU1 , CPU offerings. Further, there is also software support for 8-bit inference through popular frameworks such as TensorFlow, Theano and compute libraries like NVidia’s TensorRT1 . In this paper, we focus on enabling a sub 8-bit inference pipeline by using ternary weights and 8/4-bit activations, with minimal or no re-training, and yet achieving near state-of-art accuracy. The rationale behind our approach is to carefully convert the full-precision weights to low-precision, such that the element-wise distance between full-precision and low-precision weights are small. Consequently, the low-precision weights remain in the neighborhood of pre-trained full-precision weights in the search space of network parameters, and we expect them to generalize in a similar manner, despite no re-training. We summarize our contributions below: 1. Based on an improved theoretical formulation, propose a novel fine-grained quantization (FGQ) method to convert pre-trained models to a ternary representation with minimal loss in test accuracy, without re-training. 2. With ternary weights, achieve classification accuracy (Top-1) of 73.85% with 8-bit activations (2w-8a) and 70.69% with 4-bit activations (2w-4a), on the ImageNet dataset[3] using a pre-trained Resnet-101 model (no re-training). To the best of our knowledge, these are the highest reported accuracies in this category on ImageNet dataset[17]. 3. Demonstrate the general applicability of FGQ, with state-of-art results (2w-8a, 2w-4a) on smaller models such as Resnet-50 and Alexnet[12]. And also show the efficacy of using FGQ for (re)training at low precision. 4. Study the performance-accuracy trade-off using different group sizes. For a group of N filters, we reduce the number of multiplications to one in every N additions, thus significantly reducing computation complexity with a potential for up to 16× improvement baseline full precision models. The rest of the paper is organized as follows, Section2 discusses related work on ternary weights, low precision inference and contrast them with FGQ. Section3 describes the FGQ formulation and the theoretical basis for this method. This is followed by Section4, which includes experimental results and related discussion. Finally, in Section5 we conclude with summarizing the implications of of FGQ, our results and the future research directions. 2 Related Work Deep learning inference using low-precision weights and activations is a well-researched topic. Many researchers have experimented with custom data representations to perform deep learning tasks and have shown significant benefits over the general purpose floating point representation. [20] have show that 8-bit dynamically scaled fixed point representation [22] can be used to speed up convolution neural networks using general purpose CPU hardware by carefully choosing right data layout, compute batching and using implementation optimized for target hardware. With this they show up to 4× improvement over an aggressively tuned floating point implementation. [5] have 1 https://devblogs.nvidia.com/parallelforall/new-pascal-gpus-accelerate-inference-in-the-data-center/ 2 done a comprehensive study on the effect of low precision fixed point computation for deep learning and have successfully trained smaller networks using 16-bit fixed point on specialized hardware. This suggests that fixed point representations are better suited for low(er) precision deep learning. There have also been recent efforts exploring 8-bit floating point representation [4], however such schemes have the additional overhead of reduced precision since the exponent is replicated for each value. Whereas with fixed point representation, using a single shared exponent improves capacity for precision. Typically for deep neural networks, with reduced bit-widths it is desired to preserve the numerical precision, since the loss in range can be augmented by the dynamic scaling of the shared exponent. Commonly, low precision networks are designed to be trained from scratch, leveraging the inherent ability of network to learn the approximations introduced by low precision computations [14, 16, 9, 2, 8, 25, 6]. This can be prohibitive in applications which rely on using previously trained models. Such use cases are typical in many edge device deployments. To address such cases, FGQ is developed with motivation to be able to achieve state-of-art accuracies without any training and hence enabling direct use of pre-trained models. This requirement results in the quantization scheme being quite complex but making it more widely applicable and making it also easily usable for the former case with training from scratch. Many of the recent reduced precision work, look at the low precision only for the weights while retaining the activations in full precision [23, 21, 6, 15, 16, 14, 4]. Using low precision also for activations is essential to realize the full power-performance benefits with using 2-bit (ternary) weights. The hardware needs to operate at the throughput that is close to the precision of the weights (i.e. 16× better throughput compared to using 32-bit weights). This cannot be achieved (or would be very hard to achieve) when the activations are at full precision because streaming 32-bit activations from main memory at that rate requires much higher(16×) bandwidth and compute engine needs to be much wider to deliver the desired throughput. All of which will increase the area and power budget which is not desirable when designing for low-power edge devices. Hence, reducing the size of activations is essential for reducing the compute requirements at the edge. Using 8-bits and below for activations dramatically reduces the design requirements on the edge and opens up the possibility of achieving 16× throughput improvement. [14, 16] propose low precision networks with binary weights, while retaining the activations in full precision. [14] use a stochastic binarization scheme, achieving state-ofart (SOTA) accuracies on smaller data-sets (MNIST, CIFAR10, SVHN). [16] demonstrate near-SOTA accuracies on the large ImageNet data-set using AlexNet topology. Further, they also demonstrate a variant with binary weights and activations, with all computations are simplified bit-count operations but with significant loss in accuracy. Lower precision for activations have also been used, [8] use 1-bit for both weights and activations for smaller networks. For larger Imagenet-class networks [9], use 2-bit activations and binary weights showing reasonable accuracies. However, both these [8, 9] use specialized data representation requiring custom hardware for efficient implementation. Other solutions such as [24], employ a more tailored approach with different precision for each - weights (1-bit), activations (2-bits) and gradients (6-bits); implemented with special-purpose hardware. [13] introduces a theoretical formulation for ternary weight network using a threshold based approach (symmetric threshold ±∆) with one scaling factor for each layer. They provide an approximation to the optimal ternary representation assuming weights follow a Gaussian distribution. However, one scaling factor per layer may not approximate the full-precision network well as the model capacity is very limited in this case. To increase model capacity [25] modify this solution to use two symmetric thresholds (±∆) and two scaling factors (separately for positive and negative weights). However, despite improving the accuracy this approach typically makes the inferencing inefficient by requiring multiple passes over the positive and negative values, hence increasing the bandwidth requirements. [23] have proposed a post-facto incremental quantization approach, which aims to find the optimal representation using an iterative method, constraining weights to either 0 or powers of 2, using a 5-bit representation. and re-training activations with full precision. All the aforementioned implementation require partial or full training of the network in low precision. Alternatively, [15] used log quantization method on pre-trained models and achieved good accuracy by tuning the bit length for each layer without re-training. Achieving near-SOTA accuracy on the Imagenet dataset with deeper networks [7], without any training in low precision (for both weights and activations) is still a challenge. Our work is an attempt to address this problem and improve over existing approaches. 3 3 Ternary Conversion of Trained Network Our goal is to convert the full-precision trained weights W to ternary values {−α, 0, +α}, α ≥ 0, without re-training. We use a threshold (∆ > 0) based approach similar to [13]: i-th element Ŵi = sign(Wi ), if |Wi | > ∆, and 0 otherwise. Then, the element-wise error is E(α, ∆) = kW −αŴk2F and an optimal ternary representation α∗ Ŵ∗ ≈ W is as follows: α ∗ , ∆∗ = argmin E(α, ∆), α ≥ 0, Ŵi ∈ {−1, 0, +1}, i = 1, 2, ..., n s.t. (1) α≥0,∆>0 where n is the size of W (W ∈ Rn ). We hypothesize that weights that learn different types of features may follow different distributions. Combining all the weights together represents a mixture of various distributions, and ternarizing them using a single threshold (∆) and magnitude (α) may not preserve the distributions of individual weights. Consequently, many weights are approximated poorly (if not totally pruned out) leading to loss of valuable information that they learn. We may not be able to compensate for this loss of information as we do not train the network in low precision. This motivates us to use a fine-grained quantization technique involving multiple scaling factors in order to increase model capacity that can lead to better preservation of distributions learned by filters. Moreover, we hypothesize that positive and negative weight distributions are not always symmetric around the mean, further refinement of this solution maybe possible using two separate thresholds, ∆p and ∆n > 0, for positive and negative weights, respectively, along with a scaling factor α to ternarize the weights. 3.1 Our Formulation Computing separate ∆ and α for each weight compensates for information loss and better preserves the underlying distributions. However, such solution, while showing significant improvement in accuracy, does not reduce the number of multiplications leading to a less efficient implementation. Therefore, we seek to find a trade-off between achieving higher accuracy and reducing the total number of multiplications. We propose a fine-grained quantization approach that creates groups of weights, and ternarizes each group independently. Let us consider the weights represented as a vector W ∈ Rn . We partition the set I of n indices into k disjoint subsets, c1 , c2 , ..., ck , with cardinality |ci | = ni , such P that, ci ∩ cj = ∅, ∪i ci = I, i ni = n. We can decompose W into k orthogonal vectors W(i) ∈ Rn , P (i) i = 1, ..., k, where j-th component Wj = Wj if j ∈ ci , otherwise 0. Clearly, i W(i) = W; then we ternarize each orthogonal component W(i) as αi Ŵ(i) , where components of Ŵ(i) are in {−1, 0, +1}. Threshold-based pruning never turns 0 to non-zero, and the following orthogonality holds. W(i) ⊥ W(j) , Ŵ(i) ⊥ Ŵ(j) , W(i) ⊥ Ŵ(j) , for i 6= j. It follows that, (W(i) − αi Ŵ(i) ) ⊥ P P (W(j) − αj Ŵ(j) ), for i 6= j, and we have kW − i αi Ŵ(i) k2F = i kW(i) − αi Ŵ(i) k2F . Then, (i) for a given group of k filters {W(i) }, i = 1, ..., k, and Ŵj ∈ {−1, 0, +1}, ∀j, X X α1∗ , .., αk∗ , Ŵ(1)∗ , .., Ŵ(k)∗ = argminkW − αi Ŵ(i) k2F , = argminkW(i) − αi Ŵ(i) k2F (2) αi ,Ŵ(i) i i αi ,Ŵ(i) Therefore, we need to solve k independent sub-problems. This formulation allows a better ternary approximation to the original full-precision weights, ensuring that they remain within a neighborhood of the original solution in the complex search space of parameters, despite no re-training. Consequently, we expect the full-precision solution and the ternary counterpart to generalize in a similar manner. From model capacity point of view, we can have only three distinct values, {−α, 0, +α}, for a ternary weight vector without such grouping. With k such groups, however, we can represent 2k + 1 distinct values, thus increasing model capacity linearly with number of groups. We can solve each sub-problem using a threshold-based approach the following way. We are given a vector of elements W ∈ Rn , and we can use separate thresholds for positive and negative weights, + − along with one scaling factor α to ternarize W. Let I∆ = {i : Wi > ∆p }, I∆ = {i : Wi < −∆n }, for some ∆p , ∆n > 0. We want to solve α∗ , ∆∗p , ∆∗n = argmin α≥0,∆p >0,∆n >0 kW − αŴk2F , 4 s.t. Ŵi ∈ {−1, 0, +1}, i = 1, ..., n. (3) We have the following analytical solution. P P ( i∈I + |Wi | + i∈I − |Wi |)2 ∗ ∗ ∆ ∆ ∆p , ∆n = argmax , + − |I∆ | + |I∆ | ∆p >0,∆n >0 P ∗ α = + i∈I∆ |Wi | + + |I∆ | + P − i∈I∆ − |I∆ | |Wi | + − Note that for ∆p = ∆n = ∆, I∆ = I∆ ∪ I∆ , and (4) reproduces the formulation in ([13]). X X α∗ = ( |Wi |)/|I∆ |, ∆∗ = argmax( |Wi |)2 /|I∆ | ∆>0 i∈I∆ (4) (5) i∈I∆ The advantage of our formulation (2) is that the smaller independent sub-problems can be solved efficiently using brute-force methods to achieve better approximation. However, we also explore analytical solutions to establish the theoretical veracity of our approach. Assuming that the magnitude of the learned weights follow exponential distribution with parameter λ, we analytically derive the optimal ∆∗ from the following lemma. P Lemma 1. Using above notations, if |Wi | ∼ exp(λ), then, ∆∗ in (5) is ∆∗ ≈ 1/λ = i |Wi |/n 1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 97 101 105 Relative Error Improvement (%) From this analysis, we see the need for a higher threshold value to prune larger number Improvement of Error over Gaussian Assumption 14 of smaller elements. This is intuitive from the shape of the model distributions, which are typ12 ically heavy-tailed distributions. In reality, how10 ever, it may not be appropriate to use a single 8 distribution to model the weights of all the layers 6 of a neural network. We can apply Kolmogorov4 Smirnov (K-S) test as a goodness-of-fit measure 2 to identify an appropriate reference distribution 0 (here we choose between Gaussian and expo-2 nential), and find ∆∗ accordingly. We approxLayers imate a heavy-tailed distribution by an exponential one by pruning out some of the smaller Figure 1: Layer-wise improvement of theoretical elements. This gives us an exponential approx- ternary error (one α per layer) over Gaussian asimation with smaller λ. Further, we can use sumption by choosing an appropriate distribution maximum likelihood functions to estimate the using K-S test for ResNet-101 on Imagenet dataset. parameters of such distributions. pPn For Gaussian 2 N (0, σ), estimated σ̂ = i=1 |Wi | /n = rms(W), and for exponential case, estimated paramePn ter λ̂ = i=1 |Wi |/n. Based on such refined analysis, we observe significant improvement in the theoretical ternary error over Gaussian assumption of [13] (Figure 1). It is interesting to observe that for earlier convolution layers of ResNet-101 trained on ImageNet, the magnitude of the weights follow exponential distribution, and later layer weights are Gaussian. 3.2 Weight Grouping Our method (2) is agnostic to how the (full-precision) weights are grouped , but leverages that consequence of grouping - which allows for solving these as independent sub-problems more efficiently. The specifics of the grouping mechanism and memory layout used for accessing these groups of weights is an independent problem to explore. The primary objective of grouping is to minimize the dynamic range within each group and split the weights in such a way that the smaller groups have a uniform distribution. This helps in reducing the complexity of finding an optimal solution (α) for each independent sub-problem using either analytical or brute-force techniques. However, to realize the full performance potential of ternarization, it is essential to ensure that the grouping mechanism itself does not introduce a significant overhead. Similarity based clustering algorithms such as K-means, despite being better at finding optimal grouping of weights that may even lead to better accuracy, are not friendly for efficient implementations (in both software hardware), because of the random grouping of elements from non-contiguous memory locations. This leads to irregular memory accesses with longer latencies, to gather arbitrarily grouped weights that use a common α, for a partial accumulation of the output. 5 Based on our empirical observations, we conclude that using static groups of weights that are partitioned along input channels C achieves best accuracy. The same element from multiple filters along C have significantly less variance, since they correspond to similar input features. Hence grouping such elements results in ∝ reduced dynamic range within the group. Such Figure 2: Static Grouping: (R × S) sub-groups of a grouping also easily lends itself for efficient n elements from contiguous filters along C dimen- implementation using both existing hardware sion, αk consists of scaling factors. and in software with using [K][C/N ][R ∗ S][N ] layout for the weight tensor, where groups of N elements are accessed from contiguous memory locations. Since the elements along C accumulate to the same output feature, this layout is also amenable to efficient vectorization along K. Figure 2 shows an example of this grouping scheme applied to 3 × 3 filters. Each group of N 3 × 3 ternary filters, has 3 × 3 scaling factors (α) corresponding to each element of the filter. = 4 = , , ,… ,∝ = ∝ = ∝ , … , = 1. . , = 1 … × Experimental Results For experimental results, we focused on Resnet50 and Resnet-101[7] using ILSVRC-2012[3] dataset, to demonstrate the efficacy of our method on large, sophisticated models using 2-bit weights and 8-bit activations (2w-8a). We extended our study by applying FGQ on activations to help further reduce the precision of activations to 4-bits (2w-4a) and show results comparable with 8-bit activations for all the tested networks. Further, towards establishing the broader applicability of FGQ we demonstrate state-of-the-art accuracy also for Alexnet[12]. Convolution Data Flow FP32 weight Tensor Convert to Ternary ( α × DFP-8 Tensor FP32 activation Tensor ) Convert to DFP-8 Emulation Library Convert DFP-8 to FP32 FP32 weight tensor emulating range & precision of DFP-8 DFP-8 Tensor Convert DFP-8 to FP32 FP32 activation tensor emulating range & precision of DFP-8 FP32-convolutions-FP32 output Our setup consists of a modified version of Intel Confidential Caffe[10] that emulates low-precision dynamic Figure 3: Schematic describing our low preci2 fixed point (DFP ) computations described in sion experimental setup in Caffe, to emulate fineFig. 3. We use 32-bit accumulator for all our low grained quantization (FGQ) with ternary weights precision computations to minimize the chances and 8-bit activations of an overflow. We split the pre-trained weights into groups of N elements using the mechanism described in section3.2, and use brute-force technique to compute the floating point values of the threshold (∆) and scaling-factor (α) for each group. The scaling factors are then quantized to a 8/4-bit fixed point and the weights are stored in the memory format described in3.2. The activations are quantized to 8/4-bits before performing convolution operation and the 32-bit outputs are down converted to 8-bit and appropriately rounded before they are passed to the next layer. Our experiments indicate that it is essential to use higher precision of the first layer (8w-8a), to minimize the accumulation of quantization loss. We also observe that using pre-trained parameters in batch normalization layers leads to a loss of accuracy due to shift in variance introduced by the quantization. We prevent this loss by recomputing batch normalization parameters during the inference phase to compensate for the shift in variance. We explored the accuracy-performance trade-off using different group sizes of N , our experiments show that FGQ with a group size of N=4 (FGQ-N4) achieves highest accuracy with no re-training and a potential 9× performance benefit. FGQ-N4 applied to a pre-trained Resnet-101 model with 2w-8a achieves Top-1 accuracy of 73.9%, which is within 4% of the full-precision results. With activations reduced to 4-bits (2w-4a), the Top-1 accuracy drops only marginally to 70.7%. FGQ-N4 performs equally well on Resnet-50, achieving with Top-1 accuracy of 70.8% with 2w-8a which is 4.2% off from full-precision result, and 68.4% with 2w-4a. To the best of our knowledge, these are 2 Please not that fixed point and dynamic fixed point are used interchangeably 6 Table 1: Classification accuracy (Top-1) on ImageNet dataset achieved using FGQ with N=4 without any re-training. Results on Resnet-101, Resnet-50 and Alexnet using 2w-8a and 2w-4a compared with best published results Networks Our Baseline FGQ-N4 2w-8a FGQ-N4 2w-4a no low precision training Resnet-101 Resnet-50 AlexNet 77.50% 75.05% 56.83% 73.85% 70.76% 49.04% 70.69% 68.38% 49.00% INQ 5w-32a [23] dLAC 2w-32a [21] DoReFa 1w-4a-32g [24] with low precision re-training 74.81%3 - 73.85%3 - 50.3%3 the highest reported accuracies using 2w-8a and 2w-4a on Imagenet dataset[3] using state-of-the-art networks. To understand the general applicability of our method to a wider range of networks, we apply FGQ to the smaller Alexnet[12] model. FGQ-N4 applied to a pre-trained Alexnet model, achieves 49% Top-1 accuracy with 2w-8a without any re-training, this is 8% away from the baseline full-precision result( 56.8%). With 2w-4a we do not see any further reduction in accuracy. There are no previously published results that can be directly compared to FGQ, which perform quantizaion on pre-trained models and work with end-to-end low-precision. Hence, we compare with [21, 23, 24], which are the closest in terms of the networks used and/or the target precision. Our Alexnet result using FGQ-N is comparable to previously published result[24] which is 6% away from the baseline using 1w-4a while also employing training in low-precision with full precision gradients. Table 1 has a comparison with previous reported results from[23] using 5-bit weights and [21] using ternary weights. While they report slightly better absolute numbers, our numbers are relatively better because both these results use full-precision activations and train the network in low precision to achieve those numbers. While without any low precision training and reduced precision for activation, results with FGQ is still competitive with other similar (aforementioned) results.3 With additional low precision training with FGQ we are able significantly improve accuracy and get closer to state-of-art full precision results, as outlined in the next section along with associated performance implications. 4.1 Discussion In order to realize the full performance potential of ternary networks, the inference platform needs to operate at the throughput that is close to the precision of the weights. This would increase the amount of memory bandwidth required to stream activations by 16× and a compute engine that is much wider to deliver the desired compute throughput. Building such solution around full-precision activations would be prohibitive in terms of areas and power requirements, whereas it is more amenable to build such solution when the activations are 8 or 4-bits. Figure4a shows the performance Vs accuracy trade-off for Resnet-50[18] for a FGQ based 8-bit inference design. Our model projects the lower bound of the performance potential based on the percentage of FMA operations that can be converted into ternary accumulations at each group size N . In the ideal case, where N is equal to the total number of weights in the layer, the best case performance potential is 16× compared to the baseline full-precision performance. For a group size of N=4, 75% of all FMA operations can be performed in ternary, Using slightly larger sub-groups of N=8 we can replace 87.5% of FMA operations with ternary while losing an additional 3.7% Top-1 accuracy. At group size N = 64, ≈ 99% of all FMA operations can be replaced by ternary accumulations, resulting in 15× potential improvement in performance. But the performance comes at a cost of significant drop in accuracy. Using larger groups of weights results in a poor ternary approximation to the full-precision model. Consequently, the ternary solution moves away from the full-precision local optima and display different generalization behavior. 3 It should be noted that both these works use Resnet-50 with slight variations and hence have slightly different baseline accuracies. For [23] the baseline full precision a Top-1 accuracy is 73.22%, for [21] it is 76% and for [24] it is 55.9% 7 Top-1 Accuracy 80% Baseline (FP32) 75% 70.51% 68.59% 70.33% 71.10% 65.08% 2.0 N=2 N=8 60% N=16 55% N=32 50% N=64 45% 0x 2x 4x 6x 8x 10x 12x Speedup (relative to Baseline FP32) 14x 1.5 1.0 0.5 0.0 16x 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Training Error N=4 65% 0 70% Top-1 Accuracy 2.5 After fine-tuning N=64* Epochs (a) (b) Figure 4: a). Performance vs accuracy trade-off for Resnet-50 for a FGQ based 8-bit inference design, b). Fine-tuning Resnet-50, with pre-initialized weights on Imagenet dataset. We have trained low-precision (2w-8a) ResNet-50[18] at group size N=64 on ImageNet[3] dataset to recover the accuracy lost because of ternarization. We initialized the network with a pre-trained full-precision model and fine-tuned the parameters of the low-precision network. We reduced the learning rate to an order of 1e-4 to avoid exploding gradients, retaining all the other hyper parameters from full-precision training and performed gradient updates in full precision. After training for 20-epochs, we recover most of the lost accuracy and achieved 71.1% Top-1 and 90.01% Top-5 bringing it to within 4% of the full-precision baseline accuracy. Figure4b shows the reduction of training error and improvements in validation accuracy. 5 Conclusion We propose a fine-grained ternarization method which exploits local correlations in dynamic range of the parameters to minimize the impact of quantization on overall accuracy. We demonstrate near SOTA accuracy on Imagenet data-set using pre-trained models with quantized networks without re-training. Using ternary weights on Resnet-101 and Resnet-50 with 8-bit activations our results are within ≈ 4% from the full precision (F P 32) accuracy. Using 4-bit activations we see a further drop of ≈ 3% in accuracy. To the best of our knowledge, these are the highest reported accuracies using ternary weights and low-precision activations. Our weight grouping based approach allows us to obtain solutions that can be tailored for specific hardware, as well as, can be used on general purpose hardware, based on the accuracy and performance requirements. Smaller group sizes with N=4 achieve best accuracy, and use 75% of the computations ternary operations (simple 8-bit additions) and this is better suited for implementation on specialized hardware. Larger group sizes are more suitable for current general purpose hardware, with a larger portion of computations as low precision operations (≈ 99% for N=64), although this comes with the cost of reduced accuracy. This gap may be bridged with additional low precision training as shown in Section4. Our final quantized model can be efficiently run on full 8-bit compute pipeline, thus offering a potential 16X performance-power benefit. We continue to actively work on closing the current accuracy gap, exploring both low precision (re)training and extensions to the FGQ method itself. Also we are looking into a more theoretical exploration to better understand the formal relationship between the weight grouping and final accuracy, with an attempt to establish realistic bounds for given network-performance-accuracy requirements. 8 References [1] Yoshua Bengio, Ian Goodfellow, and Aaron Courville. Deep learning. Book in preparation for MIT Press, 2016. [2] Matthieu Courbariaux, Itay Hubara, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. Binarized neural networks: Training deep neural networks with weights and activations constrained to+ 1 or-1. arXiv preprint arXiv:1602.02830, 2016. [3] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages 248–255. IEEE, 2009. [4] Tim Dettmers. 8-bit approximations for parallelism in deep learning. arXiv preprint arXiv:1511.04561, 2015. [5] Suyog Gupta, Ankur Agrawal, Kailash Gopalakrishnan, and Pritish Narayanan. Deep learning with limited numerical precision. In ICML, pages 1737–1746, 2015. [6] Song Han, Jeff Pool, John Tran, and William Dally. Learning both weights and connections for efficient neural network. In Advances in Neural Information Processing Systems, pages 1135–1143, 2015. [7] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages 770–778, 2016. [8] Itay Hubara, Matthieu Courbariaux, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. Binarized neural networks. In Advances in Neural Information Processing Systems, pages 4107–4115, 2016. [9] Itay Hubara, Matthieu Courbariaux, Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. Quantized neural networks: Training neural networks with low precision weights and activations. arXiv preprint arXiv:1609.07061, 2016. [10] Yangqing Jia, Evan Shelhamer, Jeff Donahue, Sergey Karayev, Jonathan Long, Ross Girshick, Sergio Guadarrama, and Trevor Darrell. Caffe: Convolutional architecture for fast feature embedding. arXiv preprint arXiv:1408.5093, 2014. [11] N Jouppi. Google supercharges machine learning tasks with tpu custom chip. Google Blog, May, 18, 2016. [12] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. Imagenet classification with deep convolutional neural networks. In Advances in neural information processing systems, pages 1097–1105, 2012. [13] Fengfu Li, Bo Zhang, and Bin Liu. Ternary weight networks. arXiv preprint arXiv:1605.04711, 2016. [14] Zhouhan Lin, Matthieu Courbariaux, Roland Memisevic, and Yoshua Bengio. Neural networks with few multiplications. arXiv preprint arXiv:1609.07061, 2016. [15] Daisuke Miyashita, Edward H Lee, and Boris Murmann. Convolutional neural networks using logarithmic data representation. arXiv preprint arXiv:1603.01025, 2016. [16] Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, and Ali Farhadi. Xnor-net: Imagenet classification using binary convolutional neural networks. In ECCV, 2016. [17] Olga Russakovsky, Jia Deng, Hao Su, Jonathan Krause, Sanjeev Satheesh, Sean Ma, Zhiheng Huang, Andrej Karpathy, Aditya Khosla, Michael Bernstein, et al. Imagenet large scale visual recognition challenge. International Journal of Computer Vision, 115(3):211–252, 2015. [18] Marcel Simon, Erik Rodner, and Joachim Denzler. Imagenet pre-trained models with batch normalization. arXiv preprint arXiv:1612.01452v2, 2016. [19] Yaman Umuroglu, Nicholas J Fraser, Giulio Gambardella, Michaela Blott, Philip Leong, Magnus Jahre, and Kees Vissers. Finn: A framework for fast, scalable binarized neural network inference. arXiv preprint arXiv:1612.07119, 2016. [20] Vincent Vanhoucke, Andrew Senior, and Mark Z Mao. Improving the speed of neural networks on cpus. In Proc. Deep Learning and Unsupervised Feature Learning NIPS Workshop, volume 1, page 4. Citeseer, 2011. 9 [21] Ganesh Venkatesh, Eriko Nurvitadhi, and Debbie Marr. Accelerating deep convolutional networks using low-precision and sparsity. arXiv preprint arXiv:1610.00324, 2016. [22] Darrell Williamson. Dynamically scaled fixed point arithmetic. In Communications, Computers and Signal Processing, 1991., IEEE Pacific Rim Conference on, pages 315–318. IEEE, 1991. [23] Aojun Zhou, Anbang Yao, Yiwen Guo, Lin Xu, and Yurong Chen. Incremental network quantization: Towards lossless cnns with low-precision weights. poster at International Conference on Learning Representations, 2017. [24] Shuchang Zhou, Yuxin Wu, Zekun Ni, Xinyu Zhou, He Wen, and Yuheng Zou. Dorefa-net: Training low bitwidth convolutional neural networks with low bitwidth gradients. arXiv preprint arXiv:1606.06160, 2016. [25] Chenzhuo Zhu, Song Han, Huizi Mao, and William J Dally. Trained ternary quantization. arXiv preprint arXiv:1612.01064, 2016. 10 Appendix 5.1 Proof of Lemma 1 Let n denote the number of elements. Let f (x) = λe−λx be the pdf of exponential distribution with parameter λ > 0, and F (x) = 1 − e−λx be the cdf. Then, Z |I∆ | ≈ n f (x)dx = n(1 − F (∆)) = ne−λ∆ x>∆ Furthermore, Z X |Wi | ≈ n Z x>∆ i∈I∆ (λe−λx )xdx ≈ xf (x)dx = n x>∆ n λ (λ∆ + 1) e−λ∆ Then, G(∆) = G0 (∆) = G0 (∆) = 00 G (∆) ( P |Wi |)2 |I∆ | n λ2 = n λ2 (1 + λ∆)2 e−λ∆ (2λ(1 + λ∆)e−λ∆ − λ(1 + λ∆)2 e−λ∆ ) 0⇒∆= < 0 ∆=1/λ i∈I∆ 1 λ (maxima) Therefore, ∆∗ = 1 λ = 1X n 11 i |Wi |
9cs.NE
arXiv:1605.02306v1 [math.GT] 8 May 2016 CONJUGATION-INVARIANT NORMS ON THE COMMUTATOR SUBGROUP OF THE INFINITE BRAID GROUP MITSUAKI KIMURA Abstract. In this paper, we give a proof of the result of Brandenbursky and Kȩdra which says that the commutator subgroup of the infinite braid group admits stably unbounded norms. Moreover, we observe the norms which we constructed are equivalent to the biinvariant word norm studied by Brandenbursky and Kȩdra. 1. Introduction In [2], Burago, Ivanov, and Polterovich introduced the notion of conjugationinvariant norms and asked several problems. One of them is as follows: Problem 1.1 ([2]). Does there exists a perfect group G which satisfies the following conditions? (1) The commutator length is stably bounded on [G, G]. (2) G admits a stably unbounded norm. For the definitions on conjugation-invariant norms, see [2]. It is known that such groups exist. Brandenbursky and Kȩdra [1] proved the following theorem: Theorem 1.2 ([1]). The commutator subgroup of the infinite braid group [B∞ , B∞ ] admits a stably unbounded norm. Kawasaki [4] also showed that the commutator subgroup of Sympc (R2n )0 is such a group, where Sympc (R2n )0 is the group of symplectomorphisms with compact support isotopic to the identity of the standard symplectic space. In this paper, we give a proof of Theorem1.2 by using the idea of Kawasaki in [4]. Kawasaki introduced ν-quasimorphisms (or relative quasimorphisms) and the (ν, p, q)-commutator length clν,p,q . He proved that the existence of non-trivial ν-quasimorphism implies stably unboundedness of clν,p,q (see Proposition 2.3). To give our proof of Theorem1.2, we construct stably unbounded norms clνn ,p,q on [B∞ , B∞ ] by observing that the signature of braids σ : B∞ → R is a νn quasimorphism in §2.1. In §2.2, we study the property of the norms clνn ,p,q and prove the following theorem: Theorem 1.3. For any integer n ≥ 2 and any real numbers p ≥ 1 and q ≥ 1, the norm clνn ,p,q is equivalent to the biinvariant word norm k · k (whose stably unboundedness is observed by Brandenbursky and Kȩdra). Acknowledgement. The author would like to thank Professor Takashi Tsuboi for his guidance and helpful advice. He also thanks to Morimichi Kawasaki for his useful advice. 1 2 MITSUAKI KIMURA 2. Proofs of main results 2.1. The construction of stably unbounded norms. First, we explain the idea of Kawasaki. The definitions of (ν, p, q)-commutator length and ν-quasimorphisms are following. Definition 2.1 ([4]). Let G be a group with a conjugation-invariant norm ν and p, q ∈ R>0 . We define the (ν, p, q)-commutator subgroup [G, G]ν,p,q to be a subgroup of G generated by the elements [f, g] ∈ G such that ν(f ) ≤ p, ν(g) ≤ q. We define (ν, p, q)-commutator length clν,p,q : [G, G]ν,p,q → R≥0 by   ∃fi , ∃gi ∈ G, (i = 1, . . . , k) clν,p,q (h) = min k , h = [f1 , g1 ] · · · [fk , gk ] . ν(fi ) ≤ p, ν(gi ) ≤ q We note that clν,p,q is a conjugation-invariant norm. Definition 2.2 ([4]). Let G be a group with a conjugation-invariant norm ν. A function φ : G → R is called a ν-quasimorphism (or quasimorphism relative to ν) if there exists a constant C > 0 such that for every f, g ∈ G, |φ(f g) − φ(f ) − φ(g)| ≤ C min{ν(f ), ν(g)}. The concept of ν-quasimorphisms appeared earlier in the paper of Entov and Polterovich ([3], Theorem 7.1.), which is called “controlled quasi-additivity” in [3]. Kawasaki proved the following proposition. Proposition 2.3 ([4], Proposition 3.4.). Let φ be a ν-quasimorphism on G and n p, q ∈ R>0 . If there exist an element h ∈ [G, G]ν,p,q such that limn→∞ φ(hn ) > 0, then clν,p,q is stably unbounded on [G, G]ν,p,q . Next, we give an useful sufficient condition to prove that a function is a qK quasimorphism, where qK is a conjugation-invariant norm on a group G which is normally generated by a subset K ⊂ G defined by qK (f ) = min{l | ∃ki ∈ K, ∃gi ∈ G, f = k1g1 · · · klgl }, where xy denotes the conjugation xyx−1 . Lemma 2.4 ([3], Lemma 7.3.). Let G be a group which is normally generated by a subset K ⊂ G, and φ : G → R a function on G. If there exists a constant C > 0 such that the inequality |φ(gh) − φ(g) − φ(h)| ≤ C holds for any g ∈ G and any h ∈ G with qK (h) = 1, then φ is a qK -quasimorphism. Finally, we construct the stably unbounded norms on [B∞ , B∞ ] by proving the signature of braids is a νn -quasimorphism, where νn = qBn . We denote the n-braid group by Bn and let σ1 , . . . , σn−1 be the standard Artin generators. For a braid α ∈ Bn , we denote the closure of α by α b. For a braid α ∈ Bn , σ(α) is defined to be the signature σ(b α) of the link α b. We consider the standard inclusion ιn : Bn → Bn+1 , σi 7→ σi (i.e. ιn is “adding a trivial string”) and obtain the following sequence S∞ : B1 ⊂ B2 ⊂ · · · ⊂ Bn ⊂ · · · . We define the infinite braid group B∞ to be n=1 Bn . Since the signature of braids σ : Bn → R and the inclusion ιn : Bn → Bn+1 are compatible, i.e. σ(ιn (α)) = σ(α) for α ∈ Bn , σ : B∞ → R is well-defined. Theorem 2.5. The signature of braids σ : B∞ → R is a νn -quasimorphism. CONJUGATION-INVARIANT NORMS ON [B∞ , B∞ ] 3 Proof. By Lemma 2.4, it is sufficient to prove that |σ(αβ) − σ(α) − σ(β)| ≤ n for α, β ∈ B∞ , νn (β) = 1. The assumption νn (β) = 1 implies the existence of a braid γ ∈ B∞ such that β γ ∈ Bn ⊂ B∞ . Let m be a natural number such that αγ ∈ Bm (m > n). Since the signature of braids is conjugation-invariant, |σ(αβ) − σ(α) − σ(β)| = |σ(αγ β γ ) − σ(αγ ) − σ(β γ )|. γ β γ from α cγ by taking saddle moves m times. Note cγ ⊔ β We obtain the link α[ γ c that the link β has m − n unknot components since β γ has trivial strings after (n + 1)-th one (Figure 2). It is known that the signature changes at most ±1 by one saddle move (see [5] for example). Since the signature does not changed by taking connected sum to an unknot, the signature changes at most n by the m times saddle moves. Hence γ β γ ) − σ(α cγ ⊔ βcγ )| ≤ n. |σ(αγ β γ ) − σ(αγ ) − σ(β γ )| = |σ(α[  Figure 1. saddle move Figure 2. Now we prove Theorem 1.2. Lemma 2.6. Let G be a group normally generated by K ⊂ G and ν a conjugationinvariant norm on G. We assume that ν is bounded on K (it is so when K is finite). If p, q ≥ supk∈K ν(k), then [G, G]ν,p,q = [G, G]. 4 MITSUAKI KIMURA Proof. For a, b, r, s ∈ G, the following equalities hold: [ar, b] = [r, b]a [a, b], [a, bs] = [a, b][a, s]b . By using them, we can represent a element f of [G, G] as a product of commutators of the form [k ∗ , l∗ ] (k, l ∈ K). Therefore f ∈ [G, G]ν,p,q if p, q ≥ supk∈K ν(k).  Since B∞ is normally generated by {σ1±1 }, we have the following corollary. Corollary 2.7. For n ≥ 2 and p, q ≥ 1, clνn ,p,q is well-defined on [B∞ , B∞ ]. (Proof of Theorem 1.2) We apply Proposition 2.3 to the signature σ : B∞ → R. Since σ is a νn -quasimorphism by Theorem 2.5, it is sufficient to see that the stabilization of σ is non-trivial and it is already known (see [1] for example). Therefore, for n ≥ 2 and p, q ≥ 1, clνn ,p,q is a stably unbounded norm on [B∞ , B∞ ]νn ,p,q = [B∞ , B∞ ] by Corollary 2.7.  2.2. The extremal property. We study the properties of the norms clνn ,p,q . Two norms on a group are called equivalent if their ratio is bounded away from 0 and ∞. First, we will show that the norms clνn ,p,q are equivalent each other. It follows from the fact that the norms have an “extremal property”. Lemma 2.8. For x, y, z ∈ G, assume that x and y z commute. Then [x, y] is written as the products of 4 conjugates of z or z −1 . Proof. By the assumption, [x, [y, z]] = xy(y −1 )z x−1 y z y −1 = xyx−1 y −1 = [x, y]. Thus [x, y] = [x, [y, z]] = xz y z −1 x−1 z(z −1)y = z xy (z −1 )x z(z −1 )y .  We call that a norm µ on [B∞ , B∞ ] has the extremal property if µ satisfies the following condition: for any conjugation-invariant norm ν on [B∞ , B∞ ] which satisfies ν(αβ ) = ν(α) for all α ∈ [B∞ , B∞ ] and β ∈ B∞ (not only [B∞ , B∞ ]), there exists a positive number λ > 0 such that ν ≤ λµ. By using above lemma, we observe that the norms clνn ,p,q have the property. Proposition 2.9. For n ≥ 2 and p, q ≥ 1, clνn ,p,q has the extremal property. Proof. First we prove that clνn ,1,1 has the extremal property. Let α, β ∈ B∞ satisfy νn (α) = νn (β) = 1. Then there exists γ, γ ′ ∈ B∞ such that α e := αγ ∈ Bn , ′ ′ −1 ′ βe := β γ ∈ Bn . If m is sufficiently large, α eγ γ and βe∆m commute, where −1 −1 ∆′m = A′n,m−1 · · · A′n,2 A′n,1 A′n,2 · · · A′n,m−1 ′ and A′n,i is a commutator argyle braid appeared in [1] . By Lemma 2.8, [α, β]γ = ′ ′ ′ −1 e is written as the products of 4 conjugates of ∆′±1 . Thus [αγ , β γ ] = [e αγ γ , β] m ν([α, β]) ≤ 4ν(∆′m ). Since ∆′m is conjugate to A′n,1 , ν(∆′m ) = ν(A′n,1 ). Then we obtain ν ≤ 4ν(A′n,1 ) clνn ,1,1 . Since clνn ,1,1 ≤ pq clνn ,p,q , the proposition follows.  Since clνn ,p,q (αβ ) = clνn ,p,q (α) for all α ∈ [B∞ , B∞ ] and β ∈ B∞ , it follows from Proposition 2.9 that the norms clνn ,p,q are equivalent to each other. Next, we also consider the property of the biinvariant word norm k · k := q{σ±1 } . 1 Proposition 2.10. The biinvariant word norm k · k has the extremal property. CONJUGATION-INVARIANT NORMS ON [B∞ , B∞ ] 5 Proof. Let α ∈ [B∞ , B∞ ] with kαk = k. Then α is written as follows: α =(σ1ε1 )α1 (σ1ε2 )α2 · · · (σ1εk )αk =[α1 , σ1ε1 ]σ1ε1 [α2 , σ1ε2 ]σ1ε2 · · · [αk , σ1εk ]σ1εk ε1 =[α1 , σ1ε1 ][α2 , σ1ε2 ]σ1 σ1ε1 +ε2 · · · [αk , σ1εk ]σ1εk =··· =[α1 , σ1ε1 ][α2 , σ1ε2 ]∗ · · · [αk , σ1εk ]∗ σ1ε1 +···+εk , where εi ∈ {±1} and αi ∈ B∞ . Since α ∈ [B∞ , B∞ ], ε1 + · · · + εk = 0. Thus α is ′ written as a product of k commutators of the form [∗, σ1±1 ]∗ . Since αi and (σ1εi )∆m commute in B∞ for a sufficient large m, ν([αi , σ1εi ]∗ ) = ν([αi , σ1εi ]) ≤ 4ν(∆′m ) = 4ν(A′2,1 ) and it follows that ν(α) ≤ 4ν(A′2,1 )k = 4ν(A′2,1 )kαk.  As a corollary of Proposition 2.9 and 2.10, it follows that the norm k · k is also equivalent to the norms clνn ,p,q we constructed (Theorem 1.3) . References [1] M. Brandenbursky and J. Kȩdra, Concordance group and stable commutator length in braid groups, Algebr. Geom. Topol. (to appear) [2] D. Burago, S. Ivanov, and L. Polterovich, Conjugation-invariant norms on groups of geometric origin, Adv. Stud. Pure Math. 52 (2008), 221-250. [3] M. Entov and L. Polterovich, Quasi-states and symplectic intersections, Comment. Math. Helv., 81 (1) (2006), 75-99. [4] M. Kawasaki, Relative quasimorphisms and stably umbounded norms on the group of symplectomorphisms of the Euclidean spaces, J. Symplectic Geom. (to appear) [5] K. Murasugi, On a certain numerical invariant of link types, Trans. Amer. Math. Soc. 117 (1965), 387-422. Graduate School of Mathematical Sciences, the University of Tokyo 3-8-1 Komaba, Meguro-ku, Tokyo, 153-8914, Japan E-mail address: [email protected]
4math.GR
INITIALIZATION OF MULTILAYER FORECASTING ARTIFICIAL NEURAL NETWORKS V.V. Bochkarev and Yu.S. Maslennikova Kazan (Volga Region) Federal University [email protected], [email protected] Abstract In this paper, a new method was developed for initialising artificial neural networks predicting dynamics of time series. Initial weighting coefficients were determined for neurons analogously to the case of a linear prediction filter. Moreover, to improve the accuracy of the initialization method for a multilayer neural network, some variants of decomposition of the transformation matrix corresponding to the linear prediction filter were suggested. The efficiency of the proposed neural network prediction method by forecasting solutions of the Lorentz chaotic system is shown in this paper. Keywords: Artificial neural networks; Forecasting; Neural network initialization; Linear prediction filter Introduction Reliable forecasts are necessary nowadays both in scientific research and daily operations. At present, this problem is usually being solved by the linear prediction method. The latter reduces the solution of a forecasting problem to the search of coefficients of the linear prediction filter of the pth order that gives the best prediction of the current value of a real-valued sequence x̂ n from its previous values: xˆ n  a1 xn1  a2 xn2    a p xn p ; (1) here p is the filter order, and the letter а denotes coefficients of the filter. As a rule, one minimizes the sum of squared prediction errors considered as a function of the filter coefficients [1]. Since the graph of this function is a paraboloid, the minimum point is unique. The linear prediction method is efficient for stationary systems, i.e., those systems whose properties do not change in course of time, while the distribution of parameter fluctuations is close to the Gaussian distribution [1, 2]. In more complicated cases one should better use nonlinear methods, e.g., artificial neural networks [3, 4]. However, this method also has some drawbacks. Thus, in the case of neural networks, owing to the nonlinearity of the neurons activation function, the error functional is more complicated, and the calculated local minimum point is not necessary global. As a result, in spite of the great potential of neural networks [5], the error of a neural network prediction model may exceed that of the linear one. As is mentioned in [3], when using neural networks, the choice of the rule for the initialization of neuron weighting coefficients plays an important role. Algorithms for the initialization of neural networks imply the choice of initial values of weighting coefficients. This choice can be performed by some deterministic technique or random one (e.g., the widely used Nguyen-Widrow algorithm [5]). In the latter case, as a rule, the network is being trained several times in order to increase the probability of finding the global minimum of the error function. This leads to a multiple growth of the computational burden, while the obtained result may appear to be unsatisfactory. In [6] one proposes an interesting algorithm for constructing a hybrid neural network [4] for time series prediction. First, one trains the network consisting of a single linear neuron. The obtained coefficients are used for initializing a hybrid network, which also contains only one neuron. Then one sequentially adds neurons to the network until the decrease of the prediction error stops. In this paper we consider another approach which is also based on the preliminary solution of the optimal linear prediction problem. Formula (1) demonstrates that the linear prediction filter is representable as the one-layer linear neural direct transmission network. This analogy allows us to use the preliminarily calculated coefficients of the linear prediction model as a base, including them in the corresponding elements of the neural network. The idea is to construct a neural network which before training transforms data in just the same way as expression (1). In order to make the full use of abilities of neural network algorithms for approximating complex dependencies, the network has to consist of 2 or more layers [3]. And then we meet a difficulty. It is connected with the ambiguity of the decomposition of the initial linear transform into several sequential ones which correspond to layers of the neural network. In what follows we consider two possible ways to overcome this difficulty. The simplest algorithm for the initialization of a neural network based on coefficients of the linear prediction model Consider the simplest technique for solving the stated problem in the case when functions implemented by various network layers are evidently separated. The error that occurs due to the nonlinearity of neurons activation functions prior to the network training should be small. This fact imposes certain restrictions on the choice of activation functions for layers. For example, the hyperbolic tangent (the sigmoid) has a domain with a weak nonlinearity at the origin of coordinates. When using neurons with sigmoidal activation functions, by properly scaling the training set we can make transforms of a signal by the network neurons close to linear. Let us consider, as an example, the application of the proposed initialization algorithm to a three-layer neural direct transmission network [4]. Assume that input values of all neurons correspond to linear parts of the activation function. Represent the resulting transformation matrix of a three-layer neural network as follows: A  A3 A2 A1 , (2) where А1, А2, А3 are transformation matrices of the 1st, 2nd, and 3d layers, respectively (Fig. 1). The input layer of the network scales the data so as to make all values of the series be located within the linear domain of the hyperbolic tangent. 0 0  А= 0 0 0 ... 1 /   ·  ...  0 а1  1 0 ... 0 1 ... 0 а2 0 а3 0   0 0 ... 0  0   0  0 ... 0    ...  ·  0 0  ... 0     ... 1   0 0 0 ... 0  ... а р   0 0 0 ...   ... ... ... Fig. 1. The transformation matrix of a neural network after the initialization. The intermediate layer performs a weakly nonlinear transform with the help of the weight matrix that contains coefficients а of the linear prediction model. The output layer performs the converse data transform. By a proper choice of the coefficient  one can make the error stipulated by the nonlinearity of the activation function arbitrarily small. In this case the neural network with weights chosen in such a way will estimate the current value x̂ k of the input signal from preceding p sequential ones xk-1, xk-2, … xk-p in accordance with expression (1). Note that results of the prediction of the given neural network before training nearly coincide with the output of the linear prediction filter. When training the network with the help of an algorithm with a monotonic decrease of the error (e.g., gradient and quasi-Newton algorithms, those based on the conjugate gradients method, etc), the result obtained on any training step is the same or even better than that obtained with the help of the linear prediction filter. In this paper we use the Levenberg-Marquardt algorithm; it belongs to the class of quasiNewton methods that guarantee a high convergence rate [7]. Prediction of the Lorenz chaotic system The proposed technique for the neural network initialization was applied for the prediction of trajectories of the Lorenz system, which is the simplest example of a determinate chaotic system [8]. It was first observed by Lorenz in numerical experiments when studying the trajectory of a system of three connected quadratic ordinary differential equations that define three modes of Oberbeck-Boussinesq equations for the convection of a liquid in a 2D layer heated from below. The mentioned equations take the form  x    y  x ,   y  xr  z   y,  z  xy  bz.  (3) According to results of numerical modeling, solutions of the system with many values of parameters asymptotically tend to unstable cycles, but have two evident clusterization centers and thus form the so-called strange attractor [8]. Fig. 2 illustrates the solution to the system with   10, r  28, b  8 / 3 . Another important property of solutions to the Lorenz system is their essential dependence on the initial condition, which constitutes the main feature of the chaotic dynamics. Therefore, the long-term behavior of the system is poorly predictable. Fig. 2. Trajectories of the Lorenz attractor with r=28 (at the left); the variation of the Х coordinate (at the right) We use the Lorenz system as the test problem due to the fact that it is a rather adequate model for many real systems. In [8, 9] one mentions that this system approximately describes oscillations of parameters in turbulent flows and variations of parameters of the geomagnetic field. One also encounters such system of equations in models of economic processes [10]. For testing the proposed initialization algorithm we have constructed the series that correspond to solutions of system (3). We have applied the Runge–Kutta method with the automatic choice of the step value. We have thinned out the obtained series in order to get a sample of an acceptable size covering a long time interval with the time step of 0.01 sec. Moreover, we have removed the initial part of the sample in order to make the data used for testing correspond to the movement near the attractor and to make the results independent of the choice of the initial point. Below we represent results of the prediction of the behavior of the given system with the help of the neural network, where initial values of weights are chosen in accordance with coefficients of the linear prediction filter. First we have calculated coefficients of the linear prediction model and then on its base constructed the neural network in the way described above. We predicted each current value from 5 sequential previous ones. The first and the second layer of the neural network contained 5 neurons each. We trained the neural network with the help of the error backpropagation method, minimizing the error functional by the Levenberg-Marquardt algorithm within 300 epochs of training. The prediction was performed for a time interval varying from 0.01 to 1 second. Fig. 3. A part of the predicted series for the increase of the Х coordinate by 0.15 seconds; the interior of the rectangle shows a zoomed part of the same series: the initial series (solid line), the linear prediction (dashed line), the neural network prediction (dotted line) Fig. 3 shows a part of the predicted series; for comparison we also depict the linear prediction of the same series. This example is typical for the whole range of the prediction interval, namely, the proposed initialization algorithm provides an essential improvement in comparison both to the linear prediction method and to the neural network prediction method used in the Nguyen-Widrow initialization algorithm. See Table 1 below for mean square prediction errors for various time intervals in comparison to results obtained by other methods. The results of numerical experiments prove the efficiency of the proposed neural network initialization method. We can also ascertain that for the considered problem the neural network prediction is much more efficient than the linear prediction method. An improved network initialization method The main drawback of the considered simplest algorithm consists in the fact that layers of the network (at least, on the initial training stage) participate to some extent in the data transformation. In order to fully use abilities of multilayer networks, it is desirable to make the computational load of layers uniform. As was mentioned above, the described method for the initialization of a neural network is not unique. According to the considered example of a threelayer neural network, one can include real orthogonal matrices U1 and U2 in the resulting transformation matrix A (see expression (2) and Fig. 1). Then U1 U1  E , U1 U1  E , and T A  A 3 U 2T U 2 A 2 U 1T U 1 A1 . T (4) Therefore, before training, the neural network, where initial values of weighting coefficients of layers are given by matrices U1 A 1 , U 2 A 2U 1T , and A 3U 2T , respectively, still completely corresponds to the initial linear prediction filter. However, during the training process, because of the nonlinearity of the neurons transfer function, we can expect an improvement of the prediction accuracy. In order to choose optimal matrices U1 and U2, it is convenient to represent them in the exponential form U i  e Gi . (5) As is known, in this case, in order to make matrices Ui orthogonal, matrices Gi have to be skewsymmetric GiT  Gi . Let the number of neurons in the 1st and 2nd layers equal N. In the linear space of skewsymmetric NN-matrices (the dimension of this space equals N  N  1 2 ) we choose some basis, for example, G  k , m  , k  m, Gi,kj,m    m,i  k , j   k ,i  m, j . Then Gi  x k , m, i G k , m . (6) k,m For example, with N  3 we have a b  0   Gi    a 0 c   a i   b  c 0    0 1 0     1 0 0   bi  0 0 0    0 0 1  0 0 0      0 0 0   ci  0 0 1  .  1 0 0  0 1 0     If the number of neurons in layers is small, then one can determine unknowns in expression (4) by the gradient descent method [7]. The most appropriate choice in this case is to define the objective function as the error of the neural network which is initialized in the mentioned way and then subject to the full course of training. However, it is clear that this approach requires more calculations. In this case, only the calculation of the gradient from coefficients xk ,m,i that enter in (6) requires ~ N 2 network training courses. One can solve this problem either by using stochastic search algorithms or by the random initialization of coefficients xk ,m,i . In this case instead of the exponential parameterization of orthogonal matrices (5) one can perform the parameterization U i  I  Gi I  Gi  , 1 which requires less computations. The search of the global minimum in this case requires multiple training of the neural network. Another approach (we describe it below) is based on the following ideas. Let us choose matrices U1 and U2 so as to make the nonlinear transformation of data in the neural network bring the gain as soon as possible. The rate of the neural network training depends on the gradient calculated by differentiating the error function with respect to neurons weights. We vary coefficients xk ,m,i in (6) so as to maximize the norm of the gradient. Note that this process is quite analogous to the training of the neural network by the error backpropagation method, because, in essence, we just impose some linear constraints on the variation of weighting coefficients in accordance with expressions (4). In view of this fact we expect the total time consumption to be approximately two times greater than that of the simplest initialization algorithm described above. The implementation of this algorithm needs minimal additions to available libraries of neural network computations. For example, the network error function after the first epoch of training can be used as the objective function. In both cases, one can solve the optimization problem, for example, by the gradient descent method. We have performed numerical experiments with the proposed algorithm for the same model data and the same structure of the neural network as in the previous case. For simplicity of programming, we used the error of the neural network after the first epoch of training as the objective function. We performed 10 iterations of the gradient descent method. Then for the network with calculated optimal values of parameters of initial weights we, as above, performed 300 epochs of training. With fixed parameters the total time consumption increased less than 2 times in comparison to the simplest initialization algorithm considered above. See Table 1 for values of mean square prediction errors obtained by the application of 4 methods (the linear prediction method, the neural network prediction method with the NguyenWidrow initialization algorithm, the simplest algorithm, and the improved one based on the use of coefficients of the linear prediction model) under the same conditions for prediction intervals of 0.01, 0.02, 0.05, 0.1, and 1 second. Evidently, the use of the improved initialization algorithm in all cases results in the further essential decrease of the prediction error. Table 1 Prediction method Linear prediction method Neural network prediction method Neural network prediction method based on the linear one Improved neural network prediction method σ (0.01 sec) σ (0.02sec) σ (0.05 sec) σ (0.1 sec) σ (1 sec) 3.13810-4 1310-4 0.0108 0.0646 3.4031 1.18410-4 9.44110-4 0.0062 0.0377 0.7285 0.50510-4 1.99710-4 0.0016 0.0097 0.0862 0.27510-4 0,98510-4 0.0009 0.0048 0.0564 For comparison we have also determined values of coefficients xk ,m,i by minimizing the error at the output of the fully trained network. In this case the error of the prediction for 0.05 sec equals 0.00072 against the value of 0.0009 obtained by using the greatest gradient criterion. Evidently, switching to the method that requires much more computations, we only insignificantly improve the prediction accuracy. Conclusion According to the predicted behavior of the Lorenz chaotic system, the proposed initialization method for a neural network allows one to essentially decrease the prediction error in comparison both to that in the linear prediction method and the neural network one under the use of universal initialization algorithms. It is also true that in this problem, under the same conditions, the neural network prediction method is much more efficient than the linear one. The improved initialization algorithm allows us to additionally improve the prediction accuracy by a slight increase of the training time. Therefore, the developed method proved to be consistent for predicting the behavior of trajectories of the Lorenz chaotic system, which allows one to use it for predicting the behavior of such complex series. References 1. T.W.Anderson, «The Statistical Analysis of Time Series». Wiley-Interscience, 1994. 720 p. 2. M.Arato, Linear Stochastic Systems with Constant Coefficients. A Statistical Approach. Springer-Verlag, Berlin-Heidelberg-New York, 1982. 3. A.I. Galushkin, Neural Networks Theory. Springer, 2007, 396 p. 4. V.V. Kruglov, M.I. Dli, R.Y. Golunov. Moscow: “Fizmalit” Publisher, 2001. 224 p. (in Russian). 5. V. S. Medvedev and V. G. Potemkin, Neural networks: Matlab 6. Moscow: Dialog-MIFI, 2002. 496 p. (In Russian). 6. A.Gholipour, C.Lucas, B.N.Araabi, and M.Shafiee, Solar Activity Forecast: Spectral Analysis and Neurofuzzy Prediction. // Journal of Atmospheric and Solar-Terrestrial Physics. (2005). V.67, p. 595-603. 7. Ph.E.Gill, W.Murray, and M.H.Wright, Practical Optimization. N.Y.: Springer, 1981. 401 p. 8. Richard M. Crownover, Introduction to Fractals and Chaos, Jones and Bartlett, 1995. 9. P.G. Frick, Turbulence: Approaches and Models. 2-nd Edition. М.; Izhevsk: RDC “Regular and Chaotic Dynamics”, 2010. 332 p. (In Russian). 10. Tönu Puu, Nonlinear Economic Dynamics. Springer, 4th ed., 1997, 288 p.
9cs.NE
arXiv:1802.07810v1 [cs.AI] 21 Feb 2018 Manipulating and Measuring Model Interpretability Forough Poursabzi-Sangdeh Daniel G. Goldstein Jake M. Hofman [email protected] [email protected] [email protected] University of Colorado Boulder Microsoft Research Microsoft Research Jennifer Wortman Vaughan Hanna Wallach [email protected] [email protected] Microsoft Research Microsoft Research Abstract Despite a growing body of research focused on creating interpretable machine learning methods, there have been few empirical studies verifying whether interpretable methods achieve their intended effects on end users. We present a framework for assessing the effects of model interpretability on users via pre-registered experiments in which participants are shown functionally identical models that vary in factors thought to influence interpretability. Using this framework, we ran a sequence of large-scale randomized experiments, varying two putative drivers of interpretability: the number of features and the model transparency (clear or black-box). We measured how these factors impact trust in model predictions, the ability to simulate a model, and the ability to detect a model’s mistakes. We found that participants who were shown a clear model with a small number of features were better able to simulate the model’s predictions. However, we found no difference in multiple measures of trust and found that clear models did not improve the ability to correct mistakes. These findings suggest that interpretability research could benefit from more emphasis on empirically verifying that interpretable models achieve all their intended effects. 1 Introduction Machine learning is increasingly used to make decisions that affect people’s lives in critical domains like criminal justice, credit, lending, and medicine. Machine learning models are often evaluated based on their predictive performance on held-out data sets, measured, for example, in terms of accuracy, precision, or recall. However, good performance on held-out data may not be sufficient to convince decision makers that a model is trustworthy or reliable in the wild. To address this problem, a new line of research has emerged that focuses on developing interpretable machine learning methods. There are two common approaches. The first is to employ models in which the impact of each feature on the model’s prediction is easy to understand. Examples include generative additive models (Lou et al., 2012, 2013; Caruana et al., 2015) and point systems (Jung et al., 2017; Ustun and Rudin, 2016). The second is to provide post-hoc explanations for (potentially complex) models. One thread of research in this direction looks at how to explain individual predictions by learning simple local approximations of the model around particular data points (Ribeiro et al., 2016; Lundberg and Lee, 2017) or estimating the influence of training examples (Koh and Liang, 2017), while another focuses 1 on visualizing model output (Wattenberg et al., 2016). Despite the flurry of activity and innovation in this area, there is still no consensus about how to define, quantify, or measure the interpretability of a machine learning model (Doshi-Velez and Kim, 2017). Indeed, different notions of interpretability, such as simulatability, trustworthiness, and simplicity, are often conflated (Lipton, 2016). This problem is exacerbated by the fact that there are different types of users of machine learning systems and these users may have different needs in different scenarios. For example, the approach that works best for a regulator who wants to understand why a particular person was denied a loan may be different from the approach that works best for a data scientist trying to debug a machine learning model. We take the perspective that the difficulty of defining interpretability stems from the fact that interpretability is not something that can be directly manipulated or measured. Rather, interpretability is a latent property that can be influenced by different manipulable factors (such as the number of features, the complexity of the model, the transparency of the model, or even the user interface) and that impacts different measurable outcomes (such as an end user’s ability to simulate, trust, or debug the model). Different factors may influence these outcomes in different ways. As such, we argue that to understand interpretability, it is necessary to directly manipulate and measure the influence that different factors have on real people’s abilities to complete tasks. This endeavor goes beyond the realm of typical machine learning research. While the factors that influence interpretability are properties of the system design, the outcomes that we would ultimately like to measure are properties of human behavior. Because of this, building interpretable machine learning models is not a purely computational problem. In other words, what is or is not “interpretable” is defined by people, not algorithms. We therefore take an interdisciplinary approach, building on decades of psychology and social science research on human trust in models (e.g., Önkal et al., 2009; Dietvorst et al., 2015; Logg, 2017). The general approach used in this literature is to run randomized human-subject experiments in order to isolate and measure the influence of different manipulable factors on trust. Our goal is to apply this approach in order to understand interpretability—i.e., the relationships between properties of the system design and properties of human behavior. We present a sequence of large-scale randomized human-subject experiments, in which we varied factors that are thought to make models more or less interpretable (Glass et al., 2008; Lipton, 2016) and measured how these changes impacted people’s decision making. We focus on two factors that are often assumed to influence interpretability, but rarely studied formally: the number of features and the model transparency, i.e., whether the model internals are clear or a black box. We focus on laypeople as opposed to domain experts, and ask which factors help them simulate a model’s predictions, gain trust in a model, and understand when a model will make mistakes. While others have used human-subject experiments to validate or evaluate particular machine learning innovations in the context of interpretability (e.g., Ribeiro et al., 2016; Lim et al., 2009), we attempt to isolate and measure the influence of different factors in a more systematic way by taking an experimental approach. In each of our pre-registered experiments, participants were asked to predict the prices of apartments in a single neighborhood in New York City with the help of a machine learning model. Each apartment was represented in terms of eight features: number of bedrooms, number of bathrooms, square footage, total rooms, days on the market, maintenance fee, distance from the subway, and distance from a school. All participants saw the same set of apartments (i.e., the same feature values) and, crucially, the same model prediction for each apartment, which came from a linear regression model. What varied between the experimental conditions was only the presentation of the model. As a result, any observed differences in the participants’ behavior between the conditions could be attributed entirely to the model presentation. In our first experiment (Section 2), we hypothesized that participants who were shown a clear model with a small number 2 of features would be better able to simulate the model’s predictions and more likely to trust (and thus follow) the model’s predictions. We also hypothesized that participants in different conditions would exhibit varying abilities to correct the model’s inaccurate predictions on unusual examples. As predicted, we found that participants who were shown a clear model with a small number of features were better able to simulate the model’s predictions; however, we did not find that they were more likely to trust the model’s predictions and instead found no difference in trust between the conditions. We also found that participants who were shown a clear model were less able to correct inaccurate predictions. In our second experiment (Section 3), we scaled down the apartment prices and maintenance fees to match median housing prices in the U.S. in order to determine whether the findings from our first experiment were merely an artifact of New York City’s high prices. Even with scaled-down prices and fees, the findings from our first experiment replicated. In our third experiment (Section 4), we dug deeper into our finding that there was no difference in trust between the conditions. To make sure that this finding was not simply due to our measures of trust, we instead used the weight of advice measure frequently used in the literature on advice-taking (Yaniv, 2004; Gino and Moore, 2007) and subsequently used in the context of algorithmic predictions by Logg (2017). We hypothesized that participants would give greater weight to the predictions of a clear model with a small number of features than the predictions of a black-box model with a large number of features, and update their own predictions accordingly. We also hypothesized that participants’ behavior might differ if they were told that the predictions were made by a “human expert” instead of a black-box model with a large number of features. Even with the weight of advice measure, we again found no difference in trust between the conditions. We also found no difference in the participants’ behavior when they were told that the predictions were made by a human expert. We view these experiments as a first step toward a larger agenda aimed at quantifying and measuring the impact of different manipulable factors that influence interpretability. 2 Experiment 1: Predicting apartment prices Our first experiment was designed to measure the influence of the number of features and the model transparency on three properties of human behavior that are commonly associated with interpretability: laypeople’s abilities to simulate a model’s predictions, gain trust in a model, and understand when a model will make mistakes. Before running the experiment, we posited and pre-registered three hypotheses:1 H1. Simulation. A clear model with a small number of features will be easiest for participants to simulate. H2. Trust. Participants will be more likely to trust (and thus follow) the predictions of a clear model with a small number of features than the predictions of a black-box model with a large number of features. H3. Detection of mistakes. Participants in different conditions will exhibit varying abilities to correct the model’s inaccurate predictions on unusual examples. For the unusual examples, we intentionally did not pre-register any hypotheses about which conditions would make participants more or less able to correct inaccurate predictions. On the one hand, if a participant understands the model 1 Links to the pre-registration documents on aspredicted.org for each experiment are omitted to preserve author anonymity. 3 (a) Clear, two-feature condition (CLEAR -2). (b) Black-box, two-feature condition (BB -2). (c) Clear, eight-feature condition (CLEAR -8). (d) Black-box, eight-feature condition (BB -8). Figure 1: The four primary experimental conditions. In the conditions on top, the model used two features; on the bottom, it used eight. In the conditions on the left, participants saw the model internals; on the right, they were presented with the model as a black box. better, she may be better equipped to correct examples on which the model makes mistakes. On the other hand, a participant may place greater trust in a model she understands well, leading her to closely follow its predictions. Prediction error. Finally, we pre-registered our intent to analyze participants’ prediction error in each condition, but intentionally did not pre-register any directional hypotheses. 2.1 Experimental design As explained in the previous section, we asked participants to predict apartment prices with the help of a machine learning model. We showed all participants the same set of apartments and the same model prediction for each apartment. What varied between the experimental conditions was only the presentation of the model. We considered four primary 4 (a) (b) Figure 2: Part of the testing phase in the first experiment: (a) participants were asked to guess the model’s prediction and state their confidence (step 1) and (b) participants were asked to make their own prediction and state their confidence (step 3). experimental conditions in a 2 × 2 design: • Some participants saw a model that uses only two features (number of bathrooms and square footage—the two most predictive features), while some saw a model that uses all eight features. (Note that all eight feature values were visible to participants in all conditions.) • Some participants saw the model internals (i.e., a linear regression model with visible coefficients), while some were presented with the model as a black box. Screenshots from each of the four primary experimental conditions are shown in Figure 1. We additionally considered a baseline condition in which there was no model available. We ran the experiment on Amazon Mechanical Turk using psiTurk (Gureckis et al., 2016), an open-source platform for designing online experiments. The experiment was IRB-approved. We recruited 1,250 participants, all located in the U.S., with Mechanical Turk approval ratings greater than 97%. The participants were randomly assigned to the five conditions (CLEAR -2, n = 248 participants; CLEAR -8, n = 247; BB -2, n = 247; BB -8, n = 256; and NO - MODEL, n = 252). Each participant received a flat payment of $2.50. Participants were first shown detailed instructions (including, in the clear conditions, a simple English description of the corresponding two- or eight-feature linear regression model), before proceeding with the experiment in two phases. In the training phase, participants were shown ten apartments in a random order. In the four primary experimental conditions, participants were shown the model’s prediction of each apartment’s price, asked to make their own prediction, and then shown the apartment’s actual price. In the baseline condition, participants were asked to predict the price of each apartment and then shown the actual price. In the testing phase, participants were shown another twelve apartments. The order of the first ten was randomized, while the remaining two always appeared last, for reasons described below. In the four primary experimental conditions, participants were asked to guess what the model would predict for each apartment (i.e., simulate the model) and to indicate how confident they were in this guess on a five-point scale (Figure 2a). They were then shown the model’s prediction and asked to indicate how confident they were that the model was correct. Finally, they were asked to make 5 their own prediction of the apartment’s price and to indicate how confident they were in this prediction (Figure 2b). In the baseline condition, participants were asked to predict the price of each apartment and to indicate their confidence. The apartments shown to participants were selected from a data set of actual Upper West Side apartments taken from StreetEasy,2 a popular and reliable New York City real estate website, between 2013 and 2015. To create the models for the four primary experimental conditions, we first trained a two-feature linear regression model on our data set using ordinary least squares with Python’s scikit-learn library (Pedregosa et al., 2011), rounding coefficients to “nice” numbers within a safe range.3 To keep the models as similar as possible, we fixed the coefficients for number of bathrooms and square footage and the intercept of the eight-feature model to match those of the two-feature model, and then trained a linear regression model with the remaining six features, following the same rounding procedure to obtain “nice” numbers. The resulting coefficients are shown in Figure 1. When presenting the model predictions to participants, we rounded predictions to the nearest $100,000. To enable comparisons across experimental conditions, the ten apartments used in the training phase and the first ten apartments used in the testing phase were selected from those apartments in our data set for which the rounded predictions of the two- and eight-feature models agreed and chosen to cover a wide range of deviations between the models’ predictions and the apartments’ actual prices. By selecting only apartments for which the two- and eight-feature models agreed, we were able to ensure that what varied between the experimental conditions was only the presentation of the model. As a result, any observed differences in the participants’ behavior between the conditions could be attributed entirely to the model presentation. The last two apartments used in the testing phase were chosen to test our third hypothesis—i.e., that participants in different conditions will exhibit varying abilities to correct the model’s inaccurate predictions on unusual examples. To test this hypothesis, we would ideally have used an apartment with strange or misleading features that caused the two- and eight-feature models to make the same bad prediction. Unfortunately, there was no such apartment in our data set, so we chose two examples to test different aspects of our hypothesis. Both of these examples exploited the models’ large coefficient ($350,000) for number of bathrooms. The first (apartment 11) was a one-bedroom, two-bathroom apartment from our data set for which both models made high, but different, predictions. Comparisons between the two- and eight- feature conditions were therefore impossible, but we could examine differences in accuracy between the clear and black-box conditions. The second (apartment 12) was a synthetically generated one-bedroom, three-bathroom apartment for which both models made the same (high) prediction, allowing comparisons between all conditions, but ruling out accuracy comparisons since there was no ground truth. These apartments were always shown last to avoid the previously studied phenomenon in which people trust a model less after seeing it make a mistake (Dietvorst et al., 2015). 2.2 Results Having run our experiment, we compared participants’ behavior across the conditions. Doing so required us to compare multiple responses from multiple participants, which was complicated by possible correlations among any given participant’s responses. For example, some people might consistently overestimate apartment prices regardless of the condition they are assigned to, while others might consistently provide underestimates. We addressed this by fitting a mixed-effects model for each measure of interest to capture differences across conditions while controlling for 2 https://streeteasy.com/ 3 In particular, for each coefficient, we found a value that was divisible by the largest possible exponent of ten and was in the safe range, which is the coefficient value plus or minus stderr/4. 6 $100k $0k CLEAR−2 CLEAR−8 (a) BB−2 BB−8 Experiment 1: Deviation Experiment 1: Prediction error Mean prediction error $200k Mean deviation from the model Mean simulation error Experiment 1: Simulation error $150k $100k $50k $0k $300k $200k $100k $0k CLEAR−2 CLEAR−8 (b) BB−2 BB−8 CLEAR−2 CLEAR−8 BB−2 BB−8 NO−MODEL (c) Figure 3: Results from our first experiment: (a) mean simulation error, (b) mean deviation of participants’ predictions from the model’s prediction (a smaller value indicates higher trust), and (c) mean prediction error. Error bars indicate one standard error. participant-level effects—a standard approach for analyzing repeated measures experimental designs (Bates et al., 2015). We derived all plots and statistical tests from these models; plots show averages with one standard error by condition from the fitted models, and statistical tests report degrees of freedom, test statistics, and p-values under the models.4 Unless otherwise noted, all plots and statistical tests correspond to just the first ten apartments from the testing phase. H1. Simulation. We defined a participant’s simulation error to be the absolute deviation between the model’s prediction, m, and the participant’s guess for that prediction, um —that is, |m − um |. Figure 3a shows the mean simulation error in the testing phase. As hypothesized, participants in the CLEAR -2 condition had lower simulation error, on average, than participants in the other conditions (t(996) = 11.91, p < .001 for the contrast of CLEAR -2 with the other three primary conditions). This suggests that, on average, participants in this condition had some understanding of how the model works. Participants in the CLEAR -8 condition appeared to have higher simulation error, on average, than participants in the BB -8 condition who could not see the model’s internals (t(996) = 3.00, p = .002 for the contrast of CLEAR -8 with BB -8), though we note that this comparison is not one we pre-registered and could be due to chance. H2. Trust. To measure trust, we calculated the absolute deviation between the model’s prediction, m, and the participant’s prediction of the apartment’s price, ua —that is, |m − ua |; a smaller value indicates higher trust. Figure 3b shows that contrary to our second hypothesis, we found no significant difference in participants’ deviation from the model between CLEAR -2 and BB -8. (We did find statistically but not practically significant differences in participants’ self-reported confidence in the models’ predictions.) H3. Detection of mistakes. We used the last two apartments in the testing phase (apartment 11 and apartment 12) to test our third hypothesis. The models made erroneously high predictions on these examples. For both apartments, we found that participants in the four primary experimental conditions overestimated the apartments’ prices, compared to participants in the baseline condition. We suspect that this is due to an anchoring effect around the models’ predictions. For apartment 11, we found no significant difference in participants’ deviation from the model’s prediction between the four primary conditions (see Figure 4a). For apartment 12, we found a significant difference between the clear and black-box conditions (t(996) = 2.96, p = .003 for the contrast of CLEAR -2 and CLEAR -8 with BB -2 and BB -8). In particular, participants in the clear conditions deviated from the model’s prediction less, on average, than participants in the black-box conditions, resulting in even worse final predictions of the apartment’s price (see Figure 4b). This finding 4 We follow standard notation, where, e.g., the result of a t-test with n degrees of freedom is reported as t(n) = x, p = y, where x is the value of the test statistic and y is the corresponding p-value. 7 Mean deviation from the model for apartment 12 Mean deviation from the model for apartment 11 Experiment 1: Deviation in apartment 11 $150k $100k $50k $0k CLEAR−2 CLEAR−8 BB−2 BB−8 Experiment 1: Deviation in apartment 12 $300k $250k $200k $150k $100k $50k $0k CLEAR−2 $15k $10k $5k $0k CLEAR−2 CLEAR−8 BB−2 BB−8 (b) Experiment 2: Deviation in apartment 11 Mean deviation from the model for apartment 12 Mean deviation from the model for apartment 11 (a) CLEAR−8 BB−2 BB−8 (c) Experiment 2: Deviation in apartment 12 $30k $20k $10k $0k CLEAR−2 CLEAR−8 BB−2 BB−8 (d) Figure 4: Mean deviation from the model for apartments 11 and 12 in our first experiment (top) and in our second experiment (bottom). Error bars indicate one standard error. (Note that for apartment 11, comparisons between the twoand eight-feature conditions are not possible because the models make different predictions.) contradicts the common intuition that transparency enables users to understand when a model will make mistakes. Prediction error. We defined prediction error to be the absolute deviation between the apartment’s actual price, a, and the participant’s prediction of the apartment’s price, ua —that is, |a − ua |. Figure 3c shows that we did not find a significant difference between the four primary experimental conditions. However, participants in the baseline condition had significantly higher error than participants in the four primary conditions (t(1248) = 15.27, p < .001 for the contrast of the baseline with the four primary conditions). 3 Experiment 2: Scaled-down prices One potential explanation for participants’ poor abilities to correct inaccurate predictions might be their lack of familiarity with New York City’s unusually high apartment prices. For example, if a participant finds Upper West Side prices to be unreasonably high even when the model is correct, she may not notice that the model has placed too much weight on number of bathrooms. Our second experiment was designed to address this issue by replicating our first experiment with apartment prices and maintenance fees scaled down to match median housing prices in the U.S. Before running this experiment we pre-registered three hypotheses. The first two hypotheses (H4 and H5) are identical to H1 and H2 from our first experiment. We made the third hypothesis more precise than H3 to reflect the results of our first experiment and a small pilot with scaled-down prices: 8 $10k $0k CLEAR−2 CLEAR−8 BB−2 (a) BB−8 Experiment 2: Deviation Experiment 2: Prediction error $15k Mean prediction error $20k Mean deviation from the model Mean simulation error Experiment 2: Simulation error $10k $5k $0k $30k $20k $10k $0k CLEAR−2 CLEAR−8 (b) BB−2 BB−8 CLEAR−2 CLEAR−8 BB−2 BB−8 NO−MODEL (c) Figure 5: Results from our second experiment: (a) mean simulation error, (b) mean deviation of participants’ predictions from the model’s predictions (a smaller value indicates higher trust), and (c) mean prediction error. Error bars indicate one standard error. H6. Detection of mistakes. Participants will be less likely to correct inaccurate predictions on unusual examples of a clear model compared to a black-box model. 3.1 Experimental design We first scaled down the apartment prices and maintenance fees from our first experiment by a factor of ten. To account for this change, we also scaled down all regression coefficients (except for the coefficient for maintenance fee) by a factor of ten. Apart from the description of the neighborhood from which the apartments were selected, the experimental design was unchanged. We again ran the experiment on Amazon Mechanical Turk. We excluded people who had participated in our first experiment, and recruited 750 new participants all of whom satisfied the selection criteria from our first experiment. The participants were randomly assigned to the five conditions (CLEAR -2, n = 150; CLEAR -8, n = 150; BB -2, n = 147; BB -8, n = 151; and NO - MODEL , n = 152). Each participant received a flat payment of $2.50. 3.2 Results H4. Simulation. As hypothesized, and shown in Figure 5a, participants in the CLEAR -2 condition had significantly lower simulation error, on average, than participants in the other conditions (t(596) = 10.28, p < .001 for the contrast of CLEAR -2 with the other three primary conditions). This is in line with the finding from our first experiment. H5. Trust. Contrary to our second hypothesis, and in line with the finding from our first experiment, we found no significant difference in participants’ trust, as indicated by their deviation from the model, between CLEAR -2 and BB -8. H6. Detection of mistakes. In line with the finding from our first experiment, we found no significant difference in participants’ deviation from the model’s prediction between the four primary conditions for apartment 11 (see Figure 4c). As hypothesized, and in line with the finding from our first experiment, participants in the clear conditions deviated from the model’s prediction less, on average, than participants in the black-box conditions for apartment 12, resulting in even worse final predictions of the apartment’s price (see Figure 4d). These findings both suggest that New York City’s 9 unusually high apartment prices do not explain participants’ poor abilities to correct inaccurate predictions. Prediction error. Participants in the CLEAR -2 condition had statistically but not practically (< $3,000) significantly lower prediction error (t(596) = 3.17, p = .001 for the contrast of CLEAR -2 with the other three primary conditions). 4 Experiment 3: Alternative measure of trust In our first two experiments, we found that participants were no more likely to trust the predictions of a clear model with a small number of features than the predictions of a black-box model with a large number of features, as indicated by the deviation of their own predictions from the model’s prediction. However, perhaps another measure of trust would reveal differences between the conditions. In this section, we therefore present our third experiment, which was designed to allow us to compare participants’ trust across the conditions using an alternative measure of trust: the weight of advice measure frequently used in the literature on advice-taking (Yaniv, 2004; Gino and Moore, 2007; Logg, 2017). Weight of advice quantifies the degree to which people update their beliefs (e.g., predictions made before seeing the model’s predictions) toward advice they are given (e.g., the model’s predictions). In the context of our experiment, it is defined as |u2 − u1 | / |m − u1 |, where m is the model’s prediction, u1 is the participant’s initial prediction of the apartment’s price before seeing m, and u2 is the participant’s final prediction of the apartment’s price after seeing m. It is equal to 1 if the participant’s final prediction matches the model’s prediction and equal to 0.5 if the participant averages their initial prediction and the model’s prediction. To understand the benefits of comparing weight of advice across the conditions, consider the scenario in which u2 is close to m. There are different reasons why this might happen. On the one hand, it could be the case that u1 was far from m and the participant made a significant update to their initial prediction based on the model. On the other hand, it could be the case that u1 was already close to m and the participant did not update her prediction at all. These two scenarios are indistinguishable in terms of the participant’s deviation from the model’s prediction. In contrast, weight of advice would be high in the first case and low in the second. We additionally used this experiment as a chance to see whether participants’ behavior would differ if they were told that the predictions were made by a “human expert” instead of a model. Previous studies have examined this question from different perspectives with differing results (e.g., Önkal et al., 2009; Dietvorst et al., 2015). Most closely related to our experiment, Logg (2017) found that when people were presented with predictions from either an algorithm or a human expert, they updated their own predictions toward predictions from an algorithm more than they did toward predictions from a human expert in a variety of domains. We were interested to see whether this finding would replicate. We pre-registered four hypotheses: H7. Trust (deviation). Participants’ predictions will deviate less from the predictions of a clear model with a small number of features than the predictions of a black-box model with a large number of features. H8. Trust (weight of advice). Weight of advice will be higher for participants who see a clear model with a small number of features than for those who see a black-box model with a large number of features. H9. Humans vs. machines. Participants will trust a human expert and a black-box model to differing extents. As a result, their deviation from the model’s predictions and their weight of advice will also differ. 10 H10. Detection of mistakes. Participants in different conditions will exhibit varying abilities to correct the model’s inaccurate predictions on unusual examples. The first two hypotheses are variations on H2 from our first experiment, while the last hypothesis is identical to H3. 4.1 Experimental design We considered the same four primary experimental conditions as in the first two experiments plus a new condition, EXPERT, in which participants saw the same information as in BB -8, but with the black-box model labeled as “Human Expert” instead of “Model.” We did not include a baseline condition because the most natural baseline would have been to simply ask participants to predict apartment prices (i.e., the first step of the testing phase described below). We again ran the experiment on Amazon Mechanical Turk. We excluded people who had participated in our first two experiments, and recruited 1,000 new participants all of whom satisfied the selection criteria from our first two experiments. The participants were randomly assigned to the five conditions (CLEAR -2, n = 202; CLEAR -8, n = 200; BB -2, n = 202; BB -8, n = 198; and EXPERT , n = 197). Each participant received a flat payment of $1.50. We excluded data from one participant who reported technical difficulties. We asked participants to predict apartment prices for the same set of apartments used in the first two experiments. However, in order to calculate weight of advice, we modified the experiment design so that participants were asked for two predictions for each apartment during the testing phase: an initial prediction before being shown the model’s prediction and a final prediction after being shown the model’s prediction. To ensure that participants’ initial predictions were the same across the conditions, we asked for their initial predictions for all twelve apartments before introducing them to the model or human expert and before informing them that they would be able to update their predictions. This design has the added benefit of potentially reducing the amount of anchoring on the model or expert’s predictions. Participants were first shown detailed instructions (which intentionally did not include any information about the corresponding model or human expert), before proceeding with the experiment in two phases. In the (short) training phase, participants were shown three apartments, asked to predict each apartment’s price, and shown the apartment’s actual price. The testing phase consisted of two steps. In the first step, participants were shown another twelve apartments. The order of all twelve apartments was randomized. Participants were asked to predict the price of each apartment. In the second step, participants were introduced to the model or human expert before revisiting the twelve apartments. As in the first two experiments, the order of the first ten apartments was randomized, while the remaining two (apartments 11 and 12) always appeared last. For each apartment, participants were first reminded of their initial prediction, then shown the model or expert’s prediction, and then asked to make their final prediction of the apartment’s price.5 11 $50k $0k CLEAR−2 CLEAR−8 BB−2 (a) BB−8 EXPERT Experiment 3: Weight of Advice Experiment 3: Prediction error 0.6 Mean prediction error $100k Mean weight of advice (WOA) Mean deviation from the model Experiment 3: Deviation $150k 0.4 0.2 0.0 $200k $100k $0k CLEAR−2 CLEAR−8 BB−2 (b) BB−8 EXPERT CLEAR−2 CLEAR−8 BB−2 BB−8 EXPERT (c) Figure 6: Results from our third experiment: (a) mean deviation of participants’ predictions from the model’s prediction (a smaller value indicates higher trust), (b) mean weight of advice, and (c) mean prediction error. Error bars indicate one standard error. 4.2 Results H7. Trust (deviation). Contrary to our first hypothesis, and in line with the findings from our first two experiments, we found no significant difference in participants’ deviation from the model between CLEAR -2 and BB -8 (see Figure 6a). H8. Trust (weight of advice). Weight of advice is not well defined when a participant’s initial prediction matches the model’s prediction (i.e., u1 = m). For each condition, we therefore calculated the mean weight of advice over all participant–apartment pairs for which the participant’s initial prediction did not match the model’s prediction.6 This calculation can be viewed as calculating the mean conditioned on there being initial disagreement between the participant and the model. Contrary to our second hypothesis, and in line with the findings for the measures of trust in our first two experiments, we did not find a significant difference in participants’ weight of advice between the CLEAR -2 and BB -8 conditions (see Figure 6b). H9. Humans vs. machines. Contrary to our third hypothesis, we did not find a significant difference in participants’ trust, as indicated by either the deviation of their predictions from the model or expert’s prediction or by their weight of advice, between the BB -8 and EXPERT conditions. H10. Detection of mistakes. In contrast to our first two experiments, we did not find that participants in the clear conditions were less able to correct inaccurate predictions. 5 We initially considered an alternative design in which participants were asked to predict each apartment’s price, shown the model’s prediction, and then asked to update their own prediction before moving on to the next apartment. During pilots, it appeared that participants changed their initial predictions in response to the model. To verify this, we ran a larger version of this experiment, hypothesizing that participants’ initial predictions would deviate less from the model’s predictions in the CLEAR -2 condition. As predicted, this was indeed the case (t(241) = −3.41, p < .001). The amount by which participants’ initial predictions change based on the model they see could be viewed as another measure of trust. 6 We found no significant difference in the fraction of times that participants’ initial predictions matched the model’s predictions. 12 5 Discussion and future work We investigated how two factors that are thought to influence model interpretability—the number of features and the model transparency—impact laypeople’s abilities to simulate a model’s predictions, gain trust in a model, and understand when a model will make mistakes. Although we found that a clear model with a small number of features was easier for participants to simulate, we found no difference in trust. We also found that participants were less able to correct inaccurate predictions when they were shown a clear model instead of a black box. These findings suggest that one should not take for granted that a “simple” or “transparent” model always leads to higher trust. However, we caution readers against jumping to the conclusion that interpretable models are not valuable. Our experiments focused on just one model, presented to one specific subpopulation, for only a subset of the scenarios in which interpretability might play an important role. Instead, we see this work as the first of many steps towards a larger goal of rigorously quantifying and measuring when and why interpretability matters. The general experimental approach that we introduced—i.e., presenting people with models that make identical predictions but varying the presentation of these model in order to isolate and measure the impact of different factors on people’s abilities to perform well-defined tasks—could be applied in a wide range of different contexts and may lead to different conclusions in each. For example, instead of a linear regression model, one could examine decision trees or rule lists in a classification setting. Or our experiments could be repeated with participants who are domain experts, data scientists, or researchers in lieu of laypeople recruited on Amazon Mechanical Turk. Likewise, there are many other scenarios to be explored such as debugging a poorly performing model, assessing bias in a model’s predictions, or explaining why an individual prediction was made. We hope that our work can serve as a useful template for examining the importance of interpretability in these and other contexts. References Douglas Bates, Martin Mächler, Ben Bolker, and Steve Walker. Fitting linear mixed-effects models using lme4. Journal of Statistical Software, 67(1):1–48, 2015. Rich Caruana, Yin Lou, Johannes Gehrke, Paul Koch, Marc Sturm, and Noemie Elhadad. Intelligible models for healthcare: Predicting pneumonia risk and hospital 30-day readmission. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2015. Berkeley J. Dietvorst, Joseph P. Simmons, and Cade Massey. Algorithm aversion: People erroneously avoid algorithms after seeing them err. Journal of Experimental Psychology: General, 144(1):114–126, 2015. Finale Doshi-Velez and Been Kim. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608, 2017. Francesca Gino and Don A. Moore. Effects of task difficulty on use of advice. Journal of Behavioral Decision Making, 20(1):21–35, 2007. Alyssa Glass, Deborah L McGuinness, and Michael Wolverton. Toward establishing trust in adaptive agents. In Proceedings of the 13th International Conference on Intelligent User Interfaces (IUI), 2008. Todd M Gureckis, Jay Martin, John McDonnell, Alexander S Rich, Doug Markant, Anna Coenen, David Halpern, Jessica B Hamrick, and Patricia Chan. psiTurk: An open-source framework for conducting replicable behavioral experiments online. Behavior Research Methods, 48(3):829–842, 2016. 13 Jongbin Jung, Connor Concannon, Ravi Shro, Sharad Goel, and Daniel G. Goldstein. Simple rules for complex decisions. arXiv preprint arXiv:1702.04690, 2017. Pang Wei Koh and Percy Liang. Understanding black-box predictions via influence functions. In Proceedings of the 34th International Conference on Machine Learning (ICML), 2017. Brian Y Lim, Anind K Dey, and Daniel Avrahami. Why and why not explanations improve the intelligibility of context-aware intelligent systems. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI), 2009. Zachary C Lipton. The mythos of model interpretability. arXiv preprint arXiv:1606.03490, 2016. Jennifer M. Logg. Theory of machine: When do people rely on algorithms? Harvard Business School NOM Unit Working Paper No. 17-086, 2017. Yin Lou, Rich Caruana, and Johannes Gehrke. Intelligible models for classification and regression. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2012. Yin Lou, Rich Caruana, Johannes Gehrke, and Giles Hooker. Accurate intelligible models with pairwise interactions. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2013. Scott Lundberg and Su-In Lee. A unified approach to interpreting model predictions. In Advances in Neural Information Processing Systems 30 (NIPS), 2017. Dilek Önkal, Paul Goodwin, Mary Thomson, and Sinan Gönül. The relative influence of advice from human experts and statistical methods on forecast adjustments. Journal of Behavioral Decision Making, 22:390–409, 2009. Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Édouard Duchesnay. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:2825–2830, 2011. Marco Tulio Ribeiro, Sameer Singh, and Carlos Guestrin. Why should I trust you?: Explaining the predictions of any classifier. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2016. Berk Ustun and Cynthia Rudin. Supersparse linear integer models for optimized medical scoring systems. Machine Learning Journal, 102(3):349–391, 2016. Martin Wattenberg, Fernanda Viégas, and Moritz Hardt. Attacking discrimination with smarter machine learning. Accessed at https://research.google.com/bigpicture/attacking-discrimination-in-ml/, 2016. Ilan Yaniv. Receiving other people’s advice: Influence and benefit. Organizational Behavior and Human Decision Processes, 93:1–13, 2004. 14
2cs.AI
1 Recent Advances in Zero-shot Recognition arXiv:1710.04837v1 [cs.CV] 13 Oct 2017 Yanwei Fu, Tao Xiang, Yu-Gang Jiang, Xiangyang Xue, Leonid Sigal, and Shaogang Gong Abstract—With the recent renaissance of deep convolution neural networks, encouraging breakthroughs have been achieved on the supervised recognition tasks, where each class has sufficient training data and fully annotated training data. However, to scale the recognition to a large number of classes with few or now training samples for each class remains an unsolved problem. One approach to scaling up the recognition is to develop models capable of recognizing unseen categories without any training instances, or zero-shot recognition/ learning. This article provides a comprehensive review of existing zero-shot recognition techniques covering various aspects ranging from representations of models, and from datasets and evaluation settings. We also overview related recognition tasks including one-shot and open set recognition which can be used as natural extensions of zeroshot recognition when limited number of class samples become available or when zero-shot recognition is implemented in a real-world setting. Importantly, we highlight the limitations of existing approaches and point out future research directions in this existing new research area. Index Terms—life-long learning, zero-shot recognition, oneshot learning, open-set recognition. I. I NTRODUCTION Humans can distinguish at least 30,000 basic object categories [1] and many more subordinate ones (e.g., breeds of dogs). They can also create new categories dynamically from few examples or purely based on high-level description. In contrast, most existing computer vision techniques require hundreds, if not thousands, of labelled samples for each object class in order to learn a recognition model. Inspired by humans’ ability to recognize without seeing examples, the research area of learning to learn or lifelong learning [2], [3], [4] has received increasing interests. These studies aim to intelligently apply previously learned knowledge to help future recognition tasks. In particular, a major topic in this research area is building recognition models capable of recognizing novel visual categories that have no associated labelled training samples (i.e., zero-shot learning), few training examples (i.e. one-shot learning), and recognizing the visual categories under an ‘open-set’ setting where the testing instance could belong to either seen or unseen/novel categories. These problems can be solved under the setting of transfer learning. Typically, transfer learning emphasizes the transfer Yanwei Fu and Xiangyang Xue are with the School of Data Science, Fudan University, Shanghai, 200433, China. E-mail: {yanweifu,xyxue}@fudan.edu.cn; Yu-Gang Jiang is with the School of Computer Science, Shanghai Key Lab of Intelligent Information Processing, Fudan University. Email: [email protected]; Yu-Gang Jiang is the corresponding author. Leonid Sigal is with the Department of Computer Science, University of British Columbia, BC, Canada. Email: [email protected]; Tao Xiang and Shaogang Gong are with the School of Electronic Engineering and Computer Science, Queen Mary University of London, E1 4NS, UK. Email: {t.xiang, s.gong}@qmul.ac.uk. of knowledge across domains, tasks, and distributions that are similar but not the same. Transfer learning [5] refers to the problem of applying the knowledge learned in one or more auxiliary tasks/domains/sources to develop an effective model for a target task/domain. To recognize zero-shot categories in the target domain, one has to utilize the information learned from source domain. Unfortunately, it may be difficult for existing methods of domain adaptation [6] to be directly applied on these tasks, since there are only few training instances available on target domain. Thus the key challenge is to learn domain-invariant and generalizable feature representation and/or recognition models usable in the target domain. The rest of this paper is organized as follows: We give an overview of zero-shot recognition in Sec. II. The semantic representations and common models of zero-shot recognition have been reviewed in Sec. III and Sec. IV respectively. Next, we discuss the recognition tasks beyond zero-shot recognition in Sec. V including generalized zero-shot recognition, openset recognition and one-shot recognition. The commonly used datasets are discussed in Sec. VI; and we also discuss the problems of using these datasets to conduct zero-shot recognition. Finally, we suggest some future research directions in Sec. VII and conclude the paper in Sec. VIII. II. OVERVIEW OF Z ERO - SHOT R ECOGNITION Zero-shot recognition can be used in a variety of research areas, such as neural decoding from fMRI images [7], face verification [8], object recognition [9], video understanding [10], [11], [12], [13], and natural language processing [14]. The tasks of identifying classes without any observed data is called zero-shot learning. Specifically, in the settings of zero-shot recognition, the recognition model should leverage training data from source/auxiliary dataset/domain to identify the unseen target/testing dataset/domain. Thus the main challenge of zero-shot recognition is how to generalize the recognition models to identify the novel object categories without accessing any labelled instances of these categories. The key idea underpinning zero-shot recognition is to explore and exploit the knowledge of how an unseen class (in target domain) is semantically related to the seen classes (in the source domain). We explore the relationship of seen and unseen classes in Sec. III, through the use of intermediatelevel semantic representations. These semantic representation are typically encoded in a high dimensional vector space. The common semantic representations include semantic attributes (Sec. III-A) and semantic word vectors (Sec. III-B), encoding linguistic context. The semantic representation is assumed to be shared between the auxiliary/source and target/test dataset. Given a pre-defined semantic representation, each class name 2 can be represented by an attribute vector or a semantic word vector – a representation termed class prototype. III. S EMANTIC R EPRESENTATIONS IN Z ERO - SHOT R ECOGNITION Because the semantic representations are universal and shared, they can be exploited for knowledge transfer between the source and target datasets (Sec. IV), in order to enable recognition novel unseen classes. A projection function mapping visual features to the semantic representations is typically learned from the auxiliary data, using an embedding model (Sec. IV-A). Each unlabelled target class is represented in the same embedding space using a class ‘prototype’. Each projected target instance is then classified, using the recognition model, by measuring similarity of projection to the class prototypes in the embedding space (Sec. IV-B). Additionally, under an open set setting where the test instances could belong to either the source or target categories, the instances of target sets can also be taken as outliers of the source data; therefore novelty detection [15] needs to be employed first to determine whether a testing instance is on the manifold of source categories; and if it is not, it will be further classified into one of the target categories. In this section, we review the semantic representations used for zero-shot recognition. These representations can be categorized into two categories, namely, semantic attributes and beyond. We briefly review relevant papers in Table I. The zero-shot recognition can be considered a type of life-long learning. For example, when reading a description ‘flightless birds living almost exclusively in Antarctica’, most of us know and can recognize that it is referring to a penguin, even though most people have never seen a penguin in their life. In cognitive science [16], studies explain that humans are able to learn new concepts by extracting intermediate semantic representation or high-level descriptions (i.e., flightless, bird, living in Antarctica) and transferring knowledge from known sources (other bird classes, e.g., swan, canary, cockatoo and so on) to the unknown target (penguin). That is the reason why humans are able to understand new concepts with no (zero-shot recognition) or only few training samples (few-shot recognition). This ability is termed “learning to learn”. More interestingly, humans can recognize newly created categories from few examples or merely based on high-level description, e.g., they are able to easily recognize the video event named “Germany World Cup winner celebrations 2014” which, by definition, did not exist before July 2014. To teach machines to recognize the numerous visual concepts dynamically created by combining multitude of existing concepts, one would require an exponential set of training instances for a supervised learning approach. As such, the supervised approach would struggle with the one-off and novel concepts such as “Germany World Cup winner celebrations 2014”, because no positive video samples would be available before July 2014 when Germany finally beat Argentina to win the Cup. Therefore, zero-shot recognition is crucial for recognizing dynamically created novel concepts which are composed of new combinations of existing concepts. With zero-shot learning, it is possible to construct a classifier for “Germany World Cup winner celebrations 2014”by transferring knowledge from related visual concepts with ample training samples, e.g., “ FC Bayern Munich - Champions of Europe 2013” and “ Spain World Cup winner celebrations 2010”. A. Semantic Attributes An attribute (e.g., has wings) refers to the intrinsic characteristic that is possessed by an instance or a class (e.g., bird) (Fu et al. [11]), or indicates properties (e.g., spotted) or annotations (e.g., has a head) of an image or an object (Lampert et al. [9]). Attributes describe a class or an instance, in contrast to the typical classification, which names an instance. Farhadi et al. [17] learned a richer set of attributes including parts, shape, materials and etc. Another commonly used methodology (e.g., in human action recognition (Liu et al. [12]), and in attribute and object-based modeling (Wang et al. [18])) is to take the attribute labels as latent variables on the training dataset, e.g., in the form of a structured latent SVM model with the objective is to minimize prediction loss. The attribute description of an instance or a category is useful as a semantically meaningful intermediate representation bridging a gap between low level features and high level class concepts (Palatucci et al. [7]). The attribute learning approaches have emerged as a promising paradigm for bridging the semantic gap and addressing data sparsity through transferring attribute knowledge in image and video understanding tasks. A key advantage of attribute learning is to provide an intuitive mechanism for multi-task learning (Salakhutdinov et al. [19]) and transfer learning (Hwang et al. [20]). Particularly, attribute learning enables the learning with few or zero instances of each class via attribute sharing, i.e., zero-shot and one-shot learning. Specifically, the challenge of zero-shot recognition is to recognize unseen visual object categories without any training exemplars of the unseen class. This requires the knowledge transfer of semantic information from auxiliary (seen) classes, with example images, to unseen target classes. Later works (Parikh et al.[21], Kovashka et al. [22] and Berg et al. [23]) extended the unary/binary attributes to compound attributes, which makes them extremely useful for information retrieval (e.g., by allowing complex queries such as “Asian women with short hair, big eyes and high cheekbones”) and identification (e.g., finding an actor whose name you forgot, or an image that you have misplaced in a large collection). In a broader sense, the attribute can be taken as one special type of “subjective visual property” [24], which indicates the task of estimating continuous values representing visual properties observed in an image/video. These properties are also examples of attributes, including image/video interestingness [25], [26], memorability [27], [28], aesthetic [29], and human-face age estimation [30], [31]. Image interestingness was studied in Gygli et al. [25], which showed that three cues contribute the most to interestingness: aesthetics, unusualness/novelty and general preferences; the last of which refers to the fact that people, in general, find certain types 3 of scenes more interesting than others, for example, outdoornatural vs. indoor-manmade. Jiang et al. [26] evaluated different features for video interestingness prediction from crowdsourced pairwise comparisons. ACM International Conference on Multimedia Retrieval (ICMR) 2017 published special issue (“multimodal understanding of subjective properties”1 ) on the applications of multimedia analysis for subjective property understanding, detection and retrieval. These subjective visual properties can be used as an intermediate representation for zero-shot recognition as well as other visual recognition tasks, e.g., people can be recognized by the description of how pale their skin complexion is and/or how chubby their face looks [21]. In the next subsections, we will briefly review different types of attributes. 1) User-defined Attributes: User-defined attributes are defined by human experts [32], [9], or a concept ontology [11]. Different tasks may also necessitate and contain distinctive attributes, such as facial and clothes attributes [18], [33], [34], [35], [36], [37], attributes of biological traits (e.g., age and gender) [38], [39], product attributes (e.g., size, color, price) [40] and 3D shape attributes [41]. Such attributes transcend the specific learning tasks and are, typically, pre-learned independently across different categories, thus allowing transference of knowledge [22], [42], [43]. Essentially, these attributes can either serve as the intermediate representations for knowledge transfer in zero-shot, one-shot and multi-task learning [40], or be directly employed for advanced applications, such as clothes recommendation [18]. Ferrari et al. [44] studied some elementary properties such as colour and/or geometric pattern. From human annotations, they proposed a generative model for learning simple color and texture attributes. The attribute can be either viewed as unary (e.g., red colour, round texture), or binary (e.g., black/white stripes). The ‘unary’ attributes are simple attributes, whose characteristic properties are captured by individual image segments (appearance for red, shape for round). In contrast, the ‘binary’ attributes are more complex attributes, whose basic element is a pair of segments (e.g., black/white stripes). 2) Relative Attributes: Attributes discussed above use single value to represent the strength of an attribute being possessed by one instance/class; they can indicate properties (e.g., spotted) or annotations of images or objects. In contrast, relative information, in the form of relative attributes, can be used as a more informative way to express richer semantic meaning and thus better represent visual information. The relative attributes can be directly used for zero-shot recognition [21]. Relative attributes (Parikh et al. [21]) were first proposed in order to learn a ranking function capable of predicting the relative semantic strength of a given attribute. The annotators give pairwise comparisons on images and a ranking function is then learned to estimate relative attribute values for unseen images as ranking scores. These relative attributes are learned as a form of richer representation, corresponding to the strength of visual properties, and used in a number of tasks including visual recognition with sparse data, interactive image 1 http://www.icmr2017.ro/call-for-special-sessions-s1.php search (Kovashka et al. [22]), semi-supervised (Shrivastava et al. [45]) and active learning (Biswas et al. [46], [47]) of visual categories. Kovashka et al. [22] proposed a novel model of feedback for image search where users can interactively adjust the properties of exemplar images by using relative attributes in order to best match his/her ideal queries. Fu et al. [24] extended the relative attributes to “subjective visual properties” and proposed a learning-to-rank model of pruning the annotation outliers/errors in crowdsourced pairwise comparisons. Given only weakly-supervised pairwise image comparisons, Singh et al. [48] developed an end-toend deep convolutional network to simultaneously localize and rank relative visual attributes. The localization branch in [48] is adapted from the spatial transformer network [49]. 3) Data-driven attributes: The attributes are usually defined by extra knowledge of either expert users or concept ontology. To better augment such user-defined attributes, Parikh et al. [50] proposed a novel approach to actively augment the vocabulary of attributes to both help resolve intra-class confusions of new attributes and coordinate the “name-ability” and “discriminativeness” of candidate attributes. However, such user-defined attributes are far from enough to model the complex visual data. The definition process can still be either inefficient (costing substantial effort of user experts) and/or insufficient (descriptive properties may not be discriminative). To tackle such problems, it is necessary to automatically discover more discriminative intermediate representations from visual data, i.e. data-driven attributes. The data-driven attributes can be used in zero-shot recognition tasks [12], [11]. Despite previous efforts, an exhaustive space of attributes is unlikely to be available, due to the expense of ontology creation, and a simple fact that semantically obvious attributes, for humans, do not necessarily correspond to the space of detectable and discriminative attributes. One method of collecting labels for large scale problems is to use Amazon Mechanical Turk (AMT) [73]. However, even with excellent quality assurance, the results collected still exhibit strong label noise. Thus label-noise [51] is a serious issue in learning from either AMT, or existing social meta-data. More subtly, even with an exhaustive ontology, only a subset of concepts from the ontology are likely to have sufficient annotated training examples, so the portion of the ontology which is effectively usable for learning, may be much smaller. This inspired the works of automatically mining the attributes from data. Data-driven attributes have only been explored in a few previous works. Liu et al. [12] employed an information theoretic approach to infer the data-driven attributes from training examples by building a framework based on a latent SVM formulation. They directly extended the attribute concepts in images to comparable “action attributes” in order to better recognize human actions. Attributes are used to represent human actions from videos and enable the construction of more descriptive models for human action recognition. They augmented user-defined attributes with data-driven attributes to better differentiate existing classes. Farhadi et al. [17] also learned user-defined and data-driven attributes. The data-driven attribute works in [12], [17], [74] are limited. First, they learn the user-defined and data-driven 4 Different Types of Attributes User-defined attributes Relative attributes Data-driven attributes Video attributes Concept ontology Semantic word embedding Papers [32], [9][11][42], [43][18], [33], [34], [35], [36], [37][40][18][38], [39][44] [21][48][24][46], [47][22][45] [50][51][12], [17][11], [13][17][52] [53][54][53][55][56], [57][58][59] [60][61], [62][63][64], [65] [66], [67], [68], [69], [70], [15][15][71][69][70], [66][72], [10] TABLE I D IFFERENT TYPES OF SEMANTIC REPRESENTATIONS FOR ZERO - SHOT RECOGNITION . attributes separately, rather than jointly in the same framework. Therefore data-driven attributes may re-discover the patterns that exist in the user-defined attributes. Second, the data-driven attributes are mined from data and we do not know the corresponding semantic attribute names for the discovered attributes. For those reasons, usually data-driven attributes can not be directly used in zero-shot learning. These limitations inspired the works of [11], [13]. Fu et al. [11], [13] addressed the tasks of understanding multimedia data with sparse and incomplete labels. Particularly, they studied the videos of social group activities by proposing a novel scalable probabilistic topic model for learning a semi-latent attribute space. The learned multi-modal semi-latent attributes can enable multi-task learning, one-shot learning and zero-shot learning. Habibian et al. [52] proposed a new type of video representation by learning the “VideoStory” embedding from videos and corresponding descriptions. This representation can also be interpreted as data-driven attributes. The work won the best paper award in ACM Multimedia 2014. 4) Video Attributes: Most existing studies on attributes focus on object classification from static images. Another line of work instead investigates attributes defined in videos, i.e., video attributes, which are very important for corresponding video related tasks such as action recognition and activity understanding. Video attributes can correspond to a wide range of visual concepts such as objects (e.g., animal), indoor/outdoor scenes (e.g., meeting, snow), actions (e.g. blowing candle) and events (e.g., wedding ceremony), and so on. Compared to static image attributes, many video attributes can only be computed from image sequences and are more complex in that they often involve multiple objects. Video attributes are closely related to video concept detection in Multimedia community. The video concepts in a video ontology can be taken as video attributes in zero-shot recognition. Depending on the ontology and models used, many approaches on video concept detection (Chang et al. [75], [76], Snoek et al. [54], Hauptmann et al. [53], Gan et al. [64] and Qin et al. [77]) can therefore be seen as addressing a sub-task of video attribute learning to solve zero-shot video event detection. Some works aim to automatically expand (e.g., Hauptmann et al. [53] and Tang et al. [58]) or enrich (Yang et al. [78]) the set of video tags [79], [55], [78] given a search query. In this case, the expanded/enriched tagging space has to be constrained by a fixed concept ontology, which may be very large and complex [55], [80], [81]. For example, there is a vocabulary space of over 20, 000 tags in [55]. Zero-shot video event detection has also attracted large research attention recently. The video event is a higher level semantic entity and is typically composed of multiple concepts/video attributes. For example, a “birthday party” event consists of multiple concepts, e.g., “blowing candle” and “birthday cake”. The semantic correlation of video concepts has also been utilized to help predict the video event of interest, such as weakly supervised concepts [82], pairwise relationships of concepts (Gan et al. [65]) and general video understanding by object and scene semantics attributes [56], [57]. Note, a full survey of recent works on zero-shot video event detection is beyond the scope of this paper. B. Semantic Representations Beyond Attributes Besides the attributes, there are many other types of semantic representations, e.g. semantic word vector and concept ontology. Representations that are directly learned from textual descriptions of categories have also been investigated, such as Wikipedia articles [83], [84], sentence descriptions [85] or knowledge graphs [61], [62]. 1) Concept ontology: Concept ontology is directly used as the semantic representation alternative to attributes. For example, WordNet [86] is one of the most widely studied concept ontologies. It is a large-scale semantic ontology built from a large lexical dataset of English. Nouns, verbs, adjectives and adverbs are grouped into sets of cognitive synonyms (synsets) which indicate distinct concepts. The idea of semantic distance, defined by the WordNet ontology, is also used by Rohrbach et al. [61], [62] for transferring semantic information in zero-shot learning problems. They thoroughly evaluated many alternatives of semantic links between auxiliary and target classes by exploring linguistic bases such as WordNet, Wikipedia, Yahoo Web, Yahoo Image, and Flickr Image. Additionally, WordNet has been used for many vision problems. Fergus et al. [60] leveraged the WordNet ontology hierarchy to define semantic distance between any two categories for sharing labels in classification. The COSTA [63] model exploits the co-occurrences of visual concepts in images for knowledge transfer in zero-shot recognition. 2) Semantic word vectors: Recently, word vector approaches, based on distributed language representations, have gained popularity in zero-shot recognition [66], [67], [68], [69], [70], [15]. A user-defined semantic attribute space is pre-defined and each dimension of the space has a specific semantic meaning according to either human experts or concept ontology (e.g., one dimension could correspond to ‘has fur’, and another ‘has four legs’)(Sec. III-A1). In contrast, the semantic word vector space is trained from linguistic knowledge bases such as Wikipedia and UMBCWebBase using natural language processing models [71], [87]. As a result, although 5 the relative positions of different visual concepts will have semantic meaning, e.g., a cat would be closer to a dog than a sofa, each dimension of the space does not have a specific semantic meaning. The language model is used to project each class’ textual name into this space. These projections can be used as prototypes for zero-shot learning. Socher et al. [15] learned a neural network model to embed each image into a 50-dimensional word vector semantic space, which was obtained using an unsupervised linguistic model [71] trained on Wikipedia text. The images from either known or unknown classes could be mapped into such word vectors and classified by finding the closest prototypical linguistic word in the semantic space. Distributed semantic word vectors have been widely used for zero-shot recognition. Skip-gram model and CBOW model [87], [88] were trained from a large scale of text corpora to construct semantic word space. Different from the unsupervised linguistic model [71], distributed word vector representations facilitate modeling of syntactic and semantic regularities in language and enable vector-oriented reasoning and vector arithmetics. For example, V ec(“Moscow”) should be much closer to V ec(“Russia”)+V ec(“capital”) than V ec(“Russia”) or V ec(“capital”) in the semantic space. One possible explanation and intuition underlying these syntactic and semantic regularities is the distributional hypothesis [89], which states that a word’s meaning is captured by other words that cooccur with it. Frome et al. [70] further scaled such ideas to recognize large-scale datasets. They proposed a deep visualsemantic embedding model to map images into a rich semantic embedding space for large-scale zero-shot recognition. Fu et al. [69] showed that such a reasoning could be used to synthesize all different label combination prototypes in the semantic space and thus is crucial for multi-label zero-shot learning. More recent work of using semantic word embedding includes [66], [67], [68]. More interestingly, the vector arithmetics of semantic emotion word vectors is matching the psychological theories of Emotion, such as Ekman’s six pan-cultural basic emotions or Plutchik’s emotion. For example, V ec(“Sur prise”) + V ec(“Sadness”) is very close to V ec(“Disappointment”); and V ec(“Joy”) + V ec(“Trust”) is very close to V ec(“Love”). Since there are usually thousands of words that can describe emotions, zero-shot emotion recognition has been also investigated in [72] and [10]. IV. M ODELS FOR Z ERO - SHOT R ECOGNITION With the help of semantic representations, zero-shot recognition can usually be solved by first learning an embedding model (Sec. IV-A) and then doing recognition (Sec. IV-B). To the best of our knowledge, a general ‘embedding’ formulation of zero-shot recognition was first introduced by Larochelle et al. [90]. They embedded handwritten character with a typed representation which further helped to recognize unseen classes. The embedding models aim to establish connections between seen classes and unseen classes by projecting the lowlevel features of images/videos close to their corresponding semantic vectors (prototypes). Once the embedding is learned, from known classes, novel classes can be recognized based on the similarity of their prototype representations and predicted representations of the instances in the embedding space. The recognition model matches the projection of the image features against the unseen class prototypes (in the embedding space). In addition to discussing these models and recognition methods in Sec. IV-A and Sec. IV-B, respectively, we will also discuss the potential problems encountered in zero-shot recognition models in Sec. IV-C. A. Embedding Models 1) Bayesian Models: The embedding models can be learned using a Bayesian formulation, which enables easy integration of prior knowledge of each type of attribute to compensate for limited supervision of novel classes in image and video understanding. A generative model is first proposed in Ferrari and Zisserman in [44] for learning simple color and texture attributes. Lampert et al. [32], [9] is the first to study the problem of object recognition of categories for which no training examples are available. Direct Attribute Prediction (DAP) and Indirect Attribute Prediction (IAP) are the first two models for zeroshot recognition [32], [9]. DAP and IAP algorithms use a single model that first learns embedding using Support Vector Machine (SVM) and then does recognition using Bayesian formulation. The DAP and IAP further inspired later works that employ generative models to learn the embedding, including with topic models [13], [11], [91] and random forests [92]. We briefly describe the DAP and IAP models as follows, • DAP Model. Assume the relation between known classes, yi, ..., yk , unseen classes, z1, ..., z L , and descriptive attributes a1, ..., a M is given by the matrix of binary y z . Such a matrix encodes the associations values am and am presence/absence of each attribute in a given class. Extra knowledge is applied to define such an association matrix, for instance, by leveraging human experts (Lampert et al. [32], [9]), by consulting a concept ontology (Fu et al. [13]), or by semantic relatedness measured between class and attribute concepts (Rohrbach et al. [61]). In the training stage, the attribute classifiers are trained from the attribute annotations of known classes yi, ..., yk . At the test stage, the posterior probability p(am |x) can be inferred for an individual attribute am in an image x. To predict the class label of object class z, p(z|x) = Σa ∈ {0,1} M p(z|a)p(a|x) = • p(z) p(az ) M Ö z p(am |x)am (1) (2) m=1 IAP Model. The DAP model directly learns attribute classifiers from the known classes, while the IAP model builds attribute classifiers by combining the probabilities of all associated known classes. It is also introduced as direct similarity-based model in Rohrbach et al. [61]. In the training step, we can learn the probabilistic multiclass classifier to estimate p(yk |x) for all training classes 6 yi, ..., yk . Once p(a|x) is estimated, we use it in the same way as in for DAP in zero-shot learning classification problems. In the testing step, we predict, K p(am |x) = Σk=1 p(am |yk )p(yk |x) (3) 2) Semantic Embedding: Semantic embedding learns the mapping from visual feature space to the semantic space which has various semantic representations. As discussed in Sec. III-A, the attributes are introduced to describe objects; and the learned attributes may not be optimal for recognition tasks. To this end, Akata et al. [93] proposed the idea of label embedding that takes attribute-based image classification as a label-embedding problem by minimising the compatibility function between an image and a label embedding. In their work, a modified ranking objective function was derived from the WSABIE model [94]. As object-level attributes may suffer from the problems of the partial occlusions, scale changes of images, Li et al. [95] proposed learning and extracting attributes on segments containing the entire object; and then joint learning for simultaneous object classification and segment proposal ranking by attributes. They thus learned the embedding by the max-margin empirical risk over both the class label as well as the segmentation quality. Other semantic embedding algorithms have also been investigated such as semi-supervised max-margin learning framework [96], [97], latent SVM [67] or multi-task learning [20], [98], [99]. 3) Embedding into Common Spaces: Besides the semantic embedding, the relationship of visual and semantic space can be learned by jointly exploring and exploiting a common intermediate space. Extensive efforts [84], [99], [100], [101], [102], [103], [104] had been made towards this direction. Akata et al. [100] learned a joint embedding semantic space between attributes, text and hierarchical relationships. Ba et al. [84] employed text features to predict the output weights of both the convolutional and the fully connected layers in a deep convolutional neural network (CNN). On one dataset, there may exist many different types of semantic representations. Each type of representation may contain complementary information. Fusing them can potentially improve the recognition performance. Thus several recent works studied different methods of multi-view embedding. Fu et al. [105] employed the semantic class label graph to fuse the scores of different semantic representations. Similarly label relation graphs have also been studied in [106] and significantly improved large-scale object classification in supervised and zero-shot recognition scenarios. A number of successful approaches to learning a semantic embedding space reply on Canonical Component Analysis (CCA). Hardoon et al. [107] proposed a general, kernel CCA method, for learning semantic embedding of web images and their associated text. Such embedding enables a direct comparison between text and images. Many more works [108], [109], [110], [111] focused on modeling the images/videos and associated text (e.g., tags on Flickr/YouTube). Multi-view CCA is often exploited to provide unsupervised fusion of different modalities. Gong et al. [109] also investigated the problem of modeling Internet images and associated text or tags and proposed a three-view CCA embedding framework for retrieval tasks. Additional view allows their framework to outperform a number of two-view baselines on retrieval tasks. Qi et al. [112] proposed an embedding model for jointly exploring the functional relationships between text and image features for transferring inter-model and intra-model labels to help annotate the images. The inter-modal label transfer can be generalized to zero-shot recognition. 4) Deep Embedding: Most of recent zero-shot recognition models have to rely the state-of-the-art deep convolutional models to extract the image features. As one of the first works, DeViSE [70] extended the deep architecture to learn the visual and semantic embedding; and it can identify visual objects using both labeled image data as well as semantic information gleaned from unannotated text. ConSE [66] constructed the image embedding approach by mapping images into the semantic embedding space via convex combination of the class label embedding vectors. Both DeViSE and ConSE are evaluated on large-scale datasets, – ImageNet (ILSVRC) 2012 1K and ImageNet 2011 21K dataset. To combine the visual and textual branches in the deep embedding, different loss functions can be considered, including margin-based losses [70], [103], or Euclidean distance loss [113], or least square loss [84]. Zhang et al. [114] employed the visual space as the embedding space and proposed an endto-end deep learning architecture for zero-shot recognition. Their networks have two branches: visual encoding branch which uses convolutional neural network to encode the input image as a feature vector, and the semantic embedding branch which encodes the input semantic representation vector of each class which the corresponding image belonging to. B. Recognition Models in the Embedding Space Once the embedding model is learned, the testing instances can be projected into this embedding space. The recognition can be carried out by using different recognition models. The most common used one is nearest neighbour classifier which classify the testing instances by assigning the class label in term of the nearest distances of the class prototypes against the projections of testing instances in the embedding space. Fu et al. [13] proposed semi-latent zero-shot learning algorithm to update the class prototypes by one step self-training. Manifold information can be used in the recognition models in the embedding space. Fu et al. [115] proposed a hypergraph structure in their multi-view embedding space; and zero-shot recognition can be addressed by label propagation from unseen prototype instances to unseen testing instances. Changpinyo et al. [116] synthesized classifiers in the embedding space for zero-shot recognition. For multi-label zeroshot learning, the recognition models have to consider the cooccurrence/correlations of different semantic labels [63], [69], [117]. Latent SVM structure has also been used as the recognition models [118], [20]. Wang et al. [118] treated the object attributes as latent variables and learnt the correlations of attributes through an undirected graphical model. Hwang et al. [20] utilized a kernelized multi-task feature learning framework to learn the sharing features between objects and 7 Zebra Prototype The same ‘hasTail’ attribute different visual appearance Pig Prototype Pig Prototype (a) visual space (b) attribute space (c) multi-view embedding space Fig. 1. Illustrating projection domain shift problem. Zero-shot prototypes are annotated as red stars and predicted semantic attribute projections shown in blue. Both Pig and Zebra share the same ‘hasTail’ attribute yet with very different visual appearance of ‘Tail’. The figure comes from [115]. their attributes. Additionally, Long et al. [119] employed the attributes to synthesize unseen visual features at training stage; and thus zero-shot recognition can be solved by the conventional supervised classification models. the presence of ‘universal’ neighbors, or hubs, in the space. Radovanovic et al. [124] was the first to study the hubness problem; in [124] a hypothesis is made that hubness is an inherent property of data distributions in the high dimensional vector space. Nevertheless, Low et al. [125] challenged this hypothesis and showed the evidence that hubness is rather a boundary effect or, more generally, an effect of a density gradient in the process of data generation. Interestingly, their experiments showed that the hubness phenomenon can also occur in low-dimensional data. While causes for hubness are still under investigation, recent works [126], [127] noticed that the regression based zero-shot learning methods do suffer from this problem. To alleviate this problem, Dinu et al. [126] utilized the global distribution of feature instances of unseen data, i.e., in a transductive manner. In contrast, Yutaro et al. [127] addressed this problem in an inductive way by embedding the class prototypes into a visual feature space. V. B EYOND Z ERO - SHOT R ECOGNITION C. Problems in Zero-shot Recognition A. Generalized Zero-shot Recognition and Open-set Recognition There are two intrinsic problems in zero-shot recognition, namely projection domain shift problem (Sec. IV-C1) and hubness problem (Sec. IV-C2). 1) Projection Domain Shift Problems: Projection domain shift problem in zero-shot recognition was first identified by Fu et al. [115]. This problem can be explained as follows: since the source and target datasets have different classes, the underlying data distribution of these classes may also differ. The projection functions learned on the source dataset, from visual space to the embedding space, without any adaptation to the target dataset, will cause an unknown shift/bias. Figure 1 from [115] gives a more intuitive illustration of this problem. It plots the 85D attribute space representation spanned by feature projections which is learned from source data, and class prototypes which are 85D binary attribute vectors. Zebra and Pig are one of auxiliary and target classes respectively; and the same ’hasTail’ semantic attribute means very different visual appearance for Pig and Zebra. In the attribute space, directly using the projection functions learned from source datasets (e.g., Zebra) on the target datasets (e.g., Pig) will lead to a large discrepancy between the class prototype of the target class and the predicted semantic attribute projections. To alleviate this problem, the transductive learning based approaches were proposed, to utilize the manifold information of the instances from unseen classes [115], [120], [121], [122], [123], [102]. Nevertheless, the transductive setting assumes that all the testing data can be accessed at once, which obviously is invalid if the new unseen classes appear dynamically and unavailable before learning models. Thus inductive learning base approaches [120], [116], [92], [105], [122] have also been studied and these methods usually enforce other additional constraints or information from the training data. 2) Hubness problem: The hubness problem is another interesting phenomenon that may be observed in zero-shot recognition. Essentially, hubness problem can be described as In conventional supervised learning tasks, it is taken for granted that the algorithms should take the form of “closed set” where all testing classes should are known at training time. The zero-shot recognition, in contrast, assumes that the source and target classes cannot be mixed; and that the testing data only coming from the unseen classes. This assumption, of course, greatly and unrealistically simplifies the recognition tasks. To relax the settings of zero-shot recognition and investigate recognition tasks in a more generic setting, there are several tasks advocated beyond the conventional zero-shot recognition. In particular, generalized zero-shot recognition [128] and open set recognition tasks have been discussed recently [129], [130], [131], [132]. The generalized zero-shot recognition proposed in [128] broke the restricted nature of conventional zero-shot recognition and also included the training classes among the testing data. Chao et al. [128] showed that it is nontrivial and ineffective to directly extend the current zero-shot learning approaches to solve the generalized zero-shot recognition. Such a generalized setting, due to the more practical nature, is recommended as the evaluation settings for zero-shot recognition tasks [133]. Open-set recognition, in contrast, has been developed independently of zero-shot recognition. Initially, open set recognition aimed at breaking the limitation of “closed set” recognition setup. Specifically, the task of open set recognition tries to identify the class name of an image from a very large set of classes, which includes but is not limited to training classes. The open set recognition can be roughly divided into two subgroups. 1) Conventional open set recognition: First formulated in [134], [135], [130], [129], the conventional open set recognition only identifies whether the testing images come from the training classes or some unseen classes. This category of methods do not explicitly predict from which out of unseen 8 classes the testing instance, from the unseen classes, belongs to. In such a setting, the conventional open set recognition is also known as incremental learning [136], [137], [138]. 2) Generalized open set recognition: The key difference from the conventional open set recognition is that the generalized open set recognition also needs to explicitly predict the semantic meaning (class) of testing instances even from the unseen novel classes. This task was first defined and evaluated in [131], [132] on the tasks of object categorization. The generalized open set recognition can be taken as a most general version of zero-shot recognition, where the classifiers are trained from training instances of limited training classes, whilst the learned classifiers are required to classify the testing instances from a very large set of open vocabulary, say, 310 K class vocabulary in [131], [132]. Conceptually similar, there are vast variants of generalized open-set recognition tasks which have been studied in other research community such as, open-vocabulary object retrieval [139], [140], open-world person re-identification [141] or searching targets [135], open vocabulary scene parsing [142]. B. One-shot recognition A closely-related problem to zero-shot learning is one-shot or few-shot learning problem – instead of/apart from having only textual description of the new classes, one-shot learning assumes that there are one or few training samples for each class. Similar to zero-shot recognition, one-shot recognition is inspired by fact that humans are able to learn new object categories from one or very few examples [143], [144]. Existing one-shot learning approaches can be divided into two groups: the direct supervised learning based approaches and the transfer learning based approaches. 1) Direct Supervised Learning-based Approaches: Early approaches do not assume that there exist a set of auxiliary classes which are related and/or have ample training samples whereby transferable knowledge can be extracted to compensate for the lack of training samples. Instead, the target classes are used to trained a standard classifier using supervised learning. The simplest method is to employ nonparametric models such as kNN which are not restricted by the number of training samples. However, without any learning, the distance metric used for kNN is often inaccurate. To overcome this problem, metric embedding can be learned and then used for kNN classification [145]. Other approaches attempt to synthesize more training samples to augment the small training dataset [146], [147], [148], [144]. However, without knowledge transfer from other classes, the performance of direct supervised learning based approaches is typically weak. Importantly, these models cannot meet the requirement of lifelong learning, that is, when new unseen classes are added, the learned classifier should still be able to recognize the seen existing classes. 2) Transfer Learning-based One-shot Recognition: This category of approaches follow a similar setting to zero-shot learning, that is, they assume that an auxiliary set of training data from different classes exist. They explore the paradigm of learning to learn [16] or meta-learning [149] and aim to transfer knowledge from the auxiliary dataset to the target dataset with one or few examples per class. These approaches differ in (i) what knowledge is transferred and (ii) how the knowledge is represented. Specifically, the knowledge can be extracted and shared in the form of model prior in a generative model [150], [151], [152], features [153], [154], [155], [156], [157], [158], semantic attributes [13], [9], [121], [62], or contextual information [159]. Many of these approaches take a similar strategy as the existing zero-shot learning approaches and transfer knowledge via a shared embedding space. Embedding space can typically be formulated using neural networks (e.g., siamese network [160], [161]), discriminative (e.g., Support Vector Regressors (SVR) [17], [9], [162]), metric learning [163], [164], or kernel embedding [165], [154] methods. Particularly, one of most common embedding ways is semantic embedding which is normally explored by projecting the visual features and semantic entities into a common new space. Such projections can take various forms with corresponding loss functions, such as SJE [100], WSABIE [166], ALE [93], DeViSE [70], and CCA [102]. More recently deep meta-learning has received increasing attention for few-shot learning [167], [168], [161], [169], [52], [141], [170], [171], [144]. Wang et al. [172], [173] proposed the idea of one-shot adaptation by automatically learning a generic, category agnostic transformation from models learned from few samples to models learned from large enough sample sets. A model-agnostic meta-learning framework is proposed by Finn et al. [174] which trains a deep model from the auxiliary dataset with the objective that the learned model can be effectively updated/fine-tuned on the new classes with one or few gradient steps. Note that similar to the generalised zero-shot learning setting, recently the problem of adding new classes to a deep neural network whilst keeping the ability to recognise the old classes have been attempted [175]. However, the problem of lifelong learning and progressively adding new classes with few-shot remains an unsolved problem. VI. DATASETS IN Z ERO - SHOT R ECOGNITION This section summarizes the datasets used for zero-shot recognition. Recently with the increasing number of proposed zero-shot recognition algorithms, Xian et al. [133] compared and analyzed a significant number of the state-of-the-art methods in depth and they defined a new benchmark by unifying both the evaluation protocols and data splits. The details of these datasets are listed in Tab. II. A. Standard Datasets 1) Animal with Attribute (AwA) dataset [32]: AwA consists of the 50 Osher-son/Kemp animal category images collected online. There are 30, 475 images with at least 92 examples of each class. Seven different feature types are provided: RGB color histograms, SIFT [176], rgSIFT [177], PHOG [178], SURF [179], local self-similarity histograms [180] and DeCaf [181]. The AwA dataset defines 50 classes of animals, and 85 associated attributes (such as furry, and has claws). For the consistent evaluation of attribute-based object classification methods, the AwA dataset defined 10 test classes: chimpanzee, giant panda, hippopotamus, humpback whale, leopard, pig, 9 raccoon, rat, seal. The 6, 180 images of those classes are taken as the test data, whereas the 24, 295 images of the remaining 40 classes can be used for training. Since the images in AwA are not available under a public license, Xian et al. [133] introduced another new zero-shot learning dataset – Animals with Attributes 2 (AWA2) dataset with 37,322 publicly licensed and released images from the same 50 classes and 85 attributes as AwA. 2) aPascal-aYahoo dataset [17]: aPascal-aYahoo has a 12,695-image subset of the PASCAL VOC 2008 data set with 20 object classes (aPascal); and 2,644 images that were collected using the Yahoo image search engine (aYahoo) of 12 object classes. Each image in this data set has been annotated with 64 binary attributes that characterize the visible objects. 3) CUB-200-2011 dataset [182]: CUB-200-2011 contains 11, 788 images of 200 bird classes. This is a more challenging dataset than AwA – it is designed for fine-grained recognition and has more classes but fewer images. All images are annotated with bounding boxes, part locations, and attribute labels. Images and annotations were filtered by multiple users of Amazon Mechanical Turk. CUB-200-2011 is used as the benchmarks dataset for multi-class categorization and part localization. Each class is annotated with 312 binary attributes derived from the bird species ontology. A typical setting is to use 150 classes as auxiliary data, holding out 50 as target data, which is the setting adopted in Akata et al. [93]. 4) Outdoor Scene Recognition (OSR) Dataset [183]: OSR consists of 2, 688 images from 8 categories and 6 attributes (‘openness’, ‘natrual’, etc.) and an average 426 labelled pairs for each attribute from 240 training images. Graphs constructed are thus extremely sparse. Pairwise attribute annotation was collected by AMT (Kovashka et al. [22]). Each pair was labelled by 5 workers to average the comparisons by majority voting. Each image also belongs to a scene type. 5) Public Figure Face Database (PubFig) [8]: PubFig is a large face dataset of 58,797 images of 200 people collected from the internet. Parikh et al. [21] selected a subset of PubFig consisting of 772 images from 8 people and 11 attributes (‘smiling’, ‘round face’, etc.). We annotate this subset as PubFig-sub. The pairwise attribute annotation was collected by Amazon Mechanical Turk [22]. Each pair was labelled by 5 workers. A total of 241 training images for PubFig-sub respectively were labelled. The average number of compared pairs per attribute were 418. 6) SUN attribute dataset [184]: This is a subset of the SUN Database [185] for fine-grained scene categorization and it has 14, 340 images from 717 classes (20 images per class). Each image is annotated with 102 binary attributes that describe the scenes’ material and surface properties as well as lighting conditions, functions, affordances, and general image layout. 7) Unstructured Social Activity Attribute (USAA) dataset [11]: USAA is the first benchmark video attribute dataset for social activity video classification and annotation. The groundtruth attributes are annotated for 8 semantic class videos of Columbia Consumer Video (CCV) dataset [186], and select 100 videos per-class for training and testing respectively. These classes were selected as the most complex social group activities. By referring to the existing work on video ontology [187], [186], the 69 attributes can be divided into five broad classes: actions, objects, scenes, sounds, and camera movement. Directly using the ground-truth attributes as input to a SVM, the videos can come with 86.9% classification accuracy. This illustrates the challenge of USAA dataset: while the attributes are informative, there is sufficient intra-class variability in the attribute-space, and even perfect knowledge of the instance-level attributes is also insufficient for perfect classification. 8) ImageNet datasets [62], [61], [131], [116]: ImageNet has been used in several different papers with relatively different settings. The original ImageNet dataset has been proposed in [188]. The full set of ImageNet contains over 15 million labeled high-resolution images belonging to roughly 22,000 categories and labelled by human annotators using Amazon’s Mechanical Turk (AMT) crowd-sourcing tool. Starting in 2010, as part of the Pascal Visual Object Challenge, an annual competition called the ImageNet Large-Scale Visual Recognition Challenge (ILSVRC) has been held. ILSVRC uses a subset of ImageNet with roughly 1,000 images in each of 1,000 categories. In [121], [61], Robhrbach et al. split the ILSVRC 2010 data into 800/200 classes for source/target data. In [131], Fu et al. employed the training data of ILSVRC 2012 as the source data; and the testing part of ILSVRC 2012 as well as the data of ILSVRC 2010 as the target data. The full sized ImageNet data has been used in [116], [70], [66]. 9) Oxford 102 Flower dataset [189]: Oxford 102 is a collection of 102 groups of flowers each with 40 to 256 flower images, and total 8,189 images in total. The flowers were chosen from the common flower species in the United Kingdom. Elhoseiny et al. [83] generated textual descriptions for each class of this dataset. 10) UCF101 dataset [190]: UCF101 is another popular benchmark for human action recognition in videos, which consists of 13, 320 video clips (27 hours in total) with 101 annotated classes. More recently, the THUMOS-2014 Action Recognition Challenge [191] created a benchmark by extending upon the UCF-101 dataset (used as the training set). Additional videos were collected from the Internet, including 2, 500 background videos, 1, 000 validation and 1, 574 test videos. 11) Fudan-Columbia Video Dataset (FCVID) [192]: FCVID contains 91, 223 web videos annotated manually into 239 categories. Categories cover a wide range of topics (not only activities), such as social events (e.g., tailgate party), procedural events (e.g., making cake), object appearances (e.g., panda) and scenic videos (e.g., beach). Standard split consists of 45, 611 videos for training and 45, 612 videos for testing. 12) ActivityNet dataset [193]: ActivityNet is another largescale video dataset for human activity recognition and understanding and released in 2015. It consisted of 27,801 video clips annotated into 203 activity classes, totaling 849 hours of video. Comparing with existing dataset, ActivityNet has more fine-grained action categories (e.g., “drinking beer” and “drinking coffee”). ActivityNet had the settings of both trimmed and untrimmed videos of its classes. 10 A B C Dataset AwA aPascal-aYahoo PubFig PubFig-sub OSR ImageNet ILSVRC 2010 ILSVRC 2012 Oxford 102 Flower CUB-200-2011 SUN-attribute USAA UCF101 ActivityNet FCVID # instances #classes 30475 50 15339 32 58,797 200 772 8 2688 8 15 million 22000 1.2 million 1000 1.2 million 1000 8189 102 11788 200 14340 717 1600 8 13320 101 27801 203 91223 239 TABLE II #attribute 85 64 – 11 6 – – – – 312 102 69 – – – Annotation Level per class per image per image per image pairs per image pairs per image per image per image – per class per image per video per video per video per video DATASETS IN ZERO - SHOT RECOGNITION . T HE DATASETS ARE DIVIDED INTO THREE GROUPS : GENERAL IMAGE CLASSIFICATION (A), FINE - GRAINED IMAGE CLASSIFICATION (B) AND VIDEO CLASSIFICATION DATASETS (C). B. Discussion of Datasets. In Tab. II, we roughly divide all the datasets into three groups: general image classification, fine-grained image classification and video classification datasets. These datasets have been employed widely as the benchmark datasets in many previous works. However, we believe that when making a comparison with the other existing methods on these datasets, there are several issues that should be discussed. 1) Features: With the renaissance of deep convolutional neural networks, deep features of images/videos have been used for zero-shot recognition. Note that different types of deep features (e.g., Overfeat [194], VGG-19[195], or ResNet [196]) have varying level of semantic abstraction and representation ability; and even the same type of deep features, if fine-tuned on different dataset and with slightly different parameters, will also have different representative ability. Thus it should be obvious, without using the same type of features, it is not possible to conduct a fair comparisons among different methods and draw any meaningful conclusion. Importantly it is possible that the improved performance of one zero shot recognition could be largely attributed to the better deep features used. 2) Auxiliary data: As mentioned, zero-shot recognition can be formulated in a transfer learning setting. The size and quality of auxiliary data can be very important for the overall performance of zero-shot recognition. Note that these auxiliary data do not only include the auxiliary source image/video dataset, but also refer to the data to extract/train the concept ontology, or semantic word vectors. For example, the semantic word vectors trained on large-scale linguistic articles, in general, are better semantically distributed than those trained on small sized linguistic corpus. Similarly, GloVe [197] is reported to be better than the skip-gram and CBOW models [88]. Therefore, to make a fair comparison with existing works, another important factor is to use the same set of auxiliary data. 3) Evaluation: For many datasets, there is no agreed source/target splits for zero-shot evaluation. Xian et al. [133] suggested a new benchmark by unifying both the evaluation protocols and data splits. VII. F UTURE R ESEARCH D IRECTIONS 1) More Generalized and Realistic Setting: From the detailed review of existing zero-shot learning methods, it is clear that overall the existing efforts have been focused on a rather restrictive and impractical setting: classification is required for new object classes only and the new unseen classes, though having no training sample present, are assumed to be known. In reality, one wants to progressively add new classes to the existing classes. Importantly, this needs to be achieved without jeopardizing the ability of the model to recognize existing seen classes. Furthermore, we cannot assume that the new samples will only come from a set of known unseen classes. Rather, they can only be assumed to belong to either existing seen classes, known unseen classes, or unknown unseen classes. We therefore foresee a more generalized setting will be adopted by the future zero-shot learning work. 2) Combining Zero-shot with Few-shot Learning: As mentioned earlier, the problems of zero-shot and few-shot learning are closely related and as a result, many existing methods use the same or similar models. However, it is somewhat surprising to note that no serious efforts have been taken to address these two problems jointly. In particular, zero-shot learning would typically not consider the possibility of having few training samples, while few-shot learning ignores the fact that the textual description/human knowledge about the new class is always there to be exploited. A few existing zeroshot learning methods [131], [13], [198], [85] have included few-shot learning experiments. However, they typically use a naive kNN approach, that is, each class prototype is treated as a training sample and together with the k-shot, this becomes a k+1-shot recognition problem. However, as shown by existing zero-shot learning methods [115], the prototype is worth far more that one training sample; it thus should be treated differently. We thus expect a future direction on extending the existing few-shot learning methods by incorporating the prototype as a ‘super’-shot to improve the model learning. 3) Beyond object categories: So far the current zero-shot learning efforts are limited to recognizing object categories. However, visual concepts can have far complicated relationships than object categories. In particular beyond ob- 11 jects/nouns, attributes/adjectives are important visual concepts. When combined with objects, the same attribute often has different meaning, e.g., the concept of ‘yellow’ in yellow face and a yellow banana clearly differs. Zero-shot learning attributes with associated objects is thus an interesting future research direction. 4) Curriculum learning: In a lifelong learning setting, a model will incrementally learn to recognise new classes whilst keep the capacity for existing classes. A related problem is thus how to select the more suitable new classes to learn given the existing classes. It has been shown that [138], [199], [200] the sequence of adding different classes have a clear impact on the model performance. It is therefore useful to investigate how to incorporate the curriculum learning principles in designing a zero-shot learning strategy. VIII. C ONCLUSION In this paper, we have reviewed the recent advances in zero shot recognition. Firstly different types of semantic representations are examined and compared; the models used in zero shot learning have also been investigated. Next, beyond zero shot recognition, one-shot and open set recognition are identified as two very important related topics and thus reviewed. Finally, the common used datasets in zero-shot recognition have been reviewed with a number of issues in existing evaluations of zero-shot recognition methods discussed. We also point out a number of research direction which we believe will the focus of the future zero-shot recognition studies. Acknowledgments. This work is supported in part by two grants from NSF China (#61702108, #61622204, #61572134), and an European FP7 project (PIRSESGA2013 − 612652). Yanwei Fu is supported by The Program for Professor of Special Appointment (Eastern Scholar) at Shanghai Institutions of Higher Learning. R EFERENCES [1] I. Biederman, “Recognition by components - a theory of human image understanding,” Psychological Review, 1987. I [2] X. Chen, A. Shrivastava, and A. Gupta, “NEIL: Extracting Visual Knowledge from Web Data,” in IEEE International Conference on Computer Vision, 2013. I [3] A. Pentina and C. H. Lampert, “A PAC-bayesian bound for lifelong learning,” in International Conference on Machine Learning, 2014. I [4] S. Thrun and T. M. Mitchell, “Lifelong robot learning,” Robotics and Autonomous Systems, 1995. I [5] S. J. Pan and Q. Yang, “A survey on transfer learning,” IEEE Transactions on Data and Knowledge Engineering, vol. 22, no. 10, pp. 1345– 1359, 2010. I [6] V. Patel, R. Gopalan, R. Li, and R. Chellappa, “Visual domain adaptation: A survey of recent advances,” IEEE Signal Processing Magazine (SPM), 2015. I [7] M. Palatucci, G. Hinton, D. Pomerleau, and T. M. Mitchell, “Zero-shot learning with semantic output codes,” in NIPS, 2009. II, III-A [8] N. Kumar, A. C. Berg, P. N. Belhumeur, and S. K. Nayar, “Attribute and simile classifiers for face verification,” in ICCV, 2009. II, VI-A5 [9] C. H. Lampert, H. Nickisch, and S. Harmeling, “Attribute-based classification for zero-shot visual object categorization,” IEEE TPAMI, 2013. II, III-A, III-A1, III-A2, IV-A1, V-B2 [10] B. Xu, Y. Fu, Y.-G. Jiang, B. Li, and L. Sigal, “Video emotion recognition with transferred deep feature encodings,” in ICMR, 2016. II, III-A2, III-B2 [11] Y. Fu, T. Hospedales, T. Xiang, and S. Gong, “Attribute learning for understanding unstructured social activity,” in ECCV, 2012. II, III-A, III-A1, III-A3, III-A2, IV-A1, VI-A7 [12] J. Liu, B. Kuipers, and S. Savarese, “Recognizing human actions by attributes,” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. II, III-A, III-A3, III-A2 [13] Y. Fu, T. M. Hospedales, T. Xiang, and S. Gong, “Learning multimodal latent attributes,” IEEE TPAMI, 2013. II, III-A2, III-A3, IV-A1, IV-B, V-B2, VII-2 [14] J. Blitzer, D. P. Foster, and S. M. Kakade, “Zero-shot domain adaptation: A multi-view approach,” TTI-TR-2009-1, Tech. Rep., 2009. II [15] R. Socher, M. Ganjoo, H. Sridhar, O. Bastani, C. D. Manning, and A. Y. Ng, “Zero-shot learning through cross-modal transfer,” in NIPS, 2013. II, III-A2, III-B2 [16] S. Thrun, Learning To Learn: Introduction. Kluwer Academic Publishers, 1996. II, V-B2 [17] A. Farhadi, I. Endres, D. Hoiem, and D. Forsyth, “Describing objects by their attributes,” in CVPR, 2009. III-A, III-A3, III-A2, V-B2, VI-A2 [18] X. Wang and T. Zhang, “Clothes search in consumer photos via color matching and attribute learning,” in ACM International Conference on Multimedia, 2011. [Online]. Available: http://doi.acm.org/10.1145/ 2072298.2072013 III-A, III-A1, III-A2 [19] R. Salakhutdinov, A. Torralba, and J. Tenenbaum, “Learning to share visual appearance for multiclass object detection,” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. III-A [20] S. J. Hwang, F. Sha, and K. Grauman, “Sharing features between objects and their attributes,” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. III-A, IV-A2, IV-B [21] D. Parikh and K. Grauman, “Relative attributes,” in ICCV, 2011. III-A, III-A2, VI-A5 [22] A. Kovashka, D. Parikh, and K. Grauman, “WhittleSearch: Image search with relative attribute feedback,” in IEEE Conference on Computer Vision and Pattern Recognition, 2012. III-A, III-A1, III-A2, VI-A4, VI-A5 [23] T. L. Berg, A. C. Berg, and J. Shih, “Automatic attribute discovery and characterization from noisy web data,” in European Conference on Computer Vision, 2010. III-A [24] Y. Fu, T. M. Hospedales, J. Xiong, T. Xiang, S. Gong, Y. Yao, and Y. Wang, “Robust estimation of subjective visual properties from crowdsourced pairwise labels,” IEEE TPAMI, 2016. III-A, III-A2 [25] M. Gygli, H. Grabner, H. Riemenschneider, F. Nater, and L. V. Gool, “The interestingness of images,” in IEEE International Conference on Computer Vision, 2013. III-A [26] Y.-G. Jiang, YanranWang, R. Feng, X. Xue, Y. Zheng, and H. Yang, “Understanding and predicting interestingness of videos,” in AAAI Conference on Artificial Intelligence, 2013. III-A [27] P. Isola, D. Parikh, A. Torralba, and A. Oliva, “Understanding the intrinsic memorability of images,” in Neural Information Processing Systems, 2011. III-A [28] P. Isola, J. Xiao, A. Torralba, and A. Oliva, “What makes an image memorable?” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. III-A [29] S. Dhar, V. Ordonez, and T. L. Berg, “High level describable attributes for predicting aesthetics and interestingness,” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. III-A [30] Y. Fu, G. Guo, and T. Huang, “Age synthesis and estimation via faces: A survey,” IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010. III-A [31] K. Chen, S. Gong, T. Xiang, and C. C. Loy, “Cumulative attribute space for age and crowd density estimation,” in IEEE Conference on Computer Vision and Pattern Recognition, 2013. III-A [32] C. H. Lampert, H. Nickisch, and S. Harmeling, “Learning to detect unseen object classes by between-class attribute transfer,” in CVPR, 2009. III-A1, III-A2, IV-A1, VI-A1 [33] E. M. Rudd, M. Gunther, and T. E. Boult, “Moon:a mixed objective optimization network for the recognition of facial attributes,” in ECCV, 2016. III-A1, III-A2 [34] E. Rudd, M. Günther, and T. Boult, “Moon: A mixed objective optimization network for the recognition of facial attributes,” arXiv preprint arXiv:1603.07027, 2016. III-A1, III-A2 [35] J. Wang, Y. Cheng, and R. S. Feris, “Walk and learn: Facial attribute representation learning from egocentric video and contextual data,” in CVPR, 2016. III-A1, III-A2 [36] A. Datta, R. Feris, and D. Vaquero, “Hierarchical ranking of facial attributes,” in IEEE International Conference on Automatic Face & Gesture Recognition, 2011. III-A1, III-A2 12 [37] M. Ehrlich, T. J. Shields, T. Almaev, and M. R. Amer, “Facial attributes classification using multi-task representation learning,” in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2016, pp. 47–55. III-A1, III-A2 [38] R. Jafri and H. R. Arabnia, “A survey of face recognition techniques,” in Journal of Information Processing Systems, 2009. III-A1, III-A2 [39] Z. Wang, K. He, Y. Fu, R. Feng, Y.-G. Jiang, and X. Xue, “Multitask deep neural network for joint face recognition and facial attribute prediction,” in ACM ICMR, 2017. III-A1, III-A2 [40] A. Argyriou, T. Evgeniou, and M. Pontil, “Convex multi-task feature learning,” in ACM ICMR, 2007. III-A1, III-A2 [41] D. F. Fouhey, A. Gupta, and A. Zisserman, “Understanding higherorder shape via 3d shape attributes,” in IEEE TPAMI, 2017. III-A1 [42] D. Vaquero, R. Feris, D. Tran, L. Brown, A. Hampapur, and M. Turk, “Attribute-based people search in surveillance environments,” in IEEE Workshop on Applications of Computer Vision (WACV), dec. 2009, pp. 1 –8. III-A1, III-A2 [43] G. Wang and D. Forsyth, “Joint learning of visual attributes, object classes and visual saliency,” in IEEE International Conference on Computer Vision, 2009, pp. 537–544. III-A1, III-A2 [44] V. Ferrari and A. Zisserman, “Learning visual attributes,” in Neural Information Processing Systems, Dec. 2007. III-A1, III-A2, IV-A1 [45] A. Shrivastava, S. Singh, and A. Gupta, “Constrained semi-supervised learning via attributes and comparative attributes,” in European Conference on Computer Vision, 2012. III-A2 [46] A. Biswas and D. Parikh, “Simultaneous active learning of classifiers and attributes via relative feedback,” in IEEE Conference on Computer Vision and Pattern Recognition, 2013. III-A2 [47] A. Parkash and D. Parikh, “Attributes for classifier feedback,” in European Conference on Computer Vision, 2012. III-A2 [48] K. K. Singh and Y. J. Lee, “End-to-end localization and ranking for relative attributes,” in ECCV, 2016. III-A2 [49] M. Jaderberg, K. Simonyan, A. Zisserman et al., “Spatial transformer networks,” in Advances in Neural Information Processing Systems, 2015, pp. 2017–2025. III-A2 [50] D. Parikh and K. Grauman, “Interactively building a discriminative vocabulary of nameable attributes,” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. III-A3, III-A2 [51] J. Tang, S. Yan, R. Hong, G.-J. Qi, and T.-S. Chua, “Inferring semantic concepts from community-contributed images and noisy tags,” in ACM International Conference on Multimedia, 2009. [Online]. Available: http://doi.acm.org/10.1145/1631272.1631305 III-A3, III-A2 [52] A. Habibian, T. Mensink, and C. Snoek, “Videostory: A new multimedia embedding for few-example recognition and translation of events,” in ACM MM, 2014. III-A2, III-A3, V-B2 [53] A. Hauptmann, R. Yan, W.-H. Lin, M. Christel, and H. Wactlar, “Can high-level concepts fill the semantic gap in video retrieval? a case study with broadcast news,” IEEE Transactions on Multimedia, vol. 9, no. 5, pp. 958 –966, aug. 2007. III-A2, III-A4 [54] C. G. M. Snoek, B. Huurnink, L. Hollink, M. de Rijke, G. Schreiber, and M. Worring, “Adding semantics to detectors for video retrieval,” IEEE Transactions on Multimedia, vol. 9, pp. 975–986, 2007. III-A2, III-A4 [55] G. Toderici, H. Aradhye, M. Pasca, L. Sbaiz, and J. Yagnik, “Finding meaning on youtube: Tag recommendation and category discovery,” in IEEE Conference on Computer Vision and Pattern Recognition, 2010, pp. 3447–3454. III-A2, III-A4 [56] Z. Wu, Y. Fu, Y.-G. Jiang, and L. Sigal, “Harnessing object and scene semantics for large-scale video understanding,” in CVPR, 2016. III-A2, III-A4 [57] M. Jain, J. C. van Gemert, T. Mensink, and C. G. M. Snoek, “Objects2action: Classifying and localizing actions without any video example,” in ICCV, 2015. III-A2, III-A4 [58] J. Tang, X.-S. Hua, M. Wang, Z. Gu, G.-J. Qi, and X. Wu, “Correlative linear neighborhood propagation for video annotation,” IEEE Transactions on Systems, Man, and Cybernetics, Part B, vol. 39, no. 2, pp. 409–416, 2009. III-A2, III-A4 [59] G.-J. Qi, X.-S. Hua, Y. Rui, J. Tang, T. Mei, and H.-J. Zhang, “Correlative multi-label video annotation,” in ACM International Conference on Multimedia, 2007. [Online]. Available: http://doi.acm. org/10.1145/1291233.1291245 III-A2 [60] R. Fergus, H. Bernal, Y. Weiss, and A. Torralba, “Semantic label sharing for learning with many categories,” in European Conference on Computer Vision, 2010. III-A2, III-B1 [61] M. Rohrbach, M. Stark, and B. Schiele, “Evaluating knowledge transfer and zero-shot learning in a large-scale setting,” in CVPR, 2012. III-A2, III-B, III-B1, IV-A1, IV-A1, VI-A8 [62] M. Rohrbach, M. Stark, G. Szarvas, I. Gurevych, and B. Schiele, “What helps where – and why? semantic relatedness for knowledge transfer,” in CVPR, 2010. III-A2, III-B, III-B1, V-B2, VI-A8 [63] T. Mensink, E. Gavves, and C. G. Snoek, “Costa: Co-occurrence statistics for zero-shot classification,” in IEEE Conference on Computer Vision and Pattern Recognition, 2014. III-A2, III-B1, IV-B [64] C. Gan, Y. Yang, L. Zhu, and Y. Zhuang, “Recognizing an action using its name: A knowledge-based approach,” IJCV, 2016. III-A2, III-A4 [65] C. Gan, M. Lin, Y. Yang, G. de Melo, and A. G. Hauptmann, “Concepts not alone: Exploring pairwise relationships for zero-shot video activity recognition,” in AAAI, 2016. III-A2, III-A4 [66] M. Norouzi, T. Mikolov, S. Bengio, Y. Singer, J. Shlens, A. Frome, G. S. Corrado, and J. Dean, “Zero-shot learning by convex combination of semantic embeddings,” ICLR, 2014. III-A2, III-B2, IV-A4, VI-A8 [67] Z. Zhang and V. Saligrama, “Zero-shot learning via joint latent similarity embedding,” in CVPR, 2016. III-A2, III-B2, IV-A2 [68] ——, “Zero-shot recognition via structured prediction,” in ECCV, 2016. III-A2, III-B2 [69] Y. Fu, Y. Yang, T. Hospedales, T. Xiang, and S. Gong, “Transductive multi-label zero-shot learning,” in British Machine Vision Conference, 2014. III-A2, III-B2, IV-B [70] A. Frome, G. S. Corrado, J. Shlens, S. Bengio, J. Dean, M. Ranzato, and T. Mikolov, “DeViSE: A deep visual-semantic embedding model,” in NIPS, 2013. III-A2, III-B2, IV-A4, V-B2, VI-A8 [71] E. H. Huang, R. Socher, C. D. Manning, and A. Y. Ng, “Improving word representations via global context and multiple word prototypes,” in Association for Computational Linguistics 2012 Conference, 2012. III-A2, III-B2 [72] B. Xu, Y. Fu, Y.-G. Jiang, B. Li, and L. Sigal, “Heterogeneous knowledge transfer in video emotion recognition, attribution and summarization,” IEEE TAC, 2016. III-A2, III-B2 [73] A. Sorokin and D. Forsyth, “Utility data annotation with amazon mechanical turk,” in IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2008. III-A3 [74] J. Qin, Y. Wang, L. Liu, J. Chen, and L. Shao, “Beyond semantic attributes: Discrete latent attributes learning for zero-shot recognition,” IEEE Signal Processing Letters, vol. 23, no. 11, pp. 1667–1671, 2016. III-A3 [75] X. Chang, Y. Yang, G. Long, C. Zhang, and A. Hauptmann, “Dynamic concept composition for zero-example event detection,” in AAAI, 2016. III-A4 [76] X. Chang, Y. Yang, A. Hauptmann, E. P. Xing, and Y. Yu, “Semantic concept discovery for large-scale zero-shot event detection,” in IJCAI, 2015. III-A4 [77] J. Qin, L. Liu, L. Shao, F. Shen, B. Ni, J. Chen, , and YunhongWang, “Zero-shot action recognition with error-correcting output codes,” in CVPR, 2017. III-A4 [78] K. Yang, X.-S. Hua, M. Wang, and H.-J. Zhang, “Tag tagging: Towards more descriptive keywords of image content,” IEEE Transactions on Multimedia, vol. 13, pp. 662 –673, 2011. III-A4 [79] T. Hospedales, S. Gong, and T. Xiang, “Learning tags from unsegmented videos of multiple human actions,” in International Conference on Data Mining, 2011. III-A4 [80] H. Aradhye, G. Toderici, and J. Yagnik, “Video2text: Learning to annotate video content,” in Proc. IEEE Int. Conf. Data Mining Workshops ICDMW ’09, 2009, pp. 144–151. III-A4 [81] W. Yang and G. Toderici, “Discriminative tag learning on youtube videos with latent sub-tags,” in IEEE Conference on Computer Vision and Pattern Recognition, 2011. III-A4 [82] S. Wu, F. Luisier, and S. Bondugula, “Zero-shot event detection using multi-modal fusion of weakly supervised concepts,” in CVPR, 2016. III-A4 [83] M. Elhoseiny, B. Saleh, and A. Elgammal, “Write a classifier: Zeroshot learning using purely textual descriptions,” in IEEE International Conference on Computer Vision, December 2013. III-B, VI-A9 [84] J. L. Ba, K. Swersky, S. Fidler, and R. Salakhutdinov, “Predicting deep zero-shot convolutional neural networks using textual descriptions,” in ICCV, 2015. III-B, IV-A3, IV-A4 [85] S. Reed, Z. Akata, B. Schiele, and H. Lee., “Learning deep representations of fine-grained visual descriptions,” in CVPR, 2016. III-B, VII-2 [86] G. A. Miller, “Wordnet: A lexical database for english,” Commun. ACM, vol. 38, no. 11, pp. 39–41, Nov. 1995. III-B1 [87] T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representation in vector space,” in Proceedings of Workshop at International Conference on Learning Representations, 2013. III-B2 13 [88] T. Mikolov, I. Sutskever, K. Chen, G. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality,” in Neural Information Processing Systems, 2013. III-B2, VI-B2 [89] Z. S. Harris, Distributional Structure. Dordrecht: Springer Netherlands, 1981, pp. 3–22. III-B2 [90] H. Larochelle, D. Erhan, and Y. Bengio, “Zero-data learning of new tasks,” in AAAI, 2008. IV [91] X. Yu and Y. Aloimonos, “Attribute-based transfer learning for object categorization with zero/one training example,” in European Conference on Computer Vision, 2010. IV-A1 [92] D. Jayaraman and K. Grauman, “Zero shot recognition with unreliable attributes,” in NIPS, 2014. IV-A1, IV-C1 [93] Z. Akata, F. Perronnin, Z. Harchaoui, and C. Schmid, “Labelembedding for attribute-based classification,” in CVPR, 2013. IV-A2, V-B2, VI-A3 [94] J. Weston, S. Bengio, and N. Usunier, “Large scale image annotation: learning to rank with joint word-image embeddings,” Machine Learning, 2010. IV-A2 [95] Z. Li, E. Gavves, T. E. J. Mensink, and C. G. M. Snoek, “Attributes make sense on segmented objects,” in European Conference on Computer Vision, 2014. IV-A2 [96] X. Li and Y. Guo, “Max-margin zero-shot learning for multiclass classification,” in AISTATS, 2015. IV-A2 [97] X. Li, Y. Guo, and D. Schuurmans, “Semi-supervised zero-shot classification with label representation learning,” in ICCV, 2015. IV-A2 [98] D. Jayaraman, F. Sha, and K. Grauman, “Decorrelating semantic visual attributes by resisting the urge to share,” in CVPR, 2014. IV-A2 [99] S. J. Hwang and L. Sigal, “A unified semantic embedding: relating taxonomies and attributes,” in NIPS, 2014. IV-A2, IV-A3 [100] Z. Akata, S. Reed, D. Walter, H. Lee, and B. Schiele, “Evaluation of output embeddings for fine-grained image classification,” in CVPR, 2015. IV-A3, V-B2 [101] B. Romera-Paredes and P. Torr, “An embarrassingly simple approach to zero-shot learning,” in ICML, 2015. IV-A3 [102] Y. Fu, T. M. Hospedales, T. Xiang, Z. Fu, and S. Gong, “Transductive multi-view embedding for zero-shot recognition and annotation,” in ECCV, 2014. IV-A3, IV-C1, V-B2 [103] Y. Yang and T. M. Hospedales, “A unified perspective on multi-domain and multi-task learning,” in ICLR, 2015. IV-A3, IV-A4 [104] D. Mahajan, S. Sellamanickam, and V. Nair, “A joint learning framework for attribute models and object descriptions,” in IEEE International Conference on Computer Vision, 2011, pp. 1227–1234. IV-A3 [105] Z. Fu, T. Xiang, E. Kodirov, and S. Gong, “zero-shot object recognition by semantic manifold distance,” in CVPR, 2015. IV-A3, IV-C1 [106] J. Deng, N. Ding, Y. Jia, A. Frome, K. Murphy, S. Bengio, Y. Li, H. Neven, and H. Adam, “Large-scale object classification using label relation graphs,” in ECCV, 2014. IV-A3 [107] D. R. Hardoon, S. Szedmak, and J. Shawe-Taylor, “Canonical correlation analysis; an overview with application to learning methods,” in Neural Computation, 2004. IV-A3 [108] R. Socher and L. Fei-Fei, “Connecting modalities: Semi-supervised segmentation and annotation of images using unaligned text corpora,” in IEEE Conference on Computer Vision and Pattern Recognition, 2010. IV-A3 [109] Y. Gong, Q. Ke, M. Isard, and S. Lazebnik, “A multi-view embedding space for modeling internet images, tags, and their semantics,” International Journal of Computer Vision, 2013. IV-A3 [110] S. J. Hwang and K. Grauman, “Learning the relative importance of objects from tagged images for retrieval and cross-modal search,” International Journal of Computer Vision, 2011. IV-A3 [111] Y. Wang and S. Gong, “Translating topics to words for image annotation,” in ACM International Conference on Conference on Information and Knowledge Management, 2007. IV-A3 [112] G.-J. Qi, W. Liu, C. Aggarwal, and T. Huang, “Joint intermodal and intramodal label transfers for extremely rare or unseen classes,” IEEE TPAMI, 2017. IV-A3 [113] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, “Going deeper with convolutions,” in CVPR, 2015. IV-A4 [114] L. Zhang, T. Xiang, and S. Gong, “Learning a deep embedding model for zero-shot learning,” in CVPR, 2017. IV-A4 [115] Y. Fu, T. M. Hospedales, T. Xiang, and S. Gong, “Transductive multiview zero-shot learning,” IEEE TPAMI, 2015. IV-B, 1, IV-C1, VII-2 [116] S. Changpinyo, W.-L. Chao, B. Gong, and F. Sha, “Synthesized classifiers for zero-shot learning,” in CVPR, 2016. IV-B, IV-C1, VI-A8 [117] Y. Zhang, B. Gong, and M. Shah, “Fast zero-shot image tagging,” in CVPR, 2016. IV-B [118] Y. Wang and G. Mori, “A discriminative latent model of image region and object tag correspondence,” in Neural Information Processing Systems, 2010. IV-B [119] Y. Long, L. Liu, L. Shao, F. Shen, G. Ding, and J. Han, “From zeroshot learning to conventional supervised classification: Unseen visual data synthesis,” in CVPR, 2017. IV-B [120] E. Kodirov, T. Xiang, Z. Fu, and S. Gong, “Unsupervised domain adaptation for zero-shot learning,” in ICCV, 2015. IV-C1 [121] M. Rohrbach, S. Ebert, and B. Schiele, “Transfer learning in a transductive setting,” in NIPS, 2013. IV-C1, V-B2, VI-A8 [122] Y. Li, D. Wang, H. Hu, Y. Lin, and Y. Zhuang, “Zero-shot recognition using dual visual-semantic mapping paths,” in CVPR, 2017. IV-C1 [123] X. Xu, T. Hospedales, and S. Gong, “Transductive zero-shot action recognition by word-vector embedding,” in IJCV, 2016. IV-C1 [124] B. Marco, L. Angeliki, and D. Georgiana, “Hubness and pollution: Delving into cross-space mapping for zero-shot learning,” in ACL, 2015. IV-C2 [125] T. Low, C. Borgelt, S. Stober, and A. Nürnberger, The Hubness Phenomenon: Fact or Artifact?, 2013. IV-C2 [126] G. Dinu, A. Lazaridou, and M. Baroni, “Improving zero-shot learning by mitigating the hubness problem,” in ICLR workshop, 2014. IV-C2 [127] Y. Shigeto, I. Suzuki, K. Hara, M. Shimbo, and Y. Matsumoto, “Ridge regression, hubness, and zero-shot learning,” in ECML/PKDD, 2015. IV-C2 [128] W.-L. Chao, S. Changpinyo, B. Gong, and F. Sha., “An empirical study and analysis of generalized zero-shot learning for object recognition in the wild,” in ECCV, 2016. V-A [129] W. J. Scheirer, L. P. Jain, and T. E. Boult, “Probability models for open set recognition,” IEEE TPAMI, 2014. V-A, V-A1 [130] W. J. Scheirer, A. Rocha, A. Sapkota, and T. E. Boult, “Towards open set recognition,” IEEE TPAMI, 2013. V-A, V-A1 [131] Y. Fu and L. Sigal, “Semi-supervised vocabulary-informed learning,” in CVPR, 2016. V-A, V-A2, VI-A8, VII-2 [132] Y. Fu, H. Dong, Y. feng Ma, Z. Zhang, and X. Xue, “Vocabularyinformed extreme value learning,” in arxiv, 2017. V-A, V-A2 [133] Y. Xian, B. Schiele, and Z. Akata, “Zero-shot learning - the good, the bad and the ugly,” in CVPR, 2017. V-A, VI, VI-A1, VI-B3 [134] A. Bendale and T. Boult, “Towards open world recognition,” in CVPR, 2015. V-A1 [135] H. Sattar, S. Muller, M. Fritz, and A. Bulling, “Prediction of search targets from fixations in open-world settings,” in CVPR, 2015. V-A1, V-A2 [136] R. Gomes, M. Welling, and P. Perona, “Incremental learning of nonparametric bayesian mixture models,” in IEEE Conference on Computer Vision and Pattern Recognition, 2008. V-A1 [137] C. P. Diehl and G. Cauwenberghs, “Svm incremental learning, adaptation and optimization,” in IJCNN, vol. 4, 20–24 July 2003, pp. 2685– 2690. V-A1 [138] S. A. Rebuffi, A. Kolesnikov, G. Sperl, and C. H. Lampert, “icarl: Incremental classifier and representation learning,” in CVPR, 2017. V-A1, VII-4 [139] S. Guadarrama, E. Rodner, K. Saenko, N. Zhang, R. Farrell, J. Donahue, and T. Darrell, “Open-vocabulary object retrieval,” in Robotics Science and Systems (RSS), 2014. V-A2 [140] S. Guadarrama, E. Rodner, K. Saenko, and T. Darrell, “Understanding object descriptions in robotics by open-vocabulary object retrieval and detection,” in Journal International Journal of Robotics Research, 2016. V-A2 [141] W. Zheng, S. Gong, and T. Xiang, “Towards open-world person reidentification by one-shot group-based verification,” in IEEE TPAMI, 2016. V-A2, V-B2 [142] H. Zhao, X. Puig, B. Zhou, S. Fidler, and A. Torralba, “Open vocabulary scene parsing,” in CVPR, 2017. V-A2 [143] Jankowski, Norbert, Duch, Wodzislaw, Grabczewski, and Krzyszto, “Meta-learning in computational intelligence,” in Springer Science & Business Media, 2011. V-B [144] B. M. Lake and R. Salakhutdinov, “One-shot learning by inverting a compositional causal process,” in NIPS, 2013. V-B, V-B1, V-B2 [145] J. Goldberger, G. E. Hinton, S. T. Roweis, and R. R. Salakhutdinov, “Neighbourhood components analysis,” in Advances in Neural Information Processing Systems 17, L. K. Saul, Y. Weiss, and L. Bottou, Eds. MIT Press, 2005, pp. 513–520. [Online]. Available: http://papers.nips.cc/paper/ 2566-neighbourhood-components-analysis.pdf V-B1 [146] T. D. Kulkarni, W. F. Whitney, P. Kohli, and J. Tenenbaum, “Deep convolutional inverse graphics network,” in NIPS, 2015. V-B1 14 [147] T. D. Kulkarni, V. K. Mansinghka, P. Kohli, and J. B. Tenenbaum, “Inverse graphics with probabilistic cad models,” in arxiv:1407.1339, 2014. V-B1 [148] B. Lake, R. Salakhutdinov, and J. Tenenbaum, “Human-level concept learning through probabilistic program induction,” in NIPS, 2013. V-B1 [149] R. JVilalta and Y. Drissi, “A perspective view and survey of metalearning,” Artificial intelligence review, 2002. V-B2 [150] L. Fei-Fei, R. Fergus, and P. Perona, “A bayesian approach to unsupervised one-shot learning of object categories,” in IEEE International Conference on Computer Vision, 2003. V-B2 [151] ——, “One-shot learning of object categories,” IEEE TPAMI, 2006. V-B2 [152] T. Tommasi and B. Caputo, “The more you know, the less you learn: from knowledge transfer to one-shot learning of object categories,” in British Machine Vision Conference, 2009. V-B2 [153] E. Bart and S. Ullman, “Cross-generalization: learning novel classes from a single example by feature replacement,” in CVPR, 2005. V-B2 [154] T. Hertz, A. Hillel, and D. Weinshall, “Learning a kernel function for classification with small training samples,” in ICML, 2016. V-B2 [155] F. Fleuret and G. Blanchard, “Pattern recognition from one example by chopping,” in NIPS, 2005. V-B2 [156] Y. Amit, Fink, S. M., and U. N., “Uncovering shared structures in multiclass classification,” in ICML, 2007. V-B2 [157] L. Wolf and I. Martin, “Robust boosting for learning from few examples,” in CVPR, 2005. V-B2 [158] A. Torralba, K. Murphy, and W. Freeman, “sharing visual features for multiclass and multiview object detection,” in IEEE TPAMI, 2007. V-B2 [159] A. Torralba, K. P. Murphy, and W. T. Freeman, “Using the forest to see the trees: Exploiting context for visual object detection and localization,” Commun. ACM, 2010. V-B2 [160] J. Bromley, J. Bentz, L. Bottou, I. Guyon, Y. LeCun, C. Moore, E. Sackinger, and R. Shah, “Signature verification using a siamese time delay neural network,” in IJCAI, 1993. V-B2 [161] G. Koch, R. Zemel, and R. Salakhutdinov, “Siamese neural networks for one-shot image recognition,” in ICML – Deep Learning Workshok, 2015. V-B2 [162] W. Kienzle and K. Chellapilla, “Personalized handwriting recognition via biased reg- ularization,” in ICML, 2006. V-B2 [163] A. Quattoni, M. Collins, and T. Darrell, “Transfer learning for image classification with sparse prototype representations,” in IEEE Conference on Computer Vision and Pattern Recognition, 2008, pp. 1–8. V-B2 [164] M. Fink, “Object classification from a single example utilizing class relevance metrics,” in NIPS, 2005. V-B2 [165] L. Wolf, T. Hassner, and Y. Taigman, “The one-shot similarity kernel,” in ICCV, 2009. V-B2 [166] J. Weston, S. Bengio, and N. Usunier, “Wsabie: Scaling up to large vocabulary image annotation,” in IJCAI, 2011. V-B2 [167] Santoro, S. Bartunov, M. Botvinick, D. Wierstra, and T. Lillicrap, “Oneshot learning with memory-augmented neural networks,” in arx, 2016. V-B2 [168] L. Bertinetto, J. F. Henriques, J. Valmadre, P. Torr, and A. Vedaldi, “Learning feed-forward one-shot learners,” in NIPS, 2016. V-B2 [169] A. Habibian, T. Mensink, and C. Snoek, “Video2vec embeddings recognize events when examples are scarce,” in IEEE TPAMI, 2014. V-B2 [170] O. Vinyals, C. Blundell, T. Lillicrap, K. Kavukcuoglu, and D. Wierstra, “Matching networks for one shot learning,” in NIPS, 2016. V-B2 [171] H. Zhang, K. Dana, and K. Nishino, “Friction from reflectance: Deep reflectance codes for predicting physical surface properties from oneshot in-field reflectance„” in ECCV, 2016. V-B2 [172] Y. Wang and M. Hebert, “Learning from small sample sets by combining unsupervised meta-training with cnns,” in NIPS, 2016. V-B2 [173] ——, “Learning to learn: model regression networks for easy small sample learning,” in ECCV, 2016. V-B2 [174] C. Finn, P. Abbeel, and S. Levine, “Model-agnostic meta-learning for fast adaptation of deep networks,” in Proceedings of the 34th International Conference on Machine Learning, ser. Proceedings of Machine Learning Research, D. Precup and Y. W. Teh, Eds., vol. 70. International Convention Centre, Sydney, Australia: PMLR, 06–11 Aug 2017, pp. 1126–1135. [Online]. Available: http://proceedings.mlr.press/v70/finn17a.html V-B2 [175] A. A. Rusu, N. C. Rabinowitz, G. Desjardins, H. Soyer, J. Kirkpatrick, K. Kavukcuoglu, R. Pascanu, and R. Hadsell, “Progressive neural networks,” arXiv preprint arXiv:1606.04671, 2016. V-B2 [176] D. G. Lowe, “Distinctive image features from scale-invariant keypoints,” International Journal of Computer Vision, vol. 60, 2004. VI-A1 [177] K. E. A. van de Sande, T. Gevers, and C. G. M. Snoek, “Evaluation of color descriptors for object and scene recognition,” in IEEE Conference on Computer Vision and Pattern Recognition, 2008. VI-A1 [178] A. Bosch, A. Zisserman, and X. Munoz, “Representing shape with a spatial pyramid kernel,” in ACM International Conference on Image and Video Retrieval, 2007. VI-A1 [179] H. Bay, A. Ess, T. Tuytelaars, and L. V. Gool, “SURF: Speeded up robust features,” Computer Vision and Image Understanding, vol. 110, no. 3, pp. 346–359, 2008. VI-A1 [180] E. Shechtman and M. Irani, “Matching local self-similarities across images and videos,” in IEEE Conference on Computer Vision and Pattern Recognition, 2007. VI-A1 [181] J. Donahue, Y. Jia, O. Vinyals, J. Hoffman, N. Zhang, E. Tzeng, and T. Darrell, “Decaf: A deep convolutional activation feature for generic visual recognition,” in International Conference on Machine Learning, 2014. VI-A1 [182] C. Wah, S. Branson, P. Welinder, P. Perona, and S. Belongie, “The Caltech-UCSD Birds-200-2011 Dataset,” California Institute of Technology, Tech. Rep. CNS-TR-2011-001, 2011. VI-A3 [183] A. Oliva and A. Torralba, “Modeling the shape of the scene: Aholistic representation of the spatial envelope,” International Journal of Computer Vision, vol. 42, 2001. VI-A4 [184] G. Patterson and J. Hays, “Sun attribute database: Discovering, annotating, and recognizing scene attributes.” in IEEE Conference on Computer Vision and Pattern Recognition, 2012. VI-A6 [185] J. Xiao, J. Hays, K. A. Ehinger, A. Oliva, and A. Torralba, “Sun database: Large-scale scene recognition from abbey to zoo,” in IEEE Conference on Computer Vision and Pattern Recognition, 2010, pp. 3485–3492. VI-A6 [186] Y.-G. Jiang, G. Ye, S.-F. Chang, D. Ellis, and A. C. Loui, “Consumer video understanding: A benchmark database and an evaluation of human and machine performance,” in ACM International Conference on Multimedia Retrieval, 2011. VI-A7 [187] Z.-J. Zha, T. Mei, Z. Wang, and X.-S. Hua, “Building a comprehensive ontology to refine video concept detection,” in Proceedings of the International Workshop on Workshop on Multimedia Information Retrieval, ser. MIR ’07. New York, NY, USA: ACM, 2007, pp. 227– 236. [Online]. Available: http://doi.acm.org/10.1145/1290082.1290114 VI-A7 [188] J. Deng, W. Dong, R. Socher, L.-J. Li, K. Li, and L. Fei-Fei, “Imagenet: A large-scale hierarchical image database,” in CVPR, 2009. VI-A8 [189] M.-E. Nilsback and A. Zisserman, “Automated flower classification over a large number of classes,” in Proceedings of the Indian Conference on Computer Vision, Graphics and Image Processing, 2008. VI-A9 [190] K. Soomro, A. R. Zamir, and M. Shah, “Ucf101: A dataset of 101 human action classes from videos in the wild,” CRCV-TR-12-01, 2012. VI-A10 [191] H. Idrees, A. R. Zamir, Y.-G. Jiang, A. Gorban, I. Laptev, R. Sukthankar, and M. Shah, “The thumos challenge on action recognition for videos "in the wild",” Computer Vision and Image Understanding, 2017. VI-A10 [192] Y.-G. Jiang, Z. Wu, J. Wang, X. Xue, and S.-F. Chang, “Exploiting feature and class relationships in video categorization with regularized deep neural networks,” in IEEE TPAMI, 2017. VI-A11 [193] F. C. H. V. E. B. Ghanem and J. C. Niebles, “Activitynet: A large-scale video benchmark for human activity understanding,” in CVPR, 2015. VI-A12 [194] P. Sermanet, D. Eigen, X. Zhang, M. Mathieu, R. Fergus, and Y. LeCun, “Overfeat: Integrated recognition, localization and detection using convolutional networks,” in ICLR, 2014. VI-B1 [195] K. Chatfield, K. Simonyan, A. Vedaldi, and A. Zisserman, “Return of the devil in the details: Delving deep into convolutional nets,” in BMVC, 2014. VI-B1 [196] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” arXiv preprint arXiv:1512.03385, 2015. VI-B1 [197] J. Pennington, R. Socher, and C. D. Manning, “Glove: Global vectors for word representation,” in EMNLP, 2014. VI-B2 [198] Y. Xian, Z. Akata, G. Sharma, Q. Nguyen, M. Hein, and B. Schiele, “Latent embeddings for zero-shot classification,” in CVPR, 2016. VII-2 [199] A. Pentina and C. H. Lampert, “Lifelong learning with non-i.i.d. tasks,” in NIPS, 2015. VII-4 [200] A. Pentina, V. Sharmanska, and C. H. Lampert, “Curriculum learning of multiple tasks,” in CVPR, 2015. VII-4 15 PLACE PHOTO HERE PLACE PHOTO HERE Yanwei Fu received the BSc degree in information and computing sciences from Nanjing University of Technology in 2008; and the MEng degree in the Department of Computer Science & Technology at Nanjing University in 2011, China. He is now pursuing his PhD in vision group of EECS, Queen Mary University of London. His research interest is attribute learning, topic model, learning to rank, video summarization and image segmentation. Tao Xiang received the Ph.D. degree in electrical and computer engineering from the National University of Singapore in 2002. He is currently a reader (associate professor) in the School of Electronic Engineering and Computer Science, Queen Mary University of London. His research interests include computer vision, machine learning, and data mining. He has published over 140 papers in international journals and conferences. Leonid Sigal is an Associate Professor at the University of British Columbia. Prior to this he was a Senior Research Scientist at Disney Research. He completed his Ph.D. at Brown University in 2008; PLACE received his M.A. from Boston University in 1999, PHOTO and M.Sc. from Brown University in 2003. Leonid’s HERE research interests lie in the areas of computer vision, machine learning, and computer graphics. Leonid’s research emphasis is on machine learning and statistical approaches for visual recognition, understanding and analytics. He has published more than 70 papers in venues and journals in these fields (including TPAMI, IJCV, CVPR, ICCV and NIPS). PLACE PHOTO HERE PLACE PHOTO HERE Yu-Gang Jiang a Professor in School of Computer Science, Fudan University, China. His Lab for Big Video Data Analytics conducts research on all aspects of extracting high-level information from big video data, such as video event recognition, object/scene recognition and large-scale visual search. His work has led to many awards, including the inaugural ACM China Rising Star Award and the 2015 ACM SIGMM Rising Star Award. Xiangyang Xue Xiangyang Xue received the B.S., M.S., and Ph.D. degrees in communication engineering from Xidian University, Xi’an, China, in 1989, 1992 and 1995, respectively. He is currently a Professor of Computer Science at Fudan University, Shanghai, China. His research interests include multimedia information processing and machine learning. PLACE PHOTO HERE Shaogang Gong received the DPhil degree in 1989 from Keble College, Oxford University. He has been Professor of Visual Com- putation at Queen Mary University of Lon- don since 2001, a fellow of the Institution of Electrical Engineers and a fellow of the British Computer Society. His research inter- ests include computer vision, machine learn- ing, and video analysis.
2cs.AI
1 On the reduction of differential inclusions and Lyapunov stability arXiv:1703.07071v4 [cs.SY] 23 Jan 2018 Rushikesh Kamalapurkar, Warren E. Dixon, and Andrew R. Teel Abstract—In this paper, locally Lipschitz regular functions are utilized to identify and remove infeasible directions from differential inclusions. The resulting reduced differential inclusion is point-wise smaller (in the sense of set containment) than the original differential inclusion. The reduced inclusion is utilized to develop a generalized notion of a time derivative for locally Lipschitz candidate Lyapunov functions. The developed generalized derivative yields less conservative statements of Lyapunov stability results, invariance-like results, and Matrosov results for differential inclusions. Illustrative examples are included to demonstrate the utility of the developed stability theorems. Index Terms—differential inclusions, stability of NL systems, stability of hybrid systems, nonlinear systems I. I NTRODUCTION Differential inclusions can be used to model and analyze a large variety of practical systems. For example, systems that utilize discontinuous control architectures such as sliding mode control, multiple model and sparse neural network adaptive control, finite state machines, gain scheduling control, etc., are analyzed using the theory of differential inclusions. Differential inclusions are also used to analyze robustness to bounded perturbations and modeling errors, to model physical phenomena such as coulomb friction and impact, and to model differential games [1], [2]. Asymptotic properties of trajectories of differential inclusions are typically analyzed using Lyapunov-like comparison functions. Several generalized notions of the directional derivative are utilized to characterize the change in the value of the candidate Lyapunov function along the trajectories of differential inclusions. Early results on stability of differential inclusions that utilize nonsmooth candidate Lyapunov functions are based on Dini directional derivatives [3], [4] and contingent derivatives [5, Chapter 6]. For locally Lipschitz regular candidate Lyapunov functions, stability results based on Clarke’s notion of generalized directional derivatives have been developed in results such as [6]–[8]. In [6], Paden and Rushikesh Kamalapurkar is with the School of Mechanical and Aerospace Engineering, Oklahoma State University, Stillwater, OK, USA. [email protected]. Warren E. Dixon is with the Department of Mechanical and Aerospace Engineering, University of Florida, Gainesville, FL, USA. [email protected]. Andrew R. Teel is with the Department of Electrical and Computer Engineering, University of California, Santa Barbara, CA, USA. [email protected]. This research is supported in part by NSF award numbers 1509516 and 1508757, ONR grant number N00014-13-1-0151, and AFOSR Award Number FA9550-15-1-0155. Any opinions, findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the sponsoring agency. Sastry utilize the Clarke gradient to develop a set-valued generalized derivative along with several Lyapunov-based stability theorems. In [7], Bacciotti and Ceragioli introduce another set-valued generalized derivative that results in sets that are smaller, pointwise, than those generated by the set-valued derivative in [6]; hence, the Lyapunov theorems in [7] are generally less conservative than their counterparts in [6]. The Lyapunov theorems developed by Bacciotti and Ceragioli have also been shown to be less conservative than those based on Dini and contingent derivatives, provided locally Lipschitz regular candidate Lyapunov functions are employed (cf. [9, Proposition 7]). In this paper, and in the preliminary work in [?], locally Lipschitz regular functions are utilized to identify and remove the infeasible directions from a differential inclusion to yield a pointwise smaller (in the sense of set containment) equivalent differential inclusion. Using the reduced differential inclusion, a novel generalization of the set-valued derivative concepts in [6] and [7] is introduced for locally Lipschitz Lyapunov functions. The developed technique yields less conservative statements of Lyapunov stability results (cf. [3], [4], [6], [7], [10], [11]), invariance results (cf. [8], [12]–[14]), invariancelike results for nonautonomous systems (cf. [15], [16, Theorem 2.5]), and Matrosov results (cf. [17]–[21]) for differential inclusions. The paper is organized as follows. Section II introduces the notation and Sections III and IV review differential inclusions and Clarke-gradient-based set-valued derivatives from [6] and [7]. In Section V, locally Lipschitz regular functions are used to identify the infeasible directions in a differential inclusion. Section VI includes a novel generalization of the notion of a time-derivative with respect to a differential inclusion. Sections VII and VIII state Lyapunov stability results that utilize the novel definition of the generalized time-derivative for autonomous and nonautonomous differential inclusions, respectively. Illustrative examples where the developed stability theory is less conservative than results such as [6] and [7] are presented. Section IX summarizes the article and includes concluding remarks. II. N OTATION The n−dimensional Euclidean space is denoted by Rn and µ denotes the Lebesgue measure on Rn . Elements of Rn are T interpreted as column vectors and (·) denotes the vector transpose operator. The set of positive integers excluding 0 is denoted by N. For a ∈ R, R≥a denotes the interval [a, ∞) and R>a denotes the interval (a, ∞). Unless otherwise specified, t0 denotes the initial time and an interval is 2 assumed to be right-open and of nonzero length. The notation F : A ⇒ B is used to denote a set-valued map from A to the subsets of B. The notations co A, coA, A, Å, and ∂A are used to denote the convex hull, the closed convex hull, the closure, the interior, and the boundary of a set A, m n respectively. If a ∈ R   and b ∈ R then [a; b] denotes the a concatenated vector ∈ Rm+n . For A ⊆ Rm , B ⊆ Rn   b A the notations and A × B are interchangeably used to B n T denote the set {[a;  Tb] | a ∈ A, b ∈ B}. For A, B ⊆ R , A B denotes the set a b | a ∈ A, b ∈ B , A ± B denotes the set {a ± b ∈ Rn | a ∈ A, b ∈ B}, and A ≤ B implies kak ≤ kbk, ∀a ∈ A, and ∀b ∈ B. The notation B (x, r), B (x, r) and D (r, l) for x ∈ Rn and r, l > 0 is used to denote the sets {y ∈ Rn | kx − yk ≤ r}, {y ∈ Rn | kx − yk < r}, and {y ∈ Rn | r ≤ kyk ≤ l}, respectively. The notation |(·)| denotes the absolute value if (·) ∈ R and the cardinality if (·) is a set. For A ⊂ Rn and x ∈ Rn , dist (x, A) := inf y∈A kx − yk. The notations L∞ (A, B), C n (A, B), and Lip (A, B) denote essentially bounded, n−times continuously differentiable, and locally Lipschitz functions with domain A and codomain B, respectively. The notation 0n denotes the zero element of Rn . Whenever clear from the context, the subscript n is suppressed. III. D IFFERENTIAL INCLUSIONS n Let F : R × R≥t0 ⇒ Rn be a set-valued map. Consider the differential inclusion ẋ ∈ F (x, t) . (1) A locally absolutely continuous function x : I → Rn is called a solution to (1) over the interval I ⊆ R if ẋ (t) ∈ F (x (t) , t) , (2) for almost all t ∈ I [1, p. 50]. A solution is called complete if I = R≥t0 and maximal if it does not have a proper right extension which is also a solution to (1). If a solution is maximal and if the set {x (t) | t ∈ I} is compact, then the solution is called precompact. Similar to [22, Proposition 1], it can be shown that any solution to (1) can be extended to a maximal solution; hence, if a solution exists, then it can be assumed to be maximal without loss of generality. To facilitate the discussion, let D ⊆ Rn be open and connected and let Ω := D × I. Let ID := [t0 , TD ), where TD denotes the first exit time of the solution x (·) from D i.e., TD := min (sup I, inf {t ∈ I | x (t) ∈ / D}) and inf ∅ is assumed to be ∞. Since D is open and x (·) ∈ C 0 (I, Rn ), if x (t0 ) ∈ D, then ID 6= ∅. Throughout the manuscript, St (A) denotes the set of maximal solutions to (1) such that (x (t0 ) , t0 ) ∈ A ⊂ Rn × R≥t0 and S (A) denotes the set of maximal solutions to ẋ ∈ F (x) where x (t0 ) ∈ A ⊂ Rn . The following notions of weak and strong forward invariance are utilized in this paper. Definition 1. A set A ⊆ Rn is called weakly forward invariant with respect to (1) if ∃x (·) ∈ St (A × R≥t0 ) such that x (t) ∈ A, ∀t ∈ I. It is called strongly forward invariant with respect to (1) if ∀x (·) ∈ St (A × R≥t0 ) and ∀t ∈ I, x (t) ∈ A. 4 The following development focuses on set-valued maps that admit local solutions. Definition 2. Let D ⊆ Rn and let J be an interval. The set-valued map F : Rn × R≥t0 ⇒ Rn is said to admit local solutions over D×J if for all (y, τ ) ∈ D×J , ∃T ∈ R>τ such that a solution x : I → Rn to (1), starting from x (τ ) = y, exists over the interval I := [τ, T ) ⊆ R≥t0 . Sufficient conditions for the existence of local solutions can be found in [1, §7, Theorem 1] and [1, §7, Theorem 5]. The following Lemma, stated to facilitate the analysis, is a slight generalization of [22, Proposition 2]. Lemma 1. Let D ⊆ Rn be open and connected and let F : Rn × R≥t0 ⇒ Rn be a set-valued map that admits solutions over D × R≥t0 . Let x : [t0 , T ) → Rn , T > t0 , be a solution to (1) such that {x (t) | t ∈ [t0 , T )} ⊂ D. If the set ∪t∈J F (x (t) , t) is bounded for every subinterval J ⊆ [t0 , T ) of finite length, then x (·) is complete. Proof: For the sake of contradiction, assume that T < ∞. Since the set ∪t∈[t0 ,T ) F (x (t) , t) is bounded, (2) implies that ẋ (·) ∈ L∞ ([t0 , T ) , Rn ). Since t 7→ x (t) is locally absolutely continuous, ∀t1 , t2 ∈ [t0 , T ), ´ t2 ẋ (τ ) dτ . Since ẋ (·) ∈ kx (t2 ) − x (t1 )k2 = t1 ´ t2 ´ t2 n L∞ ([t0 , T ) , R ), t1 ẋ (τ ) dτ ≤ t12 M dτ , where M is 2 a positive constant. Thus, kx (t2 ) − x (t1 )k2 ≤ M |t2 − t1 |, and hence, t 7→ x (t) is uniformly continuous on [t0 , T ). Therefore, x (·) can be extended into a continuous function x0 : [t0 , T ] → Rn . Since x (·) is continuous, D is open, and {x (t) | t ∈ [t0 , T )} ⊂ D, x0 (T ) ∈ D. Since F admits solutions over D ×R≥t0 , x0 (·) can be extended into a solution to (1) on the interval [t0 , T 0 ) for some T 0 > T , which contradicts the maximality of x (·). Hence, x (·) is complete. The hypothesis of Lemma 1 that the set ∪t∈J F (x (t) , t) is bounded for every subinterval J ⊆ [t0 , T ) of finite length is met if, e.g., (x, t) 7→ F (x, t) is locally bounded over D×R≥t0 and x (·) is precompact (cf. [23, Proposition 5.15]). IV. S ET- VALUED DERIVATIVES The focus of this article is on the development of a less conservative Lyapunov method for the analysis of differential inclusions using Clarke’s notion of generalized directional derivatives and gradients [24, p. 39]. Clarke gradients are utilized in [4] by Paden and Sastry to introduce the following generalized notion of the time derivative of a locally Lipschitz and regular (in the sense of [24, Definition 2.3.4]) candidate Lyapunov function with respect to a differential inclusion. Definition 3. [4] For a regular function V ∈ Lip (Ω, R), the set-valued derivative of V with respect to (1) is defined as Ṽ˙ (x, t) := \ p∈∂V (x,t) pT (F (x, t) × {1}) , 3 where ∂V denotes the Clarke gradient of V , defined as (see also, [24, Theorem 2.5.1]) ∂V (x, t) := co {lim ∇V (xi , ti ) | (xi , ti ) → (x, t) , (xi , ti ) ∈ / ΩV } , (3) where ΩV is the set of measure zero where the gradient of V is not defined. 4 Lyapunov stability theorems developed using the set-valued derivative Ṽ˙ exploit the property that every upper bound of the set Ṽ˙ (x (t) , t) is also an upper bound of V̇ (x (t) , t), for almost all t where V̇ (x (t) , t) exists. The aforementioned fact is a consequence of the following proposition. Proposition 1. [4] Let x : I → Rn be a solution to (1) such that x (t0 ) ∈ D. If V ∈ Lip (Ω, R) is a regular function, then V̇ (x (t) , t) exists for almost all t ∈ ID and V̇ (x (t) , t) ∈ Ṽ˙ (x (t) , t), for almost all t ∈ ID . Proof: See [4, Theorem 3]. In [7], the notion of a set-valued derivative is further generalized via the following definition. Definition 4. [7] For a regular function V ∈ Lip (Ω, R), the set-valued derivative of V with respect to (1) is defined as V˙ (x, t) :=  a ∈ R | ∃q ∈ F (x, t) | pT [q; 1] = a, ∀p ∈ ∂V (x, t) . (4) 4 The set-valued derivative in Definition 4 results in less conservative statements of Lyapunov stability than Definition 3 since it is contained within the set-valued derivative in Definition 3 and, as evidenced by [7, Example 1], the containment can be strict. The Lyapunov stability theorems developed in [7] exploit the property that Proposition 1 also holds for V˙ (see [7, Lemma 1]). In the following, notions of Lyapunov stability for differential inclusions are introduced.1 Definition 5. The differential inclusion ẋ ∈ F (x) is said to be (strongly) (a) stable at x = 0 if ∀ > 0 ∃δ > 0 such that if x (·) ∈ S B (0, δ) , then x (·) is complete and x (t) ∈ B (0, ), ∀t ≥ 0. (b) asymptotically stable at x = 0 if it is stable  at x = 0 and ∃c > 0 such that if x (·) ∈ S B (0, c) , then x (·) is complete and limt→∞ kx (t)k = 0. (c) globally asymptotically stable at x = 0 if it is stable at x = 0 and if x (·) ∈ S (Rn ) implies that x (·) is complete and limt→∞ kx (t)k = 0. 4 The following proposition is an example of a typical Lyapunov stability result for time-invariant differential inclusions that utilizes set-valued derivatives of the candidate Lyapunov function. The proposition combines [7, Theorem 2] and a specialization of [6, Theorem 3.1]. 1 While the results in this paper are stated in terms of stability at the origin, they extend in a straightforward manner to stability of arbitrary compact sets. Proposition 2. Let F : Rn ⇒ Rn be an upper semicontinuous map with compact, nonempty, and convex values. If V ∈ Lip (Rn , R) is a positive definite and regular function such that either2 max V˙ (x) ≤ 0 or max Ṽ˙ (x) ≤ 0, ∀x ∈ Rn , then ẋ ∈ F (x) is stable at x = 0. Proof: See [7, Theorem 2] and [6, Theorem 3.1]. The following section details a novel generalization of the notion of a time-derivative with respect to a differential inclusion that yields less conservative statements of results such as Proposition 2. The generalization relies on the observation that locally Lipschitz regular functions can be utilized to reduce differential inclusions pointwise to sets of feasible directions that are smaller than the corresponding sets in (1). V. R EDUCED DIFFERENTIAL INCLUSIONS By definition, V˙ ⊆ Ṽ˙ , which implies max V˙ (x) ≤ max Ṽ˙ (x). In some cases [7, Example 1], V˙ can be a proper subset of Ṽ˙ i.e., max V˙ (x) < max Ṽ˙ (x), which implies that Lyapunov theorems based on V˙ can be less conservative than those based on Ṽ˙ . A tighter bound on the evolution of V as x (·) moves along an orbit of (1) can be obtained by examining the following alternative representation of max V˙ ,3 max V˙ (x, t) = min max p∈∂V (x,t) q∈GF V (x,t) pT [q; 1] , (5) where, for any regular function U ∈ Lip (Rn × R≥t0 , R), and any set-valued map H : Rn × R≥t0 ⇒ Rn , the reduction n n GH U : R × R≥t0 ⇒ R is defined as GH U (x, t) :=  q ∈ H (x, t) | ∃a ∈ R | pT [q; 1] = a, ∀p ∈ ∂U (x, t) . (6) Proposition 2 and (5) suggest that the only directions in F that affect the stability properties of solutions to (1) are those included in GF V , that is, the directions that map the Clarke gradient of V into a singleton. The key observation in this paper is that the statement above remains true even if V is replaced with any arbitrary locally Lipschitz regular function U . The following proposition formalizes the aforementioned observation. Proposition 3. Let F : Rn ⇒ Rn be a map with compact and nonempty values that admits solutions over Rn . Let V ∈ Lip (Rn , R) be a positive definite and regular function and let U ∈ Lip (Rn , R) be any other regular function. If min max pT q ≤ 0, p∈∂V (x) q∈GF U (x) ∀x ∈ Rn , then ẋ ∈ F (x) is stable at x = 0. Proof: The proposition follows from the more general result stated in Theorem 3. 2 The definitions of V˙ and Ṽ˙ translate to time-invariant systems as  ˙ F V (x) = a ∈ R | ∃q ∈ F (x) | pT q = a, ∀p ∈ ∂V (x) and Ṽ˙ (x) := T T p∈∂V (x) p F (x), respectively. 3 The minimization in (5) serves to maintain consistency of notation, but is in fact, redundant. 4 Proposition 3 indicates that locally Lipschitz regular functions help discover the admissible directions in F . That is, from the point of view of Lyapunov stability, only the directions in GF U are relevant, where U can be different from the candidate Lyapunov function V . If U = V , Proposition 3 reduces to Proposition 2. In fact, the differential inclusion ẋ ∈ GF U (x, t) is, in a sense, equivalent to the differential inclusion ẋ ∈ F (x, t). To make the equivalence precise, the following definition of a reduced differential inclusion is introduced. ẋ (t) ∈ F̃U (x (t) , t), ∀t ∈ T . Since µ (ID \ T ) = 0, ẋ (t) ∈ F̃U (x (t) , t), for almost all t ∈ ID . The following example demonstrates the utility of Theorem 1. ∞ Definition 6. Let U := {Ui }i=1 be a collection of realvalued locally Lipschitz regular functions defined on Ω. The set-valued map F̃U : Rn × R≥t0 ⇒ Rn , defined as  F F̃U (x, t) := F (x, t) ∩ ∩∞ i=1 GUi (x, t) , ∀t ∈ R≥0 , where sgn (x) denotes the sign of x. The function U : R × R≥0 → R, defined as ( |x| |x| ≤ 1, U (x, t) := 2 |x| − 1 |x| > 1,  ∀t ∈ R≥0 , satisfies U ∈ Lip R2 , R . In addition, since U is convex, it is also regular [24, Proposition 2.3.6]. The Clarke gradient of U can be computed using (3) as   [1, 2] × {0} x = 1,      [−2, −1] × {0} x = −1,  ∂U (x, t) = {sgn (x)} × {0} 0 < |x| < 1,    {2 sgn (x)} × {0} |x| > 1,    [−1, 1] × {0} |x| = 0, is called the U-reduced differential inclusion for (1). 4 The key utility of the reduction developed in Definition 6 is that the reduced differential is sufficient to characterize the solutions to (1). That is, as demonstrated by the following theorem, the differential inclusion ẋ ∈ F̃U (x, t) admits local solutions if (1) admits local solutions and for every solution x : I → Rn to (1), there exists a subinterval J ⊆ I, such that x (·), when restricted to J , is also a solution to ẋ ∈ F̃U (x, t) Theorem 1. Let U be a collection of countably many realvalued locally Lipschitz regular functions defined on Ω. If x : I → Rn is a solution to (1) such that x (t0 ) ∈ D, then ẋ (t) ∈ F̃U (x (t) , t) for almost all t ∈ ID . Proof: The proof closely follows the proof of [7, Lemma 1]. Consider the set of times T ⊆ ID where ẋ (t) is defined, U̇i (x (t) , t) is defined ∀i ≥ 0, and ẋ (t) ∈ F (x (t) , t). Since x (·) is a solution to (1) and since Ui ∈ Lip (Ω, R), t 7→ Ui (x (t) , t) is absolutely continuous, and hence, µ (ID \ T ) = 0. The objective is to show that ẋ (t) ∈ F̃U (x (t) , t), not just F (x (t) , t). Since each function Ui is locally Lipschitz, for t ∈ T the time derivative of Ui can be expressed as (Ui (x (t)+hẋ (t) , t + h) − Ui (x (t) , t)) U̇i (x(t) , t) = lim . h→0 h Since each Ui is regular, for i ≥ 1, 0 U̇i (x (t) , t) = Ui+ ([x (t) ; t] , [ẋ (t) ; 1]) , = Uio ([x (t) ; t] , [ẋ (t) ; 1]) , = max pT [ẋ (t) ; 1] , Example 1. Consider the differential inclusion in (1), where x ∈ R, and F : R × R≥0 ⇒ R is defined as ( 2 sgn (x − 1) |x| = 6 1, F (x, t) := [−2, 5] |x| = 1, ∀t ∈ R≥0 . The set GF U is then given   {0} F GU (x, t) = ∅   F (x, t) by |x| = 1, |x| = 0, otherwise, ∀t ∈ R≥0 . Theorem 1 can then be invoked to conclude that every solution x : I → Rn to ẋ ∈ F (x, t) satisfies ẋ (t) ∈ F̃{U } (x (t) , t) = GF 4 U (x (t) , t), for almost all t ∈ I. VI. G ENERALIZED TIME DERIVATIVES Proposition 3 and Theorem 1 suggest the following notion of a generalized time derivative of V with respect to (1). Definition 7. The U−generalized time derivative of V ∈ Lip (Ω, R) with respect to (1), denoted by V˙ U : Ω → R is defined, ∀ (x, t) ∈ Ω, as V˙ U (x, t) := min max pT [q; 1] , (7) pT [q; 1] , (8) p∈∂V (x,t) q∈F̃U (x,t) p∈∂Ui (x(t),t) 0 U̇i (x (t) , t) = Ui− ([x (t) ; t] , [ẋ (t) ; 1]) , = = Uio ([x (t) ; t] , [ẋ (t) ; 1]) , min T p [ẋ (t) ; 1] , p∈∂Ui (x(t),t) 0 U+ 0 U− o where and denote the right and left directional derivatives, and U denotes the Clarke-generalized derivative of U .4 Thus, pT [ẋ (t) ; 1] = U̇i (x (t) , t) , ∀p ∈ ∂Ui (x (t) , t), which implies ẋ (t) ∈ GF Ui (x (t) , t), for each i. Therefore, 4 See [24, p. 39] for definitions of the right and left directional derivatives and the Clarke-generalized derivative. if V is regular, and V˙ U (x, t) := max max p∈∂V (x,t) q∈F̃U (x,t) if V is not regular. The U−generalized time derivative is understood to be −∞ when F̃U (x, t) is empty. 4 Definition 7 also facilitates a unified treatment of Lyapunov stability theory using regular as well as nonregular candidate Lyapunov functions. The candidate Lyapunov function will be called a Lyapunov function if the U−generalized time derivative is negative. 5 Definition 8. If V ∈ Lip (Ω, R) is positive definite and if V˙ U (x, t) ≤ 0, ∀ (x, t) ∈ Ω, then V is called a U−generalized Lyapunov function for (1). 4 ˙ If V ∈ U then F̃U ⊆ GF V , and hence, V U (x, t) ≤ ˙ max V (x, t) , ∀ (x, t) ∈ Ω. Thus, by judicious selection of the functions in U, V˙ (x, t) can be constructed to be less U conservative than the set-valued derivatives in [6] and [7]. Naturally, if U = {V } then V˙ U = V˙ . In general, the U−generalized time derivative does not satisfy the chain rule as stated in Proposition 1. However, it satisfies the following weak chain rule which turns out to be sufficient for Lyapunov-based analysis of differential inclusions. Theorem 2. If V ∈ Lip (Ω, R), then ∀x (·) ∈ St (Ω),   T F̃U (x (t) , t) V̇ (x (t) , t) ∈ (∂V (x (t) , t)) , {1} (9) for almost all t ∈ ID . In addition, if there exists a function W : Ω → R such that V˙ U (x, t) ≤ W (x, t) , ∀ (x, t) ∈ Ω, (10) then V̇ (x (t) , t) ≤ W (x (t) , t) , (11) for almost all t ∈ ID . Proof: Let x (·) ∈ St (Ω). Since x (t0 ) ∈ D, D is open, and x (·) is continuous, ID is nonempty. Consider a set of times T ⊆ ID where ẋ (t), V̇ (x (t) , t), and U̇i (x (t) , t) are defined ∀i ≥ 0 and ẋ (t) ∈ F̃U (x (t) , t). Using Theorem 1 and the facts that x (·) is absolutely continuous and V is locally Lipschitz, µ (ID \ T ) = 0. If V is regular, then arguments similar to the proof of Theorem 1 can be used to conclude that V̇ (x (t) , t) = pT [ẋ (t) ; 1] , ∀p ∈ ∂V (x (t) , t) , ∀t ∈ T . Thus, (7), (10), and Theorem 1 imply  that  T V̇ (x (t) , t) ∈ (∂V (x (t) , t)) F̃U (x (t) , t) × {1} and V̇ (x (t) , t) ≤ W (x (t) , t), for almost all t ∈ ID . If V is not regular, then [9, Proposition 4] (see also, [25, Theorem 2]) can be used to conclude that, for almost every t ∈ ID , ∃p0 ∈ ∂V (x (t) , t) such that V̇ (x (t) , t) = pT0 [ẋ (t) ; 1]. Thus, (8), (10), and  Theorem 1 imply  that T V̇ (x (t) , t) ∈ (∂V (x (t) , t)) F̃U (x (t) , t) × {1} and V̇ (x (t) , t) ≤ W (x (t) , t) for almost all t ∈ ID . The following sections develop relaxed Lyapunov-like stability theorems for differential inclusions based on the properties of the U−generalized time derivative hitherto established. VII. S TABILITY OF AUTONOMOUS SYSTEMS In this section, U−generalized Lyapunov functions are utilized to formulate less conservative extensions to stability and invariance results for autonomous differential inclusions of the form ẋ ∈ F (x) , (12) where F : Rn ⇒ Rn is a set-valued map. A. Lyapunov stability The following Lyapunov stability theorem is a consequence of Theorem 2. Theorem 3. Let 0 ∈ D and let F : Rn ⇒ Rn be a locally bounded set-valued map with nonempty and compact values that admits solutions over D. If there exists a U−generalized Lyapunov function V : D → R for (12), then (12) is stable at x = 0. If in addition, V˙ U (x) ≤ −W (x) , ∀x ∈ D, for some positive definite function W ∈ C 0 (Rn , R), then (12) is asymptotically stable at x = 0. Furthermore, if D = Rn and if the sublevel sets Ll := {x ∈ Rn | V (x) ≤ l} are compact for all l ∈ R>0 , then (12) is globally asymptotically stable at x = 0. Proof: Given  > 0, let r > 0 be such that  B (0, r) ⊂ D and r ∈ (0, ]. Let β ∈ 0, min V (x) and Lβ := kxk=r  x ∈ B (0, r) | V (x) ≤ β . Since V is continuous, ∃δ > 0 such that B (0, δ) ⊂ Lβ . Using Theorem 2, which implies that t 7→ V (x (t)) is nonincreasing on ID , and standard arguments (see, e.g., [26, Theorem 4.8]), it can be shown that Lβ is compact, (strongly) forward invariant, and Lβ ⊂ D. Hence, every solution x (·) ∈ S (Lβ ) is precompact, and  by Lemma 1, complete. Furthermore, if x (·) ∈ S B (0, δ) then x (t) ∈ B (0, ), ∀t ∈ R≥t0 . In addition, if V˙ U (x) ≤ −W (x) , ∀x ∈ D, for some positive definite function W ∈ C 0 (Rn , R), then Theorem 2 implies that t 7→ V (x (t)) is strictly decreasing on R≥t0 provided x (t0 ) ∈ B (0, δ). Asymptotic stability and global asymptotic stability (in the case where the sublevel sets of V are compact) of (12) at x = 0 then follow from standard arguments (see, e.g., [27, Section 5.3.2]). The following example presents a case where tests based on V˙ and Ṽ˙ are inconclusive but Theorem 3 can be used to establish asymptotic stability. Example 2. Let H : R ⇒ R be defined as ( {0} |y| = 6 1, H (y) := [−1, 1] |y| = 1. Let F : R2 ⇒ R2 be defined as   {−x1 + x2 } + H (x2 ) F (x) := . {−x1 − x2 } + H (x1 ) Consider the differential inclusion in (1) and the candidate 2 Lyapunov function V : R2 → R defined as V (x) := 21 kxk2 .  Since V ∈ C 1 R2 , the set-valued derivatives V˙ in [7] and Ṽ˙ in [6] are bounded by  V˙ (x),Ṽ˙ (x) ≤ −x21 − x22 + x1 H (x2 ) + x2 H (x1 ) . (13) Since neither Ṽ˙ nor V˙ can be shown to be negative semidefinite everywhere, the inequality in (13) is insufficient to draw conclusions regarding the stability of (12). The function U : R2 → R, defined as (see Fig. 1) U (x) := max ((x1 − 1) , 0) − min ((x1 + 1) , 0) + max ((x2 − 1) , 0) − min ((x2 + 1) , 0) 6 In applications where a negative definite bound on the derivative of the candidate Lyapunov function cannot be found easily, the invariance principle is invoked. The following section develops invariance results using U−generalized timederivatives. B. Invariance principle Analogs of the Barbashin-Krasovskii-LaSalle invariance principle for autonomous differential inclusions appear in results such as [7], [12], [28]. Estimates of the limiting invariant set that are less conservative than those developed in [7], [12], [28] can be obtained by using locally Lipschitz regular functions to reduce the admissible directions in F . For example, the following theorem extends the invariance principle developed by Bacciotti and Ceragioli (see [7, Theorem 3]). Fig. 1. The function U : R2 → R.  satisfies U ∈ Lip R2 , R . In addition, since U is convex, it is also regular [24, Proposition 2.3.6]. The Clarke gradient of U is given by, #) (" sgn 1 (x1 )    |x1 | = 6 1 ∧ |x2 | = 6 1,   sgn 1 (x2 )     " #    co {0, sgn (x1 )}   |x1 | = 1 ∧ |x2 | = 6 1,    {sgn 1 (x2 )} ∂U (x) = " #   {sgn 1 (x )} 1   |x1 | = 6 1 ∧ |x2 | = 1,    co {0, sgn (x2 )}    " #     co {0, sgn (x )} 1   |x1 | = 1 ∧ |x2 | = 1,  co {0, sgn (x2 )} where ( 0 −1 < y < 1, sgn 1 (y) := sgn (y) otherwise . In this case, the reduced inclusion GF U is given by ( F (x) |x1 | = 6 1 ∧ |x2 | = 6 1, GF U (x) = ∅ otherwise. 2 F Since GF U (x) ⊂ F (x) , ∀x ∈ R , F̃{U } = GU . Since ∂V 2 1 V ∈ C R , R , ∂V (x) = ∂x (x) , and hence, the {U } −generalized time derivative of V with respect to (12) is given by  T ∂V ˙ V {U } (x) = max (x) q, ∂x q∈F̃{U } (x) " #  i −x + x h 1 2  |x1 | = 6 1 ∧ |x2 | = 6 1, x1 x2 = −x1 − x2   −∞ otherwise, ≤ −x21 − x22 . Global asymptotic stability of (12) at x = 0 is then follows from Theorem 3. 4 Theorem 4. Let F : Rn ⇒ Rn be locally bounded and outer semicontinuous [23, Definition 5.4] over D and let F (x) be nonempty, convex, and compact, ∀x ∈ D. Let V ∈ Lip (D, R) and V˙ U (x) ≤ 0, ∀x ∈ D. Let Cn ⊂ D be a compact o strongly forward invariant set. If E := x ∈ D | V˙ U (x) = 0 and if M is the largest weakly forward invariant set in E ∩ C, then x (·) ∈ S (C) implies that x (·) is complete and limt→∞ dist (x (t) , M ) = 0. Proof: Existence of x (·) follows from [1, §7, Theorem 1] and its completeness follows from Lemma 1. The same argument as [7, Theorem 3] indicates that t 7→ V (x (t)) is constant on ω (x (·)), the ω−limit set of x (·) [7, Definition 3]. Note that ω (x (·)) is weakly invariant [12, Proposition 2.8] and ω (x (·)) ⊂ C. Let y : I → ω (x (·)) be a solution to (12) such that y (t0 ) ∈ ω (x). The existence of such a solution follows from weak invariance of ω (x (·)). Since t 7→ V (x (t)) is constant on ω (x (·)), V̇ (y (t)) = 0, ∀t ∈ R≥t0 . Let T be a set of time instances where ẏ (t) is defined and ẏ (t) ∈ F̃U (y (t)). If V is regular, then arguments similar to the proof of Theorem 1 can be used to conclude that ∀t ∈ T and ∀p ∈ ∂V (y (t)), 0 = V̇ (x (t)) = pT ẏ (t). Since V˙ U (x) = minp∈∂V (x) maxq∈F̃U (x) pT q ≤ 0, ∀x ∈ D and pT ẏ (t) = 0, ∀p ∈ ∂V (y (t)), it follows that V˙ (y (t)) = U 0, ∀t ∈ T , which means that y (t) ∈ E, for almost all t ≥ t0 . If V is not regular then [9, Proposition 4] (see also, [25, Theorem 2]) can be used to conclude that for almost every t ∈ I, ∃p0 ∈ ∂V (y (t)) such that 0 = V̇ (y (t)) = pT0 ẏ (t). Since, V˙ U (x) = maxp∈∂V (x) maxq∈F̃U (x) pT q ≤ 0, ∀x ∈ D and pT0 ẏ (t) = 0 for some p0 ∈ ∂V (y (t)), it follows that V˙ U (y (t)) = 0, ∀t ∈ T , which means that y (t) ∈ E for almost all t ≥ t0 . Since y (·) ∈ C 0 (R≥t0 , Rn ), y (t) ∈ E, ∀t ≥ t0 . That is, ω (x (·)) ⊂ E, and hence, ω (x (·)) ⊂ E ∩ C. Since ω (x (·)) is weakly invariant, ω (x (·)) ⊂ M . As a result, limt→∞ dist (x (t) , ω (x (·))) = 0 implies limt→∞ dist (x (t) , M ) = 0. The following corollary illustrates one of the many alternative ways to establish the existence of a compact strongly forward invariant set needed to apply Theorem 4. 7 Corollary 1. Let F : Rn ⇒ Rn be locally bounded and outer semicontinuous [23, Definition 5.4] over D and let F (x) be nonempty, convex, and compact, ∀x ∈ D. Let V ∈ Lip (D, R) and V˙ U (x) ≤ 0, ∀x ∈ D. Let l > 0 be such that the level set Ll := {x ∈ D : V (x) ≤ l} is closednand a connected component Cl of Ll is bounded. If o E := x ∈ D | V˙ U (x) = 0 and if M is the largest weakly  forward invariant set contained in E ∩Cl , then x (·) ∈ S Cl implies that x (·) is complete and limt→∞ dist (x (t) , M ) = 0. Proof: Let x : I → R be a maximal solution to (12) such that x (t0 ) ∈ Cl . From Theorem 2, t 7→ V (x (t)) is nonincreasing on ID . If x (t1 ) ∈ / Cl for some t1 ∈ ID , then continuity of x (·), the fact that Cl is a connected component of Ll , and the fact that Ll is closed imply that x (t1 ) ∈ / Ll , which is impossible since t 7→ V (x (t)) is nonincreasing on ID . Hence, Cl is strongly forward invariant on ID . Since Cl is bounded by assumption, x (·) is precompact, and hence, complete, by Lemma 1. The conclusion of the corollary then follows from Theorem 4 with C = Cl . The invariance principle is often applied to conclude asymptotic stability at the origin in the form of the following corollary.  complete solutions converge to the origin, x (·) ∈ S B (0, δ) =⇒ limt→∞ x (t) = 0; hence, (12) is asymptotically stable at x = 0. If D = Rn and the sublevel sets {x ∈ Rn | V (x) ≤ l} are compact for all l ∈ R≥0 , then r, and hence, δ, can be selected arbitrarily large; therefore, (12) is globally asymptotically stable at x = 0. The following example demonstrates the utility of the developed invariance principle. Example 3. Let H : R ⇒ R be defined as ( {0} |y| = 6 1, H (y) :=  1 1  −2, 2 |y| = 1, and let F : R2 ⇒ R2 be defined as   {x2 } + H (x2 ) F (x) := , {−x1 − x2 } + H (x1 ) (14) and consider the differential inclusion in (1). The candidate Lyapunov function V : R2 → R is defined as V (x) := 1/2 kxk2 . Since V ∈ C 1 R2 , R , the set-valued derivatives 2 ˙ V in [7] and Ṽ˙ in [6] are bounded by  V˙ (x) , Ṽ˙ (x) ≤ −x22 + x2 H (x1 ) + x1 H (x2 ) . (15) Corollary 2. Let 0 ∈ D and V ∈ Lip (D, R) be a positive definite function. Let F : Rn ⇒ Rn be locally bounded and outer semicontinuous [23, Definition 5.4] over D and let F (x) be nonempty, convex, and compact, ∀x ∈ D. If V˙ U (x) ≤ 0, ∀x ∈ D, and if for each ν > 0, no complete solution to (12) remains in the level set {x ∈ D | V (x) = ν}, then (12) is asymptotically stable at x = 0. In addition, if D = Rn and the sublevel sets {x ∈ Rn | V (x) ≤ l} are compact for all l ∈ R≥0 , then (12) is globally asymptotically stable at x = 0. That is, neither Ṽ˙ (x) nor V˙ (x) are negative semidefinite everywhere, and hence, the inequality in (15) is inconclusive. Let U : R2 → R be defined as in Example 2. The {U } −reduced differential inclusion corresponding to F is given by  F (x) |x1 | = 6 1 ∧ |x2 | = 6 1,    {0} × {−1} + − 1 , 1  x = 1 ∧ x = 0, 1 2 2  1 21  F̃{U } (x) =  {0} × {1} + − , x = −1 ∧ x2 = 0, 1  2 2   ∅ otherwise. Proof: To prove the corollary, it is first established that every complete solution converges to the origin, and then it is shown that all solutions are complete. Let x : R≥t0 → Rn be any complete solution to (12). Since t 7→ V (x (t)) is decreasing and bounded below, limt→∞ V (x (t)) = c for some c ≥ 0. For all y ∗ ∈ ω (x (·)), ∃ {ti }i∈N ⊂ R≥t0 , limi→∞ ti = ∞ such that limi→∞ x (ti ) = y ∗ . Since V is continuous, V (ω (x (·))) = {c}. If it can be shown that c = 0, then positive definiteness of V would imply that ω (x (·)) = {0}, and hence, limt→∞ x (t) = 0. To prove that c = 0 using contradiction, assume that there exists a complete solution x : R≥t0 → Rn such that c > 0. Let y : R≥t0 → Rn be a solution to (12) such that y (t) ∈ ω (x (·)) , ∀t ∈ R≥t0 . Such a solution exists since ω (x (·)) is weakly invariant. Along the solution y, V (y (t)) = c > 0, ∀t ∈ R≥t0 , which contradicts the hypothesis that no complete solution to (12) remains in the level set {x ∈ D | V (x) = ν} for any ν > 0. Therefore, c = 0 Select r > 0 such that B (0, r) ⊂ D and δ > 0 such that B (0, δ) ∈ Lβ := x ∈ B (0, r) | V (x) ≤ β , where β ∈ 0, minkxk=r V (x) . Lyapunov stability of (12) at x = 0 and the fact that Lβ is strongly forward invariant follows from Theorem 3. Since Lβ is compact, all solutions starting in Lβ are precompact, and hence, complete, by Lemma 1. Since all The {U } −generalized time derivative of V with respect to ẋ = F (x) is then given by   x1 x2 q, V˙ {U } (x) := max q∈F̃{U } (x) " #  h i  x 2   x1 x2    −x1 − x2    # "   h i   {0}  max 1 0   − 23 , − 12 =  " #   h i {0}     max −1 0  1 3      2, 2     −∞ ≤ |x1 | = 6 1 ∧ |x2 | = 6 1, x1 = 1 ∧ x2 = 0, x1 = −1 ∧ x2 = 0, otherwise, −x22 . In  this 2case, the set E in Corollary 1 is given by E = x ∈ R | x2 = 0 . Since the level sets Ll are bounded and connected, ∀l ∈ R≥0 , and since the largest invariant set contained within E ∩ Ll is {[0; 0]}, ∀l ∈ R≥0 , Corollary 1 can be invoked to conclude that all solutions to (12) converge to the origin. 8 From Theorem 2, V̇ (x (t) , t) ≤ −x22 (t) for almost all t ∈ R≥0 ; hence, given any ν > 0, a trajectory of (12) can remain on the level set {x √ ∈ Rn | V (x) = ν} if and only if x2 (t) = 0 and x1 (t) = ± 2ν, for all t ∈ R≥0 . From 1, √ Theorem  the state [x1 ; x2 ] can remain constant at ± 2ν; 0 for all  √  t ∈ R≥0 only if [0; 0] ∈ F ± 2ν; 0 , which is not true for the inclusion in (14). Therefore, Corollary 2 can be invoked to conclude that the system is globally asymptotically stable at x = 0. 4 if the sublevel sets {x ∈ Rn | W (x) ≤ c} are compact ∀c ∈ R≥0 , then (1) is globally uniformly asymptotically stable at x = 0. Proof: Select r > 0 such  that B (0, r) ⊂ D. Let x (·) ∈ St (Ωc × R ≥t0 ) where Ωc := x ∈ B (0, r) |W (x) ≤ c for some c ∈ 0, minkxk2 =r W (x) . Using Theorem 2 and [16, Lemma 2], V (x (t0 ) , t0 ) ≥ V (x (t) , t) , ∀t ∈ ID . (18) VIII. S TABILITY OF N ONAUTONOMOUS SYSTEMS Before stating the stability results for nonautonomous systems, the following definitions are stated. Definition 9. The differential inclusion in (1) is said to be (strongly) (a) uniformly stable at x = 0, if ∀ > 0 ∃δ > 0 such that if x (·) ∈ St B (0, δ) × R≥0 , then x (·) is complete and x (t) ∈ B (0, ), ∀t ≥ t0 . (b) globally uniformly stable at x = 0, if it is uniformly stable at x = 0 and ∀ > 0 ∃∆ > 0 such that if x (·) ∈ St B (0, ) × R≥0 , then x (·) is complete and x (t) ∈ B (0, ∆), ∀t ≥ t0 . (c) uniformly asymptotically stable at x = 0 if it is uniformly stable at x = 0 and ∃c > 0 such that  ∀ > 0 ∃T ≥ 0 such that if x (·) ∈ St B (0, c) × R≥0 , then x (·) is complete and x (t) ∈ B (0, ), ∀t ≥ t0 + T . (d) globally uniformly asymptotically stable at x = 0 if it is uniformly stable at x = 0 and ∀c,   > 0 ∃T ≥ 0 such that if x (·) ∈ St B (0, c) × R≥0 , then x (·) is complete and x (t) ∈ B (0, ), ∀t ≥ t0 + T . 4 While the results in this section are stated in terms of stability of the entire state at the origin and uniformity with respect to time, they extend in a straightforward manner to partial stability, uniformity with respect to a part of the state (see, e.g., [15, Definition 4.1]) and stability of arbitrary compact sets. A. Lyapunov stability In this section, a basic Lyapunov-based stability result is stated for nonautonomous differential inclusions. Theorem 5. Let 0 ∈ D and let Ω := D × R≥t0 . Let F : Rn × R≥t0 ⇒ Rn be a locally bounded set-valued map with nonempty and compact values that admits solutions over Ω. Let V ∈ Lip (Ω, R) be a positive definite function. If there exist positive definite functions W , W ∈ C 0 (D, R) such that W (x) ≤ V (x, t) ≤ W (x) , ∀ (x, t) ∈ Ω, ˙ V U (x, t) ≤ 0, ∀x ∈ D, and almost all t ∈ R≥t0 , (16) then (1) is uniformly stable at x = 0. In addition, if there exists a positive definite function W ∈ C 0 (D, R) such that V˙ U (x, t) ≤ −W (x) , Using (18) and arguments similar to [26, Theorem 4.8], it can be shown that all solutions x (·) ∈ St (Ωc × R≥t0 ) satisfy x (t) ∈ B (0, r) on every interval of their existence. Therefore, all solutions x (·) ∈ St (Ωc × R≥t0 ) are precompact, and hence, complete, by Lemma 1. Since W is continuous and positive definite, ∃δ > 0 such that B (0, δ) ⊂ Ωc . Since δ is independent of t0 , uniform stability of (1) at x = 0 is established. The rest of the proof is identical to [27, Section 5.3.2], and is therefore omitted. In the following example, tests based on V˙ and Ṽ˙ are inconclusive, but Theorem 5 can be invoked to conclude global uniform asymptotic stability of the origin. Example 4. Let H : R ⇒ R be defined as in Example 3 and let F : R2 × R≥t0 ⇒ R2 be defined as   {−x1 + x2 (1 + g (t))} + H (x2 ) F (x, t) = , {−x1 − x2 } + H (x1 ) where g ∈ C 1 (R≥t0 , R), 0 ≤ g (t) ≤ 1, ∀t ∈ R≥t0 and ġ (t) ≤ g (t) , ∀t ∈ R≥t0 . Consider the differential inclusion in (1) and the candidate Lyapunov function V : R2 × R≥t0 → R defined as V (x, t) := x21 + (1 + g (t)) x22 . the candidate Lyapunov 2 2 2 function satisfies kxk2 ≤ V (x, t) ≤ 2 kxk2 , ∀ (x,  t) ∈ R × 1 2 R≥t0 . In this case, since V ∈ C R × R≥t0 , R , similar to [26, Example 4.20], the set-valued derivatives V˙ in [7] and Ṽ˙ in [6] satisfy the bound  V˙ (x, t) , Ṽ˙ (x, t) ≤ −2x21 − 2x22 + 2x1 H (x2 ) + 2x2 h (t) H (x1 ) , (19) where h (t) := 1 + g (t) and the inequality 2 + 2g (t) − ġ (t) ≥ 2 is utilized. Therefore, neither Ṽ˙ (x, t) nor V˙ (x, t) can be shown to be negative semidefinite everywhere. The function U1 : R2 × R≥t0 → R, defined as (see Fig. 1) U1 (x, t) = max ((x1 − 1) , 0) − min ((x1 + 1) , 0) + max ((x2 − 1) , 0) − min ((x2 + 1) , 0) , (20) (17) ∀x ∈ D and for almost all t ∈ R≥t0 , then (1) is uniformly asymptotically stable at x = 0. Furthermore, if D = Rn and  ∀t ∈ R≥t0 , satisfies U1 ∈ Lip R2 × R≥t0 , R . In addition, since U1 is convex, it is also regular [24, Proposition 2.3.6]. 9 The Clarke gradient of U1 is given by, #) (" sgn 1 (x1 )    × {0} |x1 | = 6 1 ∧ |x2 | = 6 1,   sgn 1 (x2 )     # "    co {0, sgn (x1 )}   × {0} |x1 | = 1 ∧ |x2 | = 6 1,    {sgn 1 (x2 )} ∂U1 (x, t) = " #   {sgn 1 (x )} 1   × {0} |x1 | = 6 1 ∧ |x2 | = 1,    co {0, sgn (x2 )}    " #     co {0, sgn (x )} 1   × {0} |x1 | = 1 ∧ |x2 | = 1,  co {0, sgn (x2 )} where ‘sgn 1’ {U1 } −reduced F is given by was introduced in Example 2. The differential inclusion corresponding to ( F (x, t) |x1 | = 6 1 ∧ |x2 | = 6 1, F̃{U1 } (x, t) = ∅ otherwise. The {U1 } −generalized time derivative of V with respect to ẋ = F (x, t) is then given by  T ∂V V˙ {U1 } (x) := max (x, t) [q; 1] , q∈F̃{U1 } (x,t) ∂ (x, t)   T    2x1 −x1 + x2 h (t)   6 1∧  |x1 | =    2x2 h (t)  −x1 − x2  |x | = 1, = 2 6  ġ (t) x22 1    −∞ otherwise, 2 ≤ −2 kxk2 . Theorem 5 can then be invoked to conclude that ẋ ∈ F (x, t) is globally uniformly asymptotically stable at x = 0. 4 B. Invariance-like results In applications such as adaptive control, Lyapunov methods commonly result in semidefinite Lyapunov functions (i.e., candidate Lyapunov functions with time derivatives bounded by a negative semidefinite function of the state). The following theorem establishes the fact that if the function W in (17) is positive semidefinite then t 7→ W (x (t)) asymptotically decays to zero. Theorem 6. Let 0 ∈ D and let Ω := D × R≥t0 . Let F : Rn × R≥t0 ⇒ Rn be a set-valued map with nonempty and compact values that admits solutions over Ω. Let V ∈ Lip (Ω, R) be a positive definite function that satisfies (16) and (17) where W ∈ C 0 (D, R) is positive semidefinite. Select r > 0 such that B (0, r) ⊂ D. If F is locally bounded, uniformly in t, over Ω,5 then every solution x (·) ∈ St (Ωc × R≥t0 ), where Ωc :=  x ∈ B (0, r) | W (x) ≤ c and c ∈ 0, minkxk2 =r W (x) , is complete, bounded, and satisfies limt→∞ W (x (t)) = 0. Proof: Similar to the proof of [16, Corollary 1], it is established that the bounds on V˙ F in (7) and (8) imply 5 A set-valued map F : Rn × R n ≥0 ⇒ R is locally bounded, uniformly in t, over Ω, if for every compact K ⊂ D, there exists M > 0 such that ∀ (x, t, y) such that (x, t) ∈ K × R≥t0 , and y ∈ F (x, t), kyk2 ≤ M . that the cLf is nonincreasing along all the solutions to (1). The nonincreasing property of the cLf is used to establish boundedness of x (·), which is used to prove the existence and uniform continuity of complete solutions. Barbălat’s lemma [26, Lemma 8.2] is then used to conclude the proof. Let x (·) ∈ St (Ωc × R≥t0 ). Using Theorem 2 and [16, Lemma 2], V (x (t0 ) , t0 ) ≥ V (x (t) , t) , ∀t ∈ ID . (21) Using (21) and arguments similar to [26, Theorem 4.8], it can be shown that all solutions x (·) ∈ St (Ωc × R≥t0 ) satisfy x (t) ∈ B (0, r) on every interval of their existence. Therefore, all solutions x (·) ∈ St (Ωc × R≥t0 ) are precompact, and hence, complete, by Lemma 1. To establish uniform continuity of the solutions, it is observed that since F is locally bounded, uniformly in t, over Ω, and x (t) ∈ B (0, r) on R≥t0 , the map t 7→ F (x (t) , t) is uniformly bounded on R≥t0 . Hence, (2) implies that ẋ ∈ L∞ (R≥t0 ). Since t 7→ x (t) is locally absolutely continuous, ´t ∀t1 , t2 ∈ R≥t0 , kx (t2 ) − x (t1 )k2 = t12 ẋ (τ ) dτ . Since 2 ´t ´t ẋ ∈ L∞ , t12 ẋ (τ ) dτ ≤ t12 M dτ , where M is a positive 2 constant. Thus, kx (t2 ) − x (t1 )k2 ≤ M |t2 − t1 |, and hence, t 7→ x (t) is uniformly continuous on R≥t0 . Since x 7→ W (x) is continuous and B (0, r) is compact, x 7→ W (x) is uniformly continuous on B (0, r). Hence, t 7→ W (x´(t)) is uniformly continuous on R≥t0 . Furthert more, t 7→ t0 W (x (τ )) dτ is monotonically increasing and ´t from (17), t0 W (x (τ )) dτ ≤ V (x (t0 ) , t0 ) − V (x (t) , t) ´t ≤ V (x (t0 ) , t0 ). Hence, limt→∞ t0 W (x (τ )) dτ exists and is finite. By Barbălat’s Lemma [26, Lemma 8.2], limt→∞ W (x (t)) = 0. In the following example V˙ and Ṽ˙ do not have a negative semidefinite upper bound, but Theorem 6 can be invoked to conclude partial stability. Example 5. Let H : R ⇒ R be defined as in Example 3 and let F : R2 × R≥t0 ⇒ R2 be defined as F (x, t) =   {x2 (1 + g (t))} + H (x2 ) , {−x1 − x2 } + H (x1 ) where g ∈ C 1 (R≥t0 , R), 0 ≤ g (t) ≤ 1, ∀t ∈ R≥t0 and ġ (t) ≤ g (t) , ∀t ∈ R≥t0 . Consider the differential inclusion in (1) and the candidate Lyapunov function V : R2 × R≥t0 → R defined as V (x, t) := x21 + (1 + g (t)) x22 . The candidate Lyapunov 2 2 2 function satisfies kxk2 ≤ V (x, t) ≤ 2 kxk2 , ∀ (x, t)  ∈R × 1 2 R≥t0 . In this case, since V ∈ C R × R≥t0 , R , the setvalued derivatives V˙ in [7] and Ṽ˙ in [6] are bounded by  V˙ (x, t) , Ṽ˙ (x, t) ≤ −2x22 + 2x2 h (t) H (x1 ) + 2x1 H (x2 ) , (22) where h (t) := 1+g (t) and the inequality 2+2g (t)− ġ (t) ≥ 2 is utilized. Thus, neither Ṽ˙ nor V˙ are negative semidefinite everywhere. 10 Let U1 be defined as in (20). The {U1 } −reduced differential inclusion corresponding to F is given by  F (x, t) |x1 | 6= 1 ∧ |x2 | 6= 1,    {0}× {−1}+ − 1 , 1  x = 1 ∧ x = 0, 1 2 2  1 21  F̃{U1} (x, t) =  {0}× {1}+ − , x = −1 ∧ x2 = 0, 1  2 2   ∅ otherwise. The {U1 } −generalized time derivative of V with respect to ẋ = F (x, t) is then given by  T ∂V ˙ V {U1 } (x, t) := max (x, t) [q; 1] , q∈F̃{U1 } (x,t) ∂ (x, t)   T   x2 h (t) 2x1    |x1 | = 6 1∧       2x2 h (t) −x1 − x2   |x | = 6 1,  2   ġ (t) x22 1           h i  {0}     x1 = 1∧ max 2 0 0   32 , − 12  x = 0, 2 = 1          {0}  h i   x1 = −1∧     max −2 0 0  21 , 32    x2 = 0,    1      −∞ otherwise, ≤ −2x22 . Theorem 6 can then be invoked to conclude that t 7→ x1 (t) ∈ L∞ (R≥t0 , R) and limt→∞ x2 (t) = 0. 4 Theorem 6 and its counterparts are widely used in applications such as adaptive control to establish boundedness of the system and convergence of the state to the origin. However, since Theorem 6 is a partial stability result, it generally cannot be used to establish convergence of the parameter estimates to their true values. Under certain excitation conditions, parameter convergence can be established using auxiliary functions [18]. Theorems that rely on such auxiliary functions fall under the umbrella of Matrosov theorems, named after the seminal work in [17]. The following section focuses on Matrosov theorems. C. Matrosov theorems In this section, a less conservative generalization of Matrosov results for uniform asymptotic stability of nonautonomous systems is developed. In particular, the nonsmooth version [21, Theorem 1] of the nested Matrosov theorem [18, Theorem 1] is generalized. The following definitions of Matrosov functions are inspired by [21]. Definition 10. Let γ, δ, ∆ > 0 be constants. A finite set  M of functions {Yj }j=1 ⊂ C 0 B (0m , γ) × D (δ, ∆) , R is said to have the Matrosov property relative to (γ, δ, ∆) if ∀j ∈ {0, · · · , M },  (z, x) ∈ B (0m , γ) × D (δ, ∆) ∧ (Yi (z, x) = 0, ∀i ∈ {0, · · · , j}) =⇒ Yj+1 (z, x) ≤ 0, where Y0 (z, x) = 0 and YM +1 (z, x) = 1, ∀ (z, x) ∈ B (0m , γ) × D (δ, ∆). 4 Definition 11. Let Ω := D × R≥t0 and let δ, ∆ > 0 be constants such that D (δ, ∆) ⊂ D. Let F : Rn × R≥t0 ⇒ Rn be a set-valued map with nonempty and compact values. The M functions {Wj }j=1 ⊂ Lip (Ω, R) are said to be Matrosov functions for (F, δ, ∆) if ∃φ : Ω → Rm , γ > 0, and M {Yj }j=1 ⊂ C 0 B (0m , γ) × D (δ, ∆) , R such that M (a) The set of functions {Yj }j=1 has the Matrosov property relative to (γ, δ, ∆), (b) ∀j ∈ {1, · · · , M } and ∀ (x, t) ∈ D (δ, ∆) × R≥t0 , max {|Wj (x, t)| , |φ (x, t)|} ≤ γ, (c) ∀j ∈ {1, · · · , M } there exists a collection of regular functions Uj ⊂ Lip (D (δ, ∆) × R≥t0 , R) such ˙ (x, t) ≤ that ∀ (x, t) ∈ D (δ, ∆) × R≥t0 , W Uj Yj (φ (x, t) , x) 4 The following technical Lemmas aid the proof of the Matrosov theorem. Lemma 2. Given δ > 0, ∃ > 0 such that  (z, x) ∈ B (0m , γ) × D (δ, ∆) ∧ (Yj (z, x) = 0, ∀j ∈ {1, · · · , M − 1}) =⇒ YM (z, x) ≤ −. Proof: See [18, Claim 1]. Lemma 3. Let l ∈ {2, · · · , M }, ˜ > 0, and Ỹl ∈ C 0 (Rm × Rn , R). If  (z, x) ∈ B (0m , γ) × D (δ, ∆) ∧ (Yj (z, x) = 0, ∀j ∈ {1, · · · , l − 1}) =⇒ Ỹl (z, x) ≤ −˜ , then ∃Kl−1 > 0 such that  (z, x) ∈ B (0m , γ) × D (δ, ∆) ∧ (Yj (z, x) = 0, ∀j ∈ {1, · · · , l − 2}) =⇒ ˜ Kl−1 Yl−1 (z, x) + Ỹl (z, x) ≤ − . 2 Proof: See [18, Claim 2] The Matrosov theorem can now be stated as follows. Theorem 7. Let 0 ∈ D and let F : Rn × R≥t0 ⇒ Rn be a set-valued map with nonempty and compact values such that (1) is uniformly stable at x = 0. If for each pair of numbers δ, ∆ ∈ R, such that 0 ≤ δ ≤ ∆ and D (δ, ∆) ⊂ D, there exist Matrosov functions for (F, δ, ∆), then (1) is uniformly asymptotically stable at x = 0. If D = Rn and if (1) is uniformly globally stable at x = 0 then (1) is uniformly globally asymptotically stable at x = 0. Proof: Select ∆ > 0 such that B (0, ∆) ⊂ D and let r > 0 be such that x (·) ∈ St B (0, r) × R≥0 =⇒ x (t) ∈ B (0, ∆), ∀t ≥ t0 . Let  ∈ (0, r) and select δ > 0 such that x (·) ∈ St B (0, δ) × R≥0 =⇒ x (t) ∈ B (0, ), ∀t ≥ t0 . By repeated application of Lemmas 2 and 3 it can be shown that ∀δ > 0, ∃ζ > 0 and K1 , · · · , KM −1 > 0 such that ∀ (z, x) ∈ B (0m , γ) × D (δ, ∆), Z (z, x) := M −1 X j=1 Kj Yj (z, x) + YM (z, x) ≤ − ζ 2M −1 . (23) 11 Let W ∈ Lip (Ω, R) be defined as W (x, t) := M −1 X Kj Wj (x, t) + WM (x, t) . j=1 From Definition 11.b,  |V (x, t)| ≤ γ 1 + M −1 X  Kj  =: η. (24) j=1 Fix (x0 , t0 ) ∈ B (0, r) × R≥0 and x (·) ∈ St ({(x0 , t0 )}). The solution x (·) satisfies x (t) ∈ B (0, ∆), ∀t ∈ R≥t0 . From Definition 11.c, V˙ Uj (x, t) ≤ Z (φ (x, t) , x), ∀ (x, t) ∈ D (δ, ∆) × R≥t0 , and hence, from Theorem 2, V̇ (x (t) , t) ≤ Z (φ (x (t) , t) , x (t)) , for almost all t ∈ x (23), −1 (25) Fig. 2. The function U2 . (D (δ, ∆)). Using Definition 11.b and Z (φ (x (t) , t) , x (t)) ≤ − ζ , 2M −1 (26) for almost all t ∈ x−1 (D (δ, ∆)). M Let T > 2 ζ η . The claim is that kx (t)k ≤ , ∀t ≥ t0 + T . If not, then x (t) ∈ D (δ, ∆), ∀t ∈ [t0 , t0 + T ]. Hence, from (25) and (26), ζ V̇ (x (t) , t) ≤ − M −1 , (27) 2 for almost all t ∈ [t0 , t0 + T ]. Integrating (27) and using Tζ the bound in (24), 2M ≤ 2η, which contradicts T > −1 2M η (0, r), ∃T > 0 such that x (·) ∈ ζ . Hence, ∀ ∈  St B (0, r) × R≥0 =⇒ kx (t)k < , ∀t ≥ t0 + T , i.e., (1) is uniformly asymptotically stable at x = 0. If D = Rn and if (1) is uniformly globally stable at x = 0 then r can be selected arbitrarily large, and hence, the result is global Example 6. Let H : R ⇒ R be defined as in Example 3 and let F : R2 × R≥t0 ⇒ R2 be defined as in Example 5. Let U1 be defined as in (20). Let W1 : R2 × R≥t0 → R be defined as W1 (x, t) := x21 + (1 + g (t)) x22 . It follows that W˙ 1{U1 } (x, t) ≤ −2x22 , ∀x ∈ R2 , and uniform global stability of (1) at x = 0 can be concluded from Theorem 5. Let φ (x, t) = 0, ∀ (x, t) ∈ R2 × R≥t0 and let Y1 (z, x) := −2x22 , ∀ (z, x) ∈ R × R2 . Let W2 (x, t) := x1 x2 . The function U2 : R2 × R≥t0 → R, defined as (see Fig. 2)   |x1 | > |x2 | ∧ x ∈ Sq, |x1 | U2 (x, t) = |x2 | |x1 | ≤ |x2 | ∧ x ∈ Sq,   1 + U ∗ (x, t) x ∈ / Sq, ∀t ∈ R≥t0 , where U ∗ (x, t) = max ((2x1 − 2) , 0) − min ((2x1 + 2) , 0) + max ((2x2 − 2) , 0) − min ((2x2 + 2) , 0), ∀t ∈ R≥t0 and ’Sq’ denotes the open unit square  centered at the origin, satisfies U2 ∈ Lip R2 × R≥t0 , R . In addition, since U2 is convex, it is also regular [24, Proposition 2.3.6]. of U2 is given by (" #)  2 sgn 1 (x )  1  × {0}    2 sgn 1 (x2 )     " #   co {0, 2 sgn (x )} 1 ∂U2 (x, t) = ×{0}    {2 sgn 1 (x2 )}  " #     {2 sgn 1 (x )} 1   ×{0}   co {0, 2 sgn (x2 )} The Clarke gradient |x1 | = 6 1 ∧ |x2 | = 6 1, |x1 | = 1 ∧ |x2 | = 6 1, |x1 | = 6 1 ∧ |x2 | = 1, if x ∈ / Sq, # " [−1, 1]    × {0} |x1 | = 0 ∧ |x2 | = 0,    [−1, 1]    " #    sgn (x )  1  × {0} |x1 | > |x2 | ,    {0} ∂U2 (x, t) = " #   {0}   × {0} |x1 | < |x2 | ,     sgn (x2 )   #  "   co {0, sgn (x )} 1   × {0} |x1 | = |x2 | > 0,  co {0, sgn (x2 )} if x ∈ Sq, and  ( )  sgn 1 (x ) , 1   co        ( 2 sgn 1 (x1 )) × {0} |x1 | = 6 |x2 | ,     sgn 1 (x2 ) ,      co    2 sgn 1 (x2 ) ∂U2 (x, t) =  ( )   sgn (x1 ) ,   co      2 sgn (x1 ) , 0     × {0} |x1 | = |x2 | ,  ( )    sgn (x2 ) ,        co 2 sgn (x ) , 0 2 12 if x ∈ ∂Sq. The {U2 } −reduced differential inclusion corresponding to F is given by  6 1 ∧ |x2 | = 6 1, F (x, t) x ∈ / Sq ∧ |x1 | =    F (x, t) x ∈ Sq ∧ |x | = |x2 | , 1 6 F̃{U2 } (x, t) =  {0} x ∈ Sq ∧ |x | = 0 ∧ |x2 | = 0, 1    ∅ otherwise. The {U2 } −generalized derivative of W2 is      T     x2 h (t) x2         x1  −x1 − x2       1  0 ˙ W2{U2 } (x, t) =         0         −∞ then given by x∈ / Sq∧ |x1 | = 6 1∧ |x2 | = 6 1∨ x ∈ Sq∧ |x1 | = 6 |x2 | , x ∈ Sq∧ |x1 | = 0∧ |x2 | = 0, otherwise. ˙ 2 2 That is, W 2{U2 } (x, t) ≤ −x1 − x2 x1 + 2x2 . If Y2 (z, x) := 2 2 2 −x1 − x2 x1 + 2x2 , ∀ (z, x) ∈ R × R , then the functions {Y1 , Y2 } have the Matrosov  property. Furthermore, since W1 , W2 ∈ C 0 R2 × R≥t0 , R , ∀0 < δ < ∆, ∃γ > 0 such that |W (x, t)| ≤ γ, ∀ (x, t) ∈ D (δ, ∆) × R≥t0 . Hence, {W1 , W2 } are Matrosov functions for (F, δ, ∆), ∀0 < δ < ∆. Hence, by Theorem 7, ẋ ∈ F (x, t) is uniformly globally asymptotically stable at x = 0. IX. C ONCLUSION This paper demonstrates that locally Lipschitz regular functions can be used to identify infeasible directions in differential inclusions. The infeasible directions can then be removed to yield a point-wise smaller (in the sense of set containment) equivalent differential inclusion. The reduction process is utilized to develop a novel generalization of the set-valued derivative for locally Lipschitz candidate Lyapunov functions. Less conservative statements of Lyapunov stability and invariancelike results for differential inclusions are developed based on the reduction using locally Lipschitz regular functions. The fact that arbitrary locally Lipschitz regular functions can be used to reduce differential inclusions to smaller sets of admissible directions indicates that there may be a smallest set of admissible directions corresponding to each differential inclusion. Further research is needed to establish the existence of such a set and to find a representation of it that facilitates computation. R EFERENCES [1] A. F. Filippov, Differential equations with discontinuous right-hand sides. Kluwer Academic Publishers, 1988. [2] N. N. Krasovskii and A. I. Subbotin, Game-theoretical control problems. New York: Springer-Verlag, 1988. [3] E. Roxin, “Stability in general control systems,” J. Differ. Equ., vol. 1, no. 2, pp. 115–150, 1965. [4] B. E. Paden and S. S. Sastry, “A calculus for computing Filippov’s differential inclusion with application to the variable structure control of robot manipulators,” IEEE Trans. Circuits Syst., vol. 34, no. 1, pp. 73–82, Jan. 1987. [5] J. P. Aubin and A. Cellina, Differential inclusions. Springer, Berlin, 1984. [6] D. Shevitz and B. Paden, “Lyapunov stability theory of nonsmooth systems,” IEEE Trans. Autom. Control, vol. 39 no. 9, pp. 1910–1914, 1994. [7] A. Bacciotti and F. Ceragioli, “Stability and stabilization of discontinuous systems and nonsmooth Lyapunov functions,” ESAIM Control Optim. Calc. Var., vol. 4, pp. 361–376, 1999. [8] Q. Hui, W. Haddad, and S. Bhat, “Semistability, finite-time stability, differential inclusions, and discontinuous dynamical systems having a continuum of equilibria,” IEEE Trans. Autom. Control, vol. 54, no. 10, pp. 2465–2470, Oct. 2009. [9] F. M. Ceragioli, “Discontinuous ordinary differential equations and stabilization,” Ph.D. dissertation, Universita di Firenze, Italy, 1999. [10] A. N. Michel and K. Wang, Qualitative theory of dynamical systems, the role of stability preserving mappings. New York: Marcel Dekker, 1995. [11] E. Moulay and W. Perruquetti, “Finite time stability of differential inclusions,” IMA J. Math. Control Info., vol. 22, pp. 465–275, 2005. [12] E. Ryan, “An integral invariance principle for differential inclusions with applications in adaptive control,” SIAM J. Control Optim., vol. 36, no. 3, pp. 960–980, 1998. [13] H. Logemann and E. Ryan, “Asymptotic behaviour of nonlinear systems,” Amer. Math. Month., vol. 111, pp. 864–889, 2004. [14] A. Bacciotti and L. Mazzi, “An invariance principle for nonlinear switched systems,” Syst. Control Lett., vol. 54, pp. 1109–1119, 2005. [15] W. M. Haddad, V. Chellaboina, and S. G. Nersesov, Impulsive and hybrid dynamical systems. Princeton Series in Applied Mathematics, 2006. [16] N. Fischer, R. Kamalapurkar, and W. E. Dixon, “LaSalle-Yoshizawa corollaries for nonsmooth systems,” IEEE Trans. Autom. Control, vol. 58, no. 9, pp. 2333–2338, Sep. 2013. [17] V. M. Matrosov, “On the stability of motion,” J. Appl. Math. Mech., vol. 26, pp. 1337–1353, 1962. [18] A. Lorı́a, E. Panteley, D. Popovic, and A. R. Teel, “A nested Matrosov theorem and persistency of excitation for uniform convergence in stable nonautonomous systems,” IEEE Trans. Autom. Control, vol. 50, no. 2, pp. 183–198, 2005. [19] R. Sanfelice and A. R. Teel, “Asymptotic stability in hybrid systems via nested Matrosov functions,” IEEE Trans. Autom. Control, vol. 54, no. 7, pp. 1569–1574, Jul. 2009. [20] B. Paden and R. Panja, “Globally asymptotically stable ’PD+’ controller for robot manipulators,” Int. J. Control, vol. 47, no. 6, pp. 1697–1712, 1988. [21] A. R. Teel, D. Nešić, T.-C. Lee, and Y. Tan, “A refinement of Matrosov’s theorem for differential inclusions,” Automatica, vol. 68, pp. 378–383, 2016. [22] E. Ryan, “Discontinuous feedback and universal adaptive stabilization,” in Control of Uncertain systems. Springer, 1990, pp. 245–258. [23] R. T. Rockafellar and R. J.-B. Wets, Variational analysis. Springer Science & Business Media, 2009, vol. 317. [24] F. H. Clarke, Optimization and nonsmooth analysis. SIAM, 1990. [25] J. J. Moreau and M. Valadier, “A chain rule involving vector functions of bounded variation,” J. Funct. Anal., vol. 74, no. 2, pp. 333–345, 1987. [26] H. K. Khalil, Nonlinear systems, 3rd ed. Upper Saddle River, NJ: Prentice Hall, 2002. [27] M. Vidyasagar, Nonlinear systems analysis, 2nd ed. SIAM, 2002. [28] J. Alvarez, Y. Orlov, and L. Acho, “An invariance principle for discontinuous dynamic systems with applications to a Coulomb friction oscillator,” ASME J. Dyn. Syst. Meas. Control, vol. 74, pp. 190–198, 2000. 13 Rushikesh Kamalapurkar received his M.S. and Ph.D. degrees in 2011 and 2014, respectively, from the Mechanical and Aerospace Engineering Department at the University of Florida. After working for a year as a postdoctoral research fellow with Dr. Warren E. Dixon, he was selected as the 201516 MAE postdoctoral teaching fellow. In 2016 he joined the School of Mechanical and Aerospace Engineering at the Oklahoma State University as an Assistant professor. His primary research interest has been intelligent, learning-based optimal control of uncertain nonlinear dynamical systems. He has published 3 book chapters, 18 peer reviewed journal papers and 19 peer reviewed conference papers. His work has been recognized by the 2015 University of Florida Department of Mechanical and Aerospace Engineering Best Dissertation Award, and the 2014 University of Florida Department of Mechanical and Aerospace Engineering Outstanding Graduate Research Award. Warren E. Dixon received his Ph.D. in 2000 from the Department of Electrical and Computer Engineering from Clemson University. He worked as a research staff member and Eugene P. Wigner Fellow at Oak Ridge National Laboratory (ORNL) until 2004, when he joined the University of Florida in the Mechanical and Aerospace Engineering Department. His main research interest has been the development and application of Lyapunov-based control techniques for uncertain nonlinear systems. His work has been recognized by the 2015 & 2009 American Automatic Control Council (AACC) O. Hugo Schuck (Best Paper) Award, the 2013 Fred Ellersick Award for Best Overall MILCOM Paper, a 2012-2013 University of Florida College of Engineering Doctoral Dissertation Mentoring Award, the 2011 American Society of Mechanical Engineers (ASME) Dynamics Systems and Control Division Outstanding Young Investigator Award, the 2006 IEEE Robotics and Automation Society (RAS) Early Academic Career Award, an NSF CAREER Award, the 2004 Department of Energy Outstanding Mentor Award, and the 2001 ORNL Early Career Award for Engineering Achievement. He is a Fellow of both ASME and IEEE, an IEEE Control Systems Society (CSS) Distinguished Lecturer, and served as the Director of Operations for the Executive Committee of the IEEE CSS Board of Governors (2012-2015). He was awarded the Air Force Commander’s Public Service Award (2016) for his contributions to the U.S. Air Force Science Advisory Board. He is currently or formerly an associate editor for ASME Journal of Journal of Dynamic Systems, Measurement and Control, Automatica, IEEE Transactions on Systems Man and Cybernetics: Part B Cybernetics, and the International Journal of Robust and Nonlinear Control. Andrew R. Teel received his A.B. degree in Engineering Sciences from Dartmouth College in Hanover, New Hampshire, in 1987, and his M.S. and Ph.D. degrees in Electrical Engineering from the University of California, Berkeley, in 1989 and 1992, respectively. After receiving his Ph.D., he was a postdoctoral fellow at the Ecole des Mines de Paris in Fontainebleau, France. In 1992 he joined the faculty of the Electrical Engineering Department at the University of Minnesota, where he was an assistant professor until 1997. Subsequently, he joined the faculty of the Electrical and Computer Engineering Department at the University of California, Santa Barbara, where he is currently a Distinguished Professor and director of the Center for Control, Dynamical systems, and Computation. His research interests are in nonlinear and hybrid dynamical systems, with a focus on stability analysis and control design. He has received NSF Research Initiation and CAREER Awards, the 1998 IEEE Leon K. Kirchmayer Prize Paper Award, the 1998 George S. Axelby Outstanding Paper Award, and was the recipient of the first SIAM Control and Systems Theory Prize in 1998. He was the recipient of the 1999 Donald P. Eckman Award and the 2001 O. Hugo Schuck Best Paper Award, both given by the American Automatic Control Council, and also received the 2010 IEEE Control Systems Magazine Outstanding Paper Award. In 2016, he received the Certificate of Excellent Achievements from the IFAC Technical Committee on Nonlinear Control Systems. He is Editor-in-Chief for Automatica, and a Fellow of the IEEE and of IFAC.
3cs.SY
An Algorithmic Framework for Labeling Network Maps? Jan-Henrik Haunert1 and Benjamin Niedermann2 1 arXiv:1505.00164v2 [cs.CG] 30 Dec 2015 2 University of Osnabrück, Germany Karlsruhe Institute of Technology, Germany Abstract. Drawing network maps automatically comprises two challenging steps, namely laying out the map and placing non-overlapping labels. In this paper we tackle the problem of labeling an already existing network map considering the application of metro maps. We present a flexible and versatile labeling model that subsumes different labeling styles. We show that labeling a single line of the network is NP-hard, even if we make very restricting assumptions about the labeling style that is used with this model. For a restricted variant of that model, we then introduce an efficient algorithm that optimally labels a single line with respect to a given cost function. Based on that algorithm, we present a general and sophisticated workflow for multiple metro lines, which is experimentally evaluated on real-world metro maps. 1 Introduction Label placement and geographic network visualization are classical problems in cartography, which independently of each other have received the attention of computer scientists. Label placement usually deals with annotating point, line or area features of interest in a map with text labels such that the associations between the features and the labels are clear and the map is kept legible [8]. Geographic network visualization, on the other hand, often aims at a geometrically distorted representation of reality that allows information about connectivity, travel times, and required navigation actions to be retrieved easily. Computing a good network visualization is thus related to finding a layout of a graph with certain favorable properties [15]. For example, to avoid visual clutter in metro maps, an octilinear graph layout is often chosen, in which the orientation of each edge is a multiple of 45◦ [11,12,14]. Alternatively, one may choose a curvilinear graph layout, that is, to display the metro lines as curves [5,13]. Computing a graph layout for a metro map and labeling the stops have been considered as two different problems that can be solved in succession [14], but also integrated solutions have been suggested [11,12]. Nevertheless, in practice, metro maps are often drawn manually by cartographers or designers, as the existing algorithms do not achieve results of sufficient quality in adequate time. For example, Nöllenburg and Wolff [11] report that their method needed 10 hours and 31 minutes to compute a labeled metro map of Sydney that they present in their article, while an unlabeled map for the same instance was obtained after 23 minutes—both results were obtained without proof of optimality but with similar optimality gaps. On the other hand Wang and Chi [14] present an algorithm that creates the graph layout and labeling within one second, but they cannot guarantee that labels do not overlap each other or the metro lines. An integrated approach to computing a graph layout and labeling the stops allows consideration to be given to all quality criteria of the final visualization. On the other hand, treating both problems separately will probably reduce computation time. Moreover, we consider the labeling of a metro map as an interesting problem on its own, since, in some situations, the layout of the network is given as part of the input and must not be changed. In a semi-automatic workflow, for example, a cartographer may want to draw or alter a graph layout manually before using an automatic method to place labels, ? A preliminary version of this paper has appeared in Proc. 21st Int. Conf. on Computing Combinatorics (COCOON’15), volume 9198 of Lect. Notes Comput. Sci., pages 689–700, Springer-Verlag. This research was initiated during Dagstuhl Seminar 13151 “Drawing Graphs and Maps with Curves” in April 2013 probably to test multiple different labeling styles with the drawing. Hence, a labeling algorithm is needed that is rather flexible in dealing with different labeling styles. In this paper, we are given the layout of a metro map consisting of several metro lines on which stops (also called stations) are located. For each stop we are further given its name, which should be placed close to its position. We first introduce a versatile and general model for labeling metro maps; see Section 2. Like many labeling algorithms for point sets [1,3,6], our algorithm uses a discrete set of candidate labels for each point. Often, each label is represented by a rectangle wrapping the text. Since we also want to use curved labels, however, we represent a label by a simple polygon that approximates a fat curve, that is, a curve of certain width reflecting the text height. We then prove that even in that simple model labeling a single metro line is NP-hard considering different labeling styles. Hence, we restrict the set of candidates satisfying certain properties, which allows us to solve the problem on one metro line C in O(n2 ) time, where n is the number of stops of C; see Section 4. This algorithm optimizes the labeling with respect to a cost function that is based on Imhof’s [8] classical criteria of cartographic quality. Utilizing that algorithm, we present an efficient heuristic for labeling a metro map consisting of multiple metro lines; see Section 6. Our method is similar to the heuristic presented by Kakoulis and Tollis [9], in the sense that it discards some label candidates to establish a set of preconditions that allow for an efficient exact solution. Our model of quality is more general than the one of Kakoulis and Tollis, however, as it not only takes the quality of individual labels but also the quality of pairs of labels for consecutive metro stations into account. Finally, we evaluate our approach presenting experiments conducted on realistic metro maps; see Section 8. Note that “stops” on “metro lines” can refer more generally to points of interest on the lines of any kind of a network map. We address labeling styles for octilinear graph layouts and curvilinear graph layouts that use Bézier curves. The more general model behind our method, however, subsumes but is not limited to these particular styles. 2 Labeling Model We assume that the metro lines are given by directed, non-self-intersecting curves in the plane described by polylines, which for example have been derived by approximating Bézier curves. We denote that set of metro lines by M. Further, the stops of each metro line C ∈ M are given by an ordered set SC of points on C going from the beginning to the end of C. For two stops s, s0 ∈ SC we write s < s0 if s lies before s0 . We denote the union of the stops among all metro lines by S and call the pair (M, S) a metro map. For each stop s ∈ S we are further given a name that should be placed close to it. In contrast to previous work, we do not follow traditional map labeling abstracting from the given text by bounding boxes. Instead we model a label ` of a stop s ∈ S as a simple polygon. For example, a label could have been derived by approximating a fat curve prescribing the name of the stop;Ssee Fig. 1. For each stop s we are given a set Ks of labels, which we also call candidates of s. The set s∈S Ks is denoted by K. Since “names should disturb other map content as little as possible”[8], we strictly forbid overlaps between labels and lines as well as label-label overlaps. Further, each stop must be labeled. Hence, a set L ⊆ K is called a labeling if (1) no two labels of L intersect each other, (2) no label ` ∈ L intersects any metro line C ∈ M, and (3) for each stop s ∈ S there is exactly one label ` ∈ L ∩ Ks . Definition 1 (MetroMapLabeling). Given: Metro map (M, S), candidates K and cost function w : 2K → R+ . Find, if it exists: Optimal labeling L of (M, S, K, w), i.e., w(L) ≤ w(L0 ) for any labeling L0 ⊆ K. The model allows us to create arbitrarily shaped label candidates for a metro map. In our evaluation we have considered two different labeling styles. The first style, OctilinStyle, creates for each stop a set of octilinear rectangles as label candidates; see Fig. 2. We use that style for octilinear maps. The second style, CurvedStyle, creates for each stop a set of fat Bézier curves as label candidates, which are then approximated by simple polygons; see Fig. 1. We use that style for curvilinear metro maps, lm n L−1 { 1 2 v2 v1 { 1 2 v1 p2 `τ p3 v2 bτ L1 lm 2 lm 4 p4 s C n p1 C (a) (b) Fig. 1: Construction of curved candidates. (a) Construction of a single label. (b) Candidates Ks = L1 ∪ L−1 for stop s. in order to adapt the curvilinear style of the metro map. The basic idea is that a label perpendicularly emanates from a stop with respect to its metro line and then becomes horizontal to sustain legibility. In the following section we motivate our choice of candidates based on cartographic criteria and give detailed technical descriptions for both labeling styles. 2.1 Two Examples of Labeling Styles We extracted the rules for generating label candidates from Imhof’s “general principles and requirements” for map labeling [8]. For schematic network maps, the need for “legibility” implies that we must not destroy the underlying design principle with clutter. To this end, we generate candidate labels that adhere to the schematics of the network. That is, we use straight horizontal and diagonal labels with octilinear layouts and curved labels with curvilinear layouts. We now describe more precisely, how we defined the labeling styles CurvedStyle and OctilinStyle, which are used for curvilinear layouts and octilinear layouts, respectively. Curvilinear Metro Maps. For CurvedStyle, assume that the given metro map is curvilinear. In order to achieve a “clear graphic association” between a label and the corresponding point p, we construct the simple polygon prescribing a candidate label based on a curve ` (possibly a straight-line segment) that emanates from p. The candidate label itself is a continuous section of ` that does not directly start in p but at a certain configurable distance from it. We define the end of the candidate label on ` based on the text length and assign a non-zero width to the curve section to represent the text height. In the case that p lies on a single curved line C, we require that ` and C are perpendicular in p to enhance the angular resolution of the final drawing. By bending ` towards the horizontal direction, we avoid steep labels. We approximate ` by a simple polygon consisting of a constant number of line segments. We now describe the construction of a single candidate more specifically. For each stop s of each metro line C we create a constant number of curved labels adapting the curvilinear style of the metro map. The basic idea is that a label perpendicularly emanates from s with respect to C and then becomes horizontal to sustain legibility; see Fig. 1. Let n = (nx , ny ) be the normalized normal vector of C at s. Further, let d ∈ {−1, 1} and c1 , c2 ∈ R+ be pre-defined constants. For τ = (c1 , c2 , d) we define the fat cubic Bézier curve bτ by the following four control points; see Fig. 1. p1 = s, p2 = s + 0.5 · v 1 , p3 = s + v 1 + 0.5 · v 2 , p4 = s + v 1 + v 2 , where v 1 = c1 · n, v 2 = sgn(n) · (d · c2 , 0), and sgn(n) = 1 if nx > 0 and sgn(n) = −1 otherwise. We define the thickness of bτ to be the predefined height of a label. Let `τ be the sub-curve of bτ that starts at p1 and has the length of the name of s and let `0τ be the curve when mirroring `τ at s. Further, let lm be the length of the longest name of lm a stop in S and let Ld = {`τ , `0τ | τ ∈ {(lm , lm , d), ( lm 2 , lm , d), ( 4 , lm , d)}}. If n has an orientation less ◦ than or equal to 60 , we set Ks = L1 and otherwise Ks = L1 ∪L−1 . Hence, if n is almost vertical and C `5 `3 `03 `05 `05 `4 `2 p `1 s l 0 `1 `02 (a) `04 `2 `01 `0 2 p s (b) `1 l l `1 s `03 `3 `2 `02 (c) l l0 l0 s l0 l s l s (d) (e) (f) Fig. 2: Construction of octilinear candidates for a stop s. (a) s lies on a horizontal segment. (b) s lies on a diagonal segment. (c) s lies on a vertical segment. (d) s lies on a crossing of two diagonal segments l and l0 . (e) s lies on a crossing of a vertical and horizontal segment. (f) s lies on a crossing of a vertical and diagonal segment. is therefore almost horizontal at s, we also add the labels L−1 pointing into the opposite x-direction than n. In our experiments we did not let the labels start at s, but with a certain offset to s, in order to avoid intersections with C. Octilinear Metro Maps. For OctilinStyle assume that the metro map is octilinear. We model the labels as horizontal and diagonal rectangles. Let l be the line segment of C on which s lies and let R be an axis-aligned rectangle that is the bounding box of the name of s. Further, let c be a circle around s with a pre-defined radius. We place the labels such that they touch the border of c, but they do not intersect the interior of c. Hence, the labels have a pre-defined offset to s. If l is horizontal, we place five copies `1 , . . . , `5 of R above l as follows; see Fig. 2(a). We place `1 , `2 and `3 such that the left-bottom corner of `1 , the midpoint of `2 ’s bottom edge and the right-bottom corner of `3 coincides with the topmost point of c. We rotate `4 by 45◦ counterclockwise and place it at c such that the midpoint of its left side touches c, i.e., that midpoint lies on a diagonal through s. Finally, `5 is obtained by mirroring `4 at the vertical line through s. Mirroring `1 , . . . , `5 at the horizontal line through s, we obtain the rectangles `01 , . . . , `05 , respectively. We then set Ks = {`i , `0i | 1 ≤ i ≤ 5}. If l is diagonal, we create the candidates in the same manner as in the case that l is horizontal; see Fig. 2(b). However, we only create the candidates `2 and `02 and the candidates that are horizontally aligned. If l is vertical, we place three copies `1 , . . . , `3 of R to the right of l as follows; see Fig. 2(c). We rotate `1 by 45◦ counterclockwise and `2 by 45◦ clockwise. We place `1 , `2 , `3 at c such that the midpoints of their left edges touch c. Mirroring `1 , `2 , `3 at the vertical line through s, defines the rectangles `01 , `02 and `03 . We set Ks = {`i , `0i | 1 ≤ i ≤ 3}. In case that s is a crossing of two metro lines, we create the candidates differently. If s is the crossing of two diagonals, we create the candidates as shown in Fig. 2(d). If s is the crossing of a horizontal and a vertical segment, we create the labels as shown in Fig. 2(e). If s is the crossing of a diagonal and horizontal segment, we create the labels as shown in Fig. 2(f). We analogously create the labels, if s is the crossing of a vertical and a diagonal segment. Remark: If a stop lies on multiple metro lines, then we can apply similar constructions, where the labels are placed on the angle bisectors of the crossing lines. 3 Computational Complexity We first study the computational complexity of MetroMapLabeling assuming that the labels are either based on OctilinStyle or CurvedStyle. In particular we show that the problem is NP-hard, if the metro map consists of only one line. The proof uses a reduction from the NP-complete problem monotone planar 3SAT [10]. Based on the given style, we create for the set C of 3SAT clauses a metro map (M, S) such that (M, S) has a labeling if and only if C is satisfiable. The proof can be easily adapted to other labeling styles. Note that the complexity of labeling points using a finite set of axisaligned rectangular label candidates is a well-studied NP-complete problem, e.g., see [7,6]. However, c2 c1 x2 F x3 c3 F x4 Q R x5 x1 h c4 P Fig. 3: Illustration of NP-completeness proof. (a) 3-SAT formula ϕ with clauses c1 = x4 ∨ x1 ∨ x5 , c2 = x2 ∨ x4 ∨ x3 , c3 = x̄2 ∨ x̄1 ∨ x̄3 and c4 = x̄3 ∨ x̄5 ∨ x̄4 represented as a metro map. Truth assignment is x1 = true, x2 = true, x3 = false, x4 = false and x5 = false. The gray graph G represents the adjacencies of the used gadgets. The solid lines represent a spanning tree of G that can be used to merge the polygons to one simple polygon. Exemplarily the polygons P and Q are merged into one polygon R. The single components are illustrated in Fig. 4. since we do not necessarily use axis-aligned rectangles as labels and since for the considered labeling styles the labels are placed along metro lines, it is not obvious how to reduce a point-feature labeling instance on an instance of MetroMapLabeling. In order to show the NP-hardness, we prove that it is NP-complete to decide whether a metro map (M, S) has a labeling based on the given labeling style. Theorem 1. MetroMapLabeling is NP-complete, if the labels are based on OctilinStyle or CurvedStyle, even if the metro map has only one metro line. Proof. For the illustrations we use OctilinStyle, but the same constructions can be done based on CurvedStyle; see end of proof. We first show that the problem deciding whether (M, S) has a labeling lies in NP. We first create for each stop s ∈ S its candidates Ks based on the given labeling style. Recall that each candidate has constant size. We then guess for each stop s ∈ S the label `s that belongs to the desired labeling L. Obviously, we can decide in polynomial time whether {`s | s ∈ S} is a labeling of (M, S) performing basically intersection tests. We now perform a reduction from the NP-complete Planar Monotone 3-Sat problem [10]. Let ϕ be a Boolean formula in conjunctive normal form such that it consists of n variables and m clauses and, furthermore, each clause contains at most three literals. The formula ϕ induces the graph Gϕ as follows. Gϕ contains for each variable a vertex and it contains for each clause a vertex. Two vertices u and v are connected by an edge {u, v} ∈ E if and only if u represents a variable x and v represents a clause c, such that x is contained in c. We call a clause of ϕ positive (negative) if it contains only positive (negative) literals. The formula ϕ is an instance of Planar Monotone 3-Sat if it satisfies the following requirements. 1. ϕ is monotone, i.e., each clause is either positive or negative, and 2. the graph Gϕ is planar and has a rectilinear plane embedding such that (a) the vertices representing variables are placed on a horizontal line h, (b) the vertices representing negative clauses are placed below h, (c) the vertices representing positive clauses are placed above h, (a) (b) s1 `2 1 Negative s2 s2 `1 1 `1 2 `2 1 `2 2 s3 `1 3 s3 `1 4 s4 `1 1 Positive F `2 4 (c) F s1 `2 3 c (d) x x F1 F2 H x F2 F1 x x x Fig. 4: Illustration of the gadgets. Selectable labels are filled, while all other labels are not filled. Ports are marked with a dashed square. (a) Chain gadget of length 4. (b) Fork gadget. (c) Clause gadget. (d) Variable gadget with three negative and three positive ports. (d) the edges are drawn on their respective side of h. Planar Monotone 3-Sat then asks whether ϕ is satisfiable. Using only stops lying on single horizontal and vertical segments, we construct a metro map (M, S) that mimics the embedding of Gϕ . In particular M will only consist of one metro line C that connects all stops such that the stops and their candidates simulate the variables and clauses of ϕ. We will prove that (M, S) has a labeling if and only if ϕ is satisfiable. We refer to Fig. 3 for a sketch of the construction. We first define gadgets simulating variables, clauses and connecting structures. Each gadget consists of a set of stops that lie on the border of a simple polygon P . Later on we use this polygon P to prescribe the shape of the metro line C. Chain. The chain gadget represents and transmits truth values from variables to clauses mimicking the embeddings of the edges in Gϕ . A chain consists of an even number of stops s1 , . . . , sk that lie on vertical and horizontal segments; see Fig. 4(a). Hence, with respect to the given labeling style each stop si has a predefined set of candidates Ksi . For each stop si there are two specially marked candidates `1i and `2i that lie on opposite sides of si ’s segment; for an example see the filled blue labels in Fig 4(a). We say that those labels are selectable, because we define the gadget such that those labels are the only labels that can be selected for a labeling. To that end, we lay out the metro line such that it does not intersect any selectable label, but all labels that are not selectable. The stops are placed such that the following conditions are satisfied. (1) The label `2i intersects the label `1i+1 for 1 ≤ i < k. (2) Except the intersections mentioned in (1), there is no intersection between selectable labels of different stops. (3) The segments of the stops are connected by polylines s.t. the result is a simple polygon P intersecting all labels except the selectable labels. The labels `11 and `2k do not intersect any selectable labels; we call them the ports of the chain. Later on, we use the ports to connect other gadgets with the chain, i.e., we arrange the gadgets such that two of their ports intersect, but no other selectable label. Further, we assign a polarization to each selectable label. The labels `11 , . . . , `1k are negative and the labels `21 , . . . , `2k are positive. Consider a labeling L of a chain assuming that P is interpreted as a metro line; we can cut P at some point in order to obtain an open curve. By construction of P only selectable labels are contained in L. In particular we observe that if the negative port `11 is not contained in L, then the positive labels `21 , . . . , `2k belong to L. Analogously, if the positive port `2k is not contained in L, then the negative labels `11 , . . . , `1k belong to L. We use this behavior to represent and transmit truth values through the chain. Fork. The fork gadget splits an incoming chain into two outgoing chains and transmits the truth value represented by the incoming chain into the two outgoing chains. A fork consists of three stops s1 , s2 and s3 such that s1 and s2 are placed on vertical segments and s3 is placed on a horizontal segment; see Fig. 4(b). Analogously to the chain, each stop si with (1 ≤ i ≤ 3) has two selectable labels `1i and `2i . We arrange the stops such that the following conditions are satisfied. 1. The labels `12 and `13 intersect `21 . Apart from those two intersections no selectable label intersects any other selectable label. 2. The segments of the stops are connected by polylines s.t. the result is a simple polygon P intersecting all labels except the selectable labels. The label `11 is the incoming port and the labels `22 and `23 are the outgoing ports of the fork. We distinguish two types of forks by assigning different polarizations to the selectable labels. In the negative (positive) fork, the labels `11 , `12 and `13 are positive (negative) and the labels are `21 , `22 and `23 are negative (positive). Hence, the incoming port is positive (negative) and the outgoings ports are negative (positive). Consider a labeling L of a fork assuming that P is interpreted as a metro line. By construction of P only selectable labels belong to L. Further, if the incoming port `11 does not belong to L, then the outgoing ports `21 and `21 belong to L. Finally, if one outgoing port does not belong to L, then the incoming port belongs to L. Clause. The clause gadget represents a clause c of the given instance. It forms a chain of length 2 with the addition that it has three ports instead of two ports; see Fig 4(c). To that end one of both stops has three selectable labels; one intersecting a selectable label of the other stop, and two lying on the opposite side of the stop’s segment without intersecting any selectable label of the other stop. The gadget is placed at the position where the vertex of c is located in the drawing of Gϕ ; see Fig. 3. We observe that a labeling L of a clause gadget always contains at least one port. Further, we do not assign any polarization to its selectable labels. Variable. The variable gadget represents a single variable x. It forms a composition of chains and forks that are connected by their ports; see Fig 4(d). More precisely, let s be the number of clauses in which the negative literal x̄ occurs and let t be the number of clauses in which the positive literal x occurs. Along the horizontal line h on which the vertex of x is placed in the drawing of Gϕ , we place a horizontal chain H. Further, we place a sequence of negative forks F 1 , . . . , F s−1 to the left of H and a sequence of positive forks F1 , . . . , Ft−1 to the right of H. The negative incoming port of F1 is connected to the positive port of H by a chain. Two consecutive forks Fi and Fi+1 are connected by a chain H 0 such that H 0 connects a positive outgoing port of Fi with the negative incoming port of Fi+1 . Analogously, the positive incoming port of F 1 is connected to the negative port of H by a chain. Two consecutive forks F i and F i+1 are connected by a chain H 0 such that H 0 connects a negative outgoing port of F i with the positive incoming port of F i+1 . We observe that the gadget has s + t free ports. Further, we can arrange the forks such that the free ports of F1 , . . . , Ft−1 lie above h and the free ports of F 1 , . . . , F s−1 lie below h. Consider a labeling L of a variable. By construction of the forks and chains, if one positive free port is not contained in L, then all negative free ports must be contained in L. Analogously, if one negative free port is not contained in L, then all positive free ports must be contained in L. Using additional chains we connect the positive free ports with the positive clauses and the negative ports with the negative clauses correspondingly; see Fig. 3. More precisely, assume that the variable x is contained in the positive clause c; negative clauses can be handled analogously. With respect to the drawing of Gϕ , a positive free port of x’s gadget is connected with the negative port of a chain whose positive port is connected with a free port of c’s gadget. Note that we can easily choose the simple polygons enclosing the gadgets such that they do not intersect by defining them such that they surround the gadgets tightly. (a) (b) (c) Fig. 5: Illustration of the gadgets based on OctilinStyle. Selectable labels are filled, while all other labels are not filled. (a) Chain gadget of length 4. (b) Fork gadget. (c) Clause gadget. One Metro Line. We construct the polygons enclosing the single gadgets such that they do not intersect each other. We now sketch how the polygons can be merged to a single simple polygon P . Cutting this polygon at some point we obtain a polyline prescribing the desired metro line. We construct a graph H = (V, E) as follows. The polygons of the gadgets are the vertices of the graph and an edge (P, Q) is contained in E if and only if the corresponding gadgets of the polygons P and Q are connected by their ports; see Fig. 3. Since Gϕ is planar and the gadgets mimic the embedding of Gϕ , it is not hard to see that H is also planar. We construct a spanning tree T of H. If an edge (P, Q) of H is also contained in T , we merge P and Q obtaining a new simple polygon R; see for an example Fig. 3. To that end we cut P and Q in polylines and connect the four end points by two new polylines such that the result is a simple polygon. We in particular ensure that the new polygon does not intersect any other polygon and that R intersects the same labels as P and Q together. In T we correspondingly contract the edge. Note that by contracting edges, T remains a tree. We repeat that procedure until T consists of a single vertex, i.e., only one simple polygon is left. Soundness. It is not hard to see that our construction is polynomial in the size of the given 3SAT formula ϕ. Assume that ϕ is satisfiable. We show how to construct a labeling L of the constructed metro map. For each variable x that is true (false) in the given truth assignment, we put all negative (positive) labels of the corresponding variable gadget and its connected chains into L. By construction those labels do not intersect. It remains to select labels for the clause gadgets. Consider a positive clause c; negative clauses can be handled analogously. Since ϕ is satisfiable, c contains a variable x that is true in the given truth assignment of ϕ. The set L contains only negative labels of the chain connecting the gadget of x with the gadget of c, but no positive labels of that chain. Hence, we can add the port of c’s gadget that is connected to that chain without creating intersections. For the second stop of the clause we put that selectable label into L that is not a port. We can apply this procedure to all positive and negative clauses without creating intersections, which yields the labeling L of the constructed metro map. Finally, assume that we are given a labeling L of the constructed metro map. Consider the clause gadget of a positive clause c; negative clauses can be handled analogously. By construction L contains at least one port ` of that gadget. This port is connected to a chain, which is then connected to a gadget of a variable x. We set that variable x true. We apply this procedure to all clauses; for negative clauses we set the corresponding variable to false. Since ` is contained in L, only negative labels of that chain can be contained in L, but no positive labels. Hence, the positive ports of the variable gadget are also not contained in L. By the previous reasoning this implies that all negative ports of the gadget are contained in L. Consequently, by applying a similar procedure to negative clauses, it cannot happen that x is set to false. Altogether, this implies a valid truth assignment of ϕ. Remarks: Fig. 5 illustrates the construction of the gadgets for CurvedStyle. Note that only the fork gadget, the clause gadget and the chain gadget rely on the concrete labeling style. Further, using CurvedStyle, a stop s lying on a vertical segment lv has exactly two different distinguish labels; one that lies to the left of lv and one that lies to the right of lv . t u (a) s2 consecutive s s4 s5 3 (b) s6 C `0 ` s1 switchover switchover (c) `00 s C s0 s00 ` `00 = `v `0 =`u s s0 C s00 Fig. 6: (a) Consecutive stops and switchovers. (b) The candidates satisfy the transitivity property. (c) The candidates do not satisfy the transitivity property. 4 Labeling Algorithm for a Single Metro Line We now study the case that the given instance I = (M, S, K, w) consists only of one metro line C. Based on cartographic criteria we introduce three additional assumptions on I, which allows us to efficiently solve MetroMapLabeling. For each stop s ∈ S, we assume that each candidate ` ∈ Ks is assigned to one side of C; either ` is a left candidate assigned to the left side of C, or ` is a right candidate assigned to the right side of C. For appropriately defined candidate sets those assignments correspond with the geometric positions of the candidates, i.e., left (right) candidates lie on the left (right) hand side of C. Assumption 1 (Separated Labels) Candidates that are assigned to different sides of C do not intersect. This assumption is normally not a real restriction, because for appropriately defined candidate sets and realistic metro lines, the line C separates both types of candidates geometrically. We further require what we call the transitivity property. Assumption 2 (Transitivity Property) For any three stops s, s0 , s00 ∈ S with s < s0 < s00 and any three candidates ` ∈ Ks , `0 ∈ Ks0 and `00 ∈ Ks00 assigned to the same side of C, it holds that if neither ` and `0 intersect nor `0 and `00 intersect then also ` and `00 do not intersect; see also Fig. 6(b)–(c). In our experiments we established Assumption 1 and Assumption 2 by removing candidates greedily. In Section 8 we show that for real-world metro maps and the considered candidate sets we remove only few labels, which indicates that those assumptions have only a little influence on the labelings. Two stops s, s0 ∈ S with s < s0 are consecutive if there is no other stop s00 ∈ S with s < s00 < s0 ; see Fig. 6(a). For two consecutive stops s1 , s2 ∈ S we say that each two candidates `1 ∈ Ks1 and `2 ∈ Ks2 are consecutive and denote the set that contains each pair of consecutive labels in L ⊆ K by PL ⊆ L×L. Further, two consecutive labels `1 , `2 ∈ KC form a switchover (`1 , `2 ) if they are assigned to opposite sides of C, where (`1 , `2 ) denotes an ordered set indicating the order of the stops of `1 and `2 . Two switchovers of C are consecutive in L ⊆ K if there is no switchover in L in between of both. We define the set of all switchovers in K by W and the set of consecutive switchovers in L ⊆ K by ΓL ⊆ W × W. Based on cartographic criteria extracted from Imhof’s “general principles and requirements” for map labeling [8], we require a cost function w : 2K → R+ of the following form; see also Section 5 for a detailed motivation of w. Assumption 3 (Linear Cost Function) For any L ⊆ K we require X X X w(L) = w1 (`) + w2 (`1 , `2 ) + w3 (σ1 , σ2 ), `∈L (`1 ,`2 )∈PL (σ1 ,σ2 )∈ΓL where w1 : L → R rates a single label, w2 : PL → R rates two consecutive labels and w3 : ΓL → R rates two consecutive switchovers. In particular, we define w such that it penalizes the following structures to sustain readbility. (1) Steep or highly curved labels. (2) Consecutive labels that lie on different sides of C, or that are shaped differently. (3) Consecutive switchovers that are placed close to each other. (a) `1 `8 `9 `2 `4 `5 `3 `7 C `6 (c) ⊥ (b) `1 `4 `7 x `2 `5 `8 `3 `6 `9 `2 `01 s02 d2 d1 y hAσ,σ0 dummy switchover s1 s01 s2 σ I(σ, σ 0 ] `1 σ0 d3 > d4 dummy switchover `02 = Aσ,σ0 Fig. 7: Illustrations for labeling a single metro line. (a) A one-sided instance and (b) the acyclic directed graph G based on its labels. (c) A two-sided instance with a labeling. The switchovers σ 0 and σ separate the labeling into a two-sided and a one-sided instance. If I = ({C}, S, K, w) satisfies Assumption 1–3, we call MetroMapLabeling also SoftMetroLineLabeling. We now introduce an algorithm that solves this problem in O(n2 k 4 ) time, where n = |S| and k = max{|Ks | | s ∈ S}. Note that k is typically constant. We assume w.l.o.g. that K contains only candidates that do not intersect C. Labels on One Side. We first assume that all candidate labels in K are assigned either to the left or to the right side of C; without loss of generality to the left side of C. For two stops s, s0 ∈ S we denote the instance restricted to the stops {s, s0 } ∪ {s00 ∈ S | s < s00 < s0 } by I[s, s0 ]. We denote the first stop of C by s and the last stop by s. The transitivity property directly yields the next lemma. Lemma 1. Let s, s0 and s00 be stops with s < s0 < s00 , L be a labeling of I[s, s0 ], ` ∈ L ∩ Ks and `0 ∈ L ∩ Ks0 . Any `00 ∈ Ks00 intersecting ` also intersects `0 . Proof. Recall for the proof that we assume that I satisfies Assumptions 1–3. Assume for the sake of contradiction that there is a candidate `00 ∈ Ks00 such that `00 intersects ` but not `0 ; see Fig. 6(c). Since L is a labeling, the labels ` and `0 do not intersect. Hence, neither ` and `0 nor `0 and `00 intersect. Since all three labels are assigned to the same side of C, the transitivity property holds, which directly contradicts that ` and `0 do not intersect. t u Hence, the lemma states that `0 separates L from the candidates of the stops succeeding s0 . We use this observation as follows. Based on K we define a directed acyclic graph G = (V, E); see Fig. 7(a)–(b). This graph contains a vertex u for each candidate ` ∈ K and the two vertices x and y. We call x the source and y the target of G. Let `u denote the candidate that belongs to the vertex u ∈ V \ {x, y}. For each pair u, v ∈ V \ {x, y} the graph contains the edge (u, v) if and only if the stop of `u lies directly before the stop of `v and, furthermore, `u and `v do not intersect. Further, for each vertex u of any candidate of s the graph contains the edge (x, u), and for each vertex u of any candidate of s the graph contains the edge (u, y). For an edge (u, v) ∈ E we define its cost we as follows. For u 6= x and v 6= y we set we = w1 (`v ) + w2 (`u , `v ). For x = u we set we = w1 (`v ) and for v = y we set we = 0.P An x-y path P ⊆ E in G is a path in G that starts at x and ends at y. Its costs are w(P ) = e∈P we . The x-y path with minimum costs among all x-y paths is the shortest x-y path. Lemma 2. For any x-y path P in G there is a labeling L of I with w(P ) = w(L) and for any labeling L of I there is an x-y path P in G with w(P ) = w(L). Proof. Recall for the proof that we assume that I satisfies Assumptions 1–3. Let P = (VP , EP ) be an x-y path in G and let L = {`v ∈ K | v ∈ VP }, where VP denotes the vertices of P and EP the edges of P . We show that L is a labeling of C with w(L) = w(P ). Obviously, for each stop s ∈ S the set L contains exactly one candidate ` ∈ Ks . By construction for each edge (u, v) ∈ EP the labels `u and `v do not intersect. Hence, by Lemma 1 the label `v cannot intersect any label ` ∈ L of any stop that occurs before the stop of `u . Hence, the set L is a labeling. Let `1 , . . . , `n be the labels in L in the order of their stops. It holds w(P ) = X we = w1 (`1 ) + e∈EP n X (w1 (`i ) + w2 (`i−1 , `i )) = w(L) (1) i=2 Now, let L be an arbitrary labeling of C. We show that there is an x-y path P with w(P ) = w(L). Let s and s0 be two consecutive stops with s < s0 and let ` and `0 be the corresponding labels in L. Since ` and `0 do not intersect, the corresponding vertices u and u0 of ` and `0 are adjacent in G. Hence, the labels in L induce a path P in G. Let `1 , . . . , `n be the labels in L in the order of their stops. Using Equation 1 we obtain w(P ) = w(L). t u The lemma in particular proves that a shortest x-y path P in G corresponds with an optimal labeling of I. Due to [4, Chapter 24], P can be constructed in O(|V | + |E|) time using a dynamic programming approach, which we call MinPath. In particular MinPath considers each edge only once. There are O(n · k) vertices in G and each vertex has at most k incoming edges, which implies that there are O(n · k 2 ) edges. Since MinPath considers each edge only once, we compute the edges of G on demand, which saves storage. Theorem 2. If I is one-sided, SoftMetroLineLabeling can be optimally solved in O(nk 2 ) time and O(nk) space. Labels on Both Sides. If candidates lie on both sides of the metro line, we solve the problem utilizing the algorithm for the one-sided case. Consider a labeling L of I and let σ, σ 0 be two switchovers in L such that σ lies before σ 0 and no other switchover lies in between both; see Fig. 7(c). Roughly spoken, σ and σ 0 induce a two-sided instance that lies before σ and a one-sided instance that lies in between both switchovers σ and σ 0 . Lemma 3. Let s, s01 , s02 and s00 be stops with s < s01 < s02 < s00 ; s01 and s02 are consecutive. Let L be a labeling of I[s, s02 ], ` ∈ L ∩ Ks , `01 ∈ L ∩ Ks01 , `02 ∈ L ∩ Ks02 s.t. (`01 , `02 ) is a switchover. Any `00 ∈ Ks00 intersecting ` intersects `01 or `02 . Proof. Recall for the proof that we assume that I satisfies Assumptions 1–3. Assume for the sake of contradiction that there is a label `00 ∈ Ks00 such that `00 intersects ` without intersecting `01 and `02 . Since ` and `00 intersect each other, due to Assumption 1 both are assigned to the same side of C; w.l.o.g., let ` and `00 be assigned to the left hand side of C. Further, w.l.o.g., let `01 be a left candidate and `02 a right candidate; analogous arguments hold for the opposite case. Since L is a labeling, the labels ` and `01 do not intersect. Hence, neither ` and `01 nor `01 and `00 intersect. Since `, `01 and `00 are assigned to the same side of C, the transitivity property must hold. However, this contradicts that ` and `00 intersect. t u Hence, the lemma yields that for the one-sided instance we can choose any labeling; as long as this labeling does not intersect any label of σ or σ 0 , it composes with σ, σ 0 and the labeling of the two-sided instance to one labeling for the instance up to σ 0 . We use that observation as follows. Let σ = (`1 , `2 ) and σ 0 = (`01 , `02 ) be two switchovers in W. Let s1 and s2 be the stops of `1 and `2 , and let s01 and s02 be the stops of `01 and `02 , respectively; see Fig. 7(c). We assume that σ < σ 0 , i.e., s1 < s01 . Let I(σ, σ 0 ] be the instance restricted to the stops {s ∈ S | s2 < s < s01 } ∪ {s01 , s02 }, where (σ, σ 0 ] indicates that the stops of σ 0 belong to that instance, while the stops of σ do not. The switchovers σ and σ 0 are compatible if `2 and `01 are assigned to the same side of C, and there is a labeling for I[s1 , s02 ] such that it contains `1 , `2 , `01 and `02 and, furthermore, σ and σ 0 are the only switchovers in that labeling. Let L be the optimal labeling among those labelings. We denote the labeling L \ {`1 , `2 } of I(σ, σ 0 ] by Aσ,σ0 . Utilizing Theorem 2, we obtain Aσ,σ0 in O(n · k 2 ) time. For any labeling L of an instance J let hL ∈ L be the label of the first stop in J and let tL ∈ L be the label of the last stop in J; hL is the head and tL is the tail of L. For technical reasons we extend S by the dummy stops d1 , d2 , d3 and d4 such that d1 < d2 < s < d3 < d4 for any stop s ∈ S. For d1 and d2 we introduce the dummy switchover ⊥ and for d3 and d4 the dummy switchover >. We define that ⊥ and > are compatible to all switchovers in W and that ⊥ and > are compatible, if there is a one-sided labeling for I. Conceptually, each dummy switchover consists of two labels that are assigned to both sides of C. Further, neither ⊥ nor > has any influence on the cost of a labeling. Hence, w.l.o.g. we assume that they are contained in any labeling. Similar to the one-sided case we define a directed acyclic graph G0 = (V 0 , E 0 ). This graph contains a vertex u for each switchover W ∪ {⊥, >}. Let σu denote the switchover that belongs to the vertex u ∈ V . In particular let x denote the vertex of ⊥ and y denote the vertex of >. For each pair u, v ∈ V the graph contains the edge (u, v) if and only if σu and σv are compatible and σu < σv . The cost we of an edge e = (u, v) in G0 is we = w(Aσu ,σv ) + w3 (σu , σv ) + w2 (`u2 , hAσu ,σv ), where σu = (`u1 , `u2 ). In the special case that σu and σv share a stop, we set we = w3 (σu , σv ) + w2 (`v1 , `v2 ) + w1 (`v2 ), where σv = (`v1 , `v2 ). Let P be an x-y path in G0 and let e1 = (x = v0 , v1 ), e2 = (v1 , v2 ), . . . , el = (vl−1 , vl = y) be the edges of P . For a vertex vi of P with 0 ≤ i ≤ l we write σi instead of σvi . We denote the set Sl i=1 Aσi−1 ,σi by LP . Lemma 4. a) The graph G0 has an x-y path if and only if I has a labeling. b) Let P be a shortest x-y path in G0 , then LP is an optimal labeling of I. Proof. Recall for the proof that we assume that I satisfies Assumption 1–3. By construction of G0 , it directly follows that G0 has an x-y path P if and only if I has a labeling L. We first show that LP is a labeling of I with w(LP ) = w(P ). Afterwards we prove that for any labeling L of I it holds w(L) ≥ w(LP ). Let e1 = (v0 , v1 ), e2 = (v1 , v2 ), . . . , el = (vl−1 , vl ) be the edges of P with v0 = x and vl = y. For a vertex vi with 0 ≤ i ≤ l we write σi instead of σvi . We show by induction over m ∈ N with 1 ≤ m ≤ l that m [ Lm := Aσi−1 ,σi i=1 Pm is a labeling of I(σ0 , σm ] with w(Lm ) = i=1 wei . Altogether this implies that LP = Ll is a labeling with w(LP ) = w(P ). For m = 1 we have L1 = Aσ0 ,σ1 . By the construction of G0 the set Aσ0 ,σ1 is a labeling. Since σ0 = (`0 , `1 ) is a dummy switchover we have w3 (σ0 , σ1 ) = 0 and w2 (`2 , hAσ0 ,σ1 ) = 0. Hence, it holds w(Aσ0 ,σ1 ) = we1 . Now, consider the set Lm for m > 1. We first argue that Lm is a labeling of I(σ0 , σm ]. By induction the set Lm−1 ⊆ Lm is a labeling of I(σ0 , σm−1 ]. Further, by construction the set Lm \Lm−1 = Aσm−1 ,σm is a labeling of the instance I(σm−1 , σm ]. Since σm−1 and σm are compatible, no label of Lm \ Lm−1 intersects any label of σm−1 . Then by Lemma 3 no two labels in Lm intersect P each other. Pm m−1 We now show that w(Lm ) = i=1 wei . By induction we have w(Lm−1 ) = i=1 wei . Since Lm = Lm−1 ∪ Aσm−1 ,σm it holds w(Lm ) = w(Lm−1 ∪ Aσm−1 ,σm ). (2) We distinguish two cases. First assume that σm−1 and σm do not have any stop in common. Let σm−1 = (`m−1 , `m−1 ), then we derive from Equation (2) 1 2 w(Lm ) =w(Lm−1 ∪ Aσm−1 ,σm ) =w(Lm−1 ) + w(Aσm−1 ,σm ) + w3 (σm−1 , σm ) + w2 (`m−1 , hAσm−1 ,σm ) 2 (I) (II) = w(Lm−1 ) + wem = m X w ei . i=1 Equality (I) holds due to the definition of wem and Equality (II) is by induction true. Now assume m that σm−1 and σm have a stop in common. Let σm = (`m 1 , `2 ), then we derive from Equation (2) w(Lm ) =w(Lm−1 ∪ Aσm−1 ,σm ) m m =w(Lm−1 ) + w3 (σm−1 , σm ) + w2 (`m 1 , `2 ) + w1 (`2 ) m (III) (IV ) X = w(Lm−1 ) + wem = w ei . i=1 Equality (III) holds due to the definition of wem and Equality (IV) is by induction true. Altogether we obtain that Ll is a labeling with w(Ll ) = w(P ). Finally we show, that there is no other labeling L with w(L) < w(LP ). Assume for the sake of contradiction that there is such a labeling L. Let ⊥ = σ0 , σ1 , . . . , σl = > be the switchovers in L, such that σi < σi+1 for each 0 ≤ i < l. We observe that two consecutive switchovers σi and σi+1 are compatible. Hence, for any i with 1 ≤ i ≤ l there is an edge ei = (u, v) in G0 with σu = σi−1 and σv = σi+1 . Consequently, the edges e1 , . . . , el form an x-y path Q. By the first two claims of this lemma, there is a labeling LQ of I with w(Q) = w(LQ ). Since P is a shortest x-y path it holds w(L) < w(LP ) = w(P ) ≤ w(Q) = w(LQ ) We now show that w(LQ ) ≤ w(L) deriving a contradiction. To that end recall that LQ = l [ i=1 Aσi−1 ,σi . For 1 ≤ i ≤ l the set Aσi−1 ,σi is an optimal labeling of the instance I(σi−1 , σi ] such that Aσi−1 ,σi ∪σi−1 is a labeling and σi is the only switchover contained in Aσi−1 ,σi . Let Li ⊆ L and LQ i ⊆ LQ be the labelings restricted to I(σi−1 , σi ]. In particular we have LQ = A and σ is the only switchover in Li . If we σ ,σ i i−1 i i had w(LQ ) > w(L), there must be two consecutive switchovers σi−1 and σi such that w(Li ) < w(LQ i ). However, this contradicts the optimality of Aσi−1 ,σi . Consequently, it holds w(LQ ) ≤ w(L) yielding the claimed contradiction. t u By Lemma 4 a shortest x-y path P in G0 corresponds with an optimal labeling L of C, if this exists. Using MinPath we construct P in O(|V 0 | + |E 0 |) time. Since W contains O(nk 2 ) switchovers, the graph G0 contains O(nk 2 ) vertices and O(n2 k 4 ) edges. As MinPath considers each edge only once, we compute the edges of G0 on demand, which needs O(nk 2 ) storage. We compute the costs of the incoming edges of a vertex v ∈ V 0 utilizing the one-sided case. Proceeding naively, we need O(nk 2 ) time per edge, which yields O(n3 k 6 ) time in total. Reusing already computed information, we improve that result as follows. Let (u1 , v), . . . , (uk , v) denote the incoming edges of v such that σu1 ≤ · · · ≤ σuk , i.e., the stop of σui ’s first label does not lie after the stop of σuj ’s first label with i < j. Further, let σv = (`1v , `2v ) and let Gi be the graph for the one-sided instance I[si , s] considering only candidates that lie on the same side as `1v , where si is the stop of the second label of σui and s is the stop of `1v . Let Pi be the shortest xi -yi path in Gi , where xi and yi denote the source and target of Gi , respectively. We observe that excluding the source and target, the graph Gi is a sub-graph of G1 for all 1 ≤ i ≤ k. Further, since a sub-path of a shortest path is also a shortest path among all paths having the same end vertices, we can assume without loss of optimality that when excluding xi and yi from Pi , the path Pi is a sub path of P1 for all 1 ≤ i ≤ k. We therefore only need to compute G1 and P1 and can use sub-paths of P1 in order to gain the costs of all incoming edges of v. Hence, we basically apply for each vertex v ∈ V the algorithm for the one-sided case once using O(nk 2 ) time per vertex. We then can compute the costs in O(1) time per edge, which yields the next result. Theorem 3. SoftMetroLineLabeling can be optimally solved in O(n2 k 4 ) time and O(nk 2 ) space. 1st Step 2nd Step 3rd Step 4th Step Fig. 8: Schematic illustration of the presented workflow. 1st Step: generation of candidates. 2nd Step: scaling and creation of initial labeling (red labels). 3rd Step: pre-selection of candidates. 4th Step: Solving the metro lines independently. 5 Cost Function In this section we motivate the cost function introduced in Section 4. For a given metro map ({C}, S) that consists of a single metro line C, and generated candidates K, we rate each labeling L ⊆ K using the following cost function: X X X w(L) = w1 (`) + w2 (`1 , `2 ) + w3 (σ1 , σ2 ), `∈L (`1 ,`2 )∈PL (σ1 ,σ2 )∈ΓL where w1 : L → R rates a single label, w2 : PL → R rates two consecutive labels and w3 : ΓL → R rates two consecutive switchovers; see Assumption 3. The definition of this function relies on the following considerations, which are based on Imhof’s “general principles and requirements” for map labeling [8]. To respect that some (e.g., steep and highly curved) labels are more difficult to read than others, we introduce a cost w1 (`) for each candidate label `. Imhof further notes that “names should assist directly in revealing spatial situation” and exemplifies this principle with maps that show text only while still conveying the most relevant geographic information. To transfer this idea to metro maps, we favor solutions where the labels for each two consecutive stops on a metro line have similar properties. That is, the two labels should be placed on the same side of the line and their slopes and curvatures should be similar. In a map satisfying this criterion, a user need not find the point-text correspondence on a one-to-one basis. Instead, the user can identify metro lines and sequences of stops based on label groups, which, for example, makes it easier to count the stops till a destination. (Of course, this is also an improvement in terms of legibility.) In our model, we consider the similarity of consecutive labels by introducing a cost w2 (`1 , `2 ) for each pair (`1 , `2 ) of candidates that belong to consecutive stops on C. We penalize consecutive candidates that lie on opposite sides of the metro line, because those disturb the overall label placement. We add this cost to the objective value of a solution if both candidates are selected. Since we minimize the total costs of the solution, the cost for a pair of candidates should be low if they are similar. Further, if C has labels that do not lie on the same side of C, the implied switchovers should occur in regular distances and not cluttered. Hence, for each pair σ1 and σ2 of two consecutive switchovers in a solution, we add a cost w3 (σ1 , σ2 ) to the objective value of the solution that depends on the distance between σ1 and σ2 ; the smaller the distance, the greater the cost of w3 (σ1 , σ2 ). We now describe more precisely how we defined w1 , w2 and w3 for our evaluation. The definitions depend on the applied labeling style. Curved Labels. Using CurvedStyle for the labels we define the cost functions as follows. For a label ` ∈ K let p1` = (x1` , y`1 ) be the start point of ` and let p2` = (x2` , y`2 ) be the end point of `; recall that we derived the labels from Bézier curves. Let v ` be the vector connecting p1` with p2` and let α ∈ [0, 2π] denote the angle of v ` . We define  0 ≤ α ≤ π2  α`  π − α π ` 2 <α ≤π δ` = α` − π π < α ≤ 23 π    2π − α` 32 π < α < 2π Hence, the angle δ` is a measure for how horizontal the vector v ` is, whereby the smaller the value of δ` , the more horizontal is v ` . We defined the cost function w1 rating a single label ` ∈ K to be w1 = 10 · δ` . Hence, we penalize steep labels. We defined w2 rating two consecutive labels `1 and `2 as follows. If `1 and `2 point into different x-direction, w2 is 150. Else, if `1 and `2 are switchovers, the cost w2 is 0. In all other cases, w2 is the difference between the angle α`1 and α`2 . Hence, in the latter case we penalize labels that are differently aligned. Finally, w3 rating two switchovers σ1 and σ2 of the same line is defined as , where dσ1 ,σ2 is the number of stops in between σ1 and σ2 . In particular w3 effects that w3 = dσ200 1 ,σ2 a labeling with equally sized sequences of labels lying on the same side of their metro line are rated better than a labeling where the sequences are sized irregularly. Octilinear Labels. Using OctilinStyle for the labels we define the cost functions as follows. Recall that we use OctilinStyle for octilinear metro maps. For a label ` let l` be the segment on which its stop is placed. If l` is horizontal, but ` is not diagonal, we set w1 = 200. If l` is vertical or diagonal, but ` is not horizontal, we set w1 = 100. In all other cases we set w1 = 0. The functions w2 and w3 are defined in the same way as for CurvedStyle. 6 Multiple Metro Lines In this section we consider the problem that we are given a metro map (M, S) consisting of multiple metro lines. We present an algorithm that creates a labeling for (M, S) in two phases. Each phase is divided into two steps; see Fig. 8 for a schematic illustration. In the first phase the algorithm creates the set K of label candidates and ensures that there exists at least one labeling for the metro map. In the second phase it then computes a labeling L for (M, S, K). To that end it makes use of the labeling algorithm for a single metro line; see Section 4. In order to rate L, we extend the cost function w for a single metro line on multiple metro lines, i.e., for any L ⊆ K we require X X X X w(L) = w(C) with w(C) = w1 (`) + w2 (`1 , `2 ) + w3 (σ1 , σ2 ), C∈M `∈LC (`1 ,`2 )∈PLC (σ1 ,σ2 )∈ΓLC where LC = L ∩ KC is the labeling restricted to metro line C ∈ M, w1 : LC → R rates a single label, w2 : PLC → R rates two consecutive labels and w3 : ΓLC → R rates two consecutive switchovers of C. In particular w satisfies Assumption 3 for a single metro line. Altogether, the workflow yields a heuristic that relies on the conjecture that using optimal algorithms in single steps is sufficient to obtain good labelings. In our evaluation we call that approach DpAlg. 6.1 First Phase – Candidate Generation First, we create the label candidates K. We then enforce that there is a labeling L for the given instance I = (M, S, K). 1st Step – Candidate Creation. Depending on the labeling style, we generate a discrete set of candidate labels for every stop. Hence, we are now given the instance (M, S, K, w). In particular we assume that each candidate ` ∈ K is assigned to one side of its metro line C, namely to the left or right side of C, and, furthermore, w is a cost function satisfying Assumption 3 for each metro line C. 2nd Step – Scaling. Since each stop of a metro map must be labeled, we first apply a transformation on the given candidates to ensure that there is at least one labeling of the metro map. To that end we first determine for each stop s ∈ S of each metro line C ∈ M two candidates of Ks that are assigned to opposite sides of C. More specifically, among all candidates in Ks that are assigned to the right hand side of C and that do not intersect any metro line of M, we take that candidate `R ∈ Ks with minimum costs, i.e., w1 (`) is minimal. If such a candidate does not exist, because each label of Ks intersects at least one metro line, we take a pre-defined label `R ∈ Ks that is assigned to the right hand side of C. In the same manner we choose a candidate `L ∈ Ks that is assigned to the left hand side of C. Let Ds = {`R , `L }, we now enforce that there is a labeling L of I such that for each stop s ∈ S it contains a label of Ds . S We check whether the set s∈S Ds admits a labeling L for I. Later, we describe more specifically how to do this. If L exists, we continue with the third step of the algorithm using I and L as input. Otherwise, we scale all candidates of K smaller by a constant factor and repeat the described procedure. Sampling a pre-defined scaling range [xmin , xmax ], we find in that manner a scaling factor x ∈ [xmin , xmax ] for the candidates that admits a labeling L of I. We choose x as large as possible. If we could not find x, e.g, because we have chosen [xmin , xmax ] or the sampling not appropriately, we abort the algorithm, stating that the algorithm could not find a labeling. S Next, we describe how to check whether there is a labeling for s∈S Ds . Since for each s ∈ S the set Ds contains two candidates, we can make use of a 2SAT formulation to model the labeling problem. For each stop s ∈ S and each candidate ` ∈ Ds , we introduce the Boolean variable x` . Those Boolean S variables induce the set L = {` ∈ s∈S Ds | x` is true}. The following formulas are satisfiable if and only if L is a labeling of M. ¬x` ¬x` ∨ ¬x`0 x` ∨ x`0 , ¬x` ∨ ¬x`0 ∀s ∈ S ∀` ∈ Ds s.t. ∃C ∈ M that intersects ` [ ∀`, `0 ∈ Ds s.t. ` and `0 intersect. s∈S ∀s ∈ S ∀`, `0 ∈ Ds The first formula ensures that there is no label of the solution that intersects any metro line. The second one avoids overlaps between labels, while the two last formulas enforce that for each stop s ∈ S there is exactly one label of Ds that is contained in the solution. According to [2] in linear time with respect to the number of variables and formulas, the satisfiability can be checked. We introduce O(n) variables and instantiate the second formula O(n2 ) times, because each pair of candidates may overlap. The remaining formulas are instantiated in O(n2 ) time. Hence, the total running time is in O(n2 · t), where t denotes the number of scaling steps. 6.2 Second Phase – Candidate Selection We assume that we are given the scaled instance I = (M, S, K) and the labeling L for I of the previous phase. We apply a pre-selection on the candidates by discarding candidates such that no two stops’ candidates of different metro lines intersect and each metro line satisfies Assumption 1 and Assumption 2. We never remove a label in L from the candidate set, however, to ensure that there is always a feasible solution. Finally, considering the metro lines independently, we select for each stop a candidate to be its label using the dynamic program described in Section 4. 3th Step – Candidate Pre-Selection. We first ensure that I satisfies Assumption 1 and Assumption 2. If two candidates ` and `0 of the same metro line C intersect and if they are assigned to opposite sides of C, we delete one of both labels as follows. If ` ∈ L, we delete `0 , and if `0 ∈ L we delete `. Otherwise, if none of both is contained in L, we delete that label with higher costs; ties are broken arbitrarily. Afterwards, Assumption 1 is satisfied. Further, for each metro line C of I we iterate through the stops of C from its beginning to its end. Doing so, we delete candidates from K violating Assumption 2 as described as follows. Let s be the currently considered stop. For each candidate ` ∈ Ks we check for each stop s0 with s0 < s whether there is a label `0 ∈ Ks0 that intersects `. If `0 exists, we check whether each candidate `00 ∈ Ks00 of any stop s00 with s0 < s00 < s intersects ` or `0 . If this is not the case, we delete ` if ` is not contained in L, and otherwise we delete `0 . Note that not both can be contained in L. By construction each metro line of instance I then satisfies Assumption 2, where L ⊆ K. Finally, we ensure that the metro lines in M become independent in the sense that no candidates of stops belonging to different metro lines intersect and no candidate intersects any metro line. Hence, after this step, the metro lines can independently be labeled such that the resulting labelings compose to a labeling of I. We first rank the candidates of K as follows. For each metro line C ∈ M we construct a labeling LC using the dynamic program for the two sided case as presented in Section 4. Due to the previous step, those labelings exist. Note that for two metro lines C, C 0 ∈ M there may be labels ` ∈ LC and `0 ∈ LC 0 that intersect each other. For each candidate ` ∈ K we set val` = 1 if ` ∈ LC for a metro line C ∈ M, and val` = 0 otherwise. A candidate ` ∈ K has a smaller rank than a candidate `0 ∈ K, if val` > val`0 or val` = val`0 and w1 (`) ≤ w1 (`0 ); ties are broken arbitrarily. We now greedily remove candidates from K until all metro lines are independent. We create a conflict graph G = (V, E) such that the vertices of G are the candidates and the edges model intersections between candidates, i.e., two vertices are adjacent if and only if the corresponding labels intersect. Then, we delete all vertices whose corresponding labels intersect any metro line. Afterwards, starting with I = ∅, we construct an independent set I on G as follows. First, we add all vertices of G to I, whose labels are contained in L, and delete them and their neighbors from G. Since the labels in L do not intersect, I is an independent set of the original conflict graph. In the increasing order of their ranks, we remove each vertex v and its neighbors from G. Each time we add v to I; obviously sustaining that I is an independent set in G. We then update for each stop s ∈ S its candidate set Ks to Ks ← {` ∈ Ks | vertex of ` is contained in I}. Since all labels of L are contained in I, there is a labeling for (M, S, K, w) based on the new candidate set K. 4th Step – Final Candidate Selection. Let I = (M, S, K, w) be the instance after applying the third step and L be the labeling that has been created in the first step. By the previous step the metro lines are in the sense independent that candidates of stops belonging to different metro lines do not intersect. Further, they all satisfy Assumption 1 and Assumption 2. Hence, we use the dynamic programming approach of Section 4 in order to label them independently. The composition of those labelings is then a labeling L of I. 7 Alternative Approaches We now present the three approaches IlpAlg, ScaleAlg, GreedyAlg, which are adaptions of our workflow. We use those to experimentally evaluate our approach against alternatives. While GreedyAlg is a simple and fast greedy algorithm, IlpAlg and ScaleAlg are based on an ILP formulation. 7.1 Integer Linear Programming Formulation To assess the impact of the second phase of our approach, we present an integer linear programming formulation that optimally solves MetroMapLabeling with respect to the required cost function. Let (M, S, K, w) be an instance of that problem, which we obtain after the first phase of our approach. We first note that we apply a specific cost function (see Section 5). The cost function w3 , which rates two consecutive switchovers σ = (`1 , `2 ) and σ 0 = (`01 , `02 ) of a labeling L, does not rely on the actual switchovers, but only on their positions on the corresponding metro line. Hence, we may assume that w3 expects the stops of `1 and `01 . This assumption helps us reduce the number of variables. For each candidate ` ∈ K we define a binary variable x` ∈ {0, 1}. If x` = 1, we interpret it such that ` is selected for the labeling. We introduce the following constraints. x` = 0 x ` + x `0 ≤ 1 X x` = 1 `∈Ks ∀` ∈ K that intersect a metro line. (3) ∀`, `0 ∈ K that intersect. (4) ∀s ∈ S (5) Moreover, for each metro line C ∈ M we define the following variables. To that end, let P ∈ KC × KC be the set of all consecutive labels and let s1 , . . . , sn be the stops of C in that particular order. y`,`0 ∈ {0, 1}, ∀(`, `0 ) ∈ P. hi,j ∈ {0, 1}, 1 ≤ i < n and i < j < n zi ∈ {0, 1}, 1≤i<n If y`,`0 = 1, we interpret it such that both ` and `0 are selected for the labeling. If zi = 1, we interpret it such that the selected labels of the stops si and si+1 form a switchover. If hi,j = 1, we interpret it such that the selected labels at si , si+1 , sj and sj+1 form two consecutive switchovers. Further, for each metro line C we introduce the following constraints. In these constraints L(K) denotes the set of labels that lie to the left of C, and R(K) denotes the set of labels that lie to the right of C. X ∀(`, `0 ) ∈ P (6) 1≤i<n (7) x` − 1 ≤ zi 1≤i<n (8) X 1≤i<j<n (9) hi,j · w3 (si , sj ) (10) x` + x`0 − 1 ≤ y`,`0 X x` + x` − 1 ≤ zi `∈L(Ksi ) `∈R(Ksi+1 ) X X x` + `∈R(Ksi ) `∈L(Ksi+1 ) zi + zj − 1 − zk ≤ hi,j i<k<j We further define for each metro line C the following linear term. w(C) := X `∈KC x` · w1 (`) + X y`,`0 · w2 (`, `0 ) + (`,`0 )∈P X 1≤i<n i<j<n Subject to the presented Constraints (3)–(9) we then minimize X w(C). (11) C∈M Consider a variable assignment that minimizes (11) and satisfies Constraints (3)–(9). We show that L = {` ∈ K | x` = 1} is an optimal labeling of the given instance with respect to the given cost function. First of all, L is a valid labeling. Constraint (3) ensures that no label in L intersects any metro line. By Constraint (4) the labels in L are pairwise disjoint. Finally, by Constraint (5) for each stop there is exactly one label contained in L. In particular, for a metro line C ∈ M, the set LC = L ∩ KC is a valid labeling of C. We now show that w(LC ) = w(C) for any metro line C ∈ M. Since we minimize (11), this implies the optimality of L. Obviously, for a label ` ∈ KC the cost w1 (`) is taken into account in w(C) if and only if ` belongs to L. By Constraint (6) for two consecutive labels ` and `0 of C we have y`,`0 = 1 if both are contained in L. Further, by the minimality of (11), if at least one of both labels does not belong to L, it holds y`,`0 = 0. Hence, w2 (`, `0 ) is taken into account in w(C) if and only if both ` and `0 belong to L. By Constraint (7) and Constraint (8) it holds zi,j = 1 if the labels `i ∈ L and `i+1 ∈ L of the consecutive stops si and si+1 form a switchover in L. Hence, by Constraint (9) it further holds hi,j = 1 if the labels of si and si+1 as well as sj and sj+1 form switchovers σi and σj in L, and, furthermore, there is no other switchover in between σi and σj , i.e., both switchovers are consecutive. On the other hand, by the minimality of w(C) in all other cases it holds hi,j = 0. Hence, w3 (si , sj ) is taken into account in w(C) if and only if σi and σj are consecutive switchovers in L. Altogether we obtain the following theorem. Theorem 4. Given an optimal variable assignment for the presented ILP formulation, the set L = {` ∈ K | x` = 1} is an optimal labeling of (M, S, K) with respect to w. The approach IlpAlg simply replaces the second phase of DpAlg by that ILP formulation. Hence, it solves the second phase optimally. The approach ScaleAlg samples a predefined scaling range [xmin , xmax ], which is also used by DpAlg. For each scale x it scales the candidates correspondingly. Using the ILP formulation it then checks whether the candidates admit a labeling. Hence, we approximately obtain the greatest scaling factor that admits a labeling. 7.2 Greedy-Algorithm The algorithm GreedyAlg replaces the dynamic programming approach in our workflow as follows. Starting with the solution L enforced by the 1st step, the greedy algorithm iterates once through the stops of C. For each stop s of C it selects the candidate ` ∈ Ks that minimizes w1 (`)+w2 (`p , `)+w2 (`, `s ) among all valid candidates in Ks , where `p ∈ L is the candidate selected for the previous stop sp and `s ∈ L is the candidate for the successive stop. It replaces the candidate of s in L with `. 8 Evaluation To evaluate our approach presented in Section 6, we did a case study on the metro systems of Sydney (173 stops) and Vienna (84 stops), which have been used as benchmarks before [5,11,14]. For Sydney we took the curved layout from [5, Fig. 1a] and the octilinear layouts from [11, Fig. 9a,b][14, Fig. 10.], while for Vienna we took the curved layout from [5, Fig. 8c] and the ocitlinear layouts from [11, Fig. 13a,b]. See also Table 1 for an overview of the instances. Since the metro lines of Sydney are not only paths, we disassembled those metro lines into single paths. We did this by hand and tried to extract as long paths as possible. Hence, the instances of Sydney decompose into 12 lines and the instances of Vienna into 5 lines. We took the positions of the stops as presented in the corresponding papers. In the curved layout of Sydney we removed the stops Tempe and Martin Place (in Fig. 9(a) marked as red dots), because both stops are tightly enclosed by metro lines such that only the placement of very small labels is possible. This is not so much a problem of our approach, but of the given layout. In a semi-automatic approach the designer would then need to change the layout. For the curvilinear layouts we used labels of CurvedStyle and for the octilinear layouts we used labels of OctilinStyle. For the layouts of Sydney2, Sydney3 and Vienna2 the authors present labelings; see Fig. 10, Fig. 11 and Fig. 12. For any other layout they do not present labelings. s : Ratio of Table 1: Overview of considered instances. Style: Style of map and applied labels. smax applied scale factors. The scale smax is a lower bound for the largest possible scaling factor (obtained by ScaleAlg), and s is the scale computed by the first phase of our workflow. Instance Sydney1 Sydney2 Sydney3 Sydney4 Vienna1 Vienna2 Vienna3 Style Octi. Octi. Octi. Curved Octi. Octi. Curved. 0.69 0.57 0.57 0.67 0.59 0.81 0.54 Reference [11, Fig. 9a] [11, Fig. 9b] [14, Fig. 10.] [5, Fig. 1a] [11, Fig. 13a] [11, Fig. 13b] [5, Fig. 8c] s smax The experiments were performed on a single core of an Intel(R) Core(TM) i7-3520M CPU processor. The machine is clocked at 2.9 GHz, and has 4096 MB RAM. Our implementation is written in Java. For each instance and each algorithm we conducted 100 runs and took the average running times. Each time before we started the 100 runs, we performed 50 runs without measuring the running time in order to warm up the virtual machine (Java(TM) SE Runtime Environment, build 1.8.0 60-b27, Table 2: Running times in seconds of the workflow broken down into its two phases and their single steps (if applicable). Algo.: The applied algorithm. Times less than 0.01 seconds are marked with ?. Algo. Instance Layout Phase 1: Creation Phase 2: Selection P P 1st 2nd 1st 2nd Total DpAlg GreedyAlg Sydney1 Octi. ScaleAlg IlpAlg 0.03 0.02 0.02 0.02 0.18 0.18 – 0.17 0.21 0.2 0.02 0.19 0.09 ? – – 0.1 ? – – 0.18 ? 69.09 25.43 0.39 0.2 69.11 25.62 DpAlg GreedyAlg Sydney2 Octi. ScaleAlg IlpAlg 0.03 0.02 0.02 0.02 0.28 0.28 – 0.28 0.31 0.3 0.02 0.29 0.07 ? – – 0.09 ? – – 0.15 ? 17.29 15.17 0.46 0.3 17.31 15.46 DpAlg GreedyAlg Sydney3 Octi. ScaleAlg IlpAlg 0.03 0.02 0.02 0.02 0.17 0.16 – 0.15 0.2 0.17 0.02 0.17 0.07 ? – – 0.09 ? – – 0.16 ? 33.61 21.56 0.36 0.17 33.63 21.73 DpAlg GreedyAlg Sydney4 Curved ScaleAlg IlpAlg 0.03 0.03 0.03 0.02 0.33 0.33 – 0.34 0.36 0.35 0.05 0.36 0.1 0.1 ? ? – – – – 0.2 ? 243.58 98.81 0.56 0.35 243.63 99.17 DpAlg GreedyAlg Vienna1 Octi. ScaleAlg IlpAlg 0.01 0.01 0.01 0.01 0.06 0.06 – 0.06 0.07 0.07 0.01 0.08 0.01 ? – – ? ? – – 0.02 ? 3.31 0.55 0.09 0.07 3.32 0.63 DpAlg GreedyAlg Vienna2 Octi. ScaleAlg IlpAlg 0.01 0.01 0.01 0.01 0.09 0.1 – 0.08 0.1 0.11 0.01 0.09 ? ? – – ? ? – – ? ? 4.65 0.36 0.11 0.11 4.66 0.45 DpAlg GreedyAlg Vienna3 Curved ScaleAlg IlpAlg 0.02 0.02 0.02 0.01 0.15 0.14 – 0.13 0.17 0.16 0.02 0.15 0.02 ? – – 0.04 ? – – 0.06 ? 7.27 0.49 0.23 0.16 7.29 0.64 Table 3: Experimental results for Sydney and Vienna. Algo.: The applied algorithm. Candidates: Values concerning candidates; No. of candidates after the first and third step, A12= No. of labels removed to establish Assumption 1 and Assumption 2, SO= No. of switchovers. Cost: Ratio of costs; LA = labeling obtained by procedure A ∈ {DpAlg, GreedyAlg, IlpAlg, ScaleAlg}, L = labeling obtained by procedure IlpAlg. Sequence: Values concerning sequences of labels lying on the same side of their metro line; min=length of shortest sequence, max =length of longest sequence, avg.=average length of sequences. Instance Layout Algo. Candidates Cost Sequence 1st 3rd A12 SO w1 (LA ) w2 (LA ) w3 (LA ) w(LA ) w1 (L) w2 (L) w3 (L) w(L) min max avg. DpAlg GreedyAlg Sydney1 Octi. ScaleAlg IlpAlg 1164 1004 9 4 1164 1005 9 15 1164 – – 13 1164 – – 7 1.73 1.73 2.46 1 1.12 1.87 1.67 1 0.63 7.62 2.91 1 1.16 2.64 1.97 1 3 1 3 3 41 24 20 20 9.53 5.81 6.97 8.1 DpAlg GreedyAlg Sydney2 Octi. ScaleAlg IlpAlg 1104 963 1104 964 1104 – 1104 – 6 19 15 5 1.36 2.46 3.91 1 1.08 1.83 1.92 1 3.25 19.52 8.88 1 1.33 3.54 2.91 1 1 1 1 3 26 35 19 25 9.34 5.94 6.76 9.48 DpAlg GreedyAlg Sydney3 Octi. ScaleAlg IlpAlg 1132 1013 0 6 1132 1013 0 14 1132 – – 12 1132 – – 6 1 2.15 2.72 1 1 1.79 2.68 1 1 5.99 3.06 1 1 2.61 2.76 1 3 1 2 3 25 23 21 25 8.76 6.9 7.02 8.76 DpAlg GreedyAlg Sydney4 Curved ScaleAlg IlpAlg 1275 1020 2 8 1275 1021 2 28 1275 – – 13 1275 – – 7 1 1 1.05 1 1.13 1.08 1.69 1 1.15 12.81 2.28 1 1.01 1.16 1.1 1 3 1 2 3 27 24 20 27 7.38 4.82 6.21 7.92 DpAlg GreedyAlg Vienna1 Octi. ScaleAlg IlpAlg 466 403 466 403 466 – 466 – 0 0 – – 2 7 6 2 0.74 1.26 2.04 1 1.29 2.43 3.14 1 0.99 8.59 6.22 1 1.07 2.48 2.99 1 8 1 1 8 21 12.8 21 9.41 19 10.05 21 12.8 DpAlg GreedyAlg Vienna2 Octi. ScaleAlg IlpAlg 468 324 468 324 468 – 468 – 1 1 – – 8 18 6 4 2.63 4.79 2.63 1 1.03 1.72 1.07 1 4.01 14.23 2.55 1 1.52 3.36 1.4 1 1 1 1 5 16 12 12 16 8.12 4.31 7.87 10 DpAlg GreedyAlg Vienna3 Curved ScaleAlg IlpAlg 606 535 606 535 606 – 606 – 0 0 – – 7 11 13 7 1 0.98 1.18 1 1 1.47 3.2 1 1 1.92 2.18 1 1 1.06 1.34 1 2 1 1 2 22 17 16 22 10.7 6.6 7.43 10.7 3 3 – – (a) Sydney4 : DpAlg, CurvedStyle Layout from [5, Fig. 1a.]. (b) Sydney4 : GreedyAlg, CurvedStyle Layout from [5, Fig. 1a]. Fig. 9: Labelings for Sydney using DpAlg and GreedyAlg. Oracle). We did this in order to measure the actual running times of our algorithms and not to measure the time that the virtual machine of Java spends for loading classes and optimizing byte code. Table 2 and Table 3 present our quantitative results for the considered instances. For Sydney4 labelings are found in Fig. 9 and for Sydney2, Sydney3 and Vienna2 labelings created by DpAlg are found in Fig. 10, Fig. 11, Fig. 12, respectively. The labelings of all instances are found in the appendix. We first note that with respect to the total number of created candidates only few labels are removed for enforcing Assumption 1 and Assumption 2; see Table 3, A12. This indicates that requiring those assumptions is not a real restriction on a realistic set of candidates, even though they seem to be artificial. Running time. Even for large networks as Sydney, our algorithm DpAlg needs less than 0.6 seconds; see Table 2. This shows that our approach is applicable for scenarios in which the map designer wants to adapt the layout and its labeling interactively. In particular in those scenarios not every of the four steps must be repeated each time, which improves computing time. For example, after once applying the scaling step (1st phase, 2nd step – the most time consuming step), the instance does not need to be rescaled again, but the relation between label size and map size is determined. Further, DpAlg is only moderately slower than GreedyAlg; 0.21 seconds in maximum, see Table 2, Sydney4. On the other hand, the approaches IlpAlg and ScaleAlg are not alternatives, because their running times are much worse; over 1 minute in maximum; see Table 2, Sydney4. Quality. We observe that in all labelings created by DpAlg there are only few switchovers, namely 4–8; see Table 3, column SO. Hence, there are long sequences of consecutive labels that lie on the same side of their metro line; see corresponding figures and Table 3, column Sequence. Together with the ILP based approach IlpAlg, it yields the solution with the longest sequences in average. In particular the switchovers are placed such that those sequences are regularly sized. The labels of a single sequence are mostly directed into the same x-direction and in particular they are similarly shaped so that those sequences of labels form regular patterns as desired. The alignment of the labels is chosen so that they blend in with the alignment of their adjacent labels. In comparison with the solution of IlpAlg, the DpAlg ) costs of DpAlg never exceed a factor of 1.52; see Table 3, column w(L w(L) . For the instances Sydney4 and Vienna3 it even obtains a solution with the same costs. For the other instances, DpAlg basically DpAlg ) spends its additional costs on the choice of the single labels ( w1w(L1 (L) ) and the distance of switchovers DpAlg ) ( w3w(L3 (L) ). Berowra Mt Kuring−gai Mt Colah Asquith Richmond East Richmond Hornsby Clarendon Waitara Windsor Wahroonga Mulgrave Vineyard Warrawee Normanhurst Turramurra Riverstone Thornleigh Schofields Quakers Hill Pymble Gordon Pennant Hills Killara Marayong Beecroft Lindfield Roseville Cheltenham R d n s rith in oo gto w in M Pla Pe n gs err St W Kin Em u ary s M tD ru itt oo ty H ill D oo ns id e Blacktown Chatswood Seven Hills Epping Toongabbie Carlingford Pendle Hill Artarmon St Leonards Eastwood Telopea Wentworthville Wollstonecraft Denistone Dundas Westmead Rydalmere Parramatta Waverton West Ryde North Sydney Camellia y Meadowbank Rosehill rQ ua Harris Park cti ula un iJ f clif nd Bo C ro gs n oo d ro yd o As n hfi eld Su m m er Le H ill w is h Pe am te rs h Sta am nm ore N ew to w n M ac do na ld to w C Bu rw om eb us h Museum Central H Erskineville lm ore rk Green Square St Peters Mascot C Be w n ow l ba Pa ke m La on a hb sto y nc nk go ile W Pu Ba Ya am ps ie C an te rb ury H url sto ne D Pa ulw rk ic h H M ill arr ic kv ille Sy de nh am Se fto n d oo hto Warwick Farm St James Town Hall Redfern Strathfield Birrong C m ar Regents Park nfi eld he ste rH ill Cabramatta arr a ge Martin Place Lidcombe Olympic Park Berala Flemington C Ed Concord West Auburn North Strathfield Vill aw Kin Wynyard Guildford Yennora Fairfield Canley Vale ig ss irc C Rhodes Clyde Le on Milsons Point Granville Merrylands Domestic Liverpool Tempe International Casula Wolli Creek Tu rr Arncliffe Banksia Ba Be rd w ell ort N y xle ella Pa rk h H ills y gs gro ve Be ve rl Kin d ee arw N ds to w erw oo R iv Pa nia hy es by R ev H ort Pa na w Ea st H ols ills Glenfield Macquarie Fields Ingleburn Rockdale Minto Kogarah Leumeah Carlton Allawah Campbelltown Hurstville Penshurst Macarthur Mortdale Oatley Como Jannali lla are nu ro C h a ea ba nd w ym ow ng ira G lo M ari oo ra Kir C W ee Sutherland Loftus Engadine Heathcote Waterfall (a) Original labeling by [11] (b) Sydney2 : DpAlg, OctilinStyle Layout from [11, Fig. 9b.]. Fig. 10: Labelings for Sydney. In contrast, GreedyAlg yields significantly more switchovers; in maximum 20 switchovers more than DpAlg, see Sydney4 . Consequently, there are many distracting switches of labels from one side to the other of the metro line; e.g. see Fig. 9. Although the sequences of consecutive labels lying on the same side may be longer in maximum compared to DpAlg, they are much shorter in average; see Table 3, column Sequence. Further, several adjacent labels point in opposite x-directions, which results in distracting effects; see corresponding figures. Altogether, the labelings that are obtained by GreedyAlg do not look regular, but cluttered. DpAlg solves those problems since it considers the metro line globally yielding an optimal labeling for a single line. This observation is also reflected in DpAlg ) Table 3, column w(L w(L) , which shows that the costs computed by GreedyAlg are significantly larger than the costs computed by DpAlg. In particular costs for positioning the switchovers are much worse; Sydney2 : w3 (LGreedyAlg )/w3 (L) = 19.52, w3 (LDpAlg )/w3 (L) = 3.25 and Vienna2 : w3 (LGreedyAlg )/w3 (L) = 14.23, w3 (LDpAlg )/w3 (L) = 4.01. Hence, the better quality of DpAlg prevails the slightly better running time of GreedyAlg. Concerning the computed scale factor in the first phase of DpAlg, the labels are smaller than those produced by ScaleAlg by a factor of 0.54–0.81; see Table 1. While this seems to be a drawback on the first sight, the smaller size provides necessary space that is used to obtain a labeling of higher quality with respect to the number and the placement of switchovers. Hence, the solutions of ScaleAlg have more switchovers (except for Vienna2 ) and shorter sequences of labels lying on the same side in average than DpAlg; see Table 3, column SO and Sequence. We observe that both Nöllenburg and Wolff’s and our labelings of Sydney look quite similar, whereas our labeling has less switchovers; see Fig. 10. The same applies for the labelings of the layout of Vienna; see Fig. 12. Recall that their approach needed more than 10 hours to compute a labeled metro map of Sydney. Since they need only up to 23 minutes to compute the layout without labeling, it lends itself to first apply their approach to gain a layout and then to apply our approach to construct a corresponding labeling. Wang and Chi present in their paper [14] an approach that is divided into two phases. In the first phase they compute the layout of the metro map and then in the second phase they create a labeling for (a) (b) Fig. 11: Labelings for Sydney. (a) Original Labeling presented by Wang and Chi [14] (b) Sydney3 : DpAlg. Floridsdorf Neue Donau Handelskai Dresdner Straße Jägerstraße Heiligenstadt Währinger Straße Volksoper Michelbeuern AKH Ta bo r Pr str at aß er e st er n Spittelau Friedensbrücke Roßauer Lände Nußdorfer Straße Messe Trabrennstraße Stadion Schottenring Alser Straße Nestroyplatz Josefstädter Straße H K O üt e t te nd ta ld le kr or rs in g f Sc J er traß hw oh Str e eg ns aß le tra e rs ß tra e ße Museumsquartier Gumpendorfer Straße H O üt Br b t au U er eld ns nte St orf ch r S . V w t. eit eig V M eid g eit lin S Hieass g ch t e H ön zin au b g pt run st n ra ße Kettenbrückengasse Pilgramgasse Margaretengürtel er Schwedenplatz St Volkstheater Westbahnhof H Zie N gle eu rg ba as ug se as se Rathaus re St nga ep s ha se ns pla tz ub en to r Schottentor Thaliastraße Burggasse Stadthalle Leopoldau Großfeldsiedlung Aderklaaer Straße Rennbahnweg Kagraner Platz Kagran Alte Donau VIC Kaisermühlen Donauinsel Vorgartenstraße Landstraße Stadtpark Karlsplatz Taubstummengasse Südtiroler Platz Keplerplatz Reumannplatz Rochusgasse Kardinal−Nagel−Platz Schlachthausgasse Erdberg Gasometer Zippererstraße Enkplatz Simmering Längenfeldgasse Niederhofstraße Philadelphiabrücke Tscherttegasse Am Schöpfwerk Alterlaa Erlaaer Straße Perfektastraße Siebenhirten (a) (b) Fig. 12: Labelings for Vienna. (a) Original Labeling presented by Nöllenburg and Wolff [11] (b) Vienna2 : DpAlg. that layout. For both steps they formulate energy functions expressing their desired objectives, which then are locally optimized. Figure 11(a) shows the metro map of Sydney created by their approach. In comparison, Fig. 11(b) shows the same layout with a labeling created by our approach. Both labelings look quite similar. While our approach needed 0.26s (see Table 2, Sydney3 ), their approach needed less than 0.1s on their machine. However, their approach does not guarantee that the labels are occlusionfree, but labels may overlap with metro lines and other labels. This may result in illegible drawings A B C (a) (b) Fig. 13: Comparison of two labelings for the same line. (a) Labeling is created by the tool presented by Wang and Chi[14]. (b) Labeling is created by DpAlg. of metro maps. For example Fig. 13 shows two labelings of a metro line of Sydney that has been laid out by the tool of Wang and Chi. Figure 13(a) shows a labeling that has been created by their tool, while Fig. 13(b) shows a labeling that has been created by our approach. The labeling of Wang and Chi has several serious defects that makes the map hardly readable. The marked regions A, B and C show labels that overlap each other. Hence, some of the labels are obscured partly, while some of the labels are completely covered by other labels. For example in region B the label St. Peters and the label Erskinville overlap the label Macdonaldtown such that it is hardly viewable. Further, region C contains two diagonal rows of stops aligned parallel. While the upper row is visible, the lower row is almost completely covered by labels. Further, the labels of the upper row obscure the labels of the lower row. In contrast our approach yields an occlusion-free labeling, such that each label and each stop is easily legible. We therefore think that our approach is a reasonable alternative for the labeling step of Wang and Chi’s approach. In particular, we think that the better quality of our approach prevails the better running time of Wang and Chi’s approach. In conclusion our workflow is a reasonable alternative and improvement for the approaches presented both by Nöllenburg and Wolff, and by Wang and Chi. In the former case, our approach is significantly faster, while in contrast to the latter case we can guarantee occlusion-free labelings. Acknowledgment. We sincerely thank Herman Haverkort, Arlind Nocaj, Aidan Slingsby and Jo Wood for helpful and interesting discussions. References 1. P. K. Agarwal, M. van Kreveld, and S. Suri. Label placement by maximum independent set in rectangles. Comp. Geom.-Theor. Appl., 11:209–218, 1998. 2 2. B. Aspvall, M. F. Plass, and R. E. Tarjan. A linear-time algorithm for testing the truth of certain quantified boolean formulas. Inf. Process. Lett., 8(3):121–123, 1979. 16 3. J. Christensen, J. Marks, and S. Shieber. An empirical study of algorithms for point-feature label placement. Acm. T. Graphic., 14(3):203–232, 1995. 2 4. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms (3. Edition). MIT Press, 2009. 11 5. M. Fink, H. Haverkort, M. Nöllenburg, M. Roberts, J. Schuhmann, and A. Wolff. Drawing Metro Maps Using Bézier Curves. In W. Didimo and M. Patrignani, editors, Graph Drawing, volume 7704 of LNCS, pages 463–474. Springer Berlin Heidelberg, 2013. 1, 19, 22 6. M. Formann and F. Wagner. A packing problem with applications to lettering of maps. In ACM Sympos. on Comput. Geom., pages 281–288, 1991. 2, 4 7. R. J. Fowler, M. S. Paterson, and S. L. Tanimoto. Optimal packing and covering in the plane are npcomplete. Inf. Process. Lett., 12(3):133 – 137, 1981. 4 8. E. Imhof. Positioning names on maps. Am. Cartographer, pages 128–144, 1975. 1, 2, 3, 9, 14 9. K. G. Kakoulis and I. G. Tollis. A unified approach to labeling graphical features. In Proceedings of the Fourteenth Annual Symposium on Computational Geometry, SCG ’98, pages 347–356, New York, NY, USA, 1998. ACM. 2 10. D. Lichtenstein. Planar formulae and their uses. SIAM J. Comput., 11(2):329–343, 1982. 4, 5 11. M. Nöllenburg and A. Wolff. Drawing and labeling high-quality metro maps by mixed-integer programming. IEEE T. Vis. Comput. Gr., 17(5):626–641, 2011. 1, 19, 23, 24 12. J. Stott, P. Rodgers, J. Martinez-Ovando, and S. Walker. Automatic metro map layout using multicriteria optimization. IEEE T. Vis. Comput. Gr., 17(1):101–114, 2011. 1 13. A. van Goethem, W. Meulemans, A. Reimer, H. Haverkort, and B. Speckmann. Topologically safe curved schematisation. Cartogr. J., 50(3):276–285, 2013. 1 14. Y.-S. Wang and M.-T. Chi. Focus+context metro maps. IEEE T. Vis. Comput. Gr., 17(12):2528–2535, 2011. 1, 19, 23, 24, 25 15. A. Wolff. Graph drawing and cartography. In R. Tamassia, editor, Handbook of Graph Drawing and Visualization, chapter 23, pages 697–736. CRC Press, 2013. 1 A Labelings (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 14: Labelings for instance Sydney1. (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 15: Labelings for instance Sydney2. (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 16: Labelings for instance Sydney3. (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 17: Labelings for instance Sydney4. (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 18: Labelings for instance Vienna1. (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 19: Labelings for instance Vienna2. (a) DpAlg (b) GreedyAlg (c) ScaleAlg (d) IlpAlg Fig. 20: Labelings for instance Vienna3.
8cs.DS
Sailfish: Alignment-free Isoform Quantification from arXiv:1308.3700v1 [q-bio.GN] 16 Aug 2013 RNA-seq Reads using Lightweight Algorithms Rob Patro1 , Stephen M. Mount2 , and Carl Kingsford1 1 Lane Center for Computational Biology, School of Computer Science Carnegie Mellon University 2 Department of Cell Biology and Molecular Genetics and Center for Bioinformatics and Computational Biology, University of Maryland RNA-seq has rapidly become the de facto technique to measure gene expression. However, the time required for analysis has not kept up with the pace of data generation. Here we introduce Sailfish, a novel computational method for quantifying the abundance of previously annotated RNA isoforms from RNA-seq data. Sailfish entirely avoids mapping reads, which is a time-consuming step in all current methods. Sailfish provides quantification estimates much faster than existing approaches (typically 20-times faster) without loss of accuracy. The ability to generate genomic and transcriptomic data is accelerating beyond our ability to process it. The increasingly widespread use and growing clinical relevance (e.g. [11]) of RNAseq measurements of transcript abundance will only serve to magnify the divide between our data acquisition and data analysis capabilities. The goal of isoform quantification is to determine the relative abundance of different RNA transcripts given a set of RNA-seq reads. In the analysis of RNA-seq data, isoform quantification is 1 one of the most computationally time-consuming steps, and it is commonly the first step in an analysis of differential expression among multiple samples [13]. There are numerous computational challenges in estimating transcript-level abundance from RNA-seq data. Mapping the sequencing reads to the genome or transcript sequences can require substantial computational resources. This often leads to complicated models that account for read bias and error during inference, further adding to the time spent on analysis. Finally, some reads, known as multireads [7, 15], can map to multiple, sometimes many, different transcripts. The ambiguity resulting from these multireads complicates the estimation of relative transcript abundances. Existing approaches first use read-mapping tools, such as Bowtie [4], to determine potential locations from which the RNA-seq reads originated. Given the read alignments, some of the most accurate transcript quantification tools resolve the relative abundance of transcripts using expectation-maximization (EM) procedures [15, 5, 10]. In such procedures, reads are first assigned to transcripts, and these assignments are then used to estimate transcript abundances. The abundances are then used to re-estimate the read assignments, weighting potential matches in proportion to the currently estimated relative abundances, and these steps are repeated until convergence. In practice, both of these steps can be time consuming. For example, even when exploiting the parallel nature of the problem, mapping the reads from a reasonably sized (e.g. 100M reads) RNA-seq experiment can take hours. Recent tools, such as eXpress [10], aim to reduce the computational burden of isoform quantification from RNA-seq data by substantially altering the EM algorithm. However, even for such advanced approaches, performing read alignment and processing the large number of alignments that result from ambiguously mapping reads remains a significant bottleneck and fundamentally limits the scalability of approaches that depend on mapping. Sailfish, our software for isoform quantification from RNA-seq data, is based on the philosophy of lightweight algorithms, which make frugal use of data, respect constant factors, and effectively use concurrent hardware by working with small units of data where possible. Sailfish avoids mapping reads entirely (Fig. 1), resulting in large savings in time and space. A key technical con- 2 tribution behind our approach is the observation that transcript coverage, which is essential for isoform quantification, can be reliably and accurately estimated using counts of k-mers occurring in reads. This results in the ability to obtain accurate quantification estimates more than an order of magnitude faster than existing approaches, often in minutes instead of hours. For example, for the data described in Figure 2, Sailfish is between 18 and 29 times faster than the next fastest method while providing expression estimates of equal accuracy. In Sailfish, the fundamental unit of transcript coverage is the k-mer. This is different from existing approaches, where the fragment or read is the fundamental unit of coverage. By working with k-mers, we can replace the computationally intensive step of read mapping with the much faster and simpler process of k-mer counting. We also avoid any dependence on read mapping parameters (e.g. mismatches and gaps) that can have a significant effect on both the runtime and accuracy of conventional approaches. Yet, our approach is still able to handle sequencing errors in reads because only the k-mers that overlap the erroneous bases will be discarded or mis-assigned, while the rest of the read can be processed as if it were error-free. This also leads to Sailfish having only a single explicit parameter, the k-mer length. Longer k-mers may result in less ambiguity, which makes resolving their origin easier, but may be more affected by errors in the reads. Conversely, shorter k-mers, though more ambiguous, may be more robust to errors in the reads (Supplementary Fig. 1). Further, we can effectively exploit modern hardware where multiple cores and reasonably large memories are common. Many of our data structures can be represented as arrays of atomic integers (see Methods). This allows our software to be concurrent and lock-free where possible, leading to an approach that scales well with the number of available CPUs (Supplementary Fig. 2). Additional benefits of the Sailfish approach are discussed in Supplementary Note 1. Sailfish works in two phases: indexing and quantification (Fig. 1). A Sailfish index is built from a particular set of reference transcripts (a FASTA sequence file) and a specific choice of k-mer length, k. The index consists of data structures that make counting k-mers in a set of reads and resolving their potential origin in the set of transcripts efficient (see Methods). The most important data structure in the index is the minimal perfect hash function [1] that maps each k-mer in the 3 (1) index (per reference & choice of k) reference transcripts (2) quant read data perfect hash function array of k-mer counts transcript k-mer k-mers transcripts (per set of reads) unhashable k-mers estimate abundances µ̂1 µ̂2 ... ... reallocate counts based on µ̂ µ̂M µ̂1 µ̂2 µ̂M Figure 1: The Sailfish pipeline consists of an indexing phase (1) that is invoked via the command sailfish index and a quantification phase (2) invoked via the command sailfish quant. The Sailfish index has four components: (a) a perfect hash function mapping each k-mer in the transcript set to a unique integer between 0 and N — the number of unique k-mers in the set of transcripts; (b) an array recording the number of times each k-mer occurs in the reference set; (c) an index mapping each transcript to the multiset of k-mers that it contains; (d) an index mapping each k-mer to the set of transcripts in which it appears. The quantification phase consists of counting the indexed k-mers in the set of reads and then applying an EM procedure to determine the maximum-likelihood estimates of relative transcript abundance. 4 reference transcripts to an index between 0 and the number of different k-mers in the transcripts such that no two k-mers share an index. This allows us to quickly index and count any k-mer from the reads that also appears in the transcripts. We find that pairing the minimum perfect hash function with an atomically updateable array of k-mer counts allows us to count k-mers even faster than with existing advanced lock-free hashes such as that used in Jellyfish [6]. The index also contains a pair of look-up tables that allow fast access to the indexed k-mers appearing in a specific transcript as well as the indexed transcripts in which a particular k-mer appears, both in amortized constant time. Because the index depends only on the set of reference transcripts and the choice of k-mer length, it only needs to be rebuilt when one of these factors changes. The quantification phase of Sailfish takes as input the index described above and a set of RNAseq reads and produces an estimate of the relative abundance of each transcript in the reference, measured in both Reads Per Kilobase per Million mapped reads (RPKM) and Transcripts Per Million (TPM); (see Methods for the definitions of these measures). First, Sailfish counts the number of times each indexed k-mer occurs in the set of reads. Owing to efficient k-mer indexing by means of the perfect hash function and the use of a lock-free counting data structure (Methods), this process is efficient and scalable (Supplementary Fig. 2). Sailfish then applies an expectationmaximization (EM) procedure to determine maximum likelihood estimates for the relative abundance of each transcript. Conceptually, this procedure is similar to the EM algorithm used by RSEM [5], except that k-mers rather than fragments are probabilistically assigned to transcripts, and a two-step variant of EM is used to speed up convergence. The estimation procedure first assigns k-mers proportionally to transcripts (i.e. if a transcript is the only potential origin for a particular k-mer, then all observations of that k-mer are attributed to this transcript, whereas for a k-mer that appears once in each of n different transcripts and occurs m times in the set of reads, m/n observations are attributed to each potential transcript of origin). These initial allocations are then used to estimate the expected coverage for each transcript (Methods, Eqn. 3). In turn, these expected coverage values alter the assignment probabilities of k-mers to transcripts (Methods, Eqn. 1). Using these basic EM steps as a building block, we apply a globally-convergent 5 EM acceleration method, SQUAREM [16], that substantially increases the convergence rate of the estimation procedure by modifying the parameter update step and step-length based on the current solution path and the estimated distance from the fixed point (see Methods, Alg. 2). Additionally, we reduce the number of variables that need to be fit by the EM procedure by collapsing k-mers into equivalence classes. Two k-mers are equivalent from the perspective of the EM algorithm if they occur in the same set of transcript sequences with the same rate (more details available in Methods). This reduction in the number of active variables substantially reduces the computational requirements of the EM procedure. For example, in the set of reference transcripts for which we estimate abundance using the Microarray Quality Control (MAQC) [12] data (Fig. 2), there are 60,504,111 k-mers (k = 20), of which 39,393,132 appear at least once in the set of reads. However, there are only 151,385 distinct equivalence classes of k-mers with non-zero counts. Thus, our EM procedure needs to optimize the allocations of 151,385 k-mer equivalence classes instead of 39,393,132 individual k-mers, a reduction by a factor of ≈ 260. Once the EM procedure converges, the estimated abundances are corrected for systematic errors due to sequence composition bias and transcript length using a regression approach similar to Zheng et al. [18], though using random forest regression instead of a generalized additive model. This correction is applied after initial estimates have been produced rather than at a read mapping or fragment assignment stage, requiring fewer variables to be fit during bias correction. To examine the efficiency and accuracy of Sailfish, we compared it to RSEM [5], eXpress [10] and Cufflinks [15] using both real and synthetic data. Accuracy on real data was quantified by the agreement between RNA-seq-based expression estimates computed by each piece of software and qPCR measurements for the same sample (human brain tissue (HBR) in Fig. 2 and Supplementary Fig. 3, and universal human reference tissue (UHR) in Supplementary Fig. 4). These paired RNA-seq and qPCR experiments were performed as part of the Microarray Quality Control (MAQC) study [12]. qPCR abundance measurements are given at the resolution of genes rather than isoforms. Thus, to compare these measurements with the transcript-level abundance estimates produced by the software, we summed the estimates for all isoforms belonging to a gene to obtain 6 c a RPKM(log2 ) 0 5 103 5 0 qPCR(log2 ) 10 6.20h 6.75h 2.27h 102 15 15.72h 10.19h Time in minutes 10 RPKM(log2 ) alignment quantification 46.55h 10 b 104 0.26h 101 0.12h 5 0 0 5 10 Ground Truth(log2 ) d 15 fish RSEM Xpress fflinks e Cu Sail Human Brain Tissue Pearson Spearman RMSE medPE Synthetic SRX016366 100 fish RSEM Xpress fflinks e Cu Sail Synthetic Sailfish RSEM eXpress Cufflinks Sailfish RSEM eXpress Cufflinks 0.86 0.85 1.69 31.60 0.83 0.81 1.86 36.63 0.86 0.86 1.69 32.73 0.86 0.86 1.67 30.75 0.92 0.94 1.26 4.24 0.92 0.93 1.24 5.97 0.64 0.66 2.80 26.44 0.91 0.93 1.31 6.76 Figure 2: (a) The correlation between qPCR estimates of gene abundance (x-axis) and the estimates of Sailfish. The ground-truth results are taken from the microarray quality control study (MAQC) [12]. The results shown here are for the human brain tissue and the RNA-seq based estimates were computed using the reads from SRA accession SRX016366. The set of transcripts used in this experiment were the curated RefSeq [9] genes (accession prefix NM) from hg18. (b) The correlation between the actual number of transcript copies in a simulated dataset (x-axis) and the abundance estimates of Sailfish. The transcripts used in this experiment were all Ensembl [2] transcripts from hg19 that were annotated with a coding feature (CDS). (c) The total time taken by each method, Sailfish, RSEM, eXpress and Cufflinks, to estimate isoform abundance on each dataset. The total time taken by a method is the height of the corresponding bar, and the total is further broken down into the time taken to perform read-alignment (for Sailfish, we instead measured the time taken to count the k-mers in the read set) and the time taken to quantify abundance given the aligned reads (or k-mer counts). All tools were run in multi-threaded mode (where applicable) and were allowed to use up to 16 threads. The table (d) gives the accuracy of each of the methods on both datasets, as measured by the Pearson and Spearman correlation coefficients, root-mean-square error (RMSE) and median percentage error (medPE). 7 an estimate for that gene. We compare predicted abundances using correlation coefficients, rootmean-square error (RMSE), and median percentage error (medPE) (additional details available in Supplementary Note 2). Figure 2 shows that the speed of Sailfish does not sacrifice any accuracy. To show that Sailfish is accurate at the isoform level, we generated synthetic data using the Flux Simulator [3], which allows versatile modeling of various RNA-seq protocols (see Supplementary Note 3). Unlike synthetic test data used in previous work [5, 10], the procedure used by the Flux Simulator is not based specifically on the generative model underlying our estimation procedure. Sailfish remains accurate at the isoform level (Fig. 2). The memory usage of Sailfish is comparable with that of other tools, using between 4 and 6 Gb of RAM during isoform quantification for the experiments reported here. Sailfish applies the idea of lightweight algorithms to the problem of isoform quantification from RNA-seq reads and in doing so achieves a breakthrough in terms of speed. By eliminating the necessity of read mapping from the expression estimation pipeline, we not only improve the speed of the process but also simplify it considerably, eliminating the burden of choosing all but a single external parameter (the k-mer length) from the user. As the size and number of RNA-seq experiments grow, we expect Sailfish and its paradigm to remain efficient for isoform quantification because the memory footprint is bounded by the size and complexity of the target transcripts and the only phase that grows explicitly in the number of reads — k-mer counting — has been designed to effectively exploit many CPU cores. Sailfish is free and open-source software and is available at http://www.cs.cmu.edu/~ckingsf/ software/sailfish. Methods Indexing. The first step in the Sailfish pipeline is building an index from the set of reference transcripts T . Given a k-mer length k, we compute an index Ik (T ) containing four components. The first component is a minimum perfect hash function h on the set of k-mers kmers(T ) contained 8 in T . A minimum perfect hash function is a bijection between kmers(T ) and the set of integers {0, 1, . . . , |kmers(T )| − 1}. Sailfish uses the BDZ minimum perfect hash function [1]. The second component of the index is an array C containing a count C (si ) for every si ∈ kmers(T ). Finally, the index contains a lookup table F, mapping each transcript to the multiset of k-mers that it contains and a reverse lookup table R mapping each k-mer to the set of transcripts in which it appears. The index is a product only of the reference transcripts and the choice of k, and thus needs only to be recomputed when either of these changes. Quantification. The second step in the Sailfish pipeline is the quantification of relative transcript abundance; this requires the Sailfish index Ik (T ) for the reference transcripts T as well as a set of RNA-seq reads R. First, we count the number of occurrences of each si ∈ kmers(T ) ∩ kmers(R). Since we know exactly the set of k-mers that need to be counted and already have a perfect hash function h for this set, we can perform this counting in a particularly efficient manner. We maintain an array CR of the appropriate size |kmers(T )|, where CR (h(si )) contains the number of times we have thus far observed si in R. Sequencing reads, and hence the k-mers they contain, may originate from transcripts in either the forward or reverse direction. To account for both possibilities, we check both the forward and reverse-complement k-mers from each read and use a majority-rule heuristic to determine which of the k-mers to increment in the final array of counts CR . If the number of k-mers appearing in h from the forward direction of the read is greater than the number of reverse-complement k-mers, then we only increment the counts for k-mers appearing in this read in the forward direction. Otherwise, only counts for k-mers appearing in the reverse-complement of this read are incremented in the array of counts. Ties are broken in favor of the forward directed reads. By taking advantage of atomic integers and the compare-and-swap (CAS) operation provided by modern processors, which allows many hardware threads to efficiently update the value of a memory location without the need for explicit locking, we can stream through R and update the counts of CR in parallel while sustaining very little resource contention. 9 We then apply an expectation-maximization algorithm to obtain estimates of the relative abundance of each transcript. We define a k-mer equivalence class as the set of all k-mers that appear in the same set of transcripts with the same frequency. In other words, let χ(s) be a vector that so that entry t of χ(s) gives how many times s appears in transcript t ∈ T . Then the equivalence class of a k-mer si is given by [si ] = {s j ∈ kmers(T ) | χ(s j ) = χ(si )}. When performing the EM procedure, we will allocate counts to transcripts according to the set of equivalence classes rather than the full  set of transcripts. We will let T ([si ]) = ∑s j ∈[si ] CR h(s j ) denote the total count of k-mers in R that originate from equivalence class [si ]. We say that transcript t contains equivalence class [s] if [s] is a subset of the multiset of k-mers of t and denote this by [s] ⊆ t. Estimating abundances via an EM algorithm. The EM algorithm (Algo. 1) alternates between estimating the fraction of counts of each observed k-mer that originates from each transcript (Estep) and estimating the relative abundances of all transcripts given this allocation (M-step). The E-step of the EM algorithm computes the fraction of each k-mer equivalence class’ total   count that is allocated to each transcript. For equivalence class s j and transcript ti , this value is computed by   µ̂i T ( s j ) , α( j, i) = ∑t⊇[s j ] µ̂t (1) where µ̂i is the currently estimated relative abundance of transcript i. These allocations are then used in the M-step of the algorithm to compute the relative abundance of each transcript. The relative abundance of transcript i is estimated by µ̂i = µi ∑t j ∈T µ j , (2) where µi is µi = ∑[s j ]⊆ti α( j, i) . lˆi (3) The variable lˆi denotes the adjusted length of transcript i and is simply lˆi = li − k + 1 where li is the length of transcript i in nucleotides. 10 Algorithm 1: An EM iteration. One iteration of the expectation-maximization procedure that updates the estimated k-mer allocations α(·, ·) and computes new estimates of relative µ. transcript abundance µˆ 0 based on the current estimates of relative transcript abundance µ̂ µ) 1 function EM( µ̂ 2 begin   3 for s j do 4 w = ∑t⊇[s j ] µ̂t   5 for t ⊇ s j do   6 α( j, i) = µ̂i T ( s j )/w 7 8 9 10 11 12 13 14 y=0 for t ∈ T do Ct = ∑[s j ]⊆ti α( j, i) µt0 = Ct /lˆi y = y + µt for t ∈ T do µ̂ 0t = µt0 /y return µˆ 0 = hµˆ 0 0 , µˆ 0 1 , . . . , µˆ 0 |T | i Algorithm 2: A SQUAREM iteration. Updates the relative abundance estimates according to an accelerated EM procedure whose update direction and magnitude are dynamically computed [16]. µ 1 = EM(µ̂ µ 0) 1 µ̂ µ 2 = EM(µ̂ µ 1) 2 µ̂ µ 1 − µ̂ µ0 3 r = µ̂ µ µ 1) − r 4 v = ( µ̂ 2 − µ̂ 5 γ = − ||r|| / ||v|| 6 modify γ by backtracking, if necessary, to ensure global convergence µ 3 = max(00, µ̂ µ 0 − 2γr + γ 2 v) 7 µ̂ µ 0 = EM(µ̂ µ 3) 8 µ̂ 11 However, rather than perform the standard EM update steps, we perform updates according to µ t = hµ̂0 , . . . , µ̂|T | i is a vector of relative the SQUAREM procedure [16] described in Algo. 2. µ̂ abundance maximum-likelihood estimates, and EM(·) is a standard iteration of the expectationmaximization procedure as outlined in Algo. 1. For a detailed explanation of the SQUAREM procedure and its proof of convergence, see [16]. Intuitively, the SQUAREM procedure builds an µ from 3 successive steps along the EM solution path, and uses approximation of the Jacobian of µ̂ the magnitude of the differences between these solutions to determine a step size γ by which to update the estimates according to the update rule (line 7). The procedure is then capable of making µ parameters, which substantially improves the speed of converrelatively large updates to the µ̂ gence. In Sailfish, the iterative SQUAREM procedure is repeated for a user-specified number of steps (30 for all experiments reported in this paper; see Supplementary Fig. 5). Bias Correction. The bias correction procedure implemented in Sailfish is based on the model introduced by Zheng et al. [18]. Briefly, it performs a regression analysis on a set of potential bias factors where the response variables are the estimated transcript abundances (RPKMs). Sailfish automatically considers transcript length, GC content and dinucleotide frequencies as potential bias factors, as this specific set of features were suggested by Zheng et al. [18]. For each transcript, the prediction of the regression model represents the contribution of the bias factors to this transcript’s estimated abundance. Hence, these regression estimates (which may be positive or negative) are subtracted from the original estimates to obtain bias-corrected RPKMs. For further details on this bias correction procedure, see [18]. The original method used a generalized additive model for regression; Sailfish implements the approach using random forest regression to leverage high-performance implementations of this technique. The key idea here is to do the bias correction after abundance estimation rather than earlier in the pipeline. The bias correction of Sailfish can be disabled with the --no-bias-correction command line option. Finally, we note that it is possible to include other potential features, like normalized coverage plots that can encode positional bias, into the bias correction phase. However, in the current version of Sailfish, we have not 12 implemented or tested bias correction for these features. Computing RPKM and TPM. Sailfish outputs both Reads Per Kilobase per Million mapped reads (RPKM) and Transcripts Per Million (TPM) as quantities predicting the relative abundance of different isoforms. The RPKM estimate is the most commonly used, and is ideally 109 times the rate at which reads are observed at a given position, but the TPM estimate has also become somewhat common [5, 17]. Given the relative transcript abundances µ̂i estimated by the EM procedure described above, the TPM for transcript i is given by TPMi = 106 µ̂i . (4) Let Ci = ∑[s j ]⊆ti α( j, i) be the number of k-mers mapped to transcript i. Then, the RPKM is given by RPKMi = Ci li/103 N 106 = 109 Clii N ≈ 109 µi , N (5) where N = ∑[si ] T ([si ]) and the final equality is approximate only because we replace li with lˆi . Computing Accuracy Metrics. Since the RPKM (and TPM) measurements are only relative estimates of isoform abundance, it is essential to put the ground-truth and estimated relative abundances into the same frame of reference before computing our validation statistics. While this centering procedure will not effect correlation estimates, it is important to perform before computing M RMSE and medPE. Let X = {xi }M i=1 denote the ground-truth isoform abundances and Y = {yi }i=1 denote the estimated abundances. We transform the estimated abundances by aligning their centroid with that of the ground-truth abundances; specifically, we compute the centroid-adjusted  M M abundance estimates as Y 0 = {yi − ω}M where ω = x − y /M. It is these centroid ∑ ∑ i i i=i i=1 i=1 adjusted abundance estimates on which we compute all statistics. Simulated Data. The simulated RNA-seq data was generated by the FluxSimulator [3] v1.2 with the parameters listed in Supplementary Note 3. This resulted in a dataset of 150M, 76 base13 pair pared-end reads. RSEM, eXpress and Cufflinks were given paired-end alignments since they make special use of this data. Further, for this dataset, Bowtie [4] was given the additional flag -X990 when aligning the reads to the transcripts, as 990 base-pairs was the maximum observed insert size in the simulated data. TopHat [14] was provided with the option --mate-inner-dist 198, to adjust the expected mate-pair inner-distance to the simulated average. The read files were provided directly to Sailfish without any extra information since the same quantification procedure is used whether single or paired end reads are provided. Software Comparisons. For all comparisons, both eXpress and RSEM were provided with the same sets of aligned reads in BAM format. All reads were aligned with Bowtie [4] v0.12.9 using the parameters -aS and -v3, which allows up to three mismatches per read and reports all alignments. To prepare an alignment for Cufflinks, TopHat was run using Bowtie 1 (--bowtie1) and with options -N 3 and --read-edit-dist 3 to allow up to three mismatches per read. For RSEM, eXpress and Cufflinks, the reported times were the sum of the times required for alignment (via Bowtie for RSEM and eXpress or via TopHat for Cufflinks) and the times required for quantification. The time required for each method is further decomposed into the times for the alignment and quantification steps in Fig. 2. Choice of Software Options and Effect on Runtime. Most expression estimation software, including RSEM, eXpress and Cufflinks, provides a myriad of program options to the user which allow for trade-offs between various desiderata. For example, the total time required by TopHat and Cufflinks is lower when Cufflinks is run without bias correction (e.g. 1.92h as opposed to 2.27h with bias correction on the SRX016366 data). However, without bias correction, Cufflinks yields slightly lower accuracy (Pearson σ = 0.82, Spearman ρ = 0.81) than the other methods, while still taking 16 times longer to run than Sailfish. Similarly, although aligned reads can be streamed directly into eXpress via Bowtie, we empirically observed lower overall runtimes when aligning reads and quantifying expressions separately (and in serial), so these times were reported. Also, we found that on the synthetic data, the correlations produced by eXpress improved to Pearson 14 σ = 0.85, Spearman ρ = 0.87 and σ = 0.9, ρ = 0.92 when running the EM procedure for 10 or 30 extra rounds (-b 10 and -b 30). However, this also greatly increased the runtime (just for the estimation step) from 1.9h to 16.71h and 42.12h respectively. In general, we attempted to run each piece of software with the options that would be most common in a standard usage scenario. However, despite the inherent difficulty of comparing a set of tools parameterized on an array of potential options, the core thesis that Sailfish can provide accurate expression estimates much faster than any existing tool remains true, as the fastest performing alternatives, when even when sacrificing accuracy for speed, were over an order of magnitude slower than Sailfish. Sailfish version 0.5 was used for all experiments, and all analyses were performed with a kmer size of k = 20. Bias correction was enabled in all experiments involving real but not simulated data. The RPKM values reported by Sailfish were used as transcript abundance estimates. RSEM [5] version 1.2.3 was used with default parameters, apart from being provided the alignment file (--bam), for all experiments, and the RPKM values reported by RSEM were used as abundance estimates. eXpress [10] version 1.3.1 was used for all experiments. It was run with default parameters on the MACQ data, and without bias correction (--no-bias-correct) on the synthetic data. The abundance estimates were taken as the FPKM values output by eXpress. Cufflinks [15] version 2.1.1 was used for experiments and was run with bias correction (-b) and multi-read recovery (-u) on the MACQ data, and with only multi-read recovery (-u) on the synthetic data. The FPKM values output by Cufflinks were used as the transcript abundance estimates. All experiments were run on a computer with 8 AMD OpteronTM 6220 processors (4 cores each) and 256Gb of RAM. For all experiments, the wall time was measured using the built-in bash time command. Implementation of Sailfish. Sailfish has two basic subcommands, index and quant. The index command initially builds a hash of all k-mers in the set of reference transcripts using the Jelly- 15 fish [6] software. This hash is then used to build the minimum perfect hash, count array, and look-up tables described above. The index command takes as input a k-mer size via the -k option and a set of reference transcripts in FASTA format via the -t parameter. It produces the Sailfish index described above, and it can optionally take advantage of multiple threads with the target number of threads being provided via a -p option. The quant subcommand estimates the relative abundance of transcripts given a set of reads. The quant command takes as input a Sailfish index (computed via the index command described above and provided via the -i parameter). Additionally, it requires the set of reads, provided as a list of FASTA or FASTQ files given by the -r parameter. Finally, just as in index command, the quant command can take advantage of multiple processors, the target number of which is provided via the -p option. Sailfish is implemented in C++11 and takes advantage of several C++11 language and library features. In particular, Sailfish makes heavy use of built-in atomic data types. Parallelization across multiple threads in Sailfish is accomplished via a combination of the standard library’s thread facilities and the Intel Threading Building Blocks (TBB) library [8]. Sailfish is available as an open-source program under the GPLv3 license, and has been developed and tested on Linux and Macintosh OS X. Author Contributions R.P., S.M.M. and C.K. designed the method and algorithms, devised the experiments, and wrote the manuscript. R.P. implemented the Sailfish software. Acknowledgments This work has been partially funded by National Science Foundation (CCF1256087, CCF-1053918, and EF-0849899) and National Institutes of Health (1R21AI085376 and 1R21HG006913). C.K. received support as an Alfred P. Sloan Research Fellow. 16 References [1] F. C. Botelho, R. Pagh, and N. Ziviani. Simple and space-efficient minimal perfect hash functions. In Algorithms and Data Structures, pages 139–150. Springer, 2007. [2] P. Flicek, I. Ahmed, M. R. Amode, D. Barrell, K. Beal, S. Brent, D. Carvalho-Silva, P. Clapham, G. Coates, S. Fairley, et al. Ensembl 2013. Nucleic Acids Research, 41(D1):D48– D55, 2013. [3] T. Griebel, B. Zacher, P. Ribeca, E. Raineri, V. Lacroix, R. Guigó, and M. Sammeth. Modelling and simulating generic RNA-Seq experiments with the flux simulator. Nucleic Acids Research, 40(20):10073–10083, 2012. [4] B. Langmead, C. Trapnell, M. Pop, S. L. Salzberg, et al. Ultrafast and memory-efficient alignment of short DNA sequences to the human genome. Genome Biology, 10(3):R25, 2009. [5] B. Li and C. Dewey. RSEM: accurate transcript quantification from RNA-Seq data with or without a reference genome. BMC Bioinformatics, 12(1):323, 2011. [6] G. Marçais and C. Kingsford. A fast, lock-free approach for efficient parallel counting of occurrences of k-mers. Bioinformatics, 27(6):764–770, 2011. [7] A. Mortazavi, B. A. Williams, K. McCue, L. Schaeffer, and B. Wold. Mapping and quantifying mammalian transcriptomes by RNA-Seq. Nature Methods, 5(7):621–628, 2008. [8] C. Pheatt. Intel threading building blocks. Journal of Computing Sciences in Colleges, 23(4):298–298, Apr. 2008. [9] K. D. Pruitt, T. Tatusova, G. R. Brown, and D. R. Maglott. NCBI Reference Sequences (RefSeq): current status, new features and genome annotation policy. Nucleic Acids Research, 40(D1):D130–D135, 2012. 17 [10] A. Roberts, L. Pachter, et al. Streaming fragment assignment for real-time analysis of sequencing experiments. Nature methods, 10(1):71–73, 2013. [11] S. Roychowdhury, M. K. Iyer, D. R. Robinson, R. J. Lonigro, Y.-M. Wu, X. Cao, S. KalyanaSundaram, L. Sam, O. A. Balbin, M. J. Quist, T. Barrette, J. Everett, J. Siddiqui, L. P. Kunju, N. Navone, J. C. Araujo, P. Troncoso, C. J. Logothetis, J. W. Innis, D. C. Smith, C. D. Lao, S. Y. Kim, J. S. Roberts, S. B. Gruber, K. J. Pienta, M. Talpaz, and A. M. Chinnaiyan. Personalized oncology through integrative high-throughput sequencing: A pilot study. Science Translational Medicine, 3(111):111ra121, 2011. [12] L. Shi, L. H. Reid, W. D. Jones, R. Shippy, J. A. Warrington, S. C. Baker, P. J. Collins, F. De Longueville, E. S. Kawasaki, K. Y. Lee, et al. The MicroArray Quality Control (MAQC) project shows inter-and intraplatform reproducibility of gene expression measurements. Nature Biotechnology, 24(9):1151–1161, 2006. [13] C. Soneson and M. Delorenzi. A comparison of methods for differential expression analysis of RNA-seq data. BMC Bioinformatics, 14(1):91, 2013. [14] C. Trapnell, L. Pachter, and S. L. Salzberg. TopHat: discovering splice junctions with RNASeq. Bioinformatics, 25(9):1105–1111, 2009. [15] C. Trapnell, B. A. Williams, G. Pertea, A. Mortazavi, G. Kwan, M. J. van Baren, S. L. Salzberg, B. J. Wold, and L. Pachter. Transcript assembly and quantification by RNA-Seq reveals unannotated transcripts and isoform switching during cell differentiation. Nature Biotechnology, 28(5):511–515, 2010. [16] R. Varadhan and C. Roland. Simple and globally convergent methods for accelerating the convergence of any EM algorithm. Scandinavian Journal of Statistics, 35(2):335–353, 2008. [17] G. P. Wagner, K. Kin, and V. J. Lynch. Measurement of mRNA abundance using RNA-seq data: RPKM measure is inconsistent among samples. Theory in Biosciences, 131(4):281– 285, 2012. 18 [18] W. Zheng, L. M. Chung, and H. Zhao. Bias detection and correction in RNA-Sequencing data. BMC Bioinformatics, 12(1):290, 2011. 19 Sailfish: Alignment-free Isoform Quantification from RNA-seq Reads using Lightweight Algorithms Rob Patro, Stephen M.Mount and Carl Kingsford 1 Supplementary Figure 1: Effect of k-mer length on retained data and k-mer ambiguity 1.0 0.9 Ratio (count / total) 0.8 0.7 mapped k-mers / possible k-mers unique k-mers / all k-mers 0.6 0.5 0.4 0.3 16 18 20 k-mer length 22 24 Supplementary Figure 1: As the k-mer length is varied in the range [15, 25] when processing the synthetic dataset, we observe that a longer k-mer length results in a slight decrease in data retention (denoted by the red line which shows the ratio of number of k-mers from the read set that were hashable to the total number of k-mers appearing in the set of reads). Simultaneously, we observe that the ratio of the number of unique k-mers (k-mers having a unique locus of origin) in the set of transcripts to the total number of k-mers in the set of transcripts (blue line) increases as we make k larger. It seems that, as expected, there is a trade-off in the choice of k, with a larger k resulting in less robustness to sequencing error but a higher fraction unique k-mers and smaller k-mers providing more robustness to errors in the data but at the cost of increased ambiguity. However, since the differences are relatively small over a reasonably large range of k, we can expect the inference procedure to be fairly robust to this parameter. We use k = 20 for all experiments, and this is the default in Sailfish. However, we did not attempt to optimize this parameter when performing our experiments. 2 Supplementary Figure 2: Speed of counting indexed k-mers Supplementary Figure 2: The time to count all of the k-mers and quantify transcript abundance in an 81M read dataset (SRX016366) as function of the number of concurrent hashing threads. Even with only a single thread, the counts for all k-mers in the dataset can be processed in 34 minutes and 26 seconds, while with 32 processing threads, all k-mers can be counted in only 1 minute and 28 seconds. 3 Supplementary Note 1: Additional benefits of the Sailfish approach An additional benefit of our lightweight approach is that the size of the indexing and counting structures required by Sailfish are a small fraction of the size of the indexing and alignment files required by most other methods. For example, for the MAQC dataset described in Figure 2, the total size of the indexing and count files required by Sailfish for quantification was 2.4Gb, compared with much larger indexes and accompanying alignment files in BAM format used by other approaches (e.g., the 15.5Gb index and alignment file produced by Bowtie [4]). Unlike alignment files which grow with the number of reads, the Sailfish index files grow only with the number of unique k-mers and the complexity of the transcriptome’s k-mer composition and are independent of the number of reads. 4 Supplementary Figure 3: Correlation plots with qPCR on human brain tissue and synthetic data RSEM Cufflinks 0 0 5 5 5 10 10 RPKM(log2 ) 0 10 20 RPKM(log2 ) eXpress 5 qPCR(log2 ) 0 10 10 5 qPCR(log2 ) 0 10 20 20 15 15 15 10 10 10 5 5 5 0 0 5 15 Ground Truth(log2 ) 10 20 0 0 5 15 Ground Truth(log2 ) 10 20 0 0 5 5 0 10 15 qPCR(log2 ) Ground Truth(log2 ) 20 Supplementary Figure 3: Correlation plots of RSEM, eXpress and Cufflinks for the data presented in Fig. 2. Each column is labeled with the method whose output was used to produce that column’s plots. The top row of plots show the correlation between the computed RPKM and the qPCR-based expression estimates for the human brain tissue. The bottom row of plots shows the correlation between the computed RPKM and the true abundance of each transcript on the synthetic dataset. To generate the results shown here, eXpress was run using its default streaming expression estimation algorithm. As reported in Methods, additional batch EM iterations improve eXpress’s accuracy, but come at the cost of a substantial increase in runtime. 5 Supplementary Figure 4: Correlation with qPCR on universal human reference tissue RPKM(log2 ) Sailfish RSEM eXpress Cufflinks 5 5 5 5 0 0 0 0 5 5 5 5 10 10 10 10 10 5 0 qPCR(log2 ) 5 10 5 qPCR(log2 ) 5 0 10 104 5 5 0 qPCR(log2 ) 10 5 0 qPCR(log2 ) 5 alignment quantification 35.60h 103 Time in minutes 8.60h 2.60h 102 101 100 0.10h fish Sail M RSE SRX016367 ress eXp s flink Cuf Sailfish RSEM eXpress Cufflinks Pearson 0.87 0.85 0.87 0.87 Spearman 0.88 0.85 0.88 0.88 RMSE 1.64 1.81 1.65 1.68 medPE 29.95 34.77 31.03 27.33 Supplementary Figure 4: The accuracy of four methods on a second dataset from the MACQ [12] study. The reads for this experiment were taken from SRA accession SRX016367 (≈ 93M reads) and are from a mixture of different tissues (i.e. the Universal Human Reference or UHR). The same set of reference transcripts were used as in Fig. 2 of the main text. The relative accuracy and performance of the methods is similar to what we observed in the other MACQ dataset, with Sailfish, eXpress and Cufflinks all achieving comparable accuracy (all slightly more accurate than RSEM). Sailfish is ≈ 26 times faster then Cufflinks, the closest method in terms of speed. 6 Supplementary Note 2: Additional details of accuracy analysis We compare predicted abundances using correlation coefficients (Pearson & Spearman), rootmean-square error (RMSE), and median percentage error (medPE). These metrics allow us to gauge the accuracy of methods from different perspectives . For example, the Pearson correlation coefficient measures how well trends in the true data are captured by the methods, but, because the correlation is taken in the log scale, it discounts transcripts with zero (or very low) abundance in either sample, while the RMSE includes transcripts with true or estimated abundance of zero. Both eXpress and Cufflinks produced a few outlier transcripts, with very low but non-zero estimated abundance, which significantly degraded the Pearson correlation measure. We discarded these outliers by filtering the output of these methods, and setting to zero any estimated RPKM less than or equal to 0.01, a cutoff chosen because it removed the outliers but did not seem to discard any other truly expressed transcripts. 7 Supplementary Note 3: Parameters for simulated data The simulated RNA-seq data was generated by the FluxSimulator [3] v1.2 with the following parameters. ### Expression ### NB_MOLECULES 5000000 REF_FILE_NAME hg19_annotations.gtf GEN_DIR hg19/chrs LOAD_NONCODING NO TSS_MEAN 50 POLYA_SCALE NaN POLYA_SHAPE NaN ### Fragmentation ### FRAG_SUBSTRATE RNA FRAG_METHOD UR FRAG_UR_ETA 350 FRAG_UR_D0 1 ### Reverse Transcription ### RTRANSCRIPTION YES RT_PRIMER RH RT_LOSSLESS YES RT_MIN 500 RT_MAX 5500 ### Amplification ### GC_MEAN NaN PCR_PROBABILITY 0.05 FILTERING NO ### Sequencing ### READ_NUMBER 150000000 READ_LENGTH 76 PAIRED_END YES ERR_FILE 76 FASTA YES UNIQUE_IDS YES 8 Supplementary Figure 5: Convergence of relative abundance estimates −5 ×10 1.2 1.0 |µ̂0−µ̂1| |T | 0.8 0.6 0.4 0.2 0.0 0 5 10 15 iteration 20 25 30 Supplementary Figure 5: The average difference between the relative abundance as estimated by two successive applications of the EM step (Algo. 2 lines 1–2) versus iterations of the SQUAREM algorithm (in the Universal Human Reference tissue experiment). We can see that the residual drops off quickly, and appears to have converged before 30 iterations of the SQUAREM procedure have been performed. 9
5cs.CE
Multiscale model reduction for shale gas transport in fractured media I. Y. Akkutlu ∗ Yalchin Efendiev† Maria Vasilyeva‡ arXiv:1507.00113v1 [cs.CE] 1 Jul 2015 July 2, 2015 Abstract In this paper, we develop a multiscale model reduction technique that describes shale gas transport in fractured media. Due to the pore-scale heterogeneities and processes, we use upscaled models to describe the matrix. We follow our previous work [1], where we derived an upscaled model in the form of generalized nonlinear diffusion model to describe the effects of kerogen. To model the interaction between the matrix and the fractures, we use Generalized Multiscale Finite Element Method [13, 17]. In this approach, the matrix and the fracture interaction is modeled via local multiscale basis functions. In [17], we developed the GMsFEM and applied for linear flows with horizontal or vertical fracture orientations on a Cartesian fine grid. In this paper, we consider arbitrary fracture orientations and use triangular fine grid and developed GMsFEM for nonlinear flows. Moreover, we develop online basis function strategies to adaptively improve the convergence. The number of multiscale basis functions in each coarse region represents the degrees of freedom needed to achieve a certain error threshold. Our approach is adaptive in a sense that the multiscale basis functions can be added in the regions of interest. Numerical results for two-dimensional problem are presented to demonstrate the efficiency of proposed approach. 1 Introduction Shale gas transport is an active area of research due to a growing interest in producing natural gas from source rocks. The shale systems have added complexities due to the presence of organic matter, known as kerogen. The kerogen brings in new fluid storage and transport qualities to the shale. A number of authors, e.g., Loucks et al. (2009), Sondergeld et al. (2010), and Ambrose et al. (2012), [26, 31, 3], have previously discussed the physical properties of the kerogen using scanning electron microscopy (SEM) and showed the co-existence of nanoporous kerogen and microporous conventional inorganic rock materials. Gas transport in the kerogen typically develops at low Reynolds number and relatively high Knudsen number values. Under these conditions, it is expected that the transport is not driven by laminar (Darcy) flow dominantly but instead by the pore diffusion and other molecular transport mechanisms such as Knudsen diffusion and the adsorbed phase (or surface) diffusion. The latter introduces nonlinear processes at the pore scale that occur in heterogeneous pore geometry. Some types of upscaled models are needed to represent these complex processes for reservoir simulations. In large-scale simulations, the complex pore-scale transport needs to be coupled to the transport in fractures. This brings an additional difficulty in multiscale simulations. In particular, the multiscale simulations of the processes describing the interaction between the fracture and the matrix require reduced-order model approaches that work for problems without scale separation and high contrast. The objective of this paper ∗ Department of Petroleum Engineering, Texas A & M University, College Station, TX of Mathematics, Texas A&M University, College Station, TX. ‡ Department of Computational Technologies, Institute of Mathematics and Informatics, North-Eastern Federal University, Yakutsk, Republic of Sakha (Yakutia), Russia, 677980 & Institute for Scientific Computation, Texas A&M University, College Station, TX 77843-3368 † Department 1 is to discuss the development of such approaches for describing the fracture and the matrix interaction by taking the upscaled matrix model following our previous work [1]. In our previous work [1], we proposed a set of macroscopic models that take into account the nanoporous nature and nonlinear processes of the shale matrix. Our derivation uses multiple scale asymptotic analysis applied to mass balance equations, equation of state (for free gas) and isotherm of adsorption. The fine-scale microscopic description is largely based on the model formulated by Akkutlu and Fathi (2012), [2]. The macroscopic parameters that appear in the equations require solutions of cell problem defined in representative volume elements (RVEs). These RVE problems take into account fine-scale variations and average their effects on macro scale. The multiscale approaches proposed in [1] are limited to representing the features that have scale separation. To represent the fracture network and the interaction between the fracture network and the matrix, we present a multiscale approach following the framework of Generalized Multiscale Finite Element Method (GMsFEM), [13]. The main idea of GMsFEM is to use multiscale basis functions to extract an essential information in each coarse grid (computational grid) and develop a reduced-order model. In [17], we have developed the GMsFEM and applied for linear flows with horizontal or vertical fracture orientations on a Cartesian fine grid. In this paper, our contributions are: (1) the use of arbitrary fracture orientations and use triangular fine grids; (2) the development of GMsFEM for nonlinear flows; and (3) the development of online basis function strategies to adaptively improve the convergence. To represent the fractures on the fine grid, we use Discrete Fracture Model (DFM) [35]. The fine grid is constructed to resolve the fractures. For the coarse grid, we choose a rectangular grid. The GMsFEM framework uses these fine-scale models in computing the snapshot space and the offline space. The nonlinear models are handled with GMsFEM by locally updating multiscale basis functions. The study of flows in fractured media has a long history. Some modeling techniques on the fine grid include the Discrete Fracture Model (DFM), Embedded Fracture Model (EFM) [27, 25, 23], the singlepermeability model, the multiple-permeability models ([33, 4, 28, 23, 20, 34, 30, 10]), and hierarchical fracture models [23]. Though these approaches are designed for fine-scale simulations, a number of these approaches represent the fractures at a macroscopic level. For example, multiple-permeability models represent the network of connected fractures macroscopically by introducing several permeabilities in each block. The EFM ([27, 25, 23]) models the interaction of fractures with the fine-grid blocks separately for each block. The main idea of hierarchical fracture modeling presented in [23] is to homogenize small-length fractures (with the length smaller than the coarse block), while to represent the large-length fractures. Some of these approaches can be generalized by incorporating the interaction of fractures and permeability heterogeneities locally, which can lead to efficient upscaling techniques, [11, 19]. In recent papers [21], several multiscale approaches are proposed for representing the fracture effects. These approaches share common concepts with the methods that we discuss here in a sense that they add new degrees of freedom to represent the fractures on a coarse grid. The main difference is that our approaches use local spectral problems accompanied by adaptivity to detect the regions, where to add new basis functions. In this regard, the procedure of finding multiscale basis functions and the enrichment procedure is different from existing techniques. The proposed method constructs multiscale basis functions by appropriately selecting local snapshot space and the local spectral problems for the underlying nonlinear problem. The local spectral problems allow us to adaptively enrich in the regions with larger errors. In the paper, we discuss adaptivity issues and how to add multiscale basis functions in some selected regions. To reduce the computational cost associated with constructing the snapshot space, we follow [5] and use randomized boundary conditions. One of other novel components of the paper is the use of online basis functions (see [8] for online basis functions for steady state problems) for the time-dependent nonlinear problems. The online basis functions are constructed during the simulation using the residual and they can reduce the error significantly. These basis functions are used if the offline basis functions can not reduce the error below a desired threshold. We present numerical results for some representative examples. In these examples, we use nonlinear matrix and fracture models. Our numerical results show that the coarse-scale models with a fewer degrees of freedom can be used to get an accurate approximation of the fine-scale solution. In particular, only 10 % 2 degrees of the freedom are needed to obtain an accurate representation of the fine-scale solution. We also add a geomechanical contribution to the permeability term, where the permeability depends on the pressure. Furthermore, we demonstrate the use of online basis functions and how they can reduce the error. The paper is organized as follows. In the next section, we present a model problem. In Section 3, we discuss the fine-scale model. Section 4 is devoted to the development of GMsFEM, in particular, the offline spaces. In this section, we present numerical results for offline basis functions. In Section 5, we discuss randomized snapshot spaces and show that their use can give similar accuracy while for less computational cost. In Section 6, we develop online basis functions and present numerical results. 2 Model Problem In this paper, we will study nonlinear gas transport in fractured media motivated by several applications including shale gas. We are interested in the shale gas transport described in [2]. Similar equations arise in other models, where one considers a free gas in the tight reservoirs. We will consider general equations am (c) ∂c = div(bm (c, x)∇c), ∂t (1) where c is the amount of free gas and a(c) and b(c) contain terms related to storage and adsorption coefficients. In [2], the authors consider the nonlinear terms have the forms am (c) = φ + (1 − φ)γ ∂F , ∂c bm (c, x) = φD + (1 − φ)γDs κ ∂F + φ RT c, ∂c µ where γ is a parameter, which is unity in kerogen and is equal to Vgrain,k /Vgrain in the inorganic material (Vgrain,k is grain volume and Vgrain is kerogen grain volume). Diffusivity D and porosity φ are defined for the free fluid in the inorganic matrix and in the kerogen as follows ( ( Dk in kerogen φk in kerogen D= , φ= . Di in inorganic matrix φi in inorganic matrix For the free gas we have ideal gas assumption. The Darcy law of free gas flow in inorganic matrix is used with permeability κ and gas viscosity µ. For the sorbed gas we can use Langmuir or Henry‘s isotherms F = F (c). In [24, 35], the authors discuss a general framework, where the equations also include nonlinear diffusivity due to adsorbed gas in a shale formation. In [22], the nonlinear terms appear due to barotropic effects. The nonlinear flows also contain components that are due to diffusion in the fractures. One needs additional equations for modeling fractures. The fractures have high conductivity. We will use a general equation of the form ∂c af (c) = div(bf (c, x)∇c) (2) ∂t to describe the flow within fractures. In [2], the authors use af (c) = φf , bf (c, x) = κf RT c, µ where φf and κf are the fracture porosity and permeability. These problems are solved on a fine grid using DFM as will be described in Section 3. In many shale gas examples, the matrix heterogeneities can be upscaled and the resulting upscaled equation has the form (1). However, the interaction between matrix and fractures require some type of multiscale modeling approach, where the effects of the fractures need to be captured more accurately. Approaches, such as multicontinuum [24] are often used, but these approaches use idealized assumptions on fracture distributions. In this paper, we will use multiscale basis functions to represent fracture effects. In our previous work 3 [17], we have considered similar approaches for single-phase flow when fractures (which could be horizontal or vertical) are aligned with Cartesian grid. In this paper, we consider arbitrary fracture distribution in the context of nonlinear flow equations. The overall model equations will be solved on a coarse grid. Next, we introduce the concepts of fine and coarse grids. Let T H be a usual conforming partition of the computational domain Ω into finite elements (triangles, quadrilaterals, tetrahedra, etc.). We refer to this partition as the coarse grid and assume that each coarse element is partitioned into a connected union of fine grid blocks. The fine grid partition will be denoted by T h , and is by definition a refinement of the coarse grid T H . We use {xi }N i=1 (where N denotes the number of coarse nodes) to denote the vertices of the coarse mesh T H and define the neighborhood of the node xi by [ (3) ωi = {Kj ∈ T H ; xi ∈ K j }. See Figure 1 for an illustration of neighborhoods and elements subordinated to the coarse discretization. Figure 1: Illustration of a coarse neighborhood and coarse element We emphasize the use of ωi to denote a coarse neighborhood, and K to denote a coarse element throughout the paper. 3 Fine-scale discretization To discretize the system on fine grid, we will use finite element method and use DFM for fractures. To solve Problem (1) using finite element method (FEM), we need a fine grid discretization to capture the fractures. These computations can be expensive. Here, we apply the discrete fracture network (DFM) model for modeling flows in fractures [29]. In the discrete-fracture model, the aperture of the fracture appears as a factor in front of the one dimensional integral for the consistency of the integral form. This is the main idea of the discrete-fracture model, which can be applied in any complex configuration for fractured porous media. To demonstrate it, we consider the two-dimensional problem of Equation (2). We simplify the fractures as the lines with small aperture. Thus, one-dimensional element is needed to describe fractures in the discretefracture model. The system of equations (1) will be discretized in a two-dimensional form for the matrix 4 and in one-dimensional form for the fractures. The whole domain Ω can be represented by Ω = Ωm ⊕i di Ωf,i , (4) where m and f represent the matrix and the fracture of the permeability field κ, respectively. Here, di is the aperture of the i th fracture and i is the index of the fractures. Note that Ωm is a two-dimensional domain and Ωf,i is a one-dimensional domain (Figure 2). Then Equations (1) and (2) and can be written as follows (for any test function v): Z XZ ∂c ∂c ∂c am (c) v dx + di m( , v) + a(c, v) = af (c) v dx+ ∂t ∂t ∂t Ωm Ωf,i i Z Z (5) X + bm (c, x)∇c · ∇v dx + di bm (c, x)∇c · ∇v dx = 0. Ωm i Ωf,i Figure 2: Fine grid with fractures To solve (5), we will first linearize the system. We will use the following linearization Z XZ cn+1 − cn cn+1 − cn cn+1 − cn m( , v) + a(cn+1 , v) = am (cn ) v dx + di af (cn ) v dx+ τ τ τ Ωm Ωf,i i (6) Z XZ n n+1 n n+1 + bm (c , x)∇c · ∇v dx + di bf (c , x)∇c · ∇v dx = 0. Ωm i Ωf,i The standard fully-implicit finite difference scheme is used for the approximation with time step size τ and superscripts n, n+1 denote previous and current time levels. This is a first-order in time and unconditionally stable linearization. PNf For standard Galerkin finite element method, we write the solution as c = i=1 ci φi , where φi are the standard linear element basis functions defined on T h and Nf denotes the number of the nodes on the fine grid. The equation (6) can be presented in matrix form: Mn cn+1 − cn + An cn+1 = 0, τ 5 (7) where M is the mass matrix given by Z n M = [mij ] = n am (c )φi φj dx + di XZ Ωm af (cn )φi φj dx, Ωf,i i and A is the stiffness matrix given by Z XZ n n A = [aij ] = bm (c , x)∇φi · ∇φj dx + di Ωm bf (cn , x)∇φi · ∇φj dx. Ωf,i i Hence at each time step we have the following linear problem Qn cn+1 = M n cn , (8) where Qn = (M n + τ An ). This fine scale discretization yields large matrices of size Nf × Nf . 4 Coarse-grid discretization using GMsFEM. Offline spaces. We use multiscale basis functions to represent the solution space. We will consider the continuous Galerkin (CG) formulation and signify ωi as the support of basis functions. We denote the basis functions by ψkωi , which is supported in ωi , and the index k represents the numbering of these basis functions. In turn, the CG solution will be sought as X cms (x, t) = cik (t)ψkωi (x). i,k Once the basis functions are identified, the CG global coupling is given through the variational form m( ∂c , v) + a(cms , v) = 0, ∂t for all v ∈ Voff , (9) where Voff is used to denote the space spanned by those basis functions and Z XZ m(c, v) = am c v dx + di af c v dx, Ωm Z bm ∇c · ∇v dx + di a(c, v) = Ωf,i i Ωm XZ i bf ∇c · ∇v dx. Ωf,i Let V be the conforming finite element space with respect to the fine-scale partition T h . We assume c ∈ V is the fine-scale solution satisfying m( ∂c , v) + a(c, v) = 0, ∂t v ∈ V. (10) Next, we describe GMsFEM. GMsFEM consists of offline and online stage. In the offline stage we construct multiscale basis functions and after that in the online stage, we solve our problem for any input parameters, such as right hand sides or boundary conditions. Offline computations: Step 1. Coarse grid generation. Step 2. Construction of the snapshot space that will be used to compute an offline space. Step 3. Construction of a “small” dimensional offline space by performing dimension reduction in the space of local snapshots. 6 Given the computational domain, a coarse grid can be constructed and local problems are solved on coarse neighborhoods to obtain the snapshot spaces. Then, smaller dimensional offline spaces are obtained from the snapshot spaces by dimension reduction via some spectral problems [13, 12, 16, 14, 5]. After that we can solve our problem in the constructed offline space. Moreover, we will construct online basis functions that are problem dependent and are computed locally based on some local residuals [9, 8]. We now present the construction of the offline basis functions and the corresponding spectral problems ω for obtaining a space reduction. In the offline computation, we first construct a snapshot space Vsnap . The snapshot space can be the space of all fine-scale basis functions or the solutions of some local problems with various choices of boundary conditions. For example, we can use the following κ-harmonic extensions to form a snapshot space. For each fine-grid function, δjh (x), which is defined by δjh (x) = δj,k , ∀j, k ∈ Jh (ωi ), where Jh (ωi ) denotes the fine-grid boundary node on ∂ωi . For simplicity, we omit the index i. Given a fine-scale piecewise linear function defined on ∂ω (here ω is a generic coarse element), we define ψjω,snap by following variational problem Z XZ a(ψjω,snap , v) = bm ∇ψjω,snap · ∇v dx + dj bf ∇ψjω,snap · ∇v dx = 0 in ω, (11) ωm ωf,j j and ψjω,snap = δjh (x) on ∂ω, ω = ωm ⊕j dj ωf,j . For brevity of notation, we now omit the superscript ω, yet it is assumed throughout this section that the offline space computations are localized to respective coarse subdomains. Let li be the number of functions in the snapshot space in the region ω, and Vsnap = span{ψjsnap : 1 ≤ j ≤ li }, for each coarse subdomain ω. Denote   . Rsnap = ψ1snap , . . . , ψlsnap i ω In order to construct the offline space Voff , we perform a dimension reduction of the snapshot space using an auxiliary spectral decomposition. The analysis in [15] motivates the following eigenvalue problem in the space of snapshots: off off off Aoff Ψoff (12) k = λk S Ψk , where A off = [aoff mn ] Z = snap bm ∇ψm · ∇ψnsnap dx + dj XZ ωm j S off = [soff mn ] = Z snap snap bm ψ m ψn dx + dj snap T bf ∇ψm · ∇ψnsnap dx = Rsnap ARsnap , ωf,j XZ ωm j snap snap T bf ψ m ψn dx = Rsnap SRsnap , ωf,j where A and S denote analogous fine scale matrices as defined by Z XZ n Aij = bm (c , x)∇φi · ∇φj dx + di bf (cn , x)∇φi · ∇φj dx, Dm Df,i i Z Sij = bm (cn )φi φj dx + di Dm XZ i bf (cn )φi φj dx, Df,i ω where φi is the fine-scale basis function. To generate the offline space, we then choose the smallest Moff eigenvalues from Eq. (12) and form the corresponding eigenvectors in the space of snapshots by setting Pli snap ω off Ψoff (for k = 1, . . . , Moff ), where Ψoff ψkoff = j=1 kj ψj kj are the coordinates of the vector Ψk . Next, we create an appropriate solution space and variational formulation that for a continuous Galerkin approximation. We begin with an initial coarse space V0init = span{χi }N i=1 . Recall that N denotes the 7 number of coarse neighborhoods. Here, χi are the standard multiscale partition of unity functions defined by Z XZ a(χi , v) = bm ∇χi · ∇v dx + dj bf ∇χi · ∇v dx = 0 K ∈ ω (13) ωm ωf,j j χi = gi on ∂K, for all K ∈ ω, where gi is a continuous function on ∂K and is linear on each edge of ∂K. ωi We then multiply the partition of unity functions by the eigenfunctions in the offline space Voff to construct the resulting basis functions ψi,k = χi ψkωi ,off ωi for 1 ≤ i ≤ N and 1 ≤ k ≤ Moff , (14) ωi where Moff denotes the number of offline eigenvectors that are chosen for each coarse node i. We note that the construction in Eq. (14) yields continuous basis functions due to the multiplication of offline eigenvectors with the initial (continuous) partition of unity. Next, we define the continuous Galerkin spectral multiscale space as ωi Voff = span{ψi,k : 1 ≤ i ≤ N and 1 ≤ k ≤ Moff }. (15) P N ωi c Using a single index notation, we may write Voff = span{ψi }N i=1 , where Nc = i=1 Moff denotes the total number of basis functions in the space Voff . We also construct an operator matrix R0T = [ψ1 , . . . , ψNc ] , where ψi are used to denote the nodal values of each basis function defined on the fine grid. P We seek cms (x) = i ci ψi (x) ∈ Voff such that m( ∂cms , v) + a(cms , v) = 0 ∂t for all v ∈ Voff . (16) We note that variational form in (16) yields the following linear algebraic system Qn0 cn+1 = M0n cn0 , 0 (17) where c0 denotes the nodal values of the discrete CG solution, and Qn0 = R0 Qn R0T and M0n = R0 M n . We also note that the operator matrix may be analogously used in order to project coarse scale solutions onto the fine grid cn+1 = R0T cn+1 . In our simulations presented next, we do not update basis functions. We 0 discuss basis function update in Section 6. 4.1 Numerical result We present numerical results for the coarse-scale solution using offline basis functions. The basis functions of the offline space are constructed following the procedure described above. Note that, the basis functions are constructed only once at initial time and used for generating the stiffness matrix and the right hand side. We consider the solution of problem with constant and nonlinear matrix-fracture coefficients in (6). As constant coefficients (see previous section) representing matrix and fracture properties, we use following am = 0.8, bm = 1.3 · 10−7 and af = 0.001, bf = 1.0. For nonlinear matrix-fracture coefficients, we use am (c) = φ + (1 − φ) ∂F , ∂c bm (c, x) = φD + (1 − φ)Ds and af (c) = φf , bf (c, x) = 8 κf RT c, µ ∂F κ + φ RT c, ∂c µ (18) (19) where Dk = 10−7 [m2 /s], Di = 10−8 [m2 /s], φ = 0.04, T = 413[K], µ = 2 · 10−5 [kg/(m s)] and for fractures kf = 10−12 [m2 ], φf = 0.001. As for permeability κ in (18), we use constant κ = κ0 and stress-dependent model κ = κm (see [18, 32]) with M !3  pc − αp , κm = κ0 1 − p1 where κ0 = 10−18 [m2 ], p = RT c, pc = 109 [P a], p1 = 1.8 · 109 [P a], α = 0.5 and M = 0.5. For the sorbed gas, we use Langmuir model s , F (c) = cµs (1 + sc)2 where s = 0.26 · 10−3 and cµs = 0.25 · 10−5 [mol/m3 ]. Figure 3: Coarse and fine grids. Coarse grid contains 50 cells, 85 facets and 36 vertices. Fine grid contains 7580 cells, 11470 facets and 3891 vertices. Figure 4: Coarse and fine grids. Coarse grid contains 200 cells, 320 facets and 121 vertices. Fine grid contains 13036 cells, 19694 facets and 6659 vertices. The equation is solved with Dirichlet boundary condition c(x, t) = 5000 on the left boundary and Neumann boundary conditions ∂c(x,t) = 0 on other boundaries. The domain Ω has a length of 60 meters in both ∂n 9 directions. We calculate concentration for tmax = 5 years with the time step τ = 10 days. As for initial condition, we use c(x, t = 0) = 10000[mol/m3 ]. For the numerical solution, we construct structured two coarse grids with 36 nodes (Figure 3) and with 121 nodes (Figure 4). As for fine grids, we use unstructured grids, which resolves the existing fractures. Figure 5: Solution with constant matrix-fracture coefficients on coarse (top) and on fine (bottom) grids for t=1, 3 and 5 year (from top to bottom) In Figure 5, we show the pressure distribution for three concrete time level t = 1, 3 and 5 years. For 10 Figure 6: Coarse-scale (top) and fine-scale (bottom) solutions for t=5 year for the case of nonlinear permeability with κ = κ0 Figure 7: Coarse-scale (top) and fine-scale (bottom) solutions for t=5 year for the case of nonlinear coefficients with κ = κm the pressure and concentration, we have the following relationship: p = RT c. Pressure distribution for nonlinear matrix-fracture coefficients in (6) is presented in Figures 6 - 7 for last time level. In these figures, we show fine-scale (reference) and coarse-scale (multiscale) solutions. The coarse-scale solution is obtained in an offline space of dimension 288 (using Mof f = 8 multiscale basis functions per coarse neighborhood) and the fine-scale solution is obtained in a space of dimension 3891. Compared to the fine-scale solution on the left with the coarse-scale solution on the right of the figures, we observe that the GMsFEM can approximate the fine-scale solution accurately. To compare the results, we use relative weighted errors ||ε||∗ = ||cms − ch ||∗ /||ch ||∗ , 11 using L2a and Ha1 weighted norms that are defined as Z ||ε||L2a = 1/2 , a ε2 dx Ω 1/2 . (a ∇ε, ∇ε) dx Z ||ε||Ha1 = Ω Figure 8: Multiscale basis functions corresponding to the first 3 smallest eigenvalues in the case with constant fracture-matrix properties after multiplication to partition of unity functions, ψi,k = χi ψkωi ,off , i = 25 and k = 0, 1, 2 (from left to right) In Table 1, we present relative errors (in percentage) for last time level for constant fracture and matrix properties in (6) using coarse grids with 36 and 121 nodes. For the coarse-scale approximation, we vary the dimension of the spaces by selecting a certain number of offline basis functions (Mof f ) corresponding to the smallest eigenvalues. In the Table 1, we recall that Vof f denotes the offline space, dim(Vof f ) is the offline space dimension, Mof f is the number of the multiscale basis functions per coarse neighborhood (we use a similar number of Mof f for each ωi ), cms and ch are the multiscale and reference solutions, respectively. Figure 8 presents the multiscale basis functions corresponding to the first 3 smallest eigenvalues in the case with constant fracture-matrix properties in (6). These offline basis functions are multiplied by partition of unity functions. When we use Mof f = 8 and the case with 36 coarse nodes, the relative L2a and Ha1 weighted errors are 0.3 % and 0.7%, respectively for final time level. The dimension of the corresponding offline space is 288 and for reference solution is 3891. For coarse grid with 121 nodes, the relative errors are slightly smaller 0.1% and 0.2% for L2a and Ha1 weighted errors, respectively. The dimension of the corresponding offline space is 968 and for reference solution is 6659. The relative L2a and Ha1 errors at different time instants for the cases with 36 and 121 coarse grids are presented in Figures 9 and 10. As we observe if we take 4 or more basis functions per coarse node, the relative errors remain small. Mof f 1 2 4 8 12 dim(Vof f ) 36 72 144 288 432 λmin 9.0 10−9 4.5 10−8 1.1 10−7 2.2 10−6 0.19 L2a 24.484 12.229 1.068 0.303 0.083 Ha1 84.383 33.923 2.162 0.737 0.258 Mof f 1 2 4 8 12 dim(Vof f ) 121 242 484 968 1452 λmin 2.5 10−8 9.6 10−8 1.6 10−7 0.37 1.23 L2a 17.136 3.975 0.651 0.110 0.060 Ha1 68.989 36.337 3.595 0.246 0.108 Table 1: Numerical results (relative errors (%) for the final time level). Left: for the case with 36 coarse nodes. Right: for the case with 121 coarse nodes. We present relative weighted errors in Tables 2 and 3 for different number of eigenvectors Mof f for the case with nonlinear matrix-fracture coefficients in (6). We consider a case with 36 coarse nodes. When we use Mof f = 8 and the case with κ = κ0 , the relative L2a and Ha1 errors are 0.2 % and 0.7%, respectively. The dimension of the corresponding offline space is 288 and for reference solution is 3891. For the case with κ = κm in (18), we have 0.4% and 1.0% of relative L2a and Ha1 errors, respectively. The dimension of coarse spaces for the corresponding number of eigenvectors are 72, 144, 288, 432 and 576 for Mof f = 2, 4, 8 and 12. 12 Figure 9: Relative L2a and Ha1 weighted errors (%) for coarse grid in Figure 3 with 36 nodes. Constant matrix-fracture properties. Figure 10: Relative L2a and Ha1 weighted errors (%) for coarse grid in Figure 3 with 121 nodes. Constant matrix-fracture properties. We observe that as the dimension of the coarse space (the number of selected eigenvectors Mof f ) increases, the respective relative errors decrease. Also we have similar error behaviour as for case with constant matrixfracture coefficients. Moreover, we see that the decrease in the relative error is fast initially and one can obtain small errors using only a few basis functions. Mof f 1 2 4 8 12 dim(Vof f ) 36 72 144 288 432 λmin 4.8 10−9 2.4 10−8 6.0 10−8 1.1 10−6 0.19 L2a 21.717 10.772 0.933 0.270 0.123 Ha1 87.897 38.774 1.947 0.737 0.323 Mof f 1 2 4 8 12 dim(Vof f ) 121 242 484 968 1452 λmin 2.5 10−8 9.6 10−8 1.6 10−7 0.37 1.23 L2a 14.333 3.673 0.646 0.110 0.063 Ha1 64.197 30.510 3.272 0.251 0.159 Table 2: Numerical results (relative weighted errors (%) for final time level) for case with κ = κ0 in (18). Left: the case with 36 coarse nodes. Right: the case with 121 coarse nodes. 13 Mof f 1 2 4 8 12 dim(Vof f ) 36 72 144 288 432 λmin 2.0 10−9 1.0 10−8 2.6 10−8 5.1 10−7 0.19 L2a 24.484 10.785 1.247 0.432 0.234 Ha1 92.039 35.874 2.423 1.069 0.712 Mof f 1 2 4 8 12 dim(Vof f ) 121 242 484 968 1452 λmin 2.5 10−8 9.6 10−8 1.6 10−7 0.37 1.23 L2a 16.318 3.715 0.645 0.134 0.096 Ha1 60.267 22.872 3.000 0.386 0.282 Table 3: Numerical results (relative weighted errors (%) for the final time level) for case with κ = κm in (18). Left: the case with 36 coarse nodes. Right: the case with 121 coarse nodes. Remark 4.1. In our numerical simulations, we do not use empricial interpolation procedures for approximating the nonlinear functionals a· (c, ·) and b· (c, ·) (see [6] for more details). In the approaches of [6], empirical interpolation concepts [7] are used to evaluate the nonlinear functions by dividing the computation of the nonlinear function into coarse regions, evaluating the contributions of nonlinear functions in each coarse region taking advantage of a reduced-order representation of the solution. By using these approaches, we can reduce the computational cost associated with evaluating the nonlinear functions and consequently making the computational cost to be independent of the fine grid. 5 Randomized oversampling GMsFEM Next, we present numerical results for the oversampling and the randomized snapshots that can substantially save the computational cost for snapshot calculations. In this algorithm, instead of solving local harmonic problems (11) for each fine grid node on the boundary, we solve a small number of harmonic extension local problems with random boundary conditions [5]. More precisely, we let ψjωi ,rsnap = rj , x ∈ ∂ωi+ , where rj are independent identical distributed standard Gaussian random vectors on the fine grid nodes of the boundary. When we use randomized snapshots, we only generate a fraction of the snapshot vectors by using random boundary conditions. For snapshot space calculations, we use the extended coarse grid neighborhood for m = 1, 2, . . . , by ωi+ = ωi + m, where m is width of the fine-grid layer. Here, for example, ωi+ = ωi + 1 means the coarse grid neighborhood plus all 1 layer of adjacent fine grid of ωi , and so on (see Figure 11 for illustration). Calculations in the oversampled neighborhood domain ωi+ reduces the effects due to the artificial oscillation in random boundary conditions. 5.1 Numerical results The simulation results are presented in Tables 4 - 5 for 36 node coarse grid case. We use constant matrixfracture properties, see (6). We present the results for the randomized snapshot case for last time level. In our simulations, we set the oversampling size m = 0, 2, 4, 6 for ωi+ = ωi + m and use different numbers of multiscale basis functions Mof f = 2, 4, 8 and 12. In Table 4, we investigate the effects of the oversampling ωi+ = ωi + m, as we increase the number of fine grid extensions m = 0, 2, 4 and 6. We see that the oversampling helps to improve the results initially, but the improvements slow and larger oversampling domains do not give significant improvement in the solution accuracy. When we use a snapshot ratio of 25.6 % (between the standard number of snapshots and the randomized algorithm for ωi+ = ωi + 4), the relative L2a and Ha1 weighted errors are 0.2 % and 0.8% for full snapshots and 0.2 % and 0.9% for randomized snapshots. We observe that the randomized algorithm can give similar errors as a full snapshots. 14 Figure 11: Neighborhood domain with oversampling (ωi+ = ωi + m, m = 1, 2, 4, 6) for the coarse grid with 36 nodes Table 5 shows relative L2a and Ha1 errors for different number of randomized snapshots Mi . The oversampled region ωi+ = ωi + 4 is chosen, that is, the oversampled region contains an extra 4 fine-grid cell layers around ωi . Our numerical results show that one can achieve a similar accuracy when using a fraction of snapshots with randomized algorithms and thus, it can provide a substantial CPU savings. 6 Residual based adaptive online GMsFEM In this section, we consider the construction of the online basis functions that are used in some regions adaptively to reduce the error significantly. We follow earlier works [9, 8], which were done for linear timeindependent problems. The online basis functions are constructed based on a residual and take into account distant effects. The construction of online basis functions is motivated by the analysis. Using the offline computation, we construct multiscale basis functions that can be used for any input parameters to solve the problem on the coarse grid. The fast convergence due to adding online basis functions depends on the offline space. It is important that the offline space contains some essential features of the solution space. In our numerical simulations, we demonstrate that with a sufficient number of offline basis functions, we can achieve a rapid convergence for the proposed online procedure. First, we derive the error indicator for the error (cn − cnms ) for time-dependent problem (21) in the energy norm. Furthermore, we use the error indicator to develop an enrichment algorithm. The error indicator gives an estimate of the local error on the coarse grid region ωi and we can then add basis functions to improve the solution. We assume, as before, V is the fine-scale finite element space. To find the fine-scale solution cn+1 ∈ V , we solve (as before) cn+1 − cn m( , v) + a(cn+1 , v) = (f, v), ∀v ∈ V (20) τ and for multiscale solution cn+1 ms ∈ Voff we have m( n cn+1 ms − cms , v) + a(cn+1 ms , v) = (f, v), τ ∀v ∈ Voff . We define a linear functional rn (v) for n-th time level by n n+1 rn (v) = τ (f, v) − m(cn+1 ms − cms , v) − τ a(cms , v). 15 (21) 2 4 8 12 full snapshots randomized snapshots L2a Ha1 L2a Ha1 without oversampling, ωi 100 % 39.7 % 12.229 33.923 8.303 33.237 1.068 2.162 1.704 4.730 0.303 0.737 1.005 2.962 0.083 0.258 0.557 1.643 2 4 8 12 with oversampling, ωi+ = ωi + 2 100 % 28.3 % 12.247 33.943 8.921 33.399 1.073 4.237 0.972 3.750 0.261 0.744 0.354 1.003 0.114 0.329 0.219 0.704 2 4 8 12 with oversampling, ωi+ = ωi + 4 100 % 25.6 % 12.216 33.657 9.334 28.213 1.015 4.576 0.626 2.561 0.262 0.841 0.264 0.949 0.114 0.349 0.153 0.441 2 4 8 12 with oversampling, ωi+ = ωi + 6 100 % 22.5 % 12.746 35.899 9.455 27.922 1.013 5.014 0.603 2.377 0.251 0.820 0.277 0.875 0.124 0.369 0.120 0.421 Mof f Table 4: Randomized oversampling for GMsFEM with number of snapshots Mi = 24 (constant matrixfracture properties) in every ωi+ = ωi + n, n = 0, 2, 4, 6 for coarse mesh with 36 nodes (relative errors (%) for final time level) Mof f 2 4 8 12 12.8 % (Mi = 12) L2 H1 8.228 24.878 1.908 4.208 0.861 1.777 - 17.0 % (Mi = 16) L2 H1 9.449 28.895 1.381 3.581 0.589 1.563 0.313 0.781 21.3 % (Mi = 20) L2 H1 7.346 22.774 0.779 2.692 0.292 1.189 0.217 0.581 25.6 % (Mi = 24) L2 H1 9.334 28.213 0.626 2.561 0.264 0.949 0.153 0.441 29.8 % (Mi = 28) L2 H1 9.335 26.973 0.843 4.439 0.245 0.894 0.110 0.393 Table 5: Randomized oversampling for GMsFEM with different number of snapshots Mi = 12, 16, 20, 24, 28 in every ωi+ = ωi + 4 (constant matrix-fracture properties) for coarse mesh with 36 nodes (relative errors (%) for final time level) Let ωi be a coarse region and Vi = H01 (ωi ) then Z Z Z n n+1 n ri (v) = τ fv − am (cms − cms ) v dx − τ ωim ωi − dj XZ j ωif,j af (c) (cn+1 ms ωim − cnms ) v dx − τ dj bm ∇cn+1 ms · ∇v dx XZ j ωif,j bf ∇cn+1 ms · ∇v dx, where ωi = ωim ⊕j dj ωif,j and m and f represent the matrix and the fracture. 16 The solution at (n + 1) time level (cn+1 ms ) is the solution of the elliptic problem of the form n+1 aτ (cms , v) = τ (f, v) + m(cnms , v). (22) We use following notation aτ (u, v) = m(u, v) + τ a(u, v). Error estimators for the spatial discretization error take into account the dependence of the elliptic problem (22) on the time step parameter τ and we will use the τ -weighted H1 norm ||v||2τ = τ ||v||2a + ||v||2m , where ||v||2τ = aτ (v, v), ||v||2a = a(v, v), ||v||2m = m(v, v). We define the projection Π : V → Vof f by Πv = N X χi (Pi v), i=0 where Pi : V → span{ψkwi ,of f } be the projection defined by Pi v = li  X  b v ψkwi ,of f ψkwi ,of f . k=1 The projection Pi is the first li terms of spectral expansion in terms of eigenfunctions of following problem Z off off ωi b |∇χi |2 Ψoff v dx. (23) aτ (Ψ , v) = λ τ ωi Then Z τ b |∇χi |2 (v − Pi v)2 dx ≤ ωi 1 ωi a (v − Pi v, v − Pi v). λli+1 τ and ωi i aω τ (v − Pi v, v − Pi v) ≤ aτ (v, v). We note that this spectral problem is different from the original one formulated in (12); however, it involves similar terms, such as energy norms and L2 norms. Let en = cn − cnms is error for n-th time level and using (20) and (21), we have m(en+1 − en , v) + τ a(en+1 , v) = (rn , v), where the right hand side can be written as follows n n+1 rn (v) = τ (f, v) − m(cn+1 ms − cms , v) − τ a(cms , v) n n+1 ≤ τ (f, v − Πv) + τ (f, Πv) − m(cn+1 ms − cms , Πv) − τ a(cms , Πv) n n+1 − m(cn+1 ms − cms , v − Πv) − τ a(cms , v − Πv) n n+1 = τ (f, v − Πv) − m(cn+1 ms − cms , v − Πv) − τ a(cms , v − Πv) = N X i=1 rin (χi (v − Pi v)) ≤ N X ||rin ||∗ ||χi (v − Pi v)||τ . i=1 17 (24) We have ||χi (v − Pi v)||2τ = ||χi (v − Pi v)||2m + τ ||χi (v − Pi v)||2a Z Z = ||χi (v − Pi v)||2m + τ C b |∇χi |2 (v − Pi v)2 dx + τ C b χ2i |∇(v − Pi v)|2 dx ωi ωi Z i ≤ Caω (v − P v, v − P v) + τ C b |∇χi |2 (v − Pi v)2 dx i i τ ωi     C C i i aω (v − P v, v − P v) ≤ C + aω ≤ C+ i i τ τ (v, v). λli+1 λli+1 (25) Therefore m(en+1 − en , v) + τ a(en+1 , v) ≤ N X ||rin ||∗ ||χi (v − Pi v)||τ ≤ i=1  ≤ C+ N X 1/2 C Λmin !1/2 ||rin ||2∗ i=1 N X N X 1/2  C 1/2 i aω ||rin ||∗ C + τ (v, v) λ li+1 i=1 1/2 i aω τ (v, v)  ≤ C+ i=1 C 1/2 Λmin N X !1/2 ||rin ||2∗ aτ (v, v)1/2 , i=1 where Λmin = mini λli+1 . Finally, we take v = en+1 ||en+1 ||2τ  ≤ C+ Λmin  ≤ C+ N X 1/2 C ||en+1 ||τ + m(en , en+1 ) i=1 N X 1/2 C !1/2 ||rin ||2∗ Λmin !1/2 ||rin ||2∗ ||en+1 ||τ + ||en ||m ||en+1 ||τ . i=1 Then ||e n+1  ||τ ≤ C+ C 1/2 Λmin N X !1/2 ||rin ||2∗ + ||en ||m . i=1 This inequality residuals give a computable indicator of the error en+1 = cn+1 − cn+1 ms in the τ -weighted H1 norm. Remark 6.1. We note that the analysis suggests the use of (23) as a local eigenvalue problem. This eigenvalue problem is “slightly” different from (12) that we have used earlier. Our numerical simulations show that the use of (23) improves the convergence of the offline or online procedures slightly in our numerical examples. We will use the spectral problems based on (12) in our numerical simulations as it is independent of time stepping. Next, we consider online basis construction. We use the index m ≥ 1 to represent the enrichment level. m At the enrichment level m, we use Vms to denote the corresponding space that can contains both offline and m+1 m online basis functions. We will consider a strategy for getting the space Vms from Vms . By the online basis functions we mean basis functions that are computed during iterative process, contrary to offline basis functions that are computed before iterative process. The online basis functions are computed based on n+1,(m) some local residuals for the current multiscale solution cms . m+1 m Let Vms = Vms +span{ϕ} be the new approximate space that constructed by adding online basis ϕ ∈ Vi n+1,(m+1) m+1 on the i-th coarse neighborhood ωi and cms ∈ Vms be the corresponding GMsFEM solution. n,(m) n+1 n+1 We define csemi = csemi (cms ), which satisfies n aτ (cn+1 semi , v) = τ (f, v) + m(cms , v). 18 n+1 For the error cn+1 ms − csemi , we have n+1 n+1 n+1 n+1 n+1 n+1 n+1 n+1 n+1 aτ (cn+1 ms − csemi , cms − csemi ) = aτ (cms , cms − csemi ) − aτ (csemi , cms − csemi ) n+1 n+1 n+1 n+1 n+1 n n+1 = aτ (cn+1 ms , cms − csemi ) − (τ f, cms − csemi ) − m(cms , cms − csemi ) n+1 = r(cn+1 ms − csemi ) = N X n+1 n+1 n+1 ri (χi (Pi (cn+1 semi − cms ) + cms − csemi )) i ≤ N X n+1 n+1 n+1 ||ri ||∗ ||χi (Pi (cn+1 semi − cms ) + cms − csemi )||τ . i Using (25) we obtain aτ (cn+1 ms n+1,(m+1) The solution cms − n+1 cn+1 semi , cms − cn+1 semi )  ≤ C+ Λmin n+1,(m) ||ri ||∗ . (26) i satisfies n+1 2 n+1,(m+1) 2 − cn+1 ||cms semi ||τ ≤ ||v − csemi ||τ , Taking v = cms X N C m+1 ∀v ∈ Vms . + αϕ, we have 2 ωi 2 n+1,(m) 2 n+1,(m) 2 ωi n+1,(m) −cn+1 ||cn+1,(m+1) −cn+1 +αϕ−cn+1 −cn+1 ms semi , ϕ)+α aτ (ϕ, ϕ). semi ||τ ≤ ||cms semi ||τ = ||cms semi ||τ +2α aτ (cms The last two terms in above inequality measure the amount of the reduction in error when the new basis m function ϕ is added to the space Vms . For α = −1 and ϕ ∈ Vi is the solution of aτ (ϕ, v) = r(v), n+1,(m+1) Then for esemi n+1,(m+1) 2 ||τ ||esemi n+1,(m+1) = cms n+1,(m) 2 ||τ n+1,(m) 2 ||esemi ||τ ∀v ∈ Vi . − cn+1 semi we have ≤ ||esemi n+1,(m) i − cn+1 − 2 aω τ (cms semi , ϕ) + ri (ϕ) ≤ n+1,(m) i , ϕ) + 2τ (f, v) + 2m(cn,(m) , ϕ) + r(ϕ) ≤ ||esemi − 2 aω τ (cms ms n+1,(m) 2 ||τ − ||r||2∗ . To enhance the convergence and efficiency of the online adaptive GMsFEM, we consider enrichment on nonoverlapping coarse neighbothoods. Let I ⊂ {1, 2, . . . , N } be the index set of some non-overlapping coarse m+1 m neighborhoods. We define Vms = Vms + span{ϕi , ı ∈ I} and obtain X n+1,(m+1) 2 n+1,(m) 2 ||esemi ||τ ≤ ||esemi ||τ − ||ri ||2∗ . i∈I Finally, we combine this with (26) and obtain n+1,(m) n+1,(m+1) 2 ||τ ||esemi n+1,(m) ) aωi (e ,e ||ri ||2∗  τ semi  Psemi N C 2 C + Λmin i∈I i=1 ||ri ||∗   P 2 i∈I ||ri ||∗  ||en+1,(m) P ≤ 1 −  ||2τ . semi N C 2 C + Λmin i=1 ||ri ||∗ n+1,(m) 2 ||τ ≤ ||esemi − X We will find online basis functions ϕ ∈ Vi to maximize the local resudial rin for current time level. Moreover, the required ϕ is the solution of aτ (ϕ, v) = ri (v), 19 ∀v ∈ Vi , (27) m where Ri (v)is the local residual that defined using wms n n+1 ri (v) = τ (f, v) − m(cn+1 ms − cms , v) − τ a(cms , v) and ||ri ||2∗ = ||ϕ||2τ according to the Riez representation theorem. For solution in each time level, we iteratively enrich our offline space by residual based online basis function. These basis functions are calculated using Equation (27) with zero Dirichlet boundary conditions and the residual norm ||rin ||∗ provides a measure on the amount of reduction in energy error. For the construction of the adaptive online basis functions, we first choose 0 < θ < 1, for each coarse neighborhood ωi , find the online basis ϕi ∈ Vi using equation (27). After compute the norm of local residuals and calculate ηi ηi2 := kri k2? , 2 where kri k? = kφi kτ , then arrange them in descending order, i.e. η12 ≥ η22 ≥ ... ≥ ηN . Then, choose the smallest k such that N k X X θ ηi2 ≤ ηi2 . i=1 i=1 This implies that, for the coarse neighborhood ωj (j = 1, ...k), we add the corresponding online basis ϕj to m the original space Vms . 6.1 Numerical results Next, we present numerical results for residual based online basis functions. We consider a similar problem as in the previous section with constant matrix-fracture properties in (6) and iteratively enrich the offline space by online residual basis functions in some selected time steps. Our coarse and fine grid setups are the same as in Section 4.1. Because re-generation of the matrix R is needed, when we add online basis function, we add them for some selected time steps. We note that, when we add new online basis functions, which are based on current residuals, we remove previously calculated online basis function and keep them till we update the online basis functions. It will save computational time if we have small size of coarse scale problem. In Table 6, we present L2a and Ha1 errors. We consider three different cases. In the first case (we call it Case 1), online basis functions are added at the first time step and after that in every 30-th time step. In the second case (we call it Case 2), online basis functions are replaced at the first five consecutive time steps, and after that, the online basis functions are updated in every 30-th time step. In the third case (we call it Case 3), online basis functions are replaced at the first ten consecutive time steps, and after that, the online basis functions are updated in every 30-th time step. More updates initially helps to reduce the error due to the initial condition. As we mentioned that the offline space is important for the convergence, and we present the results for different number of initial offline basis functions per coarse neighborhood. We use multiscale basis functions from offline space as a initial basis functions. In Table 7, we show errors when online basis functions are replaced at the first five consecutive time steps (as in Case 2), and afterwards, online basis functions are updated at 10-th, 20-th and 30-th time step. For our calculations, we use tmax = 5 years with τ = 10 days. Calculations are performed in the coarse grid with 121 nodes for the case with constant matrix-fracture properties. We observe from this table the following facts. • Choosing 4 initial offline basis functions improves the convergence substantially. This indicates that the choice of the initial offline space is important. • Adding online basis functions less frequently (such as at every 30th time step) provides an accurate approximation of the solution. This indicates that the online basis functions can be added only at some selected time steps. Next, we would like to show that one can use online basis functions adaptively and use the adaptivity criteria discussed above. In Table 8, we present results for residual based online basis functions with adaptivity with θ = 0.7. In Figure 13, we show errors by time. We observe that applying adaptive algorithm can much reduce errors. 20 Figure 12: Fine scale solution (right), coarse-scale using 2 offline basis functions (middle) and coarse-scale after two online iteration for some time levels (left) for t=1, 3 and 5 year (from top to bottom) (constant matrix-fracture coefficients). For fine-scale solution size of problem is 6659. For 2 offline basis functions is 242 and after two online iteration is 484 7 Conclusions In this paper, we present a multiscale approach for shale transport in fractured media. Our approach uses an upscaled model in the form of nonlinear parabolic equations to represent the matrix that consists of organic and inorganic matter. The nonlinearities in the equation are due to the interaction of organic and inorganic matter. The interaction of nonlinear matrix and the fracture is represented by multiscale basis functions. We follow Generalized Multiscale Finite Element Method to extract the leading order terms that represent the matrix and the fracture interaction. Multiscale basis functions are constructed locally in each coarse region and they represent the interaction between the upscaled matrix and the fracture network. We show that our proposed approach can effectively capture the small-scale effects and the overall system can be modeled using a fewer degrees of freedom. Numerical results are presented. In some cases and some regions, the offline procedure is insufficient to give accurate representations of the solution, due to the fact that offline 21 DOF (# iter) 121 242 (1) 363 (2) 242 363 (1) 484 (2) 484 605 (1) 726 (2) L2a Mof f = 1 17.136 13.047 7.275 Mof f = 2 3.975 1.653 0.889 Mof f = 4 0.651 0.208 0.171 Ha1 DOF (# iter) 68.989 43.662 12.262 121 242 (1) 363 (2) 36.337 6.705 0.972 242 363 (1) 484 (2) 3.595 0.307 0.056 484 605 (1) 726 (2) L2a Mof f = 1 17.136 13.209 6.603 Mof f = 2 3.975 1.716 0.546 Mof f = 4 0.651 0.165 0.105 Ha1 DOF (# iter) 68.989 42.777 12.689 121 242 (1) 363 (2) 36.337 7.841 0.914 242 363 (1) 484 (2) 3.595 0.313 0.057 484 605 (1) 726 (2) L2a Mof f = 1 17.136 13.002 6.125 Mof f = 2 3.975 1.692 0.449 Mof f = 4 0.651 0.144 0.076 Ha1 68.989 42.091 13.186 36.337 8.709 0.862 3.595 0.318 0.056 Table 6: Convergence history using one, two and four offline basis functions (Mof f = 1, 2 and 4). We add online basis functions for every 30 time step and for N −th first steps (Cases 1, 2, and 3). Left: N = 1. Middle: N = 5. Right: N = 10. Here DOF for the last time step. DOF (# iter) 121 242 (1) 363 (2) 242 363 (1) 484 (2) 484 605 (1) 726 (2) L2a Mof f = 1 17.136 12.511 5.910 Mof f = 2 3.975 1.624 0.378 Mof f = 4 0.651 0.126 0.048 Ha1 DOF (# iter) 68.989 41.477 13.153 121 242 (1) 363 (2) 36.337 8.225 0.934 242 363 (1) 484 (2) 3.595 0.303 0.033 484 605 (1) 726 (2) L2a Mof f = 1 17.136 12.925 6.275 Mof f = 2 3.975 1.669 0.474 Mof f = 4 0.651 0.147 0.080 Ha1 DOF (# iter) 68.989 42.778 12.705 121 242 (1) 363 (2) 36.337 8.034 0.880 242 363 (1) 484 (2) 3.595 0.305 0.041 484 605 (1) 726 (2) L2a Mof f = 1 17.136 13.209 6.603 Mof f = 2 3.975 1.716 0.546 Mof f = 4 0.651 0.165 0.105 Ha1 68.989 42.777 12.689 36.337 7.841 0.914 3.595 0.313 0.057 Table 7: Convergence history using one, two and four offline basis functions (Mof f = 1, 2 and 4). We add online basis functions for every N th time step and for first 5 steps Left: N = 10. Middle: N = 20. Right: N = 30. Here DOF for last time step computations are typically performed locally and global information is missing in these offline information. These phenomena occur locally and in some of these regions that are identified using the proposed error indicators, we need to develop online basis functions [8]. We discuss online basis functions and show that this procedure converges fast. 8 Acknowledgements We are grateful to Tat Leung for helpful discussions and suggestions regarding to online basis constructions. MV’s work is partially supported by Russian Science Foundation Grant RS 15-11-10024. 22 DOF (# iter) 121 242 (1) 363 (2) 242 363 (1) 484 (2) 484 605 (1) 726 (2) P iter L2a Mof f = 1 17.136 11 13.209 22 6.603 Mof f = 2 3.975 11 1.716 22 0.546 Mof f = 4 0.651 11 0.165 22 0.105 Ha1 DOF 68.989 42.777 12.689 121 243 381 36.337 7.841 0.914 242 376 504 3.595 0.313 0.057 484 635 737 P iter L2a Mof f = 1 17.136 44 4.082 78 2.681 Mof f = 2 3.975 44 0.441 77 0.376 Mof f = 4 0.651 44 0.110 68 0.098 Ha1 68.989 6.418 2.871 36.337 0.720 0.325 3.595 0.044 0.039 Table 8: Convergence history using one, two and four offline basis functions (Mof f = 1, 2 and 4). We add online basis functions for every 30 time step and for first 5 steps Left: without space adaptivity. Right: with space adaptivity. Here DOF for last time step References [1] I Yucel Akkutlu, Yalchin Efendiev, and Viktoria Savatorova. Multi-scale asymptotic analysis of gas transport in shale matrix. Transport in Porous Media, 107(1):235–260, 2015. [2] I Yucel Akkutlu and Ebrahim Fathi. Multiscale gas transport in shales with local kerogen heterogeneities. SPE Journal, 17(04):1–002, 2012. [3] Raymond J Ambrose, Robert C Hartman, Mery Diaz-Campos, I Yucel Akkutlu, Carl H Sondergeld, et al. Shale gas-in-place calculations part i: New pore-scale considerations. SPE Journal, 17(01):219– 229, 2012. [4] R. Baca, R. Arnett, and D. Langford. Modeling fluid flow in fractured porous rock masses by finite element techniques. Int. J. Num., 4:337348, 1984. [5] V. Calo, Y. Efendiev, J. Galvis, and G. Li. Randomized oversampling for generalized multiscale finite element methods. http://arxiv.org/pdf/1409.7114.pdf. [6] Victor M Calo, Yalchin Efendiev, Juan Galvis, and Mehdi Ghommem. Multiscale empirical interpolation for solving nonlinear pdes. Journal of Computational Physics, 278:204–220, 2014. [7] S. Chaturantabut and D. C. Sorensen. Application of pod and deim to dimension reduction of nonlinear miscible viscous fingering in porous media. Mathematical and Computer Modeling of Dynamical Systems, 17:337–353, 2011. [8] Eric T Chung, Yalchin Efendiev, and Wing Tat Leung. Residual-driven online generalized multiscale finite element methods. arXiv preprint arXiv:1501.04565, 2015. [9] E.T. Chung, Y. Efendiev, and G. Li. An adaptive GMsFEM for high-contrast flow problems. Journal of Computational Physics, 273:54–76, 2014. [10] Peter Dietrich, Rainer Helmig, Martin Sauter, Heinz Hötzl, Jürgen Köngeter, and Georg Teutsch. Flow and transport in fractured porous media. Springer Science & Business Media, 2005. [11] L. J. Durlofsky. Numerical calculation of equivalent grid bock permeability tensors for heterogeneous porous media. Water resources research, 27(5):699–708, 1991. 23 Figure 13: Dynamic of relative L2a (left) and Ha1 (right) weighted errors (%) for coarse grid in figure 4 with 121 nodes for the case with constant coefficients. Weighted errors using offline basis functions and online basis functions with and without adaptivity. Top: 1 offline basis function. Middle: 2 offline basis functions. Bottom: 4 offline basis functions. [12] Y. Efendiev, J. Galvis, and E. Gildin. Local-global multiscale model reduction for flows in highly heterogeneous media. Journal of Computational Physivs, 231 (24):8100–8113, 2012. [13] Y. Efendiev, J. Galvis, and T. Hou. Generalized multiscale finite element methods. Journal of Computational Physics, 251:116–135, 2013. [14] Y. Efendiev, J. Galvis, G. Li, and M. Presho. Generalized multiscale finite element methods. oversampling strategies. International Journal for Multiscale Computational Engineering, accepted, 2013. [15] Y. Efendiev, J. Galvis, and X.H. Wu. Multiscale finite element methods for high-contrast problems using local spectral basis functions. Journal of Computational Physics, 230:937–955, 2011. [16] Y. Efendiev, T. Hou, and V. Ginting. Multiscale finite element methods for nonlinear problems and their applications. Comm. Math. Sci., 2:553–589, 2004. 24 [17] Yalchin Efendiev, Seong Lee, Guanglian Li, Jun Yao, and Na Zhang. Hierarchical multiscale modeling for flows in fractured media using generalized multiscale finite element method. arXiv preprint arXiv:1502.03828, 2015. to appear in International Journal on Geomathematics, (DOI) 10.1007/s13137015-0075-7. [18] Anthony F Gangi. Variation of whole and fractured porous rock permeability with confining pressure. In International Journal of Rock Mechanics and Mining Sciences & Geomechanics Abstracts, volume 15, pages 249–257. Elsevier, 1978. [19] B. Gong, M. Karimi-Fard, and L. J. Durlofsky. Upscaling discrete fracture characterizations to dualporosity, dual-permeability models for efficient simulation of flow with strong gravitational effects. SPE J., 13(1):5867, 2008. [20] H. Hajibeygi, D. Karvounis, and P. Jenny. A loosely coupled hierarchical fracture model for the iterative multiscale finite volume method. Society of Petroleum Engineers. doi:10.2118/141991-MS. [21] Hadi Hajibeygi, Dimitris Karvounis, Patrick Jenny, et al. A loosely coupled hierarchical fracture model for the iterative multiscale finite volume method. In SPE Reservoir Simulation Symposium. Society of Petroleum Engineers, 2011. [22] SH Lee, C Jensen, and I Lunati. Modeling and simulation of shale gas production in multi-staged hydraulic-fractured formations. In ECMOR XIII-13th European Conference on the Mathematics of Oil Recovery, 2012. [23] S.H. Lee, M.F. Lough, and C.L. Jensen. Hierarchical modeling of flow in naturally fractured formations with multiple length scales. Water resources research, 37(3):443–455, 2001. [24] Jianfang Li, Cong Wang, Didier Ding, Yu-Shu Wu, Yuan Di, et al. A generalized framework model for simulation of gas production in unconventional gas reservoirs. In Paper SPE 163609 presented at SPE Reservoir Simulation Symposium, The Woodlands, Texas, USA, pages 18–20, 2013. [25] L. Li and S. H. Lee. Efficient field-scale simulation of black oil in naturally fractured reservoir through discrete fracture networks and homogenized media. SPE Reservoir Evaluation & Engineering. [26] Robert G Loucks, Robert M Reed, Stephen C Ruppel, and Daniel M Jarvie. Morphology, genesis, and distribution of nanometer-scale pores in siliceous mudstones of the mississippian barnett shale. Journal of Sedimentary Research, 79(12):848–861, 2009. [27] M. F. Lough, S. H. Lee, and J. Kamath. A new method to calculate effective permeability of gridblocks used in the simulation of naturally fractured reservoirs. SPE doi:10.2118/36730-PA. [28] M. M. Karimi-Fard and A. Firoozabadi. Numerical simulation of water injection in 2d fractured media using discrete-fracture model. SPE REE J., 4:117126, 2003. [29] J. Noorishad and M. Mehran. An upstream finite element method for solution of transient transport equation in fractured porous media. Water Resour. Res., 18(3):588–596, 1982. [30] Volker Reichenberger, Hartmut Jakobs, Peter Bastian, and Rainer Helmig. A mixed-dimensional finite volume method for two-phase flow in fractured porous media. Advances in Water Resources, 29(7):1020– 1036, 2006. [31] Carl H Sondergeld, Raymond Joseph Ambrose, Chandra Shekhar Rai, Jason Moncrieff, et al. Microstructural studies of gas shales. In SPE Unconventional Gas Conference. Society of Petroleum Engineers, 2010. [32] Asana Wasaki, I Yucel Akkutlu, et al. Permeability of organic-rich shale. In SPE Annual Technical Conference and Exhibition. Society of Petroleum Engineers, 2014. 25 [33] Yu-Shu Wu, Yuan Di, Zhijiang Kang, and Perapon Fakcharoenphol. A multiple-continuum model for simulating single-phase and multiphase flow in naturally fractured vuggy reservoirs. Journal of Petroleum Science and Engineering, 78(1):13–22, 2011. [34] Yu-Shu Wu, G. Qin, R. E. Ewing, Y. Efendiev, Z. Kang, and Y. Ren. A multiple-continuum approach for modeling multiphase flow in naturally fractured vuggy petroleum reservoirs. SPE-104173, presented at the 2006 SPE International Oil & Gas Conference and Exhibition in China held in Beijing, China. [35] Jun Yao, Hai Sun, Dong-yan Fan, Chen-chen Wang, and Zhi-xue Sun. Numerical simulation of gas transport mechanisms in tight shale gas reservoirs. Petroleum Science, 10(4):528–537, 2013. 26
5cs.CE
arXiv:1711.04177v1 [math.GT] 11 Nov 2017 COUNTING PROBLEMS IN GRAPH PRODUCTS AND RELATIVELY HYPERBOLIC GROUPS ILYA GEKHTMAN, SAMUEL J. TAYLOR, AND GIULIO TIOZZO Abstract. We study properties of generic elements of groups of isometries of hyperbolic spaces. Under general combinatorial conditions, we prove that loxodromic elements are generic (i.e. they have full density with respect to counting in balls for the word metric) and translation length grows linearly. We provide applications to a large class of relatively hyperbolic groups and graph products, including right-angled Artin groups and rightangled Coxeter groups. 1. Introduction Let G be a finitely generated group. One can learn a great deal about the geometric and algebraic structure of G by studying its actions on various negatively curved spaces. Indeed, Gromov’s theory of hyperbolic groups [Gro87] provides the clearest illustration of this philosophy. However, weaker forms of negative curvature, ranging from relative hyperbolicity [Far98, Bow12, Osi06] to acylindrical hyperbolicity [Osi15, Bow08], apply to much larger classes of groups and still provide rather strong consequences. In all of these theories, a special role is played by the loxodromic elements of the action, i.e. those elements which act with sink-source dynamics. In this paper, we are interested in quantifying the abundance of such isometries for the action of G on a hyperbolic space X. We emphasize that in all but the simplest situations, the natural hyperbolic spaces that arise are not locally compact. This includes actions associated to relatively hyperbolic groups [Far98], cubulated groups [KK14, Hag14], mapping class groups [MM99], and Out(Fn ) [BF14, HM13], to name only a few. Hence, in this paper we make no assumptions of local finiteness or discreteness of the action. Suppose that G y X is an action by isometries on a hyperbolic space X. We address the question: How does a typical element of G act on X? When G is not amenable, the word “typical” has no well defined meaning, and depends heavily on the averaging procedure: a family of finitely supported measures exhausting G. Although much is now known about measures generated from a random walk on G [Mah11, CM15, MT14, MS14], very little is known about counting with respect to balls in the word metric. This will be our main focus. In more precise terms, fix a finite generating set S for the group G. Let Bn be the ball of radius n about 1 with respect to the word metric d determined by S. Then we call a property P generic if #{g ∈ Bn : g has P } →1 as n → ∞. #Bn In this language, a refinement of our questions asks when the loxodromic elements of a particular action G y X are generic with respect to a generating set S. It is important to Date: November 15, 2017. 1 2 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO note that genericity in the counting model depends on the generating set: a priori, sets may be generic with respect to one word metric, but not with respect to another. The results of this paper are modeled on our previous work [GTT16], where we studied the situation where G is itself hyperbolic. Recall that g ∈ G is loxodromic with respect to the action G y X if and only if its translation length τX (g) = lim dX (x, g n x)/n is strictly positive. In [GTT16], we prove that for any isometric action of a hyperbolic group G on a hyperbolic metric space X, loxodromic elements are generic, and translation length grows linearly. However, the genericity of loxodromic elements is in general false when the hypothesis that G is hyperbolic is dropped (see Example 1). In the present paper, we generalize this theorem to a much larger class of groups. Our general setup is discussed below, but here is a sample: Theorem 1.1. Suppose that either (1) G is a finitely generated group which admits a geometrically finite action on a CAT(−1) space with virtually abelian parabolic subgroups and S an admissible generating set, or (2) G is a right-angled Artin or Coxeter group which does not split as a direct product, and S is its standard vertex generating set. Then for any nonelementary isometric action G y X on a separable hyperbolic metric space X there is an L > 0 such that #{g ∈ Bn : τX (g) ≥ Ln} → 1. (1) #Bn In particular, loxodromic elements are generic. In fact, our theorem applies to a more general class of relatively hyperbolic groups and graph products (see Section 2 for precise statements and definitions) and in fact to any group satisfying certain combinatorial conditions. Before moving to our general framework, we state one more result which may be of independent interest. It is a direct generalization of a theorem of Gouëzel, Mathéus, and Maucourant [GMM15] who consider the case where G is hyperbolic. Theorem 1.2. Let G be as in Theorem 1.1 with generating set S, and suppose that H is an infinite index subgroup of G. Then lim n→∞ #(H ∩ Bn ) = 0. #Bn That is, the proportion of elements of G of length less than n which lie in H goes to 0 as n → ∞. 1.1. General framework and results. Our general framework is as follows. We define a graph structure to be a pair (G, Γ) where G is a countable group and Γ is a directed, finite graph such that: (1) there is a labeled vertex v0 , called the initial vertex ; for every other vertex v there exists a directed path from v0 to v; (2) every edge is labeled by a group element such that edges directed out of a fixed vertex have distinct labels. By (2), there exists an evaluation map ev : E(Γ) → G and this map extends to the set of finite paths in Γ by concatenating edge labels. We denote by Ω0 the set of finite paths starting at v0 , by Sn ⊂ Ω0 the set of paths of length n, and by #X the cardinality of X. COUNTING LOXODROMICS 3 A graph structure is a geodesic combing if the evaluation map ev : Ω0 → G is bijective, and each path in Ω0 evaluates to a geodesic in the associated Cayley graph. See Section 3.1 for details. For each set A ⊆ Ω0 we introduce the counting measure P n on Ω0 as P n (A) := #(Sn ∩ A) . #Sn The graph structure is almost semisimple if the number of paths of length n starting from v0 has pure exponential growth, i.e. there exists c > 0, λ > 1 such that c−1 λn ≤ #Sn ≤ cλn for each n. See Section 3.2 for details. Definition 1.3. For each vertex v of Γ, we denote by Lv the set of loops based at v, and by Γv = ev(Lv ) its image in G. We call Γv the loop semigroup associated to v. Consider an action G y X, where X is a hyperbolic metric space. A semigroup L < G is nonelementary if it contains two independent loxodromics. A graph structure (G, Γ) is nonelementary for the action G y X if for any vertex v of maximal growth (see Definition 3.1) the loop semigroup Γv is nonelementary. We now introduce several criteria on a graph structure that guarantee it is nonelementary: we call them thickness and quasitightness. Definition 1.4 (Thickness). A graph structure is thick if for any vertex v of maximal growth there exists a finite set B ⊆ G such that G = BΓv B. More generally, a graph structure is thick relatively to a subgroup H < G if for every vertex v of maximal growth there exists a finite set B ⊆ G such that H ⊆ BΓv B. Given a path γ in Γ, we say it c–almost contains an element w ∈ G if γ contains a subpath p such that w = a · ev(p) · b in G, with |a|, |b| ≤ c. We denote as Yw,c the set of paths in Γ starting at the initial vertex which do not c–almost contain w. The following definition is modeled on the one found in [AL02]. Definition 1.5 (Growth quasitightness). A graph structure (G, Γ) is called growth quasitight if there exists c > 0 such that for every w ∈ G the set Yw,c has density zero with respect to P n ; that is, P n (Yw,c ) → 0 as n → 0. More generally, given a subgroup H < G we say that (G, Γ) is growth quasitight relative to H if there exists a constant c > 0 such that for every w ∈ H the set Yw,c has density zero. In the most general form, the main theorem we are going to prove is the following. Theorem 1.6. Let G be a countable group of isometries of a separable, δ-hyperbolic metric space X, and let (G, Γ) be an almost semisimple graph structure which is either: (1) nonelementary; (2) thick relative to a nonelementary subgroup H < G; or (3) growth quasitight relative to a nonelementary subgroup H < G. Then there exists L > 0 such that for every  > 0 one has that: 4 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO (i) Displacement grows linearly: #{g ∈ Sn : dX (gx, x) ≥ (L − )n} →1 #Sn as n → ∞. (ii) Translation length grows linearly: #{g ∈ Sn : τX (g) ≥ (L − )n} →1 #Sn as n → ∞. (iii) As a consequence, loxodromic elements are generic: #{g ∈ Sn : g is X − loxodromic} →1 #Sn as n → ∞. If we are interested in counting with respect to balls in the Cayley graph, we get the following immediate consequence. Corollary 1.7. Let G be a group with finite generating set S. Suppose that (i) there is a geodesic combing for (G, S); (ii) G has pure exponential growth with respect to S; and (iii) the combing for (G, S) satisfies at least one of the conditions (1), (2), (3) above. Then for any nonelementary action G y X on a hyperbolic space, the set of loxodromic elements is generic with respect to S. Note that the right-angled Artin group G = F2 × F3 of Example 1 with the standard generators has a geodesic combing and has pure exponential growth but loxodromic elements are not generic, so an additional dynamical condition (such as (1), (2), (3)) must be added. In fact, we will show that for graph products such as RAAGs and RACGs this condition amounts essentially to the group G not being a product. Moreover, we will prove that the three conditions are related, namely (3) ⇒ (2) ⇒ (1). 2. Applications 2.1. Hyperbolic groups. By Cannon’s theorem [Can84], a hyperbolic group G admits a geodesic combing for any generating set. In fact, the language recognized by the graph is defined by choosing for each g ∈ G the smallest word (in lexicographic order) among all words of minimal length which represent g. This is called the ShortLex representative. We proved in [GTT16] that this graph structure is nonelementary, hence we can apply Theorem 1.6. 2.2. RAAGs, RACGs, and graph products. Let G be a right angled Artin or Coxeter group, and let S its standard vertex generating set. A result of Hermiller and Meier [HM95] implies that (G, S) is ShortLex automatic. In our language, (G, S) admits a geodesic combing. However, the graph Γ parameterizing this language of geodesics does not have the correct dynamical properties needed to apply Theorem 1.6. In Section 10, we modify their construction to show that when G is not a direct product, it has a graph structure with respect to the standard generators with the strongest possible dynamical properties. We then obtain the following: Theorem 2.1. Let G be a right-angled Artin or Coxeter group which is not virtually cyclic and does not split as a product, and consider an action of G on a hyperbolic, separable metric space X. Then eq. (1) holds, and loxodromic elements are generic with respect to the standard generators. COUNTING LOXODROMICS 5 Actually, our theorem applies to all graph products of groups with geodesic combing (Theorem 10.5). We refer the reader to Section 10 for details. Let us point out that RAAGs which are products give in fact examples of actions where loxodromics are not generic: Example 1 (Nongenericity in general). Denote the free group of rank n by Fn and fix a free basis as a generating set. Let G = F2 × F3 and let X denote a Cayley graph for F2 . Give G its standard generating set; that is, the generating set consisting of a basis for F2 and a basis for F3 . Consider the action G y X in which the F2 factor acts by left multiplication and the right factor acts trivially. If we denote the set of loxodromics for the action by LOX, then 2 # (LOX ∩ Bn ) = 6= 1. lim n→∞ #Bn 3 Note that in the example above G has pure exponential growth and a geodesic combing, so these two conditions are not sufficient to yield genericity of loxodromics. Moreover, the complement of LOX is a subgroup H < G which has infinite index and positive density, showing that conditions are needed also in Theorem 1.2. Moreover, as a consequence of the geodesic combing that we produce in order to prove the previous theorem, we also prove the following fine counting statement for the number of elements in a ball with respect to the standard generating set. As far as we know, this result is also new, and it may be of independent interest. Theorem 2.2. Let G be a right-angled Artin group or Coxeter group which is not virtually cyclic and does not split as a product. Then there exists λ > 1, C > 0 such that lim n→∞ #Sn = C. λn We say that a group with a generating set with the previous property has exact exponential growth. This is stronger than pure exponential growth (where one only requires C −1 λn ≤ #Sn ≤ Cλn ), and depends very subtly on the choice of generating set. In fact, in Theorem 11.1 we will establish this result also more generally for graph products. 2.3. Relatively hyperbolic groups. Our results also apply to a large class of relatively hyperbolic groups. We need two hypotheses. First, recall that a relatively hyperbolic group G is equipped with a compact metric space ∂G known as its Bowditch boundary, and such a space carries a natural Patterson-Sullivan measure ν, defined with respect to the word metric on Cay(G, S) (see Section 9.2). We call a relatively hyperbolic group G with a generating set S pleasant if the action of G on ∂G × ∂G is ergodic with respect to the measure ν × ν. Second, we need a geodesic combing with respect to some generating set S. Let us call a finite generating set S admissible if G admits a geodesic combing with respect to S. We have the following general statement: Theorem 2.3. Let G be a relatively hyperbolic group with an admissible generating set S for which G is pleasant. Then, for each action of G on a hyperbolic, separable, metric space X, there exists L > 0 such that #{g ∈ Bn : τX (g) ≥ Ln} →1 #Bn As a consequence, X-loxodromic elements are generic. as n → ∞. 6 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO In fact, by [AC16] and [NS95], many relatively hyperbolic groups admit geodesic combings as follows. Let us call a finitely generated group G geodesically completable if any finite generating set S of G can be extended to a finite generating set S 0 ⊇ S for which there exists a geodesic biautomatic structure. Antolı́n and Ciobanu ([AC16], Theorem 1.5) proved that whenever G is hyperbolic relative to a collection of subgroups (Pi ) each of which is geodesically completable, then G is geodesically completable. Moreover, from automata theory ([HRR17], Theorem 5.2.7) one gets that if G admits a geodesic biautomatic structure for S, then it also admits a geodesic combing for the same S. Hence one gets: Proposition 2.4. Let (G, P) be a relatively hyperbolic group such that each parabolic subgroup P ∈ P is geodesically completable. Then every finite generating set S can be extended to a finite generating set S 0 which admits a geodesic combing. Let us note that in particular, virtually abelian groups are geodesically completable ([AC16], Proposition 10.1), hence any group hyperbolic relative to a collection of virtually abelian subgroups is geodesically completable and admits a geodesic combing. Moreover, we will prove (Proposition 9.17): Proposition 2.5. If a group G acts geometrically finitely on a CAT(−1) proper metric space, then G is pleasant with respect to any finite generating set. In particular, geometrically finite Kleinian groups satisfy both hypotheses of Theorem 2.3, which establishes Theorem 1.1 (1) as a corollary of Theorem 2.3. 2.4. Actions with strongly contracting elements. Let us now remark that by combining our work with recent work of W. Yang one can apply our theorem in even more general cases. Following [ACT15], [Yan16], we call an element g ∈ G strongly contracting for the action on Cay(G, S) in the above sense if n 7→ g n is a quasigeodesic and there exists C, D ≥ 0 such that for any geodesics γ in Cay(G, S) whose distance from hgi is at least C, the diameter of the image of γ under the nearest point projection to hgi is bounded by D. Wenyuan Yang [Yan16] has recently announced that whenever the action G y Cay(G, S) has a strongly contracting element, G is growth quasitight and has pure exponential growth with respect to S. Combining Theorem 1.7 with Yang’s result we obtain the following: Corollary 2.6. Let G be a group with finite generating set S. Suppose that the Cayley graph Cay(G, S) has a strongly contracting element and that (G, S) has a geodesic combing. Then for any nonelementary action G y X on a hyperbolic space, the set of loxodromic elements is generic with respect to S. 2.5. Genericity with respect to the Markov chain. Our approach is to deduce typical properties of elements of G from typical long term behavior of long paths in the associated graph structure. As a by-product, we also obtain a general theorem about generic elements for sample paths in a Markov chain, which may be of independent interest. More precisely, an almost semisimple graph Γ defines a Markov chain on the vertices of Γ (see 3.3), hence it defines a Markov measure P on the set Ω0 of infinite paths from the initial vertex. For such Markov chains, we prove the following: Theorem 2.7. Let (G, Γ) be an almost semisimple, nonelementary graph structure for G y X, and let x ∈ X. Then: (1) For P-almost every sample path (wn ), the sequence (wn x) converges to a point in ∂X; COUNTING LOXODROMICS 7 (2) There exist finitely many constants Li > 0 (i = 1, . . . , r) such that for P-almost every sample path there exists an index i such that d(wn x, x) = Li ; n (3) If we denote L := min1≤i≤r Li , then for each  > 0 one has lim n→∞ P(τX (wn ) ≥ n(L − )) → 1 as n → ∞. As a consequence, P(wn is loxodromic) → 1 as n → ∞. 2.6. Non-backtracking random walks. An illustration of the previous result is given by looking at non-backtracking random walks. Let G be a group and S = S −1 a generating set. The non-backtracking random walk on G is the process defined by taking gn uniformly at random among the elements of S \ {(gn−1 )−1 } and considering the sample path wn = g1 g2 . . . gn . We prove the following, which answers a question of I. Kapovich. Theorem 2.8. Let G be a nonelementary group of isometries of a separable hyperbolic metric space X, and let S be a finite generating set. Consider the non-backtracking random walk wn := g1 . . . gn defined as above, and let P be corresponding the measure on the set Ω0 of sample paths. Then P (wn is loxodromic on X) → 1 as n → ∞. Proof. Let us consider F = F (S) the free group generated by S, with its standard word metric. By composing the projection F → G with the action on X, we can think of F as a group of isometries of X. Then F has a standard geodesic combing, whose graph Γ has only one non-trivial component, hence (by Proposition 6.3) the graph structure (F, Γ) is thick, hence nonelementary. The result then follows from Theorem 2.7.  2.7. Previous results. Beginning with Gromov’s influential works [Gro87, Gro93, Gro03], there is a large literature devoted to studying typical behavior in finitely generated groups. More recent developments can be found, for example, in [AO96, Arz98, BMR03, Cha95, KMSS03, KS05, KRSS07, Ol’92]. If one takes the definition of genericity with respect to random walks, instead of using counting in balls, then genericity of loxodromics has been established in many cases. In particular, the question of genericity of pseudo-Anosovs in the mapping class group goes back to at least Dunfield-Thurston [DT06], and for random walks it has been proven independently by Rivin [Riv08] and Maher [Mah11]. This relates to our setup, as a mapping class is pseudo-Anosov iff it acts loxodromically on the curve complex. Genericity of loxodromics for random walks on groups of isometries of hyperbolic spaces has been established with increasing level of generality in [CM15, Sis11, MT14]. Let us note that in general counting in balls and counting with random walks need not yield the same result, and in fact it is a very important problem to establish whether the harmonic measure for the random walk can coincide with a Patterson-Sullivan-type measure, given by taking limits of counting measures over balls. Many results in this area show that the two measures do not coincide except in particular cases, while an existence result of a random walk for which harmonic and PS measure coincide is due for hyperbolic groups to Connell-Muchnik [CM07]. 8 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO As for counting in balls, Wiest [Wie14] recently showed that if a group G satisfies a weak automaticity condition and the action G y X on a hyperbolic space X satisfies a strong geodesic word hypothesis, then the loxodromics make up a definite proportion of elements of the n ball. This geodesic word hypothesis essentially requires geodesics in the group G, given by the normal forms, to project to unparameterized quasigeodesics in the space X under the orbit map. In our work, on the other hand, we do not assume any nice property of the action except it being by isometries. Let us note that our theorems answer (when the hypotheses of our two papers overlap) the open problems (3) (4) in ([Wie14], section 2.12) Acknowledgments. We thank Yago Antolı́n for useful suggestions and clarifications. The first author is partially supported by NSF grant DMS-1401875 and ERC advanced grant “Moduli” of Prof. Ursula Hamenstädt, the second author is partially supported by NSF grants DMS-1400498 and DMS-1744551, and the third author is partially supported by NSERC and the Connaught fund. 3. Background material Since graph structures play central role in our work, we begin by discussing some further details. The reader will notices that much of this is inspired by the theory of regular languages and automatics groups [EPC+ 92], but we place a special focus on the graph which parameterizes the language. Thus our terminology may differ from that in the literature. 3.1. Graph structures. The general framework is as follows. We define a graph structure to be a pair (G, Γ) where G is a countable group and Γ is a directed, finite graph such that: (1) there is a labeled vertex v0 , called the initial vertex ; for every other vertex v there exists a directed path from v0 to v; (2) every edge is labeled by a group element such that edges directed out of a fixed vertex have distinct label. Thus, there exists an evaluation map ev : E(Γ) → G and this map extends to the set of finite paths in Γ by concatenating edge labels. If S = ev(E(Γ)), we say that (G, Γ) is a graph structure with respect to S. We denote by Ω0 the set of finite paths starting at v0 and by Ω the set of all finite paths. When ev(Ω0 ) = G, we call the graph structure surjective; in this case S = ev(E(Γ)) generates G as a semigroup. A surjective graph structure is geodesic if for each path p ∈ Ω, the word length |ev(p)|S is equal to the length of the path. In this case, all paths in Γ evaluate naturally to geodesic paths in the Cayley graph Cay(G, S). Finally, the graph structure is called injective, if ev : Ω0 → G is injective. For example, if each path in Ω0 labels the ShortLex geodesic representative of its evaluation (with respect to some ordering on S), then (G, Γ) is injective. A bijective, geodesic graph structure (G, Γ) with respect to S is called a geodesic combing of G with respect to S. Note the evaluation map, restricted to Ω0 , factors through S ∗ , the set of all words in the alphabet S. The image in S ∗ of Ω0 (i.e. all words which can be spelled starting at v0 ) is called the language parameterized (or recognized) by Γ. This language is prefix closed by construction; an initial subword of a recognized word is also recognized. We warn the reader that references differ on the exact meaning on some of these terms. For example, Calegari–Fujiwara use the term “combing” to refer to the language of a bijective, geodesic graph structure rather than the graph structure itself [CF10, Cal13]. Since we will be most interested in dynamical properties of the graph parameterizing the language of geodesics, we choose to emphasize the graph structure itself. COUNTING LOXODROMICS 9 3.2. Almost semisimple graphs. Let us summarize some of the fundamental properties about graphs and Markov chains. Much of this material appears in Calegari–Fujiwara [CF10], and we refer to that article and [GTT16] for more details and proofs. Let Γ be a finite, directed graph with vertex set V (Γ) = {v0 , v1 , . . . , vr−1 }. The adjacency matrix of Γ is the r × r matrix M = (Mij ) defined so that Mij is the number of edges from vi to vj . Such a graph is almost semisimple of growth λ > 1 if the following hold: (1) There is an initial vertex, which we denote as v0 ; (2) For any other vertex v, there is a (directed) path from v0 to v; (3) The largest modulus of the eigenvalues of M is λ, and for any eigenvalue of modulus λ, its geometric multiplicity and algebraic multiplicity coincide. We denote by Ω the set of all finite paths in Γ, Ωv for the set of finite paths starting at v, and Ω0 = Ωv0 the set of finite paths starting at v0 . For a path g ∈ Ω, we use [g] to denote its terminal vertex. Similarly, we denote as Ω∞ the set of all infinite paths in Γ, Ω∞ v the set ∞ . of infinite paths starting at v and Ω∞ = Ω v0 0 Given two vertices v1 , v2 of a directed graph, we say that v2 is accessible from v1 and write v1 → v2 if there is a path from v1 to v2 , and two vertices are mutually accessible if v1 → v2 and v2 → v1 . Mutual accessibility is an equivalence relation, and equivalence classes are called irreducible components of Γ. For any subset A ⊆ Ω0 , we define the growth λ(A) of A as p λ(A) := lim sup n #(A ∩ Sn ), n→∞ where Sn ⊂ Ω0 is the set of all paths starting at v0 that have length n. For each vertex v of Γ which lies in a component C, let Pv (C) denote the set of finite paths in Γ based at v which lie entirely in C. Moreover, for any path g from v0 to v, we let Pg (C) = g · Pv (C) be the set of finite paths in Ω which can be written as a concatenation of g with a path contained entirely in C. Definition 3.1. An irreducible component C of Γ is called maximal if for some (equivalently, any) g ∈ Ω0 with [g] ∈ C, the growth of Pg (C) equals λ. A vertex is maximal if it belong to a vertex of maximal growth. Moreover, we say a vertex vi of Γ has large growth if there exists a path from vi to a vertex in a maximal component, and it has small growth otherwise. Definition 3.2. For every vertex v of Γ, the loop semigroup of v is the set Lv of loops in the graph Γ which begin and end at v. It is a semigroup with respect to concatenation. A loop in Lv is primitive if it is not the concatenation of two (non-trivial) loops in Lv . Let Γ be an almost semisimple graph of growth λ > 1. Then there exist constants c > 0 and λ1 < λ such that ([GTT16], Lemma 2.3): (1) For any vertex v of large growth and any n ≥ 0, c−1 λn ≤ #{paths from v of length n} ≤ cλn (2) For any vertex v of small growth and any n ≥ 0, #{paths from v of length n} ≤ cλn1 (3) If v belongs to the maximal component C, then for any n ≥ 0 c−1 λn ≤ #{paths in Pv (C) of length n} ≤ cλn 10 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO and also ([GTT16], Lemma 6.5) c−1 λn ≤ #{paths in Lv of length n} ≤ cλn 3.3. Markov chains. Given an almost semisimple graph Γ of growth λ with edge set E(Γ), one constructs a Markov chain on the vertices of Γ as follows. If vi has large growth, then we set the probability µ(vi → vj ) of going from vi to vj as (2) µ(vi → vj ) = Mij ρ(1)j , λρ(1)i and if vi has small growth, we set µ(vi → vj ) = 0 for i 6= j and µ(vi → vi ) = 1. Now, for each vertex v the measure µ induces measures Pnv on the space Ωv of finite paths starting at v, simply by setting Pnv (γ) = µ(e1 ) · · · µ(en ) for each path γ = e1 . . . en starting at v. Similarly, this measure can be extended to a measure Pv on the space Ω∞ v of infinite paths starting at v. The most important cases for us will be the measures on the set of (finite and infinite, respectively) paths starting at v0 , which we will denote as Pn = Pnv0 and P = Pv0 . Each measure Pv defines a Markov chain on the space V (Γ), and we consider for each n the random variable wn : Ω∞ → Ω wn ((e1 , . . . , en , . . . )) = e1 . . . en defined as the concatenation of the first n edges of the infinite path. In order to compare the n-step distribution for the Markov chain to the counting measure, let us denote as LG the set of paths from v0 ending at a vertex of large growth. Then we note ([GTT16], Lemma 3.4) that there exists c > 1 such that, for each A ⊆ Ω0 , (3) c−1 Pn (A) ≤ P n (A ∩ LG) ≤ c Pn (A). It turns out (see [GTT16], Lemma 3.3) that, with respect to this choice of measure, a vertex v belongs to a maximal irreducible component of Γ if and only if it is recurrent, i.e. : (1) there is a path from v0 to v of positive probability; and (2) whenever there is a path from v to another vertex w of positive probability, there is also a path from w to v of positive probability. For this reason, maximal components will also be called recurrent components. It is well-known that for almost every path of the Markov chain there exists one recurrent component C such that the path lies completely in C from some time on, and visits each vertex of C infinitely many times. Thus, for each recurrent component C, we let ΩC be the set of all infinite paths from the initial vertex which enter C and remain inside C forever, and denote as PC the conditional probability of P on ΩC . Moreover, for each recurrent vertex v the distribution of return times decays exponentially:  (4) Pv τv+ = n ≤ e−cn where τv+ = min{n ≥ 1 : [wn ] = v} denotes the first return time to vertex v. We will associate to each recurrent vertex of the Markov chain a random walk, and use previous results on random walks to prove statements about the asymptotic behavior of the Markov chain. COUNTING LOXODROMICS 11 For each sample path ω ∈ Ω∞ , let us define n(k, v, ω) as the k th time the path ω lies at the vertex v. In formulas,  0 if k = 0 n(k, v, ω) := min (h > n(k − 1, v, ω) : [wh ] = v) if k ≥ 1 To simplify notation, we will write n(k, v) instead of n(k, v, ω) when the sample path ω is fixed. We now define the first return measure µv on the set of primitive loops by setting, for each primitive loop γ = e1 . . . en with edges e1 , . . . , en , µv (e1 . . . en ) = µ(e1 ) . . . µ(en ). Extend µv to the entire loop semigroup Lv by setting µv (γ) = 0 if γ ∈ Lv is not primitive. Since almost every path starting at v visits v infinitely many times, the measure µv is a probability measure. By equation (4), for every recurrent vertex v, the first return measure µv has finite exponential moment, i.e. there exists a constant α > 0 such that Z (5) eα|γ| dµv (γ) < ∞. Lv 3.4. Hyperbolic spaces. In this paper, X will always be a geodesic, separable metric space. Such a space is called δ-hyperbolic for some δ ≥ 0 if for every geodesic triangle in X, each side is contained within the δ–neighborhood of the other two sides. Each hyperbolic space has a well-defined Gromov boundary ∂X, and we refer the reader to [BH09, Section III.H.3], [GdlH90], or [KB02, Section 2] for definitions and properties. If g is an isometry of X, its translation length is defined as d(g n x, x) n→∞ n where the limit does not depend on the choice of x. In order to estimate the translation length, we will use the following well-known lemma; see for example [MT14, Proposition 5.8]. τX (g) := lim Lemma 3.3. There exists a constant c, which depends only on δ, such that for any isometry g of a δ-hyperbolic space X and any x ∈ X with d(x, gx) ≥ 2(gx, g −1 x)x + c, the translation length of g is given by τX (g) = d(x, gx) − 2(gx, g −1 x)x + O(δ). An isometry g of X is loxodromic if it has positive translation length; in that case, it has two fixed points on ∂X. We say two loxodromic elements are independent if their fixed point sets are disjoint. A semigroup (or a group) G < Isom X is nonelementary if it contains two independent loxodromics. We will use the following criterion. Proposition 3.4 ([DSU14, Proposition 7.3.1]). Let L be a semigroup of isometries of a hyperbolic metric space X. If the limit set ΛL ⊂ ∂X of L on the boundary of X is nonempty and L does not have a finite orbit in ∂X, then L is nonelementary. Finally, we turn to the definition and basic properties of shadows in the δ-hyperbolic space X. For x, y ∈ X, the shadow in X around y based at x is Sx (y, R) = {z ∈ X : (y, z)x ≥ d(x, z) − R}, 12 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO where R > 0 and (y, z)x = 12 (d(x, y) + d(x, z) − d(y, z)) is the usual Gromov product. The distance parameter of Sx (y, R) is by definition the number r = d(x, y) − R, which up to an additive constant depending only on δ, measures the distance from x to Sx (y, R). Indeed, z ∈ Sx (y, R) if and only if any geodesic [x, z] 2δ–fellow travels any geodesic [x, y] for distance r + O(δ). The following observation is well-known. Lemma 3.5. For each D ≥ 0, and each x, y in a metric space, we have ND (Sx (y, R)) ⊆ Sx (y, R + D). 3.5. Random walks. A probability measure µ on G is said to be nonelementary with respect to the action G y X if the semigroup generated by the support of µ is nonelementary. We will need the fact that a random walk on G whose increments are distributed according to a nonelementary measure µ almost surely converge to the boundary of X and has positive drift in X. Theorem 3.6 ([MT14, Theorems 1.1, 1.2]). Let G be a countable group which acts by isometries on a separable hyperbolic space X, and let µ be a nonelementary probability distribution on G. Fix x ∈ X, and let (un ) be the sample path of a random walk with independent increments with distribution µ. Then: (1) almost every sample path (un x) converges to a point in the boundary of ∂X, and the resulting hitting measure ν is nonatomic; (2) moreover, if µ has finite first moment, then there is a constant L > 0 such that for almost every sample path lim n→∞ d(x, un x) = L > 0. n The constant L > 0 in Theorem 3.6 is called the drift of the random walk (un ). 4. Behavior of generic sample paths for the Markov chain Let G be a group with a nonelementary action G y X on a hyperbolic space X. In this section we assume that G has a graph structure (G, Γ) which is almost semisimple and nonelementary. 4.1. Convergence to the boundary of X. In this section we show that almost every sample path for the Markov chain converges to the boundary of X. Since we are assuming that the graph structure is nonelementary, the exact same proof as in ([GTT16], Theorem 6.8) yields the following. Theorem 4.1. For P-almost every path (wn ) in the Markov chain, the projection (wn x) to the space converges to a point in the boundary ∂X. As a consequence, we have for every vertex v of large growth a well-defined harmonic measure νvX , namely the hitting measure for the Markov chain on ∂X: for each each (Borel) A ⊆ ∂X we define νvX (A) := Pv ( lim wn x ∈ A). n→∞ The previous proof also provides a decomposition theorem for the harmonic measures νvX . If R is the set of recurrent vertices of Γ, then we have: X X X (6) νvX = µ(γ)γ∗ νw w∈R γ:v→w COUNTING LOXODROMICS 13 Here, the sum is over all finite paths from v to w which only meet a recurrent vertex at their terminal endpoint. Note that if v is recurrent, then νvX is the harmonic measure for the random walk on G generated by the measure µv , as discussed above. Lemma 4.2. For any v of large growth, the measure νvX is non-atomic. X X Proof. Since the random walk measures νw are non-atomic, so are the measures γ∗ νw for X each γ, hence by equation (6) the measure νv is also non-atomic as it is a linear combination of non-atomic measures.  4.2. Positive drift along geodesics. In this section, we show that almost every sample path has a well-defined and positive drift in X. Theorem 4.3. For P-almost every sample path ω = (wn ) there exists a recurrent component C = C(ω) for which we have d(wn x, x) = LC , lim n→∞ n where LC > 0 depends only on C. Since Γ is finite, this gives at most finitely many potential drifts for the Markov chain. Proof. Let v be a recurrent vertex. Since the graph structure is nonelementary, the loop semigroup Γv is nonelementary, hence the random walk given by the return times to v has positive drift. More precisely, from Theorem 3.6, there exists a constant `v > 0 such that for almost every sample path which enters v, d(wn(k,v) x, x) lim = `v . k→∞ k Morever, as the distribution of return times has finite exponential moment, for almost every sample path one has n(k, v, ω) lim = Tv . k→∞ k These two facts imply d(wn(k,v) x, x) `v lim = . k→∞ n(k, v) Tv Now, almost every infinite path visits every vertex of some recurrent component infinitely often. Thus, for each recurrent vertex vi which belongs to a component C, there exists a constant Li > 0 such that for PC -almost every path (wn ), there is a limit d(wn(k,vi ) x, x) . n(k, vi ) Let C be a maximal component, and v1 , . . . , vk its vertices. Our goal now is to prove that L1 = L2 = . . . Lk . Let us pick a path ω ∈ Ω0 such that the limit Li above exists for each i = 1, . . . , k, and define Ai = {n(k, vi ), k ∈ N}, and the equivalence relation i ∼ j if Li = Lj . Since wn(k,vi ) and wn(k,vi )+1 differ by one generator, d(wn(k,vi ) x, wn(k,vi )+1 x) is uniformly bounded, hence d(wn(k,vi )+1 x, x) d(wn(k,vi ) x, x) lim = lim = Li k→∞ k→∞ n(k, vi ) + 1 n(k, vi ) so the equivalence relation satisfies the hypothesis of ([GTT16], Lemma 6.9), hence there is a unique limit LC = Li so that d(wn x, x) lim = LC . n→∞ n Li = lim k→∞ 14 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO  Corollary 4.4. For every vertex v of large growth, and for Pv -almost every sample path (wn ) there exists a recurrent component C accessible from v such that we have d(wn x, x) n Proof. By Theorem 4.3, for P-almost every path LC for some recurrent component C. Let g0 be a Then for any ω = (wn ) ∈ Ω∞ en ) v , the path (w w en+k = wn+k (g0 · ω) = g0 · wn (ω) where k = |g0 |. lim n→∞ = LC . which passes through v, the drift equals path from v0 to v of positive probability. = g0 · ω belongs to Ω∞ 0 , and moreover Hence d(wn x, x) − d(x, g0 x) ≤ d(w en+k x, x) = d(wn x, g0 x) ≤ d(wn x, x) + d(x, g0 x) and so by Theorem 4.3 lim n→∞ d(w en+k x, x) d(wn x, x) = lim = LC n→∞ n n as required.  For application in Section 5, we will need the following convergence in measure statement. Let us denote (7) L := min C recurrent LC > 0 the smallest drift. Corollary 4.5. For any  > 0, and for any v of large growth,   d(x, wn x) ≤ L −  → 0. Pv n Proof. By the theorem, the sequence of random variables Xn = d(wnnx,x) converges almost surely to a function X∞ with the finitely many values L1 , . . . , Lr . Moreover, for every n the variable Xn is bounded above by the Lipschitz constant of the orbit map G → X. Thus, Xn converges to X∞ in L1 , yielding the claim.  4.3. Decay of shadows for P. For any shadow S, we denote its closure in X ∪ ∂X by S. Since the harmonic measures νvX for the Markov chain are nonatomic (by Lemma 4.2), we get by the same proof as in [GTT16] the following decay of shadows results. Proposition 4.6 (Decay of shadows, [GTT16], Proposition 6.18). There exists a function f : R → R such that f (r) → 0 as r → ∞, and such that for each v of large growth,  νvX Sx (gx, R) ≤ f (r), where r = d(x, gx) − R is the distance parameter of the shadow. Proposition 4.7 ([GTT16], Proposition 6.19). There exists a function p : R+ → R+ with p(r) → 0 as r → ∞, such that for each vertex v and any shadow Sx (gx, R) we have   Pv ∃n ≥ 0 : wn x ∈ Sx (gx, R) ≤ p(r), where r = d(x, gx) − R is the distance parameter of the shadow. 5. Generic elements with respect to the counting measure We now use the results about generic paths in the Markov chain to obtain results about generic paths with respect to the counting measure. COUNTING LOXODROMICS 15 5.1. Genericity of positive drift. The first result is that the drift is positive along generic paths: Theorem 5.1. Let (G, Γ) be an almost semisimple, nonelementary graph structure, and L > 0 be the smallest drift as given by eq. (7). Then for every  > 0 one has #{g ∈ Sn : d(gx, x) ≥ (L − ) |g|} →1 #Sn as n → ∞. The result follows from Corollary 4.5 similarly as in the proof of ([GTT16], Theorem 5.1). Proof. Let AL denote the set of paths AL := {g ∈ Ω0 : d(gx, x) ≤ L|g|}. We know by Corollary 4.5 that for any L0 < L one has Pn (AL0 ) → 0 as n → ∞. Then, for each path g of length n we denote as gb the prefix of g of length n − blog nc, and we observe that #{g ∈ Sn : gb ∈ / LG} #{g ∈ Sn ∩ AL− : gb ∈ LG} P n (AL− ) ≤ + #Sn #Sn and we know by [GTT16, Proposition 2.5] that the first term tends to 0. Now, by writing g = gbh with |h| = log |g| we have that d(gx, x) ≤ (L − )|g| implies d(b g x, x) ≤ d(gx, x) + d(b g x, gx) ≤ (L − )|g| + d(x, hx) ≤ hence, there exists C such that it is less than ≤ (L − )|g| + C log |g| ≤ L0 |b g| for any L −  < L0 < L whenever |g| is sufficiently large. This proves the inclusion {g ∈ Sn ∩ AL− : gb ∈ LG} ⊆ {g ∈ Sn : gb ∈ AL0 ∩ LG} and by Lemma 3.2 (1) #{g ∈ Sn : gb ∈ AL0 ∩ LG} ≤ cλlog n #(Sn−log n ∩ AL0 ∩ LG) ≤ hence by equation (3) and considering the size of Sn−log n ≤ c1 λlog n Pn−log n (AL0 )#Sn−log n ≤ c2 λn Pn−log n (AL0 ). Finally, using that Pn−log n (AL0 ) → 0 we get #{g ∈ Sn ∩ AL− : gb ∈ LG} ≤ lim sup c3 Pn−log n (AL0 ) = 0 #S n→∞ n→∞ n which proves the claim. lim sup  5.2. Decay of shadows for the counting measure. For g ∈ G, we set SxΓ (gx, R) = {h ∈ Ω0 : hx ∈ Sx (gx, R)} , where as usual, Sx (gx, R) is the shadow in X around gx centered at the basepoint x ∈ X and hx = ev(h)x. We will need the following decay property for SxΓ (gx, R) ⊆ Ω0 . Proposition 5.2. There is a function ρ : R+ → R+ with ρ(r) → 0 as r → ∞ such that for every n ≥ 0 P n (SxΓ (gx, R)) ≤ ρ (d(x, gx) − R) . We start with the following lemma in basic calculus. 16 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO Lemma 5.3. Let p : R+ → [0, 1] be a decreasing function with p(x) → 0 as x → ∞. For each α > 0 and each C > 0, there exists a function pe : R+ → R+ such that: (1) pe(x) ≥ p(x) for each x ∈ R+ ; (2) pe(x + mC) ≥ pe(x)e−αm for each x ∈ R+ , m ∈ N: (3) pe(x) → 0 as x → ∞. Proof. Let us define pe inductively as follows: pe(x) := p(x) if x ∈ [0, C) pe(x + C) := max{p(x + C), pe(x)e−α } Thus (1) and (2) are immediate from the definition. To prove (3), note that for each n there exists k ≤ n such that pe(x + nC) = p(x + (n − k)C)e−αk . Hence as x + nC → ∞ either x + (n − k)C → ∞ or k → ∞, thus the only limit point is 0.  Proof of Proposition 5.2. Pick a path h ∈ Ω0 of length n in SxΓ (gx, R), and let b h denote the longest subpath of h starting at the initial vertex and which ends in a vertex of large growth. Let us write h = b hl where l is the second part of the path. Note that we have d(hx, b hx) = d(b hlx, b hx) = d(lx, x) ≤ kC where k := |l| and C is the Lipschitz constant of the orbit map, hence by Lemma 3.5 b h ∈ SxΓ (gx, R0 + kC) where R0 = R + D and D = O(δ). Note that for each element b h there are at most cλk1 choices of the continuation l, hence #(Sn ∩ SxΓ (gx, R)) ≤c n X λk1 #(Sn−k ∩ SxΓ (gx, R0 + kC) ∩ LG) ≤ k=0 and by using eq. (3) and Proposition 4.7 ≤ c1 n X λk1 λn−k n−k P (SxΓ (gx, R0 k=0 n + kC)) ≤ c1 λ n X (λ1 /λ)k p(d(x, gx) − R0 − kC) k=0 Now, by Lemma 5.3 we can replace p by pe, choosing α so that eα λ1 < λ, thus getting pe(d(x, gx) − R0 − kC) ≤ eαk pe(d(x, gx) − R0 ) Thus, the previous estimate becomes P n (SxΓ (gx, R)) ≤ c2 n X (eα λ1 /λ)k pe(d(x, gx) − R0 ) ≤ c3 pe(d(x, gx) − R0 ) k=0 which proves the lemma if one sets ρ(r) := c3 pe(r − D).  5.3. Genericity of loxodromics. We now use the previous counting results to prove that loxodromic elements are generic with respect to the counting measure. The strategy is to apply the formula of Lemma 3.3 to show that translation length grows linearly as function of the length of the path: in order to do so, one needs to show that the distance d(gx, x) is large (as we did in Theorem 5.1) and, on the other hand, the Gromov product (gx, g −1 x)x is not too large. The trick to do this is to split the path g in two subpaths of roughly the same length, and show that the first and second half of the paths are almost independent. COUNTING LOXODROMICS 17 To define this precisely, for each n let us denote n1 = b n2 c and n2 = n − n1 . For each path g ∈ Ω, we define its initial part i(g) to be the subpath given by the first n1 edges of g, and its terminal part t(g) to be the subpath given by the last n2 edges of g. With this definition, g = i(g) · t(g) and |i(g)| = n1 , |t(g)| = n2 . Moreover, we define the random variables in , tn : Ω∞ → Ω by in (w) = i(wn ) and tn (w) = t(wn ). Note that by definition in = wn1 and by the Markov property we have for each paths g, h ∈ Ω: P(in = g and tn = h) = P(wn1 = g)Pv (wn2 = h) where v = [g]. In the next Lemma, we use the notation C(ω) to refer to the recurrent component to which the sample path ω = (wn ) eventually belongs, as in Theorem 4.3. Lemma 5.4. For any  > 0 we have   d(x, tn (ω)x) LC(ω) > →0 − lim P n→∞ n 2 as n → ∞. Proof. Note that by definition tn (ω) = wn2 (T n1 ω), where T : Ω∞ → Ω∞ is the shift in the space of infinite paths. Note that for every A ⊆ Ω∞ by the Markov property we have X P(T −n A) = P([wn ] = v)Pv (A) v∈V Let us define the function Sn (ω, ω 0 ) := d(x, wn (ω)x) − LC (ω 0 ) . n Note that from Corollary 4.4 for every vertex v of large growth and every  > 0 Pv (Sn (ω, ω) ≥ ) → 0 Moreover, for every n, if the path (e1 , . . . , en , . . . ) lies entirely in the component C from some point on, then the same is true for the shifted path (en+1 , en+2 , . . . ), i.e. C(T n ω) = C(ω) almost surely, and so Sn (ω, T k ω 0 ) = Sn (ω, ω 0 ) for all n, k hence = X P(Sn2 (T n1 ω, ω) > ) = P(Sn2 (T n1 ω, T n1 ω) > ) = X P([wn1 ] = v])P(Sn2 (ω, ω) > ) ≤ Pv (Sn2 (ω, ω) > ) v∈V v∈V ∩LG and the right-hand side tends to 0 by Corollary 4.4, proving the claim.  We now show that i(g) and t(g)−1 generically do not fellow travel. For the argument, let Sn (v) denote the set of paths in Ω which start at v and have length n. Lemma 5.5. Let f : R → R be any function such that f (n) → +∞ as n → +∞. Then   P n g ∈ Ω0 : (i(g)x, t(g)−1 x)x ≥ f (n) → 0 as n → ∞. Proof. We compute  #{g ∈ Sn1 , [g] = v, h ∈ Sn2 (v) : (gx, h−1 x)x ≥ f (n)} ≤ P n g : (i(g)x, t(g)−1 x)x ≥ f (n) = #Sn 18 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO and by fixing v and forgetting the requirement that [g] = v we have X #{g ∈ Sn , h ∈ Sn (v) : (gx, h−1 x)x ≥ f (n)} 1 2 ≤ ≤ #Sn v∈V then by fixing a value of h X X 1 ≤ #Sn v∈V  # g ∈ Sn1 : gx ∈ Sx (h−1 x, d(x, h−1 x) − f (n)) ≤ h∈Sn2 (v) hence from decay of shadows (Proposition 5.2) follows that X X ρ(f (n))#Sn #V #Sn1 #Sn2 ρ(f (n)) 1 ≤ ≤ ≤ cρ(f (n)) → 0. #Sn #Sn v∈V h∈Sn2 (v)  Once we have shown that i(g) and t(g)−1 are almost independent, we still need to show that also g and g −1 are almost independent. In order to do so, we note that i(g) is the beginning of g while t(g)−1 is the beginning of g −1 , and then we use the following trick from hyperbolic geometry. See e.g. [TT15]. Lemma 5.6 (Fellow traveling is contagious). Let X be a δ–hyperbolic space with basepoint x and let that A ≥ 0. If a, b, c, d are points of X with (a · b)x ≥ A, (c · d)x ≥ A, and (a · c)x ≤ A − 3δ. Then (b · d)x − 2δ ≤ (a · c)x ≤ (b · d)x + 2δ. In order to apply Lemma 5.6, we need to check that the first half of g (which is i(g)) and the first half of g −1 (which is t(g)−1 ) generically do not fellow travel. Lemma 5.7. For each η > 0, the probability   n(L − η) n −1 −1 P g ∈ Ω0 : (t(g) x, g x)x ≤ →0 2 and P n  g ∈ Ω0 n(L − η) : (i(g)x, gx)x ≤ 2  →0 as n → ∞. Proof. Consider the set BL := {g ∈ Ω0 : d(x, gx) − d(x, i(g)x) ≤ Theorem 4.3 for P-almost every sample path we have |g|L 2 }. We know by LC L d(x, wn x) − d(x, wn1 x) = ≥ n 2 2 hence for any L0 < L one has Pn (BL0 ) → 0 as n → ∞. Hence, as in the proof of Theorem 5.1 we get for any  > 0,   n(L − ) n (8) P d(x, gx) − d(x, i(g)x) ≥ →1 2 lim n→∞ Finally, by writing out the Gromov product, the triangle inequality and the fact that the action is isometric we get (t(g)−1 x, g −1 x)x ≥ d(x, g −1 x) − d(t(g)−1 x, g −1 x) = d(x, gx) − d(x, i(g)x) which combined with (8) proves the first half of the claim. COUNTING LOXODROMICS 19 The second claim follows analogously. Namely, from Theorem 4.3 and Lemma 5.4, we have for any  > 0   n(LC(ω) − ) P d(x, wn (ω)x) − d(x, tn (ω)x) ≤ →0 2 which then implies as before   n(L − ) P n d(x, gx) − d(x, t(g)x) ≥ →1 2 and to conclude we use that (i(g)x, gx)x ≥ d(x, gx) − d(i(g)x, gx) = d(x, gx) − d(x, t(g)x).  We now use Lemma 5.6 (fellow traveling is contagious) to show that the Gromov products (gx, g −1 x)x do not grow too fast with respect to our counting measures. Proposition 5.8. Let f : N → R be a function such that f (n) → +∞ as n → ∞. Then   P n (gx, g −1 x)x ≤ f (n) → 1 as n → ∞. Proof. Define  n(L − η) − 3δ f1 (n) = min f (n) − 2δ, 2 It is easy to see that f1 (n) → ∞ as n → ∞. By Lemma 5.6, if we know that: (1) (i(g)x, gx)x ≥ n(L − η)/2, (2) (t(g)−1 x, g −1 x)x ≥ n(L − η)/2, and (3) (i(g)x, t(g)−1 x)x ≤ f1 (n) ≤ n(L − η)/2 − 3δ, then (gx, g −1 x)x ≤ (i(g)x, t(g)−1 x)x + 2δ ≤ f1 (n) + 2δ.  Using Lemmas 5.5 and 5.7, the probability that conditions (1),(2), (3) hold tends to 1, hence we have P n ((gx, g −1 x)x ≤ f (n)) → 1 as n → ∞.  Finally, we put together the previous estimates and use Lemma 3.3 to prove that translation length grows linearly and loxodromic elements are generic. Theorem 5.9 (Linear growth of translation length). Let (G, Γ) be an almost semisimple, nonelementary graph structure, and L the smallest drift given by eq. (7). Then for any  > 0 we have #{g ∈ Sn : τX (g) ≥ n(L − )} → 1, #Sn as n → ∞. As a consequence, #{g ∈ Sn : g is X − loxodromic} → 1, #Sn as n → ∞. 20 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO Proof. If we set f (n) = ηn with η > 0, then by Proposition 5.8 and Theorem 5.1 the events (gx, g −1 x)x ≤ ηn and d(x, gx) ≥ n(L − η) occur with probability (P n ) which tends to 1, hence by Lemma 3.3     P n τX (g) ≥ n(L − 3η) ≥ P n d(x, gx) − 2(gx, g −1 x)x + O(δ) ≥ n(L − 3η) which approaches 1 as n → ∞. This implies the statement if we choose  > 3η. The second statements follows immediately since elements with positive translation length are loxodromic.  5.4. Genericity of loxodromics for the Markov chain. We now remark that a very similar proof yields that loxodromics are generic for P-almost every sample path of the Markov chain. More precisely, we have the following (which is a reformulation of Theorem 2.7): Theorem 5.10. Let (G, Γ) be an almost semisimple, nonelementary graph structure, and let L be the smallest drift. Then for every  > 0, one has   P τX (wn ) ≥ n(L − ) → 1, as n → ∞. As a consequence,   P wn is loxodromic on X → 1 as n → ∞. Proof. The proof is very similar to the proof of Theorem 5.9, so we will just sketch it. First, by using the Markov property we establish that  lim P (in x, t−1 n x)x ≥ g(n) = 0 n→∞ for any choice of function g : N → R such that limn→+∞ g(n) = +∞. Then, by using positivity of the drift as in the proof of Lemma 5.7 we prove that for each  > 0, we have  lim P (wn−1 x, t−1 n x)x ≤ n(L − )/2 = 0 n→∞ and  lim P (in x, wn x)x ≤ n(L − )/2 = 0 n→∞ From the previous three facts, using Lemma 5.6 one proves:   lim P (wn x, wn−1 x)x ≥ f (n) = 0 n→∞ for any f : N → R such that limn→+∞ f (n) = +∞. The theorem then follows immediately from this fact and Corollary 4.5, applying the formula of Lemma 3.3.  6. Thick graph structures Definition 6.1. A graph structure (G, Γ) is thick if for every vertex v of maximal growth there exists a finite set B ⊆ G such that (9) G = BΓv B where Γv is the loop semigroup of v. In greater generality, if H < G is a subgroup, we say that the graph structure (G, Γ) is thick relatively to H if for any vertex v of maximal growth there exists a finite set B ⊆ G such that (10) H ⊆ BΓv B. COUNTING LOXODROMICS 21 6.1. The case of only one non-trivial component. We say that a component C is non-trivial if there is at least one closed path of positive length entirely contained in C. Proposition 6.2. If a graph structure (G, Γ) has only one non-trivial component, then it is thick. Proof. Let C be the unique maximal component of Γ. Every finite path γ in the graph can be written as γ = h1 gh2 , where h1 is a path from the initial vertex to C, g is a path entirely in C, and h1 is a path going out of C. By construction, the lengths of h1 and h2 are uniformly bounded. Fix some vertex v of C and let s be a shortest path from v to the last vertex of h. Further, let t be a shortest path from the last vertex of g to v. Then one can write γ = h1 gh2 = h1 s−1 (sgt)t−1 h2 where h1 s−1 and t−1 h2 vary in a finite set, and sgt ∈ Γv . Hence G = BΓv B with B a finite set.  6.2. Thick implies nonelementary. Proposition 6.3. Fix an action G y X of G on a hyperbolic metric space X. Let (G, Γ) be an almost semisimple graph structure, and H < G a nonelementary subgroup. If (G, Γ) is thick relatively to H, then it is nonelementary, i.e. for any maximal vertex v the action of the loop semigroup Γv on X is nonelementary. Proof. Since the action of H is nonelementary, there exists a free subgroup F ⊆ H of rank 2 which quasi-isometrically embeds in X. Hence, the orbit map F → X extends to an embedding ∂F → ∂X, and we identify ∂F with its image. Thickness implies F ⊆ BΓv B, and taking limit sets in ∂X we see that [ ∂F ⊂ b · ΛΓv , b∈B from which we conclude that ΛΓv is infinite. To complete the proof that Γv is nonelementary, it suffices to show that Γv does not have a fixed point on ∂X. Suppose toward a contradiction that p ∈ ∂X is such a fixed point. Let us write F = hf, gi where f, g are free generators of F , and consider the sequence of elements hi,j = f i g j in F . For each i, j there are ai,j , ci,j ∈ B such that hi,j = ai,j li,j ci,j for some li,j in Γv . Since B is finite, we may pass to a subsequence and assume that ai,j = a and ci,j = c for all i, j. Then li,j = a−1 hi,j c−1 fixes the point p for all i and so hi,j (c−1 (p)) = a(p) −i0 i−i0 j for all i, j. Hence h−1 f g is a sequence of elements of F which fix the point i0 ,j0 hi,j = g −1 q = c (p) ∈ ∂F ⊂ ∂X. Since F is a free group, this implies that g −i0 f i−i0 g j agree up to powers for infinitely many i, j, a clear contradiction.  From Proposition 6.3 and Theorem 5.9 we get: Theorem 6.4. Let G y X be a nonelementary action of a countable group on a separable, hyperbolic metric space. Suppose that G has an almost semisimple graph structure Γ which is thick with respect to a nonelementary subgroup H. Then loxodromic elements are generic: lim n→∞ #{g ∈ Sn : g is loxodromic on X} =1 #Sn 22 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO In fact, the translation length generically grows linearly: there exists L > 0 such that lim n→∞ #{g ∈ Sn : τX (g) ≥ Ln} = 1. #Sn This completes the proof of Theorem 1.6 in the introduction. 7. Relative growth quasitightness Fix a graph structure (G, Γ). In practice, we will often show that the graph structure is thick by establishing the property of growth quasitightness. This property was introduced in [AL02] and and further studied in [Yan16]. Our notion of quasitightness depends on the particular graph structure. Given a path γ in Γ, we say it c–almost contains an element w ∈ G if γ contains a subpath p such that w = a · ev(p) · b in G, with |a|, |b| ≤ c. We denote as Yw,c the set of paths in Γ starting at the initial vertex which do not c–almost contain w. Definition 7.1. A graph structure (G, Γ) is called growth quasitight if there exists c > 0 such that for every w ∈ G the set Yw,c has density zero with respect to P n ; that is, P n (Yw,c ) → 0 as n → 0. More in general, given a subgroup H < G we say that (G, Γ) is growth quasitight relatively to H if there exists a constant c > 0 such that for every w ∈ H the set Yw,c has density zero. 7.1. Growth quasitight implies thick. Proposition 7.2. Let (G, Γ) be an almost semisimple graph structure, and H < G a subgroup. If (G, Γ) is growth quasitight relatively to H, then it is thick relatively to H. Proof. Let C be a component of maximal growth, let v a vertex in C, and let γ be some path from the initial vertex to v. Denote the length of γ by d. Let w ∈ H. By growth quasitightness plus maximal growth, there is a path of the form γγ1 , which c–almost contains w and where γ1 is entirely contained in C. Since γ has length d, the path γ1 (c + d)–almost contains w; that is, γ1 = p1 p2 p3 where ev(p2 ) = awb for |a|, |b| ≤ c + d. Let q1 be a shortest path from v to the initial vertex of p2 and q2 be a shortest path from the terminal vertex of p2 to v. Then w = (a−1 ev(q1 )−1 ) · ev(q1 p2 q2 ) · (ev(q2 )−1 b−1 ), where (a−1 ev(q1 )−1 ) and (ev(q2 )−1 b−1 ) vary in a finite set B. Since ev(q1 p2 q2 ) ∈ Γv , this completes the proof.  Combining Proposition 7.2 with Theorem 6.4 we get: Theorem 7.3. Let (G, Γ) be an almost semisimple graph structure which is growth quasitight with respect to a nonelementary subgroup H. Then loxodromic elements are generic. This completes the proof of Theorem 1.6. COUNTING LOXODROMICS 23 8. Infinite index subgroups have zero density In this section, we prove that in our general setup a subgroup H < G of infinite index has zero density with respect to counting. Combined with what we are going to prove in sections 9 and 10, this immediately implies Theorem 1.2 in the introduction. Recall that ev : Ω0 → G is the evaluation map for paths starting at v0 . Theorem 8.1. Let (G, Γ) be an injective, almost semisimple, thick graph structure. Let H < G be an infinite index subgroup. Then P n ({p ∈ Ω0 : ev(p) ∈ H}) → 0, as n → ∞. That is, the proportion of paths starting at v0 which spell an element of H goes to 0 as the length of the path goes to ∞. The proof is an adaptation of ([GMM15], Theorem 4.3) to the non-hyperbolic case. We will consider an extension ΓH of Γ = (V, E) defined as follows. The vertex set of ΓH is V × H \ G. For any edge σ : x → y in Γ there is an edge in ΓH from (x, Hg) to (y, Hgg 0 ) where g 0 = ev(σ). Lemma 8.2. Let C be a component of maximal growth. For any v1 ∈ C and g1 ∈ G there are infinitely many Hg ∈ H \ G such that (v1 , Hg) can be reached from (v1 , Hg1 ) by a path contained in C × H \ G. Proof. Suppose not, so that the only points of H \ G that can be reached in this manner are {Hz : z ∈ T } where T is a set of size D. Consider w ∈ G. By thickness, there exists a finite set B ⊆ G and some path γ lying in C, starting and ending at v1 such that ev(γ) = g2 wg3 where g2 , g3 lie in B. Then γ lifts to a path in ΓH from (v1 , Hg1 ) to (v1 , Hg1 ev(γ)). By assumption, this implies Hg1 ev(γ) = Hz for some z ∈ T . Thus, there is an h ∈ H with g2 wg3 = ev(γ) = g1−1 hz and hence w ⊂ B −1 g1−1 HT B −1 . Thus there is a finite subset Υ = B −1 g1−1 ∪ T B −1 with G = ΥHΥ, so by Neumann’s theorem [Neu54] H must be of finite index, giving a contradiction.  The following general result about Markov chains is Lemma 4.4 of [GMM15]. Lemma 8.3. Let Xn be a Markov chain on P a countable set V , and m a stationary measure. Let Ṽ be the set of points x ∈ V such that y:x→y m(y) = ∞ where x → y means there is a positive probability path from x to y. Then for all x ∈ V and x0 ∈ Ṽ we have Px (Xn = x0 ) → 0. Combining Lemmas 8.3 and 8.2 we obtain: Corollary 8.4. For any x1 , x2 ∈ Γ lying in a maximal component C and g1 , g2 ∈ G, the number of paths of length n in ΓH from (x1 , Hg1 ) to (x2 , Hg2 ) is o(λn ). Proof. The Markov chain µ on Γ restricts to a Markov chain µC on C, which in turn lifts to a Markov chain µC,H on the induced graph CH on the vertex set C × H \ G ⊂ ΓH (obtained by assigning to an edge the transition probability of its projection to C. A µC,H stationary measure m̃ on CH is given by taking the product of the stationary measure m on C and the counting measure on H \ Γ. Any vertex v ∈ C has positive m P measure and all lifts of v in CH have equal positive m̃ measure. Thus, Lemma 8.2 implies y:x→y m̃(y) → ∞. The corollary now follows by applying Lemma 8.3 to the chain µC,H .  24 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO Note, paths of length n in ΓH from (x1 , Hg1 ) to (x2 , Hg2 ) are in bijection with paths of length n in Γ beginning at x1 , ending at x2 , and evaluating to elements of g1−1 Hg2 . Thus, we obtain: Corollary 8.5. For any x1 , x2 ∈ Γ lying in a maximal component C and g1 , g2 ∈ G, the number of paths of length n in Γ beginning at x1 , ending at x2 , and evaluating to elements of g1−1 Hg2 is o(λn ). We now complete the proof of Theorem 8.1. Given k > 0, let Pn,k (resp. Qn,k ) be the set of paths p ∈ Ω0 of length n which spend time at most k (resp. more than k) in non-maximal components. Note that there is a η < λ with |Qn,k | ≤ η k λn−k for all n and k. Now, consider a path γ in Pn,k ∩ ev−1 H. We can decompose it as γ = γ1 γ2 γ3 where γ1 and γ3 have length adding up to at most k and γ2 is contained in a maximal component C. Since a path in Pn,k spends at most time k in nonmaximal components, there are only Dk possibilities for γ1 and γ3 , where D depends only on the graph. On the other hand, by Corollary 8.5, for a path in ev−1 H, there are at most f (n) = o(λn ) possibilities for γ2 , thus |Pn,k ∩ ev−1 H| ≤ Dk f (n) for all k < n where f (n) = o(λn ). Hence, P n (ev−1 H) ≤ C 00 λ−n (|Pn,k ∩ ev−1 H| + |Qn,k |) ≤ C 00 Dk λ−n f (n) + C 00 (η/λ)k . Fixing k we see that lim sup P n (ev−1 H) ≤ C 00 (η/λ)k . n→∞ As this is true for arbitrary k, we get limn→∞ P n (ev−1 H) = 0, as claimed. 9. Application to relatively hyperbolic groups In this section, we show how our main theorem applies to a large class of relatively hyperbolic groups. Let G be a finitely generated group, and P be a collection of subgroups. Following [Bow12], let us recall that G is hyperbolic relative to P if there is a compactum M on which G acts geometrically finitely, and the maximal parabolic subgroups are the elements of P. Such a compactum M is then unique up to G-equivariant homeomorphisms, and it is called the Bowditch boundary of G. We will denote it as ∂G. More precisely, let G act by homeomorphisms on a compact, perfect, metrizable space M . Then a point ζ ∈ M is called conical if there is a sequence (gn ) and distinct points α, β ∈ M such that gn ζ → α and gn η → β for all η ∈ M \ {ζ}. A point ζ ∈ M is called bounded parabolic if the stabilizer of ζ in G is infinite, and acts cocompactly on M \ {ζ}. We say that the action of G on M is a convergence action if G acts properly discontinuously on triples of elements of M , and the action is geometrically finite if it is a convergence action and every point of M is either a conical limit point or a bounded parabolic point. Note that there are only countably many parabolic points. Finally, the maximal parabolic subgroups are the stabilizers of bounded parabolic points. We refer the reader to [Far98, Bow12, Osi06, GM08] for the relevant background material. Fix a relatively hyperbolic group (G, P), a generating set S, and let dG denote distance in G with respect to S. Let Ĝ be the vertices of Cay(G, S ∪ P) with the induced metric, which we denote by dˆ or dĜ . Here Cay(G, S ∪ P) is the corresponding electrified Cayley S graph, that is the Cayley graph of G with respect to the generating set S ∪ P. We remind the reader that Cay(G, S ∪ P) is hyperbolic and that ∂Cay(G, S ∪ P) naturally includes as a subspace into ∂G, the complement of which is the collection of parabolic fixed points. COUNTING LOXODROMICS 25 Following [Yan13], the Bowditch boundary ∂G is equipped with a quasiconformal, nonatomic measure ν, which is given by the Patterson-Sullivan construction by taking average on balls for the word metric on G. Definition 9.1. We define a relatively hyperbolic group G to be pleasant if its action on ∂G × ∂G with the measure ν × ν is ergodic. We will also see (Proposition 9.17) that a relatively hyperbolic group is pleasant if it admits a geometrically finitely action on a CAT (−1) proper metric space. For instance, geometrically finite Kleinian groups satisfy this hypothesis. Note that, once G admits such an action, the theorem works for isometric actions of G on any hyperbolic, metric space X. In this section, we will prove the following result. Theorem 9.2. Let G be a pleasant, relatively hyperbolic group, and let (G, Γ) be a geodesic combing. Then for any nonelementary action of G on a hyperbolic metric space X, the graph structure (G, Γ) is nonelementary. Combining this result with Theorem 1.6, the discussion in section 2.3, and the fact that relatively hyperbolic groups has pure exponential growth for any generating set ([Yan13], Theorem 1.9) this establishes Theorem 2.3 in the introduction. In fact, using very recent work of W. Yang [Yan16], the theorem may be extended to all nontrivial relatively hyperbolic groups, as relatively hyperbolic groups contain strongly contracting elements by [ACT15] and [Yan16] (see Corollary 2.6 in the introduction). However, we give a self-contained argument here. 9.1. Fellow traveling in the Cayley graph and coned-off space. We will need the following proposition, which is certainly known to experts. We provide a proof for completeness. Proposition 9.3. For K, C ≥ 0, there are D, L ≥ 0 such that the following holds. Suppose that γ = [a, b] is a geodesic in Cay(G, S) with length at least L which projects to a K– quasigeodesic in Cay(G, S ∪ P). Let γ 0 be any other geodesic in Cay(G, S) whose endpoints have distance no more than C from a, b in Cay(G, S ∪ P). Then there are a0 , b0 ∈ γ 0 such that dG (a, a0 ) ≤ D and dG (b, b0 ) ≤ D. We will use the following theorem of Osin: Theorem 9.4 ([Osi06], Theorem 3.26). There is an ν ≥ 0 such that if p, q, r are sides of a geodesic triangle in Cay(G, S ∪ P), then for any vertex v on p there exists a vertex u on either q or r such that dG (v, u) ≤ ν. Proof of Proposition 9.3. Suppose that dG (a, b) > K(2C + 4ν + K) so that dĜ (a, b) > 2C + 4ν, for ν as in Theorem 9.4. Let c, c0 be geodesics in Cay(G, S∪P) joining the endpoints of γ, γ 0 respectively. Note that ˆ by assumption the initial and terminal endpoints of these geodesics are at d–distance less than C from one another. Pick vertices ca , cb on c (ordered a, ca , cb , b) so that dĜ (a, ca ) = dĜ (b, cb ) = C + 2ν. (This is possible since dĜ (a, b) > 2C + 4ν.) Consider a geodesic quadrilateral with opposite sides c, c0 . Applying Theorem 9.4 twice, we may find vertices c0a , c0b ∈ c0 such that dG (ca , c0a ) ≤ 2ν and dG (cb , c0b ) ≤ 2ν. Now using, for example, ([Hru10], Lemma 8.8), we can find vertices γa , γb ∈ γ and γa0 , γb0 ∈ γ 0 which have dG –distance at most L from ca , cb , c0a , c0b , respectively, where L ≥ 0 26 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO depends only on (G, P) and S. Note that dG (γa , γa0 ) ≤ 2(L + ν) and dG (γb , γb0 ) ≤ 2(L + ν). Moreover, dĜ (a, γa ) ≤ dĜ (a, ca ) + dĜ (ca , γa ) ≤ C + 2ν + L, and so dG (a, γa ) ≤ K(C + 2ν + L + 1) since both a and γa occur along γ. Similarly, dG (b, γb ) ≤ K(C + 2ν + L + 1). Putting everything together, after setting a0 = γa0 and b0 = γb0 , we see that each of dG (a, a0 ) and dG (b, b0 ) are less than 2(L + ν) + K(C + 2ν + L + 1) and this completes the proof.  9.2. Patterson-Sullivan measures and sphere averages. Continuing with the notation from the previous section, let h be the exponent of convergence for Cay(G, S). That is, h = lim log |Bn |/n, n→∞ where Bn denotes the ball of radius n in G with respect to dG . Definition 9.5. For g ∈ G, we define the large shadow Πr (g) at g to be the set of ζ ∈ ∂G such that there exists some geodesic in Cay(G, S) from 1 converging to ζ intersecting Br (g). Similarly, the small shadow πr (g) is the set of ζ ∈ ∂G such that every geodesic in Cay(G, S) from 1 converging to ζ intersects Br (g). In Theorem 1.7 and Proposition A4 of [Yan13] Yang constructs an h-quasiconformal ergodic density ν without atoms for the word metric on the Bowditch boundary ∂G. In Lemma 4.3 of [Yan13] he shows that this satisfies the shadow lemma: for large enough r: ν(πr (g)) ' ν(Πr (g)) ' e−h·dG (1,g) (11) (up to a uniform multiplicative constant). In particular, ν has full support on ∂G. In what follows, Sn denotes the set of elements g ∈ G with dS (1, g) = n. Lemma 9.6. There is a C > 0 such that for any Borel set A ⊂ G ∪ ∂G one has |A ∩ Sn | ≤ Cν(A), lim sup |Sn | n→∞ where A denote the closure of A in G ∪ ∂G. Proof. Let A ⊂ G ∪ ∂G be a Borel set. Since the number of elements in a ball of radius r in Cay(G, S) is universally bounded, a point of ∂G lies in at most D small shadows πr (g), g ∈ Sn where D depends only on r. Thus,   X [ ν (πr (g)) ≤ Dν  πr (g) g∈Sn ∩A g∈Sn ∩A Moreover, if we denote An := A \ Bn−1 then An+1 ⊆ An and \ [ πr (g) ⊂ A. n∈N g∈An T S Indeed, if ζ ∈ n∈N g∈An πr (g), then there are gn ∈ A with |gn | ≥ n such that some (any) geodesic from the identity to ζ meets Br (gn ). Hence, gn → ζ and so ζ ∈ A. Thus, since Sn ∩ A ⊆ An we have for large enough n     [ [ ν πr (g) ≤ ν  πr (g) ≤ 2ν(A) g∈Sn ∩A g∈An COUNTING LOXODROMICS 27 so by exponential growth and the shadow lemma (11) X |Sn ∩ A| ' e−hn |Sn ∩ A| ' ν(πr (g)) . 2Dν(A). |Sn | g∈Sn ∩A  9.3. Growth quasitightness for relatively hyperbolic groups. We will now establish a form of relative growth quasitightness for a relatively hyperbolic group G. S Let w be an element of G. A w-path is an infinite path of the form lw = i∈Z wi γw in the Cayley graph Cay(G, S), where γw = [1, w] is a geodesic segment joining the identity and w. Of course there may be finitely many choices of lw for each w. Definition 9.7. The element w is called K–bounded if some w-path lw (with the arc length parameterization) in the Cayley graph Cay(G, S) projects to a K-quasigeodesic in the electrified graph Cay(G, S ∪ P). The following lemma is well-known. See for example [DMS10, ADT]. Lemma 9.8. For each K, there is a function f : N → N such that if w is K–bounded, then every w-path lw is an f -stable quasigeodesic in the Cayley graph Cay(G, S). Recall that lw being f –stable means that any K–quasigeodesic with endpoints on lw has Hausdorff distance at most f (K) from the subpath of lw its endpoints span. Given w ∈ G and c ≥ 0, we say that a (finite or infinite) geodesic γ c-almost contains w if there exists g ∈ G such that dG (g, γ) ≤ c and dG (gw, γ) ≤ c. Let Xw,c be the set of h ∈ G such that there exists a geodesic γ from identity to h which does not c-almost contain w. That is, for every g ∈ Nc (γ), γ does NOT pass within distance c of gw. Proposition 9.9. For each K ≥ 1, there is c ≥ 0 such that for every K–bounded w ∈ G we have |Bn ∩ Xw,c | →0 ehn as n → ∞. We remark that, for fixed c, it suffices to prove the proposition for sufficiently long w, that is, where |w|S is sufficiently large. We will prove this proposition by using the ergodicity of the double boundary (Proposition 9.17). To do this, we will apply Proposition 9.3 several times, for K the boundedness constant. Hence, we fix K once and for all, and consider the constant D produced by that proposition as a function of C alone and write D = D(C). Let Zw,c be the set of pairs (α, β) in ∂G × ∂G such that for every bi-infinite geodesic γ in Cay(G, S) joining α and β there exist infinitely many x ∈ Nc (γ) such that γ passes within c n of xw. Let Zw,c be the set of pairs (α, β) in ∂G × ∂G such that for every bi-infinite geodesic γ joining α and β there are n elements x ∈ Nc (γ) such that γ passes within c of T at least n n xw. By definition, Zw,c = n∈N Zw,c . Moreover, for each n, w, c, the sets Zw,c and Zw,c are G-invariant subsets of ∂G × ∂G. Furthermore we have Lemma 9.10. For each K ≥ 0 there is a constant c0 = c0 (K) such that for all c ≥ c0 , Zw,c contains a pair of conical points for every K–bounded w ∈ G. Proof. Let f be the function given by Lemma 9.8. By definition, the w-path lw projects to a K-quasigeodesic in Cay(G, S ∪ P), hence it has two distinct limit points (w−∞ , w∞ ) in the Bowditch boundary ∂G. Then, by connecting further and further points on lw by a 28 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO geodesic in the Cay(G, S), using f -stability and the Ascoli-Arzelá theorem, one constructs a geodesic in Cay(G, S) which connects w∞ to w−∞ and c-fellow travels lw , once c ≥ 2f (1). Hence, (w−∞ , w∞ ) ∈ Zw,c .  Lemma 9.11. For each K, there is a c1 = c1 (K) and L1 = L1 (K) such that for c ≥ c1 n and for any K–bounded w ∈ G with |w| ≥ L1 , the set Zw,c has nonempty interior. More n n precisely, the interior of Zw,c contains every pair of conical points in Zw,c where c0 is as 0 in Lemma 9.10. n Proof. Suppose that (α, β) ∈ Zw,c is a pair of conical points, and pick a geodesic γ joining 0 α and β. Then by definition there are segments [xj , x0j ] ⊆ [α, β] for 1 ≤ j ≤ n and points zj such that dG (xj , zj ), dG (x0j , zj w) ≤ c0 (for 1 ≤ j ≤ n). Now, let αi , βi ∈ ∂G such that αi → α and βi → β. In particular, for some uniform R, the projections of the geodesics [αi , βi ] to Cay(G, S ∪ P) R–fellow travel the projection of [α, β] for longer and longer intervals. Hence, there is an N ≥ 0 so that for i ≥ N , each ˆ [αi , βi ] passes with d–distance R from [xj , x0j ] ⊂ [α, β]. Since w is K–bounded, the geodesic segment zj · [1, w] = [zj , zj w] projects to a K– quasigeodesic, so we may apply Proposition 9.3 (with C = R + c0 ) to find constants D, L such that if |w| ≥ L there exist points yj , yj0 ∈ [αi , βi ] such that dG (yj , zj ), dG (yj0 , zj w) ≤ D. n and this Setting c1 = D, L1 = L we see that for sufficiently large i ≥ 0, (αi , βi ) ∈ Zw,c 1 completes the proof.  Since G is pleasant, the action of G on ∂G × ∂G is ergodic, hence Lemma 9.11 implies Lemma 9.12. For c ≥ c1 (K) and for any K–bounded w ∈ G with |w| ≥ L1 (K), the set n Zw,c has full ν × ν measure. Hence, under the same hypotheses the set Zw,c has full ν × ν measure. n is G-invariant, hence by ergodicity its measure is either 0 Proof. For each n, the set Zw,c or 1. Since it has nonempty interior and the measure ν × ν has full support, then it must n .  have full measure. The second claim follows since Zw,c = ∩n Zw,c Let Λw,c ⊂ ∂G be the set of conical points α ∈ ∂G such that for every geodesic ray γ from the identity converging to α there are infinitely many points g ∈ Nc (γ) such that γ passes within distance c of gw. Using Proposition 9.3 just as in Lemma 9.11 we have: Lemma 9.13. For each K ≥ 0 there is a c2 = c2 (K) and L2 = L2 (K) such that for c ≥ c2 , and for any K–bounded w ∈ G with |w| ≥ L2 , if (α, β) ∈ Zw,c1 , then either α or β is in Λw,c . This implies Corollary 9.14. For each c ≥ c2 and for any K-bounded w ∈ G with |w| ≥ L2 , the set Λw,c has full ν measure. Lemma 9.15. For each K ≥ 0 there is a c3 = c3 (K) and L3 = L3 (K) such that for each c ≥ c3 and for any K–bounded w ∈ G with |w| ≥ L3 , the closure of Xw,c is contained in ∂G \ Λw,c2 . Proof. If this were false, then for all large c ≥ 0 there would be a sequence (yi ) ⊆ Xw,c converging to η ∈ Λw,c2 . Since η is not a parabolic fixed point, then one can view η as belonging to the boundary of Cay(G, S ∪ P). Then the projections to Cay(G, S ∪ P) of any geodesics γi = [1, yi ] must R–fellow travel the projection to Cay(G, S ∪ P) of [1, η] for longer and longer intervals, where R is independent of w. If η were in Λw,c2 , then just as in the COUNTING LOXODROMICS 29 proof of Lemma 9.11, we would obtain by applying Proposition 9.3 (with C = c2 + R) two constants L3 , c3 such that for |w| ≥ L and for large i, the geodesic γi c3 –almost contains w. Hence, for c ≥ c3 we obtain a contradiction to yi ∈ Xw,c for all i. This completes the proof.  We are now in position to prove Proposition 9.9. Proof of Proposition 9.9. By Lemma 9.15 and Corollary 9.14, for c ≥ c3 ν(Xw,c ) ≤ ν(∂G \ Λw,c2 ) = 0 Hence, applying Lemma 9.6, for large enough c > 0 we have lim sup e−hn |Bn ∩ Xw,c | ≤ Cν(Xw,c ) = 0. n  9.4. The loop semigroup is nonelementary. We will now assume that (G, P) is a pleasant relatively hyperbolic group which admits a geodesic combing for the generating set S. Recall that by work of Antolı́n-Ciobanu [AC16], if the parabolic subgroups are geodesically completable, then every generating set for G can be extended to a generating set for which G has a geodesic combing. From here on, we will use such a generating set. Then for each w ∈ G and constant c, let us recall that Yw,c is the set of paths γ in the directing graph from the initial vertex which do not c-almost contain w, i.e. such that one cannot write ev(γ) = a1 wa2 in G, with |ai | ≤ c for i = 1, 2. By identifying paths from the identity with group elements, it is immediate from the definition that Yw,c ⊆ Xw,c . Hence, by Proposition 9.9, also Yw,c has zero density if w is K–bounded. Proposition 9.16. Let (G, Γ) be a geodesic combing for a pleasant, relatively hyperbolic group. Then (G, Γ) is nonelementary. Proof. We are going to prove that the graph structure is thick relative to a nonelementary, free subgroup F < G, which yields the claim by Proposition 6.3. Let v be a vertex of maximal growth and w be any K–bounded word. Let d = diam Γ. Let c be the constant from Proposition 9.9. Let h1 be a group element representing a path from the initial vertex to v, and consider the set Σ = {h1 h2 : h2 ∈ Γv } Since v has maximal growth and Yw,c has zero density, the set Σ contains a path h which does not belong to Yw,c . Then there is a path h = h1 h2 such that h1 has length ≤ d, h2 is entirely contained in the component Cv containing v, and h2 contains a subpath of the form w0 = awb where a and b have length less than c + d. Let s be a path from v to the start of w0 and t be a path from the end of w0 to v, each of length at most D. Then sw0 t is in Γv and w = as−1 (swt)t−1 b ⊂ BΓv B where B is a finite set. To complete the proof, it suffices to show that BΓv B contains a nonelementary subgroup (Proposition 6.3). Using a standard ping-pong argument, construct a free subgroup H = hf, gi ≤ G which K–quasi-isometrically embeds in Cay(G, S ∪ P) and which K–quasiisometrically embeds into X for some K ≥ 0. (Indeed, by [TT15], a random 2-generator subgroup of G will have this property.) For this K, let B be the finite subset produced above enlarged to contain f ± , g ± . Then for any w ∈ H, at least one of w, wf , or wg is cyclically reduced in H and hence K–bounded in G. Hence w ∈ BΓv B and so H ≤ BΓv B, as required.  30 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO 9.5. Double Ergodicity. We conclude this section by proving that a group G which admits a geometrically finite action on a CAT(−1) space is pleasant. Let us assume that G acts geometrically finitely on a CAT(−1) space Y . Recall that an orbit map G → Y induces an embedding ∂G → ∂Y [Bow12, Theorem 9.4], so we can identify ∂Y with the Bowditch boundary of G. We continue to denote the pushforward of the measure ν to ∂Y by ν. Proposition 9.17. Suppose G acts geometrically finitely on a CAT(−1) space Y . Then the action of G on ∂Y × ∂Y is ergodic with respect to ν × ν. We remind the reader that ν is quasiconformal with respect to the word metric rather than the metric on Y . Proof. Assume G acts geometrically finitely on a CAT(−1) space Y , with elements of P being the parabolic subgroups. Recall that the Bowditch boundary ∂G is identified with the Gromov boundary of Y. Let d = dG still denote the word metric on G. For ζ ∈ ∂G and g, h ∈ G let βζ (g, h) = lim sup (d(g, z) − d(h, z)) z→ζ be the Busemann functions for the word metric on G. By W. Yang’s Lemma 2.20 in [Yan13] there is a C > 0 such that for every conical ζ ∈ ∂G we have | lim sup [d(g, z) − d(h, z)] − lim inf [d(g, z) − d(h, z)]| < C (12) z→ζ z→ζ Moreover, the Patterson-Sullivan measure ν (for the word metric) gives full measure to conical points and is a quasiconformal density in the sense that there is a D > 0 such that: dg? ν (ζ) ≤ De−hβζ (g,e) (13) D−1 e−hβζ (g,e) ≤ dν for all g ∈ G and ζ ∈ ∂G. We claim there is a G-invariant measure in the measure class of ν × ν. Indeed, let   d(e, y) + d(e, z) − d(y, z) ρe (ζ, ξ) = lim sup . 2 z→ζ,y→ξ Define a locally finite measure m0 on (∂G × ∂G) \ Diag by dm0 (ζ, ξ) = e2hρe (ζ,ξ) dν(ζ) dν(ξ) We now claim that the measure m0 is G quasi-invariant with a uniformly bounded derivative. Indeed, we can compute 2ρe (g −1 ζ, g −1 ξ) − 2ρe (ζ, ξ) =   = lim sup d(e, g −1 y) + d(e, g −1 z) − d(g −1 y, g −1 z) − lim sup [d(e, y) + d(e, z) − d(y, z)] = z→ζ,y→ξ z→ζ,y→ξ = lim sup [d(g, y) − d(e, y)] + lim sup [d(g, z) − d(e, z)] + O(1) = βξ (g, e) + βζ (g, e) + O(1) y→ξ z→ζ (where we could distribute the limsup since the limsup and liminf are within bounded difference (see (12)). Hence, combining this with (13) one gets that the Radon-Nykodym cocycle is uniformly bounded, i.e. −1 −1 dg? ν dg? m0 dg? ν (ζ) (ξ) ∼ (ζ, ξ) = e2hρe (g ζ,g ξ)−2hρe (ζ,ξ) =1 dm0 dν dν Hence, by a general fact in ergodic theory the Radon-Nykodym cocycle is also a coboundary (see [Fur02], Proposition 1). Thus, there exists a G-invariant measure m on (∂G×∂G)\Diag COUNTING LOXODROMICS 31 in the same measure class as m0 , hence also in the same measure class as ν × ν. By [Yan13], the Patterson-Sullivan measure is supported on conical limit points. Thus, m is also supported on pairs of conical limit points. By Theorem 2.6 of [Kai94], any quasi-product G-invariant Radon measure on the double boundary of a CAT(−1) space which gives full measure to pairs of conical limit points of G is ergodic. Thus, ν × ν is ergodic.  10. RAAGs, RACGs and graph products Let Λ be a finite simplicial (undirected) graph. Recall that the corresponding right-angled Artin group (RAAG) A(Λ) is the group given by the presentation A(Λ) := hv ∈ V (Λ) : [v, w] = 1 ⇐⇒ (v, w) ∈ E(Λ)i. The corresponding right-angled Coxeter group (RACG) C(Λ) is the group obtained from A(Λ) by adding the relators v 2 = 1 for each v ∈ V (Λ). In each case, S = {v ±1 : v ∈ V (Λ)} is called the set of standard (or vertex ) generators of the group. In greater generality, let Λ be a finite simplicial graph, and for each vertex v of Λ let us pick a finitely generated group Gv , which we call vertex group. Then we define the graph product G(Λ) := hg ∈ Gv : [g, h] = 1 ⇐⇒ g ∈ Gv , h ∈ Gw and (v, w) ∈ E(Λ)i as the group generated by the vertex groups Gv with the relation that two vertex groups commute if and only if the corresponding vertices are joined by an edge. Clearly, RAAGs are special cases of graph products when Gx = Z for all x, and RACGs are graph products with Gx = Z/2Z. Graph products were first introduced by Green [Gre90] and have received much attention, see for example [BHP93, Chi94, Gre90, Hag08, HM95, HW+ 99, Mei96, Mei95, Rad03]. In this section, we are going to apply our counting techniques to graph products. 10.1. Geodesic combing for graph products. Let us call a group admissible if it has a geodesic combing with respect to some finite generating set (i.e., in the language of the previous sections, if it has an admissible generating set). Recall that a recurrent component is nontrivial if it contains at least one closed path. A component is terminal if there is no path exiting it. A graph structure is recurrent if every vertex admits a directed path to every vertex other than the initial one. Recall that, given a graph Λ, the opposite graph is the graph Λop with the same vertex set as Λ and such that (v, w) ∈ E(Λop ) if and only if (v, w) ∈ / E(Λ). We will assume that Λ is anticonnected, i.e. that the opposite graph Λop is connected. This implies that G(Λ) is not a direct product of graph products associated to subgraphs of Λ. Proposition 10.1. Let Λ be anticonnected, and choose for each vertex x a group Gx with a geodesic combining (Gx , Γx ) for the generating set Sx . Then the graph product G(Λ) with the generating set S = ∪x Sx admits a geodesic combing which is recurrent. We call the generating set S in Proposition 10.1, the standard generating set for G(Λ). Note that this agrees with the standard vertex generators for the special case of right-angled Artin and Coxeter groups. The proof of Proposition 10.1 will provide an explicit construction of a recurrent graph structure for G(Λ) with the standard generators. Hermiller-Meier [HM95] provided a construction of a geodesic combing, which is however not recurrent. In the next few lemmas, we will show that if Λ is anticonnected we can modify their construction in order to make 32 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO it recurrent. Of course it is necessary to assume that Λ is anticonnected, as the counting theorems fail for RAAGs which decompose as direct products (see Example 1). Let us first review the construction of [HM95]. First introduce a total ordering on the vertices of Λ such that the first two vertices in the ordering are not adjacent in Λ. Each vertex of Λ will be labeled by a capital letter A, B, . . . . Then for each pair of vertices (I, J) such that I and J are not adjacent in Λ and with I > J one constructs the (I, J)-admissible tree in the following way. An (I, J)-admissible word is a finite sequence IJK1 K2 . . . Kr (with r ≥ 0) such that: (1) J < K1 < K2 < · · · < Kr and (2) if Ki ≤ I for some i ≤ r, then Ki is not adjacent to at least one vertex among I, J, K1 , . . . , Ki−1 . Given (I, J), the (I, J)-admissible tree is the finite directed tree, whose vertices are labeled by letters and whose paths spell exactly the (I, J)-admissible words. In particular, such a tree will have I as a root and there is only one edge coming out of this vertex, with endpoint J. Here, and in what follows, a directed edge always has the same label as its terminal vertex. Moreover, [HM95] define the header graph (the terminology is ours) as the graph with one vertex for each letter, and an edge A → B if and only if A < B. Finally, they construct the graph structure for C(Λ) (the corresponding RACG) as follows. Consider the union of an initial vertex v0 , the header graph and all (I, J)-admissible trees. First, one identifies the vertex I of the header graph with the root of the (I, J)admissible tree for each possible J. Then, one adds one edge from v0 to each vertex of the header graph, and if A > B and A, B are not adjacent, one joins by a directed edge each vertex labeled A in the union of the (I, J)-admissible trees with the B vertex in the (A, B)-admissible tree. As shown by Hermiller-Meier, this graph G gives a bijective, geodesic graph structure for C(Λ) [HM95, Section 5 and Proposition 3.3]. In fact, they show that G recognizes the geodesic language of normal forms with respect to the ordering of the vertices of Λ, but we will not need this stronger fact. Let C be the subgraph of G obtained by removing all vertices in the header graph and the initial vertex. That is, C is the subgraph induced on the vertices on all (I, J)–admissible trees, excluding the initial vertex of the tree (which is labeled I). Lemma 10.2. If Λ is anticonnected, then the graph C is irreducible, i.e. there is one directed path from each vertex to any other vertex. Hence, G has a unique nontrivial recurrent component C and this component is terminal. Proof. We will show that C is indeed irreducible. This will suffice since the header graph has no directed loops (it only has directed edges which increase in the ordering) and there are no edges leaving C by construction. Since the (unique) type J vertex in the (I, J)–admissible tree has a directed path to each of its vertices and each vertex is in some (I, J)–admissible tree, it suffices to show that from any vertex of C we can reach the type J vertex of any (I, J)–admissible tree. Hence, fix some vertex v of G and I, J, which are vertices of Λ. Here is a main point: Any type I vertex of any admissible tree is joined to the type J vertex of the (I, J)–admissible tree. Hence, it suffices to get from v to any type I vertex of any admissible tree. To do this let X be the type of v. COUNTING LOXODROMICS 33 Fix a path X = X0 , X1 , . . . Xn = I in the complement graph of Λ. (Here we use that Λ is anticonnected.) That is, Xi and Xi+1 are not adjacent in Λ. We have to get from v to any type I vertex. We do this inductively as follows: We have either X < X1 or X > X1 . In the first case, there is a type X1 vertex v1 in the admissible tree containing v along with a directed path v → v1 . (Since no consecutive pair in our fixed path are adjacent in Λ, condition (2) above holds automatically.) In the second case, there is an edge from v to the unique X1 vertex of the (X, X1 )–admissible tree, call this vertex v1 . In either case we get a directed path v → v1 , were v1 is a type X1 vertex. We now repeat this argument to produce a path from v1 → v2 , where v2 is a type X2 vertex. Continuing in this manner, we produce v → v1 → . . . → vn , were vn has type I. Since vn then has a directed edge to the type J vertex of the (I, J)–admissible tree (as discussed above), this completes the proof,  We now know that the union of the admissible trees (excluding the initial vertices) is an irreducible graph. However, the header graph by construction is not irreducible. However, in the following lemma we observe that all words we can spell in the header graph can also be spelled in one of the admissible trees. Hence, we can modify G (essentially, by removing the header graph) in order to get a recurrent graph Gr which recognizes the same language as G. Lemma 10.3. If Λ is anticonnected, there exists a recurrent graph Gr which recognizes the same language as G. Proof. Assume that Λ is anticonnected and that its vertices are ordered so that the first two vertices A, B do not commute (i.e. they are not adjacent). We modify G so that the resulting graph Gr still recognizes the same language as G, and it is recurrent. The modification is simple and requires only one observation: we note that any strictly increasing sequence X1 . . . Xr can be spelled in the (B, A)–admissible tree, starting from some vertex. In fact, if X1 = A then BX1 . . . Xr is (B, A)-admissible, since the only required condition is that whenever Xi ≤ B the vertex Xi is not adjacent to some Xl with l < i. However, the only two letters not greater than B are A, B, and A and B are not adjacent by construction. Similarly, if X1 6= A then BAX1 . . . Xr is (B, A)-admissible. Thus, the new graph Gr is given by removing the header graph and joining the initial vertex v0 to each vertex of the (B, A)-admissible tree. Any word which is recognized by G is made of an increasing word followed by a word spelled in the union of the admissible trees. In Gr , such a word is spelled by spelling the increasing sequence in the (B, A)-admissible tree, and the second part as before. This proves the claim.  The graph Gr is a recurrent graph which by Lemma 10.3 gives a bijective, geodesic graph structure the right-angled Coxeter group C(Λ). We now modify the construction to produce a geodesic combing for each graph product G(Λ). Let ΓI be the graph structure of the vertex group GI , let v0,I be the initial vertex of GI , let s1,I , . . . , sk,I be the labels of the edges going out of v0,I , and let v1,I , . . . , vI,k be the targets of these edges, respectively. Moreover, let Γ0I be the subgraph of ΓI given by removing the initial vertex. To construct the graph structure for G(Λ), let us consider the disjoint union of a vertex ve0 , which will serve as initial vertex, and a copy of Γ0I for each vertex v of type I in Gr . Moreover, for any edge in Gr of type I → J let us connect each vertex of the corresponding Γ0I with the vertices v1,J , . . . , vk,J of the corresponding Γ0J with edges labeled, respectively, s1,J , . . . , sk,J . Finally, for each edge from v0 in Gr to some other vertex of type I, let 34 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO us connect the new initial vertex ve0 with vertices v1,J , . . . , vk,J of Γ0J with edges labeled, respectively, s1,J , . . . , sk,J . This new graph ΓG gives a bijective, geodesic structure for G(Λ) with respect to the standard generators. This follows since, by construction, ΓG parameterizes the same language of geodesic normal forms for G(Λ) given in [HM95]. Moreover, since ΓG is modeled on the recurrent graph Gr one easily sees that ΓG is itself recurrent. This completes the proof of Proposition 10.1. Corollary 10.4. Let G(Λ) be a graph product of admissible groups, which does not decompose as a direct product. Then there exists a thick graph structure for its standard generating set. Proof. From Proposition 6.2, the graph structure given by the above proposition is thick since ΓG is recurrent.  As a consequence of thickness, we are ready to establish the following counting result for loxodromics. Theorem 10.5. Let G be an infinite graph product of admissible groups which does not decompose as a product of infinite groups, and let S be its set of standard (vertex) generators. Then for any nonelementary action G y X on a separable hyperbolic space X, the set of loxodromics for the action is generic with respect to S, i.e. #{g ∈ G : |g|S ≤ n and g is X − loxodromic} −→ 1, #{g ∈ G : |g|S ≤ n} as n → ∞. 11. Exact exponential growth for RAAGs and RACGs We conclude by proving a fine estimate on the number of elements in a ball for RAAGs and RACGs. Theorem 11.1. Let G be a right-angled Artin or Coxeter group which is not virtually cyclic and does not decompose as a product of infinite groups, and let us consider S its standard generating set. Then there exists constants λ > 1, c > 0 such that the following limit exists: (14) lim n→∞ #{g ∈ G : |g|S = n} = c. λn We say that a group which satisfies (14) has exact exponential growth. Let us remark that such a property is not invariant with respect to quasi-isometries of the metric, and hence it depends very carefully on the generating set. In fact, Theorem 11.1 will follow immediately from the following theorem for general graph products. Theorem 11.2. Let G(Λ) be a graph product of admissible groups, and assume that Λ is anticonnected (so that the group does not split trivially as a product) and has at least 3 vertices. Then G(Λ) has exact exponential growth. Note that it makes sense to assume that the number of vertices is at least 3. In fact, if n = 1 then G(Λ) can be any group with a geodesic combing, while if n = 2 then G(Λ) can be the free product of any two admissible groups. In particular, if it is a RAAG then it must be the free group on 2 generators, which has exact exponential growth, and if it is a RACG it must be Z/2Z ? Z/2Z, which is virtually cyclic. COUNTING LOXODROMICS 35 Let us remark that the growth function for graph products has been worked out by Chiswell [Chi94] (see also [AP14]); however, it does not seem obvious how to prove exact exponential growth by this method. Let us consider the recurrent graph Gr defined in the previous section, and denote as r G0 = Gr \ {v0 }. By the previous section, we know that Gr0 is irreducible. The final step in the proof of Theorem 11.2 is the following lemma. Lemma 11.3. If Λ is anticonnected and has at least 3 vertices, then the graph Gr0 is aperiodic. Proof. Let us assume, consistently with the previous section, that the vertices of Λ are ordered. Let us call A, B, C the three smallest vertices, with A < B < C, and assume that A, B are not adjacent. Then let us observe that the sequences BAC and BABC are (B, A) admissible, hence in the (B, A)-admissible tree there is a Y -shaped subtree with five vertices: one labeled A, two labeled B (let us denote them B1 , B2 ) and two labeled C (let us denote them C1 , C2 ) so that the paths in this subtree are B1 → A → C1 and B1 → A → B2 → C2 . Now, since the graph is irreducible, there exists a path from C1 to A; let us denote its vertices as C1 → v1 → v2 · · · → vk → A. Then by definition, the type of v1 is smaller than C, and is not adjacent to C. Thus, by construction, there is also an edge from C2 to v1 ; hence, in the graph there are two loops: one loop is given by A → C1 → v1 → · · · → vk → A and the other is A → B → C2 → v1 → · · · → vk → A. Since the lengths of these two closed paths differ by one, the greatest common divisor of the lengths of all paths is 1, hence Gr0 is aperiodic.  Note that the statement is false if the number of vertices is 2: indeed, then there is only one loop of length 2, hence the period is 2. Now, let us consider a general graph product G(Λ). By the previous section, by replacing vertices of Gr with graphs which recognize the geodesic combings of vertex group, we get a new graph ΓG which gives a geodesic combing for G(Λ). By the previous Lemma we get: Corollary 11.4. If Λ is anticonnected and has at least three vertices, then the graph Γ0G = ΓG \ {v0 } is irreducible and aperiodic. Proof of Theorem 11.2. Since the graph Γ0G is irreducible and aperiodic, then by the PerronFrobenius theorem its adjacency matrix A has a unique eigenvalue λ > 1 of maximum modulus, and that eigenvalue is real, positive, and simple. Moreover, the coordinates of n the corresponding eigenvector are all positive. Finally, the sequence A λn converges to the projection to the eigenspace. In particular, none of the basis vectors is orthogonal to the eigenvector, hence for any i, j there exists cij > 0 such that (An )ij = cij . n→∞ λn lim Now, each path of length n from the initial vertex starts with an edge to the irreducible graph, hence X #Sn−1 (vi ) X X (An−1 )ij X X cij #Sn = → → =c>0 λn λn λn λ v →v v →v j v →v j 0 i 0 i which establishes exact exponential growth. 0 i  36 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO References [AC16] Yago Antolin and Laura Ciobanu, Finite generating sets of relatively hyperbolic groups and applications to geodesic languages, Trans. Amer. Math. Soc. 368 (2016), no. 11, 7965–8010. [ACT15] G.N. Arzhantseva, C. Cashen, and J. Tao, Growth tight actions, Pacific J. Math. 278 (2015), no. 1, 1–49. [ADT] Tarik Aougab, Matthew Gentry Durham, and Samuel J. Taylor, Pulling back stability with applications to Out(F) and relatively hyperbolic groups, J. Lond. Math. Soc. [AL02] Goulnara N Arzhantseva and IG Lysenok, Growth tightness for word hyperbolic groups, Mathematische Zeitschrift 241 (2002), no. 3, 597–611. [AO96] G. Arzhantseva and A. Olshanskii, Generality of the class of groups in which subgroups with a lesser number of generators are free, Mat. Zametki 59 (1996), 489–496. [AP14] J. Athreya and A. Prasad, Growth in right-angled groups and monoids, available at arXiv:1409.4142, 2014. [Arz98] GN Arzhantseva, Generic properties of finitely presented groups and Howson’s theorem, Communications in Algebra 26 (1998), no. 11, 3783–3792. [BF14] Mladen Bestvina and Mark Feighn, Hyperbolicity of the complex of free factors, Adv. Math. 256 (2014), 104–155. MR 3177291 [BH09] Martin R. Bridson and Aandre Haefliger, Metric spaces of non-positive curvature, vol. 319, Springer, 2009. [BHP93] Young-Gheel Baik, Jim Howie, and SJ Pride, The identity problem for graph products of groups, Journal of Algebra 162 (1993), no. 1, 168–177. [BMR03] Alexandre V Borovik, Alexei G Myasnikov, and Vladimir N Remeslennikov, Multiplicative measures on free groups, Internat. J. Algebra Comput. 13 (2003), no. 06, 705–731. [Bow08] Brian H. Bowditch, Tight geodesics in the curve complex, Invent. Math. 171 (2008), no. 2, 281–300. [Bow12] Brian H Bowditch, Relatively hyperbolic groups, International Journal of Algebra and Computation 22 (2012), no. 03, 1250016. [Cal13] Danny Calegari, The ergodic theory of hyperbolic groups, Geometry and topology down under, Contemp. Math 597 (2013), 15–52. [Can84] James W Cannon, The combinatorial structure of cocompact discrete hyperbolic groups, Geometriae Dedicata 16 (1984), no. 2, 123–148. [CF10] Danny Calegari and Koji Fujiwara, Combable functions, quasimorphisms, and the central limit theorem, Ergodic Theory and Dynamical Systems 30 (2010), no. 05, 1343–1369. [Cha95] Christophe Champetier, Propriétés statistiques des groupes de présentation finie, Adv. Math. 116 (1995), no. 2, 197–262. [Chi94] Ian M Chiswell, The growth series of a graph product, Bulletin of the London Mathematical Society 26 (1994), no. 3, 268–272. [CM07] Chris Connell and Roman Muchnik, Harmonicity of quasiconformal measures and Poisson boundaries of hyperbolic spaces, Geom. Funct. Anal. 17 (2007), no. 3, 707–769. [CM15] Danny Calegari and Joseph Maher, Statistics and compression of scl, Ergodic Theory and Dynamical Systems 35 (2015), no. 01, 64–110. [DMS10] Cornelia Druţu, Shahar Mozes, and Mark Sapir, Divergence in lattices in semisimple Lie groups and graphs of groups, Transactions of the American Mathematical Society 362 (2010), no. 5, 2451–2505. [DSU14] Tushar Das, David Simmons, and Mariusz Urbański, Geometry and dynamics in Gromov hyperbolic metric spaces: With an emphasis on non-proper settings, arXiv preprint arXiv:1409.2155 (2014). [DT06] Nathan Dunfield and William P Thurston, Finite covers of random 3-manifolds, Invent. Math. 166 (2006), no. 3, 457–521. [EPC+ 92] David Epstein, Mike S Paterson, James W Cannon, Derek F Holt, Silvio V Levy, and William P Thurston, Word processing in groups, AK Peters, Ltd., 1992. [Far98] Benson Farb, Relatively hyperbolic groups, Geom. Funct. Anal. 8 (1998), no. 5, 810–840. [Fur02] A. Furman, Coarse-geometric perspective on negatively curved manifolds and groups, Rigidity in Dynamics and Geometry (M. Burger and A. Iozzi, eds.), Springer, 2002, pp. 149–166. [GdlH90] É. Ghys and P. de la Harpe (eds.), Sur les groupes hyperboliques d’après Mikhael Gromov, Progress in Mathematics, vol. 83, Birkhäuser Boston, Inc., Boston, MA, 1990, Papers from the Swiss Seminar on Hyperbolic Groups held in Bern, 1988. MR 1086648 (92f:53050) COUNTING LOXODROMICS [GM08] [GMM15] [Gre90] [Gro87] [Gro93] [Gro03] [GTT16] [Hag08] [Hag14] [HM95] [HM13] [HRR17] [Hru10] [HW+ 99] [Kai94] [KB02] [KK14] [KMSS03] [KRSS07] [KS05] [Mah11] [Mei95] [Mei96] [MM99] [MS14] [MT14] [Neu54] [NS95] [Ol’92] [Osi06] 37 Daniel Groves and Jason Fox Manning, Dehn filling in relatively hyperbolic groups, Israel Journal of Mathematics 168 (2008), no. 1, 317–429. Sébastien Gouëzel, Frédéric Mathéus, and François Maucourant, Entropy and drift in word hyperbolic groups, arXiv preprint arXiv:1501.05082 (2015). Elisabeth Ruth Green, Graph products of groups, Ph.D. thesis, University of Leeds, 1990. Mikhael Gromov, Hyperbolic groups, Springer, 1987. M Gromov, Asymptotic invariants of infinite groups, Geometric group theory, vol. 2, vol. 182, Cambridge University Press, 1993. Mikhail Gromov, Random walk in random groups, Geometric and Functional Analysis 13 (2003), no. 1, 73–146. I. Gekhtman, S. Taylor, and G. Tiozzo, Counting loxodromics for hyperbolic actions, available at arXiv:1605.02103, 2016. F. Haglund, Finite index subgroups of graph products, Geometriae Dedicata 135 (2008), no. 1, 167–209. Mark F Hagen, Weak hyperbolicity of cube complexes and quasi-arboreal groups, Journal of Topology 7 (2014), no. 2, 385–418. S. Hermiller and J. Meier, Algorithms and geometry for graph products of groups, Journal of Algebra 171 (1995), no. 1, 230–257. Michael Handel and Lee Mosher, The free splitting complex of a free group, i hyperbolicity, Geometry & Topology 17 (2013), no. 3, 1581–1670. Derek F. Holt, Sarah Rees, and Claas E. Röver, Groups, languages and automata, London Mathematical Society Student Texts, vol. 88, Cambridge University Press, Cambridge, 2017. G. Hruska, Relative hyperbolicity and relative quasiconvexity for countable groups, Algebr. Geom. Topol 10 (2010), 1807–1856. Tim Hsu, Daniel T Wise, et al., On linear and residual properties of graph products., The Michigan Mathematical Journal 46 (1999), no. 2, 251–259. Vadim Kaimanovich, Ergodicity of harmonic invariant measures for the geodesic flow on hyperbolic spaces, J. Reine Angew. Math. 455 (1994), 57–104. Ilya Kapovich and Nadia Benakli, Boundaries of hyperbolic groups, Combinatorial and geometric group theory (New York, 2000/Hoboken, NJ, 2001) 296 (2002), 39–93. Sang-Hyun Kim and Thomas Koberda, The geometry of the curve graph of a right-angled Artin group, International Journal of Algebra and Computation 24 (2014), no. 02, 121–169. Ilya Kapovich, Alexei Myasnikov, Paul Schupp, and Vladimir Shpilrain, Generic-case complexity, decision problems in group theory, and random walks, J. Algebra 264 (2003), no. 2, 665–694. Ilya Kapovich, Igor Rivin, Paul Schupp, and Vladimir Shpilrain, Densities in free groups and Zn , visible points and test elements, Math. Res. Lett 14 (2007), no. 2. Ilya Kapovich and Paul Schupp, Genericity, the Arzhantseva-Ol’shanskii method and the isomorphism problem for one-relator groups, Math. Ann. 331 (2005), no. 1, 1–19. Joseph Maher, Random walks on the mapping class group, Duke Math. J. 156 (2011), no. 3, 429–468. Holger Meinert, The bieri-neumann-strebel invariant for graph products of groups, Journal of Pure and Applied Algebra 103 (1995), no. 2, 205–210. John Meier, When is the graph product of hyperbolic groups hyperbolic?, Geometriae Dedicata 61 (1996), no. 1, 29–41. Howard A. Masur and Yair N. Minsky, Geometry of the complex of curves. I. Hyperbolicity, Invent. Math. 138 (1999), no. 1, 103–149. P Mathieu and A Sisto, Deviation inequalities for random walks, arXiv preprint arXiv:1411.7865 (2014). Joseph Maher and Giulio Tiozzo, Random walks on weakly hyperbolic groups, To appear in J. Reine Angew. Math. (2014). Bernhard H. Neumann, Groups covered by finitely many cosets, Publ. Math. Debrecen 3 (1954). Walter Neumann and Michael Shapiro, Automatic structures, rational growth and geometrically finite hyperbolic groups, Invent. Math. 120 (1995), 259–287. A Yu Ol’shanskii, Almost every group is hyperbolic, Internat. J. Algebra Comput. 2 (1992), no. 01, 1–17. Denis V Osin, Relatively hyperbolic groups: intrinsic geometry, algebraic properties, and algorithmic problems, vol. 843, American Mathematical Soc., 2006. 38 I. GEKHTMAN, S.J. TAYLOR, AND G. TIOZZO [Osi15] [Rad03] [Riv08] [Sis11] [TT15] [Wie14] [Yan13] [Yan16] Denis Osin, Acylindrically hyperbolic groups, Trans. Amer. Math. Soc. (2015). David G Radcliffe, Rigidity of graph products of groups, Algebraic & Geometric Topology 3 (2003), no. 2, 1079–1088. Igor Rivin, Walks on groups, counting reducible matrices, polynomials, and surface and free group automorphisms, Duke Math. J. 142 (2008), no. 2, 353–379. Alessandro Sisto, Contracting elements and random walks, J. Reine Angew. Math. (2011). Samuel J. Taylor and Giulio Tiozzo, Random extensions of free groups and surface groups are hyperbolic, Int. Math. Res. Not. (2015). Bert Wiest, On the genericity of loxodromic actions, arXiv preprint arXiv:1406.7041 (2014). Wenyuan Yang, Patterson-Sullivan measures and growth of relatively hyperbolic groups, available at arXiv:1308.6326, 2013. , Statistically convex-cocompact actions of groups with contracting elements, available at arXiv:1612.03648, 2016. Department of Mathematics, Yale University, 10 Hillhouse Ave, New Haven, CT 06520, U.S.A, E-mail address: [email protected] Department of Mathematics, Temple University, 1805 North Broad Street Philadelphia, PA 19122, U.S.A, E-mail address: [email protected] Department of Mathematics, University of Toronto, 40 St George St, Toronto, ON, Canada, E-mail address: [email protected]
4math.GR
E XPLORING THE S PACE OF B LACK - BOX ATTACKS D EEP N EURAL N ETWORKS arXiv:1712.09491v1 [cs.LG] 27 Dec 2017 Arjun Nitin Bhagoji ∗ Department of Electrical Engineering Princeton University ON Warren He, Bo Li & Dawn Song EECS Department University of California, Berkeley A BSTRACT Existing black-box attacks on deep neural networks (DNNs) so far have largely focused on transferability, where an adversarial instance generated for a locally trained model can “transfer” to attack other learning models. In this paper, we propose novel Gradient Estimation black-box attacks for adversaries with query access to the target model’s class probabilities, which do not rely on transferability. We also propose strategies to decouple the number of queries required to generate each adversarial sample from the dimensionality of the input. An iterative variant of our attack achieves close to 100% adversarial success rates for both targeted and untargeted attacks on DNNs. We carry out extensive experiments for a thorough comparative evaluation of black-box attacks and show that the proposed Gradient Estimation attacks outperform all transferability based black-box attacks we tested on both MNIST and CIFAR-10 datasets, achieving adversarial success rates similar to well known, state-of-the-art white-box attacks. We also apply the Gradient Estimation attacks successfully against a real-world Content Moderation classifier hosted by Clarifai. Furthermore, we evaluate black-box attacks against state-of-theart defenses. We show that the Gradient Estimation attacks are very effective even against these defenses. 1 I NTRODUCTION The ubiquity of machine learning provides adversaries with both opportunities and incentives to develop strategic approaches to fool learning systems and achieve their malicious goals. Many attack strategies devised so far to generate adversarial examples to fool learning systems have been in the white-box setting, where adversaries are assumed to have access to the learning model (Szegedy et al. (2014); Goodfellow et al. (2015); Carlini & Wagner (2017); Moosavi-Dezfooli et al. (2015)). However, in many realistic settings, adversaries may only have black-box access to the model, i.e. they have no knowledge about the details of the learning system such as its parameters, but they may have query access to the model’s predictions on input samples, including class probabilities. For example, we find this to be the case in some popular commercial AI offerings, such as those from IBM, Google and Clarifai. With access to query outputs such as class probabilities, the training loss of the target model can be found, but without access to the entire model, the adversary cannot access the gradients required to carry out white-box attacks. Most existing black-box attacks on DNNs have focused on transferability based attacks (Papernot et al. (2016); Moosavi-Dezfooli et al. (2016); Papernot et al. (2017)), where adversarial examples crafted for a local surrogate model can be used to attack the target model to which the adversary has no direct access. The exploration of other black-box attack strategies is thus somewhat lacking so far in the literature. In this paper, we design powerful new black-box attacks using limited query access to learning systems which achieve adversarial success rates close to that of white-box attacks. These black-box attacks help us understand the extent of the threat posed to deployed systems by adversarial samples. The code to reproduce our results can be found at https://github.com/ sunblaze-ucb/blackbox-attacks. New black-box attacks. We propose novel Gradient Estimation attacks on DNNs, where the adversary is only assumed to have query access to the target model. These attacks do not need any ∗ Work done while visiting UC Berkeley 1 Figure 1: Sample adversarial images of Gradient Estimation attacks on Clarifai’s Content Moderation model. Left: original image, classified as ‘drug’ with a confidence of 0.99. Right: adversarial sample with  = 32, classified as ‘safe’ with a confidence of 0.96. access to a representative dataset or any knowledge of the target model architecture. In the Gradient Estimation attacks, the adversary adds perturbations proportional to the estimated gradient, instead of the true gradient as in white-box attacks (Goodfellow et al. (2015); Kurakin et al. (2016)). Since the direct Gradient Estimation attack requires a number of queries on the order of the dimension of the input, we explore strategies for reducing the number of queries to the target model. We also experimented with Simultaneous Perturbation Stochastic Approximation (SPSA) and Particle Swarm Optimization (PSO) as alternative methods to carry out query-based black-box attacks but found Gradient Estimation to work the best. Query-reduction strategies We propose two strategies: random feature grouping and principal component analysis (PCA) based query reduction. In our experiments with the Gradient Estimation attacks on state-of-the-art models on MNIST (784 dimensions) and CIFAR-10 (3072 dimensions) datasets, we find that they match white-box attack performance, achieving attack success rates up to 90% for single-step attacks in the untargeted case and up to 100% for iterative attacks in both targeted and untargeted cases. We achieve this performance with just 200 to 800 queries per sample for single-step attacks and around 8,000 queries for iterative attacks. This is much fewer than the closest related attack by Chen et al. (2017). While they achieve similar success rates as our attack, the running time of their attack is up to 160× longer for each adversarial sample (see Section 3.5). A further advantage of the Gradient Estimation attack is that it does not require the adversary to train a local model, which could be an expensive and complex process for real-world datasets, in addition to the fact that training such a local model may require even more queries based on the training data. Attacking real-world systems. To demonstrate the effectiveness of our Gradient Estimation attacks in the real world, we also carry out a practical black-box attack using these methods against the Not Safe For Work (NSFW) classification and Content Moderation models developed by Clarifai, which we choose due to their socially relevant application. These models have begun to be deployed for real-world moderation (Liu, 2016), which makes such black-box attacks especially pernicious. We carry out these attacks with no knowledge of the training set. We have demonstrated successful attacks (Figure 1) with just around 200 queries per image, taking around a minute per image. In Figure 1, the target model classifies the adversarial image as ‘safe’ with high confidence, in spite of the content that had to be moderated still being clearly visible. We note here that due to the nature of the images we experiment with, we only show one example here, as the others may be offensive to readers. The full set of images can be found at https://sunblaze-ucb.github.io/blackbox-attacks/. Comparative evaluation of black-box attacks. We carry out a thorough empirical comparison of various black-box attacks (given in Table 7) on both MNIST and CIFAR-10 datasets. We study attacks that require zero queries to the learning model, including the addition of perturbations that are either random or proportional to the difference of means of the original and targeted classes, as well as various transferability based black-box attacks. We show that the proposed Gradient Estimation attacks outperform other black-box attacks in terms of attack success rate and achieve results comparable with white-box attacks. In addition, we also evaluate the effectiveness of these attacks on DNNs made more robust using adversarial training (Goodfellow et al., 2015; Szegedy et al., 2014) and its recent variants including ensemble adversarial training (Tramèr et al., 2017a) and iterative adversarial training (Madry ˛ et al., 2017). We find that although standard and ensemble adversarial training confer some robustness against single-step attacks, they are vulnerable to iterative Gradient Estimation attacks, with adversarial success rates in excess of 70% for both targeted and untargeted attacks. We find that our 2 methods outperform other black-box attacks and achieve performance comparable to white-box attacks. Iterative adversarial training is quite robust against all black-box attacks we test. In summary, our contributions include: 1. We propose new Gradient Estimation black-box attacks using queries to the target model. We also investigate two methods to make the number of queries needed independent of the input dimensionality. 2. We conduct a thorough evaluation of 10 different black-box attack strategies on state-ofthe-art classifiers on the MNIST and CIFAR-10 datasets, and we find that with a small number of queries, our proposed Gradient Estimation attacks outperform transferability based attacks and achieve attack success rates matching those of white-box attacks. 3. We carry out practical black-box attacks on Clarifai’s Not Safe For Work (NSFW) classification and Content Moderation models through public APIs, and show that the generated adversarial examples can mislead these models with high confidence. 4. Finally, we evaluate these black-box attacks against state-of-the-art adversarial training based defenses on DNNs, and we find that both standard and ensemble adversarial training are not robust against Gradient Estimation attacks. Further, even against iterative adversarial training our methods outperform transferability based attacks. Related Work. Existing black-box attacks that do not use a local model were first proposed for convex inducing two-class classifiers by Nelson et al. (2012). For malware data, Xu et al. (2016) use genetic algorithms to craft adversarial samples, while Dang et al. (2017) use hill climbing algorithms. These methods are prohibitively expensive for non-categorical and high-dimensional data such as images. Papernot et al. (2017) proposed using queries to a target model to train a local surrogate model, which was then used to to generate adversarial samples. This attack relies on transferability. To the best of our knowledge, the only previous literature on query-based black-box attacks in the deep learning setting is independent work by Narodytska & Kasiviswanathan (2016) and Chen et al. (2017). Narodytska & Kasiviswanathan (2016) propose a greedy local search to generate adversarial samples by perturbing randomly chosen pixels and using those which have a large impact on the output probabilities. Their method uses 500 queries per iteration, and the greedy local search is run for around 150 iterations for each image, resulting in a total of 75,000 queries per image, which is much higher than any of our attacks. Further, we find that our methods achieve higher targeted and untargeted attack success rates on both MNIST and CIFAR-10 as compared to their method. Chen et al. (2017) propose a black-box attack method named ZOO, which also uses the method of finite differences to estimate the derivative of a function. However, while we propose attacks that compute an adversarial perturbation, approximating FGSM and iterative FGS; ZOO approximates the Adam optimizer, while trying to perform coordinate descent on the loss function proposed by Carlini & Wagner (2017). Neither of these works demonstrates the effectiveness of their attacks on real-world systems or on state-of-the-art defenses. 2 BACKGROUND AND E VALUATION SETUP In this section, we will first introduce the notation we use throughout the paper and then describe the evaluation setup and metrics used in the remainder of the paper. The full set of attacks that was evaluated is given in Table 7 in Appendix C, which also provides a taxonomy for black-box attacks. 2.1 N OTATION A classifier f (·; θ) : X → Y is a function mapping from the domain X to the set of classification outputs Y. (Y = {0, 1} in the case of binary classification, i.e. Y is the set of class labels.) The number of possible classification outputs is then |Y|. θ is the set of parameters associated with a classifier. Throughout, the target classifier is denoted as f (·; θ), but the dependence on θ is dropped if it is clear from the context. H denotes the constraint set which an adversarial sample must satisfy. `f (x, y) is used to represent the loss function for the classifier f with respect to inputs x ∈ X and their true labels y ∈ Y. The loss functions we use are the standard cross-entropy loss (denoted 3 xent) and the logit loss from Carlini & Wagner (2017) (denoted as logit). These are described in Section 3.1. An adversary can generate adversarial example xadv from a benign sample x by adding an appropriate perturbation of small magnitude (Szegedy et al., 2014). Such an adversarial example xadv will either cause the classifier to misclassify it into a targeted class (targeted attack), or any class other than the ground truth class (untargeted attack). Since the black-box attacks we analyze focus on neural networks in particular, we also define some notation specifically for neural networks. The outputs of the penultimate layer of a neural network f , representing the output of the network computed sequentially over all preceding layers, are known as the logits. We represent the logits as a vector φf (x) ∈ R|Y| . The final layer of a neural network f used for classification is usually a softmax layer represented as a vector of probabilities f P|Y| eφi (x) . pf (x) = [pf1 (x), . . . , pf|Y| (x)], with i=1 pfi (x) = 1 and pfi (x) = P|Y| f φ (x) j=1 2.2 e j E VALUATION SETUP The empirical evaluation carried out in Sections 6 and 3 is on state-of-the-art neural networks on the MNIST (LeCun & Cortes, 1998) and CIFAR-10 (Krizhevsky & Hinton, 2009) datasets. The details of the datasets and the architecture and training procedure for all models are given below. 2.2.1 DATASETS MNIST. This is a dataset of images of handwritten digits (LeCun & Cortes, 1998). There are 60,000 training examples and 10,000 test examples. Each image belongs to a single class from 0 to 9. The images have a dimension d of 28 × 28 pixels (total of 784) and are grayscale. Each pixel value lies in [0, 1]. The digits are size-normalized and centered. This dataset is used commonly as a ‘sanity-check’ or first-level benchmark for state-of-the-art classifiers. We use this dataset since it has been extensively studied from the attack perspective by previous work. CIFAR-10. This is a dataset of color images from 10 classes (Krizhevsky & Hinton, 2009). The images belong to 10 mutually exclusive classes (airplane, automobile, bird, cat, deer, dog, frog, horse, ship, and truck). There are 50,000 training examples and 10,000 test examples. There are exactly 6,000 examples in each class. The images have a dimension of 32 × 32 pixels (total of 1024) and have 3 channels (Red, Green, and Blue). Each pixel value lies in [0, 255]. 2.2.2 M ODEL TRAINING DETAILS In this section, we present the architectures and training details for both the normally and adversarially trained variants of the models on both the MNIST and CIFAR-10 datasets. The accuracy of each model on benign data is given in Table 4. MNIST. Each pixel of the MNIST image data is scaled to [0, 1]. We trained four different models on the MNIST dataset, denoted Models A to D, which are used by Tramèr et al. (2017a) and represent a good variety of architectures. For the attacks constrained with the L∞ distance, we vary the adversary’s perturbation budget  from 0 to 0.4, since at a perturbation budget of 0.5, any image can be made solid gray. The model details for the 4 models trained on the MNIST dataset are as follows: 1. Model A (3,382,346 parameters): Conv(64, 5, 5) + Relu, Conv(64, 5, 5) + Relu, Dropout(0.25), FC(128) + Relu, Dropout(0.5), FC + Softmax 2. Model B (710,218 parameters) - Dropout(0.2), Conv(64, 8, 8) + Relu, Conv(128, 6, 6) + Relu, Conv(128, 5, 5) + Relu, Dropout(0.5), FC + Softmax 3. Model C (4,795,082 parameters) - Conv(128, 3, 3) + Relu, Conv(64, 3, 3) + Relu, Dropout(0.25), FC(128) + Relu, Dropout(0.5), FC + Softmax 4. Model D (509,410 parameters) - [FC(300) + Relu, Dropout(0.5)] × 4, FC + Softmax Models A and C have both convolutional layers as well as fully connected layers. They also have the same order of magnitude of parameters. Model B, on the other hand, does not have fully connected layers and has an order of magnitude fewer parameters. Similarly, Model D has no convolutional 4 layers and has fewer parameters than all the other models. Models A, B, and C all achieve greater than 99% classification accuracy on the test data. Model D achieves 97.2% classification accuracy, due to the lack of convolutional layers. CIFAR-10. Each pixel of the CIFAR-10 image data is in [0, 255]. We choose three model architectures for this dataset, which we denote as Resnet-32, Resnet-28-10 (ResNet variants (He et al., 2016; Zagoruyko & Komodakis, 2016)), and . For the attacks constrained with the L∞ distance, we vary the adversary’s perturbation budget  from 0 to 28. As their name indicates, Resnet-32 and Resnet-28-10 are ResNet variants (He et al., 2016; Zagoruyko & Komodakis, 2016), while Std.-CNN is a standard CNN (TensorFlow Authors, b). In particular, Resnet-32 is a standard 32 layer ResNet with no width expansion, and Resnet-28-10 is a wide ResNet with 28 layers with the width set to 10, based on the best performing ResNet from Zagoruyko & Komodakis (TensorFlow Authors, a). The width indicates the multiplicative factor by which the number of filters in each residual layer is increased. Std.-CNN is a standard CNN1 from Tensorflow (Abadi et al., 2015) with two convolutional layers, each followed by a max-pooling and normalization layer and two fully connected layers, each of which has weight decay. Resnet-32 is trained for 125,000 steps, Resnet-28-10 is trained for 167,000 steps and Std.-CNN is trained for 100,000 steps on the benign training data. Models Resnet-32 and Resnet-28-10 are much more accurate than Std.-CNN. All models were trained with a batch size of 128. The two ResNets achieve close to state-of-the-art accuracy (Benenson, 2016) on the CIFAR-10 test set, with Resnet-32 at 92.4% and Resnet-28-10 at 94.4%. Std.-CNN, on the other hand, only achieves an accuracy of 81.4%, reflecting its simple architecture and the complexity of the task. 2.3 M ETRICS Throughout the paper, we use standard metrics to characterize the effectiveness of various attack strategies. For MNIST, all metrics for single-step attacks are computed with respect to the test set consisting of 10,000 samples, while metrics for iterative attacks are computed with respect to the first 1,000 samples from the test set. For the CIFAR-10 data, we choose 1,000 random samples from the test set for single-step attacks and a 100 random samples for iterative attacks. In our evaluations of targeted attacks, we choose target T for each sample uniformly at random from the set of classification outputs, except the true class y of that sample. Attack success rate. The main metric, the attack success rate, is the fraction of samples that meets the adversary’s goal: f (xadv ) 6= y for untargeted attacks and f (xadv ) = T for targeted attacks with target T (Szegedy et al., 2014; Tramèr et al., 2017a). Alternative evaluation metrics are discussed in Appendix A. Average distortion. We also evaluate the average distortion for adversarial examples using average L2 distance between the benign samples and the adversarial ones as suggested by Gu & Rigazio PN (2014): ∆(Xadv , X) = N1 i=1 k(Xadv )i − (X)i k2 where N is the number of samples. This metric allows us to compare the average distortion for attacks which achieve similar attack success rates, and therefore infer which one is stealthier. Number of queries. Query based black-box attacks make queries to the target model, and this metric may affect the cost of mounting the attack. This is an important consideration when attacking real-world systems which have costs associated with the number of queries made. 3 Q UERY BASED ATTACKS : G RADIENT E STIMATION ATTACK Deployed learning systems often provide feedback for input samples provided by the user. Given query feedback, different adaptive, query-based algorithms can be applied by adversaries to understand the system and iteratively generate effective adversarial examples to attack it. Formal definitions of query-based attacks are in Appendix B. We initially explored a number of methods of using query feedback to carry out black-box attacks including Particle Swarm Optimization (Kennedy, 2011) and Simultaneous Perturbation Stochastic Approximation (Spall, 1992). However, these methods were 1 https://github.com/tensorflow/models/tree/master/tutorials/image/ cifar10 5 not effective at finding adversarial examples for reasons detailed in Section 3.6, which also contains the results obtained. Given the fact that many white-box attacks for generating adversarial examples are based on gradient information, we then tried directly estimating the gradient to carry out black-box attacks, and found it to be very effective in a range of conditions. In other words, the adversary can approximate white-box Single-step and Iterative FGSM attacks (Goodfellow et al., 2015; Kurakin et al., 2016) using estimates of the losses that are needed to carry out those attacks. We first propose a Gradient Estimation black-box attack based on the method of finite differences (Spall, 2005). The drawback of a naive implementation of the finite difference method, however, is that it requires O(d) queries per input, where d is the dimension of the input. This leads us to explore methods such as random grouping of features and feature combination using components obtained from Principal Component Analysis (PCA) to reduce the number of queries. Threat model and justification: We assume that the adversary can obtain the vector of output probabilities for any input x. The set of queries the adversary can make is then Qf = {pf (x), ∀x}. Note that an adversary with access to the softmax probabilities will be able to recover the logits up to an additive constant, by taking the logarithm of the softmax probabilities. For untargeted attacks, the adversary only needs access to the output probabilities for the two most likely classes. A compelling reason for assuming this threat model for the adversary is that many existing cloudbased ML services allow users to query trained models (Watson Visual Recognition, Clarifai, Google Vision API). The results of these queries are confidence scores which can be used to carry out Gradient Estimation attacks. These trained models are often deployed by the clients of these ML as a service (MLaaS) providers (Liu (2016)). Thus, an adversary can pose as a user for a MLaaS provider and create adversarial examples using our attack, which can then be used against any client of that provider. Comparing against existing black-box attacks: In the results presented in this section, we compare our attacks against a number of existing black-box attacks in both ther targeted and untargeted case. Detailed descriptions of these attacks are in Section 6. In particular, we compare against the following attacks that make zero queries to the target model: 1. Baseline attacks: Random-Gaussian perturbations denoted as Rand. (Section 6.1.1) and Difference-of-Means aligned perturbations denoted as D. of M. (Section 6.1.2) 2. Transferability attack (single local model) (Section 6.3.1) using Fast Gradient Sign (FGS) and Iterative FGS (IFGS) samples generated on a single source model for both loss functions. This is denoted as Transfer model FGS/IFGS-loss); e.g., Transfer Model A FGS-logit 3. Transferability attack (local model ensemble) (Section 6.3.2) using FGS and IFGS samples generated on a source model for both loss functions (Transfer models FGS/IFGS-loss); e.g., Transfer Model B, Model C IFGS-logit We also compare against white-box attacks, descriptions of which are in Section 6.2 and results are in Appendix D. 3.1 F INITE DIFFERENCE METHOD FOR GRADIENT ESTIMATION In this section, we focus on the method of finite differences to carry out Gradient Estimation based attacks. Let the function whose gradient is being estimated be g(x). The input to the function is a d-dimensional vector x, whose elements are represented as xi , where i ∈ [1, . . . , d]. The canonical basis vectors are represented as ei , where ei is 1 only in the ith component and 0 everywhere else. Then, a two-sided estimation of the gradient of g with respect to x is given by  g(x+δe1 )−g(x−δe1 )  2δ .. .  FDx (g(x), δ) =   . (1) g(x+δed )−g(x−δed ) 2δ δ is a free parameter that controls the accuracy of the estimation. A one-sided approximation can also be used, but will be less accurate (Wright & Nocedal, 1999). If the gradient of the function g exists, then limδ→0 FDx (g(x), δ) = ∇x g(x). The finite difference method is useful for a black-box 6 adversary aiming to approximate a gradient based attack, since the gradient can be directly estimated with access to only the function values. 3.1.1 A PPROXIMATE FGS WITH FINITE DIFFERENCES In the untargeted FGS method, the gradient is usually taken with respect to the cross-entropy loss between the true label of the input and the softmax probability vector. The cross-entropy loss of a P|Y| network f at an input x is then `f (x, y) = − j=1 1[j = y] log pfj (x) = − log pfy (x), where y is the index of the original class of the input. The gradient of `f (x, y) is ∇x `f (x, y) = − ∇x pfy (x) pfy (x) . (2) An adversary with query access to the softmax probabilities then just has to estimate the gradient of pfy (x) and plug it into Eq. 2 to get the estimated gradient of the loss. The adversarial sample thus generated is ! FDx (pfy (x), δ) xadv = x +  · sign . (3) pfy (x) This method of generating adversarial samples is denoted as FD-xent. Targeted black-box adversarial samples generated using the Gradient Estimation method are then ! FDx (pfT (x), δ) . (4) xadv = x −  · sign pfT (x) The targeted version of the method is denoted as FD-xent-T. 3.1.2 E STIMATING THE LOGIT- BASED LOSS We also use a loss function based on logits which was found to work well for white-box attacks by Carlini & Wagner (2017). The loss function is given by `(x, y) = max(φ(x + δ)y − max{φ(x + δ)i : i 6= y}, −κ), (5) where y represents the ground truth label for the benign sample x and φ(·) are the logits. κ is a confidence parameter that can be adjusted to control the strength of the adversarial perturbation. If the confidence parameter κ is set to 0, the logit loss is max(φ(x + δ)y − max{φ(x + δ)i : i 6= y}, 0). For an input that is correctly classified, the first term is always greater than 0, and for an incorrectly classified input, an untargeted attack is not meaningful to carry out. Thus, the loss term reduces to φ(x + δ)y − max{φ(x + δ)i : i 6= y} for relevant inputs. An adversary can compute the logit values up to an additive constant by taking the logarithm of the softmax probabilities, which are assumed to be available in this threat model. Since the loss function is equal to the difference of logits, the additive constant is canceled out. Then, the finite differences method can be used to estimate the difference between the logit values for the original class y, and the second most likely class y 0 , i.e., the one given by y 0 = argmaxi6=y φ(x)i . The untargeted adversarial sample generated for this loss in the white-box case is xadv = x +  · sign(∇x (φ(x)y0 − φ(x)y )). Similarly, in the case of a black-box adversary with query-access to the softmax probabilities, the adversarial sample is xadv = x +  · sign(FDx (φ(x)y0 − φ(x)y , δ)). (6) Similarly, a targeted adversarial sample is xadv = x −  · sign(FDx (max(φ(x)i : i 6= T ) − φ(x)T , δ)). (7) The untargeted attack method is denoted as FD-logit while the targeted version is denoted as FDlogit-T. 7 MNIST Baseline D. of M. 44.8 (5.6) 81.5 (5.6) 20.2 (5.6) 97.1 (5.6) Model A B C D CIFAR-10 Model Resnet-32 Resnet-28-10 Std.-CNN Baseline D. of M. 9.3 (440.5) 6.7 (440.5) 20.3 (440.5) Transfer from Model B Gradient Estimation using Finite Differences Rand. 8.5 (6.1) 7.8 (6.1) 4.1 (6.1) 38.5 (6.1) Single-step FD-xent FD-logit 51.6 (3.3) 92.9 (6.1) 69.2 (4.5) 98.9 (6.3) 60.5 (3.8) 86.1 (6.2) 95.4 (5.8) 100.0 (6.1) Iterative IFD-xent IFD-logit 75.0 (3.6) 100.0 (2.1) 86.7 (3.9) 100.0 (1.6) 80.2 (4.5) 100.0 (2.2) 98.4 (5.4) 100.0 (1.2) Rand. 19.4 (439.4) 17.1 (439.4) 22.2 (439.4) Iterative IFGS-xent IFGS-logit 89.8 (4.75) 88.5 (4.75) 79.5 (4.75) 78.7 (4.75) 73.3 (4.75) 71.4 (4.75) Transfer from Resnet-28-10 Gradient Estimation using Finite Differences Single-step FD-xent FD-logit 49.1 (217.1) 86.0 (410.3) 50.1 (214.8) 88.2 (421.6) 80.0 (341.3) 98.9 (360.9) Single-step FGS-xent FGS-logit 66.3 (6.2) 80.8 (6.3) 49.5 (6.2) 57.0 (6.3) 76.3 (6.2) 87.6 (6.3) Iterative IFD-xent IFD-logit 62.0 (149.9) 100.0 (65.7) 46.0 (120.4) 100.0 (74.9) 66.0 (202.5) 100.0 (79.9) Single-step FGS-xent FGS-logit 74.5 (439.4) 76.6 (439.4) 37.4 (439.4) 37.7 (439.4) Iterative IFGS-xent IFGS-logit 99.0 (275.4) 98.9 (275.6) 33.7 (275.4) 33.6 (275.6) Table 1: Untargeted black-box attacks: Each entry has the attack success rate for the attack method given in that column on the model in each row. The number in parentheses for each entry is ∆(X, Xadv ), the average distortion over all samples used in the attack. In each row, the entry in bold represents the black-box attack with the best performance on that model. Gradient Estimation using Finite Differences is our method, which has performance matching white-box attacks. Above: MNIST, L∞ constraint of  = 0.3. Below: CIFAR-10, L∞ constraint of  = 8. MNIST Baseline Model A B C D D. of M. 15.0 (5.6) 35.5 (5.6) 5.84 (5.6) 59.8 (5.6) CIFAR-10 Baseline Model Resnet-32 Resnet-28-10 Std.-CNN D. of M. 1.2 (440.3) 0.9 (440.3) 2.6 (440.3) Gradient Estimation using Finite Differences Single-step FD-xent FD-logit 30.0 (6.0) 29.9 (6.1) 29.5 (6.3) 29.3 (6.3) 34.1 (6.1) 33.8 (6.4) 61.4 (6.3) 60.8 (6.3) Iterative IFD-xent IFD-logit 100.0 (4.2) 99.7 (2.7) 99.9 (4.1) 98.7 (2.4) 100.0 (4.3) 99.8 (3.0) 100.0 (3.7) 99.9 (1.9) Transfer from Model B Single-step FGS-xent FGS-logit 18.3 (6.3) 18.1 (6.3) 14.0 (6.3) 13.8 (6.3) 16.8 (6.3) 16.7 (6.3) Transfer from Resnet-28-10 Gradient Estimation using Finite Differences Single-step FD-xent FD-logit 23.8 (439.5) 23.0 (437.0) 29.2 (439.4) 28.0 (436.1) 44.5 (439.5) 40.3 (434.9) Iterative IFD-xent IFD-logit 100.0 (110.9) 100.0 (89.5) 100.0 (123.2) 100.0 (98.3) 99.0 (178.8) 95.0 (126.8) Iterative IFGS-xent IFGS-logit 54.5 (4.6) 46.5 (4.2) 34.0 (4.6) 26.1 (4.2) 36.4 (4.6) 32.8 (4.1) Single-step FGS-xent FGS-logit 15.8 (439.4) 15.5 (439.4) 5.6 (439.4) 5.6 (439.4) Iterative IFGS-xent IFGS-logit 71.8 (222.5) 80.3 (242.6) 5.1 (222.5) 5.9 (242.6) Table 2: Targeted black-box attacks: adversarial success rates. The number in parentheses () for each entry is ∆(X, Xadv ), the average distortion over all samples used in the attack. Above: MNIST,  = 0.3. Below: CIFAR-10,  = 8. 3.1.3 I TERATIVE ATTACKS WITH ESTIMATED GRADIENTS The iterative variant of the gradient based attack described in Section 6.2 is a powerful attack that often achieves much higher attack success rates in the white-box setting than the simple single-step gradient based attacks. Thus, it stands to reason that a version of the iterative attack with estimated gradients will also perform better than the single-step attacks described until now. An iterative attack with t + 1 iterations using the cross-entropy loss is: !! FDxtadv pfy (xtadv ) t+1 t xadv = ΠH xadv + α · sign , (8) pfy (xtadv ) where α is the step size and H is the constraint set for the adversarial sample. This attack is denoted as IFD-xent. If the logit loss is used instead, it is denoted as IFD-logit. 3.1.4 E VALUATION OF G RADIENT E STIMATION USING F INITE D IFFERENCES In this section, we summarize the results obtained using Gradient Estimation attacks with Finite Differences and describe the parameter choices made. FD-logit and IFD-logit match white-box attack adversarial success rates: The Gradient Estimation attack with Finite Differences (FD-logit) is the most successful untargeted single-step black-box attack for MNIST and CIFAR-10 models. It significantly outperforms transferability-based attacks (Table 1) and closely tracks white-box FGS with a logit loss (WB FGS-logit) on MNIST and CIFAR10 (Figure 2). For adversarial samples generated iteratively, the Iterative Gradient Estimation attack with Finite Differences (IFD-logit) achieves 100% adversarial success rate across all models on both datasets (Table 1). We used 0.3 for the value of  for the MNIST dataset and 8 for the CIFAR-10 dataset. The average distortion for both FD-logit and IFD-logit closely matches their white-box counterparts, FGS-logit and IFGS-logit as given in Table 8. 8 L∞ constrained strategies on Model A L∞ constrained strategies on Resnet-32 100 Difference-of-means Random-perturbation Finite-difference xent Finite-difference logit Query-reduced PCA-100 logit Transfer Model B FGS xent Transfer Model B FGS logit White-box FGS logit White-box FGS xent 80 60 40 20 Adversarial success (%) Adversarial success (%) 100 0 Difference-of-means Random-perturbation Finite-difference xent Finite-difference logit Query-reduced PCA-400 logit Transfer Resnet-28-10 FGS xent White-box FGS logit White-box FGS xent 80 60 40 20 0 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4  0 (a) Model A (MNIST) 4 8 12 16 20 24 28 32  (b) Resnet-32 (CIFAR-10) Figure 2: Effectiveness of various single step black-box attacks on Model A (MNIST) and Resnet-32 (CIFAR-10). The y-axis for both figures gives the variation in adversarial success as  is increased. The most successful black-box attack strategy in both cases is the Gradient Estimation attack using Finite Differences with the logit loss (FD-logit), which coincides almost exactly with the white-box FGS attack with the logit loss (WB FGS-logit). Also, the Gradient Estimation attack with query reduction using PCA (GE-QR (PCA-k, logit)) performs well for both datasets as well. FD-T and IFD-T achieve the highest adversarial success rates in the targeted setting: For targeted black-box attacks, IFD-xent-T achieves 100% adversarial success rates on almost all models as shown by the results in Table 2. While FD-xent-T only achieves about 30% adversarial success rates, this matches the performance of single-step white-box attacks such as FGS-xent-T and FGS-logit-T (Table 9). The average distortion for samples generated using gradient estimation methods is similar with that of white-box attacks. Parameter choices: We use δ = 1.0 for FD-xent and IFD-xent for both datasets, while using δ = 0.01 for FD-logit and IFD-logit. We find that a larger value of δ is needed for xent loss based attacks to work. The reason for this is that the probability values used in the xent loss are not as sensitive to changes as in the logit loss, and thus the gradient cannot be estimated since the function value does not change at all when a single pixel is perturbed. For the Iterative Gradient Estimation attacks using Finite Differences, we use α = 0.01 and t = 40 for the MNIST results and α = 1.0 and t = 10 for CIFAR-10 throughout. The same parameters are used for the white-box Iterative FGS attack results given in Appendix D. This translates to 62720 queries for MNIST (40 steps of iteration) and 61440 queries (10 steps of iteration) for CIFAR-10 per sample. We find these choices work well, and keep the running time of the Gradient Estimation attacks at a manageable level. However, we find that we can achieve similar adversarial success rates with much fewer queries using query reduction methods which we describe in the next section. 3.2 Q UERY REDUCTION The major drawback of the approximation based black-box attacks is that the number of queries needed per adversarial sample is large. For an input with dimension d, the number of queries will be exactly 2d for a two-sided approximation. This may be too large when the input is high-dimensional. So we examine two techniques in order to reduce the number of queries the adversary has to make. Both techniques involve estimating the gradient for groups of features, instead of estimating it one feature at a time. The justification for the use of feature grouping comes from the relation between gradients and directional derivatives (Hildebrand, 1962) for differentiable functions. The directional derivative of a function g is defined as ∇v g(x) = limh→0 g(x+hv)−g(x) . It is a generalization of a partial derivative. h For differentiable functions, ∇v g(x) = ∇x g(x) · v, which implies that the directional derivative is just the projection of the gradient along the direction v. Thus, estimating the gradient by grouping features is equivalent to estimating an approximation of the gradient constructed by projecting it ˆ x g(x) of any function g can be along appropriately chosen directions. The estimated gradient ∇ computed using the techniques below, and then plugged in to Equations 3 and 6 instead of the finite difference term to create an adversarial sample. Next, we introduce the techniques applied to group the features for estimation. 9 3.2.1 Q UERY REDUCTION BASED ON RANDOM GROUPING The simplest way to group features is to choose, without replacement, a random set of features. The gradient can then be simultaneously estimated for all these features. If the size of the set chosen is k, then the number of queries the adversary has to make is d kd e. When k = 1, this reduces to the case where the partial derivative with respect to every feature is found, as in Section 3.1. In each iteration of Algorithm 1, there is a set of indices S according to which v is determined, with vi = 1 if and P only if i ∈ S. Thus, the directional derivative being estimated is i∈S ∂g(x) ∂xi , which is an average of partial derivatives. Thus, the quantity being estimated is not the gradient itself, but an index-wise averaged version of it. Algorithm 1 Gradient estimation with query reduction using random features Input: x, k, δ, g(·) ˆ x g(x) of g(·) at x Output: Estimated gradient ∇ ˆ 1: Initialize empty vector ∇x g(x) of dimension d 2: for i ← 1 to d kd e − 1 do i−1 3: Choose a set of random k indices Si out of [1, . . . , d]/{∪j=1 Sj } 4: Initialize v such that vj = 1 iff j ∈ Si ˆ x g(x)j = g(x+δv)−g(x−δv) , which is the two-sided approximation of the directional 5: For all j ∈ Si , set ∇ 2δk derivative along v 6: end for d e−1 dk 7: Initialize v such that vj = 1 iff j ∈ [1, . . . , d]/{∪j=1 Sj } d d e−1 k 8: For all j ∈ [1, . . . , d]/{∪j=1 3.2.2 ˆ x g(x)j = Sj }, set ∇ g(x+δv)−g(x−δv) 2δk Q UERY REDUCTION USING PCA COMPONENTS A more principled way to reduce the number of queries the adversary has to make to estimate the gradient is to compute directional derivatives along the principal components as determined by principal component analysis (PCA) (Shlens, 2014), which requires the adversary to have access to a set of data which is represetative of the training data. PCA minimizes reconstruction error in terms of the L2 norm; i.e., it provides a basis in which the Euclidean distance to the original sample from a sample reconstructed using a subset of the basis vectors is the smallest. Concretely, let the samples the adversary wants to misclassify be column vectors xi ∈ Rd for i ∈ {1, . . . , n} X be the d × n matrix of centered data samples (i.e. X = [x̃1 x̃2 . . . x̃n ], where Pnand let 1 i j x̃ = x − n j=1 x ). The principal components of X are the normalized eigenvectors of its sample covariance matrix C = XXT. Since C is a positive semidefinite matrix, there is a decomposition C = UΛUT where U is an orthogonal matrix, Λ = diag(λ1 , . . . , λd ), and λ1 ≥ . . . ≥ λd ≥ 0. Thus, U in Algorithm 2 is the d × d matrix whose columns are unit eigenvectors of C. The eigenvalue λi is the variance of X along the ith component. Algorithm 2 Gradient estimation with query reduction using PCA components Input: x, k, U, δ, g(·) ˆ x g(x) of g(·) at x Output: Estimated gradient ∇ 1: for i ← 1 to k do ui 2: Initialize v such that v = ku , where ui is the ith column of U ik 3: Compute g(x + δv) − g(x − δv) αi (v) = , 2δ which is the two-sided approximation of the directional derivative along v ˆ x g(x)i = ∇ ˆ x g(x)i−1 + αi (v)v 4: Update ∇ 5: end for ˆ x g(x) = ∇ ˆ x g(x)k 6: Set ∇ 10 PCA-based query reduction for Model A 100 None 112 23 12 6 3 80 60 40 Adversarial success (%) Adversarial success (%) 100 20 0 PCA-based query reduction for Resnet-32 100 None 400 200 100 50 10 80 60 40 Adversarial success (%) Random feature groupings for Model A 20 0 0 0.1 0.2 0.3 0.4 0.5  60 40 20 0 0.1 0.15 0.2 0.25 0.3 0.35 0.4  (a) Gradient Estimation attack with query reduction using random grouping and the logit loss (GE-QR (RG-k, logit)) on Model A (MNIST, d = 784). The adversarial success rate decreases as the number of groups d kd e is decreased, where k is the size of the group and d is the dimension of the input. None 400 200 100 50 10 80 4 (b) Gradient Estimation attack with query reduction using PCA components and the logit loss (GEQR (PCA-k, logit)) on Model A (MNIST, d = 784). The adversarial success rates decrease as the number of principal components k used for estimation is decreased. Relatively high success rates are maintained even for k = 50. 8 12 16 20 24 28 32  (c) Gradient Estimation attack with query reduction using PCA components and the logit loss (GEQR (PCA-k, logit)) on Resnet-32 (CIFAR-10). Relatively high success rates are maintained even for k = 400. Figure 3: Adversarial success rates for Gradient Estimation attacks with query reduction (FDQR (Technique, logit)) on Model A (MNIST) and Resnet-32 (CIFAR-10), where Technique is either PCA or RG. ‘None’ refers to FD-logit, the case where the number of queries is 2d, where d is the dimension of the input. In Algorithm 2, U is the d × d matrix whose columns are the principal components ui , where i ∈ [d]. The quantity being estimated in Algorithm 2 is an approximation of the gradient in the PCA basis: (∇x g(x))k = k  X ∇x g(x)T i=1 ui kui k  ui , kui k where the term on the left represents an approximation of the true gradient by the sum of its projection along the top k principal components. In Algorithm 2, the weights of the representation in the PCA basis are approximated using the approximate directional derivatives along the principal components. 3.3 I TERATIVE ATTACKS WITH QUERY REDUCTION Performing an iterative attack with the gradient estimated using the finite difference method (Equation 1) could be expensive for an adversary, needing 2td queries to the target model, for t iterations with the two-sided finite difference estimation of the gradient. To lower the number of queries needed, the adversary can use either of the query reduction techniques described above to reduce the number of queries to 2tk ( k < d). These attacks using the cross-entropy loss are denoted as IGE-QR (RG-k, xent) for the random grouping technique and IGE-QR (PCA-k, xent) for the PCA-based technique. 3.3.1 E VALUATION OF G RADIENT E STIMATION ATTACKS WITH QUERY REDUCTION In this section, we first summarize the results obtained using Gradient Estimation attacks with query reduction and then provide a more detailed analysis of the effect of dimension on attacks with query reduction Gradient estimation with query reduction maintains high attack success rates: For both datasets, the Gradient Estimation attack with PCA based query reduction (GE-QR (PCA-k, logit)) is effective, with performance close to that of FD-logit with k = 100 for MNIST (Figure 2a) and k = 400 for CIFAR-10 (Figure 2b). The Iterative Gradient Estimation attacks with both Random Grouping and PCA based query reduction (IGE-QR (RG-k, logit) and IGE-QR (PCA-k, logit)) achieve close to 100% success rates for untargeted attacks and above 80% for targeted attacks on Model A on MNIST and Resnet-32 on CIFAR-10 (Figure 5). Figure 5 clearly shows the effectiveness of the gradient 11 estimation attack across models, datasets, and adversarial goals. While random grouping is not as effective as the PCA based method for Single-step attacks, it is as effective for iterative attacks. Effect of dimension on Gradient Estimation attacks: We consider the effectiveness of Gradient Estimation with random grouping based query reduction and the logit loss (GE-QR (RG-k, logit)) on Model A on MNIST data in Figure 3a, where k is the number of indices chosen in each iteration of Algorithm 1. Thus, as k increases and the number of groups decreases, we expect attack success to decrease as gradients over larger groups of features are averaged. This is the effect we see in Figure 3a, where the adversarial success rate drops from 93% to 63% at  = 0.3 as k increases from 1 to 7. Grouping with k = 7 translates to 112 queries per MNIST image, down from 784. Thus, in order to achieve high adversarial success rates with the random grouping method, larger perturbation magnitudes are needed. On the other hand, the PCA-based approach GE-QR (PCA-k, logit) is much more effective, as can be seen in Figure 3b. Using 100 principal components to estimate the gradient for Model A on MNIST as in Algorithm 2, the adversarial success rate at  = 0.3 is 88.09%, as compared to 92.9% without any query reduction. Similarly, using 400 principal components for Resnet-32 on CIFAR-10 (Figure 3c), an adversarial success rate of 66.9% can be achieved at  = 8. At  = 16, the adversarial success rate rises to 80.1%. Remarks: While decreasing the number of queries does reduce attack success rates, the proposed query reduction methods maintain high attack success rates. 3.4 A DVERSARIAL SAMPLES In Figure 4, we show some examples of successful untargeted adversarial samples against Model A on MNIST and Resnet-32 on CIFAR-10. These images were generated with an L∞ constraint of  = 0.3 for MNIST and  = 8 for CIFAR-10. Clearly, the amount of perturbation added by iterative attacks is much smaller, barely being visible in the images. WB FGS FD-logit GE-QR-PCA MNIST Single-step CIFAR-10 WB IFGS IFD-logit IGE-QR-PCA MNIST Iterative CIFAR-10 Figure 4: Untargeted adversarial samples on Model A on MNIST and Resnet-32 on CIFAR-10. All attacks use the logit loss. Perturbations in the images generated using single-step attacks are far smaller than those for iterative attacks. The ‘7’ from MNIST is classified as a ‘3’ by all single-step attacks and as a ‘9’ by all iterative attacks. The dog from CIFAR-10 is classified as a bird by the white-box FGS and Finite Difference attack, and as a frog by the Gradient Estimation attack with query reduction. 3.5 E FFICIENCY OF GRADIENT ESTIMATION ATTACKS In our evaluations, all models were run on a GPU with a batch size of 100. On Model A on MNIST data, single-step attacks FD-xent and FD-logit take 6.2 × 10−2 and 8.8 × 10−2 seconds per sample respectively. Thus, these attacks can be carried out on the entire MNIST test set of 10,000 images in about 10 minutes. For iterative attacks with no query reduction, with 40 iterations per sample (α set to 0.01), both IFD-xent and IFD-xent-T taking about 2.4 seconds per sample. Similarly, IFD-logit 12 Query-based attack Attack success No. of queries Time per sample (s) Finite Diff. Gradient Estimation (RG-8) Iter. Finite Diff. Iter. Gradient Estimation (RG-8) Particle Swarm Optimization SPSA 92.9 (6.1) 61.5 (6.0) 100.0 (2.1) 98.4 (1.9) 84.1 (5.3) 96.7 (3.9) 1568 196 62720 8000 10000 8000 8.8 × 10−2 1.1 × 10−2 3.5 0.43 21.2 1.25 Table 3: Comparison of untargeted query-based black-box attack methods. All results are for attacks using the first 1000 samples from the MNIST dataset on Model A and with an L∞ constraint of 0.3. The logit loss is used for all methods expect PSO, which uses the class probabilities. and IFD-logit-T take about 3.5 seconds per sample. With query reduction, using IGE-QR (PCA-k, logit) with k = 100 the time taken is just 0.5 seconds per sample. For Resnet-32 on the CIFAR-10 dataset, FD-xent, FD-xent-T, FD-logit and FD-logit-T all take roughly 3s per sample. The iterative variants of these attacks with 10 iterations (α set to 1.0) take roughly 30s per sample. Using query reduction, IGE-QR (PCA-k, logit) with k = 100 with 10 iterations takes just 5s per sample. The time required per sample increases with the complexity of the network, which is observed even for white-box attacks. All the above numbers are for the case when queries are not made in parallel. Our attack algorithm allows for queries to be made in parallel as well. We find that a simple parallelization of the queries gives us a 2 − 4× speedup. The limiting factor is the fact that the model is loaded on a single GPU, which implies that the current setup is not fully optimized to take advantage of the inherently parallel nature of our attack. With further optimization, greater speedups can be achieved. Remarks: Overall, our attacks are very efficient and allow an adversary to generate a large number of adversarial samples in a short period of time. 3.6 OTHER QUERY- BASED ATTACKS We experimented with Particle Swarm Optimization (PSO),2 a commonly used evolutionary optimization strategy, to construct adversarial samples as was done by Sharif et al. (2016), but found it to be prohibitively slow for a large dataset, and it was unable to achieve high adversarial success rates even on the MNIST dataset. We also tried to use the Simultaneous Perturbation Stochastic Approximation (SPSA) method, which is similar to the method of Finite Differences, but it estimates the gradient of the loss along a random direction r at each step, instead of along the canonical basis vectors. While each step of SPSA only requires 2 queries to the target model, a large number of steps are nevertheless required to generate adversarial samples. A single step of SPSA does not reliably produce adversarial samples. The two main disadvantages of this method are that i) the convergence of SPSA is much more sensitive in practice to the choice of both δ (gradient estimation step size) and α (loss minimization step size), and ii) even with the same number of queries as the Gradient Estimation attacks, the attack success rate is lower even though the distortion is higher. A comparative evaluation of all the query-based black-box attacks we experimented with for the MNIST dataset is given in Table 3. The PSO based attack uses class probabilities to define the loss function, as it was found to work better than the logit loss in our experiments. The attack that achieves the best trade-off between speed and attack success is IGE-QR (RG-k, logit). 4 ATTACKING DEFENSES In this section, we evaluate black-box attacks against different defenses based on adversarial training and its variants. We focus on adversarial training based defenses as they aim to directly improve the robustness of DNNs, and are among the most effective defenses demonstrated so far in the literature. 2 Using freely available code from http://pythonhosted.org/pyswarm/ 13 IGE-QR (PCA-400, logit) across models A MNIST A Aadv-0.3 CIFAR-10 Resnet-32 Resnet-32 adv-8 Single-step Iterative PCA-100 RG-8 PCA-100 RG-8 88.1 (6.0) 4.1 (5.8) 61.5 (6.0) 2.0 (5.3) 99.9 (2.5) 50.7 (4.2) 98.4 (1.9) 27.5 (2.4) Single-step Untargeted Resnet-32 Targeted Aadv-0.3 Resnet-32adv-8 Iterative PCA-400 RG-8 PCA-400 RG-8 66.9 (410.7) 8.0 (402.1) 66.8 (402.7) 7.7 (401.8) 98.0 (140.7) 97.0 (151.3) 99.0 (80.5) 98.0 (92.9) 0 40 20 60 80 100 Adversarial success (%) (a) Adversarial success rates for untargeted attacks (b) Adversarial success rates of the Iterative Grausing query reduction. The parameters used for query dient Estimation attack using the logit loss, with reduction are indicated in the table. PCA (400) used for query reduction. Figure 5: Adversarial success rates for query-reduced attacks.  is set to 0.3 for Model A on MNIST and 8 for Resnet-32 on CIFAR-10. Model Aadv-0.3 and Resnet-32 adv-8 are adversarially trained variants (ref. Section 4.1) of the models. All attacks use roughly 8000 queries per sample for both datasets. We find that Iterative Gradient Estimation attacks perform much better than any single-step black-box attack against defenses. Nevertheless, in Figure 6, we show that with the addition of an initial random perturbation to overcome “gradient masking” (Tramèr et al., 2017a), the Gradient Estimation attack with Finite Differences is the most effective single-step black-box attack on adversarially trained models on MNIST. Dataset (Model) Benign Adv Adv-Ens Adv-Iter MNIST (A) CIFAR-10 (Resnet-32) 99.2 92.4 99.4 92.1 99.2 91.7 99.3 79.1 Table 4: Accuracy of models on the benign test data 4.1 4.1.1 BACKGROUND AND EVALUATION SETUP A DVERSARIAL TRAINING Szegedy et al. (2014) and Goodfellow et al. (2015) introduced the concept of adversarial training, where the standard loss function for a neural network f is modified as follows: ˜ y) = α`f (x, y) + (1 − α)`f (xadv , y), `(x, (9) where y is the true label of the sample x. The underlying objective of this modification is to make the neural networks more robust by penalizing it during training to count for adversarial samples. During training, the adversarial samples are computed with respect to the current state of the network using an appropriate method such as FGSM. Ensemble adversarial training. Tramèr et al. (2017a) proposed an extension of the adversarial training paradigm which is called ensemble adversarial training. As the name suggests, in ensemble adversarial training, the network is trained with adversarial samples from multiple networks. Iterative adversarial training. A further modification of the adversarial training paradigm proposes training with adversarial samples generated using iterative methods such as the iterative FGSM attack described earlier (Madry ˛ et al., 2017). 4.2 A DVERSARIALLY TRAINED MODELS We train variants of Model A with the 3 adversarial training strategies described above using adversarial samples based on an L∞ constraint of 0.3. Model Aadv-0.3 is trained with FGS samples, while Model Aadv-iter-0.3 is trained with iterative FGS samples using t = 40 and α = 0.01. For the model with ensemble training, Model Aadv-ens-0.3 is trained with pre-generated FGS samples for Models A, C, and D, as well as FGS samples. The source of the samples is chosen randomly for 14 MNIST Model Model Aadv-0.3 Model Aadv-ens-0.3 Model Aadv-iter-0.3 CIFAR-10 Model Resnet-32 adv-8 Resnet-32 adv-ens-8 Resnet-32 adv-iter-8 Baseline D. of M. 6.5 (5.6) 2.0 (5.6) 3.0 (5.6) Gradient Estimation using Finite Differences Single-step FD-xent FD-logit 10.3 (2.6) 2.8 (5.9) 6.1 (3.5) 6.2 (6.3) 9.2 (7.4) 7.5 (7.2) Rand. 1.3 (6.1) 1.2 (6.1) 1.0 (6.1) Baseline D. of M. 9.6 (440.5) 10.1 (440.5) 22.86 (440.5) Transfer from Model B Iterative IFD-xent IFD-logit 36.4 (3.1) 76.5 (3.1) 24.2 (4.1) 96.4 (2.7) 14.5 (0.96) 11.6 (3.5) Single-step FGS-xent FGS-logit 14.6 (6.2) 14.63 (6.3) 3.1 (6.2) 3.1 (6.3) 11.5 (6.2) 11.0 (6.3) Transfer from Resnet-28-10 Gradient Estimation using Finite Differences Rand. 10.9 (439.4) 10.4 (439.4) 21.41 (439.4) Single-step FD-xent FD-logit 2.4 (232.9) 8.5 (401.9) 7.7 (360.2) 12.2 (399.8) 45.5 (365.5) 47.5 (331.1) Iterative IFGS-xent IFGS-logit 16.5 (4.7) 15.9 (4.7) 4.8 (4.7) 4.9 (4.7) 8.7 (4.7) 8.2 (4.7) Iterative IFD-xent IFD-logit 69.0 (136.0) 100.0 (73.8) 95.0 (190.4) 100.0 (85.2) 55.0 (397.6) 54.6 (196.3) Single-step FGS-xent FGS-logit 13.1 (439.4) 13.2 (439.4) 9.7 (439.4) 9.6 (439.4) 23.2 (439.4) 23.1 (439.4) Iterative IFGS-xent IFGS-logit 30.2 (275.4) 30.2 (275.6) 15.9 (275.4) 15.5 (275.6) 22.3 (275.4) 22.3 (275.6) Table 5: Untargeted black-box attacks for models with adversarial training: adversarial success rates and average distortion ∆(X, Xadv ) over the samples. Above: MNIST,  = 0.3. Below: CIFAR-10,  = 8. L∞ constrained strategies on Model Aadv-0.3 L∞ constrained strategies on Resnet-32adv-0.3 100 Difference-of-means Random-perturbation Finite-difference xent Finite-difference logit Transfer Model B FGS xent Transfer Model B FGS logit White-box FGS logit White-box FGS xent Rand+finite-difference Rand+FGS 80 60 40 20 Adversarial success (%) Adversarial success (%) 100 0 Difference-of-means Random-perturbation Finite-difference xent Finite-difference logit Transfer Resnet-28-10 FGS xent White-box FGS logit White-box FGS xent 80 60 40 20 0 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4  0 4 8 12 16 20 24 28  (a) Model Aadv-0.3 (MNIST) (b) Resnet-32 adv-8 (CIFAR-10) Figure 6: Effectiveness of various single step black-box attacks against adversarially trained models. On the MNIST model, Model Aadv-0.3 the attack with the highest performance up till  = 0.3 is the Gradient Estimation attack using Finite Differences with initially added randomness. Beyond this, the Transferability attack (single local model) using samples from Model B performs better. On the CIFAR-10 model Resnet-32 adv-8 , the best performing attack is the Transferability attack (single local model) using samples from Resnet-28-10. each minibatch during training. For all adversarially trained models, each training batch contains 128 samples of which 64 are benign and 64 are adversarial samples (either FGSM or iterative FGSM). This implies that the loss for each is weighted equally during training; i.e., in Eq. 9, α is set to 0.5. Networks using standard and ensemble adversarial training are trained for 12 epochs, while those using iterative adversarial training are trained for 64 epochs. We train variants of Resnet-32 using adversarial samples with an L∞ constraint of 8. Resnet-32 adv-8 is trained with FGS samples with the same constraint, and Resnet-32 ens-adv-8 is trained with pre-generated FGS samples from Resnet-32 and Std.-CNN as well as FGS samples. Resnet-32 adv-iter-8 is trained with iterative FGS samples using t = 10 and α = 1.0. The adversarial variants of Resnet-32 is trained for 80,000 steps Table 4 shows the accuracy of these models with various defenses on benign test data. 4.3 S INGLE - STEP ATTACKS ON DEFENSES In Figure 6a, we can see that both single-step black-box and white-box attacks have much lower adversarial success rates on Model Aadv-0.3 as compared to Model A. The success rate of the Gradient Estimation attacks matches that of white-box attacks on these adversarially trained networks as well. To overcome this, we add an initial random perturbation to samples before using the Gradient Estimation attack with Finite Differences and the logit loss (FD-logit). These are then the most effective single step black-box attacks on Model Aadv-0.3 at  = 0.3 with an adversarial success rate of 32.2%, surpassing the Transferability attack (single local model) from B. In Figure 6b, we again see that the Gradient Estimation attacks using Finite Differences (FD-xent and FD-logit) and white-box FGS attacks (FGS-xent and FGS-logit) against Resnet-32. As  is increased, the attacks that perform the best are Random Perturbations (Rand.), Difference-ofmeans (D. of M.), and Transferability attack (single local model) from Resnet-28-10 with the latter performing slightly better than the baseline attacks. This is due to the ‘gradient masking’ phenomenon and can be overcome by adding random perturbations as for MNIST. An interesting effect is observed 15 Finite-difference vs RAND-FGSM for Model A variants Adversarial success (%) 100 Finite-difference logit on Model Aadv-0.3 White-box FGS on Model Aadv-0.3 Finite-difference logit on Model Aadv-ens-0.3 White-box FGS on Model Aadv-ens-0.3 Finite-difference logit on Model Aadv-iter-0.3 White-box FGS on Model Aadv-iter-0.3 80 60 40 20 0 0.1 0.15 0.2 0.25 0.3 0.35 0.4  Figure 7: Increasing the effectiveness of FD-logit attacks on Model Aadv-0.3 , Model Aadv-ens-0.3 and Model Aadv-iter-0.3 (MNIST) by adding an initial L∞ constrained random perturbation of magnitude 0.01. at  = 4, where the adversarial success rate is higher than at  = 8. The likely explanation for this effect is that the model has overfitted to adversarial samples at  = 8. Our Gradient Estimation attack closely tracks the adversarial success rate of white-box attacks in this setting as well. Increasing effectiveness of single-step attacks using initial random perturbation: Since the Gradient Estimation attack with Finite Differences (FD-xent and FD-logit) were not performing well due the masking of gradients at the benign sample x, we added an initial random perturbation to escape this low-gradient region as in the RAND-FGSM attack (Tramèr et al., 2017a). Figure 7 shows the effect of adding an initial L∞ -constrained perturbation of magnitude 0.05. With the addition of a random perturbation, FD-logit has a much improved adversarial success rate on Model Aadv-0.3 , going up to 32.2% from 2.8% without the perturbation at a total perturbation value of 0.3. It even outperforms the white-box FGS (FGS-logit) with the same random perturbation added. This effect is also observed for Model Aadv-ens-0.3 , but Model Aadv-iter-0.3 appears to be resistant to single-step gradient based attacks. Thus, our attacks work well for single-step attacks on DNNs with standard and ensemble adversarial training, and achieve performance levels close to that of white-box attacks. 4.4 I TERATIVE ATTACKS ON DIFFERENT ADVERSARIAL TRAINING DEFENSES While single-step black-box attacks are less effective at  lower than the one used for training, our experiments show that iterative black-box attacks continue to work well even against adversarially trained networks. For example, the Iterative Gradient Estimation attack using Finite Differences with a logit loss (IFD-logit) achieves an adversarial success rate of 96.4% against Model Aadv-ens-0.3 , while the best transferability attack has a success rate of 4.9%. It is comparable to the white-box attack success rate of 93% from Table 10. However, Model Aadv-iter-0.3 is quite robust even against iterative attacks, with the highest black-box attack success rate achieved being 14.5%. Further, in Figure 5, we can see that using just 4000 queries per sample, the Iterative Gradient Estimation attack using PCA for query reduction (IGE-QR (PCA-400, logit)) achieves 100% (untargeted) and 74.5% (targeted) adversarial success rates against Model Aadv-0.3 . Our methods far outperform the other black-box attacks, as shown in Table 10. Iterative black-box attacks perform well against adversarially trained models for CIFAR-10 as well. IFD-logit achieves attack success rates of 100% against both Resnet-32 adv-8 and Resnet-32 adv-ens-8 (Table 5), which reduces slightly to 97% when IFD-QR (PCA-400, logit) is used. This matches the performance of white-box attacks as given in Table 10. IFD-QR (PCA-400, logit) also achieves a 72% success rate for targeted attacks at  = 8 as shown in Figure 5. The iteratively trained model has poor performance on both benign as well as adversarial samples. Resnet-32 adv-iter-8 has an accuracy of only 79.1% on benign data, as shown in Table 4. The Iterative 16 Gradient Estimation attack using Finite Differences with cross-entropy loss (IFD-xent) achieves an untargeted attack success rate of 55% on this model, which is lower than on the other adversarially trained models, but still significant. This is in line with the observation by Madry ˛ et al. (2017) that iterative adversarial training needs models with large capacity for it to be effective. This highlights a limitation of this defense, since it is not clear what model capacity is needed and the models we use already have a large number of parameters. Remarks. Both single-step and iterative variants of the Gradient Estimation attacks outperform other black-box attacks, achieving attack success rates close to those of white-box attacks even on adversarially trained models. 5 ATTACKS ON C LARIFAI : A REAL - WORLD SYSTEM Since the only requirement for carrying out the Gradient Estimation based attacks is query-based access to the target model, a number of deployed public systems that provide classification as a service can be used to evaluate our methods. We choose Clarifai, as it has a number of models trained to classify image datasets for a variety of practical applications, and it provides black-box access to its models and returns confidence scores upon querying. In particular, Clarifai has models used for the detection of Not Safe For Work (NSFW) content, as well as for Content Moderation. These are important applications where the presence of adversarial samples presents a real danger: an attacker, using query access to the model, could generate an adversarial sample which will no longer be classified as inappropriate. For example, an adversary could upload violent images, adversarially modified, such that they are marked incorrectly as ‘safe’ by the Content Moderation model. We evaluate our attack using the Gradient Estimation method on the Clarifai NSFW and Content Moderation models. An important point to note here is that given the lack of an easily accessible open-source dataset for these tasks to train a local surrogate model, carrying out attacks based on transferability is a challenging task. On the other hand, our attack can directly be used for any image of the adversary’s choice. The Content Moderation model has five categories, ‘safe’, ‘suggestive’, ‘explicit’, ‘drug’ and ‘gore’, while the NSFW model has just two categories, ‘SFW’ and ‘NSFW.’ When we query the API with an image, it returns the confidence scores associated with each category, with the confidence scores summing to 1. We use the random grouping technique in order to reduce the number of queries and take the logarithm of the confidence scores in order to use the logit loss. A large number of successful attack images can be found at https://sunblaze-ucb.github. io/blackbox-attacks/. Due to their possibly offensive nature, they are not included in the paper. An example of an attack on the Content Moderation API is given in Figure 1, where the original image on the left is clearly of some kind of drug on a table, with a spoon and a syringe. It is classified as a drug by the Content Moderation model with a confidence score of 0.99. The image on the right is an adversarial image generated with 192 queries to the Content Moderation API, with an L∞ constraint on the perturbation of  = 32. While the image can still clearly be classified by a human as being of drugs on a table, the Content Moderation model now classifies it as ‘safe’ with a confidence score of 0.96. Remarks. The proposed Gradient Estimation attacks can successfully generate adversarial examples that are misclassified by a real-world system hosted by Clarifai without prior knowledge of the training set or model. 6 E XISTING BLACK - BOX ATTACKS In this section, we describe existing methods for generating adversarial examples. In all of these attacks, the adversary’s perturbation is constrained using the L∞ distance. 6.1 BASELINE ATTACKS Now, we describe two baseline black-box attacks which can be carried out without any knowledge of or query access to the target model. 17 6.1.1 R ANDOM PERTURBATIONS With no knowledge of f or the training set, the simplest manner in which an adversary may seek to carry out an attack is by adding a random perturbation to the input (Szegedy et al., 2014; Goodfellow et al., 2015; Fawzi et al., 2015). These perturbations can be generated by any distribution of the adversary’s choice and constrained according to an appropriate norm. If we let P be a distribution over X , and p is a random variable drawn according to P , then a noisy sample is just xnoise = x + p. Since random noise is added, it is not possible to generate targeted adversarial samples in a principled manner. This attack is denoted as Rand. throughout. 6.1.2 D IFFERENCE OF MEANS A perturbation aligned with the difference of means of two classes is likely to be effective for an adversary hoping to cause misclassification for a broad range of classifiers (Tramèr et al., 2017b). While these perturbations are far from optimal for DNNs, they provide a useful baseline to compare against. Adversaries with at least partial access to the training or test sets can carry out this attack. An adversarial sample generated using this method, and with L∞ constraints, is xadv = x +  · sign(µt − µo ), where µt is the mean of the target class and µo is the mean of the original ground truth class. For an untargeted attack, t = argmini d(µi − µo ), where d(·, ·) is an appropriately chosen distance function. In other words, the class whose mean is closest to the original class in terms of the Euclidean distance is chosen to be the target. This attack is denoted as D. of M. throughout. 6.1.3 E FFECTIVENESS OF BASELINE ATTACKS In the baseline attacks described above, the choice of distribution for the random perturbation attack and the choice of distance function for the difference of means attack are not fixed. Here, we describe the choices we make for both attacks. The random perturbation p for each sample (for both MNIST and CIFAR-10) is chosen independently according to a multivariate normal distribution with mean 0, i.e. p ∼ N (0, Id ). Then, depending on the norm constraint, either a signed and scaled version of the random perturbation (L∞ ) or a scaled unit vector in the direction of the perturbation (L2 ) is added. For an untargeted attack utilizing perturbations aligned with the difference of means, for each sample, the mean of the class closest to the original class in the L2 distance is determined. As expected, adversarial samples generated using Rand. do not achieve high adversarial success rates (Table 1) in spite of having similar or larger average distortion than the other black-box attacks for both the MNIST and CIFAR-10 models. However, the D. of M. method is quite effective at higher perturbation values for the MNIST dataset as can be seen in Figure 2a. Also, for Models B and D, the D. of M. attack is more effective than FD-xent. The D. of M. method is less effective in the targeted attack case, but for Model D, it outperforms the transferability based attack considerably. Its success rate is comparable to the targeted transferability based attack for Model A as well. The relative effectiveness of the two baseline methods is reversed for the CIFAR-10 dataset, however, where Rand. outperforms D. of M. considerably as  is increased. This indicates that the models trained on MNIST have normal vectors to decision boundaries which are more aligned with the vectors along the difference of means as compared to the models on CIFAR-10. 6.2 S INGLE - STEP AND I TERATIVE FAST G RADIENT M ETHODS Now, we describe two white-box attack methods, used in transferability-based attacks, for which we constructed approximate, gradient-free versions in Section 3. These attacks are based on either iterative or single-step gradient based minimization of appropriately defined loss functions of neural networks. All results for white-box attacks are contained in Appendix D. Since these methods all require the knowledge of the model’s gradient, we assume the adversary has access to a local model f s . Adversarial samples generated for f s can then be transferred to the target model f t to carry out a transferability-based attack (Papernot et al., 2016; Moosavi-Dezfooli et al., 2016). An ensemble of local models (Liu et al., 2017) may also be used. Transferability-based attacks are described in Section 6.3. The single-step Fast Gradient method, first introduced by Goodfellow et al. (2015), utilizes a firstorder approximation of the loss function in order to construct adversarial samples for the adversary’s surrogate local model f s . The samples are constructed by performing a single step of gradient ascent 18 for untargeted attacks. Formally, the adversary generates samples xadv with L∞ constraints (known as the Fast Gradient Sign (FGS) method) in the untargeted attack setting as xadv = x +  · sign(∇x `f s (x, y)), (10) where `f s (x, y) is the loss function with respect to which the gradient is taken. The loss function typically used is the cross-entropy loss (Goodfellow et al., 2016). Adversarial samples generated using the targeted FGS attack are xadv = x −  · sign(∇x `f s (x, T )), (11) where T is the target class. Iterative Fast Gradient methods are simply multi-step variants of the Fast Gradient method described above (Kurakin et al., 2016), where the gradient of the loss is added to the sample for t + 1 iterations, starting from the benign sample, and the updated sample is projected to satisfy the constraints H in every step: t t xt+1 adv = ΠH (xadv + α · sign(∇xtadv `f s (xadv , y))), (12) with x0adv = x. Iterative fast gradient methods thus essentially carry out projected gradient descent (PGD) with the goal of maximizing the loss, as pointed out by Madry ˛ et al. (2017). Targeted adversarial samples generated using iterative FGS are t t xt+1 adv = ΠH (xadv − α · sign(∇xtadv `f s (xadv , T ))). 6.2.1 (13) B EYOND THE CROSS - ENTROPY LOSS Prior work by Carlini & Wagner (2017) investigates a variety of loss functions for white-box attacks based on the minimization of an appropriately defined loss function. In our experiments with neural networks, for untargeted attacks, we use a loss function based on logits which was found to work well for white-box attacks in Carlini & Wagner (2017). The loss function is given by `(x, y) = max(φ(x + δ)y − max{φ(x + δ)i : i 6= y}, −κ), (14) where y represents the ground truth label for the benign sample x, φ(·) are the logits. κ is a confidence parameter that can be adjusted to control the strength of the adversarial sample. Targeted adversarial samples are generated using the following loss term: xadv = x −  · sign(∇x (max(φ(x)i : i 6= T ) − φ(x)T )). 6.3 (15) T RANSFERABILITY BASED ATTACKS Here we describe black-box attacks that assume the adversary has access to a representative set of training data in order to train a local model. One of the earliest observations with regards to adversarial samples for neural networks was that they transfer; i.e, adversarial attack samples generated for one network are also adversarial for another network. This observation directly led to the proposal of a black-box attack where an adversary would generate samples for a local network and transfer these to the target model, which is referred to as a Transferability based attack. Targeted transferability attacks are carried out using locally generated targeted white-box adversarial samples. 6.3.1 S INGLE LOCAL MODEL These attacks use a surrogate local model f s to craft adversarial samples, which are then submitted to f in order to cause misclassification. Most existing black-box attacks are based on transferability from a single local model (Papernot et al., 2016; Moosavi-Dezfooli et al., 2016). The different attack strategies to generate adversarial instances introduced in Section 6.2 can be used here to generate adversarial instances against f s , so as to attack f . 6.3.2 E NSEMBLE OF LOCAL MODELS Since it is not clear which local model f s is best suited for generating adversarial samples that transfer well to the target model f , Liu et al. (2017) propose the generation of adversarial examples 19 for an ensemble of local models. This method modifies each of the existing transferability attacks by substituting a sum over the loss functions in place of the loss from a single local model. Concretely, let the ensemble of m local models to be usedP to generate the local loss be {f s1 , . . . , f sm }. m The ensemble loss is then computed as `ens (x, y) = i=1 αi `f si (x, y), where αi is the weight given to each model in the ensemble. The FGS attack in the ensemble setting then becomes xadv = x +  · sign(∇x `ens (x, y)). The Iterative FGS attack is modified similarly. Liu et al. (2017) show that the Transferability attack (local model ensemble) performs well even in the targeted attack case, while Transferability attack (single local model) is usually only effective for untargeted attacks. The intuition is that while one model’s gradient may not be adversarial for a target model, it is likely that at least one of the gradient directions from the ensemble represents a direction that is somewhat adversarial for the target model. Untargeted Transferability to Model A Source B B,C B,C,D Single-step Iterative FGS-xent FGS-logit IFGS-xent IFGS-logit 66.3 (6.2) 80.8 (6.3) 89.8 (4.75) 88.5 (4.75) 68.1 (6.2) 89.8 (6.3) 95.0 (4.8) 97.1 (4.9) 56.0 (6.3) 88.7 (6.4) 73.5 (5.3) 94.4 (5.3) Targeted Transferability to Model A Single-step Iterative Source FGS-T (xent) FGS-T (logit) IFGS-T (xent) IFGS-T (logit) B 18.3 (6.3) 18.1 (6.3) 54.5 (4.6) 46.5 (4.2) 23.0 (6.3) 23.0 (6.3) 76.7 (4.8) 72.3 (4.5) B,C B,C,D 25.2 (6.4) 25.1 (6.4) 74.6 (4.9) 66.1 (4.7) Table 6: Adversarial success rates for transferability-based attacks on Model A (MNIST) at  = 0.3. Numbers in parentheses beside each entry give the average distortion ∆(X, Xadv ) over the test set. This table compares the effectiveness of using a single local model to generate adversarial examples versus the use of a local ensemble. 6.3.3 T RANSFERABILITY ATTACK RESULTS For the transferability experiments, we choose to transfer from Model B for MNIST dataset and from Resnet-28-10 for CIFAR-10 dataset, as these models are each similar to at least one of the other models for their respective dataset and different from one of the others. They are also fairly representative instances of DNNs used in practice. Adversarial samples generated using single-step methods and transferred from Model B to the other models have higher success rates for untargeted attacks when they are generated using the logit loss as compared to the cross entropy loss as can be seen in Table 1. For iterative adversarial samples, however, the untargeted attack success rates are roughly the same for both loss functions. As has been observed before, the adversarial success rate for targeted attacks with transferability is much lower than the untargeted case, even when iteratively generated samples are used. On the MNIST dataset, the highest targeted transferability rate is 54.5% (Table 2) as compared to 89.8% in the untargeted case (Table 1). One attempt to improve the transferability rate is to use an ensemble of local models, instead of a single one. The results for this on the MNIST data are presented in Table 6. In general, both untargeted and targeted transferability increase when an ensemble is used. However, the increase is not monotonic in the number of models used in the ensemble, and we can see that the transferability rate for IFGS-xent samples falls sharply when Model D is added to the ensemble. This may be due to it having a very different architecture as compared to the models, and thus also having very different gradient directions. This highlights one of the pitfalls of transferability, where it is important to use a local surrogate model similar to the target model for achieving high attack success rates. 20 7 C ONCLUSION Overall, in this paper, we conduct a systematic analysis of new and existing black-box attacks on state-of-the-art classifiers and defenses. We propose Gradient Estimation attacks which achieve high attack success rates comparable with even white-box attacks and outperform other state-of-the-art black-box attacks. We apply random grouping and PCA based methods to reduce the number of queries required to a small constant and demonstrate the effectiveness of the Gradient Estimation attack even in this setting. We also apply our black-box attack against a real-world classifier and state-of-the-art defenses. All of our results show that Gradient Estimation attacks are extremely effective in a variety of settings, making the development of better defenses against black-box attacks an urgent task. R EFERENCES Martín Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Jozefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Murray, Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever, Kunal Talwar, Paul Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. URL http://tensorflow.org/. Software available from tensorflow.org. Rodrigo Benenson. Classification datasets results. http://rodrigob.github.io/are_we_ there_yet/build/#classification-dataset-type, 2016. Accessed: 2017-08-22. Nicholas Carlini and David Wagner. Towards evaluating the robustness of neural networks. In IEEE Symposium on Security and Privacy, 2017, 2017. Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, and Cho-Jui Hsieh. Zoo: Zeroth order optimization based black-box attacks to deep neural networks without training substitute models. arXiv preprint arXiv:1708.03999, 2017. Clarifai. Clarifai | image & video recognition API. https://clarifai.com. Accessed: 2017-08-22. Hung Dang, Huang Yue, and Ee-Chien Chang. Evading classifiers by morphing in the dark. 2017. Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. Analysis of classifiers’ robustness to adversarial perturbations. arXiv preprint arXiv:1502.02590, 2015. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. Deep learning. MIT Press, 2016. Ian J Goodfellow, Jonathon Shlens, and Christian Szegedy. Explaining and harnessing adversarial examples. In International Conference on Learning Representations, 2015. Google Vision API. Vision API - image content analysis | Google cloud platform. https:// cloud.google.com/vision/. Accessed: 2017-08-22. Shixiang Gu and Luca Rigazio. Towards deep neural network architectures robust to adversarial examples. arXiv preprint arXiv:1412.5068, 2014. Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016. Francis Begnaud Hildebrand. Advanced calculus for applications, volume 63. Prentice-Hall Englewood Cliffs, NJ, 1962. James Kennedy. Particle swarm optimization. In Encyclopedia of machine learning, pp. 760–766. Springer, 2011. 21 Alex Krizhevsky and Geoffrey Hinton. Learning multiple layers of features from tiny images. 2009. Alexey Kurakin, Ian Goodfellow, and Samy Bengio. Adversarial examples in the physical world. arXiv preprint arXiv:1607.02533, 2016. Yann LeCun and Corrina Cortes. The MNIST database of handwritten digits. 1998. Amy Liu. Clarifai featured hack: Block unwanted nudity in blog comments with disqus. https: //goo.gl/TCCVrR, 2016. Accessed: 2017-08-22. Yanpei Liu, Xinyun Chen, Chang Liu, and Dawn Song. Delving into transferable adversarial examples and black-box attacks. In ICLR, 2017. Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, and Pascal Frossard. Deepfool: a simple and accurate method to fool deep neural networks. arXiv preprint arXiv:1511.04599, 2015. Seyed-Mohsen Moosavi-Dezfooli, Alhussein Fawzi, Omar Fawzi, and Pascal Frossard. Universal adversarial perturbations. arXiv preprint arXiv:1610.08401, 2016. Konda Reddy Mopuri, Utsav Garg, and R Venkatesh Babu. Fast feature fool: A data independent approach to universal adversarial perturbations. arXiv preprint arXiv:1707.05572, 2017. Aleksander Madry, ˛ Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, and Adrian Vladu. Towards deep learning models resistant to adversarial attacks. arXiv:1706.06083 [cs, stat], June 2017. Nina Narodytska and Shiva Prasad Kasiviswanathan. Simple black-box adversarial perturbations for deep networks. arXiv preprint arXiv:1612.06299, 2016. Blaine Nelson, Benjamin IP Rubinstein, Ling Huang, Anthony D Joseph, Steven J Lee, Satish Rao, and JD Tygar. Query strategies for evading convex-inducing classifiers. The Journal of Machine Learning Research, 13(1):1293–1332, 2012. Nicolas Papernot, Patrick McDaniel, and Ian Goodfellow. Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. arXiv preprint arXiv:1605.07277, 2016. Nicolas Papernot, Patrick McDaniel, Ian Goodfellow, Somesh Jha, Z Berkay Celik, and Ananthram Swami. Practical black-box attacks against deep learning systems using adversarial examples. In Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security, 2017. Mahmood Sharif, Sruti Bhagavatula, Lujo Bauer, and Michael K Reiter. Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1528–1540. ACM, 2016. Jonathon Shlens. A tutorial on principal component analysis. arXiv preprint arXiv:1404.1100, 2014. James C Spall. Multivariate stochastic approximation using a simultaneous perturbation gradient approximation. IEEE transactions on automatic control, 37(3):332–341, 1992. James C Spall. Introduction to stochastic search and optimization: estimation, simulation, and control, volume 65. John Wiley & Sons, 2005. Christian Szegedy, Wojciech Zaremba, Ilya Sutskever, Joan Bruna, Dumitru Erhan, Ian Goodfellow, and Rob Fergus. Intriguing properties of neural networks. In International Conference on Learning Representations, 2014. TensorFlow Authors. Tensorflow resnet models. https://github.com/tensorflow/ models/tree/master/resnet, a. Accessed: 2017-08-22. TensorFlow Authors. Tensorflow CIFAR-10 tutorial model. https://github.com/ tensorflow/models/tree/master/tutorials/image/cifar10, b. Accessed: 2017-08-22. 22 Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Dan Boneh, and Patrick McDaniel. Ensemble adversarial training: Attacks and defenses. arXiv preprint arXiv:1705.07204, 2017a. Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, and Patrick McDaniel. The space of transferable adversarial examples. arXiv preprint arXiv:1704.03453, 2017b. Watson Visual Recognition. Watson visual recognition. https://www.ibm.com/watson/ services/visual-recognition/. Accessed: 2017-10-27. Stephen J Wright and Jorge Nocedal. Numerical optimization. Springer Science, 35(67-68):7, 1999. Weilin Xu, Yanjun Qi, and David Evans. Automatically evading classifiers. In Proceedings of the 2016 Network and Distributed Systems Symposium, 2016. Sergey Zagoruyko and Nikos Komodakis. Wide residual networks. arXiv preprint arXiv:1605.07146, 2016. A A LTERNATIVE ADVERSARIAL SUCCESS METRIC Note that the adversarial success rate can also be computed by considering only the fraction of inputs that meet the adversary’s objective given that the original sample was correctly classified. That is, one would count the fraction of correctly classified inputs (i.e. f (x) = y) for which f (xadv ) 6= y in the untargeted case, and f t (xadv ) = T in the targeted case. In a sense, this fraction represents those samples which are truly adversarial, since they are misclassified solely due to the adversarial perturbation added and not due to the classifier’s failure to generalize well. In practice, both these methods of measuring the adversarial success rate lead to similar results for classifiers with high accuracy on the test data. B F ORMAL DEFINITIONS FOR QUERY- BASED ATTACKS Here, we provide a unified framework assuming an adversary can make active queries to the model. Existing attacks making zero queries are a special case in this framework. Given an input instance x, the adversary makes a sequence of queries based on the adversarial constraint set H, and iteratively adds perturbations until the desired query results are obtained, using which the corresponding adversarial example xadv is generated. We formally define the targeted and untargeted black-box attacks based on the framework as below. Definition 1 (Untargeted black-box attack). Given an input instance x and an iterative active query attack strategy A, a query sequence can be generated as x2 = A({(x1 , qf1 )}, H), ..., xi = A({(x1 , qf1 ), . . . , (xi−1 , qfi−1 )}, H), where qfi denotes the ith corresponding query result on xi , and we set x1 = x. A black-box attack on f (·; θ) is untargeted if the adversarial example xadv = xk satisfies f (xadv ; θ) 6= f (x; θ), where k is the number of queries made. Definition 2 (Targeted black-box attack). Given an input instance x and an iterative active query attack strategy A, a query sequence can be generated as x2 = A({(x1 , qf1 )}, H), ..., xi = A({(x1 , qf1 ), . . . , (xi−1 , qfi−1 )}, H), where qfi denotes the ith corresponding query result on xi , and we set x1 = x. A black-box attack on f (·; θ) is targeted if the adversarial example xadv = xk satisfies f (xadv ; θ) = T , where T and k are the target class and the number of queries made, respectively. The case where the adversary makes no queries to the target classifier is a special case we refer to as a zero-query attack. In the literature, a number of these zero-query attacks have been carried out with varying degrees of success (Papernot et al., 2016; Liu et al., 2017; Moosavi-Dezfooli et al., 2016; Mopuri et al., 2017). 23 Zero-query Abbreviation Untargeted Targeted Rand. D. of M. + + + Transfer model FGS-xent Transfer model FGS-logit Transfer model IFGS-xent Transfer model IFGS-logit + + + + + + + + FD-xent FD-logit IFD-xent IFD-logit + + + + + + + + GE-QR (RG-k, logit) IGE-QR (RG-k, logit) GE-QR (PCA-k, logit) IGE-QR (PCA-k, logit) + + + + + + + + WB FGS-xent WB FGS-logit WB IFGS-xent WB IFGS-logit + + + + + + + + Surrogate attack FGS Steps Single-step IFGS Iterative Finite-difference gradient estimation Query based Black-box Attack Random-Gaussian-perturbation Difference-of-means Transfer from model Steps Single-step Iterative Query-reduced gradient estimation Technique Random grouping White-box PCA Fast gradient sign (FGS) Steps Single-step Iterative Single-step Iterative Steps Single-step Iterative Loss function Cross-entropy Logit-based Cross-entropy Logit-based Loss function Cross-entropy Logit-based Cross-entropy Logit-based Loss function Logit-based Logit-based Logit-based Logit-based Loss function Cross-entropy Logit-based Cross-entropy Logit-based Table 7: Attacks evaluated in this paper C S UMMARY OF ATTACKS EVALUATED Taxonomy of black-box attacks: To deepen our understanding of the effectiveness of black-box attacks, in this work, we propose a taxonomy of black-box attacks, intuitively based on the number of queries on the target model used in the attack. The details are provided in Table 7. We evaluate the following attacks summarized in Table 7: 1. Zero-query attacks (a) Baseline attacks: Random-Gaussian perturbations (Rand.) and Difference-of-Means aligned perturbations (D. of M.) (b) Transferability attack (single local model) using Fast Gradient Sign (FGS) and Iterative FGS (IFGS) samples generated on a single source model for both loss functions (Transfer model FGS/IFGS-loss); e.g., Transfer Model A FGS-logit (c) Transferability attack (local model ensemble) using FGS and IFGS samples generated on a source model for both loss functions (Transfer models FGS/IFGS-loss); e.g., Transfer Model B, Model C IFGS-logit 2. Query based attacks (a) Finite-difference and Iterative Finite-difference attacks for the gradient estimation attack for both loss functions (FD/IFD-loss); e.g., FD-logit (b) Gradient Estimation and Iterative Gradient Estimation with Query reduction attacks (IGE/GE-QR (Technique-k, loss)) using two query reduction techniques, random grouping (RG) and principal component analysis components (PCA); e.g., GE-QR (PCA-k, logit) 3. White-box FGS and IFGS attacks for both loss functions (WB FGS/IFGS (loss)) D W HITE - BOX ATTACK RESULTS In this section, we present the white-box attack results for various cases in Tables 8–10. Where relevant, our results match previous work (Goodfellow et al., 2015; Kurakin et al., 2016). 24 MNIST White-box Model A B C D Single-step Iterative FGS (xent) FGS (logit) IFGS (xent) IFGS (logit) 69.2 (5.9) 90.1 (5.9) 99.5 (4.4) 100.0 (2.1) 84.7 (6.2) 98.8 (6.3) 100.0 (4.75) 100.0 (1.6) 67.9 (6.1) 76.5 (6.6) 100.0 (4.7) 100.0 (2.2) 98.3 (6.3) 100.0 (6.5) 100.0 (5.6) 100.0 (1.2) CIFAR-10 White-box Model Resnet-32 Resnet-28-10 Std.-CNN Single-step FGS (xent) FGS (logit) 82.6 (439.7) 86.8 (438.3) 86.4 (439.6) 87.4 (439.2) 93.9 (439.6) 98.5 (429.8) Iterative IFGS (xent) IFGS (logit) 100.0 (247.2) 100.0 (66.1) 100.0 (278.7) 100.0 (75.4) 98.0 (314.3) 100.0 (80.3) Table 8: Untargeted white-box attacks: adversarial success rates and average distortion ∆(X, Xadv ) over the test set. Above: MNIST,  = 0.3. Below: CIFAR-10,  = 8. MNIST White-box Model A B C D Single-step Iterative FGS (xent) FGS (logit) IFGS (xent) IFGS (logit) 30.1 (6.1) 30.1 (6.1) 100.0 (4.7) 99.6 (2.7) 29.6 (6.2) 29.4 (6.3) 100.0 (4.6) 98.7 (2.4) 33.2 (6.4) 33.0 (6.4) 100.0 (4.6) 99.8 (3.0) 61.5 (6.4) 60.9 (6.3) 100.0 (4.7) 99.9 (2.0) CIFAR-10 White-box Model Resnet-32 Resnet-28-10 Std.-CNN Single-step FGS (xent) FGS (logit) 23.7 (439.6) 23.5 (436.0) 28.0 (439.6) 27.6 (436.5) 43.8 (439.5) 40.2 (435.6) Iterative IFGS (xent) IFGS (logit) 100.0 (200.4) 100.0 (89.5) 100.0 (215.7) 100.0 (99.0) 99.0 (262.4) 95.0 (127.8) Table 9: Targeted white-box attacks: adversarial success rates and average distortion ∆(X, Xadv ) over the test set. Above: MNIST,  = 0.3. Below: CIFAR-10,  = 8. MNIST White-box Model Model Aadv-0.3 Model Aadv-ens-0.3 Model Aadv-iter-0.3 Single-step Iterative FGS (xent) FGS (logit) IFGS (xent) IFGS (logit) 2.8 (6.1) 2.9 (6.0) 79.1 (4.2) 78.5 (3.1) 6.2 (6.2) 4.6 (6.3) 93.0 (4.1) 96.2 (2.7) 7.0 (6.4) 5.9 (7.5) 10.8 (3.6) 11.0 (3.6) CIFAR-10 White-box Model Resnet-32 adv-8 Resnet-32 adv-ens-8 Resnet-32 adv-iter-8 Single-step FGS (xent) FGS (logit) 1.1 (439.7) 1.5 (438.8) 7.2 (439.7) 6.6 (437.9) 48.3 (438.2) 50.4 (346.6) Iterative IFGS (xent) IFGS (logit) 100.0 (200.6) 100.0 (73.7) 100.0 (201.3) 100.0 (85.3) 54.9 (398.7) 57.3 (252.4) Table 10: Untargeted white-box attacks for models with adversarial training: adversarial success rates and average distortion ∆(X, Xadv ) over the test set. Above: MNIST,  = 0.3. Below: CIFAR10,  = 8. 25
1cs.CV
Collaborative Large-Scale Dense 3D Reconstruction with Online Inter-Agent Pose Optimisation Stuart Golodetz∗ Victor A. Prisacariu Tommaso Cavallari∗ David W. Murray Nicholas A. Lord∗ Philip H. S. Torr arXiv:1801.08361v1 [cs.CV] 25 Jan 2018 Department of Engineering Science, University of Oxford {smg,tommaso,nicklord,victor,dwm,phst}@robots.ox.ac.uk Abstract Reconstructing dense, volumetric models of real-world 3D scenes is important for many tasks, but capturing large scenes can take significant time, and the risk of transient changes to the scene goes up as the capture time increases. These are good reasons to want instead to capture several smaller sub-scenes that can be joined to make the whole scene. Achieving this has traditionally been difficult: joining sub-scenes that may never have been viewed from the same angle requires a high-quality relocaliser that can cope with novel poses, and tracking drift in each sub-scene can prevent them from being joined to make a consistent overall scene. Recent advances in mobile hardware, however, have significantly improved our ability to capture medium-sized sub-scenes with little to no tracking drift. Moreover, highquality regression forest-based relocalisers have recently been made more practical by the introduction of a method to allow them to be trained and used online. In this paper, we leverage these advances to present what to our knowledge is the first system to allow multiple users to collaborate interactively to reconstruct dense, voxel-based models of whole buildings. Using our system, an entire house or lab can be captured and reconstructed in under half an hour using only consumer-grade hardware. Figure 1: A globally consistent collaborative reconstruction of a three-storey house, as produced by our approach. The reconstruction involved relocalising 6 separate sequences from the Priory subset of our dataset. pensating for tracking drift [17, 46, 47, 24, 14]. However, even with the most sophisticated voxel-based approaches [24, 14], capturing the data needed to reconstruct a large scene (e.g. a whole building) can take significant time and planning, and require considerable concentration on the part of the user. Moreover, the risk of transient changes to the scene (e.g. people moving around) goes up as the capture time increases, corrupting the model and forcing the user to restart the capture. There are thus good reasons to want to split the capture into several shorter sequences, which can be captured either over multiple sessions or in parallel (by multiple users) and then joined to make the whole scene. Achieving this has traditionally been difficult: joining the sub-scenes requires the ability to accurately determine the relative transformations between them (the camera relo- 1. Introduction Reconstructing dense, volumetric models of real-world 3D scenes is an important task in computer vision and robotics, with applications in content creation for films, games and augmented reality [23], cultural heritage preservation [48] and building information modelling [32]. Since the seminal KinectFusion work of Newcombe et al. [33], which demonstrated real-time voxel-based reconstruction of a desk-sized scene in real time using only a consumer-grade RGB-D sensor, huge progress has been made in increasing the size of scene we are able to reconstruct [34, 36, 37] and in com∗ S. Golodetz, T. Cavallari and N. Lord assert joint first authorship. 1 Figure 2: More examples of our approach, showing the Flat, House and Lab subsets of our dataset. calisation problem), even though the areas in which they overlap may never have been viewed from the same angles, and tracking drift in each sub-scene can prevent them from being joined to make a consistent overall scene. Recent advances in mobile hardware, however, such as the introduction of augmented reality smartphones that estimate their pose using visual-inertial odometry, have significantly improved our ability to capture medium-sized subscenes with little to no drift. Moreover, in RGB-D relocalisation, keyframe-based relocalisers such as random ferns [20], which were previously widely used for relocalisation in a single-user context but were unable to relocalise from novel poses, have recently been giving way to high-quality regression-based methods such as SCoRe forests [43, 45], driven by recent work [2] that showed how they could be trained and used online. Unlike keyframe-based methods, such approaches have been shown to be much better suited to relocalisation from novel poses, which is critical when aligning sub-scenes captured from different angles. In this paper, we leverage these advances to present what to our knowledge is the first system to allow multiple users to collaborate interactively to reconstruct dense, voxel-based models of whole buildings. Unlike previous multi-agent mapping approaches, our approach is able to reconstruct detailed, globally consistent dense models. Using our system, an entire house or lab can be captured and reconstructed in under half an hour using only consumergrade hardware (see §4.5). We have integrated our approach into the open-source SemanticPaint framework [22, 21], making it easy for existing SemanticPaint and InfiniTAM [37] users to benefit from our work, and constructed a new dataset of sub-scenes to validate our approach, and we make both our code and this dataset available online. Figures 1 and 2 show reconstructions produced by our approach. approaches can be divided into two main categories: 2. Related Work (ii) Centralised approaches, by contrast, can take advantage of the computing power provided by one or more central servers and their ability to communicate with all agents at once to produce detailed, globally consistent maps. For example, Chebrolu et al. [3] described a semi-dense approach based on LSD-SLAM [15] in which monocular Although previous work on multi-agent mapping has not focused on dense reconstruction, multi-agent mapping itself has a rich research history in computer vision and robotics, and several good surveys exist [40, 41]. Existing (i) Decentralised approaches eschew the use of a central server and instead produce a local map of the scene on each agent, often transmitting these local maps between agents when they meet to share knowledge of parts of the scene that individual agents have not yet visited. For example, Cunningham et al. [12] proposed an approach called DDFSAM, in which each robot produces a landmark-based map and shares compressed, timestamped versions of it with neighbouring robots. This was extended by [13], which registered landmark-based maps together using an approach based on Delaunay triangulation and RANSAC. The same lab later proposed DDF-SAM 2.0 [11], which avoids repeated and expensive recreation of the combined neighbourhood map through the use of ‘anti-factors’. Cieslewski et al. [8] presented a sophisticated decentralised collaborative mapping back-end based on distributed version control. Choudhary et al. [6] described an approach that performs decentralised mapping using object-based maps, decreasing the bandwidth required for map sharing, but depending on the existence of pre-trained objects in the scene. Most recently, Cieslewski et al. [7] aimed to minimise the bandwidth each robot uses for inter-agent relocalisation by first establishing which other robots have relevant information, and then only communicating with the best robot found. Decentralised approaches have numerous applications, including search and rescue [30], agricultural robotics [4], planetary exploration [1] and underwater mapping [35, 44], but because of the limited computing power that tends to be available on mobile agents, most existing approaches target robustness to unreliable network connections and mechanical failures, rather than reconstructing detailed scene geometry, limiting their usefulness for tasks like building information modelling or cultural heritage preservation. reads frames Mapping Component 1 updates Voxel Scene Agent 1 Mapping Server ... ... Local Relocaliser accesses scenes ... Mapping Component N Agent N Scene Renderer uses Voxel Scene reads poses from Local Relocaliser reads trajectories from accesses scenes and relocalisers Pose Graph Optimiser ~ f1 1 T2 ~ f3 1T2 ~ T f4 1 2 Trajectory 1 ... Candidate Relocalisation Selector feeds Inter-Agent Relocaliser ~ T f2 1 2 ~ T f5 1 2 operates on Pose Graph ... adds relative transform samples 1T2 gT2 gT1 gT5 1T3 Trajectory N ~ T f3 1 4 considers existing clusters ~ T ~ f2 1T4 ~ f4 1T4 f1 1 4 1T4 gT4 3T4 gT3 3T5 3T6 gT6 Figure 3: The architecture of our system. Individual agents (whether local or remote) track their poses and feed posed RGB-D frames to the mapping server. A separate mapping component is instantiated for each agent, which reconstructs a voxel scene and trains a local relocaliser. Separately, the candidate relocalisation selector repeatedly selects a pose from one of the agents’ trajectories for relocalisation against another scene. The inter-agent relocaliser uses the scene renderer to render synthetic RGB and depth images of the corresponding scene from the selected pose, and passes them to the local relocaliser of the target scene. If a relocalisation succeeds (and is verified, see §3.3.1), a sample of the relative transform between the two scenes is recorded. The relative transform samples for each scene pair are clustered for robustness (see §3.3.2). Whenever the cluster to which a sample is added is sufficiently large, we construct a pose graph by blending the relative poses in the largest clusters, and trigger a pose graph optimisation. The optimised poses are then used for rendering the overall scene. clients produced pose-graph maps of keyframes that were sent to a central server for optimisation. Riazuelo et al. [39] described a cloud-based distributed visual SLAM system inspired by PTAM [26]. Their clients performed tracking only, with the more expensive mapping steps being performed in the cloud. Mohanarajah et al. [31] described another cloud-based approach based on the authors’ Rapyuta robotics platform. The client robots estimated their local poses by running dense, keyframe-based visual odometry on RGB-D images from a PrimeSense camera. The keyframes were then centrally optimised using g2 o [27]. Forster et al. [19] demonstrated centralised, keyframe-based collaborative mapping from micro aerial vehicles (MAVs), each equipped with a monocular camera and an IMU. More recently, Schmuck and Chli [42] have shown how to incorporate server-to-client feedback into a multi-UAV collaborative approach, allowing agents to share information. A few approaches do not fit cleanly into either category. Reid et al. [38] described a distributed approach in which multiple autonomous ground robots were controlled from a centralised ground control station (GCS), but were able to operate independently for a while if the connection to the GCS failed. McDonald et al. [29] described a stereo approach in which a single agent reconstructed a scene over multiple sessions, effectively collaborating with itself over time. Chen et al. [5] described an approach that is initially peer-to-peer, with each robot building a pose graph independently, storing its sensor data, and exchanging information with other robots on rendezvous, but later client-server, with the robots transferring their pose graphs and sensor data to a central server for pose graph optimisation and the building of a coloured point cloud map. Fankhauser et al. [16] described an approach that allowed an Asctec Firefly hexacopter and a quadrupedal ground robot to work together to help the ground robot to navigate safely. Whilst no fixedposition central server was used, the ground robot had significant computing power and effectively played the role of a server, performing bundle adjustment on data received from the hexacopter to maintain a globally consistent map. 3. Our Approach Since we target scenarios such as building information modelling, where hardware failure is a minor concern, we adopt a centralised approach with a number of lightweight mobile clients and a powerful central server (e.g. a laptop or desktop with one or more high-end GPUs): see Figure 3. Each client estimates accurate local poses for a sequence of RGB-D frames (see §3.1) and transmits both the frames and the poses to the central server (see §3.2). The server constructs a sub-scene and trains a relocaliser for each client, and relocalises the sub-scenes from different clients against each other to establish a consistent global map (see §3.3). Our system can run in either interactive or batch mode. In batch mode, all of the sub-scenes are sent across to the server (or simply read directly from disk) before any relocalisation is performed. In interactive mode, the server will start relocalising clients against each other immediately, and new clients can join on the fly to contribute to the map. 3.1. Local Tracking (Client-Side) As mentioned above, each client in our system must estimate accurate local poses for a sequence of RGB-D frames and then transmit both the frames and the poses to the central server. This is non-trivial, since traditional pose estimation approaches, particularly those based purely on visual tracking, have tended to be subject to significant tracking drift, particularly at larger scales. For collaborative mapping, a common solution has been for clients to simply transmit inaccurate local poses and rely on the server to perform global optimisation (e.g. pose graph optimisation between keyframes [38, 5, 31] or bundle adjustment [3, 18, 42]) to achieve a globally consistent map (the optimised poses can then be sent back to the clients if desired [3, 31, 42]). However, (i) such global optimisations do not scale well, limiting the overall size of map that can be constructed, and (ii) the local poses on the clients are only corrected as global optimisations on the server finish, meaning that for much of the time they cannot be fully trusted. In our system, we instead leverage recent developments in consumer-grade augmented reality hardware to place the burden of accurate local pose estimation on the clients, freeing the server to focus on reconstructing a dense global map in real time. In particular, we use a straightforward client that captures the RGB-D images and poses provided by the hardware (based on visual-inertial odometry) and transmits them to the server (see §3.2). This important choice allows us to significantly simplify the design of the server (see §3.3) and reduce server-side memory consumption, making it possible to support more agents and larger global maps. network bandwidth clients use, we only transmit frames that were tracked successfully, and we compress the depth images in PNG format (lossless) and the RGB images in JPG format (lossy). Moreover, to maintain a smooth, interactive user experience on the client, we transmit messages containing the frames (and their accompanying poses) to the server on a separate thread, which iteratively reads a frame message from a pooled queue of reusable messages, compresses it and sends it to the server.1 The main thread writes uncompressed frame messages into this queue based on the current input. We discard messages that would overflow the queue (e.g. when the network is too slow to keep up with the client) to maintain interactivity and bound client memory usage; the way in which this interacts with our compression strategy is evaluated in the supplementary material. At the server end, each client has a handler (running on a separate thread) that maintains a pooled queue of uncompressed frame messages. When a compressed frame message arrives, it is immediately uncompressed and pushed onto the queue (as on the client, we discard messages that would overflow the queue). On the main thread, we run a mapping component for each client (see §3.3), which reads RGB-D frames and their accompanying poses from its client’s queue as necessary and creates a local map. 3.3. Global Mapping (Server-Side) 3.2. RGB-D Frame Transmission (Client → Server) The server has two jobs: (i) constructing a sub-scene and training a relocaliser for each client, and (ii) determining the relative transforms between these sub-scenes to establish a global coordinate system. To achieve the first, a separate mapping component for each client (i) runs the opensource InfiniTAM reconstruction engine [36, 37] on incoming (posed) RGB-D frames to construct a voxel-based map, and (ii) trains a regression forest-based relocaliser for the sub-scene online as per Cavallari et al. [2]. To achieve the second, the server attempts to relocalise synthetic images of one agent’s sub-scene using another agent’s relocaliser to find estimates of the relative transform between the subscenes (see §3.3.1). These samples are clustered in transformation space to help suppress outliers, and a pose graph is constructed and optimised in the background to further refine the relative transforms between the sub-scenes (see §3.3.2). This optimisation is inspired by the single-agent sub-mapping approach of Kähler et al. [24], which showed how to build globally consistent voxel-based models by dividing a scene into small sub-scenes and optimising the relative poses between them. However, we construct a pose graph where each agent is represented by a single node, and the edges denote the relative transforms between different agents’ sub-scenes. This differs from [24], where all sub-scenes came from one agent and no relocalisation was We use TCP between each client and the server to guarantee in-order delivery of RGB-D frames. To minimise the 1 Further details about the design of the pooled queue data structure can be found in the supplementary material. needed to establish the transforms between them. 3.3.1 Inter-Agent Relocalisation To maintain a smooth, interactive experience on the server, we attempt relocalisations between the sub-scenes of different clients on a separate thread and (if available) a separate GPU. The way in which relocalisation attempts are scheduled depends on the mode in which the server is running. In batch mode, relocalisations are attempted only once all of the client sub-scenes have been fully created, at which point they are attempted as quickly as possible (i.e. a new relocalisation attempt is scheduled as soon as the previous attempt finishes). In interactive mode, we relocalise whilst the client sub-scenes are still being reconstructed, but at most once every 20 frames: this is because relocalisers cannot be trained online and used simultaneously, so there is a need to space out relocalisation attempts to allow sufficient time in between attempts for the relocalisers to be trained. To schedule an attempt, we first randomly generate a list of 10 candidate relocalisations. Each candidate k = (a, f ), where f = (b, i), denotes an attempt to relocalise frame i of scene b in scene a’s coordinate system. To balance different pairs of scenes, which may have been reconstructed from varying numbers of frames, we first uniformly sample an (a, b) scene pair from the set of all scene pairs, and then uniformly sample a frame index i from scene b. Each generated candidate k = (a, (b, i)) is then scored via Φ(k) = φnew (k) − φconf (k) − φhomog (k). (1) In this, φnew aims to give a boost to candidates that might connect new nodes to the pose graph, defined as 1 if one of the sub-scenes a and b already has an optimised global pose and the other does not, and 0 otherwise. φconf penalises candidates that can only add a relative transform sample between a pair of sub-scenes that are already confidently relocalised with respect to each other:  φconf (a, (b, i)) = max 0, max  (|c| − N ) . c∈clusters(a,b) (2) Here, N = 2 is an empirically-chosen threshold on the number of relocalisations needed before we become confident that the relative transform between a pair of sub-scenes is correct. φhomog penalises candidates whose frame i has a local pose in scene b that is too close to (within 5cm / 5◦ of) one that has already been tried against scene a; we use a penalty of 5 for poses that are too close, and 0 otherwise. Having scored the candidates, we schedule a relocalisation attempt for a candidate k = (a, f ) with maximum score, where f = (b, i). This will proceed as shown in Figure 4. Let f T̃s denote the pose of frame f in the coordinate system of a sub-scene s. First, we render synthetic RGB and depth raycasts of sub-scene b from the known pose f T̃b , which we will call C̃bf and D̃bf . Then, we try to relocalise them using sub-scene a’s relocaliser to obtain an estimated pose f T̃a for f in a’s coordinate system. To verify this estimated pose, we first render a synthetic depth raycast D̃af of sub-scene a from f T̃a , and compute a masked absolute depth difference image ∆D between D̃af and D̃bf via ( ∆D(x) = D̃af (x) − D̃bf (x) 0 if D̃af (x) > 0 and D̃bf (x) > 0 , (3) otherwise f f where x ranges over PΩ, the domain of D̃a and D̃b . We then compute µ = ( x∈Ω ∆D(x))/|Ω|, and add a relative transform sample a T̃bf = (f T̃a )−1 f T̃b between a and b iff µ < 5 (corresponding to 5cm). The effectiveness of this verification step is evaluated in §4.2. 3.3.2 Inter-Agent Pose Optimisation We incrementally cluster the relative transform samples {a T̃bf } we add for each pair of sub-scenes (a, b) prior to performing pose graph optimisation to suppress the effect of outliers on the final result. After adding each sample, we look to see if the cluster to which the sample has just been added now has ≥ N samples (i.e. the sample has contributed to a confident relative transform): if so, it is worthwhile to run pose graph optimisation, since the pose graph we construct may have changed since the last run. To construct the pose graph, we first compute a binary relation R(a, b) between sub-scenes such that R(a, b) is true iff the largest cluster between a and b has size ≥ N (i.e. there is a confident relative transform between a and b). Next, we compute the reflexive, transitive closure R∗ of this relation, such that R∗ (a, b) is true iff there is a chain (possibly empty) of confident relative transforms between a and b. Finally, we denote the scene corresponding to the first agent as the primary scene, and add to the pose graph a node for each scene that is confidently connected to the primary scene by R∗ . To determine the edges to add to the graph, we filter a list containing each pair of sub-scenes for pairs (i) whose largest cluster has size ≥ N , and (ii) such that both sub-scenes are confidently connected to the primary scene. For each surviving pair of sub-scenes (a, b), we then blend the relative transform samples {a T̃bf } in the largest cluster using dual quaternion blending [25] to form an overall estimate a T̃b of the relative transform from b to a, and add an edge to the graph. By adding only one edge for each scene pair, we keep the pose graph we are optimising small, allowing the optimisation to be run repeatedly in the background to optimise the overall map. The goal of optimising a pose graph G is to find an optimised global pose g T̂a for each scene a for which there is a node in G. To perform the optimisation, we use the approach of Kähler et al. [24], as implemented in the opensource InfiniTAM reconstruction engine [36, 37]. This uses Failed Renderer Verifier Renderer Rejected Figure 4: To relocalise the scene of an agent b against that of another agent a, we first choose an arbitrary frame from b’s trajectory and render synthetic RGB and depth raycasts of b’s scene from the frame’s pose. Then, we try to relocalise them using a’s relocaliser, which either fails, or produces an estimated pose for the frame in a’s coordinate system. If a pose is proposed, we verify it by rendering a synthetic depth raycast of a’s scene from the proposed pose and comparing it to the synthetic depth raycast of b’s scene. We accept the pose iff the two depth raycasts are sufficiently similar (see §3.3.1). Levenberg-Marquardt to minimise the error function X (G) = (a,b)∈edges(G) v(g T̂b−1 g T̂a a T̃b ) 2 , (4) where v(T ) = (q̂(T ), t(T ))> denotes the concatenation of q̂(T ), the three imaginary components of a quaternion representing the rotational part of T , and t(T ), the translational part of T . Implicitly, this optimisation is trying to achieve −1 g T̂a g T̂b = a T̃b for every a and b, i.e. to ensure that the optimised global poses of all the scenes are consistent with the estimated relative poses between them. 4. Experiments We perform both quantitative and qualitative experiments to evaluate our approach. In §4.1, we evaluate the quality of a reconstruction we obtain with our collaborative approach by comparing a variety of measurements made on a combined mesh of the scene with ground-truth measurements made with a laser range finder in the real world. In §4.2, we evaluate the effectiveness of our depth differencebased verification approach (see §3.3.1), showing that our verifier is able to prune large numbers of incorrect relative transforms between the sub-scenes whilst rejecting practically no correct transforms. In §4.3, we demonstrate the scalability of our approach, showing that by using synthetic images for relocalisation and discarding data from the relocalisers we use when it is no longer needed, we can support up to 11 agents on a high-end PC. In §4.4, we evaluate our strategy of using synthetic scene raycasts for relocalisation rather than real images from the original sequences, by testing both approaches on the standard 7-Scenes relocalisation dataset of Shotton et al. [43]. Finally, in §4.5, we time how long our approach takes to produce consistent reconstructions for four different subsets of our dataset. The supplementary material contains further analysis. 4.1. Reconstruction Quality To demonstrate our ability to achieve high-quality collaborative reconstructions, we combined 4 sequences from the Flat subset of our dataset to reconstruct a combined map of a two-bedroom flat (see Figure 5). Since a ground-truth reconstruction of the flat was not available (and we did not have access to a LIDAR scanner with which to obtain one), we validated our reconstruction by comparing a variety of measurements made on our combined map with groundtruth measurements made with a laser range finder (a Bosch Professional GLM 40) in the real world. To achieve this, we first converted the voxel-based maps of the sub-scenes produced by InfiniTAM [36, 37] into mesh-based maps using Marching Cubes [28]. We then applied the relative transforms we had estimated between the sub-scenes during the relocalisation process to these meshes to transform them into a common coordinate system. Finally, we imported the transformed meshes into MeshLab [9], and used its pointto-point measurement tool to make our measurements. As shown in Figure 5, we found that the measurements on our Figure 6: The GPU memory we use during a collaborative reconstruction of the 6 Priory sequences from our dataset. Figure 5: An example of the high-quality reconstructions we can achieve using our collaborative approach. We joined the 4 Flat sequences from our dataset to make a combined map of a two-bedroom flat. The purple lines show the measurements we performed both using a laser range finder and on a combined mesh of our model to validate our approach (the ordering of the numbers is range finder then mesh). reconstructed model were consistently within 5cm of the ground truth, indicating that we are able to achieve reconstructions that correspond relatively well to real-world geometry. Further examples, this time showing collaborative reconstructions of multi-storey houses and a large research lab, can be found in the supplementary material. 4.2. Effectiveness of Depth Difference Verification As mentioned in §3.3.1, we verify each proposed interagent relocalisation of a sub-scene b against a sub-scene a by rendering a synthetic depth image of scene a from the proposed pose and comparing it to the synthetic depth image from scene b that was passed to the relocaliser, masking out pixels that do not have a valid depth in both images. To evaluate the effectiveness of this approach, we first took 8 pairs of sequences {a, b} from our dataset that we were able to successfully relocalise with respect to each other during the normal operation of our approach, and recorded the relative transform between them as the ‘ground truth’ transform for later use. We then attempted to relocalise every frame from scene b using the relocaliser of scene a, and vice-versa. Next, for each frame for which the relocaliser proposed a relative transform, we ran our verification step on the proposed transform, thereby classifying it as either Verified or Rejected. We then compared the proposed transform to the ‘ground truth’ transform, classifying it as Correct if it was within 5◦ and 5cm of the ground truth, and as Incorrect otherwise. Finally, we counted Verified/Correct transforms as true positives (TP), Verified/Incorrect transforms as false positives (FP), and similarly for the true negatives (TN) and false negatives (FN), as shown in Table 1. Our results show that our verifier has an extremely high average recall rate (99.2%), meaning that it largely manages to avoid rejecting correct transforms. It also has a reasonably good average specificity (75.9%), meaning that it is fairly good at pruning the number of incorrect transforms we need to deal with. However, a fairly large number of incorrect transforms still manage to pass the verification stage: as mentioned in §3.3.2, these are dealt with later by clustering the transforms and only making use of the transforms from the largest cluster. The additional effects of this clustering step are shown in the supplementary material. 4.3. Scalability (Batch Mode) To evaluate the scalability of our approach, we perform separate experiments for the batch and interactive modes of our system, since they target slightly different applications. The interactive experiment is in the supplementary material. Our batch mode experiment focuses on the server’s GPU memory usage as the number of agents increases. To evaluate this, we performed a collaborative reconstruction of the 6 Priory sequences from our dataset (these represent a threestory house: see the supplementary material). To maximise the number of agents we were able to handle, we added new sub-scenes to the server one at a time and deleted the training data used by each sub-scene’s relocaliser once it had been fully trained: this limited the maximum memory used by the relocalisers, leaving us bounded primarily by the size of the reconstructed voxel scenes. Figure 6 shows that the final GPU memory we use for each forest-based relocaliser [2] is < 500MB, meaning that we can potentially handle around 24 relocalisers on a 12GB GPU such as an NVIDIA Titan X (the actual number may be slightly less than this due to driver overhead). Moreover, since the relocalisers we use have the same structure for each scene [2], they could potentially be merged to produce a global relocaliser and reduce memory usage still further. The memory used by the voxel scenes is currently the bottleneck preventing the scal- Scene 1 Scene 2 Total Frames Relocalised Frames TP FP TN Verifier Performance FN Precision Recall Specificity f/bathroom2study f/bathroom2study f/kitchen2study f/study2sittingroom f/kitchen2study f/study2sittingroom f/study2sittingroom f/turret2sittingroom 4901 4989 5544 5895 2190 519 1254 1350 517 24 325 555 931 59 317 211 741 436 609 579 1 0 3 5 35.7% 28.9% 50.6% 72.5% 99.8% 100.0% 99.1% 99.1% 44.3% 88.1% 65.8% 73.3% h/frontroom2study h/frontroom2study h/hall2frontbedroom h/hall2frontbedroom h/hall2frontbedroom h/hall2oldkitchen h/hall2oldkitchen h/mainbedroom2studio 7714 8171 7141 6942 1229 1307 653 839 245 373 95 90 90 175 106 131 894 757 451 615 0 2 1 3 73.1% 68.1% 47.3% 40.7% 100.0% 99.5% 99.0% 96.8% 90.9% 81.2% 81.0% 82.4% – – – – – – 52.1% 99.2% 75.9% Average (all scene pairs) Table 1: Evaluating the effectiveness of the depth difference verification we perform on proposed relocalisations between pairs of sub-scenes (see §4.2). We attempt to relocalise every frame of each sub-scene against the other using [2], and record the number of frames that we were able to relocalise, together with statistics on how many correct/incorrect relocalisations were verified/rejected by the verifier. ing of our approach to more agents: currently, each scene takes up just over 1GB of memory, limiting us to around 11 agents on a Titan X (assuming the relocalisers are stored on a secondary GPU). To scale further, we could reduce the memory used by meshing each scene with Marching Cubes [28] and discarding the voxel maps. 4.4. Relocalisation from Synthetic Images As per §3.3.1, we relocalise the scenes of different agents against each other using synthetic images, rather than the real RGB-D frames originally captured by the agents. This avoids the prohibitive memory cost of storing all RGB-D frames acquired by each agent in RAM (easily hundreds of MBs per agent). However, we might expect using synthetic images to lower relocalisation performance, since we train the relocalisers for each scene using the real input frames. To verify that this is not a problem, we compared the results we are able to obtain using synthetic images to results obtained using the approach of Cavallari et al. [2] with real images on the standard 7-Scenes dataset [43]. Unlike [2], who used at most 10 modes in each leaf of their regression forests, we used at most 50 modes, since we found that this gave better results (in both cases). To test our synthetic approach, we first reconstructed each 7-Scenes sequence from the real training images as normal, then rendered synthetic frames from the testing poses, rather than using the testing images in the dataset. As Table 2 shows, our results using synthetic images were at least as good as, and in most cases actually higher than, the results using the real images, verifying that using synthetic images does not decrease relocalisation performance in practice. This is likely due to the fact that by rendering synthetic images from the reconstructed scene, we implicitly remove noise from the frames to be relocalised, improving pose estimation accuracy. 4.5. Timings To evaluate how long it takes to produce consistent reconstructions using our approach, we computed the aver- Sequence Real Images Synthetic Images Chess Fire Heads Office Pumpkin RedKitchen Stairs 99.85% 99.20% 100.00% 99.80% 90.10% 91.34% 78.30% 100.00% 98.85% 100.00% 99.95% 93.00% 99.98% 88.10% Table 2: Comparing relocalisation results obtained by rendering synthetic images of the scenes in the 7-Scenes dataset [43] from the test poses to those obtained using the real test images, by adapting a regression forest pre-trained on Office [2]. Percentages denote proportions of test frames with ≤ 5cm translation error and ≤ 5◦ angular error. Flat Priory House Lab # Sequences Longest Sequence: # Frames Longest Sequence: Time (s) Average Mapping Time (s) 4 3079 615.8 15.8 6 1640 328.0 38.4 4 4372 874.4 107.4 4 3188 637.6 272.0 Average Total Time (s) 631.6 366.4 981.8 909.6 Table 3: The times taken to collaboratively reconstruct four different subsets of our dataset (see §4.5). age times taken to collaboratively reconstruct four different subsets of our dataset (see Table 3). We computed the time taken to capture the sequences in each subset as 51 times the length of the longest sequence, assuming parallel capturing at 5Hz. The average mapping time is the time taken to relocalise the agents against each other and compute optimised global poses for their maps. To account for the random selection of frames to relocalise, we globally mapped each subset 5 times and reported the average time in the table. The average total time is from the start of the capturing process to the output of a globally consistent map: this was under half an hour for all subsets we tested. 5. Conclusion In this paper, we have shown how to collaboratively reconstruct dense, volumetric models of 3D scenes using multiple agents. Existing collaborative mapping approaches have traditionally suffered from an inability to trust the local poses produced by their mobile agents, forcing them to perform costly global optimisations (e.g. on a server) to ensure a consistent map, and limiting their ability to perform dense, volumetric mapping collaboratively. By leveraging recent mobile hardware advances to construct rigid local sub-scenes that do not need further refinement, and joining them using a state-of-the-art regressionbased relocaliser, we avoid expensive global optimisations, opting only to refine the relative poses between individual agents’ overall maps. Our system allows multiple users to collaboratively reconstruct consistent dense models of entire buildings in under half an hour using only consumergrade hardware, making it easier than ever before for users to capture detailed 3D scene models at scale. Acknowledgements This work was supported by Innovate UK/CCAV project #103700 (StreetWise), the EPSRC, ERC grant ERC2012-AdG 321162-HELIOS, EPSRC grant Seebibyte EP/M013774/1 and EPSRC/MURI grant EP/N019474/1. We would also like to thank Manar Marzouk and Maria Anastasia Tsitsigkou for their help with the collaborative dataset collection. S UPPLEMENTARY M ATERIALS A. Our Dataset Our dataset comprises 4 different subsets – Flat, House, Priory and Lab – each containing a number of different sequences that can be successfully relocalised against each other. The name of each sequence is prefixed with a simple identifier indicating the subset to which it belongs: f/ for Flat, h/ for House, p/ for Priory and l/ for Lab. Basic information about the sequences in each subset, their frame counts and capture times can be found in Table 4. Illustrations of the sequences and how they fit together to make the combined scenes are shown in Figures 7 to 10. Each sequence was captured at 5Hz using an Asus ZenFone AR augmented reality smartphone, which produces depth images at a resolution of 224 × 172, and colour images at a resolution of 1920 × 1080. To improve the speed at which we were able to load sequences from disk, we resized the colour images down to 480 × 270 (i.e. 25% size) to produce the collaborative reconstructions we show in the paper, but we nevertheless provide both the original and resized images as part of the dataset. We also provide the calibration parameters for the depth and colour sensors, the 6D poses for both sensors at each frame, and the optimised global pose produced for each sequence when running our approach on all of the sequences in each subset. Finally, we provide a pre-built mesh of each sequence, pre-transformed by its optimised global pose to allow the sequences from each subset to be loaded into MeshLab [9] or CloudCompare [10] with a common coordinate system. B. Additional Experiments In this section, we describe some additional experiments that we performed to evaluate our method. In §B.1, we evaluate the extent to which our approach of incrementally clustering the relative transform samples between different pairs of sub-scenes is able to remove outliers and find consistent relocalisations between the sub-scenes. In §B.2, we evaluate the scalability of our approach for interactive collaborative reconstruction. Finally, in §B.3, we evaluate the impact of frame compression on the final reconstruction quality we are able to achieve on the server. We show that with compression enabled, we can maintain real-time mapping whilst discarding fewer frames, allowing us to reconstruct higherquality models. Sequence Frame Count Capture Time (s) f/bathroom2study f/kitchen2study f/study2sittingroom f/turret2sittingroom 2173 2728 2816 3079 434.6 545.6 563.2 615.8 h/frontroom2study h/hall2frontbedroom h/hall2oldkitchen h/mainbedroom2studio 4372 3342 3798 3600 874.4 668.4 759.6 720.0 p/bath2office p/bed2office p/dining2guest p/guest2bath p/kitchen2dining p/living2dining 1319 1518 1232 1315 1142 1640 263.8 303.6 246.4 263.0 228.4 328.0 l/atrium l/firstfloor l/groundfloor l/secondfloor 1709 3188 1985 2146 341.8 637.6 397.0 429.2 Table 4: The sequences in each subset of our dataset. B.1. Effectiveness of Relative Transform Clustering As described in §3.3.2 of the main paper, we incrementally cluster the relative transform samples {a T̃bf } we add for each pair of sub-scenes (a, b) prior to performing pose graph optimisation to suppress the effect of outliers on the final result. This is achieved by checking each new relative transform sample to see if there is an existing cluster to which it can be added (we specify that this is possible iff it is within 20◦ and 10cm of any existing relative transform in the cluster). If so, we add the sample to the first such cluster we find; if not, we create a new cluster for it. To evaluate the effectiveness of this approach, we took the same 8 pairs of sequences {a, b} we used to evaluate our depth difference verifier in §4.2 of the main paper, and again relocalised every frame from scene b using the relocaliser of scene a, and vice-versa. We then counted the number of relative transform samples that were added during this process, and examined the clusters into which they had been collected. In particular, we compared the size of the largest cluster in each case (i.e. the largest ‘correct’ cluster) with the size of the largest cluster whose blended transform (obtained by blending all of the relative transforms in the cluster using dual quaternion blending [25]) was not within 20◦ and 10cm of the blended transform of the correct cluster. We refer to this latter cluster as the largest ‘incorrect’ cluster. The difference between these two sizes gave us a measure of the safety margin of our approach in each case, i.e. Figure 7: A collaborative reconstruction of the 4 Flat sequences in our dataset (f/turret2sittingroom, f/study2sittingroom, f/kitchen2study and f/bathroom2study). These collectively represent a single-storey, two-bedroom flat. The mono-colour images show the individual sub-scenes we reconstruct from each sequence; the other images show the combined map. Figure 8: A collaborative reconstruction of the 4 House sequences in our dataset (h/frontroom2study, h/hall2frontbedroom, h/hall2oldkitchen and h/mainbedroom2studio). These collectively represent a two-storey, four-bedroom house. The monocolour images show the individual sub-scenes we reconstruct from each sequence; the other images show the combined map. Figure 9: A collaborative reconstruction of the 6 Priory sequences in our dataset (p/bath2office, p/bed2office, p/guest2bath, p/dining2guest, p/kitchen2dining and p/living2dining). These collectively represent a three-storey house. The mono-colour images show the individual sub-scenes we reconstruct from each sequence; the other images show the combined map. the number of consistent erroneous samples that would need to have been added to the largest incorrect cluster to cause it to have been chosen instead of the correct cluster. As our results in Table 5 show, for most pairs of scenes the size of the correct cluster was significantly larger than the size of the largest incorrect cluster, indicating that in practice we are very likely to accumulate ≥ N samples from the correct cluster and become confident about it long before we accumulate ≥ N samples from an incorrect cluster. For two pairs of scenes (f/bathroom2study & f/study2sittingroom, and h/hall2frontbedroom & h/mainbedroom2studio), the safety margins were much lower than in the other cases. However, in both cases, the pairs of scenes in question have comparatively low overlap (see the green and yellow sequences in both Figures 7 and 8). Moreover, whilst the blended transforms of the correct cluster and the largest incorrect cluster in each case were not within 20◦ and 10cm of each other, a manual inspection of the relevant transforms showed that they were still comparatively close (within 50◦ and 50cm), meaning that the safety margin before hitting a cluster with a grossly incorrect blended transform is in practice somewhat higher in each case. B.2. Scalability (Interactive Mode) To evaluate the scalability of our approach in interactive mode, we time a collaborative reconstruction involving a server and three different clients: (i) a desktop using a Kinect camera and a relocaliser based on random ferns [20], connected to the server over a wired network, (ii) a laptop using an Orbbec Astra S camera and a regression forest relocaliser [2], connected to the server over WiFi, and (iii) a local process on the same machine as the server that reads posed RGB-D frames from disk. The frame processing times on the server and each client over the course of this experiment, together with a detailed description of what is happening at each stage during the process, are shown in Figure 11. As might be expected, the time taken per frame on each client is unaffected by the number of other agents connected to the server, allowing local reconstruction to remain interactive even when many clients are connected. Moreover, the time taken per frame on the server increases by only a small amount for each additional agent added, allowing the server user to continue to view the collaborative reconstruction interactively from different angles even when multiple different clients are connected. With a large number of clients connected, the Figure 10: A collaborative reconstruction of the 4 Lab sequences in our dataset (l/groundfloor, l/firstfloor, l/atrium and l/secondfloor). These collectively represent a three-storey research lab. The mono-colour images show the individual subscenes we reconstruct from each sequence; the other images show the combined map. Scene 1 Scene 2 Total Frames Samples Added Correct Cluster Largest Incorrect Cluster Safety Margin f/bathroom2study f/bathroom2study f/kitchen2study f/study2sittingroom f/kitchen2study f/study2sittingroom f/study2sittingroom f/turret2sittingroom 4901 4989 5544 5895 1472 82 589 765 1317 (89.5%) 21 (25.6%) 506 (85.9%) 759 (99.2%) 18 (1.2%) 18 (22.0%) 5 (0.8%) 2 (0.3%) 1299 3 501 757 h/frontroom2study h/frontroom2study h/hall2frontbedroom h/hall2frontbedroom h/hall2frontbedroom h/hall2oldkitchen h/hall2oldkitchen h/mainbedroom2studio 7714 8171 7141 6942 360 592 242 260 249 (69.2%) 442 (74.7%) 192 (79.3%) 102 (39.2%) 16 (4.4%) 10 (1.7%) 12 (5.0%) 69 (26.5%) 233 432 180 33 Table 5: Evaluating the extent to which our approach of incrementally clustering the relative transform samples between different pairs of sub-scenes is able to remove outliers and find consistent relocalisations between the sub-scenes. We attempt to relocalise every frame of each sub-scene against the other using [2], and record the total number of samples that were added (equal to the number of relocalised frames that passed depth difference verification), and the sizes of the correct cluster and the largest incorrect cluster produced by our method in each case (together with the percentages of the samples added these sizes represent). The safety margin for each scene pair refers to the number of consistent erroneous samples that would need to have been added to the largest incorrect cluster to cause it to have been chosen instead of the correct cluster. server currently becomes less interactive because the mapping components for each client are being run sequentially: this is something we plan to mitigate in the future by running all of the mapping components in parallel. B.3. Frame Compression To demonstrate the impact that compressing the RGB-D frames we transmit over the network has on the final reconstruction quality on the server, we used CloudCompare [10] to compare a locally-reconstructed reference model of an office with two reconstructions performed from frame Server allocates scene 3 Collaboration starts Collaboration/rendering continues Client 2 relocalises Figure 11: An experiment showing how the frame processing times on the server and each of three individual clients change over the course of a collaborative reconstruction using our system. Note that we smooth these times over a 100-frame window to make the graph slightly easier to read. Prior to the start of the experiment, the server allocates a mapping component for the first client and waits for it to connect. The experiment starts when the first client (a desktop using a Kinect camera and a relocaliser based on random ferns [20]) connects to the server over a wired network. Reconstruction begins when the client starts sending RGB-D frames to the server. Subsequently, a second client (a laptop using an Orbbec Astra S camera and a regression forest relocaliser [2]) connects to the server over WiFi. This causes the server to allocate a mapping component for the second client and start reconstructing a local scene based on the RGB-D frames that it sends across. In parallel, the server starts trying to relocalise the local scenes of the two clients against each other on a separate thread. Around half way through the experiment, the tracking on the second client fails, triggering a local relocalisation that causes a spike in processing time on the client. Towards the end of the experiment, a third client (this time a local one on the same machine as the server that reads posed RGB-D frames from disk) connects, and the server again allocates a mapping component for it. The processing time on this client is lower because it does not need to perform camera tracking. At this point, the server is trying to relocalise all three local scenes against each other. Finally, all three clients disconnect, and reconstruction stops. However, inter-agent relocalisation continues on the server until a consistent reconstruction is achieved, and the server continues rendering all three local scenes to allow the user to visualise what is happening. data sent over a WiFi connection, one with frame compression disabled and the other with it enabled (see Figure 12). We measured the bandwidth of this WiFi connection to be roughly 8 Mbits/s, which is less than the roughly 25 Mbits/s that we needed to transmit the same sequence in compressed form without loss over a wired connection, and much less than the roughly 250 Mbits/s that would have been needed to transmit the sequence without loss uncompressed. In other words, with compression enabled, we are able to transmit around 1 in 3 of the frames in the sequence over WiFi whilst maintaining real-time rates; without compression, this drops to more than 1 in 30. As Figure 12 shows, this has a significant effect on the resulting reconstruction quality: with compression disabled (b), we lose some parts of the map completely and have a higher error rate across the map as a whole; with compression enabled (c), we manage to reconstruct more or less the entire map, and the error rate is greatly reduced. C. Additional Implementation Details In this section, we describe some implementation details that might be relevant for anyone wanting to reimplement our approach, namely the inner workings of the pooled queue data structure mentioned in §3.2 of the main paper, and the way in which we can render a global map of all of the sub-scenes we have reconstructed. These details can be skipped by more casual readers. (a) Reference Model (b) Reference vs. Uncompressed (c) Reference vs. Compressed Figure 12: An example showing the impact of frame compression on the reconstruction quality we are able to achieve on the server whilst maintaining real-time frame rates by discarding some frames: (a) a locally-reconstructed reference model of an office; (b) the differences between the reference model and a model reconstructed from the frames that we managed to transmit without using compression; (c) the differences between the reference model and a model reconstructed from the frames that we managed to transmit with compression. The comparisons were made using CloudCompare [10]. The errors range from blue = 0cm to red ≥ 5cm (or missing). With compression enabled, we are forced to discard far fewer frames, allowing us to achieve a much lower error rate with respect to the reference model. C.1. Pooled Queue Data Structure A pooled queue is a data structure that pairs a normal queue Q of objects of type T with a pool P of reusable T objects, with the underlying goal of minimising memory reallocations for performance reasons. Normal queues conventionally support the following range of operations: empty checks whether the queue is empty, peek gets the object (if any) at the front of the queue, pop removes the object (if any) at the front of the queue, push adds an object to the back of the queue, and size gets the number of objects on the queue. Pooled queues support the same range of operations, but their implementations of push and pop are necessarily complicated by interactions with the pool. The pop operation is the more straightforward of the two: this simply removes the object (if any) at the front of the queue and returns it to the pool (with appropriate synchronisation in a multi-threaded context). The push operation is more complicated, and we divide it into two parts: begin push and end push. The begin push operation first checks whether a reusable object is currently available from the pool. If so, it removes it from the pool and returns a push handler encapsulating the object to the caller. The caller then modifies the object, after which the push handler calls end push to actually push the object onto the queue. If a reusable object is not available from the pool when begin push is called, we have a range of options, which are available as policies in our implementation: (i) discard the object we are trying to push onto the queue, (ii) grow the pool by allocating a new object that can then be reused, (iii) remove a random element from the queue and return it to the pool so that it can be reused, or (iv) wait for another thread to pop an object from the queue and return it to the pool. In practice, we found the discard strategy to work best for our approach: growing the pool has the disadvantage that the memory usage can grow without bound over time, waiting makes the client and/or server (as the case may be) less interactive, and removing a random element from the queue functions much like discarding but with different frames. C.2. Global Map Rendering To render a global map of all of the sub-scenes we have reconstructed from a global pose Tg ∈ SE 3 , we first compute (for each agent a) the corresponding local pose Ta in a’s local coordinate system: Ta = Tg g T̂a (5) Using the standard raycasting approach for a voxel-based scene [37], we then render synthetic colour and depth images (at 1280×960 resolution) for each agent from the local pose we have computed for it, which we call Ca and Da respectively. Finally, we set the colour of each pixel in the output image O based on per-pixel depth testing between the agents, i.e. O(x) = Ca∗ (x), where a∗ = argmin Da (x), a where x ranges over the domain of O. (6) References [1] A. Bajpai, G. Burroughes, A. Shaukat, and Y. Gao. Planetary Monocular Simultaneous Localization and Mapping. JFR, 33(2):229–242, 2016. 2 [2] T. Cavallari, S. Golodetz*, N. A. Lord*, J. Valentin, L. D. Stefano, and P. H. S. Torr. On-the-Fly Adaptation of Regression Forests for Online Camera Relocalisation. In CVPR, 2017. 2, 4, 7, 8, 12, 13, 14 [3] N. Chebrolu, D. Marquez-Gamez, and P. Martinet. Collaborative Visual SLAM Framework for a Multi-Robot System. In PPNIV, 2015. 2, 4 [4] F. A. A. Cheein and R. Carelli. Agricultural Robotics: Unmanned Robotic Service Units in Agricultural Tasks. IEEE Industrial Electronics Magazine, 7(3), 2013. 2 [5] H. Chen, J. Zhong, Y. Fu, and Y. Lou. Pose-graph Based 3D Map Fusion with Distributed Robot System. In ROBIO, 2014. 3, 4 [6] S. Choudhary, L. Carlone, C. Nieto, J. Rogers, H. I. Christensen, and F. Dellaert. Distributed Mapping with Privacy and Communication Constraints: Lightweight Algorithms and Object-based Models. arXiv preprint arXiv:1702.03435, 2017. 2 [7] T. Cieslewski, S. Choudhary, and D. Scaramuzza. DataEfficient Decentralized Visual SLAM. arXiv preprint arXiv:1710.05772, 2017. 2 [8] T. Cieslewski, S. Lynen, M. Dymczyk, S. Magnenat, and R. Siegwart. Map API – Scalable Decentralized Map Building for Robots. In ICRA, pages 6241–6247, 2015. 2 [9] P. Cignoni, M. Callieri, M. Corsini, M. Dellepiane, F. Ganovelli, and G. Ranzuglia. MeshLab: an Open-Source Mesh Processing Tool. In Eurographics Italian Chapter Conference, pages 129–136, 2008. 6, 10 [10] CloudCompare v2.9 (GPL software), 2017. Retrieved from http://www.danielgm.net/cc. 10, 13, 15 [11] A. Cunningham, V. Indelman, and F. Dellaert. DDF-SAM 2.0: Consistent Distributed Smoothing and Mapping. In ICRA, pages 5220–5227, 2013. 2 [12] A. Cunningham, M. Paluri, and F. Dellaert. DDF-SAM: Fully Distributed SLAM using Constrained Factor Graphs. In IROS, pages 3025–3030, 2010. 2 [13] A. Cunningham, K. M. Wurm, W. Burgard, and F. Dellaert. Fully Distributed Scalable Smoothing and Mapping with Robust Multi-robot Data Association. In ICRA, pages 1093– 1100, 2012. 2 [14] A. Dai, M. Nießner, M. Zollhöfer, S. Izadi, and C. Theobalt. BundleFusion: Real-time Globally Consistent 3D Reconstruction using Online Surface Re-integration. TOG, 36(3):24, 2017. 1 [15] J. Engel, T. Schöps, and D. Cremers. LSD-SLAM: LargeScale Direct Monocular SLAM. In ECCV, pages 834–849, 2014. 2 [16] P. Fankhauser, M. Bloesch, P. Krüsi, R. Diethelm, M. Wermelinger, T. Schneider, M. Dymczyk, M. Hutter, and R. Siegwart. Collaborative Navigation for Flying and Walking Robots. In IROS, pages 2859–2866, 2016. 3 [17] N. Fioraio, J. Taylor, A. Fitzgibbon, L. D. Stefano, and S. Izadi. Large-Scale and Drift-Free Surface Reconstruction Using Online Subvolume Registration. In CVPR, pages 4475–4483, 2015. 1 [18] P. Fleck, C. Arth, C. Pirchheim, and D. Schmalstieg. Tracking and Mapping with a Swarm of Heterogeneous Clients. In ISMAR, 2015. 4 [19] C. Forster, S. Lynen, L. Kneip, and D. Scaramuzza. Collaborative Monocular SLAM with Multiple Micro Aerial Vehicles. In IROS, pages 3962–3970, 2013. 3 [20] B. Glocker, J. Shotton, A. Criminisi, and S. Izadi. RealTime RGB-D Camera Relocalization via Randomized Ferns for Keyframe Encoding. TVCG, 21(5):571–583, May 2015. 2, 12, 14 [21] S. Golodetz*, M. Sapienza*, J. P. C. Valentin, V. Vineet, M.M. Cheng, A. Arnab, V. A. Prisacariu, O. Kähler, C. Y. Ren, D. W. Murray, S. Izadi, and P. H. S. Torr. SemanticPaint: A Framework for the Interactive Segmentation of 3D Scenes. Technical Report TVG-2015-1, Department of Engineering Science, University of Oxford, October 2015. Released as arXiv e-print 1510.03727. 2 [22] S. Golodetz*, M. Sapienza*, J. P. C. Valentin, V. Vineet, M.M. Cheng, V. A. Prisacariu, O. Kähler, C. Y. Ren, A. Arnab, S. L. Hicks, D. W. Murray, S. Izadi, and P. H. S. Torr. SemanticPaint: Interactive Segmentation and Learning of 3D Worlds. In ACM SIGGRAPH Emerging Technologies, page 22, 2015. 2 [23] J. Huang, A. Dai, L. Guibas, and M. Niessner. 3DLite: Towards Commodity 3D Scanning for Content Creation. TOG, 2017. 1 [24] O. Kähler, V. A. Prisacariu, and D. W. Murray. Real-Time Large-Scale Dense 3D Reconstruction with Loop Closure. In ECCV, pages 500–516, 2016. 1, 4, 5 [25] L. Kavan, S. Collins, C. O’Sullivan, and J. Zara. Dual Quaternions for Rigid Transformation Blending. Technical Report TCD-CS-2006-46, Trinity College Dublin, 2006. 5, 10 [26] G. Klein and D. Murray. Parallel Tracking and Mapping for Small AR Workspaces. In ISMAR, pages 225–234, 2007. 3 [27] R. Kümmerle, G. Grisetti, H. Strasdat, K. Konolige, and W. Burgard. g2 o: A General Framework for Graph Optimization. In ICRA, pages 3607–3613, 2011. 3 [28] W. E. Lorensen and H. E. Cline. Marching Cubes: A High Resolution 3D Surface Construction Algorithm. ACM SIGGRAPH Computer Graphics, 21(4):163–169, 1987. 6, 8 [29] J. McDonald, M. Kaess, C. Cadena, J. Neira, and J. J. Leonard. Real-time 6-DOF multi-session visual SLAM over large-scale environments. RAS, 61(10):1144–1158, 2013. 3 [30] N. Michael, S. Shen, K. Mohta, Y. Mulgaonkar, V. Kumar, K. Nagatani, Y. Okada, S. Kiribayashi, K. Otake, K. Yoshida, K. Ohno, E. Takeuchi, and S. Tadokoro. Collaborative Mapping of an Earthquake-Damaged Building via Ground and Aerial Robots. JFR, 29(5):832–841, 2012. 2 [31] G. Mohanarajah, V. Usenko, M. Singh, R. D’Andrea, and M. Waibel. Cloud-based Collaborative 3D Mapping in RealTime with Low-Cost Robots. TASE, 12(2):423–431, 2015. 3, 4 [32] S. Murali, P. Speciale, M. R. Oswald, and M. Pollefeys. Indoor Scan2BIM: Building Information Models of House Interiors. In IROS, 2017. 1 [33] R. A. Newcombe, S. Izadi, O. Hilliges, D. Molyneaux, D. Kim, A. J. Davison, P. Kohli, J. Shotton, S. Hodges, and A. Fitzgibbon. KinectFusion: Real-Time Dense Surface Mapping and Tracking. In ISMAR, pages 127–136, 2011. 1 [34] M. Nießner, M. Zollhöfer, S. Izadi, and M. Stamminger. Real-time 3D Reconstruction at Scale using Voxel Hashing. TOG, 32(6):169, 2013. 1 [35] L. Paull, G. Huang, M. Seto, and J. J. Leonard. Communication-Constrained Multi-UAV Cooperative SLAM. In ICRA, pages 509–516, 2015. 2 [36] V. A. Prisacariu, O. Kähler, M. M. Cheng, C. Y. Ren, J. Valentin, P. H. S. Torr, I. D. Reid, and D. W. Murray. A Framework for the Volumetric Integration of Depth Images. arXiv preprint arXiv:1410.0925, 2014. 1, 4, 5, 6 [37] V. A. Prisacariu, O. Kähler, S. Golodetz, M. Sapienza, T. Cavallari, P. H. S. Torr, and D. W. Murray. InfiniTAM v3: A Framework for Large-Scale 3D Reconstruction with Loop Closure. arXiv preprint arXiv:1708.00783v1, 2017. 1, 2, 4, 5, 6, 15 [38] R. Reid, A. Cann, C. Meiklejohn, L. Poli, A. Boeing, and T. Braunl. Cooperative Multi-Robot Navigation, Exploration, Mapping and Object Detection with ROS. In IV, 2013. 3, 4 [39] L. Riazuelo, J. Civera, and J. M. M. Montiel. C2 TAM: A Cloud framework for cooperative tracking and mapping. RAS, 62(4):401–413, 2014. 3 [40] W. Rone and P. Ben-Tzvi. Mapping, localization and motion planning in mobile multi-robotic systems. Robotica, 31:1– 23, 2013. 2 [41] S. Saeedi, M. Trentini, M. Seto, and H. Li. Multiple-robot Simultaneous Localization and Mapping – A Review. JFR, 33(1):3–46, 2016. 2 [42] P. Schmuck and M. Chli. Multi-UAV Collaborative Monocular SLAM. In ICRA, pages 3863–3870, 2017. 3, 4 [43] J. Shotton, B. Glocker, C. Zach, S. Izadi, A. Criminisi, and A. Fitzgibbon. Scene Coordinate Regression Forests for Camera Relocalization in RGB-D Images. In CVPR, pages 2930–2937, 2013. 2, 6, 8 [44] L. Silveira, F. Guth, P. Drews-Jr, P. Ballester, M. Machado, F. Codevilla, N. Duarte-Filho, and S. Botelho. An Opensource Bio-inspired Solution to Underwater SLAM. IFACPapersOnLine, 48(2):212–217, 2015. 2 [45] J. Valentin, M. Nießner, J. Shotton, A. Fitzgibbon, S. Izadi, and P. Torr. Exploiting Uncertainty in Regression Forests for Accurate Camera Relocalization. In CVPR, pages 4400– 4408, 2015. 2 [46] T. Whelan, M. Kaess, H. Johannsson, M. Fallon, J. J. Leonard, and J. McDonald. Real-time large scale dense RGB-D SLAM with volumetric fusion. IJRR, 34(4-5):598– 626, 2015. 1 [47] T. Whelan, S. Leutenegger, R. F. Salas-Moreno, B. Glocker, and A. J. Davison. ElasticFusion: Dense SLAM Without A Pose Graph. In RSS, 2015. 1 [48] M. Zollhöfer, C. Siegl, M. Vetter, B. Dreyer, M. Stamminger, S. Aybek, and F. Bauer. Low-Cost Real-Time 3D Reconstruction of Large-Scale Excavation Sites. JOCCH, 9(1), 2016. 1
1cs.CV
EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS FRANK HIMSTEDT AND PETER SYMONDS arXiv:1510.02370v1 [math.RT] 8 Oct 2015 Abstract. We prove a recursive formula for the exterior and symmetric powers of modules for a cyclic 2-group. This makes computation straightforward. Previously, a complete description was only known for cyclic groups of prime order. 1. Introduction The aim of this paper is to provide a recursive procedure for calculating the exterior and symmetric powers of a modular representation of a cyclic 2-group. Let G ∼ = C2n be a cyclic n n group of order 2 and k a field of characteristic 2. Recall that there are 2 indecomposable kG-modules V1 , V2 , . . . , V2n for which dim Vr = r. Theorem 1.1. For all n ≥ 1, r ≥ 0 and 0 ≤ s ≤ 2n−1 we have M i+j Λr (V2n−1 +s ) ∼ Ω2n (Λi (Vs ) ⊗k Λj (V2n−1 −s )) ⊕ tV2n , = i,j≥0 2i+j=r where t is a non-negative integer chosen so that both sides have the same dimension. Here Ω2n is the syzygy or Heller operator over C2n , so Ω2n Vs = V2n −s for 1 ≤ s ≤ 2n . The group action on V1 , . . . , V2n−1 factors through C2n−1 so that exterior powers of these modules can be computed by applying the formula for this smaller group. In particular, one can determine the exterior powers on the right hand side of the formula in this way. We also show that there is a simple recursive procedure for calculating tensor products. Since Λ(A ⊕ B) ∼ = Λ(A) ⊗ Λ(B), we obtain a complete recursive procedure for calculating exterior powers of all possible modules. It is sufficiently efficient that it is easy to calculate even by hand far beyond the range that was previously attainable by machine computation. For symmetric powers we use the following result from [21]. Theorem 1.2. For all n ≥ 1, r ≥ 0 and 0 ≤ s ≤ 2n−1 we have ′ ′ S r (V2n−1 +s ) ∼ =ind Ωr n Λr (V2n−1 −s ), 2 where 0 ≤ r ′ < 2n and r ′ ≡ r (mod 2n ). Here the symbol ∼ =ind means up to direct summands induced from subgroups H G. Thus a knowledge of the exterior powers determines the symmetric powers up to induced summands. In fact it is shown in [21] how such a formula determines the symmetric powers completely, using a recursive procedure. This project was supported by the Deutsche Forschungsgemeinschaft under the project KE 964/1-1 (“Invariantentheorie endlicher und algebraischer Gruppen”). 1 EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 2 Formulas for the exterior and symmetric powers of a module for a cyclic group of prime order p were given by Almkvist and Fossum [1] and Renaud [19]. These were extended to cyclic p-groups by Hughes and Kemper [14] provided that the power is at most p − 1. A formula for Λ2 in the case of cyclic 2-groups was given by Gow and Laffey [11]. Also Kouwenhoven [15] obtained important results on exterior powers of modules for cyclic pgroups, including recursion formulas for Λ(Vq±1 ) where q is a power of p. For p = 2 these formulas are special cases or direct consequences of Theorem 1.1, so we obtain independent proofs for some of the results in [11, 15]. Our strategy is to consider Λ(V2n−1 +s ) as the quotient of S(V2n−1 +s ) by the ideal generated by the squares of elements of V2n−1 +s . It turns out that we need to consider an intermediate ring S̃(V2n−1 +s ), in which we only quotient out the squares of the elements of Vs ⊆ V2n−1 +s . We show that S̃ r (V2n−1 +s ) ∼ =ind Λr (V2n−1 +s ) for r < 2n . But S̃(V2n−1 +s ) can be resolved by the Koszul complex over S(V2n−1 +s ) on the squares of the elements of a basis for Vs . We show that this Koszul complex is separated in the sense of [21], that is that the image of a boundary map is contained in a projective submodule. This leads to the formula M Ωi2n (Λi (Vs ) ⊗k S j (V2n−1 +s )), S̃ r (V2n−1 +s ) ∼ =proj 2i+j=r where the symbol ∼ =proj means up to projective summands. Using Theorem 1.2, the right hand side is easily seen to be equal to the right hand side of the formula in Theorem 1.1 modulo induced summands. This yields the formula of Theorem 1.1 modulo induced summands. The strengthening to an equality modulo just projective summands is a formal inductive argument. We would like to thank Dikran Karagueuzian for the calculations that were very helpful in discovering the formula of Theorem 1.1. 2. Koszul Complexes Let G be a finite group, H a subgroup of G and k a field of characteristic p > 0. All tensor products will be over k if not otherwise specified. We recall some general facts about chain complexes of kG-modules from [21, Section 3]. Definition 2.1. ([21, Definition 3.2]) A chain complex C∗ of kG-modules is called: (a) acyclic if it is 0 in negative degrees and it only has homology in degree 0; (b) weakly induced from H if each module is induced from H, and weakly induced from H except in degrees I if each Ci , i 6∈ I, is induced from H; (c) separated at Ci if Im(di+1 ) → Ci factors through a projective kG-module; (d) separated if it is separated at each Ci . Write Bi for Im(di+1 ) ⊆ Ci . If the inclusion Bi ֒→ Ci factors through a projective then it factors through the injective hull of Bi , call it Pi (injective is equivalent to projective for modular representations), and Pi ֒→ Ci is injective since it is so on the socle. Thus we can write Ci = Pi ⊕ Ci′ and Bi ⊆ Pi . Lemma 2.2. ([21, Lemma 3.9]) If the chain complexes C∗ , C∗′ of kG-modules are separated then so is the (total) tensor product C∗ ⊗ C∗′ . Similarly for a product of finitely many chain complexes. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 3 Proof. Let Pi be a projective module such that Im(di+1 ) ⊆ Pi ⊆ Ci and L similarly for Pi′ . ′ ′ ′ ′ Then, L ′ summing over all degrees, Im(d ⊗ d ) ⊆ P ⊗′ C + C ⊗′ P where′ P := i Pi and P := i Pi . There is a short exact sequence 0 → P ⊗P → P ⊗C ⊕C ⊗P → P ⊗C +C ⊗P → 0. The first two terms are projective, hence so is the third.  We need to consider tensor-induced complexes. For details of the construction see [4, II 4.1]. Lemma 2.3. Suppose that every elementary abelian p-subgroup of G is conjugate to a subgroup of H, and let C∗ be a complex of kH-modules that is separated. Then the tensor-induced complex C∗ ↑⊗G H is also separated. Proof. By the proof of Lemma 2.2 above, the image Im(d↑⊗G H ) is contained in P ⊗ C ⊗ · · · ⊗ C + C ⊗ P ⊗ · · · ⊗ C + · · · + C ⊗ C ⊗ · · · ⊗ P, which is a kG-submodule of C∗ ↑⊗G H . But the same proof shows that this module is projective on restriction to H, so it is projective, by Chouinard’s Theorem [7, Corollary 1.1].  The next two results comprise a variation on [21, Proposition 3.3] and have the same proof. Proposition 2.4. Let H be an arbitrary subgroup of G. Suppose that the complex K∗ : Kw → · · · → K0 of kG-modules is: (a) acyclic, (b) weakly induced from H except in at most one degree and (c) K∗ is separated on restriction to H. Then K∗ is separated. Recall that the Heller translate ΩV of a kG-module V is defined to be the kernel of the projective cover P (V ) → V and Ωi V for i ≥ 1 denotes Ω iterated i times. Similarly Ω−1 V is the cokernel of the injective hull V → I(V ) and Ω−i V for i ≥ 1 is its iteration. We let Ω0 V denote V with any projective summands removed. These have the properties that Ωi Ωj V ∼ = Ωi+j V and that if V is induced so is Ωi V . Lemma 2.5. Suppose that the complex K∗ : Kw → · · · → K0 of kG-modules is: (a) acyclic with H0 (K∗ ) = L, and (b) separated. Then L ∼ =proj K0 ⊕ Ω−1 K1 ⊕ Ω−2 K2 ⊕ · · · ⊕ Ω−w Kw . Let V be a kG-module, as a k-vector space, and W a submodule L∞ finite-dimensional L∞ rof V . r We write S = S(V ) = r=0 S (V ) for the symmetric algebra on V and Λ(W ) = r=0 Λ (W ) for the exterior algebra on W . For r < 0 let S r (V ) denote the 0 module. Definition 2.6. Let W be a submodule of a kG-module V and let W p denote the kGsubmodule of S p (V ) spanned by the p-th powers of elements of W . Let K(V, W p ) denote the Koszul complex of graded kG-modules: d d d d · · · −→ S(V ) ⊗ Λ3 (W p ) −→ S(V ) ⊗ Λ2 (W p ) −→ S(V ) ⊗ W p −→ S(V ), P cp ∧ · · · ∧ w p for wj ∈ W and where d(f ⊗ w1p ∧ w2p ∧ · · · ∧ wip ) = ij=1(−1)j+1 f wjp ⊗ w1p ∧ · · · ∧ w j i f ∈ S(V ). We write K r (V, W p ) when we consider the complex K(V, W p ) in grading-degree r. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 4 If k = F2 then the squaring map gives an isomorphism between W and W 2 , so we can regard W 2 as a copy of W in degree 2 equipped with a squaring map into S 2 (V ). From this P point of view, the boundary map is given by d(f ⊗ w1 ∧ w2 ∧ · · · ∧ wi ) = ij=1 f wj2 ⊗ w1 ∧ ···∧ w cj ∧ · · · ∧ wi for wj ∈ W and f ∈ S(V ). We will normally take the second point of view, so we will assume that k = F2 in a large part of this paper. Since any kC2n -module can be written in F2 , this is not a significant restriction. Lemma 2.7. In the context of Definition 2.6, the complex K(V, W p ) is acyclic and its homology in degree 0 is S(V )/(W p ), where (W p ) is the ideal generated by all elements w p , w ∈ W. Proof. If {w1 , . . . , wr } is a basis for W then {w1p , . . . , wrp} is a regular sequence in S(V ) and it spans W p . This is now a standard result about Koszul complexes.  Lemma 2.8. Let V , V ′ be kG-modules, finite-dimensional as k-vector spaces and let W , W ′ be submodules of V and V ′ , respectively. The complex K(V ⊕ V ′ , (W ⊕ W ′ )p ) is isomorphic to the (total) tensor product K(V, W p ) ⊗ K(V ′ , W ′p ) as a complex of graded kG-modules. Proof. This is analogous to [21, Lemma 3.8].  We also need to deal with tensor induction of graded modules and complexes. ∼ Lemma 2.9. Let H be a subgroup of G and let V, W be kH-modules. Then S(V ↑G H) = ⊗G G ∼ S(V ) ↑⊗G H , Λ(V ↑H ) = Λ(V ) ↑H as graded kG-modules, and if the characteristic of k is 2 G G 2 ∼ then K(V ↑H , (W ↑H ) ) = K(V, W 2 )↑⊗G H as complexes of graded kG-modules. Without the restriction on the characteristic of k we would have to deal with the sign convention that appears in the definition of the action of G on the tensor-induced complex. Proof. Let {gi } be a set of coset representatives for G/H and write V ↑G H = ⊕gi ⊗ V . The formulas now follow from the usual formulas for S and Λ of a sum and the definition of the group action on a tensor induced module.  3. Modules for Cyclic 2-Groups From now on, let G = hgi ∼ = C2n be a cyclic group of order 2n , n ≥ 1, and k a field of characteristic 2. We write a(G) for the Green ring of kG-modules. Up to isomorphism, there are 2n indecomposable kG-modules V1 , V2 , . . . , V2n and we choose the notation so that dimk (Vi ) = i. For convenience we write V0 for the 0 module. The generator g ∈ G acts on Vi with matrix a Jordan block with ones on the diagonal. Choose a k-basis {x1 , x2 , . . . , xn } of Vn such that gxi = xi + xi−1 for all 2 ≤ i ≤ n and gx1 = x1 . Each element of S(Vi ) can be written uniquely as a polynomial in x1 , . . . , xi , and for j ≤ i, we can identify Vj with the kG-submodule of Vi spanned by x1 , x2 , . . . , xj . Each Vi is uniserial with composition series 0 < V1 < V2 < · · · < Vi−1 < Vi . Note that for i ≤ 2n−1 the kernel of Vi is nontrivial and so Vi can be identified with the i-dimensional indecomposable module for the quotient group C2n−1 . Decompositions of tensor products into indecomposables have been studied by several authors, see for example [2, 3, 9, 13, 16, 17, 18, 20]. In our case, this decomposition can easily be computed using the Heller translate Ω. We write Ω2n instead of Ω when we want EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 5 to emphasize that we are working with modules for the group C2n . It is easy to check that Ω2n Vi ∼ =proj V2n −i for 0 ≤ i ≤ 2n , where proj means modulo projective modules for C2n . Recall that Ω2n (V ⊗ V ′ ) ∼ =proj (Ω2n V ) ⊗ V ′ , where the projective part can be determined by comparing dimensions. For cyclic groups, Ω22n ∼ =proj V ⊗ V ′ . =proj Id and Ω2n V ⊗ Ω2n V ′ ∼ This provides an easy recursive method for calculating the decomposition of tensor products in the case of cyclic 2-groups. In order to calculate Va ⊗ Vb , we may assume a ≥ b and write a = 2r − a′ for the smallest possible r such that a′ ≥ 0. Then Va ⊗ Vb ∼ = Ω2r (Va′ ⊗ Vb ) modulo copies = (Ω2r Va′ ) ⊗ Vb ∼ r−1 r then it is more efficient to write b = 2 − b′ too. of V2r . If b ≥ 2 Example. For V9 , V13 ∈ a(C16 ) we have: V9 ⊗ V13 ∼ = (V7 ⊗ V3 )⊕ copies = (Ω16 V7 ) ⊗ (Ω16 V3 ) ∼ ∼ of V16 . By comparing dimensions we get V9 ⊗V13 = (V7 ⊗V3 )⊕6V16 . Now we consider the nonfaithful module V7 ⊗V3 as a module for the factor group ∼ = C8 and get V7 ⊗V3 ∼ = Ω8 (V1 ⊗V3 )⊕ ∼ copies of V8 . Again by comparing dimensions we obtain V7 ⊗V3 = Ω8 (V1 ⊗V3 )⊕2V8 ∼ = V5 ⊕2V8 and hence V9 ⊗ V13 ∼ = V5 ⊕ 2V8 ⊕ 6V16 . Let H = hg 2 i be the unique maximal subgroup of G. For 1 ≤ j ≤ 2n−1 we also denote the indecomposable kH-module of dimension j by Vj . Of course, this is an abuse of notation, but we will always make it clear whether we consider Vj as a kG-module or as a kH-module. An elementary calculation with Jordan canonical forms shows that the restriction operator G ↓G H : a(G) → a(H) is given by Vi ↓H = Vi′ ⊕ Vi′′ where Vi′ is the kH-submodule generated by {xi , xi−2 , xi−4 , . . . } and Vi′′ is the kH-submodule generated by {xi−1 , xi−3 , xi−5 , . . . }. In particular, we have (i′ , i′′ ) = ( i+1 , i−1 ) if i is odd, and (i′ , i′′ ) = ( 2i , 2i ) if i is even. The 2 2 G n−1 induction operator ↑G . H : a(H) → a(G) is given by Vj ↑H = V2j for 1 ≤ j ≤ 2 We say that a kG-module is induced if it is induced from proper subgroups. Let aP (G) be the submodule of a(G) generated by the projective modules and aI (G) the submodule generated by the induced modules. Notice that aP (G) and aI (G) are ideals of a(G) and that induction maps aP (H) into aP (G) and aI (H) into aI (G), but restriction only maps aP (G) into aP (H). The following lemmas deduce information on kG-modules and short exact sequences of kG-modules from their restriction to H. Lemma 3.1. Let A be a kG-module such that A↓G H is induced from a proper subgroup of H. Then A is induced from H. Proof. We can assume that A is indecomposable. Since A↓G H is induced, each indecomposable direct summand of A↓G has even dimension. Thus dim (A) is even and so A is induced.  k H As in the introduction we write ∼ =proj for isomorphisms modulo induced and =ind and ∼ modulo projective summands, respectively. Lemma 3.2. Let A, B be induced kG-modules such that A↓G ∼ =proj B. =proj B↓G . Then A ∼ H G∼ A↓G H ↑H = H Proof. Since A is induced, 2A; the same is true for B. Inducing a projective yields  a projective, so we obtain 2A ∼ =proj 2B and the claim follows. G ∼ Lemma 3.3. Let A and B be kG-modules such that A ∼ =ind B and A↓G H =proj B ↓H . Then A∼ =proj B. Proof. We have A ⊕ X ∼ = B ⊕ Y for some induced modules X and Y . On restriction, we G ∼ ∼ obtain X ↓G Y ↓ H =proj H and so X =proj Y by Lemma 3.2. Now cancel the non-projective summands of X and Y in the original formula.  EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 6 Lemma 3.4. Let 0 → A → B → C → 0 be a short exact sequence of kG-modules that is separated at B on restriction to H and such that C ∼ =ind B ⊕ Ω−1 2n A as kG-modules. Then the sequence is separated at B (as a sequence of kG-modules). Proof. The hypotheses imply that there are induced modules X and Y such that C ⊕ X ∼ = −1 −1 G G G ∼ G ∼ A)↓ by Lemma 2.5 (B ⊕ Ω B↓ ⊕ Ω A↓ A ⊕ Y and also C ↓ B ⊕ Ω−1 = = n n n−1 proj proj 2 2 H H H H 2 G G G ∼ applied to 0 → A↓G H → B↓H → 0. It follows that X ↓H =proj Y ↓H , hence, by Lemma 3.2, X∼ =proj B ⊕ Ω−1 =proj Y and then C ∼ 2n A. d e Thus our short exact sequence is 0 → A → B → B ⊕ Ω−1 2n A → 0, up to projective summands. Consider the long exact sequence for Tate Ext: d e ∗ ∗ 1 (1) · · · → HomkG (A, A) → HomkG (A, B) → HomkG (A, B ⊕ Ω−1 2n A) → Ext (A, A) → · · · , where HomkG denotes homomorphisms modulo those that factorize through a projective. Since Ext1 (A, A) ∼ = HomkG (A, Ω−1 2n A) we have dim Im(e∗ ) + dim Ext1 (A, A) ≥ dim HomkG (A, B ⊕ Ω−1 2n A) = dim HomkG (A, B) + dim HomkG (A, Ω−1 2n A) = dim HomkG (A, B) + dim Ext1 (A, A) and therefore dim Im(e∗ ) ≥ dim HomkG (A, B). Hence e∗ is injective and so d∗ = 0. But d = d∗ (IdA ), so d factors through a projective, as required.  The next lemma describes tensor induction from H to G modulo induced modules and gives information on the structure of the exterior algebra Λ(V2j ) as a kG-module in terms of the kH-module Λ(Vj ). Lemma 3.5. Let r, j be integers such that r ≥ 0 and 1 ≤ j ≤ 2n−1. We consider Vj as a kH-module and V2j = Vj ↑G H as a kG-module. ⊗G ∼ (a) Let A and B be kH-modules. Then (A ⊕ B) ↑⊗G ⊕B ↑⊗G ⊕X for some H = A ↑H H induced kG-module X. (b) There is an induced kG-module X such that Λ2r (V2j ) ∼ = Λr (Vj )↑⊗G H ⊕ X. r (c) If r is odd, then the kG-module Λ (V2j ) is induced from H. (d) If j is even, then the kG-module Vj ↑⊗G H is induced from H. ∼ (e) If j is odd, then Vj ↑⊗G V . = ind 1 H Proof. (a) follows from [4, I 3.15.2 (iii)]. (b) By the construction of induced modules, we have V2j = Vj ⊕ gVj as vector spaces and the action of the generator g of G on V2j is given by g(v + gv ′) = g 2 v ′ + gv. So there is a natural isomorphism M ′ ′′ (Λr (Vj ) ⊗ Λr (gVj )) Λ2r (V2j ) = Λ2r (Vj ⊕ gVj ) ∼ = r ′ ,r ′′ ≥0 r ′ +r ′′ =2r of vector spaces, and thus Λ2r (V2j ) ∼ = (Λr (Vj ) ⊗ gΛr (Vj )) ⊕ M 0≤r ′ <r ′′ r ′ +r ′′ =2r ′ ′′ ′ ′′ ((Λr (Vj ) ⊗ Λr (gVj )) ⊕ g(Λr (Vj ) ⊗ Λr (gVj ))). EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 7 Via this isomorphism, the right hand side becomes a kG-module and from the action of g, ′ ′′ ′ ′′ we see that (Λr (Vj ) ⊗ Λr (gVj )) ⊕ g(Λr (Vj ) ⊗ Λr (gVj )) is a kG-submodule isomorphic to ′ ′′ ⊗G r r r (Λr (Vj ) ⊗ Λr (gVj ))↑G H and Λ (Vj ) ⊗ gΛ (Vj ) is a submodule isomorphic to Λ (Vj )↑H . (c) The proof is similar to that of (b). Note that, if r is odd, the summand corresponding to r ′ = r ′′ which leads to the tensor induced submodule in (b) does not occur. (d),(e) We say that a kG-module is induced except for possibly one trivial summand if it is G isomorphic to A↑G H or A↑H ⊕V1 for some kH-module A. We prove (d) and (e) simultaneously by showing that for all 1 ≤ j ≤ 2n−1 the kG-module Vj ↑⊗G H is induced except for possibly one trivial summand. The claim then follows from the fact that dimk (Vj ↑⊗G H ) is even if and only if j is even. ∼ The proof is by induction on j. Because V1 ↑⊗G = V1 we can assume j > 1. If j is H even, then the kH-module Vj is induced from a proper subgroup of H. So [4, I 3.15.2 (iv)] implies that Vj ↑⊗G H is a direct sum of modules induced from H (even from proper subgroups of H). Assume that j is odd. So we can write j = 2m + j ′ with 1 ≤ m < n − 1 and 1 ≤ j ′ < 2m . First, we treat the case j ′ = 1. By the Mackey formula for tensor induction m G∼ ∼ [4, I 3.15.2 (v)] we have Vj ↑⊗G H ↓H = V2m +1 ⊗ V2m +1 = V1 ⊕ (2 − 2)V2m ⊕ 2V2m+1 , and so ⊗G ∼ m−1 Vj ↑H = V1 ⊕ (2 − 1)V2m+1 ⊕ V2m+2 , which is induced up to one trivial summand. Now ′ assume j > 1. Then Vj ′ ⊗ V2m +1 ∼ = Vj ⊕ (j ′ − 1)V2m as kH-modules. By [4, I 3.15.2 (i)] and (a) we get (2) ⊗G ∼ ⊗G ⊗G ′ (Vj ′ ↑⊗G H ) ⊗ (V2m +1 ↑H ) =ind (Vj ↑H ) ⊕ (j − 1)(V2m ↑H ). By induction and the case j ′ = 1, we know that the left hand side of (2) is induced except for possibly one trivial summand. Hence, Vj ↑⊗G H is induced except for possibly one trivial summand.  We can now see that the symmetric and exterior powers of even dimensional indecomposable modules have a particularly restricted form. Corollary 3.6. Suppose that we have non-negative integers j, s, t, u with u, j odd and s ≥ 1. t t Furthermore, assume that 2t u < 2n and 2s j ≤ 2n . Then Λ2 u (V2s j ) and S 2 u (V2s j ) are both t t induced unless t ≥ s. If t ≥ s then Λ2 u (V2s j ) ∼ = m′ V1 ⊕ Y , where = mV1 ⊕ X and S 2 u (V2s j ) ∼ ′ X, Y are induced modules and m and m are the numbers of non-induced indecomposable t−s t−s summands in Λ2 u (Vj ) and Λ2 u (V2n−s −j ), respectively. t Proof. Using Lemma 3.5 (a),(b),(d) we see that, up to induced direct summands, Λ2 u (V2s j ) is tensor-induced from a subgroup of index 2min{s,t} . If t < s then, up to induced direct summands, it is tensor-induced from Λu (V2s−t j ) and thus is induced, by part (c) of the same lemma. If t ≥ s then, again up to induced direct summands, it is tensor-induced from t−s Λ2 u (Vj ); the description given is then seen to be valid using parts (a), (d) and (e). The t t case of S 2 u (V2s j ) reduces to that of Λ2 u (V2n −2s j ), by Theorem 1.2.  Corollary 3.7. If X is a kG-module such that every direct summand has dimension divisible by 4 then S 2 (X) is induced. Proof. By the identity S 2 (A ⊕ B) ∼ = S 2 (A) ⊕ S 2 (B) ⊕ A ⊗ B, we may assume that X is indecomposable, say X = V4u . The claim now follows from Corollary 3.6.  EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 8 In the proof of our main result we will often have information only modulo induced direct summands. The following definition and lemmas deal with the splitting of maps in such situations. Recall that a map f : A → B of kG-modules is split injective, if there is a map g : B → A of kG-modules such that g ◦ f = IdA . For maps f : A → B, f ′ : A → B ′ of kG-modules we write (f, g) : A → B ⊕ B ′ , a 7→ (f (a), f ′ (a)). Definition 3.8. Let f : A → B be a map of kG-modules. We say that f is split injective modulo induced summands if there exists an induced kG-module X and a map f ′ : A → X of kG-modules such that (f, f ′ ) : A → B ⊕ X is split injective. Split injective modulo induced summands behaves in much the same way as split injective. Lemma 3.9. Given maps f : A → B, g : B → C and h : D → E of kG-modules: (a) if f and g are split injective modulo induced summands then so is g ◦ f , (b) if g ◦ f is split injective modulo induced summands then so is f , (c) if f , h are split injective modulo induced summands then so is f ⊗h : A⊗D → B ⊗E. Proof. (a) By assumption, we have induced modules X, Y and maps f ′ : A → X, u : B → A, u′ : X → A, g ′ : B → Y , v : C → B, v ′ : Y → B such that u ◦ f + u′ ◦ f ′ = IdA and v ◦ g + v ′ ◦ g ′ = IdB . We define (g ◦ f )′ : A → X ⊕ Y, a 7→ (f ′ (a), g ′ ◦ f (a)), w : C → A, c 7→ u ◦ v(c) and w ′ : X ⊕ Y → A, (x, y) 7→ u′ (x) + u ◦ v ′ (y). Then w ◦ (g ◦ f ) + w ′ ◦ (g ◦ f )′ = IdA . Parts (b) and (c) are proved in a similar way; the proofs are left to the reader.  Lemma 3.10. Let f : A → B be a map of kG-modules and write A = A′ ⊕ A′′ , where A′ has only non-induced summands and A′′ has only induced summands. Let i denote the inclusion of A′ in A. Then f is split injective modulo induced summands if and only if f ◦ i is split injective. Proof. Suppose that f is split injective modulo induced summands; we want to show that f ◦ i is split injective. By Lemma 3.9 (a), the map f ◦ i is split injective modulo induced summands, so we can assume that A = A′ and we have to show that f is split injective. Since f is split injective modulo induced summands we have an induced module X and maps f ′ : A → X, u : B → A, u′ : X → A such that u◦f +u′ ◦f ′ = IdA . Since X and A have no summands in common, we know that u′ ◦ f ′ lies in the radical of EndkG (A) (note that L if A = Ai with Ai indecomposable and we write elements of EndkG (A) as matrices with entries in HomkG (Ai , Aj ) then the radical consists of the morphisms for which no component is an isomorphism). Thus u ◦ f is surjective, hence an automorphism of A, and f is split injective. Conversely, suppose that f ◦ i : A′ → B is split injective, so there is a map g : B → A′ such that g ◦ (f ◦ i) = IdA′ . Let j denote the inclusion of X := A′′ in A and f ′ the projection of A onto A′′ . We define v := i ◦ g : B → A, and v ′ : X → A, x 7→ −(i ◦ g ◦ f ◦ j)(x) + j(x). Then v ◦ f + v ′ ◦ f ′ = IdA , so f is split injective modulo induced summands.  Remark. The proof above shows that the induced module X in Definition 3.8 can always be chosen in such a way that X only contains indecomposable direct summands that also occur in A. Remark. Definition 3.8 makes sense for any finite group and any class of indecomposable modules and Lemmas 3.9(a,b) and 3.10 remain true. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 9 It will turn out that certain symmetric and exterior powers of modules for cyclic 2-groups are contained in the Z-submodule c(G) of the Green ring a(G) spanned by the indecomposable modules Vr for r satisfying r 6≡ 2 (mod 4). We describe some properties of c(G). Lemma 3.11. The submodule c(G) is (a) a subring of a(G) and (b) closed under Ω2n . Proof. Part (b) is clear from the definitions. For part (a) we need to show that Vi ⊗ Vj ∈ c(G) for all 0 ≤ i, j ≤ 2n , i, j 6≡ 2 (mod 4). For n = 1 we only have V1 ⊗ V1 = V1 ∈ c(G). Suppose that n > 1. By the remarks on the computation of tensor products at the beginning of this section, we have Vi ⊗ Vj = ′ ′ ′ n−1 ′ and i′ ≡ ±i (mod 4) Ωm 2n (Vi′ ⊗ Vj ′ ) ⊕ m V2n for some integers m, m , where 0 ≤ i , j ≤ 2 ′ and j ≡ ±j (mod 4). We can consider Vi′ and Vj ′ as modules for H ∼ = C2n−1 and the claim follows from induction and part (b).  4. Main Theorem From now on we assume that k = F2 is a field with 2 elements and G is a cyclic group of order 2n . For 0 ≤ s ≤ 2n−1 , we know from Lemma 2.7 that K(V2n−1 +s , Vs2 ) is acyclic and that its homology in degree 0 is S(V2n−1 +s )/(Vs2 ). It will turn out that S(V2n−1 +s )/(Vs2 ) is closely related to the exterior algebra Λ(V2n−1 +s ), so it is natural to study the structure of L 2 e 2n−1 +s ) = er the graded ring S(V r≥0 S (V2n−1 +s ) := S(V2n−1 +s )/(Vs ) as a kG-module. For a L er non-negative integer m write Se<m (V2n−1 +s ) = m−1 r=0 S (V2n−1 +s ) and use a similar notation e (V2n−1 +s ) denote the kernel of the natural epimorphism for other graded modules. Let N e S(V2n−1 +s ) → Λ(V2n−1 +s ). Choose a k-basis {x1 , x2 , . . . , x2n−1 +s } of V2n−1 +s as in Section 3. For simplicity, write xtop := x2n−1 +s , xtop−1 := x2n−1 +s−1 and so on. Each element of S(V2n−1 +s ) can be written Qn uniquely as a polynomial in x1 , x2 , . . . , xtop . Set a := 2i=1 (g i xtop ) ∈ S(V2n−1 +s ). If s < 2n−1 e 2n−1 +s ), and if s = 2n−1 let e let e a be the image of a in S(V a be the image of the element Q n−1 2 e n a is still invariant, because g 2 x2n = x2n +x2n−1 t∈G/C2 (txtop ) in S(V2 ). In the latter case e e 2n ) is invariant under C2 . In all cases, a is homogeneous of degree 2n , has and so x2top ∈ S(V degree 2n when considered as a polynomial in xtop , the elements a and e a are invariant under n−1 the action of G, and the image of e a in Λ(V2n−1 +s ) is 0. If s = 2 then we also write eb for Q2n i e 2n ). the image of the element i=1 (g xtop ) in S(V The next theorem is our main result. Since any representation of G ∼ = C2n over a field of characteristic 2 can be written in F2 , part (d) implies Theorem 1.1, but we record the other parts since they are also of interest and they form an integral part of the proof. Theorem 4.1. Let n and s be integers such that n ≥ 1 and 0 ≤ s ≤ 2n−1 . (a) (Separation) The complex K(V2n−1 +s , Vs2 ) of kG-modules is separated. n e 2n−1 +s ) ∼ a] ⊗ Se<2 (V2n−1 +s ) as graded (b) (Periodicity) For s < 2n−1 we have S(V =ind k[e n e 2n ) ∼ a] ⊗ (Se<2 (V2n ) ⊕ keb). In both cases kG-modules. For s = 2n−1 we have S(V =ind k[e e 2n−1 +s ). the isomorphism from right to left is induced by the product in S(V EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 10 (c) (Splitting) The short exact sequence of graded kG-modules e (V2n−1 +s ) −→ S(V e 2n−1 +s ) −→ Λ(V2n−1 +s ) −→ 0 0 −→ N e (V2n−1 +s ) = e e 2n−1 +s ) ⊕ I, e where Ie is a kG-module induced from H. is split and N aS(V (d) (Exterior powers) For each r ≥ 0 we have the following isomorphism of kG-modules M i+j Ω2n (Λi (Vs ) ⊗ Λj (V2n−1 −s )). Λr (V2n−1 +s ) ∼ =proj i,j≥0 2i+j=r The case s = 0 is a little unnatural, but we need it for the induction, because the restriction of V2n−1 +1 is V2n−2 +1 ⊕ V2n−2 . It is sometimes more succinct to consider Hilbert series with coefficients in the Green ring (possibly modulo projectives or induced modules). For more details see [12]. In particular, we consider the following series associated to a kG-module V : ∞ ∞ P P λt (V ) = Λr (V )tr , σt (V ) = S r (V )tr , σ et (V ) = r=0 ∞ P r=0 er r λΩ t (V S (V )t , )= r=0 ∞ P Ωr Λr (V )tr . r=0 The last of these requires G to be specified in order for the Ω to be determined; it is naturally considered modulo projectives. They all commute with restriction and turn direct sums of modules into products of series. This is all an easy consequence of the corresponding properties of the corresponding functors on modules, except perhaps for λΩ t (V ⊕ W ), where r+s r s ∼ we need the formula Ω V ⊗ Ω W =proj Ω (V ⊗ W ). Many of our statements about modules imply Hilbert series versions. n (3) 2 −1 σt (V2n−1 +s ) =ind λΩ t (V2n−1 −s )(1 − t ) σ et (V2n−1 +s ) =ind λΩ t2 (Vs )σt (V2n−1 +s ) n σ et (V2n−1 +s ) =ind λt (V2n−1 +s )(1 − t2 )−1 Ω λt (V2n−1 +s ) =proj λΩ t2 (Vs )λt (V2n−1 −s ) Theorem 1.2 Separation 4.1(a) Splitting and periodicity 4.1(b),(c) Exterior powers 4.1(d), where the symbols =ind and =proj mean that we consider the coefficients only modulo induced or projective direct summands, respectively. The first and last of the above identities are, in fact, equivalent to the original versions. The second identity follows from Theorem 4.1 (a), Lemma 2.5 and Lemma 2.7 (once the theorem is proved). Remark. An easy calculation shows that, for fixed n and s, the last of the formulas in (3) follows formally from the first three if we are satisfied with only =ind . Remark. The proof of Theorem 1.2 in [21] actually gives a more precise formula than the first one in (3). It works by showing that the complex K(V2n , V2n−1 −s ) defined in [21] is separated and then applying Lemma 2.5; note that the definition of K(V2n , V2n−1 −s ) in [21] is different from our Definition 2.6. The result is that σt (V2n−1 +s ) =proj σt (V2n )λΩ t (V2n−1 −s ). Since V2n can be given a basis that is permuted by G, each S r (V2n ) has a monomial basis that is permuted. For small n, the decomposition of σt (V2n ) can be calculated by hand; in general the calculation can be organized using [21, Proposition 2.2]. Alternatively, [21, Proposition 2.2] can be applied directly to σt (V2n−1 +s ). The next six sections are devoted to the proof of Theorem 4.1 by induction on n. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 11 5. The Case n = 1 In this section we start the inductive proof of Theorem 4.1. Suppose that n = 1, so we have to prove the statements in Theorem 4.1 for s ∈ {0, 1}. With these assumptions on n and s, parts (b)-(d) of Theorem 4.1 can easily be verified by a direct calculation. In fact, in (b) one obtains isomorphisms of kG-modules (not only modulo induced summands), and in (c) one gets Ie = 0. Separation for s = 0 is trivial. Let us consider part (a) for n = s = 1. We have to show that for each r > 0 the short exact sequence 0 → S r−2 (V2 ) → S r (V2 ) → Ser (V2 ) → 0 of kG-modules is separated at S r (V2 ). If r is odd, then S r (V2 ) is induced by Theorem 1.2, hence projective, and so separation is obviously true. Separation is trivial for r = 0. For even r > 0, a direct calculation and r−2 (V2 ), and so separation Theorem 1.2 show that Ser (V2 ) ∼ =ind S r (V2 ) ⊕ Ω−1 = V1 ⊕ V1 ∼ 2 S follows from Lemma 3.4. Sections 6-10 comprise the inductive step in the proof of Theorem 4.1. In these sections we always assume that n > 1 is an integer and that Theorem 4.1 holds for all smaller values of n. Throughout these sections the notation remains the same as in Sections 3 and 4; thus G = hgi ∼ = C2n is a cyclic group of order 2n , k = F2 is a field with two elements and s is an integer such that 0 ≤ s ≤ 2n−1 . 6. Periodicity In this section we prove part (b) of Theorem 4.1, assuming that parts (a)-(d) of the theorem hold for all smaller values of n. Let H be the unique maximal subgroup of G and let {x1 , x2 , . . . , xtop } be a k-basis n of V2n−1 +s as in Section 4. We choose G-invariant elements a ∈ S 2 (V2n−1 +s ) and e a ∈ n 2 e S (V2n−1 +s ) as in Section 4. Let T (V2n−1 +s ) be the kG-submodule of S(V2n−1 +s ) spanned n by the monomials in x1 , . . . , xtop that are not divisible by x2top . We have S(V2n−1 +s ) ∼ = <2n <2n n−1 n−1 n−1 (V2 +s ) = S (V2 +s ). k[a] ⊗ T (V2 +s ) as kG-modules; see [21, Lemma 1.1]. So T n Notice that the periodicity of S(V2n−1 +s ) in [21, Theorem 1.2] is equivalent to T ≥2 (V2n−1 +s ) being induced. In fact, we know something stronger from [21, Corollary 3.11], namely that n−1 T >2 −s (V2n−1 +s ) is induced. e 2n−1 +s ), obtaining S(V e 2n−1 +s ) ∼ a]⊗Te(V2n−1 +s ) We can make the same construction for S(V = k[e as kG-modules. Define L(V2n−1 +s , Vs2 ) to be the subcomplex of K(V2n−1 +s , Vs2 ) defined using T (V2n−1 +s ) instead of S(V2n−1 +s ), that is d d d · · · −→ T (V2n−1 +s ) ⊗ Λ2 (Vs ) −→ T (V2n−1 +s ) ⊗ Vs −→ T (V2n−1 +s ), where the boundary morphisms are as in Definition 2.6 (this can be done since the xtop used in the definition of T (V2n−1 +s ) is not contained in Vs ). Thus L(V2n−1 +s , Vs2 ) is a complex of graded kG-modules; it is exact except in degree 0, where the homology is H0 (L(V2n−1 +s , Vs2 )), which is isomorphic to Te(V2n−1 +s ) as a kG-module. Notice that, by construction, the complexes K(V2n−1 +s , Vs2 ) and k[a]⊗L(V2n−1 +s , Vs2 ) of kG-modules are isomorphic. In particular, note for later use that one of them is separated (over G or over H) if and only if the other is so too. From now on we fix s and abbreviate the notation to just S, T , K, L, etc. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 12 Suppose that s < 2n−1 . We claim that Lri = T r−2i ⊗ Λi (Vs ) is induced for all i ≥ 0, r ≥ 2n . We may assume that i ≤ s. Then r − 2i ≥ 2n − 2s > 2n−1 − s and so T r−2i is induced. Thus Lr is a complex of induced kG-modules for each r ≥ 2n . Consider the restriction of the complex K to the subgroup H. It decomposes as a tensor product of two complexes, by Lemma 2.8. Each of these is separated, by induction and Theorem 4.1 (a), hence so is their product, by Lemma 2.2. It follows that for each r ≥ 0, the complex Lr is separated on restriction to H. We have just seen that Lr is a complex of induced modules for all r ≥ 2n . Thus, for each r ≥ 2n , the complex Lr is separated, by n n Proposition 2.4. Now Lemma 2.5 shows that H0 (L≥2 ) is induced. But this is exactly Te≥2 , n n e 2n−1 +s ) ∼ so S(V a] ⊗ Te ∼ a] ⊗ Te<2 = k[e a] ⊗ Se<2 is periodic if s < 2n−1 . = k[e =ind k[e n Now suppose that s = 2n−1 . By the same argument as for s < 2n−1 , we see that Te>2 is n a ⊕ keb. induced. To complete the proof of Theorem 4.1 (b) we have to show that Se2 ∼ =ind ke n n 2 −i n Set yi := g x2 for i = 1, 2, . . . , 2 , so {y1 , . . . , y2n } is a k-basis of V2n which is permuted n−1 by G. A basis for V2n−1 < V2n is given by g 2 yi − yi = yi+2n−1 − yi for i = 1, 2, . . . , 2n−1 . e 2n ), so yei2 = ye2 n−1 for i = 1, . . . , 2n−1 . The set consisting Write yei for the image of yi in S(V i+2 n of all monomials of degree 2 in all the yei such that ye1 , . . . , ye2n−1 only occur to the power e 2n ). The group G permutes these monomials and it is at most 1 forms a k-basis for S(V straightforward to check that there are two invariant monomials, namely ye1 ye2 · · · ye2n = eb and a; the rest span induced submodules. This completes the proof of ye22n−1 +1 ye22n−1 +2 · · · ye22n = e periodicity. 7. Splitting In this section we prove part (c) of Theorem 4.1, assuming the whole of the theorem for smaller n. Let H be the unique maximal subgroup of G and {x1 , x2 , . . . , xtop } a k-basis of V2n−1 +s as e 2n−1 +s ) for the kernel of the natural surjection in Section 4. As in Theorem 4.1 we write N(V f e 2n−1 +s ) → Λ(V2n−1 +s ). The following proposition deals with the structure of S(V e 2n−1 +s ) S(V n in degrees less than 2 . Proposition 7.1. For any integer s such that 0 ≤ s ≤ 2n−1 , the short exact sequence (4) n f e <2n (V2n−1 +s ) −→ Se<2n (V2n−1 +s ) −→ 0 −→ N Λ<2 (V2n−1 +s ) −→ 0 e <2n (V2n−1 +s ) is induced from H. of graded kG-modules is split, and N Before starting with the proof of Proposition 7.1 we introduce some further notation. As described at the beginning of Section 3, we have V2n−1 +s ↓G H = V2n−2 +s′ ⊕ V2n−2 +s′′ where ′ ′′ n−2 ′ ′′ ′ ′′ 0 ≤ s ,s ≤ 2 and s = s or s = s + 1. The kH-submodule V2n−2 +s′ of V2n−1 +s has the k-basis {xtop , xtop−2 , xtop−4 , . . . } and the kH-submodule V2n−2 +s′′ has the k-basis {xtop−1 , xtop−3 , xtop−5 , . . . }. We write Se′ (V2n−2 +s′ ) and Se′′ (V2n−2 +s′′ ) for S(V2n−2 +s′ )/(Vs2′ ) and S(V2n−2 +s′′ )/(Vs2′′ ), respectively. So the xi with odd i and the xi with even i provide natural e 2n−1 +s ) of kH-modules, and e 2n−1 +s ) and Se′′ (V2n−2 +s′′ ) → S(V embeddings Se′ (V2n−2 +s′ ) → S(V we have e 2n−1 +s ) ∼ S(V = Se′ (V2n−2 +s′ ) ⊗ Se′′ (V2n−2 +s′′ ) as kH-modules, where the isomorphism is given by f1 ⊗ f2 7→ f1 · f2 . EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 13 e 2n−2 +s′ ) according to the description preceding Theoa′ ∈ S(V Choose a′ ∈ S(V2n−2 +s′ ), e rem 4.1, but working over H. Thus a′ is homogeneous of degree 2n−1 , has degree 2n−1 when considered as a polynomial in xtop . Furthermore, a′ and e a′ are invariant under the action of H a′′ ∈ Se′′ (V2n−2 +s′′ ). and e a′ has image 0 in Λ(V2n−2 +s′ ). Similarly, choose a′′ ∈ S(V2n−2 +s′′ ) and e So a′′ is homogeneous of degree 2n−1 , has degree 2n−1 when considered as a polynomial in xtop−1 and a′′ and e a′′ are invariant under the action of H and e a′′ has image 0 in Λ(V2n−2 +s′′ ). By induction, e a′ and e a′′ are periodicity generators of Se′ (V2n−2 +s′ ) and Se′′ (V2n−2 +s′′ ), respectively. That is, we have n−1 n−1 a′′ ] ⊗ Se′′<2 (V2n−2 +s′′ ) a′ ] ⊗ Se′<2 (V2n−2 +s′′ ) and Se′′ (V2n−2 +s′′ ) ∼ Se′ (V2n−2 +s′ ) ∼ =ind k[e =ind k[e or the variant with eb′ or eb′′ if s′ = 2n−2 or s′′ = 2n−2 . Lemma 7.2. Let s be an integer such that 0 ≤ s ≤ 2n−1 and let e a′ be a periodicity generator for Se′ (V2n−2 +s′ ) as above. Then n n−1 n−1 n−1 e Se<2 (V2n−1 +s )↓G = Se<2 (V2n−1 +s ) ⊕ e a′ Se<2 (V2n−1 +s ) ⊕ (ge a′ )Se<2 (V2n−1 +s ) ⊕ X H e is generated as a k-vector space by the images as kH-modules, whereLthe kH-submodule X 2n −1 r of all monomials x ∈ r=2n−1 S (V2n−1 +s ) such that x has degree strictly less than 2n−1 when considered as a polynomial in xtop and x has degree strictly less than 2n−1 when considered as a polynomial in xtop−1 . Proof. We give all monomials in S(V2n−1 +s ) the lexicographic order with xtop−1 > xtop > L2n −1 n−1 r xtop−2 > · · · > x1 . Let h ∈ a′ has leading term x2top−1 we r=2n−1 S (V2n−1 +s ). Since ge n−1 n can write h as h = h1 · ge a′ + h2 where h1 ∈ Se<2 (V2n−1 +s ) and h2 ∈ Se<2 (V2n−1 +s ) such that h2 has degree < 2n−1 when considered as a polynomial in xtop−1 . Then, because e a′ n−1 has leading term x2top and only involves monomials in xtop , xtop−2 , xtop−4 , . . . , we can find L2n −1 n−1 r e such that h2 = h3 · e h3 ∈ Se<2 (V2n−1 +s ) and h4 ∈ X a′ + h4 . Thus, r=2 n−1 S (V2n−1 +s ) is n−1 n−1 e Comparing dimensions, we see the sum of e a′ Se<2 (V2n−1 +s ), (ge a′ )Se<2 (V2n−1 +s ) and X. that this sum has to be direct and Lemma 7.2 follows.  We are now ready to prove Proposition 7.1. Proof. (of Proposition 7.1) We study the restriction of the sequence (4) to the maximal subgroup H. By Lemma 7.2, the middle term is n n−1 e Se<2 (V2n−1 +s )↓G = Se<2 (V2n−1 +s ) ⊕ Je ⊕ X, H n−1 where Je := e a′ Se (V2n−1 +s ) ⊕ (ge a′ )Se<2 (V2n−1 +s ). Owing to the choice of e a′ , we have n n e <2 (V2n−1 +s ) and therefore Je ⊆ N e <2 (V2n−1 +s ). In fact, by construction, Je is a kGe a′ ∈ N L2n −1 r e (V2n−1 +s ) and is induced from H. We consider the exact sequence submodule of r=2n−1 N of kG-modules n −1 2M Ser (V2n−1 +s ) −→ X −→ 0, (5) 0 −→ Je −→ <2n−1 L2n −1 r=2n−1 er e where X := r=2n−1 S (V2n−1 +s )/J. We know from Lemma 7.2 that the sequence (5) is ∼ e e split when restricted to H and X ↓G H = X as kH-modules. Since J is induced from H it is relatively H-injective, and so the sequence (5) splits over kG (see [8, Theorem (19.2)]). EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 14 n Thus Je is a direct summand of Se<2 (V2n−1 +s ) over kG, so there is a kG-submodule Je′′ of n n e <2n (V2n−1 +s ), it follows that Se<2 (V2n−1 +s ) such that Se<2 (V2n−1 +s ) = Je ⊕ Je′′ . Since Je ⊆ N e <2n (V2n−1 +s ) = Je ⊕ Je′ , where Je′ := Je′′ ∩ N e <2n (V2n−1 +s ). We have N n−1 n−1 a′ Se<2 (V2n−1 +s )↓G a′ )Se<2 (V2n−1 +s )↓G Je↓G H =e H ⊕ (ge H. n−1 <2n−1 ∼ e′ e′′ , we have, by induction and Because Se<2 (V2n−1 +s )↓G H = (S (V2n−2 +s′ ) ⊗ S (V2n−2 +s′′ )) ignoring the grading, n−1 n−1 (6) Je↓G ∼ =ind (Λ′ ⊗ Λ′′ )<2 ⊕ (Λ′ ⊗ Λ′′ )<2 . H ′ ′′ Here we write Λ ⊗ Λ for the graded kH-module Λ(V2n−2 +s′ ) ⊗ Λ(V2n−2 +s′′ ). Restricting the sequence (4) to H, we obtain the sequence e <2n (V2n−1 +s )↓G → (Se′ (V2n−2 +s′ ) ⊗ Se′′ (V2n−2 +s′′ ))<2n → (Λ′ ⊗ Λ′′ )<2n → 0 0→N H of kH-modules, which is split by induction. Thus, by induction again, we obtain n−1 ∼ a′ (Λ′ ⊗ Λ′′ )<2n−1 ⊕ e e <2n (V2n−1 +s )↓G (7) N a′′ (Λ′ ⊗ Λ′′ )<2 . H =ind e e′ G ∼ e e′ G ∼ e <2n (V2n−1 +s )↓G ∼ e G Equations (6) and (7) imply that Je↓G H ⊕ J ↓H = (J ⊕ J )↓H = N H =ind J ↓H . It ′ G follows that Je ↓H is induced from proper subgroups of H. By Lemma 3.1 the kG-module Je′ e <2n (V2n−1 +s ) = Je⊕ Je′ is induced from H. We have just seen is induced from H, and hence N e <2n (V2n−1 +s ) is relatively H-injective that sequence (4) is split on restriction to H; since N the sequence must split over kG. This completes the proof of Proposition 7.1.  e 2n−1 +s ) and the exterior powers The following corollary provides a connection between S(V of V2n−1 +s in degrees less than 2n . Corollary 7.3. For r and s integers such that 0 ≤ s ≤ 2n−1 and 0 ≤ r < 2n , the map f induces an isomorphism of kG-modules modulo induced summands Ser (V2n−1 +s ) ∼ =ind Λr (V2n−1 +s ). Proof. This is clear from Proposition 7.1 (for n > 1) and Section 5 (for n = 1).  We can now prove Theorem 4.1 (c). For s < 2n−1 we have Se (V2n−1 +s ) ∼ = Λ(V2n−1 +s )⊕X, where X is induced, so part (c) of Theorem 4.1 follows from part (b). For s = 2n−1 we have n Se<2 (V2n−1 +s ) ⊕ keb ∼ = Λ(V2n−1 +s ) ⊕ X ′ , where X ′ is induced. Note that eb maps to a generator 2n of Λ (V2n−1 +s ). Again, part (c) of Theorem 4.1 is a consequence of (b). <2n 8. Preparation for Separation In this section we prepare for the proof of part (a) of Theorem 4.1, assuming the whole of the theorem for smaller n. Let H be the unique maximal subgroup of G and let {x1 , x2 , . . . , xtop } be a k-basis of V2n−1 +s as in Section 4. The main goal of this section is to develop useful criteria for the complex K(V2n−1 +s , Vs2 ) to be separated. Lemma 8.1. Let r, s be non-negative integers such that 0 ≤ s ≤ 2n−1 . Suppose that for each ′ ′ 0 ≤ r ′ < r with r ′ ≡ r mod 2, the complex K r (V2n−1 +s , Vs2 ) is separated at K0r (V2n−1 +s , Vs2 ) = ′ S r (V2n−1 +s ). Then K r (V2n−1 +s , Vs2 ) is separated at Kir (V2n−1 +s , Vs2 ) = S r−2i (V2n−1 +s )⊗Λi (Vs ) for all i ≥ 1. The same is true when K and S are replaced by L and T from Section 6. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 15 Proof. We only demonstrate the proof for K and S; the proof for L and T is analogous. We write V := V2n−1 +s and W := Vs for short. Fix i ≥ 1 and consider the boundary morphism di+1 : S r−2i−2 (V )⊗Λi+1 (W ) → S r−2i (V )⊗Λi (W ) in K r (V, W 2 ). We have to show that Im(di+1 ) → S r−2i (V ) ⊗ Λi (W ) factors through a projective kG-module. Since K r−2i (V, W 2 ) is separated at K0r−2i (V, W 2 ) the inclusion (W 2 )r−2i → S r−2i (V ) factors through a projective kG-module P r−2i . We can write the inclusion Im(di+1 ) → S r−2i (V )⊗Λi (W ) as a composition of inclusions Im(di+1 ) → (W 2 )r−2i ⊗ Λi (W ) → S r−2i (V ) ⊗ Λi (W ), where the last map factors through the projective kG-module P r−2i ⊗ Λi (W ).  Lemma 8.2. Let s and r be integers such that 0 ≤ s ≤ 2n−1 and 0 < r < 2n , and suppose that the complex K i (V2n−1 +s , Vs2 ) is separated for all 0 ≤ i < r. Then the following statements are equivalent: (a) K r (V2n−1 +s , Vs2 ) is separated, g (b) The natural map S r (V2n−1 +s ) −→ Λr (V2n−1 +s ) is split injective modulo induced summands, L i+j i j (c) Λr (V2n−1 +s ) ∼ i,j≥0 Ω2n (Λ (Vs ) ⊗ Λ (V2n−1 −s )). =ind 2i+j=r Proof. We write S r := S r (V2n−1 +s ), Ser := Ser (V2n−1 +s ) and K i := K i (V2n−1 +s , Vs2 ). The conditions on K i and Lemma 8.1 show that K r is separated except, perhaps, at K0r = S r . The restriction of the complex K r to H decomposes as a tensor product of two complexes, by Lemma 2.8. Each of these is separated by our continuing induction hypothesis, hence so is their product, by Lemma 2.2, and so K r is separated on restriction to H. Thus the short exact sequence (8) j i 0 −→ Im(d1 ) −→ S r −→ Ser −→ 0 from K r is separated at S r on restriction to H (the maps i, j should not be confused with the indices in part (c) of the lemma). The separation of K r in positive (complex-) degrees and L i−1 i j Lemma 2.5 yield the formula Im(d1 ) ∼ i≥1, j≥0 Ω2n (Λ (Vs )) ⊗ S (V2n−1 +s ). Theorem 1.2 =proj 2i+j=r now shows that M i+j−1 Ω n (Λi (Vs ) ⊗ Λj (V2n−1 −s )). (9) Im(d1 ) ∼ =ind 2 i≥1, j≥0 2i+j=r (a) ⇒ (b) Let f : Ser → Λr be the natural surjection, so g = f ◦ j. By Proposition 7.1, the map f is split injective modulo induced summands, and, by Lemma 3.9, it is enough to show that j is split injective modulo induced summands. By assumption, S r = X ⊕ M for some submodules X and M of S r such that X is projective and ker(j) = Im(d1 ) ⊆ X. Let j ′ : S r → X be the projection onto X and u′ : X → S r the natural embedding. Define u : Ser = j(X) ⊕ j(M) → S r , j(x) + j(m) 7→ m (note that the restriction of j to M is injective). Then u ◦ j + u′ ◦ j ′ = IdS r and so j is split injective modulo induced summands. (b) ⇒ (c) Assume (b). The factorization g = f ◦j and Lemma 3.9 (b) imply that j is also split injective modulo induced summands. Write S r = A′ ⊕ A′′ , where A′ has only non-induced summands and A′′ is induced. By Lemma 3.10, the restriction of j to A′ is split injective, so j maps A′ injectively into Ser and j(A′ ) is a direct summand of Ser . Factoring out A′ and j i j(A′ ) in (8) we obtain the short exact sequence 0 −→ Im(d1 ) −→ S r /A′ −→ Ser /j(A′ ) −→ 0. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 16 As we have seen at the beginning of the proof, i factors through a projective on restriction to H, and so the same is true for i. Thus the complex Im(d1 ) → S r /A′ is separated on restriction to H. Because S r /A′ ∼ = A′′ is induced, the complex is separated, by Proposition 2.4. Lemma 2.5 yields Ser /j(A′ ) ∼ =ind Ω2n Im(d1 ). Using (9) we obtain =proj S r /A′ ⊕ Ω2n Im(d1 ) ∼ M i+j Ω2n (Λi (Vs ) ⊗ Λj (V2n−1 −s )). (10) Ser /j(A′ ) ∼ =ind i≥1, j≥0 2i+j=r Theorem 1.2 implies j(A′ ) ∼ =ind Ωr2n Λr (V2n−1 −s ). Adding the summand j(A′ ) =ind S r ∼ = A′ ∼ to both sides of (10) and using Corollary 7.3 gives us the formula in (c). (c) ⇒ (a) Assume that (c) holds. From Corollary 7.3, Theorem 1.2 and (9) we get Ser ∼ =ind r Im(d ). Separation of K now follows from applying Lemma 3.4 to the short exact S r ⊕ Ω−1 1 2n sequence (8).  Separation of K r (V2n−1 +s , Vs2 ) for r = 0, 1 is trivial. We will now prove it for r = 2. Notice that if a non-zero map Va → Vb of kG-modules is to factor through a projective over C2n , then we must have a + b > 2n . This is because the map must factor through the projective cover V2n ։ Vb , which has kernel V2n −b , into which Va will certainly be mapped if a ≤ 2n − b. Lemma 8.3. For any integer s such that 0 ≤ s ≤ 2n−1 the complex K 2 (V2n−1 +s , Vs2 ) is separated. Proof. The complex in question is Vs ֒→ S 2 (V2n−1 +s ). By induction, the map factors through a projective on restriction to H. Write S 2 (V2n−1 +s ) = A′ ⊕A′′ , where A′ has only non-induced summands and A′′ has only induced summands. The component Vs → A′′ factors through a projective, by Proposition 2.4. We claim that the component Vs → A′ must be 0. From Theorem 1.2, we know that 2 S (V2n−1 +s ) =ind Λ2 (V2n−1 −s ); but V2n−1 −s is a module for C2n−1 , and it follows that A′ contains only summands of dimension ≤ 2n−1 . Let Vt be such a summand, so t ≤ 2n−1 and suppose that there is a non-zero component Vs → Vt . It must factor through a projective on restriction, where it is a map Vs′ ⊕ Vs′′ → Vt′ ⊕ Vt′′ , with s′ , s′′ , t′ , t′′ ≤ 2n−2 . By the discussion above, none of the components can factor through a projective module over C2n−1 unless they are 0.  We can readily prove separation when s is even. Lemma 8.4. For any even integer s such that 0 ≤ s ≤ 2n−1 , the complex K(V2n−1 +s , Vs2 ) of kG-modules is separated. Proof. Write s = 2s′ . From Lemma 2.9 we know that K(V2n−1 +s , Vs2 ) ∼ = K(V2n−2 +s′ , Vs2′ )↑⊗G H . The right hand side is separated by Lemma 2.3 and our induction hypothesis.  In view of this lemma, we assume now that s is odd. Lemma 8.5. Let s be an odd integer such that 0 < s < 2n−1 . Then (given our induction hypothesis): (a) Λr (V2n−1 −s ) ∈ c(G) for all r ≥ 0 and (b) S r (V2n−1 +s ) ∈ c(G) for all 0 ≤ r < 2n−1 . Here c(G) is the subgroup of the Green ring in Lemma 3.11. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 17 Proof. For part (a), the dimension d = 2n−1 − s of the module is in the range where we know that our formula for exterior powers (see Theorem 4.1 (d)) is valid by our continuing induction hypothesis. The statement is clearly true for d = 1 and we can employ induction on d, using the formula and the properties of c(G) in Lemma 3.11. For part (b) we use the formula σt (V2n−1 +s ) =proj σt (V2n )λΩ t (V2n−1 −s ) from the remark at the end of Section 4 and part (a). The summands of S(V2n ) are permutation modules on a monomial basis, so are in c(G) unless the stabilizer of a monomial is of index 2. But this first happens in degree 2n−1 , because if a monomial fixed by a subgroup of order 2n−1 contains yi , it must also contain all 2n−1 elements of the orbit of yi .  9. Separation First we make some general constructions related to symmetric and exterior powers of vector spaces. It is convenient to do this integrally first and then reduce modulo 2. Let U be a free module over the integers localized at 2, Z(2) . For r ≥ 0 set T r (U) = U ⊗Z(2) · · · ⊗Z(2) U (r times). Let the symmetric group Σr act on T r (U) by permuting the factors. Factoring out the action of Σr we get S r (U) = T r (U)/Σr = T r (U) ⊗Z(2) Σr Z(2) . We can also let Σr act on T r (U) by permuting the factors and multiplying by the signature of the permutation, in which case we write T r (U)σ . Similarly, on factoring out the action of Σr we obtain Λr (U) = T r (U)σ /Σr . For any subset I ⊆ {1, . . . , r} we set ΣI := {π ∈ Σr | π(i) = i for all i 6∈ I} (so ΣI is a subgroup of Σr isomorphic to Σ|I| ). For r ≥ 2, write r = 2p + t with 1 ≤ t ≤ 2p . Consider the subgroup ( Qr := Σ{1,...,2p } × Σ{2p +1,...,r} if t < 2p (Σ{1,...,2p } × Σ{2p +1,...,2p+1 } ) ⋊ hτ i if t = 2p of Σr , where τ ∈ Σr is the involution mapping i to 2p + i for i = 1, 2, . . . , 2p . The importance of Qr lies the fact that the index |Σr : Qr | is odd. This can been seen as folp p lows: |Σ2p +t |/(|Σ2p | · |Σt |) = 2 t+t , which is equal to the coefficient of xt in (1 + x)2 +t ≡ p+1 p p p+1 p (mod 4). (1 + x2 )(1 + x)t (mod 2); also (1 + x)2 = (1 + x2 + 2X))2 ≡ 1 + 2x2 + x2 r r r r Define LS (U) := T (U)/Qr and LΛ (U) := T (U)σ /Qr . There are natural quotient maps have sections trS : S r (U) → LrS (U) qS : LrS (U) → S r (U) and qΛ : LrΛ (U) → Λr (U), which P and trΛ : Λr (U) → LrΛ (U) given by tr x := |Σr1:Qr | π∈Σr /Qr πx. These have the property that qS ◦ trS = IdS r (U ) and qΛ ◦ trΛ = IdΛr (U ) . These maps are all natural transformations of functors on free Z(2) -modules. Writing r = 2p + t as before, we see from the description of Qr that ( p S 2 (U) ⊗ S t (U) if t < 2p LrS (U) ∼ = p p p (S 2 (U) ⊗ S 2 (U))/C2 ∼ = S 2 (S 2 (U)) if t = 2p . Similarly, if r ≥ 3 we have ( p Λ2 (U) ⊗ Λt (U) if t < 2p LrΛ (U) ∼ = p p p (Λ2 (U) ⊗ Λ2 (U))/C2 ∼ = S 2 (Λ2 (U)) if t = 2p , because the involution τ has signature 1, provided that p ≥ 1. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 18 Now let V be an F2 -vector space and let U be a free Z(2) -module such that V ∼ = F2 ⊗Z(2) U. r r r r r Let L denote one of the functors S , Λ , LS , LΛ above and use it to define a functor with the same name on F2 -vector spaces by Lr (V ) = F2 ⊗Z(2) Lr (U). This gives the expected result for S r (V ) and Λr (V ). In order to verify that Lr is really a functor on vector spaces, notice that if U and U ′ are two free Z(2) -modules then the natural map HomZ(2) (U, U ′ ) → HomF2 (F2 ⊗Z(2) U, F2 ⊗Z(2) U ′ ) is surjective, so all maps of vector spaces lift. Furthermore, a map in the kernel has image in 2U ′ , so factors through multiplication by 2 on U ′ . But multiplication by 2 on U ′ induces multiplication by 2r on T r (U ′ )σ , thus it induces 0 on F2 ⊗Z(2) Lr (U ′ ). It follows that the formulas above are also valid for F2 -vector spaces. A difference is that we now have natural transformations er : S r → Λr and Lre : LrS → LrΛ induced by reducing modulo squares. The above functors induce functors on modules for a group in the obvious way. Remark. Any representation of G over a field of characteristic 2 can be written in F2 , so this is sufficient for our purposes. If we really needed functors on vector spaces over a bigger field, this could be achieved by starting with a larger ring than Z(2) . In the rest of this section we prove part (a) of Theorem 4.1, assuming the whole of the theorem for smaller n. We use the same notation as before. Lemma 9.1. Suppose that V is a kG-module, r ≥ 2 and Lre : LrS (V ) → LrΛ (V ) is split injective modulo induced summands. Then er : S r (V ) → Λr (V ) is split injective modulo induced summands. Proof. Consider the commutative diagram er S r (V ) −−−→ Λr (V )   tr  trS y y Λ Lr LrS (V ) −−−e→ LrΛ (V ). The map trS is split injective, so if Lre is split injective modulo induced summands then so is Lre ◦ trS , by Lemma 3.9 (a). But this is equal to trΛ ◦ er and Lemma 3.9 (b) shows that er is split injective modulo induced summands.  Lemma 9.2. If s is an odd integer such that 0 < s < 2n−1 and r is an integer such that 0 ≤ r < 2n , then er : S r (V2n−1 +s ) → Λr (V2n−1 +s ) is split injective modulo induced summands. Proof. We use induction on r. The cases r = 0, 1 are trivial and r = 2 is covered by Lemma 8.3 combined with Lemma 8.2. Let r ≥ 3 and write r = 2p + t with 1 ≤ t ≤ 2p . Abbreviate V2n−1 +s to V . By Lemma 9.1, it is sufficient to check that Lre : LrS (V ) → LrΛ (V ) is split injective modulo induced summands. p p p If t < 2p then Lre = e2 ⊗ et : S 2 (V ) ⊗ S t (V ) → Λ2 (V ) ⊗ Λt (V ). This is split injective modulo induced summands by induction and Lemma 3.9 (c). p p p p If t = 2p then Lre = S 2 (e2 ) : S 2 (S 2 (V )) → S 2 (Λ2 (V )). By induction, e2 is split injective p p modulo induced summands, so it extends to a split injective map M : S 2 (V ) → Λ2 (V ) ⊕ X with left inverse N, where X is induced. By the remark after Lemma 3.10, we may assume p that X only contains summands that are also summands of S 2 (V ); by Lemma 8.5 and the EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 19 assumption that r < 2n (and hence 2p < 2n−1, since t = 2p ), these are of dimension divisible p by 4. Applying S 2 , we see that S 2 (e2 ) extends to p p p S 2 (M) : S 2 (S 2 (V )) → S 2 (Λ2 (V )) ⊕ S 2 (X) ⊕ (Λ2 (V ) ⊗ X), p with left inverse S 2 (N). Certainly Λ2 (V ) ⊗ X is induced, and S 2 (X) is induced, by Corollary 3.7. Thus Lre and thus er are split injective modulo induced summands.  Again, let s be an odd integer such that 0 < s < 2n−1 . It follows from Lemmas 8.1, 8.2 and 9.2 that the complex K r (V2n−1 +s , Vs2 ) is separated for all 0 ≤ r < 2n . Recall that K(V2n−1 +s , Vs2 ) is separated if and only if the complex L(V2n−1 +s , Vs2 ) from Section 6 is separated. For the rest of this section we will write just K, L etc. . Now Lr is separated for all 0 ≤ r < 2n , because it coincides with K r in this range. We will show that Lr is separated for r ≥ 2n by induction on r, so let r ≥ 2n and assume that the complex is separated in all lower degrees. By Lemma 8.1, we can also assume that Lr is separated in positive (complex-)degrees, so it is enough to prove that the short exact sequence (11) 0 → Im(dr1 ) → T r → Ter → 0 is separated at T r . By Lemma 2.8, the restriction of K to the maximal subgroup H of G decomposes as a tensor product of two complexes, and each of these is separated, by our continuing induction hypothesis and Theorem 4.1(a). Their product is also separated, by Lemma 2.2, hence so is Lr . It follows that the sequence (11) is separated at T r on restriction to H. But T r is induced for this range of r. Separation of (11) follows immediately from Proposition 2.4 applied to Im(dr1 ) → T r . This proves that the complex K r (V2n−1 +s , Vs2 ) is separated for all r ≥ 0, and part (a) of Theorem 4.1 follows. 10. Exterior Powers In this section we prove part (d) of Theorem 4.1, assuming the whole of the theorem for smaller n. Because we have already proved separation, periodicity and splitting we know that Ω λt (V2n−1 +s ) =ind λΩ t2 (Vs )λt (V2n−1 −s ); see the first remark at the end of Section 4. In order to obtain the formula with =proj , we first consider the restriction to the subgroup H of index 2. Writing V2n−1 +s ↓G H = V2n−2 +s′ ⊕ V2n−2 +s′′ , the two sides of the formula become Ω Ω Ω λt (V2n−2 +s′ )λt (V2n−2 +s′′ ) and λΩ t2 (Vs′ )λt2 (Vs′′ )λt (V2n−2 −s′ )λt (V2n−2 −s′′ ). ′′ Ω ′ But we know, by induction, that λt (V2n−2 +s′ ) =proj λΩ t2 (Vs )λt (V2n−2 −s′ ) and similarly for s . Thus, on restriction, the two sides are equal modulo projectives. Now use Lemma 3.3 in order to see that the two sides are equal modulo projectives even before restriction. This finally completes the proof of Theorem 4.1. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 20 11. A Bound on the Number of Non-Induced Summands The description of the tensor product given in Section 3 shows that the decomposition of Vr ⊗ Vs into indecomposable summands involves a summand of odd dimension if and only both r and s are odd, in which case it contains precisely one odd-dimensional summand. Let us write summ(V ) for the number of indecomposable summands in the module V . Proposition 11.1. The number of non-induced summands in Λ(V ) is at most q 1 (dim(V )+summ(V )) 22 = 2summ(V ) dim(Λ(V )). Proof. Let f (V ) denote the number of non-induced summands in Λ(V ). The comment about the tensor product above shows that f (V ⊕ W ) = f (V )f (W ). The proposed bound also turns sums into products, so it suffices to consider the case when V = Vr is indecomposable 1 and show that f (Vr ) ≤ 2 2 (r+1) . We use induction on r. Since the cases r = 0, 1 are trivial we can assume that r ≥ 2, and we can write r = 2n−1 + s, where 1 ≤ s ≤ 2n−1 . Setting t = 1 in the formula Ω λt (V2n−1 +s ) =proj λΩ t2 (Vs )λt (V2n−1 −s ) and using induction we obtain Ω f (Λ(V2n−1 +s )) = f (λ1 (V2n−1 +s )) = f (λΩ 1 (Vs ))f (λ1 (V2n−1 −s )) = f (λ1 (Vs ))f (λ1 (V2n−1 −s )) 1 n−1 −s+1) ≤ 2 2 (2 1 1 n−1 +2) 2 2 (s+1) = 2 2 (2 1 n−1 +s+1) ≤ 2 2 (2 .  For an indecomposable kG-module Vr , if we assume that the group acts faithfully then r > 12 |G|, and the dimension of any direct summand of Λ(Vr ) is at most |G|. It follows that the dimension of the non-induced part of Λ(Vr ) divided by the dimension of the whole of 1 Λ(Vr ) is at most 2 2 (3−r) r. 12. Remarks (a) As already mentioned in the introduction, the formula in Theorem 1.1 reduces the computation of Λr (V2n−1 +s ) to the computation of tensor products of exterior powers of modules of smaller dimension. Since tensor products can easily be determined recursively (see Section 3), this gives an efficient recursive method for calculating the decomposition of exterior powers of modules for cyclic 2-groups into indecomposables. A program based on this recurrence relation was implemented in GAP [10] by the first author. A restriction on the use of Theorem 1.1 is the growth of the multiplicities of direct summands of the form V2m . For example, the multiplicity of V128 as a direct summand of Λ57 (V147 ) is 8197519886357582844587268803532720. If one is only interested in the non-induced part of Λr (V2n−1 +s ) the recurrence relation can be applied modulo induced summands to keep the multiplicities relatively small. Together with the results in [21], the recurrence relation in Theorem 1.1 also provides an algorithm for computing the decomposition of the symmetric powers S r (Vm ) into indecomposables for arbitrary m and r. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 21 Example. We determine the decomposition of Λ6 (V13 ) into indecomposables: Λ6 (V13 ) ∼ =proj Ω0+6 (Λ0 (V5 ) ⊗ Λ6 (V3 )) ⊕ Ω1+4 (Λ1 (V5 ) ⊗ Λ4 (V3 )) ⊕ 16 16 3 0 2 2 3+0 Ω2+2 16 (Λ (V5 ) ⊗ Λ (V3 )) ⊕ Ω16 (Λ (V5 ) ⊗ Λ (V3 )) (Λ2 (V5 ) ⊗ V3 ) ⊕ Ω16 (Λ3 (V5 )). ∼ =proj 3 Furthermore Λ (V5 ) ∼ = Λ2 (V5 ), by duality, and Λ2 (V5 ) ∼ = V3 ⊕ V7 . = V3 ⊕ Ω8 (V1 ) ∼ = Ω0+2 (Λ0 (V1 ) ⊗ Λ2 (V3 )) ⊕ Ω1+0 (Λ1 (V1 ) ⊗ Λ0 (V3 )) ∼ 8 8 Thus Λ6 (V13 ) ∼ =proj (V3 ⊗ V3 ) ⊕ (V7 ⊗ V3 ) ⊕ Ω16 (V3 ⊕ V7 ) =proj (V3 ⊕ V7 ) ⊗ V3 ⊕ Ω16 (V3 ⊕ V7 ) ∼ ∼ =proj (V1 ⊕ 2V4 ) ⊕ (V5 ⊕ 2V8 ) ⊕ (V13 ⊕ V9 ) ∼ =proj V1 ⊕ 2V4 ⊕ V5 ⊕ 2V8 ⊕ V9 ⊕ V13 . Comparing dimensions, we obtain Λ6 (V13 ) ∼ = V1 ⊕ 2V4 ⊕ V5 ⊕ 2V8 ⊕ V9 ⊕ V13 ⊕ 104V16. (b) Obviously, Gow and Laffey’s formula for exterior squares [11, Theorem 2] is the special case r = 2 of Theorem 1.1. Furthermore, setting s = 2n−1 − 1 in Theorem 1.1 gives Kouwenhoven’s formula [15, Theorem 3.4] for Λr (Vq−1 ) when q is a power of 2 (for all r). In [15, Theorem 3.5] Kouwenhoven proved the formula λt (Vq+1 − Vq−1 ) = 1 + (Vq+1 − Vq−1 )t + t2 (12) in a(Cq·p )[[t]], where q is a power of a prime p; see Section 4 for a definition of λt . We will show how this can be derived from Theorem 1.1 in the case that p = 2. Note that, since the dimension series of the two sides match, it is sufficient to prove this modulo projectives. The theorem gives us: 2n λt (V2n−1 +1 ) = (1 + V2n −1 t2 )λΩ (V2n−1 −1 ) t modulo V2n and Ω λt (V2n−1 −1 ) = (1 + V2n−1 −1 t)λt22n−1 (V2n−2 −1 ) modulo V2n−1 . The latter can be written as Ω λt (V2n−1 −1 ) = (1 + V2n−1 −1 t)(λt22n−1 (V2n−2 −1 ) + V2n−1 f (t)) exactly (the last term can be written inside the parentheses, since (1+V2n−1 −1 t) is invertible). Applying Ω2n in odd degrees we obtain Ω 2n λΩ (V2n−1 −1 ) = (1 + V2n−1 +1 t)(λt22n−1 (V2n−2 −1 ) + V2n−1 f (t)). t Substituting into the left hand side of (12) yields (1 + V2n −1 t2 )(1 + V2n−1 +1 t)(1 + V2n−1 −1 t)−1 modulo V2n , and it is easy to verify that (1 + V2n −1 t2 )(1 + V2n−1 +1 t) = (1 + V2n−1 −1 t)(1 + (V2n−1 +1 − V2n−1 −1 )t + t2 ) modulo V2n . (c) Theorem 1.1 can also be used to calculate the Adams operations on the Green ring a(C2n ), as was shown to us by Roger Bryant and Marianne Johnson. For each r > 0 and j ∈ {1, . . . , 2n }, define an element ψΛr (Vj ) ∈ a(C2n ) by ψΛ1 (Vj ) − ψΛ2 (Vj )t + ψΛ3 (Vj )t2 − · · · = ψΛ,t (Vj ) = d dt log λt (Vj ). EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 22 By Z-linear extension there is a map ψΛr : a(C2n ) → a(C2n ), called the rth Adams operation defined by the exterior powers. It can be shown that if r is odd, then ψΛr is the identity map i i i on a(C2n ) and that ψΛ2 r = ψΛ2 for all i ≥ 1, so all that remains is to describe ψΛ2 for i ≥ 1 (see [5] and [6] for details). For j ≥ 2, write j = 2m + s with m ≥ 0 and 1 ≤ s ≤ 2m ; then i i−1 i ψΛ2 (V2m +s ) = 2ψΛ2 (Vs ) + ψΛ2 (V2m −s ) for all i ≥ 2 and ψΛ2 (V2m +s ) = 2V2m+1 − 2V2m+1 −s + ψΛ2 (V2m −s ). This can be seen by applying the definition of the Adams operations to the Hilbert series form of Theorem 1.1, obtaining (in the obvious notation) Ω Ω ψΛ,t (V2m +s ) =proj 2tψΛ,t 2 (Vs ) + ψΛ,t (V2m −s ). References [1] G. Almkvist, R.M. Fossum, Decompositions of exterior and symmetric powers of indecomposable Z/pZmodules in characteristic p and relations to invariants, in Sém. d’Algèbre P. Dubreil, Lecture Notes in Math. 641, Springer-Verlag, Berlin, Heidelberg, New York, 1976-1977, 1–111. [2] M. J. J. Barry, Decomposing tensor products and exterior and symmetric squares, J. Group Theory 14 (2011), 59–82. [3] M. J. J. Barry, Generators for decompositions of tensor products of modules, Arch. Math. 97 (2011), 503–512. [4] D. J. Benson, Representations and cohomology I and II, Cambridge studies in advanced mathematics 30, 31 (1991), Cambridge Univ. Press, Cambridge. [5] R. M. Bryant, M. Johnson, Adams operations on the Green ring of a cyclic group of prime-power order, J. Algebra, 323 (2010), 2818–2833 [6] R. M. Bryant, M. Johnson, Periodicity of Adams operations on the Green ring of a finite group, J. Pure Appl. Algebra, 215 (2011), 989–1002 [7] L. Chouinard, Projectivity and relative projectivity over group rings, J. Pure and Applied Algebra 7 (1976), 278-302. [8] C.W. Curtis, I. Reiner, Methods of representation theory I, Wiley, New York, 1987. [9] J. A. Green, The modular representation algebra of a finite group, Illinois J. Math. 6 (1962), 607–619. [10] The GAP Group, ‘GAP – Groups, Algorithms, and Programming‘, Version 4.5.4 (2012), http://www.gap-system.org. [11] R. Gow, T. Laffey, On the decomposition of the exterior square of an indecomposable module of a cyclic p-group, J. Group Theory 9 (2006), 659–672. [12] F. Himstedt, P. Symonds, Equivariant Hilbert series, Algebra & Number Theory 3 (2009), 423–443. [13] X.-D. Hou, Elementary divisors of tensor products and p-ranks of binomial matrices, Linear Algebra Appl. 374 (2003), 255–274. [14] I. Hughes, G. Kemper, Symmetric powers of modular representations, Hilbert series and degree bounds, Comm. in Algebra, 28 (2000), 2059–2088. [15] F. M. Kouwenhoven, The λ-structure of the Green rings of cyclic p-groups, Proc. of Symposia in Pure Math., 47 (1987), 451–466. [16] C. W. Norman, On the Jordan form of the tensor product over fields of prime characteristic, Linear and Multilinear Algebra 38 (1995), 351–371. [17] C. W. Norman, On Jordan bases for the tensor product and Kronecker sum and their elementary divisors over fields of prime characteristic, Linear Multilinear Algebra 56 (2008), 415-451. [18] J.-C. Renaud, The decomposition of products in the modular representation ring of a cyclic group of prime power order, J. Algebra 58 (1979), 1–11. [19] J.-C. Renaud, Recurrence relations in a modular representation algebra, Bull. Austral. Math. Soc. 26 (1982), 215–219. EXTERIOR AND SYMMETRIC POWERS OF MODULES FOR CYCLIC 2-GROUPS 23 [20] B. Srinivasan, The modular representation ring of a cyclic p-group, Proc. London Math. Soc. (3) 14 (1964), 677–688. [21] P. Symonds, Cyclic group actions on polynomial rings, Bulletin London Math. Soc. 39 (2007), 181–188. Technische Universität München, Zentrum Mathematik - M11, Boltzmannstr. 3, 85748 Garching, Germany E-mail address: [email protected] School of Mathematics, University of Manchester, Manchester M13 9PL, United Kingdom E-mail address: [email protected]
0math.AC
Identification of functionally related enzymes by learning-to-rank methods arXiv:1405.4394v1 [cs.LG] 17 May 2014 Michiel Stock, Thomas Fober, Eyke Hüllermeier, Serghei Glinca, Gerhard Klebe, Tapio Pahikkala, Antti Airola, Bernard De Baets, Willem Waegeman ∗ Abstract Enzyme sequences and structures are routinely used in the biological sciences as queries to search for functionally related enzymes in online databases. To this end, one usually departs from some notion of similarity, comparing two enzymes by looking for correspondences in their sequences, structures or surfaces. For a given query, the search operation results in a ranking of the enzymes in the database, from very similar to dissimilar enzymes, while information about the biological function of annotated database enzymes is ignored. In this work we show that rankings of that kind can be substantially improved by applying kernel-based learning algorithms. This approach enables the detection of statistical dependencies between similarities of the active cleft and the biological function of annotated enzymes. This is in contrast to search-based approaches, which do not take annotated training data into account. Similarity measures based on the active cleft are known to outperform sequence-based or structure-based measures under certain conditions. We consider the Enzyme Commission (EC) classification hierarchy for obtaining annotated enzymes during the training phase. The results of a set of sizeable experiments indicate a consistent and significant improvement for a set of similarity measures that exploit information about small cavities in the surface of enzymes. 1 Introduction Modern high-throughput technologies in molecular biology are generating more and more protein sequences and tertiary structures, of which only a small fraction can ever be experimentally annotated w.r.t. functionality. Predicting the biological function of enzymes1 remains extremely challenging, and especially novel functions are hard to detect, despite the large number of automated annotation methods that have been introduced in the last decade [1, 2]. Existing online services, such as BLAST or ReliBase, often provide tools to search in databases that contain collections of annotated enzymes. These systems rely on some notion of similarity when searching for related enzymes, but the definition of similarity differs from system to system. Indeed, a vast number of measures for expressing similarity between two enzymes exists in the literature, performing calculations on different levels of abstraction. One can make a major subdivision of these measures into approaches that solely use the sequence of amino acids, approaches that also take into account the tertiary structure, and approaches that consider local fold information by analyzing small cavities (hypothetical binding sites) at the surface of an enzyme. Sequence-based measures such as BLAST [3] and PSI-BLAST [4] can be computed in an efficient manner and are able to find enzymes with related functions under certain conditions. In addition to these, several kernelbased methods have been developed to make predictions for proteins at the sequence level - see e.g. [5, 6]. A high sequence similarity usually results in a high structural similarity, and proteins with a sequence identity (the number of matches in an alignment) above 40 % are generally considered to share the same structure [7]. However, this assumption becomes less reliable in the twilight zone, when the sequence identity is situated between 25 and 40 %. Furthermore, enzymes with comparable functions can exhibit sequences with very low sequence identity [8, 9]. For these reasons, and because three-dimensional crystal structures are becoming more and more available in online databases, the comparison of proteins at the structural level has gained increasing attention. The secondary ∗ M. Stock, B. De Baets and W. Waegeman are with the Department of Mathematical Modelling, Statistics and Bioinformatics, Ghent University, Coupure links 653, 9000 Ghent, Belgium, email: [email protected]. T. Fober and E. Hüllermeier are with the Philipps-Universität of Marburg, Department of Mathematics and Computer Science, Hans-Meerwein-Straße 6, D-35032 Marburg, Germany. S. Glinca and G. Klebe are also with the Philipps-Universität of Marburg, Department of Pharmacy, Marbacher Weg 6-10, D-35032 Marburg, Germany. T. Pahikkala and A. Airola are with the Department of Information Technology and the Turku Centre for Computer Science, University of Turku, Joukahaisenkatu 3-5 B 20520 Turku, Finland. 1 Enzymes are biomolecules that catalyze chemical reactions. All the enzymes we consider in this work are proteins and vice versa. Both notions will be used interchangeably. 1 structure of an enzyme is known to highly influence its biological function [10] and contains valuable information that is missing at the sequence level [11, 12, 13]. Many approaches that perform calculations on the overall fold of the protein have been developed - see e.g. [14, 15, 16]. Unfortunately, such approaches are also not optimal for determining the function of enzymes. They require knowledge of active site residues and usually lead to a quite coarse representation, especially for enzymes, where often only a few specific residues are responsible for the catalytic mechanism [17]. For example, the vicinal-oxygen-chelate superfamily shows a large functional diversity while having only a limited sequence diversity [18, 19]. It has also been shown that some parts of the protein structure space have a high functional diversity [20], further limiting the use of global fold similarity. For these reasons, many methods consider local structural features, such as evolutionary conserved residues [21, 22]. The most appropriate similarity measures for the prediction of enzyme functions focus on surface regions in which ligands, co-factors and substrates can bind [23]. Cavities in the surface are known to contain valuable information, and exploiting similarities between those cavities helps finding functionally related enzymes. By considering structural and physico-chemical information of binding sites, one can detect relationships that cannot be found using traditional sequence- and fold-based methods, making such similarities of particular interest for applications in drug discovery [24, 25]. In addition to providing a complementary notion of protein families [26], these methods also allow for extracting relationships between cavities of unrelated proteins [27]. Similarity measures that highlight cavities and binding sites can be further subdivided into graph-based approaches such as [28, 29, 30, 31, 32], geometric approaches such as [33, 34] and feature-based approaches such as [35, 36]. These measures will be discussed more thoroughly in Section 2. This paper aims to show that the search for functionally related enzymes can be substantially improved by applying learning-to-rank methods. These algorithms use training data to build a mathematical model for ranking objects, such as enzymes, that are not necessarily seen among the training data. While our methods can be applied to all types of data, as long as a meaningful similarity measure can be constructed, we only demonstrate its power using cavity-based measures, for the reasons explained above. Ranking-based machine learning algorithms are often used for applications in information retrieval [37]. Due to their proven added value for search engines, ranking-based machine learning methods have gained some popularity in bioinformatics, for example in drug discovery [38, 39] or to find similarities between proteins [40, 41]. Despite this, many online services such as BLAST, PDB, Dali and CavBase solely rely on similarity measures to construct rankings, without utilizing annotated enzymes and learning algorithms to steer the search process during a training phase. However, due to the presence of annotated enzymes in online databases, improvements can be made by applying ranking-based machine learning algorithms. This amounts to a transition from an unsupervised to a supervised learning scenario. Using four different cavity-based similarity measures and one based on sequence alignment as input for RankRLS [42], a kernel-based ranking algorithm, we demonstrate a significant improvement for each of these measures. RankRLS works in a similar way as competitors such as RankSVM [43], because it uses annotated training data to learn rankings during a training phase. The training data is annotated via the Enzyme Commission (EC) functional classification hierarchy, a commonly used way to subdivide enzymes into functional classes. EC numbers adopt a four-number hierarchical structure, representing different levels of catalytic detail. Importantly, this representation focuses on the chemical reactions that are performed, and not on structure or homology. As explained more elaborately in Section 2, the EC numbers are used to construct a ground-truth catalytic similarity measure, and subsequently to generate ground-truth rankings. In addition to obtaining annotated training data, this procedure also allows for a fair comparison with the more traditional approach, using conventional performance measures for rankings. This way of evaluating also characterizes the difference between our search engine approach and previous work in which supervised learning algorithms for EC number assignment have been considered – for a far from complete list see e.g. [44, 29, 45, 46, 47]. In this work we are unable to compare to such methods, because they do not return rankings as output. Nonetheless, similar to some of these approaches, we do take the hierarchical structure of the EC numbers into account. Instead of predicting one EC number, a ranking of functionally related enzymes is returned for a given query. In this scheme the top of the obtained ranking is expected to contain enzymes with functions similar to the query enzyme with an unknown EC number. A ranking provides end users with a generally well-known and easily understandable output, while still useful results can be retrieved when an enzyme with a new EC number is encountered. 2 2.1 Material and methods Database Our work builds upon CavBase, a database that is made commercially available as part of ReliBase [48]. CavBase can be used for the automated detection, extraction, and storage of protein cavities from experimentally determined 2 protein structures, which are available through the Protein Data Bank (PDB). The geometrical arrangement of the pocket and its physico-chemical properties are first represented by predefined pseudocenters – spatial points that characterize the geometric center of a functional group specified by a particular property. The type and the spatial position of the pseudocenters depend on the amino acids that border the binding pocket and expose their functional groups. They are derived from the protein structure using a set of predefined rules [49]. Hydrogen-bond donor, acceptor, mixed donor/acceptor, hydrophobic aliphatic, metal ion, pi (accounts for the ability to form π-π interactions) and aromatic properties are considered as possible types of pseudocenters. These pseudocenters can be regarded as a compressed representation of surface areas where certain protein-ligand interactions are encountered. Consequently, a set of pseudocenters is an approximate representation of a spatial distribution of physico-chemical properties. To build and test our models we require an appropriate data set that contains sufficiently many proteins and EC classes. Based on the experience of local pharmaceutical experts, we chose the data set of EC classes depicted in Table 1. To generate the first data set (data set I), we retrieved all proteins from the PDB which got assigned one of these EC classes. Thus, we ended up with a set of 5,257 proteins. To ensure that only unique proteins were contained in our data set, we used the protein culling server2 with its default parameterization. As such, all proteins that have high pairwise homology were filtered out. This procedure resulted in a data set of cardinality 1,714. To extract the active site of the protein we used the assumption that the largest binding site of a protein does contain its catalytic center [23]. Hence, for each protein we took the binding site from the database CavBase which maximized the volume. From our data set, 158 proteins were not contained in the CavBase (e.g., because the structure was determined by NMR instead of X-ray). Therefore these proteins were removed from the data set, resulting in a final data set of size 1,556. The first data set comes with two drawbacks. First of all, the binding site containing the catalytic centre was determined by a pure heuristic, namely by taking the largest binding site among all binding sites a protein exhibits. Moreover, sufficient resolution was not a criterium for selecting the cavities. This may lead to a data set of low quality. Therefore, relying on the expertise of pharmaceutical experts we compiled another data set referred to as data set II, containing the same EC classes. For this data set, all proteins from the PDB that have a resolution of at least 2.5 Å were considered. Moreover the binding site volume was required to range between 350 Å3 and 3500 Å3 . Structures not meeting these conditions were eliminated since resolutions below 2.5 Å usually lead to a too coarse representation, while binding sites with volumes outside the above-mentioned range are usually artefacts produced by the algorithm used for their detection. From the resulting set of 24,102 proteins the active site was selected. This resulted in a data set of 1730 enzymes on which we applied the protein culling server to finally end up with a second data set of 561 enzymes. A pairwise sequence similarity matrix and phylogenetic tree of our data sets can be found in the supplementary materials. 2.2 Similarity measures for cavities In the introduction we have motivated why our analysis is restricted to similarity measures for cavities, which are three-dimensional objects that can be represented in multiple ways. Some measures are graph-based, transforming cavities into node-labeled and edge-weighted graphs. This allows to apply traditional techniques to compare graphs (e.g. [28]). Unfortunately, techniques that construct a boolean similarity measure, such as those based on graph isomorphisms, are not appropriate for comparing noisy and flexible protein structures. Computing the maximum common subgraph [50] can be considered as a more appropriate alternative, and this method will be used in this paper as a baseline (see below). The graph edit distance [51] is another measure to compare graphs, specifying the number of edit operations needed to transform a given graph into another graph. This distance can be calculated in different ways, e.g., by using a greedy heuristic [52] or quadratic programming [53]. Unfortunately, the graph edit distance is very hard to parameterize and often quite inefficient. More efficient approaches belong to the class of graph kernels. They have gained a lot of attention in bioinformatics, as they allow for a sufficiently high degree of error tolerance. Different realizations are available, such as the shortest path kernel [54], the random walk kernel [30] and the graphlet kernel [31, 32]. Graph kernels work particularly well for small molecules such as ligands, but they are less useful for larger molecules such as proteins. They gave rather poor results in [36], which explains why we concentrated here on the maximum common subgraph as a representative for graph-based approaches. As a second category of measures for cavities, geometric methods directly process the labeled spatial coordinates of the functional parts, denoted as point clouds, instead of transforming a protein cavity into a graph. Remarkably, only few approaches have been proposed that build on this representation. In [33] geometric hashing is employed to 2 http://www.bioinf.manchester.ac.uk/leaf/ 3 Table 1: List of the 21 EC numbers with their accepted name and the number of examples of each class for the two data sets. EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC EC number 1.1.1.1 1.1.1.21 1.5.1.3 1.11.1.5 1.14.15.1 2.1.1.45 2.1.1.98 2.4.1.1 2.4.2.29 2.7.11.1 3.1.1.7 3.1.3.48 3.4.21.4 3.4.21.5 3.5.2.6 4.1.2.13 4.2.1.1 4.2.1.20 5.3.1.5 5.3.3.1 6.3.2.1 accepted name alcohol dehydrogenase aldehyde reductase dihydrofolate reductase cytochrome-c peroxidase camphor 5-monooxygenase thymidylate synthase diphthine synthase phosphorylase tRNA-guanine transglycosylase non-specific serine/threonine enzyme kinase acetylcholinesterase enzyme-tyrosine-phosphatase trypsin thrombin β-lactamase fructose-bisphosphate aldolase carbonate dehydratase tryptophan synthase xylose isomerase steroid ∆-isomerase pantoate-β-alanine ligase # set I 23 35 110 92 30 63 5 43 32 304 23 151 118 87 153 48 186 13 18 14 8 # set II 15 30 6 31 36 22 43 40 16 24 13 28 72 51 8 4 76 7 21 10 8 calculate a superposition of protein cavities that can be used to derive an alignment and a similarity score. A similar approach was used in [34], in which an optimization problem was solved instead of applying geometric hashing. Beside these two approaches, several other methods exist for comparing two point clouds [55]. Unfortunately, the majority of these methods cannot cope with biological data, due to a very high complexity or error intolerance. As a third family of approaches, one can also represent the protein cavity as a feature vector, taking both the geometry of the cavity and physico-chemical properties into account – see e.g. [36, 35]. Subsequently, traditional or specialized measures can be applied on these vectors to obtain similarity scores between protein cavities [56, 57]. In the experiments we selected representative method for each of the three groups: one graph-based measure, one geometric measure and one feature-based measure. We also considered the original CavBase measure and a measure obtained from the Smith-Waterman protein sequence alignment. This lead to a comparison of five different measures, four based on cavities and one based on sequence alignment. Below, these measures are explained more in detail: Labeled Point Cloud Superposition (LPCS) [34]. This value is obtained by processing labeled point clouds. Hence, the CavBase data can be used directly without a need for transforming it into another representation. Intuitively, two labeled point clouds are considered similar if they can be spatially superimposed. More specifically, an approximate superposition of the two structures is obtained by fixing the first point cloud and moving the second point cloud as a whole. Two point clouds are well superimposed when each point in the first cloud can be matched with a point in the second point cloud, while the distances of these points are small and their labels consistent. This concept is used to define a fitness function that is maximized using a direct search approach [58]. The obtained maximal fitness is taken as the similarity between the two labeled point clouds. A similar measure was also proposed in [59], but a convolution kernel is suggested to obtain similarities between the point clouds. Maximum Common Subgraph (MCS) [50]. Using the MCS, the original representation in the form of a labeled point cloud must be transformed into a node-labeled and edge-weighted graph. Each pseudocenter is becoming a node labeled with the corresponding physico-chemical property. To capture the geometry, a complete graph is considered, where each edge is weighted with the Euclidean distance between the two pseudocenters it is adjacent to. The problem of measuring similarity between protein cavities now boils down to the problem of measuring similarity between graphs. A well-known approach here is to search for the maximum common subgraph of the two input graphs and to define similarity as the size of the maximum common subgraph relative to the size of the larger graph. In case of noisy data, a threshold  is required, 4 defining two edges as equal if their weight differs at most by . In this paper, this parameter is set to 0.2 Å, as recommended by several authors [52, 60]. CavBase (CB) similarity [49]. CavBase also makes use of an algorithm for the detection of common subgraphs. Instead of considering the largest common subgraph, as done in the case of MCS, the 100 largest common subgraphs are considered. Each common subgraph is used to determine a transformation rule by means of the Kabsch algorithm [61], which superimposes both proteins. In a post-processing step the surface points are also superimposed according to the transformation rule, and a similarity score is derived using these surface points. Eventually, a set of 100 similarity values is obtained, from which the highest value is returned as similarity between the two protein cavities. Fingerprints (FP) Fingerprints are a well-known concept and have been used successfully in many domains. For the comparison of protein binding sites, the authors in [62] transformed the protein binding site into a node-labeled and edge-weighted graph as described above. Moreover they defined generically a set of features, namely complete node-labeled and edge-weighted graphs of size 3. For each such feature, a test is performed to decide whether or not the feature is contained in the graph representing the protein. This is done by subgraph isomorphism, to checks whether the labels are identical. The nodes of the features are labeled by the set of physiochemical properties. Edges of patterns are labeled by intervals or bins and instead of testing for equivalence, a test is performed whether edge weight of the graph representing the protein falls into the bin of the pattern. The thus generated fingerprints are compared by means of the Jaccard similarity measure, as proposed by [56]. Smith-Waterman (SW) Beside using structure-based approaches to compare protein binding sites, we used also sequence alignment in our experimental study. To calculate sequence alignments we used the SmithWaterman algorithm [63] which was parameterized with the Blosum-62 matrix. From the sequence alignment we derived the sequence identity which was subsequently used to perform experiments. 2.3 Unsupervised ranking In the introduction we have explained why existing online services such as BLAST, PDB, Dali and CavBase construct rankings in an unsupervised way. These systems create a ranking by means of a similarity measure only, without training a model that uses annotated enzymes. The annotated enzymes in a database are simply ranked according to their similarity with an enzyme query with unknown function. In the case of CavBase, the enzymes having a high cavity-based similarity appear on top of the ranking, those exhibiting a low cavity-based similarity end up at the bottom. More formally, let us represent the similarity between a pair of enzymes by K : V 2 → R+ , where V represents the set of all potential enzymes. Given the similarities K(v, v 0 ) and K(v, v 00 ), we compose the ranking of v 0 and v 00 conditioned on the query v as: 00 0 00 v 0 K v v ⇔ K(v, v ) ≥ K(v, v ) , K v (1) indicates the relation is ranked higher than, for query v, based on the similarity K. Note that this is where a relation between two enzymes conditioned on a third enzyme. In our context, there is no meaningful ranking possible between enzymes v 0 and v 00 without referring to another enzyme v. This approach adopts the same methodology as a nearest neighbor classifier, but a ranking rather than a class label should be seen as the output of the algorithm. The quality of such rankings can be evaluated when the database contains annotated enzymes and annotated queries. In an evaluation phase, we compare the obtained ranking with the ground truth ranking, which can be constructed from the EC numbers for annotated enzymes. This ground truth ranking can be deduced from the catalytic similarity (i.e., ground truth similarity) between the query and all database enzymes, by counting the number of successive matches in the EC label of the query and the database enzymes. Thus the catalytic similarity is a property of only a pair of enzymes. In contrast, in order to create the ground truth ranking of two enzymes, the catalytic similarity has to be calculated w.r.t. a third enzyme. For example, an enzyme with EC number EC 2.4.2.23 has a catalytic similarity of two compared to an enzyme labeled as EC 2.4.99.12, since both enzymes belong to the family of glycosyltransferases. Conversely, the same enzyme manifests a similarity value of only one with an enzyme labeled as EC 2.8.2.23. Both are transferases in this case, but they show no further relevant similarity in the chemistry of the reactions to be catalyzed. More formally, let us represent the catalytic similarity between two enzymes by a relation Q : V 2 → {0, 1, 2, 3, 4}. Q is defined by: 4 Y i X Q(v, v 0 ) = qi qj , i=1 j=1 5 0 EC 2.7.7.34 3 EC ?.?.?.? 2 0 1 EC 4.2.3.90 0 0 0 EC 4.6.1.11 2 EC 2.7.7.12 EC 2.7.1.12 Figure 1: Six enzyme structures are shown, five of which correspond to a known EC number. The catalytic similarity Q is depicted on the edges of the graph. The algorithm that we present allows us to infer for the unannotated query (denoted as EC ?.?.?.?) a ranking of the annotated enzymes. To this end, the unsupervised approach solely uses cavity-based similarity measures, whereas the supervised approach also takes the EC numbers of annotated enzymes into account. zondag, 13 mei 2012 where qi equals 1 if the ith digit of the EC numbers of v and v 0 are the same and 0 otherwise. Figure 1 gives an example for six enzymes, five of which correspond to a known EC number. The catalytic similarity Q is depicted on the edges of the graph. The proposed algorithm allows us to infer for an unannotated query a ranking of the annotated enzymes, some of which the algorithm may not have encountered among the training data. Given the similarities Q(v, v 0 ) and Q(v, v 00 ), we compose similar to Eq. (1) the ground truth ranking of v 0 and 00 v conditioned on the query v as: 00 0 00 v 0 Q v v ⇔ Q(v, v ) ≥ Q(v, v ) . As a result, an entire ground truth ranking of database enzymes with known EC numbers can be constructed, given an annotated query enzyme. 2.4 Supervised ranking In contrast to unsupervised ranking approaches, supervised algorithms do take ground truth information into account during a training phase. We perform experiments with so-called conditional ranking algorithms [64, 65] using the RankRLS implementation [42]. Let us introduce the short-hand notation e = (v, v 0 ) to denote a couple consisting of an enzyme query v and a database enzyme v 0 . RankRLS produces a linear basis function model of the type: h(e) = h(v, v 0 ) = hw, Φ(e)i , (2) in which w denotes a vector of parameters and Φ(e) an implicit feature representation for the couple e = (v, v 0 ). RankRLS differs from more conventional kernel-based methods because it optimizes a convex and differentiable approximation of the rank loss in bipartite ranking (i.e., area under the ROC curve) instead of the zero-one loss. Together with the standard L2 regularization term on the parameter vector w and a regularization parameter λ, the following loss is minimized: X X L(h, T ) = (Qe − Qē − h(e) + h(ē))2 , (3) v∈V e,ē∈Ev for a given training set T = {(e, Qe ) | e ∈ E}. Here Qe = Q(v, v 0 ) denotes the ground truth similarity as defined above, E the set of training query-object couples for which ground truth information is available and Ev the subset of E containing results for the query v. The outer sum in Eq. (3) takes all queries into account, and the inner sum analyzes all pairwise differences between the ranked results for a given query. This loss can be minimized in a computationally efficient manner, using analytic shortcuts and gradient-based methods, as shown in [64, 65]. According to the representer theorem [66], one can rewrite Eq. (2) in the following dual form: X h(e) = hw, Φ(e)i = aē K Φ (e, ē) . ē∈E with K Φ (e, ē) a kernel function with four enzymes as input and aē the weights in the dual space. In this paper we adopt the Kronecker product feature mapping, containing information on couples of enzymes: Φ(e) = Φ(v, v 0 ) = φ(v) ⊗ φ(v 0 ) , 6 with φ(v) a feature mapping of an individual enzyme and ⊗ the Kronecker product. One can easily show that this pairwise feature mapping yields the Kronecker product pairwise kernel in the dual representation: K Φ (e, ē) = K Φ (v, v 0 , v̄, v̄ 0 ) = K φ (v, v̄)K φ (v 0 , v̄ 0 ) , with K φ a traditional kernel for enzymes. Specifying a universal kernel for K φ leads to a universal kernel for K Φ [67], indicating that one can use the kernel to represent any arbitrary relation, provided that the learning algorithm has access to training data of sufficient quality. This kernel has been introduced in [68] for modelling protein-protein interactions. We consider this kernel because of its universal approximation property, but also other pairwise kernels exist, such as the cartesian pairwise kernel [69], the metric learning pairwise kernel [70] and the transitive pairwise kernel [71, 64]. Nonetheless, it is probably not very surprising that such kernels only yield an improvement if the concepts to be learned satisfy the restrictions that are imposed by the kernels [67]. With the exception of the FP measure, none of the similarity measures discussed in Section 2.2 are strictly speaking valid kernels. Using the above construction, all similarity measures can be converted into kernels of type K φ , when they are made symmetric and positive definite. These attributes guarantee a numerically stable and unique solution of the learning algorithm. We simply enforced symmetry by averaging the similarity matrix with its transpose. Subsequently, we made the different similarity matrices positive definite by performing an eigenvalue decomposition and setting all eigenvalues smaller than 10−10 equal to zero. This method leads to a negligible loss of information compared to the numerical accuracy of our algorithms and data storage. Finally, each kernel matrix was normalized so that all diagonal elements have a value equal to one. Since these procedures were performed on the whole data set, one arrives at a so-called transductive learning setting [72]. Minor adjustments would obtain a more traditional inductive learning setting. Note that overfitting is prevented when applying this procedure, since the EC numbers of the enzymes in the data set are not taken into account. Since the catalytic similarity is a symmetric measure we also perform a post-processing to the output of our algorithm. The matrix with the predicted values used for ranking the enzymes is made symmetric by averaging it with its transpose. 2.5 Performance measures for ranking The ranking obtained with unsupervised or supervised learning algorithms can be compared to the ground truth ranking by applying performance measures that are commonly used in information retrieval. First of all, the ranking accuracy (RA) is considered, and it is defined as follows: RA = 1 1 X |V | v∈V |{Ev | ye > yē }| X I(h(e) − h(ē)) , e,ē∈Ev : ye <yē with I(x) the Heaviside function, returning one when its argument is positive, zero when its argument is negative and 1/2 when its argument is zero. The ranking accuracy can be considered as a generalization of the area under the ROC curve for more than two ordered classes [73]. Our interest in the ranking accuracy is motivated by two reasons. Firstly, unlike most other performance measures we consider, all levels of the EC hierarchy are taken into account to determine the performance of different algorithms. Predicted rankings can be interpreted as layered or multipartite rankings – see e.g. citeWaegeman2008e,Furnkranz2009. The ranking accuracy preserves this hierarchical structure by counting all pairwise comparisons. The second reason of interest is based on the fact that the ranking accuracy is optimized by the RankRLS software, using the convex and differentiable approximation given in Eq. (3). This loss function characterizes the most important difference with more traditional kernel-based algorithms, such as support vector machines, resulting in an information retrieval setting instead of a more traditional classification or network inference setting. Since the ranking accuracy is not generally known in bioinformatics, we also evaluated our algorithms using three more conventional performance measures that are commonly considered for bipartite rankings (i.e., rankings containing relevant versus irrelevant objects). These three measures are the area under the ROC curve (AUC), mean average precision (MAP) and normalized discounted cumulative gain (nDCG) [74]. For AUC and MAP all ground truth rankings had to be converted into bipartite rankings, leading to a decrease in granularity for performance estimation. We chose a cut-off threshold of three in ground truth similarity: a retrieved enzyme is relevant to the enzyme query if at least the first three parts of its EC number are identical to the query. 2.6 Experimental setup We selected two data sets of enzymes from CavBase, as described in Section 2.1. The ground-truth catalytic similarity of all enzyme pairs was computed for each data set. Each data set was further randomized and split in 7 Table 2: Summary of the results obtained for unsupervised and supervised ranking for both data sets. For each combination of similarity and type of performance measure, the performance is averaged over the different folds and queries, with the standard deviation between parentheses. Unsupervised Supervised Unsupervised Supervised RA MAP AUC nDCG RA MAP AUC nDCG CB 0.6096 0.4883 0.7110 0.7161 0.7717 0.5659 0.8242 0.6550 (0.1286) (0.2912) (0.1845) (0.3107) (0.1960) (0.3384) (0.1857) (0.4195) FP 0.6411 0.4478 0.7221 0.6615 0.7175 0.5966 0.8003 0.6928 RA MAP AUC nDCG RA MAP AUC nDCG CB 0.7216 0.9156 0.9415 0.9599 0.9997 0.9995 0.9999 0.9983 (0.1911) (0.1662) (0.1209) (0.0708) (0.0011) (0.0037) (0.0005) (0.0185) FP 0.7212 (0.1546) 0.7156 (0.2478) 0.8714 (0.1447) 0.8189 (0.2003) 0.931 (0.1096) 0.905 (0.2397) 0.9844 (0.0502) 0.8887 (0.2243) (0.1670) (0.2692) (0.1961) (0.2709) (0.2098) (0.3219) (0.2225) (0.3984) Set I MCS 0.5960 0.4967 0.6967 0.7686 0.7988 0.6854 0.8585 0.7717 Set II MCS 0.8070 0.9094 0.9622 0.9330 0.9944 0.9980 0.9997 0.9744 (0.1010) (0.2659) (0.1728) (0.3001) (0.1906) (0.3001) (0.1802) (0.3635) LPCS 0.6173 0.4826 0.7183 0.7364 0.7741 0.6324 0.8306 0.7324 (0.1244) (0.2572) (0.1565) (0.276) (0.1945) (0.3064) (0.1954) (0.3724) SW 0.6576 0.5201 0.7397 0.7401 0.7899 0.6963 0.8813 0.7518 (0.1446) (0.2964) (0.1980) (0.2597) (0.1789) (0.3103) (0.1591) (0.3669) (0.1736) (0.1514) (0.0847) (0.0948) (0.0253) (0.0265) (0.0036) (0.0773) LPCS 0.7515 0.8303 0.8937 0.8986 0.9883 0.9663 0.9926 0.9467 (0.1647) (0.1768) (0.1165) (0.1146) (0.0583) (0.1172) (0.0354) (0.1183) SW 0.7856 0.9167 0.9523 0.9589 0.9985 0.9980 0.9998 0.9968 (0.1591) (0.1634) (0.1146) (0.0768) (0.0076) (0.0393) (0.0042) (0.0344) four cross-validation folds of equal size. In the unsupervised case each subset was used individually to allow for a comparison with the supervised model. Of such a subset, each enzyme was used as a query to rank the remaining enzymes, as described in Section 2.3. The performance for each of these rankings was averaged to obtain the global performance over the folds. In the supervised setting, each fold was withheld as a test set, while the other three parts of the data set were used for training and model selection. This process was repeated for each part, so that every instance was used for training and testing (thus, four-fold outer cross-validation). Neither the query nor the database enzymes are thus used for building a model, which allows us to demonstrate that our methods can generalize to new enzymes. In addition, a 10-fold inner cross-validation loop was implemented for estimating the optimal regularization parameter λ, as recommended in [75]. The value of this hyperparameter, which controls model complexity, was selected from a grid containing all powers of 10 from 10−4 to 105 . The final model was trained using the whole training set and the median of the best hyperparameter values over the ten folds. We used the implementation RLScore3 in Python to train the models. 3 Results and discussion 3.1 Differences between cavity-based similarities and data sets Table 2 gives a global summary of the results obtained for the unsupervised and the supervised ranking approach for both data sets. One can note a sizeable difference between the performances for the different cavity-based similarities, data sets and the performance measures used. Despite this variation, it is clear that data set I is considerably harder than data set II. This can easily be explained by the fact that data set II only contains enzymes with a certain resolution of the active site. Furthermore, for set II the active site is determined by an expert, while for set I the active site is resolved by heuristically choosing the largest cavity. It is likely that some mistakes are made in this annotation process. Consequently, inferring functional similarity of data set I will be harder. The cavity-based similarity measure based on fingerprints usually results in the worst performance, except for the ranking error in the unsupervised setting. It seems that the performance of the FP does not improve as much in the supervised approach, compared to other cavity-based similarity measures. This is likely because the fingerprints cause a high loss of information, since even functionally dissimilar enzyme cavities can be considered similar according to this metric. Comparing the two graph-based similarities (MCS and CB), we see some differences between the data sets. Though both perform relatively well, MCS performs better for data set I, while CB is the clear champion of data 3 See http://staff.cs.utu.fi/~aatapa/software/RLScore/ for this software. 8 set II. The good performance of CavBase for data set II can be explained easily. CavBase computes the 100 largest common subgraphs, which could be used to construct a cavity-based similarity measure. However, a graph representation leads to a loss of information, since the coordinates of pseudocenters cannot be restored. Moreover, since the size of the (maximum) common subgraph is an integer that usually lies in the range of 4 to 12 nodes, there is a loss of resolution by mapping many different pairs of cavities to the same similarity score. In theory, MCS suffers from these drawbacks. Even though the resolution problem is to a certain extent solved if the size of the maximum common subgraph is divided by the size of the larger binding site, the graph representation could still lead to a slight loss of information. On the other hand, the LPCS measure uses geometric information, hence, no loss of information is introduced by transforming the pseudocenter representation into a graph representation. Moreover, this transformation does not cause the resolution problem. Yet, the measure is computed via solving a multimodal optimization problem, so it is possible to get stuck in a local optimum, resulting in a similarity score that is too low. Similar to MCS, LPCS seems to perform relatively better for data set I compared to data set II, probably because the local optimum becomes less of an issue in the former case. This can be explained by the fact that data set I contains larger cavities, on average, hence making it harder to find the global optimum. Finally, we consider the measure based on sequence alignment. For data set I, the SW similarity measure competes with the MCS as one of the best measures, depending on the performance measure. For data set II in the supervised case, it is only outperformed by the CB measure. It is clear that the SW measure is a powerful method for comparing cavities, as it is also limited by a bad resolution of the cleft.. Like MCS, SW seeks to quantify the largest similar region, here as a local alignment. As this contains, information about the common residues of the cavity, this is a simple, though powerful measure. 3.2 The benefits of supervised ranking The ranking of both data set I and data set II showed a considerable improvement in the supervised approach. Three important reasons can be put forward to explain the improvement in performance. In this section we will illustrate this using data set II, as this one showed the most clear effects of learning. First of all, the traditional benefit of supervised learning plays an important role. One can expect that supervised ranking methods outperform unsupervised methods, because they take annotations into account during the training phase to guide the model towards retrieval of enzymes with a similar EC number. Conversely, unsupervised methods solely rely on a meaningful similarity measure between enzymes, while ignoring EC numbers. Second, we also advocate that supervised ranking methods have the ability to preserve the hierarchical structure of EC numbers in their predicted rankings. Figure 2 supports this claim. It summarizes the values used for ranking one fold of the test set obtained by the different models. A higher value (indicated by a lighter color) in a row means that this enzyme is considered to have a higher catalytic similarity w.r.t. the query enzyme. So, for unsupervised ranking it visualizes K φ (v, v 0 ), for supervised ranking the values h(v, v 0 ) are shown. Each row of the heatmap corresponds to one query. For the supervised models one notices a much better correspondence with the ground truth. Furthermore, the different levels of catalytic similarity can be better distinguished. In addition, an example of the distributions of the predicted values within one query is visualized in Figure 3 by means of box plots. The different populations within a plot correspond to the different levels of the catalytic similarity w.r.t. the query enzyme. This illustrates again that supervised models can make a better discrimination between enzymes that are functionally more similar and those that are dissimilar. For this example query, no quartiles are overlapping in any supervised model, unlike the unsupervised approach, which only detects a good ranking for exact matches (i.e., enzymes having an EC number identical to the query). A third reason for improvement by the supervised ranking method can be found in the exploitation of dependencies between different catalytic similarity values. Roughly speaking, if one is interested in the catalytic similarity between enzymes v and v 0 , one can try to compute this catalytic similarity in a direct way based on mutual relationships in cavities, or derive it in an indirect way from the cavity-based similarity with a third enzyme v 00 . This division into a direct and an indirect approach shows a certain correspondence to similar discussions in the context of inferring protein-protein interaction and signal transduction networks – see e.g. [76, 70, 77]. Unsupervised ranking boils in a certain sense down to a direct approach, while supervised ranking should be interpreted as indirect. Especially when the similarity matrix contains noisy values, one can expect that the indirect approach allows for detecting back bone entries and correcting the noisy ones. 3.3 Differences between performance measures Table 2 indicates that the different performances are to some degree influenced by the similarity measure and data set used. This is especially clear for the supervised ranking approach. One can observe a very clear distinction 9 (b) Ground truth (a) Unsupervised and supervised measures used for ranking Figure 2: (a) Heatmaps of the values used for ranking the data set II for one fold in the testing phase. Each row of the heatmap corresponds to one query. The four figures on top visualize the cavity-based similarities K φ (v, v 0 ) that are used to construct an unsupervised ranking. The four figures at the bottom visualize the model output h(v, v 0 ), which is used to derive a supervised ranking. (b) The ground truth catalytic similarity that had to be learned. between the ranking accuracy and area under the ROC curve, which treat every position as equally important, and the other two measures, which emphasize the top of the ranking. This should not come as a surprise, as an approximation of the ranking error is optimized in our algorithms. The AUC is very related to the RA, as they coincide for bipartite rankings. In the latter we only make a distinction between ’relevant’ enzymes, which have three or more EC numbers in common, and enzymes which do not. Since the RA uses a finer fragmentation of functional similarity, this is a more severe performance measure compared to the AUC. For data set II, both AUC and RA are both very close to the theoretical optimum for nearly all cavity-based similarity measures in the supervised case. Figure 4 shows the ROC curves that are obtained by applying the cut-off threshold for data set I, which defines a database enzyme a hit if at least the first three digits of the EC number are correct. In contrast to the scalar performance measures of Table 2, the ROC curve gives information about the quality of the ranking at all positions. It is immediately clear that supervised ranking outcompetes unsupervised ranking, as the former’s curves are closer to the upper left corner. Typically for these curves, there is a part in the beginning where the line has a very high slope, showing that a certain fraction of relevant objects can be detected with very high sensitivity and specificity. This fraction that can be detected nearly without mistakes increases after the supervised learning step, as indicated by the higher ‘offset’ of these curves (most clear for SW, LPCS and FP in the ROC curve). The next section of the curve is usually a part with a smaller average slope, indicating that at some point it becomes harder to detect signal. For the unsupervised curves, this is nearly a straight line, which means that from that point the detection of catalytically similar enzymes is essentially random. The supervised curves still have a concave shape at their second part, which shows that relevant enzymes can still be detected in that piece. From Table 2 it is also clear that supervised ranking usually scores worse for MAP and nDCG compared to RA and AUC. For the nDCG the performance sometimes even decreases after learning a model! This can easily be explained by the fact that our model optimizes the quality of the complete ranking, in contrast to only the top which is assessed by MAP and nDGC. Note that the top functionally similar enzymes (i.e. the same EC number) can likely be detected based on the cavity-based similarity alone. Hence, training a model might not be required to perform good in this section. One can see this learning effect nicely in Figure 4 for the CB similarity measure. The quality of the supervised ranking of the top for this measure is worse than for all other measures (indicated by the low nDCG). The overall ranking (indicated by the AUC) is quite good in comparison, as the lower part compensates for the bad ranking at the top. Depending on the application, the top or the general ranking might be more of interest. 4 Related work Since the comparison of enzymes has become an important task in functional bioinformatics, a vast number of similarity measures for proteins has been proposed so far. As mentioned in the introduction, a reliable method 10 Unsupervised FP Unsupervised LPCS Unsupervised MCS Unsupervised SW 1.0 1.0 1.0 1.0 1.0 ● 3 0 3 0.6 prediction 0.2 ● 0 0.0 0.0 0.0 ● 0 ● 0.2 0.2 0.2 0.2 0.4 0.4 0.8 0.8 ● 0.6 prediction 0.6 prediction 0.4 0.6 prediction 0.8 0.8 ● 0.4 0.6 0.4 prediction 0.8 Unsupervised CB 3 0 3 0 3 cat. similarity cat. similarity cat. similarity cat. similarity cat. similarity Supervised CB Supervised FP Supervised LPCS Supervised MCS Supervised SW 3 ● 0 2 0 1 prediction 2 0 0 0 ● 1 prediction 2 prediction ● 1 1 prediction 2 1 prediction 2 3 3 3 3 4 ● ● ● 3 cat. similarity 0 3 cat. similarity 0 −1 ● 0 −1 ● 3 cat. similarity 0 3 cat. similarity 0 3 cat. similarity Figure 3: Box-and-whisker plots of the values used for ranking data set II for one randomly chosen query as an example. The different populations on the x-axis denote the groups that are formed by subdividing the database enzymes according to the number of EC number digits they share with the query. Given a query v and a database enzyme v 0 , the y-axis shows the distribution of the values h(v, v 0 ) and K φ (v, v 0 ) for the supervised and the unsupervised approach, respectively. For nearly all cavity-based similarity measures, one can observe a much better separation of the groups for the supervised approach. will focus on the geometry and the physico-chemical properties of certain regions of an enzyme. However, methods that are based on the sequence or the fold usually exhibit a much lower complexity and they can also lead to good results, especially when the sequence identity is above a certain threshold. ProFunc [78] is in this regard a very interesting tool, in which a bulk of different methods is applied, such as sequence alignment, motif and template search, and also a comparison of active sites. The biological function of enzymes is derived from the closest match in different databases such as PDB, UniProt and PROCAT, and finally returned by the program. Despite being very powerful, this approach becomes nevertheless very inefficient, with runtimes up to several hours fro a single protein. Since we considered a sizeable data set for which nearly 3,000,000 pairwise similarity scores had to be computed, it became impossible to compare our results to ProFunc. In addition to focusing on individual enzymes, one can also take protein-protein interactions into account for inferring the function. Proteins that are close to each other in a protein-protein interaction network are expected to have similar functions, so one can try to infer the function of an unanotated protein by looking at its neighbors [79]. Similarly, one can also solve optimization problems over the global network, such as maximizing the number of edges that connect proteins sharing the same function [80, 81]. Other approaches make use of probabilistic graphical models such as Markov random fields [82, 83]. Conceptually, these methods might also enrich the predictions obtained by an unsupervised search-based approach, but they usually do not consider cavity and binding site information to predict the function of proteins. 5 Conclusion In this paper we have recast the EC annotation problem as a conditional ranking problem. We have shown that retrieval of enzymes w.r.t. functionality can be substantially improved by applying a supervised ranking method that takes advantage of ground truth EC numbers during the training phase. In contrast, more traditional methods rely heavily on a notion of similarity to search for functionally related enzymes in online databases. Such methods lead to an unsupervised approach in which annotations are not taken into account. We focused specifically on cavity-based similarity measures, because their benefits compared to sequence-based and structure-based approaches have been demonstrated in previous work, although our method can work with any meaningful similarity measure defined on enzymes. In the experiments we could demonstrate a considerable improvement of the quality of the overall ranking. The results were influenced by the type of data used and the way 11 0.6 0.4 CB sup. FP sup. LPCS sup. MCS sup. SW sup. CB unsup. FP unsup. LPCS unsup. MCS unsup. SW unsup. 0.0 0.2 Average true positive rate 0.8 1.0 ROC curve for the different enzyme similarity measurements of data set I 0.0 0.2 0.4 0.6 0.8 1.0 False positive rate Figure 4: Receiver operating characteristic curves for the unsupervised and supervised ranking methods for data set I. An enzyme is considered functionally similar to the query if the first three digits of the EC number are identical to those of the query. the ranking was evaluated, indicating that the most optimal method is highly dependent of the specific problem setting. Nevertheless, our supervised ranking algorithm outperformed the unsupervised ranking algorithm for all cavity-based similarities for most performance measures considered. While the unsupervised approach succeeded quite well in returning exact matches to a query, the hierarchical structure of EC numbers was better preserved in the rankings predicted by the supervised approach. As such, supervised ranking can be interpreted as a powerful alternative for retrieval methods that are more traditionally used in bioinformatics. Acknowledgements MS, BDB and WW acknowledge the support of Ghent University (MRP Bioinformatics: from nucleotides to networks). T.F., E.H., S.G. and G.K. gratefully acknowledge financial support by the German Research Foundation (DFG) and the LOEWE Research Center for Synthetic Microbiology, Marburg. T.P. and A.A. are both supported for this work by the Academy of Finland (grant 134020 and 128061, respectively). References [1] I. Friedberg, “Automated protein function prediction–the genomic challenge,” Briefings in Bioinformatics, vol. 7, pp. 225–42, Sept. 2006. [2] D. Dunaway-Mariano, “Enzyme function discovery,” Structure, vol. 16, no. 11, pp. 1599–1600, 2008. [3] S. F. Altschul, W. Gish, W. Miller, E. W. Myers, and D. J. Lipman, “Basic Local Alignment Search Tool,” Journal of Molecular Biology, vol. 215, no. 3, pp. 403–410, 1990. [4] S. F. Altschul, T. L. Madden, A. A. Schäffer, J. Zhang, Z. Zhang, W. Miller, and D. J. Lipman, “Gapped Blast and PsiBlast: a new generation of protein database search programs,” Nucleic Acid Research, vol. 25, no. 17, pp. 3389–3402, 1997. [5] C. Leslie, E. Eskin, and W. S. Noble, “The spectrum kernel: a string kernel for SVM protein classification.,” in Pacific Symposium on Biocomputing, pp. 566–575, Jan. 2002. [6] C. S. Leslie, E. Eskin, A. Cohen, J. Weston, and W. S. Noble, “Mismatch string kernels for discriminative protein classification,” Bioinformatics, vol. 20, pp. 467–76, Mar. 2004. 12 [7] R. Powers, J. C. Copeland, K. Germer, K. A. Mercier, V. Ramanathan, and P. Revesz, “Comparison of protein active site structures for functional annotation of proteins and drug design,” Proteins: Structure, Function, and Bioinformatics, vol. 65, pp. 124–135, 2006. [8] B. Rost, “Enzyme function less conserved than anticipated,” Journal of Molecular Biology, vol. 318, no. 2, pp. 595–608, 2002. [9] A. J. Chalk, C. L. Worth, J. P. Overington, and A. W. E. Chan, “PDBLIG: Classification of small molecular protein binding in the protein data bank,” Journal of Medical Chemistry, vol. 47, no. 15, pp. 3807–3816, 2004. [10] K. Kinoshita, Y. Murakami, and H. Nakamura, “eF-seek: prediction of the functional sites of proteins by searching for similar electrostatic potential and molecular surface shape,” Nucleic Acid Research, vol. 35, no. suppl 2, pp. W398–W402, 2007. [11] J. Thornton, A. Todd, D. Milburn, N. Borkakoti, and C. Orengo, “From structure to function: Approaches and limitations,” Nature Structural Biology, vol. 7 Suppl, pp. 991–994, 2000. [12] M. Kotera, Y. Okuno, M. Hattori, S. Goto, and M. Kanehisa, “Computational assignment of the EC numbers for genomic-scale analysis of enzymatic reactions,” Journal of the American Chemical Society, vol. 126, pp. 16487–98, Dec. 2004. [13] V. Egelhofer, I. Schomburg, and D. Schomburg, “Automatic assignment of EC numbers,” PLoS Computational Biology, vol. 6, pp. 1000661+, 2010. [14] M. Shatsky, R. Niussinov, and H. J. Wolfson, “A method for simultaneous alignment of multiple protein structures,” Proteins: Structure, Function, and Bioinformatics, vol. 56, pp. 143–156, 2004. [15] M. Shatsky, The Common Point Set Problem with Applications to Protein Structure Analysis. PhD thesis, Tel Aviv University, Tel Aviv, Israel, 2006. [16] A. Harrison, F. Pearl, I. Sillitoe, T. Slidel, R. Mott, J. Thornton, and C. Orengo, “Recognizing the fold of a protein structure,” Bioinformatics, vol. 19, no. 14, pp. 1748–1759, 2003. [17] A. C. Martin, C. A. Orengo, E. G. Hutchinson, S. Jones, M. Karmirantzou, R. A. Laskowski, J. B. Mitchell, C. Taroni, and J. M. Thornton, “Protein folds and functions,” Structure, vol. 6, pp. 875–84, July 1998. [18] P. C. Babbitt and J. Gerlt, “Understanding enzyme superfamilies,” Journal of Biological Chemistry, vol. 272, pp. 30591–30594, Dec. 1997. [19] J. A. Gerlt and P. C. Babbitt, “Divergent evolution of enzymatic function: mechanistically diverse superfamilies and functionally,” Annual review of biochemistry, vol. 70, pp. 209–246, 2001. [20] M. Osadchy and R. Kolodny, “Maps of protein structure space reveal a fundamental relationship between protein structure and function,” Proceedings of the National Academy of Sciences of the United States of America, vol. 108, no. 30, pp. 12301–12306, 2011. [21] D. M. Kristensen, R. M. Ward, A. M. Lisewski, S. Erdin, B. Y. Chen, V. Y. Fofanov, M. Kimmel, L. E. Kavraki, and O. Lichtarge, “Prediction of enzyme function based on 3D templates of evolutionarily important amino acids,” BMC Bioinformatics, vol. 9, Jan. 2008. [22] S. Erdin, A. M. Lisewski, and O. Lichtarge, “Protein function prediction: towards integration of similarity metrics,” Current Opinion in Structural Biology, vol. 21, pp. 180–8, Apr. 2011. [23] R. A. Laskowski, N. M. Luscombe, M. B. Swindells, and J. M. Thornton, “Protein clefts in molecular recognition and function,” Protein Science, vol. 5, no. 12, pp. 2438–2452, 1996. [24] S. Pérot, O. Sperandio, M. A. Miteva, A.-C. Camproux, and B. O. Villoutreix, “Druggable pockets and binding site centric chemical space: a paradigm shift in drug discovery,” Drug Discovery Today, vol. 15, no. 15-16, pp. 656–667, 2010. [25] C. Andersson, B. Y. Chen, and A. Linusson, “Mapping of ligand-binding cavities in proteins,” Proteins, vol. 78, no. 6, pp. 1408–1422, 2010. 13 [26] M. Weisel, J. M. Kriegl, and G. Schneider, “Architectural repertoire of ligand-binding pockets on protein surfaces,” Chembiochem, vol. 11, no. 4, pp. 556–563, 2010. [27] A. Weber, A. Casini, A. Heine, D. Kuhn, C. T. Supuran, A. Scozzafava, and G. Klebe, “Unexpected nanomolar inhibition of carbonic anhydrase by COX-2-selective celecoxib: new pharmacological opportunities due to related binding site recognition,” Journal of Medical Chemistry, vol. 47, no. 3, pp. 550–557, 2004. [28] J. Huan, D. Bandyopadhyay, W. Wang, J. Snoeyink, J. Prins, and A. Tropsha, “Comparing graph representations of protein structure for mining family-specific residue-based packing motifs,” Journal of computational biology : a journal of computational molecular cell biology, vol. 12, no. 6, pp. 657–71, 1999. [29] K. M. Borgwardt, C. S. Ong, S. Schönauer, S. V. N. Vishwanathan, A. J. Smola, and H.-P. Kriegel, “Protein function prediction via graph kernels,” Bioinformatics, vol. 21 Suppl 1, pp. i47–56, June 2005. [30] T. Gärtner, Kernels for Structured Data. Singapore: World Scientific, 2008. [31] N. Shervashidze, “Efficient graphlet kernels for large graph comparison,” in Proceedings of the 12th International Conference on Artificial Intelligence and Statistics (AISTATS), vol. 5, pp. 488–495, 2009. [32] V. Vacic, L. I. ans S. Lonardi, and P. Radivojac, “Graphlet kernels for prediction of functional residues in protein structures,” Journal of Computational Biology, vol. 17, no. 1, pp. 55–72, 2010. [33] M. Shatsky, A. Shulman-Peleg, R. Nussinov, and H. J. Wolfson, “The multiple common point set problem and its application to molecule binding pattern detection,” Journal of Computational Biology, vol. 13, no. 2, pp. 407–428, 2006. [34] T. Fober, S. Glinca, G. Klebe, and E. Hüllermeier, “Superposition and alignment of labeled point clouds,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 8, pp. 1653–1666, November/December 2011. [35] N. Weill and D. Rognan, “Alignment-free ultra-high-throughput comparison of druggable protein-ligand binding sites,” Journal of Chemical Information and Modeling, vol. 50, no. 1, pp. 123–135, 2010. [36] T. Fober, M. Mernberger, G. Klebe, and E. Hüllermeier, “Fingerprint kernels for protein structure comparison,” Molecular Informatics, vol. 31, no. 6-7, pp. 443–452, 2012. [37] E. Hüllermeier and J. Fürnkranz, Preference Learning. Springer, 2010. [38] F. Rathke, K. Hansen, U. Brefeld, and K.-R. Müller, “StructRank: a new approach for ligand-based virtual screening,” Journal of Chemical Information and Modeling, vol. 51, pp. 83–92, Dec. 2010. [39] S. Agarwal, D. Dugar, and S. Sengupta, “Ranking chemical structures for drug discovery: a new machine learning approach.,” Journal of Chemical Information and Modeling, vol. 50, pp. 716–31, May 2010. [40] J. Weston, A. Eliseeff, D. Zhou, C. Leslie, and W. S. Noble, “Protein ranking: from local to global structure in the protein similarity network,” Proceedings of the National Academy of Science, vol. 101, pp. 6559–6563, 2004. [41] R. Kuang, J. Weston, W. S. Noble, and C. Leslie, “Motif-based protein ranking by network propagation,” Bioinformatics, vol. 21, pp. 3711–8, Oct. 2005. [42] T. Pahikkala, E. Tsivtsivadze, A. Airola, J. Järvinen, and J. Boberg, “An efficient algorithm for learning to rank from preference graphs,” Machine Learning, vol. 75, no. 1, pp. 129–165, 2009. [43] T. Joachims, “A support vector method for multivariate performance measures,” in Proceedings of the International Conference on Machine Learning, Bonn, Germany, pp. 377–384, 2005. [44] P. D. Dobson and A. J. Doig, “Predicting enzyme class from protein structure without alignments.,” Journal of Molecular Biology, vol. 345, pp. 187–99, Jan. 2005. [45] J. Rousu, C. Saunders, S. Szedmak, and J. Shawe-Taylor, “Kernel-based learning of hierarchical multilabel classification models,” Journal of Machine Learning Research, vol. 7, pp. 1601–1626, 2006. [46] A. Sokolov and A. Ben-Hur, “A structured-outputs method for prediction of protein function,” in Proceedings of the 3rd International Workshop on Machine Learning in Systems Biology, 2008. 14 [47] A. K. Arakaki, Y. Huang, and J. Skolnick, “EFICAz2: enzyme function inference by a combined approach enhanced by machine learning,” BMC Bioinformatics, vol. 10, p. 107, Jan. 2009. [48] M. Hendlich, A. Bergner, J. Günther, and G. Klebe, “Relibase: design and development of a database for comprehensive analysis of proteinligand interactions,” Journal of Molecular Biology, vol. 326, pp. 607–620, Feb. 2003. [49] S. Schmitt, D. Kuhn, and G. Klebe, “A new method to detect related function among proteins independent of sequence and fold homology,” Journal of Molecular Biology, vol. 323, no. 2, pp. 387–406, 2002. [50] H. Bunke and K. Shearer, “A graph distance metric based on the maximal common subgraph,” Pattern Recognition Letters, vol. 19, no. 3-4, pp. 255–259, 1998. [51] A. Sanfeliu and K. Fu, “A distance measure between attributed relational graphs for pattern recognition,” IEEE Transactions on Systems, Man and Cybernetics, vol. 13, no. 3, pp. 353–362, 1983. [52] N. Weskamp, E. Hüllermeier, D. Kuhn, and G. Klebe, “Multiple graph alignment for the structural analysis of protein active sites.,” IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol. 4, no. 2, pp. 310–20, 2007. [53] M. Neuhaus and H. Bunke, Bridging the Gap between Graph Edit Distance and Kernel Machines. New Jersey: World Scientific, 2007. [54] K. Borgwardt, C. Ong, S. Schonauer, S. Vishwanathan, A. Smola, and H. Kriegel, “Protein function prediction via graph kernels,” Bioinformatics, vol. 21, no. 1, pp. i47–i56, 2005. [55] H. Alt and L. J. Guibas, “Discrete geometric shapes: Matching, interpolation, and approximation: A survey,” tech. rep., Handbook of Computational Geometry, 1996. [56] P. Mahé, N. Ueda, T. Akutsu, J.-L. Perret, and J.-P. Vert, “Graph kernels for molecular structure-activity relationship analysis with support vector machines,” Journal of chemical information and modeling, vol. 45, no. 4, pp. 939–51, 2005. [57] M. M. Deza and E. Deza, Encyclopedia of Distances. Heidelberg, Germany: Springer, 2009. [58] H.-G. Beyer and H.-P. Schwefel, “Evolution strategies: A comprehensive introduction,” Natural Computing, vol. 1, no. 1, pp. 3–52, 2002. [59] B. Hoffmann, M. Zaslavskiy, J.-P. Vert, and V. Stoven, “A new protein binding pocket similarity measure based on comparison of clouds of atoms in 3D: application to ligand prediction,” BMC Bioinformatics, vol. 11, Jan. 2010. [60] T. Fober, M. Mernberger, G. Klebe, and E. Hüllermeier, “Evolutionary construction of multiple graph alignments for the structural analysis of biomolecules.,” Bioinformatics, vol. 25, pp. 2110–7, Aug. 2009. [61] W. Kabsch, “A solution of the best rotation to relate two sets of vectors,” Acta Crystallographica, vol. 32, pp. 922–923, 1976. [62] T. Fober, M. Mernberger, R. Moritz, and E. Hüllermeier, “Graph-kernels for the comparative analysis of protein active sites,” in German Conference on Bioinformatics, (Halle (Saale), Germany), pp. 21 – 31, 2009. [63] T. F. Smith and M. S. Waterman, “Identification of common molecular subsequences,” Journal of Molecular Biology, vol. 147, pp. 195–197, 1981. [64] T. Pahikkala, W. Waegeman, E. Tsivtsivadze, T. Salakoski, and B. De Baets, “Learning intransitive reciprocal relations with kernel methods,” European Journal of Operational Research, vol. 206, pp. 676–685, Nov. 2010. [65] T. Pahikkala, A. Airola, M. Stock, B. De Baets, and W. Waegeman, “Efficient regularized least-squares algorithms for conditional ranking on relational data,” Machine Learning, vol. 93, no. 2-3, pp. 321–356, 2013. [66] B. Schölkopf and A. Smola, Learning with Kernels, Support Vector Machines, Regularisation, Optimization and Beyond. The MIT Press, 2002. [67] W. Waegeman, T. Pahikkala, A. Airola, T. Salakoski, M. Stock, and B. De Baets, “A kernel-based framework for learning graded relations from data,” IEEE Transactions on Fuzzy Systems, vol. 20, pp. 1090–1101, 2012. 15 [68] A. Ben-Hur and W. S. Noble, “Kernel methods for predicting protein-protein interactions,” Bioinformatics, vol. 21, pp. i38–46, June 2005. [69] H. Kashima, S. Oyama, Y. Yamanishi, and K. Tsuda, “On pairwise kernels: An efficient alternative and generalization analysis.,” in PAKDD (T. Theeramunkong, B. Kijsirikul, N. Cercone, and T. B. Ho, eds.), vol. 5476 of Lecture Notes in Computer Science, pp. 1030–1037, Springer, 2009. [70] J.-P. Vert, J. Qiu, and W. S. Noble, “A new pairwise kernel for biological network inference with support vector machines.,” BMC Bioinformatics, vol. 8, Jan. 2007. [71] R. Herbrich, T. Graepel, and K. Obermayer, “Large margin rank boundaries for ordinal regression,” in Advances in Large Margin Classifiers (A. Smola, P. Bartlett, B. Schölkopf, and D. Schuurmans, eds.), pp. 115–132, MIT Press, 2000. [72] O. Chapelle, B. Schölkopf, and A. Zien, Semi-Supervised Learning. MIT Press, 2006. [73] W. Waegeman, B. De Baets, and L. Boullart, “ROC analysis in ordinal regression learning,” Pattern Recognition Letters, vol. 29, pp. 1–9, 2008. [74] K. Järvelin and J. Kekäläinen, “Cumulated gain-based evaluation of IR techniques,” ACM Transactions on Information Systems (TOIS), vol. 20, no. 4, pp. 422–446, 2002. [75] S. Varma and R. Simon, “Bias in error estimation when using cross-validation for model selection,” BMC Bioinformatics, vol. 7, Jan. 2006. [76] R. Albert, B. DasGupta, R. Dondi, S. Kachalo, E. Sontag, A. Zelikovsky, and K. Westbrooks vol. 14, pp. 927– 949, 2007. [77] P. Geurts, N. Touleimat, M. Dutreix, and F. D’Alché-Buc, “Inferring biological networks with output kernel trees,” BMC Bioinformatics, vol. 8, no. 2, p. S4, 2007. [78] R. Laskowski, J. Watson, and J. Thornton, “Profunc: a server for predicting protein function from 3d stucture,” NAR, vol. 33, pp. W89–W93, 2005. [79] B. Schwikowski, P. Uetz, and S. Fields, “A network of protein-protein interactions in yeast,” Nature Biotechnology, vol. 18, pp. 3548–3557, 2000. [80] A. Vazquez, A. Flammini, A. Maritan, and A. Vespignani, “Global protein function prediction from proteinprotein interaction networks,” Bioinformatics, vol. 21, pp. ii59–ii65, 2003. [81] U. Karaoz, T. Murali, S. Letovsky, Y. Zheng, C. Ding, C. Cantor, and S. Kasif, “Whole-genome annotation by using evidence integration in functional-linkage networks,” Proceedings of the National Academy of Sciences, vol. 101, pp. 2888–2893, 2004. [82] M. Deng, K. Zhang, S. Mehta, T. Chen, and F. Sun, “Prediction of protein function using protein-protein interaction data,” Journal of Computational Biology, vol. 10, pp. 947–960, 2003. [83] S. Letovsky and S. Kasif, “Predicting protein function from protein/protein interaction data: a probabilistic approach,” Bioinformatics, vol. 19, pp. i197–i204, 2003. 16
5cs.CE
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 A Generalized-Impedance Based Stability Criterion for Three-Phase Grid-Connected Voltage Source Converters Huanhai Xin, Ziheng Li, Wei Dong, Zhen Wang, and Leiqi Zhang  Abstract—The output impedance matrices of three-phase grid-connected voltage source converters (VSCs) are widely used in power system stability analysis. Regardless of how the impedance is modeled, there always exist coupling terms in the impedance matrix, which makes the system a multi-inputmulti-output (MIMO) system. As a practical approximation, the coupling terms are generally omitted and the impedance-based stability criterion for the resultant single-input-single-output (SISO) system can be applicable. However, such handling may result in analytical errors. This letter proposes a new stability criterion based on an equivalent SISO system by introducing the concept of generalized- impedances, which can completely keep the coupling terms. Further, the effects of the phase-locked-loop (PLL) parameters on system stability are studied based on the proposed criterion. The effectiveness of the proposed criterion is verified by a hardware-in-the-loop (HIL) simulation based on a RT-LAB platform. Index Terms—Grid-connected converters, impedance modeling, small-signal stability, sub-synchronous oscillation. I. INTRODUCTION RID-CONNECTED voltage source converters (VSCs) are widely used for renewable energy integration and high-voltage DC transmission systems [1]. However, the interaction between the power electronic controllers and the transmission lines can lead to power oscillations, which poses new challenges for power system stability [2-5]. When analyzing the oscillation problems introduced by power electronic devices, the impedance-based methods are widely used, in which a grid-connected VSC is modeled as an output impedance connected to a voltage/current source and the grid is represented similarly [2-7]. In a three-phase system, the impedance of the VSC or the grid can be mathematically written as a matrix, which relates the voltage vector to the current vector. Currently, most impedance-based methods for grid-tied VSCs can be classified into two categories according to the reference frames where the impedance matrices are formulated: the synchronous frame (dq frame) based methods G This work is jointly supported by the National Key Research and Development Program (No. 2016YFB0900104), the National Science Foundation of China (No. 51577168) and Science & Technology Project of Yunnan Electric Power Company (yndw (2016) 000303DD00124). Huanhai Xin, Ziheng Li, Wei Dong, Zhen Wang, and Leiqi Zhang are with the College of Electrical Engineering, Zhejiang University, Hangzhou 310027, China. Email: [email protected]. [2-3] and the stationary frame (abc frame) based methods [4-5]. In the dq frame, there usually exist coupling terms (non-diagonal elements) in the impedance matrices of the VSCs and the grid, which makes the system a MIMO system. Usually, the generalized Nyquist stability criterion (GNSC) is used for stability performance analysis in these methods [2-3]. Similarly, in the abc frame, the coupling terms also exist between the positive and the negative sequence impedances in the VSC system and the grid. Although the two sequence impedances of a symmetrical grid can be strictly decoupled (the impedance matrix is diagonal), the impedance matrix of the VSC usually has coupling terms [5]. As a practical approximation, the coupling terms are generally omitted and the impedance-based stability criterion for the resultant SISO system can be applicable [4, 6]. Unfortunately, ignoring the coupling terms may lead to inaccurate analysis results in a mirror frequency coupled system [5, 7]. This letter presents a generalized-impedance based stability criterion (GISC) for three-phase grid-connected VSCs. By mathematically manipulating the characteristic equation, the system can be transformed into an equivalent SISO system, which can be regarded as a generalized-impedance based series circuit. In essence, the small-signal instability of the system can be explained as a resonance of the equivalent circuit and evaluated by the classical Nyquist stability criterion. II. GRID-CONNECTED VSC MODEL The grid-connected VSC considered in this letter is shown in Fig. 1. The converter uses a conventional LCL filter. The grid-side network includes C f and LLine , where C f is the filter capacitor, LLine denotes the total inductance of the filter and the transmission line. The converter is controlled by a dual-loop vector controller based on a PLL. The current controller of the VSC has voltage feed-forward (VFF) and decoupling terms. The positions of the phasors and the reference frames of the system are shown in Fig. 2, where the dq frame represents the converter-side rotating frame introduced by the PLL and the xy frame represents the grid-side synchronous rotating frame [2]. In steady state, the dq frame is aligned with the xy frame. This paper focuses on the oscillations induced by the PLL and the inner current loop (similar to [5]). The following assumptions are considered to simplify the problem: 1) The time delay of the sampling circuits and the PWM are neglected due to their tiny time scales [8]. 2) The dynamics of the filter in > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < the VFF are neglected, since the oscillation frequency under study is much lower than the cut-off frequency of the filter. VSC Side U sdq Vdc U node 1 Lf PWM I abc Cf I abc U abc abc/dq abc/dq I dq U sdqref Grid Side IG I LLine U abc abc/dq Uq U dq I dqref Current Control PLL  PLL Fig. 1. Block diagram of the grid-connected converter q y I I  U U d    pll x 0 xy : grid-side rotating frame (global frame) dq : inverter-side rotating frame (local frame) 0:synchronous speed  : speed obtained by PLL Fig. 2. Reference frames and phasor positions. It should be emphasized that there is no constraint on the power factor (PF) of the VSC, i.e., the VSC can be the interface of a STATCOM (PF=0) or a renewable energy (usually PF  1). A. Dynamic Model of the VSC in Polar Coordinate For simplicity of analysis, resistances of the filter inductor and the transmission line are neglected. In the dq frame, the dynamic model of the VSC, including the PLL, filter inductor and the current controller, can be represented by:  pll  G pll ( s )U q  U sdref  ( I dref  I d )Gi ( s)  U d  0 L f I q  (1) U sqref  ( I qref  I q )Gi ( s)  U q  0 L f I d , U =U  L sI   L I d f d f q  sd U sq =U q  L f sI q   L f I d where Gpll (s) and Gi (s) are the transfer functions of the PLL and the current controller, respectively. The meanings of other symbols are shown in Fig. 1 and Fig. 2. To obtain the small-signal model, the following steps can be followed: 1) Linearizing (1) and solving the linearized equations, the dynamic model in the dq frame can be obtained; 2) The model is transformed to the xy frame using angle relationships shown in Fig. 2; 3) The model in the xy frame is written in the form of the polar coordinate as follows: 0   U   I  0 ΔI     0 Y ( s)  U   , (2) I   g      where Yg (s)  Gi (s)Gpll (s) I 0 / [(Gi (s)  L f s)(1  Gpll (s)U 0 )] and the subscript “0” denotes steady-state values. The detailed derivation is shown in Appendix A. B. Dynamic Model of the Grid in Polar Coordinate According to the topology shown in Fig. 1, the model of the network can be formulated as follows:  I G   U  ΔIG    ΔI  Y  (3)    I G G  U   where Y = YLine + YC . The expressions of YLine and YC are shown in Appendix B. In particular, YC is 0 if the output filter only has an inductor. III. GENERALIZED-IMPEDANCES OF THE SYSTEM A. Definition of the Generalized-impedance It follows from (2) and (3) that the VSC model and the grid model have the common structure shown as follows:  I   A( s) C ( s)   U   I    C (s) D( s)  U   .      Grid Controller 2 (4) Based on (4), the generalized-admittances ( Ygi (s), i  1,2,3 ) are defined as follows: Yg1 (s) : D(s)  A(s), Yg 2 (s) : A(s)  jC(s), Yg 3 (s) : A(s)  jC(s). (5) The generalized-impedance is defined as the inverse of the generalized-admittance (i.e., Z gi (s)  Ygi1 (s) ). B. Generalized-impedances of the VSC and the Grid It follows from (2) and (5) that the generalized-admittance of the VSC can be calculated as follows: Yg1_ VSC (s)  Yg (s), Yg 2 _ VSC (s)  0, Yg 3 _ VSC (s)  0. (6) Note that matrix Y in (3) has the same structure as matrix 0  a b  a b  -1 a  jb , it can be b a  . Since T b a  T   0 a  jb       obtained that TYT-1 : diag(Y+ ,Y )  diag(Z1,Z1 ), where T  (7) 1 1 j    , j  1 . As mentioned in Section I, 2 1  j  matrix Y exists coupling terms and thus the system becomes a MIMO system. From the definition in (5), the generalized-impedance of the grid can be obtained as follows: Yg1_ grid (s)  0, Yg 2 _ grid (s)  Y , Yg 3 _ grid (s)  Y . (8) -1 Note that TYT implies the admittance is changed from the synchronous frame to the stationary frame [7], so Y (or Y ) corresponds to the positive (or negative) sequence admittance. IV. GENERALIZED-IMPEDANCE BASED STABILITY ANALYSIS In this section, we derive the characteristic equations of the system, and analyze its small-signal stability. It follows from (2) and (3) that the characteristic equation can be expressed as  0 0   det     Y   0, 0 Y g   (9) where det() is the determinant function. Since T is invertible, (9) is equivalent to   0 0    det  T    Y  T-1   0,  0 Yg       (10) which is further equivalent to  Y  1 1 Y+ 0   det  g  (11)      0.  2  1 1   0 Y   When Yg (s)  0 , (11) implies det(Y (s)Y (s))  0 . This is a special case indicating the VSC and the network have the same resonance point, which is not the focus of this paper. Excluding this case, (11) is equivalent to > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <  1 0    Z   Z     1 0  Yg I  = det    2Z g I    0     1 1     Z  Z     1 1  2  (12) It follows from (12) that the characteristic equation of the closed-loop system can be simplified as 1  Yg (Z  Z ) 2  0. (13) From the definitions of the generalized-impedance, we can rearrange (13) as 2Z g1_ VSC  Z g 2 _ grid  Z g 3 _ grid  0 , which can be explained as the series circuit of the generalized-impedances of the VSC and the grid. Therefore, the oscillation of the grid-connected VSC can be regarded as the series resonance of the equivalent circuit. The system described by (13) is a SISO system, thus the complexity of analysis is reduced distinctly. It is worth noting that the VSC and the grid are usually assumed to be stable respectively when analyzing the interaction between the VSC and the grid [6]. We also assume the VSC is stable when connected to an ideal grid, so Yg ( s) and (Z  Z ) 2 have no pole in the right half plane. Consequently, it follows from the Nyquist criterion that GISC: If the Nyquist curve of Yg (s)(Z  Z ) 2 does not encircle the point (1, j0) , then the system is stable. Note that, although the form of GISC looks similar to the criterion given in [6], their meanings are different. On one hand, the open-loop transfer function used to plot the Nyquist curve is not the loop-gain Zsource  s  / Zload  s  of the source and load impedances seen at their interface, but the loop-gain of the equivalent generalized-impedance circuit. On the other hand, the criterion in [6] performs very well for single-phase system (which is a SISO system), but there may be errors resulting from the coupling terms [5] in three-phase systems. In contrast, the GISC uses the special structure of the impedance matrix in (2) and established an equivalent SISO system from a MIMO system without any approximation. Moreover, the distance between (1, j0) and the Nyquist curve represents the stability margin, so the GISC can also be used to guide the oscillation suppression. For example, the influences of the PLL’s parameters on system stability can be analyzed and tuned via the GISC. The studied system is shown in Fig. 1, in which LLine is set as 0.26p.u., other parameters of the VSC are listed in Table I. The Nyquist plots of the open-loop transfer function with three groups of PLL parameters, i.e., the proportional gain K ppll and the integral gain Kipll , are given in Fig. 3. It shows that, in the neighborhood of the PLL parameters given in Table I, larger proportional gain ( K ppll ) has more positive effect on system stability (see the curves of P2 and P3 in Fig. 3), while larger integral gain ( Kipll ) has more negative effect (see the curves of P1 and P2). 0.26p.u. at t=2s. The reference signals of the current control loop are assumed to be constant, and I dref  1p.u. , I qref  0p.u. The stability of this system is analyzed using the GISC. The Nyquist curve of Yg (s)(Z  Z ) 2 is shown in Fig. 4. The point (1, j0) is not encircled initially, thus the system is stable. With the additional inductor, the plot shows that the system has two poles in the right half plane, so the system is unstable. The HIL simulation results in Fig. 5 also verify the above analysis, where the sub-synchronous oscillation (42Hz) and supersynchronous oscillation (58Hz) occur after the impedance is increased from 0.2p.u. to 0.26p.u. 0.8 6 dB 4 dB 2 dB P 1 (Kppll=2.5, ipll=3020) -2 dB -4 K dB 0 dB P 2 (Kppll=2.5, Kipll=2000) P 3 (Kppll=5, Kipll=2000) 0.6 10 dB 0.4 Imaginary Axis   Y Y Z     2 Z g I  det  g   Z   Y 2      0.2 -10 dB 20 dB -20 dB 0 P1 P3 P2 -0.2 -0.4 -0.6 -1.2 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 Real Axis Fig. 3. Nyquist plots of the open-loop transfer function with different PLL parameters. 4 dB 0.6 6 dB 0.4 Imaginary Axis   Z det    Z 3 2 dB 0 dB -2 dB Lline = 0.20 Lline = 0.26 10 dB -10 dB 0.2 20 dB -20 dB 0 -0.2 -0.4 -0.6 -1.2 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 Real Axis Fig. 4. Nyquist plots of the open-loop transfer function with different LLine . Voltage (Phase A) Current (Phase A) Divergent Oscillation V. EXPERIMENTAL RESULTS The hardware-in-the-loop (HIL) simulation of a three-phase grid-connected VSC is conducted in RT-LAB, where the VSC and the grid are simulated by OP5600 and the converter is controlled by a controller based on TMS320F28335. The impedance of the transmission line is changed from 0.20p.u. to t =2s Voltage spectrum Fig. 5. Instability due to the change of inductance from 0.20p.u. to 0.26p.u. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < TABLE I. PARAMETERS OF THE VSC Symbol Sb Ub Lf Gi(s) Gpll(s) linearized state equation of LLine can be expressed as: Description Base value of power Base value of voltage Inductance of the inverter side filter Transfer function of the current controller Transfer function of the PLL 4 1  I Linex   s    U x   I Liney   L s 2  L  2   s   U y  . Line Line Value 500kVA 690V 0.2pu 0.6+15/s 2.5/s+3020/s2 Denote Line to be the power factor angle at the node 1 of LLine . Then (B.2) can be converted to the polar coordinates as follows:  I Line   U   I Line  Line  = YLine U   , where YLine  VI. CONCLUSION The generalized-impedance based stability criterion is proposed for the stability analysis of a three-phase gridconnected VSC system. By rigorous mathematical derivation, a MIMO system composed of the VSC and the grid is transformed to an equivalent SISO system composed of the generalized-impedances of the grid and the VSC. Consequently, the oscillation can be explained as the series resonance of the equivalent circuit. Such GISC can be used for the stability analysis of a three-phase system. GISC based study shows the significant effects of the PLL parameters on system stability. HIL simulation validates the effectiveness of the proposed criterion. Future work will extend this criterion to systems with multiple VSCs and use this criterion to guide VSC control design. By linearizing (1), the small-signal model of the inverter can be obtained in the dq frame, and can be rewritten in the form of polar coordinates as follows: (A.1)  U sdref   G  s   I dref    L T  G  s  T  I    U  ,  0 f Θ2 i Θ1   I   U   i I  U     U sqref   I qref  (A.2)  U sd   U  0  I q   U   U sq   U U   L f sG pll  s  0 I d  U U   , I   I  0 L f TΘ2   L s T f Θ1  I  I   I  I  (A.3) cos  I  sin  I   sin  I  cos  I  and TΘ2   .  sin  I cos  I   cos  I  sin  I  It follows from the assumptions that U sdref  U sd , U sqref  U sq , and I dref =I qref =0 are satisfied. Thus, from (A.2) and (A.3) the following equation is obtained:  I   I  0  sG pll ( s) L f U U  q   ( sL f  Gi (s ))TΘ1  .  I  I   Id  (A.4) Considering that the angles in (A.4) satisfy U     pll and  I     pll (shown in Fig. 2),  pll in (A.1) can be further expressed as  pll  Gpll (s)U  / (1  Gpll (s)U ) in terms of   . Thus, by eliminating U ,   , and  pll in (A.4), (A.5) holds:  I  0 0   U   I    0 Yg ( s)  U   , where Yg (s)  Gi (s)Gpll (s)I 0 / [(Gi (s)  L f s)(1  Gpll (s)U 0 )] and subscript “0” denotes steady-state values. (A.5) the APPENDIX B The linearized state equation of an inductor in xy reference frame can be expressed as: 1  I kx   s     U ix   U jx    I ky   L s 2  L  2   s    U iy    U jy   , k k   (B.1) where i and j are the nodes next to the inductor. Since the voltage of the ideal grid is considered to be constant, the 1  s   cos Line  sin Line  . LLine s 2  LLine 2   s   sin Line cos Line   I kx   I ky   Ck  s     U ix   U jx    s    U iy    U jy   ,   (B.4) where i and j are the nodes next to the inductor. Denote C to be the power factor angle at the node 1 of C f . Since the voltage of the ground is also constant, the linearized state equation of C f can be expressed as:  I C   U   I C C  = YC U   , (B.5) s   cos C  sin C  s   sin C cos C  .  where YC  CC   REFERENCES [2] [3] [4] [5] [6] where TΘ1   (B.3) Similarly, the linearized state equation of a capacitor in xy coordinates can be expressed as: [1] APPENDIX A  pll  G pll ( s)U U ,   s pll  (B.2) [7] [8] F. Blaabjerg, Z. Chen, and S. B. Kjaer, "Power electronics as efficient interface in dispersed power generation systems," IEEE Trans. Power Electron., vol. 19, no. 5, pp. 1184-1194, Sep. 2004. B. Wen, D. Boroyevich, R. Burgos, P. Mattavelli, and Z. Shen, "Analysis of D-Q small-signal impedance of grid-tied inverters," IEEE Trans. Power Electron., vol. 31, no. 1, pp. 675-687, Jan. 2016. B. Wen, D. Dong, D. Boroyevich, R. Burgos, P. Mattavelli, and Z. Shen, "Impedance-based analysis of grid-synchronization stability for three-phase paralleled converters," IEEE Trans. Power Electron., vol. 31, no. 1, pp. 26-37, Jan. 2016. M. Cespedes, J. Sun, "Impedance modeling and analysis of grid- connected voltage-source converters," IEEE Trans. Power Electron., vol. 29, no. 3, pp. 1254-1261, Mar. 2014. M. K. Bakhshizadeh, X. Wang, F. Blaabjerg, et. al., "Couplings in phase domain impedance modeling of grid-connected converters," IEEE Trans. Power Electron., vol. 31, no. 10, pp. 6792-6796, Oct. 2016. J. Sun, "Impedance-based stability criterion for grid-connected inverters," IEEE Trans. Power Electron., vol.26, no.11, pp.3075-3078, Nov. 2011. A. Rygg, M. Molinas, Z. Chen, and X. Cai, "A modified sequence domain impedance definition and its equivalence to the dq-domain impedance definition for the stability analysis of ac power electronic systems," IEEE J. Emerging Sel. Topics Power Electron., vol. 4, no. 4, pp. 1383-1396, Dec. 2016. M. Zhao, X. Yuan, J. Hu, and Y. Yan, "Voltage dynamics of current control time-scale in a VSC-connected weak grid," IEEE Trans. Power Syst., vol. 31, no.4, pp. 2925-2937, Jul. 2016.
3cs.SY
arXiv:1610.02523v2 [math.GR] 7 Jun 2017 THE kR -PROPERTY ON FREE TOPOLOGICAL GROUPS FUCAI LIN, SHOU LIN, AND CHUAN LIU Abstract. A space X is called a kR -space, if X is Tychonoff and the necessary and sufficient condition for a real-valued function f on X to be continuous is that the restriction of f on each compact subset is continuous. In this paper, we mainly discuss the kR -property on the free topological groups, and generalize some well-known results of K. Yamada’s in the free topological groups. 1. Introduction Recall that X is called a k-space, if the necessary and sufficient condition for a subset A of X to be closed is that A ∩ C is closed for every compact subset C. It is well-known that the k-property generalizing metrizability has been studied intensively by topologists and analysts. A space X is called a kR -space, if X is Tychonoff and the necessary and sufficient condition for a real-valued function f on X to be continuous is that the restriction of f on each compact subset is continuous. Clearly every Tychonoff k-space is a kR -space. The converse is false. Indeed, for any uncountable cardinal κ the power Rκ is a kR -space but not a k-space, see [11, Theorem 5.6] and [10, Problem 7.J(b)]. Now, the kR -property has been widely used in the study of topology, analysis and category, see [3, 4, 5, 6, 13, 16, 17]. Results of our research will be presented in two separate papers. In the paper [14], we mainly extend some well-known results in k-spaces to kR -spaces, and then seek some applications in the study of free Abelian topological groups. In the current paper, we shall deter the kR -property on free topological groups and extend some results of K. Yamada’s on free topological groups. The paper is organized as follows. In Section 2, we introduce the necessary notation and terminologies which are used for the rest of the paper. In Section 3, we investigate the kR property on free topological groups, and generalize some results of K. Yamada’s. In section 4, we pose some interesting questions about kR -spaces in the class of free topological groups which are still unknown for us. 2. Preliminaries In this section, we introduce the necessary notation and terminologies. Throughout this paper, all topological spaces are assumed to be Tychonoff, unless otherwise is explicitly stated. First of all, let N be the set of all positive integers and ω the first countable order. For a space X, we always denote the set of all the non-isolated points by NI(X). For undefined notation and terminologies, the reader may refer to [2], [8], [9] and [15]. Let X be a topological space and A ⊆ X be a subset of X. The closure of A in X is denoted by A. Moreover, A is called bounded if every continuous real-valued function f defined on A is bounded. The space X is called a k-space provided that a subset C ⊆ X is closed in X if C ∩ K is closed in K for each compact subset K of X. A space X is called a kR -space, if X is Tychonoff and the necessary and sufficient condition for a real-valued function f on X to be continuous is that the restriction of f on each compact subset is continuous. Note that every Tychonoff k-space is a kR -space. A subset P of X is called a sequential neighborhood of x ∈ X, 2000 Mathematics Subject Classification. Primary 54H11, 22A05; Secondary 54E20; 54E35; 54D50; 54D55. Key words and phrases. kR -space; k-space; stratifiable space; Lašnev space; k-network; free topological group. The first author is supported by the NSFC (Nos. 11571158, 11201414, 11471153), the Natural Science Foundation of Fujian Province (Nos. 2017J01405, 2016J05014, 2016J01671, 2016J01672) of China. 1 2 FUCAI LIN, SHOU LIN, AND CHUAN LIU if each sequence converging to x is eventually in P . A subset U of X is called sequentially open if U is a sequential neighborhood of each of its points. A subset F of X is called sequentially closed if X \ F is sequentially open. The space X is called a sequential space if each sequentially open subset of X is open. The space X is said to be Fréchet-Urysohn if, for each x ∈ A ⊂ X, there exists a sequence {xn } such that {xn } converges to x and {xn : n ∈ N} ⊂ A. Definition 2.1. [4] Let X be a topological space. • A subset U of X is called R-open if for each point x ∈ U there is a continuous function f : X → [0, 1] such that f (x) = 1 and f (X \ U ) ⊂ {0}. It is obvious that each R-open is open. The converse is true for the open subsets of Tychonoff spaces. • A subset U of X is called a functional neighborhood of a set A ⊂ X if there is a continuous function f : X → [0, 1] such that f (A) ⊂ {1} and f (X \ U ) ⊂ {0}. If X is normal, then each neighborhood of a closed subset A ⊂ X is functional. Definition 2.2. Let λ be a cardinal. An indexed family {Xα }α∈λ of subsets of a topological space X is called • point-countable if for any point x ∈ X the set {α ∈ λ : x ∈ Xα } is countable in X; • compact-countable if for any compact subset K in X the set {α ∈ λ : K ∩ Xα 6= ∅} is countable in X; • locally finite if any point x ∈ X has a neighborhood Ox ⊂ X such that the set {α ∈ λ : Ox ∩ Xα 6= ∅} is finite in X; • compact-finite in X if for each compact subset K ⊂ X the set {α ∈ λ : K ∩ Xα 6= ∅} is finite in X; • strongly compact-finite [4] in X if each set Xα has an R-open neighborhood Uα ⊂ X such that the family {Uα }α∈λ is compact-finite in X; • strictly compact-finite [4] in X if each set Xα has a functional neighborhood Uα ⊂ X such that the family {Uα }α∈λ is compact-finite in X. Definition 2.3. [4] Let X be a topological space and λ be a cardinal. An indexed family {Fα }α∈λ of subsets of a topological space X is called a fan (more precisely, a λ-fan) in X if this family is compact-finite but not locally finite in X. A fan {Fα }α∈λ is called strong (resp. strict) if each set Fα has a R-open neighborhood (resp. functional neighborhood) Uα ⊂ X such that the family {Uα }α∈λ is compact-finite in X. If all the sets Fα of a λ-fan {Fα }α∈λ belong to some fixed family F of subsets of X, then the fan will be called an F λ -fan. In particular, if each Fα is closed in X, then the fan will be called a Cldλ -fan. Clearly, we have the following implications: strict fan ⇒ strong fan ⇒ fan. Let P be a family of subsets of a space X. Then, P is called a k-network if for every compact ′ subset K of X and S an′ arbitrary open set U containing K in X there is a finite subfamily P ⊆ P such that K ⊆ P ⊆ U . Recall that a space X is an ℵ-space (resp. ℵ0 -space) if X has a σ-locally finite (resp. countable) k-network. Recall that a space X is said to be Lašnev if it is the continuous closed image of some metric space. Definition 2.4. [7] A topological space X is a stratifiable space if for each open subset U in X, one can assign a sequence {Un }∞ n=1 of open subsets of X such that ⊂ U ; (a) U Sn∞ (b) n=1 Un = U ; (c) Un ⊂ Vn whenever U ⊂ V . Note: Each Lašnev space is stratifiable [9]. Let X be a non-empty space. Throughout this paper, X −1 = {x−1 : x ∈ X}, which is just a copy of X. For every n ∈ N, the Fn (X) denotes the subspace of F (X) that consists of all THE kR -PROPERTY ON FREE TOPOLOGICAL GROUPS 3 the words of reduced length at most n with respect to the free basis X. Let e be the neutral element of F (X), that is, the empty For every n ∈ N, an element x1 x2 · · · xn is also called L word. L a form for (x1 , x2 , · · · , xn ) ∈ (X X −1 {e})n . The word g is called reduced if it does not contain e or any pair of consecutive symbol of the form xx−1 . It follows that if the word g is reduced and non-empty, then it is different from the neutral element e of F (X). In particular, each element g ∈ F (X) distinct from the neutral element can be uniquely written in the form ǫ1 ǫ2 ǫn g = xǫ11 xǫ22 · · · xǫnn , where n ≥ 1, ǫ1 ∈ {−1, 1}, xi ∈ X, and the support of g = xS 1 x2 · · · xn is defined as supp(g) = {x1 , · · · , xn }. Given a subset K of F (X), we put supp(K) = g∈K supp(g). For every n ∈ N, let M M in : (X X −1 {e})n → Fn (X) be the natural mapping defined by for each (x1 , x2 , · · · , xn ) ∈ (X L in (x1 , x2 , ...xn ) = x1 x2 · · · xn L −X {0})n . 3. The kR -property on free topological groups In this section, we investigate the kR -property on free topological groups, and generalize some results of K. Yamada’s. Recently, T. Banakh in [4] proved that F (X) is a k-space if F (X) is a kR -space for a Lašnev space X. Indeed, he obtained this result in the class of more weaker spaces. However, he did not discuss the following quesiton: Question 3.1. Let X be a space. For some n ∈ ω, if Fn (X) is a kR -space, is Fn (X) a k-space? First, we give the following Theorem 3.3, which gives a complementary for the result of T. Banakh’s. Lemma 3.2. Let F (X) be a kR -space. If each Fn (X) is a normal k-space, then F (X) is a k-space. Proof. It is well-known that each compact subset of F (X) is contained in some Fn (X) [2, Corollary 7.4.4]. Hence it follows from [13, Lemma 2] that F (X) is a k-space.  Theorem 3.3. Let X be a paracompact σ-space. Then F (X) is a kR -space and each Fn (X) is a k-space if and only if F (X) is a k-space. Proof. Since X is a paracompact σ-space, it follows from [2, Theorem 7.6.7] that F (X) is also a paracompact σ-space, hence each Fn (X) is normal. Now it is legal to apply Lemma 3.2 and finish the proof.  Next, we shall show that for arbitrary a metrizable space X, the kR -property of F8 (X) implies that F (X) is a k-space, see Theorem 3.6. We first prove two technic propositions. To prove them, we need the description of a neighborhood base of e in F (X) obtained in [20]. Let 2n H0 (X) = {h = xε11 xε22 · · · xε2n ∈ F (X) : 2n X εi = 0, xi ∈ X for i ∈ {1, 2, · · · , n}, n ∈ N}. i=1 Obviously, the subset H0 (X) is a clopen normal subgroup of F (X). It is easy to see that each h ∈ H0 (X) can be represented as h = g1 xε11 y1−ε1 g1−1 g2 xε22 y2−ε1 g2−1 · · · gn xεnn yn−ε1 gn−1 , for some n ∈ N, where xi , yi ∈ X, εi = ±1 and gi ∈ F (X) for i ∈ {1, 2, · · · , n}. Let P (X) be the set of all continuous pseudometrics on a space X. Then take an arbitrary r = {ρg : g ∈ F (X)} ∈ P (X)F (X) . Let n X ρgi (xi , yi ) : h = g1 xε11 y1−ε1 g1−1 g2 xε22 y2−ε1 g2−1 · · · gn xεnn yn−ε1 gn−1 , n ∈ N} pr (h) = inf{ i=1 for each h ∈ H0 (X). In [20], Uspenskii proved that 4 FUCAI LIN, SHOU LIN, AND CHUAN LIU (a) ρr is a continuous on H0 (X) and (b) {{h ∈ H0 (X) : pr (h) < δ} : r ∈ P (X)F (X) , δ > 0} is a neighborhood base of e in F (X). Moreover, pr (e) = 0 for each r ∈ P (X)F (X) . Proposition 3.4. For a stratifiable k-space X if F8 (X) is a kR -space, then X is separable or discrete. Proof. Assume L on the contrary that X is neither separable nor discrete. Then X contains a space Y = C D as a closed subset, where C = {xn : n ∈ ω}∪{x} is a convergent sequence with its limit point {x} and D = {dα : α ∈ ω1 } is a discrete closed subset of X. Since D is a discrete closed subset of X, we choose a discrete family {Oα }α∈ω1 of open subsets suchSthat dα ∈ Oα for each α ∈ ω1 . We may assume that xn 6= xm for arbitrary n 6= m and C ∩ α∈ω1 Oα = ∅. Since X is stratifiable and Y is closed in X, it follows from [20] that F (Y ) is homeomorphic to a closed subgroup of F (X). Hence F8 (Y ) is closed subspace of F8 (X). Next we shall show that F8 (X) contains a strict Cldω -fan, a contradiction. Indeed, since F8 (X) is normal, it suffices to construct a strong Cldω -fan in F8 (X). For each α ∈ ω1 choose a function fα : ω1 → ω such that fα |α : α → ω is a bijection. For each n ∈ ω, let −1 −1 Fn = {d−1 xm dβ dα xn x−1 dα : fα (β) = n, α, β ∈ ω1 , m ≤ n}. β x We claim that the family {Fn : n ∈ ω} is a strong Cldω -fan in F8 (X). We divide into the proof by the following three statements. (1) For each n ∈ ω, the set Fn is closed in F8 (X). Fix an arbitrary n ∈ ω. It suffices to show that the set Fn is closed in F8 (Y ). Let Z = suppFn . Then it is obvious that Z is a closed discrete subspace of Y . It follows from [20] that F (Z) is homeomorphic to a closed subgroup of F (Y ), and thus F8 (Z) is a closed subspace of F8 (Y ). Since F (Z) is discrete and Fn ⊂ F8 (Z), the set Fn is closed in F8 (Y ) (and thus closed in F (X)). (2) The family {Fn : n ∈ ω} is strong compact-finite in F8 (X). By induction, choose two families of open neighborhoods {Wn }n∈ω and {Vn }n∈ω in X satisfy the following conditions: (a) for each n ∈ ω, xn ∈ Wn ; (b) for each n ∈ ω, x ∈ Vn and Vn+1 ⊂ Vn ; (c) for each n ∈ ω, we have Wn ∩ (C ∪ D) = {xn }, Vn ∩ (D ∪ Wn ) = ∅ and Vn ∩ C ⊂ Cn , where Cn = {xm : m > n} ∪ {x}; S S (d) V1 ∩ α∈ω1 Oα = ∅ and Wn ∩ α∈ω1 Oα = ∅ for each n ∈ ω. For each n ∈ ω, let [ Un = {Oβ−1 Vn−1 Wm Oβ Oα Wn Vn−1 Oα−1 : fα (β) = n, α, β ∈ ω1 , m ≤ n}. Obviously, each Un contains in F8 (X) \ F7 (X), and since F8 (X) \ F7 (X) is open in F8 (X), it follows from [2, Corollary 7.1.19] that each Un is open in F8 (X). We claim that the family {Un : n ∈ ω} is compact-finite in F8 (X). Suppose not, there exist a compact subset K in F8 (X) and an increasing sequence {nk } such that K ∩ Unk 6= ∅ for each k ∈ ω. Since X is stratifiable, F (X) is paracompact, then the closure of the set supp(K) is compact in X. However, for each k ∈ ω, since K ∩ Unk 6= ∅, there exist mk ∈ ω, αk ∈ ω1 and βk ∈ ω1 such that fαk (βk ) = nk and 6= ∅, hence supp(K) ∩ Oαk 6= ∅ and supp(K) ∩ Oβk 6= ∅. Oα−1 Wmk Oβk Oαk Wnk Vn−1 K ∩ Oβ−1 Vn−1 k k k k Therefore, the set supp(K) intersects each element of the family {Oαk , Oβk : k ∈ ω}. Since the set {nk : k ∈ ω} is infinite and fαk (βk ) = nk for each k ∈ ω, the set {αk , βk : k ∈ ω} is infinite. Then supp(K) intersects infinitely many Oα ’s, which is a contradiction with the compactness of supp(K). Therefore, the family {Un : n ∈ ω} is compact-finite in F8 (X). Therefore, the family {Fn : n ∈ ω} is strong compact-finite in F8 (X). (3) The family {Fn : n ∈ ω} is not locally finite at the point e in F8 (Y ) (and thus not locally finite in F8 (X)). THE kR -PROPERTY ON FREE TOPOLOGICAL GROUPS S S n∈ω {h ∈ F8 (Y ) : pr (h) < δ} ∩ [ Indeed, it suffices to show that e ∈ r = {ρg : g ∈ F (Y )}, we shall show that n∈ω Fn \ 5 Fn in F8 (Y ). For any δ > 0 and Fn 6= ∅. n∈ω are continuous pseudometrics on Y Since the sequence {xn } converges to x and ρdα and ρd−1 α (xn , x) < 2δ for each for each α ∈ ω1 , there is n(α) ∈ ω such that ρdα (xn , x) < δ2 and ρd−1 α n ≥ n(α). Therefore, there are n0 ∈ ω and uncountable set A ⊂ ω1 such that ρdα (xn , x) < 2δ and ρd−1 (xn , x) < 2δ for each n ≥ n0 and α ∈ A. Choose α ∈ A that has infinitely many α predecessors in A. Since fα (α ∩ A) is an infinite set, there exist m > n0 and β ∈ α ∩ A such that fα (β) = m. Then the word −1 g = d−1 xn0 dβ dα xfα (β) x−1 d−1 α ∈ Ffα (β) = Fm . β x Furthermore, we have δ δ −1 (xn0 , x) + ρdα (xm , x) < + = δ. pr (g) = pr (d−1 xn0 dβ dα xfα (β) x−1 d−1 α ) ≤ ρd−1 β x β 2 2 S Hence e ∈ n∈ω Fn . Then The family {Fn : n ∈ ω} is not locally finite at the point e in F8 (Y ).  Proposition 3.5. For a metrizable space X if F8 (X) is a kR -space, then X is locally compact. Proof. Assume on the contrary that X is not locally compact. Then there exists a closed hedgehog subspace [ J = {x} ∪ ( Xn ) ∪ {zn : n ∈ ω} n∈ω such that (1) Xn = {yn } ∪ {xn,j : j ∈ ω} is a closed discrete subset of J for each n ∈ ω; (2) {zn : n S ∈ ω} is a closed discrete subset of J; and (3) {{x} ∪ n≥k Xn : k ∈ ω} is a neighborhood base of x in J. By Proposition 3.4, the space X is separable. Next we shall show that F8 (X) contains a strict Cldω -fan, which is a contradiction with F8 (X) is a kR -space. Since F8 (X) is an ℵ0 -space by [1, Theorem 4.1], the subspace F8 (X) is normal, hence it suffices to show that F8 (X) contains a strong Cldω -fan. Furthermore, it follows from [4, Proposition 2.9.2] that each compact-finite family of subsets of X is strongly compact-finite, hence it suffices to show that F8 (X) contains a Cldω -fan. For any n, j ∈ ω, put En,j = {zn−1 yj−1 xzn xn,j }. Then it is obvious that each En,j is closed. Furthermore, it follows from the proof of [19, S S Proposition 2.1] that x ∈ n,j∈ω En,j \ n,j∈ω En,j , and thus the family {En,j : n, j ∈ ω} is not locally finite at the point x. Next we claim that the family {En,j : n, j ∈ ω} is compact-finite. Suppose not, there exist a compact subset K and two sequences {ni } and {ji } such that K ∩ Eni ,ji 6= ∅. Then the closure of the set supp(K) is compact since F8 (X) is paracompact. Since the family {En,j : n, j ∈ ω} are disjoint each other, one of the sequences {ni } and {ji } is an infinite set. If {ni } is an infinite set, then the closed discrete set {zni : i ∈ ω} is contained is an infinite set and in supp(K), which is a contradiction since supp(K) is compact. If {ji } S {ni } is a finite set, then there exists N ∈ ω such that {xni ,ji : i ∈ N} ⊂ j<N Xj . Obviously, the closed discrete set {xni ,ji : i ∈ N} is an infinite set and contains in supp(K), which is a contradiction.  Now we can show one of our main theorems in this paper. Theorem 3.6. For a metrizable space X, the following are equivalent: (1) F (X) is a k-space; (2) F8 (X) is a k-space; 6 FUCAI LIN, SHOU LIN, AND CHUAN LIU (3) F8 (X) is a kR -space; (4) the space X is locally compact separable or discrete. Proof. The equivalence of (1) and (4) was showed in [19]. It is obvious that (2) ⇒ (3). By Propositions 3.4 and 3.5, we have (3) ⇒ (4).  By Theorem 3.6, it is natural to ask the following question: Question 3.7. Let X be a metrizable space. If Fn (X) is a kR -space for some n ∈ {4, 5, 6, 7}, then is F8 (X) a kR -space? Note For each n ∈ {2, 3}, the answer to the above question is negative. Indeed, for an arbitrary metrizable space X, since i2 is a closed mapping, F2 (X) is a Fréchet-Urysohn space (and thus a k-space). For n = 3, we have the following Theorem 3.9. However, for each n ∈ {4, 5, 6, 7}, the above question is still unknown for us. Proposition 3.8. For a metrizable space X if F3 (X) is a kR -space, then X is locally compact or NI(X) is compact. Proof. Assume on the contrary that neither X is locally compact nor the set of all non-isolated points of X is compact. Then X contains a closed subspace [ M Y = {x} ∪ Xn ⊕ Cn , n∈ω n∈ω where for every n ∈ ω Xn = {x Sn,i : i ∈ ω} is a closed discrete subset of X, {{x} ∪ m≥n Xm : n ∈ ω} is a neighborhood base of x in Y , Cn = {cn,i : i ∈ ω} ∪ {cn } is a convergent sequence with its limit cn , and Cn is contained in the open subset Un of X such that the family {Un : n ∈ ω} is discrete in S S X and ({x} ∪ m∈ω Xm ) ∩ m∈ω Um = ∅. In order to obtain a contradiction, we shall construct a strict Cldω -fan in F3 (X). For any n, i ∈ ω, choose an open neighborhood Oni of the point xn,i in X such that the family {Oni : i ∈ ω} S S is discrete, Oni ∩ m∈ω Um = ∅ and Oni ∩ ({x} ∪ n∈ω Xn ) = {xn,i }. For each n, i ∈ ω, let E(n, i) = {gn,i = cn c−1 n,i xn,i } and U (n, i) = Vni (Wni )−1 Oni , where Vni and Wni are two arbitrary open neighborhoods of cn and cn,i in X respectively such that Vni ∪Wni ⊂ Un and Vni ∩Wni = ∅. Obviously, each E(n, i) is closed and it follows from [2, Corollary 7.1.19] that U (n, i) is an open neighborhood of E(n, i) for each n, i ∈ ω. In [19], the author has S S showed that x ∈ n,i E(n, i) \ n,i E(n, i), hence the family {E(n, i) : n, i ∈ ω} is not locally finite in F3 (X). To complete the proof, it suffices to show that the family {U (n, i) : n, i ∈ ω} is compact-finite in F3 (X). Suppose not, there exists a compact subset K and two sequences {nj } and {ij } such that K ∩ U (nj , ij ) 6= ∅. Similar to the proof of Proposition 3.5, we can obtain a contradiction.  Theorem 3.9. For a metrizable space X the following are equivalent: (1) F3 (X) is a k-space; (2) F3 (X) is a kR -space; (3) the space X is locally compact or NI(X) is compact. Proof. The equivalence of (1) and (3) was showed in [19]. The implication of (1) ⇒ (2) is obvious. By Proposition 3.8, we have (2) ⇒ (3).  The following theorem was proved in [14]. THE kR -PROPERTY ON FREE TOPOLOGICAL GROUPS 7 Theorem 3.10. [14] Let X be a stratifiable space such that X 2 is a kR -space. If X satisfies one of the following conditions, then either X is metrizable or X is the topological sum of kω -subspaces. (1) X is a k-space with a compact-countable k-network; (2) X is a Fréchet-Urysohn space with a point-countable k-network. Since F2 (X) contains a closed copy of X × X, it follows from Theorem 3.10 that we have the following theorem. Theorem 3.11. Let X be a stratifiable k-space with a compact-countable k-network. Then the following are equivalent: (1) F2 (X) is a k-space; (2) F2 (X) is a kR -space; (3) either X is metrizable or X is the topological sum of kω -subspaces. The following proposition shows that we can not replace “F3 (X)” with “F4 (X)” in Theorem 3.9. First, we recall a special space. Let M M3 = {Cα : α < ω1 }, where Cα = {c(α, n) : n ∈ N} ∪ {cα } with c(α, n) → cα as n → ∞ for each α ∈ ω1 . Proposition 3.12. The subspace F4 (M3 ) is not a kR -space. Proof. It suffices to show that F4 (M3 ) contains a strict Cldω -fan. It follows from [12, Theorem 20.2] that we can find two families A = {Aα : α ∈ ω1 } and B = {Bα : α ∈ ω1 } of infinite subsets of ω such that (a) Aα ∩ Bβ is finite for all α, β ∈ ω1 ; (b) for no A ⊂ ω, all the sets Aα \ A and Bα ∩ A, α ∈ ω1 are finite. For each n ∈ ω, put −1 Xn = {c(α, n)c−1 α c(β, n)cβ : n ∈ Aα ∩ Bβ , α, β ∈ ω1 }. It suffices to show the following three statements. (1) The family {Xn } is strictly compact-finite in F4 (M3 ). Since M3 is a Lašnev space, it follows from [2, Theorem 7.6.7] that F (M3 ) is also a paracompact σ-space, hence F4 (M3 ) is paracompact (and thus normal). Hence it suffices to show that the family {Xn } is strongly compact-finite in F4 (M3 ). For each α ∈ ω1 and n ∈ ω, let Cαn = Cα \ {c(α, m) : m ≤ n}, and put Un = {c(α, n)x−1 c(β, n)y −1 : n ∈ Aα ∩ Bβ , α, β ∈ ω1 , x ∈ Cαn , y ∈ Cβn }. Obviously, each Xn ⊂ F4 (M3 ) \ F3 (M3 ). Since F4 (M3 ) \ F3 (M3 ) is open in F4 (M3 ), it follows from [2, Corollary 7.1.19] that each Un is open in F4 (M3 ). We claim that the family {Un } is compact-finite in F4 (M3 ). Suppose not, then there exist a compact subset K in F4 (M3 ) and a subsequence {nk } of ω such that K ∩ Unk 6= ∅ for each k ∈ ω. For each k ∈ ω, choose an arbitrary point −1 zk = c(αk , nk )x−1 k c(βk , nk )yk ∈ K ∩ Unk , n where xk ∈ Cαnkk and yk ∈ Cβkk . Since F4 (M3 ) is paracompact, it follows from [1] that the closure of the set supp(K) is compact in M3 . Therefore, there exists N ∈ ω such that [ supp(K) ∩ {Cα : α ∈ ω1 \ {αi ∈ ω1 : i ≤ N }} = ∅, S that is, supp(K) ⊂ α∈{γi ∈ω1 :i≤N } Cα . Since each zk ∈ K, there exists αk , βk ∈ {αi ∈ ω1 : i ≤ N } such that Aαk ∩ Bβk is an infinite set, which is a contradiction with Aα ∩ Bβ is finite for all α, β < ω1 . (2) Each Xn is closed in F4 (M3 ). 8 FUCAI LIN, SHOU LIN, AND CHUAN LIU Fix an arbitrary n ∈ ω. Next we shall show that Xn is closed in F4 (M3 ). Let Z = supp(Xn ). Then Z is a closed discrete subset of M3 . Since M3 is metriable, it follows from [20] that F (Z) is homeomorphic to a closed subgroup of F (M3 ), hence F4 (Z) is a closed subspace of F4 (M3 ). Since F (Z) is discrete and Xn ⊂ F4 (Z), the set Xn is closed in F4 (Z) (and thus closed in F4 (M3 )). (3) The family {Xn } is not locally finite at the point e in F4 (M3 ). S S Indeed, it suffices to show that e ∈ n∈ω Xn \ n∈ω Xn . For any δ > 0 and r = {ρg : g ∈ F (M3 )}, we shall show that [ {h ∈ F4 (M3 ) : pr (h) < δ} ∩ Xn 6= ∅. n∈ω since ρe is continuous, we can choose a function f : ω1 → ω such that ρe (c(α, n), cα ) < 2δ for any α ∈ ω1 and n ≥ f (α). For each α < ω1 , put A′α = {n ∈ Aα : n ≥ f (α)} and Bα′ = {n ∈ Bα : n ≥ f (α)}. By the condition (b) of the families A and B, it is easy to see that there exist α, β ∈ ω1 such that A′α ∩ Bβ′ 6= ∅. So, choose n ∈ A′α ∩ Bβ′ . Then ρe (c(α, n), cα ) < 2δ −1 and ρe (c(β, n), cβ ) < 2δ . Let z = c(α, n)c−1 α c(β, n)cβ . Then z ∈ Xn and δ δ pr (z) ≤ ρe (c(α, n), cα ) + ρe (c(β, n), cβ ) < + = δ, 2 2 S hence z ∈ {h ∈ F4 (M3 ) : pr (h) < δ} ∩ n∈ω Xn .  Theorem 3.13. Let X be a metrizable space. If F4 (X) is a kR -space, then NI(X) is separable. Proof. Suppose not, then X contains a closed copy of M3 . Use the same notation in Theorem 3.12. Since X is metrizable, there exists a discrete family {Uα }α∈ω1 of open subsets in X such that Cα ⊂ Uα for each α ∈ ω1 . For arbitrary (α, n) ∈ ω1 × ω, choose open neighborhoods Vα,n and Wα,n of the point c(α, n) and cα in X respectively such that Vα,n ∩ Wα,n = ∅ and Vα,n ∪ Wα,n ⊂ Uα . For each n ∈ N, put and [ −1 −1 On = {Vα,n Wα,n Vβ,n Wβ,n : n ∈ Aα ∩ Bβ , α, β ∈ ω1 }. Similar to the proof of Theorem 3.12, we can show that the family {On }n∈ω of open subsets is compact-finite in F4 (X), hence the family {Xn }n∈ω is a strict Cldω -fan in F4 (X), which is a contradiction.  4. Open questions In this section, we pose some interesting questions about kR -spaces in the class of free topological groups, which are still unknown for us. By Theorems 3.6, 3.9 and 3.11, it is natural to pose the following question. Question 4.1. Let X be a metrizable space. For each n ∈ {4, 5, 6, 7}, if Fn (X) is a kR -space, is Fn (X) a k-space? In [18], Yamada also made the following conjecture: Yamada’s Conjecture: The subspace F4 (X) is Fréchet-Urysohn if the set of all non-isolated points of a metrizable space X is compact. Indeed, we know no answer for the following question. Question 4.2. Is F4 (X) a kR -space if the set of all non-isolated points of a metrizable space X is compact? In particular, we have the following question. L Question 4.3. Let X = C D, where C is a non-trivial convergent sequence with its limit point and D is an uncountable discrete space. Is F4 (X) a kR -space? In [3], the authors showed that each closed subspace of a stratifiable kR -space is a kR -subspace. However, the following two questions are still open. THE kR -PROPERTY ON FREE TOPOLOGICAL GROUPS 9 Question 4.4. Is each closed subgroup of a kR -free topological group kR ? Question 4.5. Is each subspace Fn (X) of a kR -free topological group kR ? Acknowledgements. The authors wish to thank the reviewers for careful reading preliminary version of this paper and providing many valuable suggestions. References [1] A.V. Arhangel’skiı̌, O. G. Okunev and V. G. Pestov, Free topological groups over metrizable spaces, Topology Appl., 33(1989), 63–76. [2] A. Arhangel’skiı̌ and M. Tkachenko, Topological groups and related structures, Atlantis Press, Paris; World Scientific Publishing Co. Pte. Ltd., Hackensack, NJ, 2008. [3] T. Banakh and S. Gabriyelyan, On the Ck -stable closure of the class of (separable) metrizable spaces, Monatshefte für Mathematik, 180(2016), 39–64. [4] T. Banakh, Fans and their applications in General Topology, Functional Analysis and Topological Algebra, arXiv:1602.04857v2. [5] J.L. Blasco, On µ-Spaces and kR -Spaces, Proc. Amer. Math. Soc., 67(1)(1977), 179–186. [6] C.R. Borges, A stratifiable kR -space which is not a k-space, Proc. Amer. Math. Soc., 81(1981), 308–310. [7] J.G. Ceder, Some generalizations of metric spaces, Pacific J. Math., 11(1961), 105-C125. [8] R. Engelking, General Topology (revised and completed edition), Heldermann Verlag, Berlin, 1989. [9] G. Gruenhage, Generalized metric spaces, In: K. Kunen, J. E. Vaughan(Eds.), Handbook of Set-Theoretic Topology, Elsevier Science Publishers B.V., Amsterdam, 1984, 423–501. [10] J. Kelley, General Topology, Springer-Verlag, New York-Berlin, 1975. [11] N. Noble, The continuity of functions on Cartesian products, Trans. Amer. Math. Soc., 149(1970), 187C198. [12] W. Just, M. Weese, Discovering Modern Set Theorey II, Graduate Studies in Mathematics, 18, 1997. [13] J. Li, On k-spaces and kR -spaces, Czech. Math. J., 55(2006), 941–945. [14] F. Lin, S. Lin, C. Liu, The kR -property in sequential fans and the applications in the free Abelian topological groups, arXiv:1610.02522v1. [15] S. Lin, Point-countable Covers and Sequence-covering mappings (second edition), Beijing, China Science Press, 2015. [16] S. Lin, Note on kR -spaces, Q & A in General Topoloy, 9(1991), 227–236. [17] E. Michael,, On k-spaces, kR -spaces and k(X), Pacific J. Math.., 47(1973), 487–498. [18] K. Yamada, Fréchet-Urysohn spaces in free topological groups, Proc. Amer. Math. Soc., 130(2002), 2461– 2469. [19] K. Yamada, The natural mappings in and k-subspaces of free topological groups on metrizable spaces, Topology Appl., 146-147(2005), 239–251. [20] V. Uspenskii, Free topological groups of metrizable spaces, Math. USSR Izv. 37(1991), 657–680. (Fucai Lin): School of mathematics and statistics, Minnan Normal University, Zhangzhou 363000, P. R. China E-mail address: [email protected]; [email protected] (Shou Lin): Institute of Mathematics, Ningde Teachers’ College, Ningde, Fujian 352100, P. R. China E-mail address: [email protected] (Chuan Liu): Department of Mathematics, Ohio University Zanesville Campus, Zanesville, OH 43701, USA E-mail address: [email protected]
4math.GR
1 Binary Hypothesis Testing with Byzantine Sensors: Fundamental Trade-off Between Security and Efficiency arXiv:1707.09592v3 [cs.IT] 19 Jan 2018 Xiaoqiang Ren∗ , Jiaqi Yan∗ , and Yilin Mo∗† Abstract This paper studies binary hypothesis testing based on measurements from a set of sensors, a subset of which can be compromised by an attacker. The measurements from a compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic exponential rate, with which the probability of error goes to zero, is adopted to indicate the detection performance of a detector. In practice, we expect the attack on sensors to be sporadic, and therefore the system may operate with all the sensors being benign for an extended period of time. This motivates us to consider the trade-off between the detection performance of a detector, i.e., the probability of error, when the attacker is absent (defined as efficiency) and the worst-case detection performance when the attacker is present (defined as security). We first provide the fundamental limits of this trade-off, and then propose a detection strategy that achieves these limits. We then consider a special case, where there is no trade-off between security and efficiency. In other words, our detection strategy can achieve the maximal efficiency and the maximal security simultaneously. Two extensions of the secure hypothesis testing problem are also studied and fundamental limits and achievability results are provided: 1) a subset of sensors, namely “secure” sensors, are assumed to be equipped with better security countermeasures and hence are guaranteed to be benign; 2) detection performance with unknown number of compromised sensors. Numerical examples are given to illustrate the main results. Index Terms Hypothesis testing, Security, Secure detection, Efficiency, Trade-off, Byzantine attacks, Fundamental limits ∗: Xiaoqiang Ren, Jiaqi Yan and Yilin Mo are with the School of Electrical and Electronics Engineering, Nanyang Technological University, Singapore. Emails: [email protected], [email protected], [email protected] †: Corresponding Author. January 22, 2018 DRAFT 2 I. I NTRODUCTION Background and Motivations: Network embedded sensors, which are pervasively used to monitor the system, are vulnerable to malicious attacks due to their limited capacity and sparsely spatial deployment. An attacker may get access to the sensors and send arbitrary messages, or break the communication channels between the sensors and the system operator to tamper with the transmitted data. Such integrity attacks have motivated many researches on how to infer useful information from corrupted sensory data in a secure manner [1]–[3]. In this paper, we follow this direction but with the focus on the trade-off between the performance of the inference algorithm when the attacker is absent and the “worst-case” performance when the attacker, which has the knowledge of the inference algorithm, is present. We define two metrics, efficiency and security, to characterize the performance of the hypothesis testing algorithm (or detector) under the two scenarios respectively and analyze the trade-off between security and efficiency. Our Work and its Contributions: We consider the sequential binary hypothesis testing based on the measurements from m sensors. It is assumed that n out of these m sensors may be compromised by an attacker, the set of which is chosen by the attacker and fixed over time. The adversary can manipulate the measurements sent by the compromised sensors arbitrarily. According to Kerckhoffs’s principle [4], i.e., the security of a system should not rely on its obscurity, we assume that the adversary knows exactly the hypothesis testing algorithm used by the fusion center. On the other hand, the fusion center (i.e., the system operator) only knows the number of malicious sensors n, but does not know the exact set of the compromised sensors. At each time k, the fusion center needs to make a decision about the underlying hypothesis based on the possibly corrupted measurements collected from all sensors until time k. Given a hypothesis testing algorithm at the fusion center (i.e., a measurements fusion rule), the worst-case probability of error is investigated, and the asymptotic exponential decay rate of the error, which we denote as the “security” of the system, is adopted to indicate the detection performance. On the other hand, when the attacker is absent, the detection performance of a hypothesis testing algorithm, i.e., the asymptotic exponential decay rate of the error probability, is denoted by the “efficiency”. We focus on the trade-off between efficiency and security. In particular, we are interested in characterizing the fundamental limits of the trade-offs between efficiency and security and the detectors that achieve these limits. January 22, 2018 DRAFT 3 The main contributions of this work are summarized as follows: 1) To the best of our knowledge, this is the first work that studies the trade-off between the efficiency and security of any inference algorithm. 2) With mild assumptions on the probability distributions of the measurements, we provide the fundamental limits of the trade-off between the efficiency and security (Corollaries 1 and 2). Furthermore, we present detectors, with low computational complexity, that achieve these limits (Theorem 4). Therefore, the system operator can easily adopt the detectors we proposed to obtain the best trade-off between efficiency and security. Interestingly, in some cases, e.g., Gaussian random variables with same variance and different mean, the maximal efficiency and the maximal security can be achieved simultaneously (Theorem 5). 3) Similar results, i.e., the fundamental limits of the trade-off and the detectors that possess these limits, are established with several different problem settings (Section V). This shows that our analysis techniques are insightful and may be helpful for the future related studies. Related Literature: A sensor is referred to as a Byzantine sensor if its messages to the fusion center are fully controlled by an adversary1 . Recently, detection with Byzantine sensors has been studied extensively in [5]–[14], among which [5]–[7] took the perspective of an attacker and aimed to find the most effective attack strategy, [8]–[11] focused on designs of resilient detectors, and [12]–[14] formulated the problem in a game-theoretic way. The main results of [5] are the critical fraction of Byzantine sensors that blinds the fusion center, which is just the counterpart of the breakdown point in robust statistics [15], and the most effective attack strategy that minimizes the asymptotic error exponent in the Neyman-Pearson setting, i.e., the Kullback–Leibler (K–L) divergence. Since the Byzantine sensors are assumed to generate independent and identical distributed (i.i.d.) data, the resulting measurements with minimum K–L divergence and the corresponding robust detector coincide with those in [16]. Similar results were obtained in [6], [7] by considering non-asymptotic probability of error in Bayesian setting and asymptotic Bayesian performance metric, i.e., Chernoff information, respectively. The authors in [8] focused on computation efficient algorithms to determine optimal parameters of the q-out-of-m procedure [17] in large scale networks for different fractions of Byzantine sensors. More than two types of sensors were assumed in [9], [10]. The authors thereof proposed 1 In practice, to manipulate the data of a sensor, an adversary may attack the sensor node itself or break the communication channel between the sensor and the fusion center. In this paper, we do not distinguish these two approaches. January 22, 2018 DRAFT 4 a maximum likelihood procedure, which is based on the iterative expectation maximization (EM) algorithm [18], simultaneously classifying the sensor nodes and performing the hypothesis testing. The authors in [11] showed that the optimal detector is of a threshold structure when the fraction of Byzantine sensors is less than 0.5. A zero-sum game was formulated in each of [12]–[14], among which a closed-form equilibrium point of attack strategy and detector was obtained in [14], computation efficient and nearly optimal equilibrium point (exact equilibrium point only in certain cases) was obtained in [12], and numerical simulations were used to study the equilibrium point in [13]. While in [5]–[10], [13] the Byzantine sensors are assumed to generate malicious data independently, this work, as in [11], [12], [14], assumes that the Byzantine sensors may collude with each other. The collusion model is more reasonable since the attacker is malicious and will arbitrarily change the messages of the sensors it controlls. Notice also that compared to the independence model, the collusion model complicates the analysis significantly. Unlike [6]–[10], [12], [13], where the sensors only send binary messages, this work, as in [5], [11], [14], assumes that the measurements of a benign sensor can take any value. Since the binary message model simplifies the structure of corrupted measurements, and, hence, implicitly limits the capability of an attacker, it is easier to be dealt with. This work differs from [11], [14] as follows. The authors in [11] focused on one time step scenario. The analysis is thus fundamentally different and more challenging. On the contrary, in this work the hypothesis testing is performed sequentially and an asymptotic regime performance metric, i.e., the Chernoff information, is concerned. A similar setting as in this work was considered in our recent work [14]. However, [14] focused on the equilibrium point. The performance (i.e., the security and efficiency) of the obtained equilibrium detection rule is merely one point of the admissible set that will be characterized in this paper. Finally, we should remark that the aforementioned literature mainly focuses on designing algorithms in adversarial environment. However, those algorithms may perform poorly in the absence of the adversary comparing to the classic Neyman-Pearson detector or Naive Bayes detector. A fundamental question, which we seek to answer in this paper, is that how to design a detection strategy which performs “optimally” regardless of whether the attacker is present. Organization: In Section II, we formulate the problem of binary hypothesis testing in adversarial environments, in which the attack model, the performance indices and the notion of the efficiency and security are defined. For the sake of completeness, we give a brief introduction the large deviation theory in Section III, which is a key supporting technique for the later January 22, 2018 DRAFT 5 analysis. The main results are presented in Section IV. We first provide the fundamental limits of the trade-off between the efficiency and security. We then propose detectors that achieve these limits. At last, we show that the maximal efficiency and the maximal security can be achieved simultaneously in some cases. Two extensions are investigated in Section V. After providing numerical examples in Section VI, we conclude the paper in Section VII. Notations: R (R+ ) is the set of (nonnegative) real numbers. Z+ is the set of positive integers. The cardinality of a finite set I is denoted as |I|. For a set A ∈ Rn , int(A) denotes its interior. Pk For any sequence {x(k)}∞ k=1 , we denote its average at time k as x̄(k) , t=1 x(t)/k. For a vector x ∈ Rn , the support of x, denoted by supp(x), is the set of indices of nonzero elements: supp(x) , {i ∈ {1, 2, . . . , n} : xi 6= 0}. II. P ROBLEM F ORMULATION Consider the problem of detecting a binary state θ ∈ {0, 1} using m sensors’ measurements. Define the measurement y(k) at time k to be a row vector: h i y(k) , y1 (k) y2 (k) · · · ym (k) ∈ Rm , (1) as a vector of all measurements from time 1 to time k: h i Y(k) , y(1) y(2) · · · y(k) ∈ Rmk . (2) where yi (k) is the scalar measurement from sensor i at time k. For simplicity, we define Y(k) Given θ, we assume that all measurements {yi (k)}i=1,...,m, k=1,2,... are independent and identically distributed (i.i.d.). The probability measure generated by yi (k) is denoted as ν when θ = 0 and it is denoted as µ when θ = 1. In other words, for any Borel-measurable set A ⊆ R, the probability that yi (k) ∈ A equals ν(A) when θ = 0 and equals µ(A) when θ = 1. We denote the probability space generated by all measurements y(1), y(2), . . . as (Ωy , Fy , Poθ )2 , where for any l ≥ 1 2 Poθ (yi1 (k1 ) ∈ A1 , . . . , yil (kl ) ∈ Al )   ν(A1 )ν(A2 ) . . . ν(Al ) =  µ(A1 )µ(A2) . . . µ(Al ) if θ = 0 , if θ = 1 The superscript “o” stands for original, which is contrasted with corrupted measurements. January 22, 2018 DRAFT 6 when (ij , kj ) 6= (ij ′ , kj ′ ) for all j 6= j ′ . The expectation taken with respect to Poθ is denoted by Eoθ . We further assume that ν and µ are absolutely continuous with respect to each other. Hence, the log-likelihood ratio λ : R → R of yi (k) is well defined as   dµ (yi ) , λ(yi ) , log dν (3) where dµ/dν is the Radon-Nikodym derivative. We define fk : Rmk → [0, 1], the detector at time k, as a mapping from the measurement space Y(k) to the interval [0, 1]. When fk (Y(k)) = 0, the system makes a decision θ̂ = 0, and when fk (Y(k)) = 1, θ̂ = 1. When fk (Y(k)) = γ ∈ (0, 1), the system then “flips a biased coin” to choose θ̂ = 1 with probability γ and θ̂ = 0 with probability 1 − γ. The system’s strategy f , (f1 , f2 , · · · ) is defined as an infinite sequence of detectors from time 1 to ∞. A. Attack Model Let the (manipulated) measurements received by the fusion center at time k be y′ (k) = y(k) + ya (k), (4) where ya (k) ∈ Rm is the bias vector injected by the attacker at time k. In the following, Assumptions 1–3 are made on the attacker, among which Assumption 1 is in essence the only limitation we pose. Assumption 1 (Spare Attack). There exists an index set I ⊂ M , {1, 2, . . . , m} with |I| = n S a such that ∞ k=1 supp(y (k)) = I. Furthermore, the system knows the number n, but it does not know the set I. We should remark that the above assumption does not pose any restrictions on the value of yia (k) if sensor i is compromised at time k, i.e., the bias injected into the data of a compromised sensor can be arbitrary. Assumption 1 says that the attacker can compromise up to n out of m sensors at each time. It is practical to assume that the attacker possesses limited resources, i.e., the number of compromised sensors is (non-trivially) upper bounded, since otherwise it would be too pessimistic and the problem becomes trivial. The quantity n might be determined by the a priori knowledge about the quality of each sensor. Alternatively, the quantity n may be viewed as a design parameter, which indicates the resilience level that the system is willing to introduce; the details of which are January 22, 2018 DRAFT 7 in Remark 1. Notice also that since the worst-case attacks (over the set of compromised sensors and the attack strategy) are concerned (the performance metric will be introduced shortly), it is equivalent to replace the cardinality requirement |I| = n by |I| ≤ n. We should note that in [6], [8], [12], it was also assumed that the number/fraction of malicious sensor nodes is known to the system operator. Moreover, the set of compromised sensors is assumed to be fixed over time. Notice that if we assume that the set of compromised sensors has a fixed cardinality but is time-varying, i.e., there exists no a set like I to bound the compromised sensors, the attacker would be required to abandon the sensor nodes it has compromised, which is not sensible. Notice that in [8]– [10], it was assumed the set of malicious/misbehaving sensors is fixed as well. We should also note that though this work is concerned with asymptotic performances (i.e., the security and efficiency introduced later), the numerical simulations in Section VI show that our algorithm indeed perform quite well in an non-asymptotic setup. Actually, if a finite-time horizon problem is considered and the time required for an attacker to control a benign sensor is large enough, then it is reasonable to assume that the set of compromised sensors is fixed. In fact, the exactly same sparse attack model as in Assumption 1 has been widely adopted by literature dealing with Byzantine sensors, e.g., state estimation [19], [20], and quickest change detection [21]. Finally, we should note that we do not assume any pattern of the bias yia (k) for i ∈ I, i.e., the malicious bias injected may be correlated across the compromised sensors and correlated over time. Compared to the independence assumption in [5]–[10], [13], our assumption improves the effectiveness of the attacker and is more realistic in the sense that the attacker is malicious and will do whatever it wants. Remark 1. The parameter n can also be interpreted as how many bad sensors the system can and is willing to tolerate, which is a design parameter for the system operator. In general, increasing n will increase the resilience of the detector under attack. However, as is shown in the rest of the paper, a larger n may result in more conservative design and is likely to cause a performance degradation during normal operation when no sensor is compromised. Assumption 2 (Model Knowledge). The attacker knows the probability measure µ and ν and the true state θ. January 22, 2018 DRAFT 8 By the knowledge about the sensor, the attacker can develop the probability measure µ and ν. To obtain the true state, the attacker may deploy its own sensor network. Though it might be difficult to satisfy in practice, this assumption is in fact conventional in literature concerning the worst-case attacks, e.g., [5], [21]. Nevertheless, this assumption is in accordance with the Kerckhoffs’s principle. Assumption 3 (Measurement Knowledge). At time k, the attacker knows the current and all the historical measurements available at the compromised sensors. Since the attacker knows the true measurement of a compromised sensor i, yi (k), it may set the fake measurement arrived at the fusion center yi′ (k) to any value it wants by injecting yia (k). One may also verify that all the results in this paper remain even if the attacker is “strong” enough where at time k, it knows measurements from all the sensors Y(k). An admissible attack strategy is any causal mapping from the attacker’s available information to a bias vector that satisfies Assumption 1. This is formalized as follows. Let I = {i1 , i2 , . . . , in }. Define the true measurements of the compromised sensors from time 1 to k as h i YI (k) , yI (1) yI (2) · · · yI (k) ∈ R|I|k with i h yI (k) , yi1 (k) yi2 (k) · · · yin (k) ∈ R|I| . Similar to Y(k), Y ′ (k) (Y a (k)) is defined as all the manipulated (bias vector) from time 1 to k. The bias ya (k) is chosen as a function of the attacker’s available information at time k: ya (k) , g(YI (k), Y a (k − 1), I, θ, k), (5) where g is a function3 of YI (k), Y a(k − 1), I, θ, k such that ya (k) satisfies Assumption 1. We denote g as an admissible attacker’s strategy. Notice that since time k is an input variable and the available measurements YI (k), Y a (k − 1) are “increasing” with respect to time k, the definition in (5) does not exclude the time-varying attack strategy. Denote the probability space generated by all manipulated measurements y′ (1), y′ (2), . . . as (Ω, F , Pθ ). The expectation taken with respect to the probability measure Pθ is denoted by Eθ . 3 The function g is possibly random. For example, given the available information, the adversary can flip a coin to decide whether to change the measurement or not. January 22, 2018 DRAFT 9 B. Asymptotic Detection Performance Given the strategy of the system and the attacker, the probability of error at time k can be defined as e(θ, I, k) ,   E0 fk (Y ′ (k))  1 − E1 fk (Y ′ (k)) when θ = 0, (6) when θ = 1. Notice that fk could take any value from [0, 1]. Hence, the expected value of fk is used to compute the probability of error. In this paper, we are concerned with the worst-case scenario. As a result, let us define ǫ(k) , max θ=0,1,|I|=n e(θ, I, k). (7) In other words, ǫ(k) indicates the worst-case probability of error considering all possible sets of compromised sensors and the state θ given the detection rule f and attack strategy g. Notice also that in accordance with Assumption 1, the set I in the above equation is fixed over time. Ideally, for each time k, the system wants to design a detector fk to minimize ǫ(k). However, such a task can hardly be accomplished analytically since the computation of the probability of error usually involves numerical integration. Thus, in this article, we consider the asymptotic detection performance in hope to provide more insight on the detector design. Define the rate function as ρ , lim inf − k→∞ log ǫ(k) . k (8) Clearly, ρ is a function of both the system strategy f and the attacker’s strategy g. As such, we will write ρ as ρ(f, g) to indicate such relations. Since ρ indicates the rate with which the probability of error goes to zero, the system would like to maximize ρ in order to minimize the detection error. On the contrary, the attacker wants to decrease ρ to increase the detection error. C. Interested Problems In practice, the attacker may not be present consistently. As a result, the system will operate for an extended period of time with all sensors being benign. Thus, a natural question arises: is there any detection rule that has “decent” performance regardless of the presence of the attacker? Or is there a fundamental trade-off between security and efficiency? In other words, a detector that is “good” in the presence of an adversary will be “bad” in a benign environment. This paper is devoted to answering this question. January 22, 2018 DRAFT 10 Informally, the performance of a detection rule when there is no attacker at all is referred to by “efficiency”, while the performance when the worst-case attacker (provided that the attacker knows the detection rule used by the system) is present is referred to by “security”. Mathematically speaking, given a system strategy f , denote by E(f ) and S (f ) its efficiency and security respectively, which are formalized as follows: E(f ) ,ρ(f, g = 0), (9) S (f ) , inf ρ(f, g) (10) g where 0 ∈ Rm is the zero vector. III. P RELIMINARY: L ARGE D EVIATION T HEORY In this section, we introduce the large deviation theory, which is a key supporting technique of this paper. To proceed, we first introduce some definitions. Let Mω (w) , R Rd ew·X dω(X), w ∈ Rd be the moment generating function for the random vector X ∈ Rd that has the probability measure ω, where w · X is the dot product. Let domω , {w ∈ Rd |Mω (w) < ∞} be the support such that Mω (w) is finite. Define the Fenchel–Legendre transform of the function log Mω (w) as Iω (x) = sup {x · w − log Mω (w)}, x ∈ Rd . (11) w∈Rd Theorem 1 (Multidimensional Cramér’s Theorem [22]). Suppose X(1), . . . , X(k), . . . be a sequence of i.i.d. random vectors and X(k) ∈ Rd has the probability measure ω. Let X(k) , Pk t=1 X(t)/k, k ∈ Z+ be the empirical mean. Then if 0 ∈ int(domω ), the probability P(X(k) ∈ A) with A ⊆ Rd satisfies the large deviation principle, i.e., 1) if A is closed, lim sup k→∞ 1 log P(X(k) ∈ A) ≤ − inf Iω (x). x∈A k 2) if A is open, lim inf k→∞ January 22, 2018 1 log P(X(k) ∈ A) ≥ − inf Iω (x). x∈A k DRAFT 11 IV. M AIN R ESULTS A. Technical Preliminaries Denote the moment generating function of the log-likelihood ratio λ under each hypothesis as: M0 (w) , M1 (w) , Z ∞ y=−∞ Z ∞ exp(wλ(y))dν(y), (12) exp(wλ(y))dµ(y). (13) y=−∞ Furthermore, define dom0 as the region where M0 (w) is finite and I0 (x) as the Fenchel–Legendre transform of log M0 (w). The quantities M1 (w), dom1 and I1 (x) are defined similarly. Denote the the Kullback-Leibler (K–L) divergences by Z ∞ Z D(1k0) , λ(y)dµ, D(0k1) , − y=−∞ ∞ λ(y)dν. y=−∞ To apply the multidimensional Cramér’s Theorem and avoid degenerate problems, we adopt the following assumptions: Assumption 4. 0 ∈ int(dom0 ) and 0 ∈ int(dom1 ). Assumption 5. The K–L divergences are well-defined, i.e., 0 < D(1k0), D(0k1) < ∞. With the above assumptions, we have the following properties of I0 (x) and I1 (x). the proof of which is provided in Appendix A. Theorem 2. Under Assumptions 4 and 5, the followings hold: 1) I0 (x) (I1 (x)) is twice differentiable, strictly convex and strictly increasing (strictly decreasing) on [−D(0k1), D(1k0)]. 2) The following equalities hold: I1 (D(1k0)) = 0, (14) I0 (D(1k0)) = D(1k0), (15) I0 (−D(0k1)) = 0, (16) I1 (−D(0k1)) = D(0k1). (17) I0 (0) = I1 (0). January 22, 2018 (18) DRAFT 12 1.8 1.6 I0 (D(1||0)) = D(1||0) I0 (x) I1 (x) 1.4 1.2 1 0.8 I1 (−D(0||1)) = D(0||1) 0.6 0.4 I0 (0) = I1 (0) = C 0.2 0 −1 −0.5 0 0.5 1 1.5 2 Fig. 1: Illustration of I0 (x) and I1 (x). The figure is plotted by assuming y1 (1) to be Bernoulli distributed under both hypotheses with Po0 (y1 (1) = 1) = 0.02 and Po1 (y1 (1) = 1) = 0.6. Since I0 (0) = I1 (0), let us define C , I0 (0). (19) To make the presentation clear, we illustrate I0 (x) and I1 (x) in Fig. 1. The “inverse functions” of I0 (x) and I1 (x) are defined as follows: for z ≥ 0, I0−1 (z) = max{x ∈ R : I0 (x) = z}, I1−1 (z) = min{x ∈ R : I1 (x) = z}. Let Dmin , min{D(0k1), D(1k0)}. We further define h(z) : (0, (m − n)Dmin ) 7→ (0, (m − n)Dmin ) as h(z) ,(m − n) min{I0 (I1−1 (z/(m − n)), I1 (I0−1 (z/(m − n))}. January 22, 2018 (20) DRAFT 13 B. Fundamental Limits We are ready to provide the fundamental limitations between efficiency and security. The proof is provided in Appendix B. Theorem 3. For any detection rule f , the following statements on E(f ) and S (f ) are true: 1) E(f ) ≤ mC, 2) S (f ) ≤ (m − 2n)+ C, where (m − 2n)+ = max{0, m − 2n}. 3) S (f ) ≤ E(f ), 4) Let E(f ) = z, we have S (f ) ≤ ( h(z) if 0 < z < (m − n)Dmin (21a) 0 if z ≥ (m − n)Dmin . (21b) Remark 2. Theorem 3 indicates that mC is the maximum efficiency that can be achieved by any detector, while (m − 2n)+ C is the maximum security that can be achieved. Therefore, if m ≤ 2n, i.e., no less that half of the sensors are compromised, then S (f ) = 0 for any f , which implies that all detectors will have zero security. In that case, the naive Bayes detector will be the optimal choice since it has the optimal efficiency and the analysis becomes trivial. Therefore, without any further notice, we assume m > 2n for the rest of the paper. Notice that fourth constraint in Theorem 3 indicates a trade-off between security and efficiency. For general cases, the maximum security and efficiency may not be achieved simultaneously. However, in Section IV-D, we will prove that for a special case, there exist detectors that can achieve the maximum security and efficiency at the same time. Notice that I0 (x) (I1 (x)) is strictly increasing (decreasing) on [−D(0k1), D(1k0)]. Therefore, combining (15) and (17), one obtains that h(z) is strictly decreasing. Then the dual version of (21a) is obtained as follows. Let S (f ) = z we have that if 0 < z ≤ (m − 2n)C, E(f ) ≤ h−1 (z) = h(z), (22) where h−1 (z) is the inverse function of h(z), and the equality holds because h(z) is an involutory function, i.e., h(h(z)) = z for every z ∈ (0, (m − n)Dmin ). We then have the following two corollaries. The results follow straightforwardly from Theorem 3 and (22), we thus omit the proofs. January 22, 2018 DRAFT 14 Corollary 1. Suppose the security of a detector f satisfies S (f ) = z ∈ [0, (m − 2n)C], then the maximum efficiency of f satisfies the following inequality:   mC if z = 0 max E(f ) ≤ ,  f ∈{f :S (f )=z} he (z) if z > 0 where he (z) , min{mC, h(z)}. Corollary 2. Suppose the efficiency of a detector f satisfies E(f ) = z ∈ [0, mC], then the maximum security of f satisfies the following inequality:   hs (z) if 0 < z < z ′ , max S (f ) ≤  f ∈{f :E(f )=z} 0 if z ≥ z ′ or z = 0, where hs (z) = min{z, (m − 2n)C, h(z)}, and z ′ = (m − n)Dmin . C. Achievability In this section, we propose a detector that achieves the upper bounds in Corollaries 1 and 2. Let zs ≤ (m−2n)C. At time k ≥ 1, the algorithm, denoted by fz∗s , is implemented as follows. Remark 3. We here discuss about the computational complexity of the detection rule fz∗s . The computational complexity for the step 1 is O(m). Notice that the quantity λ̄i (k) is computed in a recursive fashion. The complexity for the step 2 is O(m log m). To compute δ(0, k) and δ(1, k), we can first sort I0 (λ̄i (k)) and I1 (λ̄i (k)) in ascending order, respectively, and then sum the first m − 2n elements of each. The computational complexity for the step 3 and step 4 is fixed, and the step 5 has computational complexity O(m). Therefore, the total computational complexity for each time step is O(m log m). We now show the performance of fz∗s and the proof is provided in Appendix C. January 22, 2018 DRAFT 15 Algorithm 1 Hypothesis testing algorithm fz∗s 1: Compute the empirical mean of the likelihood ratio from time 1 to time k for each sensor i: λ̄i (k) , k X λ(yi′ (t))/k t=1 1 k−1 λ̄i (k − 1) + λ(yi′ (k)) = k k (23) with λ̄i (0) = 0. 2: Compute I0 (λ̄i (k)) and I1 (λ̄i (k)) for each i. Compute the following sum: X δ(0, k) , min I0 (λ̄i (k)), |O|=m−n,O⊂M δ(1, k) , min |O|=m−n,O⊂M i∈O X I1 (λ̄i (k)). i∈O 3: If δ(0, k) < zs , make a decision θ̂ = 0; go to the next step otherwise. 4: If δ(1, k) < zs , make a decision θ̂ = 1; go to the next step otherwise. P 5: If m i=1 λ̄i (k) < 0, make a decision θ̂ = 0; make a decision θ̂ = 1 otherwise. Definition 1. (ze , zs ) are called an admissible pair if the following inequalities holds: 0 ≤zs ≤ (m − 2n)C,   mC if zs = 0 ze ≤ ,  he (zs ) if zs > 0 where he (zs ) is defined in Corollary 1. Theorem 4. Let (ze , zs ) be any admissible pair of efficiency and security. Then there holds E(fz∗s ) ≥ ze , S (fz∗s ) ≥ zs . The above theorem means that the upper bounds in Corollaries 1 and 2 are achieved by fz∗s . Hence, we provide a tight characterization on admissible efficiency and security pair. We illustrate the shape of admissible region in Fig 2. Remark 4. The optimal detector may not be necessarily unique, in the sense that there may exist other detectors, other than the one defined by Algorithm 1, that can achieve the same efficiency January 22, 2018 DRAFT 16 3 2.5 ((m − n)C, (m − n)C) Security 2 (m − 2n)C 1.5 1 0.5 0 mC 0 0.5 1 1.5 2 Efficiency 2.5 3 Fig. 2: Achievable efficiency and security region for any detector. The figure is plotted by assuming y1 (1) to be Bernoulli distributed under both hypotheses with Po0 (y1 (1) = 1) = 0.02 and Po1 (y1 (1) = 1) = 0.6. The shaded area is the admissible pair (E(f ), S (f )) for any detector f . The red dashed line is the function (m − n)I0 (I1−1 (z/(m − n))), while the blue dotted line the function (m − n)I1 (I0−1 (z/(m − n))). and security limits. By definition, the detectors achieving the limits have the same asymptotic performance. However, the finite-time performance (in terms of detection error) may be different and we are planning to investigate this in the future work. D. Special Case: Symmetric Distribution In this subsection, we discuss a case where the maximum security and efficiency can be achieved simultaneously by a detector. Notice that by the definition of admissible pair, if we have h((m − 2n)C) ≥ mC, (24) then we know that (ze = mC, zs = (m − 2n)C) is an admissible pair and hence the detector ∗ f(m−2n)C defined in Section IV-C can achieve maximum security (m − 2n)C and efficiency January 22, 2018 DRAFT 17 mC simultaneously. In other words, adding security will not deteriorate the performance of the system in the absence of the adversary. The following theorem provides a sufficient condition for (24), which is based on the first order derivative of I0 (·) and I1 (·). The proof is presented in Appendix D for the sake of legibility. (1) (1) ∗ Theorem 5. If I0 (x)|x=0 = −I1 (x)|x=0 , then h((m−2n)C) ≥ mC holds. Therefore, f(m−2n)C possesses not only the maximal security but also the maximal efficiency. Notice that whether or not the above sufficient condition is satisfied merely depends on the probability distribution of the original observations, which is independent of the number of the compromised sensors. If there exists “symmetry” between distribution µ and ν, then the sufficient condition can be satisfied. To be specific, if there exists a constant a such that for any Borel measurable set A, we have µ(a + A) = ν(a − A), then one can prove that M0 (w) = M0 (−w), which further implies that (1) (1) I0 (x) = I1 (−x) ⇒ I0 (x)|x=0 = −I1 (x)|x=0 . We provide two examples of pairs of “symmetric” distributions as follows: 1) Each yi (k) is i.i.d. Bernoulli distributed and   θ with probability p0 yi (k) =  1 − θ with probability 1 − p0 2) Each yi (k) satisfies the following equation: yi (k) = aθ + vi (k), where a 6= 0 and vi (k) ∼ N (v̄, σ 2 ) is i.i.d. Gaussian distributed. V. E XTENSION In this section, we consider two extensions to the problem settings discussed in Section IV. January 22, 2018 DRAFT 18 A. Secure Sensors Consider that there is a subset of “secure” sensors that are well protected and cannot be compromised by the attacker. We would like to study the trade-off between security and efficiency when those “secure” sensors are deployed. Let ms out of the total m sensors be “secure” and the remaining m − ms sensors are “normal” ones that can be compromised by an adversary. In this subsection, n can take any value in {0, 1, . . . , m − ms } and does not necessarily satisfy 2n < m. The other settings are the same as in Section II. Denote by Es (f ) and Ss (f ) the efficiency and security of a detection rule f under such case. Then one obtains the following results as in Theorem 3. Theorem 6. For any detection rule f , the following statements on Es (f ) and Ss (f ) are true: 1) Es (f ) ≤ mC, 2) Ss (f ) ≤ max((m − 2n)C, ms C), 3) Ss (f ) ≤ Es (f ), 4) Let Es (f ) = z, we have Ss (f ) ≤   h(z)  0 if 0 < z < (m − n)Dmin . if z ≥ (m − n)Dmin The above theorem is proved in the same manner as in Appendix B. Notice that the essential difference is the range of Ss (f ), i.e., the statement in the second bullet. This is due to the fact that the ms secure sensors cannot be compromised. Remark 5. From the above theorem, one sees that replacing ms normal sensors with secure sensors does not change the fundamental trade-off between the security and efficiency. However, the benefit of these ms secure sensors are that the security itself is improved when 2n > m−ms . Also, one notice that when m − ms ≥ 2n, there are no gains of deploying secure sensors. Intuitively, in such case the redundancy of the m − ms normal sensors is enough. Furthermore, the detector fzss in Algorithm 2, which is a slight variation of fz∗s and treats the ms secure sensors separately, achieves the limits. This is stated in the following theorem, which is proved in the same manner as in Appendix C. January 22, 2018 DRAFT 19 Theorem 7. If the pair (ze , zs ) satisfies 0 ≤zs ≤ max((m − 2n)C, ms C),   mC if zs = 0 ze ≤ ,  he (zs ) if zs > 0 then there holds Es (fzss ) ≥ ze , Ss (fzss ) ≥ zs . Algorithm 2 Hypothesis testing algorithm fzss when there are secure sensors 1: Compute λ̄i (k) for each sensor. 2: Compute I0 (λ̄i (k)) and I1 (λ̄i (k)) for each sensor. Compute the minimum sum from the “normal” sensors: δ(0, k) = δ(1, k) = 3: If δ(0, k) + Pi=m min |O|=m−ms −n,O⊂{1,...,m−ms } min |O|=m−ms −n,O⊂{1,...,m−ms } m−ms +1 I0 (λ̄i (k)) X I0 (λ̄i (k)), i∈O X I1 (λ̄i (k)). i∈O < zs , make a decision θ̂ = 0; go to the next step otherwise. Pi=m 4: If δ(1, k) + m−ms +1 I1 (λ̄i (k)) < zs , make a decision θ̂ = 1; go to the next step otherwise. P 5: If m i=1 λ̄i (k) < 0, make a decision θ̂ = 0; make a decision θ̂ = 1 otherwise. B. Unknown Number of Compromised Sensors In the previous section, we assume that if the system is being attacked, then n sensors are compromised. However, in practice, the exact number of compromised sensors is likely to be unknown. In this subsection, we assume that we know an estimated upper bound on the compromised sensors, denoted by n. Let na denote the number of the sensors that are actually compromised. Therefore, na may take value in Na , {0, 1, 2, . . . n}4 . 4 In Section II-A, we remark that the requirement |I| = n can be equivalently replaced by |I| ≤ n. The implicit assumption is that the estimated upper bound n is tight and the worst-case number of compromised sensors is in indeed n. Therefore, na in this section may also be interpreted as the tight upper bound of the number of actually compromised senors. January 22, 2018 DRAFT 20 Given a detector f , denote by Dna (f ) the detection performance when the number of compromised sensor is na . Then, one has D0 (f ) = E(f ) and Dn (f ) = S (f ). In the following, we present the pairwise trade-off between Dna (f ) and Dn′a (f ) for any 0 ≤ na , n′a ≤ n, and propose an algorithm to achieve these performance limits. A similar argument as in Section IV can be adopted to obtain these results, the details of which are omitted. We define h̃ : Na × Na × (0, ∞) 7→ (0, ∞) as h̃(na , n′a , z) n o ,(m − ña ) min h̃0 (z/(m − ña )), h̃1 (z/(m − ña )) , where ña = na + n′a , and h̃0 (z) = h̃1 (z) =   I0 (I −1 (z)) 1  0   I1 (I −1 (z)) 0  0 if 0 < z < D(0||1) , if z ≥ D(0||1) if 0 < z < D(1||0) . if z ≥ D(1||0) Then one obtains that for any detector f and na , n′a ∈ N, there hold Dna (f ) ≤ (m − 2na )C, (25)  Dna (f ) ≤ h̃ na , n′a , Dn′a (f ) . (26) Let z , (z0 , z1 , . . . , zn ) be a n-tuplet of admissible detection performance, i.e., zna ≤ (m − 2na )C, zna ≤ h̃(na , n′a , zn′a ). Then the detector in Algorithm 3, which is a variation of fz∗s in Section IV-C and is denoted by fz∗ , can achieve these performance, i.e., Dna (fz∗ ) ≥ zna for any na ∈ N. VI. N UMERICAL E XAMPLES A. Asymptotic Performance We simulate the performance of the detector fz∗s proposed in Section IV-C (i.e., its efficiency and security) and compare the empirical results to the theoretical ones shown in Fig. 2. The same parameters as in Fig. 2 are used, i.e., Po0 (y1 (1) = 1) = 0.02, Po1 (y1 (1) = 1) = 0.6, m = 9 and n = 2. To simulate the security, it is assumed that the following attack strategy is January 22, 2018 DRAFT 21 Algorithm 3 Hypothesis testing algorithm fz∗ initialization: na = n. 1: Compute λ̄i (k), I0 (λ̄i (k)), I1 (λ̄i (k)) for each sensor i. 2: While na ≥ 1 1) Compute these two minima: δ̃(0, k, na ) , δ̃(1, k, na ) , min |O|=m−na ,O⊂M min |O|=m−na ,O⊂M X I0 (λ̄i (k)), i∈O X I1 (λ̄i (k)). i∈O 2) If δ̃(0, k, na ) < zna , make a decision θ̂ = 0 and stop. 3) If δ̃(1, k, na ) < zna , make a decision θ̂ = 1 and stop. 4) Replace na with na − 1. P 3: If m i=1 λ̄i (k) < 0, make a decision θ̂ = 0; make a decision θ̂ = 1 otherwise. adopted. If θ = 0, the attacker modifies the observations of the compromised sensors such that for every i ∈ I and k ≥ 1 I0 (λ̄i (k)) ≥ zs . On the other hand, if θ = 1, the attack strategy is such that I1 (λ̄i (k)) ≥ zs holds for every i ∈ I and k ≥ 1. To simulate the performance with high accuracy, we adopt the importance sampling approach [23]. To plot Fig. 3, we let zs be in [0, (m − 2n)C = 1.5987]. Notice that the theoretical performance of fz∗s coincides exactly with the fundamental limits in Fig. 2. Therefore, Fig. 3 verifies that our algorithm fz∗s indeed achieves the fundamental limits. B. Non-asymptotic Performance We have proved that our algorithm is optimal in the sense that it achieves the fundamental trade-off between the security and efficiency. However, notice that both the security and efficiency are asymptotic performance metrics. In this example, we show that our algorithm possesses quite “nice” finite-time performance as well by comparing it to the naive Bayes detector. We should remark that while the Bayes detector is strictly optimal (i.e., optimal for any time horizon) in the absence of attackers, its security is zero. The results are in Fig. 4, where zs is chosen to January 22, 2018 DRAFT 22 1.6 1.4 Security 1.2 1 theoretical empirical 0.8 0.6 0.4 0.2 0 2.72 2.74 2.76 2.78 2.8 2.82 2.84 2.86 2.88 2.9 Efficiency Fig. 3: Comparison between the empirical and theoretical performance of the detector fz∗s when zs ∈ [0, (m − 2n)C]. be 1.4282. Fig. 4 illustrates that the algorithm fz∗s with zs = 1.4282 has a finite-time detection performance comparable to that of naive Bayes detector when the attacker is absent. The finitetime performance metric ǫ(k) is defined in (7), where the attacker is absent, i.e., g = 0, and the detector is fz∗s =1.4282 or the naive Bayes. One should note that the security of fz∗s is 1.4282. As a result, adopting the secure detector fz∗s increases the security of the system while introducing minimum performance loss in the absence of the adversary. C. Comparison with Other Detectors To simulate the detectors introduced later, we use the same sensor network model as in Fig. 3. The asymptotic performances, i.e., the efficiency and security, are summarized in Table I, while the non-asymptotic performances when the attacker is absent are in Fig. 5. Table I is consistent with the statement that our algorithm achieves the best trade-off between the security and efficiency, while Fig. 5 shows that it is preferable to adopt our algorithm as well with respect to the finite-time performance when the attacker is absent. In the following, we present the two detectors to be compared to in detail. The first detector is the equilibrium detection rule that is proposed in [14] for cases where January 22, 2018 DRAFT 23 Naive Bayes ∗ f1.4282 10−2 10−4 ǫ(k) 10−6 10−8 10−10 10−12 10−14 1 2 3 4 5 6 time k 7 8 9 10 Fig. 4: Finite-time performance of fz∗s in the absence of the adversary. m > 2n. This detection rule, which shares the same spirit with the α-trimmed mean in robust statistics [15], first removes the largest n and smallest n log-likelihood ratios, and then compares the mean of the remaining m − 2n log-likelihood ratios to 0, just as in the classic probability ratio test. The details of the detection rule, denoted by ftrim , are formalized as follows.   0 if Pm−n λ̄[i] (k) < 0, i=n+1 ftrim (Y ′ (k)) = P  m−n 1 if i=n+1 λ̄[i] (k) ≥ 0, where λ̄[i] (k) is the i-th smallest element of {λ̄1 (k), λ̄2 (k), . . . , λ̄m (k)} with λ̄i (k) being the empirical mean of log-likelihood ratio from time 1 to k for senor i, which is defined in (23). It was shown in [14] that the security and efficiency of ftrim are S (ftrim ) = (m − 2n)C, E(ftrim ) = (m − n)C. Since for any z < C, there hold I0 (I1−1 (z)) > C, I1 (I0−1 (z)) > C. Then by the definition of h(z) and Theorem 4, one obtains that if the security of our algorithm is (m − 2n)C, its efficiency is larger than (m − n)C, i.e., E(fz∗s =(m−2n)C ) > (m − n)C. January 22, 2018 DRAFT 24 Therefore, our algorithm is preferable since, with the same security, it achieves the larger efficiency than the algorithm ftrim . In particular, by Theorem 5, the efficiency gain of our algorithm in certain cases is nC. The next detector is the q-out-of-m procedure [17], which has been studied in [8] by assuming that the malicious sensor nodes generate fictitious data randomly and independently, and the probability that the compromised sensor flips the binary message is known. The q-out-of-m procedure is simple and works as follows. At time k, after receiving the mk (binary) messages, the fusion center makes a decision   1 if Pk Pm y ′ (k) ≥ qk , i=1 i t=1 θ̂ =  0 otherwise. (27) Let q = [q1 , . . . , qk , . . .] be a sequence of thresholds used in the above detector from time 1 to infinity. In the sequel, we denote the above detector as fqom (q). Notice that fqom (q) is just the naive Bayesian detector, which minimizes the weighted sum of miss detection and false alarm at each time k (the weight is determined by qk ). It is clear that if fqom (q) is used at the fusion center, the worst-case attack is always sending 0 (1) if the true state θ is 1 (0). Therefore, at time k, the performance (i.e., the probability of detection error) of the detector fqom (q) under the worst-case attacks is as follows.   mk − nk   pj1 (1 − p1 )mk−nk−j , P1 (fqom (q) = 0) = j j=0 qk X P0 (fqom (q) = 1)   mk − nk   pj0 (1 − p0 )mk−nk−j , = j j=max(0,qk −nk) mk−nk X where p0 , Po0 (y1 (1) = 1) = 0.02, p1 , Po1 (y1 (1) = 1) = 0.6. Then it is reasonable to set nk < qk < mk − nk, since otherwise the worst-case (over θ) detection error will be 1. However it is challenging to obtain the optimal qk analytically to minimize the worst-case detection error; we do this by brute-force numerical simulations. By varying the time k from 1 to 40, we obtain ∗ the (approximate) security and the optimal parameters q1∗ , . . . , q40 . Then we further simulate the performance of the q-out-m algorithm when the optimal parameters obtained above are used and the attacker is absent. January 22, 2018 DRAFT 25 TABLE I: The asymptotic performances of our algorithm fz∗s with zs = 1.4282, the trimmed mean detector in [14] ftrim , and the optimal q-out-m procedure fqom (q∗ ). fz∗s =1.4282 ftrim fqom (q∗ ) security 1.43 1.43 0.69 efficiency 2.88 2.00 1.68 ∗ f1.4282 ftrim fqom (q∗ ) 10−2 ǫ(k) 10−5 10−8 10−11 10−14 1 2 3 4 5 6 time k 7 8 9 10 Fig. 5: Finite-time performance of fz∗s , ftrim , and fqom (q∗ ) in the absence of the adversary. VII. C ONCLUSION AND F UTURE WORK In this paper, we studied the trade-off between the detection performance of a detector when the attacker is absent (termed efficiency) and the “worst-case” detection performance when the attacker, knowing the detector, is present (termed security). The setting is that a binary hypothesis testing is conducted based on measurements from a set of sensors, some of which can be compromised by an attacker and their measurements can be manipulated arbitrarily. We first provided the fundamental limits of the trade-off between the efficiency and security of any detector. We then presented detectors that possesses the limits of the efficiency and security. Therefore, a clear guideline on how to balance the efficiency and security has been established for the system operator. An interesting point of the fundamental trade-off is that in some cases, the maximal efficiency and the maximal security can be achieved simultaneously, i.e., the maximal January 22, 2018 DRAFT 26 efficiency (security) can be achieved without compromising any security (efficiency). In addition, two extensions were investigated: secure sensors are assumed for the first one, and the detection performance beyond the efficiency and security is concerned for the second one. The main results were verified by numerical examples. Investigating the problem when the measurements from the benign sensors are not i.i.d. is a future direction. A PPENDIX A T HE P ROOF OF T HEOREM 2 The following lemma is needed to prove Theorem 2: Lemma 1. If Assumption 4 and 5 hold, then the following statement is true: 1) For any w, M0 (w + 1) = M1 (w). (28) 2) There exists a small enough ǫ > 0, such that log M0 (w) is well-defined on [−ǫ, 1 + ǫ], and log M1 (w) is well-defined on [−1 − ǫ, ǫ]. 3) log M0 (w), log M1 (w) are strictly convex. 4) The derivative of log M0 (w) and log M1 (w) satisfy (log M0 (w))(1) |w=1 = D(1k0). (29) (log M0 (w))(1) |w=0 = −D(0k1). (30) (log M1 (w))(1) |w=0 = D(1k0). (31) (log M1 (w))(1) |w=−1 = −D(0k1). (32) Proof. By definition, M0 (w + 1) = = Z Z ∞ −∞ ∞ −∞   dµ (y) dν dµ (y) dν w w dµ (y)dν(y) dν dµ(y) = M1 (w), which proves (28). Assuming M0 (w1 ), M0 (w2 ) < ∞ and w1 < w2 , by the convexity of the exponential function, we know that for any λ and 0 < α, β < 1 and α + β = 1, 0 < exp [(αw1 + βw2 )λ] ≤ αew1 λ + βew2 λ . January 22, 2018 DRAFT 27 Therefore 0 < M0 (αw1 + βw2 ) ≤ αM0 (w1 ) + βM0 (w2 ) is well-defined, which proves that the domain of log M0 (w) is convex. Furthermore, by Assumption 4, 0 ∈ int(dom1 ) gives 1 ∈ int(dom0 ), (33) Hence, [0, 1] ⊂ int(dom0 ), which proves that log M0 (w) is well-defined on [−ǫ, 1 + ǫ] if ǫ is small enough. It is well known that log M0 (w) is infinitely differentiable on int(dom0 ) (see [22, Exercise 2.2.24]). Basic calculations give that (log M0 (w))(2) w   2 Z  dµ dµ (y) log (y) dν(y) > 0 = dν dν R (34) (35) always holds, where (log M0 (w))(2) is the second derivative. The above quantity is strictly positive since the KL divergence between probability measure µ and ν are strictly positive by Assumption 5. Therefore, log M0 (w) is strictly convex. The domain and the strict convexity of log M1 (w) can be proved similarly. Take the derivative of log M0 (w) at w = 1 yields Z dµ (1) (log M0 (w)) |w=1 = λ(y) (y)dν(y) dν ZR = λ(y)dµ(y) = D(1k0). R Equation (30), (31) and (32) can be proved similarly. We are now ready to prove Theorem 2: Proof of Theorem 2. Define the derivative of log M0 (w) to be ψ(w). Since log M0 (w) is strictly convex, we know that ψ(w) is strictly increasing and therefore, its inverse function is well defined on [−D(0k1), D(1k0)]. Denote the inverse function as ϕ(x). By the convexity of log M0 (w), we have that log M0 (w) ≥ log M0 (w∗ ) + ψ(w∗ )(w − w∗ ). (36) Hence, for any x ∈ [−D(0k1), D(1k0)], suppose that ψ(w∗ ) = x, we have wx − log M0 (w) = [w∗ ψ(w∗ ) − log M0 (w∗ )] + [(w − w∗ )ψ(w∗ ) + log M0 (w∗ ) − log M0 (w)] . January 22, 2018 DRAFT 28 Notice the last term on the RHS of the equation is non-positive. Hence, we can prove that I0 (x) = w∗ ψ(w∗ ) − log M0 (w∗ ) = ϕ(x)x − log M0 (ϕ(x)). (37) Take the derivative and second order derivative of I0 (x) we have d2 I0 (x) 1 dI0 (x) = ϕ(x), = (1) > 0, 2 dx dx ψ (ϕ(x)) where the last inequality is due to the fact that log M0 (w) is strictly convex, and thus its second derivative ψ (1) is strictly positive. Hence we prove that I0 (x) is twice differentiable and strictly convex on [−D(0k1), D(1k0)]. Notice that dI0 (x) dx = ϕ(−D(0k1)) = 0, x=−D(0k1) we can prove that I0 (x) is also strictly increasing. Similarly we can prove the properties for I1 (x). Combining (37), (29) and (30), we can prove (14) and (15). Equation (16) and (17) can be proved similarly. Since I0 (0) = sup 0 · w − log M0 (w) = sup − log M0 (w), w w I1 (0) = sup 0 · w − log M1 (w) = sup − log M1 (w), w w and M0 (w + 1) = M1 (w), We can conclude I0 (0) = I1 (0). A PPENDIX B T HE P ROOF OF T HEOREM 3 The proof is divided into four parts, each of which is devoted to one of the statements in Theorem 3. Part I. For any index set O ⊂ M and χ ∈ R, define the following Bayesian like detector:   0 if P i∈O λ̄i (k) < χ, fk,χ,O (Y ′(k)) = (38)  1 if P λ̄ (k) ≥ χ, i∈O i January 22, 2018 DRAFT 29 where λ̄i (k) is the empirical mean of the log-likelihood ratio from time 1 to k for sensor i, which is defined in (23). Denote fχ,O = (f1,χ,O (Y ′ (1)), · · · , fk,χ,O (Y ′ (k)), · · · ) and fO∗ , f0,O . (39) ∗ It is well known that fM minimize the average error probability [24]: e(θ = 0, O = ∅, k)+e(θ = 1, O = ∅, k), where, recall, e(θ, O, k) is defined in (6). Notice that log(e(θ = 0, O = ∅, k) + e(θ = 1, O = ∅, k)) lim inf − k→∞ k log maxθ e(θ, O = ∅, k) . = lim inf − k→∞ k ∗ Hence, when the attacker is absent, fM is optimal in the sense that the rate ρ defined in (8) ∗ is maximized. Furthermore, Cramér’s Theorem gives that E(fM ) = mI0 (0) = mC. Therefore, E(f ) ≤ mC holds for any detector f . Part II. In this part, we show S (f ) ≤ (m−2n)+ C. The proof is by construction: we construct a attack strategy g ∗ such that, for any detection rule f , the following inequality holds: ρ(f, g ∗ ) ≤ (m − 2n)+ C. (40) Let O′ = {1, . . . , n} and O′′ = {m − n + 1, . . . , m}. The attack strategy g ∗ is as follows. (i). When θ = 0, sensors in O′ are compromised and the distributions are flipped, i.e., the measurements of sensors in O′ are i.i.d. as µ. (ii). When θ = 1, sensors in O′′ \ O′ are compromised and the distributions are flipped. Thus, under attack g ∗ , for either θ = 1 or θ = 0, sensors in O′ will follow distribution µ and sensors in O′′ \ O′ will follow distribution ν. In other words, only sensors in M \ (O′ ∪ O′′ ) have different distributions under different θ. Notice that when m ≤ 2n, M \ (O′ ∪ O′′ ) = ∅, ∗ which means that ρ(f, g ∗ ) = 0. If m > 2n, by the optimality of the detection rule fM\(O ′ ∪O ′′ ) defined in (39), one obtains ρ(f, g ∗ ) ≤ (m − 2n)C. Equation (40) is thus obtained. Part III. It is clear from the definitions of E(f ) and S (f ) that S (f ) ≤ E(f ) holds. Part IV. Consider the following product measures: µa = µ × µ . . . × µ × ν × ν . . . × ν , {z } {z } | | m−n n µka = µa × µa . . . × µa {z } | k January 22, 2018 DRAFT 30 and ν∗ = ν × ν . . . × ν , {z } | m ν∗k = ν∗ × ν∗ . . . × ν∗ . {z } | k The measure µa is generated by an attack that flips the distribution on the last n sensors, when the true hypothesis is θ = 1. The measure ν∗ is generated by benign sensors when the true hypothesis is θ = 0. Now let us consider the following problem: given φ > 0, find the detection rule f such that Eν∗k fk + φk Eµka (1 − fk ) (41) is minimized for every k ≥ 1. Let fφ = (fφ,1 , . . . , fφ,k , . . .) with fk,φ given by fk,φ (Y ′ (k)) = fk,− log φ,{1,2,...,m−n} (Y ′ (k)), (42) where, recall, the function fk,χ,O (Y ′ (k)) is defined in (38). Then by the Bayesian decisiontheoretic detection theory, fφ is a solution to the above problem. Let Eφ , lim inf − k→∞ and Sφ , lim inf − k→∞ log Eν∗k fφ,k k log Eµka (1 − fφ,k ) . k Then from the optimality of fφ , for any φ > 0 and any detector f = (f1 , . . . , fk , . . .), the following hold for any k: If Eν∗k fk ≤ Eν∗k fφ,k , then Eµka (1 − fk ) ≥ Eµka (1 − fφ,k ). This implies that log Eν∗k fk ≥ Eφ , k→∞ k log Eµka (1 − fk ) then lim inf − ≤ Sφ . k→∞ k If lim inf − Furthermore, the definitions of E(f ) and S (f ) yield log Eν∗k fk , k→∞ k log Eµka (1 − fk ) S (f ) ≤ lim inf − . k→∞ k E(f ) ≤ lim inf − January 22, 2018 DRAFT 31 Therefore, for any φ > 0 and any detector f , the following hold: If E(f ) ≥ Eφ , then S (f ) ≤ Sφ . Now let us evaluate Eφ and Sφ . Let φ̃ = − log φ/(m − n), then Cramér’s theorem yields   0 if φ̃ ≤ −D(0k1), Eφ =  (m − n)I0 (φ̃) if φ̃ > −D(0k1), and Sφ =   0 if φ̃ ≥ D(1k0),  (m − n)I1 (φ̃) if φ̃ < D(1k0). Notice that the monotonicity of I0 (·) on [−D(0k1), ∞) implies that if 0 < Eφ < (m − n)I0 (D(1k0)) = (m − n)D(1k0), φ̃ ∈ (−D(0k1), D(1k0)) holds. Therefore, if 0 < Eφ < (m − n)D(1k0), there holds Sφ = (m − n)I1 (I0−1 (Eφ /(m − n))). One thus obtains that for any detector f , if 0 < E(f ) < (m − n)D(1k0) S (f ) ≤ (m − n)I1 (I0−1 (E(f )/(m − n))). (43) Also, it is easy to see that if Eφ ≥ (m − n)D(1k0), Sφ = 0 holds. Thus, S (f ) = 0 if E(f ) ≥ (m − n)D(1k0). (44) Similarly, one considers the detection problem for the measures µk∗ and νak and obtains that for any detector f , if 0 < E(f ) < (m − n)D(0k1) S (f ) ≤ (m − n)I0 (I1−1 (E(f )/(m − n))) (45) S (f ) = 0 if E(f ) ≥ (m − n)D(0k1). (46) and Then equation (21a) follows from (43) and (45), and equation (21b) from (44) and (46). January 22, 2018 DRAFT 32 A PPENDIX C T HE P ROOF OF T HEOREM 4 This theorem is proved by showing that fz∗s = 0 (or 1) if certain conditions are satisfied (i.e., Lemma 4). Furthermore, the special structure of these conditions can ensure that, under any attacks, fz∗s = 0 (or 1) if the measurements of sensors in an attack free environment belong to a certain set, to which the Cramér’s Theorem is applied. Before proceeding, we need to define the following subsets of Rm : Definition 2. Define B− , B+ ⊂ Rm as ) ( ) ( m m X X − m + m λi < 0 , B , λ ∈ R : λi ≥ 0 . B , λ∈R : i=1 i=1 Definition 3. Let O ⊂ M, j ∈ {0, 1} and z ∈ R+ , define a ball as n o X Bal(O, j, z) = λ ∈ Rm : Ij (λi ) < z . i∈O Definition 4. Let j ∈ {0, 1} and z ∈ R+ , define an extended ball as [ EBal(j, z, n) , Bal(O, j, z). |O|=m−n From the definition of extended balls, it is clear that h i λ1 . . . λm ∈ EBal(j, z, n) if and only if the following inequality holds: X min Ij (λi ) < z. |O|=m−n Combining with the definition of fz∗s , i∈O we know that at time k, the output of fz∗s is 0 if and only if where Λ− (zs ) is defined as h i λ̄(k) , λ̄1 (k) · · · λ̄m (k) ∈ Λ− (zs ), Λ− (zs ) , EBal(0, zs , n) The output is 1 if λ̄(k) ∈ Λ+ (zs ), where [  B− \ EBal(1, zs , n) . Λ+ (zs ) , Rm \Λ− (zs )   [ = B+ EBal(1, zs , n) \ EBal(0, zs , n) January 22, 2018 DRAFT 33 We first need the following supporting lemma. Lemma 2. Given O1 , O2 ⊂ M , {1, 2, . . . , m} with |O1 T O2 | = p > 0, z ≤ pD(1k0), the optimal value of the following optimization problem is given by pI1 (I0−1 (z/p)): X I1 (xi ) infm x∈R i∈O1 X s.t. (47) I0 (xi ) < z. i∈O2 Proof. Since I1 (·) is nonnegative, I1 (D(1k0)) = 0 and xi can take any value when i ∈ / O2 , one can equivalently rewrite (47) as X infm x∈R I1 (xi ) i∈O1 ∩O2 X s.t. I0 (xi ) < z, i∈O2 xi = D(1k0), i ∈ O1 \ O2 . By the nonnegativity of I0 (·), the above equation is equivalent to X I1 (xi ) inf m ′ x∈R ,0<z ≤z i∈O1 ∩O2 X s.t. I0 (xi ) < z ′ , i∈O1 ∩O2 X (48) I0 (xi ) ≤ z − z ′ , i∈O2 \O1 xi = D(1k0), i ∈ O1 \ O2 . To obtain the solution to the above equation, let us fist focus on the following optimization problem: minm x∈R X I1 (xi ) i∈O s.t. X (49) ′ I0 (xi ) = z , i∈O where O = O1 ∩ O2 . Denotes its optimal value by ψ(z ′ ). In the following, we show that ψ(z ′ ) = pI1 (I0−1 (z ′ /p)). (50) We claim that a solution to (49) is xi = January 22, 2018 ( I0−1 (z ′ /p) if i ∈ O, (51a) whatever if i ∈ / O. (51b) DRAFT 34 With this claim, (50) clearly holds. In the following we show that this claim is correct. Equation (51b) is trivial. We then focus on (51a). Due to the convexity of the functions I0 (·) and I1 (·), one obtains that for any x ∈ Rm , pI0 X xi /p i∈O pI1 X xi /p i∈O ! ≤ ! ≤ X I0 (xi ), i∈O X I1 (xi ) i∈O Therefore, without any performance loss, one may restrict the solution to the set X∗ as follows: X∗ , {x ∈ Rm : x1 = x2 = · · · = xp }. Then it is clear from the monotonicity of I0 and I1 that (51a) holds. This thus proves (50). Notice that ψ(z ′ ) in (50) is decreasing with respect to z ′ . Then the fact that I0 (−D(0k1)) = 0 yields that (48) is equivalent to minm x∈R s.t. X I1 (xi ) i∈O1 ∩O2 X I0 (xi ) = z, i∈O1 ∩O2 xi = −D(0k1), i ∈ O2 \ O1 , xi = D(1k0), i ∈ O1 \ O2 , which concludes Lemma 2 by (50). Lemma 3. Assume that (ze , zs ) are an admissible pair, then the following statements are true: 1) Bal(M, 0, ze ) ⊆ B− . 2) Bal(M, 1, ze ) ⊆ B+ . T 3) EBal(0, zs , n) EBal(1, zs , n) = ∅. T 4) EBal(1, zs , n) Bal(M, 0, ze ) = ∅. T 5) EBal(0, zs , n) Bal(M, 1, ze ) = ∅. Proof. 1): It suffices to prove that given any x ∈ Rm , if x ∈ B+ , then x 6∈ Bal(M, 0, ze). By the convexity of I0 (x), one obtains that X X I0 (xi ) ≥ mI0 (1/m xi ) ≥ mI0 (0) = mC, i∈M January 22, 2018 i∈M DRAFT 35 where the second inequality follows from x ∈ B+ and the fact that I0 (x) is increasing when x ≥ 0. Notice that by its definition, ze ≤ mC holds. The proof is done. 2): This can be proved similarly to 1). 3): By the definition of EBal, we need to prove that for any O1 , O2 with |O1 | = |O2 | = m−n, Bal(O1 , 0, zs ) ∩ Bal(O2 , 1, zs ) = ∅ holds. Notice that when z ≤ pD(1k0), pI1 (I0−1 (z/p)) is increasing with respect to p. Thus by Lemma 2, it suffices to prove that (m−2n)I1 (I0−1 (zs /(m− 2n))) ≥ zs , which is true because 0 ≤ zs ≤ (m−2n)C, pI1 (I0−1 (z/p)) is decreasing with respect to z when z ≤ pD(1k0), and (m − 2n)I1 (I0−1 (0)) = (m − 2n)C. 4): Similar to 3), it suffices to prove that for any O1 with |O1 | = m − n, Bal(O1 , 0, zs ) ∩ Bal(M, 0, ze ) = ∅ holds. By Lemma 2, it suffices to prove that (m−n)I1 (I0−1 (ze /(m−n))) ≥ zs . Then it is equivalent to prove that (m − n)I1 (I0−1 (he (zs )/(m − n))) ≥ zs , which follows from the definition of he (z) and the fact that pI1 (I0−1 (z/p)) is decreasing with respect to z when z ≤ pD(1k0). 5): This can be proved similarly to 4). From Lemma 3, one obtains straightforwardly the following lemma. Lemma 4. Assume that (ze , zs ) are an admissible pair, then the following set inclusions are true: 1) EBal(0, zs , n) ⊆ Λ− (zs ). 2) EBal(1, zs , n) ⊆ Λ+ (zs ). 3) Bal(M, 0, ze ) ⊆ Λ− (zs ). 4) Bal(M, 1, ze ) ⊆ Λ+ (zs ). We are now ready to prove Theorem 4. Proof of Theorem 4. We focus on the proof of S (fz∗s ) ≥ zs , and a similar (and simpler) approach can be used to prove E(fz∗s ) ≥ ze . Notice that EBal(0, zs , n) ⊆ Λ− (zs ) in Lemma 4 gives that, January 22, 2018 DRAFT 36 under any attacks, there holds Bal(M, 0, zs ) ⊆ Λ− (zs ). Therefore, 1 log P0 (fz∗s ,k = 1) k→∞ k 1 ≤ lim sup log Po0 (λ̄(k) ∈ Rm \ Bal(M, 0, zs )) k→∞ k m X ≤− inf I0 (xi ) m lim sup x∈R \Bal(M,0,zs ) i=1 = −zs , (52) where the second inequality holds because of the Cramér’s Theorem and the fact that Rm \ Bal(M, 0, zs ) is closed. Similarly, by EBal(1, zs , n) ⊆ Λ+ (zs ) in Lemma 4, one obtains lim sup k→∞ 1 log P1 (fz∗s ,k = 0) ≤ −zs . k (53) It follows from (52) and (53) that S (fz∗s ) ≥ zs . The proof is thus complete. A PPENDIX D T HE P ROOF OF T HEOREM 5 Define the following two functions h0 (z), h1 (z) : (0, Dmin) 7→ (0, Dmin): h0 (z) = I0 (I1−1 (z)), h1 (z) = I1 (I0−1 (z)). Then we have the following two lemmas on h0 (z) and h1 (z). Lemma 5. Both h0 (z) and h1 (z) are convex. Furthermore, the following equality holds: h0 (C) = h1 (C) = C. (54) Proof. The equation (54) follows directly from (18) and (19). To prove the convexity of h0 (z) and h1 (z), we first need to prove that I0−1 (x) is convex and I1−1 (x) is concave on [0, Dmin ]. Notice that if ψ is the inverse function of φ and φ are twice differentiable, then by chain rule ψ (2) (x) = − φ(2) (ψ(x)) [φ(1) (ψ(x))] 3. Therefore, since I0 (x) (I1 (x)) is strictly convex and strictly decreasing (increasing) on [−D(0k1), D(1k0)], I0−1 (x) (I1−1 (x)) is convex (concave) on [0, Dmin ]. January 22, 2018 DRAFT 37 The convexity of h0 (z) and h1 (z) then follows the fact that the composition of a convex and increasing (decreasing) function with a convex (concave) function is convex [25]. We are now ready to prove Theorem 5 Proof. By chain rule, we know that 1 dh0 (z) (1) |z=C = I0 (x)|x=0 × (1) = −1. dz I1 (x)|x=0 Therefore, by the convexity of h0 (z), we know that h0 (z) ≥ h0 (C) − (z − C) × dh0 (z) |z=C = 2C − z. dz Similarly, one can prove that h1 (z) ≥ 2C − z. Hence, by the definition of h(z), h(z) ≥ 2(m − n)C − z, ∗ which implies that h((m − 2n)C) ≥ mC holds and f(m−2n)C achieves maximum security and efficiency simultaneously. R EFERENCES [1] A. S. Rawat, P. Anand, H. Chen, and P. K. Varshney, “Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networks,” IEEE Transactions on Signal Processing, vol. 59, no. 2, pp. 774–786, 2011. [2] Y. Mo and B. Sinopoli, “Secure estimation in the presence of integrity attacks,” IEEE Transactions on Automatic Control, vol. 60, no. 4, pp. 1145–1151, 2015. [3] A. Teixeira, K. C. Sou, H. Sandberg, and K. H. Johansson, “Secure control systems: A quantitative risk management approach,” IEEE Control Systems, vol. 35, no. 1, pp. 24–45, 2015. [4] C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. [5] S. Marano, V. Matta, and L. Tong, “Distributed detection in the presence of byzantine attacks,” IEEE Transactions on Signal Processing, vol. 57, no. 1, pp. 16–29, 2009. [6] B. Kailkhura, Y. S. Han, S. Brahma, and P. K. Varshney, “Distributed bayesian detection in the presence of byzantine data,” IEEE transactions on signal processing, vol. 63, no. 19, pp. 5250–5263, 2015. [7] ——, “Asymptotic analysis of distributed bayesian detection with byzantine data,” IEEE Signal Processing Letters, vol. 22, no. 5, pp. 608–612, 2015. [8] M. Abdelhakim, L. E. Lightfoot, J. Ren, and T. Li, “Distributed detection in mobile access wireless sensor networks under byzantine attacks,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 950–959, 2014. January 22, 2018 DRAFT 38 [9] E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, “Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 1, pp. 205–215, 2013. [10] E. Soltanmohammadi and M. Naraghi-Pour, “Fast detection of malicious behavior in cooperative spectrum sensing,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 3, pp. 377–386, 2014. [11] Y. Mo, J. P. Hespanha, and B. Sinopoli, “Resilient detection in the presence of integrity attacks,” IEEE Transactions on Signal Processing, vol. 62, no. 1, pp. 31–43, 2014. [12] K. G. Vamvoudakis, J. P. Hespanha, B. Sinopoli, and Y. Mo, “Detection in adversarial environments,” IEEE Transactions on Automatic Control, vol. 59, no. 12, pp. 3209–3223, 2014. [13] A. Abrardo, M. Barni, K. Kallas, and B. Tondi, “A game-theoretic framework for optimum decision fusion in the presence of byzantines,” IEEE Transactions on Information Forensics and Security, vol. 11, no. 6, pp. 1333–1345, 2016. [14] J. Yan, X. Ren, and Y. Mo, “Sequential detection in adversarial environments,” Online; http://yilinmo.github.io/papers/cdc17-1.html. [15] P. J. Huber, Robust statistics. Springer, 2011. [16] ——, “A robust version of the probability ratio test,” The Annals of Mathematical Statistics, vol. 36, no. 6, pp. 1753–1758, 1965. [17] R. Viswanathan and V. Aalo, “On counting rules in distributed detection,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 37, no. 5, pp. 772–775, 1989. [18] A. P. Dempster, N. M. Laird, and D. B. Rubin, “Maximum likelihood from incomplete data via the em algorithm,” Journal of the royal statistical society. Series B (methodological), pp. 1–38, 1977. [19] H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Transactions on Automatic Control, vol. 59, no. 6, pp. 1454–1467, 2014. [20] S. Mishra, Y. Shoukry, N. Karamchandani, S. N. Diggavi, and P. Tabuada, “Secure state estimation against sensor attacks in the presence of noise,” IEEE Transactions on Control of Network Systems, vol. 4, no. 1, pp. 49–59, 2017. [21] G. Fellouris, E. Bayraktar, and L. Lai, “Efficient byzantine sequential change detection,” IEEE Transactions on Information Theory, 2017. [22] A. Dembo and O. Zeitouni, Large deviations techniques and applications. Springer Science & Business Media, 2009, vol. 38. [23] R. Y. Rubinstein and D. P. Kroese, Simulation and the Monte Carlo method. John Wiley & Sons, 2016. [24] S. Key, “Fundamentals of statistical signal processing, volume ii: Detection theory,” 1993. [25] S. Boyd and L. Vandenberghe, Convex optimization. January 22, 2018 Cambridge university press, 2004. DRAFT
7cs.IT
A1 -TYPE SUBGROUPS CONTAINING REGULAR UNIPOTENT ELEMENTS arXiv:1706.05212v1 [math.GR] 16 Jun 2017 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN Abstract. Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 0 and let X = PSL2 (p) be a subgroup of G containing a regular unipotent element x of G. By a theorem of Testerman, x is contained in a connected subgroup of G of type A1 . In this paper we prove that with two exceptions, X itself is contained in such a subgroup (the exceptions arise when (G, p) = (E6 , 13) or (E7 , 19)). This extends earlier work of Seitz and Testerman, who established the containment under some additional conditions on p and the embedding of X in G. We discuss applications of our main result to the study of the subgroup structure of finite groups of Lie type. 1. Introduction Let G be a simple algebraic group of adjoint type over an algebraically closed field K of characteristic p > 0. Let X = PSL2 (q) be a subgroup of G, where q > 4 is a p-power, and let x ∈ X be an element of order p. By the main theorem of [25], x is contained in a closed connected subgroup of G of type A1 , unless G = G2 , p = 3 and x belongs to the conjugacy (3) class of G labelled A1 as in [14]. With a view towards applications to the study of the subgroup structure of finite groups of Lie type, it is desirable to seek natural extensions of this result. In particular, under what conditions can one embed the full subgroup X in an A1 subgroup of G? As a special case of the main theorem of [28], this question has a positive answer when G is classical and X is not contained in a proper parabolic subgroup of G (for G = SLn (K), this is a well-known theorem of Steinberg [31]). One can see that the condition on the embedding of X is necessary by considering indecomposable representations of X which do not arise as restrictions of indecomposable representations of an algebraic A1 . In [28], Seitz and Testerman also provide a positive answer if G is a simple exceptional algebraic group (of type G2 , F4 , E6 , E7 or E8 ) and p is large enough, still under the same assumption that X is not contained in a proper parabolic subgroup of G. More precisely, the approach in [28] requires p > N (G) where N (G2 ) = 19, N (F4 ) = 43, N (E6 ) = 43, N (E7 ) = 67, N (E8 ) = 113. (1) More general results on the embedding of finite quasisimple subgroups in exceptional algebraic groups are established by Liebeck and Seitz in [18]. For instance, if X = PSL2 (q) and q is sufficiently large, then [18, Theorem 1] implies that X is contained in a proper closed positive dimensional subgroup of G. Here “sufficiently large” means that q > t(G).(2, p − 1) with t(G2 ) = 12, t(F4 ) = 68, t(E6 ) = 124, t(E7 ) = 388, t(E8 ) = 1312. (2) It is natural to seek an extension of [28, Theorem 2] by removing the conditions on p and the embedding of X in G when G is of exceptional type and X = PSL2 (q). In [29], Seitz and Testerman study the case where x ∈ X is semiregular in G (that is, CG (x) is a unipotent group). Notice that if x is not semiregular then x ∈ CG (s)0 for some Date: March 27, 2018. 1 2 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN non-trivial semisimple element s ∈ G and one can hope to answer the question in the proper reductive subgroup CG (s)0 ; so the semiregular case, where such a reduction is not possible, is particularly interesting. In this situation, the main result of [29] states that X is contained in a connected subgroup of type A1 if either q > p, or if q = p and PGL2 (q) 6 NG (X). In this paper, we extend the results in [29] by studying the remaining case where X = PSL2 (p) and PGL2 (p) 66 NG (X). In order to do this, we will assume x ∈ X is regular in G, which means that CG (x) is an abelian unipotent group of dimension r, where r is the rank of G (equivalently, x is contained in a unique Borel subgroup of G). It is well known that regular unipotent elements exist in all characteristics and they form a single conjugacy class. Since the order of x is the smallest power of p greater than the height of the highest root of G (see [34, Order Formula 0.4]), our hypothesis implies that p > h, where h is the Coxeter number of G. (Recall that h = dimr G − 1 = ht(α0 ) + 1, where ht(α0 ) is the height of the highest root of G.) In particular, given the aforementioned earlier work in [28], we may assume that h 6 p 6 N (G), (3) where N (G) is given in (1). Our main result is the following (in this paper, an A1 -type subgroup is a closed connected subgroup isomorphic to SL2 (K) or PSL2 (K)). Theorem 1. Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element of G. Then exactly one of the following holds: (i) X is contained in an A1 -type subgroup of G; (ii) G = E6 , p = 13 and X is contained in a D5 -parabolic subgroup of G; (iii) G = E7 , p = 19 and X is contained in an E6 -parabolic subgroup of G. In all three cases, X is uniquely determined up to G-conjugacy. Remark 1. Let us make some comments on the statement of Theorem 1. (a) To see the uniqueness of X in part (i), it suffices to show that every subgroup Y = PSL2 (p) of G containing x is conjugate to X. Write X < A and Y < B, where A and B are A1 -type subgroups of G. By Proposition 2.11(ii), A and B are G-conjugate, say A = B g , so X, Y g < A. Finally, by applying [17, Theorem 5.1] and Lang’s theorem, we deduce that X and Y g are A-conjugate. (b) The interesting examples arising in (ii) and (iii) were found by Craven [9] in his recent study of the maximal subgroups with socle PSL2 (q) in finite exceptional groups of Lie type. The action of such a subgroup X on the adjoint module Lie(G) is described in Theorem 8.1 (see Section 8) and its construction is explained in [9, Section 9]. Let us say a few words on the construction in (ii), where G = E6 and p = 13. Let P = QL be a D5 -parabolic subgroup of G and identify the unipotent radical Q with a 16-dimensional spin module for L0 = D5 . Take a subgroup Y = PSL2 (p) < L0 containing a regular unipotent element of L0 and consider the semidirect product QY < P (note that Y is uniquely determined up to L0 conjugacy). Now one checks that Q|Y has an 11-dimensional composition factor W with dim H 1 (Y, W ) = 1. It follows that there is a complement X = PSL2 (p) to Q in QY that is not QY -conjugate to Y . Moreover, one can show that X contains a regular unipotent element of G and there is a unique P -class of such subgroups X (hence X is uniquely determined up to G-conjugacy). We will show that the subgroup X constructed in this way is not contained in an A1 -type subgroup of G (this follows from Theorem 2 below). A similar construction can be given in (iii) A1 -TYPE SUBGROUPS 3 and again one can show that such a subgroup is both unique up to conjugacy and is not contained in an A1 -type subgroup. (c) The conclusion of Theorem 1 for G = G2 can be deduced from the proof of [29, Lemma 3.1]. It also follows from Kleidman’s classification of the maximal subgroups of G2 (p) in [13]. However, for completeness we will provide an alternative proof, following the same approach we use for the other exceptional groups. (d) Finally, let us comment on the adjoint hypothesis in the statement of the theorem. Let G be a simple exceptional algebraic group and let Gad be the corresponding adjoint group. Suppose Y = PSL2 (p) or SL2 (p) is a subgroup of G containing a regular unipotent element y of G. The regularity of y implies that Z(Y ) 6 Z(G) and thus Y Z(G)/Z(G) = PSL2 (p) is a subgroup of Gad containing a regular unipotent element, so it is determined by Theorem 1. The next result shows that the subgroups X in part (i) of Theorem 1 are G-irreducible in the sense of Serre (that is, X is not contained in a proper parabolic subgroup of G). The proof is given at the end of Section 2. By [35, Theorem 1.2], any connected reductive subgroup of a reductive algebraic group G containing a regular unipotent element is Girreducible, so we can view Theorem 2 as a partial analogue for subgroups isomorphic to PSL2 (p) in simple exceptional groups. Theorem 2. Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 0 and let x ∈ G be a regular unipotent element such that x ∈ X = PSL2 (p) < A < G, where A is an A1 -type subgroup of G. Then X is G-irreducible. Remark 2. As in Theorem 1, let X = PSL2 (p) be a subgroup of G containing a regular unipotent element. By combining Theorems 1 and 2, we deduce that X is contained in an A1 -type subgroup of G if and only if X is not contained in a proper parabolic subgroup of G. In particular, the examples arising in parts (ii) and (iii) of Theorem 1 are genuine exceptions to the containment in (i). The next result follows by combining Theorem 1 with the main results of [28, 29]. Corollary 1. Let G be a simple algebraic group of adjoint type over an algebraically closed field of characteristic p > 0 and let X = PSL2 (q) be a subgroup of G containing a regular unipotent element of G, where q > 4 is a p-power. In addition, if G is classical assume that X is G-irreducible. Then either (a) X is contained in an A1 -type subgroup of G, or (b) q = p and (G, p, X) is one of the cases in parts (ii) and (iii) in Theorem 1. Next we present some further applications of Theorem 1. Let G be a simple algebraic group as in Theorem 1 and recall that a finite subgroup of G is Lie primitive if it is not contained in a proper closed subgroup of positive dimension. In [11, Section 3], Guralnick and Malle determine the maximal Lie primitive subgroups H of G containing a regular unipotent element (the maximal closed positive dimensional subgroups of G containing a regular unipotent element were determined in earlier work of Saxl and Seitz [26]). More precisely, they give a list of possibilities for H, but they do not claim that all cases actually occur. In particular, their proof relies on [28] and thus H = PSL2 (p) arises as a possibility when G ∈ {F4 , E6 , E7 , E8 } and h 6 p 6 N (G). Therefore, by combining [11, Theorems 3.3, 3.4] with Theorem 1, we obtain the following refinement. Corollary 2. Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 0. Suppose H is a maximal Lie primitive subgroup of G containing a regular unipotent element. Let H0 denote the socle of H. 4 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN (i) If G = G2 , then one of the following holds: (a) p = 2 and H = J2 ; (b) p = 7 and H = 23 .SL3 (2), G2 (2) or PSL2 (13); (c) p = 11 and H = J1 . (ii) If G = F4 , then one of the following holds: (a) p = 2 and H0 = PSL3 (16), PSU3 (16) or PSL2 (17); (b) p = 13 and H = 32 .SL3 (3), or H0 = PSL2 (25), PSL2 (27) or 3 D4 (2). (iii) If G = E6 , then one of the following holds: (a) p = 2 and H0 = PSL3 (16), PSU3 (16) or Fi22 ; (b) p = 13 and either H = 33 .SL3 (3) or H0 = 2 F4 (2)0 . (iv) If G = E7 , then p = 19 and H0 = PSU3 (8) or PSL2 (37). (v) If G = E8 , then one of the following holds: (a) p = 2 and H0 = PSL2 (31); (b) p = 7 and H0 = PSp8 (7) or Ω9 (7); (c) p = 31 and H = 25+10 .SL5 (2) or 53 .SL3 (5), or H0 = PSL2 (32), PSL2 (61) or PSL3 (5). Remark 3. By Corollary 2, there are no Lie primitive subgroups containing a regular unipotent element if p > 31. This lower bound is best possible: the case (G, p) = (E8 , 31) with H0 = PSL2 (32) is a genuine example (this can be deduced from recent work of Litterick [22]). However, we are not claiming that all of the possibilities listed in Corollary 2 are Lie primitive and contain regular unipotent elements (indeed, we expect that this list can be reduced further). We can also use Theorem 1 to shed new light on the subgroup structure of finite exceptional groups of Lie type. Let G be a simple exceptional algebraic group of adjoint type over F̄p with p prime and let F : G → G be a Steinberg endomorphism of G with fixed point subgroup GF , an almost simple group over Fq . The maximal subgroups of the Ree groups 2 G2 (q) and 2 F4 (q) (and their automorphism groups) have been determined up to conjugacy by Kleidman [13] and Malle [23], respectively, and similarly G2 (q) is handled in [8] for q even and in [13] for q odd. Therefore, we may assume GF is one of F4 (q), E6 (q), 2 E6 (q), E7 (q) and E8 (q). In these cases, through the work of many authors, the problem of determining the maximal subgroups H of GF has essentially been reduced to the case where H is an almost simple group of Lie type with socle H0 over a field Fq0 of characteristic p (see [24, Section 29.1] and the references therein). Here one of the main problems is to determine if such a subgroup is of the form M F , where M is maximal among positive dimensional F -stable closed subgroups of G. Significant restrictions on the rank of H0 and the size of q0 are established in [16, 18], but the problem of obtaining a complete classification is still open. The special case H0 = PSL2 (q0 ) is of particular interest. If q0 > t(G).(2.p − 1), where t(G) is the integer in (2), then the aforementioned work of Liebeck and Seitz [18] shows that q = q0 and H = M F for some maximal connected subgroup M of G of type A1 . Further results in this direction have recently been obtained by Craven [9] when GF is one of F4 (q), E6 (q), 2 E6 (q) or E7 (q). Using the maximality of H, he proves that H = M F in almost every case, but his approach is unable to eliminate certain values of q0 . In particular, the case where H = PSL2 (h + 1) contains a regular unipotent element of G is problematic (the existence of such subgroups, in a much more general setting, was established by Serre [30], which explains why they are called Serre embeddings in [9]). Using Theorem 1, one can show that all maximal Serre embeddings are of the form (M F )0 (we can also handle A1 -TYPE SUBGROUPS 5 G = E8 , which is excluded in [9]). In particular, it follows that part (ii) in [9, Theorem 1.1] is a subcase of part (iii), and the same conclusion holds for [9, Theorem 1.3]. To conclude the introduction, let us briefly describe the main steps in the proof of Theorem 1 (we refer the reader to Section 2.5 for more details). Suppose x ∈ X = PSL2 (p) < G is a regular unipotent element of G and let A < G be an A1 -type subgroup containing x with maximal torus T = {t(c) | c ∈ K × }. Set V = Lie(G) and F× p = hξi. Without loss of generality, replacing X by a suitable G-conjugate, we show that we may assume that X contains the toral element t(ξ) ∈ T , which corresponds to a diagonalizable element s ∈ SL2 (p) with eigenvalues ξ and ξ −1 (see Lemma 2.19). We can use the known action of A on V to determine the eigenvectors and eigenspaces of s on V and this severely restricts the possibilities for V |X . It is possible to obtain further restrictions on the indecomposable summands of V |X by considering the trace on V of semisimple elements in X of small order (typically, we only need to work with elements of order 2 and 3). In this way, in almost all cases, we are able to reduce to the situation where V |X is compatible with the action of a PSL2 (p) subgroup of A. In this situation, V |X is given in Table 2 (our notation for indecomposable summands in Table 2 is explained in Section 2.1) and we observe that the socle of V |X has a 3-dimensional simple summand W = hw2 , w0 , w−2 i, where wi is an eigenvector for s with eigenvalue ξ i . Let Ei be the ξ i -eigenspace of s on V . Without loss of generality, we may assume that the action of x on W (in terms of this basis) is given by the matrix   1 1 1  0 1 2  0 0 1 and thus w2 ∈ ker(x − 1) ∩ E2 ,  w0 ∈ ker((x − 1)2 ) \ ker(x − 1) ∩ E0 ,  w−2 ∈ ker((x − 1)3 ) \ ker((x − 1)2 ) ∩ E−2 . Our main goal is to show that W is an sl2 -subalgebra of V . To do P this, we may assume that x is obtained by exponentiating the regular nilpotent element γ∈Π(G) eγ ∈ V with respect to a fixed Chevalley basis B = {eα , fα , hγ | α ∈ Φ+ (G), γ ∈ Π(G)} for V (see Section 2.5 for more details). This allows us to explicitly identify a maximal torus T of an A1 -type subgroup of G containing x, which means that we can compute eigenvectors and eigenspaces for s in terms of the Chevalley basis. With the aid of Magma [3] to simplify the computations, we can describe the action of x on V in terms of a dim G× dim G matrix with respect to B and then compute bases for the subspaces ker((x − 1)i ) for i > 1. In this way, we obtain expressions for w2 , w0 and w−2 in terms of B, but with undetermined coefficients. We then derive relations between these coefficients by considering the action of x on W , and further relations can be found by using the fact that CV (x) = ker(x − 1) is an abelian subalgebra. Apart from a handful of special cases, this allows us to reduce to the case where W is an sl2 -subalgebra and we complete the argument by showing that the stabilizer of W in G is an A1 -type subgroup. This process of elimination and extension comprises the bulk of the proof of Theorem 1 (see Sections 3–7). However, there are a handful of possibilities for (G, p) which require further attention; these are the cases arising in part (ii) of Theorem 2.22 and they are handled in Section 8. In each of these cases, the action of X on V is known (up to one of 6 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN three possibilities if (G, p) = (E6 , 13) or (E7 , 19)) and X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i. This allows us to reduce to the case where X is contained in a proper parabolic subgroup P = QL of G. Let π : P → P/Q be the quotient map. Using π, we identify L with P/Q and so we may view π(X) as a subgroup of L0 . We may as well assume that P is a minimal parabolic (with respect to containing X), so π(X) is not contained in a proper parabolic subgroup of L0 . Now π(x) ∈ L0 is a regular unipotent element which is contained in an A1 -type subgroup H of L0 (this follows by combining Theorem 2.22 with the aforementioned earlier work of Seitz and Testerman [28] for classical groups). By inspecting [15], we can determine the action of H on V , which must be compatible with the action of X on V given in Theorem 2.22. In this way we deduce that (G, p, L0 ) = (E6 , 13, D5 ) and (E7 , 19, E6 ) are the only possibilities, and this completes the proof of Theorem 1. Remark 4. We anticipate that some of the new methods introduced in this paper will be applicable more generally. Indeed, in future work we will investigate subgroups of exceptional algebraic groups of the form X = PSL2 (p) containing semiregular unipotent elements, with a view to removing the conditions in [28, Theorem 2]. Notation. Our notation is fairly standard. For a simple algebraic group G we write Φ(G), Φ+ (G) and Π(G) = {α1 , . . . , αr } for the set of roots, positive roots and simple roots of G, with respect to a fixed Borel subgroup, and we follow Bourbaki [4] in labelling the simple roots. We will often denote a root α = a1 α1 + · · · + ar αr by writing α = a1 · · · ar . If V is a module for a group then soc(V ) and rad(V ) denote the socle and radical of V , respectively, and we write V m to denote V ⊕ · · · ⊕ V (with m summands). It will be convenient to write [An1 1 , . . . , Ank k ] for a block-diagonal matrix with a block Ai occurring with multiplicity ni . In addition, we will write Ji for a standard (upper triangular) unipotent Jordan block of size i. Acknowledgments. Testerman was supported by the Fonds National Suisse de la Recherche Scientifique, grant numbers 200021 146223 and 200021 153543. Burness thanks the Section de Mathématiques and the Centre Interfacultaire Bernoulli at EPFL for their generous hospitality. It is a pleasure to thank David Craven and Jacques Thévenaz for many useful discussions. We also thank Bob Guralnick, Gunter Malle and Iulian Simion for helpful comments on an earlier version of this paper. 2. Preliminaries In this section we record some preliminary results that will be needed in the proof of Theorem 1. We start by recalling some well known results from the modular representation theory of the simple groups PSL2 (p). Our main reference is Alperin [1]. 2.1. Representation theory. Let K be an algebraically closed field of characteristic p > 5, let X = PSL2 (p) and let P = hxi ∼ = Zp be a Sylow p-subgroup of X. The subgroup P of X has exactly p indecomposable KP -modules, say W1 , . . . , Wp , where dim Wi = i and Wp is the unique projective indecomposable KP -module. The element x has Jordan form [Ji ] on Wi . In particular, if W is a projective KP -module, then dim W = ap for some a > 1, and x has Jordan form [Jpa ] on W . There are precisely (p + 1)/2 simple KX-modules, labelled V1 , V3 , . . . , Vp in [1], where dim Vi = i. In particular, every simple KX-module is odd-dimensional. Here V1 is the trivial module and Vp is the Steinberg module. It is easy to see that x has Jordan form [Ji ] on Vi . By a theorem of Steinberg, each Vi is the restriction of a simple module for the corresponding algebraic group of type A1 (see [32, Section 13]), so we can refer to the highest weight of Vi with respect to a maximal torus of the algebraic A1 . We identify A1 -TYPE SUBGROUPS 7 the weights of this 1-dimensional torus with the set of integers, and we will often write Vi = LX (i − 1) to highlight the highest weight of Vi . Similarly, there are precisely (p+1)/2 projective indecomposable KX-modules, labelled P1 , P3 , . . . , Pp in [1], where Pp = Vp is simple and the remainder are reducible. Here dim P1 = dim Pp = p and dim Pi = 2p for 1 < i < p. The element x has Jordan form [Jp ] on P1 and Pp , and Jordan form [Jp2 ] on the remaining Pi . The structure of these modules is described by Alperin [1, pp.48–49]. In terms of composition factors, we have P1 = V1 |Vp−2 |V1 and Pi = Vi |(Vp−i+1 ⊕ Vp−i−1 )|Vi where 1 < i < p is odd. (Here this notation indicates that soc(Pi ) ∼ = Pi /rad(Pi ) ∼ = Vi and ∼ rad(Pi )/soc(Pi ) = Vp−i+1 ⊕ Vp−i−1 .) It will be convenient to define U = P1 = LX (0)|LX (p − 3)|LX (0) (4) W (i) = Pi+1 = LX (i)|(LX (p − i − 1) ⊕ LX (p − i − 3))|LX (i) (5) and for i ∈ {2, 4, . . . , p − 3}. The Green correspondence (see [1, Section 11]) implies that if V is an indecomposable KX-module then V |P = W ⊕W 0 where W is projective (or zero) and W 0 is indecomposable (or zero). In particular, the following lemma holds. Lemma 2.1. Let V be an n-dimensional indecomposable KX-module and write n = ap+b, where a > 0 and 0 6 b < p. Then x has Jordan form [Jpa , Jb ] on V . The main result on the structure of indecomposable KX-modules is the following theorem. Here we define a subtuple of an n-tuple [m1 , . . . , mn ] to be a tuple of the form [mi , mi+1 , . . . , mj ] for some 1 6 i 6 j 6 n. We denote this by writing [mi , mi+1 , . . . , mj ] ⊆ [m1 , . . . , mn ]. Theorem 2.2. Let V be a reducible indecomposable non-projective KX-module. Then there exists an integer ` > 2 and a subtuple [a1 , . . . , a` ] ⊆ [1, p − 2, 3, p − 4, . . . , p − 2, 1] such that soc(V ) = Va1 ⊕ Va3 ⊕ · · · ⊕ Va`− , V /soc(V ) = Va2 ⊕ Va4 ⊕ · · · ⊕ Va`−1+ where  = 1 if ` is even, otherwise  = 0. Proof. This follows from the discussion in [12, Section 3]. Also see [9, Proposition 5.14].  Corollary 2.3. Let V be an indecomposable KX-module with precisely two composition factors. If soc(V ) = LX (i) then V /soc(V ) ∈ {LX (p − i − 3), LX (p − i − 1)} for some i ∈ {0, 2, . . . , p − 3}, hence dim V = p ± 1. Corollary 2.4. Let V be a reducible indecomposable KX-module. Then dim V > p − 1. Moreover, if V has at least four composition factors, then dim V > 2(p − 1). There is a very similar description of the indecomposable modules for SL2 (p). Indeed, if we write X = SL2 (p)/Z then each indecomposable KX-module corresponds to an indecomposable module for SL2 (p) with kernel Z = {±I2 }. 8 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN 2.2. Traces. Let x2 and x3 be representatives of the unique conjugacy classes of elements of order 2 and 3 in X, respectively (note that xi is semisimple since p > 5). Let V be a KX-module and let tr(V, xi ) denote the trace of xi on V . Lemma 2.5. If V = LX (i) then tr(V, x2 ) = (−1)i/2 , tr(V, x3 ) =   1 i ≡ 0 (mod 3) −1 i ≡ 1 (mod 3)  0 i ≡ 2 (mod 3) Proof. This is a straightforward calculation, using the fact that we can identify LX (i) with the i-th symmetric power Symi (M ), where M is the natural module for SL2 (K).  If V is a KX-module with composition factors V1 , . . . , Vk , then tr(V, xi ) = k X tr(Vj , xi ) j=1 since the action of xi is diagonalizable. Therefore, the next two results are immediate corollaries of Lemma 2.5 (here we use the notation U and W (i) defined in (4) and (5)). Lemma 2.6. We have   1 p ≡ 1 (mod 4) 1 p ≡ 1 (mod 3) tr(U, x2 ) = , tr(U, x3 ) = 3 p ≡ 3 (mod 4) 2 p ≡ 2 (mod 3) Lemma 2.7. We have  tr(W (i), x2 ) = 2 i ≡ 0 (mod 4) −2 i ≡ 2 (mod 4) and   2 p ≡ 1 (mod 3)     1 p ≡ 2 (mod 3)         −1 p ≡ 1 (mod 3) tr(W (i), x3 ) = −2 p ≡ 2 (mod 3)          −1 p ≡ 1 (mod 3)    1 p ≡ 2 (mod 3) i ≡ 0 (mod 3) i ≡ 1 (mod 3) i ≡ 2 (mod 3) Let G be a simple algebraic group over K of adjoint type, let V be a KG-module and let m be a positive integer. Define Tm (G, V ) = {tr(V, x) | x ∈ G has order m}. Recall that the adjoint module for G is the Lie algebra Lie(G), on which G acts via the adjoint representation. Proposition 2.8. Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 5. Let V = Lie(G) be the adjoint module. Then Tm (G, V ) is recorded in Table 1 for m ∈ {2, 3}. Proof. This follows by inspecting the dimensions of the centralizers of elements of order m in G (see [10, Tables 4.3.1 and 4.7.1]), using the fact that dim CV (g) = dim CG (g) for every semisimple element g ∈ G (see [6, Section 1.14], for example).  A1 -TYPE SUBGROUPS G 9 T2 (G, V ) T3 (G, V ) G2 −2 −1, 5 F4 −4, 20 −2, 7 E6 −2, 14 −3, 3, 6, 15, 30 E7 −7, 5, 25 −2, 7, 34, 52 E8 −8, 24 −4, 5, 14, 77 Table 1. Traces of elements of order 2 and 3 on the adjoint module Remark 2.9. Suppose X = PSL2 (p) is contained in G = E6 , where p > 5 and G is adjoint. Write G = Ĝ/S and X = X̂/S, where Ĝ is the simply connected group of type E6 and S = Z3 is the centre of Ĝ. Now X has Schur multiplier Z2 , which implies that X̂ = Z3 × X. Therefore, every element y ∈ X of order 3 lifts to an element in Ĝ of order 3. In particular, if y ∈ X has order 3 then CG (y)0 = A5 T1 , D4 T2 or A32 (see [10, Table 4.7.1]), whence tr(V, y) ∈ {−3, 6, 15} with respect to V = Lie(G). Remark 2.10. In a few cases it is helpful to know the eigenvalue multiplicities on V of elements in G of order m > 3 for certain values of m; the relevant cases are the following: (G, m) ∈ {(F4 , 7), (E6 , 7), (E7 , 5), (E8 , 19)}. It is straightforward to obtain this information with the aid of Magma [3], using an algorithm of Litterick (see [21, Section 3.3.1] – we thank Dr. Litterick for his assistance with these computations. 2.3. A1 -type subgroups. Let G be a simple algebraic group and recall that p is a good prime for G if p > 2 in types B, C and D, p > 3 for G2 , F4 , E6 and E7 , and p > 5 when G is of type E8 (all primes are good in type A). Proposition 2.11. Let G be a simple algebraic group of adjoint type over an algebraically closed field of good characteristic p > 0. Let x ∈ G be an element of order p. (i) There is an A1 -type subgroup of G containing x. (ii) If x is regular then the subgroup in (i) is unique up to G-conjugacy. Proof. Part (i) follows from the main theorem of [34]. Part (ii), for G exceptional, follows from [15, Theorem 4]. Now assume G is classical and let H be an A1 -type subgroup of G containing x. Let V be the natural module for G. By [35, Theorem 1.2], H is not contained in a proper parabolic subgroup of G. In particular, if G is of type A, B or C then H acts irreducibly and tensor indecomposably (see [35, Proposition 2.3]) on V and the conjugacy statement follows from representation theory. Finally, let us assume G = Dr (with r > 4). We claim that H < L < G, where L = Br−1 is the stabilizer of a non-singular 1-space. The result then follows since H is unique in L up to L-conjugacy, and L itself is unique up to G-conjugacy. To justify the claim, first observe that x has Jordan form [J2r−1 , J1 ] on V , using [26, Lemma 1.2(ii)] and the fact that x has order p, so p 6= 2. In particular, H acts reducibly on V and we complete the argument by applying [20, Lemma 2.2].  Proposition 2.12. Let G be a simple exceptional algebraic group of adjoint type and let x ∈ G be a regular unipotent element such that x ∈ X = PSL2 (p) < A < G, 10 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN where A is an A1 -type subgroup. Then the action of X on the adjoint module V = Lie(G) is given in Table 2. Proof. A precise description of V |A as a tilting module is given in [19, Table 10.1] (for G = E6 we may assume that A < F4 < G so the action of A on V can be deduced from the actions of A on Lie(F4 ) and the minimal module for F4 (see [19, Table 10.2])). Following [19], we write T (l; µ; . . .) for a tilting module having the same composition factors as the direct sum of Weyl modules for A with highest weights l, µ, . . .. In terms of this notation, we get  T (10; 2) G = G2     G = F4  T (22; 14; 10; 2) T (22; 16; 14; 10; 8; 2) G = E6 V |A =   T (34; 26; 22; 18; 14; 10; 2) G = E7    T (58; 46; 38; 34; 26; 22; 14; 2) G = E8 As explained at the start of [19, Section 10], we can express T (l; µ; . . .) as a direct sum of indecomposable tilting modules of the form T (c), where the highest weight c is at most 2p − 2. For example, suppose G = F4 and p = 19, so V |A = T (22; 14; 10; 2) as above. The highest weight is 22, so one summand is T (22), which is a uniserial module of shape 14|22|14 (see [27, Lemma 2.3]). The highest weight not already accounted for is 10, so T (10) = LA (10) is a summand and we deduce that V |A = T (22) ⊕ LA (10) ⊕ LA (2) and thus V |X = T (22)|X ⊕ LX (10) ⊕ LX (2). By [27, Lemma 2.3], T (22)|X is a projective indecomposable KX-module of dimension 2p = 38, so T (22)|X = W (i) for some i. By comparing socles, it follows that i = 14 and thus V |X = W (14) ⊕ LX (10) ⊕ LX (2) as recorded in Table 2. The other cases are entirely similar and we omit the details.  For the remainder of this section, let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field K of characteristic p > 0, and let r and h = h(G) be the rank and Coxeter number of G, respectively. We will assume G contains a regular unipotent element of order p, which means that p > h. (6) We need to recall the construction of A1 -type subgroups of G containing regular unipotent elements, following the treatment in [30, 33, 34]. First we need some new notation. Let LC be a simple Lie algebra over C of type Φ(G). Fix a Chevalley basis B = {eα , fα , hγ | α ∈ Φ+ (G), γ ∈ Π(G)} of LC and write zi = zαi for z ∈ {e, f, h} and Π(G) = {α1 , . . . , αr }. It will be convenient to define fα = e−α for each α ∈ Φ+ (G). Let LZ be the Z-span of B and set LK = LZ ⊗Z K. (By abuse of notation, we also write eα , fα , ei , fi , hi for the elements eα ⊗ 1, fα ⊗ 1, etc., in LK .) Fix a root α ∈ Φ(G). As in the familiar Chevalley construction, we have (ad(eα )j /j!)(LZ ) ⊆ LZ for all j > 0, and this allows us to construct the element exp(ad(xeα )) ∈ GLdim G (Z[x]), where x is an indeterminate. By passing to K, we obtain a 1-dimensional unipotent subgroup Uα = {exp(ad(γeα )) | γ ∈ K} 6 Aut(LK )0 = G (see [6, Proposition 4.4.2]). Note that G = hUα | α ∈ Φ(G)i. A1 -TYPE SUBGROUPS V |X G p G2 p > 11 LX (10) ⊕ LX (2) p=7 F4 11 W (2) p > 23 LX (22) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) p = 19 W (14) ⊕ LX (10) ⊕ LX (2) p = 17 W (10) ⊕ LX (14) ⊕ LX (2) p = 13 W (10) ⊕ W (2) E6 p > 23 LX (22) ⊕ LX (16) ⊕ LX (14) ⊕ LX (10) ⊕ LX (8) ⊕ LX (2) p = 19 W (14) ⊕ LX (16) ⊕ LX (10) ⊕ LX (8) ⊕ LX (2) p = 17 W (10) ⊕ LX (16) ⊕ LX (14) ⊕ LX (8) ⊕ LX (2) p = 13 W (10) ⊕ W (8) ⊕ W (2) E7 p > 37 LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) p = 31 W (26) ⊕ LX (22) ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) p = 29 W (22) ⊕ LX (26) ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) p = 23 W (18) ⊕ W (10) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) p = 19 W (14) ⊕ W (10) ⊕ W (2) ⊕ LX (18) E8 p > 59 LX (58) ⊕ LX (46) ⊕ LX (38) ⊕ LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) p = 53 W (46) ⊕ LX (38) ⊕ LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) p = 47 W (34) ⊕ LX (46) ⊕ LX (38) ⊕ LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) p = 43 W (38) ⊕ W (26) ⊕ LX (34) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) p = 41 W (34) ⊕ W (22) ⊕ LX (38) ⊕ LX (26) ⊕ LX (14) ⊕ LX (2) p = 37 W (34) ⊕ W (26) ⊕ W (14) ⊕ LX (22) ⊕ LX (2) p = 31 W (26) ⊕ W (22) ⊕ W (14) ⊕ W (2) Table 2. The action of X on V = Lie(G) in Proposition 2.12 Given the lower bound on p in (6), we can make a similar construction for more general elements of LZ . To do this, let LZ(p) be the Z(p) -span of B, where Z(p) is the localization of Z at the prime ideal (p) = pZ, so that LK = LZ(p) ⊗Z(p) K. By [34, Proposition 1.5] we have  ad(e)j /j! (LZ(p) ) ⊆ LZ(p) P for all e ∈ α∈Φ+ (G) Zeα and all j > 0. Then as in the Chevalley construction, for any P P non-zero element y in α∈Φ+ (G) Zeα or α∈Φ+ (G) Zfα , we can produce xy (x) = exp(ad(xy)) ∈ GLdim G (Z(p) [x]). In particular, by passing to K, we define Uy = {xy (γ) = exp(ad(γy)) | γ ∈ K} ⊆ Aut(LK )0 = G. (7) We will use this general set-up to construct certain A1 -type subgroups of our group G, following [33, 34]. In order to state the main result (Proposition 2.13 below), recall that an ordered triple of elements (e, h, f ) chosen from LK (or from LZ ) is an sl2 -triple if they satisfy the commutation relations between the standard generators of the Lie algebra sl2 , namely [h, e] = 2e, [h, f ] = −2f, [e, f ] = h. 12 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN We have the following result (in part (iii), we use the notation xy (γ) from (7)). Pr Proposition Pr 2.13. Suppose p > h(G) and (e, h, f ) is an sl2 -triple of LZ , with e = i=1 ei and f ∈ i=1 Zfi . Then the following hold: (i) Ue and Uf are 1-dimensional subgroups of G. (ii) A = hUe , Uf i is an A1 -type subgroup of G. (iii) T = {t(c) | c ∈ K × } is a maximal torus of hUe , Uf i, where t(c) = xe (c)xf (−c−1 )xe (c)xe (−1)xf (1)xe (−1), and the map t : Gm → T is a morphism of algebraic groups. (iv) The action of T on the basis {v̄ = v ⊗ 1 | v ∈ B} of LK is given by t(c) · ēα = cα(h) ēα , t(c) · h̄i = h̄i for all α ∈ Φ(G), 1 6 i 6 r. Moreover, αi (h) = 2 for all 1 6 i 6 r. (v) T normalizes Ue and Uf . (vi) Ue contains a regular unipotent element of G. Proof. This follows by combining [33, Lemmas 1 and 2] and [34, Lemma 1.2].  The following proposition will play an important role in the proof of Theorem 1. Pr Proposition 2.14. Suppose p > h(G) and (e, h, f ) is an sl -triple of L , with e = 2 Z i=1 ei Pr and f ∈ i=1 Zfi . Let W be the 3-dimensional subalgebra of LK generated by {e, f } and let H be the stabilizer of W in G. Then H is an A1 -type subgroup of G. Proof. Let A be the A1 -type subgroup of G constructed in Proposition 2.13(ii). Note that A contains a regular unipotent element and it clearly stabilizes W by construction, so A 6 H. Let M1 be a maximal closed positive dimensional subgroup of G with H 6 M1 . By the main theorem of [35], A is not contained in a proper parabolic subgroup of G, so Borel-Tits [2, Corollary 3.9] (also see Weisfeiler [36]) implies that M1 is reductive. By [26, Theorem A], either M1 is an A1 -type subgroup (and thus A = H = M1 ), or G = E6 and M1 = F4 . In the latter case, H 6= M1 since M1 does not stabilize a 3-dimensional subspace of LK , so let M2 be a maximal closed positive dimensional subgroup of M1 with H 6 M2 . As above, M2 is reductive and by applying [26, Theorem A] once again, we conclude that A = H = M2 .  We would like to be able to use Proposition 2.14 to identify the stabilizers of other sl2 -subalgebras of LK . With this aim in mind, we present Proposition 2.15 below. In order to state this result, we need some additional notation. Suppose we have an sl2 -triple (e, h, f ) as in Proposition 2.13. Let T be the 1-dimensional torus constructed in part (iii) of the proposition. Let α0 ∈ Φ(G) be the highest root and recall thatPh(G) = ht(α0 ) + 1, where ht : Φ(G) → N is the familiar height function (that P is, if α = i ai αi then ht(α) = i ai ). Then {2i | −ht(α0 ) 6 i 6 ht(α0 )} is the set of weights of T on both LZ and LK . For each T -weight m, write (LZ )m for the corresponding T -weight space and similarly for LK . In both the statement and proof of the following result, we use the notation ā = a ⊗ 1 ∈ LK for a ∈ LZ . Pr Proposition 2.15. Suppose p > h(G) and (e, h, f ) is an sl -triple of L , with e = 2 Z i=1 ei P and f ∈ ri=1 Zfi . Suppose y ∈ (LZ )p−1 ∩ CLZ (e) and z ∈ (LZ )p−3 are chosen so that (i) [y, z] = 0 in LZ ; and (ii) (ē, h̄ + γ ȳ, f¯ + γ z̄) is an sl2 -triple in LK for some γ ∈ K. A1 -TYPE SUBGROUPS 13 Then there exists g ∈ CG (ē) such that g · h̄ = h̄ + γ ȳ and g · f¯ = f¯ + γ z̄ in LK . Moreover, the stabilizer in G of the subalgebra W of LK generated by {ē, f¯ + γ z̄} is an A1 -type subgroup. P Proof. First observe that y ∈ α∈Φ+ (G) Zeα since y ∈ (LZ )p−1 , so we can take g = xy (γ) ∈ G as in (7). Note that g ∈ CG (ē) since y ∈ CLZ (e). Now y is an eigenvector for ad(h) (since y is a T -weight vector), so [y, [y, h]] = 0 and thus g · h̄ = h̄ + γ[ȳ, h̄] = h̄ − γ[h̄, ȳ] = h̄ − γ(p − 1)ȳ = h̄ + γ ȳ. The maximum T -weight in LZ is 2ht(α0 ), which is at most 2(p−1) since p > h(G) > ht(α0 ), so ad(y)i (f ) ∈ (LZ )i(p−1)−2 = 0 for all i > 3 and thus 1 g · f¯ = f¯ + γ[ȳ, f¯] + γ 2 [ȳ, [ȳ, f¯]]. 2 In addition, since [y, z] = 0 and z ∈ (LZ )p−3 , we have [h + y, f + z] = −2f + (p − 3)z + [y, f ]. (8) ¯ ¯ The sl2 commutation relations imply that [h̄ + ȳ, f + z̄] = −2(f + z̄), which is equal to −2f¯ − 3z̄ + [ȳ, f¯] by (8). Therefore, [ȳ, f¯] = z̄ and thus [ȳ, [ȳ, f¯]] = 0. We conclude that g · h̄ = h̄ + γ ȳ and g · f¯ = f¯ + γ z̄ in LK , as required. The final statement concerning the stabilizer of W follows immediately from Proposition 2.14.  2.4. Exponentiation. In this section we turn to a different notion of “exponentiation”, following Seitz [27]. As before, let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field K of characteristic p > 0 and let r and h denote the rank and Coxeter number of G. Let U = hUα | α ∈ Φ+ (G)i be the unipotent radical of a fixed Borel subgroup B of G corresponding to our choice of base Π(G) = {α1 , . . . , αr }, where the root subgroup Uα is defined as in (7). As explained in [27, Section 5], we may view Lie(U ) as an algebraic group via the Hausdorff formula. Set V = Lie(G). We start by recalling [27, Proposition 5.3]. Proposition 2.16. Suppose p > h. Then there exists a unique isomorphism of algebraic groups θ : Lie(U ) → U (9) whose tangent map is the identity and which is B-equivariant; that is, θ(b · n) = bθ(n)b−1 for all n ∈ Lie(U ), b ∈ B. Suppose G contains a regular unipotent element x of order p, so p > h and we are in a position to use Proposition 2.16 to study the structure of CG (x). Replacing x by a suitable conjugate, we may assume that x = xe (1) = exp(ad(e)), Pr where e = i=1 ei . As in Proposition 2.13, let A be an A1 -type subgroup of G containing x, and let T = {t(c) | c ∈ K × } be the given maximal torus of A. Without loss of generality, we may assume that T is contained in the Borel subgroup B defined above. From the description of the action of A on V = Lie(G) in the proof of Proposition 2.12, it follows that t(c) acts on the 1-eigenspace CV (x) = Lie(CG (x)) as diag(cd1 , . . . , cdr ), (10) where the di are recorded in Table 3 (we label the di so that they form a decreasing sequence). Proposition 2.17. Let x = xe (1) ∈ G be a regular unipotent element of order p, where P e = ri=1 ei , and let T = {t(c) | c ∈ K × } be the torus constructed in Proposition 2.13. 14 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN G di G2 10, 2 F4 22, 14, 10, 2 E6 22, 16, 14, 10, 8, 2 E7 34, 26, 22, 18, 14, 10, 2 E8 58, 46, 38, 34, 26, 22, 14, 2 Table 3. The integers d1 , . . . , dr in (10) (i) There exist connected 1-dimensional unipotent subgroups Xi = {xi (γ) | γ ∈ K} such that CG (x) = hXi | 1 6 i 6 ri. In particular, each z ∈ CG (x) can be written Qr as a commuting product of the form z = i=1 xi (γi ) for some γi ∈ K. (ii) We have t(c)xi (γ)t(c)−1 = xi (cdi γ) (11) for all c ∈ K × , γ ∈ K, 1 6 i 6 r. Proof. First note that p > h since x has order p. As above, let U = hUα | α ∈ Φ+ (G)i be the unipotent radical of a Borel subgroup B of G and note that x ∈ U and T 6 B. Moreover, we have CG (x) 6 U and thus CV (x) = Lie(CG (x)) ⊆ Lie(U ). Choose vr ∈ Lie(U ) such that θ(vr ) = x, where θ is the map in Proposition 2.16. Extend to a basis {v1 , . . . , vr } of the 1-eigenspace CV (x), where t(c) · vi = cdi vi for each i, and construct the corresponding connected 1-dimensional unipotent subgroups Xi = {xi (γ) = θ(γvi ) | γ ∈ K} 6 G. Recall that CG (x) is abelian, so CV (x) = Lie(CG (x)) is an abelian subalgebra and the proof of [27, Proposition 5.4] implies that each Xi is contained in CG (x). Therefore, H = hXi | 1 6 i 6 ri is a closed connected unipotent subgroup of CG (x). Moreover, vi ∈ Lie(Xi ) for each i, so dim H > r and thus H = CG (x) (note that CG (x) is connected since G is adjoint). Part (i) now follows since CG (x) is abelian. Finally, part (ii) follows from the B-equivariance of θ (see Proposition 2.16).  Proposition 2.18. Let U be the unipotent radical of a Borel subgroup B of G, let W be a proper non-zero subalgebra of Lie(U ) and let H be the stabilizer of W in G. Assume H contains a regular unipotent element of G of order p. Then either (i) H is contained in a proper parabolic subgroup of G; or (ii) H is contained in an A1 -type subgroup of G. Proof. Since p > h, we can consider the isomorphism θ : Lie(U ) → U in (9). Let Z = Z(W ) be the centre of W , which is a non-zero abelian subalgebra of W stabilized by H. We claim that θ(Z) 6 H. To see this, let z ∈ Z, w ∈ W and note that θ(z) and θ(w) commute since [z, w] = 0 in Lie(U ) (see the proof of [27, Proposition 5.4]). The B-equivariance of θ implies that θ(θ(z) · w) = θ(z)θ(w)θ(z)−1 = θ(w), so θ(z) · w = w and the claim follows. Therefore, H is a positive dimensional subgroup of G containing a regular unipotent element. To complete the argument, we proceed as in the proof of Proposition 2.14, using BorelTits [2, Corollary 3.9]. Let us assume H is not contained in a proper parabolic subgroup of G. Then H 6 M1 , where M1 is a maximal closed reductive positive dimensional subgroup A1 -TYPE SUBGROUPS 15 of G. By the main theorem of [26], either M1 is an A1 -type subgroup, or G = E6 and M1 = F4 , so we may assume that we are in the latter situation. Suppose H = M1 . Since V |M1 = Lie(M1 ) ⊕ V26 , where V26 is the minimal module for M1 , it follows that W = V26 is the only possibility. But V26 must contain a non-zero semisimple element (just by comparing the ranks of G and M1 ) and this is a contradiction. Therefore H is a proper subgroup of M1 and thus H 6 M2 for some maximal closed reductive subgroup M2 of M1 . By a further application of [26] we conclude that H is contained in an A1 -type subgroup of G.  2.5. Methods. In this section we discuss the proof of Theorem 1, highlighting the main steps and ideas. Let G be a simple exceptional algebraic group of adjoint type defined over an algebraically closed field K of characteristic p > 0. Let r be the rank of G and let V = Lie(G) be the adjoint module. Suppose x ∈ X = PSL2 (p) < G is a regular unipotent element of G, so p > h where h is the Coxeter number of G. The embedding of X in G corresponds to an abstract homomorphism ϕ : SL2 (p) → G with kernel Z = Z(SL2 (p)) and image X. As before, let LC be a simple Lie algebra over C of type Φ(G) and fix a Chevalley basis B = {eα , fα , hγ | α ∈ Φ+ (G), γ ∈ Π(G)}. (12) Since p > h, we can view B as a basis for V , where eα , fα are in the appropriate root spaces with respect to the Cartan subalgebra spanned by the hγ . It will be convenient to write zi = zαi for z ∈ {e, f, h} and Π(G) = {α1 , . . . , αr }. P Set e = ri=1 ei and let (e, h, f ) be an sl2 -triple as in Proposition 2.13. Let A be the corresponding A1 -type subgroup of G constructed in Proposition 2.13, with maximal torus T = {t(c) | c ∈ K × } and associated morphism t : Gm → T . By replacing X by a suitable G-conjugate, we may assume that x = exp(ad(e)) ∈ A. Let v : Ga → A be a morphism of algebraic groups such that t(c)v(γ)t(c)−1 = v(c2 γ) for all c ∈ K × , γ ∈ K. We may assume v : Ga → im(v) is an isomorphism of algebraic groups. Consider the elements     ξ 0 1 1 u= , s= (13) 0 1 0 ξ −1 in SL2 (p), where F× p = hξi = {1, . . . , p − 1}. Without loss of generality, we may assume that x = ϕ(u) = v(1) so ϕ(sus−1 ) = ϕ(um ) = v(m) with m = ξ 2 . Then t(ξ)xt(ξ)−1 = ϕ(s)xϕ(s)−1 and thus ϕ(s) = t(ξ)z for some z ∈ CG (x). Set s̄ = ϕ(s) ∈ X. Lemma 2.19. There exists a CG (x)-conjugate of X containing x and t(ξ). Proof. As noted above, we have s̄ = t(ξ)z Qr for some z ∈ CG (x). By Proposition 2.17 thereQare scalars γi ∈ K such that z = i=1 xi (γi ). Let us consider a general element y = ri=1 xi (δi ) ∈ CG (x). In view of (11), we get Y Y Y Y ys̄y −1 = xi (δi )t(ξ) xi (γi − δi )t(ξ)−1 t(ξ) = xi (δi ) xi (ξ di (γi − δi ))t(ξ) i i i = Y i xi (δi + ξ di (γi − δi ))t(ξ) i where the di are the integers appearing in Table 3. di Since p > h and F× p = hξi, it is easy to see that there is at most one i such that ξ = 1. If there is no such i then we can set δi = ξ di γi /(ξ di − 1) for all i, so ys̄y −1 = t(ξ) and X y is the desired conjugate of X. Finally, suppose ξ dj = 1 and γj 6= 0 for some j. By defining δi 16 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN as above for all i 6= j, we get ys̄y −1 = t(ξ)xj (γj ) with [t(ξ), xj (γj )] = 1. But this implies that ys̄y −1 is a non-semisimple element, which contradicts the semisimplicity of s̄.  In view of the lemma, we may assume that X contains t(ξ), which corresponds to a diagonalizable element s ∈ SL2 (p) with eigenvalues ξ and ξ −1 . Since t(ξ) ∈ T , we can use the known action of A on V (see the proof of Proposition 2.12) to determine the eigenvectors and eigenspaces of s on V . For example, {ξ d1 , ξ d2 , . . . , ξ dr } (14) is the collection of eigenvalues of s on CV (x), where the di are given in Table 3. We set s̄ = t(ξ) = sZ ∈ X, where Z is the centre of SL2 (p). Note that A contains the Borel subgroup hs̄, xi of X. The proof of Theorem 1 has three main steps, which we now describe. Step 1: Elimination. Our initial aim is to reduce to the situation where the action of X on V is compatible with the decomposition of V as an A-module given in Table 2. In almost all cases, we are able to achieve this goal. To do this, we consider the possible decompositions of V |X as a direct sum of indecomposable KX-modules, using the description of these modules given in Section 2.1, with the aim of eliminating all but one possibility. First we use the fact that the decomposition of V |X has to be compatible with the Jordan form of x on V (this can be read off from the relevant tables in [14]). In addition, it must be compatible with the known eigenvalues of s on V (as noted above, these are just the eigenvalues of t(ξ) on V , which we can compute from the known action of A on V ). Note that if M is an indecomposable summand of V |X then the restriction of M to hsi is completely reducible, so we just need to identify the KX-composition factors of M in order to compute the eigenvalues of s on this summand. Often it is sufficient to compare the eigenvalues of s on CV (x) with the expected eigenvalues in (14), and we can also use our earlier calculations on the traces of elements of order 2 and 3 to obtain further restrictions on V |X (see Section 2.2). With this approach in mind, the following lemma will be useful. Lemma 2.20. Let M be an indecomposable KX-module of the form LX (i), U or W (j), where i ∈ {0, 2, . . . , p − 1} and j ∈ {2, 4, . . . , p − 3}. Then the eigenvalues of s on CM (x) are ξ i , 1 and {ξ j , ξ −j }, respectively. Proof. First recall that x has Jordan form [Ji+1 ], [Jp ] and [Jp2 ] on LX (i), U and W (j), respectively. The fixed point of x on the simple module LX (i) has highest weight i, so the result is clear in this case. Similarly, soc(U ) = LX (0) so s has eigenvalue ξ 0 on CU (x). Finally, suppose M = W (j). The highest weight of soc(M ) = LX (j) is j, so ξ j is one of the eigenvalues of s on CM (x). To determine the second eigenvalue, it is helpful to view W (j) as the restriction to X of the tilting module T (2p − 2 − j) for the ambient algebraic group of type A1 (see [27, Lemma 2.3]). On the latter module, x has a fixed point of weight 2p − 2 − j (the high weight), so the eigenvalue of s is ξ 2p−2−j = ξ −j as required.  Let us illustrate how Step 1 is carried out in the specific case (G, p) = (E8 , 31). 8 ] on V (see [14, Example 2.21. Suppose G = E8 and p = 31, so x has Jordan form [J31 Table 9]). In particular, V |X is projective and thus every indecomposable summand of V |X is also projective. In terms of the notation introduced in Section 2.1, the possibilities A1 -TYPE SUBGROUPS 17 for V |X are as follows  M 1 ⊕ M 2 ⊕ M 3 ⊕ M 4 ⊕ M5 ⊕ M6 ⊕ M7 ⊕ M8      W (a1 ) ⊕ M1 ⊕ M2 ⊕ M3 ⊕ M4 ⊕ M5 ⊕ M6 W (a1 ) ⊕ W (a2 ) ⊕ M1 ⊕ M2 ⊕ M3 ⊕ M4   W (a1 ) ⊕ W (a2 ) ⊕ W (a3 ) ⊕ M1 ⊕ M2    W (a1 ) ⊕ W (a2 ) ⊕ W (a3 ) ⊕ W (a4 ) where Mi ∈ {LX (30), U } and ai ∈ {2, 4, . . . , 28}. If V |X has an Mi summand, then s has an eigenvalue ξ 30 = ξ 0 on CV (x), which contradicts (14), so we must have V |X = W (a1 ) ⊕ W (a2 ) ⊕ W (a3 ) ⊕ W (a4 ). Since ξ 30 = 1 and s has eigenvalues ξ i , ξ −i on CW (i) (x) (see Lemma 2.20), it follows that {ξ a1 , ξ −a1 , ξ a2 , ξ −a2 , ξ a3 , ξ −a3 , ξ a4 , ξ −a4 } = {ξ 28 , ξ 16 , ξ 8 , ξ 4 , ξ 26 , ξ 22 , ξ 14 , ξ 2 } (see Table 3). Up to a re-ordering of summands, this immediately implies that a1 ∈ {2, 28}, a2 ∈ {4, 26}, a3 ∈ {8, 22}, a4 ∈ {14, 16}. Let y ∈ X be an involution. Since tr(W (i), y) = ±2 and tr(V, y) ∈ {−8, 24} (see Lemma 2.7 and Proposition 2.8), it follows that tr(W (ai ), y) = −2 for all i, whence ai ≡ 2 (mod 4) and thus (a1 , a2 , a3 , a4 ) = (2, 26, 22, 14) is the only possibility. We have now reduced to the case where the decomposition of V |X is compatible with V |A (see Table 2). Step 2: Extension. Next observe that if V |X has the decomposition given in Table 2 then the socle of V |X has a simple summand W = LX (2). To complete the argument, we aim to show that W is an sl2 -subalgebra of V and its stabilizer in G is an A1 -type subgroup. We can do this in almost every case; the exceptions are the two special cases appearing in the statement of Theorem 1. Let {w2 , w0 , w−2 } be a basis for W , where wi is an eigenvector for s with eigenvalue ξ i . We may assume that the action of x on W is given by the matrix   1 1 1  0 1 2  (15) 0 0 1 with respect to this basis (that is, x(w0 ) = w0 + w2 , etc.). If we define s̄ = sZ ∈ X as above then hs̄, xi is a Borel subgroup of X and we can consider the opposite Borel subgroup hs̄, x0 i of X, where x0 ∈ X is also a regular unipotent element of order p. With respect to the above basis, we may assume that x0 acts on W via the matrix   1 0 0  2 1 0  (16) 1 1 1 If all these conditions are satisfied, then we will say that {w2 , w0 , w−2 } is a standard basis for W . With the aid of Magma [3] we can construct a dim G × dim G matrix to represent the action of x on V with respect to our Chevalley basis B. Moreover, we can use Proposition 2.13(iv) to compute the eigenvalues and eigenvectors of t(ξ) (and thus s) on V in terms of B. For i ∈ Z, it will be convenient to write Ei for the ξ i -eigenspace of s on V (so wi ∈ Ei for the elements in a standard basis of W ). Next we identify a basis {v1 , . . . , vr } of the 1-eigenspace CV (x) = ker(x − 1) in terms of B, where vi ∈ Edi (see Table 3). Since w2 ∈ CV (x) ∩ E2 we can write r X w2 = ai vi i=1 18 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN for some ai ∈ K, where ai 6= 0 only if ξ di = ξ 2 . Similarly,  w0 ∈ ker((x − 1)2 ) \ ker(x − 1) ∩ E0 ,  w−2 ∈ ker((x − 1)3 ) \ ker((x − 1)2 ) ∩ E−2 . Using Magma it is straightforward to compute bases for the relevant kernels; these computations can be done by hand, but it is much quicker and more efficient to use a machine. Given these bases, say B2 , B0 and B−2 , we can write X X X w2 = av v, w0 = bv v, w−2 = cv v v∈B2 v∈B0 v∈B−2 for av , bv , cv ∈ K and our goal is to determine these scalars. To do this, we can use the specified actions of x and x0 on W to derive relations between the coefficients. Further relations can be determined by exploiting the fact that x and x0 are regular unipotent elements. For example, we observe that x0 · w−2 = w−2 and x0 · [w−2 , w0 ] = [w−2 , w0 + w−2 ] = [w−2 , w0 ], where [ , ] is the Lie bracket on V , so w−2 , [w−2 , w0 ] ∈ CV (x0 ). Since the regularity of x0 implies that CG (x0 ) is abelian, it follows that CV (x0 ) = Lie(CG (x0 )) is an abelian subalgebra of V (for the latter equality, recall that p > h) and thus [w−2 , [w−2 , w0 ]] = 0. (17) Proceeding in this way, our P goal is to reduce toP the case where W = hw2 , w0 , w−2 i is an sl2 -subalgebra, with w2 = ri=1 ei and w−2 ∈ ri=1 Zfi . Moreover, we want to find integers l, µ such that (w2 , lw0 , µw−2 ) is an sl2 -triple over Z (that is, an sl2 -triple of LZ in the notation of Section 2.3). Indeed, if we can do this, then Proposition 2.14 implies that the stabilizer of W in G is an A1 -type subgroup and so we are in the genericP situation described in part (i) of Theorem 1. In a few cases, we are unable to force w−2 ∈ ri=1 Zfi , but by appealing to Proposition 2.15 we can still show that the same conclusion holds. In the remaining cases where W is not an sl2 -subalgebra, or the action of X on V is incompatible with V |A , we will show that X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i. More precisely, we will establish the following result, which reduces the proof of Theorem 1 to the handful of cases appearing in Table 4 (see Remark 1(a) for the conjugacy statement in part (i)). Theorem 2.22 (Reduction Theorem). Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element of G and set V = Lie(G) with Chevalley basis as in (12). Then one of the following holds: (i) X is contained in an A1 -type subgroup of G and X is uniquely determined up to G-conjugacy; (ii) X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i and (G, p, V |X ) is one of the cases in Table 4. We will prove the Reduction Theorem in Sections 3–7, considering each possibility for G in turn. Step 3: Parabolic analysis. The final step in our proof of Theorem 1 concerns the cases arising in Theorem 2.22(ii), given in Table 4. In view of Proposition 2.18, we may assume that X is contained in a proper parabolic subgroup P = QL of G and we proceed by studying the possible embeddings of X in such a subgroup. Take P to be a minimal such parabolic and let π : P → P/Q be the quotient map. By identifying L with P/Q, we may view π(X) as a subgroup of L0 . Now we can show that π(X) < H, where H is an A1 -TYPE SUBGROUPS 19 V |X G p F4 13 W (10) ⊕ W (2) E6 13 W (10) ⊕ W (8) ⊕ W (2) W (10) ⊕ W (4) ⊕ W (2) W (10)2 ⊕ W (4) E7 19 W (8) ⊕ W (4) ⊕ W (2) ⊕ U W (16) ⊕ W (10) ⊕ W (4) ⊕ U W (16) ⊕ W (14) ⊕ W (8) ⊕ U E8 37 W (34) ⊕ W (26) ⊕ W (14) ⊕ LX (22) ⊕ LX (2) Table 4. The exceptional cases (G, p, V |X ) in Theorem 2.22 A1 -type subgroup of L0 containing a regular unipotent element of L0 (namely, π(x)), so we can use [15] to study the composition factors of V |H for each (G, L0 ). In turn, this imposes restrictions on the decomposition of V |X . But the possibilities for V |X are listed in Table 4 and in this way we arrive at the two special cases in the statement of Theorem 1. See Section 8 for the details. (Notice that we adopt a similar approach in the proof of Theorem 2 below.) Example 2.23. To illustrate some of the above ideas, let us explain how we handle the case (G, p) = (E8 , 31). Recall that in Example 2.21 we reduced to the situation where V |X = W (2) ⊕ W (26) ⊕ W (22) ⊕ W (14), which is compatible with the decomposition of V |A . Let W = soc(W (2)) = LX (2) and let {w2 , w0 , w−2 } be a standard basis of W as above. First consider w2 ∈ CV (x). Now CV (x) ∩ E2 is 1-dimensional (indeed, by inspecting Table 3 we see that there is a unique di which is congruent to 2 modulo 30), spanned by the sum of the simple root vectors, so we must have w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 ) for some non-zero scalar a1 ∈ K. Similarly, w0 is contained in the 1-dimensional space ker((x − 1)2 ) ∩ E0 and we take w0 = a2 (h1 + 19h2 + 4h3 + 9h4 + 28h5 + 18h6 + 10h7 + 4h8 ). Finally, w−2 is in the 2-dimensional space ker((x − 1)3 ) ∩ E−2 (note that ξ −2 = ξ 58 since p = 31) and it follows that w−2 = a3 (8f1 + 28f2 + f3 + 10f4 + 7f5 + 20f6 + 18f7 + f8 ) + a4 eα0 where α0 = 2α1 + 3α2 + 4α3 + 6α4 + 5α5 + 4α6 + 3α7 + 2α8 is the highest root. Note that a3 6= 0 since w−2 ∈ ker((x − 1)3 ) \ ker((x − 1)2 ) and eα0 ∈ CV (x). By considering the action of x on W (see (15)) we quickly deduce that a2 = 16a1 and a3 = 4a1 . Finally, one checks that the condition in (17) yields a4 = 0, so setting a1 = 1 we have w2 = e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 w0 = 16(h1 + 19h2 + 4h3 + 9h4 + 28h5 + 18h6 + 10h7 + 4h8 ) w−2 = 4(8f1 + 28f2 + f3 + 10f4 + 7f5 + 20f6 + 18f7 + f8 ) and it is easy to see that w2 , w0 and w−2 satisfy the relations [w2 , w−2 ] = 2w0 , [w2 , w0 ] = w2 , [w0 , w−2 ] = w−2 , (18) 20 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN and thus W = hw2 , w0 , w−2 i is an sl2 -subalgebra. Moreover, if we set 0 w20 = w2 , w00 = −2w0 , w−2 = −w−2 , (19) 0 ) is an sl -triple. Moreover, working mod p, we have then (w20 , w00 , w−2 2 0 w−2 = 92f1 + 136f2 + 182f3 + 270f4 + 220f5 + 168f6 + 114f7 + 58f8 0 ) is an sl -triple over Z (see the proof of [34, Proposition 2.4]). Since and thus (w20 , w00 , w−2 2 X stabilizes W , it is contained in an A1 -type subgroup of G by Proposition 2.14. This completes the proof of Theorem 1 for G = E8 with p = 31. We close this section by giving a proof of Theorem 2. Proof of Theorem 2. Let V = Lie(G) be the adjoint module for G. Seeking a contradiction, suppose X < P , where P = QL is a proper parabolic subgroup of G with unipotent radical Q and Levi factor L. We may as well assume that P is minimal with respect to the containment of X. In particular, if π : P → P/Q is the quotient map and we identify L with P/Q, then π(X) is not contained in a proper parabolic subgroup of L0 . Now π(x) is a regular unipotent element of L0 (see [35, Lemma 2.6]), so by combining Theorem 2.22 with the main theorem of [28], we deduce that π(X) is contained in an A1 -type subgroup H of L0 . The KH-composition factors of V |H can be read off from the information in [15, Tables 1–5] and we can use this to determine the KX-composition factors of V |X . Indeed, each composition factor of V |P is an irreducible KL0 -module (the unipotent radical Q acts trivially on the KP -composition factors of V |P ), so the decompositions of V |X and V |H have to be compatible. But the decomposition of V |X is given in Table 2 and in this way we will reach a contradiction. To see this, first observe that X has at least one trivial composition factor on V , coming from Z(L). By inspecting Table 2, this immediately implies that (G, p) ∈ {(F4 , 13), (E6 , 13), (E8 , 37)}. Suppose (G, p) = (E8 , 37). From Table 2, the KX-composition factors of V |X are as follows: LX (34)2 , LX (26)2 , LX (22)2 , LX (20), LX (14)2 , LX (10), LX (8), LX (2)2 , LX (0). (20) By inspecting [15, Table 5], using the fact that V |X has a unique trivial composition factor, we deduce that L0 = A4 A2 A1 , A4 A3 or A5 A2 . However, in each of these cases we see that V |X has an LX (6) composition factor, which is incompatible with (20). The other two possibilities for (G, p) can be eliminated in a similar fashion. For example, if (G, p) = (E6 , 13) then the composition factors of V |X are LX (10)3 , LX (8)3 , LX (4), LX (2)4 , LX (0). By inspecting [15, Table 3], just considering trivial composition factors, we deduce that L0 = A22 A1 , A4 A1 or D5 , but in each case we find that V |X has two or more LX (4) factors. This is a contradiction.  As mentioned above, the proof of Theorem 2.22 will be given in Sections 3–7, where we carry out Steps 1 and 2 for each group in turn. We handle Step 3 in Section 8, thus completing the proof of Theorem 1. 3. The case G = G2 We begin the proof of Theorem 1 by handling the case G = G2 . As noted in Remark 1(c), the result in this case can be deduced from the proof of [29, Lemma 3.1] (it also follows from Kleidman’s classification of the maximal subgroups of G2 (p) in [13]). A1 -TYPE SUBGROUPS 21 Theorem 3.1. Let G be a simple algebraic group of type G2 over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element x of G. Then X is contained in an A1 -type subgroup of G. Proof. As noted in Section 1, we may assume that 7 6 p 6 19 (see (3)). Let V = Lie(G) be the adjoint module for G and fix a Chevalley basis for V as in (12). We will use the notation introduced in Section 2.5. In particular, hs̄, xi is a Borel subgroup of X, where s̄ = t(ξ) = sZ and {ξ 10 , ξ 2 } (21) i are the eigenvalues of s ∈ SL2 (p) on CV (x), where F× p = hξi. Let Ei be the ξ -eigenspace of s on V and recall from Section 2.3 that we may assume x is obtained by exponentiating the regular nilpotent element e = e1 + e2 ∈ V (that is, we will assume x = exp(ad(e))). According to [14, Table 2], the Jordan form of x on V is as follows:  [J11 , J3 ] p > 11 (22) [J72 ] p=7 We will use the notation U and W (i) for the projective indecomposable KX-modules defined in (4) and (5), respectively. Case 1. V |X is semisimple First assume V |X is semisimple and recall that x has Jordan form [Jm+1 ] on LX (m) (for 0 6 m < p). In view of (22), it follows that ( LX (10) ⊕ LX (2) p > 11 V |X = LX (6)2 p = 7. If p = 7 then the above decomposition implies that ξ 6 is an eigenvalue of s on CV (x), but this is not compatible with (21). Now assume p > 11, so V |X = LX (10) ⊕ LX (2). As in Section 2.5, let {w2 , w0 , w−2 } be a standard basis for the summand W = LX (2), so wi ∈ Ei and the action of x on W is given by the matrix in (15). Our goal is to show that W is an sl2 -subalgebra with P w2 = e and w−2 ∈ 2i=1 Zfi . Furthermore, we seek integers l, µ so that (w2 , lw0 , µw−2 ) is an sl2 -triple over Z, which will allow us to apply Proposition 2.14. For p > 17 we find that each space ker(x − 1) ∩ E2 , ker((x − 1)2 ) ∩ E0 , ker((x − 1)3 ) ∩ E−2 (23) is 1-dimensional, which gives us w2 = a1 (e1 + e2 ), w0 = a2 (h1 + 13h2 ), w−2 = a3 (4f1 + f2 ) for some non-zero scalars ai ∈ K (in the expressions for w0 and w−2 , the specific coefficients of the hi and fi will depend on the characteristic p; the coefficients presented here are for p = 17). If we set a1 = 1 then by considering the action of x on V we deduce that a2 = 14 and a3 = 7. Now w2 , w0 and w−2 satisfy the relations in (18), so we get an sl2 -triple 0 ) as in (19). Here w 0 0 0 0 (w20 , w00 , w−2 −2 = −w−2 = 6f1 + 10f2 and thus (w2 , w0 , w−2 ) is an sl2 -triple over Z (see the proof of [34, Proposition 2.4]). Finally, by applying Proposition 2.14, we conclude that X is contained in an A1 -type subgroup of G. Next assume p = 13. Once again ker(x−1)∩E2 and ker((x−1)2 )∩E0 are 1-dimensional, but now ker((x − 1)3 ) ∩ E−2 is 2-dimensional, spanned by the vectors 11f1 + f2 and e32 (here we use the notation e32 for eγ with γ = 3α1 + 2α2 ). Therefore w2 = a1 (e1 + e2 ), w0 = a2 (h1 + 6h2 ), w−2 = a3 (11f1 + f2 ) + a4 e32 22 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN for some ai ∈ K. By considering the action of x on W we deduce that a2 = 10a1 and a3 = 3a1 . Moreover, (17) implies that a4 = 0 and by arguing as above, setting a1 = 1 and using Proposition 2.14, we deduce that X is contained in an A1 -type subgroup of G. Now suppose p = 11. Here we have w2 = a1 (e1 + e2 ), w0 = a2 (h1 + 9h2 ) + a3 e32 , w−2 = a4 (5f1 + f2 ) + a5 e31 and by considering the action of x on W we deduce that a2 = 8a1 , a4 = a1 and a5 = 2a3 . We may as well set a1 = 1, so w2 = e1 + e2 , w0 = 8(h1 + 9h2 ) + γe32 , w−2 = 5f1 + f2 + 2γe31 for some γ ∈ K. One now checks that the relations in (18) are satisfied (for all γ), so W = hw2 , w0 , w−2 i is an sl2 -subalgebra. Moreover, if we take e = w2 , h = −2(8(h1 + 9h2 )) = 6h1 + 4h2 , f = −(5f1 + f2 ) = 6f1 + 10f2 , then (e, h, f ) is an sl2 -triple over Z and we can apply Proposition 2.15 (with y = e32 and z = e31 ). It follows that the stabilizer of W in G is an A1 -type subgroup. Case 2. rad(V |X ) 6= 0, p > 11 To complete the proof of the theorem we may assume that rad(V |X ) 6= 0. Suppose p > 11 and W is a reducible indecomposable summand of V |X . If p > 13 then dim W > 12 (see Corollary 2.4) and thus Lemma 2.1 implies that x has a Jordan block of size n > 12 on W , but this is incompatible with (22). Now assume p = 11. Here (22) implies that W has at least three composition factors (if there were only two, then x would have Jordan form [J10 ] or [J11 , J1 ] on W , which contradicts (22)). By Lemma 2.1, it follows that x has Jordan form [J11 , Ji ] on W with i ∈ {0, 3}, so dim W ∈ {11, 14}. By considering Theorem 2.2, it is easy to see that i = 0 is the only possibility, so W = U is projective and thus V |X = U ⊕ LX (2). However, this implies that an involution x2 ∈ X has trace 2 on V (see Section 2.2), which is incompatible with Proposition 2.8. This is a contradiction. Case 3. rad(V |X ) 6= 0, p = 7 Finally, let us assume p = 7. Here V |X is projective and thus each indecomposable summand is also projective. Since the eigenvalues of s on CV (x) are {ξ 4 , ξ 2 }, we deduce that V |X = W (2) or W (4). In fact, by considering the trace of x2 , we see that V |X = W (2) is the only option. This is compatible with the decomposition of V with respect to an A1 -type subgroup of G containing a regular unipotent element (see Table 2). Let W be the LX (2) summand in the socle of V |X and let {w2 , w0 , w−2 } be a standard basis. The spaces ker(x − 1) ∩ E2 and ker((x − 1)2 ) ∩ E0 are 1-dimensional, whereas ker((x − 1)3 ) ∩ E−2 is 2-dimensional and we get w2 = a1 (e1 + e2 ), w0 = a2 (h1 + 4h2 ), w−2 = a3 (2f1 + f2 ) + a4 e32 for some ai ∈ K. Set a1 = 1, so w2 = e. By considering the action of x on W we deduce that a2 = a3 = 4. Moreover, (17) implies that a4 = 0 and we deduce that W = hw2 , w0 , w−2 i is an sl2 -subalgebra and the relations in (18) are satisfied. As before, the desired result now follows by applying Proposition 2.14. This completes the proof of Theorem 3.1.  A1 -TYPE SUBGROUPS 23 4. A reduction for G = F4 In this section our goal is to establish Theorem 2.22 when G = F4 . The proof of Theorem 1 in this case will be completed in Section 8. Our main result is the following. Theorem 4.1. Let G be a simple algebraic group of type F4 over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element x of G and set V = Lie(G). Then one of the following holds: (i) X is contained in an A1 -type subgroup of G; (ii) p = 13, V |X = W (10) ⊕ W (2) and X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i. Proof. In view of (3), we may assume that 13 6 p 6 43. We set up the standard notation as before. In particular, {ξ 22 , ξ 14 , ξ 10 , ξ 2 } (24) × are the eigenvalues of s on CV (x), where Fp = hξi, and  [J , J15 , J11 , J3 ] p > 23    23 2 ,J ,J ] [J19 p = 19 11 3 (25) 2 [J , J , J ] p = 17  15 3   17 4 [J13 ] p = 13 is the Jordan form of x on V (see [14, Table 4]). We may assume that x is obtained by exponentiating the regular nilpotent element e = e1 + e2 + e3 + e4 in V , with respect to a Chevalley basis for V as in (12). It will also be useful to note that V |X is self-dual. Case 1. V |X is semisimple If p ∈ {13, 17, 19} then (25) implies that  2   LX (18) ⊕ LX (10) ⊕ LX (2) p = 19 V |X = LX (16)2 ⊕ LX (14) ⊕ LX (2) p = 17   LX (12)4 p = 13 but none of these decompositions are compatible with the eigenvalues of s on CV (x) given in (24). For example, if p = 19 then the given decomposition implies that the relevant eigenvalues are {ξ 0 , ξ 0 , ξ 10 , ξ 2 }, but this contradicts (24). Now assume p > 23, so V |X = LX (22) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2). Let W be the LX (2) summand and let {w2 , w0 , w−2 } be a standard basis for W as in Section 2.5, so wi ∈ Ei (the ξ i -eigenspace of s on V ) and the action of x and x0 on W is given by the matrices in (15) and (16), respectively, where hs̄, x0 i is the opposite Borel subgroup of X. If p > 29 then the spaces in (23) are 1-dimensional and we get w2 = a1 (e1 + e2 + e3 + e4 ) w0 = a2 (h1 + 23h2 + 4h3 + 6h4 ) w−2 = a3 (5f1 + 28f2 + 20f3 + f4 ) for some ai ∈ K (in the expressions for w0 and w−2 , the specific coefficients depend on the characteristic p; the ones given here are for p = 29). If we set a1 = 1 then we can use the action of x on V to deduce that a2 = 18 and a3 = 13. Moreover, the relations in (18) are 0 ) is an sl -triple, where these elements are defined satisfied and it follows that (w20 , w00 , w−2 2 in (19). Now 0 w−2 = −w−2 = −13(5f1 + 28f2 + 20f3 + f4 ) = 22f1 + 42f2 + 30f3 + 16f4 24 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN 0 ) is an sl -triple over Z (see the proof of [34, Proposition working mod p, so (w20 , w00 , w−2 2 2.4]). By applying Proposition 2.14, we conclude that X is contained in an A1 -type subgroup of G. Now suppose p = 23. Here w2 = a1 (e1 + e2 + e3 + e4 ) w0 = a2 (h1 + 4h2 + 16h3 + 7h4 ) + a3 e2342 w−2 = a4 (10f1 + 17f2 + 22f3 + f4 ) + a5 e1342 for some ai ∈ K (we use the notation e2342 for eγ with γ = 2α1 + 3α2 + 4α3 + 2α4 , and similarly for e1342 ). By considering the action of x on W we deduce that a2 = 12a1 , a4 = 7a1 and a5 = 2a3 . Setting a1 = 1 we get w2 = e1 + e2 + e3 + e4 w0 = 12(h1 + 4h2 + 16h3 + 7h4 ) + γe2342 w−2 = 7(10f1 + 17f2 + 22f3 + f4 ) + 2γe1342 for some γ ∈ K, and one can check that the relations in (18) are satisfied. In particular, W is an sl2 -subalgebra of V . Set e = w2 , h = −2(12(h1 + 4h2 + 16h3 + 7h4 )) = 22h1 + 15h2 + 14h3 + 9h4 and f = −(7(10f1 + 17f2 + 22f3 + f4 )) = 22f1 + 19f2 + 7f3 + 16f4 . Then (e, h, f ) is an sl2 -triple over Z and by applying Proposition 2.15 (with y = e2342 and z = e1342 ) we deduce that the stabilizer of W in G is an A1 -type subgroup. Case 2. rad(V |X ) 6= 0, p > 19 For the remainder we may assume that rad(V |X ) 6= 0. First assume p > 19. By arguing as in Case 2 in the proof of Theorem 3.1, it is straightforward to reduce to the case p = 19. For example, suppose p = 23 and W is a reducible indecomposable summand of V |X . The Jordan form of x on V (see (25)) implies that W has at least three composition factors and we can use Lemma 2.1 to see that x has Jordan form [J23 , Ji ] on W with i ∈ {0, 3, 11, 15}, so dim W ∈ {23, 26, 34, 38}. Using Theorem 2.2, we deduce that i = 0 is the only option, so V |X = U ⊕ LX (14) ⊕ LX (10) ⊕ LX (2). But this implies that an involution x2 ∈ X has trace 0 on V , which is incompatible with Proposition 2.8. Now assume p = 19. Suppose W is a reducible non-projective indecomposable summand of V |X . By combining Lemma 2.1 and Theorem 2.2 we deduce that x has Jordan form 2 , J ] or [J 2 , J ] on W , so there is a unique such summand (and the other summand [J19 11 19 3 is simple). However, this is incompatible with the self-duality of V |X . For example, if x 2 , J ] on W , then V | = W ⊕ L (10) and Theorem 2.2 implies that has Jordan form [J19 3 X X soc(W ) = LX (0) ⊕ LX (2) ⊕ LX (4), W/soc(W ) = LX (16) ⊕ LX (14) (up to duality) so V |X is not self-dual. Therefore, we may assume that each indecomposable summand is either simple or projective, so the possibilities for V |X are as follows:    U ⊕ LX (18) ⊕ LX (10) ⊕ LX (2) U 2 ⊕ LX (10) ⊕ LX (2)   W (i) ⊕ LX (10) ⊕ LX (2) A1 -TYPE SUBGROUPS 25 with i ∈ {2, 4, . . . , 16}. As in (24), the eigenvalues of s on CV (x) are {ξ 4 , ξ 14 , ξ 10 , ξ 2 }. Since s has eigenvalues 1 and {ξ i , ξ −i } on CU (x) and CW (i) (x), respectively (see Lemma 2.20), it follows that V |X = W (i) ⊕ LX (10) ⊕ LX (2) with i ∈ {4, 14}. The case i = 4 can be ruled out by considering the trace of x2 , hence i = 14 and V |X is compatible with the containment of X in an A1 -type subgroup of G (see Table 2). We need to show that X is contained in such a subgroup. To do this we can repeat the argument in Case 1 for p > 29 (the details are entirely similar). Case 3. rad(V |X ) 6= 0, p = 17 Now assume p = 17. Suppose W is a reducible non-projective indecomposable summand 2 , J ] or [J , J ], of V |X . It is easy to check that the Jordan form of x on W is either [J17 3 17 15 2 so there is a unique such summand. If x has Jordan form [J17 , J3 ] on W then Theorem 2.2 implies that V |X = W ⊕ LX (14) (up to duality) where soc(W ) = LX (0) ⊕ LX (2) ⊕ LX (4), W/soc(W ) = LX (16) ⊕ LX (14), but this is incompatible with the self-duality of V |X . Similarly, in the other case we have V |X = W ⊕ V1 ⊕ LX (2) and soc(W ) = LX (i) ⊕ LX (i + 2), W/soc(W ) = LX (14 − i) ⊕ LX (12 − i) with i ∈ {0, 2, 4, . . . , 12} and V1 ∈ {LX (16), U }. By self-duality, i = 6 is the only option. But this implies that x2 has trace 0 on V , which contradicts Proposition 2.8. It follows that each indecomposable summand of V |X is either simple or projective. By arguing as above (the case p = 19), using the fact that s has eigenvalues {ξ 6 , ξ 14 , ξ 10 , ξ 2 } on CV (x), we deduce that V |X = W (i) ⊕ LX (14) ⊕ LX (2) with i ∈ {6, 10}. If i = 6 then one can check that an element x3 ∈ X of order 3 has trace 1 on V , so Proposition 2.8 implies that i = 10. Therefore, the action of X is compatible with an A1 -type subgroup of G (see Table 2) and it remains to establish the desired containment. As before, let {w2 , w0 , w−2 } be a standard basis of the LX (2) summand W in the decomposition of V |X . In the usual manner we deduce that w2 = a1 (e1 + e2 + e3 + e4 ) w0 = a2 (h1 + 5h2 + 6h3 + 10h4 ) for some non-zero scalars a1 , a2 ∈ K. We may assume a1 = 1. Now w−2 is contained in ker((x − 1)3 ) ∩ E−2 , which is 2-dimensional, and we get w−2 = a3 (12f1 + 9f2 + 4f3 + f4 ) + a4 (e1231 − e1222 ). Since the action of x on W is given by the matrix in (15) we deduce that a2 = 6 and a3 = 1. Finally, the condition in (17), which is obtained by considering the action of x0 on W , implies that a4 = 0. It is easy to see that the relations in (18) are satisfied and we complete the argument in the usual manner, via Proposition 2.14. Case 4. rad(V |X ) 6= 0, p = 13 Finally, let us assume that p = 13. Here V |X is projective and thus each indecomposable summand is also projective. Since the eigenvalues of s on CV (x) are {ξ 10 , ξ 2 , ξ 10 , ξ 2 }, we quickly deduce that V |X is one of the following: W (2) ⊕ W (10), W (2)2 , W (10)2 . 26 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN Let y = ŷZ ∈ X be an element of order 7, where ŷ ∈ SL2 (13) is SL2 (K)-conjugate to a diagonal matrix diag(ω, ω −1 ) and ω ∈ K is a non-trivial 7-th root of unity. For each decomposition we can compute the eigenvalues of y on V and then compare the results with the list of eigenvalue multiplicities of all elements in G of order 7 (as noted in Remark 2.10, the latter can be computed using Litterick’s algorithm in [21]). For example, if V |X = W (2)2 then y ∈ GL52 (K) is conjugate to the diagonal matrix [I8 , ωI8 , ω 2 I8 , ω 3 I6 , ω 4 I6 , ω 5 I8 , ω 6 I8 ], but one checks that no element in G of order 7 acts on V with these eigenvalues. In this way, we deduce that V |X = W (2) ⊕ W (10) is the only possibility. Let W be the LX (2) summand in the socle of V |X and let {w2 , w0 , w−2 } be a standard basis. The spaces ker(x − 1) ∩ E2 and ker((x − 1)2 ) ∩ E0 are 2-dimensional and we get w2 = a1 (e1 + e2 + e3 + e4 ) + a2 (e1231 − e1222 ) w0 = a3 (h1 + 9h2 + 12h3 + 9h4 ) + a4 (e1221 + 10e1122 ) for some ai ∈ K. Finally, one checks that ker((x − 1)3 ) ∩ E−2 is 4-dimensional and we take w−2 = a5 (3f1 + f2 + 10f3 + f4 ) + a6 (e1220 + 3e0122 ) + a7 (e1121 + 8e0122 ) + a8 e2342 . In the usual manner, by considering the action of x on W , we get a3 = 2a1 , a4 = a2 , a5 = 10a1 and a7 = 2a2 + a6 . In addition, the condition in (17) yields the following system of equations: a21 a2 + 8a21 a6 = 0 7a21 a2 + 11a21 a6 = 0 11a21 a2 + 5a21 a6 = 0 4a21 a8 + 8a1 a22 + 7a1 a2 a6 = 0 If a1 6= 0 then these equations imply that a2 = a6 = a8 = 0, so w2 = a1 (e1 + e2 + e3 + e4 ) w0 = −a1 (h1 + 9h2 + 12h3 + 9h4 ) w−2 = 10a1 (3f1 + f2 + 10f3 + f4 ) and by setting a1 = 1 we can use Proposition 2.14 to show that X is contained in an A1 -type subgroup. On the other hand, if a1 = 0 then we can set a2 = 1, so w2 = e1231 − e1222 w0 = e1221 + 10e1122 w−2 = a6 (e1220 + 3e0122 ) + (2 + a6 )(e1121 + 8e0122 ) + a8 e2342 One checks that [w2 , w0 ] = 0, so 0 = x0 · [w2 , w0 ] = [w2 + 2w0 + w−2 , w0 + w−2 ] and we deduce that a6 = 7, hence w−2 = 7e1220 + 9e1121 + 2e0122 + a8 e2342 . It is now easy to check that W ⊆ heα | α ∈ Φ+ (G)i is a subalgebra, which gives case (ii) in the statement of the theorem. This completes the proof of Theorem 4.1.  A1 -TYPE SUBGROUPS 27 5. A reduction for G = E6 The following result, which we prove in this section, establishes Theorem 2.22 for groups of type E6 . Theorem 5.1. Let G be a simple adjoint algebraic group of type E6 over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element x of G and set V = Lie(G). Then one of the following holds: (i) X is contained in an A1 -type subgroup of G; (ii) p = 13, V |X is one of W (10) ⊕ W (8) ⊕ W (2), W (10) ⊕ W (4) ⊕ W (2), W (10)2 ⊕ W (4) and X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i. Proof. Here 13 6 p 6 43, V |X is self-dual and {ξ 22 , ξ 16 , ξ 14 , ξ 10 , ξ 8 , ξ 2 } (26) F× p are the eigenvalues of s on CV (x), where = hξi (see Section 2.5). By inspecting [14, Table 6], we see that  [J , J17 , J15 , J11 , J9 , J3 ] p > 23    23 2 ,J ,J ,J ,J ] [J19 p = 19 17 11 9 3 (27) 3 , J , J , J ] p = 17 [J  15 9 3   17 6 ] [J13 p = 13 is the Jordan form of x on V . We freely adopt the notation introduced in Section 2. Case 1. V |X is semisimple If p ∈ {13, 17, 19} then   LX (18)2 ⊕ LX (16) ⊕ LX (10) ⊕ LX (8) ⊕ LX (2) p = 19 LX (16)3 ⊕ LX (14) ⊕ LX (8) ⊕ LX (2) p = 17 V |X =  LX (12)6 p = 13 but not one of these decompositions is compatible with eigenvalues of s on CV (x) (see (26)) so we may assume p > 23 and VX = LX (22) ⊕ LX (16) ⊕ LX (14) ⊕ LX (10) ⊕ LX (8) ⊕ LX (2). Let W be the LX (2) summand and let {w2 , w0 , w−2 } be a standard basis for W . If p > 29 then one checks that each of the spaces in (23) are 1-dimensional and the result quickly follows via Proposition 2.14. For example, if p = 29 then w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 ) w0 = a2 (h1 + 5h2 + 20h3 + 28h4 + 20h5 + h6 ) w−2 = a3 (f1 + 5f2 + 20f3 + 28f4 + 20f5 + f6 ) and by setting a1 = 1 and considering the action of x on W (see (15)), we deduce that a2 = 21 and a3 = 13. One now checks that (w2 , −2w0 , −w−2 ) is an sl2 -triple over Z (see the proof of [34, Proposition 2.4]) and by applying Proposition 2.14 we deduce that X is contained in an A1 -type subgroup of G. Now assume p = 23. Here ker((x − 1)2 ) ∩ E0 and ker((x − 1)3 ) ∩ E−2 are 2-dimensional and we get w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 ) w0 = a2 (h1 + 10h2 + 22h3 + 17h4 + 22h5 + h6 ) + a3 e122321 w−2 = a4 (f1 + 10f2 + 22f3 + 17f4 + 22f5 + f6 ) + a5 e112321 28 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN where a1 a2 a4 6= 0. Set a1 = 1. From the action of x on W we deduce that a2 = 15, a4 = 7 and a5 = 2a3 , so w2 = e1 + e2 + e3 + e4 + e5 + e6 w0 = 15(h1 + 10h2 + 22h3 + 17h4 + 22h5 + h6 ) + γe122321 w−2 = 7(f1 + 10f2 + 22f3 + 17f4 + 22f5 + f6 ) + 2γe112321 for some γ ∈ K. If we take e = w2 , h = −2(15(h1 + 10h2 + 22h3 + 17h4 + 22h5 + h6 )) and f = −7(f1 + 10f2 + 22f3 + 17f4 + 22f5 + f6 ) = 16f1 + 22f2 + 7f3 + 19f4 + 7f5 + 16f6 then (e, h, f ) is an sl2 -triple over Z and using Proposition 2.15 we conclude that X is contained in an A1 -type subgroup of G. Case 2. rad(V |X ) 6= 0, p > 19 If p > 23 then we can essentially repeat the argument in the proof of Theorem 4.1 (see the first paragraph in Case 2). Indeed, it is easy to reduce to the case where p = 23 and V |X = U ⊕ LX (16) ⊕ LX (14) ⊕ LX (10) ⊕ LX (8) ⊕ LX (2), but this is not compatible with (26). Now assume p = 19. Suppose V |X has a reducible non-projective indecomposable summand W . By applying Lemma 2.1 and Theorem 2.2, we deduce that the Jordan form of x on W is one of the following: 2 2 2 [J19 , J11 ], [J19 , J9 ], [J19 , J3 ], [J19 , J17 ]. In particular, V |X has a unique such summand. The structure of W is described in Theorem 2.2 and it is easy to see that the existence of such a summand contradicts the 2 , J ] on W . Then up to self-duality of V |X . For instance, suppose x has Jordan form [J19 9 duality we have soc(W ) = LX (6) ⊕ LX (8) ⊕ LX (10), W/soc(W ) = LX (10) ⊕ LX (8) and thus V |X = W ⊕ LX (16) ⊕ LX (10) ⊕ LX (2) is not self-dual. The other cases are very similar. Therefore, we may assume that each indecomposable summand of V |X is either simple or projective. By considering the eigenvalues of s in (26), we deduce that V |X = W (i) ⊕ LX (16) ⊕ LX (10) ⊕ LX (8) ⊕ LX (2) with i ∈ {4, 14}. If i = 4 then we find that x2 has trace 2 on V , which contradicts Proposition 2.8, hence i = 14 is the only possibility. In the usual manner, we now construct a basis w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 ) w0 = a2 (h1 + 18h2 + 9h3 + 5h4 + 9h5 + h6 ) w−2 = a3 (f1 + 18f2 + 9f3 + 5f4 + 9f5 + f6 ) + a4 (e112211 − e111221 ) (with a1 a2 a3 6= 0) of the summand W = LX (2) of V |X . If we set a1 = 1 and consider the action of x on W (see (15)) we deduce that a2 = 11 and a3 = 3, and one checks that the condition in (17) gives a4 = 0. The result now follows in the usual manner via Proposition 2.14. Case 4. rad(V |X ) 6= 0, p = 17 A1 -TYPE SUBGROUPS 29 First assume that V |X has a reducible indecomposable non-projective summand W . In the usual way, by combining Lemma 2.1 and Theorem 2.2, we deduce that the Jordan form of x on W is one of the following: 3 2 2 [J17 , J3 ], [J17 , J9 ], [J17 , J3 ], [J17 , J15 ]. 3 , J ] on W , so V | = W ⊕ L (14) ⊕ L (8). By Suppose that x has Jordan form [J17 3 X X X applying Theorem 2.2, using the self-duality of V |X , we deduce that soc(W ) = W/soc(W ) = LX (10) ⊕ LX (8) ⊕ LX (6) is the only possibility, but this is incompatible with the eigenvalues of s on CV (x). We can 2 , J ] and [J 2 , J ] by the self-duality of V | , so let us assume x has Jordan rule out [J17 9 X 17 3 form [J17 , J15 ] on W . By self-duality it follows that soc(W ) = W/soc(W ) = LX (8) ⊕ LX (6) and thus V |X is one of the following: ( W ⊕ M1 ⊕ M2 ⊕ LX (8) ⊕ LX (2) W ⊕ W (i) ⊕ LX (8) ⊕ LX (2) where Mj ∈ {LX (16), U } and i ∈ {2, 4, . . . , 14}. However, it is clear that none of these decompositions are compatible with (26). For the remainder, we may assume that each indecomposable summand of V |X is either simple or projective. By considering the eigenvalues of s, we deduce that V |X = W (i) ⊕ M1 ⊕ LX (14) ⊕ LX (8) ⊕ LX (2) with i ∈ {6, 10} and M1 ∈ {LX (16), U }. By computing the trace of x3 and appealing to Proposition 2.8 (and also Remark 2.9), it follows that i = 10 and M1 = LX (16) is the only possibility. In particular, we have now reduced to the case where the decomposition of V |X is compatible with containment in an A1 -type subgroup of G (see Table 2). As before, let W be the LX (2) summand of V |X and let {w2 , w0 , w−2 } be a standard basis of W . The reader can check that w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 ) w0 = a2 (h1 + 12h2 + 4h3 + 9h4 + 4h5 + h6 ) + a3 (e112211 − e111221 ) w−2 = a4 (f1 + 12f2 + 4f3 + 9f4 + 4f5 + f6 ) + a5 (e112210 + e011221 ) + a6 (e111211 + 15e011221 ) with a1 a2 a4 6= 0. Set a1 = 1. By considering the action of x on W we deduce that a2 = 9, a4 = 1 and a6 = 2a3 + a5 . The condition in (17) yields a5 = 15a3 , so a6 = 0 and thus w2 = e1 + e2 + e3 + e4 + e5 + e6 w0 = 9(h1 + 12h2 + 4h3 + 9h4 + 4h5 + h6 ) + γ(e112211 − e111221 ) w−2 = f1 + 12f2 + 4f3 + 9f4 + 4f5 + f6 + 15γ(e112210 + e011221 ) for some γ ∈ K. In addition, the relations in (18) are satisfied and W is an sl2 -subalgebra of V . Set e = w2 , h = −2(9(h1 + 12h2 + 4h3 + 9h4 + 4h5 + h6 )) and f = −(f1 + 12f2 + 4f3 + 9f4 + 4f5 + f6 ) = 16f1 + 5f2 + 13f3 + 8f4 + 13f5 + 16f6 . Then (e, h, f ) is an sl2 -triple over Z and by applying Proposition 2.15 (with y = e112211 − e111221 and z = −(e112210 + e011221 )) we conclude that X is contained in an A1 -type subgroup of G. 30 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN Case 5. rad(V |X ) 6= 0, p = 13 Here (27) implies that V |X is projective, so each indecomposable summand is also projective. In view of (26), we must have V |X = W (i) ⊕ W (j) ⊕ W (k) with i, j ∈ {2, 10} and k ∈ {4, 8}. In each case, the traces of x2 and x3 are −2 and −3, respectively, so we need to work harder to eliminate some of these decompositions. Let y = ŷZ ∈ X be an element of order 7, where ŷ ∈ SL2 (13) is SL2 (K)-conjugate to a diagonal matrix diag(ω, ω −1 ) and ω ∈ K is a non-trivial 7-th root of unity. We can compute the eigenvalues of y on V and then compare with the eigenvalue multiplicities of all elements in G of order 7, which we obtain using the algorithm in [21]. In this way, we deduce that V |X is one of the following: W (10) ⊕ W (8) ⊕ W (2), W (10) ⊕ W (4) ⊕ W (2), W (10)2 ⊕ W (4). Case 5(a). p = 13, V |X = W (10) ⊕ W (8) ⊕ W (2) Here V |X is compatible with the containment of X in an A1 -type subgroup of G (see Table 2). Let W be the LX (2) summand in the socle of V |X and let {w2 , w0 , w−2 } be a standard basis. In the usual manner, we deduce that w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 ) + a2 (e112210 + e111211 − e011221 ) w0 = a3 (h1 + 3h2 + 10h3 + h4 + 10h5 + h6 ) + a4 (e111210 + 3e111111 − e011211 ) w−2 = a5 (f1 + 3f2 + 10f3 + f4 + 10f5 + f6 ) + a6 (e111110 + 7e011210 − e011111 ) + a7 (e101111 + 9e011210 ) + a8 (e122321 ) for some scalars ai ∈ K. By considering the action of x on W , together with the condition in (17), we see that a3 = 5a1 , a4 = a2 , a5 = 10a1 , a7 = 6a2 + 2a6 and either a1 = 0 or a2 = a6 = a8 = 0. In the latter situation, we set a1 = 1 and then check that the relations in (18) are satisfied – this allows us to apply Proposition 2.14 to conclude that X is contained in an A1 -type subgroup of G. Now assume a1 = 0 and set a2 = 1. Here one checks that [w−2 , w2 ] = 0, so [w−2 , w2 +2w0 +w−2 ] = 0 since x0 preserves the Lie bracket on V . This yields a6 = 9, so w2 = e112210 + e111211 − e011221 w0 = e111210 + 3e111111 − e011211 (28) w−2 = 9e111110 + 11e101111 + 6e011210 + 4e011111 + a8 (e122321 ) We conclude that W is an X-invariant subalgebra of heα | α ∈ Φ+ (G)i, as in part (ii) in the statement of the theorem. Case 5(b). p = 13, V |X = W (10) ⊕ W (4) ⊕ W (2) or W (10)2 ⊕ W (4) Let W be the LX (4) summand in the socle of V |X and let {w4 , w2 , w0 , w−2 , w−4 } be a basis of W with wi ∈ Ei . We may assume that the actions of x and x0 on W are given by the matrices     1 1 1 1 1 1 0 0 0 0      0 1 2 3 4   4 1 0 0 0       0 0 1 3 6  and  6 3 1 0 0  (29)          0 0 0 1 4   4 3 2 1 0  0 0 0 0 1 1 1 1 1 1 A1 -TYPE SUBGROUPS 31 respectively (in terms of this basis). One checks that ker(x − 1) ∩ E4 is 1-dimensional, whereas the following spaces ker((x − 1)2 ) ∩ E2 , ker((x − 1)3 ) ∩ E0 , ker((x − 1)4 ) ∩ E−2 , ker((x − 1)5 ) ∩ E−4 have dimension 3, 3, 5 and 6, respectively, and we get w4 = a1 (e112211 − e111221 ) w2 = a2 (e112210 + e011221 ) + a3 (e111211 + 11e011221 ) + a4 (e1 + e2 + e3 + e4 + e5 + e6 ) w0 = a5 (e111210 + e011211 ) + a6 (e111111 + 8e011211 ) + a7 (h1 + 3h2 + 10h3 + h4 + 10h5 + h6 ) w−2 = a8 (e111110 + e011111 ) + a9 (e101111 + 10e011111 ) + a10 (e011210 + 9e011111 ) + a11 (f1 + 3f2 + 10f3 + f4 + 10f5 + f6 ) + a12 (e122321 ) w−4 = a13 (e111100 + 3e001111 ) + a14 (e101110 + e001111 ) + a15 (e011110 + 6e001111 ) + a16 (e010111 + 3e001111 ) + a17 (12f101000 + 10f010100 + 2f001100 + 11f000110 + f000011 ) + a18 (e112321 ) for some ai ∈ K. Set a1 = 1 and consider the relations among the ai obtained from the action of x on this basis. It is also helpful to note that x0 is a regular unipotent element, so CV (x0 ) is abelian and thus [w−4 , [w−4 , w−2 ]] = 0. In this way, we deduce that w4 = e112211 − e111221 w2 = a2 (e112210 + e011221 ) + (1 + a2 )(e111211 + 11e011221 ) w0 = 2a2 (e111210 + e011211 ) + (6 + 6a2 )(e111111 + 8e011211 ) w−2 = a8 (e111110 + e011111 ) + (4 + 5a2 + 2a8 )(e101111 + 10e011111 ) + (6a2 + 12a8 )(e011210 + 9e011111 ) + a12 (e122321 ) w−4 = a13 (e111100 + 3e001111 ) + (2a2 + 8a8 + a13 )(e101110 + e001111 ) + (11a2 + 9a8 )(e011110 + 6e001111 ) + (1 + 2a2 + 2a8 + 12a13 )(e010111 + 3e001111 ) + 4a12 (e112321 ) Next one checks that [w2 , w−2 ] = 0, so x0 · [w2 , w−2 ] = 0 and thus [w2 + 3w0 + 3w−2 + w−4 , w−2 + w−4 ] = 0 since x0 preserves the Lie bracket. This yields a13 = 12a2 + 2a22 + 12a2 a8 . Similarly, [w4 , w2 ] = 0 and thus [w4 + 4w2 + 6w0 + 4w−2 + w−4 , w2 + 3w0 + 3w−2 + w−4 ] = 0. This relation implies that a22 + 12a2 a8 + 9a2 + 12a8 = 0 and it is now straightforward to check that W ⊆ heα | α ∈ Φ+ (G)i is a subalgebra. This completes the proof of Theorem 5.1.  6. A reduction for G = E7 In this section we establish the following result, which proves Theorem 2.22 for groups of type E7 . Theorem 6.1. Let G be a simple adjoint algebraic group of type E7 over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element x of G and set V = Lie(G). Then one of the following holds: (i) X is contained in an A1 -type subgroup of G; 32 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN (ii) p = 19, V |X is one of W (8) ⊕ W (4) ⊕ W (2) ⊕ U, W (16) ⊕ W (10) ⊕ W (4) ⊕ U, W (16) ⊕ W (14) ⊕ W (8) ⊕ U and X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i. Proof. Recall that we may assume 19 6 p 6 67 (see (3)) and {ξ 34 , ξ 26 , ξ 22 , ξ 18 , ξ 14 , ξ 10 , ξ 2 } (30) F× p is the collection of eigenvalues of s on CV (x), where = hξi. By [14, Table 8], the Jordan form of x on V is as follows:  [J , J27 , J23 , J19 , J15 , J11 , J3 ] p > 37    35 2 ,J ,J ,J ,J ,J ]  p = 31  [J31 23 19 15 11 3 2 ,J ,J ,J ,J ,J ] [J29 p = 29 (31) 27 19 15 11 3  5  [J , J15 , J3 ] p = 23    23 7 ] [J19 p = 19 Note that V |X is self-dual. Case 1. V |X is semisimple If p < 37 then the eigenvalues of s on CV (x) are incompatible with (30), so we may assume p > 37 and thus V |X = LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) in view of (31). Let W be the LX (2) summand and let {w2 , w0 , w−2 } be a standard basis for W . In the usual manner, it is straightforward to show that W is an appropriate sl2 subalgebra and we can use Proposition 2.14 to show that (i) holds in the statement of the theorem. For example, if p = 37 we get w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 ) w0 = a2 (h1 + 33h2 + 15h3 + 5h4 + 12h5 + 32h6 + 28h7 ) w−2 = a3 (4f1 + 21f2 + 23f3 + 20f4 + 11f5 + 17f6 + f7 ) + a4 e2234321 If we set a1 = 1, then by considering the action of x on W , we deduce that a2 = 20 and a3 = 10. Furthermore, the relation in (17) implies that a4 = 0 and we deduce that (w2 , −2w0 , −w−2 ) is an sl2 -triple over Z (see the proof of [34, Proposition 2.4]). Now apply Proposition 2.14. Case 2. rad(V |X ) 6= 0, p > 29 If p > 37 then a combination of Lemma 2.1 and Corollary 2.4 implies that x has a Jordan block of size n > 36 on V , but this contradicts (31). Next assume p = 31. In the usual way, by applying Lemma 2.1 and Theorem 2.2, and by appealing to the self-duality of V |X , we can reduce to the case where each indecomposable summand of V |X is either simple or projective. By considering the eigenvalues in (30), it follows that V |X = W (i) ⊕ LX (22) ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) with i ∈ {4, 26}. If i = 4 then an involution x2 ∈ X has trace −3 on V , which contradicts Proposition 2.8. Therefore i = 26 and it is entirely straightforward to show that the LX (2) summand of V |X is an appropriate sl2 -subalgebra. The result follows via Proposition 2.14 in the usual fashion. A1 -TYPE SUBGROUPS 33 A similar argument applies when p = 29. If V |X has a reducible non-projective summand then the self-duality of V |X implies that V |X = M1 ⊕ M2 ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) is the only possibility, where soc(M1 ) ∼ = M1 /soc(M1 ) = LX (12) ⊕ LX (14) and M2 ∈ {LX (28), U }. However, this implies that x2 has trace −3 on V , which is a contradiction. Therefore, the indecomposable summands of V |X are simple or projective, and by considering the eigenvalues in (30) we deduce that V |X = W (i) ⊕ LX (26) ⊕ LX (18) ⊕ LX (14) ⊕ LX (10) ⊕ LX (2) with i ∈ {6, 22}. We can rule out i = 6 by computing the trace of x3 , so i = 22 and we complete the argument as in the previous case. Case 3. rad(V |X ) 6= 0, p = 23 As before, it is not difficult to reduce to the case where each indecomposable summand of V |X is either simple or projective. By considering the eigenvalues in (30) we deduce that V |X = W (i) ⊕ W (j) ⊕ M1 ⊕ LX (14) ⊕ LX (2) where i ∈ {4, 18}, j ∈ {10, 12} and M1 ∈ {LX (22), U }. By computing the trace of x2 we see that (i, j) = (4, 12) or (18, 10), and we can rule out the first possibility by considering the trace of x3 . This calculation with x3 also implies that M1 = LX (22), so V |X = W (18) ⊕ W (10) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2). Let W be the LX (2) summand and fix a standard basis {w2 , w0 , w−2 }. By considering the spaces ker(x − 1) ∩ E2 , ker((x − 1)2 ) ∩ E0 , ker((x − 1)3 ) ∩ E−2 we deduce that w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 ) w0 = a2 (h1 + 17h2 + 6h3 + 15h4 + 11h5 + 11h6 + 15h7 ) + a3 (e1223210 + e1123211 − e1122221 ) w−2 = a4 (20f1 + 18f2 + 5f3 + f4 + 13f5 + 13f6 + f7 ) + a5 (e1123210 + 2e1122211 + 20e1112221 ) Setting a1 = 1 and using the action of x on W , we deduce that a2 = 6, a4 = 19 and a5 = 2a3 , so we have w2 = e1 + e2 + e3 + e4 + e5 + e6 + e7 w0 = 6(h1 + 17h2 + 6h3 + 15h4 + 11h5 + 11h6 + 15h7 ) + γ(e1223210 + e1123211 − e1122221 ) w−2 = 19(20f1 + 18f2 + 5f3 + f4 + 13f5 + 13f6 + f7 ) + 2γ(e1123210 + 2e1122211 + 20e1112221 ) for some γ ∈ K. One can check that the relations in (18) are satisfied, so W is an sl2 -subalgebra of V . Set e = w2 , h = −2(6(h1 + 17h2 + 6h3 + 15h4 + 11h5 + 11h6 + 15h7 )), f = −19(20f1 + 18f2 + 5f3 + f4 + 13f5 + 13f6 + f7 ) = 11f1 + 3f2 + 20f3 + 4f4 + 6f5 + 6f6 + 4f7 34 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN and y = e1223210 + e1123211 − e1122221 , z = e1123210 + 2e1122211 + 20e1112221 . Then (e, h, f ) is an sl2 -triple over Z and we can use Proposition 2.15 to deduce that X is contained in an A1 -type subgroup of G. Case 4. rad(V |X ) 6= 0, p = 19 Finally, let us assume p = 19 so V |X is projective and each indecomposable summand is also projective. By considering the eigenvalues in (30), it follows that V |X = W (i) ⊕ W (j) ⊕ W (k) ⊕ M1 where i ∈ {2, 16}, j ∈ {4, 14}, k ∈ {8, 10} and M1 ∈ {LX (18), U }. By computing the trace of x2 we see that (i, j, k, M1 ) is one of the following: (2, 14, 10, LX (18)), (16, 4, 8, LX (18)), (16, 4, 10, U ), (16, 14, 8, U ), (2, 4, 8, U ). In all of these cases, x3 has trace 2 on V , which is compatible with Proposition 2.8. If V |X = W (16) ⊕ W (4) ⊕ W (8) ⊕ LX (18) then there is an element y ∈ X of order 5 with eigenvalues [I25 , ωI27 , ω 2 I27 , ω 3 I27 , ω 4 I27 ] on V , but one checks that there are no elements in G that act on V in this way (for example, see [7, Table 6]), so this possibility is ruled out. If V |X is one of W (8) ⊕ W (4) ⊕ W (2) ⊕ U, W (16) ⊕ W (10) ⊕ W (4) ⊕ U, W (16) ⊕ W (14) ⊕ W (8) ⊕ U then X stabilizes the 1-dimensional subalgebra of V spanned by the vector w = e1122111 − e1112211 + e0112221 . Indeed, X stabilizes soc(U ) = LX (0), which is spanned by a vector in CV (x) ∩ E0 . But one checks that CV (x) ∩ E0 = hwi so we are in case (ii) in the statement of the theorem. Finally, suppose V |X = W (2) ⊕ W (14) ⊕ W (10) ⊕ LX (18), which is compatible with the containment of X in an A1 -type subgroup of G (see Table 2). Let W be the LX (2) summand in the socle of V |X and let {w2 , w0 , w−2 } be a standard basis. In the usual way we obtain w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 ) w0 = a2 (h1 + 2h2 + 12h3 + 14h4 + 5h5 + 6h6 + 17h7 ) + a3 (e1122111 − e1112211 + e0112221 ) w−2 = a4 (9f1 + 18f2 + 13f3 + 12f4 + 7f5 + 16f6 + f7 ) + a5 (e1122110 − e1112210 + 13e1112111 + 12e0112211 ) + a6 (e2234321 ) and we may assume a1 = 1. By considering the action of x on W , together with the condition in (17), we deduce that a2 = 2, a4 = 11, a5 = 16a3 and a6 = 13a23 , so we have w2 = e1 + e2 + e3 + e4 + e5 + e6 + e7 w0 = 2(h1 + 2h2 + 12h3 + 14h4 + 5h5 + 6h6 + 17h7 ) + γ(e1122111 − e1112211 + e0112221 ) w−2 = 11(9f1 + 18f2 + 13f3 + 12f4 + 7f5 + 16f6 + f7 ) + 16γ(e1122110 − e1112210 + 13e1112111 + 12e0112211 ) + 13γ 2 (e2234321 ) for some γ ∈ K. Set e = w2 , h = −2(2(h1 + 2h2 + 12h3 + 14h4 + 5h5 + 6h6 + 17h7 )), f = −11(9f1 + 18f2 + 13f3 + 12f4 + 7f5 + 16f6 + f7 ) = 15f1 + 11f2 + 9f3 + f4 + 18f5 + 14f6 + 8f7 A1 -TYPE SUBGROUPS 35 and y = e1122111 − e1112211 + e0112221 z1 = 8(e1122110 − e1112210 + 13e1112111 + 12e0112211 ) z2 = 11e2234321 Then (e, h, f ) is an sl2 -triple over Z, but we cannot directly apply Proposition 2.15. However, a minor modification of the argument in the proof of that proposition will work. First observe that y ∈ (LZ )p−1 ∩ CLZ (e), z1 ∈ (LZ )p−3 and z2 ∈ (LZ )2p−4 (in terms of the notation used in the proof of Proposition 2.15). Moreover, (w2 , −2w0 , −w−2 ) = (ē, h̄ + δ ȳ, f¯ + δz̄1 + δ 2 z̄2 ) is an sl2 -triple in LK , where δ = −2γ. Set g = exp(ad(δy)) ∈ G and note that 1 g · ē = ē, g · h̄ = h̄ + δ[ȳ, h̄] = h̄ + δ ȳ, g · f¯ = f¯ + δ[ȳ, f¯] + δ 2 [ȳ, [ȳ, f¯]] 2 (for the final equality, note that all higher degree terms are zero since the maximum T -weight on LZ is 2ht(α0 ) 6 2(p − 1)). Now calculating (in LZ ), we have [h + y, f + z1 + z2 ] = −2f + (p − 3)z1 + (2p − 4)z2 + [y, f ] + [y, z1 ] and passing to LK we get −2f¯ − 3z̄1 − 4z̄2 + [ȳ, f¯] + [ȳ, z̄1 ] = −2(f¯ + z̄1 + z̄2 ). Therefore [ȳ, f¯] + [ȳ, z̄1 ] = z̄1 + 2z̄2 and by comparing T -weights we deduce that [ȳ, f¯] = z̄1 and [ȳ, z̄1 ] = 2z̄2 . Finally, this implies that 1 g · f¯ = f¯ + δz̄1 + δ 2 [ȳ, z̄1 ] = f¯ + δz̄1 + δ 2 z̄2 2 and we can now conclude as in the proof of Proposition 2.15. In particular, X is contained in an A1 -type subgroup of G. This completes the proof of Theorem 6.1.  7. A reduction for G = E8 In this section we complete the proof of the Reduction Theorem (see Theorem 2.22). Our main result is the following: Theorem 7.1. Let G be a simple algebraic group of type E8 over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element x of G and set V = Lie(G). Then one of the following holds: (i) X is contained in an A1 -type subgroup of G; (ii) p = 37, V |X = W (34) ⊕ W (26) ⊕ W (14) ⊕ LX (22) ⊕ LX (2) and X stabilizes a non-zero subalgebra of heα | α ∈ Φ+ (G)i. Proof. First note that we may assume that 31 6 p 6 113 (see (3)). In fact, we may assume p > 37 since the case p = 31 was handled in Section 2 (see Examples 2.21 and 2.23). Recall that {ξ 58 , ξ 46 , ξ 38 , ξ 34 , ξ 26 , ξ 22 , ξ 14 , ξ 2 } (32) 36 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN is the collection of eigenvalues of s on CV (x) and note that V |X is self-dual. The Jordan form of x on V is as follows:  [J59 , J47 , J39 , J35 , J27 , J23 , J15 , J3 ] p > 59    2 ,J ,J ,J ,J ,J ,J ]  [J53 p = 53  39 35 27 23 15 3   3  p = 47  [J47 , J39 , J27 , J23 , J15 , J3 ] 4 ,J ,J ,J ,J ] [J43 p = 43 (33) 35 23 15 3  4 ,J ,J ,J ,J ]  [J p = 41  41 39 27 15 3   6 ,J ,J ]  p = 37  [J37 23 3   8 [J31 ] p = 31 (see [14, Table 9]). Case 1. V |X is semisimple By considering the eigenvalues in (32) we deduce that p > 59 and V |X = LX (58) ⊕ LX (46) ⊕ LX (38) ⊕ LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2). Let W be the LX (2) summand and let {w2 , w0 , w−2 } be a standard basis. If p > 61 then it is straightforward to show that W is an appropriate sl2 -subalgebra and the result follows by applying Proposition 2.14 (note that if p = 61 then ker((x − 1)3 ) ∩ E−2 is 2-dimensional, but this does not cause any special difficulties). Now assume p = 59. Here ker((x − 1)2 ) ∩ E0 and ker((x − 1)3 ) ∩ E−2 are both 2-dimensional and we get w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 ) w0 = a2 (h1 + 22h2 + 52h3 + 35h4 + 46h5 + 48h6 + 41h7 + 25h8 ) + a3 (e23465432 ) w−2 = a4 (26f1 + 41f2 + 54f3 + 25f4 + 16f5 + 9f6 + 4f7 + f8 ) + a5 (e23465431 ) Set a1 = 1 and consider the action of x on W (see (15)). We deduce that a2 = 13, a4 = 1 and a5 = 2a3 , so w2 = e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 w0 = 13(h1 + 22h2 + 52h3 + 35h4 + 46h5 + 48h6 + 41h7 + 25h8 ) + γ(e23465432 ) w−2 = 26f1 + 41f2 + 54f3 + 25f4 + 16f5 + 9f6 + 4f7 + f8 + 2γ(e23465431 ) for some γ ∈ K. Set e = w2 , h = −2(13(h1 + 22h2 + 52h3 + 35h4 + 46h5 + 48h6 + 41h7 + 25h8 )) and f = −(26f1 + 41f2 + 54f3 + 25f4 + 16f5 + 9f6 + 4f7 + f8 ) = 33f1 + 18f2 + 5f3 + 34f4 + 43f5 + 50f6 + 55f7 + 58f8 Then (e, h, f ) is an sl2 -triple over Z (see the proof of [34, Proposition 2.4]) and by applying Proposition 2.15 (with y = e23465432 and z = e23465431 ) we deduce that X is contained in an A1 -type subgroup of G. Case 2. rad(V |X ) 6= 0, p > 53 If p > 61 then the dimension of each indecomposable summand of V |X is at least 60, which implies that the Jordan form of x has a block of size n > 60. This is a contradiction. Next assume p = 59. Suppose W is a reducible indecomposable non-projective summand of V |X , so dim W > 58 (see Corollary 2.4). In view of (33) and Lemma 2.1, we deduce that x has Jordan form [J59 , Ji ] on W for some i ∈ {3, 15, . . . , 47}. But this implies that dim W is even, so W has at least four composition factors and thus i > 57 A1 -TYPE SUBGROUPS 37 (again, by Corollary 2.4). This is a contradiction. Therefore, we may assume that each indecomposable summand of V |X is either simple or projective. Clearly, V |X = U ⊕ LX (46) ⊕ LX (38) ⊕ LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) is the only possibility. However, this implies that x2 has trace −4 on V , which contradicts Proposition 2.8. Now assume p = 53. As in the previous case, by applying Lemma 2.1 and Theorem 2.2, and by appealing to the self-duality of V |X , it is straightforward to reduce to the case where the indecomposable summands of V |X are either simple or projective. Moreover, by considering the eigenvalues in (32), we deduce that V |X = W (i) ⊕ LX (38) ⊕ LX (34) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) with i ∈ {6, 46}. By computing the trace of x3 ∈ X, it follows that i = 46. It is now entirely straightforward to show that the LX (2) summand of V |X is an appropriate sl2 subalgebra and the result follows via Proposition 2.14. Case 3. rad(V |X ) 6= 0, p = 47 As in the previous case, we can quickly reduce to the situation where each indecomposable summand of V |X is simple or projective, in which case V |X = W (i) ⊕ M2 ⊕ LX (38) ⊕ LX (26) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) with i ∈ {12, 34} and M1 ∈ {LX (46), U }. By computing the trace of x2 we deduce that i = 34 and M1 = LX (46), in which case V |X is compatible with the containment of X in an A1 -type subgroup of G (see Table 2). As usual, let W be the LX (2) summand of V |X and let {w2 , w0 , w−2 } be a standard basis for W . We get w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 ) w0 = a2 (h1 + 26h2 + 3h3 + 6h4 + 31h5 + 10h6 + 37h7 + 18h8 ) + a3 (e23354321 − e22454321 ) w−2 = a4 (34f1 + 38f2 + 8f3 + 16f4 + 20f5 + 11f6 + 36f7 + f8 ) + a5 (e22354321 − 2e13354321 ) We may set a1 = 1. By considering the action of x on this basis we deduce that a2 = 1, a4 = 36 and a5 = 45a3 , so w2 = e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 w0 = h1 + 26h2 + 3h3 + 6h4 + 31h5 + 10h6 + 37h7 + 18h8 + γ(e23354321 − e22454321 ) w−2 = 36(34f1 + 38f2 + 8f3 + 16f4 + 20f5 + 11f6 + 36f7 + f8 ) + 45γ(e22354321 − 2e13354321 ) for some γ ∈ K. One now checks that the relations in (18) are satisfied and thus W is an sl2 -subalgebra of V . Set e = w2 , h = −2(h1 + 26h2 + 3h3 + 6h4 + 31h5 + 10h6 + 37h7 + 18h8 ) and f = −36(34f1 + 38f2 + 8f3 + 16f4 + 20f5 + 11f6 + 36f7 + f8 ) = 45f1 + 42f2 + 41f3 + 35f4 + 32f5 + 27f6 + 20f7 + 11f8 Then (e, h, f ) is an sl2 -triple over Z and we can use Proposition 2.15 to conclude that X is contained in an A1 -type subgroup of G. Case 4. rad(V |X ) 6= 0, p = 43 38 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN By arguing in the usual manner, it is straightforward to reduce to the case where each indecomposable summand of V |X is either simple or projective. By considering the eigenvalues in (32), we deduce that V |X = W (i) ⊕ W (j) ⊕ LX (34) ⊕ LX (22) ⊕ LX (14) ⊕ LX (2) with i ∈ {4, 38} and j ∈ {16, 26}. By computing the trace of x2 , we see that (i, j) = (38, 26) is the only option, in which case V |X is compatible with the desired containment of X in an A1 -type subgroup of G. As usual, we now construct the summand W = LX (2) of V |X in terms of a standard basis {w2 , w0 , w−2 }; it is easy to show that W is an appropriate sl2 -subalgebra and we can conclude by applying Proposition 2.14. Case 5. rad(V |X ) 6= 0, p = 41 First assume that V |X has a reducible indecomposable non-projective summand W . In the usual way, we deduce that the Jordan form of x on W is one of the following:  4 4 ,J ] , J27 ], [J41  15  [J41  3 [J41 , J3 ] 2 , J ], [J 2 , J ] [J 2 , J27 ], [J41  15 41 3   41 [J41 , J39 ], 4 , J ] or [J 4 , J ] then there is a unique such summand. If the Jordan form is either [J41 27 41 15 Moreover, W has an odd number of composition factors and it is easy to see that this is incompatible with the self-duality of V |X . Similar reasoning rules out the cases where x 2 , J ]. Finally, suppose x has Jordan form [J 3 , J ] or [J , J ]. Here has Jordan form [J41 i 41 39 41 3 the self-duality of V |X implies that soc(W ) ∼ = W/soc(W ) = LX (22) ⊕ LX (20) ⊕ LX (18) or soc(W ) ∼ = W/soc(W ) = LX (20) ⊕ LX (18), respectively. However, the existence of such a summand would mean that ξ 20 is an eigenvalue of s on CV (x), which is not the case (see (32)). Therefore, we conclude that every indecomposable summand of V |X is either simple or projective. More precisely, in view of (32), it follows that V |X = W (i) ⊕ W (j) ⊕ LX (38) ⊕ LX (26) ⊕ LX (14) ⊕ LX (2) with i ∈ {6, 34} and j ∈ {18, 22}. By computing the trace of x3 we deduce that (i, j) = (34, 22), in which case V |X is compatible with the containment of X in an A1 -type subgroup. Let W be the LX (2) summand of V |X and let {w2 , w0 , w−2 } be a standard basis. In the usual manner we deduce that w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 ) w0 = a2 (h1 + 30h2 + 10h3 + 27h4 + 22h5 + 25h6 + 36h7 + 14h8 ) w−2 = a3 (3f1 + 8f2 + 30f3 + 40f4 + 25f5 + 34f6 + 26f7 + f8 ) + a4 (e22343221 − e12343321 + e12244321 ) Set a1 = 1. By considering the action of x on this basis we get a2 = 36 and a3 = 24. Finally, one can check that the condition in (17) implies that a4 = 0 and now the desired result follows from Proposition 2.14. Case 6. rad(V |X ) 6= 0, p = 37 A1 -TYPE SUBGROUPS 39 To complete the proof of the theorem, we may assume that p = 37 (recall that the case p = 31 was handled earlier in Examples 2.21 and 2.23). As usual, let us first assume that V |X has a reducible indecomposable non-projective summand W . By applying Lemma 2.1 and Theorem 2.2, we deduce that the Jordan form of x on W is one of the following: 6 4 3 2 2 [J37 , J23 ], [J37 , J23 ], [J37 , J3 ], [J37 , J23 ], [J37 , J3 ]. 3 , J ] is the only possibility, with In fact, the self-duality of V |X implies that [J37 3 soc(W ) ∼ = W/soc(W ) = LX (16) ⊕ LX (18) ⊕ LX (20). But if this is a summand of V |X then ξ 20 is an eigenvalue of s on CV (x), contradicting (32). Therefore, we have reduced to the case where each indecomposable summand of V |X is simple or projective. Again, by considering (32) we deduce that V |X = W (i) ⊕ W (j) ⊕ W (k) ⊕ LX (22) ⊕ LX (2) (34) with i ∈ {2, 34}, j ∈ {10, 26} and k ∈ {14, 22}. We claim that (i, j, k) = (34, 26, 14), in which case the decomposition of V |X is compatible with the containment of X in an A1 subgroup of G. One can check that all of the eight above decompositions are compatible with the trace of x2 and x3 , so we consider the traces of elements of larger order. Let y ∈ X be an element of order 19. In each case it is straightforward to compute the eigenvalues of y on V . Using Litterick’s algorithm in [21], we can compute the eigenvalues on V of every element in G of order 19 and in this way we deduce that (i, j, k) = (34, 26, 14) as claimed. Let W be the LX (2) summand of V |X with standard basis {w2 , w0 , w−2 }. The spaces ker(x − 1) ∩ E2 , ker((x − 1)2 ) ∩ E0 , ker((x − 1)3 ) ∩ E−2 have respective dimensions 2, 2 and 3, which gives w2 = a1 (e1 + e2 + e3 + e4 + e5 + e6 + e7 + e8 ) + a2 (e22343221 − e12343321 + e12244321 ) w0 = a3 (h1 + 24h2 + 6h3 + 15h4 + 4h5 + 34h6 + 31h7 + 32h8 ) + a4 (e22343211 + 24e12343221 + 25e12243321 ) w−2 = a5 (22f1 + 10f2 + 21f3 + 34f4 + 14f5 + 8f6 + 16f7 + f8 ) + a6 (e22343210 + 13e12243221 − e12233321 ) + a7 (e12343211 + 23e12243221 + 2e12233321 ) By considering the action of x on this basis, we deduce that a3 = 28a1 , a4 = 3a2 , a5 = 16a1 and a7 = 6a2 + a6 . The condition in (17) yields the equations 16a21 a2 + 3a21 a6 = 0 19a21 a2 + 6a21 a6 = 0 If a1 6= 0 then these equations imply that a2 = a6 = 0, so we can set a1 = 1 and then apply Proposition 2.14 to show that X is contained in an A1 -type subgroup. On the other hand, if a1 = 0 then we may assume a2 = 1, so w2 = e22343221 − e12343321 + e12244321 w0 = 3(e22343211 + 24e12343221 + 25e12243321 ) w−2 = a6 (e22343210 + 13e12243221 − e12233321 ) + (6 + a6 )(e12343211 + 23e12243221 + 2e12233321 ) It is straightforward to check that W ⊆ heα | α ∈ Φ+ (G)i is a subalgebra and this puts us in case (ii) of the theorem. This completes the proof of Theorem 7.1.  40 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN 8. Proof of Theorem 1 In this final section we complete the proof of Theorem 1. In view of Theorem 3.1, we may assume that G is of type F4 , E6 , E7 or E8 . Moreover, by our work in Sections 4–7, it remains to handle the cases appearing in Table 4. In each of these cases, X stabilizes a non-zero subalgebra W ⊆ heα | α ∈ Φ+ (G)i of V = Lie(G) and by applying Proposition 2.18 we can assume that X is contained in a proper parabolic subgroup P = QL of G with unipotent radical Q and Levi factor L. The following result, when combined with Theorem 2, completes the proof of Theorem 1. (Recall that Craven [9] has constructed a subgroup X satisfying the conditions in parts (ii) and (iii) of Theorem 1, and he has established its uniqueness up to conjugacy; see Remark 1(b).) Theorem 8.1. Let G be a simple exceptional algebraic group of adjoint type over an algebraically closed field of characteristic p > 0. Let X = PSL2 (p) be a subgroup of G containing a regular unipotent element of G and let V = Lie(G) be the adjoint module. If X is contained in a proper parabolic subgroup P = QL of G, then either (i) G = E6 , p = 13, L0 = D5 and V |X = W (10)2 ⊕ W (4); or (ii) G = E7 , p = 19, L0 = E6 and V |X = W (16) ⊕ W (14) ⊕ W (8) ⊕ U . Proof. We may assume that P is minimal with respect to containing X. Let π : P → P/Q be the quotient map and identify L with P/Q. By arguing as in the first paragraph in the proof of Theorem 2 (see the end of Section 2), we deduce that π(X) is contained in an A1 -type subgroup H of L0 . In addition, Theorem 2 implies that X is not contained in an A1 -type subgroup of G, so (G, p, V |X ) must be one of the cases in Table 4. As noted in the proof of Theorem 2, the composition factors of V |H can be read off from [15, Tables 1–5] and this imposes restrictions on the composition factors of V |X . By considering each possibility for (G, L0 ) in turn, comparing composition factors with Table 4, we will show that the cases labelled (i) and (ii) in the statement of the theorem are the only compatible options. First assume (G, p) = (F4 , 13), so the composition factors of V |X are LX (10)3 , LX (8), LX (2)3 and LX (0). By inspecting [15, Table 2] it is easy to see that there is no compatible Levi subgroup L. Similarly, if (G, p) = (E8 , 37) then the composition factors of V |X are given in (20) and thus we can eliminate this case by repeating the argument in the proof of Theorem 2. Next suppose (G, p) = (E6 , 13). The three possibilities for V |X are as follows: W (10) ⊕ W (8) ⊕ W (2) : LX (10)3 , LX (8)3 , LX (4), LX (2)4 , LX (0) W (10) ⊕ W (4) ⊕ W (2) : LX (10)3 , LX (8)2 , LX (6), LX (4)2 , LX (2)3 , LX (0) W (10) ⊕ W (10) ⊕ W (4) : LX (10)4 , LX (8), LX (6), LX (4)2 , LX (2)2 , LX (0)2 In all three cases, we see that V |X has at most two trivial composition factors, so [15, Table 3] implies that L0 = A2 A21 , A22 A1 , A4 A1 or D5 . If L0 = A2 A21 then V |X has five or more LX (2) factors, which is incompatible with all three possibilities for V |X . Similarly, if L0 = A4 A1 then there are too many LX (4) factors, and we can rule out L0 = A22 A1 because we would get LX (1) composition factors, which is absurd. Finally, suppose L0 = D5 . Since the Weyl module WX (14) has an LX (10) composition factor, we see that V |X has four such factors and thus V |X = W (10) ⊕ W (10) ⊕ W (4) is the only option. A1 -TYPE SUBGROUPS 41 Finally, let us assume (G, p) = (E7 , 19). The three possibilities for V |X are as follows: W (8) ⊕ W (4) ⊕ W (2) ⊕ U : LX (16)2 , LX (14)2 , LX (12), LX (10), LX (8)3 , LX (4)2 , LX (2)2 , LX (0)2 W (16) ⊕ W (10) ⊕ W (4) ⊕ U : LX (16)3 , LX (14), LX (12), LX (10)2 , LX (8), LX (6), LX (4)2 , LX (2), LX (0)3 W (16) ⊕ W (14) ⊕ W (8) ⊕ U : LX (16)3 , LX (14)2 , LX (10), LX (8)3 , LX (4), LX (2)2 , LX (0)3 By inspecting [15, Table 4], counting the number of trivial composition factors, we quickly reduce to a small number of possibilities for L0 . By considering non-trivial composition factors, it is straightforward to reduce further to the case L0 = E6 . For example, we can rule out L0 = A6 because there would be too many LX (4) factors. Similarly, L0 = D5 A1 is out because we would have an LX (6) and at least three LX (8) factors, which is not compatible with any of the three possibilities above. We can rule out L0 = D6 because it would imply that V |X has an LX (5) factor. Finally, suppose L0 = E6 . Here V |X has at least three LX (16) and LX (8) composition factors, so V |X = W (16) ⊕ W (14) ⊕ W (8) ⊕ U is the only possibility.  References [1] J.L. Alperin, Local Representation Theory, Cambridge Stud. Adv. Math., vol. 11, Cambridge Univ. Press, 1986. [2] A. Borel and J. Tits, Éléments unipotents et sous-groupes paraboliques de groupes réductifs. I, Invent. Math. 12 (1971), 95–104. [3] W. Bosma, J. Cannon and C. Playoust, The Magma algebra system I: The user language, J. Symbolic Comput. 24 (1997), 235–265. [4] N. Bourbaki, Groupes et algebrès de Lie (Chapitres 4, 5 et 6), Hermann, Paris, 1968. [5] R.W. Carter, Simple groups of Lie type, John Wiley and Sons, London, 1972. [6] R.W. Carter, Finite Groups of Lie Type: Conjugacy Classes and Complex Characters, John Wiley and Sons, London, 1985. [7] A.M. Cohen and R.L. Griess, On finite subgroups of the complex Lie group of type E8 , Proc. Sympos. Pure Math. 47 (1987), 367–405. [8] B.N. Cooperstein, Maximal subgroups of G2 (2n ), J. Algebra 70 (1981), 23–36. [9] D.A. Craven, Maximal PSL2 subgroups of exceptional groups of Lie type, preprint (arXiv:1610.07469) [10] D. Gorenstein, R. Lyons and R. Solomon, The Classification of the Finite Simple Groups, Number 3, Mathematical Surveys and Monographs, vol. 40, Amer. Math. Soc., 1998. [11] R. Guralnick and G. Malle, Rational rigidity for E8 (p), Compos. Math. 150 (2014), 1679–1702. [12] G.J. Janusz, Indecomposable representations of groups with a cyclic Sylow subgroup, Trans. Amer. Math. Soc. 125 (1966), 288–295. [13] P.B. Kleidman, The maximal subgroups of the Chevalley groups G2 (q) with q odd, the Ree groups 2 G2 (q), and their automorphism groups, J. Algebra 117 (1988), 30–71. [14] R. Lawther, Jordan block sizes of unipotent elements in exceptional algebraic groups, Comm. Algebra 23 (1995), 4125–4156. [15] R. Lawther and D.M. Testerman, A1 subgroups of exceptional algebraic groups, Mem. Amer. Math. Soc. 141 (1999). [16] M.W. Liebeck, J. Saxl and D.M. Testerman, Simple subgroups of large rank in groups of Lie type, Proc. London Math. Soc. 72 (1996), 425–457. [17] M.W. Liebeck and G.M. Seitz, Subgroups generated by root elements in groups of Lie type, Annals of Math. 139 (1994), 293–361. [18] M.W. Liebeck and G.M. Seitz, On the subgroup structure of exceptional groups of Lie type, Trans. Amer. Math. Soc. 350 (1998), 3409–3482. [19] M.W. Liebeck and G.M. Seitz, The maximal subgroups of positive dimension in exceptional algebraic groups, Mem. Amer. Math. Soc. 802 (2004). [20] M.W. Liebeck and D.M. Testerman, Irreducible subgroups of algebraic groups, Q. J. Math. 55 (2004), 47–55. 42 TIMOTHY C. BURNESS AND DONNA M. TESTERMAN [21] A.J. Litterick, Finite simple subgroups of exceptional algebraic groups, Ph.D. thesis, Imperial College London, 2013. [22] A.J. Litterick, On non-generic finite subgroups of exceptional algebraic groups, Mem. Amer. Math. Soc., to appear. [23] G. Malle, The maximal subgroups of 2 F4 (q 2 ), J. Algebra 139 (1991), 52–69. [24] G. Malle and D. Testerman, Linear Algebraic Groups and Finite Groups of Lie Type, Cambridge Advanced Studies in Mathematics vol. 133, Cambridge University Press, 2011. [25] R. Proud, J. Saxl and D.M. Testerman, Subgroups of type A1 containing a fixed unipotent element in an algebraic group, J. Algebra 231 (2000), 53–66. [26] J. Saxl and G.M. Seitz, Subgroups of algebraic groups containing regular unipotent elements, J. London Math. Soc. 55 (1997), 370–386. [27] G.M. Seitz, Unipotent elements, tilting modules, and saturation, Invent. Math. 141 (2000), 467–502. [28] G.M. Seitz and D.M. Testerman, Extending morphisms from finite to algebraic groups, J. Algebra 131 (1990), 559–574. [29] G.M. Seitz and D.M. Testerman, Subgroups of type A1 containing semiregular unipotent elements, J. Algebra 196 (1997), 595–619. [30] J.-P. Serre, Exemples de plongements des groupes PSL2 (Fp ) dans des groupes de Lie simples, Invent. Math. 124 (1996), 525–562. [31] R. Steinberg, Representations of algebraic groups, Nagoya Math. J. 22 (1963), 33–56. [32] R. Steinberg, Endomorphisms of linear algebraic groups, Mem. Amer. Math. Soc. 80 (1968). [33] D.M. Testerman, The construction of the maximal A1 ’s in the exceptional algebraic groups, Proc. Amer. Math. Soc. 116 (1992), 635–644. [34] D.M. Testerman, A1 -type overgroups of elements of order p in semisimple algebraic groups and the associated finite groups, J. Algebra 177 (1995), 34–76. [35] D.M. Testerman and A. Zalesski, Irreducibility in algebraic groups and regular unipotent elements, Proc. Amer. Math. Soc. 141 (2013), 13–28. [36] B. Weisfeiler, On one class of unipotent subgroups of semisimple algebraic groups, preprint (arxiv:0005149) T.C. Burness, School of Mathematics, University of Bristol, Bristol BS8 1TW, UK E-mail address: [email protected] D.M. Testerman, Institute of Mathematics, Station 8, École Polytechnique Fédérale de Lausanne, CH-1015 Lausanne, Switzerland E-mail address: [email protected]
4math.GR
BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS SEMA GÜNTÜRKÜN arXiv:1404.0118v2 [math.AC] 20 Aug 2015 A BSTRACT. Boij-Söderberg theory describes the scalar multiples of Betti diagrams of graded modules over a polynomial ring as a linear combination of pure diagrams with positive coefficients. There are a few results that describe Boij-Söderberg decompositions explicitly. In this paper, we focus on the Betti diagrams of lex-segment ideals. Mainly, we characterize the Boij-Söderberg decomposition of a lex-segment ideal and describe it by using Boij-Söderberg decompositions of some other related lex-segment ideals. 1. I NTRODUCTION Boij-Söderberg is very recent theory which addresses the characterization of Betti diagrams of graded modules in polynomial rings. It is originated in a pair of conjectures by Boij and Söderberg in [3] and in [4] whose proof is given by Eisenbud and Schreyer in [6]. Their result gives a characterization of Betti diagrams of graded modules up to scalar multiples. For more information about Boij-Söderberg theory, we refer to a very informative survey written by Fløystad in [8]. This theory brings up an idea of decomposition of the Betti diagrams of graded modules whose resolutions are not pure resolution. If the resolution is pure, then the decomposition consists of only one pure diagram with a positive coefficient as expected. There is not much known about the behavior of the Boij-Söderberg decomposition of an ideal in a polynomial ring. Any characterization of Boij-Söderberg decompositions, either about BoijSöderberg coefficients or about the chain of the degree sequences associated with the pure diagrams, would also assist us in understanding and interpreting the structural consequences of Boij-Söderberg decomposition of the Betti diagrams. Although the theory is quite recent and has a lot of open problems, improvements and contributions to this theory are quite impressive. Cook in [5] and Berkesch, Erman, Kumini, and Sam in [1] discuss Boij-Söderberg theory in the perspective of poset structures. In [14], Nagel and Sturgeon examine the Boij-Söderberg decomposition of some ideals that are raised from some combinatorial objects. They show the combinatorial importance of the coefficients of the pure diagrams in the Boij-Söderberg decompositions of their interest of ideals. In [10], results of Gibbons, Jeffries, Mayes, Rauciu, Stone and White provide a relation between decomposition of the Betti diagrams of complete intersections and degrees of their minimal generators. Another recent work is done by Francisco, Mermin, and Schweig in [9]. In their paper, they study the behavior of the Boij-Söderberg coefficients of Borel ideals. For the sake of simplicity, the abbreviation BS is used for the Boij-Söderberg . In this paper, we study the behavior of BS decompositions of lex-segment ideals and obtain a neat relation between the BS decompositions of a given lex ideal and some other related lex ideals. Throughout the paper, our main focus will be the BS chain of the degree sequences in the decomposition and we also provide a strong correlation of the coefficients of the pure diagrams as well. The reason of why we are interested in the BS decomposition of lex-segment ideals is based on the fact that lex ideals have very particular Betti diagrams. The Bigatti-Hulett-Pardue, in [2, 13, 15], prove that the lex-segment ideals have the largest Betti numbers among the ideals with the same Hilbert function. This pivotal property of lex-segment ideals makes their BS decompositions worthy of study. Moreover, Eliahou-Kervaire formula gives a nice formulation for the Betti diagram of lex ideals. The main goal is to obtain a pattern for the BS decomposition of a lex ideal by using decompositions of some other related lex-segment ideals. In what follows, let R = k[x, y, z] be a polynomial ring of 3 variables, with the lexicographic order, x >lex y >lex z and L be a lex-segment ideal in R. The ideal L can be decomposed as L = xa + J where a is also a lex-segment ideal in R and J is a lex-segment ideal in k[y, z]. The first main result 2010 Mathematics Subject Classification. 13D02, 13C99, 13A99. Key words and phrases. Boij-Söderberg decompositions, Betti diagrams, Lex-segment ideals. 1 2 SEMA GÜNTÜRKÜN of this paper describes the “beginning” of the BS decomposition of L in terms of the decomposition of a. The algorithm of BS decomposition itself provides a chain of degree sequences. The first degree sequence in the chain is the top degree sequence of the Betti diagram of L. By the algorithm, the second degree sequences is the top degree sequence of the remaining diagram after the subtraction of the first pure diagram with a suitable coefficient from the Betti diagram. It continues until the Betti diagram is decomposed completely. Thus, by saying that the “beginning” of the BS decomposition, we mean the several degree sequences, that is pure diagrams, are obtained in the beginning of the BS decomposition of L. We now state our first result. Theorem 1.1. Let R = k[x, y, z] and L be a lex-segment ideal of codimension 3 in R. Suppose 1 6= a = L : (x). Write the Boij-Söderberg decomposition of a as β(a) = t X αi πdi + Ra , t X α̃i πd̄i + RL i=0 where < < ... < < ... < are all top degree sequences of length 3, that is, di = (di0 , di1 , di2 ) for i = 0, 1, ..., t, and Ra is the linear combination of the pure diagrams greater that πdt . Then the Boij-Söderberg decomposition of L has the form d0 d1 dl dt β(L) = i=0 d̄i di (di0 + 1, di1 + 1, di2 where = + 1 = + 1), and α̃i = αi for i = 0, 1, ..., t and α̃t ≥ αt , and RL is a linear combination of pure diagrams greater than πd̄t . The second main result in this article is devoted to the pure diagrams - that is to say, degree sequences - of the BS decomposition of the Betti diagrams of L and (J, x) = (L, x) in the polynomial ring R = k[x, y, z]. Like in Theorem 1.1, we notice some similarities of the BS decompositions of lex ideal L and (L, x). We reveal that the entire part of the BS decomposition of (L, x) containing all pure diagrams of length less than 3 shows up precisely at the end of the BS decomposition of L. That is, all pure diagrams of length less than 3 are exactly the same with the coefficients. In particular, we prove that Theorem 1.2. Let L ⊂ R = k[x, y, z] be an Artinian lex-segment ideal of codimension 3. Suppose that L cannot be decomposed as L = x(x, y, z t ) + J where J is different from (y, z)Gmin (J) and 1 < t < k − 1. Let a = L : (x) be a lex-segment ideal of R. Then L = xa + J where J ∈ k[y, z] is a stable ideal of codim 2. The ideal (J, x) = (L, x) is also a codim 3 Artinian, lex-segment ideal in R. β(L, x) = R(L,x) + n X αi πdi i=t+1 where dt+1 < dt+2 < ... < dn are all top degree sequences of length less than 3, with the coefficients αi , i = t + 1, ..., n. R(L,x) is the linear combination of the pure diagrams associated with the degree sequences of length 3. Then the BS decomposition of L is n X αi πdi β(L) = RL + i=t+1 where the chain dt+1 dt+2 dn < < ... < of degree sequences of length 2 and 1 exactly with the same coefficients αi and RL is the linear combination of the pure diagrams associated with the degree sequences of length 3. As a plan of this paper, we first discuss some useful relations of the Betti numbers of the ideals L, a and J in section 2. We also describe the entire Betti diagram of the lex ideal L in terms of the Betti numbers of the colon ideal a = L : (x) and the stable ideal J in the same section. In section 3, we give the proof of Theorem 1.1 which gives the relation between the beginning of the BS decompositions of L and a. Proof of Theorem 1.2 is given in section 4. BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 3 Combining the results of Theorems 1.1 and 1.2, in the case of R = k[x, y, z], we give the following diagram to summarize nicely the relation between the degree sequences in the BS decompositions of L and the ideals a and (L, x).       all length < 3 all length 3 The chain of more length 3    degree sequences   < degree sequences <  degree sequences  . degree sequences =   coming from   coming from  of L (section 5) (L, x) a(−1) We will see that, most of the time, the decompositions of a and (L, x) may not enough to cover all pure diagrams in the decomposition of L since there might be some pure diagrams of length 3 which may not obtained by the ideal a. One naturally hopes to obtain a description of the entire BS decomposition of lex-segment ideal L in terms of some other related ideals. Section 5 includes further observations for a possible way to describe the entire BS chain of degree sequences in the BS decomposition of L. The lexicographic order x >lex y >lex z makes us think about the colon ideals b = L : (y) and c = L : (z). As in the case a = L : (x) in section 3, one may expect similar results for the lex ideals b and c. Indeed, the examples show that there is a relation between the BS decompositions of the lex ideal L and the colon ideals b and c. This allows us to give an almost full description of the pure diagrams appearing in the decomposition of L. 2. BACKGROUND AND P RELIMINARIES Throughout this section we assume that R is a graded polynomial ring with n < ∞ variables over a field k with each variable has degree one. In the case of n = 3, we will see the description of the Betti diagram L = xa + J in terms of the Betti numbers of a and J. Let M be a graded R-module. The minimal graded free resolution of M is written as F : 0 → Fn → . . . → Fi → . . . → F1 → F0 → M → 0 where Fi = M R(−α)βi,α . α≥0 The numbers βi,α are the Betti numbers of M and are considered in the Betti diagram β(M ) of M whose entry in row i and column j is βi,i+j . Let d = (d0 , d1 , ..., dn−1 ) ∈ Zn≥0 be a sequence of non-negative integers of length n+1 with d0 < ... < dn−1 . The graded free resolution of M is called a pure resolution of type d = (d0 , ..., di , ..., dn−1 ) if, for all i = 0, 1, ..., n − 1, the i-th syzygy module of M is generated only by elements of degree di , in other words, all Betti numbers are zero except βi,di (M ). Then the Betti diagram of this module is called a pure diagram of type d. The formula for the pure diagram associated by d is based on the Herzog-Kühl equations introduced in [12],  n−1 1  λ Q if α = di where λ ∈ Q>0 . βi,α = i=0,i6=k |di − dk |  0 otherwise We define a partial order on the degree sequences so that ds < dt if dsi ≤ dti for all i = 0, 1, ..., n − 1. The order on the degree sequences induces an order of the pure diagrams πds < πdt if ds < dt . The BS decomposition of a Betti diagram of an R- module is a linear combination of pure diagrams with positive coefficients. Algorithm 2.1 (Boij-Söderberg Decomposition Algorithm). The algorithm to decompose for a given (non-pure) Betti diagram has the following steps (1) Determine the top degree sequence d = (d0 , ..., di , ..., dn−1 ) of the Betti diagram of the Rmodule M , say β(M ). 4 SEMA GÜNTÜRKÜN (2) Determine the coefficient α of the pure diagram πd by   βi,di (M ) min , for i = 0, 1, .., n − 1 . βi,di (πd ) (3) Subtract απd from the Betti diagram β(M ) so that the new entries will be all positive. (4) Repeat the first and second steps for the remaining diagram β(M )−απd until the Betti diagram is completely decomposed into pure diagrams. Thus the BS decomposition of a graded R-module M gives an ordered decomposition of the Betti diagram, X β(M ) = as πds where πds < πdt if s < t. s Example 2.2. For instance, let I = (x2 , xy, xz, y 2 ) be an ideal in k[x, y, z], the BS decomposition of R/I is given as β(R/I) = (8)πd0 + (4)πd1 where 0 1 2 0 1 2 3 1 πd0 = 0 24 - - - < πd1 = 0 61 - - as d0 = (0, 2, 3, 4) < d1 = (0, 2, 3). 1 - 41 13 81 1 - 12 31 Consider a monomial ideal I in R. We will denote the set of minimal monomial generators of I by G(I). Then G(I)i will denote the subset of G(I) containing the minimal generators of degree i. The notation Gmin (I) will be used for the initial degree of the monomials in I and Gmax (I) will stand for the maximum degree of the monomials in G(I) throughout the paper. We next state the definitions of graded lexicographic monomial order and lex-segment ideal. Definition 2.3. Let m = xs11 ...xsnn and n = xt11 ...xtnn be two monomials in R = k[x1 , ..., xn ]. If either deg m > deg n or deg m = deg n and si − ti > 0 for the first index i such that si − tt 6= 0, then it is said that m >glex n in graded lexicographic order. Definition 2.4. Let R be a polynomial ring and L be a monomial ideal in R generated by the monomials m1 , ..., ml . The ideal L is called a lex-segment ideal (lexicographic ideal, or lex ideal) in R if for each monomial m ∈ R the existence of some mi ∈ G(L) with m >glex mi and deg(m) = deg(mi ) implies m ∈ L. For simplicity, we will use > for the lex order >glex unless the order is different than lexicographic order. In this section, we make some observations about the Betti diagrams of lex-segment ideals. We aim to get some correlations between Betti numbers of the lex ideals L = xa + J, a = L : x and J in k[x, y, z]. Next lemma shows that the colon ideal a is also a lex-segment ideal in k[x, y, z]. Lemma 2.5. Let L be a lex-segment ideal in R = k[x1 , .., xn ]. Consider the colon ideals ai = L : (xi ), for i = 1, ..., n. Then each ai is also a lex-segment ideal in R. Proof. Let m′ ∈ ai be a monomial, for any i = 1, ..., n. Let m be a monomial in R and deg m = deg m′ and m >glex m′ . Then xi m′ ∈ L as ai = L : (xi ), and xi m >glex xi m′ . This implies xi m ∈ L and hence m ∈ L : (xi ) = ai .  Let u be a monomial in R = k[x1 , .., xn ], we define m(u) to be the largest index i such that xi divides u. Recall that a monomial ideal I is said to be stable if, for every monomial u ∈ G(I) and all i < m(u), xi u/xm(u) is also in G(I). Next we quote a proposition from [7]. Proposition 2.6. (Eliahou-Kervaire formula) Let I ⊂ R be a stable ideal. Then  P m(u)−1 (a) βi,i+j (I) = , i u∈G(I)j (b) proj dim R/I = max{m(u) : u ∈ G(I)}, (c) reg (I) = max{deg (u) : u ∈ G(I)}. BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 5 From now on, we always assume n = 3, that is, R = k[x, y, z] unless otherwise is stated. We follow with a lemma that indicates the relation between the minimal generators of ideals L = xa + J, a = L : x and J. Then the next lemma provide a crucial short exact sequence of these ideals. Lemma 2.7. If L is lex-segment ideal in R, then there are unique monomial ideals a ⊂ R and J ⊂ k[y, z] such that L = xa + J. Moreover, the ideal a is also a lex-segment ideal since a = L : (x) and J is stable in R, and G(L) = xG(a) ∪ G(J). Proof. The proof follows immediately from the fact that L is a lex-segment ideal with graded lex order x > y > z.  Lemma 2.8. Let 0 → F1 → F0 → J and 0 → G2 → G1 → G0 → a be graded free resolutions for the ideals J and a. If L = xa + J, then there is a short exact sequence 0 → J(−1) → a(−1) ⊕ J → L → 0. Moreover, 0 → G2 (−1) ⊕ F1 (−1) → G1 (−1) ⊕ F1 ⊕ F0 (−1) → G0 (−1) ⊕ F0 → L is the graded minimal free resolution of L. Proof. The form of the lex-segment ideal L implies the short exact sequence 0 → J(−1) → a(−1) ⊕ J → L → 0. The mapping cone for the short exact sequence provides a free resolution for L. Let m ∈ G(a) ∩ G(J). Then m ∈ G(J) implies either m = ym′ or m = zm′ for some monomial m′ ∈ k[y, z]. As L is a lex-segment ideal and m ∈ L, xm′ ∈ G(L). So m′ ∈ G(a). Therefore m is divisible by m′ and m cannot be a minimal generator of a. Therefore the ideals J and a do not have common minimal generators. This tells us that there is no cancellation in the mapping cone structure. So the resulting graded free resolution for L is minimal.  We now analyze the Betti numbers of the ideals L, a = L : (x) and J. We know that the lex-segment ideals L and a are stable and in addition to this, J is a lex ideal in k[y, z]. Thus, Eliahou-Kervaire formula gives rise to the following decomposition, βi,i+j (L) = P u∈G(L)j m(u)−1 i  X m(u) − 1 + i = u∈G(L)j x|u | {z = βi,i+j−1 (a) } X m(u) − 1 i u∈G(L)j x∤u | {z say Di,i+j We name the initial degree of J, Gmin (J) := k and the Betti numbers of β(a) and β(J) as } ai,i+j := βi,i+j (a), and ci,i+j := βi,i+j (J). The following lemmas provide some relations and identities about the Betti numbers of L, a. They help us to describe the entire Betti diagram of L with respect to the Betti numbers of a and J. Lemma 2.9. As L = xa + J in R = k[x, y, z], if Gmin (L) ≥ 2, then Gmin (L) = Gmin (a) + 1 by stability of the ideals L and a = L : (x) 6= 1. Lemma 2.10. The Eliahou-Kervaire formula gives the following identities for the Betti numbers of the J • c0,k = c1,k+1 + 1, • c0,j = c1,j+1 for all j ≥ k + 1, • if c0,k = k + 1 then c1,k+1 = k and ci,i+j = 0 for all i = 0, 1 and j ≥ k + 1. We know that βi,i+j (L) = ai,i+j−1 + Di,i+j . Thus, it follows that ( 0, when j ≤ k − 1, Di,i+j = βi,i+j (J, x), when j ≥ k. That is, D0,j = c0,j , D1,j+1 = c0,j + c1,j+1 , and D2,j+2 = c1,j+1 . 6 SEMA GÜNTÜRKÜN Lemma 2.11. Gmin (J) ≥ Gmax (a) + 1 where J 6= 0. Proof. Say Gmax (a) = t. Suppose k = Gmin (J) < t, then y k ∈ G(L)k . So, by lex-order, all monomials u of degree k divisible by x are in L. Thus, u is in the form xi y j z s where i ≥ 1, i + j + s = k. As Gmax (a) = t > k, there is a minimal generator v ∈ L of degree t + 1 such that x|v. Therefore, v can be written as v = w1 · w2 where w1 and w2 are two monomials such that deg w1 = k and w2 is not divisible by x and deg w2 = t − k + 1. Since all degree k monomials divisible by x are in L, w1 is in L and so v cannot be a minimal generator. Thus k ≥ t. Now, we need to show that the equality is not possible, i.e. k = t is not possible. We prove this by contradiction. To this end, suppose k = t. So y k is a minimal generator in L and since t = k we can find at least one minimal generator u of a with degree k. Then xu becomes a minimal generator in L of degree k + 1. As all monomials v of degree k divisible by x are in L then there is a monomial w such that v = xw and w|u. This contradicts that u is a minimal generator of a. Hence k 6= t. i.e. k ≥ t + 1  Suppose Betti diagrams for a and J are β(a) 1 2 .. . 0 a0,1 a0,2 .. . 1 a1,2 a1,2 .. . 2 a2,3 a2,4 .. . and k − 1 a0,k−1 a1,k a2,k+1 β(J) k k+1 .. . 0 c0,k c0,k+1 .. . 1 c0,k − 1 c0,k+1 , .. . Gmax (J) c0,Gmax (J) c0,Gmax (J) TABLE 1. The Betti diagrams of a and J. Therefore the short exact sequence in Lemma 2.8 together with all other Lemmas 2.7, 2.9 and 2.11 we discuss in this section yield that the Betti diagram for L has the following form: β(L) 2 3 .. . 0 a0,1 a0,2 .. . k−1 k k+1 .. . 1 a1,2 a1,2 .. . 2 a2,3 a2,4 .. . a0,k−2 a1,k−1 a2,k a0,k−1 + c0,k a1,k + 2c0,k − 1 a2,k+1 + c0,k − 1 c0,k+1 2c0,k+1 c0,k+1 .. .. .. . . . Gmax (L) = Gmax (J) c0,Gmax (L) 2c0,Gmax (L) c0,Gmax (L) TABLE 2. The Betti diagram of L If the Betti diagrams of the ideals a and J “overlap” then they do only at the k th row of the β(L) as in the above diagram. In other words, the Betti numbers of β(L) in the kth row may be expressed in terms of both the Betti numbers of β(a) and β(J) in their k − 1th and first row, respectively. 3. T HE B OIJ -S ÖDERBERG D ECOMPOSITIONS OF L AND L : (x) In this section we prove Theorem 1.1. Let d0 < d1 < ... < di < ... < dt be the BS chain of all length 3 top degree sequences for a = L : (x). Suppose the chain of the first t + 1 top degree sequences of the BS decomposition of the Betti diagram of L is d̄0 < d̄1 < ... < d̄i < ... < d̄t . Then d̄i = di + 1 = (di0 + 1, di1 + 1, di2 + 1) for all i = 0, 1, ..., t with exactly the same coefficients, except possibly the coefficient of πd̄t . BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 7 Recall that, for a given top degree sequence d = (d0 , d1 , d2 ), the “normalized” pure diagram πd can be obtained as  if i + j 6= di  0 ! 2 2 Q Q βi,i+j (πd ) = 1  |di − dr |, i = 0, 1, 2 . if i + j = di , where λ = lcm λ |di −dr | r=0,r6=i r=0,r6=i Thus, this formula provides pure diagrams with integer entries. From now on, pure diagrams have integer entries. Let d0 = (d00 , d01 , d02 ) be the top degree sequence for the Betti diagram of a. if d02 < k +1, that is, d00 < d01 < d02 < k + 1, so d00 < k − 1 then we see that βi,i+j (a) = βi,i+j+1 (L) for all j = 0, 1, ..., k − 2 as in the table 2. This essentially follows from the fact that the Betti diagrams of a and J may only overlap on the k-th row in the Betti diagram of L. As L = xa + J and degree shift due to multiplication by x the top degree sequence of β(L) will be d0 + 1. Thus β(L) − α0 πd0 +1 becomes the first step of the BS-decomposition of β(L). In fact, we could repeat this process for all degree sequence ds such that ds2 < k + 1. Suppose ds2 < k + 1 for s = 0, 1, ..., l − 1 and ds2 ≤ k + 1 for s ≥ l for some l > 0. So we assume that the next degree sequence after dl−1 is dl = (dl0 , dl1 , dl2 = k + 1). Therefore, after l steps in the decomposing both β(a) and β(L), we would get the remaining diagrams β(a) − l−1 X αs πds =: β̃(a) and β(L) − l−1 X αs πds +1 =: β̃(L). s=0 s=0 Let dl = (dl0 , dl1 , dl2 ) be the next top degree sequence of the Betti diagram for a and dl2 = k + 1 so above paragraph shows that dl + 1 becomes the next top degree sequence of Betti diagram for L. Then the remaining diagram after the first l steps of the BS decompositions for both a and L look like as following, β(a) − l−1 P s=0 αs πds β̃(a) 0 1 2 dl0 β̃0,dl0 (a) .. .. .. .. . . . . = dl1 − 1 a0,dl1 −1 β̃1,dl1 (a) .. .. .. .. . . . . dl2 − 2 = k − 1 a0,dl2 −2 a1,dl2 −1 a2,dl2 TABLE 3. Remaining diagram after l steps for β(a) and similarly, β(L) − l−1 P s=0 αs πds +1 β̃(L) dl0 + 1 .. . dl1 = .. . dl2 − 1 = k dl2 .. . 0 β̃0,dl0 +1 (L) .. . a0,dl1 −1 .. . a0,dl2 −2 + c0,dl2 −1 c0,dl2 .. . 1 .. . β̃1,dl1 +1 (L) .. . a1,dl2 −1 + c0,dl2 −1 + c1,dl2 c0,dl2 + c1,dl2 +1 .. . TABLE 4. Remaining diagram after l step for β(L). 2 .. . .. . β̃2,dl2 +1 (L) c1,dl2 +1 .. . 8 SEMA GÜNTÜRKÜN By construction of β(L), we deduce that β̃0,dl +1 (L) = β̃0,dl (a) as dl0 + 1 < k, 0 0 β̃1,dl +1 (L) = β̃1,dl (a) as dl1 < k, and 1 1 β̃2,dl +1 (L) = a2,dl + c1,dl as dl2 − 1 = k. 2 2 2 The algorithm 2.1 exposes the coefficient of the pure diagram πdl to be (3.1) αl = min ( β̃0,dl (a) β̃1,dl (a) a2,dl 2 1 0 , , β0,dl (πdl ) β1,dl (πdl ) β2,dl (πdl ) 0 1 2 ) . and similarly for the BS-decomposition of β(L) there is a rational number α̃l as the coefficient of the pure diagram πdl +1 such that (3.2) α̃l = min ( β̃0,dl (a) 0 β̃1,dl (a) 1 a2,dl + c1,dl 2 , , β0,dl (πdl ) β1,dl (πdl ) β2,dl (πdl ) 0 1 2 2 ) Hence we just need to look at the k-th row of the Betti diagram of L if β(a) and β(L) overlap. Thus, we only need to think about the top degree sequences ds of length 3 of β(a) such that ds2 = k + 1. Case 1: Let a2,k+1 be eliminated in the (l + 1)-th step of the decomposition algorithm of β(a). In l+1 other words, dl = (dl0 , dl1 , dl2 ) is of length 3, whereas dl+1 = (dl+1 0 , d1 ) has length 2. It shows that 0 1 i l d < d < ... < d < ... < d are all length 3 degree sequences in the decomposition of β(a). Hence, BS decomposition of β(a) is β(a) = l X αs πds + [all pure diagrams of length less than 3]. s=0 Recall that we only focus on the degree sequences of length three. Since the length of dl+1 is two, we do not need to pay attention to the (l + 2)-th step in the decomposition. Besides that the table 4 already shows that dl + 1 is top degree sequence of the remaining diagram of L, β̃(L). Therefore, the first (l + 1)-th top degree sequences of Boij-Söderberg decomposition of β(L) is d0 + 1 < d1 + 1 < ... < dl + 1 where the coefficients α̃i = αi for i = 0, 1, ..., l − 1. Case 2: Suppose that a2,k+1 is not eliminated in the (l + 1)-th step of the decomposition of β(a). Moreover we assume that it will vanish in the (t + 1)-th step for some t > l. That is, the chain of the degree sequences in the BS decomposition of β(a) is d0 < d1 < ... < dl < ... < dt < ... < dn where • for s = 0, 1, ..., l − 1, ds = (ds0 , ds1 , ds2 ) has length 3 such that ds2 < k + 1, • for s = l, ..., t, ds = (ds0 , ds1 , ds2 ) has length 3 such that ds2 = k + 1, • for s = t + 1, ..., n, ds = (ds0 , ds1 ) has length 2. As the entries only above the (k − 1)-th row are eliminated until the (t + 1)-th step of the decomposition, it is easy to observe the remaining diagram of L. In table 2, we have seen that the entries of both β(a) and β(L) above the k-th row are the same. Therefore, the remaining diagram of β(a) after subtracting the first t pure diagrams is BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS β(a) − t−1 P αs πds s=0 where β̃i,dti (a) = βi,dti (a) − t−1 P s=0 β̃(a) 0 t d0 β̃0,dt0 (a) .. .. . . = dt1 − 1 a0,dt1 −1 .. .. . . dt2 − 2 = k − 1 a0,dt2 −2 1 .. . β̃1,dt1 (a) .. . a1,dt2 −1 9 2 .. . .. . β̃2,dt2 (a) αs βi,dti (πds ), for i = 0, 1, 2. Furthermore, as in (3.1) and (3.2), we have similar relations between the coefficients in both BS decomposition of β(a) and β(L) during their first t steps. The coefficients of the pure diagrams πds in the decomposition of β(a) for s = l, ..., t − 1 is ) ( β̃i,dsi (a) , for i = 0, 1, 2 . αs = min βi,dsi (πds ) Similarly, the corresponding coefficient α˜s of the pure diagram πds +1 in the decomposition of β(L) becomes ( ) β̃i,dsi +1 (L) α˜s = min , for i = 0, 1, 2 βi,dsi +1 (πds +1 ) ) ( β̃1,ds1 (a) β̃2,ds2 (a) + c1,ds2 β̃0,ds0 (a) . , , = min β0,ds0 (πds ) β1,ds1 (πds ) β2,ds2 (πds ) We assume that any of the entries of the corresponding to dsi for i = 0, 1 is eliminated where s = l, .., t − 1. Thus β̃2,ds2 (a) αs < , where ds2 = k + 1. β2,k+1 (πds ) So it follows that β̃2,ds2 (a) + c1,k+1 β̃2,ds2 (a) < . β2,k+1 (πds ) β2,k+1 (πds ) Hence α̃s = αs for s = l, ..., t − 1. However, this equality may not be true for the coefficients αt and α̃t since β̃2,dt2 (a) will be eliminated in the next step. So αt ≤ α̃t . Hence the remaining diagram of β(L) is β̃(L) := β(L) − t−1 P s=0 αs πds +1 = dt0 + 1 .. . dt1 .. . dt2 − 1 = k k+1 .. . 0 β̃0,dt0 +1 (L) .. . a0,dt1 −1 .. . a0,dt2 −2 + c0,dt2 −1 c0,k+1 .. . 1 .. . β̃1,dt1 +1 (L) .. . a1,dt2 −1 + c0,dt2 −1 + c1,dt2 c0,k+1 + c1,k+2 .. . 2 .. . .. . β̃2,dt2 (L) c1,k+2 .. . where β̃0,dt0 +1 (L) = β̃0,dt0 (a) as dt0 + 1 < k, β̃1,dt1 +1 (L) = β̃1,dt1 (a) as dt1 < k, and β2,dt2 +1 (L) = β̃2,dt2 (a) + c1,dt2 as dt2 − 1 = k. This will bring us back to Case 1; dt = (dt0 , dt1 , dt2 ) is the last top degree sequence of length 3 in the BS decomposition of β(a). The remaining diagram above clearly shows us that dt + 1 = (dt0 + 1, dt1 + 1, dt2 + 1) shows up as a degree sequence in the BS decomposition of β(L) in the next step. As a summary, if d0 < d1 < ... < dt is the chain of the all top degree sequences of length 3 in the BS-decomposition of β(a) with coefficients αs for s = 0, 1, .., t. Then d0 + 1 < d1 + 1 < ... < 10 SEMA GÜNTÜRKÜN dt + 1 becomes the first t top degree sequences of length 3 in the BS-decomposition of β(L) with α̃s = αs if s < t and α̃t ≥ αt . Hence we have shown that the ”beginnings“ of the chain of the degree sequences in the BS decompositions of β(L) = xa + J and β(a) are identical. We believe that there is a analogous result for a lex-ideal in k[x1 , ..., xn ]. Remark 3.3. Let L = (x1 )a + J in R = k[x1 , x2 , ..., xn ] be a lex-segment ideal, then a is also lexsegment ideal in R and J turns out to be a stable ideal of codim n − 1 in k[x2 , ..., xn ]. Suppose Fn−1 − →··· − → Fi − →··· − → F1 − →J − →0 Gn − →··· − → Gi − →··· − → G1 − →a − →0 are the minimal free resolutions of J and a, respectively. We get the same short exact sequence in Lemma 2.8, then by mapping cone we have the following minimal free resolution for L 0 → Gn (−1) ⊕ Fn−1 (−1) → ... → G2 (−1) ⊕ F2 ⊕ F1 (−1) → G1 (−1) ⊕ F1 → L. So it yields βi,i+j (L) =   βi,i+j−1(a)  βi,i+j−1(a) + where i = 0, 1, ..., n − 1 and i + j < Gmin (J), i P βt,j+t (J) where i = 0, 1, ..., n − 1 and i + j ≥ Gmin (J). t=i−1 By using lex-order properties of L and a, as we did in case n = 3, we conclude that the Betti diagrams of a and J either overlap only on the Gmin (J)-th row of the Betti diagram of L or do not overlap at all. Identify k := Gmin (J). Therefore, the Betti diagram of L in k[x1 , ..., xn ] is β(L) 2 3 .. . 0 a0,1 a0,2 .. . 1 a1,2 a1,3 .. . 2 a2,3 a2,4 .. . k−1 k k+1 .. . a0,k−2 a0,k−1 + c0,k c0,k+1 .. . a1,k−1 a1,k + c0,k + c1,k+1 c0,k+1 + c1,k+2 .. . a2,k a2,k+1 + c1,k+1 + c2,k+2 c1,k+2 + c2,k+3 .. . Gmax (L) = Gmax (J) c0,Gmax (L) ... ... ... n-1 an−1,n an−1,n+1 .. . ... ... an−1,k+n−3 ... an−1,k+n−2 + cn−1,k+n−1 ... cn−1,k+n−1 .. ... . c0,Gmax (L) + c1,Gmax (L)+1 c1,Gmax (L)+1 + c2,Gmax (L)+2 ... cn−1,Gmax (L)+n−1 TABLE 5. Betti diagram of L in k[x1 , ..., xn ] Henceforth, proof of Theorem 1.1 can be easily modified for the polynomial ring of n variables. Corollary 3.4. Let L = (x1 )a + J in R = k[x1 , x2 , ..., xn ] be a lex-segment ideal. If πd0 < πd1 < ... < πdt are all pure diagrams of length n in the BS decomposition of a, where di = (di0 , di1 , ..., din−1 ) for i = 0, 1, ..., t. Then the chain of pure diagrams πd̄0 < πd̄1 < ... < πd̄t appears in the beginning of the BS decomposition of L such that d̄i = di + 1 = (di0 + 1, di1 + 1, .., din−1 + 1). BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 4. T HE B OIJ -S ÖDERBERG D ECOMPOSITION FOR 11 L AND (L, x) In Theorem 1.1, we have showed that if πdi , a type-di = (di0 , di1 , di2 ) pure diagram, appears as a summand in the BS decomposition of β(a) then, π(d+1)i for (d + 1)i = (di0 + 1, di1 + 1, di2 + 1) show up as the i-th summand of the BS decomposition of β(L), with the same BS coefficient possible except for the last one. In this section, we now consider the end of the BS decomposition of L in R = k[x, y, z] and show that all degree sequences of length less than 3 in the decomposition of β(L, x) = β(J, x) occurs precisely as all degree sequences of length less that 3 in the decomposition for L. We prove our claim for all Artinian lex-segment ideals L = a(x) + J except the ones of the form L = x(x, y, z t ) + J where J is different that (y, z)Gmin (J) and 1 < t < k − 1. The main idea of proof is induction whose base step also requires some tedious case analyzing of the decompositions of both β(L) and β(L, x). Then finally schemes of case analyzing help us to demonstrate how all degree sequences of length less than 3 for both L and (L, x) coincide entirely with their coefficients. Furthermore, we conjecture that the statement of the Theorem 1.2 is also true for L = x(x, y, z t ) + J, whereas proof of that situation requires a case analyzing which becomes infeasible. 4.1. Decomposing the Betti diagram of (L, x). First we observe that the same pure diagrams πd , for all d of length less than 3, as in the decomposition of the Betti diagram of L. To show this, it suffices to check on the remaining diagrams after several steps of the decomposition algorithm for (L, x). We also notice that, for all i > k, i-th row of the Betti diagram of (L, x) has the form |c0,i , 2c0,i+1 c0,i | where c0,i < k. Say Gmax (L, x) = Gmax (L) = Gmax (J) =: n. Assume k = Gmin (J) > 2 and n ≥ k + 1. Then the Betti diagram of the lex ideal (L, x) is 0 1 − .. . 1 2 .. . β(L, x) = k − 1 − k c0,k k + 1 c0,k+1 .. .. . . n c0,n 1 − − .. . 2 − − .. . − 2c0,k − 1 2c0,k+1 .. . − c0,k − 1 c0,k+1 .. . 2c0,n c0,n First degree sequence is d̄0 = (1, k + 1, k + 2), then we have β(L, x) − γ0 πd̄0 where πd̄0 = 1 . . . k 0 1 . . . − 1 − . . . k+1 2 − . . . k and   2c0,k − 1 c0,k − 1 c0,k − 1 γ0 = min 1, , . = k+1 k k c −1 Notice that Artinian lex ideal property of L yields c0,k ≤ k + 1. Thus 0,kk ≤ 1. If c0,k = k + 1, i.e. Gmax (L) = k, then the BS decomposition of (L, x) becomes β(L, x) = (1)π(1,k+1,k+2) + (k)π(k,k+1) + (1)π(k) . If c0,k < k + 1, then c0,k −1 k < 1. Therefore, the remaining diagram after the first step becomes 12 SEMA GÜNTÜRKÜN 0 .. . c0,k − 1 k .. . k c0,k k+1 .. . n c0,k+1 .. . c0,n 1 β(L, x) − γ0 πd̄0 = 1− 1 2 - - .. . (k − 1)c0,k + 1 k 2c0,k+1 .. . 2c0,n .. . c0,k+1 .. . c0,n Then the next pure diagram is πd̄1 = 1 . . . k k+1 0 2 . . . − − 1 − . . . k+2 − 2 − . . . − k d̄1 = (1, k + 1, k + 3). for The coefficient for πd̄1 is γ1 = min  1 c0,k − 1 c0,k (k − 1) + 1 c0,k+1 − , , 2 2k k(k + 2) k  . Case I: Let γ1 = 1 c0,k − 1 − . 2 2k This is implied by the following inequalities; k + 1 ≤ c0,k and 2c0,k+1 + c0,k > k + 1. 3 Thus the algorithm eliminates the entry β0,1 (L, x)and the remaining diagram is     c0,k − 1 1 c0,k − 1 − π(1,k+1,k+2) − π(1,k+1,k+3) β(L, x) − k 2 2k 0 k c0,k = k+1 c 0,k+1 .. . n Next if d̄2 .. . c0,n 1 3c0,k − k − 3 2 2 − 1 c0,k − 1 ) c0,k+1 − k( − 2 2k .. . 2c0,k+1 .. . 2c0,n c0,n = (k, k + 1, k + 3) and then the coefficient of the pure diagram π(k,k+1,k+3) becomes   k + 1 − c0,k c0,k 3c0,k − k − 3 , , c0,k+1 − . γ2 = min 2 6 2 This creates two possible sub-cases and we observe the remaining diagrams for each case; 3(c0,k−1 ) − k which is a result of k3 < c0,k+1 , then we obtain Case I.1: If γ2 = 6 0 k β(L, x) − γ0 πd̄0 − γ1 πd̄1 − γ2 πd̄2 = k + 1 .. . n k 3 +1 c0,k+1 1 - .. . 2c0,k+1 .. . c0,n 2c0,n 2 c0,k+1 − .. . c0,n k 3 BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS k+1−c0,k 2 Case I.2: If γ2 = c0,k+1 − as c0,k+1 < β(L, x) − γ0 πd̄0 − γ1 πd̄1 − γ2 πd̄2 k 3 13 , then 0 k k + 1 − 2c0,k k+1 c0,k+1 = k+2 c0,k+2 .. .. . . n c0,n 1 k − 3c0,k+1 2c0,k+1 2c0,k+2 .. . 2 c0,k+2 .. . 2c0,n c0,n Case II: Let γ1 = c0,k (k − 1) + 1 , k(k + 2) because k + 1 > c0,k and (k − 1)c0,k + 1 < (k + 2)c0,k+1 . 3 Then the algorithm gives β(L, x) −  c0,k − 1 k  π(1,k+1,k+2) −  c0,k (k − 1) + 1 k(k + 2)  π(1,k+1,k+3) 1 2 - - .. . k 0 k − 3(c0,k − 1) 1− k+2 .. . c0,k .. . - k+1 c0,k+1 2c0,k+1 .. . n .. . .. . 2c0,n .. . (k − 1)c0,k + 1 c0,k+1 − k+2 .. . c0,n 1 = c0,n The next top degree sequence is d̄2 = (1, k + 2, k + 3) and its coefficient is n k − 3(c − 1) 2c (k − 1)c0,k + 1 o 0,k+1 c0,k+1 0,k . , , − γ2 = min k+2 k+2 k+1 (k + 1)(k + 2) Therefore, it splits into two sub-cases : Case II.1: γ2 = β(L, x) − k − 3(c0,k − 1 as k + 2 < c0,k+1 + 2c0,k . Then k+2 2 P i=0 γi πd̄i k k + 1 = .. . n 0 c0,k c0,k+1 .. . c0,n 1 2 2c0,k+1 − k + 3(c0,k − 1) c0,k+1 + 2c0,k − (k + 2) .. .. . . 2c0,n c0,n d̄3 The next degree sequence is = (k, k + 2, k + 3) and its coefficient is n 2 k 1 k + 2o γ3 = min c0,k , c0,k+1 − + c0,k − 1, co,k+1 + c0,k − . 3 3 2 2 If c0,k < 12 co,k+1 + c0,k − k+2 2 , then it implies k + 2 < c0,k+1 which is not possible. Thus the coefficient must be c0,k+1 (k − 1)c0,k γ3 = − 1(k + 1)(k + 2). k+1 + Then the remaining diagram looks like 14 SEMA GÜNTÜRKÜN 0 β(L, x) − 3 P k+2−c0,k+1 2 k γi πd̄i = k + 1 c0,k+1 .. . .. . n i=0 c0,n 1 - 2 .. . c0,k+1 +k 2 .. . 2c0,n c0,n c0,k+1 (k − 1)c0,k + 1 − , then the algorithm k+1 (k + 1)(k + 2) ≥ 1. So this case does not exist if the maximum degree is k + 1. Suppose Case II.2: Note that if Gmax (L, x) = k + 1 and γ2 = contradicts the assumption c0,k Gmax (L, x) > k + 1, so γ2 = c0,k+1 (k − 1)c0,k + 1 − if 2c0,k + c0,k+1 < k + 2. k+1 (k + 1)(k + 2) Then the remaining diagram is 0 β(L, x) − 2 P γi πd̄i i=0 1 1− .. . k = k+1 k+2 .. . n c0,k+1 c0,k+2 .. . kc0,k+1 +(k−1)c0,k +1 k+1 2 .. . - 2c0,k+2 .. . c0,k+2 .. . c0,n 2c0,n c0,n (2c0,k +c0,k+1 )−1 k+1 .. . c0,k 1 .. . - The top degree sequence of the remaining diagrams is (1, k + 2, k + 4) and its coefficient is γ3 = min n1 2 − 2c0,k + c0,k+1 − 1 kc0,k+1 + (k − 1)c0,k + 1 c0,k+2 o . , , 2(k + 1) (k + 1)(k + 3) k+1 Next we observe each possible sub-cases for γ3 . 1 2c0,k + c0,k+1 − 1 Case II.2.a : If γ3 = − as a result of 2 2(k + 1) k + 4 < 3c0,k+1 + 4c0,k and k + 2 < 2c0,k + c0,k+1 + 2c0,k+2 . Then we get the remaining diagram 0 β(L, x) − 3 P i=0 γi πd̄i k k+1 = k+2 .. . n c0,k c0,k+1 c0,k+2 .. . c0,n 1 - 2 - 3c0,k+1 +4c0,k −(k+4) 2 2c0,k+2 .. . c0,k+2 − 2c0,n c0,k+1+2c0,k −1 2 − .. . k+1 2 c0,n In this case, we would like to continue to decompose one more step. The coefficient of the pure diagram π(k,k+2,k+4) comes from n 3c0,k+1 + 4c0,k − (k + 4) c0,k+1 + 2c0,k − 2 − k o γ4 = min c0,k , . , c0,k+2 + 4 2 (a1): If γ4 = co,k , that is, k+4 < c0,k+1 and k + 2 < c0,k+1 + 2c0,k+2 3 So the remaining diagram becomes BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 4 P β(L, x) − γi πd̄i i=0 (a2): If γ4 = k+1 = k+2 .. . n 0 1 c0,k+1 c0,k+2 .. . 3c0,k+1 −(k+4) 2 c0,n 2c0,n 2c0,k+2 .. . 15 2 c0,k+2 − k+2−c0,k+1 2 .. . c0,n 3c0,k+1 + 4c0,k − (k + 4) , which is forced by 4 k+4 > c0,k+1 and c0,k+1 + k < 4c0,k+2. 3 Then 0 β(L, x) − 4 P γi πd̄i i=0 k k+1 = k+2 .. . k+4−3c0,k+1 4 c0,k+1 1 - c0,k+2 .. . 2c0,k+2 .. . 2 k+c0,k+1 c0,k+2 − 4 .. . c0,n 2c0,n c0,n n (a3): If γ4 = c0,k+2 + c0,k+1 + 2c0,k − 2 − k , which is caused by 2 2c0,k+2 + c0,k+1 < k + 2 and 4c0,k+2 < k + c0,k+1 . Then the remaining diagram becomes 0 β(L, x) − 4 P γi πd̄i i=0 k k+1 = k+2 k+3 .. . c0,k+1 c0,k+2 c0,k+3 .. . c0,k+1 −4c0,k+2 +k 2 2c0,k+2 2 - 2c0,k+3 .. . c0,k+3 .. . c0,n 2c0,n c0,n k+2−2c0,k+2 −c0,k+1 2 n Case II.2.b : If γ3 = 1 - kc0,k+1 + (k − 1)c0,k + 1 because of the following inequalities (k + 1)(k + 3) 3c0,k+1 + 4c0,k < k + 4 and kc0,k+1 + (k − 1)c0,k + 1 < (k + 3)c0,k+2 . Thus, the remaining diagram is β(L, x) − 3 X γi πd̄i i=0 0 1 .. . k = k+1 k+2 .. . n (k+1)(k+2)−2c0,k (2k+1)+3c0,k+1 (k−1) (k+1)(k+2) Case II.2.c : If γ3 = .. . c0,k c0,k+1 c0,k+2 .. . c0,n 1 .. . - 2 .. . - 2c0,k+2 .. . 2c0,n (k+3)c0,k+2 −kc0,k+1 −(k−1)c0,k −1 k+3 .. . c0,n 1 2c0,k + c0,k+1 − 1 − as 2 2(k + 1) 2c0,k+2 + c0,k+1 + 2c0,k < k + 2 and (k + 3)c0,k+2 < kc0,k+1 + (k − 1)c0,k + 1. 16 SEMA GÜNTÜRKÜN Then β(L, x) − 2 X γi πd̄i i=0 0 1 = 2c0,k + c0,k+1 − 1 1− − k+1 . . . k c0,k k+1 c0,k+1 2c0,k+2 k+1 . . . 1 2 - - . . . - . . . - kc0,k+1 + (k − 1)c0,k + 1 − k+1 k+2 c0,k+2 2c0,k+2 k+3 . . . n c0,k+3 . . . c0,n 2c0,k+3 . . . 2c0,n (k+3)c0,k+2 k+1 c0,k+2 − (k+1)c0,k+2 k+1 =0 c0,k+3 . . . c0,n We notice that the pattern of the above remaining diagram is similar to the one in the beginning of the Case II.2. All possible top degree sequences (∗, ∗, k + 4) in Case II.2.a and Case II.2.b will be replaced by (∗, ∗, k + 5) in the next steps of Case II.2.c. Case III: If Gmax (L, x) = k + 1 then by Eliahou-Kervaire formula we get c0,k + c0,k+1 = k + 1 as c L is an Artinian lex segment ideal. Let γ1 = 0,k+1 k , then it requires that 2c0,k+1 + c0,k < k + 1 and so c0,k+1 < 1 which is a contradiction. Thus this case does not exits if the maximum degree is k + 1. Suppose that Gmax (L, x) > k + 1. Thus c0,k+1 γ1 = k since 2c0,k+1 + c0,k < k + 1 and (k + 2)c0,k+1 < (k − 1)c0,k + 1. Then the remaining diagram after subtracting two pure diagrams with corresponding coefficients is    c c0,k − 1 0,k+1 β(L, x) − π(1,k+1,k+3) = π(1,k+1,k+2) − k k .. . 0 k + 1 − (c0,k + 2co,k+1 ) k .. . k c0,k k+1 k+2 .. . n c0,k+1 c0,k+2 .. . c0,n 1 1 2 - - .. . (k − 1)c0,k + 1 − (k + 2)c0,k+1 k 2c0,k+1 2c0,k+2 .. . 2c0,n .. . c0,k+2 .. . c0,n Then the next top degree sequence is d̄2 = (1, k + 1, k + 4) and the coefficient   k + 1 − (c0,k + 2co,k+1 ) (k − 1)c0,k + 1 − (k + 2)c0,k+1 c0,k+2 γ2 = min , , . 3k k(k + 3) k Case III.1: Let γ2 = β(L, x) − 2 P i=0 k + 1 − (c0,k + 2co,k+1 ) . Then 3k γi πd̄i k k+1 = k+2 .. . n 0 c0,k c0,k+1 c0,k+2 .. . c0,n 1 2 - (4(c0,k −1)−(c0,k+1 +k) 3 2c0,k+1 2c0,k+2 .. . 2c0,n c0,k+2 − (k+1)−(2c0,k+1 +c0,k ) 3 .. . c0,n BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 17 Thus d̄3 = (k, k + 1, k + 4) and   c0,k (4(c0,k − 1) − (c0,k+1 + k) (k + 1) − (2c0,k+1 + c0,k ) γ3 = min , , c0,k+2 − . 3 12 3 We next observe one step more in the decomposition. So we get the following sub-cases sinceγ3 has two possible cases: c0,k , the remaining diagram turns into Case III.1.a: When γ3 = 3 0 β(L, x) − 3 P γi πd̄i i=0 k 1 k+1 = k+2 c0,k+2 .. .. . . n c0,n Case III.1.b: When γ3 = c0,k+2 − β(L, x) − 3 P γi πd̄i i=0 c +k + 0,k4 c0,k+1 2 P 3c0,k+1 −k 4 .. . c0,n 0 1 k k + 1 − (3c0,k+2 + 2c0,k+1 ) k − (4c0,k+2 + 3c0,k+1 ) k+1 c0,k+1 2c0,k+1 k + 2 c 2c 0,k+2 0,k+2 = k+3 c0,k+3 2c0,k+3 .. .. .. . . . c0,n 2c0,n 2 c0,k+3 .. . c0,n (k − 1)c0,k + 1 − (k + 2)c0,k+1 and then k(k + 3) γi πd̄i i=0 c0,k+2 + 2c0,n 0 β(L, x) − 2c0,k+1 2c0,k+2 .. . 2 - (k + 1) − (2c0,k+1 + c0,k ) , the remaining diagram has the form 3 n Case III.2: Let γ2 = 1 - 1 .. . k = k+1 k+2 .. . n 1 .. . - k+4−(c0,k +co,k+1 ) k+3 .. . c0,k c0,k+1 c0,k+2 .. . c0,n 2c0,k+1 2c0,k+2 .. . 2c0,n 2 .. . c0,k+2 − (k−1)c0,k +1−(k+2)c0,k+1 k+3 .. . c0,n c0,k+2 Case III.3: Let γ2 = and then k 0 1 .. . β(L, x) − 2 P i=0 γi πd̄i k = k+1 k+2 k+3 .. . n k+1−(c0,k +2co,k+1 +3c0,k+2 ) k .. . c0,k c0,k+1 c0,k+2 c0,k+3 .. . c0,n 1 .. . 2 .. . (k−1)c0,k +1−(k+2)c0,k+1 −(k+3)c0,k+2 k 2c0,k+1 - 2c0,k+2 2c0,k+3 .. . c0,k+3 .. . 2c0,n c0,n Hence we could pause the decomposing process since we have observed enough part of BS decomposition of the Betti diagram (L, x) so that we can compare each possible remaining diagram with the ones will be obtained from BS decompositon of the Betti diagram of L. We examine the BS decomposition of the lex ideal L. First of all, as a trivial case, we notice that if Gmin (L) = 1, then the statement is vacuously true since L = (L, x). 18 SEMA GÜNTÜRKÜN We next induct on the difference of the initial degrees Gmin (J) − Gmin (a) ≥ 1. Base Step: In this step, we show that the statement is true for the lex ideals L = xa+J when Gmin (J)− Gmin (a) = 1. That is, if Gmin (J) = k ≥ 2 then Gmin (a) = k − 1. So a = (x, y, z)k−1 since L is a lex ideal. To this end, we modify the Betti diagram of L in the table 2 to this particular lex ideal L; 0 1 2 k(k+1) k(k−1) k + c0,k (k − 1)(k + 1) + 2c0,k − 1 + c0,k − 1 2 2 k + 1 c 2c c 0,k+1 0,k+1 0,k+1 β(L) = .. .. .. .. . . . . n c0,n 2c0,n c0,n k(k − 1) + 2 c0,k − 1, respectively. Then d1 = (k, k + 1, k + 3) becomes the next degree sequence with the coefficient nk o α1 = min , c0,k+1 . 3 Now, analyze each possible cases for the next step in the decomposition. k (i) If α1 = < c0,k+1 then the remaining diagram of of β(L) after three steps becomes 3 0 1 2 k + 1 k 3 1 P k β(L) − αi πdi = k + 1 c0,k+1 2c0,k+1 c0,k+1 − 3 . . . . i=0 .. .. .. .. Obviously the first top degree sequence and its coefficient are d0 = (k, k+1, k+2) and α0 = n c0,n 2c0,n c0,n k k If c0,k > + 1 and 2c0,k+1 + c0,k > k + 1 as in the Case I of (L, x) and since α1 = < c0,k+1 this 3 3 remaining diagrams matches with the one in the Case I.1, β(L) − 1 X αi πdi = β(L, x) − 2 X γi πd̄i . i=0 i=0 Hence we are done as the BS decompositions for L and (L, x) have the same remaining diagram. Otherwise the BS decomposition of (L, x) results in either as in Case II or Case III, we keep decomposing the Betti diagram of L. The next degree sequence is d2 = (k, k + 2, k + 3) and the coefficient of π(k,k+2,k+3) is   2c0,k+1 c0,k+1 k k α2 = min + 1, , − . 3 3 2 6 As k 3 +1< c0,k+1 2 − k 6 implies k + 2 < c0,k+1 which is not possible. So α2 = c0,k+1 k − . 2 6 Therefore the remaining diagram is 0 β(L) − 2 P i=0 αi πdi k k+1 = k+2 .. . n If we have Case II for (L, x), which means k+2−c0,k+1 2 c0,k+1 c0,k+2 .. . c0,n 1 c0,k+1 +k 2 2c0,k+2 .. . 2c0,n 2 c0,k+2 .. . c0,n k + 1 > c0,k and (k − 1)c0,k + 1 < (k + 2)c0,k+1 3 BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 19 and also k + 2 < c0,k+1 + 2c0,k , so β(L) − 2 X αi πdi = β(L, x) − 3 X γi πei , as in Case II.1. i=0 i=0 If k + 2 > c0,k+1 + 2c0,k , which corresponds to Case II.2 for (L, x), again we move on to the next step. So d3 = (k, k + 2, k + 4) and then nk + 2 − c o 0,k+1 c0,k+1 + k α3 = min , , c0,k+2 . 2 4 This splits into three cases; 4 2 P P k+2−c0,k+1 πd3 = β(L, x) − γi πei , as in Case II.2.a1.. • β(L) − αi πdi − 2 • β(L) − • β(L) − i=0 2 P i=0 2 P i=0 αi πdi − c0,k+1 +k πd3 4 = β(L, x) − 4 P γi πei , as in Case II.2.a2.. i=0 αi πdi − c0,k+2 πd3 = β(L, x) − i=0 4 P γi πei , as in Case II.2.a3.. i=0 We might need to recall that Case II.2.a for (L, x) requires k + 4 < 3c0,k+1 + 4c0,k and k + 2 < 2c0,k + c0,k+1 + 2c0,k+2 . If k + 4 > 3c0,k+1 + 4c0,k as in Case II.2.b, it contradicts the first assumption k 3 < c0,k+1 . As Case II.2.c is a case similar to Case II.2, continuing the algorithm will leads us again the same remaining diagram as we have Case II.2.a. Thus, if either Case I or Case II holds for the decomposition of (L, x), we always end up with the same remaining diagrams, even with the ones having size 3. If the decomposition for (L, x) turns into the Case III, we get 2c0,k+1 + c0,k < k + 1 and (k + 2)c0,k+1 < (k − 1)c0,k + 1. On the other hand, by the assumption k3 < c0,k+1 , the former and the latter inequalities imply c0,k < k3 +1 and k3 + 1 < c0,k , respectively and we have a contradiction. Thus, this situation cannot come true at all. (ii) If α1 = c0,k+1 < k3 , and if the BS decomposition of (L, x) follows Case I then we have 0 1 2 k k + 1 − 2c0,k+1 k − 3c0,k+1 1 2 P k + 1 c 2c - = β(L, x) − P γi π i . 0,k+1 0,k+1 β(L) − αi πdi = d̄ .. .. .. .. i=0 i=0 . . . . n c0,n 2c0,n c0,n If the decomposition of (L, x) follows different path, the next degree sequence in the decomposition for L becomes d = (k, k + 1, k + 4) and the coefficient is   k + 1 − 2c0,k+1 k − 3c0,k+1 , , c0,k+2 . α2 = min 3 4 We move on the next sub-cases for each possibility for the coefficient α2 . k − 3c0,k+1 (ii.a) If α2 = thanks to the inequality 4 k < 3c0,k+1 + 4c0,k+2 , we have 0 β(L) − 2 P i=0 αi πdi k k+1 = k+2 .. . n k+4+c0,k+1 4 c0,k+1 1 - 2 - c0,k+2 .. . 2c0,k+1 2c0,k+2 .. . 4c0,k+2 +3c0,k+1 −k 4 c0,n 2c0,n c0,n .. . 20 SEMA GÜNTÜRKÜN If the algorithm follows through as in the Case III for the decomposition of (L, x), the relation k < 3c0,k+1 + 4c0,k+2 yields the same the remaining diagram. Hence β(L) − 2 X αi πdi = β(L, x) − 3 X γi πd̄i . i=0 i=0 If the Betti diagram of (L, x) is decomposed as in the Case II, we keep decomposing the Betti diagram of L and get three sub-cases for the next coefficient α3 = min nk + 4 + c 0,k+1 , c0,k+1 , 4c0,k+2 + 3c0,k+1 − k }. 4 4 k + 4 + c0,k+1 If α3 = , that is, 4 k + 4 < 3c0,k+1 and k + 2 < 2c0,k+2 + c0,k+1 then 0 1 2 3c0,k+1 −k−4 k + 1 c0,k+1 2 3 P k+2c0,k+1 2c0,k+2 c0,k+2− β(L) − αi πdi = k + 2 c0,k+2 2 i=0 .. .. .. .. . . . . n c0,n 2c0,n c0,n 4 P which is equal to β(L, x) − γi πd̄i since the same relations are also required for the Case i=0 II.2.a.1 for the decomposition of (L, x). If α3 = c0,k+1 , that is, the relations are 3c0,k+1 < k + 4 and k < 4c0,k+2 − c0,k+1 , then 0 β(L) − 3 P αi πdi i=0 k k+1 = k+2 .. . k+4−3c0,k+1 4 c0,k+1 1 - 2 - c0,k+2 .. . 2c0,k+2 .. . 4c0,k+2 −c0,k+1 −k 4 .. . n c0,n 2c0,n c0,n and it is the same remaining diagram as in Case II.2.a.2 for (L, x) because of the same required relations. 4c0,k+2 + 3c0,k+1 − k If α3 = , which is a consequence of the following inequalities 4 k + 2 < 2c0,k+2 + c0,k+1 and 4c0,k+2 − c0,k+1 < k. Then 0 β(L) − 3 P i=0 αi πdi k k+1 = k+2 k+3 .. . n = β(L, x) − 4 X i=0 c0,k+1 c0,k+2 c0,k+3 .. . c0,k+1 −4c0,k+2 +k 2 2c0,k+2 2 - 2c0,k+3 .. . c0,k+3 .. . c0,n 2c0,n c0,n k+2−(2c0,k+2 +c0,k+1 ) 2 1 - γi πd̄i as in Case II.2.a.3 for (L, x). BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 21 (ii.b) If α2 = c0,k+2 then the remaining diagram becomes 0 1 2 k k + 1 − 2c0,k+1 − 3c0,k+2 k − 3c0,k+1 − 4c0,k+2 k+1 c0,k+1 2c0,k+1 2 P k + 2 c 2c 0,k+2 0,k+2 β(L) − αi πdi = i=0 k+3 c0,k+3 2c0,k+3 c0,k+3 .. .. .. .. . . . . n c0,n 2c0,n c0,n The above diagram matches with remaining diagrams as in the Case III.1.b for the decomposition of (L, x) if (L, x) decomposes as in Case III. Now suppose that BS decomposition of β(L, x) after several steps ends up as in the Case II. We want to show that same remaining diagram occurs for L as well. If Gmax is not k + 3, we may have another case which gives us similar pattern like above diagram such as 2 P β(L) − αi πdi − c0,k+3 π(k,k+1,k+5) = i=0 0 1 2 k k + 1 − 2c0,k+1 − 3c0,k+2 − 4c0,k+3 k − 3c0,k+1 − 4c0,k+2 − 5c0,k+3 k+1 c0,k+1 2c0,k+1 k+2 c0,k+2 2c0,k+2 k+3 c0,k+3 2c0,k+3 k+3 c0,k+4 2c0,k+4 c0,k+4 .. .. .. .. . . . . n c0,n 2c0,n c0,n k − (3c0,k+1 + 4c0,k+2 ) Thus, assume the maximum degree is k+3. Therefore the next coefficient is α3 = 5 with the pure diagram πk,k+1,k+5. Then the remaining diagram turns into 0 β(L) − 3 P k αi πdi = k + 1 i=0 k+2 k+3 k+5+2c0,k+2 +c0,k+1 2 c0,k+1 c0,k+2 c0,k+3 1 2c0,k+1 2c0,k+2 2c0,k+3 2 5c0,k+3 +4c0,k+2 +3c0,k+1 −k 5 Also, we have assumed that the Betti diagram of (L, x) decomposes as in Case II. We notice that the entries of the remaining diagram is closely related to the one in Case II.2.a3. 0 β(L) − 3 P i=0 αi πdi k = k+1 k+2 k+3 k+2−2c0,k+2 −c0,k+1 2 c0,k+1 c0,k+2 c0,k+3 + 3D 1 c0,k+1 −4c0,k+2 +k 2 2c0,k+2 2c0,k+3 + 5D 2 c0,k+3 + 2D 4c0,k+2 +3c0,k+1 −k . 10 where D = Thus the next coefficient is   c0,k+1 − 4c0,k+2 + k c0,k+3 k + 2 − 2c0,k+2 − c0,k+1 + D, + D, +D α4 = min 6 10 2 which follows the same paths for the decomposition of (L, x) in Case II.2.a3. BS decompositions of β(L) and β(L, x) always come up with the same remaining diagrams after several steps of the decomposition. Moreover, we observe that they share not only the length two pure diagrams and their coefficients but also some length three pure diagrams. Hence, in every possible case we end up with the same remaining diagrams for both β(L) and β(L, x). In other words, the BS decompositions of L and (L, x) coincide precisely after several steps of the algorithm. Thus the statement holds for the case of Gmin (J) − Gmin (a) = 1. Induction Hypothesis: Let the statement be true for all lex ideals L = xa+J with Gmin (J)−Gmin (a) = 22 SEMA GÜNTÜRKÜN N ≥ 1. We need to show that it is also true for the lex ideals satisfying Gmin (J) − Gmin (a) = N + 1. To this end, we identify the initial degrees of J and a by Gmin (J) = k and Gmin (a) = m. Suppose that L = xa + J is a lex ideal such that k − m = N + 1. So k − m = N + 1 ≥ 2. We prove this into two cases. Case A: If y m ∈ / a. Since a is a lex ideal, we write a = xb + I. Then we notice that Gmin (I) 6= k. Otherwise it contradicts to y k ∈ G(J). Thus k Gmin (I) m as y m ∈ / a. Define ã ⊂ a as the ideal containing all monomials of a of degree greater or equal to m + 1 and note that ã is also a lex ideal with Gmin (ã) = m + 1. Define L̃ = xã + J and it is a lex ideal with Gmin (J) − Gmin (ã) = k − (m + 1) = k − m − 1 = N + 1 − 1 = N . Therefore, by the induction hypothesis, β(L̃) and β(L, x) have the same ends in their BS decompositions, i.e. same pure diagrams of length less than 3 with same coefficients, X X β(L̃) − α̃i πd̃i = β(L, x) − γi πdi . di , all length 3 degree sequences d̃i , all length 3 degree sequences ˜ It is easy to see that I˜ = I as y m ∈ On the other hand, ã can be decomposed as ã = xb̃ + I. / a and Gmin (b̃) = m. Clearly, Gmin (I) − Gmin (b̃) ≤ (k − 1) − m = N . Again by the induction hypothesis BS decompositions of β(ã) and β(I, x) have the same ends. Recall that a = xb + I, so we get Gmin (I) − Gmin (b) ≤ (k − 1) − (m − 1) = k − m = N + 1. Suppose that Gmin (I) − Gmin (b) < N + 1, then thanks to the induction hypothesis, BS decompositions of a and (I, x) have the same ends, so do a and ã. That is, X X D := β(a) − All length 3 pure diagrams = β(ã) − All length 3 pure diagrams. Also using the Theorem 1.1 BS decompositions for the ideals L and L̃ can be observed as; 0 β(L) = di X αi πdi + with l(di )=3 1 Remaining 2 .. . diagram, D k .. . βi,i+j (L, x), i ≥ k 2 and 0 β(L̃) = d̃i X with l(d̃i )=3 α̃i πd̃i + 1 Remaining 2 .. . diagram, D k .. . βi,i+j (L, x), i ≥ k 2 This shows that β(L) and β(L̃) have same ends and we also know that β(L̃) and β(L, x) have the same ends. Hence the statement is true. It remains to study when Gmin (I) − Gmin (b) = (k − 1) − (m − 1) = k − m = N + 1, which means Gmin (I) = k − 1. It follows from Gmin (J) = k that I = (y, z)k−1 . Then a = xb + I and b = xb + I where Gmin (I) − Gmin (b) ≥ (k − 2) − (m − 2) ≥ N + 1. If it is a strict inequality then applying the same process as we have done for L can be applied to a to prove the statement. If there is an equality, we end up with the same situation. L = xa + J where Gmin (J) = k, Gmin (a) = m and k − m = N + 1, and a = xb + I where I = (y, z)k−1 , Gmin (b) = m − 1, and b = xb + I where I = (y, z)k−2 , Gmin (b) = m − 2. We repeat this until we get c = x(x, y, z t−1 ) + K where K = (y, z)s , s = k − m + 1, 1 ≤ t ≤ k − m. For this form of the lex ideal, one can check the BS decomposition of the ideal c. BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS β(c) = 2 .. . 0 2 .. . 1 1 .. . 2 .. . t .. . 1 .. . 2 .. . 1 .. . 23 s s + 1 2s + 1 s 1 t = + + 1   2: t−1 t − t: − − 1   2: s−t+1 − − 1 − s −  s t: s: − − t−1   + 1 t + t−1 s  t: 1 − − + s : − s−t+2 s−t+1 2: 1 − − t : − t−1 t   2: 1 − − s: − s s−1      s s: 1 1 +1 s: 1 | {z } same end as in the decomposition of (L,x) Therefore the statement is true for the ideal c. So we may assume that, without loss of generality, a is in the form of c, i.e., Gmin (I) − Gmin (a) < N + 1. This observation completes the proof for Case I. Case B: Let y m ∈ a. (i) If m ∈ / 1; we write a = xb + I and Gmin (I) = m > 1. This implies that b = (x, y, z)m−1 . Consider ã = (a, x) = x(1)+I. Clearly ã = (ã, x), so the statement is trivially true for the ideal ã. Moreover, Gmin (I) − Gmin (a) = m − (m − 1) = 1. By the base case, the decompositions of β(a) and β(I, x) have the same ends. Hence, X X β(a) − all length 3 pure diagrams = β(I, x) − all length 3 pure diagrams X all length 3 pure diagrams. = β(ã) − Similar to the Case 1, consider the lex ideal L̃ = xã + J and y Gmin (ã) = y ∈ / ã. Thus by the result of the Case 1, the statement is true for L̃. We do exactly the same trick as in Case 1 to show that β(L) and β(L̃) have the same ends and it follows that the statement holds for L. (ii) If m = 1; that is, a = (x, y, z t ) where 1 ≤ t ≤ k − 1. In the Case 1 we have already shown that the BS decomposition of the β(L) satisfy the statement if L = x(x, y, z t ) + J where J = (y, z)k . Nevertheless, for more general stable ideal J ⊂ k[y, z] we have already assumed that L cannot be in that form in the statement. Conjecture 4.1. The statement of Theorem 1.2 holds for all Artinian lex-ideals in k[x, y, z]. Theorem 1.2 shows that the ends of the Boij-Söderbeg decompositions of L and (L, x) = (J, x) are exactly the same for all Artinian lex ideals L in R except the ones in the form of L = x(x, y, z t ) + J where J is different from (y, z)Gmin (J) and 1 < t < k −1. On the other hand, based on the computations we have done using the BoijSoederberg packages of the computer algebra software Macaulay2, see [11], we strongly believe that this result is also true for the lex ideals in that particular form. 5. F URTHER O BSERVATIONS AND E XAMPLES For an Artinian lex ideal L ⊂ k[x, y, z] of codimension 3, we have shown that the summands of length 3 pure diagrams of the Boij-Söderberg decomposition of a where a = L : (x), and the summands of pure diagrams of length less than 3 in the Boij-Söderberg decomposition of (L, x) appear in the decomposition 24 SEMA GÜNTÜRKÜN of the ideal L = a(x) + J in the beginning and in the end, respectively.       length 3 degree all length < 3 degree extra length 3 β(L) = sequences coming  + +  sequences coming  . degree sequences from a(−1) from (L, x) There might be also some other pure diagrams of length 3 other than the ones coming from the BS decomposition of a. However, how this middle part containing pure diagrams of length 3 comes out is not quite clear. One might ask whether or not the ideals b = L : (y) and c = L : (z) help to describe the middle part. In fact, examples show that there is a quite strong relation between them as well. Nevertheless, both the results obtained in sections 3 and 4 about β(a) and β(L, x) and the observations we discuss in this section about β(b) and β(c) provide a very close approximation for the BS chain of degree sequences for β(L). Either our observation in this section is not enough to cover the entire middle part of the decomposition of β(L) or the BS decompositions of b and c may give redundant degree sequences. Now in this section we illustrate the elation between the BS decompositions of the ideals b, c and L via examples. Example 5.1. Let L = (x2 , xy 2 , xyz, xz 2 , y 8 , y 7 z, y 6 z 2 , y 5 z 3 , y 4 z 4 , y 3 z 5 , y 2 z 6 , yz 7 , z 8 ) be a lex segment ideal in R. Then a = L : x = (x, y 2 , yz, z 2 ) is lex segment ideal such that L = xa + J where J = (y, z)8 is stable in R and lex segment in k[y, z]. Similarly the ideals b = L : y = (x2 , xy, xz, y 7 , y 6 z, y 5 z 2 , y 4 z 3 , y 3 z 4 , y 2 z 5 , yz 6 , z 7 ) = L : z = c are lex segment ideals such that L = yb + I = zc + K where I = (x2 , xz 2 , z 8 ) and K = (x2 , xy 2 , y 8 ). We construct similar short exact sequences like in Lemma 2.8 for the ideals b and c. Unlike the case for a, we might have cancellations in the mapping cone of the short exact sequences for ideals. It means we can have cancellations in the Betti diagram since the mapping cone structure may not yield the minimal free resolution. This situation causes different degree sequences that do not appear in BS decomposition of L. We first notice that b = c and find the BS decomposition of β(a) β(a) = (1)π(1,3,4) + [pure diags. of length < 3], Then we consider the short exact sequence for the ideals b and L = yb + I 0 − → I(−1) x   → − b(−1) ⊕ I x   R(−3) ⊕ R(−4) ⊕ R(−9) x   R(−2) ⊕ R4 (−3) ⊕ R9 (−8) x   0 R(−5) ⊕ R7 (−10) x   R(−5) ⊕ R(−10) x   R4 (−4) ⊕ R16 (−9) x   → − L x   R3 (−3) z }| { ✘✘ ⊕R9 (−8) R4✘ (−3) R(−2) ⊕ ✘ x   ✘ ⊕ R5 (−4) ⊕ R17 (−9) ✘✘ R(−3) ✘ x   R2 (−5) ⊕ R8 (−10) x   0 0 The mapping cone of the short exact sequence for ideals b and L (so the same for c and L = zc + K) ends up with “one” cancellation in the first degree. So we interpret this as ignoring one pure diagram → 0 − BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 25 at the beginning, which is the one corresponding to the degree sequence (2, 3, 4) at the beginning of the decomposition of β(b). Therefore, 8 1 ✘✘ β(b) = β(c) = ✘ (1)π ✘✘ (2,3,4) + ( )π(2,3,9) + ( )π(2,8,9) + [pure diags. length < 3]. 7 7 The pure diagrams of length less than 3 are coming from the ideal β(L, x) = [length 3 pure diags.] + (8)π(8,9) + (1)π(8) . Hence we claim that the summands (with coefficients) in the BS decomposition of β(L) are β(L) ≈ (1)π(2,4,5) +(α2 ) π(3,4,10) +(α3 ) π(3,9,10) + (8)π(8,9) + (1)π(8) , | {z } | {z } | {z } | {z } from a(−1) from b(−1) from b(−1) from (L,x) for some coefficients α2 , α3 in Q. Indeed, the BS decomposition of L is, 2 9 β(L) = (1)π(2,4,5) + ( )π(3,4,10) + ( )π(3,9,10) + (8)π(8,9) + (1)π(8) . 7 7 The impressive point of this example is that we are able to describe the entire BS chain of degree sequences of L from its the colon ideals a, b and the ideal (L, x). Example 5.2. This example shows that some different situations might occur other than the previous example. Let L = (x2 , xy 2 , xyz, xz 2 , y 4 , y 3 z, y 2 z 2 , yz 6 , z 9 ) be lex-segment ideal in R. Then a = L : x = (x, y 2 , yz, z 2 ), b = L : y = (x2 , xy, xz, y 3 , y 2 z, yz 2 , z 6 ) and c = L : (z) = (x2 , xy, xz, y 3 , y 2 z, yz 5 , z 8 ). We observe that one cancellation occurs in the mapping cone process of each ideal b and c. BS decompositions of a, b, c and (L, x) are β(a) = 1π(1,3,4) + [pure diags. of length < 3], 5 1 7 1 ✘✘ + π(2,3,5) + π(2,4,5) + π(2,4,8) + π β(b) = ✘ 1π✘ (2,3,4) 3 6 4 20 (3,4,8) 1 + π(3,7,8) + [pure diags. of length < 3], 10 1 1 1 1 1 ✘✘ + π(2,3,5) + π(2,4,5) + π(2,4,8) + β(c) = ✘ 1π✘ π(3,4,8) + π(3,7,8) (2,3,4) 3 3 2 10 10 3 1 + π(3,7,10) + π(3,9,10) + [pure diags. of length < 3] 14 42 and β(L, x) = [pure diags. of length 3] + 1π(4,10) + 1π(7,10) + 1π(9) . So, the BS decomposition for the ideal L is likely to be β(L) ≈ 1π(2,4,5) + α2 π(3,4,6) + α3 π(3,5,6) + α4 π(3,5,9) + α5 π(4,5,9) + α6 π(4,8,9) + α7 π(4,8,11) + α8 π(4,10,11) + 1π(4,10) + 1π(7,10) + 1π(9) where αi ∈ Q, i = 2, ...8. Thus it seems that we almost obtain the actual BS decomposition for L which is 2 2 + π(3,4,6) π(3,5,6) β(L) = 1π(2,4,5) + 3 3 | {z } | {z } | {z } from a(−1) from b(−1) and c(−1) from b(−1) and c(−1) 3 1 1 + + + π(3,5,9) π(4,5,9) π(4,8,9) 2 10 20 | {z } | {z } | {z } from b(−1) and c(−1) from b(−1) and c(−1) from b(−1) and c(−1) 1 + 1π(4,10) + 1π(7,10) + 1π(9) . + π 4 | (4,8,11) | {z } {z } from c(−1) from (L,x) 26 SEMA GÜNTÜRKÜN Apparently, the BS decomposition of c provides an additional pure diagram, π(4,10,11) , which does not appear in the BS decomposition of L. Nevertheless it still supports the idea of the covering up the middle part of the decomposition of β(L) by using decompositions of β(b) and β(c). Example 5.3. In the previous example we saw that our approximation for L gives a longer BS chain of the degree sequences than the actual BS chain of the degree sequences via the BS decomposition of the ideals a, b, c and (L, x). Consider the lex-segment ideal L = (x2 , xy, xz 2 , y 6 , y 5 z, y 4 z 3 , y 3 z 4 , y 2 z 5 , yz 6 , z 9 ) in R. Then the colon ideals are a = L : x = (x, y, z 2 ), b = L : y = (x, y 5 , y 4 z, y 3 z 3 , y 2 z 4 , yz 5 , z 6 ), and c = L : z = (x2 , xy, xz, y 5 , y 4 z 2 , y 3 z 3 , y 2 z 4 , yz 5 , z 8 ). The mapping cone for the ideal c requires two cancellations, so we ignore the first two degree sequences. Then, 1 1 β(a) = π(1,2,4) + π(1,3,4) + [pure diags. of length < 3], 3 3 1 9 2 1 β(b) = π(1,6,7) + π(1,6,8) + π(1,7,8) + π(5,7,8) + [pure diags. of length < 3], 5 35 7 2 19 1 1 1 ✟✟ 1 ✘ ✘ + π π(2,7,8) + π(2,7,10) + π(5,7,10) β(c) = ✘ 1π✘ ✟(2,3,8) + π(2,6,8) + (2,3,4) ✟ 6 3 30 15 3 + [pure diags. of length < 3], and 1 β(L, x) = [pure diags. length 3] + π(6,8) + 2π(7,8) + 2π(7,10) + 1π(9) . 2 Then, we get the following chain of degree sequences in order to set up the approximate BS decomposition for L β(L) ≈ (2, 3, 5) < (2, 4, 5) < (2, 7, 8) < (2, 7, 9) < (2, 8, 9) < (6, 8, 9) {z } | {z } | from a(−1) from b(−1) < (3, 7, 9) < (3, 8, 9) < (3, 8, 11) < (6, 8, 11) < (7, 9) < (8, 9) < (8, 11) < (10) . | {z } | {z } from c(−1) from (L,x) However, we know that the degree sequences in the decomposition must be a partial ordered chain, so the ones that violate the partial order are needed to be eliminated. From the decomposition of β(c), we get (3, 7, 9) as the first degree sequence, but (2, 8, 9) and (6, 8, 9) cannot be before (3, 7, 9). So we have to ignore the sequences (2, 8, 9) and (6, 8, 9). Then we get an approximate decomposition such as 1 1 β(L) ≈ π(2,3,5) + π(2,4,5) + α3 π(2,7,8) + α4 π(2,7,9) + α7 π(3,7,9) 3 3 1 1 + α8 π(3,8,9) + α9 π(3,8,11) + α10 π(6,8,11) + π(6,8) + π(7,9) 2 2 + 2π(8,9) + 2π(8,11) + 1π(10) . The BS decomposition of β(L) is 1 1 1 2 1 β(L) = π(2,3,5) + π(2,4,5) + π(2,4,8) + π(2,7,8) + π(2,7,9) 3 3 3 15 10 1 1 1 1 1 + π(3,7,9) + π(3,8,9) + π(6,8,11) + π(6,8) + π(7,9) 2 2 2 2 2 + 2π(8,9) + 2π(8,11) + 1π(10) . The degree sequence (3, 8, 11) associated with (2, 7, 10), which is coming from the decomposition of β(c), does not show up in the decomposition of β(L), similar to the situation in Example 5.2. Moreover, for this lex ideal L, we realize another different situation. The degree sequence (2, 4, 8) shows up in the BS chain of degree sequences of β(L), but (2 − 1, 4 − 1, 8 − 1) = (1, 3, 7) does not appear in any of the decompositions of β(a), β(b) and β(c). An explanation for that extra degree sequence (2, 4, 8) might be possible for this example. We see that (2, 4, 5) is the last degree sequence coming from a(−1) and the next degree sequence (2, 7, 8) is from b(−1). If we assume that there is no other degree sequence between (2, 4, 5) and (2, 7, 8), it implies BOIJ-SÖDERBERG DECOMPOSITIONS OF LEX-SEGMENT IDEALS 27 that simultaneous elimination of the entries in the positions of β1,4 and β2,5 in the Betti diagram of L by the algorithm of BS decomposition. However, this is not possible because otherwise there would not be a pure diagram of length 2 in the BS decomposition of a. Hence again by the partial order, it must be (2, 4, 5) < (2, 4, 8) < (2, 7, 8). Examples 5.2 and 5.3 show that the BS decompositions of a, b, c and (L, x) may not be enough to provide the entire chain of degree sequences in the BS decomposition of L. Therefore, it is possible that there are some gaps and redundant degree sequences in the approximation of BS chain of degree sequences of L. In view of the explanations, such as the cancellations in mapping cone, the necessity of the order of the chain of the degree sequences, we are able to provide the entire chain of degree sequences in the BS decomposition of L. Problem 5.4. Is it true that the the Boij-Söderberg decomposition of a lex ideal L can be described by the decompositions of its colon ideals a, b, c and (L, x) precisely. That is, in terms of all the pure diagrams and their coefficients? The relation between BS decompositions of a (Artinian) lex-segment ideal L and the lex ideals a = L : x and (L, x) is pointed out in Theorems 1.1 and 1.2. Furthermore, the examples we have observed in this section show that if we know the BS decompositions of the colon ideals b = L : y and c = L : z, then almost the entire BS chain of the degree sequences for the lex-segment ideal L may be revealed. In other words, we try formalize the full chain of degree sequences of the BS decomposition of the ideal L by using the BS chains of degree sequences of the colon ideals a,b, c and the lex ideal (L, x). Studying what the observations indicate is a further direction for our research on BS decomposition of lex-segment ideals. A natural follow-up work which aims to describe all BS coefficients of a lex ideal L in terms of the coefficients of its colon ideals a, b, c and the larger lex ideal (L, x) may arise at this point, i.e., we narrow our attention on the degree sequences, that is, pure diagrams. Although the results about a and (L, x) involve the coefficients as well, we do not have a foresight regarding a relation between the coefficients in the decompositions of b, c and L based on the observations mentioned in this section. ACKNOWLEDGMENT The author would like to thank to her Ph.D. adviser Uwe Nagel for proposing the problem about Boij-Söderberg decompositions of lex-segment ideals and his contributions and discussions during the course of preparing this manuscript. She would also like to thank Daniel Erman for introducing her to the Boij-Söderberg Theory during a 2011 Summer Graduate Workshop at MSRI. R EFERENCES [1] Christine Berkesch, Daniel Erman, Manoj Kummini, and Steven V. Sam. Poset structures in Boij-Söderberg theory. Int. Math. Res. Not. IMRN, (22):5132–5160, 2012. [2] Anna Maria Bigatti. Upper bounds for the Betti numbers of a given Hilbert function. Comm. Algebra, 21(7):2317–2334, 1993. [3] Mats Boij and Jonas Söderberg. Graded Betti numbers of Cohen-Macaulay modules and the multiplicity conjecture. J. Lond. Math. Soc. (2), 78(1):85–106, 2008. [4] Mats Boij and Jonas Söderberg. Betti numbers of graded modules and the multiplicity conjecture in the non-CohenMacaulay case. Algebra Number Theory, 6(3):437–454, 2012. [5] David Cook, II. The structure of the Boij-Söderberg posets. Proc. Amer. Math. Soc., 139(6):2009–2015, 2011. [6] David Eisenbud and Frank-Olaf Schreyer. Betti numbers of graded modules and cohomology of vector bundles. J. Amer. Math. Soc., 22(3):859–888, 2009. [7] Shalom Eliahou and Michel Kervaire. Minimal resolutions of some monomial ideals. J. Algebra, 129(1):1–25, 1990. [8] Gunnar Fløystad. Boij-Söderberg theory: introduction and survey. In Progress in commutative algebra 1, pages 1–54. de Gruyter, Berlin, 2012. [9] Chirstopher Francisco, Jeffrey Mermin, and Jay Scheweig. Boij-söderberg and veronese decompositions. https://math.okstate.edu/people/mermin/papers/Boij-Soderberg_and_Veronese_decompositions.pdf. [10] Courtney Gibbons, Jack Jeffries, Sarah Mayes, Claudiu Raicu, Branden Stone, and Bryan White. Non-simplicial decompositions of betti diagrams of complete intersections. arXiv:1301.3441. [11] Daniel R. Grayson and Michael E. Stillman. Macaulay2, a software system for research in algebraic geometry. http://www.math.uiuc.edu/Macaulay2/. 28 SEMA GÜNTÜRKÜN [12] J. Herzog and M. Kühl. On the Betti numbers of finite pure and linear resolutions. Comm. Algebra, 12(13-14):1627–1646, 1984. [13] Heather A. Hulett. Maximum Betti numbers of homogeneous ideals with a given Hilbert function. Comm. Algebra, 21(7):2335–2350, 1993. [14] Uwe Nagel and Stephen Sturgeon. Combinatorial interpretations of some Boij-Söderberg decompositions. J. Algebra, 381:54–72, 2013. [15] Keith Pardue. Deformation classes of graded modules and maximal Betti numbers. Illinois J. Math., 40(4):564–585, 1996. E-mail address: [email protected] D EPARTMENT OF M ATHEMATICS , U NIVERSITY MI 48109-1043, USA BOR , OF M ICHIGAN , 2074 E AST H ALL , 530 C HURCH S TREET A NN A R -
0math.AC
1 Offline signature authenticity verification through unambiguously connected skeleton segments arXiv:1711.03082v1 [cs.CV] 8 Nov 2017 Jugurta Montalvão, Luiz Miranda, and Jânio Canuto Abstract—A method for offline signature verification is presented in this paper. It is based on the segmentation of the signature skeleton (through standard image skeletonization) into unambiguous sequences of points, or unambiguously connected skeleton segments corresponding to vectorial representations of signature portions. These segments are assumed to be the fundamental carriers of useful information for authenticity verification, and are compactly encoded as sets of 9 scalars (4 sampled coordinates and 1 length measure). Thus signature authenticity is inferred through Euclidean distance based comparisons between pairs of such compact representations. The average performance of this method is evaluated through experiments with offline versions of signatures from the MCYT-100 database. For comparison purposes, three other approaches are applied to the same set of signatures, namely: (1) a straightforward approach based on Dynamic Time Warping distances between segments, (2) a published method by [18], also based on DTW, and (3) the average human performance under equivalent experimental protocol. Results suggest that if human performance is taken as a goal for automatic verification, then we should discard signature shape details to approach this goal. Moreover, our best result – close to human performance – was obtained by the simplest strategy, where equal weights were given to segment shape and length. Index Terms—Pseudo-online signatures, Skeletonization, Mean Opinion Score (MOS). I. I NTRODUCTION ANDWRITTEN signature is a form of personal identification widely accepted, both socially and legally, and it has been used for centuries to authenticate documents such as bank checks, letters, contracts and many other that require proof of authorship. By signing, a person may provide unique information regarding the way she or he converts gesture intentions into spontaneous hand movement. Writing speed, traversed path, pen tilt, pressure applied, all these data are articulated to result in a static figure on signed documents [12]. Signature analysis can be divided in two categories: offline and online. In the offline mode, either signatures are available through the traditional wet ink method (such as in paper documents), or they are available in scanned form, through optical devices, such as scanners and digital cameras. In both cases, all available data corresponds to static signature images. This type of approach is not the most efficient for verifying signatures due to the fact that relevant dynamic information is discarded. In the online mode, a person uses a digitizing device (e.g. digitizing tablets or touchsceen devices) to directly record signals from the hand movement. This provides much more information than a static image, for the digitizing device H typically can record several complementary signals, such as the path travelled by the pen tip, as well as its instantaneous speed, applied pressure and pen tilt. This approach is the one that dominates research on signature verification now, due to the worldwide spreading of affordable acquisition devices [15]. However, the offline approach still has some attractive aspects. For instance, even today, many contracts and credit card authorization are performed through traditional signatures on paper. Indeed, although online signature verification has higher reliability, in many practical situations, for economical or practical reasons, wet ink signatures are yet useful biometric signals. And even in the unlikely scenario of a complete substitution of wet ink signatures by electronically acquired ones, at least the task of signature verification from ancient ink on paper documents should remain a relevant topic, due to the large amount of old signed documents, whose authenticity are potentially waiting to be verified [16]. To give some fundamental definitions and jargon, we assume that a signature verification is a process that determines whether a tested signature was produced by a target individual, from which at least one genuine signature is available. If under some chosen criteria the tested signature is similar to the genuine references, below a pre-established similarity threshold, it is labelled true, or a genuine signature. Otherwise, the signature is labelled false, or a forgery. Moreover, Coetzer et al. [4] classify forgeries as • • • Random forgery: The forger does not know the author’s name neither the original signature. Thus the false signature is completely random. Simple forgery: The forger knows the author’s name, but she/he does not have access to the original signature. Skilled forgery: The forger has access to samples of genuine signatures, and also knows the name of the author. It can also be divided into two classes: Amateur and Professional. The Professional Skilled Forgery is produced by a person with professional expertise in handwriting analysis, being able to produce a higher quality forgery than the Amateur. In general, the offline signature verification process can be divided into four steps [1]: Acquisition, Preprocessing, Feature Extraction and Comparison. In the Preprocessing step, image quality is improved and pixels are transformed to reduce the computational burden of the subsequent steps. Examples of techniques applied in this step are: thinning, color conversion, noise reduction, smoothing, morphological operations and resizing. For instance, Shah et al. [17] cropped images to exclude redundant white regions. The Feature Extraction step is where 2 most works propose innovations. According to Batista et al. [2], an ideal feature extraction technique extracts a minimal feature set that maximizes interpersonal variability amongst signature samples from various subjects, whereas it minimizes intrapersonal variability amongst samples belonging to the same subject. Lee and Pan [10] divide the features into three classes: Global Features, Local Features and Geometrical Features. Typical features extracted from offline signatures are marginal projections. Shanker and Rajagopalan [18] extracts vertical projection of bitmaps corresponding to signatures, thus yielding profiles which are compared through Dynamic Time Warping (DTW). Likewise, Coetzer et al. [4] pushes a bit further the same idea, by using many marginal projections of the same signature, over different angles, what they call Discrete Radon Transform, whose behaviour is modelled with a Hidden Markov Model. Nguyen et al. [13] also use similar projections. Indeed, they use two techniques for global features extraction: the first is derived from the total energy a writer uses to create a signature, whereas the second technique employs information from the vertical and horizontal projections of a signature, focusing on the proportion of the distance between key strokes in the image, and the height/width of the signature. Although marginal projections are more commonly used in literature, straightforward approaches to feature extraction may also rely upon image skeletonization [7]. Typically, skeletonization is used to filter foreground pixels in bitmaps. But it can also be used to map offline signatures into sets of points, similar to online representations, which is appealing because online verification techniques may be deployed, such as the use of DTW to compare segments of points from different signatures. Indeed, this straightforward approach corresponds to the baseline method implemented in this paper, as explained in Section III. Once features are available, signature authenticity verification can be performed. To simulate actual verification, most academic works randomly select a small number of genuine signature samples from each user (typically from 5 to 15) to play the role of a set of enrolled signatures. Then, samples from the remaining dataset of false and genuine signatures are randomly taken to simulate verification attempts. These test samples are compared to the enrolled samples, and a decision is made. If a genuine signature is rejected, it is called a false rejection error. By contrast, if a forgery is accepted, it is called a false acceptance error. The experimental protocol for False Acceptance Rate (FAR) and False Rejection Rate (FRR) computation used in this work is explained in Section V. Furthermore, in this paper, we propose a method inspired by online approaches, through the compact codification of segments of skeletonized offline signatures, as explained in Section IV. These skeletonized segments are the basic aspect of this work, and they are detailed in Section II. Moreover, the segmentation used in this work induces a straightforward method similar to classical online verification strategies, through DTW. As for our experiments, we take into account that, in biometrics, comparing performances measures using different databases can be misleading, which we consider an important issue. Therefore, to allow a direct comparison under the same database and the same experimental protocol for all compared methods, we use the well-known MCYT-100 online signature database, where each online sample was converted to an offline (bitmap) representation, as explained in Section V, where comparative results are provided along with our experimental setup. It is worth noting that human baseline performance is presented for the same dataset, in the spirit of works such as [5] and [11]. Finally, in Section VI, we conclude by discussing our results and the usefulness of Mean Opinion Scores (MOS) as a potential goal to automatic verification performances. II. U NAMBIGUOUSLY CONNECTED SKELETON SEGMENTS Raw online signature signals are frequently represented by two vectors of samples: a sequence of regularly sampled horizontal positions, xON LI N E (n), and another sequence of corresponding vertical positions, yON LI N E (n), where n stands for sample counter through time. As compared to offline representation, signature verification through signals xON LI N E (n) and yON LI N E (n) is significantly better. Although we know that velocity information may not be completely recovered from offline representations, we address the offline signature verification problem by first recovering horizontal and vertical signals, which may be regarded as pseudo-versions of xON LI N E (n) and yON LI N E (n). This is done through standard skeletonization, as described in [7]. Unlike true online representations, skeletons from each signature are sets of unordered points. For instance, as in Figure 1, most offline signature skeletons can be regarded as sets of unordered pixels in a bitmap, even though some subsets of these pixels form segments that are clearly created in an unambiguous sequential hand gesture. Comparisons between online signatures are straightforward, because points (xON LI N E , yON LI N E ) are ordered through time. Analogously, the comparison between two offline signatures may also be done through the comparison of sequences of points (xOF F LI N E , yOF F LI N E ), representing black pixel coordinates in skeletons. However, ambiguities concerning the ordering of points turns this task into a combinatorial optimization problem whose computational cost may be prohibitive. To significantly reduce this cost, both methods proposed in this paper decompose offline signatures skeletons into Unambiguously Connected Skeleton Segments (UCSS), as illustrated in Figure 1. To define UCSS, an offline signature skeleton is regarded as connected graph G(V, E) where the vertices V are the points of the skeleton and the edges E are bidirectional connection between neighbouring points (8connected neighbourhood). We also consider that the degree of a vertex V is the number of neighbouring vertices that V is connected to. Therefore, each UCSS is a sequences of directly connected vertices found between: a) two vertices with degrees greater than 2 (internal segments), b) an one-degree vertex and a vertex with degree greater than 2 (extremities), or c) two one-degree vertices (isolated lines). 3 Fig. 1. (a) Inside the circles one finds the points of the skeleton that delimits UCSS. (b) Full skeleton as a set of extracted features(UCSS). We assume that each segment, sm,n,k , is a portion of signature where points are unambiguously ordered, apart from a single ambiguity in the overall direction of the pen movement (i.e. one does not know in what end of the UCSS the movement of the pen begins). Thus, the n-th signature sample, n = 1, 2, . . . , N, from the m-th signer, m = 1, 2, . . . , M is represented by a set {sm,n } = {sm,n,1, sm,n,2, . . . , sm,n,K }, where sm,n,k is the k-th UCSS, or a sequence of Lm,n,k pairs of coordinate points, (xi, yi ), 1 < i ≤ Lm,n,k . Moreover, to take into account the single ambiguity in the overall direction of the pen movement, each UCSS is represented twice: first with the sequence of pairs in a given order, sm,n,k = [(x1, y1 ), (x2, y2 ), . . . , (x Lm, n, k , y Lm, n, k )], ∗ and then in reversed order, sm,n,k = [(x Lm, n, k , y Lm, n, k ), (x Lm, n, k −1, y Lm, n, k −1 ), . . . , (x1, y1 )]. III. BASELINE M ETHOD Two methods for automatic offline signature verification are proposed in this paper. The first method is considered as a baseline, for it is a straightforward application of Dynamic Time Warping to compute distances between UCSS. In this method, the standard DTW method under Itakura’s restrictions [9] is applied to systematically compare every segment sm,n,k ∗ ) to every segments of a given bag of (and its reverse, sm,n,k segments, extracted from reference signatures. Consider, for instance, a test signature, {sm,t est } with Kt est UCSS, and a bag of segments, {B}, with KB UCSS (i.e. all segments, from all references, are merged into the single set {B}). Then, each UCSS in the test signature is compared to all KB UCSS from {B}, and the minimum distance is taken. In other words, each UCSS in a test signature is associated to the single UCSS in {B} which yields the minimum DTW distance. More precisely, Cm,t est (k, {B}) = 1 Lm,t est,k min DTW(sm,t est,k, sB, j ), j (1) and the average distance between sets {sm,t est } and {B} is given by C̄m,t est ({B}) = 1 Kt est KÕ t est Cm,t est (k; {B}) k=1 where DTW(sm,t est,k, sB, j ) stands for Dynamic Time Warping distance under Itakura’s restriction between sm,t est,k and sB, j , or its reversed version, s∗B, j , depending on which one yields the lowest distance. Moreover, k ∈ 1, 2, . . . , Kt est , j ∈ 1, 2, . . . , KB , and test is a pointer to a signature from the test set. Moreover, Lm,t est,k is the length (number of points) of the k-th UCSS, of the tested signature. In this work, we randomly take 5 genuine signatures from each individual as reference set, denoted as {sm,r e f1 },{sm,r e f2 },..., {sm,r e f5 }. Therefore, {B} is the union of all 5 references, namely: Ð Ð Ð {B} = {{sm,r e f1 } {sm,r e f2 } . . . {sm,r e f5 }}, and KB is the resulting cardinality of {B}. To provide a better score for tested signatures, we also define 5 partial bags of segments, {B}r e fi , where segments of the i-th reference signature are excluded from {B}. As a result, we are able to compute an average distance between each reference signature, {sm,r e fi }, and the corresponding remaining bag of segments, {B}r e fi , as follows C̄0 ({B}) = (1/5) 5 Õ C̄m,r e fi ({B}r e fi ). i=1 Finally, the total distance between a tested signature {sm,t est } and a genuine set of references, summarised by the bag of segments {B}, is defined as: Jm,r e f = C̄m,t est ({B}) , C̄0 ({B}) (2) where C̄0 ({B}) plays the role of a normalization score. An important drawback of this baseline method is the computation of more than KB × Kt est DTW distances in order to obtain a single score/cost for each tested signature, where KB is roughly 5 times the average number of segments (UCSS) in a genuine signature. As a consequence, this method has a high computational burden. IV. P ROPOSED METHOD WITH UCSS SUBSAMPLING To significantly alleviate the computational load of the baseline method, we encode each UCSS as an eight-dimensional (8D) vector that roughly represents the shape and the position of the encode UCSS, plus a scalar corresponding to the UCSS length (the length is given in terms of number of points in the UCSS), as illustrated in Figure 2. This UCSS encoding strategy is the main aspect of the proposed method. We assume that almost all UCSS are short enough to prevent strong warping, therefore, one may get rid of the high DTW computation cost by replacing each UCSS with 4 subsampled points. In other words, it is assumed that UCSS comparisons through DTW are almost equivalent to the much faster Euclidean distance computation between the corresponding 8D vectors (UCSS length is not taken into account when plain DTW is used). Indeed, a UCSS sm,n,k can be regarded as a composition of two sampled signals, say xn and yn , with n = 1, 2, . . . , LUCSS , and the proposed coding scheme just takes 4 equally spaced subsamples of xn and yn , thus yielding an 8-dimensional vector um,n,k . For practical purposes, we then assume that: DTW(sm,n,i , sm,n, j ) D2 (um,n,i , um,n, j ) ≈ , Lm,n,i 4 4 (ii) The oversampled set of points are numerically rounded to integer values, and (iii) they are also dilated until segments are approximately four pixels wide. These three steps are enough to convert the entire online data into offline signatures. Indeed, the resulting images are used in the Mean Opinion Score experiment detailed in Subsection V-A. As for the other experiments, another sequence of steps are still taken to convert offline signatures into pseudo-online ones, namely: (i) The standard skeletonization method described in [7] is applied to each dilated signature image. (ii) Resulting skeletons, or sets of 2D points from each signature sample are centered at the origin, whereas their variance in both vertical and horizontal directions are scaled to one. Fig. 2. Proposed method: illustration of 8D vectors and lengths of two segments (segments 10 and 17). Each segment (UCSS) is coded with 8+1 = 9 scalars. The last scalar represents the segment length. where D2 (um,n,i , um,n, j ) is the accumulated squared Euclidean distance between the 4 corresponding points in the two compared UCSS. We highlight that, as for the definition of function DTW, in Equation 1, D2 is also defined as the minimum of two distances, where both um,n, j and its reversed version, u∗m,n, j are considered. For the non-reversed um,n, j 8 Í only, we obtain D2 (um,n,i , um,n, j ) = (um,n,i (k) − um,n, j (k))2 . k=1 Therefore, the comparison between two signatures is significantly simplified through the use of the following distance, as compared to that in Equation 1: Cm,t est (k, {U}) = 1 min D2 (um,t est,k, uU, j ), 4 j (3) where {U} is the set of all 4-points segments from the reference signatures. Analogously, every subset {B}r e fi is replaced with {U}r e fi , and the final score/cost for a given signature can be computed as in Equation 2. V. E XPERIMENTAL R ESULTS In this work, we use the well-known MCYT-100 online signatures database, for which error rates (for online verification task) can be abundantly found in literature [6], [17], [8]. This database is a subcorpus of the MCYT database [14], acquired from M = 100 different writers. Each writer provided 25 genuine signatures, whereas 5 different volunteers provided 25 skilled forgeries per signature (N = 50). All signatures were acquired through a WACOM Intuos A6 USB Tablet at constant sampling rate of 100 Hz. To obtain the offline signatures we need for our experiments, we first convert each MCYT online sample into an image where only horizontal (xON LI N E ) and vertical (yON LI N E ) pen tip positions through time are considered, as follows: (i) Points in each online signature are interpolated using splines to allow for oversampling of the otherwise sparse representation (due to the relatively low sampling rate of 100 samples per second). Fig. 3. (a) Online signature. (b) Oversampled online signature. (c) Dilated image – approximately four pixels wide lines. (d) Skeleton of the signature. From the resulting pseudo-online versions of the signatures, represented by a set of coordinate pairs, UCSS are extracted. It is noteworthy that the order in which these pairs are presented no longer stands for a discrete time counter, as in true online representation, for it now represents a mere skeleton point counter, whose correspondence to time ordering is unknown. In all experiments, to simulate an actual biometric system, we randomly choose 5 genuine signatures from the database to form the enrolment card. Afterwards, the other signatures of the same user are randomly sampled and compared with those into the enrolment card. Given a decision threshold, the proportion of true signatures whose costs are above this threshold (thus wrongly rejected as not genuine) is the estimated FRR, whereas the proportion of false signatures whose distances are below the threshold is the estimated FAR. We also compared the computational burden of the two proposed methods to process and compare one enrolment card, with 5 genuine samples per signature, and to compute scores for all 20 + 25 = 45 remaining signature samples per reference. The processing time for the baseline method was thousands times greater than that for the proposed method with UCSS subsampling. Surprisingly, the lighter method yielded a significantly better performance, as presented in Figure 4. An interesting by-product of both methods is that after two UCSS are associated (according either to Equation 1 or to Equation 3), instead of comparing their shapes, one may just 5 compare their lengths, thus yielding a new score corresponding to the absolute difference of associated lengths. This can be regarded as a third method, here referred to as the length based one, in Figure 4 and Table 1. TABLE I R ESULTS FOR EACH METHOD AFTER 50 INDEPENDENT RUNS . E ACH RUN CORRESPONDS TO A RANDOM PARTITION OF 5 REFERENCE AND 10 TEST SIGNATURES (5 GENUINE ONES ). Method I-Baseline II- Method by [18] III-Length based IV- Shape based (proposed) V-Fusion (mean) of scores from III and IV EER 32.2 % 36.7 % 25.1 % 19.4 % std. dev. 1.4 % 0.6 % 1.2 % 1.3 % 18.7 % 1.0 % A. Mean Opinion Score Extraction Protocol Fig. 4. ROC curves for all tested methods. In this set of experiments, we use 5 randomly chosen reference signatures to simulate enrolment, and a pool of 20 remaining genuine signatures, along with 25 false ones to test the simulated system. A black dot also indicates the MOS performance, as explained in Subsection V-A, for a subjective decision threshold that cannot be handled to yield a ROC. To provide a wider comparison scenario for the proposed methods based on UCSS, we also included in the comparison experiments the method published by [18], which extracts projections of bitmaps corresponding to signatures, and compare them through a modified DTW, where so called stability measures are included to improve performances. We reproduced the best implementation of their method (as explained in their paper), and we applied it to the the same offline signatures we used to test our methods, under the same experimental protocol. We highlight that although the method by [18] was implemented and revised to strictly follow their instructions, we only apply it to the database of pseudo-offline signatures, as illustrated in Figure 3. Moreover, instead of 10 reference genuine signatures, as in [18], we use 5 ones to assure the same protocol to all compared methods. In a second round of experiments, we repeated 50 times, for each method, the following protocol: 5 genuine signatures were randomly chosen as references (enrolment), whereas a set of 10 (5 from the remaining genuine signatures, plus 5 randomly chosen false ones) were used to test the simulated system. For each independent trial, we adjusted the threshold decision to obtain the operational point where FAR equals FRR, the Equal Error Rate (EER). Table 1 presents all average results per method, in terms of EER and its standard deviation over the 50 independent trials. In both sets of experiments, scores of the methods III and IV are also fused through simple arithmetic mean, yielding an improved performance, as shown in Figure 4 and Table 1. To quantify the human performance for the same task, we also prepared 239 two-page cards, each one corresponding to a genuine source of signatures – a genuine signer – in the MCYT database. These cards contain five genuine signatures on its left side, and ten signatures randomly chosen in its right side. Only 5 out of the 10 signatures on the right side are genuines. An example of these cards can be seen in Figure 5. These cards were presented to different students and lecturers in our university (willing volunteers), and these volunteers were carefully instructed to study the genuine signatures presented on the left part of the page, and then to label all signatures on the right part, by writing in the boxes next to each signature a T, for true (genuine), or a F, for false. No further a priori was provided. We highlight that the volunteers did not know the proportions of true and false signatures in each card. Fig. 5. (a) Reference panel with five randomly chosen genuine signatures (b) Panel with five randomly chosen forgeries and five randomly chosen genuine signatures. A total of 239 cards were filled by 103 volunteers, and after comparing all provided labels to the true hidden labels, the estimated Mean Opinion Score (MOS) obtained was consolidated as: • • 25.6% of False Rejection Rate and 11.0% of False Acceptance Rate. The dot in Figure 4 allows the visual comparison between the rates FAR and FRR from MOS (to which the decision threshold cannot be known or handled) and the ROC curves 6 from the automatic methods, for a range of possible decision thresholds. VI. C ONCLUSION This brief work was inspired by the evident superiority of online signature verification methods, as compared to offline ones. Therefore all methods proposed here are based on skeletonization, possibly the most straightforward method to obtain pseudo-online signature representations from images. The baseline method cross-compares all unambiguously connected sequences of points from skeletons, where the conception of a Unambiguously Connected Skeleton Segment (UCSS - whose formal definition was given in Section II) plays a pivotal role. By assuming that UCSS shapes and position are relevant information for biometric verification, we should expect that the systematic cross-comparison of UCSS, through DTW, would yield the best performance, at a high computational cost. However, it was noticed instead that the alternative method initially proposed to alleviate the high computational burden of the baseline method – by considering only 4 points per UCSS – yielded a significantly better performance, as compared to the baseline method. Moreover, even the very simple byproduct method based on the comparison between UCSS lengths performed better than the baseline method. Indeed, the baseline method only outperformed the method by [18], which uses an improved DTW, but relies upon marginal projections of signatures instead of segments like the UCSS proposed in this work. From these results, we conjecture that, in average, UCSS is a good segmentation option, but UCSS shape details are not relevant information carriers for the biometric verification purpose. Indeed, given the comparative performances, we should even conclude that UCSS shape details are disturbing noises, for biometric verification task. This point is an interesting matter for future works. Regarding the by-product method based on UCSS length, it is noteworthy that the use of either DTW or Euclidean distance to match UCSS is a necessary step. In other words, behind the apparent simplicity of this method, one should be aware that the matching of UCSS is a not so simple step of it, which also rises interesting questions. For instance, the superiority of the joint approach – where UCSS shape and length are combined – may have a connection to the lost signal of pen tip velocity, which in turn is the main signal for biometric verification in [3]. Indeed, UCSS shape (straightness) and length are expected to be somehow dependent on pen tip velocity, either through two-thirds power law, or through isochrony [19], and this dependency is also an attractive subject for further works. For now, in this letter, we just conjecture that the fusion of length and shape based scores is somehow related to inferred velocity signal, given a signature image, which may explain its relatively good performance. Clearly, even the best performance presented here is far from performances typically found in literature for online verification, with the same database in its original (online) form. By contrast, in this work we assume that, for the offline verification task, the best possible performances are not far from what a crowd of willing and attentive humans can do. Therefore, we choose to use a MOS-based rate as basis for comparison, and it indicates that the best performances we obtained are indeed close to that of a crowd of humans. Nonetheless, further experiments using actual offline signature databases and other competing methods are intended to be done in the sequel of this work. ACKNOWLEDGMENT This work was supported by grant from the Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) to J.M. R EFERENCES [1] Y. M. Al-Omari, S. N. H. S. Abdullah, and K. Omar, “State-of-the-art in offline signature verification system,” in Pattern Analysis and Intelligent Robotics (ICPAIR), 2011 International Conference on, vol. 1. IEEE, 2011, pp. 59–64. [2] L. Batista, D. Rivard, R. Sabourin, E. Granger, and P. Maupin, “State of the art in off-line signature verification,” Pattern Recognition Technologies and Applications: Recent Advances, pp. 39–62, 2008. [3] J. Canuto, B. Dorizzi, J. Montalvão, and L. Matos, “On the infinite clipping of handwritten signatures,” Pattern Recogn. Lett., vol. 79, no. C, pp. 38–43, Aug. 2016. [4] J. Coetzer, B. M. Herbst, and J. A. du Preez, “Offline signature verification using the discrete radon transform and a hidden markov model,” EURASIP Journal on Advances in Signal Processing, vol. 2004, no. 4, pp. 1–13, 2004. [5] J. Coetzer, B. Herbst, and J. Du Preez, “Off-line signature verification: a comparison between human and machine performance,” in Tenth International Workshop on Frontiers in Handwriting Recognition. Suvisoft, 2006. [6] M. A. Ferrer, J. F. Vargas, A. Morales, and A. Ordóñez, “Robustness of offline signature verification based on gray level features,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 966–977, 2012. [7] R. C. Gonzalez and R. E. Woods, “Image processing,” Digital image processing, vol. 2, 2007. [8] L. G. Hafemann, R. Sabourin, and L. S. Oliveira, “Offline handwritten signature verification-literature review,” arXiv preprint arXiv:1507.07909, 2015. [9] F. Itakura, “Minimum prediction residual principle applied to speech recognition,” IEEE Transactions on Acoustics, Speech, and Signal Processing, vol. 23, no. 1, pp. 67–72, 1975. [10] S. Lee and J. C. Pan, “Offline tracing and representation of signatures,” Systems, Man and Cybernetics, IEEE Transactions on, vol. 22, no. 4, pp. 755–771, 1992. [11] D. Morocho, A. Morales, J. Fierrez, and R. Tolosana, “Signature recognition: establishing human baseline performance via crowdsourcing,” in 2016 4th International Conference on Biometrics and Forensics (IWBF). IEEE, 2016, pp. 1–6. [12] E. Nel, J. A. du Preez, and B. M. Herbst, “Estimating the pen trajectories of multi-path static scripts using hidden markov models,” in Document Analysis and Recognition, 2005. Proceedings. Eighth International Conference on. IEEE, 2005, pp. 41–45. [13] V. Nguyen, M. Blumenstein, and G. Leedham, “Global features for the off-line signature verification problem,” in 2009 10th International Conference on Document Analysis and Recognition. IEEE, 2009, pp. 1300–1304. [14] J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. FaundezZanuy, V. Espinosa, A. Satue, I. Hernaez, J.-J. Igarza, C. Vivaracho et al., “Mcyt baseline corpus: a bimodal biometric database,” IEE ProceedingsVision, Image and Signal Processing, vol. 150, no. 6, pp. 395–401, 2003. [15] R. Plamondon and S. N. Srihari, “Online and off-line handwriting recognition: a comprehensive survey,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 22, no. 1, pp. 63–84, 2000. [16] Y. Qiao, M. Nishiara, and M. Yasuhara, “A framework toward restoration of writing order from single-stroked handwriting image,” IEEE transactions on pattern analysis and machine intelligence, vol. 28, no. 11, pp. 1724–1737, 2006. 7 [17] A. S. Shah, M. Khan, F. Subhan, M. Fayaz, and A. Shah, “An offline signature verification technique using pixels intensity levels,” International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 9, no. 8, pp. 205–222, 2016. [18] A. P. Shanker and A. Rajagopalan, “Off-line signature verification using dtw,” Pattern recognition letters, vol. 28, no. 12, pp. 1407–1414, 2007. [19] P. Viviani and T. Flash, “Minimum-jerk, two-thirds power law, and isochrony: converging approaches to movement planning.,” Journal of Experimental Psychology: Human Perception and Performance, vol. 21, no. 1, pp. 32–53, 1995.
1cs.CV
JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Difficulty Adjustable and Scalable Constrained Multi-objective Test Problem Toolkit arXiv:1612.07603v2 [cs.NE] 16 Sep 2017 Zhun Fan, Senior Member, IEEE, Wenji Li, Xinye Cai, Hui Li, Caimin Wei, Qingfu Zhang, Fellow, IEEE, Kalyanmoy Deb, Fellow, IEEE, and Erik D. Goodman Abstract—Multi-objective evolutionary algorithms (MOEAs) have achieved great progress in recent decades, but most of them are designed to solve unconstrained multi-objective optimization problems. In fact, many real-world multi-objective problems usually contain a number of constraints. To promote the research of constrained multi-objective optimization, we first propose three primary types of difficulty, which reflect the challenges in the real-world optimization problems, to characterize the constraint functions in CMOPs, including feasibility-hardness, convergencehardness and diversity-hardness. We then develop a general toolkit to construct difficulty adjustable and scalable constrained multi-objective optimization problems (CMOPs) with three types of parameterized constraint functions according to the proposed three primary types of difficulty. In fact, combination of the three primary constraint functions with different parameters can lead to construct a large variety of CMOPs, whose difficulty can be uniquely defined by a triplet with each of its parameter specifying the level of each primary difficulty type respectively. Furthermore, the number of objectives in this toolkit are able to scale to more than two. Based on this toolkit, we suggest nine difficulty adjustable and scalable CMOPs named DAS-CMOP1-9. To evaluate the proposed test problems, two popular CMOEAs - MOEA/D-CDP and NSGA-II-CDP are adopted to test their performances on DAS-CMOP1-9 with different difficulty triplets. The experiment results demonstrate that none of them can solve these problems efficiently, which stimulate us to develop new constrained MOEAs to solve the suggested DAS-CMOPs. Index Terms—Constrained problems, multi-objective optimization, test problems, controlled difficulties. I. I NTRODUCTION RACTICAL optimization problems usually involve simultaneous optimization of multiple and conflicting objectives with many constraints. Without loss of generality, constrained multi-objective optimization problems (CMOPs) can be defined as follows: P minimize F(x) = ( f1 (x), . . . , fm (x))T subject to (1) gi (x) ≥ 0, i = 1, . . . , q h j (x) = 0, j = 1, . . . , p x ∈ Rn where F(x) = ( f1 (x), f2 (x), . . . , fm (x))T ∈ Rm is a mdimensional objective vector, gi (x) ≥ 0 defines i-th of q inequality constraints, h j (x) = 0 defines j-th of q equality constraints. If m is greater than three, we usually call it a constrained many-objective optimization problem (CMaOP). A solution x is said to be feasible if it meets gi (x) ≥ 0, i = 1, . . . , q and h j (x) = 0, j = 1, . . . , p at the same time. For two feasible solutions x1 and x2 , solution x1 is said to dominate x2 if fi (x1 ) ≤ fi (x2 ) for each i ∈ {1, . . . , m} and f j (x1 ) < f j (x2 ) for at least one j ∈ {1, . . . , m}, denoted as x1  x2 . For a feasible solution x∗ ∈ Rn , if there is no other feasible solution x ∈ Rn dominating x∗ , x∗ is said to be a feasible Pareto-optimal solution. The set of all the feasible Pareto-optimal solutions is called Pareto Set (PS). Mapping the PS into the objective space results in a set of objective vectors, denoted as the Pareto Front (PF), where PF = {F(x) ∈ Rm |x ∈ PS}. For CMOPs, more than one objective need to be optimized simultaneously subject to constraints. Generally speaking, CMOPs are much more difficult to solve than their unconstrained counterparts - unconstrained multi-objective optimization problems (MOPs). Constrained multi-objective evolutionary algorithms (CMOEAs) are particularly designed to solve CMOPs, with the capability of balancing the search between the feasible and infeasible regions in the search space [1]. In fact, two basic issues need to be considered carefully when designing a CMOEA. One is to balance the feasible solutions and the infeasible solutions, the other is to balance the convergence and diversity of a CMOEA. To address the former issue, constraint handling mechanisms need to be carefully designed by researchers. The existing constraint handling methods can be broadly classified into five different types, including feasibility maintenance, use of penalty functions, separation of constraint violation and objective values, multi-objective constraint handling and hybrid methods [2]. The feasibility maintenance methods usually adopt special encoding and decoding techniques to guarantee that a newly generated solution is feasible. The penalty function-based method is one of the most popular approaches. The overall constraints violation is added to each objective with a predefined penalty factor, which indicates a preference between the constraints and the objectives. The penalty function-based method includes static penalties [3], dynamic penalties [4], death penalty functions [3], co-evolutionary penalty functions [5], adaptive penalty functions [6]–[8] and self-adaptive penalty functions [9], [10] etc. In the methods using separation of constraint violation and objective values, the constraint functions and the objective functions are treated separately. Variants of this type include stochastic ranking (SR) [11], constraint dominance principle (CDP) [12], epsilon-constrained methods [13], [14]. In the multi-objective constraint handling method, the constraint functions are transformed to one extra objective function. Representative methods of this type include infeasibility driven evolutionary algorithm (IDEA) [15], JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 COMOGA [16] and Cai and Wang’s Method (CW) [17], etc. The hybrid methods of constraint handling usually adopt several constraint-handling methods. Representative methods include adaptive trade-off model (ATM) [18] and ensemble of constraint handling methods (ECHM) [19]. To address the second issue, the selection methods need to be designed to balance the performance of convergence and diversity in MOEAs. At present, MOEAs can be generally classified into three categories based on the selection strategies. They are Pareto-dominance (e.g., NSGA-II [20], PAES-II [21] and SPEA-II [22]), decomposition-based (e.g., MOEA/D [23], MOEA/D-DE [24], MOEA/D-M2M [25] and EAGMOEA/D [26]) and indicator based methods (e.g., IBEA [27], R2-IBEA [28], SMS-EMOA [29] and HypE [30]). In the group of Pareto-dominance based methods, such as NSGA-II [20], the set of the first non-dominated level solutions is selected to improve the performance of convergence, and the crowding distance is adopted to maintain the performance of diversity. In the decomposition-based methods, the performance of convergence is maintained by minimizing the aggregation functions and the performance of diversity is obtained by setting the weight vectors uniformly. In the indicator based methods, such as HypE [30], the performance of convergence and diversity is achieved by the using the hypervolume metric. A CMOP includes objectives and constraints. A number of features have already been identified to define the difficulty of objectives, which include: 1) Geometry of PF (linear, convex, concave, degenerate, disconnected and mixed of them) 2) Search space (biased, or unbiased) 3) Unimodal or multi-modal objectives 4) Dimensionality of variable space and objective space The first one is the geometry of PF. The geometry of PF of a MOP can be linear, convex, concave, degenerate, disconnected and mixed of the them. Representative MOPs reflecting this type of difficulty include ZDT [31], F1-9 [32] and DTLZ [33]. The second one is the biased or unbiased search space. Representative MOPs in this category include MOP1-7 [34] and IMB1-14 [35]. The third one is the modality of objectives. The objectives of a MOP can be either uni-modal (DTLZ1 [33]) or multi-modal (F8 [32]). Objectives with multimodal have multiple local optimal solutions which increase the likelihood of an algorithm being trapped in local optima. The high dimensionality of variable space and objective space are also critical features to define the difficulty of objectives. LSMOP1-9 [36] have high dimensionality in the variable space. DTLZ [33] and WFG [37] have high dimensionality in the objective space. On the other hand, constraint functions in general greatly increase the difficulty of solving CMOPs. However, as far as we know, only several test suites (CTP [38], CF [39]) are designed for CMOPs. CTP test problems [38] are have the capability of adjusting the difficulty of the constraint functions. They offer two types of difficulties: the difficulty near the Pareto front and the difficulty in the entire search space. The test problem CTP1 gives the difficulty near the PF, because the constraint functions of CTP1 make the search region close to the Pareto front 2 infeasible. Test problems CTP2-CTP8 provide an optimizer the difficulty in the entire search space. CF test problems [39] are also commonly used benchmarks, which provide two types of difficulties. For CF1-CF3 and CF8CF10, their PFs are a part of their unconstrained PFs. The rest of CF test problems CF4-CF7 have difficulties near their PFs, and many constrained Pareto optimal points lie on some boundaries of the constraints. Even though CDP [38] and CF [39] offer the abovementioned advantages. They have some limitations: • • • • The number of decision variables in the constraint functions can not be extended. The difficulty level of each type is not adjustable. No constraint functions with low ratios of feasible regions in the entire search space are suggested. The number of objectives is not scalable. Some other used two-objective test problems, include BNH [40], TNK [41], SRN [42] and OSY [43] problems, which are not scalable to the number of objectives, and difficult to identify types of difficulties. In this paper, we propose a general framework to construct difficulty adjustable and objective scalable CMOPs which can overcome the limitations of existing CMOPs. CMOPs constructed by this toolkit can be classified into three major types, which are feasibility-hard, convergence-hard and diversityhard CMOPs. Feasibility-hard CMOP is a type of problem that presents difficulty for CMOEAs to find feasible solutions in the search space. CMOPs with feasibility-hardness usually have small portions of feasible regions in the entire search space. In addition, CMOPs with convergence-hardness mainly suggest difficulty for CMOEAs to approach the PFs efficiently by setting many obstacles before the PFs, while CMOPs with diversity-hardness mainly provide difficulty for CMOEAs to distribute their solutions along the complete PFs. In our work, the three types of difficulty are embedded into the CMOPs through proper construction of constraint functions. In summary, the contribution of this paper is as follows: 1) This paper defines three primary types of difficulty for constraints in CMOPs. When designing new constraint handling mechanisms for a CMOEA, one has to investigate the nature of constraints in a CMOP that the CMOEA is aiming to address, including the types and levels of difficulties embedded in the constraints. Therefore, a proper definition on the types of difficulty for constraints in CMOPs is necessary and desirable. 2) This paper also defines the level of difficulty, regarding each type of difficulty for constraints in the constructed CMOPs, which can be adjusted by users. A difficulty level is uniquely defined by a triplet with each of its parameter specifying the level of each primary difficulty type respectively. Combination of the three primary constraint types with different difficulty triplets can lead to construction of a large variety of constraints for CMOPs. 3) Based on the proposed three primary types of difficulty for constraints, nine difficulty adjustable CMOPs named DAS-CMOP1-9 are constructed. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 The remainder of this paper is organized as follows. Section II discusses the effects of constraints on PFs. Section III introduces the types and levels of difficulties provided by constraints in CMOPs. Section IV explains the proposed toolkit of construction methods for generating constraints in CMOPs with different types and levels of difficulty. Section V realizes the scalability to the number of objectives in CMOPs using the proposed toolkit. Section VI generates a set of difficulty adjustable CMOPs using the proposed toolkit. In Section VII, the performance of two CMOEAs on DASCMOP1-9 with different difficulty levels are compared by experimental studies, and Section VIII concludes the paper. II. E FFECTS OF CONSTRAINTS ON PF S Constraints define the infeasible regions in the search space, leading to different types and levels of difficulty for the resulting CMOPs. Some major effects of the constraints on PFs in CMOPs include the following [44]: 1) Infeasible regions make the original unconstrained PF partially feasible. This can be further divided into two situations. In the first situation, the PF of the constrained problem consists of a part of its unconstrained PF and a set of solutions on some boundaries of constraints, as illustrated by Fig. 1(a). In the second situation, the PF of the constrained problem is only a part of its unconstrained PF, as illustrated by Fig. 1(b). 2) Infeasible regions block the way towards the PF, as illustrated by Fig. 1(c). 3) The complete original PF is covered by infeasible regions and becomes no more feasible. Every constrained Pareto optimal point lies on some constraint boundaries, as illustrated by Fig. 1(d). 4) Constraints may reduce the dimensionality of the PF with one example illustrated by Fig. 1(e). In general, although the problem is M−dimensional, constraints make the constrained PF K−dimensional (where K < M). In the particular case of Fig. 1(e), M = 2, K = 1. III. D IFFICULTY TYPES AND LEVELS OF CMOP S Three primary difficulty types have been identified, including convergence-hardness, diversity-hardness, and feasibilityhardness. A difficulty level for each primary difficulty type can be defined as a parameter ranging from 0 to 1. Three difficulty levels, corresponding to three primary difficulty types respectively, form a triplet that depicts the nature of the difficulty of a CMOP. A. Difficulty 1: Diversity-hardness Generally, the PFs of CMOPs with diversity-hardness have many discrete segments, or some parts more difficult to be achieved than the other parts by imposing large infeasible regions near them. As a result, achieving the complete PF is difficult for CMOPs. 3 B. Difficulty 2: Feasibility-hardness For the feasibility-hard CMOPs, the ratios of feasible regions in the search space are usually very low. It is difficult to generate a feasible solution for a CMOEA on the feasibilityhard CMOPs. Often in the initial stage of a CMOEA, most solutions in the population are infeasible. C. Difficulty 3: Convergence-hardness CMOPs with convergence-hardness hinder the convergence of CMOEAs towards the PFs. Usually, CMOEAs encounter more difficulty to approach the PFs. Because infeasible regions block the way of CMOEAs converging to the PFs. In other words, the generational distance (GD) metric [45], which indicates the performance of convergence, is difficult to be minimized in the evolutionary process. D. Difficulty level of each primary difficulty type A difficulty level of each primary difficulty type can be defined by a parameter in the parameterized constraint function corresponding to the primary difficulty type. Each parameter is normalized from 0 to 1. Three parameters, corresponding to the difficulty level of the three primary difficulty types respectively, form a triplet (η, ζ, γ) that exactly defines the nature of difficulty of a CMOP constructed by the three parameterized constraint functions. If each element of the triplet can only take value of either 0 or 1, then a simple combination of the three primary difficulty types will give rise to seven basic different difficulty types. This is analogous to a simple combination of three primary colors gives rise to seven basic colors. But if we allow the three parameters to take any value between 0 and 1, then we can literally get countless difficulty nature (analogous to countless colors in the color space). A difficulty nature here is then precisely depicted by a triplet (η, ζ, γ). IV. CONSTRUCTION TOOLKIT As we know, constructing a CMOP is composed of constructing two major parts - objective functions and constraint functions. Li, et al. [46] suggested a general framework for constructing objective functions. It is stated as follows: fi (x) = αi (x1:m−1 ) + βi (x1:m−1, xm:n ) )T , (2) where x1:m−1 = (x1, . . . , xm−1 xm:n = (xm, . . . , xn are two sub-vectors of x = (x1, . . . , xn )T . The function αi (x1:m−1 ) is called the shape function, and βi (x1:m−1, xm:n ) is called the nonnegative distance function. The objective function fi (x), i = 1, . . . , m is the sum of the shape function αi (x1:m−1 ) and the nonnegative distance function βi (x1:m−1, xm:n ). We adopt Li, et al.’s method [46] in this work. In terms of constructing the constraint functions, three different types of constraint functions are suggested in this paper, corresponding to the proposed three primary types of difficulty of CMOPs. More specifically, Type-I constraint functions provide the difficulty of diversity-hardness, TypeII constraint functions introduce the difficulty of feasibilityhardness, and Type-III constraint functions generate the difficulty of convergence-hardness. The detailed definition of )T JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1.5 1.5 infeasible area PF without constraints PF with constraints infeasible area PF with constraints PF without constraints 0.8 1 f2 1 f2 f2 1 infeasible area PF with constraints PF without constraints feasbile area PF with constraints PF without constraints 0.6 f2 1 1 1.5 infeasbile area PF with constraints PF without constraints f2 1.5 4 0.4 0.5 0.5 0.5 0.5 0.2 0 0 0.5 1 1.5 0 0 0.5 f1 (a) 1 1.5 0 0 0.5 f1 1 1.5 0 0 0.5 f1 (b) (c) 1 1.5 0 0 0.5 f1 f1 (d) (e) Fig. 1. Illustration of the effects of constraints on PFs. (a) Infeasible regions makes the original unconstrained PF partially feasible. Many constrained Pareto optimal solutions lie on the constraint boundaries. (b) Infeasible regions makes the original unconstrained PF partially feasible. The constrained PF is a part of its unconstrained PF. (c) Infeasible regions blocks the way of converging to the PF. The constrained PF is same to its unconstrained PF. (d) The complete original PF is no more feasible. Every constrained Pareto optimal solution lies on the constraint boundaries. (e) Constraints reduce the dimensionality of the PF. A two-objective optimization problem is transformed into a constrained single optimization problem. TABLE I BASIC DIFFICULTY TYPES OF THE CMOP S Basic Difficulty Types T1: Diversity-hardness T2: Feasibility-hardness T3: Convergence-hardness T4: Diversity-hardness and feasibility-hardness T5: Diversity-hardness and convergence-hardness T6: Feasibility-hardness and convergence-hardness T7: Diversity-hardness, feasibility-hardness and convergence-hardness Comment Distributing the feasible solutions in the complete PF is difficult. Obtaining a feasible solution is difficult. Approaching a Pareto optimal solution is difficult. Obtaining a feasible solution and the complete PF is difficult. Approaching a Pareto optimal solution and the complete PF is difficult. Obtaining a feasible solution and approaching a Pareto optimal solution is difficult. Obtaining a Pareto optimal solution and the complete PF is difficult. A. Type-I Constraint Functions: Diversity-hardness Fig. 2. The illustration of three primary difficulty types and their combination resulting in seven basic difficulty types (as shown in Table I), using an analogy of three primary colors and their combination towards seven basic colors. Fig. 3. The illustration of combining three parameterized constraint functions using a triplet composing of three parameters. The three primary constraint functions correspond to the three primary difficulty types respectively. the three types of constraint functions are given in detail as follows: Type-I constraint functions are defined to limit the boundary of sub-vector x1:m−1 . More specifically, this type of constraint functions divides the PF of a CMOP into a number of disconnected segments, generating the difficulty of diversityhardness. Here, we use a parameter η ∈ [0, 1] to represent the level of difficulty. η = 0 means the constraint functions impose no effects on the CMOP, while η = 1 means the constraint functions provide their maximum effects. An example of CMOP with diversity-hardness is suggested as follows:   minimize f1 (x) = x1 + g(x)      minimize f2 (x) = 1 − x12 + g(x)    Ín (3) g(x) = i=2 (xi − sin(0.5πx1 ))2    subject to c(x) = sin(aπx1 ) − b ≥ 0      xi ∈ [0, 1]  where a > 0, b ∈ [0, 1]. As an example a = 10, n = 2 are set here. The parameter η indicating the level of difficulty is set to η = (b + 1)/2. The number of disconnected segments in the PF is controlled by a. Moreover, the value of b controls the width of each segment. The width of segments reaches its maximum when b = −1. When b increases, the width of segments decreases, and the difficulty level increases, so does the parameter of the difficulty level η. As a result, if η is set to 0.55, the PF is shown in Fig. 4(a). If η = 0.75, the PF is shown in Fig.4 (b). It can be observed that the width of segments of the PF is reduced as η keeps increasing. If η = 1.0, the width of segments shrinks to zero, which provides the maximum level of difficulty to the CMOP. The PF of a three-objective CMOP with Type-I constraint functions is also shown in Fig. 4(d), with the difficult level η = 0.75. It can be 1 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 seen that Type-I constraint functions can be applied in more than two-objective CMOPs, which means that a CMOP with the scalability to the number of objectives can be constructed using this type of constraints. B. Type-II Constraint Functions: Feasibility-hardness Type-II constraint functions are set to limit the reachable boundary of the distance function of βi (x1:m−1, xm:n ), and thereby control the ratio of feasible regions. As a result, TypeII constraint functions generate the difficulty of feasibilityhardness. Here, we use a parameter ζ to represent the level of difficulty, which ranges from 0 to 1. ζ = 0 means the constraints are the weakest, and ζ = 1.0 means the constraint functions are the strongest. For example, a CMOP with Type-II constraint functions can be defined as follows:   minimize f1 (x) = x1 + g(x)     minimize f2 (x) = 1 − x12 + g(x)    Ín    g(x) = i=2 (xi − sin(0.5πx1 ))2 (4)  subject to c1 (x) = g(x) − a ≥ 0      c2 (x) = b − g(x) ≥ 0     n = 30, xi ∈ [0, 1]  1 , and a ≥ 0, b ≥ 0 and b ≥ a. where ζ equals to exp(b−a) The distance between the constrained PF and unconstrained PF is controlled by a, and a = 0.5 in this example. The ratio of feasible regions is controlled by b − a. If b − a = +∞, ζ = 0, the feasible area reaches maximum as shown in Fig. 5(a). If b − a = 0.1, ζ = 0.905, the feasible area is decreased as shown in Fig. 5(b). If b − a = 0, ζ = 1.0, the feasible area in the objective space is very small. The PF of this problem is shown in Fig. 5(c). Type-II constraints can be also applied to CMOPs with three objectives as shown in Fig. 5(d). C. Type-III Constraint Functions: Convergence-hardness Type-III constraint functions limit the reachable boundary of objectives. As a result, infeasible regions act like ’blocking’ hindrance for searching populations of CMOEAs to approach the PF. As a result, Type-III constraint functions generate the difficulty of convergence-hardness. Here, we use a parameter γ to represent the level of difficulty, which ranges from 0 to 1. γ = 0 means the constraints are the weakest, γ = 1 means the constraints are the strongest, and the difficulty level increases as γ increases. For example, a CMOP with Type-III constraint functions can be defined as follows:  min f1 (x) = x1 + g(x)      min f2 (x) = 1 − x12 + g(x)    Ín   where g(x) = i=2 (xi − sin(0.5πx1 ))2     s.t.  ck (x) = (( f1 − pk ) cos θ k − ( f2 − qk ) sin θ k )2 /ak2    (5) +(( f1 − pk ) sin θ k + ( f2 − qk ) cos θ k )2 /b2k ≥ r    pk = [0, 1, 0, 1, 2, 0, 1, 2, 3]      q  k = [1.5, 0.5, 2.5, 1.5, 0.5, 3.5, 2.5, 1.5, 0.5]     ak2 = 0.4, b2k = 1.6, θ k = −0.25π     c = 20, n = 30, xi ∈ [0, 1], k = 1, . . . , 9  5 where the level of difficulty parameter γ is defined as γ = 2r. If γ = 0.1, the PF is shown in Fig. 6(a). If γ = 0.5, the infeasible regions are increased and shown in Fig. 6(b). If γ = 0.75, the infeasible regions become bigger than those of γ = 0.5 as shown in Fig. 6(c). The constraints of Type-III can be also applied to CMOPs with three objectives as shown in Fig. 6(d). Type-III constraint functions can be expressed in a matrix form, which can be defined as follows: (F(x) − Hk )T Sk (F(x) − Hk ) ≥ r (6) where F(x) = ( f1 (x), . . . , fm (x))T . Hk is a translation vector. Sk is a transformational matrix, which control the degree of rotation and stretching of the vector (F(x) − Hk ). According to the Type-III constraint functions in Eq. (5), Hk = (pk , qk )T , and Sk can be expressed as follows:  cos2 θk + sin2 θk  a2 b2 Sk =  k sin 2θk k  b k2  k − sina2θ 2 cos2 θk b k2    2  + sina2θk   k k It is worthwhile to point out that by using this approach we can further extend the number of objectives to be more than three, even though more sophisticated visualization approach is needed to show the resulting CMOPs in the objective space. To summarize, the three types of constraint functions discussed above correspond to the three primary difficulty types of CMOPs respectively. In particular, Type-I constraint function corresponds to diversity-hardness, Type-II corresponds to feasibility-hardness, and Type-III corresponds to convergencehardness. The level of each primary difficulty type can be decided by a parameter. In this work, three parameters are defined in a triplet (η, ζ, γ), which specifies the difficulty level of a particular difficulty type. It is noteworthy to point out that this approach of constructing toolkit for CMOPs can also be scaled to generate CMOPs with more than three objective functions. The scalability to the number of objectives is discussed in more detail in Section V. V. S CALABILITY TO THE NUMBER OF OBJECTIVES Recently many-objective optimization attracts a lot of research interests, which makes the feature of scalability to the number of objectives of CMOPs desirable. A general framework to construct CMOPs with the scalability to the number of objectives is given in Eq. (7). In Eq. (7), we borrow the idea of WFG toolkit [37] to construct objectives, which can be scaled to any number of objectives. More specifically, the number of objectives is controlled by a user-defined parameter m. Three different types of constraint functions proposed in Section V can be combined together with the scalable objectives to construct difficulty adjustable and scalable CMOPs (DAS-CMOPs). More specifically, the first K constraint functions with Type-I are defined to limit the reachable boundary of each decision variable in the shape functions (α1 (x1:m−1 ) to αm (x1:m−1 )), which have the ability to control the difficulty level of diversity-hardness by η. The (K + 1) to (K + P) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 2 f2 f2 2 3 PF without constraint Feasible area PF with Type−I constraint PF without constraint Feasible area PF with Type−I constraint 2 Feasible area PF with Type−I constraint 2 1.5 1 f3 3 PF without constraint Feasible area PF with Type−I constraint f2 3 6 0.5 1 1 1 0 2 2 0 0 1 2 0 0 3 1 f1 2 1 0 0 3 1 f1 (a) η = 0.55 2 3 0 0 f2 f1 (b) η = 0.75 1 (c) η = 1.0 f1 (d) m = 3, η = 0.75 Fig. 4. Illustrations on the influence of Type-I constraint functions. When the parameter of difficulty level η increases, the width of segments in the PF decreases, and the difficulty level of a CMOP increases. Because the PF of a CMOP with Type-I constraint is disconnect and usually has many discrete segments, obtaining the complete PF is difficult. Thus a CMOP with Type-I constraints is diversity-hard. (a) Two-objective CMOP with η = 0.55. (b) Two-objective CMOP with η = 0.75. (c) Two-objective CMOP with η = 1.0. (d) Three-objective CMOP with η = 0.75. 2 2 PF without constraint PF with Type−II constraint Feasible area 1.5 PF without constraint PF with Type−II constraint Feasible area 1.5 2 PF without constraint PF with constraint Feasible area 1 1 0.5 f2 f2 f2 f3 1.5 2 PF without constraint PF with Type−II constraint Feasible area 1 0.5 1 0 0.5 −1 2 1 0 0 0.5 1 f1 1.5 0 0 2 (a) ζ = 0 0.5 1 f1 1.5 0 0 2 0.5 (b) ζ = 0.905 1 f1 1.5 2 (c) ζ = 1.0 1.5 1 0.5 0 0 f2 2 f1 (d) m = 3, ζ = 0.905 1 . Here, the default value of a is set Fig. 5. Illustrations on the influence of Type-II constraint functions. The parameter of difficulty degree ζ = exp(b−a) to 0.5. The ratio of feasible regions is controlled by ζ . When the parameter ζ increases, the portion of feasible regions decreases, and the difficulty level of feasibility increases. (a) ζ = 0.0. (b) ζ = 0.905. (c) ζ = 1.0. (d) The Type-II constraint can be applied into three-objective optimization problems, and ζ = 0.905. 4 4 PF with Type−III constraint Infeasible area 3 4 PF with Type−III constraint Infeasible area 3 PF with Type−III constraint Infeasible area PF with Type−III constraint Infeasible area 1.5 3 2 f3 f2 f2 f2 1 2 2 0.5 1 1 1 0 0 0 0 0 0 0 0 1 2 f1 (a) γ = 0.1 3 4 1 2 f1 3 (b) γ = 0.5 4 0 0.5 1 2 f1 (c) γ = 0.75 3 4 0.5 1 1 1.5 f2 1.5 f1 (d) γ = 0.5, m = 3 Fig. 6. Illustrations on the influence of Type-III constraint functions. Infeasible regions block the way of converging to the PF. The gray parts of each figure are infeasible regions. A parameter γ is adopted to represent the level of difficulty, which ranges from 0 to 1. γ = 0 means the constraints are the weakest, and γ = 1 means the constraints are the strongest. When γ increases, the difficulty level of convergence-hardness of a CMOP increases. (a) γ = 0.1. (b) γ = 0.5. (c) γ = 0.75. (d) The Type-III constraint can also be applied into three-objective optimization problems, here with γ = 0.5. constraint functions belong to Type-II, which limit the reachable boundary of the distance functions (β1 (x1:m−1, xm:n ) to β1 (x1:m−1, xm:n )). They have the ability to control the the difficulty level of feasibility-hardness by ζ. The last Q constraint functions are set directly on each objective, and belong to Type-III. They generate a number of infeasible regions, which hinder the working population of a CMOEA approaching to the PF. The difficulty level of convergence-hardness generated by Type-III constraint functions is controlled by γ. The rest of parameters in Eq. (7) are illustrated as follows. Three parameters K, P and Q are used to control the number of each type of constraint functions, respectively. K ≤ m − 1, P ≤ m and Q ≥ 1. The total number of constraint functions is controlled by (K +P+Q). n decides the dimensions of decision variables, and n ≥ m. a decides the number of disconnected segments in the PF. d indicates the distance between the constrained PF and the unconstrained PF. The difficulty level of a DAS-CMOP is controlled by a difficulty triplet (η, ζ, γ), with each of its component ranging from 0 to 1. When each of parameter in the difficult triplet increases, the difficulty level of a DAS-CMOP increases. It is worth noting that the number of objectives of DASCMOPs can be easily scaled by tuning the parameter of m. The difficulty level of DAS-CMOPs can be also easily adjusted JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 7 by assigning a difficulty triplet (η, ζ, γ) with three parameters ranging from 0 to 1.   min     min             min     s.t                                          f1 (x) = α1 (x1:m−1 ) + β1 (x1:m−1, xm:n ) f2 (x) = α2 (x1:m−1 ) + β2 (x1:m−1, xm:n ) .. . fm (x) = αm (x1:m−1 ) + βm (x1:m−1, xm:n ) ck (x) = sin(aπxk ) − b ≥ 0, if k is odd ck (x) = cos(aπxk ) − b ≥ 0, if k is even cK+p (x) = (e − β p )(β p − d) ≥ 0 cK+P+q (x) = (F(x) − Hq )T Sq (F(x) − Hq ) ≥ r k = 1, . . . , K, and K ≤ m − 1 p = 1, . . . , P, and P ≤ m q = 1, . . . , Q η = (b + 1)/2 ζ = exp(d − e), d ≤ e γ = 2r (7) VI. A SET OF DIFFICULTY ADJUSTABLE AND SCALABLE CMOP S In this section, as an example, a set of nine difficulty adjustable and scalable CMOPs (DAS-CMOP1-9) is suggested through the proposed toolkit. As mentioned in Section IV, constructing a CMOP composes of constructing objective functions and constraint functions. According to Eq. (7), we suggest nine multi-objective functions, including convex, concave and discrete PF shapes, to construct CMOPs. A set of difficulty adjustable constraint functions is generated by Eq. (7). Nine difficulty adjustable and scalable CMOPs named DAS-CMOP1-9 are generated by combining the suggested objective functions and the generated constraint functions. The detailed definitions of DAS-CMOP19 are shown in Table II. In Table II, DAS-CMOP1-3 have the same constraint functions. For DAS-CMOP4-6, they also have the same constraint functions. The difference between DAS-CMOP1-3 and DASCMOP4-6 is that they have different distance functions. For DAS-CMOP1-6, they have two objectives. The number of objectives in Eq. (7) are able to scale to more than two. For example, DAS-CMOP7-9 have three objectives. The constraint functions of DAS-CMOP8 and DAS-CMOP9 are the same as those of DAS-CMOP7. It is worth noting that the value of difficulty triplet elements can be set by users. If we want to reduce/increase the difficulty levels of DAS-CMOP1-9, we only need to adjust the parameters of the triplet elements to smaller/larger values, and generate a new set of test instances. VII. EXPERIMENTAL STUDY A. Experimental Settings To test the performance of CMOEAs on the DAS-CMOPs, two commonly used CMOEAs (i.e., MOEA/D-CDP and NSGA-II-CDP) are tested on DAS-CMOP1-9 with sixteen different difficulty triplets in the experiment. As descripted in Section IV, three parameters are defined in a triplet (η, ζ, γ), which specifies the difficulty level of a particular difficulty type. More specifically, η represents the difficulty level of diversity-hardness, ζ denotes the difficulty level of feasibilityhardness, and γ indicates the difficulty level of convergencehardness. The difficulty triplets for each DAS-CMOP are listed in Table III. The detailed parameters of the algorithms are summarized as follows. 1) Setting for reproduction operators: The mutation probability Pm = 1/n (n is the number of decision variables). For the polynomial mutation operator, the distribution index is set to 20. For the simulated binary crossover (SBX) operator, the distribution index is set to 20. The rate of crossover CR = 0.9. 2) Population size: For DAS-CMOP1-6, N = 200, and for DAS-CMOP7-9, N = 105. 3) Number of runs and stopping condition: Each algorithm runs 30 times independently on each test problem with sixteen different difficulty triplets. The maximum function evaluations is 100000 for DAS-CMOP1-6, 200000 for DAS-CMOP7-9. 4) Neighborhood size: T = 20 for DAS-CMOP1-6, T = 10 for DAS-CMOP7-9. 5) Probability use to select in the neighborhood: δ = 0.9. 6) The maximal number of solutions replaced by a child: nr = 2. B. Performance Metric To measure the performance of MOEA/D-CDP and NSGAII-CDP on DAS-CMOP1-9 with different difficulty triplets, the inverted generation distance (IGD) [47] is adopted. The detailed definition of IGD is given as follows: • Inverted Generational Distance (IGD): The IGD metric simultaneously reflects the performance of convergence and diversity, and it is defined as follows: Í     IGD(P∗, A) =    y∗ ∈ P∗ d(y ∗, A) | P∗ | (8) qÍ    m 2 ∗   d(y ∗, A) = min{ i=1 (yi − yi ) } y∈A  where P∗ is the ideal PF set, A is an approximate PF set achieved by an algorithm. m represents the number of objectives. It is worth noting that the smaller value of IGD represents the better performance of both diversity and convergence. C. Performance Comparisons on two-objective DAS-CMOPs Table IV presents the statistic results of IGD values for MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP13. We can observe that for DAS-CMOP1 with difficulty triplets (0.0, 0.25, 0.0), (0.0, 0.5, 0.0) and (0.0, 0.75, 0.0), NSGA-II-CDP is significantly better than MOEA/D-CDP, which indicates that NSGA-II-CDP is more suitable for solving DAS-CMOP1 with feasibility-hardness. For DASCMOP1 with difficulty triplets (0.0, 0.0, 0.25), (0.0, 0.0, 0.5) JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 8 TABLE II DAS-CMOP S T EST SUITE : THE OBJECTIVE FUNCTIONS AND CONSTRAINT FUNCTIONS OF DAS-CMOP1-9. Problem Objectives DAS-CMOP1  min     min      where                DAS-CMOP2  min     min        where  DAS-CMOP3              min     min        where              DAS-CMOP4 DAS-CMOP5 DAS-CMOP6 DAS-CMOP7 DAS-CMOP8 DAS-CMOP9   min     min   where        min     min   where        min     min   where      f1 (x) = x1 + g1 (x) f2 (x) = 1 − x12 + g2 (x) Í g1 (x) = j ∈J1 (x j − sin(0.5π x1 ))2 Í g2 (x) = j ∈J2 (x j − cos(0.5π x1 ))2 J1 = { j | j is odd and 2 ≤ j ≤ n} J2 = { j | j is even and 2 ≤ j ≤ n} n = 30, x ∈ [0, 1] n f1 (x) = x1 + g1 (x) √ f2 (x) = 1 − x1 + g2 (x) Í g1 (x) = j ∈J1 (x j − sin(0.5π x1 ))2 Í g2 (x) = j ∈J2 (x j − cos(0.5π x1 ))2 J1 = { j | j is odd and 2 ≤ j ≤ n} J2 = { j | j is even and 2 ≤ j ≤ n} n = 30, x ∈ [0, 1] n f1 (x) = x1 + g1 (x) √ f2 (x) = 1 − x1 + 0.5 ∗ | sin(5π x1 ) | + g2 (x) Í g1 (x) = j ∈J1 (x j − sin(0.5π x1 ))2 Í g2 (x) = j ∈J2 (x j − cos(0.5π x1 ))2 J1 = { j | j is odd and 2 ≤ j ≤ n} J2 = { j | j is even and 2 ≤ j ≤ n} n = 30, x ∈ [0, 1] n f1 (x) = x1 + g(x) f2 (x) = 1 − x12 + g(x) Í g(x) = (n − 1) + nj=2 (x j − 0.5)2 − cos(20π(x j − 0.5)) n = 30, x ∈ [0, 1] n f1 (x) = x1 + g(x) √ f2 (x) = 1 − x1 + g(x) Í g(x) = (n − 1) + nj=2 (x j − 0.5)2 − cos(20π(x j − 0.5)) n = 30, x ∈ [0, 1] n f1 (x) = x1 + g(x) √ f2 (x) = 1 − x1 + 0.5 ∗ | sin(5π x1 ) | + g(x) Í g(x) = (n − 1) + nj=2 (x j − 0.5)2 − cos(20π(x j − 0.5)) n = 30, x ∈ [0, 1] n  min      min    min    where      f1 (x) = x1 ∗ x2 + g(x) f2 (x) = x2 ∗ (1 − x1 ) + g(x) f3 (x) = 1 − x2 + g(x) Í g(x) = (n − 2) + nj=3 (x j − 0.5)2 − cos(20π(x j − 0.5)) n = 30, x ∈ [0, 1] n  min      min    min    where       min     min     min    where      f1 (x) = cos(0.5π x1 ) ∗ cos(0.5π x2 ) + g(x) f2 (x) = cos(0.5π x1 ) ∗ sin(0.5π x2 ) + g(x) f3 (x) = sin(0.5πx1 ) + g(x) Í g(x) = (n − 2) + nj=3 (x j − 0.5)2 − cos(20π(x j − 0.5)) n = 30, x ∈ [0, 1] n f1 (x) = cos(0.5π x1 ) ∗ cos(0.5π x2 ) + g(x) f2 (x) = cos(0.5π x1 ) ∗ sin(0.5π x2 ) + g(x) f3 (x) = sin(0.5πx1 ) + g(x) 2 Í 0.25 j g(x) = nj=3 (x j − cos( n π(x1 + x2 ))) n = 30, x ∈ [0, 1] n Constraints  c1 (x) = sin(aπ x1 ) − b ≥ 0     c2 (x) = (e − g1 )(g1 − d) ≥ 0      c3 (x) = (e − g2 )(g2 − d) ≥ 0     ck+3 (x) = (( f1 − pk ) cos θk − ( f2 − qk ) sin θk )2 /a2  k  +(( f1 − pk ) sin θk + ( f2 − qk ) cos θk )2 /b k2 ≥ r      pk = [0, 1, 0, 1, 2, 0, 1, 2, 3], a2k = 0.3, b k2 = 1.2, θk = −0.25π      qk = [1.5, 0.5, 2.5, 1.5, 0.5, 3.5, 2.5, 1.5, 0.5]    a = 20, d = 0.5, η = (b + 1)/2, ζ = exp(d − e), γ = 2r It is the same as that of DAS-CMOP1 It is the same as that of DAS-CMOP1                          c1 (x) = sin(aπ x1 ) − b ≥ 0 c2 (x) = (e − g(x))(g(x) − d) ≥ 0 ck+2 (x) = (( f1 − pk ) cos θk − ( f2 − qk ) sin θk )2 /a2k +(( f1 − pk ) sin θk + ( f2 − qk ) cos θk )2 /b k2 ≥ r pk = [0, 1, 0, 1, 2, 0, 1, 2, 3], a2k = 0.3, b k2 = 1.2, θk = −0.25π qk = [1.5, 0.5, 2.5, 1.5, 0.5, 3.5, 2.5, 1.5, 0.5] a = 20, d = 0.5, η = (b + 1)/2, ζ = exp(d − e), γ = 2r It is the same as that of DAS-CMOP4 It is the same as that of DAS-CMOP4                            c1 (x) = sin(aπ x1 ) − b ≥ 0 c2 (x) = cos(aπx2 ) − b ≥ 0 c3 (x) = (e − g(x))(g(x) − d) ≥ 0 Í ck+3 (x) = 3j=1, j,k fj2 + ( fk − 1)2 − r 2 ≥ 0 Í3 c7 (x) = j=1 ( fj − √1 )2 − r 2 ≥ 0 3 a = 20, d = 0.5, k = 1, 2, 3 η = (b + 1)/2, ζ = exp(d − e), γ = 2r It is the same as that of DAS-CMOP7 It is the same as that of DAS-CMOP7 JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 TABLE III T HE DIFFICULTY TRIPLETS FOR EACH DAS-CMOP Difficulty Triplets (0.0,0.0,0.0) (0.0,0.25,0.0) (0.0,0.0,0.25) (0.25,0.0,0.0) (0.0,0.5,0.0) (0.0,0.0,0.5) (0.5,0.0,0.0) (0.0,0.75,0.0) (0.0,0.0,0.75) (0.75,0.0,0.0) (0.0,1.0,0.0) (0.0,0.0,1.0) (1.0.0,0.0,0.0) (0.25,0.25,0.25) (0.5,0.5,0.5) (0.75,0.75,0.75) and (0.0, 0.00, 0.75), MOEA/D-CDP is significantly better than NSGA-II-CDP, which indicates that MOEA/D-CDP is more suitable for solving DAS-CMOP1 with convergence-hardness. For DAS-CMOP1 with simultaneous convergence-, feasibilityand convergence-hardness, i.e., the difficulty triplets are (0.25, 0.25, 0.25), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75), NSGAII-CDP is significantly better than MOEA/D-CDP. The final populations with the best IGD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP1 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75) are plotted in Fig. 7. We can observe that each type of constraint functions in DAS-CMOP1 indeed generates corresponding difficulties for MOEA/D-CDP and NSGA-II-CDP. With the increasing of each elements in the difficulty triplet, the problem is more difficult to solve, as illustrated by Fig. 7(d)-(e) and Fig. 7(i)-(j). For DAS-CMOP2 with feasibility-hardness, for example, the difficulty triplets are (0.0, 0.25, 0.0), (0.0, 0.5, 0.0) and (0.0, 0.75, 0.0), NSGA-II-CDP is significantly better than MOEA/D-CDP. For DAS-CMOP2 with difficulty triplets (0.0, 0.0, 0.5) and (0.0, 0.0, 0.75), MOEA/D-CDP is significantly better than NSGA-II-CDP, which indicates that MOEA/D-CDP is more suitable for solving DAS-CMOP2 with convergence-hardness. For DAS-CMOP2 with the difficulty triplet (1.0, 0.0, 0.0), MOEA/D-CDP is also significantly better than NSGA-II-CDP. For DAS-CMOP2 with simultaneous convergence-, feasibility- and convergence-hardness, NSGAII-CDP is significantly better than MOEA/D-CDP. Fig. 8 shows the final populations with the best IGD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP2 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75). Both MOEA/D-CDP and NSGA-II-CDP can only achieve a few parts of the PFs. With the increasing of each element in the difficulty triplet, it is more difficult for MOEA/D-CDP and NSGA-II-CDP to find the whole PFs of DAS-CMOP2. For DAS-CMOP3 with the difficulty triplet (0.0, 0.0, 0.0), that is, there are no constraints in DAS-CMOP3, NSGAII-CDP is significantly better than MOEA/D-CDP. For DAS-CMOP3 with difficulty triplets (0.0, 0.0, 0.75) and (0.0, 0.0, 1.0), MOEA/D-CDP is significantly better than NSGA-II-CDP, which indicates that MOEA/D-CDP is more suitable for solving DAS-CMOP3 with larger difficulty levels in terms of convergence-hardness. For DAS-CMOP3 with the difficulty triplet (1.0, 0.0, 0.0), MOEA/D-CDP performs better than NSGA-II-CDP. For DAS-CMOP3 with feasibility-hardness, for example, the difficulty triplets are (0.0, 0.25, 0.0), (0.0, 0.5, 0.0) and (0.0, 0.75, 0.0), NSGA-II- 9 CDP is significantly better than MOEA/D-CDP. For DASCMOP3 with simultaneous convergence-, feasibility- and convergence-hardness, NSGA-II-CDP is significantly better than MOEA/D-CDP. Fig. 9 shows the final populations with the best IGD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP3 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75). For DAS-CMOP3 with diversity- or feasibility- or convergence-hardness, MOEA/D-CDP and NSGA-II-CDP can not find the whole PFs. With the increasing of difficulty triplets, DAS-CMOP3 is becoming more difficult for MOEA/D-CDP and NSGA-II-CDP to solve, as illustrated by Fig. 9(d)-(e) and Fig. 9(i)-(j). The statistic results of IGD values for MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP4-7 are shown in Table V. From this Table, we can observe that MOEA/D-CDP is significantly better than MOEA/D-CDP on DAS-CMOP4 with the difficulty triplet (0.0, 0.0, 0.0). In other words, MOEA/D-CDP works better than NSGA-II-CDP on DAS-CMOP4 without any constraints. For DAS-CMOP4 with feasibility-hard difficulty triplets (0.0, 0.25, 0.0), (0.0, 0.5, 0.0) and (0.0, 0.0, 1.0), NSGAII-CDP is significantly better than MOEA/D-CDP. For DAS-CMOP4 with diversity-hard difficulty triplets (0.25, 0.0, 0.0), (0.5, 0.0, 0.0), (0.75, 0.0, 0.0) and (1.0, 0.0, 0.0), MOEA/D-CDP performs significantly better than NSGAII-CDP. For DAS-CMOP4 with convergence-hard difficulty triplets (0.0, 0.0, 0.25), (0.0, 0.0, 0.5) and (0.0, 0.0, 0.75), MOEA/D-CDP also performs significantly better than NSGAII-CDP. For DAS-CMOP5 with feasibility-hard difficulty triplets (0.0, 0.25, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 1.0) and (0.75, 0.75, 0.75), NSGA-II-CDP performs significantly better than MOEA/D-CDP. For DAS-CMOP5 with diversity- or convergence-hardness, MOEA/D-CDP is significantly better than NSGA-II-CDP. For DAS-CMOP6 with the difficulty triplet (0.0, 0.0, 1.0), NSGA-II-CDP is significantly better than MOEA/D-CDP. For DAS-CMOP6 with difficulty triplets (0.0, 0.0, 0.25), (0.0, 0.0, 0.5), (0.5, 0.0, 0.0) and (1.0, 1.0, 1.0), MOEA/D-CDP is significantly better than NSGA-II-CDP. For DAS-CMOP5 with the rest of difficulty triplets, MOEA/D-CDP and NSGAII-CDP have not any significantly difference. D. Performance Comparisons on three-objective DAS-CMOPs The statistic results of IGD values for MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP7-9 are presented in Table IV. For DAS-CMOP7 without any constraints, that is, the difficulty triplet is (0.0, 0.0, 0.0), NSGA-II-CDP is significantly better than MOEA/D-CDP. For DAS-CMOP7 with diversity- or feasibility-hardness, for example, the difficulty triplets are (0.0, 0.25, 0.0), (0.25, 0.0, 0.0) (0.0, 0.5, 0.0), (0.5, 0.0, 0.0), (0.0, 0.75, 0.0) and (0.75, 0.0, 0.0), NSGA-IICDP is also significantly better than MOEA/D-CDP. For DASCMOP7 with difficulty triplets (0.0, 0.0, 1.0) and (1.0, 0.0, 0.0), MOEA/D-CDP is significantly better than NSGA-II-CDP. For DAS-CMOP7 with simultaneous diversity-, feasibility- and JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 convergence-hardness, NSGA-II-CDP performs significantly better than NSGA-II-CDP. For DAS-CMOP8 with convergence-hardness, for example, the difficulty triplets are (0.0, 0.0, 0.25), (0.0, 0.0, 0.5), (0.0, 0.0, 0.75) and (0.0, 0.0, 1.0), MOEA/D-CDP performs significantly better than NSGA-II-CDP. For DAS-CMOP8 with the difficulty triplet (1.0, 0.0, 0.0), MOEA/D-CDP is also significantly better than NSGA-II-CDP. For DAS-CMOP8 with the rest of difficulty triplets, NSGA-II-CDP is better or significantly better than MOEA/D-CDP. For DAS-CMOP9 with feasibility-hardness, i.e, the difficulty triplets are (0.0, 0.25, 0.0), (0.0, 0.5, 0.0) and (0.0, 0.75, 0.0), NSGA-II-CDP performs significantly better than MOEA/D-CDP. For DAS-CMOP9 with convergenceor diversity-hardness, i.e., the difficulty triplets are (0.0, 0.0, 0.25), (0.0, 0.0, 0.5) (0.5, 0.0, 0.0), (0.0, 0.0, 0.75), (0.75, 0.0, 0.0), (0.0, 0.0, 1.0) (1.0, 0.0, 0.0), MOEA/D-CDP is significantly better than NSGA-II-CDP. For DAS-CMOP9 with simultaneous diversity-, feasibility- and convergencehardness, NSGA-II-CDP performs significantly better than MOEA/D-CDP. The final populations with the best IGD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP9 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75) are plotted in Fig. 10. We can observe that both MOEA/D-CDP and NSGA-II-CDP only achieve a few parts of PFs of DAS-CMOP9. E. Analysis of Experimental Results From the above performance comparisons on the nine test instances DAS-CMOPs, it is clear that each type of constraint functions generates corresponding difficulties for MOEA/DCDP and NSGA-II-CDP. With the increasing of each elements in the difficulty triplet, the problem is becoming more difficult for MOEA/D-CDP and NSGA-II-CDP to solve. Furthermore, it can be concluded that NSGA-II-CDP performs better than MOEA/D-CDP on DAS-CMOPs with feasibility-hardness. MOEA/D-CDP performs better than NSGA-II-CDP on DASCMOPs with diversity- or convergence-hardness. In the case of DAS-CMOPs with simultaneous diversity-, feasibility- and convergence-hardness, NSGA-II-CDP performs better than MOEA/D-CDP on most of test instances. VIII. C ONCLUSION In this work, we proposed a construction toolkit to build difficulty adjustable and scalable CMOPs. The method used to design the construction toolkit is based on three primary constraint functions identified to correspond to three primary difficulty types of DAS-CMOPs. The method is also scalable because both number of objectives and constraints can be conveniently extended. As an example, a set of DASCMOPs (DAS-CMOP1-9) was generated using this construction toolkit. To verify the effectiveness of the suggested test instances, comprehensive experiments were conducted to test the performance of two popular CMOEAs (MOEA/D-CDP and NSGA-II-CDP) on DAS-CMOPs with different difficulty triplets. Through analyzing the performance of the two test 10 algorithms, it is found that the three primary types of difficulties did exist in the corresponding test problems, and the algorithms under test showed different behaviors in reaching the PFs. The observation demonstrates that the proposed method of constructing the CMOPs is very efficient and effective to help evaluate the performance of the tested algorithms. ACKNOWLEDGMENT This research work was supported by Guangdong Key Laboratory of Digital Signal and Image Processing, the National Natural Science Foundation of China under Grant (61175073, 61300159, 61332002, 51375287), Jiangsu Natural Science Foundation (BK20130808) and Science and Technology Planning Project of Guangdong Province, China (2013B011304002). R EFERENCES [1] T. P. Runarsson and X. Yao, “Search biases in constrained evolutionary optimization,” Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol. 35, no. 2, pp. 233–243, 2005. [2] C. A. Coello Coello, “Theoretical and numerical constraint-handling techniques used with evolutionary algorithms: a survey of the state of the art,” Computer Methods in Applied Mechanics and Engineering, vol. 191, no. 11-12, pp. 1245–1287, Jan. 2002. [3] F. Hoffmeister and J. Sprave, “Problem-independent handling of constraints by use of metric penalty functions,” 1996. [4] J. A. Joines and C. R. Houck, “On the use of non-stationary penalty functions to solve nonlinear constrained optimization problems with ga’s,” in Evolutionary Computation, 1994. IEEE World Congress on Computational Intelligence., Proceedings of the First IEEE Conference on. IEEE, 1994, pp. 579–584. [5] F.-z. Huang, L. Wang, and Q. He, “An effective co-evolutionary differential evolution for constrained optimization,” Applied Mathematics and computation, vol. 186, no. 1, pp. 340–356, 2007. [6] J. C. Bean and A. ben Hadj-Alouane, A dual genetic algorithm for bounded integer programs, 1993. [7] D. W. Coit, A. E. Smith, and D. M. Tate, “Adaptive penalty methods for genetic optimization of constrained combinatorial problems,” INFORMS Journal on Computing, vol. 8, no. 2, pp. 173–182, 1996. [8] A. Ben Hadj-Alouane and J. C. Bean, “A genetic algorithm for the multiple-choice integer program,” Operations research, vol. 45, no. 1, pp. 92–101, 1997. [9] B. Tessema and G. G. Yen, “A self adaptive penalty function based algorithm for constrained optimization,” in Evolutionary Computation, 2006. CEC 2006. IEEE Congress on. IEEE, 2006, pp. 246–253. [10] Y. G. Woldesenbet, G. G. Yen, and B. G. Tessema, “Constraint handling in multiobjective evolutionary optimization,” Evolutionary Computation, IEEE Transactions on, vol. 13, no. 3, pp. 514–525, 2009. [11] T. P. Runarsson and X. Yao, “Stochastic ranking for constrained evolutionary optimization,” Evolutionary Computation, IEEE Transactions on, vol. 4, no. 3, pp. 284–294, 2000. [12] K. Deb, “An efficient constraint handling method for genetic algorithms,” Computer methods in applied mechanics and engineering, vol. 186, no. 2, pp. 311–338, 2000. [13] M. Laumanns, L. Thiele, and E. Zitzler, “An efficient, adaptive parameter variation scheme for metaheuristics based on the epsilon-constraint method,” European Journal of Operational Research, vol. 169, no. 3, pp. 932–942, 2006. [14] T. Takahama, S. Sakai, and N. Iwane, “Constrained optimization by the ε constrained hybrid algorithm of particle swarm optimization and genetic algorithm,” in AI 2005: Advances in Artificial Intelligence. Springer, 2005, pp. 389–400. [15] T. Ray, H. K. Singh, A. Isaacs, and W. Smith, “Infeasibility driven evolutionary algorithm for constrained optimization,” in Constrainthandling in evolutionary optimization. Springer, 2009, pp. 145–165. [16] P. D. Surry and N. J. Radcliffe, “The comoga method: constrained optimisation by multi-objective genetic algorithms,” Control and Cybernetics, vol. 26, pp. 391–412, 1997. [17] Z. Cai and Y. Wang, “A multiobjective optimization-based evolutionary algorithm for constrained optimization,” Evolutionary Computation, IEEE Transactions on, vol. 10, no. 6, pp. 658–675, 2006. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 11 TABLE IV M EAN AND STANDARD DEVIATION OF I GD VALUES OBTAINED BY MOEA/D-CDP AND NSGA-II-CDP ON DAS-CMOP1-3. W ILCOXON ’ S RANK SUM TEST AT 0.05 SIGNIFICANCE LEVEL IS PERFORMED BETWEEN MOEA/D-CDP AND NSGA-II-CDP. † AND ‡ DENOTE THAT THE PERFORMANCE OF NSGA-II-CDP IS SIGNIFICANTLY WORSE THAN OR BETTER THAN THAT OF MOEA/D-CDP, RESPECTIVELY. DAS-CMOP1 MOEA/D-CDP NSGA-II-CDP 1.367E-01 1.494E-01 2.934E-02 3.723E-02 1.375E-01 9.878E-02‡ 2.591E-02 1.185E-02 1.351E-01 2.006E-01† 3.515E-02 2.100E-02 1.497E-01 1.524E-01 2.609E-02 4.081E-02 1.578E-01 1.174E-01‡ 1.516E-02 1.304E-02 1.809E-01 2.362E-01† 3.005E-02 2.125E-02 1.602E-01 1.605E-01 4.631E-02 3.716E-02 1.858E-01 1.420E-01‡ 3.527E-02 1.546E-02 1.769E-01 3.147E-01† 3.770E-02 5.324E-02 1.658E-01 1.510E-01 4.960E-02 4.018E-02 3.682E-01 3.636E-01 1.230E-02 6.217E-03 6.998E-01 4.625E-01‡ 3.767E-01 2.755E-02 4.515E-01 1.531E+00† 1.169E-01 9.908E-01 2.674E-01 2.119E-01‡ 3.893E-02 4.025E-02 4.160E-01 3.624E-01‡ 7.441E-02 4.702E-02 7.750E-01 7.079E-01‡ 5.452E-02 9.615E-02 (0.0,0.25,0.0) (0.0,0.0,0.25) (0.25,0.0,0.0) (0.0,0.5,0.0) (0.0,0.0,0.5) (0.5,0.0,0.0) (0.0,0.75,0.0) (0.0,0.0,0.75) (0.75,0.0,0.0) (0.0,1.0,0.0) (0.0,0.0,1.0) (1.0.0,0.0,0.0) (0.25,0.25,0.25) (0.5,0.5,0.5) (0.75,0.75,0.75) 1 1.5 True PF MOEA/D-CDP 0.4 1 1.5 0.6 0.4 1 0.2 0.4 0.6 0.8 0.5 0.5 1 1 0 1.5 0 0.5 f1(x) 0.2 0.5 1 f1(x) (f) (0.5,0.0,0.0) 1.5 0.5 0.5 1 f1(x) (g) (0.0,0.5,0.0) 1.5 1.6 True PF NSGA-II-CDP 1.5 1 0 0.5 1 f1(x) (h) (0.0,0.0,0.5) 1.5 0.5 0.5 1.5 (e) (0.75,0.75,0.75) True PF NSGA-II-CDP 1.4 2 0.4 1 f1(x) 2.5 0.6 0 0.6 0.5 1.5 (d) (0.5,0.5,0.5) 0.2 0 1 True PF NSGA-II-CDP 0.8 f2(x) f2(x) 1 1 f1(x) 1 True PF NSGA-II-CDP 1.5 0.4 0.5 0.5 1.5 (c) (0.0,0.0,0.5) 2 True PF NSGA-II-CDP 0.6 1 f1(x) (b) (0.0,0.5,0.0) 1 0.8 1.2 0.8 f2(x) 0 (a) (0.5,0.0,0.0) f2(x) True PF 1.4 0.2 f1(x) 0 1.6 True PF MOEA/D-CDP f2(x) 0.2 0 2 True PF MOEA/D-CDP 0.8 f2(x) 0.6 f2(x) f2(x) 1 True PF MOEA/D-CDP 0.8 DAS-CMOP3 MOEA/D-CDP NSGA-II-CDP 1.909E-01 1.536E-01‡ 4.315E-02 2.340E-02 1.744E-01 1.224E-01‡ 4.493E-02 2.374E-02 2.076E-01 1.888E-01‡ 4.827E-02 3.296E-02 2.300E-01 2.146E-01 5.525E-02 5.225E-02 1.847E-01 1.292E-01‡ 3.752E-02 2.305E-02 2.127E-01 2.095E-01 4.019E-02 1.883E-02 4.185E-01 3.263E-01‡ 1.068E-01 1.168E-01 2.320E-01 1.527E-01‡ 4.604E-02 2.729E-02 2.201E-01 2.656E-01† 2.596E-02 5.844E-02 2.258E-01 1.956E-01‡ 5.725E-02 5.785E-02 4.353E-01 4.389E-01 4.106E-02 2.952E-02 6.590E-01 6.615E-01† 2.879E-04 1.982E-03 4.331E-01 1.842E+00† 9.567E-02 1.431E+00 2.589E-01 1.686E-01‡ 3.644E-02 4.206E-02 4.680E-01 4.027E-01‡ 5.516E-02 3.817E-02 7.473E-01 2.808E-01‡ 1.864E-01 1.242E-01 f2(x) (0.0,0.0,0.0) DAS-CMOP2 MOEA/D-CDP NSGA-II-CDP 1.678E-01 1.720E-01 2.675E-02 3.710E-02 1.203E-01 7.994E-02‡ 2.097E-02 1.316E-02 1.709E-01 1.606E-01 3.485E-02 4.088E-02 1.719E-01 1.796E-01 3.073E-02 4.273E-02 1.359E-01 9.157E-02‡ 2.820E-02 1.670E-02 1.580E-01 2.164E-01† 4.670E-02 4.156E-02 1.796E-01 1.799E-01 3.874E-02 3.604E-02 1.548E-01 1.073E-01‡ 2.665E-02 1.557E-02 1.554E-01 3.354E-01† 2.601E-02 1.110E-01 2.206E-01 1.712E-01‡ 4.483E-02 4.269E-02 3.250E-01 3.235E-01 7.175E-03 4.915E-03 7.388E-01 7.177E-01 1.901E-01 1.254E-01 4.102E-01 1.413E+00† 1.029E-01 8.854E-01 1.404E-01 9.860E-02‡ 2.999E-02 1.632E-02 1.656E-01 1.123E-01‡ 4.357E-02 1.638E-02 1.867E-01 1.029E-01 ‡ 3.758E-02 1.201E-02 f2(x) Instance Difficulty Triplet 1.2 1 0.8 1 f1(x) (i) (0.5,0.5,0.5) 1.5 0.6 0.5 1 1.5 f1(x) (j) (0.75,0.75,0.75) Fig. 7. The final populations with the best I GD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP1 with different difficulty triplets. (a)-(e) and (f)-(j) show the best populations achieved by MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP1 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75), respectively. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 12 TABLE V M EAN AND STANDARD DEVIATION OF I GD VALUES OBTAINED BY MOEA/D-CDP AND NSGA-II-CDP ON DAS-CMOP4-6. W ILCOXON ’ S RANK SUM TEST AT 0.05 SIGNIFICANCE LEVEL IS PERFORMED BETWEEN MOEA/D-CDP AND NSGA-II-CDP. † AND ‡ DENOTE THAT THE PERFORMANCE OF NSGA-II-CDP IS SIGNIFICANTLY WORSE THAN OR BETTER THAN THAT OF MOEA/D-CDP, RESPECTIVELY. DAS-CMOP4 MOEA/D-CDP NSGA-II-CDP 1.121E-02 5.282E-02† 8.906E-03 2.977E-02 2.913E-03 2.412E-03‡ 1.290E-03 1.460E-04 7.880E-02 3.380E-01† 4.741E-02 5.514E-02 1.849E-02 6.475E-02† 1.324E-02 3.587E-02 2.915E-03 2.345E-03‡ 1.108E-03 7.926E-05 2.380E-01 9.456E-01† 8.551E-02 3.330E-01 2.321E-02 5.856E-02† 1.611E-02 3.015E-02 2.668E-03 3.105E-03 7.843E-04 3.840E-03 4.260E-01 1.266E+00† 1.443E-01 1.709E-01 1.690E-02 5.761E-02† 1.301E-02 2.894E-02 5.229E-02 1.019E-01 1.307E-01 1.272E-01 1.824E+00 1.633E+00‡ 9.650E-02 2.638E-01 4.795E-01 7.564E+00† 1.055E-01 4.254E+00 3.392E-03 5.863E-02† 1.941E-03 1.292E-01 1.219E-02 3.658E-01† 3.938E-02 1.246E-01 2.341E-01 2.449E-01 1.670E-03 5.065E-02 (0.0,0.25,0.0) (0.0,0.0,0.25) (0.25,0.0,0.0) (0.0,0.5,0.0) (0.0,0.0,0.5) (0.5,0.0,0.0) (0.0,0.75,0.0) (0.0,0.0,0.75) (0.75,0.0,0.0) (0.0,1.0,0.0) (0.0,0.0,1.0) (1.0.0,0.0,0.0) (0.25,0.25,0.25) (0.5,0.5,0.5) (0.75,0.75,0.75) 1 2 True PF MOEA/D-CDP 0.4 f2(x) 0.6 1 0.4 0.2 0.4 0.6 0.8 1 1 0 1.5 (a) (0.5,0.0,0.0) 1 0.2 (b) (0.0,0.5,0.0) 0.5 0.5 1 1 1 0.2 1 0.5 0.5 1.5 f1(x) 1 (d) (0.5,0.5,0.5) (e) (0.75,0.75,0.75) 1.5 True PF NSGA-II-CDP True PF NSGA-II-CDP 0.6 0.4 1.5 f1(x) 1.5 0.8 f2(x) f2(x) 0.8 (c) (0.0,0.0,0.5) True PF NSGA-II-CDP 0.4 0.6 1 True PF NSGA-II-CDP 0.6 0.4 f1(x) 1.5 0.8 0 f1(x) f2(x) 0 1 f2(x) 0.6 True PF MOEA/D-CDP 0.2 0.5 0.5 f1(x) 0 1.5 True PF MOEA/D-CDP True PF NSGA-II-CDP f2(x) 0.2 0 1.5 True PF MOEA/D-CDP 0.8 1.5 f2(x) f2(x) 1 True PF MOEA/D-CDP 0.8 DAS-CMOP6 MOEA/D-CDP NSGA-II-CDP 6.304E-02 6.778E-02 7.337E-02 3.402E-02 6.410E-02 5.489E-02 6.666E-02 5.249E-02 1.202E-01 3.907E-01† 5.496E-02 2.475E-01 9.321E-02 1.291E-01 7.435E-02 6.290E-02 7.189E-02 5.139E-02 4.962E-02 5.530E-02 4.169E-01 9.448E-01† 3.895E-01 3.083E-01 9.403E-02 1.369E-01† 5.364E-02 5.124E-02 6.957E-02 6.104E-02 7.664E-02 5.444E-02 1.260E+00 1.258E+00 3.391E-01 2.116E-01 1.446E-01 1.268E-01 1.056E-01 6.071E-02 1.816E-01 1.616E-01 1.024E-01 1.222E-01 1.983E+00 1.656E+00‡ 1.490E-01 2.554E-01 5.126E-01 8.314E+00† 9.984E-02 6.611E+00 1.719E-01 1.418E-01 1.534E-01 1.734E-01 7.863E-01 5.457E-01 5.005E-01 3.147E-01 1.014E+00 9.106E-01 3.383E-01 4.101E-01 f2(x) (0.0,0.0,0.0) DAS-CMOP5 MOEA/D-CDP NSGA-II-CDP 1.464E-02 5.356E-02† 1.365E-02 2.640E-02 3.034E-03 2.269E-03‡ 1.265E-03 7.276E-05 4.158E-02 4.192E-01† 2.298E-02 1.665E-01 2.010E-02 6.510E-02† 1.235E-02 4.145E-02 2.940E-03 2.390E-03‡ 1.187E-03 6.758E-04 1.010E-01 8.761E-01† 7.600E-02 2.850E-01 1.822E-02 5.840E-02† 9.361E-03 2.992E-02 2.587E-03 3.078E-03 1.237E-03 4.450E-03 5.002E-01 1.223E+00† 1.142E-01 2.086E-01 1.992E-02 7.616E-02† 1.608E-02 3.299E-02 1.178E-02 1.114E-01† 3.037E-02 1.017E-01 1.946E+00 1.612E+00‡ 3.058E-01 2.741E-01 4.465E-01 7.917E+00† 9.627E-02 7.613E+00 2.754E-03 4.428E-02 6.112E-04 1.206E-01 5.861E-01 2.919E-01 7.668E-01 4.291E-01 1.319E+00 4.312E-01‡ 4.447E-01 5.137E-01 f2(x) Instance Difficulty Triplet 1 1 0.2 0 0.2 0.4 0.6 f1(x) (f) (0.5,0.0,0.0) 0.8 1 0.5 0.5 1 f1(x) (g) (0.0,0.5,0.0) 1.5 0 0 0.2 0.4 0.6 f1(x) (h) (0.0,0.0,0.5) 0.8 1 0.5 0.5 1 f1(x) (i) (0.5,0.5,0.5) 1.5 0.5 0.5 1 1.5 f1(x) (j) (0.75,0.75,0.75) Fig. 8. The final populations with the best I GD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP2 with different difficulty triplets. (a)-(e) and (f)-(j) show the best populations achieved by MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP2 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75), respectively. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 13 TABLE VI M EAN AND STANDARD DEVIATION OF I GD VALUES OBTAINED BY MOEA/D-CDP AND NSGA-II-CDP ON DAS-CMOP7-9. W ILCOXON ’ S RANK SUM TEST AT 0.05 SIGNIFICANCE LEVEL IS PERFORMED BETWEEN MOEA/D-CDP AND NSGA-II-CDP. † AND ‡ DENOTE THAT THE PERFORMANCE OF NSGA-II-CDP IS SIGNIFICANTLY WORSE THAN OR BETTER THAN THAT OF MOEA/D-CDP, RESPECTIVELY. DAS-CMOP7 MOEA/D-CDP NSGA-II-CDP 6.052E-02 5.150E-02‡ 1.018E-03 4.413E-03 5.154E-02 4.946E-02‡ 1.787E-03 2.179E-03 5.048E-02 5.288E-02† 9.856E-04 5.451E-03 5.852E-02 4.869E-02‡ 7.656E-04 4.057E-03 5.178E-02 4.891E-02‡ 3.099E-03 1.839E-03 4.583E-02 6.307E-02† 2.608E-04 1.707E-02 5.546E-02 4.548E-02‡ 1.450E-03 4.871E-03 5.197E-02 5.008E-02‡ 2.550E-03 2.209E-03 4.523E-02 5.550E-02† 8.689E-04 1.165E-02 5.030E-02 4.257E-02‡ 1.483E-03 4.277E-03 6.275E-02 5.037E-02 5.399E-02 2.946E-03 4.052E-02 3.359E-01† 3.495E-03 3.097E-02 5.309E-01 1.045E+01† 1.013E-01 9.771E+00 5.149E-02 4.687E-02‡ 2.355E-03 2.668E-03 5.015E-02 4.335E-02‡ 2.605E-03 2.033E-03 4.671E-02 3.979E-02‡ 2.854E-03 3.892E-03 (0.0,0.0,0.25) (0.25,0.0,0.0) (0.0,0.5,0.0) (0.0,0.0,0.5) (0.5,0.0,0.0) (0.0,0.75,0.0) (0.0,0.0,0.75) (0.75,0.0,0.0) (0.0,1.0,0.0) (0.0,0.0,1.0) (1.0.0,0.0,0.0) (0.25,0.25,0.25) (0.5,0.5,0.5) (0.75,0.75,0.75) 1 1.6 True PF MOEA/D-CDP 1 0.8 0.2 0.2 0.4 0.6 0.8 0.4 0.5 1 (a) (0.5,0.0,0.0) 1 0 1.5 1 0 (b) (0.0,0.5,0.0) 0.2 0.6 0.8 1 f1(x) (f) (0.5,0.0,0.0) 1.5 0.5 0.5 1 f1(x) (g) (0.0,0.5,0.0) 1.5 0.6 0.4 1.5 1.5 1 0.2 0.4 0.6 f1(x) (h) (0.0,0.0,0.5) 0.8 1 0.5 0.5 1 1.2 1.4 (e)(0.75,0.75,0.75) True PF NSGA-II-CDP 0.4 0.8 f1(x) True PF NSGA-II-CDP 1.4 2 0 0.6 1.6 True PF NSGA-II-CDP 0.6 0 1 (d)(0.5,0.5,0.5) 0.2 0.5 1 f1(x) 2.5 0.8 f2(x) 1 0.2 0 0.5 0.5 1 (c)(0.0,0.0,0.5) True PF NSGA-II-CDP f2(x) 0.4 0.4 1 True PF NSGA-II-CDP 1.2 0.8 f1(x) 1.5 0.6 0 0.4 f1(x) 1 0.8 0.6 True PF MOEA/D-CDP 1.4 1.5 f2(x) 0 1.6 True PF MOEA/D-CDP 0.2 0.6 f1(x) f2(x) f2(x) 0.4 2 True PF MOEA/D-CDP 0.8 1.2 0.6 0 1 True PF MOEA/D-CDP 1.4 f2(x) f2(x) 0.8 f2(x) (0.0,0.25,0.0) DAS-CMOP9 MOEA/D-CDP NSGA-II-CDP 2.737E-01 3.158E-01 2.447E-01 1.784E-01 3.499E-01 2.084E-01‡ 1.447E-01 1.231E-01 9.470E-02 3.315E-01† 6.021E-02 1.805E-01 3.127E-01 3.458E-01 2.813E-01 1.977E-01 3.552E-01 2.347E-01‡ 1.265E-01 1.042E-01 8.891E-02 3.847E-01† 2.556E-02 1.532E-01 1.875E-01 4.130E-01† 1.502E-01 1.874E-01 3.309E-01 1.880E-01‡ 1.275E-01 1.016E-01 1.430E-01 4.165E-01† 1.100E-01 1.053E-01 1.963E-01 3.675E-01† 1.720E-01 2.286E-01 6.635E-01 6.360E-01 5.863E-02 3.965E-02 3.265E-01 4.129E-01† 1.061E-01 4.490E-02 6.505E-01 3.184E+00† 1.102E-01 2.713E+00 3.636E-01 2.390E-01‡ 1.293E-01 1.075E-01 3.704E-01 2.902E-01‡ 1.294E-01 1.054E-01 3.874E-01 3.016E-01‡ 1.501E-01 1.283E-01 f2(x) (0.0,0.0,0.0) DAS-CMOP8 MOEA/D-CDP NSGA-II-CDP 6.679E-02 6.679E-02 5.616E-04 5.958E-03 6.759E-02 6.453E-02‡ 2.889E-03 1.798E-03 6.399E-02 7.098E-02† 1.117E-03 3.921E-03 6.756E-02 6.326E-02‡ 1.122E-03 3.801E-03 6.718E-02 6.455E-02‡ 2.691E-03 2.882E-03 6.502E-02 7.726E-02† 1.267E-03 7.831E-03 6.663E-02 5.746E-02‡ 1.498E-03 4.938E-03 6.746E-02 6.401E-02‡ 2.562E-03 2.269E-03 6.681E-02 7.974E-02† 5.307E-03 8.422E-03 6.151E-02 5.014E-02‡ 1.504E-03 5.565E-03 9.187E-02 6.621E-02 9.316E-02 2.866E-03 5.852E-02 6.803E-02† 8.136E-03 1.571E-02 6.650E-01 8.974E+00† 9.562E-02 6.236E+00 6.997E-02 6.184E-02‡ 2.735E-03 2.544E-03 6.961E-02 5.518E-02‡ 3.527E-03 2.564E-03 6.909E-02 4.677E-02‡ 3.572E-03 3.447E-03 f2(x) Instance Difficulty Triplet 1.2 1 0.8 1 f1(x) (i) (0.5,0.5,0.5) 1.5 0.6 0.4 0.6 0.8 1 1.2 1.4 f1(x) (j) (0.75,0.75,0.75) Fig. 9. The final populations with the best I GD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP3 with different difficulty triplets. (a)-(e) and (f)-(j) show the best populations achieved by MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP3 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75), respectively. JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 f2(x) f1(x) (a) (0.5,0.0,0.0) f3(x) f3(x) 0 2 2 f2(x) 1 0 0 f1(x) (f) (0.5,0.0,0.0) 1.5 1 0.5 2 f2(x) 1 0 0.5 (g) (0.0,0.5,0.0) f1(x) 0 2 f2(x) 2 1 f1(x) (h) (0.0,0.0,0.5) 0.5 1.5 f2(x) f1(x) 1 0.5 2 f2(x) 2 1 f1(x) (i) (0.5,0.5,0.5) f1(x) True PF NSGA-II-CDP 1.5 1.5 0 0 1 0.5 0.5 (e) (0.75,0.75,0.75) True PF NSGA-II-CDP 1 1.5 1 1 0 0.5 2 1 0 0 1 (d) (0.5,0.5,0.5) 0.5 1 f3(x) f2(x) f1(x) True PF NSGA-II-CDP 1.5 1.5 1 1 0 0 1.5 1 (c) (0.0,0.0,0.5) True PF NSGA-II-CDP 2 0.5 1 f2(x) f1(x) (b) (0.0,0.5,0.0) True PF NSGA-II-CDP 1 1 0.5 0 1 0.5 2 2 1 True PF MOEA/D-CDP 1.5 f3(x) 1 0 0 1 0.5 0 2 2 1 True PF MOEA/D-CDP 1.5 f3(x) 1 f3(x) f2(x) 1.5 0.5 1.5 2 1 True PF MOEA/D-CDP 1.5 f3(x) f3(x) f3(x) 1 0.5 0 2 True PF MOEA/D-CDP 2 f3(x) True PF MOEA/D-CDP 1.5 14 1 0.5 2 2 1 f2(x) 1 0 0 f1(x) (j) (0.75,0.75,0.75) Fig. 10. The final populations with the best I GD values in 30 independent runs by using MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP9 with different difficulty triplets. (a)-(e) and (f)-(j) show the best populations achieved by MOEA/D-CDP and NSGA-II-CDP on DAS-CMOP9 with difficulty triplets (0.5, 0.0, 0.0), (0.0, 0.5, 0.0), (0.0, 0.0, 0.5), (0.5, 0.5, 0.5) and (0.75, 0.75, 0.75), respectively. [18] Y. Wang, Z. Cai, Y. Zhou, and W. Zeng, “An adaptive tradeoff model for constrained evolutionary optimization,” Evolutionary Computation, IEEE Transactions on, vol. 12, no. 1, pp. 80–92, 2008. [19] B. Y. Qu and P. N. Suganthan, “Constrained multi-objective optimization algorithm with an ensemble of constraint handling methods,” Engineering Optimization, vol. 43, no. 4, pp. 403–416, 2011. [20] K. Deb, A. Pratap, S. Agarwal, and T. Meyarivan, “A fast and elitist multiobjective genetic algorithm: NSGA-II,” Evolutionary Computation, IEEE Transactions on, vol. 6, no. 2, pp. 182–197, 2002. [21] D. W. Corne, N. R. Jerram, J. D. Knowles, M. J. Oates et al., “PESA-II: Region-based selection in evolutionary multiobjective optimization,” in Proceedings of the Genetic and Evolutionary Computation Conference (GECCO’2001). Citeseer, 2001. [22] E. Zitzler, M. Laumanns, L. Thiele, E. Zitzler, E. Zitzler, L. Thiele, and L. Thiele, “SPEA2: Improving the strength pareto evolutionary algorithm,” 2001. [23] Q. Zhang and H. Li, “MOEA/D: A multiobjective evolutionary algorithm based on decomposition,” Evolutionary Computation, IEEE Transactions on, vol. 11, no. 6, pp. 712–731, 2007. [24] H. Li and Q. Zhang, “Multiobjective optimization problems with complicated pareto sets, MOEA/D and NSGA-II,” Evolutionary Computation, IEEE Transactions on, vol. 13, no. 2, pp. 284–302, 2009. [25] H.-L. Liu, F. Gu, and Q. Zhang, “Decomposition of a multiobjective optimization problem into a number of simple multiobjective subproblems,” Evolutionary Computation, IEEE Transactions on, vol. 18, no. 3, pp. 450–455, 2014. [26] X. Cai, Y. Li, Z. Fan, and Q. Zhang, “An external archive guided multiobjective evolutionary algorithm based on decomposition for combinatorial optimization,” Evolutionary Computation, IEEE Transactions on, vol. 19, no. 4, pp. 508–523, Aug 2015. [27] E. Zitzler and S. Künzli, “Indicator-based selection in multiobjective search,” in Parallel Problem Solving from Nature-PPSN VIII. Springer, 2004, pp. 832–842. [28] D. H. Phan and J. Suzuki, “R2-IBEA: R2 indicator based evolutionary algorithm for multiobjective optimization,” in Evolutionary Computation (CEC), 2013 IEEE Congress on. IEEE, 2013, pp. 1836–1845. [29] N. Beume, B. Naujoks, and M. Emmerich, “SMS-EMOA: Multiobjective selection based on dominated hypervolume,” European Journal of Operational Research, vol. 181, no. 3, pp. 1653–1669, 2007. [30] J. Bader and E. Zitzler, “HypE: An algorithm for fast hypervolumebased many-objective optimization,” Evolutionary computation, vol. 19, no. 1, pp. 45–76, 2011. [31] K. Deb, “Multi-objective Genetic Algorithms: Problem Difficulties and Construction of Test Problems,” Evolutionary Computation, vol. 7, no. 3, pp. 205–230, 1999. [32] H. Li and Q. Zhang, “Multiobjective Optimization Problems With Complicated Pareto Sets, MOEA/D and NSGA-II.” IEEE Trans. Evolutionary Computation, 2009. [33] K. Deb, L. Thiele, M. Laumanns, and E. Zitzler, Scalable test problems for evolutionary multiobjective optimization. Springer, 2005. [34] H.-L. Liu, F. Gu, and Q. Zhang, “Decomposition of a Multiobjective Optimization Problem Into a Number of Simple Multiobjective Sub- problems,” IEEE Transactions on Evolutionary Computation, vol. 18, no. 3, pp. 450–455, 2014. [35] H.-L. Liu, L. Chen, K. Deb, and E. Goodman, “Investigating the Effect of Imbalance Between Convergence and Diversity in Evolutionary Multiobjective Algorithms,” IEEE Transactions on Evolutionary Computation, vol. PP, no. 99, pp. 1–1, 2016. [36] R. Cheng, Y. Jin, M. Olhofer, and B. Sendhoff, “Test Problems for Large-Scale Multiobjective and Many-Objective Optimization,” IEEE Transactions on Cybernetics, pp. 1–14, 2016. [37] S. Huband, P. Hingston, L. Barone, and L. While, “A review of multiobjective test problems and a scalable test problem toolkit,” Evolutionary Computation, IEEE Transactions on, vol. 10, no. 5, pp. 477–506, 2006. [38] K. Deb, Multi-objective optimization using evolutionary algorithms. John Wiley & Sons, 2001, vol. 16. [39] Q. Zhang, A. Zhou, S. Zhao, P. N. Suganthan, W. Liu, and S. Tiwari, “Multiobjective optimization test instances for the cec-2009 special session and competition,” University of Essex, Colchester, UK and Nanyang technological University, Singapore, special session on performance assessment of multi-objective optimization algorithms, technical report, pp. 1–30, 2008. [40] T. T. Binh and U. Korn, “Mobes: A multiobjective evolution strategy for constrained optimization problems,” in The Third International Conference on Genetic Algorithms (Mendel 97), vol. 25. Citeseer, 1997, p. 27. [41] M. Tanaka, H. Watanabe, Y. Furukawa, and T. Tanino, “Ga-based decision support system for multicriteria optimization,” in Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century., IEEE International Conference on, vol. 2. IEEE, 1995, pp. 1556–1561. [42] N. Srinvas and K. Deb, “Multi-objective function optimization using non-dominated sorting genetic algorithms,” Evolutionary Computation, vol. 2, no. 3, pp. 221–248, 1994. [43] A. Osyczka and S. Kundu, “A new method to solve generalized multicriteria optimization problems using the simple genetic algorithm,” Structural optimization, vol. 10, no. 2, pp. 94–99, 1995. [44] H. Jain and K. Deb, “An Evolutionary Many-Objective Optimization Algorithm Using Reference-Point Based Nondominated Sorting Approach, Part II - Handling Constraints and Extending to an Adaptive Approach.” IEEE Trans. Evolutionary Computation, vol. 18, no. 4, pp. 602–622, 2014. [45] D. A. Van Veldhuizen and G. B. Lamont, “Evolutionary computation and convergence to a pareto front,” in Late breaking papers at the genetic programming 1998 conference. Citeseer, 1998, pp. 221–228. [46] H. Li, Q. Zhang, and J. Deng, “Multiobjective test problems with complicated pareto fronts: Difficulties in degeneracy,” in Evolutionary Computation (CEC), 2014 IEEE Congress on. IEEE, 2014, pp. 2156– 2163. [47] P. A. Bosman and D. Thierens, “The balance between proximity and diversity in multiobjective evolutionary algorithms,” Evolutionary Computation, IEEE Transactions on, vol. 7, no. 2, pp. 174–188, 2003.
9cs.NE
arXiv:1707.08644v2 [math.ST] 24 Oct 2017 Sharpening Jensen’s Inequality J. G. Liao and Arthur Berg Division of Biostatistics and Bioinformatics Penn State University College of Medicine October 26, 2017 Abstract This paper proposes a new sharpened version of the Jensen’s inequality. The proposed new bound is simple and insightful, is broadly applicable by imposing minimum assumptions, and provides fairly accurate result in spite of its simple form. Applications to the moment generating function, power mean inequalities, and RaoBlackwell estimation are presented. This presentation can be incorporated in any calculus-based statistical course. Keywords: Jensen gap, Power mean inequality, Rao-Blackwell Estimator, Taylor series 1 1 Introduction Jensen’s inequality is a fundamental inequality in mathematics and it underlies many important statistical proofs and concepts. Some standard applications include derivation of the arithmetic-geometric mean inequality, non-negativity of Kullback and Leibler divergence, and the convergence property of the expectation-maximization algorithm (Dempster et al., 1977). Jensen’s inequality is covered in all major statistical textbooks such as Casella and Berger (2002, Section 4.7) and Wasserman (2013, Section 4.2) as a basic mathematical tool for statistics. Let X be a random variable with finite expectation and let ϕ(x) be a convex function, then Jensen’s inequality (Jensen, 1906) establishes E [ϕ (X)] − ϕ (E [X]) ≥ 0. (1) This inequality, however, is not sharp unless var(X) = 0 or ϕ(x) is a linear function of x. Therefore, there is substantial room for advancement. This paper proposes a new sharper bound for the Jensen gap E[ϕ(X)] − ϕ (E[X]). Some other improvements of Jensen’s inequality have been developed recently; see for example Walker (2014), Abramovich and Persson (2016); Horvath et al. (2014) and references cited therein. Our proposed bound, however, has the following advantages. First, it has a simple, easy to use, and insightful form in terms of the second derivative ϕ′′ (x) and var(X). At the same time, it gives fairly accurate results in the several examples below. Many previously published improvements, however, are much more complicated in form, much more involved to use, and can even be more difficult to compute than E[ϕ(X)] itself as discussed in Walker (2014). Second, our method requires only the existence of ϕ′′ (x) and is therefore broadly applicable. In contrast, some other methods require ϕ(x) to admit a power series representation with positive coefficients (Abramovich and Persson, 2016; Dragomir, 2014; Walker, 2014) or require ϕ(x) to be super-quadratic (Abramovich et al., 2014). Third, we provide both a lower bound and an upper bound in a single formula. We have incorporated the materials in this paper in our classroom teaching. With only slightly increased technical level and lecture time, we are able to present a much sharper version of the Jensen’s inequality that significantly enhances students’ understanding of 2 the underlying concepts. 2 Main result Theorem 1. Let X be a one-dimensional random variable with mean µ, and P (X ∈ (a, b)) = 1, where −∞ ≤ a < b ≤ ∞. Let ϕ(x) is a twice differentiable function on (a, b), and define function h(x; ν) , Then ϕ (x) − ϕ (ν) ϕ′ (ν) − . x−ν (x − ν)2 inf {h(x; µ)}var(X) ≤ E [ϕ (X)] − ϕ (E[X]) ≤ sup {h(x; µ)}var(X). x∈(a,b) (2) x∈(a,b) Proof. Let F (x) be the cumulative distribution function of X. Applying Taylor’s theorem to ϕ(x) about µ with a mean-value form of the remainder gives ϕ(x) = ϕ(µ) + ϕ′ (µ)(x − µ) + ϕ′′ (g(x)) (x − µ)2 , 2 where g(x) is between x and µ. Explicitly solving for ϕ′′ (g(x))/2 gives ϕ′′ (g(x))/2 = h(x; µ) as defined above. Therefore b E [ϕ (X)] − ϕ (E [X]) = Z = Z = Z b {ϕ(x) − ϕ(µ)} dF (x) a a a ϕ′ (µ)(x − µ) + h(x; µ)(x − µ)2 dF (x) b h(x; µ)(x − µ)2 dF (x), and the result follows because inf x∈(a,b) h(x; µ) ≤ h(x; µ) ≤ supx∈(a,b) h(x; µ). Theorem 1 also holds when inf h(x; µ) is replaced by inf ϕ′′ (x)/2 and sup h(x; µ) replaced by sup ϕ′′ (x)/2 since inf ϕ′′ (x) ≤ inf h(x; µ) and 2 sup ϕ′′ (x) ≥ sup h(x; µ). 2 These less tight bounds are implied in the economics working paper Becker (2012). Our lower and upper bounds have the general form J · var(X), where J depends on ϕ. Similar 3 forms of bounds are presented in Abramovich and Persson (2016); Dragomir (2014); Walker (2014), but our J in Theorem 1 is much simpler and applies to a wider class of ϕ. Inequality (2) implies Jensen’s inequality when ϕ′′ (x) ≥ 0. Note also that Jensen’s inequality is sharp when ϕ(x) is linear, whereas inequality (2) is sharp when ϕ(x) is a quadratic function of x. In some applications the moments of X present in (2) are unknown, although a random sample x1 , . . . , xn from the underlying distribution F is available. A version of Theorem 1 suitable for this situation is given in the following corollary. Corollary 1.1. Let x1 , . . . , xn be any n datapoints in (−∞, ∞), and let n 1X x̄ = xi , n i=1 n 1X ϕ(xi ), ϕx = n i=1 n 1X S = (xi − x̄)2 . n i=1 2 Then inf h(x; x̄)S 2 ≤ ϕx − ϕ(x̄) ≤ sup h(x; x̄)S 2 , x∈[a,b] x∈[a,b] where a = min{x1 , . . . , xn } and b = max{x1 , . . . , xn }. Proof. Consider the discrete random variable X with probability distribution P (X = xi ) = 1/n, i = 1, . . . , n. We have E[X] = x̄, E[ϕ(X)] = ϕx , and var(X) = S 2 . Then the corollary follows from application of Theorem 1. Lemma 1. If ϕ′ (x) is convex, then h(x; µ) is monotonically increasing in x, and if ϕ′ (x) is concave, then h(x; µ) is monotonically decreasing in x. Proof. We prove that h′ (x; µ) ≥ 0 when ϕ′ (x) is convex. The analogous result for concave ϕ′ (x) follows similarly. Note that dh(x; µ) = dx ϕ′ (x)+ϕ′ (µ) − ϕ(x)−ϕ(µ) 2 x−µ 2 1 (x − µ) , 2 so it suffices to prove ϕ (x) − ϕ (µ) ϕ′ (x) + ϕ′ (µ) ≥ . 2 x−µ Without loss of generality we assume x > µ. Convexity of ϕ′ (x) gives ϕ′ (y) ≤ϕ′ (µ) + ϕ′ (x) − ϕ′ (µ) (y − µ) x−µ 4 for all y ∈ (µ, x). Therefore we have Z x ϕ (x) − ϕ (µ) = ϕ′ (y) dy µ  Z x ϕ′ (x) − ϕ′ (µ) ′ ≤ (y − µ) dy ϕ (µ) + x−µ µ ϕ′ (x) + ϕ′ (µ) = (x − µ) . 2 and the result follows. Lemma 1 makes Theorem 1 easy to use as the follow results hold:   inf h(x; µ) = lim h(x; µ) x→a , when ϕ′ (x) is convex  sup h(x; µ) = lim h(x; µ) x→b   inf h(x; µ) = lim h(x; µ) x→b , when ϕ′ (x) is concave.  sup h(x; µ) = lim h(x; µ) x→a Note the limits of h(x; µ) can be either finite or infinite. The proof of Lemma 1 borrows ideas from Bennish (2003). Examples of functions ϕ(x) for which ϕ′ is convex include ϕ(x) = exp(x) and ϕ(x) = xp for p ≥ 2 or p ∈ (0, 1]. Examples of functions ϕ(x) for which ϕ′ is concave include ϕ(x) = − log x and ϕ(x) = xp for p < 0 or p ∈ [1, 2]. 3 Examples Example 1 (Moment Generating Function). For any random variable X supported on (a, b) with a finite variance, we can bound the moment generating function E[etX ] using Theorem 1 to get inf {h(x; µ)}var(X) ≤ E[etX ] − etE[X] ≤ sup {h(x; µ)}var(X), x∈(a,b) x∈(a,b) where h(x; µ) = For t > 0 and (a, b) = (−∞, ∞), we have tetµ etx − etµ − . (x − µ)2 x − µ inf h(x; µ) = lim h(x; µ) = 0 and x→−∞ 5 sup h(x; µ) = lim h(x; µ) = ∞. x→∞ So Theorem 1 provides no improvement over Jensen’s inequality. However, on a finite domain such as a non-negative random variable with (a, b) = (0, ∞), a significant improvement in the lower bound is possible because inf h(x; µ) = h(0; µ) = 1 − etµ + tµetµ > 0. µ2 Similar results hold for t < 0. We apply this to an example from Walker (2014), where X is an exponential random variable with mean 1 and ϕ(x) = etx with t = 1/2. Here the √ actual Jensen’s gap is E[etX ] − et E[X] = 2 − e ≈ .351. Since var(X) = 1, we have .176 ≈ h(0; µ) ≤ E[etX ] − et E[X] ≤ lim h(x; µ) = ∞. x→∞ The less sharp lower bound using inf ϕ′′ (x)/2 is 0.125. Utilizing elaborate approximations and numerical optimizations Walker (2014) yielded a more accurate lower bound of 0.271. Example 2 (Arithmetic vs Geometric Mean). Let X be a positive random variable on interval (a, b) with mean µ. Note that − log(x) is convex whose derivative is concave. Applying Theorem 1 and Lemma 1 leads to lim h(x; µ)var(X) ≤ −E{log(X)} + log µ ≤ lim h(x; µ)var(X), x→a x→b where h(x; µ) = 1 − log x + log µ + . 2 (x − µ) µ(x − µ) Now consider a sample of n positive data points x1 , . . . , xn . Let x̄ be the arithmetic 1 mean and x̄g = (x1 x2 · · · xn ) n be the geometric mean. Applying Corollary 1.1 gives exp{S 2 h(b; x̄)} ≤ x̄ ≤ exp{S 2 h(a; x̄)}, x̄g where a, b, S 2 are as defined in Corollary 1.1. To give some numerical results, we generated 100 random numbers from uniform distribution on [10,100]. For these 100 numbers, the arithmetic mean x̄ is 54.830 and the geometric mean x̄g is 47.509. The above inequality becomes 1.075 ≤ x̄ 1 (x1 x2 · · · xn ) n = 1.154 ≤ 1.331, which are fairly tight bounds. Replacing h(xn ; x̄) by ϕ′′ (xn )/2 and h(x1 ; x̄) by ϕ′′ (x1 )/2 leads to a less accurate lower bound 1.0339 and upper bound 21.698. 6 Example 3 (Power Mean). Let X be a positive random variable on a positive interval (a, b) with mean µ. For any real number s 6= 0, define the power mean as Ms (X) = (EX s )1/s Jensen’s inequality establishes that Ms (X) is an increasing function of s. We now give a sharper inequality by applying Theorem 1. Let r 6= 0, Y = xr , µy = EY , p = s/r and ϕ(y) = y p . Note that EX s = E{ϕ(Y )}. Applying Theorem 1 leads to inf h(y; µy )var(Y ) ≤ E[X s ] − (EX r )p ≤ sup h(y; µy )var(Y ), where h(y; µy ) = y p − µpy pµp−1 y . − 2 (y − µy ) y − µy To apply Lemma 1, note that ϕ′ (y) is convex for p ≥ 2 or p ∈ (0, 1] and is concave for p < 0 or p ∈ [1, 2] as noted in Section 2. Applying the above result to the case of r = 1 and s = −1, we have Y = X, p = −1. Therefore  −1  −1  −1 −1 −1 −1 (EX) + lim h(y; µy )var(X) ≤ EX ≤ (EX) + lim h(y; µy )var(X) . y→a y→b For the same sequence x1 , . . . , xn generated in Example 2, we have x̄harmonic = 39.113. Applying Corollary 1.1 leads to 25.337 ≤ x̄harmonic = 39.113 ≤ 48.905. Note that the upper bound 48.905 is much smaller than the arithmetic mean x̄ = 54.830 by the Jensen’s inequality. Replacing h(b; x̄) by ϕ′′ (b)/2 and h(a; x̄) by ϕ′′ (a)/2 leads to a less accurate lower bound 0.8298 and 51.0839. In a recent article published in the American Statistician, de Carvalho (2016) revisited Kolmogorov’s formulation of generalized mean as Eϕ (X) = ϕ−1 (E [ϕ(X)]), (3) where ϕ is a continuous monotone function with inverse ϕ−1 . The Example 2 corresponds to ϕ(x) = − log(x) and Example 3 corresponds to ϕ(x) = xs . We can also apply Theorem 1 to bound ϕ−1 (Eϕ(X)) for a more general function ϕ(x). 7 Example 4 (Rao-Blackwell Estimator). Rao-Blackwell theorem (Theorem 7.3.17 in Casella and Berger, 2002; Theorem 10.42 in Wasserman, 2013) is a basic result in statistical estimation. Let θ̂ be an estimator of θ, L(θ, θ̂) be a loss function convex in θ̂, and T a sufficient statistic. Then the Rao-Blackwell estimator, θ̂∗ = E[θ̂ | T ], satisifies the following inequality in risk function E[L(θ, θ̂)] ≥ E[L(θ, θ̂∗ )]. (4) We can improve this inequality by applying Theorem 1 to ϕ(θ̂) = L(θ, θ̂) with respect to the conditional distribution of θ̂ given T : E[L(θ, θ̂) | T ] − L(θ, θ̂∗ ) ≥ inf h(x; θ̂∗ )var(θ̂ | T ), x∈(a,b) where function h is defined as in Theorem 1 for ϕ(θ̂) and P (θ̂ ∈ (a, b) | T ) = 1. Further taking expectations over T gives ∗ E[L(θ, θ̂)] − E[L(θ, θ̂ )] ≥ E  ∗  inf h(x; θ̂ )var(θ̂ | T ) . x∈(a,b) In particular for square-error loss, L(θ, θ̂) = (θ̂ − θ)2 , we have h i E[(θ − θ̂) ] − E[(θ − θ̂ ) ] = E var(θ̂ | T ) . 2 ∗ 2 Using the original Jensen’s inequality only establishes the cruder inequality in Equation (4). 4 Improved bounds by partitioning As discussed in Example 1 above, Theorem 1 does not improve on Jensen’s inequality if inf h(x; µ) = 0. In such cases, we can often sharpen the bounds by partitioning the domain (a, b) following an approach used in Walker (2014). Let a = x0 < x1 < · · · < xm = b, Ij = [xj−1 , xj ), ηj = P (X ∈ Ij ), and µj = E(X | X ∈ Ij ). It follows from the law of total expectation that 8 E[ϕ(X)] = = m X j=1 m X ηj E[ϕ(X) | X ∈ Ij ] ηj ϕ(µj ) + j=1 m X j=1 ηj (E[ϕ(X) | X ∈ Ij ] − ϕ(µj )) . Let Y be a discrete random variable with distribution P (Y = µj ) = ηj , j = 1, 2, . . . , m. It is easy to see that EY = EX. It follows by Theorem 1 that m X j=1 ηj ϕ(µj ) = E [ϕ (Y )] ≥ ϕ(EY ) + inf y∈[µ1 ,µm ] h(y; µy )var(Y ). We can also apply Theorem 1 to each E[ϕ(X | X ∈ Ij )] − ϕ(µj ) term: E[ϕ(X | X ∈ Ij )] − ϕ(µj ) ≥ inf h(x; µj )var(X | X ∈ Ij ). x∈Ij Combining the above two equations, we have E[ϕ(X)] − ϕ(EX) ≥ inf y∈[µ1 ,µm ] h(y; µy )var(Y ) + m X j=1 ηj inf h(x; µj )var(X | X ∈ Ij ). x∈Ij (5) Replacing inf by sup in the righthand side gives the upper bound. The Jensen gap on the left side of (5) is positive if any of the m + 1 terms on the right is positive. In particular, the Jensen gap is positive if there exists an interval I ⊂ (a, b) that satisfies inf x∈I ϕ′′ (x) > 0, P (X ∈ I) > 0 and var(X | X ∈ I) > 0. Note that a finer partition does not necessarily lead to a sharper lower bound in (5). The focus of the partition should therefore be on isolating the part of interval (a, b) in which ϕ′′ (x) is close to 0. Consider example X∼N (µ, σ 2 ) with µ = 0 and σ = 1 and ϕ(x) = ex . We divide (−∞, ∞) into three intervals with equal probabilities. This gives Ij ηj (−∞, −.431) 1/3 -1.091 0.280 0.000 0.212 (−0.431, 0.431) 1/3 0.000 0.060 0.435 0.580 1.091 0.280 1.209 ∞ (0.431, ∞) 1/3 E[X | X ∈ Ij ] var(X | X ∈ Ij ) 9 inf x∈Ij h(x; µj ) supx∈Ij h(x; µj ) σ The actual Jensen gap is eµ+ 2 − eµ = 0.649. The lower bound from (5) is 0.409, which is a huge improvement over Jensen’s bound of 0. The upper bound ∞, however, provides no improvement over Theorem 1. To summarize, this paper proposes a new sharpened version of the Jensen’s inequality. The proposed bound is simple and insightful, is broadly applicable by imposing minimum assumptions on ϕ(x), and provides fairly accurate result in spite of its simple form. It can be incorporated in any calculus-based statistical course. References Abramovich, S. and L.-E. Persson (2016). Some new estimates of the Jensen gap. Journal of Inequalities and Applications 2016 (1), 39. Abramovich, S., L.-E. Persson, and N. Samko (2014). Some new scales of refined Jensen and Hardy type inequalities. Mathematical Inequalities & Applications 17 (3), 1105–1114. Becker, R. A. (2012). The variance drain and Jensen’s inequality. Technical report, CAEPR Working Paper No. 2012-004. Available at SSRN: https://ssrn.com/abstract=2027471 or http://dx.doi.org/10.2139/ssrn.2027471. Bennish, J. (2003). A proof of Jensens inequality. Missouri Journal of Mathematical Sciences, 15 (1). Casella, G. and R. L. Berger (2002). Statistical inference, Volume 2. Duxbury Pacific Grove, CA. de Carvalho, M. (2016). Mean, what do you mean? The American Statistician 70 (3), 270–274. Dempster, A. P., N. M. Laird, and D. B. Rubin (1977). Maximum likelihood from incomplete data via the em algorithm. Journal of the royal statistical society. Series B (methodological), 1–38. Dragomir, S. (2014). Jensen integral inequality for power series with nonnegative coefficients and applications. RGMIA Res. Rep. Collect 17, 42. 10 Horvath, L., K. A. Khan, and J. Pecaric (2014). Refinement of Jensen’s inequality for operator convex functions. Advances in inequalities and applications 2014. Jensen, J. L. W. V. (1906). Sur les fonctions convexes et les inégalités entre les valeurs moyennes. Acta mathematica 30 (1), 175–193. Walker, S. G. (2014). On a lower bound for the Jensen inequality. SIAM Journal on Mathematical Analysis 46 (5), 3151–3157. Wasserman, L. (2013). All of statistics: a concise course in statistical inference. Springer Science & Business Media. 11
10math.ST
Stochastic k-Server: How Should Uber Work?* Sina Dehghani ∗† Soheil Ehsani arXiv:1705.05755v2 [cs.DS] 30 May 2017 Vahid Liaghat ‡ ∗† MohammadTaghi HajiAghayi Saeed Seddighin ∗† ∗† Abstract In this paper we study a stochastic variant of the celebrated k-server problem. In the kserver problem, we are required to minimize the total movement of k servers that are serving an online sequence of t requests in a metric. In the stochastic setting we are given t independent distributions hP1 , P2 , . . . , Pt i in advance, and at every time step i a request is drawn from Pi . Designing the optimal online algorithm in such setting is NP-hard, therefore the emphasis of our work is on designing an approximately optimal online algorithm. We first show a structural characterization for a certain class of non-adaptive online algorithms. We prove that in general metrics, the best of such algorithms has a cost of no worse than three times that of the optimal online algorithm. Next, we present an integer program that finds the optimal algorithm of this class for any arbitrary metric. Finally by rounding the solution of the linear relaxation of this program, we present an online algorithm for the stochastic k-server problem with an approximation factor of 3 in the line and circle metrics and factor of O(log n) in a general metric of size n. In this way, we achieve an approximation factor that is independent of k, the number of servers. Moreover, we define the Uber problem, motivated by extraordinary growth of online network transportation services. In the Uber problem, each demand consists of two points -a source and a destination- in the metric. Serving a demand is to move a server to its source and then to its destination. The objective is again minimizing the total movement of the k given servers. We show that given an α-approximation algorithm for the k-server problem, we can obtain an (α + 2)-approximation algorithm for the Uber problem. Motivated by the fact that demands are usually highly correlated with the time (e.g. what day of the week or what time of the day the demand has arrived), we study the stochastic Uber problem. Using our results for stochastic k-server we can obtain a 5-approximation algorithm for the stochastic Uber problem in line and circle metrics, and a O(log n)-approximation algorithm for general metrics. Furthermore, we extend our results to the correlated setting where the probability of a request arriving at a certain point depends not only on the time step but also on the previously arrived requests. 1 Introduction The k-server problem is one of the most fundamental problems in online computation that has been extensively studied in the past decades. In the k-server problem we have k mobile servers on a metric space M. We receive an online sequence of t requests where the ith request is a point ri ∈ M. Upon the arrival of ri , we need to move a server to ri , at a cost equal to the distance ∗ University of Maryland Supported in part by NSF CAREER award CCF-1053605, NSF BIGDATA grant IIS-1546108, NSF AF:Medium grant CCF-1161365, DARPA GRAPHS/AFOSR grant FA9550-12-1-0423, and another DARPA SIMPLEX grant. ‡ Facebook † from the current position of the server to ri . The goal is to minimize the total cost of serving all requests. Manasse, McGeoch, and Sleator [31] introduced the k-server problem as a natural generalization of several online problems, and a building block for other problems such as the metrical task systems. They considered the adversarial model, in which the online algorithm has no knowledge of the future requests. Following the proposition of Sleator and Tarjan [34], they evaluate the performance of an online algorithm using competitive analysis. In this model, an online algorithm ALG is compared to an offline optimum algorithm OPT which is aware of the entire input in advance. For a sequence of requests ρ, let |ALG(ρ)| and |OPT(ρ)| denote the total cost of ALG and OPT for serving ρ. An algorithm is c-competitive if for every ρ, |ALG(ρ)| ≤ c |OPT(ρ)| + c0 where c0 is independent of ρ. Manasse et al. [31] showed a lower bound of k for the competitive ratio of any deterministic algorithm in any metric space with at least k + 1 points. The celebrated k-server conjecture states that this bound is tight for general metrics. For several years the known upper bounds were all exponential in k, until a major breakthrough was achieved by Koutsoupias and Papadimitriou [29], who showed that the so-called work function algorithm is (2k − 1)-competitive. Proving the tight competitive ratio has been the “holy grail” of the field in the past two decades. This challenge has led to the study of the problem in special spaces such as the uniform metric (also known as the paging problem), line, circle, and trees metrics (see [15, 16] and references therein). We also refer the reader to Section 1.3 for a short survey of randomized algorithms, particularly the recent result of Bansal, Buchbinder, Madry, and Naor [7] which achieves the competitive ratio of O(log3 n log2 k) for discrete metrics that comprise n points. The line metric (or Euclidean 1-dimensional metric space) is of particular interest for developing new ideas. Chrobak, Karloof, Payne, and Vishwnathan [15] were the first to settle the conjecture in the line by designing an elegant k-competitive algorithm. Chrobak and Larmore [16] generalized this approach to tree metrics. Later, Bartal and Koutsoupias [10] proved that the work function algorithm is also k-competitive in line. Focusing on the special case of k = 2 in line, Bartal et al. [9] show that, using randomized algorithms, one can break the barrier of lower bound k by giving a 1.98-competitive algorithm for the case where we only have two servers. Despite the strong lower bounds for the k-server problem, there are heuristics algorithms that are constant competitive in practice. For example, for the paging problem- the special case of uniform metric- the least recently used (LRU) strategy is shown to be experimentally constant competitive (see Section 1.3). In this paper we present an algorithm an run it on real world data to measure its empirical performance. In particular we use the distribution of car accidents obtained from road safety data. Our experiments illustrate our algorithm is performing even better in practice. The idea of comparing the performance of an online algorithm (with zero-knowledge of the future) to the request-aware offline optimum has led to crisp and clean solutions. However, that is not without its downsides. The results in the online model are often very pessimistic leading to theoretical guarantees that are hardly comparable to experimental results. Indeed, one way to tighten this gap is to use stochastic information about the input data as we describe in this paper. We should also point out that the competitive analysis is not the only possible or necessarily the most suitable approach for this problem. Since the distributions from which the input is generated are known, one can use dynamic programming (or enumeration of future events) to derive the optimal movement of servers. Unfortunately, finding such an optimal online solution using the distributions is an NP-hard problem 1 , thus the dynamic programming or any other approach takes 1 Reduction from k-median to Stochastic k-server: to find the k median of set S of vertices, one can construct an instance of stochastic k-server with t = 1 and P1 (v) = 1/|S| for every v ∈ S. The best initialization of the servers 2 exponential time. This raises the question that how well one can perform in comparison to the best online solution. In the rest of the paper we formally define the model and address this question. A natural and well-motivated generalization of k-server is to assume the demands are two points instead of just one, consisting of a source and a destination. To serve a demand we need to move a server to the source and then move it to the destination. We call this problem the Uber problem. One can see, the Uber problem is the same as k-server when the sources and the destinations are the same. We also show that, given an α-approximation algorithm for the k-server problem, we can obtain a (α + 2)-approximation algorithm for the Uber problem. Thus our results for k-server also apply to the Uber problem. 1.1 The Stochastic Model In this paper, we study the stochastic k-server problem where the input is not chosen adversarially, but consists of draws from given probability distributions. This problem has lots of applications such as network transportations and equipment replacement in data centers. The current mega data centers contain hundreds of thousands of servers and switches with limited life-span. For example servers usually retire after at most three years. The only efficient way to scale up the maintenance in data centers is by automation, and robots are designed to handle maintenance tasks such as repairs or manual operations on servers. The replacement process can be modeled as requests that should be satisfied by robots, and robots can be modeled as servers. This problem also has applications in physical networks. As an example, suppose we model a shopping service (e.g. Google Express) as a k-server problem in which we receive an online sequence of shopping requests for different stores. We have k shopping cars (i.e., servers) that can serve the requests by traveling to the stores. It is quiet natural to assume that on a certain time of the week/day, the requests arrive from a distribution that can be discovered by analyzing the history. For example, an Uber request is more likely to be from suburb to midtown in the morning, and from midtown to suburb at night. We formalize this stochastic information as follows. For every i ∈ [1 · · · t], a discrete probability distribution Pi is given in advance from which request ri will be drawn at time step i. The distributions are chosen by the adversary and are assumed to be independent but not necessarily identical. This model is inspired by the well-studied model of prophet inequalities 2 [30, 25]. As mentioned before, the case of line metric has proven to be a very interesting restricted case for studying the k-server problem. In this paper, we focus mainly on the class of line metric though our results carry over to circle metric and general metrics as well. In the adversarial model, the competitive ratio seems to be the only well-defined notion for analyzing the performance of online algorithms. However, in the presence of stochastic information, one can derive a much better benchmark that allows us to make fine-grained distinctions between the online algorithms. We recall that in the offline setting, for a class of algorithms C, the natural notion to measure the performance of an algorithm ALG ∈ C is the approximation ratio defined as the worse case ratio of |ALG| to |OPT(C)| where OPT(C) is the optimal algorithm in the class. In this paper, we also measure the performance of an online algorithm by its approximation ratio– compared to the optimal online solution. We note that given distributions P1 , . . . , Pt , one can iteratively compute the optimal online solution by solving the following exponential-size dynamic gives the optimum solution to k-median of S. 2 In the prophet inequality setting, given (not necessarily identical) distributions P1 , . . . , Pt , an online sequence of values x1 , . . . , xn where xi is drawn from Pi , an onlooker has to choose one item from the succession of the values, where xi is revealed at step i. The onlooker can choose a value only at the time of arrival. The goal is to maximize the chosen value. 3 program: for every i ∈ [0 · · · t] and every possible placement A of k servers (called a configuration) on the metric, let τ (i, A) denote the minimum expected cost of an online algorithm for serving the first i requests and then moving the servers to configuration A. Note that τ (i, A) can inductively be computed via the following recursive formula τ (i, A) = min τ (i − 1, B) + Eri ∼Pi [min. distance from B to A subject to serving ri ] , B where τ (0, A) is initially zero for every A. 1.2 Our Results Our first main result is designing a constant approximation algorithm in the line metric when the distributions for different time steps are not necessarily identical. Theorem 1.1 There exists a 3-approximation online algorithm for the stochastic k-server problem in the line metric. The running time is polynomial in k and the sum of the sizes of the supports of input distributions. The same guarantee holds for the circle metric. For the general metric, we present an algorithm with a logarithmic approximation guarantee. Theorem 1.2 There exists a O(log n)-approximation online algorithm for the stochastic k-server problem in a general metric of size n. We prove the theorems using two important structural results. The first key ingredient is a general reduction from class of online algorithms to a restricted class of non-adaptive algorithms while losing only a constant factor in the approximation ratio. Recall that a configuration is a placement of k-servers on the metric. We say an algorithm ALG is non-adaptive if it follows the following procedure: ALG pre-computes a sequence of configurations A0 , A1 , . . . , At . We start by placing the k-servers on A0 . Upon the arrival of ri , (i) we move the servers to configuration Ai ; next (ii) we move the closest server s to ri ; and finally (iii) we return s to its original position in Ai . We first prove the following structural result. Theorem 1.3 For the stochastic k-server problem in the general metric, the optimal non-adaptive online algorithm is within 3-approximation of the optimal online algorithm. Using the aforementioned reduction, we focus on designing the optimal non-adaptive algorithm. We begin by formulating the problem as an integer program. The second ingredient is to use the relaxation of this program to formalize a natural fractional variant of the problem. In this variant, a configuration is a fractional assignment of server mass to the points of the metric such that the total mass is k. To serve a request at point ri , we need to move some of the mass to have at least one amount of server mass on ri . The cost of moving the server mass is naturally defined as the integral of the movement of infinitesimal pieces of the server mass. By solving the linear relaxation of the integer program, we achieve the optimal fractional non-adaptive algorithm. We finally prove Theorems 1.1 and 1.2 by leveraging the following rounding techniques. The rounding method in line has been also observed by Türkoglu [35]. We provide the proof for the case of line in Section 5 for the sake of completeness. The rounding method for general metrics is via the wellknown embedding of a metric into a distribution of well-separated trees while losing a logarithmic factor in the distortion. Bansal et al. [7] use a natural rounding method similar to that of Blum, Burch, and Kalai [12] to show that any fractional k-server movement on well-separated trees can be rounded to an integral counterpart by losing only a constant factor. 4 Theorem 1.4 (first proven in [35]) Let ALGf denote a fractional k-server algorithm in the line, or circle. One can use ALGf to derive a randomized integral algorithm ALG such that for every request sequence σ, E [|ALG(σ)|] = |ALGf (σ)|. The expectation is over the internal randomness of ALG. Furthermore, in the stochastic model ALG can be derandomized. Theorem 1.5 (proven in [7]) Let ALGf denote a fractional k-server algorithm in any metric. One can use ALGf to derive a randomized integral algorithm ALG such that for every request sequence σ, E [|ALG(σ)|] ≤ O(log n) |ALGf (σ)|. We further show that in the stochastic setting, if the number of possible input scenarios is m, even if the distributions are correlated, one can compute the best fractional online competitive algorithm in time polynomial in m and n. Note that since the number of placements of k servers on n points is exponential, it is not possible to enumerate all the possible choices of an online algorithm. We solve this problem by presenting a non-trivial LP relaxation of the problem with size polynomial in n and m; therefore obtaining the following result. We present the formal model and analysis in Appendix A. Theorem 1.6 The optimal online algorithm of the stochastic k-server problem with correlated setting in line and circle can be computed in polynomial time w.r.t. the number of possible scenarios. In general metrics, an O(log n)-approximation algorithm can be obtained. We also show that having an α-approximation algorithm for k-server, we can obtain a (α + 2)approximation for the Uber problem, using a simple reduction. Theorem 1.7 Let ALG denote an α-approximation algorithm for k-server. One can use ALG to derive a (α + 2)-approximation algorithm for the Uber problem. Proof. Consider an instance of the Uber problem IU . Let si and ti denote the i-th source and destination, respectively. We generate an instance of the k-server problem Ik by removing every ti from IU . In other words the demands are si ’s. We use ALG to provide a solution for IU as follows. For satisfying the i-th demand, we use ALG to move a server to si . Then using the shortest path from si to ti , we move that server to ti and then return it back to si . Let OPTU and OPTk denote the cost of the optimal solutions for IU and Ik , respectively. Let d(si , ti ) denote the distance of ti from si in the metric. Let C denote the total movement of the servers. We have, OPTU ≥ OPTk . X OPTU ≥ d(si , ti ). i C ≤ α OPTk +2 X d(si , ti ) ≤ (α + 2) OPTU . i  1.3 Further Related Work The randomized algorithms often perform much better in the online paradigm. For the k-server problem, a lower bound of Ω(log k) is shown by [28] for the competitive ratio of randomized algorithms in most common metrics. Despite the exponential gap, compared to the lower bound of deterministic algorithms, very little is known about the competitiveness of randomized algorithms. 5 In fact, the only known algorithms with competitive ratios below k, work either in the uniform metric (also known as the paging problem [21, 32, 2, 8]), a metric comprising k + 1 points [23], and two servers on the line [9]. Two decades after the introduction of the k-server problem, a major breakthrough was achieved by Bansal et al. [7] in discrete metrics with sub-exponential size. If M comprise n points, their randomized algorithm achieves a competitive ratio of O(log3 n log2 k). The case of uniform metric has been extensively studied under various stochastic models motivated by the applications in computer caching. Koutsoupias and Papadimitriou [29] consider two refinements of the competitive analysis for server problems. First, they consider the diffuse adversary model. In this model, at every step i the adversary chooses a distribution Di over the uniform metric of the paging problem. Then the ith request is drawn from Di which needs to be served. The distribution Di is not known to the online algorithm and it may depend on the previous requests. However, in their paper, they consider the case wherein it is guaranteed that for every point p, Di (p) ≤  for a small enough ; i.e., the next request is not predictable with absolute certainty for the adversary. The results of Koutsoupias and Papadimitriou and later Young [36] shows that the optimum competitive ratio in this setting is close to 1 + Θ(k). The second refinement introduced in [29] restricts the optimal solution to having lookahead at most `. Hence, one can define a comparative ratio which indicates the worst-case ratio of the cost of the best online solution to the best solution with lookahead `. They show that for the k-server problem, and more generally the metrical task system problem, there are online algorithms that admit a comparative ratio of 2` + 1; for some instances this ratio is tight. Various other models of restricting the adversary (access graph model [14, 26, 22], fault rate model [27, 6, 19], etc) have also been considered for the paging problem (see [33, 11] and references therein for a further survey of these results). Unfortunately, many of the stochastic settings considered for the paging problem do not seem to have a natural generalization beyond the uniform metric setting. For example, in the diffuse adversary model, most of the studied distributions do not weaken the adversary in the general metric. In this paper, we look for polynomial-time approximation algorithms in the class of online algorithms that have access to the distributions. We would like to mention that various online problems have been previously considered under prophet inequality model or i.i.d. model (where all distributions are identical). The maximum matching problem, scheduling, and online network design has been extensively studied in these models(see e.g. [3, 5, 4, 17, 1, 18]). In the graph connectivity problems, Garg, Gupta, Leonardi,and Sankowski [24] consider the online variants of Steiner tree and several related problems under the i.i.d. stochastic model. In the adversarial model, there exists an Ω(log n) lower bound on the competitive ratio of any online algorithm, where n is the number of demands. However, Garg et al. show that under the i.i.d. assumption, these problems admit online algorithms with constant or O(log log n) competitive ratios. We refer the reader to the excellent book by Borodin and ElYaniv [13] for further study of online problems. 2 Preliminaries In this section we formally define the stochastic k-server problem. The classical k-server problem is defined on a metric M which consists of points that could be infinitely many. For every two points x and y in metric M, let d(x, y) denote the distance of x from y which is a symmetric function and 6 satisfies the triangle inequality. More precisely for every three points x, y, and z we have d(x, x) = 0 (1) d(x, y) = d(y, x) (2) d(x, y) + d(y, z) ≥ d(x, z). (3) In the k-server problem the goal is to place k servers on k points of the metric, and move these servers to satisfy the requests. We refer to every placement of the servers on the metric points by a configuration. Let ρ = hr1 , r2 , . . . , rt i be a sequence of requests, the goal of the kserver problem is to find configurations hA0 , A1 , A2 , . . . , At i such that for every i there exists a server on point ri in configuration Ai . We say such a list of configurations is valid for the given P list of requests. A valid sequence of configurations is optimal if d(Ai−1 , Ai ) is minimized where d(X, Y ) stands for the minimum cost of moving servers from configuration X to configuration Y . An optimal sequence hA0 , A1 , . . . , At i of configurations is called an optimal offline solution of OFKS(M, ρ) when Pρ is known in advance. We refer to the optimal cost of such movements with | OFKS(M, ρ)| = d(Ai−1 , Ai ). We also define the notion of fractional configuration as an assignment of the metric points to non-negative real numbers. More precisely, each number specifies a mass of fractional server on a point. Every fractional solution adheres to the following condition: The total sum of the values assigned to all points is exactly equal to k. Analogously, a fractional configuration serves a request ri if there is a mass of size at least 1 of server assigned to point ri . An offline fractional solution of the k-server problem for a given sequence of requests ρ is defined as a sequence of fractional configurations hA0 , A1 , . . . , At i such that Ai serves ri . In the online k-server problem, however, we are not given the whole sequence of requests in the beginning, but we will be informed of every request once its realization is drawn. An algorithm A is an online algorithm for the k-server problem if it reports a configuration A0 as an initial configuration and upon realization of every request ri it returns a configuration Ai such that hA0 , A1 , . . . , Ai i is valid for hr1 , r2 , . . . , ri i. If A is deterministic, it generates a unique sequence of configurations for every sequence of requests. Let A(M, ρ) be the sequence that A generates for requests in ρ and |A(M, ρ)| denote its cost. In the online stochastic k-server problem, in addition to metric M, we are also given t independent probability distributions hP1 , P2 , . . . , Pt i which show the probability that every request ri is realized on a point of the metric at each time. An algorithm A is an online algorithm for such a setting, if it generates a configuration for every request ri not solely based on hr1 , r2 , . . . , ri i and hA0 , A1 , . . . , Ai−1 i but also with respect to the probability distributions. Similarly, we define the cost of an online algorithm A for a given sequence of requests ρ with |A(M, ρ, hP1 , P2 , . . . , Pt i)|. We define the expected cost of an algorithm A on metric M and with probability distributions hP1 , P2 , . . . , Pt i by |A(M, hP1 , P2 , . . . , Pt i)| = E∀i,ri ∼Pi |A(M, ρ, hP1 , P2 , . . . , Pt i)|. For every metric M and probability distributions hP1 , P2 , . . . , Pt i we refer to the online algorithm with the minimum expected cost by OPTM,hP1 ,P2 ,...,Pt i . An alternative way to represent a solution of the k-server problem is as a vector of configurations hB0P , B1 , . . . , Bt i such P that Bi does not necessarily serve request ri . The cost of such solution is equal to d(Bi−1 , Bi ) + 2d(Bi , ri ) where d(Bi , ri ) is the minimum distance of a server in configuration Bi to request ri . The additional cost of 2d(Bi , ri ) can be thought of as moving a server from Bi to serve ri and returning it back to its original position. Thus, every such representation of a solution 7 can be transformed to the other representation. Similarly, d(Bi , ri ) for a fractional configuration Bi is the minimum cost which is incurred by placing a mass 1 of server at point ri . We use letter B for the configurations of such solutions throughout the paper. In this paper the emphasis is on the stochastic k-server problem on the line metric. We define the line metric L as a metric of points from −∞ to +∞ such that the distance of two points x and y is always equal to |x − y|. Moreover, we show that deterministic algorithms are as powerful as randomized algorithms in this setting, therefore we only focus on deterministic algorithms in this paper. Thus, from here on, we omit the term deterministic and every time we use the word algorithm we mean a deterministic algorithm unless otherwise is explicitly mentioned. 3 Structural Characterization Recall that an online algorithm A has to fulfill the task of reporting a configuration Ai upon arrival of request ri based on hA0 , A1 , . . . , Ai−1 i, hr1 , r2 , . . . , ri i, and hP1 , P2 , . . . , Pt i. We say an algorithm B is request oblivious, if it reports configuration Bi regardless of request ri . As such, B generates configurations t i for a sequence of requests hr1 , r2 , . . . , rt i and the cost P hB0 , B1 , . . . , BP of such configuration is d(Bi−1 , Bi ) + 2d(Bi , ri ). More precisely, no matter what request ri is, B will generate the same configuration for a given list of past configurations hB0 , B1 , . . . , Bi−1 i, a given sequence of past requests hr1 , r2 , . . . , ri−1 i, and the sequence of probability distributions hP1 , P2 , . . . , Pt i. In the following we show that every online algorithm A can turn into a request oblivious algorithm BA that has a cost of at most |3A(M, ρ, hP1 , P2 , . . . , Pt i)| for a given sequence of requests ρ. Lemma 3.1 Let A be an online algorithm for the stochastic k-server problem. For any metric M, there exists a request oblivious algorithm BA such that |BA (M, hP1 , P2 , . . . , Pt i)| ≤ 3|A(M, hP1 , P2 , . . . , Pt i)|. Proof. Let ρ be a sequence of requests. We define online algorithm BA as follows: The configuration that BA reports for a given list of input arguments hB0 , B1 , . . . , Bi i, hr1 , r2 , . . . , ri i, and hP1 , P2 , . . . , Pt i is the output of algorithm A on inputs hB0 , B1 , . . . , Bi i, hr1 , r2 , . . . , ri−1 i, and hP1 , P2 , . . . , Pt i (The same input except that ri is dropped from the sequence of requests). We show the cost of such algorithm for input ρ is at most 3 times the cost of A for the same input. Let hA0 , A1 , . . . , At i be the sequence of configurations that A generates for requests ρ and hB0 , B1 , . . . , Bt i be the output of algorithm BA . According to the construction of BA , B0 = A0 and Bi = Ai−1 for all 1 ≤ i ≤ t. Note that for algorithm A, we assume P every Ai serves P request ri . By definition, the cost of solution hB0 , B1 , B2 , . . . , Bt i is equal to d(Bi−1 , Bi ) + 2 d(Bi , ri ). Since B0 = B1 = A0 and Bi = Ai−1 , t X d(Bi−1 , Bi ) = i=1 t−1 X d(Ai−1 , Ai ) ≤ i=1 t X d(Ai−1 , Ai ) = |A(M, ρ, hP1 , P2 , . . . , Pt i)|. (4) i=1 Moreover, since every Ai servers request ri , d(Bi , ri ) ≤ d(Bi , Ai ) = d(Ai−1 , Ai ). Hence, 2 t X i=1 d(Bi , ri ) ≤ 2 t X i=1 d(Bi , Ai ) = 2 t X d(Ai−1 , Ai ) = 2|A(M, ρ, hP1 , P2 , . . . , Pt i)|. i=1 Inequality (4) along with Equation (5) implies |BA (M, ρ, hP1 , P2 , . . . , Pt i)| ≤ 3|A(M, ρ, hP1 , P2 , . . . , Pt i)|. 8 (5) Since this holds for all requests ρ ∼ hP1 , P2 , . . . , Pt i, we have |BA (M, hP1 , P2 , . . . , Pt i)| ≤ 3|A(M, hP1 , P2 , . . . , Pt i)| and the proof is complete.  An immediate corollary of Lemma 3.1 is that the optimal request oblivious algorithm has a cost of at most |3 OPTM,hP1 ,P2 ,...,Pt i (M, hP1 , P2 , . . . , Pt i)|. Therefore, if we only focus on the request oblivious algorithms, we only lose a factor of 3 in comparison to the optimal online algorithm. The following lemma states a key structural lemma for an optimal request oblivious algorithm. Lemma 3.2 For every request oblivious algorithm B, there exists a randomized request oblivious algorithm B 0 with the same expected cost which is not only oblivious to the last request, but also oblivious to all requests that have come prior to this. Proof. For any given request oblivious online algorithm B, we construct an online algorithm B 0 which is oblivious to all of the requests as follows: For an input hB1 , B2 , . . . , Bi−1 i of configurations and probability distributions hP1 , P2 , . . . , Pt i, draw a sequence of requests hr1 , r2 , . . . , ri i from hP1 , P2 , . . . , Pt i conditioned on the constraint that B would generate configurations hB1 , B2 , . . . , Bi−1 i for requests hr1 , r2 , . . . , ri−1 i. Now, report the output of B for inputs hB1 , B2 , . . . , Bi−1 i, hr1 , r2 , . . . , ri i, and hP1 , P2 , . . . , Pt i. We define the cost of step i of algorithm B 0 as d(Bi−1 , Bi ) + 2d(Bi , ri ). Due to the construction of algorithm B 0 , the expected cost of this algorithm at every step i for a random sequence of requests is equal to the expected cost of algorithm B for a random sequence of requests drawn from hP1 , P2 , . . . , Pt i. Therefore, the expected cost of both algorithms for a random sequence of requests are equal and thus |B(M, hP1 , P2 , . . . , Pt i)| = |B 0 (M, hP1 , P2 , . . . , Pt i)|.  Lemma 3.2 states that there always exists an optimal randomized request oblivious online algorithm that returns the configurations regardless of the requests. We call such an algorithm non-adaptive. Since a non-adaptive algorithm is indifferent to the sequence of the requests, we can assume it always generates a sequence of configurations just based on the distributions. For an optimal of such algorithms, all such sequence of configurations should be optimal as well. Therefore, there always exists an optimal non-adaptive online algorithm which is deterministic. By Lemma 3.1 not only do we know the optimal request oblivious algorithm is at most 3-approximation, but also the same holds for the optimal non-adaptive algorithm. Theorem 3.3 There exists a sequence of configurations hB0 , B1 , . . . , Bt i such that an online algorithm which starts with B0 and always returns configuration Bi upon arrival of request ri has an opproximation factor of at most 3. 4 Fractional Solutions In this section we provide a fractional online algorithm for the k-server problem that can be implemented in polynomial time. Note that by Theorem 3.3 we know that there exist configurations hB1 , B2 , . . . , Bt i such that the expected cost of a non-adaptive algorithm that always returns these configurations is at most 3 times the cost of an optimal online algorithm. Therefore, we write an integer program to find such configurations with the least expected cost. Next, we provide a relaxed LP of the integer program and show that every feasible solution of such LP corresponds to a fractional online algorithm for the stochastic k-server problem. Hence, solving such a linear program, that can be done in polynomial time, gives us a fractional online algorithm for the problem. 9 4.1 Linear Program Recall that given t independent distributions hP1 , . . . , Pt i for online stochastic k-server, an adaptive algorithm can be represented by t + 1 configurations hB0 , . . . , Bt i. Upon the arrival of each request ri , we move the servers from configuration Bi−1 to Bi and then one server serves ri and goes back to its position in Bi . The objective is to find the configurations such that the cost of moving to new configurations in addition to the expected cost of serving the requests is minimized. Therefore the problem can formulated in an offline manner. First we provide an integer program in order to find a vector of configurations with the least cost. The decision variables of the program represent the configurations, the movement of servers from one configuration to another, and the way that each possible request is served. In particular, at each time step τ : • For each node v there is a variable bτ,v ∈ N denoting the number of servers on node v. • For each pair of nodes u and v, there is a movement variable fτ,u,v ∈ N denoting the number of servers going from u to v for the next round. • For each node v and possible request node r, there is a variable xτ,v,r ∈ {0, 1} denoting whether r is served by v or not. In the following integer program, the first set of constraints ensures the number of servers on nodes at each time is updated correctly according to the movement variables. The second set of constraints ensures that each possible request is served by at least one server. The third set of constraints ensures that no possible request is served PtBy the definition, the Pt by an empty node. cost of a sequence of configurations hB0 , . . . , Bt i is i=1 d(Bi−1 , Bi ) + 2 i=1 d(Bi , ri ). Thus the objective is to minimize the expression XX XXX fτ,u,v d(u, v) + 2 xτ,v,r Pr(z ∼ Pτ = r)d(v, r) τ u,v τ v r , where Pr(z ∼ Pτ = r) denotes the probability that r is requested at time τ . XX XXX min. fτ,u,v d(u, v) + 2 xτ,v,r Pr(z ∼ Pτ = r)d(v, r) τ ∀τ, v u,v bτ +1,v = bτ,v + X τ v fτ,u,v − X u ∀τ, u, v X r fτ,v,u . u xτ,v,r ≥ 1. v ∀τ, v, r ∀τ xτ,v,r ≤ bτ,v . X bτ,v ≤ k. ∀τ, v, r xτ,v,r ∈ {0, 1}. ∀τ, u, v fτ,u,v ∈ N. ∀τ, v bτ,v ∈ N. v Now we consider the following relaxation of the above integer program. 10 min. XX τ ∀τ, v fτ,u,v d(u, v) + 2 u,v bτ +1,v = bτ,v + X XXX τ v fτ,u,v − X u ∀τ, u, v X xτ,v,r Pr(z ∼ Pτ = r)d(v, r) r fτ,v,u . u xτ,v,r ≥ 1. v ∀τ, v, r ∀τ xτ,v,r ≤ bτ,v . X bτ,v ≤ k. v 5 Reduction from Integral k-server to Fractional k-server In this section we show how we can obtain an integral algorithm for the stochastic k-server problem from a fractional algorithm. We first show that every fractional algorithm for the line metric can be modified to an integral algorithm with the same cost. Next, we study the problem on HST metrics; we give a rounding method that produces an integral algorithm from a fractional algorithm while losing a constant factor. Finally, we leverage the previously known embedding techniques to show every metric can be embedded into HST’s with a distortion of at most O(log n). This will lead to a rounding method for obtaining an integral algorithm from every fractional algorithm on general metrics while losing a factor of at most O(log n). Combining this with the 3 approximation fractional algorithm that we provide in Section 4, we achieve an O(log n) approximation algorithm for the stochastic k-server problem on general graphs. 5.1 Integrals Are as Strong as Fractionals On the Line In this section we show every fractional algorithm on the line metric can be derandomized to an integral solution with the same expected cost. The rounding method is as follows: For every fractional configuration A, we provide an integral configuration I(A) such that (i) the distance of two configurations A1 and A2 is equal to the expected distance of two configurations I(A1 ) and I(A2 ). (ii) for every point x in the metric that A has a server mass of size at least 1 on x, there exists a server on point x in I(A). Let for every point x in the metric, A(v) denote the amount of server mass on node v of the line. For every fractional configuration B, we define a mass function fA : (0, k] → as follows. P PV j fA (x) = vj if and only if j is the minimum integer such that j−1 A(i) < x and i=1 i=1 A(i) ≥ x. Intuitively, if one gathers the server mass by sweeping the line from left to right, fA (x) is the first position on which we have gathered x amount of server mass. The rounding algorithm is as follows: • Pick a random real number r in the interval [0, 1). • I(A) contains k servers on positions fA (r), fA (r + 1), fA (r + 2), . . . , fA (r + k − 1). Note that the rounding method uses the same r for all of the configurations. More precisely, we draw r from [0, 1) at first and use this number to construct the integral configurations from fractional configurations. The following two lemmas show that both of the properties hold for the rounding algorithm we proposed. Lemma 5.1 Let A be a fractional configuration and x be a point such that A(x) ≥ 1. Then I(A) has a server on x. 11 Proof. Due to the construction of our rounding method, for every two consecutive servers a and b in I(A), the total mass of servers after a and before b in the fractional solution is less than 1. Therefore, I(A) should put a server on point x, otherwise the total mass of servers in the fractional solution between the first server before x and the first server after x would be at least 1.  The next lemma shows that the rounding preserves the distances between the configurations in expectation. Lemma 5.2 Let A1 and A2 be two fractional configurations and |A1 − A2 | be their distance. The following holds for the distances of the configurations E| I(A1 ) − I(A2 )| = |A1 − A2 |. Proof. The key point behind the proof of this lemma is that the distance of two fractional configurations A1 and A2 can be formulated as follows Z 1 |A1 − A2 | = | Iω (A1 ) − Iω (A2 )|dω 0 where Iω (A) stands for an integral configurations which places the servers on points fA (ω), fA (ω+1), fA (ω + 2), . . ., fA (ω + k − 1). Since at the beginning of the rounding method we draw r uniformly at random, the expected distance of the two rounded configurations is exactly equal to Z 1 | Iω (A1 ) − Iω (A2 )|dω 0 which is equal to the distance of A1 from A2 .  Theorem 5.3 For any given fractional online algorithm A for the k-server problem on the line metric, there exists an online integral solution for the same problem with the same expected cost. 5.2 Reduction for General Graphs An HST is a undirected rooted tree in which every leaf represents a point in the metric and the distance of a pair of points in the metric is equal to the distance of the corresponding leaves in the tree. In an HST, weights of the edges are uniquely determined by the depth of the vertices they connect. More precisely, in a σ-HST the weight of an edges between a vertex v and its children is equal to σ h−dv where h stands for the height of the tree and dv denotes the depth of vertex v. Since HSTs are very well structured, designing algorithms on HSTs is relatively easier in comparison to a more complex metric. Therefore, a classic method for alleviating the complexity of the problems is to first embed the metrics into HSTs with a low distortion and then solve the problems on these trees. Perhaps the most important property of the HSTs is the following: Observation 5.1 For every pair of leaves u, v ∈ T of an HST, the distance of u and v is uniquely determined by the depth of their deepest common ancestor. Note that, the higher the depth of the common ancestor is, the lower the distance of the leaves will be. Therefore, the closest leaves to a leaf v are the ones that share the most common ancestors with v. Bansal et al. propose a method for rounding every fractional solution of the k-server problem to an integral solution losing at most a constant factor [7]. 12 Theorem 5.4 [7] Let T be a σ-HST with n leaves, σ > 5, and let A = hA0 , A1 , A2 , . . . , At i be a sequence of fractional configurations. There is an online procedure that maintains a sequence of randomized k-server configurations S = hS0 , S1 , S2 , . . . , St i satisfying the following two properties: • At any time i, the state Si is consistent with the fractional state Ai . • If the fractional state changes from xi−1 to xi at time i, incurring a movement cost of ci , then the state Si−1 can be modified to a state Si while incurring a cost of O(ci ) in expectation. Embedding general metrics into trees and in particular HSTs has been the subject of many studies. The seminal work of Fakcharoenphol et al. [20] has shown that any metric can be randomly log n embedded to σ-HSTs with distortion O( σlog σ ). Theorem 5.5 [20] There exists a probabilistic method to embed an arbitrary metric M into σlog n HSTs with distortion σlog σ . Therefore, to round a fractional solution on a general metric, we first embed it into 6-HSTs with a distortion of at most O(log n) and then round the solution while losing only a constant factor. This will give us an integral algorithm that has an expected cost of at most O(log n) times the optimal. Theorem 5.6 For any given fractional online algorithm A for the k-server problem on an arbitrary metric, there exists an online integral solution for the same problem having a cost of no worse that O(log n) times the cost of A in expectation. 6 Acknowledgment We would like to thank Shi Li for having helpful discussions. References [1] M. Abolhasani, S. Ehsani, H. Esfandiari, M. Hajiaghayi, R. Kleinberg, and B. Lucier. Beating 1 − 1/e for ordered prophets. arXiv preprint arXiv:1704.05836, 2017. [2] D. Achlioptas, M. Chrobak, and J. Noga. Competitive analysis of randomized paging algorithms. Theoretical Computer Science, 234(1):203–218, 2000. [3] S. Alaei, M. Hajiaghayi, and V. Liaghat. Online prophet-inequality matching with applications to ad allocation. In Proceedings of the 13th ACM Conference on Electronic Commerce, pages 18–35. ACM, 2012. [4] S. Alaei, M. Hajiaghayi, and V. Liaghat. The online stochastic generalized assignment problem. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 11–25. Springer, 2013. [5] S. Alaei, M. T. Hajiaghayi, V. Liaghat, D. Pei, and B. Saha. Adcell: Ad allocation in cellular networks. In Algorithms–ESA 2011, pages 311–322. Springer, 2011. [6] S. Albers, L. M. Favrholdt, and O. Giel. On paging with locality of reference. In Proceedings of the thiry-fourth annual ACM symposium on Theory of computing, pages 258–267. ACM, 2002. 13 [7] N. Bansal, N. Buchbinder, A. Madry, and J. Naor. A polylogarithmic-competitive algorithm for the k-server problem. 2011. [8] N. Bansal, N. Buchbinder, and J. S. Naor. A primal-dual randomized algorithm for weighted paging. Journal of the ACM (JACM), 59(4):19, 2012. [9] Y. Bartal, M. Chrobak, and L. L. Larmore. A randomized algorithm for two servers on the line. Information and Computation, 158(1):53–69, 2000. [10] Y. Bartal and E. Koutsoupias. On the competitive ratio of the work function algorithm for the k-server problem. Theoretical computer science, 324(2):337–345, 2004. [11] L. Becchetti. Modeling locality: A probabilistic analysis of lru and fwf. In Algorithms–ESA 2004, pages 98–109. Springer, 2004. [12] A. Blum, C. Burch, and A. Kalai. Finely-competitive paging. In Foundations of Computer Science, 1999. 40th Annual Symposium on, 1999. [13] A. Borodin and R. El-Yaniv. Online computation and competitive analysis. cambridge university press, 2005. [14] A. Borodin, S. Irani, P. Raghavan, and B. Schieber. Competitive paging with locality of reference. Journal of Computer and System Sciences, 50(2):244–258, 1995. [15] M. Chrobak, H. Karloff, T. Payne, and S. Vishwnathan. New ressults on server problems. SIAM Journal on Discrete Mathematics, 4(2):172–181, 1991. [16] M. Chrobak and L. L. Larmore. An optimal on-line algorithm for k servers on trees. SIAM Journal on Computing, 20(1):144–148, 1991. [17] S. Dehghani, S. Ehsani, M. Hajiaghayi, V. Liaghat, and S. Seddighin. Online survivable network design and prophets. 2015. [18] S. Dehghani, I. A. Kash, and P. Key. Online stochastic scheduling and pricing the clouds. 2017. [19] P. J. Denning. The working set model for program behavior. Communications of the ACM, 26(1):43–48, 1983. [20] J. Fakcharoenphol, S. Rao, and K. Talwar. A tight bound on approximating arbitrary metrics by tree metrics. In Proceedings of the thirty-fifth annual ACM symposium on Theory of computing, pages 448–455. ACM, 2003. [21] A. Fiat, R. M. Karp, M. Luby, L. A. McGeoch, D. D. Sleator, and N. E. Young. Competitive paging algorithms. Journal of Algorithms, 12(4):685–699, 1991. [22] A. Fiat and M. Mendel. Truly online paging with locality of reference. In Foundations of Computer Science, 1997. Proceedings., 38th Annual Symposium on, pages 326–335. IEEE, 1997. [23] A. Fiat and M. Mendel. Better algorithms for unfair metrical task systems and applications. SIAM Journal on Computing, 32(6):1403–1422, 2003. 14 [24] N. Garg, A. Gupta, S. Leonardi, and P. Sankowski. Stochastic analyses for online combinatorial optimization problems. In Proceedings of the nineteenth annual ACM-SIAM symposium on Discrete algorithms, pages 942–951. Society for Industrial and Applied Mathematics, 2008. [25] M. T. Hajiaghayi, R. Kleinberg, and T. Sandholm. Automated online mechanism design and prophet inequalities. In AAAI, volume 7, pages 58–65, 2007. [26] S. Irani, A. R. Karlin, and S. Phillips. Strongly competitive algorithms for paging with locality of reference. SIAM Journal on Computing, 25(3):477–497, 1996. [27] A. R. Karlin, S. J. Phillips, and P. Raghavan. Markov paging. SIAM Journal on Computing, 30(3):906–922, 2000. [28] H. Karloff, Y. Rabani, and Y. Ravid. Lower bounds for randomized k-server and motionplanning algorithms. SIAM Journal on Computing, 23(2):293–312, 1994. [29] E. Koutsoupias and C. H. Papadimitriou. On the k-server conjecture. Journal of the ACM (JACM), 42(5):971–983, 1995. [30] U. Krengel, L. Sucheston, et al. Semiamarts and finite values. Bull. Amer. Math. Soc, 83(4), 1977. [31] M. S. Manasse, L. A. McGeoch, and D. D. Sleator. Competitive algorithms for server problems. Journal of Algorithms, 11(2):208–230, 1990. [32] L. A. McGeoch and D. D. Sleator. A strongly competitive randomized paging algorithm. Algorithmica, 6(1-6):816–825, 1991. [33] K. Panagiotou and A. Souza. On adequate performance measures for paging. In Proceedings of the thirty-eighth annual ACM symposium on Theory of computing, pages 487–496. ACM, 2006. [34] D. D. Sleator and R. E. Tarjan. Amortized efficiency of list update and paging rules. Communications of the ACM, 28(2):202–208, 1985. [35] D. Türkoglu. The k-Server Problem and Fractional Analysis. PhD thesis, Masters Thesis, The University of Chicago, 2005. http://people. cs. uchicago. edu/ duru/papers/masters. pdf, 2005. [36] N. E. Young. Bounding the diffuse adversary. In SODA, volume 98, pages 420–425, 1998. 15 A Correlated Setting In this section, we study the k-server problem when the probability distributions are not independent. Recall that in the independent setting the sequence of requests is referred to by ρ = hr1 , . . . , rt i. In the correlated model we assume all different possibilities for ρ have been given in the form of a set R = {ρ1 , . . . , ρm } of m sequences ρi = hri,1 , . . . , ri,t i. Moreover, we assume the probability of each scenario ρi is denoted by pi and given in advance. Given the list of different scenarios and probabilities, the goal is to design an online algorithm to serve each request ri,j prior to arrival of the next request such that the overall movement of the servers is minimized. We model this problem by an integer program. We first write an integer program and show that every solution of this program is uniquely mapped to a deterministic online algorithms for the problem. Moreover, every online algorithm can be mapped to a feasible solution of the program. More precisely, each solution of the program is equivalent to an online algorithm of the problem. Furthermore, we show how to derive an online algorithm from the solution of the integer program. These two imply that the optimal deterministic online algorithm can be obtained from the optimal solution of the program. A.1 Program To better convey the idea behind the integer program, we first introduce the tree T which is a trie containing all sequences ρ1 to ρm . Let us use w(v) to denote the path from the root to a node v. With these notations, a node v ∈ T represents a request which may occur conditioning all requests in w(v) occur beforehand. Besides, every leaf of T uniquely represents one of the ρi ’s. Let us use l(v) to denote the set of those indices i for which ρi is a leaf of the subtree of v. At each step t, only those ρi ’s can be a final option for R that hρi,1 , . . . , ρi,t i = hr1 , . . . , rt i. Hence, a new request rt can be informative since we know that none of the ρi ’s in l(rt−1 )\l(rt au) will occur anymore.PFor a node v we define P r(v) as the probability of all requests in w(v) happening i.e. P r(v) = i∈l(v) P r(R = ρi ). We extend the tree T by adding k − 1 additional nodes. As shown in Figure 1, these nodes form a path leading to the root of T . These nodes plus the root represent the initial configuration of the k servers. Let us call these nodes the initial set I. Now we can show the movement of the servers in our metric space by means of k tokens in T . To do so, we begin with putting one token on each of the k nodes of I. Each token corresponds to one of the servers. After a server moves to serve a request rt , we move its corresponding token to a node of T which represents the request rt . Note that at this step, there is no discrimination between any of the sequences in l(rt ) in terms of occurrence. This causes a deterministic online algorithm A to serve the first |w(rt )| requests of R in the same way if R is going to be one of ρi ’s (i ∈ l(rt )). A result of this uniquely serving is that we can use some downward links on T in order to show how each request v gets served. In the next paragraphs we explain about these links and how we construct the integer program. Let us use xu,v to denote a link from a node u ∈ T to its descendant v. xu,v is one if and only if A uses the same server to serve u and then v without using that server to serve any other request between u and v. This consecutive serving may occur with probability P r(v) = P r(u)P r(v|u). In this case, the algorithm moves a server from u to v and pays |u − v| as the distance cost between the two points of the metric space corresponding to u and v. There are two conditions for these links that we must care about. First, since each request v should be served with a server, at least one of the xu,v ’s should be one for all u in w(v). Without loss of generality, we assume this is exactly one of them, i.e. there is no need to serve a request with more than one server. Second, after serving a request u, a server can go for serving at most 16 one other request. That is, for each i ∈ l(u), there should be at most one v ∈ ρi such that xu,v = 1. This condition guarantees that in serving the sequence of requests R, a server which serves rt1 ∈ R has always at most one other request rt2 ∈ R as the next serving request. The following integer program maintains both conditions for xu,v ’s and has the expected overall movement of all servers as the objective function: X P r(v)|u − v|xu,v min. u,v∈T ;u∈w(v) ∀v ∈ T \I X xu,v = 1. u∈w(v) ∀u ∈ T, i ∈ l(u) X xu,v ≤ 1. v∈ρi ∀u, v ∈ T, u ∈ w(v) xu,v ∈ {0, 1} Next, we can relax the constraints of the program to make it linear. Therefore, instead of assigning either {0} or {1}, to each xu,v we let it be a real number between 0 and 1. Thus, the integer program turns to the following linear program with the same objective function but more relaxed constraints. X min. P r(v)|u − v|xu,v u,v∈T ;u∈w(v) ∀v ∈ T \I X xu,v = 1. u∈w(v) ∀u ∈ T, i ∈ l(u) X xu,v ≤ 1. v∈ρi ∀u, v ∈ T, u ∈ w(v) xu,v ≤ 1 ∀u, v ∈ T, u ∈ w(v) xu,v ≥ 0 Note that every feasible solution of the linear program is corresponding to a fractional solution of the problem. Since the optimal solution of the linear program can be found in polynomial time, using the rounding methods presented in Section 5 we obtain an optimal online algorithm for the line metric and a O(log n) approximation algorithm for general metrics as stated in Theorem 1.6. B Experimental Results The goal of this section is to make an evaluation of our method for the line on a real world data set. The line can be an appropriate model for a plenty of applications. For example, it could be sending road maintenance trucks to different points of a road or sending emergency vehicles to accident scenes along a highway. For this experiment, we take the case of car accidents. Data sets. We use Road Safety Data3 to find the distribution of the accidents along the A14 road in Great Britain. In 2015, over 1600 accidents occurred on this highway, with an average of 140 accidents per month. We assume a point every 10 miles along the highway. That is 40 points in total. Then we build the distributions with respect to how the accidents are spread over the days of month. In this way, we achieve 30 distributions for 40 points along the line. 3 4 https://data.gov.uk/dataset/road-accidents-safety-data/ https://en.wikipedia.org/wiki/A1 road (Great Britain) 17 Number of Servers Algorithm Optimum 2 6.5 0.2 3 7.6 0.8 4 6.7 3.1 5 7.1 8.4 6 7.5 29.4 7 8.3 57.9 8 8.5 126.3 9 8.4 406.7 10 9.3 1477.1 11 8.2 6173.6 Table 1: The running time of our algorithm and the optimum algorithm in seconds. For higher number of servers, the optimum solution was not calculable within 5 hours. Algorithms. We compare the performance of our method to that of the optimum algorithm. To find the optimum solution we use backtracking. The running time of the algorithm is exponential to k. However, we use techniques such as branch and bound and exponential dynamic programming to get a fast implementation. Results. We run different experiments with k from 2 to 11 on the line and distributions explained above. In previous sections we showed an upper bound of 3 for the approximation factor of our algorithm. Interestingly, in these experiments we can observe a better performance as shown by Figure 1. We compare the running time of the algorithms in Table 1. Note that the size of our LP our method solvers does not vary by k. This is in fact the reason behind why its running time remains almost the same. In contrast, the running time of the optimum algorithm grows exponentially. Figure 1: Performance of our algorithm compared to the optimum. The dashed curve indicates two times the optimum. 18
8cs.DS
Learning-Theoretic Foundations of Algorithm Configuration for Combinatorial Partitioning Problems∗ Maria-Florina Balcan Vaishnavh Nagarajan Ellen Vitercik Colin White arXiv:1611.04535v3 [cs.DS] 17 May 2017 May 18, 2017 Abstract Max-cut, clustering, and many other partitioning problems that are of significant importance to machine learning and other scientific fields are NP-hard, a reality that has motivated researchers to develop a wealth of approximation algorithms and heuristics. Although the best algorithm to use typically depends on the specific application domain, a worst-case analysis is often used to compare algorithms. This may be misleading if worst-case instances occur infrequently, and thus there is a demand for optimization methods which return the algorithm configuration best suited for the given application’s typical inputs. We address this problem for clustering, max-cut, and other partitioning problems, such as integer quadratic programming, by designing computationally efficient and sample efficient learning algorithms which receive samples from an application-specific distribution over problem instances and learn a partitioning algorithm with high expected performance. Our algorithms learn over common integer quadratic programming and clustering algorithm families: SDP rounding algorithms and agglomerative clustering algorithms with dynamic programming. For our sample complexity analysis, we provide tight bounds on the pseudodimension of these algorithm classes, and show that surprisingly, even for classes of algorithms parameterized by a single parameter, the pseudo-dimension is superconstant. In this way, our work both contributes to the foundations of algorithm configuration and pushes the boundaries of learning theory, since the algorithm classes we analyze consist of multi-stage optimization procedures and are significantly more complex than classes typically studied in learning theory. ∗ Authors’ addresses: {ninamf,vaishnavh,vitercik,crwhite}@cs.cmu.edu. 1 Introduction NP-hard problems arise in a variety of diverse and oftentimes unrelated application domains. For example, clustering is a widely-studied NP-hard problem in unsupervised machine learning, used to group protein sequences by function, organize documents in databases by subject, and choose the best locations for fire stations in a city. Although the underlying objective is the same, a “typical problem instance” in one setting may be significantly different from that in another, causing approximation algorithms to have inconsistent performance across the different application domains. We study how to characterize which algorithms are best for which contexts, a task often referred to in the AI literature as algorithm configuration. This line of work allows researchers to compare algorithms according to an application-specific metric, such as expected performance over their problem domain, rather than a worst-case analysis. If worst-case instances occur infrequently in the application domain, then a worst-case algorithm comparison could be uninformative and misleading. We approach application-specific algorithm configuration via a learning-theoretic framework wherein an application domain is modeled as a distribution over problem instances. We then fix an infinite class of approximation algorithms for that problem and design computationally efficient and sample efficient algorithms which learn the approximation algorithm with the best performance over the distribution, and therefore an algorithm with high performance in the specific application domain. Gupta and Roughgarden [24] introduced this learning framework to the theory community, but it has been the primary model for algorithm configuration and portfolio selection in the artificial intelligence community for decades [33] and has led to breakthroughs in diverse fields including combinatorial auctions [28], scientific computing [16], vehicle routing [12], and SAT [42]. In this framework, we study two important, infinite algorithm classes. First, we analyze approximation algorithms based on semidefinite programming (SDP) relaxations and randomized rounding procedures, which are used to approximate integer quadratic programs (IQPs). These algorithms can be used to find a nearly optimal solution to a variety of combinatorial partitioning problems, including the seminal max-cut and max 2-SAT problems. Second, we study agglomerative clustering algorithms followed by a dynamic programming step to extract a good clustering. These techniques are widely used in machine learning and across many scientific disciplines for data analysis. We begin with a concrete problem description. Problem description. In this learning framework, we fix a computational problem, such as max-cut or k-means clustering, and assume that there exists an unknown, application-specific distribution D over a set of problem instances Π. We denote an upper bound on the size of the problem instances in the support of D by n. For example, the support of D might be a set of social networks over n individuals, and the researcher’s goal is to choose an algorithm with which to perform a series of clustering analyses. Next, we fix a class of algorithms A. Given a cost function cost : A × Π → [0, H], the learner’s goal is to find an algorithm h ∈ A that approximately optimizes the expected cost with respect to the distribution D, as formalized below. Definition 1 ([24]). A learning algorithm L (, δ)-learns the algorithm class A with respect to the cost function cost if, for every distribution D over Π, with probability at least 1− δ i over h m the choice of a sample S ∼ D , L outputs an algorithm ĥ ∈ A such that Ex∼D cost ĥ, x − minh∈A {Ex∼D [cost(h, x)]} < . We require that the number of samples be polynomial in n, 1 , and 1 δ , where n is an upper bound on the size of the problem instances in the support of D. Further, we say that L is computationally efficient if its running time is also polynomial in n, 1 , and 1δ . We derive our guarantees by analyzing the pseudo-dimension of the algorithm classes we study 1 (see Section 1.1, [31, 32, 2]). We then use the structure of the problem to provide efficient algorithms for most of the classes we study. SDP-based methods for integer quadratic programming. Many NP-hard problems, such as max-cut, max-2SAT, and correlation clustering, can be represented as an integer quadratic program (IQP) of the following form. The input is an n × n matrix A with nonnegative diagonal entries and the P output is a binary assignment to each variable in the set X = {x1 , . . . , xn } which maximizes i,j∈[n] aij xi xj . In this formulation, xi ∈ {−1, 1} for all i ∈ [n]. (When the diagonal entries are allowed to be negative, the ratio between the semidefinite relaxation and the integral optimum can become arbitrarily large, so we restrict the domain to matrices with nonnegative diagonal entries.) IQPs appear frequently in machine learning applications, such as MAP inference [25, 44, 20] and image segmentation and correspondence problems in computer vision [15, 10]. Max-cut is an important IQP problem, and its applications in machine learning include community detection [7], variational methods for graphical models [34], and graph-based semi-supervised learning [39]. The seminal Goemans-Williamson max-cut algorithm is now a textbook example of semidefinite programming [21, 41, 38]. Max-cut also arises in many other scientific domains, such as circuit design [43] and computational biology [36]. The best approximation algorithms for IQPs relax the problem to anPSDP, where the input is the same matrix A, but the output is a set of unit vectors maximizing i,j aij hui , uj i. The final step is to transform, or “round,” the set of vectors into an assignment of the binary variables in X. This assignment corresponds to a feasible solution to the original IQP. There are infinitely many rounding techniques to choose from, many of which are randomized. These algorithms make up the class of Random Projection, Randomized Rounding algorithms (RPR2 ), a general framework introduced by [18]. RPR2 algorithms are known to perform well in theory and practice. When the integer quadratic program is a formulation of the max-cut problem, the class of RPR2 algorithms contain the groundbreaking Goemans-Williamson algorithm, which achieves a 0.878 approximation ratio [21]. Assuming the unique games conjecture and P 6= N P , this approximation is optimal to within any additive constant [27]. More generally, if A is any real-valued n × n matrix with nonnegative diagonal entries, then there exists an RPR2 algorithm that achieves an approximation ratio of Ω(1/ log n) [14], and in the worst case, this ratio is tight [1]. Finally, if A is positive semi-definite, then there exists an RPR2 algorithm that achieves a 2/π approximation ratio [9]. We analyze several classes of RPR2 rounding function classes, including s-linear [18], outward rotation [45], and ˜-discretized rounding functions [30]. For each class, we derive bounds on the number of samples needed to learn an approximately optimal rounding function with respect to an underlying distribution over problem instances using pseudo-dimension. We also provide a computationally efficient and sample efficient learning algorithm for learning an approximately optimal s-linear or outward rotation rounding function in expectation. We note that our results also apply to any class of RPR2 algorithms where the first step is to find some set of vectors on the unit sphere, not necessarily the SDP embedding, and then round those vectors to a binary solution. This generalization has led to faster approximation algorithms with strong empirical performance [26]. Clustering by agglomerative algorithms with dynamic programming. Given a set of n datapoints and the pairwise distances between them, at a high level, the goal of clustering is to partition the points into groups such that distances within each group are minimized and distances between each group are maximized. A classic way to accomplish this task is to use an objective function. Common clustering objective functions include k-means, k-median, and k-center, which we define later on. We focus on a very general problem where the learner’s main goal is to minimize an abstract cost function such as the cluster purity or the clustering objective function, which is 2 the case in many clustering applications such as clustering biological data [19, 29]. We study infinite classes of two-step clustering algorithms consisting of a linkage-based step and a dynamic programming step. First, the algorithm runs one of an infinite number of linkage-based routines to construct a hierarchical tree of clusters. Next, the algorithm runs a dynamic programming procedure to find the pruning of this tree that minimizes one of an infinite number of clustering objectives. For example, if the clustering objective is the k-means objective, then the dynamic programming step will return the optimal k-means pruning of the cluster tree. For the linkage-based procedure, we consider several parameterized agglomerative procedures which induce a spectrum of algorithms interpolating between the popular single-, average-, and complete-linkage procedures, which are prevalent in practice [3, 35, 40] and known to perform nearly optimally in many settings [4, 5, 6, 22]. For the dynamic programming step, we study an infinite class of objectives which include the standard k-means, k-median, and k-center objectives, common in applications such as information retrieval [11, 13]. We show how to learn the best agglomerative algorithm and pruning objective function pair, thus extending our work to multiparameter algorithms. We provide tight pseudo-dimension bounds, ranging from Θ(log n) for simpler algorithm classes to Θ(n) for more complex algorithm classes, so our learning algorithms are sample efficient. Key challenges. One of the key challenges in analyzing the pseudo-dimension of the algorithm classes we study is that we must develop deep insights into how changes to an algorithm’s parameters affect the solution the algorithm returns on an arbitrary input. For example, in our clustering analysis, the cost function could be the k-means or k-median objective function, or even the distance to some ground-truth clustering. As we range over algorithm parameters, we alter the merge step by tuning an intricate measurement of the overall similarity of two point sets and we alter the pruning step by adjusting the way in which the combinatorially complex cluster tree is pruned. The cost of the returned clustering may vary unpredictably. Similarly, in integer quadratic programming, if a variable flips from positive to negative, a large number of the summands in the IQP objective will also flip signs. Nevertheless, we show that in both scenarios, we can take advantage of the structure of the problems to develop our learning algorithms and bound the pseudo-dimension. In this way, our algorithm analyses require more care than standard complexity derivations commonly found in machine learning contexts. Typically, for well-understood function classes used in machine learning, such as linear separators or other smooth curves in Euclidean spaces, there is a simple mapping from the parameters of a specific hypothesis to its prediction on a given example and a close connection between the distance in the parameter space between two parameter vectors and the distance in function space between their associated hypotheses. Roughly speaking, it is necessary to understand this connection in order to determine how many significantly different hypotheses there are over the full range of parameters. Due to the inherent complexity of the classes we consider, connecting the parameter space to the space of approximation algorithms and their associated costs requires a much more delicate analysis. Indeed, the key technical part of our work involves understanding this connection from a learning-theoretic perspective. In fact, the structure we discover in our pseudo-dimension analyses allows us to develop many computationally efficient meta-algorithms for algorithm configuration due to the related concept of shattering. A constrained pseudo-dimension of O(log n) often implies a small search space of 2O(log n) = O(n) in which the meta-algorithm will uncover a nearly optimal configuration. We bolster the theory of algorithm configuration by studying algorithms for problems that are ubiquitous in machine learning and optimization: integer quadratic programming and clustering. In this paper, we develop techniques for analyzing randomized algorithms, whereas the algorithms analyzed in the previous work were deterministic. We also provide the first pseudo-dimension 3 lower bounds in this line of work, which require an involved analysis of each algorithm family’s performance on carefully constructed instances. Our lower bounds are somewhat counterintuitive, since for several of the classes we study, they are of the order Ω(log n), even if the corresponding classes of algorithms are defined by a single real-valued parameter. 1.1 Preliminaries and definitions In this section, we provide the definition of pseudo-dimension in the context of algorithm classes. Consider a class of algorithms A and a class of problem instances X . Let the cost function cost(h, x) denote the abstract cost of running an algorithm h ∈ A on a problem instance x ∈ X . Similarly, define the function class HA = {cost(h, ·) : X → R|h ∈ A}. Then, recall that a finite subset of problem instances S = {x1 , x2 , . . . xm } is shattered by the function class H, if there exist real-valued witnesses r1 , . . . , rm such that for all subsets T ⊆ S, there exists a function cost (hT , ·) ∈ H, or in other words, an algorithm hT ∈ A such that cost (hT , xi ) ≤ ri if and only if i ∈ T . Then, we can define the pseudo-dimension of the algorithm class A to be the pseudo-dimension P dim(H) of H i.e., the cardinality of the largest subset of X shattered by H. By bounding P dim(H), clearly we can derive sample complexity guarantees in the context of algorithm classes [17]: for every distribution D over X , every  > 0, and every δ ∈ (0, 1], 2  m ≥ c H P dim(H) + log 1δ for a suitable constant c (independent of all other parameters), then with probability at least 1 − δ over m samples x1 , . . . , xm ∼ D, m 1 X cost(h, xi ) − Ex∼D [cost(h, x)] <  m i=1 for every algorithm h ∈ A. Therefore, if a learning algorithm receives as input a sufficiently large set of samples and returns the algorithm which performs best on that sample, we can be guaranteed that this algorithm is close to optimal with respect to the underlying distribution. 2 SDP-based methods for integer quadratic programming In this section, we study several IQP approximation algorithms. These classes consist of SDP rounding algorithms and are a generalization of the seminal Goemans-Williamson (GW) max-cut algorithm [21]. We prove that it is possible to learn the optimal algorithm from a fixed class over a specific application domain, and for many of the classes we study, this learning procedure is computationally efficient and sample efficient. P We focus on integer quadratic programs of the form i,j∈[n] aij xi xj , where the input is a matrix A with nonnegative diagonal entries and the output is an assignment of the binary variables X = {x1 , . . . , xn } maximizing this sum. Specifically, each variable in X is set to either −1 or 1. This problem is also known as MaxQP [14]. Most algorithms with the best approximation guarantees use an SDP relaxation. The SDP relaxation has the form X maximize aij hui , uj i subject to ui ∈ S n−1 . (1) i,j∈[n] Given the set of vectors {u1 , . . . , un }, we must decide how they represent an assignment of the binary variables in X. In the GW algorithm, the vectors are projected onto a random vector Z drawn from an n-dimensional Gaussian. Next, if the directed distance of the resulting projection is greater than 0, then the corresponding binary variable is set to 1, and otherwise it is set to −1. 4 In some cases, the GW algorithm can be improved upon by probabilistically assigning each binary variable to 1 or −1. In the final rounding step, any rounding function r : R → [−1, 1] can be used to specify that a variable xi is set to 1 with probability 12 + 21 · r (hZ, ui i) and −1 with probability 21 − 12 · r (hZ, ui i). See Algorithm 1 for the pseudocode. This is known as a Random Algorithm 1 SDP rounding algorithm with rounding function r Input: Matrix A ∈ Rn×n . 1: Solve the SDP (1) for the optimal embedding U = (u1 , . . . , un ). 2: Choose a random vector Z ∈ Rn according to the n-dimensional Gaussian distribution. 3: Define the fractional assignment h : X → [−1, 1] such that h(xi ) = r (hZ, ui i). Output: h. Projection, Randomized Rounding (RPR2 ) algorithm, so named by the seminal work of [18]. The randomized assignment h produced by an RPR2 algorithm is called a fractional assignment. Based on the output h, we can derive a proper assignment of the variables x1 , . . . , xn where xi is set to 1 with probability 21 + 21 h(xi ) and −1 with probability 21 − 12 h(xi ). In this section, we analyze the class of s-linear round functions. For the max-cut problem, [18] proved that when the maximium cut in the graph is not very large, a worst-case approximation ratio above the GW ratio is possible using an s-linear rounding function. For example, they proved that if the optimal cut contains at most a 0.6 fraction of the edges, then the ratio is at least 0.9128. The optimal choice of s depends on the graph, but we give an efficient algorithm to learn a nearly optimal value for s in expectation over a distribution of problem instances. In Appendix B, we consider other rounding functions, including ˜-discretized rounding functions [30], outward rotation algorithms [45], and “sigmoid-like” rounding functions, which include the classes of s-linear and outward rotation functions. An s-linear rounding function φs : R → [−1, 1] is parameterized by s > 0, as follows:   −1 if y < −s φs (y) = y/s if − s ≤ y ≤ s   1 if y > s. Figure 1: A graph of the 2-linear function φ2 . Our goal is to devise an algorithm Lslin that (, δ)-learns the best s-linear rounding function with respect to a distribution D over MaxQP problem instances. Specifically, let slin∗s (A) be the expected value of the solution returned by RPR2 using the rounding function φs when evaluated on the MaxQP problem instance defined by the matrix A. We instantiate the cost function cost to be cost(A, s) = −slin∗s (A). Here, we take the negative of slin∗s (A) since our goal is to find the s parameter that will maximize this value in expectation, and minimizing cost(A, s) now amounts to maximizing slin∗s (A). We require that Lslin returns a value ŝ such that with probability at least 1 − δ, if s∗ maximizes E [slin∗s (A)], then E [slin∗s∗ (A)] − E [slin∗ŝ (A)] < . A∼D A∼D A∼D One might expect that the first step would be to bound the pseudo-dimension of the class Hslin∗ = {slin∗s : A → [−H, H] | s > 0} (Pdim(Hslin∗ )), where A is the set of all real-valued n × n matrices with nonnegative diagonal entries and H is an upper bound on the range of slin∗s when restricted to the support of the distribution over problem instances. We pursue an alternative route 5 that provides a simpler sample complexity and algorithmic analysis. We instead bound the pseudodimension of the class Hslin = {slins : A × Rn → [−H, H] | s > 0}, where slins (A, Z) is the value of the fractional assignment produced by projecting the SDP embedding of A onto Z and rounding the directed distances function φs . ExplicPof the projections (multiplied by ||Z||) using the rounding ∗ itly, slins (A, Z) = i,j aij φs (hui , Zi) · φs (hui , Zi) . Notice that slins (A) = EZ∼Z [slins (A, Z)], where Z denotes the standard n-dimensional Gaussian distribution. We prove tight bounds on the pseudo-dimension of Hslin and derive generalization guarantees for the algorithm class we ultimately care about: Hslin∗ , as follows. All omitted proofs can be found in Appendix A. Theorem 2. Suppose that Lslin is an algorithm that takes as input m samples (A(i) , Z(i) ) ∼ 1 Pm D × Z and returns the parameter ŝ which maximizes m i=1 slins (A(i) , Z(i) ). Further, supposePthat m is sufficiently large to ensure that with probability at least 1 − δ, for all s > 0, m 1  (i) (i) |m i=1 slins (A , Z ) − E(A,Z) [slins (A, Z)] | ≤ 2 . Then Lslin (, δ)-learns the class of s-linear rounding functions with respect to the cost function −slin∗s . Now, we will show that Pdim(Hslin ) = Θ(log n) and then we will present Algorithm 2, a computationally efficient and sample efficient algorithm. We will often fix a tuple (A, Z) and consider slins (A, Z) as a function of s, which we denote as slinA,Z (s). We begin with a helpful lemma. Lemma 1. The function slinA,Z : R>0 → R is made up of n + 1 piecewise components of the form sa2 + sb + c for some a, b, c ∈ R. Moreover, if the border between two components falls at some s ∈ R>0 , then it must be that s = |hui , Zi| for some ui in the optimal SDP embedding of A. n−1 be the optimal embedding of A. Then we may write Proof. First, let PX = {u1 , . . . , un } ⊂ S slinA,Z (s) = i,j aij φs (hui , Zi) · φs (hui , Zi) . For any ui ∈ X, the specific form of φs (hZ, ui i) depends solely on whether hZ, ui i < −s, −s ≤ hZ, ui i ≤ s, or s < hZ, ui i. Of course, if hZ, ui i ≥ 0 or hZ, ui i < 0, we can disregard the possibility that hZ, ui i < −s or hZ, ui i > s, respectively. Then so long as |hZ, ui i| > s, we have that φs (hZ, ui i) = ±1, where the sign depends on the sign of hZ, ui i. Further, when s grows to the point where s > |hZ, uj i|, we have that φs (hZ, ui i) = hZ, uj i/s. Therefore, if we order the set of real values {|hZ, u1 i| , . . . , |hZ, un i|}, then so long as s falls between two consecutive elements of this ordering, the form of slinA,Z (s) is fixed. In particular, each summand is either a constant, a constant multiplied by 1s , or a constant multiplied by s12 , perhaps accompanied by an additive constant term. This means that we may partition the positive real line into n + 1 intervals where the form of slin(A,Z) (s) is a fixed quadratic function, as claimed. Lemma 1 allows us to prove the following bound on Pdim(Hslin ). Lemma 2. Pdim(Hslin ) = Θ(log n). Lemma 2 follows from Lemmas 3 and 4, where we prove Pdim(Hslin ) = O(log n) and Pdim(Hslin ) = Ω(log n). Lemma 3. Pdim(Hslin ) = O(log n). Proof. We prove this upper bound by showing that if a set S of size m is shatterable, then m = O(log n). This means that the largest shatterable set must be of size O(log n),so the pseudodimension of Hslin is O(log n). We arrive at this bound by fixing a tuple A(i) , Z(i) ∈ S and analyzing slinA,Z (s). In particular, we make use of Lemma 1, from which we know that slin(A,Z) (s) is composed of n + 1 piecewise quadratic components. Therefore, if ri is the witness corresponding  to the element A(i) , Z(i) , we can partition the positive real line into at most 3(n + 1) intervals 6 At most 3(n + 1) intervals for sample (A(1) , Z (1) ) and witness r1 s>0 At most 3(n + 1) intervals for sample (A(2) , Z (2) ) and witness r2 s>0 .. At most 3(n + 1) intervals for sample (A(|S|) , Z (|S|) ) and witness r|S| s>0 Merging the intervals of all samples and witnesses At most (3n + 2)m + 1 intervals for samples S and their respective witnesses s>0  Figure 2: Partitioning s > 0 into intervals given a set S of m tuples A(i) , Z(i) and witnesses ri such that within each interval for each i, slin(A(i) ,Z (i) ) (s) is always greater than ri or lesser than ri . where slinA,Z (s) is always either less than its witness ri or greater than ri as s varies over one fixed interval. The constant 3 term comes from the fact that for a single, continuous quadratic component of slin(A,Z) (s), the function may equal ri at most twice, so there are at most three subintervals where the function is less than or greater than ri . Now, S consists of m tuples A(i) , Z(i) , each of which corresponds to its own partition of the positive real line. If we merge these partitions (as shown in Figure 2), simple algebra shows that we are left with at most (3n + 2)m + 1 intervals such that for all i ∈ [m], slinA(i) ,Z(i) (s) is always either less than its witness ri or greater than ri as s varies over one fixed interval. In other words, in one interval, the binary labeling of S, defined by whether each sample is less than or greater than its witness, is fixed. This means that if S is shatterable, the 2m values of s which induce all 2m binary labelings of S must come from distinct intervals. Therefore 2m ≤ (3n + 2)m + 1, so m = O(log n). Lemma 4. Pdim(Hslin ) = Ω(log n). Proof sketch. In order to prove that the pseudo dimension of Hslin is at least c log n for some c, we  present a set S = (G(1) , Z(1) ), . . . , (G(m) , Z(m) ) of m = c log n graphs and projection vectors that can be shattered by Hslin . In other words, there exist m witnesses r1 , . . . , rm and 2m = nc values of s, H = {s1 , . . . , snc }, such that for all T ⊆ [m], there exists sT ∈ H such that if j ∈ T , then slinST (G(j) , Z(j) ) > rj and if j 6∈ T , then slinST (G(j) , Z(j) ) ≤ rj . To build S, we use the same graph G for all G(j) and we vary Z(j) . We set G to be the graph composed of bn/4c disjoint copies of K4 . Via a careful choice of the vectors Z(j) and witnesses rj , we pick out 2m critical values of s, which we call C, such that slinG,Z(1) (s) switches from above to below its witness for every other element of the critical values in C. Meanwhile, slinG,Z(2) (s) switches from above to below its witness half as often as slinG,Z(1) (s). Similarly, slinG,Z(3) (s) switches from above to below its witness half as often as slinG,Z(2) (s), and so on. Therefore, we achieve every binary labeling of S using the functions {slins | s ∈ C}, so S is shattered. Our lower bound is particularly strong because it holds for a family of positive semidefinite matrices, rather than a more general family of real-valued matrices. We now prove that our learning algorithm, Algorithm 2 is correct, computationally efficient, and sample efficient. To prove that Algorithm 2 (, δ)-learns the class of s-linear rounding functions, we first prove that Algorithm 2 ideed outputs the empirically optimal value of ŝ. 7 Algorithm 2 An algorithm for finding an empirical value maximizing s-linear rounding function Input: Sample S = {(A(1) , Z(1) ), . . . , (A(m) , Z(m) )} (i) (i) 1: For all i, solve for the SDP embedding U (i) of A(i) , where U (i) = (u1 , . . . , un ).  2: Let T = s1 , . . . , s|T | be the set of all values s > 0 such that there exists a pair of indices (i) j ∈ [n], i ∈ [m] with |hZ(i) , uj i| = s. 1 Pm 3: For i ∈ [|T | − 1], let ŝi be the value in [si , si+1 ] which maximizes m i=1 slinA(i) ,Z(i) (s). 1 Pm 4: Let ŝ be the value in {ŝ1 , . . . , ŝ|T |−1 } that maximizes m i=1 slinA(i) ,Z(i) (s). Output: ŝ  1 Pm (i) (i) over the Lemma 5. Algorithm 2 produces the value ŝ which maximizes m i=1 slins A , Z input sample S. Algorithm 2 has running time polynomial in m and n. 1 Pm Proof. First, define hS,Z (s) = m i=1 slinA(i) ,Z(i) (s), which we claim that Algorithm 2 maximizes. In Lemma 1, we proved that each function slinA(i) ,Z(i) (s) is made up of at most n + 1 piecewise components of the form sa2 + sb + c for some a, b, c ∈ R. Therefore, hS,Z (s) is made up of at most mn + 1 piecewise components of the form sa2 + sb + c as well. Moreover, by Lemma 1, if the border (i) (i) between two components falls at some s ∈ R>0 , then it must be that hZ(i) , xj i = s for some xj in the optimal max-cut SDP embedding of A(i) . These are the thresholds which are computed in Step 2 of Algorithm 2. Therefore, as we increase s starting at 0, s will be a fixed quadratic function between the thresholds, so it is simple to find the optimal value of sP between any pair of consecutive  1 (i) (i) (Step 4), thresholds (Step 3), and then the value maximizing hS,Z (s) = m m i=1 slins A , Z which is the global optimum. We are now ready to prove our main result.    2 drawn from (D × Z)m , AlgoTheorem 3. Given a sample of size m = O H log (n) + log 1δ rithm 2 (, δ)-learns the class of s-linear rounding functions with respect to the cost function −slin∗s and it is computationally efficient.    Proof. Let S = A(1) , Z(1) , . . . , A(m) , Z(m) be a sample of size m. In Lemma 5, we prove  1 Pm (i) (i) in that Algorithm 2 on input S returns the value ŝ which maximizes m i=1 slins A , Z polynomial time. Then from our pseudodimension bound in Lemma 3 we have that with m =    H 2 O log n + log 1δ samples, with probability at least 1 − δ, for all s > 0,    1 X  slins A(i) , Z(i) − E [slins (A, Z)] < . m 2 (A,Z)∼D×Z m i=1 Then, from Lemma 12, E [slins∗ (A)] − E [slinŝ (A)] < . Thus, Algorithm 2 (, δ)-learns the A∼D best s-linear function with respect to D. 3 A∼D Agglomerative algorithms with dynamic programming We begin with an overview of agglomerative algorithms with dynamic programming, which include many widely-studied clustering algorithms, and then we define several parameterized classes of such algorithms. As in the previous section, we prove it is possible to learn the optimal algorithm from 8 a fixed class for a specific application, and for many of the classes we analyze, this procedure is computationally efficient and sample efficient. We focus on agglomerative algorithms with dynamic programming for clustering problems. A clustering instance V = (V, d) consists of a set V of n points and a distance metric d : V ×V → R≥0 specifying all pairwise distances between these points. The overall goal of clustering is to partition the points into groups such that distances within each group are minimized and distances between each group are maximized. Clustering is typically performed using an objective function Φ, such as k-means, k-median, k-center, or the distance to the ground truth clustering (a scenario we discuss in more detail in Section 3.2). Formally, an objective function Φ takes as input a set of points c = {c1 , . . . , ck } ⊆ V which we call centers, as well as a partition C = {C1 , . . . , CP V which we call a clustering. We define the rich class k } of P of clustering objectives Φ(p) (C, c) = ki=1 ( q∈Ci d(q, ci )p )1/p for p ∈ [1, ∞) ∪ {∞}. The k-means, k-median, and k-center objective functions are Φ(2) , Φ(1) , and Φ(∞) , respectively.1 Next, we define agglomerative clustering algorithms with dynamic programming, which are prevalent in practice [3, 35, 40] and enjoy strong theoretical guarantees in a variety of settings [4, 5, 6, 22]. Examples of these algorithms include the popular single-, complete-, and averagelinkage algorithms with dynamic programming. An agglomerative clustering algorithm with dynamic programming is defined by two functions: a merge function and a pruning function. A merge function ξ(A, B) → R≥0 defines a distance between two sets of points A, B ⊆ V . The algorithm builds a cluster tree T by starting with n singleton leaf nodes, and iteratively merging the two sets with minimum distance until there is a single node remaining, consisting of the set V . The children of any node T in this tree correspond to the two sets of points that were merged to form T during the sequence of P merges. Common choices for the merge function ξ include mina∈A,b∈B d(a, b) (single 1 linkage), |A|·|B| a∈A,b∈B d(a, b) (average linkage) and maxa∈A,b∈B d(a, b) (complete linkage). A pruning function Ψ takes as input a k 0 -pruning of any subtree of T and returns a score R≥0 for that pruning. A k 0 -pruning for a subtree T is a partition of the points contained in T ’s root into k 0 clusters such that each cluster is an internal node of T . Pruning functions may be similar to objective functions, though the input is a subtree. The k-means, -median, and -center objectives are standard pruning functions. The algorithm returns the k-pruning of the tree T that is optimal according to Ψ, which can be found in polynomial time using dynamic programming. Algorithm 3 details how the merge function and pruning function work together to form an agglomerative clustering algorithm with dynamic programming. In the dynamic programming step, to find the 1-pruning of any node T , we only need to find the best center c ∈ T . When k 0 > 1, we recursively find the best k 0 -pruning of T by considering different combinations of the best i0 -pruning of the left child TL and the best k 0 − i0 -pruning of the right child TR for i0 ∈ {1, . . . , k − 1} and choosing the best combination. Pictorially, Figure 3 depicts an array of available choices when designing an agglomerative clustering algorithm with dynamic programming. Each path in the chart corresponds to an alternative choice of a merging function ξ and pruning function Ψ. The algorithm designer’s goal is to determine the path that is optimal for her specific application domain. In Section 3.1, we analyze several classes of algorithms where the merge function comes from an infinite family of functions while the pruning function is an arbitrary, fixed function. In Section 3.2, we expand our analysis to include algorithms defined over an infinite family of pruning functions in conjunction with any family of merge functions. Our results hold even when there is a fixed preprocessing step that precedes the agglomerative merge step (as long as it is independent of ξ 1 There have been several papers that provide theoretical guarantees for clustering under this family of objective functions for other values of p. For instance, see Gupta and Tangwongsan’s work [23] which provides a O(p) approximation algorithm when p < log n and Bateni et al.’s work [8] which studies distributed clustering algorithms. 9 Algorithm 3 Agglomerative algorithm with dynamic programming Input: Clustering instance V = (V, d), merge function ξ, pruning function Ψ. 1: Agglomerative merge step to build a cluster tree T according to ξ: • Start with n singleton sets {v} for each v ∈ V . • Iteratively merge the two sets A and B which minimize ξ(A, B) until a single set remains. • Let T denote the cluster tree corresponding to the sequence of merges. 2: Dynamic programming to find the k-pruning of T minimizing Ψ : 0 • For each node  T , find the best k -pruning of the subtree rooted at T in T , denoted by CT,k0 , cT,k0 according to following dynamic programming recursion: (  minc∈T Ψ ({T }, c) if k 0 = 1,  Ψ CT,k0 , cT,k0 = mini0 ∈[k0 −1] Ψ CTL ,i0 ∪ CTR ,k0 −i0 , cTL ,i0 ∪ cTR ,k0 −i0 otherwise. where TL and TR denote the left and right children of T , respectively. Output: The best k-pruning of the root node Troot of T . Figure 3: A schematic for a class of agglomerative clustering algorithms with dynamic programming. 10 and Ψ), therefore our analysis carries over to algorithms such as in [6]. 3.1 Linkage-based merge functions We now define three infinite families of merge functions and provide sample complexity bounds for these families with any fixed but arbitrary pruning function. The families A1 and A3 consist of merge functions ξ(A, B) that depend on the minimum and maximum of all pairwise distances between A and B. The second family, denoted by A2 , is a richer class which depends on all pairwise distances. All classes are parameterized by a single value α. ( ) 1/α A1 = min (d(u, v))α + max (d(u, v))α α ∈ R ∪ {∞, −∞} , u∈A,v∈B u∈A,v∈B   1/α     X  1 A2 =  (d(u, v))α  α ∈ R ∪ {∞, −∞} ,    |A||B| u∈A,v∈B    A3 = α min d(u, v) + (1 − α) max d(u, v) α ∈ [0, 1] . u∈A,v∈B u∈A,v∈B For i ∈ {1, 2, 3}, we define Ai (α) as the merge function in Ai defined by α. A1 and A3 define spectra of merge functions ranging from single-linkage (A1 (−∞) and A3 (1)) to complete-linkage (A1 (∞) and A3 (0)). A2 defines a richer spectrum which includes average-linkage in addition to single- and complete-linkage. Given a pruning function Ψ, we denote (Ai (α), Ψ) as the algorithm which builds a cluster tree using Ai (α), and then prunes the tree according to Ψ. To reduce notation, when Ψ is clear from context, we often refer to the algorithm (Ai (α), Ψ) as Ai (α) and the set of algorithms {(Ai (α), Ψ) | α ∈ R ∪ {−∞, ∞}} as Ai . For example, when the cost function is Φ(p) , then we always set Ψ to minimize the Φ(p) objective, so the pruning function is clear from context. Recall that for a given class of merge functions and a cost function (a generic clustering objective Φ), our goal is to learn a near-optimal value of α in expectation over an unknown distribution of clustering instances. One might wonder if there is some α that is optimal across all instances, which would preclude the need for a learning algorithm. In Theorem 4, we prove that this is not the case; for each p ∈ [1, ∞) ∪ {∞} and i ∈ {1, 2, 3}, given any α, there exists a distribution over clustering instances for which Ai (α) is the best algorithm in Ai with respect to Φ(p) . Crucially, this means that even if the algorithm designer sets p to be 1, 2, or ∞ as is typical in practice, the optimal choice of the tunable parameter α could be any real value. The optimal value of α depends on the underlying, unknown distribution, and must be learned, no matter the value of p. To formally describe this result, we set up notation similar to Section 2. Let V denote the set of all clustering instances over at most n points. With a slight abuse of notation, we will use Φ(Ai (α),Ψ) (V) to denote the abstract cost of the clustering produced by (Ai (α), Ψ) on the instance V. Theorem 4. For i ∈ {1, 2, 3} and a permissible value iof α for Ahi , there exists h i a distribution D (p) (p) over clustering instances V such that EV∼D ΦAi (α) (V) < EV∼D ΦAi (α0 ) (V) for all permissible values of α0 6= α for Ai . For all omitted proofs in this section, see Appendix C. Now for an arbitrary objective function Φ and arbitrary pruning function Ψ, we analyze the complexity of the classes  HA1 ×{Ψ},Φ = Φ(A1 (α),Ψ) : V → R≥0 α ∈ R ∪ {∞, −∞} , 11  HA2 ×{Ψ},Φ = Φ(A2 (α),Ψ) : V → R≥0 α ∈ R ∪ {∞, −∞} , and  HA3 ×{Ψ},Φ = Φ(A3 (α),Ψ) : V → R≥0 α ∈ [0, 1] . We drop the subscript Φ from HAi ×{Ψ},Φ when the objective function is clear from context. Furthermore, in our analysis we will often fix a tuple V = (V, d) and use the notation ΦAi ,V (α) to analyze how ΦAi (α) (V) changes as a function of α. We start with A1 and A3 .     Theorem 5. For all objective functions Φ(p) , Pdim HA1 ,Φ(p) = Θ(log n) and Pdim HA3 ,Φ(p) =  2 and all pruning functions Ψ, Pdim H Θ(log n). For all other objective functions Φ = A ×{Ψ},Φ 1  O(log n) and Pdim HA3 ×{Ψ},Φ = O(log n). This theorem follows from Lemma 7 and Lemma 8. We begin with the following structural lemma, which will help us prove Lemma 7. Lemma 6. ΦA1 ,V : R ∪ {−∞, ∞} → R>0 is made up of O(n8 ) piecewise constant components. Proof sketch. Note that for α 6= α0 , the clustering returned by A1 (α) and the associated cost are both identical to that of A1 (α0 ) if both the algorithms construct the same merge tree. As we range α across R and observe the run of the algorithm for each α, at what values of α do we expect A1 (α) to produce different merge trees? To answer this, suppose that at some point in the run of algorithm A1 (α), there are two pairs of subsets of V , (A, B) and (X, Y ), that could potentially merge. There exist eight points p, p0 ∈ A, q, q 0 ∈ B, x, x0 ∈ X, and y, y 0 ∈ Y such that the decision of which pair to merge depends on the sign of ((d(p, q))α + d(p0 , q 0 )α )1/α − ((d(x, y))α + d(x0 , y 0 )α )1/α . Using a consequence of Rolle’s Theorem, which we provide in Appendix C, we show that the sign of the above expression as a function of α flips at most four times across R. Since each merge decision is defined by eight points, iterating over all (A, B) and (X, Y ) it follows that we can identify all O(n8 ) unique 8-tuples of points which correspond to a value of α at which some decision flips. This means we can divide R ∪ {−∞, ∞} into O(n8 ) intervals over each of which the merge tree, and therefore the output of ΦA1 ,V (α), is fixed. In Appendix C, we show a corresponding statement for A3 (Lemma 18). These lemmas allow us to upper bound the pseudo-dimension of HA1 , Φ and HA1 , Φ by O(log n) in a manner similar to Lemma 3, where we prove a pseudo-dimension upper bound on the class of s-linear SDP rounding algorithms. Thus we obtain the following lemma. Lemma 7. For any Φ, Pdim(HA1 , Φ) = O(log n) and Pdim(HA3 , Φ) = O(log n). Next, we give lower bounds for the pseudo-dimension of the two classes.     Lemma 8. For any objective function Φ(p) , Pdim HA1 ,Φ(p) = Ω(log n) and Pdim HA3 ,Φ(p) = Ω(log n). Proof sketch. We give a general proof outline that applies to both classes. Let b ∈ {1, 3}. We  (1) construct a set S = V , . . . , V (m) of m = log n − 3 clustering instances that can be shattered by Ab . There are 2m = n/8 possible labelings for this set, so we need to show there are n/8 choices of α such that each of these labelings is achievable by some Ab (α) for some α. The crux of the proof lies in showing that given a sequence α0 < α1 < · · · < αn0 < αn0 +1 (where n0 = Ω(n)), it is 2 Recall that although k-means, k-median, and k-center are the most popular choices, the algorithm designer can use other objective functions such as the distance to the ground truth clustering (which we discuss further in Section 3.2). 12 Algorithm 4 An algorithm for finding an empirical cost minimizing algorithm in A1 or A3  Input: Sample S = V (1) , . . . , V (m) , b ∈ {1, 3}  1: Let T = ∅. For each sample V (i) = V (i) , d(i) ∈ S, and for each ordered set of 8 points {v1 , . . . , v8 } ⊆ V (i) , solve for α (if a solution exists) in the following equation and add the solutions to T : d(v1 , v2 )α + d(v3 , v4 )α = d(v5 , v6 )α + d(v7 , v8 )α . If b = 1 : d(v1 , v2 )α + d(v3 , v4 )α = d(v5 , v6 )α + d(v7 , v8 )α . If b = 3 : αd(v1 , v2 ) + (1 − α)d(v3 , v4 ) = αd(v5 , v6 ) + (1 − α)d(v7 , v8 ). Order the elements of set T ∪ {−∞, +∞} as α1 < . . . < α|T | . For each 0 ≤ i ≤ |T |, pick an arbitrary α in the interval (αi , αi+1 ) and run Ab (α) on P all clustering instances in S to compute P V∈S ΦAb (α) (V). Let α̂ be the value which minimizes V∈S ΦAb (α) (V). Output: α̂ 2: possible to design an instance V = (V, d) over n points and choose a witness r such that ΦAb (α) (V) alternates n0 /2 times above and below r as α traverses the sequence of intervals (αi , αi+1 ). Here is a high level description of our construction. There will be two “main” points, a and a0 in V . The rest of the points are defined in groups of 6: (xi , yi , zi , x0i , yi0 , zi0 ), for 1 ≤ i ≤ (n − 2)/6. We will define the distances between all points such that initially for all Ab (α), xi merges to yi to form the set Ai , and x0i merges to yi0 to form the set A0i . As for (zi , zi0 ), depending on whether α < αi or not, Ab (α) merges the points zi and zi0 with the sets Ai and A0i respectively or vice versa. This means that there are (n − 2)/6 values of α such that Ab (α) has a unique behavior in S the merge step. Finally,Sfor all α, sets Ai merge to {a}, and sets A0i merge to {a0 }. Let A = {a} ∪ i Ai and A0 = {a0 } ∪ i A0i . There will be (n − 2)/6 intervals (αi , αi+1 ) for which Ab (α) returns a unique partition {A, A0 }. By carefully setting the distances, we cause the cost Φ({A, A0 }) to oscillate above and below a specified value r along these intervals. The upper bound on the pseudo-dimension implies a computationally efficient and sample effi  cient learning algorithm for Ai for i ∈ {1, 3}. See Algorithm 4. First, we know that m = Õ (H/)2 samples are sufficient to (, δ)-learn the optimal algorithm in Ai . Next, as a consequence of Lemmas 6 and 18, the range of feasible values of α can be partitioned into O(mn8 ) intervals, such that the output of Ai (α) is fixed over the entire set of samples on a given interval. Moreover, these intervals are easy to compute. Therefore, a learning algorithm can iterate over the set of intervals, and for each interval I, choose an arbitrary α ∈ I and compute the average cost of Ai (α) evaluated on the samples. The algorithm then outputs the α that minimizes the average cost. Theorem 6. Let Φ be a clustering objective and let Ψ be a pruning function computable in poly  H 2 1 log n + log δ , and a value i ∈ {1, 3}, nomial time. Given an input sample of size m = O  Algorithm 4 (, δ)-learns the class Ai × {Ψ} with respect to the cost function Φ and it is computationally efficient. Proof. Algorithm 4 finds the empirically best α by solving for the O(mn8 ) discontinuities of P V∈S ΦAb (α) (V) and evaluating the function over the corresponding intervals, which are guaranteed to be constant by Lemmas 6 and 18. Therefore, we can pick any arbitrary α within each interval to evaluate the empirical cost over all samples, and find the empirically best α. This can be done in polynomial time because there are polynomially many intervals, and the runtime of Ai (α) on a given instance is polynomial time. 13 Then it follows from Theorem 5 that m samples are sufficient for Algorithm 4 to (, δ)-learn the optimal algorithm in Ai for i ∈ {1, 3}. Now we turn to A2 . We obtain the following bounds on the pseudo-dimension. Theorem 7. For objective functions Φ(p) , Pdim(HA2 ,Φ(p) ) = Θ(n). For all other objective functions  Φ and all pruning functions Ψ, Pdim HA2 ×{Ψ},Φ = O(n). This theorem follows from Lemmas 9 and 10.  Lemma 9. For all objective functions Φ and all pruning functions Ψ, Pdim HA2 ×{Ψ},Φ = O(n). Proof. Recall the proof of Lemma 7. We are interested in studying how the merge trees constructed by A2 (α) changes over m instances as we increase α over R. To do this, as in the proof of Lemma 7, we fix an instance and consider two pairs of sets A, B and X, Y that could be potentially merged. Now, P the decision to merge one pair is determined by the sign of the expression P before the other 1 1 α − α . First note that this expression has O(n2 ) (d(p, q)) (d(x, y)) p∈A,q∈B x∈X,y∈Y |A||B| |X||Y | terms, and by a consequence of Rolle’s which we prove in Appendix C, it has O(n2 ) roots.  Theorem  Therefore, as we iterate over the O (3n )2 possible pairs (A, B) and (X, Y ), we can determine  O 32n unique expressions each with O(n2 ) values of α at which the corresponding decision flips.  Thus we can divide R into O n2 32n intervals over each of which the output of ΦA3 ,V (α) is fixed.  In fact, suppose S = V (1) , . .. , V (m) is a shatterable set of size m with witnesses r1 , . . . , rm . We can divide R into O mn2 32n intervals over each of which ΦA2 ,V (i) (α) is fixed for all i ∈ [m] and  therefore the corresponding labeling of S according to whether or not ΦA2 (α) V (i) ≤ ri is fixed as well for all i ∈ [m]. This means that HA2 can achieve only O mn2 32n labelings, which is at least 2m for a shatterable set S, so m = O(n).   Lemma 10. For all objective functions Φ(p) , Pdim HA2 ,Φ(p) = Ω(n). Proof sketch. The crux of the proof is to show that there exists a clustering instance V over n points, a witness r, and a set of α’s 1 = α0 < α1 < · · · < α2N < α2N +1 = 3, where N = b(n − 8)/4c, such that ΦA2 ,V (α) oscillates above and below r along the sequence of intervals (αi , αi+1 ). We finish the proof in a manner similar to Lemma 8 by constructing instances with fewer oscillations. To construct V, first we define two pairs of points which merge together regardless of the value of α. Call these merged pairs A and B. Next, we define a sequence of points pi and qi for 1 ≤ i ≤ N with distances set such that merges involving points in this sequence occur one after the other. In particular, each pi merges with one of A or B while qi merges with the other. Therefore, there are potentially 2N distinct merge trees which can be created. Using induction to precisely set the distances, we show there are 2N distinct values of α, each corresponding to a unique merge tree, thus enabling A2 to achieve all possible merge tree behaviors. Finally, we carefully add more points to the instance to control the oscillation of the cost function over these intervals as desired. In Appendix C.1, we prove more results about A2 assuming a natural restriction on the instance space V. In particular, we show the pseudo-dimension can be drastically reduced if the number of unique distances in each problem instance is not too large. In Appendix C.2, we analyze classes of algorithms that interpolate between A1 and A2 . A summary of results for all of our algorithm classes can be found in Table 2. 14 3.2 Dynamic programming pruning functions In the previous section, we analyzed several classes of linkage-based merge functions assuming a fixed pruning function in the dynamic programming step of the standard linkage-based clustering algorithm, i.e. Step 2 of Algorithm 3. In this section, we analyze an infinite class of dynamic programming pruning functions and derive comprehensive sample complexity guarantees for learning the best merge function and pruning function in conjunction. By allowing an application-specific choice of a pruning function, we significantly generalize the standard linkage-based clustering algorithm framework. Recall that in the algorithm selection model, we instantiated the cost function to be a generic clustering objective Φ. In the standard clustering algorithm framework, where Φ is defined to be any general Φ(p) (which include objectives like k-means), the best choice of the pruning function for the algorithm selector is Φ(p) itself as it would return the optimal pruning of the cluster tree for that instantiation of cost. However, when the goal of the algorithm selector is, for example, to provide solutions that are close to a ground truth clustering for each problem instance, the best choice for the pruning function is not obvious. In this case, we assume that the learning algorithm’s training data consists of clustering instances that have been labeled by an expert according to the ground truth clustering. For example, this ground truth clustering might be a partition of a set of images based on their subject, or a partition of a set of proteins by function. On a fresh input data, we no longer have access to the expert or the ground truth, so we cannot hope to prune a cluster tree based on distance to the ground truth.3 Instead, the algorithm selector must empirically evaluate how well pruning according to alternative objective functions, such as k-means or k-median, approximate the ground truth clustering on the labeled training data. In this way, we instantiate cost to be the distance of a clustering from the ground truth clustering. We guarantee that the empirically best pruning function from a class of computable objectives is near-optimal in expectation over new problem instances drawn from the same distribution as the training data. Crucially, we are able to make this guarantee even though it is not possible to compute the cost of the algorithm’s output on these fresh instances because the ground truth clustering is unknown. Along these lines, we can also handle the case where the training data consists of clustering instances, each of which has been clustered according to an objective function that is NP-hard to compute. In this scenario, our learning algorithm returns a pruning objective function that is efficiently computable and which best approximates the NP-hard objective on the training data, and therefore will best approximate the NP-hard objective on future data. Hence, in this section, we analyze a richer class of algorithms defined by a class of merge functions and a class of pruning functions. The learner now has to learn the best combination of merge and pruning functions from this class. To define this more general class of agglomerative clustering algorithms, let A denote a generic class of linkage-based merge functions (such as any of the classes Ai defined in Sections 3.1 and C) parameterized by α. We also define a rich class of center-based clustering objectives for the dynamic  (p) programming step: F = Ψ | p > 0 where Ψ(p) takes as input a partition C = {C1 , C2 , . . . , Ck0 } of n0 points and a set of centers c = {c1 , c2 , . . . , ck0 } such that ci ∈ Ci . The function Ψ(p) is defined 3 If Φ is the distance to ground truth clustering, then Φ cannot be directly measured when the clustering algorithm is used on new data. However, we assume that the learning algorithm has access to training data which consists of clustering instances labeled by the ground truth clustering. The learning algorithm uses this data to optimize the parameters defining the clustering algorithm family. With high probability, on a new input drawn from the same distribution as the training data, the clustering algorithm will return a clustering that is close to the unknown ground truth clustering. 15 Figure 4: Cluster tree corresponding to Table 1. 1 2 3 Clusters Centers Clusters Centers Clusters Centers A B C D E A, B D, E A, B, C A, B, C, D, E {A} {A} {B} {B} {C} {C} {D} {D} {E} {E} {A, B} {A} {A}, {B} {A}, {B} {D, E} {E} {D}, {E} {D}, {E} {A, B, C} {C} {A, B}, {C} {A, C} {A}, {B}, {C} {A, B, C} {A, B, C, D, E} {C} {A, B, C}, {D, E} {C, E} {A, B}, {C}, {D, E} {A, C, E} Table 1: Example dynamic programming table corresponding to the cluster tree in Figure 4 for k = 3. such that (p) Ψ (C, c) = sX X p (d(q, ci ))p . (2) Ci ∈C q∈Ci Note that the definition of Ψ(p) is identical to Φ(p) , but we use this different notation so as not to confuse the dynamic programming function with the clustering objective function. Let A(α) denote (p) the α-linkage merge function from A and F(p) denote the pruning function  Ψ . Earlier, for an abstract objective Φ, we bounded the pseudodimension of HA×{Ψ},Φ = Φ(A(α),Ψ) : V → R≥0 , where Φ(A(α),Ψ) (V) denoted the cost of the clustering produced by building the cluster tree on V using the merge function A(α) and then pruning the tree using a fixed pruning function Ψ. Now, we are interested in doubly-parameterized algorithms of the form (A(α), F(p)) which uses the merge function A(α) to build a cluster tree and then use the pruning function F(p) to prune it. To analyze the resulting class of algorithms, which we will denote by A × F, we have to bound the  pseudodimension of HA×F ,Φ = Φ(A(α),F (p)) : V → R≥0 p > 0 . Recall that in order to show that pseudodimension of HA×{Ψ},Φ is upper bounded by dHA , we proved that, given   a sample of m clustering instances over n nodes, we can split the real line into at dHA most O m2 intervals such that as α ranges over a single interval, the m cluster trees returned by the α-linkage merge function are fixed. To extend this analysis to HA×F ,Φ , we first prove a similar fact in Lemma 11. Namely, given a single cluster tree, we can split the real line into a fixed number of intervals such that as p ranges over a single interval, the pruning returned by using the function Ψ(p) is fixed. We then show in Theorem 8 how to combine this analysis of the rich class of dynamic programming algorithms with our previous analysis of the possible merge functions to obtain a comprehensive analysis of agglomerative algorithms with dynamic programming. We visualize the dynamic programming step of Algorithm 3 with pruning function Ψ(p) using a table such as Table 1, which corresponds to the cluster tree in Figure 4. Each row of the table corresponds to a sub-clustering value k 0 ≤ k, and each column corresponds to a node of the corresponding cluster tree. In the column corresponding to node T and the row corresponding to the value k 0 , we fill in the cell with the partition of T into k 0 clusters that corresponds to the best  k 0 -pruning of the subtree rooted at T , CT,k0 , cT,k0 as defined in Step 2 of Algorithm 3. 16 Figure 5: Partition of the positive real line based on whether or not P p q∈T (d(q, v2 )) as p ranges R>0 . P p q∈T (d(q, v1 )) ≤ Lemma 11. Given a cluster tree T for a clustering instance V = (V, d) of n points, the positive real line can be partitioned into a set I of O(n2(k+1) k 2k ) intervals such that for any I ∈ I, the cluster tree pruning according to Ψ(p) is identical for all p ∈ I. Proof. To prove this claim, we will examine the dynamic programming (DP) table corresponding to the given cluster tree and the pruning function Ψ(p) as p ranges over the positive real line. As the theorem implies, we will show that we can split the positive real line into a set of intervals so that on a fixed interval I, as p ranges over I, the DP table under Ψ(p) corresponding to the cluster tree is invariant. No matter which p ∈ I we choose, the DP table under Ψ(p) will be identical, and therefore the resulting clustering will be identical. After all, the output clustering is the bottomright-most cell of the DP table since that corresponds to the best k-pruning of the node containing all points (see Table 1 for an example). We will prove that the total number of intervals is bounded by O(n2(k+1) k 2k ). We will prove this lemma using induction on the row number k 0 of the DP table. Our induc0 tive will be the following. The positive real line can be partitioned into a set I (k ) of   hypothesis Q 0 0 0 0 O n2 kj=1 n2 j intervals such that for any I (k ) ∈ I (k ) , as p ranges over I (k ) , the first k 0 rows of the DP table corresponding to Ψ(p) are Notice that this means that the positive real line   invariant.  Qk 2 2 2 = O n2(k+1) k 2k intervals such that for any can be partitioned into a set I of O n j=1 n j I ∈ I, as p ranges over I, the DP table corresponding to Ψ(p) is invariant. Therefore, the resulting output clustering is invariant as well. Base case (k 0 = 1). Let p be a positive real number. Consider the first row of the DP table corresponding to Ψ(p) . Recall that each column in the DP table corresponds to a node T in the clustering tree where T ⊆ V . In the first row of the DP table and the column corresponding to node T , we fill in the cell with the single node T and the point c ∈ T which minimizes Ψ(p) ({T }, {c}) = P p q∈T (d(q, c)) . The only thing that might change as we vary p is the center minimizing this objective. Let v1 and v2 be two points in T . The point v1 is a better candidate for the center of T than v2 if and only if Ψ(p) ({T }, {v1 }) ≤PΨ(p) ({T }, {v2 }) which means that Ψ(p) ({T }, {v1 }) − P (p) p p Ψ 0, or in other words, q∈T (d(q, v1 )) − q∈T (d(q, v2 )) ≤ 0. The equation P ({T }, {v2 })p ≤ P p q∈T (d(q, v1 )) − q∈T (d(q, v2 )) has at most 2|T | zeros, so there are at most 2|T | + 1 intervals I1 , . . . , It which partition the positive real line such that for any Ii , as p ranges over Ii , whether or not Ψ(p) ({T }, {v1 }) ≤ Ψ(p) ({T }, {v2 }) is fixed. For example, see Figure 5. Every pair of points in T similarly partitions the positive real line into 2|T | + 1 intervals. If we merge all |T |2 /2 partitions — 2 one partition for each pair of points in T — then we are left with at most |T2| · 2|T | + 1 = |T |3 + 1 intervals I1 , . . . , Iw partitioning the positive real line such that for any Ii , as p ranges over Ii , the point v ∈ T which minimizes Ψ(p) ({T }, {v}) is fixed. 17 Since T is arbitrary, we can thus partition the real line for each node T 0 in the cluster tree. Again, this partition defines the center of the cluster T 0 as p ranges Pover the3 positive real4 line. If we merge the partition for every node T ∈ T , then we are left with T ∈T |T | + 1 = O(n ) intervals I1 , . . . , I` such that as p ranges over any one interval Ii , the centers of all nodes in the cluster tree are fixed. In other words, for each T , the point vi ∈ T which minimizes Ψ(p) ({T }, {vi }) is fixed. Of course, this means that the first row of the DP table is fixed as well. Therefore, the inductive hypothesis holds for the base case. Inductive step. Consider the k 0 th row of the DP table. We knowfrom the inductive hypothesis Qk0 −1 2 2  0 −1) (k 2 that the positive real line can be partitioned into a set I of O n intervals such j=1 n j 0 0 0 that for any I (k −1) ∈ I (k −1) , as p ranges over I (k −1) , the first k 0 − 1 rows of the DP table corresponding to Ψ(p) are invariant. 0 0 Fix some interval I (k −1) ∈ I (k −1) . Let T be a node in the cluster tree T and let TL and TR be the left and right children of T in T respectively. Notice that the pruning which belongs in the cell in the ith row and the column corresponding to T does not depend on the other cells in the ith row, but only on the cells in rows 1 through i − 1. In particular, the pruning which belongs in this cell depends on the inequalities defining which i0 ∈ {1, . . . , k 0 − 1} minimizes  Ψ(p) CTL ,i0 ∪ CTR ,k0 −i0 , cTL ,i0 ∪ cTR ,k0 −i0 . We will now examine this objective function and show that the minimizing i0 , and therefore the optimal pruning, only changes a small number of times 0 as p ranges over I (k −1) . For an arbitrary i0 ∈ {1, . . . , k 0 − 1}, since i0 and k 0 − i0 are both strictly less than k 0 , the best 0 i -pruning of TL (CTR ,i0 , cTR ,i0 ) is exactly the entry in the i0 th row of the DP table and the column corresponding to TL . Similarly, the best k 0 − i0 -pruning of TR , (CTR ,k0 −i0 , cTR ,k0 −i0 ) is exactly the entry in the k 0 − i0 th row of the DP table and the column corresponding to TR . Crucially, these 0 entries do not change as we vary p ∈ I (k −1) , thanks to the inductive hypothesis. 0 Therefore, for any i0 , i00 ∈ {1, . . . , k 0 − 1}, we know that for all p ∈ I (k −1) , the k 0 -pruning of T corresponding to the combination of the best i0 -pruning of TL and the best k 0 − i0 pruning of TR is fixed and can be denoted as (C 0 , c0 ). Similarly, the k 0 -pruning of T corresponding to the combination of the best i00 -pruning of TL and the best k 0 − i00 pruning of TR is fixed and can 0 be denoted as (C 00 , c00 ). Then, for any p ∈ I (k −1) , (C 0 , c0 ) is a better pruning than (C 00 , c00 ) if and only if Ψ(p) (C 0 , c0 ) ≤ Ψ(p) (C00 , c00 ). In order to analyze this inequality, let us consider p the p p p equivalent inequality Ψ(p) (C 0 , c0 ) ≤ Ψ(p) (C 00 , c00 ) i.e., Ψ(p) (C 0 , c0 ) − Ψ(p) (C 00 , c00 ) ≤ 0. Now, to expand this expression let C 0 = {C10 , C20 , . . . , Ck0 0 } and c0 = {c01 , c02 . . . , c0k0 } and similarly C 00 = {C100 , C200 , . . . , Ck0 0 } and c00 = {c001 , c002 . . . , c00k0 }. Then, this inequality can then be written as, 0 k X X i=1 q∈Ci0 The equation 0 Pk0 P i=1 q∈Ci0 p d(q, c0i ) (d(q, c0i ))p − 0 − k X X i=1 q∈Ci00 Pk 0 P i=1 q∈Ci00 d(q, c00i ) p ≤ 0. (d(q, c00i ))p has has at most 2n zeros as p 0 ranges over I (k −1) . Therefore, there are at most 2n + 1 subintervals partitioning I (k −1) such that as p ranges over one subinterval, the smaller of Ψ(p) (C 0 , c0 ) and Ψ(p) (C 00 , c00 ) is fixed. In other words, as p ranges over one subinterval, either the combination of the best i0 -pruning of T ’s left child and the best (k 0 − i0 )-pruning of T ’s right child is better than the combination of the best i00 -pruning of T ’s left child with the best (k − i00 )-pruning of T ’s right child, or vice versa. For all pairs i0 , i00 ∈ {1, . . . , k 0 − 1}, we can similarly partition I into at most 2n + 1 subintervals 0 defining the better of the two prunings. If we merge all (k 0 − 1)2 /2 partitions of I (k −1) , we have 0 2 0 (k −1) · 2n + 1 = (k 0 − 1)2 n + 1 total subintervals of I (k −1) such that as p ranges over a single 2 18 subinterval, argmini0 ∈{1,...,k0 −1} Ψ(p) CTL ,i0 ∪ CTR ,k0 −i0 , cTL ,i0 ∪ cTR ,k0 −i0  is fixed. Since these equations determine the entry in the ith row of the DP table and the column corresponding to the node T , we have that this entry is also fixed as p ranges over a single subinterval 0 in I (k −1) . 0 The above partition of I (k −1) corresponds to only a single cell in the k 0 th row of the DP table. Considering the k 0 th row of the DP table as a whole, we must fill in at most 2n entries, since there are at most 2n columns of the DP table. For each column, there is a corresponding partition of 0 I (k −1) such that as p ranges over a single subinterval in the partition, the entry in the k 0 th row 0 and that column is fixed. If we merge all such partitions, we are left with a partition of I (k −1) consisting of at most 2n2 (i − 1)2 + 1 intervals such that as p ranges over a single interval, the entry 0 in every column of the k 0 th row is fixed. As these intervals are subsets of I (k −1) , by assumption, the first k 0 − 1 rows of the DP table are also fixed. Therefore, the first k 0 rows are fixed. 0 0 0 To recap, we fixed an interval I (k −1) such that as p ranges overI (k −1) , the first  k − 1 rows of Q 0 −1 k the DP table are fixed. By the inductive hypothesis, there are O n2 j=1 n2 j 2 such intervals. 0 Then, we showed that I (k −1) can be partitioned into 2n2 (k 0 − 1)2 + 1 intervals such that for any (k0 ) (k0 ) 0 one subinterval  IQ 0 , as p ranges over I , the first k rows of the DP table are fixed. Therefore, k there are O n2 j=1 n2 j 2 total intervals such that as p ranges over a single interval, the first k 0 rows of the DP table are fixed. Aggregating this analysis over all k rows of the DP table, we have that there are ! k   Y 2 = O n2(k+1) k 2k O n2 n2 k 0 k=1 intervals such that the entire DP table is fixed so long as p ranges over a single interval. We are now ready to prove our main theorem in this section.   Theorem 8. Given m clustering instances, suppose there are O m · 2O(dHA ) intervals that partition the domain of α such that as α ranges over a single interval, the m cluster trees returned by the α-linkage merge function from A are fixed. Then, for all sets of m samples S ∼ Dm , P dim (HA×F ,Φ ) = O (dHA + k log n). Proof. Let S be a set of clustering instances. Fix a single interval of α (as shown along the horizontal axis in Figure 6) where the set of cluster trees returned by the α-linkage merge function from A is fixed across all samples. We know from Lemma 11 that we can split the real line into a fixed number of intervals such that as p ranges over a single interval (as shown along the vertical axis in Figure 6), the dynamic programming (DP) table is fixed for all the samples, and therefore the resulting set of clusterings is fixed. In particular, for a fixed α interval, each of the m samples has  its own O n2(k+1) k 2k intervals of p, and when we merge them, we are left with O mn2(k+1) k 2k intervals such that as p ranges over a single interval, each DP table for each sample is fixed, and   therefore the resulting clustering for each sample is fixed. Since there are O m2dHA such α    intervals, each inducing O mn2(k+1) k 2k such p intervals in total, we have O 2dHA m2 n2(k+1) k 2k cells in R2 such that if (α, p) is in one fixed cell, the resulting clustering across all samples is   dHA 2 2(k+1) 2k m fixed. If HA×F shatters S, then it must be that 2 = O 2 m n k , which means that    m = O log 2dHA n2(k+1) k 2k = O (dHA + k log n). 19   O mn2(k+1) k 2k intervals of p for a fixed α interval p>0 Fixed set of pruned cluster trees on samples S in each cell α Fixed set of cluster trees on samples S for all α in this interval. O(m · 2O(dHA ) ) intervals of α Figure 6: Illustration of the partition of the parameter space as described in the proof of Theorem 9.   Theorem 9. Given a sample of size m = O (H/)2 (dHA + log n + log(1/δ)) and a clustering objective Φ, it is possible to (, δ)-learn the class of algorithms A×F with respect to the cost function Φ. Moreover, this procedure is efficient if the following conditions hold: 1. k is constant, which ensures that the partition of p values is polynomial in n. 2. 2dHA is polynomial in n, which ensures that the partition of α values is polynomial in n. 3. It is possible to efficiently compute the partition of α into intervals so that on a single interval I, for all α ∈ I, the m cluster trees returned by α-linkage performed on S are fixed. Proof. A technique for finding the empirically best algorithm from A × F follows naturally from Lemma 11; we partition the range of feasible values of α as described in Section 3.1, and for each resulting interval of α, we find the fixed set of cluster trees on the samples. We then partition the values of p as discussed in the proof for Lemma 11. For each interval of p, we use Ψ(p) to prune the trees and determine the fixed empirical cost corresponding to that interval of p and α. This is illustrated in Figure 6. Iterating over all partitions of the parameter space, we can find parameters with the best empirical cost. In Theorem 8, we use Lemma 11 to show that Pdim(HA×F ,Φ ) = O (dHA + k log n) and thus arrive at our sample complexity bound when k is constant. 4 Discussion and open questions In this work, we show how to learn near-optimal algorithms over several infinite, rich classes of SDP rounding algorithms and agglomerative clustering algorithms with dynamic programming. We provide computationally efficient and sample efficient learning algorithms for many of these problems and we push the boundaries of learning theory by developing techniques to compute the pseudo-dimension of intricate, multi-stage classes of IQP approximation algorithms and clustering algorithms. We derive tight pseudo-dimension bounds for the classes we study, which lead to strong 20 sample complexity guarantees. We hope that our techniques will lead to theoretical guarantees in other areas where empirical methods for algorithm configuration have been developed. There are many open avenues for future research in this area. In this work, we focused on algorithm families containing only computationally efficient algorithms. However, oftentimes in empirical AI research, the algorithm families in question contain procedures that are too slow to run to completion on many training instances. In this situation, we would not be able to determine the exact empirical cost of an algorithm on the training set. Could we still make strong, provable guarantees for application-specific algorithm configuration in this scenario? This work also leaves open the potential for data-dependent bounds over well-behaved distributions, such as those over clustering instances satisfying some form of stability, be it approximation stability, perturbation resilience, or so on. Acknowledgments. This work was supported in part by grants NSF-CCF 1535967, NSF CCF1422910, NSF IIS-1618714, a Sloan Fellowship, a Microsoft Research Fellowship, a NSF Graduate Research Fellowship, a Microsoft Research Women’s Fellowship, and a National Defense Science and Engineering Graduate (NDSEG) fellowship. We thank Sanjoy Dasgupta, Anupam Gupta, and Ryan O’Donnell for useful discussions. References [1] Noga Alon, Konstantin Makarychev, Yury Makarychev, and Assaf Naor. Quadratic forms on graphs. Inventiones mathematicae, 163(3):499–522, 2006. [2] Martin Anthony and Peter L Bartlett. Neural network learning: Theoretical foundations. Cambridge University Press, 2009. [3] Pranjal Awasthi, Maria-Florina Balcan, and Konstantin Voevodski. Local algorithms for interactive clustering. In Proceedings of the International Conference on Machine Learning (ICML), pages 550–558, 2014. [4] Pranjal Awasthi, Avrim Blum, and Or Sheffet. Center-based clustering under perturbation stability. Information Processing Letters, 112(1):49–54, 2012. [5] Maria-Florina Balcan, Nika Haghtalab, and Colin White. k-center clustering under perturbation resilience. In Proceedings of the Annual International Colloquium on Automata, Languages, and Programming (ICALP), 2016. [6] Maria-Florina Balcan and Yingyu Liang. Clustering under perturbation resilience. SIAM Journal on Computing, 45(1):102–155, 2016. [7] Afonso S. Bandeira, Nicolas Boumal, and Vladislav Voroninski. On the low-rank approach for semidefinite programs arising in synchronization and community detection. In Proceedings of the Conference on Learning Theory (COLT), pages 361–382, 2016. [8] MohammadHossein Bateni, Aditya Bhaskara, Silvio Lattanzi, and Vahab Mirrokni. Distributed balanced clustering via mapping coresets. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 2591–2599, 2014. [9] Ahron Ben-Tal and Arkadi Nemirovski. Lectures on modern convex optimization: analysis, algorithms, and engineering applications, volume 2. Siam, 2001. 21 [10] William Brendel and Sinisa Todorovic. Segmentation as maximum-weight independent set. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 307–315, 2010. [11] Fazli Can. Incremental clustering for dynamic information processing. ACM Transactions on Information Systems (TOIS), 11(2):143–164, 1993. [12] Yves Caseau, François Laburthe, and Glenn Silverstein. A meta-heuristic factory for vehicle routing problems. In International Conference on Principles and Practice of Constraint Programming (CP), pages 144–158. Springer, 1999. [13] Moses Charikar, Chandra Chekuri, Tomás Feder, and Rajeev Motwani. Incremental clustering and dynamic information retrieval. In Proceedings of the Annual Symposium on Theory of Computing (STOC), pages 626–635, 1997. [14] Moses Charikar and Anthony Wirth. Maximizing quadratic programs: extending Grothendieck’s inequality. In Proceedings of the Annual Symposium on Foundations of Computer Science (FOCS), pages 54–60, 2004. [15] Timothee Cour, Praveen Srinivasan, and Jianbo Shi. Balanced graph matching. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 313–320, 2006. [16] Jim Demmel, Jack Dongarra, Victor Eijkhout, Erika Fuentes, Antoine Petitet, Rich Vuduc, R Clint Whaley, and Katherine Yelick. Self-adapting linear algebra algorithms and software. Proceedings of the IEEE, 93(2):293–312, 2005. [17] R.M Dudley. The sizes of compact subsets of Hilbert space and continuity of Gaussian processes. Journal of Functional Analysis, 1(3):290 – 330, 1967. [18] Uriel Feige and Michael Langberg. The RPR2 rounding technique for semidefinite programs. Journal of Algorithms, 60(1):1–23, 2006. [19] Darya Filippova, Aashish Gadani, and Carl Kingsford. Coral: an integrated suite of visualizations for comparing clusterings. BMC bioinformatics, 13(1):276, 2012. [20] Roy Frostig, Sida Wang, Percy S Liang, and Christopher D Manning. Simple MAP inference via low-rank relaxations. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 3077–3085, 2014. [21] Michel X Goemans and David P Williamson. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. Journal of the ACM (JACM), 42(6):1115–1145, 1995. [22] Anna Grosswendt and Heiko Roeglin. Improved analysis of complete linkage clustering. In European Symposium of Algorithms, volume 23, pages 656–667. Springer, 2015. [23] Anupam Gupta and Kanat Tangwongsan. Simpler analyses of local search algorithms for facility location. arXiv preprint arXiv:0809.2554, 2008. [24] Rishi Gupta and Tim Roughgarden. A PAC approach to application-specific algorithm selection. In Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science (ITCS), pages 123–134, 2016. 22 [25] Qixing Huang, Yuxin Chen, and Leonidas Guibas. Scalable semidefinite relaxation for maximum a posterior estimation. In Proceedings of the International Conference on Machine Learning (ICML), pages 64–72, 2014. [26] Fredrik D Johansson, Ankani Chattoraj, Chiranjib Bhattacharyya, and Devdatt Dubhashi. Weighted theta functions and embeddings with applications to max-cut, clustering and summarization. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 1018–1026, 2015. [27] Subhash Khot, Guy Kindler, Elchanan Mossel, and Ryan O’Donnell. Optimal inapproximability results for MAX-CUT and other 2-variable CSPs? SIAM Journal on Computing, 37(1):319– 357, 2007. [28] Kevin Leyton-Brown, Eugene Nudelman, and Yoav Shoham. Empirical hardness models: Methodology and a case study on combinatorial auctions. Journal of the ACM (JACM), 56(4):22, 2009. [29] Marina Meilă. Comparing clusterings: an information based distance. Journal of multivariate analysis, 98(5):873–895, 2007. [30] Ryan O’Donnell and Yi Wu. An optimal SDP algorithm for max-cut, and equally optimal long code tests. In Proceedings of the Annual Symposium on Theory of Computing (STOC), pages 335–344, 2008. [31] David Pollard. Convergence of stochastic processes. Springer-Verlag, 1984. [32] David Pollard. Empirical processes. Institute of Mathematical Statistics, 1990. [33] John R Rice. The algorithm selection problem. Advances in computers, 15:65–118, 1976. [34] Andrej Risteski and Yuanzhi Li. Approximate maximum entropy principles via GoemansWilliamson with applications to provable variational methods. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 4628–4636, 2016. [35] Mehreen Saeed, Onaiza Maqbool, Haroon Atique Babri, Syed Zahoor Hassan, and S Mansoor Sarwar. Software clustering techniques and the use of combined algorithm. In Proceedings of the European Conference on Software Maintenance and Reengineering, pages 301–306. IEEE, 2003. [36] Sagi Snir and Satish Rao. Using max cut to enhance rooted trees consistency. IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB), 3(4):323–333, 2006. [37] Timo Tossavainen. On the zeros of finite sums of exponential functions. Australian Mathematical Society Gazette, 33(1):47–50, 2006. [38] Vijay V Vazirani. Approximation algorithms. Springer Science & Business Media, 2013. [39] Jun Wang, Tony Jebara, and Shih-Fu Chang. Semi-supervised learning using greedy max-cut. Journal of Machine Learning Research, 14(Mar):771–800, 2013. [40] James R White, Saket Navlakha, Niranjan Nagarajan, Mohammad-Reza Ghodsi, Carl Kingsford, and Mihai Pop. Alignment and clustering of phylogenetic markers-implications for microbial diversity studies. BMC bioinformatics, 11(1):152, 2010. 23 [41] David P Williamson and David B Shmoys. The design of approximation algorithms. Cambridge University press, 2011. [42] Lin Xu, Frank Hutter, Holger H. Hoos, and Kevin Leyton-Brown. SATzilla: portfolio-based algorithm selection for SAT. Journal of Artificial Intelligence Research, 32:565–606, June 2008. [43] Chihiro Yoshimura, Masanao Yamaoka, Masato Hayashi, Takuya Okuyama, Hidetaka Aoki, Ken-ichi Kawarabayashi, and Hiroyuki Mizuno. Uncertain behaviours of integrated circuits improve computational performance. Scientific reports, 5, 2015. [44] Mingjun Zhong, Nigel Goddard, and Charles Sutton. Signal aggregate constraints in additive factorial HMMs, with application to energy disaggregation. In Proceedings of the Annual Conference on Neural Information Processing Systems (NIPS), pages 3590–3598, 2014. [45] Uri Zwick. Outward rotations: a tool for rounding solutions of semidefinite programming relaxations, with applications to max cut and other problems. In Proceedings of the Annual Symposium on Theory of Computing (STOC), pages 679–687, 1999. A Proofs from Section 2 Theorem 2. Suppose that Lslin is an algorithm that takes as input m samples (A(i) , Z(i) ) ∼ 1 Pm D × Z and returns the parameter ŝ which maximizes m i=1 slins (A(i) , Z(i) ). Further, supposePthat m is sufficiently large to ensure that with probability at least 1 − δ, for all s > 0, m 1  (i) (i) |m i=1 slins (A , Z ) − E(A,Z) [slins (A, Z)] | ≤ 2 . Then Lslin (, δ)-learns the class of s-linear rounding functions with respect to the cost function −slin∗s . Proof. Theorem 2 follows directly from Lemma 12. Lemma 12. Suppose that m is sufficiently large to ensure that with probability at least 1 − δ over a draw of m samples A(i) , Z(i) ∼ D × Z, for all s-linear functions φs ,   1 X  E [slins (A, Z)] < . slins A(i) , Z(i) − m 2 (A,Z)∼D×Z m i=1  1 Pm (i) (i) and s∗ maximizes Then with probability at least 1 − δ, if ŝ maximizes m i=1 slins A , Z E [slins (A)], then E [slins∗ (A)] − E [slinŝ (A)] < . A∼D A∼D A∼D Proof. Notice that since D × Z is a product distribution, we have that   E [slins (A, Z)] = E E [slins (A, Z)] = E [slins (A)] , A∼D Z∼Z (A,Z)∼D×Z A∼D so we know that with probability at least 1 − δ, for all s-linear functions φs ,   1 X  slins A(i) , Z(i) − E [slins (A)] < . A∼D m 2 m i=1 By assumption, we know that with probability at least 1 − δ,   1 X  slinŝ A(i) , Z(i) − E [slinŝ (A)] < A∼D m 2 m i=1 24 and   1 X  slins∗ A(i) , Z(i) − E [slins∗ (A)] < , A∼D m 2 m i=1 which means that E [slins∗ (A)] − E [slinŝ (A)] < . A∼D A∼D Lemma 4. Pdim(Hslin ) = Ω(log n). Proof. In order to prove that the   pseudo dimension  of Hslin is at least c log n for some c, we must present a set S = G(1) , Z(1) , . . . , G(m) , Z(m) of m = c log n graphs and projection vectors that can be shattered by Hslin . In other words, there exist m witnesses r1 , . . . , rm and 2m = nc s values H = {s1 , . .. , snc } such that for all T ⊆ [m], there exists  sT ∈ H such that if j ∈ T , then (j) (j) (j) (j) slinST G , Z > rj and if j 6∈ T , then slinST G , Z ≤ rj . To build S, we will use the same graph G for all G(j) and we will vary Z(j) . We set G to be the graph composed of bn/4c disjoint copies of K4 . If n = 4, then a simple calculation confirms that an optimal max-cut SDP embedding of G is         −1/3 −1/3 −1/3 1   √ √   √     − 2/3  − 2/3  0 2/3 2 , p , p  .  , 0  0   2/3  − 2/3      0 0 0 0 Therefore, for n > 4, an optimal embedding is the set of n vectors SDP (G) such that for all i ∈ {0, . . . , bn/4c − 1}, r r √ √ √ 2 2 2 2 1 2 2 1 1 e4i+1 , − e4i+1 + e4i+2 , − e4i+1 − e4i+2 + e4i+3 , − e4i+1 − e4i+2 − e4i+3 3 3 3 3 3 3 3 3 are elements SDP (G). We now define the set of m vectors Z(j) . First, we set Z(1) to be the vector  Z(1) = 70 , 5 · 70 , 5 · 70 , 70 , 71 , 5 · 71 , 5 · 71 , 71 , 72 , 5 · 72 , 5 · 72 , 72 , 73 , 5 · 73 , 5 · 73 , 73 , . . . . In other words, it is the concatenation the vector 7i (1, 5, 5, 1) for all i > 0. Next, Z(2) is defined as  Z(2) = 70 , 5 · 70 , 5 · 70 , 70 , 0, 0, 0, 0, 72 , 5 · 72 , 5 · 72 , 72 , 0, 0, 0, 0, . . . , so Z(2) is the same as Z(1) for all even powers of 7, and otherwise its entries are 0. In a similar vein,  Z(3) = 70 , 5 · 70 , 5 · 70 , 70 , 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 74 , 5 · 74 , 5 · 74 , 74 , . . . . j−1 To pin down this pattern, we set Z(j) to be the same as Z(1) for all entries of the form 7i2 (1, 5, 5, 1) for i ≥ 0, and otherwise its entries are 0. We set the following positive, increasing constants which will appear throughout the remaining analysis: a= (1, 0, 0, 0) · (1, 5, 5, 1) = 1 √ p p √ b= (−1/3, − 2/3, 2/3, 0) · (1, 5, 5, 1) = 5 √2/3 − 5 32+1 √ c= (−1/3, 2 2/3, 0, 0) · (1, 5, 5, 1) = 10 32−1 √ p p √ d = (−1/3, − 2/3, 2/3, 0) · (1, 5, 5, 1) = 5 2/3 + 5 32+1 . 25 Figure 7: Depiction of slinG,Z(j) (s) as s increases from 0. A black dot means that slinG,Z(j) (s) ≥ rj and a white dot means that slinG,Z(j) (s) < rj . Here, ai = 7i−1 c and bi = 7i−1 d. We also set c̃ = b + c + bc − d − bd − cd and we claim that the witnesses   b 1 1 −1 r1 = − 2 3n c2 1 c̃ rj = − j>1 j−1 2 3n72 −2 d2 are sufficient to prove that this set is shatterable, and we will spend the remainder of the proof showing that this is true. Now, the domain of slinG,Z(j) (s) can be split into intervals on which it has a simple, fixed form. h j−1  j−1 These intervals begin at 1 and have the form 7i2 , 7(i+1)2 , for i ≥ 0. It is straightforward h j−1  j−1 matter of calculations to check that for s ∈ 7i2 , 7(i+1)2 , 1 slinG,Z(j) (s) =   h P2 i  j−1 i−1 2k2j−1 72i2 1 1  7 + c̃ − 1  2 k=0  3n  s h s  i     1 12 c̃ Pi−1 72k2j−1 + 72i2j−1 b − 1 k=0 3n  s h i  − Pi−1 2k2j−1 1 1 2i2j−1 (b + c + bc) − y  7 + 7 c̃  2 k=0  3n  s h  i    1 12 c̃ Pi 72k2j−1 k=0 3n s 2i2j−1 h j−1  j−1 if s ∈ 7i2 , 7i2 b h j−1  j−1 if s ∈ 7i2 b, 7i2 c h j−1  j−1 if s ∈ 7i2 c, 7i2 d h j−1  j−1 if s ∈ 7i2 d, 7(i+1)2 , (1+b+c) where y = 7 . (We note here that the power of 7 pattern was chosen so that these s intervals are well defined, since 7i d < 7i+1 .) We call the following increasing sequence of numbers points of interest, which we use to prove  that this set is shattered: 70 c, 70 d, 71 c, 71 d, 72 c, 72 d, . . . , 7i c, 7i d, . . . We make two claims about these points of interest: 1. slinG,Z(1) (s) is above its witness whenever s = 7i c and it is below its witness whenever s = 7i d for i ≥ 0. 2. Let j > 1 and consider slinG,Z(j) (s). There are 2j points of interest per interval h j−1  j−1 7i2 , 7(i+1)2 . On the first half of these points of interest, slinG,Z(j) (s) is greater than its witness and on the second half, slinG,Z(j) (s) is less than its witness. These claims are illustrated by the dots in Figure 7. Together, these claims imply that S can be shattered because for any vector b ∈ {0, 1}m , there exists a point of interest s such that slins (S) induces the binary labeling b on S. 26 The first claim is true because slinG,Z(1) " i−1 # ! X 1 c̃ 72k + 72i b − 1 72i c2 k=0     1 72i − 1 1 1 2i c̃ · 2 = − +7 b −1 , 2 3n 72i c2 7 −1  1 1 7i c = − 2 3n which is an increasing function of i, so it is minimized when i = 0, where    1 b 1 0 slinG,Z(1) 7 c = − − 1 = r1 2 3n c2  so slinG,Z(1) 7i c is always at least its witness. Further, slinG,Z(1)  1 1 7i d = − 2 3n 1 1 − 2 3n = " i #! X 1 c̃ 72k 72i d2 k=0 " #! 1 72(i+1) − 1 c̃ · ), 72i d2 48 which is again an increasing function in i, with a limit of 1 49c̃ − < r1 . 2 144nd2  Therefore, slinG,Z(1) 7i d is always less than its witness, and we may conclude that the first claim is always true. For the second claim, notice that j−1 7i2 j−1 c < 7i2 j−1 +1 j−1 +1 c < 7i2 j−1 +2 d < 7i2 j−1 j−1 j−1 c · · · < 7i2 +2 c = 7(i+1)2 c, h j−1  j−1 so there are 2j points of interest per interval 7i2 c, 7(i+1)2 c , as claimed. The first two points j−1 d < 7i2 j−1 of interest, 7i2 c and 7i2 d, fall in an interval where slinG,Z(j) is decreasing in s. Therefore, it j−1 is minimized when s = 7i2 d, where " i #!  j−1  1 X 1 1 j−1 slinG,Z(j) 7i2 d = − c̃ 72k2 2 3n 72i2j−1 d2 k=0 " #! j 1 1 7(i+1)2 − 1 1 . = − c̃ · 2 3n 72i2j−1 d2 72j − 1  j−1  Simple calculations show that slinG,Z(j) 7i2 d is an increasing function in i, so it is minimized when i = 0, where slinG,Z(j) (d) = 1 2 − c̃ 3nd2 > rj , as desired. h j−1  j−1 The remaining points of interest fall in the interval 7i2 d, 7(i+1)2 , so slinG,Z(j) (s) has  h P i j−1 1 1 c̃ ik=0 72k2 . This segment of the function has a negative derivative, so the form 12 − 3n s2 it is decreasing. j−1 j−1 If j = 2, then the points of interest weh already considered, 7i2 c and 7i2 d, make up half  j−1 j−1 of the 2j points of interest in the interval 7i2 c, 7(i+1)2 c . Therefore, we only need to show 27 j−1 +1 that when s equals 7i2 j−1 +1 c and 7i2 d, then slinG,Z(j) (s) is less than its witness. As we saw,  j−1  slinG,Z(j) is decreasing on this segment, so it is enough to show that slinG,Z(j) 7i2 +1 c is less than its witness. To this end, " i #!  j−1  1 X 1 1 i2 +1 2k2j−1 slinG,Z(j) 7 c = − c̃ 7 2 3n 72i2j−1 +2 c2 k=0 " #! j 1 1 7(i+1)2 − 1 1 c̃ · . = − 2 3n 72i2j−1 +2 c2 72j − 1 This is an increasing function of i with a limit of Therefore, when s equals 7 i2j−1 +1 b and 7 i2j−1 +1 1 2 − 1 3n  1 72 c2 h j 72 j 72 −1 c̃ · i < rj when j = 2. c, then slinG,Z(j) (s) is less than its witness. h j−1  j−1 Finally, if j > 2, since slinG,Z(j) (s) is decreasing on the interval 7i2 c, 7(i+1)2 , we must  j−1 j−2   th only check that at the 2j−1 − 1 point of interest 7i2 +2 −1 d , slinG,Z(j) (s) is greater than  j−1 j−2  th its witness and at the 2j−1 + 1 point of interest 7i2 +2 c , slinG,Z(j) (s) is less than its witness. To this end, " i #!  j−1 j−2  1 X 1 1 i2 +2 −1 2k2j−1 d = − slinG,Z(j) 7 c̃ 7 2 3n 7i2j +2j−1 −2 d2 k=0 " #! j 1 1 7(i+1)2 − 1 1 c̃ · . = − 2 3n 7i2j +2j−1 −2 d2 72j − 1 This function is increasing in i, so it is minimized when i = 0, where " #! j  j−2  1 1 1 72 − 1 2 −1 d = − slinG,Z(j) 7 c̃ · 2j 2 3n 72j−1 −2 d2 7 −1   1 c̃ 1 = − = rj . j−1 −2 2 2 2 3n 7 d  j−1 j−2  Therefore, slinG,Z(j) 7i2 +2 −1 d ≥ rj for all i. Next,  i2j−1 +2j−2 slinG,Z(j) 7  1 1 c = − 2 3n 1 1 = − 2 3n 1 7i2j +2j−1 c2 1 7i2j +2j−1 c2 which is an increasing function in i, with a limit of j−1 1 c̃72  − 2 3nc2 72j − 1 28 " " c̃ i X 2k2j−1 7 k=0 j #! 7(i+1)2 − 1 c̃ · 72j − 1 #! . as i tends toward infinity. Therefore, j−1  j−1 j−2  1 c̃72  < rj slinG,Z(j) 7i2 +2 ≤ − 2 3nc2 72j − 1 for all i, so the second claim holds. B More algorithm classes for MaxQP B.1 ˜-discretized functions for max-cut The class of ˜-discretized rounding functions are a finite yet rich class of functions for the RPR2 paradigm. They were introduced by O’Donnell and Wu as a tool for characterizing the SDP gap curve for the max-cut problem, which we define shortly in order to describe O’Donnell and Wu’s guarantees for RPR2 using ˜-discretized rounding functions. However, we first define the max-cut SDP value of a graph G to be      X 1 1 wij Sdp(G) = max , − g(vi ) · g(vj )  g:V →Bn  2 2 (vi ,vj )∈E where n = |V | and Bn denotes {x ∈ Rn | ||x|| ≤ 1}. Now, suppose that a graph G has an SDP value Sdp(G) ≥ c. The SDP gap curve GapSDP (c) is a function that measures the smallest optimal max-cut value among all graphs such that Sdp(G) ≥ c. In other words, given that Sdp(G) ≥ c, we are guaranteed that the optimal max-cut value of G is at least GapSDP (c). Formally, Definition 10. For 12 ≤ s ≤ c ≤ 1, we call the pair (c, s) an SDP gap if there exists a graph G with Sdp(G) ≥ c and Opt(G) ≤ s. We define the SDP gap curve by GapSDP (c) = inf{s | (c, s) is an SDP gap}. O’Donnell and Wu prove that if G is a graph such that Sdp(G) ≥ c, if one runs RPR2 iteratively with all ˜-discretized rounding functions, then with high probability, at least one will result in a cut with value GapSDP (c) − ˜. We now formally state the definition of an ˜-discretized rounding function as well as O’Donnell and Wu’s algorithm guarantees. Definition 11. Given ˜ > 0, let I˜ denote the partition of R \ {0} into intervals,  I˜ = ±(−∞, −B], ±(−B, −B + ˜2 ], ±(−B + ˜2 , −B + 2˜ 2 ], . . . , ±(−2˜ 2 , −˜ 2 ], ±(−˜ 2 , ˜2 ) , p where B = B(˜ ) is the smallest integer multiple of ˜2 exceeding 2 ln(1/˜ ). We say that a function r : R → [−1, 1] is ˜-discretized if the following hold: 1. r is identically −1 on (−∞, −B], 0 at 0, and identically 1 on [B, ∞). 2. r’s values on the finite intervals in I˜ are from the set ˜Z ∩ (−1, 1). 2 Note that there are 2O(1/˜ ) ˜-discretized functions. Theorem 12 (Corollary 5.4 in [30]). There is an algorithm which, given any graph G with Sdp(G) ≥ 2 c and any ˜ > 0, runs in time poly(|V |)2O(1/˜ ) and with high probability outputs a proper cut in G with value at least GapSDP (c) − ˜. 29 Namely, the algorithm alluded to in Theorem 12 takes as input a graph, runs RPR2 using all ˜-discretized rounding functions, and returns the cut with the maximum value. We define cut˜(G) to be the value of the resulting cut. It is well-known that the pseudo-dimension of a finite function class F has pseudo-dimension log |F|. This immediately implies the following theorem.  Theorem 13. Given an input sample of size m = O 12 ˜12 + log 1δ there exists an algorithm that (, δ)-learns the class of ˜-discretized rounding functions with respect to the cost function −cut˜. B.2 Outward rotations Next we study a class of “outward rotation” based algorithms proposed by Zwick [45]. For the maxcut problem, outward rotations are proven to work better than the random hyperplane technique of Goemans and Williamson [21] on graphs with “light” max-cuts where the max-cut does not constitute a large proportion of the edges. As stated earlier, though Feige and Langberg later showed that there exists a class of rounding functions for which RPR2 becomes equivalent to outward rotations [18], we will analyze this class as it was originally presented by Zwick [45]. The class of outward rotation algorithms is characterized by an angle γ ∈ [0, π/2] varying which results in a range of algorithms between the random hyperplane technique of Goemans and Williamson and the naive approach of outputting a random binary assignment [21]. Unlike RPR2 , the output here is a binary assignment. An outward rotation algorithm in essence extends the optimal SDP embedding in Rn to R2n . The way this is done can be understood as follows. The original embedding is first carried over to the first n co-ordinates of a 2n-dimensional space while the remaining co-oordinates are set to zero. Suppose un+1 , un+2 , . . . , u2n are the orthonormal vectors along each of the last n co-ordinates. Each embedding ui is rotated “out” of the original space, towards un+i by an angle of γ. After performing these outward rotations, the new embedding is projected onto a random hyperplane in R2n . The binary assignment is then defined deterministically based on the sign of the projections like in the GW algorithm [21]. Intuitively, the parameter γ determines how far the SDP embedding is used to determine the final projection of vi as against an arbitrary value drawn from the normal distribution, which is contributed by ui . We formally define the class below. Algorithm 5 SDP rounding algorithm using γ-outward rotation Input: Matrix A ∈ Rn×n 1: Solve the SDP (1) for the optimal embedding U = (u1 , . . . , un ) of A. 2: Define a new embedding u0i in R2n such that the first n co-ordinates correspond to ui cos γ and the following n co-ordinates are set to 0 except the (n + i)th co-ordinate which is set to sin γ. 3: Choose a random vector Z ∈ R2n according to the 2n-dimensional Gaussian distribution. 4: For each decision variable xi , assign xi = sgn (hu0i , Zi) . Output: x1 , . . . , xn . We will now set up notations similar to Section 2. Let owrγ (A, Z) be the value of the binary assignment produced by projecting the SDP embedding of A onto Z after rotating it outwardly by γ. That is, owrγ (A, Z) = X i,j   aij sgn hu0i , Zi sgn hu0j , Zi . We will use owrγ (A) to denote the expected value of owrγ (A, Z) when Z is sampled from Z, the 2n-dimensional normal distribution. It can be easily seen that a fact very similar to Lemma 30  12 in Appendix A will apply here. Therefore, we will again use samples of the form A(i) , Z(i) for the pseudo-dimension analysis.  Let Howr = owrγ : A × R2n → [0, 1] | γ ∈ [0, π/2] . We first prove in Section B.2.1 that the pseudo-dimension of Howr is O(log n). Next, in Section B.2.2 we present an efficient learning algorithm. B.2.1 The pseudo-dimension of the class of outward rotation based algorithms We show an upper bound on the pseudo-dimension of the class of outward rotation based algorithms. In the following discussion, we will use the notation owrA,Z (γ) in order to examine how the value changes as a function of γ for a fixed (A, Z). Theorem 14. Pdim(Howr ) = O(log n).    Proof. Suppose S = A(1) , Z(1) , . . . , A(m) , Z(m) is shatterable. This means that there exist m thresholds {r1 , . . . , rm } ⊂ R such that for each T ⊆ [m], there exists a parameter γT such that owrA(i) ,Z(i) (γT ) > ri if and only if i ∈ T .  We claim that for each sample A(i) , Z(i) , owrA(i) ,Z(i) (γ) is a piecewise constant function in γ with at most n values of γ at which it is discontinuous. If this were to be true, it means that there exists n values a1 , a2 , . . . an such that for γ within a given interval in [0, a1 ], (a1 , a2 ], . . . [an , 1] owrA(i) ,Z(i) (γ) is identical and so is the label given by the witness ri . Therefore, there are at most mn values of γ which define mn + 1 intervals such that the labels given by the witnesses for the set of m samples is identical within each interval i.e., only at most mn + 1 distinct labelings of S are achievable for any choice of the witnesses. However, since S is shatterable, we need 2m < mn + 1. Thus, s = O(log n) Now, we only need prove our claim about owrA,Z (γ) given A and γ = Z. Observe that as γ increases, owrA,Z (γ) will change only when sgn (hu0i , Zi) changes for some vi . Now, note that hu0i , Zi = hui , Z[1,...,n] i cos γ + zn+i sin γ where Z[1,...,n] is the projection of Z over the first n coordindates. Clearly, hu0i , Zi is a monotone function in γ ∈ [0, π/2] and attains zero at   hui , Z[1,...,n] i −1 γ = tan − . zn+i This implies that for each i ∈ [n], sgn (hu0i , Zi) changes at most once within [0, π/2]. Therefore, owrA,Z (γ) is a piecewise constant function with at most n discontinuities. B.2.2 A learning algorithm We now present Algorithm 6 that efficiently learns the best value of γ for outward rotation with respect to samples drawn from D × Z. 1 Pm Lemma 13. Algorithm 6 produces the value γ̂ which maximizes m i=1 owrA(i) ,Z(i) (γ) given the  (1) (1)   (m) (m) sample S = A , Z ,..., A ,Z . Algorithm 6 has running time polynomial in m and n. Proof. Recall from the proof of Theorem 14 that T defines intervals over [0, π/2] within each of which the behavior of any γ is constant across all samples in S. Therefore, we only need to examine the performance of a single value of γ within each interval to exhaustively evaluate all possibilities, and single out the best one. Also observe that since there are only O(mn) values in T (in Step 2) and since computing the binary assignment on a set of m instances for a particular value of γ takes polynomial time in m and n, Step 3 should also take only polynomial time in m and n. 31 Algorithm 6 An algorithm for finding the empirical value maximizing γ    Input: Sample S = A(1) , Z(1) , . . . , A(m) , Z(m)  (1) 1: Solve for U , . . . , U (m) the optimal SDP embeddings for A(1) , . . . , A(m) , where U (i) =   (i) (i) u1 , . . . , un .  2: Let T = γ1 , . . . , γ|T | be the set of all values γ ∈ [0, π/2] such that there exists a pair of indices   (j) hu(j) ,Z[1,...,n] i −1 = γ. i ∈ [n], j ∈ [m] with tan − (j) zn+i  1 Pm  (i) (i) . 3: Let γ̂ = argmax i=1 owrγ A , Z m γ∈T ∪{π/2} Output: γ̂ Together with Theorem 2 and Theorem 14, Lemma 13 implies the following theorem.  Theorem 15. Given an input sample of size m = O 12 log n log 1 + log 1δ drawn from (D×Z)m , Algorithm 6 (, δ)-learns the class of outward rotation algorithm with respect to the cost function −owrγ . B.3 A general analysis of RPR2 algorithms In Sections 2 and B.2, we investigated two specific classes of RPR2 algorithms. We will now present an analysis that can be applied to a wide range of classes of RPR2 algorithms including that of s-linear functions and outward rotations. In particular, we show that for most classes of “sigmoid-like” rounding functions, the pseudo-dimension of RPR2 is Θ(log n). As a first step towards this goal, we define what it means for a class of rounding functions to be “sigmoid-like” (Section B.3.1). Next, in order to both generalize and simplify the sample complexity analysis, we provide an alternative randomized procedure to RPR2 , which we call Randomized Projection Randomized Thresholding (RPRT), which produces a binary assignment rather than a fractional assignment (Section B.3.2). We prove that RPRT is equivalent to RPR2 by showing that in expectation, the assignment produced by RPRT has the same value as the assignment produced by RPR2 on an arbitrary problem instance. We work in the RPRT framework to bound the sample complexity required to (, δ)-learn the best rounding function in a fixed class for either RPR2 or RPRT. We prove this by showing that the pseudo-dimension of RPRT with a sigmoid-like rounding function is Θ(log n) (Section B.3.3). Finally, in Section B.3.4, we present an algorithm which (, δ)-learns the best rounding function in a fixed class. B.3.1 A generic class of sigmoid-like rounding functions We say that a class of functions F is “sigmoid-like” if the functions in the class are parameterized by a single constant s ∈ R+ and there exists a baseline function f1 ∈ F such that for every function fs ∈ F, fs (x) := f1 (sx). Clearly, such a representation is rich enough to encompass classes of most common sigmoid-like functions including s-linear functions or any piece-wise linear function. In order for a class of sigmoid-like functions to qualify as SDP rounding functions, we additionally require that each function is non-decreasing and has a limit of −1 as x approaches −∞, and has a limit of 1 as x approaches ∞. In particular, Definition 16. A class of real-valued functions F = {fs | s ∈ R+ } consists of sigmoid-like rounding functions if there exists a baseline function f1 (x) : R → [−1, 1] such that 1. f1 (x) is non-decreasing, 32 2. lim f1 (x) = 1 and lim f1 (x) = −1, x→∞ x→−∞ and for any function fs ∈ F, we can write fs (x) = f1 (sx). Before we define RPRT, we make the following observation about sigmoid-like functions, as it will be useful for our algorithm design and sample complexity analysis. In particular, observe that for each s, Fs (x) := fs (x)+1 is a cumulative density function associated with some probability 2 distribution. This is because Fs is non-decreasing and its limits are 0 and 1 as x tends to −∞ and +∞, respectively. We denote the probability density function associated with Fs by ps . B.3.2 Randomized Projection Randomized Thresholding RPRT differs from RPR2 primarily in that it produces a binary assignment rather than a fractional assignment. In essence, RPRT simply samples a binary assignment from the distribution over binary assignments that RPR2 effectively outputs. Like RPR2 , RPRT first projects the embedding of an IQP instance A onto a random vector Z. However, RPRT then draws a random threshold for each variable and assigns the variable to either 1 or −1 depending on whether the directed distance of the projection (multiplied by ||Z||) is less than or greater than its threshold. The distribution from which these thresholds are picked are designed to mimic RPR2 in expectation. Algorithm 7 RPRT-based SDP rounding algorithm with rounding function fs ∈ F Input: Matrix A ∈ Rn×n . 1: Solve the SDP (1) for the optimal embedding U = (u1 , . . . , un ) of A. 2: Choose a random vector Z ∈ Rn according to the n-dimensional Gaussian distribution. n 3: Draw Q = (q1 , q2 , . . . , qn ) ∼ (p1 ) where p1 is the probability density function corresponding to f1 (x). 4: For each decision variable xi , output the assignment xi = sgn (qi − shui , Zi). Output: x1 , . . . , xn . Now we show that the expected value of the binary assignment produced by RPRT is equal to that of RPR2 for a given rounding function fs . We define rprts (A, Z, Q) to be the deterministic value of the binary assignment produced by RPRT using the rounding function fs , given the values of both Z and Q. Similarly, we define rprts (A, Z) to be the expected value of the binary assignment produced by RPRT given the value of Z. In other words, rprts (A, Z) = EQ∼(p1 )n [rprts (A, Z, Q)] . Finally, we define rprts (A) to be the expected value of the binary assignment produced by RPRT and by rpr2s (A) the value of the binary assignment produced by RPR2 . In other words, rprts (A) = EQ∼(p1 )n ,Z∼Z [rprts (A, Z, Q)] and rpr2s (A) = EZ∼Z [rpr2s (A, Z)] Theorem 17. Given a MaxQP problem with input matrix A and a rounding function fs , the expected value of the binary assignment produced by RPRT equals the value of the fractional assignment produced by RPR2 , i.e. rprts (A) = rpr2s (A) . Proof. Let xi and x0i denote the binary and fractional assignments produced by RPR2 and RPRT for a given Z and Q respectively. We claim that for all i, EQ∼(p1 )n [x0i ] = xi . If we can prove this, then it implies that rprts (G, Z) = rpr2s (G, Z). To prove this, we will make use of the fact that given Z, and hence given the projection hui , Zi, x0i and x0j are independent random variables. Therefore, the expectation of x0i x0j over all random draws of Q can be written as the product of 33 their individual expected values. rprts (A, Z) = = E Q∼(p1 )n X   X  aij x0i x0j  i,j aij EQ∼(p1 )n [x0i ]EQ∼(p1 )n [x0j ] i,j = X aij xi xj = rpr2s (A, Z). i,j Once we have rprts (A, Z) = rpr2s (A, Z), it is clear that rprts (A) = rpr2s (A) as Z is sampled from the same distribution in both the algorithms. Now we only need to show that for a given Z, EQ∼(p1 )n [x0i ] = xi i.e., for a given Z, for any variable, the expected binary assignment of the randomized thresholding step is equal to the fractional assignment of RPR2 for that variable. Let us examine the expected binary assignment of RPRT for a particular variable xi . The probability that xi is assigned +1 is P rqi ∼p1 [qi < shui , Zi]. Since f1 is the cumulative density function of p1 , this is equal to f1 (shui , Zi). However, due to the way we defined fs , this value is in fact equal to fs (hui , Zi). We complete the proof by noting that fs (hui , Zi) is precisely the fractional assignment of RPR2 for the choice of the rounding function fs . Now, taking advantage of this equivalence between RPR2 and RPRT for a given class of sigmoidlike functions, we will show that any learning algorithm that (, δ)-learns the best rounding functions with respect to RPRT also (, δ)-learns the best rounding functions with respect to RPR2 . Recall from Section 2 that in the analysis for pseudo-dimension, we incorporated Z in the sample set S. In the same vein, we will now also incorporate Q sample set. In other words, we will  in(1)our (1) provide to our learning algorithm the set of samples, A , Z , Q(1) , . . . , A(m) , Z(m) , Q(m) ∼ (D × Z × (p1 )n )m . In order to prove that this indeed works, we now state Theorem 18 and Lemma 14 which parallel Theorem 2 and Lemma 12 respectively. Theorem 18. Suppose F = {fs |s > 0} is a class of sigmoid-like rounding functions. Let Hrprt = {rprts : A × Rn × Rn → [0, 1]|s > 0} and let dHrprt be the pseudo-dimension of Hrprt . Suppose  that Lrprt is an algorithm that takes as input m samples A(i) , Z(i) , Q(i) ∼ D × Z × (p1 )n , where m = O 12 (dHrprt log 1 + log 1δ ) , and returns the parameter ŝ that maximizes   1 X rprts A(i) , Z(i) , Q(i) . m m i=1 Then Lrprt (, δ)-learns the class of rounding functions F with respect to the cost function −rpr2s and is computationally efficient. The proof for Theorem 18 follows from the following Lemma that is similar to Lemma 12. Lemma 14. Suppose that m is sufficiently large to ensure that with probability at least 1 − δ over  (i) (i) (i) a draw of m samples A , Z , Q ∼ D × Z × (p1 )n , for all functions fs ∈ F,   1 X  rprts A(i) , Z(i) , Q(i) − E [rprts (A, Z, Q)] < . m 2 (A,Z,Q(i) )∼D×Z×(p1 )n i=1  1 Pm  (i) (i) (i) , and s∗ maxThen with least 1 − δ, if ŝ maximizes m i=1 rprts A , Z , Q  probability at  imizes E [rpr2s (A)] , then E [rpr2s∗ (A)] − E [rpr2ŝ (A)] < . m A∼D A∼D A∼D 34 Proof of Lemma 14. Since D × Z × (p1 )n is a product distribution, we have that E (A,Z,Q)∼D×Z×(p1 )n [rprts (A, Z, Q)] = E [rprts (A)] . A∼D But from Theorem 17 we know that rprts (A) = rpr2s (A), which implies that E [rprts (A)] = E [rpr2s (A)] . A∼D A∼D Hence, we can restate the assumption in the theorem statement as follows. With probability at least 1 − δ, for all functions fs ,   1 X  rprts A(i) , Z(i) , Q(i) − E [rpr2s (A)] < . A∼D m 2 m i=1 Since this true for ŝ and s∗ , we can say that with probability 1 − δ,   1 X  rprtŝ A(i) , Z(i) , Q(i) − E [rpr2ŝ (A)] < A∼D m 2 m i=1 and    1 X rprts∗ A(i) , Z(i) , Q(i) − E [rpr2s∗ (A)] < . A∼D m 2 m i=1 Now, by definition of ŝ we have that,     1 X 1 X rprtŝ A(i) , Z(i) , Q(i) ≤ rprts∗ A(i) , Z(i) , Q(i) . m m m m i=1 i=1 Combining the previous three inequalities, we get that E [rpr2s∗ (A)] − E [rpr2ŝ (A)] < . A∼D B.3.3 A∼D The pseudo-dimension of a general class of RPRT algorithms The main result of this section is a tight bound on the pseudo-dimension of any general class of RPRT algorithms. Theorem 19. Let Hrprt = {rprts : A × Rn × Rn → [0, 1] | s > 0}. Pdim(Hrprt ) = Θ(log n). This follows from Lemma 15 and Lemma 16 where we provide matching upper and lower bounds on Pdim(Hrprt ). Lemma 15. Pdim(Hrprt ) = O(log n).    Proof. Suppose S = A(1) , Z(1) , Q(1) , . . . , A(m) , Z(m) , Q(m) is shatterable. Then there exist m thresholds {r1 , . . . , rm } ⊂ R such that for all T ⊆ [m], there exists a parameters sT such that vals0 T A(i) , Z(i) > ri if and only if i ∈ T .  We first claim that for a given sample A(i) , Z(i) , Q(i) the domain of s i.e., (0, ∞) can be parti(i) (i) (i) (i) tioned into at most n + 1 intervals (0, a1 ], (a1 , a2 ], . . . (an , ∞) such that the binary assignment produced by RPRT on the sample is identical across all parameter settings of s within a given interval. Once this is proved, we can then consider a partition of the domain of s into at most m S (i) (i) mn + 1 intervals based on the points {a1 , . . . , an }. Now, we know that for any value of s within i=1 35 a given interval of these mn + 1 intervals, the labeling induced by the witnesses on S is the same. Therefore, there are at most mn + 1 possible labelings that can be produced by any choice of the witnesses over any set of m samples. However, since we picked a shatterable instance, it must be that 2m ≤ mn + 1 i.e., m = O(log n). Now to complete the proof, we need to examine the behavior of RPRT on a single sample  A(i) , Z(i) , Q(i) for different configurations of s. Observe that as we increase s from 0 to ∞ keeping all else constant, we expect RPRT to produce a different binary assignment only when the assigned value changes for some vertex vi . However, this happens only when qi = shg(vi ), Zi i.e., when s = qi /hg(vi ), Zi. Since there are only n vertices, and at most one value of s at which the algorithm changes behavior, we expect the algorithm to change its behavior at most n times as s increases. This proves our claim. We now prove a lower bound on the pseudo-dimension of Hrprt . Lemma 16. Pdim(Hrprt ) = Ω(log n). Proof. In order to prove that the pseudo-dimension ofHrprt is at least c log n for some constant c,  (1) (1) (i) we must devise a set of samples S = G , Z , Q , . . . , G(m) , Z(m) , Q(i) of size m = c log n that can be shattered by Hrprt . This means that we should be able to find m witnesses r1 , . . . , rm and 2m = nc s values H = {s1 , . . ., snc } such that for all T ⊆ [m], there exists sT ∈ H such that if i ∈ T , then rprtsT G(i) , Z(i) , Q(i) > ri and if i 6∈ T , then rprtsT G(i) , Z(i) , Q(i) ≤ ri . In our solution, we will use the same S as designed in the proof for Lemma 4. That is, all G(i) are identical and each consists of n/4 disjoint K4 graphs over vertices Vk = {v4k+1 , v4k+2 , v4k+3 , v4k+4 } for k = 0, 1, . . . bn/4c − 4. We will later pick Z(i) and Q(i) such that as the value of s increases, we change the cuts on V1 , V2 , . . . in that order and the change in the cuts is alternatingly better and worse. By appropriately choosing different values of Z(i) , we can carefully place the intervals in which these oscillations occur across all samples so as to be able to shatter a sample of size Ω(log n). In order to define Z(i) and Q(i) , we make use of the following increasing sequence defined i−1 recursively: c1 = 8 and ci = c2i−1 . Note that we can also write ci = 82 but we will use the 1 (i) notation ci for the sake of convenience. Let aik = ck . We will now define Z in terms of aik as i follows. For even k, we define    1 3 (i) (i) (i) (i) · aik , aik , · aik , aik Z4k+1 , Z4k+2 , Z4k+3 , Z4k+4 = 2 2 and for odd k we define,   (i) (i) (i) (i) Z4k+1 , Z4k+2 , Z4k+3 , Z4k+4 = (aik , −aik , −aik , aik ) The rationale behind choosing the above value for Z(i) will become evident as we proceed with the proof. First, by a simple calculation we can confirm that the directed distance of the projections of the vertices on Z(i) lie in certain intervals as stated below. For even k,   1  j = 4k + 1,  2 aik , 2aik    1 a , 2a  j = 4k + 2, ik ik  hg (i) (vj ), Z(i) i ∈  12  j = 4k + 3,  2 aik , 2aik   −2a , − 1 a  j = 4k + 4. ik 2 ik 36 For odd k,   1  aik , 2aik  2   −2a , − 1 a  ik (i) (i) 2 ik  hg (vj ), Z i ∈   −2aik , − 12 aik     1 a , 2a  ik 2 ik j j j j = 4k + 1, = 4k + 2, = 4k + 3, = 4k + 4. As for the choice of Q(i) , we pick the same value for all i. In particular, we choose Q(i) as follows. For even k,   (i) (i) (i) (i) Q4k+1 , Q4k+2 , Q4k+3 , Q4k+4 = (−1, +1, +1, −1) , and for odd k,   (i) (i) (i) (i) Q4k+1 , Q4k+2 , Q4k+3 , Q4k+4 = (−1, −1, −1, +1) , Again, our choiceof Q(i) will make sense as we proceed with the proof. We now analyze how  (i) (i) (i) (i) (i) (i) rprts G , Z , Q varies as a function of s. We will show that rprts G , Z , Q oscillates above and below a threshold ri , bn/4c/2 times and these oscillations are spaced in such a manner that we can pick 2m values of s that can shatter S.  First, let us examine the values of s at which we expect the behavior of rprts G(i) , Z(i) , Q(i) to change. We know that this can only consist of values of s equal to 1/hg (i) (vj ), Z(i) i for some j. Based on this fact,  we observe that for the vertices in Vk the values of s at which the cut changes lie in 12 cki , 2 · cki . Thus, note that the intervals of s in which the cut changes for V1 , V2 , . . . are spaced far apart in increasing order because 2cki < 12 ck+1 given ci > 4. i Our analysis will henceforth focus on the values of s outside these intervals. We now claim that there exists values bmax and bmin such that the value of the cut is only one of these values  in k , 2 · ck and between the above intervals. In particular, the value is equal to b between 0.5c max i i h i 0.5ck+1 , 2 · ck+1 for odd k and is equal to bmin for even k. By simple calculation, it can be verified i i that the cut (S, S c ) assigned to Vk varies as follows. For even k, ( {v4k+1 , v4k+4 } s < 0.5cki , S= {v4k+1 , v4k+2 , v4k+3 } s > 2 · cki , and for odd k, ( {v4k+1 , v4k+2 , v4k+3 } S= {v4k+1 , v4k+4 } s < 0.5cki , s > 2 · cki . Now, when the cut is defined by S = {v4k+1 , v4k+4 } is 2/3. On the other hand when S = {v4k+1 , v4k+2 , v4k+3 }, value of the cut is 1/2. Thus we can make a crucial observation here: as s  1the k crosses the interval 2 ci , 2 · cki for even k, the net value of the cut over the whole graph decreases, and for odd k it increases.  More precisely, we claim that rprts G(i) , Z(i) , Q(i) as a function of s outside these intervals takes one of two values bmin and bmax . To state these values explicitly, let us define a set of variables bk such that for even k, bk = 2/3 and for odd k, bk = 1/2. Observe that when s < 1/2, the value 1 Pbn/4c−1 bk as every odd graph contributes a value of 1/2 and every even graph of the cut is bn/4c k=0 contributes a value of 2/3 to the total cut. We will denote this value by bmax . Now when s ∈ (2, 12 ci ), 37 the value then decreases to 1 bn/4c P bn/4c−1 bk k=0  − 2/3 + 1/2 which we will call bmin . We can extend this observation as follows to any interval Ii,k = (2 · cki , 21 ck+1 ) i (   bmin s ∈ Ii,k for even k ≤ bn/4c − 1, (i) (i) (i) rprts G , Z , Q = bmax s ∈ Ii,k for odd k ≤ bn/4c − 1, Now we only need to choose ri to be (bmin + bmax )/2. To complete the proof, we need to show that the oscillations with respect to these witnesses for all the samples are spaced in a manner that we can pick 2m different s covering all possible oscillations for m = Ω(log n). This becomes clear from two observations. First, Ii,2k ∪ Ii,2k+1 ⊂ Ii+1,k because ci = 2c2i−1 . Secondly, values of s injIi,2k and kIi,2k+1 induce different labelings on the ith sample. bn/4c samples. It turns out that c2m /2 ≤ c1 . That is, Im,0 ∪ Im,1 Now consider m = log(bn/4c) 3 contains I1,0 ∪ . . . I1,bn/4c−1 . We then claim that the intervals I1,k each induce a different labeling on S with respect to the witnesses. To see why this is true, observe that since Ii,k ⊂ Ii+1,bk/2c , the labeling induced by s ∈ I1,k is defined by which terms of the sequence k1 = k, ki+1 = bki /2c are odd. This however is in fact the binary equivalent of k. Since the binary equivalent for a given k is unique, the labeling induced by I1,k is unique. Thus, we have Ω(log n) samples that can be shattered. B.3.4 A learning algorithm We now present a learning algorithm(Algorithm 8) which (, δ)-learns the best rounding function with respect to D from a class of sigmoid-like rounding functions. Algorithm 8 An algorithm for finding an empirical value maximizing rounding function fs n  o  (m) Input: Sample S = A(1) , Z(1) , Q(1) , . . . , A(m) , Z(m),Q  1: Solve for X (1) , . . . , X (m) the optimal SDP embeddings of A(1) , . . . , A(m) , where X (i) =   (i) (i) x1 , . . . , xn .  2: Let T = s1 , . . . , s|T | be the set of all values s > 0 such that there exists a pair of indices (j) (j) i ∈ [n], j ∈ [m] with hZ(j) , xi i = sqi .   1 Pm (i) (i) (i) . 3: Let ŝ = argmax i=1 rprts A , Z , Q m Output: ŝ s∈T ∪{s|T | +1} In particular, we prove the following guarantee regarding Algorithm 8’s performance.  1 Pm Lemma 17. Algorithm 2 produces the value ŝ which maximizes m rpr2s A(i) , Z(i) , Q(i) i=1    given the sample S = A(1) , Z(1) , Q(1) , . . . , A(m) , Z(m) , Q(m) . Algorithm 8 has running time polynomial in m and n. Proof. The correctness of the algorithm is evident from the proof for Lemma 15. The algorithm identifies the n values of s at which the behavior of RPRT changes and proceeds to exhaustively evaluate all the possible binary assignments which are only polynomially many. Therefore the algorithm successfully finds the best value of s in polynomial time. 38  Corollary 1. Given an input sample of size m = O 12 log n log 1 + log 1δ drawn from (D × Z × (p1 )n )m , Algorithm 8 (, δ)-learns the class of rounding functions F with respect to the cost function −rpr2s and is computationally efficient. C Proofs from Section 3 Theorem 4. For i ∈ {1, 2, 3} and a permissible value iof α for Ahi , there exists h i a distribution D (p) (p) over clustering instances V such that EV∼D ΦAi (α) (V) < EV∼D ΦAi (α0 ) (V) for all permissible values of α0 6= α for Ai . Proof. We give a general proof for all three classes A1 , A2 , and A3 . We will point out a few places in the proof where the details for b = 1, 2, 3 are different, but the general structure of the argument is the same. For each value of b, we construct a single clustering instance V = (V, d) that has the desired property; the distribution D is merely the single clustering instance with probability 1. Consider some permissible value of α, denoted α∗ . Set k = 4 and n = 210. The clustering instance consists of two well-separated ‘gadgets’ of two clusters each. The class Ab results in different 2-clusterings of the first gadget depending on whether α ≤ α∗ or not. Similarly, Ab results in different 2-clusterings of the second gadget depending on whether α ≥ α∗ or not. By ensuring that for the first gadget α ≤ α∗ results in the lowest cost 2-clustering, and for the second gadget α ≥ α∗ results in the lowest cost 2-clustering, we ensure that α = α∗ is the optimal parameter overall. The first gadget is as follows. We define five points a1 , b1 , c1 , x1 and y1 . For the sake of convenience, we will group the remaining points into four sets A1 , B1 , X1 , and Y1 each containing 25 points. We set the distances as follows: d(a1 , b1 ) = d(x1 , y1 ) = 1, d(a1 , c1 ) = 1.1, and d(b1 , c1 ) = 1.2. For a ∈ A1 ∪ B1 , d(c1 , a) = 1.51 and d(a1 , a) = d(b1 , a) = 1.6. For x ∈ X1 ∪ Y1 , d(x1 , x) = d(y1 , x) = 1.6. For a ∈ A1 , b ∈ B1 , x ∈ X1 , and y ∈ Y1 , d(a, b) = d(x, y) = 1.6. We also define special points x∗1 ∈ X1 and y1∗ ∈ Y1 , which have the same distances as the rest of the points in X1 and Y1 respectively, except that d(x1 , x∗1 ) = 1.51 and d(y1 , y1∗ ) = 1.51. If two points p and q belong to the same set (A1 , B1 , X1 , or Y1 ), then d(p, q) = 1.5. The distances d(x1 , c1 ) and d(y1 , c1 ) are defined in terms of b and α∗ , but they will always be between 1.1 and 1.2. For b = 1, we set d(x1 , c1 ) = d(y1 , c1 ) = 1.2 − .1 · α∗ . For b = 2 and b = 3, 1 ∗ ∗ d(x1 , c1 ) = d(y1 , c1 ) = ((1.1α + 1.2α )/2) α∗ . So far, all of the distances we have defined are in [1, 2], therefore they trivially satisfy the triangle inequality. We set all of the rest of the distances to be the maximum distances allowed under the triangle inequality. Therefore, the triangle inequality holds over the entire metric. Now, let us analyze the merges caused by Ab (α) for various values of α. Regardless of the values of α and b, since the distances between the first five points are the smallest, merges will occur over these initially. In particular, regardless of α and b, a1 is merged with b1 , and x1 with y1 . Next, by a simple calculation, if α ≤ α∗ , then c1 merges with a1 ∪ b1 . If α > α∗ , then c1 merges with x1 ∪ y1 . Denote the set containing a1 and b1 by A01 , and denote the set containing x1 and y1 by X10 (one of these sets will also contain c1 ). Between A01 and X10 , the minimum distance is ≥ 1.1 + 1.1 ≥ 2.2. All other subsequent merges (except for the very last merge) will involve all distances smaller than 2.2, so we never need to consider A01 merging to X10 . The next smallest distances are all 1.5, so all points in A1 will merge together, and similarly for B1 , X1 , and Y1 . At this point, the algorithm has created six sets: A01 , X10 , A1 , B1 , X1 , and Y1 . We claim that if α ≤ α∗ , A01 will merge to A1 and B1 , and X10 will merge to X1 and Y1 . This is because the maximum distance between sets in each of these merges is 1.6, whereas the minimum 39 distance between {A01 , A1 , B1 } and {X10 , X1 , Y1 } is ≥ 2.2. Therefore, for all three values of b, the claim holds true. Next we claim that the 2-clustering cost of gadget 1 will be lowest for clusters A01 ∪ A1 ∪ B1 } and X10 ∪ X1 ∪ Y1 and when c1 ∈ A01 , i.e., when α ≤ α∗ . Clearly, since the distances within A01 ∪ A1 ∪ B1 and X10 ∪ X1 ∪ Y1 are much less than the distances across these sets, the best 2clustering is A01 ∪ A1 ∪ B1 and X10 ∪ X1 ∪ Y1 (with all points at distance ≤ 1.6 to their center). We proved this will be a pruning of the tree when α ≤ α∗ . Therefore, we must argue the cost of this 2-clustering is lowest when c1 ∈ A01 . The idea is that c1 can act as a very good center for A01 ∪ A1 ∪ B1 . But if c1 ∈ X10 , then the best center for A01 ∪ A1 ∪ B1 will be an arbitrary point in A1 ∪ B1 . The cost in the first case is 1.51p · 50 + 1.1p + 1.2p . The cost in the second case is 1.5p · 24 + 1.6p · 27. For X10 ∪ X1 ∪ Y1 , the center does not change depending on α (x∗1 and y1∗ tie for the best center), so the only difference in the cost is whether or not to include c1 . If α ≤ α∗ , then the cost is 1.5p · 24 + 1.51p + 1.6p · 26, otherwise the cost is 1.5p · 24 + 1.51p + 1.6p · 26 + (1.6 + 1.2 − 0.1α∗ )p . Putting it all together, if α ≤ α∗ , the cost is 1.51p · 50 + 1.1p + 1.2p + 1.5p · 24 + 1.51p + 1.6p · 26. Otherwise the cost is 1.5p · 48 + 1.51p + 1.6p · 53 + (1.6 + 1.2 − 0.1α∗ )p . Subtracting off like terms, we conclude that the first case is always smaller because 1.51p · 49 + 1.1p + 1.2p < 1.5p · 24 + 1.6p · 26 + (1.6 + 1.2 − 0.1α∗ )p for all p ≥ 1. Next, we will construct the second gadget arbitrarily far away from the first gadget. The second gadget is very similar to the first. There are points a2 , b2 , c2 , x2 , y2 , x∗2 , y2∗ and sets to A2 , B2 , X2 , Y2 . d(a2 , b2 ) = d(x2 , y2 ) = 1, d(x2 , c2 ) = 1.1, d(y2 , c2 ) = 1.2, and for b = 1, d(a2 , c2 ) = d(b2 , c2 ) = 1 ∗ ∗ 1.2 − .1 · α∗ . For b = 2 or b = 3, d(a2 , c2 ) = d(b2 , c2 ) = ((1.1α + 1.2α )/2) α∗ . The rest of the distances are the same as in gadget 1. Then c2 joins {a2 , b2 } if α ≥ α∗ , not α ≤ α∗ . The rest of the argument is identical. So the conclusion we reach, is that the cost for the second gadget is much lower if α ≥ α∗ . Therefore, the final cost of the 4-clustering is minimized when α = α∗ , and the proof is complete. Now we will show a structural lemma for A3 , which is similar to Lemma 6. Then we will provide the full details for the proof of Lemma 6. Lemma 18. ΦA3 ,V : [0, 1] → R>0 is made up of O(n8 ) piecewise constant components. Proof. First note that for α 6= α0 , the clustering returned by A1 (α) and the associated cost are both identical to that of A1 (α0 ) if both the algorithms construct the same merge tree. Now, as we increase α from 0 to 1 and observe the run of the algorithm for each α, at what values of α do we expect A1 (α) to produce different merge trees? To answer this, suppose that at some point in the run of algorithm A1 (α), there are two pairs of subsets of V , (A, B) and (X, Y ), that could potentially merge. There exist eight points p, p0 ∈ A, q, q 0 ∈ B, x, x0 ∈ X, and y, y 0 ∈ Y such that the decision of which pair to merge depends on whether αd(p, q) + (1 − α)d(p0 , q 0 ) or αd(x, y) + (1 − α)d(x0 , y 0 ) is larger. Clearly, there is at most one value of α for which these expressions are equal, unless the difference of the expressions is zero for all α. Assuming that ties are broken arbitrarily but consistently, this implies that there is at most one α ∈ [0, 1] such that the choice of whether to merge (A, B) before (X, Y ) is identical for all α < α0 , and similarly identical for α ≥ α0 . Since each merge decision is defined by eight points, iterating over all pairs (A, B) and (X, Y ) it follows that we can identify all O(n8 ) unique 8-tuples of points which correspond to a value of α at which some decision flips. This means we can divide [0, 1] into O(n8 ) intervals over each of which the merge tree, and therefore the output of ΦA1 ,V (α), is fixed. 40 Now we will provide the details of Lemma 6. In the argument for the structure of HA3 ,Φ , we relied on the linearity of A3 ’s merge equation to prove that for any eight points, there is exactly one value of α such that αd(p, q) + (1 − α)d(p0 , q 0 ) = αd(x, y) + (1 − α)d(x0 , y 0 ). Now we will use a consequence of Rolle’s Theorem (Theorem 20) to bound the values of α such that ((d(p, q))α + d(p0 , q 0 )α )1/α = ((d(x, y))α + d(x0 , y 0 )α )1/α . P x Theorem 20 (ex. [37]). Let f be a polynomial-exponential sum of the form f (x) = N i=1 ai bi , where bi > 0, ai ∈ R, and at least one ai is non-zero. The number of roots of f is upper bounded by N . Lemma 6. ΦA1 ,V : R ∪ {−∞, ∞} → R>0 is made up of O(n8 ) piecewise constant components. Proof. As was the case for HA3 , the clustering returned by A1 (α) and the associated cost are identical to that of A1 (α0 ) as long as both algorithms construct the same merge trees. Our objective is to understand the behavior of A1 (α) over m instances. In particular, as α varies over R we want to count the number of times the algorithm outputs a different merge tree on one of these instances. For some instance V we will consider two pairs of sets A, B and X, Y that can be potentially merged. The decision to merge one pair before the other is determined by the sign of dα (p, q) + dα (p0 , q 0 ) − dα (x, y) + dα (x0 , y 0 ). This expression, as before, is determined by a set of 8 points p, p0 ∈ A, q, q 0 ∈ B, x, x0 ∈ X and y, y 0 ∈ Y chosen independent of α. Now, from Theorem 20, we have that the sign of the above expression as a function of α flips 4 times across R. Since the expression is defined by exactly 8 points, iterating over all pairs (A, B) and (X, Y ) we can list only O(n8 ) such unique expressions, each of which correspond to O(1) values of α at which the corresponding decision flips. Thus, we can divide R into O(n8 ) intervals over each of which the output of ΦA1 ,V (α) is fixed. Now we give the full details for Lemmas 7 and 8. Lemma 7. For any Φ, Pdim(HA1 , Φ) = O(log n) and Pdim(HA3 , Φ) = O(log n).  Proof. Suppose S = V (1) , . . . , V (m) is a set of clustering instances that can be shattered by HA1 using the witnesses r1 , . . . , rm . We must show that m = O(log n). For each value of α ∈ R ∪ {−∞, ∞}, V (i) , based on whether or not  the algorithm A1 (α) induces a binary labeling on each (i) (i) ΦA1 (α) V ≤ ri . From Lemma 6, we know that every sample V partitions R ∪ {∞, −∞} into 8 O(n ) intervals in this way. Merging all m partitions, we can divide R ∪ {∞, −∞} into O(mn8 ) intervals over each of which ΦA3 ,V (i) (α), and therefore the labeling induced by the witnesses, is fixed for all i ∈ [m] (similar to Figure 7). This means that HA1 can achieve only O(mn8 ) binary labelings, which is at least 2m since S is shatterable, so m = O(log n). The details for HA3 , Φ are identical, by using Lemma 18.     Lemma 8. For any objective function Φ(p) , Pdim HA1 ,Φ(p) = Ω(log n) and Pdim HA3 ,Φ(p) = Ω(log n). We first prove this lemma for the center-based objective cost denoted by Φ(p) for p ∈ [1, ∞) ∪ {∞}. We later note how this can be extended cluster purity based cost. We first prove the following useful statement which helps us construct general examples with desirable properties. In particular, the following lemma guarantees that given a sequence of values of α of size O(n), it is possible to construct an instance V such that the cost of the output of A1 (α) on V as a function of α, that (p) is ΦA1 ,V (α), oscillates above and below some threshold as α moves along the sequence of intervals (αi , αi+1 ). Given this powerful guarantee, we can then pick appropriate sequences of α and generate 41 y1 0 1 x1 0 1.41 1 xi 0 1.41 z1 yi 0 1.4 − 0.1αi 2 z1 0 zi 0 zi 1.4 1.3 yi y1 1 1 xi x1 Figure 8: The clustering instance used in Lemma 19 a sample set of Ω(log n) instances that correspond to cost functions that oscillate in a manner that helps us pick Ω(n) values of s that shatters the samples. Lemma 19. Given n ∈ N, b ∈ {1, 3}, and given a sequence of n0 ≤ bn/7c α’s such that 0 = α0 < α1 < · · · < αn0 < αn0 +1 = .7, there exists a real valued witness r > 0 and a clustering instance (p) V = (V, d), |V | = n, such that for 0 ≤ i ≤ n0 /2 − 1, ΦAb (α) (V) < r for α ∈ (α2i , α2i+1 ), and (p) ΦAb (α) (V) > r for α ∈ (α2i+1 , α2i+2 ), for k = 2. Proof. First, we focus on A3 , and we discuss A1 at the end of the proof. First of all, in order for d to be a metric, we set all distances in [1, 2] so that the triangle inequality is trivially satisfied. In particular, the following are the distances of the pairs of points within each group for 1 ≤ i ≤ (n − 2)/6. d(xi , yi ) = d(x0i , yi0 ) = 1, d(xi , zi ) = 1.3, d(yi , zi ) = 1.4, d(x0i , zi ) = d(yi0 , zi ) = 1.4 − .1 · αi , d(xi , x0i ) = d(yi , yi0 ) = 2. We set the distances to zi0 as follows (see Figure 8). d(xi , zi0 ) = d(yi , zi0 ) = d(x0i , zi0 ) = d(yi0 , zi0 ) = 1.41, d(zi , zi0 ) = 2. Then the first merges will be xi to yi and x0i to yi0 , no matter what α is set to be (when each point is a singleton set, each pair of points with the minimum distance in the metric will merge). Next, zi will either merge to Ai or A0i based on the following equation: α · 1.3 + (1 − α) · 1.4 ≶ α · (1.4 − .1 · αi ) + (1 − α)(1.4 − .1 · αi ) 42 1.4 − .1 · α ≶ 1.4 − .1 · αi =⇒ =⇒ αi ≶ α If α < αi , then zi merges to A0i , otherwise it will merge to Ai . Notice that the merge expression for Ai to A0i could be as small as α · 1.3 + (1 − α) · 2 = 2 − .7 · α, but we do not want this merge to occur. If we ensure all subsequent merges have maximum distance less than 1.5, then Ai will not merge to A0i (until A and A0 merge in the very final step) as long as α < .7, because α · 1.5 + (1 − α) · 1.5 = 1.5 < 2 − .7 · .7. These distances ensure zi0 merges after zi regardless of the value of α, since zi is closer than zi0 to xi , x0i , yi , and yi0 . Furthermore, zi0 will merge to the opposite set of zi , since we set d(zi , zi0 ) = 2. The merge expression for zi0 to merge to the opposite set is α · 1.41 + (1 − α) · 1.41, while the merge expression to the same set is ≥ α · 1.41 + (1 − α) · 2. Now we set the distances to a and a0 as follows. d(a, xi ) = d(a, yi ) = d(a0 , x0i ) = d(a0 , yi0 ) = 1.42, d(a, x0i ) = d(a, yi0 ) = d(a0 , xi ) = d(a0 , yi0 ) = 2. We also set all distances between Ai and A0j to be 2, for all i and j, and all distances between Ai and Aj to be 1.5, for all i 6= j. We will set the distances from a and a0 to zi and zi0 later, but they will all fall between 1.45 and 1.5. By construction, every set Ai will merge to the current superset containing {a}, because the merge expression is α · 1.42 + (1 − α)1.5, and any other possible merge will have value ≥ α · 1.3 + (1 − α) · 2, which is larger for α < .7. Similarly, all A0i sets will merge to {a0 }. Therefore, the final two sets in the linkage tree are A and A0 . Given 1 ≤ i ≤ (n − 2)/6, by con0 , . . . z0 0 0 struction, for α ∈ (αi , αi+1 ), {z1 , . . . , zi , zi+1 (n−2)/6 } ⊆ A and {z1 , . . . , zi , zi+1 , . . . z(n−2)/6 } ⊆ A0 . Finally, we set the distances between a, a0 , zi , and zi0 to ensure the cost function oscillates. ∀1 ≤ j ≤ (n − 2)/12, ∀i, d(a, zi0 ) = d(a0 , zi ) = 1.46 0 d(a, z2j−1 ) = d(a0 , z2j ) = 1.47, 0 and d(a, z2j ) = d(a0 , z2j+1 ) = (2 · 1.46p − 1.47p )1/p . Now we calculate cost of (A, A0 ) for α’s in different ranges. Regardless of α, all Pthe 2-clustering partitions will pay i (d(a, xi )p + d(a, yi )p + d(a0 , x0i )p + d(a0 , yi0 )p ) = (n − 2)/6 · (4 · 1.42p ),but the distances for zi and zi0 differ. For α ∈ (α0 , α1 ), all of the z’s pay 1.46p , so the cost is (n − 2)/6 · (4 · 1.42p + 2 · 1.46p ). Denote this value by rlow . When α ∈ (α1 , α2 ), the only values that change are z1 and z10 , which adds d(a, z1 ) + d(a0 , z10 ) − d(a, z10 ) − d(a0 , z1 ) = 2 · (1.47p − 1.46p ) > 0 to the cost (the inequality is always true for p ∈ [1, ∞]). Denote rlow + 2 · (1.47p − 1.46p ) by rhigh . When α ∈ (α2 , α3 ), the values of z2 and z20 change, and the cost changes by d(a, z2 ) + d(a0 , z20 ) − d(a, z20 ) − d(a0 , z2 ) = 2 · ((2 · 1.46p − 1.47p ) − 1.46p ) = −2 · (1.47p − 1.46p ), decreasing it back to rlow . P In general, the cost for α ∈ (αi , αi+1 ) is rlow + 1≤j≤i (−1)i+1 · 2(1.47p − 1.46p ) = rlow + (1.47p − 1.46p ) + (−1)i+1 · (1.47p − 1.46p ). If α ∈ (α2j , α2j+1 ), then the cost is rlow , and if α ∈ (α2j+1 , α2j+2 ), the cost is rhigh . We set r = (rlow + rhigh )/2, and conclude that the cost function oscillates above and below r as specified in the lemma statement. The pruning step will clearly pick (A, A0 ) as the optimal clustering, since the only centers with more than 3 points at distance < 1.5 are a and a0 , and (A, A0 ) are the clusters in which the most points can have a and a0 as centers. This argument proved the case where n0 = (n − 2)/6. If 43 n0 < (n − 2)/6, then we set d(a, zi ) = d(a0 , zi0 ) = 1.46 for all i > n0 , which ensures the cost function oscillates exactly n0 times. This completes the proof. It is straightforward to modify this proof to work for A1 . The only major change is to set 1 d(x0i , zi ) = d(yi0 , zi ) = ((1.3αi + 1.4αi )/2) αi . Now we can prove Lemma 8. Proof of Lemma 8. Given b ∈ {1, 2}, we prove the claim for HAb ,Φ(p) by constructing a set of samples S = {V (1) , . . . , V (m) } where m = log n − 3 that can be shattered by HAb ,Φ(p) . That is, we should be able to choose 2m = n/8 different values of α such that there exists some witnesses (p) r1 , . . . , rm with respect to which ΦAb (α) (·) induces all possible labelings on S. Choose a sequence of 2m distinct α’s arbitrarily in the range (0, .7). We will index the terms of this sequence using the notation αx for all x ∈ {0, 1}m , such that αx < αy iff x1 x2 . . . xm < y1 y2 ym . Then the α’s satisfy 0 < α[0 ... 0 0] < α[0 ... 0 1] < α[0 ... 1 0] < · · · < α[1 ... 1 1] < .7. Given x, denote by n(x) the vector corresponding to x1 x2 . . . xs + 1, therefore, αn(x) is the smallest α greater than αx . Now, the crucial step is that we will use Lemma 19 to define our examples V (1) , . . . V (m) and witnesses r1 , . . . rm so that when α ∈ (αx , αn(x) ) the labeling induced by the witnesses on S corre(p) sponds to the vector x. This means that for α ∈ (αx , αn(x) ) the cost function ΦAb (α) (V (i) ) must be greater than ri if the ith term in x is 1, and less than ri otherwise. Since there are only 2m = n8 x’s, it implies that for any sample V (i) there at most n/8 values of α at which we want its cost to flip above/below ri . We can we can accomplish this using Lemma 19 by choosing αx ’s for which V (i) is supposed to switch labels. In this manner, we pick each V (i) and ri thus creating a sample of size Ω(log n) that is shattered by HAb ,Φ(p) . Note C.1. Lemma 8 assumes that the pruning step fixes a partition, and then the optimal centers can be chosen for each cluster in the partition, but points may not switch clusters even if they are closer to the center in another cluster. This is desirable, for instance, in applications which much have a balanced partition. If it is desired that the pruning step only outputs the optimal centers, and then the clusters are determined by the Voronoi partition of the centers, we modify the proof as follows. We introduce 2n0 more points into the clustering instance: c1 , . . . , cn0 , and c01 , . . . , c0n0 . Each ci will merge to cluster A, and each c0i will merge to cluster A0 . We set the distances so that ci and c0i will be the best centers for A and A0 when α ∈ (αi , αi+1 ). The distances are also set up so that the cost of the Voronoi tiling induced by c2i and c02i is rlow , and the cost for c2i+1 and c02i+1 is rhigh . This is sufficient for the argument to go through. Furthermore, the lower bound holds even ifSthe cost function is theSsymmetric distance to the 0 0 } be the ground ground truth clustering. For this proof, let A ∪ i {z2i , z2i+1 } and A0 ∪ i {z2i+1 , z2i truth clustering. Then in each interval as α increases, the cost function switches between having (n − 2)/3 errors and having (n − 2)/3 − 2 errors. Now we restate and prove Lemma 10.   Lemma 10. For all objective functions Φ(p) , Pdim HA2 ,Φ(p) = Ω(n). 44 To prove this, we start with a helper lemma. Lemma 20. Given n, and setting N = b(n−8)/2c, then there exists a clustering instance V = (V, d) of size |V | = n and a set of 2N + 2 α’s for which α-linkage creates a unique merge tree. Proof. Here is the outline of our construction. At the start, two specific pairs of points will always merge first: pa merges with qa , and pb merges with qb . The sets {pa , qa } and {pb , qb } will stay separated until the last few merge operations. Throughout the analysis, at any point in the merging procedure, we denote the current superset containing {pa , qa } by A, and we similarly denote the superset of {pb , qb } by B. The next points to merge will come in pairs, (pi , qi ) for 1 ≤ i ≤ N . We construct the distances so that pi and qi will always merge before pj and qj , for i < j. Furthermore, for all i, {pi } will first merge to A or B, and then {qi } will merge to the opposite set as pi . Let these two merges be called ‘round i’, for 1 ≤ i ≤ N . Finally, there will be a set CA of size N + 2 which merges together and then merges to A, and similarly a set CB which merges to B. Thus, in our construction, the only freedom is whether pi merges to A or to B, for all i. This is 2N combinations total. The crux of the proof is to show there exists an α for each of these behaviors. We attack the problem as follows. In round 1, the following equation specifies whether p1 merges to A or B: 1 1 (d(pa , p1 )α + d(qa , p1 )α ) ≶ (d(pb , p1 )α + d(qb , p1 )α ) 2 2 If the LHS is smaller, then p1 merges to A, otherwise B. By carefully setting the distances, we will ensure there exists a value α0 which is the only solution to the equation in the range (1, 3). Then p1 merges to A for all α ∈ (1, α0 ), and B for all α ∈ (α0 , 3). For now, assume it is easy to force q1 to merge to the opposite set. In round 2, there are two equations: 1 (d(pa , p2 )α + d(qa , p2 )α + d(p1 , p2 )α ) ≶ 3 1 (d(pa , p2 )α + d(qa , p2 )α + d(q1 , p2 )α ) ≶ 3 1 (d(pb , p2 )α + d(qb , p2 )α + d(q1 , p2 )α ), 3 1 (d(pb , p2 )α + d(qb , p2 )α + d(p1 , p2 )α ). 3 The first equation specifies where p2 merges in the case when p1 ∈ A, and the second equation is the case when p1 ∈ B. So we must ensure there exists a specific α[−1] ∈ (1, α0 ) which solves equation 1, and α[1] ∈ (α0 , 3) which solves equation 2, and these are the only solutions in the corresponding intervals. In general, round i has 2i−1 equations corresponding to the 2i−1 possible states for the partially constructed tree. For each state, there is a specific α interval which will cause the algorithm to reach that state. We must ensure that the equation has exactly one solution in that interval. If we achieve this simultaneously for every equation, then the next round will have 2 · 2i−1 states. See Figure 9 for a schematic of the clustering instance. For 1 ≤ i ≤ N , given x ∈ {−1, 1}i−1 , let Ex denote the equation in round i which determines where pi merges, in the case where for all 1 ≤ j < i, pj merged to A if xj = −1, or B if xj = 1 (and let E 0 denote the single equation for round 1). Let αx ∈ (1, 3) denote the solution to Ex = 0. Then we need to show the α’s are well-defined and follow a specific ordering, shown in Figure 10. This ordering is completely specified by two conditions: (1) α[x −1] < α[x] < α[x 1] and (2) S α[x −1 y] < α[x 1 z] for all x, y, z ∈ i<N {−1, 1}i and |y| = |z|. Now we show how to set up the distances to achieve all of these properties. To enhance readability, we start with an example for n = 10, and then move to the general construction. 45 qb pb 1 ≈ 1.151 ≈ 1.151 p1 2 pi q1 qi pN qN 1.2 All distances here ≈ 1.5 1.1 1 qa pa Figure 9: The clustering instance used in Lemma 10 α0 p1 q1 α[−1] p2 q2 α[−1 −1] α[−1 −1] α[1] p2 α[−1 1] α[−1] α[−1 1] q2 α[1 −1] α0 α[1 −1] α[1 1] α[1] α[1 1] Figure 10: A schematic for the α intervals. Each edge denotes whether to merge pi to A or qi to A. 46 We give the construction round by round. All distances are in [1, 2] which ensures the triangle inequality is always satisfied. Set d(pa , qa ) = d(pb , qb ) = 1, and set all pairwise distances between {pa , qa } and {pb , qb } to 2. We also set d(pi , qi ) = 2 for all i 6= j. Here are the distances for the first round. d(pa , p1 ) = d(pa , q1 ) = 1.1, d(qa , p1 ) = d(qa , q1 ) = 1.2, p d(pb , p1 ) = d(pb , q1 ) = d(qb , p1 ) = d(qb , q1 ) = (1.12 + 1.22 )/2 ≈ 1.151. Say we break ties by lexicographic order. Then p1 will merge first, and E 0 is the following. 1 1 (1.1α + 1.2α ) ≶ (1.151α + 1.151α ). 2 2 The unique solution in (1, 3) is α0 = 2. p1 merges to A for α ∈ (1, 2), and B for α ∈ (2, 3). The merge equations for q1 are 1 (1.1α + 1.2α + 2α ) ≶ 3 1 (1.1α + 1.2α ) ≶ 2 1 (1.151α + 1.151α ) if p1 ∈ A, or 2 1 (1.151α + 1.151α + 2α ) otherwise. 3 As long as α ∈ (1, 3), q1 will merge to the opposite cluster as p1 . This is because we set d(p1 , q1 ) to be significantly larger than the other relevant distances. We set the round two distances as follows. d(pa , p2 ) = d(pa , q2 ) = 1.1, d(qa , p2 ) = d(qa , q2 ) = 1.2, p d(pb , p2 ) = d(pb , q2 ) = d(qb , p2 ) = d(qb , q2 ) = (1.12 + 1.22 )/2 ≈ 1.151, d(p1 , p2 ) = d(p1 , q2 ) = 1.5 + 10−4 , d(q1 , p2 ) = d(q1 , q2 ) = 1.5 − 10−4 . Note the distances from {pa , qa , pb , qb } are the same to p1 as to p2 . Since we break ties lexicographically, this ensures p2 and q2 merge in round 2. Alternatively, we can add tiny perturbations to the distances such that they do not affect our analysis, but ensure the correct merge orders regardless of the tiebreaking rule. The values were picked so that the pa , qa , pb , qb distances will have the most influence in the merge equations. If it were just these four distances, then the value of α at equality would be 2 again. But in this round, the p1 and q1 distances show up in the equation. We set d(p1 , p2 ), d(q1 , p2 ) ≈ 1.5 but with small ‘offsets’ so that the values of α are on either side of α0 = 2. Equations E[−1] and E[1] are the following. 1 1 (1.1α + 1.2α + 1.5001α = (2 · 1.151α + 1.4999α ), 3 3 1 1 (1.1α + 1.2α + 1.4999α ) = (2 · 1.151α + 1.5001α ). 3 3 Then α[−1] ≈ 1.884 and α[1] ≈ 2.124. As in the previous round, it is straightforward to check all four merge equations for q2 send q2 to the opposite cluster as p2 , as long as α < 3. So far, our four intervals of α which lead to distinct behavior are (1, 1.884), (1.884, 2), (2, 2.124), and (2.124, 3). 47 Now we specify the distances for the third round, the final round in our example. Again, we set the distances from {pa , qa , pb , qb } the same way as in previous rounds. The new distances are as follows. d(p1 , p3 ) = d(p1 , q3 ) = 1.5 + 10−4 , d(q1 , p3 ) = d(q1 , q3 ) = 1.5 + 10−4 , d(p2 , p3 ) = d(p2 , q3 ) = 1.5 + 10−6 , d(q2 , p3 ) = d(q2 , q3 ) = 1.5 − 10−6 . Again, if it were just the first four points, the value of α would be 2. The distances for {p1 , q1 } differ by a small offset, and the distances for {p2 , q2 } differ by an even smaller offset, which causes the latter distances to have less influence in the merge equations. This forces the α’s into the correct intervals. In general, the offset value will decrease in higher and higher rounds. The equations E[−1 −1] , E[−1 1] , E[1 −1] , and E[1 1] are as follows: 1 (1.1α + 1.2α + (1.5 + 10−4 )α + (1.5 + 10−6 )α ) = 4 1 (1.1α + 1.2α + (1.5 + 10−4 )α + (1.5 − 10−6 )α ) = 4 1 (1.1α + 1.2α + (1.5 − 10−4 )α + (1.5 + 10−6 )α ) = 4 1 (1.1α + 1.2α + (1.5 − 10−4 )α + (1.5 − 10−6 )α ) = 4 1 (2 · 1.151α + (1.5 − 10−4 )α + (1.5 − 10−6 )α ), 4 1 (2 · 1.151α + (1.5 − 10−4 )α + (1.5 + 10−6 )α ), 4 1 (2 · 1.151α + (1.5 + 10−4 )α + (1.5 − 10−6 )α ), 4 1 (2 · 1.151α + (1.5 + 10−4 )α + (1.5 + 10−6 )α ). 4 Solving for the α’s, we obtain α[−1 −1] ≈ 1.882, α[−1 1] ≈ 1.885, α[1 −1] ≈ 2.123, α[1 1] ≈ 2.125. Furthermore, solving the equations for q3 , we find that it will merge to the opposite cluster for α < 3. Therefore, we have 8 different ranges corresponding to the 8 equations. This example suggests a general argument by induction which follows the same intuition. In each round, the new distances have less and less influence in the merge equations, ensuring the α’s stay in the correct ranges to double the number of behaviors. In our argument, we will utilize the following fact (true by elementary calculus). Fact 1. For all 0 ≤ z ≤ .01 and α ∈ (1, 3), the following are true about g(z, α) = (1.5 − z)α − α (1.5 + z)α and h(z, α) = (1.1 − z)α + (1.1 + z)α − 2 · (((1.1 − z)α + (1.1 + z)α )/2) 2 . 1. For z > 0, g(z, α) < 0, 2. for a fixed z, g is nonincreasing in α, 3. for a fixed α, g is nonincreasing in z, 4. h(0, α) = 0 and h is nondecreasing in z. Here are the details for the general construction. All distances will be between 1 and 2 so that the triangle inequality is satisfied. Given N , for all i, d(pa , qa ) = d(pb , qb ) = 1, d(pa , qa ) = d(pa , qb ) = d(pb , qa ) = d(pb , qb ) = 2, ∀i ≤ N, d(pa , pi ) = d(pa , qi ) = 1.1 − q, d(qa , pi ) = d(qa , qi ) = 1.1 + q, r 1 d(pb , pi ) = d(pb , qi ) = d(qb , pi ) = d(qb , qi ) = ((1.1 − q)2 + (1.1 + q)2 ), 2 d(pi , qi ) = 2, ∀1 ≤ j < i ≤ N, d(pi , pj ) = d(pi , qj ) = 1.5 + oj d(qi , pj ) = d(qi , qj ) = 1.5 − oj . 48 where q and oj are offset values in (0, .01) which we will specify later. Then for α ∈ (1, 3), the following are true. • The first two merges are pa to qa and pb to qb , • {pi } and {qi } will always prefer merging to A or B instead of merging to another singleton {pj } or {qj }. After the first two merges occur, all pi and qi are tied to first merge to A or B. For convenience, we specify the tiebreaking order as {p1 , q1 , . . . , pN , qN }. Alternatively, at the end we can make tiny perturbations to the distances so that tiebreaking does not occur. Next, we choose the value for q, which must be small enough to ensure that qi always merges to the opposite cluster as pi . Consider ! X N +2 h(α, q, o1 , . . . , oN , x) = (1.1 + q)α + (1.1 − q)α + xi (1.5 + oi )α + 1.5α N +3 i<N X α 2 2 − 2 · (((1.1 + q) + (1.1 − q) )/2) 2 − xi (1.5 + oi )α . i<N If this equation is positive for all x ∈ {−1, 1}N −1 , then qN will always merge to the opposite cluster as pN (and qi will always merge to the opposite cluster as pi , which we can similarly show by setting oj = 0 in h for all j > i). Note h(α, 0, 0, . . . , 0, x) = N +2 (2 · 1.1α + (N + 1) · 1.5α ) − 2 · 1.1α − N · 1.5α > 0 N +3 for all x and all α ∈ (1, 3). Fact 1 implies there exists a 0 < q ∗ < .01 such that h(α, q, 0, . . . , 0, x) stays positive. Similarly, there exists a cutoff value δ > 0 such that for all 0 < o1 , . . . , oN < δ, α ∈ (1, 3), and x ∈ {−1, 1}N −1 , h(α, q ∗ , o1 , . . . , ok , x) > 0. Therefore, as long as we set all the offsets oi less than δ, the merges will be as follows: 1. pa merges to qa and pb merges to qb . 2. For 1 . . . , N , pi merges to A or B, and qi merges to the opposite cluster. Then qN will always merge to the opposite cluster as pN . N Now S we showi that there are 2 intervals for α ∈ (1, 3) which give unique behavior. Recall for x ∈ i<N {−1, 1} , Ex is defined as X α 1 (1.1 − q ∗ )α + (1.1 + q ∗ )α − 2 · ( ((1.1 − q ∗ )2 + (1.1 + q ∗ )2 )) 2 + xi ((1.5 − oi )α − (1.5 + oi )α ). 2 i<N For brevity, we denote 1 1 d = ( ((1.1 − q ∗ )2 + (1.1 + q ∗ )2 )) 2 . 2 We show the αs are correctly ordered by proving the following three statements with induction. The first statement is sufficient to order the αs, and the second two will help to prove S the first. i 1. There exist 0 < o1 , . . . , oN < δ such that if we solve Ex = 0 for αx for all x ∈ i<N {−1, 1} , then the α’s satisfy α[x −1] < α[x] < α[x 1] and for all i < N , α[x 1] < α[y −1] for x, y ∈ {−1, 1}i and x1 . . . xi < y1 . . . yi . 2. For all k 0 ≤ N and α ∈ (1, 3), X (1.5 + ok0 )α − (1.5 − ok0 )α + ((1.5 − oi )α − (1.5 + oi )α ) > 0. k0 <i<N 49 3. X (1.1 − q ∗ )3 + (1.1 + q ∗ )3 − 2 · d3 + ∗ ∗ (1.1 − q ) + (1.1 + q ) − 2 · d + i<N X i<N ((1.5 − oi )3 − (1.5 + oi )3 ) > 0, and ((1.5 + oi ) − (1.5 − oi )) < 0. We proved the base case in our earlier example for n = 10. Assume for k ≤ N , there exist 0 < o1 , . . . , ok < δ which satisfy the three properties. We first prove the inductive step for the second and third statements. By inductive hypothesis, we know for all k 0 ≤ k and α ∈ (1, 3), X (1.5 + ok0 )α − (1.5 − ok0 )α + ((1.5 − oi )α − (1.5 + oi )α ) > 0, k0 <i≤k Since there are finite integral values of k 0 ≤ k, and the expression is > 0 for all values of k 0 , then there exists an  > 0 such that the expression is ≥  for all values of k 0 . Then we define za such that (1.5 + za )α − (1.5 − za )α < 2 for α ∈ (1, 3). Then for all 0 < z < za , k 0 ≤ k + 1, and α ∈ (1, 3), (1.5 + ok0 )α − (1.5 − ok0 )α + X ((1.5 − oi )α − (1.5 + oi )α ) > 0. k0 <i≤k+1 So as long as we set 0 < ok+1 < za , the inductive step of the second property will be fulfilled. Now we move to the third property. We have the following from the inductive hypothesis: X (1.1 − q ∗ )3 + (1.1 + q ∗ )3 − 2 · d3 + ((1.5 − oi )3 − (1.5 + oi )3 ) > 0, i≤k0 (1.1 − q ∗ ) + (1.1 + q ∗ ) − 2 · d + X i≤k0 ((1.5 + oi ) − (1.5 − oi )) < 0. We may similarly find zb such that for all 0 < ok+1 < zb , (1.1 − q ∗ )3 + (1.1 + q ∗ )3 − 2 · d3 + ∗ ∗ X ((1.5 − oi )3 − (1.5 + oi )3 ) > 0, i≤k+1 (1.1 − q ) + (1.1 + q ) − 2 · d + X ((1.5 + oi ) − (1.5 − oi )) < 0. i≤k+1 Now we move to proving the inductive step of the first property. Given x ∈ {−1, 1}k , let p(x), n(x) ∈ {−1, 1}k denote the vectors which sit on either side of αx in the ordering, i.e., αx is the only αy in the range (αp(x) , αn(x) ) such that |y| = k. If x = [1 . . . 1], then set αn(x) = 3, and if x = [0 . . . 0], set αp(x) = 1. Define f (α, x, z) = Ex + (1.5 − z)α − (1.5 + z)α . By inductive hypothesis, we have that f (αx , x, 0) = 0. We must show there exists zx such that for all 0 ≤ z ≤ zx , f (αx , x, z) < 0 and f (αn(x) , x, z) > 0. This will imply that if we choose 0 < ok+1 < zx , then α[x 1] ∈ (αx , αn(x) ). 50 Case 1: x 6= [1 . . . 1]. Since f (αx , x, 0) = 0, and by Fact 1, then for all 0 < z < .01, f (αx , x, z) < 0. Now denote i∗ as the greatest index such that xi∗ = −1. Then n(x) = [x1 . . . xi∗ −1 1 − 1 · · · − 1]. By statement 1 of the inductive hypothesis (αn(x) is a root of En(x) = 0), (1.1 − q ∗ )αn(x) + (1.1 + q ∗ )αn(x) − 2 · dαn(x) + X (n(x)i (1.5 − oi )αn(x) − n(x)i (1.5 + oi )αn(x) ) = 0 i≤k From statement 2 of the inductive hypothesis, we know that X (1.5 − oi∗ )αn(x) − (1.5 + oi∗ )αn(x) + ((1.5 + oi )αn(x) − (1.5 − oi )αn(x) ) < 0. i∗ <i≤k It follows that (1.1 − q ∗ )αn(x) + (1.1 + q ∗ )αn(x) − 2 · dαn(x) + X i<i∗ (n(x)i (1.5 − oi )αn(x) − n(x)i (1.5 + oi )αn(x) ) > 0, and furthermore, (1.1 − q ∗ )αn(x) + (1.1 + q ∗ )αn(x) − 2 · dαn(x) + X i<i∗ (xi (1.5 − oi )αn(x) − xi (1.5 + oi )αn(x) ) > 0. Therefore, f (αn(x) , 0) > 0, so denote f (αn(x) , 0) =  > 0. Then because of Fact 1, there exists zx such that ∀0 < z < zx , f (αn(x) , z) > 0. Case 2: x = [1 . . . 1]. Since f (αx , 0) = 0, and by Fact 1, then for all 0 < z < .01, f (αx , z) < 0. By property 3 of the inductive hypothesis, we have X (1.1 − q ∗ )3 + (1.1 + q ∗ )3 − 2 · d3 + ((1.5 − oi )3 − (1.5 + oi )3 ) > 0, i≤k so say this expression is equal to some  > 0. Then from Fact 1, there exists zx such that for all 0 < z < zx , 0 < (1.5 + z)3 − (1.5 − z)3 < 2 . Combining these, we have f (3, z) > 0 for all 0 < z < zx . To recap, in both cases we showed there exists zx such that for all 0 < z < min(.01, zx ), f (αx , z) < 0 and f (αn(x) , z) > 0. We may perform a similar analysis on a related function f 0 , defined as f 0 (α, x, z) = Ex + (1.5 + z)α − (1.5 − z)α to show there exists zx0 such that for all 0 < z < zx0 , f 0 (αp(x) , z) < 0 and f 0 (αx , z) > 0. We perform this analysis over all x ∈ {−1, 1}k . Finally, we set ok+1 = minx (zx , zx0 , za , zb , .01). Given x ∈ {−1, 1}k , since f (αx , ok+1 ) < 0 and f (αn(x) , ok+1 ) > 0, there must exist a root α[x 1] ∈ (αx , αn(x) ) (and by Fact 1, the function is monotone in α in the short interval (αx , αn(x) ), so there is exactly one root). Similarly, there must exist a root α[x −1] ∈ (αp(x) , αx ). Then we have shown α[x −1] and α[x 1] are roots of E[x −1] and E[x 1] , respectively. By construction, α[x −1] < αx < α[x 1] , so condition 1 is satisfied. Now we need to show condition 2 is satisfied. Given x, y ∈ {−1, 1}k , let k 0 be the largest number for which xi = yi , ∀i ≤ k 0 . Let z = x[1...k0 ] = y[1...k0 ] . Then by the inductive hypothesis, αx < αn(x) ≤ αz ≤ αp(y) < αy . It follows that α[x −1] < α[x 1] < αz < α[y proving condition 2. This completes the induction. 51 −1] < α[y 1] , Now we are ready to prove Lemma 10. Proof of Lemma 10. Given n, and setting N = b(n − 8)/4c, we will show there exists a clustering instance (V, d) of size |V | = n, a witness r, and a set of 2N + 2 α’s 1 = α0 < α1 < · · · < α2N < (p) α2N +1 = 3, such that ΦA3 (α) (V) oscillates above and below r between each interval (αi , αi+1 ). We start by using the construction from Lemma 10, which gives a clustering instance with 2N + 8 points and 2N + 2 values of α for which α-linkage creates a unique merge tree. The next part is to add 2N more points and define a witness r so that the cost function alternates above and below r along each neighboring α interval, for a total of 2N oscillations. Finally, we will finish off the proof in a manner similar to Lemma 8. Starting with the clustering instance (V, d) from Lemma 10, we add two sets of points, CA and CB , which do not interfere with the previous merges, and ensure the cost functions alternates. Let CA = {ca , c0a , a1 , a2 , . . . , aN } and CB = {cb , c0b , b1 , b2 , . . . , bN }. All distances between two points in CA are 1, and similarly for CB . All distances between a point in CA and a point in CB are 2. The distances between CA ∪ CB and A ∪ B are as follows (we defined the sets A and B in Lemma 10). d(pa , ca ) = d(pa , c0a ) = d(qa , ca ) = d(qa , c0a ) = 1.51, d(pb , cb ) = d(pb , c0b ) = d(qb , cb ) = d(qb , c0b ) = 1.51, d(pa , cb ) = d(pa , c0b ) = d(qa , cb ) = d(qa , c0b ) = 2, d(pb , ca ) = d(pb , c0a ) = d(qb , ca ) = d(qb , c0a ) = 2, d(pa , c) = d(qa , c) = d(pb , c) = d(qb , c) = 2 ∀c ∈ CA ∪ CB \ {ca , c0a , cb , c0b }, d(c, pi ) = d(c, qi ) = 1.51 ∀1 ≤ i ≤ N − 1 and c ∈ CA ∪ CB . We will specify the distances between {ca , c0a , cb , c0b } and {pN , qN } soon, but they will be in [1.6, 2]. So at the start of the merge procedure, all points in CA merge together, and all points in CB merge together. Then all merges from Lemma 10 take place, because all relevant distances are smaller than 1.51. We end up with four sets: A, B, CA , and CB . The pairs (A, B) and (CA , CB ) are dominated by distances of length 2, so the merges (CA , A) and (CB , B) will occur, which dominate (CA , B) and (CB , A) because of the distances between {pa , qa , pb , qb } and {ca , c0a , cb , c0b }. The final merge to occur will be (CA ∪ A, CB ∪ B), however, the 2-median pruning step will clearly pick the 2-clustering CA ∪ A, CB ∪ B, since no other clustering in the tree has almost all distances ≤ 1.51. Then by construction, ca or c0a will be the best center for CA ∪ A, which beat pa and qa because 1.51 · (2N ) < 1.1 · N + 2 · N = 1.55 · (2N ). Similarly, cb or c0b will be the best center for CB ∪ B. Note that centers {ca , c0a } and {cb , c0b } currently give equivalent 2-median costs. Denote this cost by r0 (i.e., the cost before we set the distances to pN and qN ). Now we set the final distances as follows. d(ca , pN ) = d(cb , qN ) = 1.6, d(c0a , pN ) = d(c0b , qN ) = 1.7, d(c0a , qN ) = d(c0b , pN ) = 1.8, d(ca , qN ) = d(cb , pN ) = 1.9. If pN ∈ A and qN ∈ B, then ca and cb will be the best centers, achieving cost r0 + 3.2 for (CA ∪ A, CB ∪ B). If pN ∈ B and qN ∈ A, then c0a and c0b will be the best centers, achieving cost r0 + 3.6 for (CA ∪ A, CB ∪ B). 52 The distances are also constructed so that in the variant where the pruning outputs the optimal centers, and then all points are allowed to move to their closest center, the cost still oscillates. First note that no points other than pN and qN are affected, since d(ca , pi ) = d(ca , qi ) for i < N , and similarly for cb . Then pN will move to the cluster with ca or c0a , and qN will move to the cluster with cb or c0b . If pN was originally in A, then the cost is r0 + 3.2, otherwise the cost is r0 + 3.4. In either scenario, we set r = r0 + 3.3. Then we have ensured for all x ∈ {−1, 1}N −1 , the cost for α ∈ (αp(x) , αx ) is < r, and the cost for α ∈ (αx , αn(x) ) is > r. We have finished our construction of a clustering instance whose cost function alternates 2N times as α increases. To finish the proof, we will show there exists a set S = {V1 , . . . , Vs } of size s = N = b(n − 8)/4c ∈ Ω(n) that is shattered by A. Such a set has 2N orderings total. For V1 , we use the construction which alternates 2N times. For V2 , we use the same construction, but we eliminate (pN , qN ) so that there are only N − 1 rounds (the extra two points can be added to CA and CB to preserve |V2 | = n). Then V2 ’s cost will alternate 12 · 2N times, between the intervals (αp(x) , αx ) and (αx , αn(x) ), for x ∈ {−1, 1}N −2 . So V2 oscillates every other time V1 oscillates, as α N increases. In general, Vi will be the construction with only N − i + 1 rounds, oscillating 2 2i−1 times, and each oscillation occurs every other time Vi−1 oscillates. This ensures for every x ∈ {−1, 1}N −1 , (αp(x) , αx ) and (αx , αn(x) ) will have unique labelings, for a total of 2N labelings. This completes the proof. Note C.2. As in Lemma 8, this lower bound holds even if the cost function is the symmetric distance to the ground truth clustering. Merely let pN and qN belong to different ground truth clusters, but for all i < N , pi and qi belong to the same ground truth cluster. Since in each adjacent α interval, pN and qN switch clusters, this shows the symmetric distance to the ground truth clustering oscillates between every interval. Now we give an ERM algorithm for A2 , similar to Algorithm 4. Algorithm 9 An algorithm for finding an empirical cost minimizing algorithm in A2  Input: Sample S = V (1) , . . . , V (m) .  1: Let T = ∅. For each sample V (i) = V (i) , d(i) ∈ S, and for all A, B, X, Y ⊆ V (i) , solve for α (if a solution exists) in the following equation and add the solutions to T : 1 |A||B| X (d(p, q))α = p∈A,q∈B 1 |X||Y | X (d(x, y))α . x∈X,y∈Y Order the elements of set T ∪ {−∞, +∞} as α1 < . . . < α|T | . For each 0 ≤ i ≤ |T |, pick an arbitrary α in the interval (αi , αi+1 ) and run A2 (α) on P all clustering instances in S to compute P Φ (V). Let α̂ be the value which minimizes V∈S ΦA2 (α) (V). V∈S A2 (α) Output: α̂ 2: Theorem 21. Let Φ be a clustering objective and let Ψ be a pruning function. Given an input   H 2 1 sample of size m = O n + log δ , Algorithm 9 (, δ)-learns the class A2 × {Ψ} with respect  to the cost function Φ. Proof. The sample complexity analysis follows the same logic as the proof of Theorem 6. To prove that Algorithm 9 indeed finds the empirically best α, recall from the pseudo-dimension analysis that the cost as a function of α for any instance is a piecewise constant function with 53 O(n2 32n ) discontinuities. In Step 1 of Algorithm 9, we solve for the values of α at which the 2 2n discontinuities occur and add them to the set PT . T therefore partitions α’s range into O(mn 3 ) subintervals. Within each of these intervals, V∈S ΦA2 (α) (V) is a constant function. Therefore, we pick any arbitrary α within each interval to evaluate the empirical cost over all samples, and find the empirically best α. C.1 Restricted classes of clustering instances Below we consider restricted classes of clustering instances and improve on the pseudo-dimension bounds of HA2 as compared to Lemma 9. In particular, we consider the class Vβ that consists of clustering instances in which the distances take one of at most β (β ∈ N) real values. A natural example would be one in which all distances are integers and are less than some value H. Here, β = H. For this case, we show a tight bound. Theorem 22. For any objective function Φ, let  HA2 ,Φ = ΦA2 (α) : Vβ → R≥0 | α ∈ R ∪ {∞, −∞} . Then Pdim(HA2 , Φ) = O (min(β log n, n)). Proof. The proof for the upper bound follows a similar line of reasoning as that of Lemma 9. For a particular instance V, let {d1 , d2 , . . . , dβ } denote the set of β values that its distances can take. The Pβ 1 α linkage criterion for merging A, B can be expressed as |A||B| i=1 ai di where, each ai can take one of at most O(n2 ) values corresponding to the number of pairs of points at a distance di . Therefore, iterating over allpairs of subsets (A, B) like we did in the proof of Lemma 9, we can only list at most O (n2 )β+1 potential linkage criteria. Therefore, the set of all pairs of subsets (A, B) and  (X, Y ) will induce at most O (n2 )2(β+1) unique comparisons between two linkage criteria. By the same argument as in the proof of Lemma 9, since each such comparison has O(n2 ) roots, if S ∈ Vm is a shatterable set, then 2m ≤ n2 ((n2 )2(β+1) ), which means that m = O(β log n). Theorem 23. For any objective function Φ(p) , Pdim(HA2 ,Φ(p) ) = Ω (min(β, n)). Proof. For the lower bound, we use a similar line of reasoning as in Lemma 10. In each round of the construction in Lemma 10, only a constant number of distinct edge lengths are added. I.e. the offsets oi define new distances 1.5 + oi and 1.5 − oi per round, but the set of the rest of the distances has constant size. Therefore, we can easily modify the proof to construct a clustering instance with Ω(m) rounds using m distinct distances. This instance will have 2Ω(β) distinct behaviors depending on α, however this reasoning is only consistent for β = o(n). For β = Ω(n), we may inherit the lower bound from Lemma 10, so the final pseudo-dimension lower bound is Ω (min(β, n)). C.2 An Interpolation So far, the linkage criteria have been based on the distances between either two pairs of points (A1 and A3 ), or every single pair between two sets considered for merging (A2 ). Now we provide an interpolation between these two extremes. In particular, we define a linkage criterion which uses σ different distances between the sets for comparison. In particular, for any two sets A and B, we define an abstract rule to pick σ pairs of points (pi , qi ) from A × B. For example, a natural choice would be to pick the (σ − 1)-th quantiles of the set of distances between points in A and B along with the maximum and minimum distances. On picking these points, we define the criterion as a function of these σ distances as follows. 54 A1,σ = A2,σ = ( σ X i=1 αi d(pi , qi ) | α = (α1 , . . . , ασ ) ∈ Rσ  σ  X  d(p, q))α i=1 !1/α ) | α ∈ R ∪ {∞, −∞} ,    (3) . (4) Observe that A1,σ has multiple parameters unlike any of the classes of algorithms we have discussed. Therefore, the analysis for A1,σ is considerably different from the rest as shown below. We use notations similar to the previous sections. Theorem 24. For any Φ, let  HA1,σ ,Φ = ΦA1,σ (α) : V → R≥0 | α ∈ Rσ . The pseudo-dimension of Pdim(HA1,σ ,Φ ) = O(σ 2 log n). Proof. The proof parallels that of Lemma 7. Consider two pairs of sets A, B and X, Y that can be potentially merged. Regardless of the parameters chosen, we know that the linkage criterion first chooses σ pairs of points (pi , qi ) ∈ A × B and (xi , yi ) ∈P X × Y . Now, theP decision to merge A, B before X, Y or vice versa is determined by the sign of σi=1 αi d(pi , qi ) − σi=1 αi d(xi , yi ). If this expression evaluates to zero, we will break ties arbitrarily but consistently. Observe that for a given set of values for d(pi , qi ) and d(xi , yi ), the above expression is either 0 for all α, or is equal to zero for the hyperplane passing through the origin and normal to (d(p1 , q1 ) − d(x1 , y1 ), . . . , d(pσ , qσ ) − d(xσ , yσ )) in the parameter space Rσ . This hyperplane divides the parameter space into two half-spaces each of which correspond to merging one pair of sets before the other. Next we note that, for a given  problem instance, as we iterate over all pairs of sets (A, B) and (X, Y ), we can list only O n4σ possible choices for the hyperplane as there are only so many 4σ-tuples of points pi , qi , xi , yi . Thus, for m problem instances, we can list at most O mn4σ different hyperplanes in Rσ . These hyperplanes, can partition the parameter space into at most σ  4σ O mn regions such that all the parameter settings in a given region correspond to identical merge trees and hence identical costs/labeling induced by the witnesses. By an argument similar to the proof of Lemma 7, we can conclude that m = O(σ 2 log n). Theorem 25. For any Φ, let  HA2,σ ,Φ = ΦA2,σ (α) : V → R | α ∈ R≥0 ∪ {∞, −∞ . Then Pdim(HA2,σ ) = O (min(σ log n, n)). Proof. This proof follows the same reasoning as in Lemma 9. The decision of whether to merge any two pairs of sets Pσ(A, αB) and (X, PYσ ), isαdetermined by the sign of the difference in their linkage criterion which is i=1 d (pi , qi ) − i=1 d (xi , yi ) where the points pi , qi , xi , yi are fixed for a given pairs of set. We know from Theorem 20 that this expression has only O(n2 ) roots. Furthermore, as we iterate over all pairs of sets (A, B) and (X, Y ), we can only generate as many such expressions as there are 4σ-tuples of points pi , qi , xi , yi . In particular, we will list only O(n4σ ) such expression each with O(n2 ) roots. In summary, similar to the proof of Lemma 9, we can argue that for a set of samples in V m to be shattered, we need that 2m ≤ n4σ · n2 i.e., m = O(σ log n). 55 Theorem 26. For any Φ(p) Pdim(HA2,σ ,Φ(p) ) = Ω(σ). Proof. We use a similar line of reasoning as in Lemma 10. In round i of the construction in Lemma 10, the merges were between a set of size 1 and a set of size i + 2. Therefore, we can easily modify the proof to construct a clustering instance with Ω(σ) rounds, and the merge equations will be the same as in Lemma 10. This instance will have 2Ω(σ) distinct behaviors depending on α, and so the pseudo-dimension is Ω(σ). Algorithm Class Linkage rule Pseudodimension Runtime of Learning Algorithm A1 Θ(log n) Õ(n8 talg ) Θ(n) Õ(n2 32n talg ) A3 minp∈A,q∈B (d(p, q))α + α maxp∈A,q∈B (d(p, q)) for α ∈ R P 1 α p∈A,q∈B d(A, B) for α ∈ R |A||B| α minp∈A, q∈B d(p, q) + (1 − α) maxp∈A, q∈B d(p, q) for α ∈ (0, 1) Θ(log n) Õ(n8 talg ) A2 with β unique distances Pσ i=1 αi d(pi , qi ) for αi ∈ R Pσ α i=1 d(pi , qi ) for αi ∈ R Θ̃(min(β, n)) Õ(n4(β+1) talg ) A2 A1,σ A2,σ O(σ 2 log n) Θ̃(σ) Õ(n2σ+2 talg ) Table 2: The different classes of algorithms and their corresponding linkage rule, pseudo-dimension, and runtime. talg denotes the runtime of the α-linkage algorithm for an arbitrary linkage rule. 56
8cs.DS
arXiv:1711.06735v1 [math.GR] 17 Nov 2017 ENDOMORPHISMS OF REGULAR ROOTED TREES INDUCED BY THE ACTION OF POLYNOMIALS ON THE RING Zd OF d-ADIC INTEGERS ELSAYED AHMED AND DMYTRO SAVCHUK Abstract. We show that every polynomial in Z[x] defines an endomorphism of the dary rooted tree induced by its action on the ring Zd of d-adic integers. The sections of this endomorphism also turn out to be induced by polynomials in Z[x] of the same degree. In the case of permutational polynomials acting on Zd by bijections the induced endomorphisms are automorphisms of the tree. In the case of Z2 such polynomials were completely characterized by Rivest in [Riv01]. As our main application we utilize the result of Rivest to derive the condition on the coefficients of a permutational polynomial f (x) ∈ Z[x] that is necessary and sufficient for f to induce a level transitive automorphism of the binary tree, which is equivalent to the ergodicity of the action of f (x) on Z2 with respect to the normalized Haar measure. 1. Introduction For a fixed integer d ≥ 2 every polynomial f (x) ∈ Z[x] naturally induces mappings fn : Z/(dn Z) → Z/(dn Z) for all positive integers n. Equivalently, these mappings are induced by the action of f on the ring of d-adic integers Zd . These two equivalent approaches to study polynomials in Z[x] have been used in different contexts during the last several decades. One of the first motivations came from the constructions of the generators for pseudo-random sequences and goes back to Knuth [Knu81, Ana98, Lar02]. In this and most of the other applications it is crucial to consider polynomials acting by permutations on Z/(dn Z). Such polynomials are generally called permutational polynomials, however it is important to emphasize the distinction of these polynomials from the class of permutation polynomials that permute elements of finite fields Fpn (see [LN83, Chapter 7] for a survey). In many cases the stronger condition of transitivity of this action is required. Another type of applications come from cryptography. Rivest in [Riv01] completely characterized polynomials that act by permutations on Z/(2n Z) for all n ≥ 1 and points out the use of one of them (namely, f (x) = 2x2 + x) in the symmetric block cipher RC6 [RRSY] that was one of the five finalists of the AES competition. The questions of ergodicity of the action of permutational polynomials have been studied in the context of dynamical systems on Zp by Anashin [Ana06]. We refer the reader to a nice survey paper [Fan15] for a background and history in polynomial dynamics on Z/(dn Z). In this paper we offer another view to the polynomials acting on Zd and on Z/(dn Z). Namely, we use the tools from the theory of groups acting on rooted trees by automorphisms and groups generated by Mealy automata. This theory exploded in 1980’s after many counterexamples to well known conjectures in group theory were found among such groups. For example, Grigorchuk group was the first example of a group of intermediate growth [Gri83], as well as one of the first examples of infinite finitely generated torsion 1 groups [Gri80] (see also [Ale72, Sus79, GS83]). Now this is a rich theory with connections to combinatorics [GŠ06], analysis [GLSŻ00], holomorphic dynamics [Nek05], dynamical systems [GS16], computer science [MS15], and many other areas. We refer the reader to the survey article [GNS00] for history and references. The key idea in many of the arguments in this theory is understanding automorphisms of rooted trees by describing their sections (terms states and restrictions are also widely used) at the subtrees hanging down from vertices of the original rooted tree. If the original tree was regular (i.e., every vertex has the same number of children), these subtrees are canonically isomorphic to the original tree, and these sections can be treated as the automorphisms of the original tree as well. We utilize this approach to analyze the action of polynomials on Zd . Note that the connection between the functions on the boundary of X ∗ induced by automata and 1-Lipschitz functions on Zd was also established by Anashin in [Ana12], where a criterion for finiteness of the corresponding automaton in terms of the van der Put series of the function was developed. This criterion provided an application of the p-adic analysis to the theory of automata. In this paper we suggest a converse application. The set of vertices of a rooted d-ary tree can be identified with the set X ∗ of all finite words over an alphabet X = {0, 1, . . . , d−1}. In this case the n-th level of X ∗ corresponds to Z/(dn Z) by identifying x0 x1 . . . xn−1 ∈ X n with x0 + d · x1 + · · · + dn−1 · xn−1 ∈ Z/(dn Z). The boundary of X ∗ (consisting of all infinite paths without backtracking initiating at the root) is then identified with the ring Zd of d-adic integers. We show in Proposition 3.1 that in this interpretation each polynomial in Z[x] induces an endomorphism of the tree X ∗ , while each permutational polynomial induces an automorphism. Our first result describes the structure of these endomorphisms. Theorem 3.2. Given a polynomial f (x) = a0 + a1 x + · · · + at xt ∈ Z[x] inducing an endomorphism of X ∗ , the image of a vertex x0 ∈ X under f is f (x0 ) (mod d) and the section of f at x0 is again a polynomial given by the equation: t  X f (i) (x0 ) i−1 i (1) f |x0 (x) = f (x0 ) div d + d x, i! i=1 where f (i) denotes the ith derivative of a polynomial f , and f (x0 ) div d is the quotient of f (x0 ) and d. Note that the case of linear polynomials was partially considered by Bartholdi and Šunı́c in [BŠ06]. Our main application deals with permutational polynomials acting transitively on Z/(2n Z) for all n. In terms of the action on the tree this condition is equivalent to being level transitive. Equivalently, f ∈ Z[x] induces a level transitive automorphism if and only if the corresponding dynamical system (Z2 , f ) is minimal (i.e., the orbit of each element of Z2 under f is dense in Z2 ), or ergodic with respect to the Haar measure on Z2 (coinciding with the uniform Bernoulli measure on Z2 viewed as a Cantor set) [GNS00, Proposition 6.5],[Ana06]. In order to state our main result, we first review the history of the problem. The following theorem prover by Larin in [Lar02] gives the conditions that f has to satisfy in order to be transitive mod 2n for each positive integer n. Theorem 4.7 ([Lar02]). A polynomial f (x) = a0 + a1 x + · · · + at xt ∈ Z[x] is transitive mod 2n for every positive integer n if and only if it satisfies the following conditions: 2 (i) (ii) (iii) (iv) a0 ≡ 1 (mod 2) a1 ≡ 1 (mod 2) a3 + a5 + a7 + · · · ≡ 2a2 (mod 4) a4 + a6 + a8 + · · · ≡ a1 + a2 − 1 (mod 4) Rivest in [Riv01] (see an alternative proof in [MŠG10]) derived the following conditions that are necessary and sufficient for a polynomial f ∈ Z[x] to induce a permutation of each level of {0, 1}∗ and hence an automorphism of the tree. Theorem 3.8 ([Riv01]). A polynomial f (x) = a0 + a1 x + · · · + at xt in Z[x] induces a permutation of Z/(2n Z) for each positive integer n if and only if it satisfies the following conditions: (i) a1 ≡ 1 (mod 2) (ii) a2 + a4 + a6 + · · · ≡ 0 (mod 2) (iii) a3 + a5 + a7 + · · · ≡ 0 (mod 2) Using Theorem 3.2 we study level transitivity of a permutational polynomial f by counting the number of nontrivial actions of the sections of f in each level. In [BOERT96, Proposition (4.6)], it was shown that f acts level transitively on the rooted binary tree if and only if the number of nontrivial actions of the sections of f in each level of {0, 1}∗ is odd. Using this fact, we determine the conditions that f has to meet in order to be level transitive. These conditions are summarized in the following theorem which is the main result of the paper. Theorem 4.6. Let f (x) = a0 + a1 x + · · · + at xt be a permutational polynomial acting on the rooted binary tree. Then this action is level transitive if and only if the following conditions hold: (i) a0 ≡ 1 (mod 2) (ii) 2a2 ≡ a3 + a5 + · · · (mod 4) (iii) a2 + a1 − 1 ≡ a4 + a6 + · · · (mod 4) Combining the conditions of Theorems 3.8 and 4.6, we obtain the conditions of Theorem 4.7 using a completely different approach. We hope that this new tool can be utilized to attack other problems from p-adic analysis. For example, the suggested approach may work to characterize ergodicity of polynomials acting on Zp for p > 2. The structure of the paper is as follows. In Section 2 we set up necessary notation regarding rooted trees and their automorphisms. Section 3 describes endomorphisms and automorphisms of rooted trees arising from polynomial actions on the ring of d-adic integers. Finally, Section 4 contains the main result on the conditions for a permutational polynomial to act level transitively on the binary tree, which is equivalent to an ergodic action of the polynomial on Z2 . Acknowledgement. The authors would like to thank Zoran Šunı́c and Said Sidki for fruitful and motivating discussions during the preparation of the manuscript. 2. Preliminaries We start this section with the notation and terminology that will be used throughout the paper. A tree is a connected graph with no cycles. A rooted tree is a tree with one vertex selected to be the root. In any connected graph, a metric (called combinatorial metric) can be defined such that the distance between any pair of vertices is the number of edges in a 3 shortest path (geodesic) connecting them. The nth level of a rooted tree is defined as the set of vertices whose distance from the root is n. Since the tree has no cycles, for each vertex v of the nth level there is only one path from the root to v. The vertex u in this path that lies in level n − 1 is called the parent of v. The vertex v is called a child of u. Hence every vertex except for the root has exactly one parent and may have some children. A rooted tree is said to be d-regular or d-ary if there exists some positive integer d such that each vertex of the tree has exactly d children. So all these trees have infinitely many levels. In case d = 2, such a tree is called a rooted binary tree which represents the main interest in our paper. We will always visualize those trees such that they grow from top to bottom. So the root is the highest vertex and the children of each vertex v are located right under v. We will label the vertices of a rooted d-ary tree by finite words over a finite alphabet X = {0, 1, . . . , d − 1}. Equivalently the set X ∗ of all finite words over X can be given the structure of a rooted d-ary tree by declaring that v is adjacent to vx for each v ∈ X ∗ and x ∈ X. Thus the empty word corresponds to the root and for each positive integer n the set X n corresponds to the nth level of the tree. The example of the rooted binary tree is shown in Figure 1. 0 0 1 0 1 00 01 0 000 0 10 1 001 1 010 2 11 2 011 3 100 4 3 101 5 110 6 111 7 Figure 1. Standard Numbering of vertices in the binary tree We will identify the nth level of X ∗ with the ring Z/(dn Z) by identifying a vertex x0 x1 . . . xn−1 ∈ X n with x0 + dx1 + · · · + dn−1xn−1 ∈ Z/(dn Z). For example, the vertices 00, 01, 10 and 11 of the second level of the rooted binary tree are identified with 0, 2, 1 and 3, respectively as shown in Figure 2. Moreover, the boundary of the tree can be naturally identified with the ring Zd of d-adic integers. The way we identified the nth level of X ∗ with Z/(dn Z) may not be the most natural way. A more natural way to do that is to identify a vertex x0 x1 . . . xn−1 with its d-ary expansion xn−1 + dxn−2 + · · · + dn−1x0 . So the vertices 00, 01, 10 and 11 of the second level of the binary tree are identified with 0, 1, 2 and 3, respectively, as shown in Figure 1. However, we adopt the first identification so that mappings induced by polynomials on X ∗ preserve the adjacency relation as we will see later. Definition 1. An endomorphism of X ∗ is a map from the set of vertices of X ∗ to itself which preserves the adjacency relation. If such a map is bijective, it is called an automorphism of X ∗. An automorphism of X ∗ preserves the degree of each vertex as well as the distance from each vertex to the root. Since the root is the only vertex with degree d, it is invariant under 4 0 +1 0 1 +2 +1 0 2 1 +4 0 +2 +1 3 +4 4 2 +4 +4 6 1 5 3 7 +8 0 8 4 12 2 10 6 14 1 9 5 13 3 11 7 15 +1 6 0 16 8 24 4 20 12 28 2 18 10 26 6 22 14 30 1 17 Even 9 25 5 21 13 29 3 19 11 27 7 23 15 31 Odd Figure 2. Dyadic Numbering of vertices in the binary tree all the tree automorphisms. Also the levels of the tree are invariant under automorphisms since the distance is preserved. The group of all automorphisms of X ∗ is denoted by Aut X ∗ . Another important concept that we want to introduce here is the definition of the section of an endomorphism of X ∗ at a vertex. Definition 2. Let h be an endomorphism of X ∗ and x ∈ X. For any word v ∈ X ∗ , we have h(xv) = h(x)v ′ for some v ′ ∈ X ∗ . The map h|x : X ∗ → X ∗ given by (2) h|x (v) = v ′ clearly defines an endomorphism of X ∗ and is called the section of h at vertex x. Inductively we can define the section of h at a vertex v = x1 x2 . . . xn as h|v = h|x1 |x2 . . . |xn . In order to fully define the action of an endomorphism h on X ∗ , we need to specify its action on the first level as well as its sections at the vertices of the first level. To see the action of h on the second level, we do the same with the sections of h at the vertices of the first level and so on. In case of an endomorphism h of a rooted binary tree, the action of h on the first level is either trivial or is a switch of 0 and 1. Another language to define an endomorphism of X ∗ is to give its wreath recursion which also specifies its action on the first level and its sections at the vertices of the first level. This language makes computations easier. Since we will not do any computations with endomorphisms, this approach will not be used here. We can visualize the action of h on X ∗ using what is called the full portrait of h. The full portrait of h is a labeled infinite rooted d-ary tree with the root labeled by the name of the endomorphism h and each vertex v labeled by h|v . Under each vertex v, we usually write the name of the mapping that h|v defines on the first level of the subtree hanging from v. In the case of a rooted binary tree, we draw a little arc (called switch) connecting the two edges hanging down from v if h|v acts nontrivially on the first level of the subtree hanging from v. If there is no switch, it means the action is trivial. 5 τ τ τ τ τ τ PSfrag replacements Figure 3. The full portrait of the adding machine One of the basic examples of automorphisms of the rooted binary tree is the adding machine which we will denote throughout the paper by τ . It gets its name from the fact that its action on the boundary of the tree, which is identified by the ring Z2 , is equivalent to adding one to the input. The sections of τ at the vertices 0 and 1 are respectively e and τ , where e is the identity automorphism. And τ acts nontrivially on the first level. The full portrait of τ is shown in Figure 3. The next definition introduces the notion of level transitivity which is the core concept of our paper. Also a necessary and sufficient condition for an automorphism to act level transitively on a rooted binary tree is provided in the next theorem, that is a partial case of a more general result [BOERT96, Proposition (4.6)]. Definition 3. An automorphism h of X ∗ is said to act level transitively on X ∗ if it acts transitively on each level of X ∗ . Proposition 2.1. Let h be an automorphism of the rooted binary tree {0, 1}∗. Then h acts level transitively if and only if the full portrait of h has an odd number of switches (nontrivial actions) in each level including the zeroth level. Remark 2.2. The proof of this theorem involves induction on the level of the tree and is quite short. We leave it as an exercise and only point out that even though this is (the only) external result that we use in this paper, its proof can be included here essentially at no extra cost, so it does not affect our claim that our proof is self contained (modulo the result of Rivest [Riv01] on the characterization of permutational polynomials). Example 1. As we can see in Figure 3, the adding machine τ has exactly one switch in each level. So the last theorem asserts that τ acts level transitively on the rooted binary tree. 3. Endomorphisms of Rooted Trees Arising from Polynomials over Z For a fixed integer d ≥ 2, each polynomial f (x) ∈ Z[x] induces mappings fn : Z/(dn Z) → Z/(dn Z) for all positive integers n by taking the evaluation map modulo dn . Identifying the nth level of the rooted d-ary tree X ∗ with the ring Z/(dn Z), the polynomial f gives rise to a mapping on the whole tree. In the next proposition, we show that this mapping is always an 6 endomorphism of the rooted tree as it preserves the root and the adjacency relation. If for some d the mapping fn is a bijection for each n, then f induces a permutation of each level of the rooted d-ary tree X ∗ and hence induces an automorphism of X ∗ . From now on, we will use the term permutational polynomial to denote a polynomial in Z[x] that induces an automorphism of X ∗ and to denote the automorphism it induces on X ∗ as well. The same letter will be used to refer to both functions and no confusion will arise. Proposition 3.1. Let f (x) ∈ Z[x]. Then f induces an endomorphism on the rooted d-ary tree X ∗ . Moreover, different polynomials over Z induce different endomorphisms on X ∗ . Proof. We pick two adjacent vertices u and v of the tree such that u is the parent of v. So u = x0 + dx1 + · · · + dn−1 xn−1 ∈ X n and v = x0 + dx1 + · · · + dn−1 xn−1 + dn xn ∈ X n+1 for some x0 , . . . , xn ∈ {0, 1, . . . , d − 1} and n ≥ 0. Let f (u) = y0 + dy1 + · · · + dn−1 yn−1 and ′ f (v) = y0′ + dy1′ + · · · + dn−1 yn−1 + dn yn′ , where y0 , . . . , yn−1 , y0′ , . . . , yn′ ∈ {0, 1, . . . , d − 1}. Since u ≡ v (mod dn ), it follows that f (u) ≡ f (v) (mod dn ). Thus ′ y0 + dy1 + · · · + dn−1 yn−1 = y0′ + dy1′ + · · · + dn−1 yn−1 By uniqueness of the d-ary expansion, we obtain yi = yi′ for i = 0, . . . , n−1. Hence f (u) is the parent of f (v). This means that f preserves the adjacency relation so it is an endomorphism of X ∗ . Now we consider two different polynomials g, h ∈ Z[x]. We can find an integer k such that g(k) 6= h(k). Let N be the smallest positive integer such that g(k) 6≡ h(k) (mod dN ). Then the actions of g and h on the N th level of X ∗ are different.  Our next goal is to completely describe endomorphisms induced by polynomials by explicitly describing their sections at all the vertices of X ∗ . Before we proceed to the next theorem, we need to introduce some basic notation to make our expressions less cumbersome. Notation. Given two integers d > 0 and a, we can use the division algorithm to find two unique integers q and r such that a = dq + r where r ∈ {0, 1, . . . , d − 1}. We will adopt the notation Qd (a) = q and Rd (a) = r i.e., Qd (a) = a div d and Rd (a) is the remainder of a when divided by d. So for each integer a we always have (3) a = Rd (a) + dQd (a). Theorem 3.2. Given a polynomial f (x) = a0 +a1 x+· · ·+at xt ∈ Z[x] inducing an endomorphism of X ∗ , the image of a vertex x0 ∈ X under the induced endomorphism is Rd (f (x0 )) and the section of f at x0 is again a polynomial given by the equation: (4) f |x0 (x) = Qd (f (x0 )) + t X f (i) (x0 ) i=1 7 i! di−1 xi Proof. We pick a vertex u = x0 + dx1 + d2 x2 + · · · + dn xn which has x0 as a prefix. We can write u as u = x0 + d · v, where v = x1 + dx2 + · · · + dn−1 xn corresponds to the suffix of the word u as in equation (2). Using the Taylor expansion of f about x0 and the fact that according to equality (3), f (x0 ) = Rd (f (x0 )) + dQd (f (x0 )) we obtain ! t t X X f (i) (x0 ) i i f (i) (x0 ) i−1 i f (u) = f (x0 + d · v) = d v = Rd (f (x0 )) + d · Qd (f (x0 )) + d v i! i! i=0 i=1 Therefore, f (x0 ) = Rd (f (x0 + d · v)) = Rd (f (x0 )), where with a slight abuse of notation in the left hand side x0 and f (x0 ) denote vertices of the first level of X ∗ , and in the right hand side x0 is an element of Z/(dZ). And finally, f |x0 (v) = Qd (f (x0 + d · v)) = Qd (f (x0 )) + t X f (i) (x0 ) i=1 i! di−1 v i  Remark 3.3. Equation (4) immediately implies that all the sections of f are polynomials of the same degree as the degree of f . Also since f (t) (x) = t!at , all the sections of f at the same level n have the same leading coefficient (dt−1 )n at . Example 2. The sections of the polynomial f (x) = 1 + 3x + 2x2 at the vertices of the first three levels of the tree are depicted in Figure 4. Proposition 3.4. A polynomial f acting on X ∗ has finitely many distinct sections if and only if it is linear. Proof. First we show that a linear polynomial f (x) = ax + b acting on X ∗ has finitely many sections. From equation (4), we see that the section of f at a vertex x0 ∈ X is given by f |x0 (x) = ax + Qd (b + x0 a). Hence all the sections of f are linear polynomials with the same leading coefficient a. So the number of sections of f is bounded up by the number of distinct constant terms of these sections. Since the constant term can be written as Qd (b+a+· · ·+a) where we have exactly x0 ≤ d−1 summands equal to a, it is enough to notice that for any collection of integers n1 , n2 , . . . , nd we have |Qd (n1 + n2 + · · · + nd )| ≤ max{|n1 |, |n2 |, . . . , |nd |}. Therefore, any section of f has the form ax + c where |c| ≤ max{|a|, |b|}. The fact that any nonlinear polynomial f (x) = a0 + a1 x + · · · + at xt acting on X ∗ has infinitely many sections follows immediately from Remark 3.3 and Proposition 3.1.  Now we turn our attention to the permutational polynomials inducing automorphisms of X ∗ . First of all, we recall the definition. Definition 4. A polynomial f (x) ∈ Z[x] is said to be d-permutational (or, simply, permutational if d is clear from the context) if for each n ≥ 1 the mapping fn : Z/(dn Z) → Z/(dn Z) induced by the evaluation homomorphism is a permutation. According to Proposition 3.1 each permutational polynomial induces an automorphism of the d-ary tree X ∗ . The following simple remark follows immediately from the definition. Remark 3.5. The sections of a permutational polynomial acting on X ∗ are again permutational. 8 1 + 3x + 2x2 ag replacements 3 + 7x + 4x2 3x + 4x2 3 + 11x + 8x2 3x + 8x2 3x + 16x2 1 + 11x + 16x2 5 + 19x + 16x2 1 + 7x + 8x2 7x + 16x2 11 + 27x + 16x2 7 + 15x + 8x2 3 + 15x + 16x2 8 + 23x + 16x2 15 + 31x + 16x2 Figure 4. Sections of an automorphism of {0, 1}∗ induced by a polynomial f (x) = 1 + 3x + 2x2 For each d ≥ 2, the set of all linear d-permutational polynomials obviously forms a group under the operation of composition. However, the set of all d-permutational polynomials does not form a group as it is not closed under taking inverses. In fact, it has the structure of a cancellative monoid as shown in the next proposition. Proposition 3.6. For each d ≥ 2, the set of all d-permutational polynomials forms a cancellative monoid under the operation of composition. Proof. It is clear that the composition of two d-permutational polynomials is again a polynomial and that it induces an automorphism of the rooted d-ary tree X ∗ . The polynomial id(x) = x plays the role of the identity as it clearly induces the identity automorphisms of the tree. so we have the structure of a monoid. The inverse of an automorphism of X ∗ induced by a permutational polynomial always exists but it cannot always be induced by a polynomial. Although this is the case for linear permutational polynomials, the inverse of a nonlinear permutational polynomial cannot be induced by a polynomial. If this were true, we would have two polynomials not both linear acting on the ring Zd (the boundary of X ∗ ) with a trivial composition which is impossible. Still the existence of the inverse makes cancellation legitimate.  Remark 3.7. If we consider the action of a d-permutational polynomial f on some specific level n, identified with Z/(dn Z), the inverse of f on Z/(dn Z) can always be induced by a permutational polynomial as shown in [MŠG10]. 9 For the rest of the paper, we will consider only permutational polynomials acting on the rooted binary tree {0, 1}∗. The next theorem, introduced by Rivest in [Riv01], determines the conditions under which a polynomial f (x) ∈ Z[x] induces a permutation of Z/(2n Z) for each n and hence an automorphism of {0, 1}∗ (i.e., is a 2-permutational polynomial). Theorem 3.8 ([Riv01, MŠG10]). A polynomial f (x) = a0 + a1 x + · · · + at xt ∈ Z[x] induces a permutation of Z/(2n Z) for each n if and only if it satisfies the following conditions: (i) a1 ≡ 1 (mod 2) (ii) a2 + a4 + a6 + · · · ≡ 0 (mod 2) (iii) a3 + a5 + a7 + · · · ≡ 0 (mod 2) The theorem does not put any restriction on the constant term a0 of the polynomial f . Assuming that f satisfies the conditions of the theorem i.e., it induces a permutation of Z/(2n Z) and that a0 is even (odd), all the evens of Z/(2n Z) are mapped to evens (odds) and all the odds of Z/(2n Z) are mapped to odds (evens). A special case of the theorem is when f (x) = ax + b i.e., when f is linear. It defines a permutation of Z/(2n Z) if and only if a is odd. From now on, a permutational polynomial will always mean a 2-permutational polynomial. Also we will drop the 2 subscript in the notation of the function Q2 and write Q(a) = a div 2. According to equation (4), the sections of a permutational polynomial f (x) = a0 + a1 x + · · · + at xt acting on {0, 1}∗ at the vertices 0 and 1 are given by the two equations: (5) f |0 (x) = Q(a0 ) + a1 x + 2a2 x2 + 22 a3 x3 · · · + 2t−1 at xt and (6) f |1(x) = Q(a0 + a1 + · · · + at ) + (a1 + 2a2 + · · · + tat )x t X  f (i) (1) i−3 i + 2 · 1a2 + 3 · 2a3 + · · · + t(t − 1)at x2 + 4 2 x i! i=3 In the case of a linear polynomial f (x) = ax + b, we have f |0 (x) = ax + Q(b) and f |1 (x) = ax + Q(a + b). For example, the adding machine τ , which was introduced in the preliminary section, can be represented by a linear permutational polynomial τ (x) = x + 1. The sections of τ at 0 and 1 are respectively x and x + 1. According to Theorem 3.8, the group of all linear 2-permutational polynomials is isomorphic to the group    a b | a, b ∈ Z, a odd . 0 1 A generating set of this group is {p, q−1 , q3 , q5 , q7 , . . .}, where p(x) = x + 1 and qm (x) = mx for m = −1, 3, 5, 7, . . .. All the generators have infinite orders except for q−1 which is an involution. It was shown in [BŠ06] that for each m = −1, 3, 5, 7, . . ., the subgroup generated by p and qm is the Baumslag-Solitar group BS(1, m) = hp, qm | qm pm = pqm i, where we adopt the convention that when the expression f g is used to denote the composition of two functions it means the function f acts first. In the same paper, Bartholdi and Šunı́c considered sections of some linear polynomials acting on {0, 1}∗. We end this section by introducing one more notation and stating a simple lemma that will be used in Section 4 to simplify the proof of the main result. 10 Notation. Suppose f (x) = a0 + a1 x + · · ·+ at xt ∈ Z[x] is a permutational polynomial. Then it uniquely defines the following integers kf , mf and nf such that (7) a1 = 2kf + 1, a2 + a4 + · · · = 2mf , a3 + a5 + · · · = 2nf . The following lemma, in particular, shows that not every permutational polynomial can be a section of another permutational polynomial. Lemma 3.9. Let f (x) = a0 + a1 x + · · · + at xt be a permutational polynomial acting on the rooted binary tree {0, 1}∗. Then for each non-root vertex v ∈ {0, 1}∗, the permutational polynomial f |v (x) = b0 + b1 x + · · · + bt xt corresponding to the section of f at v, satisfies nf |v ≡ 0 (mod 2) and b2 ≡ 0 (mod 2). Proof. Clearly, it is enough to check the conditions only for vertices of the first level. But this trivially follows from equations (5) and (6). We only have to notice that all the coefficients at xi for i ≥ 3 in both f |0 and f |1 are divisible by 4 and that the coefficients at x2 in both f |0 and f |1 are divisible by 2.  4. Level Transitivity of Permutational Polynomials Acting on a Rooted Binary Tree We start this section by presenting a couple of basic number theoretic facts that will be used many times in the proof of our main theorem. We introduce a bunch of lemmas without proofs. The proofs are straight forward so we leave them as simple exercises. The first lemma gives some properties of the function Q(x) which was defined in the last section. All the other lemmas follow from the fact that for any positive integer n we have ax ≡ x (mod n) if a and x are integers and a ≡ 1 (mod n). Lemma 4.1. For any three integers x, m and n, we have: (i) Q(x + 2n) = Q(x) + n (ii) Q(x) + Q(x + 1) = x (iii) Q(x) + Q(x + 1 + 2n) = x + n (iv) Q(x + 4n) ≡ Q(x) (mod 2) (v) Q(x) + Q(x + 1 + 4n) ≡ x (mod 2) (vi) If n ≡ m (mod 4), then Q(x + n) ≡ Q(x + m) (mod 2) Lemma 4.2. Let a1 , a2 , . . . , an be a collection of odd numbers. Then for any sequence of integers x1 , x2 , . . . , xn , we have a1 x1 + a2 x2 + · · · + an xn ≡ x1 + x2 + · · · + xn (mod 2) i.e., a1 x1 + a2 x2 + · · · + an xn has the same parity as x1 + x2 + · · · + xn . Lemma 4.3. Let a1 , a2 , . . . , an and x1 , x2 , . . . , xn be integers such that ai ≡ 1 (mod 4) for i = 1, 2, . . . , n. Then a1 x1 + a2 x2 + · · · + an xn ≡ x1 + x2 + · · · + xn (mod 4). Lemma 4.4. Let a1 , a2 , . . . , an be a collection of odd numbers and x1 , x2 , . . . , xn be any sequence of integers. Then a21 x1 + a22 x2 + · · · + a2n xn ≡ x1 + x2 + · · · + xn (mod 4). Now it is time to introduce our main theorem that determines the conditions under which a permutational polynomial acts level transitively on the rooted binary tree {0, 1}∗ . Obviously 11 a permutational polynomial acts nontrivially on the first level of the tree if and only if its constant term is odd. According to Proposition 2.1, a permutational polynomial f acts level transitively on {0, 1}∗ if and only if in each level of the tree, the number of sections of f with odd constant terms is odd, or equivalently, the sum of these constant terms is odd. The next proposition determines the conditions that a linear permutational polynomial has to meet in order to act level transitively on {0, 1}∗. The general result is given by Theorem 4.6 which we prove by induction on level. The proof of the linear case is provided first so that the idea of the induction becomes clear and then the general case is considered. Actually the proof given here is essentially different from the proofs of similar results introduced in [Ana06] and in [Lar02]. Proposition 4.5. Let f (x) = ax + b be a permutational polynomial acting on the rooted binary tree {0, 1}∗. Then this action is level transitive if and only if the following conditions hold: (i) b ≡ 1 (mod 2) (ii) a ≡ 1 (mod 4) Proof. We first show that the conditions are necessary. If condition (i) is not satisfied, then f does not act transitively on the first level. So we assume that condition (i) is satisfied but condition (ii) is not. We can also use the fact that a is odd since f is permutational. Thus we can write b = 2s + 1 and a = 2r + 1, where s and r are integers and r is odd. The sections of f at 0 and 1 are respectively ax + Q(b) = ax + s and ax + Q(a + b) = ax + r + s + 1. The sum of the two constant terms is 2s + r + 1 which is even. Therefore, f does not act transitively on the second level. To prove sufficiency of the conditions, we use induction on level. First we can write a = 4k + 1 for some integer k which follows from condition (ii). Since b is odd, f acts transitively on the first level. Now assume that the sections of f at some level n ≥ 0 are respectively ax + α1 , . . . , ax + αm , where m = 2n and suppose that α1 + · · · + αm ≡ 1 (mod 2) which serves as the induction hypothesis. The sections of f at level n + 1 are respectively ax+σ1 , ax+σ2 , . . . , ax+σ2m−1 , ax+σ2m , where σ1 = Q(α1 ), σ2 = Q(α1 +4k +1), . . . , σ2m−1 = Q(αm ), σ2m = Q(αm + 4k + 1). Hence the sum of constant terms of the sections of level n + 1 is (σ1 + σ2 ) + · · · + (σ2m−1 + σ2m ) = (Q(α1 ) + Q(α1 + 4k + 1)) + · · · + (Q(αm ) + Q(αm + 4k + 1)) ≡ α1 + · · · + αm ≡ 1 (mod 2), where we have used Lemma 4.1 part (v). The proof is now complete.  The adding machine τ (x) = x + 1 as well as all its odd powers τ r (x) = x + r, where r is odd, satisfy the conditions of the last proposition. So they act level transitively on the rooted binary tree {0, 1}∗ . Theorem 4.6. Let f (x) = a0 + a1 x + · · · + at xt be a permutational polynomial acting on the rooted binary tree {0, 1}∗. Then this action is level transitive if and only if the following conditions hold: (i) a0 ≡ 1 (mod 2) (ii) 2a2 ≡ a3 + a5 + · · · (mod 4) (iii) a2 + a1 − 1 ≡ a4 + a6 + · · · (mod 4) Proof. To show that the given conditions are necessary, we first notice that if condition (i) is not satisfied then f does not act transitively on the first level. So we assume that 12 condition (i) is satisfied and hence we can write a0 = 2s + 1 for some integer s. Since f is permutational, it satisfies the three conditions of Theorem 3.8. These three conditions could be written respectively as a1 = 2k + 1, a2 + a4 + · · · = 2m and a3 + a5 + · · · = 2n for some integers k, m and n. By adding a2 to both sides in condition (iii) and doing some simple algebraic manipulation, conditions (ii) and (iii) can be rewritten as: (ii′ ) a2 ≡ n (mod 2) (iii′ ) k + a2 ≡ m (mod 2) Equations (5) and (6) tell us that the constant terms of the sections of f at 0 and 1 are respectively Q(a0 ) and Q(a0 + a1 + · · · + at ). Their sum is Q(a0 ) + Q(a0 + a1 + · · · + at ) = Q(a0 ) + Q(a0 + 2k + 1 + 2m + 2n) = a0 + k + m + n = 2s + (k + n) + m + 1, where we have used Lemma 4.1 part (iii). For f to act transitively on the second level, we must have (8) (k + n) ≡ m (mod 2). If exactly one of the two conditions (ii′ ) and (iii′ ) is satisfied, then (k + n) 6≡ m (mod 2). However, if the two conditions are both not satisfied, we have (k + n) ≡ m (mod 2) so f does act transitively on the second level. We will show that in the latter case, f does not act transitively on the third level by proving that the sum of constant terms of the sections of f at the second level is even. From equations (5) and (6), we can infer that the constant terms of the sections of f at the vertices 00, 01, 10 and 11 are respectively: • Q(Q(a0 )) = Q(s) • Q(s + a1 + 2a2 + · · · + 2t−1 at ) = Q(s + 2k + 1 + 2a2 + · · · + 2t−1 at ) • Q(Q(a0 + a1 + · · · + at )) = Q(Q(2s + 1 + 2k + 1 + 2m + 2n)) = Q(1 + s + k + m + n) • Q((1 + s + k + m + n) + (a1 + 2a2 + · · · + tat ) + (2 · 1a2 + 3 · 2a3 + · · · + t(t − 1)at ) + P (i) 4 ti=3 f i!(1) 2i−3 ) The sum of these constant terms modulo 2 is Q(s)+Q(s+2k+1+2a2 )+Q(1+s+k+m+n)+Q((1+s+k+m+n)+a1 +22 a2 +32 a3 +· · ·+t2 at ), where we have used Lemma 4.1 part (iv). Using part (iii) of the same lemma and reusing part (iv) as well, the sum modulo 2 simplifies to s+k+a2 +Q(1+s+k+m+n)+Q((1+s+k+m+n)+1+2k+(22a2 +42 a4 +· · · )+(32a3 +52 a5 +· · · )) ≡ s + k + a2 + Q(1 + s + k + m + n) + Q((1 + s + k + m + n) + 1 + 2k + (32 a3 + 52 a5 + · · · )) ≡ s + k + a2 + Q(1 + s + k + m + n) + Q((1 + s + k + m + n) + 1 + 2k + (a3 + a5 + · · · )) ≡ s + k + a2 + Q(1 + s + k + m + n) + Q((1 + s + k + m + n) + 1 + 2k + 2n) (mod 2) Where we have used Lemma 4.4 to obtain 32 a3 + 52 a5 + · · · ≡ a3 + a5 + · · · . Again we apply part (iii) of Lemma 4.1 to have the sum modulo 2 as s + k + a2 + (1 + s + k + m + n) + k + n ≡ 2s + 2k + (k + n) + m + (n + a2 + 1) ≡ ((k + n) + m) + (n + a2 + 1) ≡ (k + n) + m ≡ 0 (mod 2) where we have used the fact that the two conditions (ii′ ) and (iii′ ) are both not satisfied. Now we prove sufficiency of the conditions. Again we use the fact that f is permutational to write a1 = 2k + 1, a2 + a4 + · · · = 2m and a3 + a5 + · · · = 2n for some integers k, m and n. We can easily infer that 2a2 ≡ 2n (mod 4) and 2n + 2k ≡ 2m (mod 4). The last equality is equivalent to equality 8. We will show that f acts transitively on the first and second levels 13 and then use induction for lower levels. Condition (i) guarantees transitivity on the first level. We deduced in the proof of necessity that the transitivity on the second level is equivalent to equality (8), which is automatically satisfied in our case as shown above. Before we formulate the induction hypothesis, we recall that at each vertex v of {0, 1}∗ the (f | ) (f | ) (f | ) section f |v is induced by a permutational polynomial f |v (x) = a0 v +a1 v x+· · ·+at v xt , so (f | ) (f | ) (f | ) it defines the integers kf |v , mf |v , and nf |v such that a1 v = 2kf |v +1, a2 v +a4 v +· · · = 2mf |v (f | ) (f | ) and a3 v + a5 v + · · · = 2nf |v . Also if v is a non-root vertex, we have nf |v ≡ 0 (mod 2) and (f | ) a2 v ≡ 0 (mod 2) by Lemma 3.9. Let us assume that the sections of f at some level l ≥ 1 of the tree are ϕ1 , . . . , ϕr , where (ϕ ) (ϕ ) r = 2l . Suppose that a0 1 +· · ·+a0 r ≡ 1 (mod 2) which serves as our induction hypothesis. Let ψ1 , ψ2 , . . . , ψ2r−1 , ψ2r be the sections of f at level l + 1. Then 2r X (ψ ) a0 i = r  X (ψ ) a0 2j−1 + (ψ ) a0 2j j=1 i=1  r      X (ϕ ) (ϕ ) (ϕ ) (ϕ ) = Q a0 j + Q a0 j + a1 j + · · · + at j j=1 = r      X (ϕ ) (ϕ ) Q a0 j + Q a0 j + 2kϕj + 1 + 2mϕj + 2nϕj j=1 r   X (ϕ ) = a0 j + kϕj + mϕj + nϕj j=1 = r X (ϕj ) a0 + r X k ϕj + j=1 j=1 ≡1+ r X j=1 k ϕj + r X j=1 r X mϕj mϕj + r X nϕj j=1 (mod 2) j=1 by induction hypothesis, where we have used Lemma 4.1 part (iii), then rearranged the terms, and finally exploited Lemma 3.9 at the last transition. We claim that (kϕi + kϕi+1 ) + (mϕi + mϕi+1 ) ≡ 0 (mod 2) for i = 1, 3, . . . , r − 1. We will show that for every permutational polynomial g(x) = b0 + b1 x + b2 x2 + · · · + bt xt satisfying the two conditions ng ≡ 0 (mod 2) and b2 ≡ 0 (mod 2), we have (kg|0 + kg|1 ) + (mg|0 + mg|1 ) ≡ 0 (mod 2). This will be enough to prove the claim. (g| ) (g| ) First we have a1 0 + a1 1 = 2kg|0 + 1 + 2kg|1 + 1, thus from equations (5) and (6) we have (g|0 ) a1 (g|1 ) + a1 2 b1 + (b1 + 2b2 + · · · + tbt ) −1= 2 3b3 + 5b5 + · · · b1 + b2 + (2b4 + 3b6 + 4b8 + · · · ) + −1= 2 3b3 + 5b5 + · · · −1 2kg + 1 + b2 + (2b4 + 4b8 + · · · ) + (3b6 + 5b10 + · · · ) + 2 kg|0 + kg|1 = −1= 14 Using Lemma 4.2, we can write the sum modulo 2 as 3b3 + 5b5 + · · · kg|0 + kg|1 ≡ (b6 + b10 + · · · ) + (mod 2) 2 Again from equations (5) and (6), we can write mg|0 + mg|1 modulo 2 as mg|0 + mg|1 ≡ b2 + (b2 + 3 · 1b3 + 2 · 3b4 + 5 · 2b5 + 3 · 5b6 + · · · ) ≡ 2b2 + (2 · 3b4 + 5 · 2b5 + · · · ) + (3 · 1b3 + 3 · 5b6 + · · · ) ≡ b3 + b6 + b7 + b10 + b11 + b14 + b15 + · · · (mod 2) The last equivalence comes from applying Lemma 4.2. Therefore the sum (kg|0 + kg|1 ) + (mg|0 + mg|1 ) 3b3 + 5b5 + · · · 2 5(b3 + b5 ) + 9(b7 + b9 ) + · · · (mod 2) ≡ 2 From Lemma 4.3, we have 5(b3 +b5 )+9(b7 +b9 )+· · · ≡ (b3 +b5 )+(b7 +b9 )+· · · ≡ 2n (mod 4) 5(b3 + b5 ) + 9(b7 + b9 ) + · · · ≡ n ≡ 0 (mod 2). The proof is now complete.  and thus 2 If a mapping f acting on the rooted binary tree {0, 1}∗ is level transitive, then the orbit of every element in the boundary of the tree Z2 under f is dense in Z2 . Thus the dynamical system (Z2 , f ) is minimal. Also Anashin proved in [Ana06] that a polynomial f ∈ Z[x] is ergodic with respect to the normalized Haar measure on Z2 if and only if f is transitive mod 2n for every positive integer n. Combining Theorem 3.8 and Theorem 4.6, we thus obtain a new and more elementary proof of the result of Larin [Lar02]. ≡ (b3 + b7 + b11 + b15 + · · · ) + Theorem 4.7 ([Lar02]). Let f (x) = a0 + a1 x + · · · + at xt ∈ Z2 [x]. Then the dynamical system (Z2 , f ) is minimal, or equivalently, f is ergodic with respect to the normalized Haar measure of Z2 if and only if the following conditions are satisfied: (i) a0 ≡ 1 (mod 2) (ii) a1 ≡ 1 (mod 2) (iii) 2a2 ≡ a3 + a5 + · · · (mod 4) (iv) a2 + a1 − 1 ≡ a4 + a6 + · · · (mod 4) References [Ale72] [Ana98] [Ana06] [Ana12] [BGK+ 08] S. V. Alešin. Finite automata and the Burnside problem for periodic groups. Mat. Zametki, 11:319–328, 1972. V. S. Anashin. Uniformly distributed sequences in computer algebra or how to construct program generators of random numbers. J. Math. Sci. (New York), 89(4):1355–1390, 1998. Computing mathematics and cybernetics, 2. Vladimir Anashin. Ergodic transformations in the space of p-adic integers. In p-adic mathematical physics, volume 826 of AIP Conf. Proc., pages 3–24. Amer. Inst. Phys., Melville, NY, 2006. V. Anashin. Automata finiteness criterion in terms of van der Put series of automata functions. p-Adic Numbers Ultrametric Anal. Appl., 4(2):151–160, 2012. I. Bondarenko, R. Grigorchuk, R. Kravchenko, Y. Muntyan, V. Nekrashevych, D. Savchuk, and Z. Šunić. Classification of groups generated by 3-state automata over 2-letter alphabet. Algebra Discrete Math., (1):1–163, 2008. (available at http://arxiv.org/abs/0803.3555 ). 15 [BOERT96] Hyman Bass, Maria Victoria Otero-Espinar, Daniel Rockmore, and Charles Tresser. Cyclic renormalization and automorphism groups of rooted trees, volume 1621 of Lecture Notes in Mathematics. Springer-Verlag, Berlin, 1996. [BŠ06] Laurent I. Bartholdi and Zoran Šuniḱ. Some solvable automaton groups. In Topological and Asymptotic Aspects of Group Theory, volume 394 of Contemp. Math., pages 11–29. Amer. Math. Soc., Providence, RI, 2006. [Fan15] Ai-Hua Fan. p-adic polynomial dynamics, 2015. https://cantorsalta2015.sciencesconf.org/conference/cantorsalta2015/Fan.pdf. [GLSŻ00] Rostislav I. Grigorchuk, Peter Linnell, Thomas Schick, and Andrzej Żuk. On a question of Atiyah. C. R. Acad. Sci. Paris Sér. I Math., 331(9):663–668, 2000. [GNS00] R. I. Grigorchuk, V. V. Nekrashevich, and V. I. Sushchanskiı̆. Automata, dynamical systems, and groups. Tr. Mat. Inst. Steklova, 231(Din. Sist., Avtom. i Beskon. Gruppy):134–214, 2000. [Gri80] R. I. Grigorchuk. On Burnside’s problem on periodic groups. Funktsional. Anal. i Prilozhen., 14(1):53–54, 1980. [Gri83] R. I. Grigorchuk. On the Milnor problem of group growth. Dokl. Akad. Nauk SSSR, 271(1):30– 33, 1983. [GS83] Narain Gupta and Said Sidki. On the Burnside problem for periodic groups. Math. Z., 182(3):385–388, 1983. [GŠ06] Rostislav Grigorchuk and Zoran Šuniḱ. Asymptotic aspects of Schreier graphs and Hanoi Towers groups. C. R. Math. Acad. Sci. Paris, 342(8):545–550, 2006. [GS16] Rostislav Grigorchuk and Dmytro Savchuk. Ergodic decomposition of group actions on rooted trees. Tr. Mat. Inst. Steklova, 292(Algebra, Geometriya i Teoriya Chisel):100–117, 2016. [Knu81] Donald E. Knuth. The art of computer programming. Vol. 2. Addison-Wesley Publishing Co., Reading, Mass., second edition, 1981. Seminumerical algorithms, Addison-Wesley Series in Computer Science and Information Processing. [Lar02] M. V. Larin. Transitive polynomial transformations of residue rings. Diskret. Mat., 14(2):20–32, 2002. [LN83] Rudolf Lidl and Harald Niederreiter. Finite fields, volume 20 of Encyclopedia of Mathematics and its Applications. Addison-Wesley Publishing Company, Advanced Book Program, Reading, MA, 1983. With a foreword by P. M. Cohn. [MS15] Alexei Miasnikov and Dmytro Savchuk. An example of an automatic graph of intermediate growth. Ann. Pure Appl. Logic, 166(10):1037–1048, 2015. [MŠG10] Smile Markovski, Zoran Šunić, and Danilo Gligoroski. Polynomial functions on the units of Z2n . Quasigroups Related Systems, 18(1):59–82, 2010. [Nek05] Volodymyr Nekrashevych. Self-similar groups, volume 117 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2005. [Riv01] Ronald L. Rivest. Permutation polynomials modulo 2w . Finite Fields Appl., 7(2):287–292, 2001. [RRSY] Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. The RC6 block cipher. Posted on the RC6 site of RSA Laboratories. Slides from NIST AES1 (1998-08-21) and AES3 (2000-04-14) conferences. [Sus79] V. I. Sushchansky. Periodic permutation p-groups and the unrestricted Burnside problem. DAN SSSR., 247(3):557–562, 1979. (in Russian). Department of Mathematics and Statistics, University of South Florida, 4202 E Fowler Ave, Tampa, FL 33620-5700, [email protected] Department of Mathematics and Statistics, University of South Florida, 4202 E Fowler Ave, Tampa, FL 33620-5700, [email protected] 16
4math.GR
Fully Decentralized Policies for Multi-Agent Systems: An Information Theoretic Approach Roel Dobbe∗, David Fridovich-Keil∗and Claire Tomlin † August 1, 2017 arXiv:1707.06334v2 [cs.SY] 29 Jul 2017 Abstract 1 Learning cooperative policies for multi-agent systems is often challenged by partial observability and a lack of coordination. In some settings, the structure of a problem allows a distributed solution with limited communication. Here, we consider a scenario where no communication is available, and instead we learn local policies for all agents that collectively mimic the solution to a centralized multi-agent static optimization problem. Our main contribution is an information theoretic framework based on rate distortion theory which facilitates analysis of how well the resulting fully decentralized policies are able to reconstruct the optimal solution. Moreover, this framework provides a natural extension that addresses which nodes an agent should communicate with to improve the performance of its individual policy. Introduction Finding optimal decentralized policies for multiple agents is often a hard problem hampered by partial observability and a lack of coordination between agents. The distributed multi-agent problem has been approached from a variety of angles, including distributed optimization [Boyd et al., 2011], game theory [Aumann and Dreze, 1974] and decentralized or networked partially observable Markov decision processes (POMDPs) [Oliehoek and Amato, 2016, Goldman and Zilberstein, 2004, Nair et al., 2005]. In this paper, we analyze a different approach consisting of a simple learning scheme to design fully decentralized policies for all agents that collectively mimic the solution to a common optimization problem, while having no access to a global reward signal and either no or restricted access to other agents’ local state. This algorithm is a generalization of that proposed in our prior work [Sondermeijer et al., 2016] related to decentralized optimal power flow (OPF). Indeed, the success of regression-based decentralization in the OPF domain motivated us to understand when and how well the method works in a more general decentralized optimal control setting. The key contribution of this work is to view decentralization as a compression problem, and then apply classical results from information theory to analyze performance limits. More specifically, we treat the ith agent’s optimal action in the centralized problem as a random variable u∗i , and model its conditional dependence on the global state variables x = (x1 , . . . , xn ), i.e. p(u∗i |x), which we assume to be stationary in time. We now restrict each agent i to observe only the ith state variable xi . Rather than solving this decentralized problem directly, we train each agent to replicate what it would have done with full information in the centralized case. That is, the vector of state variables x is compressed, and the ith agent must decompress xi to compute some estimate ûi ≈ u∗i . In our approach, each agent learns a parameterized Markov control policy ûi = π̂i (xi ) via regression. The π̂i are learned from a data set containing local states xi taken from historical measurements of system state x and corresponding optimal actions u∗i computed by solving an offline centralized optimization problem for each x. In this context, we analyze the fundamental limits of compression. In particular, we are interested in unraveling the relationship between the dependence structure of u∗i and x and the corresponding ability of an agent with partial information to approximate the optimal solution, i.e. the difference – or distortion – between decentralized action ûi = π̂i (xi ) and u∗i . This type of relationship is well studied within the information theory literature as an instance of rate distortion theory [Cover and Thomas, 2012, Chapter 13]. Classical results in this field provide a means of finding a lower bound on the expected distortion as a function of the mutual information – or rate of communication – between u∗i and xi . This lower bound is valid for each specified distortion metric, and for any arbitrary strategy of computing ûi from available data xi . Moreover, we are able to leverage a similar result to provide a conceptually simple algorithm for choosing a communication structure – letting the regressor π̂i depend on some other local states xj6=i – in such a way that the lower bound on expected distortion is minimized. As such, our method generalizes [Sondermeijer et al., 2016] and provides a novel approach for the design and analysis of regression-based decentralized optimal policies for general multi-agent systems. We demonstrate these results on synthetic examples, and on a real example drawn from solving OPF in electrical distribution grids. ∗ Indicates equal contribution. Dobbe, David Fridovich-Keil and Claire Tomlin are with the Department of Electrical Engineering and Computer Sciences, University of California, Berkeley, CA 94720, USA. [dobbe, dfk, tomlin]@eecs.berkeley.edu. † Roel 1 2 Related Work Decentralized control has long been studied within the system theory literature, e.g. [Lunze, 1992, Siljak, 2011]. Recently, various decomposition based techniques have been proposed for distributed optimization based on primal or dual decomposition methods, which all require iterative computation and some form of communication with either a central node [Boyd et al., 2011] or neighbor-to-neighbor on a connected graph [Pu et al., 2014, Raffard et al., 2004, Sun et al., 2013]. Distributed model predictive control (MPC) optimizes a networked system composed of subsystems over a time horizon, which can be decentralized (no communication) if the dynamic interconnections between subsystems are weak in order to achieve closed-loop stability as well as performance [Christofides et al., 2013]. The work of Zeilinger et al. [2013] extended this to systems with strong coupling by employing time-varying distributed terminal set constraints, which requires neighbor-to-neighbor communication. Another class of methods model problems in which agents try to cooperate on a common objective without full state information as a decentralized partially observable Markov decision process (Dec-POMDP) [Oliehoek and Amato, 2016]. Nair et al. [2005] introduce networked distributed POMDPs, a variant of the Dec-POMDP inspired in part by the pairwise interaction paradigm of distributed constraint optimization problems (DCOPs). Although the specific algorithms in these works differ significantly from the regression-based decentralization scheme we consider in this paper, a larger difference is in problem formulation. As described in Sec. 3, we study a static optimization problem repeatedly solved at each time step. Much prior work, especially in optimal control (e.g. MPC) and reinforcement learning (e.g. Dec-POMDPs), poses the problem in a dynamic setting where the goal is to minimize cost over some time horizon. In the context of reinforcement learning (RL), the time horizon can be very long, leading to the well known tradeoff between exploration and exploitation; this does not appear in the static case. Additionally, many existing methods for the dynamic setting require an ongoing communication strategy between agents – though not all, e.g. [Peshkin et al., 2000]. Even one-shot static problems such as DCOPs tend to require complex communication strategies, e.g. [Modi et al., 2005]. Although the mathematical formulation of our approach is rather different from prior work, the policies we compute are similar in spirit to other learning and robotic techniques that have been proposed, such as behavioral cloning [Sammut, 1996] and apprenticeship learning [Abbeel and Ng, 2004], which aim to let an agent learn from examples. In addition, we see a parallel with recent work on information-theoretic bounded rationality [Ortega et al., 2015] which seeks to formalize decision-making with limited resources such as the time, energy, memory, and computational effort allocated for arriving at a decision. Our work is also related to swarm robotics [Brambilla et al., 2013], as it learns simple rules aimed to design robust, scalable and flexible collective behaviors for coordinating a large number of agents or robots. 3 General Problem Formulation Consider a distributed multi-agent problem defined by a graph G = (N , E), with N denoting the nodes in the network with cardinality |N | = N , and E representing the set of edges between nodes. Fig. 1a shows a prototypical graph of this sort. Each node has a real-valued state vector xi ∈ Rαi , i ∈ N . A subset of nodes C ⊂ N , with cardinality |C| = C, are controllable and P > βi i∈N αi = X ∈ R hence are termed “agents.” Each of these agents has an action variable u ∈ R , i ∈ C. Let x = (x , . . . , x ) i i N P denote the full network state vector and u ∈ R i∈C βi = U the stacked network optimization variable. Physical constraints such as spatial coupling are captured through equality constraints g(x, u) = 0. In addition, the system is subject to inequality constraints h(x, u) ≤ 0 that incorporate limits due to capacity, safety, robustness, etc. We are interested in minimizing a convex scalar function fo (x, u) that encodes objectives that are to be pursued cooperatively by all agents in the network, i.e. we want to find u∗ = arg min fo (x, u) , u (1) s.t. g(x, u) = 0, h(x, u) ≤ 0. Note that (1) is static in the sense that it does not consider the future evolution of the state x or the corresponding future values of cost fo . We apply this static problem to sequential control tasks by repeatedly solving (1) at each time step. Note that this simplification from an explicitly dynamic problem formulation (i.e. one in which the objective function incorporates future costs) is purely for ease of exposition and for consistency with the OPF literature as in [Sondermeijer et al., 2016]. We could also consider the optimal policy which solves a dynamic optimal control or RL problem and the decentralized learning step in Sec. 3.1 would remain the same. Since (1) is static, applying the learned decentralized policies repeatedly over time may lead to dynamical instability. Identifying when this will and will not occur is a key challenge in verifying the regression-based decentralization method, however it is beyond the scope of this work. 3.1 Decentralized Learning We interpret the process of solving (1) as applying a well-defined function or stationary Markov policy π ∗ : X −→ U that maps an input collective state x to the optimal collective control or action u∗ . We presume that this solution exists and can be computed offline. Our objective is to learn C decentralized policies ûi = π̂i (xi ), one for each agent i ∈ C, based on T historical measurements of the states {x[t]}Tt=1 and the offline computation of the corresponding optimal actions {u∗ [t]}Tt=1 . 2 x1 u2 x2 x3 x4 x5 x6 u5 u6 (a) Distributed multi-agent problem. u1* ui* u C* x1 xj xN û1 ûi ûC (b) Graphical model of dependency structure. Figure 1: (a) shows a connected graph corresponding to a distributed multi-agent system. The circles denote the local state xi of an agent, the dashed arrow denotes its action ui , and the double arrows denote the physical coupling between local state variables. (b) shows the Markov Random Field (MRF) graphical model of the dependency structure of all variables in the decentralized learning problem. Note that the state variables xi and the optimal actions u∗i form a fully connected undirected network, and the local policy ûi only depends on the local state xi . Local training sets {x2 [t], u⇤2 [t]}Tt=1 Multi-Agent System Centralized Optimization 2 Data gathering Decentralize Decentralize Decentralized dLearning dLearning Learning Optimal data 3 2 3 2 x⇤ 3 2 ⇤ 3 x1 1 u2 u2 6 .. 7 4 6 . 7 4 . 5 , u5 5 4 .. 5 , 4 u⇤5 5 u6 u⇤6 x6 x⇤6 approximate Local policies û2 = ⇡ ˆ2 (x2 ) û5 = ⇡ˆ5 (x5 ) û6 = ⇡ ˆ6 (x6 ) Figure 2: A flow diagram explaining the key steps of the decentralized regression method, depicted for the example system in Fig. 1a. We first collect data from a multi-agent system, and then solve the centralized optimization problem using all the data. The data is then split into smaller training and test sets for all agents to develop individual decentralized policies π̂i (xi ) that approximate the optimal solution of the centralized problem. These policies are then implemented in the multi-agent system to collectively achieve a common global behavior. Although each policy π̂i individually aims to approximate u∗i based on local state xi , we are able to reason about how well their collective action can approximate π ∗ . Figure 2 summarizes the decentralized learning setup. More formally, we describe the dependency structure of the individual policies π̂i : Rαi −→ Rβi with a Markov Random Field (MRF) graphical model, as shown in Fig. 1b. The ûi are only allowed to depend on local state xi while the u∗i may depend on the full state x. With this model, we can determine how information is distributed among different variables and what information-theoretic constraints the policies {π̂i }i∈C are subject to when collectively trying to reconstruct the centralized policy π ∗ . Note that although we may refer to π ∗ as globally optimal, this is not actually required for us to reason about how closely the π̂i approximate π ∗ . That is, our analysis holds even if (1) is solved using approximate methods. In a dynamical reformulation of (1), for example, π ∗ could be generated using techniques from deep RL. 3.2 A Rate-Distortion Framework We approach the problem of how well the decentralized policies π̂i can perform in theory from the perspective of rate distortion. Rate distortion theory is a sub-field of information theory which provides a framework for understanding and computing the minimal distortion incurred by any given compression scheme. In a rate distortion context, we can interpret the fact that the output of each individual policy π̂i depends only on the local state xi as a compression of the full state x. For a detailed overview, see [Cover and Thomas, 2012, Chapter 10]. We formulate the following variant of the the classical rate distortion problem D∗ = min∗ p(û|u ) s.t. E [d(û, u∗ )] , I(ûi ; u∗j ) ≤ I(xi ; u∗j ) , γij , I(ûi ; ûj ) ≤ I(xi ; xj ) , δij , ∀i, j ∈ C , 3 (2) where I(·, ·) denotes mutual information and d(·, ·) an arbitrary non-negative distortion measure. As usual, the minimum distortion between random variable u∗ and its reconstruction û may be found by minimizing over conditional distributions p(û|u∗ ). The novelty in (2) lies in the structure of the constraints. Typically, D∗ is written as a function D(R), where R is the maximum rate or mutual information I(û; u∗ ). From Fig. 1b however, we know that pairs of reconstructed and optimal actions cannot share more information than is contained in the intermediate nodes in the graphical model, e.g. û1 and u∗1 cannot share more information than x1 and u∗1 . This is a simple consequence of the data processing inequality [Cover and Thomas, 2012, Thm. 2.8.1]. Similarly, the reconstructed optimal actions at two different nodes cannot be more closely related than the measurements xi ’s from which they are computed. The resulting constraints are fixed by the joint distribution of the state x and the optimal actions u∗ . That is, they are fully determined by the structure of the optimization problem (1) that we wish to solve. We emphasize that we have made virtually no assumptions about the distortion function. For the remainder of this paper, we will measure distortion as the deviation between ûi and u∗i . However, we could also define it to be the suboptimality gap fo (x, û) − fo (x, u∗ ), which may be much more complicated to compute. This definition could allow us to reason explicitly about the cost of decentralization, and it could address the valid concern that the optimal decentralized policy may bear no resemblance to π ∗ . We leave further investigation for future work. 3.3 Example: Squared Error, Jointly Gaussian To provide more intuition into the rate distortion framework, we consider an idealized example in which the xi , ui ∈ R1 . Let d(û, u∗ ) = kû − u∗ k22 be the squared error distortion measure, and assume the state x and optimal actions u∗ to be jointly Gaussian. These assumptions allow us to derive an explicit formula for the optimal distortion D∗ and corresponding regression policies π̂i . We begin by stating an identity for two jointly Gaussian X, Y ∈ R with correlation ρ: I(X; Y ) ≤ γ ⇐⇒ ρ2 ≤ 1 − e−2γ , which follows immediately from the definition of mutual information and the formula for the entropy of a Gaussian random variable. Taking ρûi ,u∗i to be the correlation between ûi and u∗i , σû2 i and σu2 ∗i to be the variances of ûi and u∗i respectively, and assuming that u∗i and ûi are of equal mean (unbiased policies π̂i ), we can show that the minimum distortion attainable is   D∗ = min∗ E ku∗ − ûk22 : ρ2ûi ,u∗i ≤ 1 − e−2γii = ρ2u∗i ,xi , ∀i ∈ C , (3) p(û|u )  X = min σu2 ∗i + σû2 i − 2ρûi ,u∗i σu∗i σûi : ρ2ûi ,u∗i ≤ ρ2u∗i ,xi , (4) {ρûi ,u∗ },{σûi } i = min {σûi } = X i X i σu2 ∗i i + σû2 i − 2ρu∗i ,xi σu∗i σûi σu2 ∗i (1 − ρ2u∗i ,xi ) .  , (5) (6) In (4), we have solved for the optimal correlations ρûi ,u∗i . Unsurprisingly, the optimal value turns out to be the maximum allowed by the mutual information constraint, i.e. ûi should be as correlated to u∗i as possible, and in particular as much as u∗i is correlated to xi . Similarly, in (5) we solve for the optimal σûi , with the result that at optimum, σûi = ρu∗i ,xi σu∗i . This means that as the correlation between the local state xi and the optimal action u∗i decreases, the variance of the estimated action ûi decreases as well. As a result, the learned policy will increasingly “bet on the mean” or “listen less” to its local measurement to approximate the optimal action. Moreover, we may also provide a closed form expression for the regressor which achieves the minimum distortion D∗ . Since we have assumed that each u∗i and the state x are jointly Gaussian, we may write any u∗i as an affine function of xi plus independent Gaussian noise. Thus, the minimum mean squared estimator is given by the conditional expectation ûi = π̂i (xi ) = E [u∗i |xi ] = E [u∗i ] + ρu∗i xi σu∗i (xi − E [xi ]) . σxi (7) Thus, we have found a closed form expression for the best regressor π̂i to predict u∗i from only xi in the joint Gaussian case with squared error distortion. This result comes as a direct consequence of knowing the true parameterization of the joint distribution p(u∗ , x) (in this case, as a Gaussian). 3.4 Determining Minimum Distortion in Practice Often in practice, we do not know the parameterization p(u∗ |x) and hence it may be intractable to determine D∗ and the corresponding decentralized policies π̂i . However, if one can assume that p(u∗ |x) belongs to a family of parameterized functions (for instance universal function approximators such as deep neural networks), then it is theoretically possible to attain or at least approach minimum distortion for arbitrary non-negative distortion measures. 4 Practically, one can compute the mutual information constraint I(u∗i , xi ) from (2) to understand how much information a regressor π̂i (xi ) has available to reconstruct u∗i . In the Gaussian case, we were able to compute this mutual information in closed form. For data from general distributions however, there is often no way to compute mutual information analytically. Instead, we rely on access to sufficient data {x[t], u∗ [t]}Tt=1 , in order to estimate mutual informations numerically. In such situations (e.g. Sec. 5), we discretize the data and then compute mutual information with a minimax risk estimator, as proposed by Jiao et al. [2014]. 4 Allowing Restricted Communication Suppose that a decentralized policy π̂i suffers from insufficient mutual information between its local measurement xi and the optimal action u∗i . In this case, we would like to quantify the potential benefits of communicating with other nodes j 6= i in order to reduce the distortion limit D∗ from (2) and improve its ability to reconstruct u∗i . In this section, we present an information-theoretic solution to the problem of how to choose optimally which other data to observe, and we provide a lower bound-achieving solution for the idealized Gaussian case introduced in Sec. 3.3. We assume that in addition to observing its own local state xi , each π̂i is allowed to depend on at most k other xj6=i . Theorem 1. (Restricted Communication) If Si is the set of k nodes j 6= i ∈ N which ûi is allowed to observe in addition to xi , then setting Si = arg max I(u∗i ; xi , {xj : j ∈ S}) : |S| = k , S (8) minimizes the best-case expectation of any distortion measure. That is, this choice of Si yields the smallest lower bound D∗ from (2) of any possible choice of S. Proof. By assumption, Si maximizes the mutual information between the observed local states {xi , xj : j ∈ Si } and the optimal action u∗i . This mutual information is equivalent to the notion of rate R in the classical rate distortion theorem [Cover and Thomas, 2012]. It is well-known that the distortion rate function D(R) is convex and monotone decreasing in R. Thus, by maximizing mutual information R we are guaranteed to minimize distortion D(R), and hence D∗ . Theorem 1 provides a means of choosing a subset of the state {xj : j 6= i} to communicate to each decentralized policy π̂i that minimizes the corresponding best expected distortion D∗ . Practically speaking, this result may be interpreted as formalizing the following intuition: “the best thing to do is to transmit the most information.” In this case, “transmitting the most information” corresponds to allowing π̂i to observe the set S of nodes {xj : j 6= i} which contains the most information about u∗i . Likewise, by “best” we mean that Si minimizes the best-case expected distortion D∗ , for any distortion metric d. As in Sec. 3.3, without making some assumption about the structure of the distribution of x and u∗ , we cannot guarantee that any particular regressor π̂i will attain D∗ . Nevertheless, in a practical situation where sufficient data {x[t], u∗ [t]}Tt=1 is available, we can solve (8) by estimating mutual information [Jiao et al., 2014]. 4.1 Example: Joint Gaussian, Squared Error with Communication Here, we reexamine the joint Gaussian-distributed, mean squared error distortion case from Sec. 3.3, and apply Thm. 1. We will take u∗ ∈ R1 , x ∈ R10 and u∗ , x jointly Gaussian with zero mean and arbitrary covariance. The specific covariance matrix Σ of the joint distribution p(u∗ , x) is visualized in Fig. 3a. For simplicity, we show the squared correlation coefficients of Σ which lie in [0, 1]. The boxed cells in Σ in Fig. 3a indicate that x9 solves (8), i.e. j = 9 maximizes I(u∗ ; x1 , xj ) the mutual information between the observed data and regression target u∗ . Intuitively, this choice of j is best because x9 is highly correlated to u∗ and weakly correlated to x1 , which is already observed by û; that is, it conveys a significant amount of information about u∗ that is not already conveyed by x1 . Figure 3b shows empirical results. Along the horizontal axis we increase the value of k, the number of additional variables xj which regressor π̂i observes. The vertical axis shows the resulting average distortion. We show results for a linear regressor of the form of (7) where we have chosen Si optimally according to (8), as well as uniformly at random from all possible sets of unique indices. Note that the optimal choice of Si yields the lowest average distortion D∗ for all choices of k. Moreover, the linear regressor of (7) achieves D∗ for all k, since we have assumed a Gaussian joint distribution. 5 Application to Optimal Power Flow In this case study, we aim to minimize the voltage variability in an electric grid caused by intermittent renewable energy sources and the increasing load caused by electric vehicle charging. We do so by controlling the reactive power output of distributed energy resources (DERs), while adhering to the physics of power flow and constraints due to energy capacity and safety. Recently, various approaches have been proposed, such as [Farivar et al., 2013] or [Zhang et al., 2014]. In these methods, DERs tend to rely on an extensive communication infrastructure, either with a central master node [Xu et al., 5 1 u∗ x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 25 optimal strategy 20 0.6 15 average random strategy MSE 0.8 0.4 10 0.2 5 0 u∗ x1 x2 x3 x4 x5 x6 x7 x8 x9 x10 0 2 4 6 8 10 Additional Observations k (a) Squared correlation coefficients. (b) Comparison of communication strategies. Figure 3: Results for optimal communication strategies on a synthetic Gaussian example. (a) shows squared correlation coefficients between of u∗ and all xi ’s. The boxed entries correspond to x9 , which was found to be optimal for k = 1. (b) shows that the optimal communication strategy of Thm. 1 achieves the lowest average distortion and outperforms the average over random strategies. 2017] or between agents leveraging local computation [Dall’Anese et al., 2014]. We study regression-based decentralization as outlined in Sec. 3 and Fig. 2 to the optimal power flow (OPF) problem [Low, 2014], as initially proposed by Sondermeijer et al. [2016]. We apply Thm. 1 to determine the communication strategy that minimizes optimal distortion to further improve the reconstruction of the optimal actions u∗i . Solving OPF requires a model of the electricity grid describing both topology and impedances; this is represented as a graph G = (N , E). For clarity of exposition and without loss of generality, we introduce the linearized power flow equations over radial networks, also known as the LinDistFlow equations [Baran and Wu, 1989]: X Pij = Pjk + pcj − pgj , (9a) (j,k)∈E,k6=i Qij = X (j,k)∈E,k6=i Qjk + qjc − qjg , vj = vi − 2 (rij Pij + ξij Qij ) (9b) (9c) In this model, capitals Pij and Qij represent real and reactive power flow on a branch from node i to node j for all branches g g (i, j) ∈ E, lower case pci and qic are the real and reactive √ power consumption at node i, and pi and qi are its real and reactive power generation. Complex line impedances rij + −1ξij have the same indexing as the power flows. The LinDistFlow equations use the squared voltage magnitude vi , defined and indexed at all nodes i ∈ N . These equations are included as constraints in the optimization problem to enforce that the solution adheres to laws of physics. To formulate our decentralized learning problem, we will treat xi , (pci , qic , pgi ) to be the local state variable, and, for all controllable nodes, i.e. agents i ∈ C, we have ui , qig , i.e. the reactive power generation can be controlled (vi , Pij , Qij are treated as dummy variables). We assume that for all nodes i ∈ N , consumption pci , qic and real power generation pgi are predetermined respectively by the demand and the power generated by a potential photovoltaic (PV) system. The action space is constrained by the reactive power capacity |ui | = |qig | ≤ q̄i . In addition, voltages are maintained within ±5% of 120V , which is expressed as the constraint v ≤ vi ≤ v . The OPF problem now reads X |vi − vref | , (10) u∗ = arg g min qi , ∀i∈C s.t. i∈N (9) , |qig | ≤ q̄i , v ≤ vi ≤ v . Following Fig. 2, we employ models of real electrical distribution grids (including the IEEE Test Feeders [IEEE PES, 2017]), which we equip with with T historical readings {x[t]}Tt=1 of load and PV data, which is composed with real smart meter measurements sourced from Pecan Street Inc. [2017]. We solve (10) for all data, yielding a set of minimizers {u∗ [t]}Tt=1 . We then separate the overall data set into C smaller data sets {xi [t], u∗i [t]}Tt=1 , ∀i ∈ C and train linear policies with feature kernels φi (·) and parameters θi of the form π̂i (xi ) = θi> φi (xi ). Practically, the challenge is to select the best feature kernel φi (·). We extend earlier work which showed that decentralized learning for OPF can be done satisfactorily via a hybrid forward- and backward-stepwise selection algorithm [Friedman et al., 2001, Chapter 3] that uses a quadratic feature kernels. Figure 4a shows the result for an electric distribution grid model based on a real network from Arizona. This network has 129 nodes and, in simulation, 53 nodes were equipped with a controllable DER (i.e. N = 129, C = 53). In Fig. 4a we show the voltage deviation from a normalized setpoint on a simulated network with data not used during training. The improvement over the no-control baseline is striking, and performance is nearly identical to the optimum achieved by the 6 2 ×10−3 linear, random linear, optimal quadratic, random quadratic, optimal 1.8 MSE 1.6 1.4 1.2 1 0 1 2 3 4 5 Additional Observations k (a) Voltage output with and without control. (b) Comparison of OPF communication strategies. Figure 4: Results for decentralized learning on an OPF problem. (a) shows an example result of decentralized learning the shaded region represents the range of all voltages in a network over a full day. As compared to no control, the fully decentralized regression-based control reduces voltage variation and prevents constraint violation (dashed line). (b) shows that the optimal communication strategy Si outperforms the average for random strategies on the mean squared error distortion metric. The regressors used are stepwise linear policies π̂i with linear or quadratic features. centralized solution. Concretely, we observed: (i) no constraint violations, and (ii) a suboptimality deviation of 0.15% on average, with a maximum deviation of 1.6%, as compared to the optimal policy π ∗ . In addition, we applied Thm. 1 to the OPF problem for a smaller network [IEEE PES, 2017], in order to determine the optimal communication strategy to minimize a squared error distortion measure. Fig. 4b shows the mean squared error distortion measure for an increasing number of observed nodes k and shows how the optimal strategy outperforms an average over random strategies. 6 Conclusions and Future Work This paper generalizes the approach of Sondermeijer et al. [2016] to solve multi-agent static optimal control problems with decentralized policies that are learned offline from historical data. Our rate distortion framework facilitates a principled analysis of the performance of such decentralized policies and the design of optimal communication strategies to improve individual policies. These techniques work well on a model of a sophisticated real-world OPF example. There are still many open questions about regression-based decentralization. It is well known that strong interactions between different subsystems may lead to instability and suboptimality in decentralized control problems [Davison and Chang, 1990]. There are natural extensions of our work to address dynamic control problems more explicitly, and stability analysis is a topic of ongoing work. Also, analysis of the suboptimality of regression-based decentralization should be possible within our rate distortion framework. Finally, it is worth investigating the use of deep neural networks to parameterize both the distribution p(u∗ |x) and local policies π̂i in more complicated decentralized control problems with arbitrary distortion measures. References P. Abbeel and A. Y. Ng. Apprenticeship Learning via Inverse Reinforcement Learning. In International Conference on Machine Learning, New York, NY, USA, 2004. ACM. R. J. Aumann and J. H. Dreze. Cooperative games with coalition structures. International Journal of Game Theory, 3(4): 217–237, Dec. 1974. M. Baran and F. Wu. Optimal capacitor placement on radial distribution systems. IEEE Transactions on Power Delivery, 4 (1):725–734, Jan. 1989. S. Boyd, N. Parikh, E. Chu, B. Peleato, and J. Eckstein. Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers. Foundations and Trends R in Machine Learning, 3(1):1–122, July 2011. M. Brambilla, E. Ferrante, M. Birattari, and M. Dorigo. Swarm robotics: a review from the swarm engineering perspective. Swarm Intelligence, 7(1):1–41, Mar. 2013. P. D. Christofides, R. Scattolini, D. M. de la Pena, and J. Liu. Distributed model predictive control: A tutorial review and future research directions. Computers & Chemical Engineering, 51:21–41, 2013. 7 T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley & Sons, 2012. E. Dall’Anese, S. V. Dhople, and G. Giannakis. Optimal dispatch of photovoltaic inverters in residential distribution systems. Sustainable Energy, IEEE Transactions on, 5(2):487–497, 2014. URL http://ieeexplore.ieee.org/xpls/abs_all.jsp? arnumber=6719562. E. J. Davison and T. N. Chang. Decentralized stabilization and pole assignment for general proper systems. IEEE Transactions on Automatic Control, 35(6):652–664, 1990. M. Farivar, L. Chen, and S. Low. Equilibrium and dynamics of local voltage control in distribution systems. In 2013 IEEE 52nd Annual Conference on Decision and Control (CDC), pages 4329–4334, Dec. 2013. doi: 10.1109/CDC.2013.6760555. J. Friedman, T. Hastie, and R. Tibshirani. The elements of statistical learning, volume 1. Springer series in statistics Springer, Berlin, 2001. C. V. Goldman and S. Zilberstein. Decentralized control of cooperative systems: Categorization and complexity analysis. J. Artif. Int. Res., 22(1):143–174, Nov. 2004. ISSN 1076-9757. URL http://dl.acm.org/citation.cfm?id=1622487.1622493. IEEE PES. IEEE Distribution Test Feeders, 2017. URL http://ewh.ieee.org/soc/pes/dsacom/testfeeders/. J. Jiao, K. Venkat, Y. Han, and T. Weissman. Minimax Estimation of Functionals of Discrete Distributions. arXiv preprint, June 2014. arXiv: 1406.6956. S. Low. Convex Relaxation of Optimal Power Flow; Part I: Formulations and Equivalence. IEEE Transactions on Control of Network Systems, 1(1):15–27, Mar. 2014. J. Lunze. Feedback Control of Large Scale Systems. Prentice Hall PTR, Upper Saddle River, NJ, USA, 1992. ISBN 013318353X. P. J. Modi, W.-M. Shen, M. Tambe, and M. Yokoo. Adopt: Asynchronous distributed constraint optimization with quality guarantees. Artif. Intell., 161(1-2):149–180, Jan. 2005. ISSN 0004-3702. doi: 10.1016/j.artint.2004.09.003. URL http://dx.doi.org/10.1016/j.artint.2004.09.003. R. Nair, P. Varakantham, M. Tambe, and M. Yokoo. Networked Distributed POMDPs: A synthesis of distributed constraint optimization and POMDPs. In AAAI, volume 5, pages 133–139, 2005. F. A. Oliehoek and C. Amato. A Concise Introduction to Decentralized POMDPs. Springer International Publishing, 1 edition, 2016. P. A. Ortega, D. A. Braun, J. Dyer, K.-E. Kim, and N. Tishby. Information-Theoretic Bounded Rationality. arXiv preprint, 2015. arXiv:1512.06789. Pecan Street Inc. Dataport, 2017. URL http://www.pecanstreet.org/. L. Peshkin, K.-E. Kim, N. Meuleau, and L. P. Kaelbling. Learning to cooperate via policy search. In Proceedings of the Sixteenth Conference on Uncertainty in Artificial Intelligence, UAI’00, pages 489–496, San Francisco, CA, USA, 2000. Morgan Kaufmann Publishers Inc. ISBN 1-55860-709-9. URL http://dl.acm.org/citation.cfm?id=2073946.2074003. Y. Pu, M. N. Zeilinger, and C. N. Jones. Inexact fast alternating minimization algorithm for distributed model predictive control. In Conference on Decision and Control, Los Angeles, CA, USA, 2014. IEEE. R. L. Raffard, C. J. Tomlin, and S. P. Boyd. Distributed optimization for cooperative agents: Application to formation flight. In Conference on Decision and Control, Nassau, The Bahamas, 2004. IEEE. C. Sammut. Automatic construction of reactive control systems using symbolic machine learning. The Knowledge Engineering Review, 11(01):27–42, 1996. D. D. Siljak. Decentralized control of complex systems. Dover Books on Electrical Engineering. Dover, New York, NY, 2011. URL http://cds.cern.ch/record/1985961. O. Sondermeijer, R. Dobbe, D. B. Arnold, C. Tomlin, and T. Keviczky. Regression-based Inverter Control for Decentralized Optimal Power Flow and Voltage Regulation. In Power and Energy Society General Meeting, Boston, MA, USA, July 2016. IEEE. A. X. Sun, D. T. Phan, and S. Ghosh. Fully decentralized AC optimal power flow algorithms. In Power and Energy Society General Meeting, Vancouver, Canada, July 2013. IEEE. Y. Xu, Z. Y. Dong, R. Zhang, and D. J. Hill. Multi-Timescale Coordinated Voltage/Var Control of High RenewablePenetrated Distribution Systems. IEEE Transactions on Power Systems, PP(99):1–1, 2017. ISSN 0885-8950. doi: 10.1109/TPWRS.2017.2669343. 8 M. N. Zeilinger, Y. Pu, S. Riverso, G. Ferrari-Trecate, and C. N. Jones. Plug and play distributed model predictive control based on distributed invariance and optimization. In Conference on Decision and Control, Florence, Italy, 2013. IEEE. B. Zhang, A. Lam, A. Dominguez-Garcia, and D. Tse. An Optimal and Distributed Method for Voltage Regulation in Power Distribution Systems. IEEE Transactions on Power Systems, PP(99):1–13, 2014. ISSN 0885-8950. doi: 10.1109/TPWRS.2014.2347281. 9
7cs.IT
Permutation monoids and MB-homogeneous structures arXiv:1802.04166v1 [math.GR] 12 Feb 2018 Thomas D. H. Coleman1, David M. Evans2, Robert D. Gray3,4 February 13, 2018 Abstract In this paper, we investigate the connection between infinite permutation monoids and bimorphism monoids of first-order structures. Taking our lead from the study of automorphism groups of structures as infinite permutation groups and the more recent developments in the field of homomorphism-homogeneous structures, we establish a series of results that underline this connection. Of particular interest is the idea of MB-homogeneity; a relational structure M is MB-homogeneous if every monomorphism between finite substructures of M extends to a bimorphism of M. The results in question include a characterisation of closed permutation monoids, a Fraı̈ssé-like theorem for MB-homogeneous structures, and the construction of 2ℵ0 pairwise non-isomorphic countable MB-homogeneous graphs. We prove that any finite group arises as the automorphism group of some MB-homogeneous graph and use this to construct oligomorphic permutation monoids with any given finite group of units. We also consider MB-homogeneity for various well-known examples of homogeneous structures and in particular give a complete classification of countable homogeneous undirected graphs that are also MB-homogeneous. Keywords: bimorphisms, MB-homogeneous, cancellative monoids, permutation monoids, oligomorphic transformation monoids, homomorphism-homogeneous structures, infinite graph theory. 2010 Mathematics Subject Classification: 20M99, 03C15, 05C63 Let M be a first-order structure with automorphism group Aut(M). As “structure is whatever is preserved by automorphisms” [17], the automorphism group is a key concept in understanding the model theory of M. Every automorphism of M is a permutation of the domain M of M; hence we can view Aut(M) as an infinite permutation group. Much of the existing literature in this field explores connections between infinite permutation group theory and model theory; see [2] and [7] for instance. More recent work has studied the endomorphism monoid End(M) of a first-order structure M; analogously, these are examples of infinite transformation monoids. By imposing additional conditions on the type of endomorphism of M, we can obtain various 1 School of Mathematics and Statistics, University of St Andrews, St Andrews, KY16 9SS, United Kingdom. Email: [email protected]. 2 Department of Mathematics, Imperial College London, South Kensington Campus, London, SW7 2AZ, United Kingdom. Email: [email protected]. 3 School of Mathematics, University of East Anglia, Norwich, NR4 7TJ, United Kingdom. Email: [email protected]. 4 This work was supported by the EPSRC grant EP/N033353/1 ‘Special inverse monoids: subgroups, structure, geometry, rewriting systems and the word problem’. 1 submonoids of End(M). These various natural monoids of transformations associated with a first-order structure M have been studied by Lockett and Truss [20, 21]. The principal aim of papers by Cameron and Nešetřil [9], Mašulović [23], [24], Mašulović and Pech [25], Lockett and Truss [20, 21], and Hartman, Hubička and Mašulović [16] focus on generalising the current theory on infinite permutation groups to the case of infinite transformation monoids; particularly in the case of End(M). Research on End(M) is not restricted to finding analogues of results about Aut(M); understanding End(M) is key to the study of the polymorphism clone Pol(M) of M and hence complexity of constraint satisfaction problems [5]. This connection provides motivation for studying endomorphism monoids of first-order structures, and has been extensively studied by Bodirsky [3, 4], Bodirsky and Nešetřil [5] and Bodirsky and Pinsker [6]. The collection of all bijective endomorphisms of a first-order structure M with domain M forms a monoid under the composition operation; we call this the bimorphism monoid of the structure M and denote it by Bi(M). Of course, every automorphism of M is a bijective homomorphism; but in general, the converse does not hold. Hence Bi(M) contains the automorphism group Aut(M) (as its group of units), but is also contained in the symmetric group Sym(M ) since every element of Bi(M) is a bijection from M to itself. Therefore, the bimorphism monoid Bi(M) gives a natural example of a permutation monoid; a monoid where each element is a permutation. In fact, as we shall see for any countable set M , the closed submonoids of the symmetric group Sym(M ) under the pointwise convergence topology are precisely the bimorphism monoids of first-order structures M on the domain M (Theorem 2.1). Although it is a natural concept, permutation monoids have not received much attention in the literature. By definition, every permutation monoid is a group-embeddable monoid. The study of group-embeddable monoids was a principal interest of early semigroup theorists; a well known result (Ore’s Theorem, see [27]) says that a monoid T is embeddable in a group if it is cancellative and satisfies Ore’s condition (for a, b ∈ T , then aT ∩ bT 6= ∅). Furthermore, a monoid T is group-embeddable if and only if M has a faithful representation as a monoid of permutations. Equivalently, M is groupembeddable if and only if M is isomorphic to a submonoid of some symmetric group; that is, a permutation monoid. A result of Reyes [30] (see [7]) states that a subgroup of the infinite symmetric group is closed if and only if it is the automorphism group of some first-order structure. Examples of highly symmetric infinite permutation groups are abundant in the literature, often arising as automorphism groups of structures with “nice” structural conditions; specifically, ℵ0 -categoricity and homogeneity. A structure M is ℵ0 -categorical if and only if M is the unique (up to isomorphism) countable model of the theory Th(M) of M, and it is homogeneous if every isomorphism between finite substructures of M extends to an automorphism of M. The two are related; every homogeneous structure M over a finite relational language is ℵ0 -categorical, and an ℵ0 -categorical structure M is homogeneous if and only if Th(M) has quantifier elimination [22]. Finding examples of ℵ0 -categorical structures provides corresponding examples of interesting permutation groups. It is a famous theorem of Engeler, Ryll-Nardzewski and Svenonius (see [17]) that a structure M is ℵ0 -categorical if and only if Aut(M) has finitely many orbits on M n for every n ∈ N; such groups are called oligomorphic permutation groups. It follows that a potential source of oligomorphic permutation groups are automorphism groups of homogeneous structures over a finite relational language. The celebrated theorem of 2 Fraı̈ssé [14] gives a characterisation of homogeneous structures, which can then be used to construct many examples of structures with an oligomorphic automorphism group. Such structures include the countable dense linear order without endpoints (Q, <), the random graph R, and the generic poset P . This was followed in time by complete classification results for countable homogeneous structures; for posets by Schmerl [32], undirected graphs by Lachlan and Woodrow [19] and directed graphs by Cherlin [10]. In the study of infinite permutation monoids and bimorphism monoids of first-order structures, the natural analogue of homogeneity is MB-homogeneity. A structure M is MB-homogeneous if every finite partial monomorphism of M extends to a bimorphism of M. This notion of homogeneity was first introduced by Lockett and Truss in [20], in which they determined conditions using MB-homogeneity for the existence of generic bimorphisms of a structure. Further results were shown by the same authors [21]; where they classified homomorphism-homogeneous (and hence MB-homogeneous) posets in a wide-ranging result. MB-homogeneity is a natural extension of MM-homogeneity – where every finite partial monomorphism of M extends to a monomorphism of M – which has been more widely considered; for instance, Cameron and Nešetřil [9] demonstrated a Fraı̈ssé-theoretic result about construction and uniqueness of MMhomogeneous structures. The aim of this paper is to develop the theory of infinite permutation monoids, with a particular focus on bimorphism monoids and MB-homogeneous structures. We begin in Section 1 by recalling the definition of an oligomorphic transformation monoid from [25], and extend results of the same paper by considering other self-map monoids as introduced by Lockett and Truss [21]. Section 2 investigates permutation monoids and MB-homogeneity in more detail, including a characterisation of closed permutation monoids (Theorem 2.1) and a Fraı̈ssé-like theorem for MB-homogeneity (Propositions 2.6, 2.7, and 2.8). Section 3 is devoted to MB-homogeneous graphs; including establishing some useful properties of MB-homogeneous graphs, introducing the notion of bimorphism equivalence (Definition 3.7) and demonstrating that there exist 2ℵ0 nonisomorphic MB-homogeneous graphs, each of which is bimorphism equivalent to the random graph R (Theorem 3.20). Furthermore, we show that for any finite group H, there exists a MB-homogeneous graph Γ such that Aut(Γ) ∼ = H (Theorem 3.21); consequently there exists an oligomorphic permutation monoid with H as its group of units. Finally, Section 4 assesses a selection of previously known homogeneous structures to determine whether or not they are MB-homogeneous, culminating in a complete classification of countably infinite graphs that are both homogeneous and MB-homogeneous (Theorem 4.11). Throughout the article, maps act on the right of their arguments, and we compose maps from left to right. A relational first-order signature σ consists of a collection of relations {R̄i : i ∈ I} where each Ri has an arity ni ∈ N for all i ∈ I. A σ-structure with equality M consists of a domain M and subsets Ri ⊆ M ni interpreting R̄i in σ for each i ∈ I. We follow usual convention for notation regarding relations; for a σ-structure M, we write RiM (x̄) if x̄ ∈ Ri ⊆ M ni . All structures M will be countably infinite unless stated otherwise. 3 1 Oligomorphic transformation monoids Let X be a countably infinite set and let T be an infinite submonoid of End(X). Then T is a transformation monoid acting on the set X via (x, α) 7→ xα for all x ∈ X and α ∈ T . We can extend this to an action of T on tuples x̄ ∈ X n , with T acting componentwise on x̄. We begin by outlining some important definitions regarding the notion of orbits on tuples for a transformation monoid; versions of these appear in [33]. Definition 1.1. Let T ⊆ End(X) be a transformation monoid acting on tuples X n as above, and let U be the group of units of T . • Define the forward orbit of a tuple x̄ to be the set F (x̄) = {ȳ ∈ X n : (∃s ∈ T )(x̄s = ȳ)}. • Define the strong orbit of x̄ to be the set S(x̄) = {ȳ ∈ X n : (∃s, t ∈ T )(x̄s = ȳ and ȳt = x̄)}. • Define the group orbit of x̄ to be the set U (x̄) = {ȳ ∈ X n : (∃s ∈ U )(x̄s = ȳ)}. We note immediately that U (x̄) ⊆ S(x̄) ⊆ F (x̄) for any tuple x̄ and that if ȳ ∈ F (x̄) then F (ȳ) ⊆ F (x̄). Furthermore, the relation x̄ ∼ ȳ if and only if x̄ and ȳ are in the same strong orbit is an equivalence relation [33]. In comparison, the forward orbit is reflexive and transitive (and thus a preorder), but it may not be symmetric. This notion therefore differs slightly from Steinberg’s weak orbits, obtained by taking the symmetric-transitive closure of the forward orbit preorder [33]. We outline a basic lemma regarding these orbits which will be useful throughout the section; the proof of this is omitted. Lemma 1.2. Let T be a transformation monoid acting on a set of tuples X n . For any tuple x̄ ∈ X n , we have the following: S (1) F (x̄) = ȳ∈F (x̄) S(ȳ); S  (2) S(x̄) = ȳ∈S(x̄) U (ȳ). Recall that a permutation group G ⊆ Sym(X) acts oligomorphically on X if and only if there are finitely many orbits on X n for every n ∈ N [7]. If the action of G componentwise on tuples of X is oligomorphic, we say that G is an oligomorphic permutation group. The next definition, originally of [25], places these concepts in the context of transformation monoids. Definition 1.3. We say that a transformation monoid T ⊆ End(X) acts oligomorphically on X if and only if there are finitely many strong orbits on X n for every n ∈ N. If the componentwise action of T on tuples of X is oligomorphic, then call T an oligomorphic transformation monoid. We note that if T is itself a group, then the strong orbits are the group orbits and the definitions coincide; so any oligomorphic permutation group is an oligomorphic transformation monoid. Our next result provides more connections between oligomorphic permutation groups and oligomorphic transformation monoids, generalising [25, Lemma 2.10]. 4 Proposition 1.4. Let T ⊆ End(X) be a transformation monoid with group of units U . If U is an oligomorphic permutation group then T is an oligomorphic transformation monoid. Proof. As U is an oligomorphic permutation group, there are finitely many group orbits U (ȳ) with y ∈ X n for every n ∈ N. As every strong orbit S(x̄) arises as the union of group orbits U (ȳ), we conclude that there are at most finitely many strong orbits of T acting on X n for every natural number n by Lemma 1.2. Remark. By the Ryll-Nardzewski theorem (see [17]), U is an oligomorphic permutation group if and only if it is the automorphism group of some ℵ0 -categorical structure M. By this proposition and the fact that Aut(M) acts as the group of units for any endomorphism monoid of M, we conclude that if M is ℵ0 -categorical then T ∈ {End(M), Epi(M), Mon(M), Bi(M), Emb(M)} is an oligomorphic transformation monoid. (See [21] for the definitions of these various transformation monoids.) This result provides us with numerous examples of oligomorphic transformation monoids, with the caveat that they are closely related to ℵ0 -categorical structures via their group of units. The main result of this section distances the notion of oligomorphicity in monoids from ℵ0 -categoricity by providing a different source of suitable examples; but first we detail some preliminary conditions. In the same way that homogeneous structures over a finite language provide examples of ℵ0 -categorical structures (and hence oligomorphic permutation groups), we turn to homomorphism-homogeneity to provide examples of oligomorphic transformation monoids. In the table below, we recall the eighteen different notions of homomorphism-homogeneity as presented in the two papers of Lockett and Truss [20, 21]. isomorphism (I) monomorphism (M) homomorphism (H) End(M) (H) IH MH HH Epi(M) (E) IE ME HE Mon(M) (M) IM MM HM Bi(M) (B) IB MB HB Emb(M) (I) II MI HI Aut(M) (A) IA MA HA Table 1: Table of XY-homogeneity: a first-order structure M is XY-homogeneous if a finite partial map of type X (column) extends to a map of type Y (row) in the associated monoid. We note that if a structure M is XY-homogeneous then it is also IY-homogeneous. For shorthand in our next result, denote the monoid of maps of type Y by Y(M) for some structure M. For example, H(M) is the endomorphism monoid of M, and A(M) is the automorphism group. A previous observation of Lockett and Truss in [21] says that an endomorphism of a finite relational structure is an automorphism if and only if it is a bijection. Lemma 1.5. If A and B are finite σ-structures and f : A − → B and g : B − → A are ∼ bijective homomorphisms, then A = B and f, g are isomorphisms. 5 Proof. The composition map f g : A − → A is a bijective endomorphism of A; by the observation above, f g must be an automorphism of A. For some ā ∈ Ani , if ¬RiA (ā) and RiB (āf ), then RiA (āf g) as g is a homomorphism. Since f g is an automorphism this is a contradiction; so f must preserve non-relations and is therefore an isomorphism. A similar argument applies to show that g is an isomorphism. Proposition 1.6. Let M be an XY-homogeneous structure with domain M . Then two tuples ā = (a1 , . . . , an ) and b̄ = (b1 , . . . , bn ) are in the same strong orbit of Y(M) if and only if there exists a partial isomorphism f of M such that āf = b̄. Proof. Suppose that α, β ∈ Y(M) are maps such that āα = b̄ and b̄β = ā respectively; so ai α = bi and bi β = ai for 1 ≤ i ≤ n. If α sends elements ai 6= aj of ā to elements ai α = aj α of b̄, then we have that ai αβ = aj αβ and so ai = aj ; a contradiction. Hence the restrictions α|ā and β|b̄ are injective maps and so they are also bijections. Now, we → A, where A, B are the structures induced consider the maps α|ā : A − → B and β|b̄ : B − by M on ā, b̄ respectively. By Lemma 1.5, we see that A ∼ = B and so we can define f = α|ā . Conversely, we see that if f is an isomorphism between the structures A and B; by XY-homogeneity (and hence IY-homogeneity) of M, we extend f to a map α ∈ Y(M) such that āα = b̄. Similarly, we extend the map f −1 : B − → A to a map β ∈ Y(M) such that b̄β = ā and so ā and b̄ are in the same strong orbit. We now move on to proving the final result of this section. A result of [7, ch2] states that, for Aut(M) acting on M n , the number of group orbits on n-tuples is finite if the number of group orbits on k-tuples of distinct elements is finite for every k ≤ n. Using the fact from Proposition 1.6 that maps between two tuples in the same strong orbit are bijections, it is not hard to show that a similar result holds for the number of strong orbits of n-tuples when Y(M) is acting on M n . This, together with Proposition 1.6, proves the following theorem. Theorem 1.7. If M is an XY-homogeneous structure over a finite relational language, then Y(M) is an oligomorphic transformation monoid. Proof. As M is over a finite relational language, it has finitely many isomorphism types on k-tuples of distinct elements for any k ∈ N; by Proposition 1.6, there are finitely many strong orbits on k-tuples of distinct elements for every k ∈ N. The result then follows from the observation above. Using this theorem, we can find examples of structures with oligomorphic transformation monoids that are not ℵ0 -categorical; for instance, any homomorphism-homogeneous poset not in Schmerl’s classification (see [23] or [21]) has an oligomorphic endomorphism monoid. A notable instance is Corollary 2.2(a) in [9]; there exists a countably infinite graph Γ with oligomorphic endomorphism (and monomorphism) monoid but a trivial automorphism group. Of particular interest to this paper is the idea of an oligomorphic permutation monoid. This follows as a special case of Definition 1.3, where the transformation monoid T is also a permutation monoid. It is a corollary of Theorem 1.7 that if M is an MB-homogeneous structure over a finite relational language, then Bi(M) is an oligomorphic permutation monoid. It follows that finding MB-homogeneous structures give interesting examples of permutation monoids; this motivates the study of MBhomogeneous structures in Section 2. 6 2 Permutation monoids and MB-homogeneity Among the endomorphism monoids of a first-order structure M mentioned in the introduction was the collection of bimorphisms Bi(M). As a set of endomorphisms it is a submonoid of End(M); however as a collection of bijective maps it is a submonoid of Sym(M ), the symmetric group on the domain of M . It follows that Bi(M) is a group-embeddable monoid and so it acts on M by permutations as opposed to transformations. Thus Bi(M) (for a countably infinite M) expressed in this fashion is an infinite permutation monoid. This section is devoted to the study of infinite permutation monoids, outlining some general properties and presenting a method for constructing interesting infinite permutation monoids via MB-homogeneous structures. To start, recall that the symmetric group Sym(M ) on a countably infinite set M has a natural topology given by pointwise convergence, with a basis for open sets given by the cosets of stabilizers of tuples. It is well-known ([30], see 4.1.4 in [17]) that G ≤ Sym(M ) is closed under the pointwise convergence topology if and only if it is the automorphism group of some first-order structure M on domain M . This was generalised by Cameron and Nešetřil [9] to closed submonoids T ≤ End(M ) under the product topology; this occurs if and only if T is the endomorphism monoid of some first-order structure M on domain M . Our first proposition provides an analogous result for closed permutation monoids; the proof of which is similar to other results along these lines. To do this, we recall the following standard result from point-set topology [29, Theorem 17.2]; if Y is a subspace of some topological space X, then a set A is closed in Y under the subspace topology inherited from X if and only if A = Y ∩B, where B is some closed set in X. Furthermore, the pointwise convergence topology on Sym(M ) is the same as the topology induced on the set by End(M ) via the inclusion map: so Sym(M ) is a subspace of End(M ). Theorem 2.1. Let M be a countable set. A submonoid T of Sym(M ) is closed under the pointwise convergence topology if and only if it is the bimorphism monoid of some structure M on domain M . Proof. We begin with the converse direction. Suppose that T = Bi(M) is the bimorphism monoid of a structure M on domain M . As Sym(M ) is a subspace of End(M ), and Bi(M) is the intersection of Sym(M ) and the closed set End(M) of End(M ), it follows from the result above that Bi(M) is closed in Sym(M ). For the forward direction, assume that T is a closed submonoid of Sym(M ). Define an n-ary relation Rx̄ by Rx̄ (ȳ) ⇔ (∃s ∈ T )(x̄s = ȳ) for each n ∈ N and x̄ ∈ M n . Let M be the relational structure on M with relations Rx̄ for all tuples x̄ ∈ M n and all n ∈ N. The proof that T = Bi(M) is by containment both ways. As every element of T is already a permutation of the domain M of M, proving that T acts as endomorphisms on M is enough to show that T ⊆ Bi(M). Assume then that s ∈ T and ȳ ∈ M n such that Rx̄ (ȳ) holds; as this happens, there exists an s′ ∈ T such that x̄s′ = ȳ. Therefore x̄s′ s = ȳs and so Rx̄ (ȳs) holds; so T ⊆ End(M) and hence T ⊆ Bi(M). It remains to show that Bi(M) ⊆ T ; so suppose that α ∈ Bi(M). Our aim is to show that α is a limit point of T ; as T is closed, it must contain all its limit points. 7 Note that each n-tuple x̄ defines a neighbourhood of α, consisting of all functions β such that x̄α = x̄β. As T is a monoid, it follows that Rx̄ (x̄) holds and so Rx̄ (x̄α) holds. By definition of Rx̄ , there exists s ∈ T such that x̄α = x̄s; hence α is a limit point of T . Therefore α ∈ T and so Bi(M) ⊆ T , completing the proof. Remark. It is a well-known result from descriptive set theory that any closed subset A of a Polish space X is itself a Polish space with the induced topology from X (see [18]). As Sym(M ) is a Polish space, it follows that Bi(M) is also a Polish space; so bimorphisms of first-order structures provide natural examples of Polish monoids. We leave this area of investigation open. Our aim now is to determine a cardinality result for closed submonoids of Sym(X). For any x̄ ∈ X n , define the pointwise stabilizer of x̄ to be the set St(x̄) = {α ∈ Bi(M) : x̄α = x̄} Note also that as Bi(M) is a group-embeddable monoid, it is therefore cancellative. Proposition 2.2. For any countably infinite first-order structure M, either |Bi(M)| ≤ ℵ0 or |Bi(M)| = 2ℵ0 , the first alternative holding if and only if the pointwise stabilizer of some tuple is the identity e ∈ Bi(M). Proof. Assume that St(x̄) = {e} for some x̄ ∈ M n . Let γ1 , γ2 ∈ Bi(M) where x̄γ1 = x̄γ2 = ȳ. As Bi(M) is a collection of permutations, it embeds in Sym(M ) = G, and the action of Bi(M) on M extends to an action of G on M. As a consequence, there exists a unique γ1−1 ∈ G such that γ1 γ1−1 = e. As ȳγ1−1 = x̄, we have that x̄γ2 γ1−1 = x̄γ1 γ1−1 = x̄. But St(x̄) = {e} and so γ2 γ1−1 = e; hence γ1 = γ2 . By the fact there are only countably many tuples in F (x̄), we are forced to conclude that Bi(M) is countable in this case. On the other hand, suppose that St(x̄) 6= {e} for all tuples x̄ ∈ M n . As M is countably infinite, we can enumerate elements of M = {x1 , x2 , . . .}. Using this enumeration, we define a sequence of tuples (x̄k )k∈N where x̄k = (x1 , . . . , xk ) for all k ∈ N. Since St(x̄) 6= {e} for all tuples x̄ of M, for each element x̄k of (x̄k )k∈N there exists tk ∈ Bi(M) such that tk 6= e and x̄k tk = x̄k . This means that the sequence (tk )k∈N of elements of Bi(M) is an infinite sequence where each bimorphism tk is not the identity element of Bi(M). As the sequence of tuples (x̄k )k∈N will eventually encapsulate every element of M , the sequence of bimorphisms (tk )k∈N approaches the pointwise stabilizer of M. This is the identity element and so e is a limit point of Bi(M). Now, for some α ∈ Bi(M), consider the sequence (tk α)k∈N . Here, tk α 6= α for any k ∈ N; for if tk α = α for some k, then cancellativity of Bi(M) implies that tk = e, contradicting our earlier assumption. Then α is a limit point for the sequence (tk α)k∈N , and so every element of Bi(M) is a limit point. This means that Bi(M) is a perfect set and thus has cardinality of the continuum (ch 6, [18]). 2.1 MB-homogeneity As mentioned in the introduction, automorphism groups of homogeneous structures are examples of infinite permutation groups whose orbits on n-tuples of distinct elements are determined by isomorphism types of substructures (see Proposition 1.6). It 8 is a consequence of Theorem 1.7 that bimorphism monoids of MB-homogeneous structures provide examples of infinite permutation monoids whose orbits on n-tuples are defined in the same way. Motivated by this, we aim to find a way of constructing MBhomogeneous structures; our inspiration for this task is Fraı̈ssé’s theorem for finding homogeneous structures (see [2]). Building on a similar result of Cameron and Nešetřil [9] for MM-homogeneous structures, the rest of this section is devoted to providing a Fraı̈ssé-like theorem for constructing MB-homogeneous structures. Throughout this section σ is a relational signature, C is a class of finite σ-structures and, following convention, we write A, B to mean the σ-structures on domains A, B. We refer the reader to [17] for further background on model theory. There are two main properties that a class of finite structures C has that guarantee the existence of a countable homogeneous structure with age C . The first is the joint embedding property (JEP); this property ensures that we can construct a countable structure M with age C . The second is the amalgamation property (AP); this ensures our constructed structure M is homogeneous by showing that it has the equivalent extension property (EP). When building a countable MB-homogeneous structure M with age C , we still need the JEP to ensure that M has the age we want but we need a different amalgamation property to ensure MB-homogeneity rather than standard homogeneity. As we are aiming to extend to bijective endomorphisms, we require a “back and forth” style argument to ensure that the extended map is indeed bijective. Due to the fact that bimorphisms are not automorphisms in general, we require two amalgamation conditions, and hence two extension conditions, to ensure that M is MBhomogeneous. We begin this section by examining the required extension properties. If M is MB-homogeneous then M is MM-homogeneous; it follows (by Proposition 4.1(b) of [9]) that M must have the mono-extension property (MEP), which takes care of the forward extension: (MEP) For all A, B ∈ Age(M) with A ⊆ B and monomorphism f : A − → M, there exists a monomorphism g : B − → M extending f . Any suitable “back” condition should express in its statement the key difference between a monomorphism of M and a bimorphism. This difference is the existence of a preimage; for any α ∈ Bi(M) and substructure A ⊆ M there exists a substructure B ⊆ M such that Bα = A. Note that this is not true for an arbitrary monomorphism β of M as Mβ is not required to equal M. The existence of a preimage for every extended map is the condition we wish to ensure in our “back” extension property, and this motivates our next definition. Definition 2.3. Let A, B be two σ-structures. We say that an injective map f : A − →B is an antimonomorphism if and only if ¬RA (a1 , . . . , an ) implies ¬RB (a1 f, . . . , an f ) for all n-ary relations R of σ. Remarks. Note that any map that is both a monomorphism and an antimonomorphism is an embedding. It is an easy exercise to show that the function composition of two antimonomorphisms is again an antimonomorphism; in particular, it is important to note that the composition of an antimonomorphism and an embedding is an antimonomorphism. We now state and prove a lemma stating that a preimage of a monomorphism is an antimonomorphism. For any bijective function f : A → B, we write f¯ : B → A to be the unique bijection such that f f¯ = 1A and f¯f = 1B . Notice here that f¯ = f . 9 Lemma 2.4. Let A, B be two σ-structures, and suppose that f : A − → B is a bijection. ¯ Then f is a monomorphism if and only if f is an antimonomorphism. Proof. Suppose f is a monomorphism and that ¬RB (b1 , . . . , bn ) = ¬RB (a1 f, . . . , an f ) holds in B. Since f preserves relations, it follows that ¬RA (a1 , . . . , an ) holds in A; as ¯ . . . , an f f¯) = ¬RA (b1 f¯, . . . , bn f¯). f f¯ = 1A we have that ¬RA (a1 , . . . , an ) = ¬RA (a1 f f, In the converse direction, suppose that f¯ is an antimonomorphism and that RA (a1 , . . . , an ) is a relation with ai = bi f¯ for all 1 ≤ i ≤ n. As f¯ preserves non-relations, it follows that RB (b1 , . . . , bn ) holds. Finally, as f¯f = 1B , we have that RB (b1 , . . . , bn ) = RB (b1 f¯f, . . . , bn f¯f ) = RB (a1 f, . . . , an f ) and therefore f is an monomorphism. Remarks. By restricting the codomain of a monomorphism f : A − → B to the image, we see that f ′ : A − → Af is a bijective homomorphism and therefore f¯′ : Af − → A is an antimonomorphism by the above lemma. Similarly, by restricting the codomain of an antimonomorphism f¯ : B − → A to the image, we see that f¯′ : B − → B f¯ and so we obtain a bijective homomorphism f ′ : B f¯ − → B. It is an immediate corollary of this result that if A, B, C are σ-structures, and f : A → B, g : B → C are bijective homomorphisms, then (f g) = ḡ f¯ : C → A is a bijective antimonomorphism. We use antimonomorphisms to express the backward extension in the bi-extension property (BEP): (BEP) For all A, B ∈ Age(M) with A ⊆ B and antimonomorphism f¯ : A − → M, there exists a antimonomorphism ḡ : B − → M extending f¯. These properties prove to be necessary and sufficient for MB-homogeneity. Proposition 2.5. Let M be a countable structure with age C . Then M is MBhomogeneous if and only if M has the BEP and the MEP. Proof. Suppose that M is MB-homogeneous; then M is also MM-homogeneous and has the MEP from Proposition 4.1(a) of [9]. Let A ⊆ B ∈ C and f¯ : A → M be an antimonomorphism. As Age(M) = C , there exist copies A′ ⊆ B ′ ⊆ M of A and B and isomorphisms θ : B − → B ′ and θ −1 : B ′ → B. Restrict the codomain of f¯ to its image to find an antimonomorphism f¯′ : A → Af¯; so θ −1 f¯′ = h̄ : A′ → Af¯ is a ¯ = h : Af¯ → A′ is a monomorphism; as bijective antimonomorphism. By Lemma 2.4, h̄ M is MB-homogeneous, extend h to a bimorphism α of M. So α|B ′ θ −1 : B ′ → B is a bijective homomorphism; by Lemma 2.4, define θ ᾱ = ḡ : B → B ′ . It remains to show that θ ᾱ extends f¯; indeed, for a ∈ A we have that af¯ = af¯αᾱ = af¯f θ ᾱ = aθ ᾱ as α extends f θ. Therefore M has the BEP. Conversely, suppose that M has the BEP and the MEP, and let f : A − → B be a monomorphism between finite substructures of M. We shall extend f : A → B to a bimorphism α of M in stages using a back and forth argument. Set A0 = A, B0 = B and f0 = f . At a typical stage, we have a bijective monomorphism fk : Ak − → Bk extending f , where Ai ⊆ Ai+1 and Bi ⊆ Bi+1 for all i ≤ k. As M is countable, we can enumerate the points M = {m0 , m1 , . . .}. When k is even, pick a point mi , where i is the smallest number such that mi ∈ / dom f . So, Ak ∪ {mi } is a substructure of M 10 ′ : Ak ∪ {mi } − → M. containing Ak . Using the MEP, extend fk to a monomorphism fk+1 ′ ′ → Bk ∪{mi fk+1 } is a By restricting the codomain of fk+1 we have that fk+1 : Ak ∪{mi } − bijective homomorphism extending fk . If k is odd, note that f¯k : Bk − → Ak is a bijective antimonomorphism by Lemma 2.4. Select a point mi , where i is the least number such that mi ∈ / dom f¯k ; so Bk ∪ {mi } is a substructure of M. Using the BEP, extend f¯k ′ : Bk ∪ {mi } − → M. Again, by restricting the codomain to an antimonomorphism f¯k+1 ′ ¯ we obtain a bijective antimonomorphism fk+1 : Bk ∪ {mi } − → Ak ∪ {mi f¯k+1 } extending ′ ¯ ¯ fk ; so fk+1 : Ak ∪ {mi fk+1 } − → Bk ∪ {mi } is a bijective homomorphism extending fk . By ensuring that every mi appears at both an odd and even stage, countably many applications of this procedure yield a bimorphism α of M extending f . Remark. We note here that this process of extending one point at a time eventually creates a bimorphism. In a similar fashion to Dolinka [12, Section 3] we can present equivalent conditions to Proposition 2.5 using one point extensions. (1PBEP/1PMEP) Suppose that A ⊆ B ∈ C and there is a (anti)monomorphism f : A − → M. If |B r A| = 1 then there exists a (anti)monomorphism g:B− → M extending f . A straightforward proof by induction shows that a structure M has both these conditions, if and only if it also has the BEP and MEP. These easier-to-handle properties are useful in determining whether or not a structure is MB-homogeneous. We now turn our attention to the actual process of construction. As we also need to ensure MM-homogeneity, it would make sense to take our “forth” amalgamation condition to be the mono-amalgamation property introduced in [9]. (MAP) Let C be a class of finite structures. For any A, B1 , B2 ∈ C and any maps fi : A − → Bi (for i = 1, 2) such that f1 is a monomorphism and f2 is an embedding, there exists C ∈ C and monomorphisms gi : Bi − →C (for i = 1, 2) such that f1 g1 = f2 g2 and g1 is an embedding. Similar to the BEP, we use antimonomorphisms to set out the “back” amalgamation condition, known as the bi-amalgamation property (BAP). (BAP) Let C be a class of finite structures. For any elements A, B1 , B2 ∈ C , antimonomorphism f¯1 : A − → B1 and embedding f2 : A − → B2 , there exists D ∈ C , embedding g1 : B1 − → D and antimonomorphism ḡ2 : B2 − →D such that f¯1 g1 = f2 ḡ2 . (see Figure 1.) We have enough now to prove the first of our propositions that detail our Fraı̈ssé-like construction. Proposition 2.6. Let M be an MB-homogeneous structure. Then Age(M) has the MAP and the BAP. Proof. As M is MB-homogeneous it is necessarily MM-homogeneous; by Proposition 4.1(b) of [9], Age(M) has the MAP. Suppose then that A, B1 , B2 are structures in Age(M), and assume we have an antimonomorphism f¯1 : A − → B1 and an embedding f2 : A − → B2 . Without loss of generality, further assume that A, B1 , B2 ⊆ M and that f2 is the inclusion map. 11 g1 ∃D ḡ2 B1 B2 f¯1 f2 A Figure 1: The bi-amalgamation property (BAP) From Lemma 2.4, f¯1 induces a bijective monomorphism f1 : Af¯1 − → A. As M is MBhomogeneous we extend f1 to some α ∈ Bi(M). Restricting α to B1 yields a bijective monomorphism α|B1 : B1 − → B1 α, where B1 α ⊇ A. Let D be the structure induced by M on B1 α∪B2 ; it follows that A ⊆ D. As α is surjective, we define C to be the structure such that Cα = D; set g1 : B1 − → C to be the inclusion map. As α : M − → M is a bijective homomorphism, then ᾱ : M − → M is an antimonomorphism by Lemma 2.4. Hence, ᾱ|B2 : B2 − → B2 ᾱ ⊆ C and define ḡ2 : B2 − → C to be this antimonomorphism. It is easy to check that f¯1 g1 = f2 ḡ2 and so Age(M) has the BAP. For our next result, recall that a class of finite structure C has the JEP if for all A, B ∈ C there exists a D ∈ C such that A, B ⊆ D. Proposition 2.7. If C is a class of finite relational structures that is closed under isomorphisms and substructures, has countably many isomorphism types and has the JEP, MAP and BAP, then there exists an MB-homogeneous structure M such that Age(M) = C . Proof. We build M over countably many stages, assuming that Mk has been constructed at some stage k ∈ N. Note that as C has countably many isomorphism types, we can enumerate them by C = {A0 , A1 , . . .}. If k ≡ 0 mod 3, select a structure Ai ∈ C , where k = 3i. Use the JEP to find a structure D that embeds both Mk and Ai ; define Mk+1 to be this structure D. If k ≡ 1 mod 3, select a triple (A, B, f ) such that A ⊆ B ∈ C and f : A − → Mk is a monomorphism. Using the MAP, we find a structure Mk+1 ∈ C such that there is an embedding e : Mk → Mk+1 and f extends to some monomorphism g : B − → Mk+1 . If ¯ ¯ k ≡ 2 mod 3 select a triple (X, Y, f ) such that X ⊆ Y ∈ C and f : X − → Mk is an antimonomorphism. Using the BAP we find a structure Mk+1 such that there is an embedding e′ : Mk → Mk+1 and f¯ is extended to an antimonomorphism ḡ : Y − → Mk+1 . We can arrange the steps such that: • every structure A ∈ C appears at some 0 mod 3 stage; • every triple (A, B, f ) appears at some 1 mod 3 stage, where for every such k, for every A ⊆ B ∈ C and every monomorphism f : A → Mk , there exists ℓ ≥ k and embedding ek,ℓ : Mk → Mℓ such that f extends to a monomorphism g : B → Mℓ . • every triple (X, Y, f¯) appears at some 2 mod 3 stage, where for every such k, for every X ⊆ Y ∈ C and every antimonomorphism f¯ : X → Mk , there exists ℓ ≥ k and embedding ek,ℓ : Mk → Mℓ such that f¯ extends to a antimonomorphism ḡ : Y → Mℓ . 12 S Following this, define M = k∈N Mk . All that remains to show is that M has age C and that M is MB-homogeneous. Our construction ensures that every Ai ∈ C appears at a 0 mod 3 stage, so it follows that C ⊆ Age(M). Conversely, we have that Mk ∈ C for all k ∈ N; as C is closed under substructures, Age(M) ⊆ C and so they are equal. Now suppose that A ⊆ B ∈ C and f : A − → M is a monomorphism. From the arrangement of steps above, there exists a k such that Af ⊆ Mk . From the construction, there exists an ℓ ∈ N such that Mℓ ⊃ Mk and the monomorphism g : B → Mℓ extends f ; so M has the MEP. We can use a similar argument to show that M has the BEP in a similar fashion and so M is MB-homogeneous by Proposition 2.5. A major consequence of Fraı̈ssé’s original theorem is the fact that any two Fraı̈ssé limits with the same age are isomorphic. While we cannot guarantee that any two structures with the same age constructed in the manner of Proposition 2.7 are isomorphic (see Section 3 for some examples) we can provide a uniqueness condition for this method of construction using a weaker notion of equivalence. Once again, we extend an idea of [9] to achieve this goal. Let M, N be two countable structures with the same signature σ. We say that M, N are bi-equivalent if: • Age(M) = Age(N ), and; • every embedding from a finite structure of M into N extends to a bijective monomorphism α : M − → N , and vice versa. Note that bi-equivalence is an equivalence relation on structures with the same signature. Two σ-structures M and N can be bi-equivalent without being isomorphic; see Example 3.11 for more details. We now show this is the relevant equivalence relation for MB-homogeneity. Proposition 2.8. 1) Let M, N be two bi-equivalent structures. If M is MB-homogeneous, so is N . 2) If M, N are MB-homogeneous and Age(M) = Age(N ), then M and N are bi-equivalent. Proof. 1) By Proposition 2.5 it suffices to show that N has the MEP and BEP. If M and N are bi-equivalent, they are certainly mono-equivalent in the sense of Proposition 4.2 of [9]; as M is MM-homogeneous, so is N (by the same result of [9]) and thus N has the MEP. Suppose then that A ⊆ B ∈ Age(N ) and there exists an antimonomorphism f¯ : A − → A′ ⊆ N . Note that A need not be isomorphic to A′ . As Age(M) = Age(N ) there exists a copy A′′ of A′ in M; fix an isomorphism e : A′ → A′′ between the two. Therefore, e is a isomorphism from a finite structure of N into M; as the two are bi-equivalent, we extend this to a bijective homomorphism α : N → M. This in turn induces a bijective antimonomorphism ᾱ : M − → N by Lemma 2.4. Now, define an antimonomorphism h̄ = f¯e : A → A′′ ; this is an antimonomorphism from A into M. Since M is MB-homogeneous, it has the BEP by Proposition 2.5 and so we extend h̄ to an antimonomorphism h̄′ : B → M. Now, the map h̄′ ᾱ : B − → N is a antimonomorphism; we need to show it extends f¯. So, for all a ∈ A, and using the facts that α extends e and h̄′ extends h̄ = f¯e, we have that af¯ = af¯αᾱ = af¯eᾱ = ah̄′ ᾱ. 13 Therefore N has the BEP. 2) Let f : A − → B be a bijective embedding from a finite structure of M into N . We utilise a back and forth argument constructing the bijection over countably many steps; so set A0 = A, B0 = B and f0 = f . At some stage, we have a bijective monomorphism fk : Ak − → Bk extending f , where Ai ⊆ Ai+1 and Bi ⊆ Bi+1 for all i ≤ k. As both M and N are countable, we can enumerate the points M = {m0 , m1 , . . .} and N = {n0 , n1 , . . .}. If k is even, select a point mi ∈ Mr dom fk , where i is the smallest natural number such that mi ∈ / dom fk . We have that Ak ∪ {mi } ⊆ M and so is an element of Age(N ) by assumption. As N is MB-homogeneous it has the MEP and so fk can be extended ′ : Ak ∪ {mi } − → N . Restricting the codomain to the image of to a monomorphism fk+1 ′ ′ } extending fk . gives a bijective monomorphism fk+1 : Ak ∪ {mi } − → Bk ∪ {mi fk+1 fk+1 ¯ If k is odd, note that fk : Bk − → Ak is a bijective antimonomorphism. Select a point nj ∈ N r dom f¯k , where j is the least natural number such that nj ∈ / im fk . Therefore Bk ∪ {nj } ⊆ N and is an element of Age(M). As M is MB-homogeneous, use the ′ : Bk ∪ {nj } − → M. Restricting the BEP to extend f¯k to an antimonomorphism f¯k+1 codomain to the image once more delivers the required bijective antimonomorphism ′ f¯k+1 : Bk ∪ {nj } − → Ak ∪ {nj f¯k+1 } extending f¯k ; taking the inverse shows that fk+1 is a bijective homomorphism extending fk as required. Repeating this process countably many times, ensuring that each mi is in the domain and each nj in the image, provides a bijective homomorphism α : M − → N extending f . The converse direction is entirely analogous. We conclude the section by observing that due to Proposition 2.7 and Proposition 2.8, a MB-homogeneous structure is determined by its age up to bi-equivalence. 3 MB-homogeneous graphs In this section, we focus on MB-homogeneous graphs in more detail. In this article, a graph Γ is a set of vertices V Γ together with a set of edges EΓ, where this edge set interprets a irreflexive and symmetric binary relation E. If {u, v} ∈ EΓ, we say that u and v are adjacent and write u ∼ v ∈ Γ. If {u, v} ∈ / EΓ, we say that {u, v} is a non-edge, that they are non-adjacent, and write u ≁ v. For a graph Γ, define the complement Γ̄ of Γ to be the graph with vertex set V Γ̄ = V Γ and edges given by u ∼ v ∈ Γ̄ if and only if u ≁ v ∈ Γ. For n ∈ N ∪ {ℵ0 }, recall that a complete graph K n on n vertices is a graph on vertex set V K n (with |V K n | = n) with edges given by u ∼ v ∈ K n if and only if u 6= v ∈ V K n . The complement of the graph K n is called the null graph on n vertices, and is denoted by K̄ n . Say that ∆ is an induced subgraph of a graph Γ if V ∆ ⊆ V Γ and u ∼ v ∈ ∆ if and only if u ∼ v ∈ ∆. In this paper, whenever we say ∆ is a subgraph of Γ, we mean that ∆ is an induced subgraph of Γ. The only exception is the case of a spanning subgraph; say that ∆ is a spanning subgraph of Γ if V ∆ = V Γ and u ∼ v ∈ ∆ implies that u ∼ v ∈ Γ. A logical place to start our investigation is by demonstrating some properties of MB-homogeneous graphs. Proposition 3.1. Let Γ be an MB-homogeneous graph. Then its complement Γ̄ is also MB-homogeneous. 14 Proof. We note that A ∈ Age(Γ) if and only if Ā ∈ Age(Γ̄). Since Γ is MB-homogeneous, it has the MEP and BEP by Proposition 2.5. Now suppose that A ⊆ B ∈ Age(Γ) and that f¯ : A − → Γ is an antimonomorphism. Any such f¯ preserves non-edges and may change edges to non-edges; so f¯ : Ā − → Γ̄ is a monomorphism. As Γ has the BEP, f¯ can be extended to an antimonomorphism ḡ : B − → Γ; this in turn induces a monomorphism ḡ : B̄ − → Γ̄ and hence Γ̄ has the MEP. The proof that Γ̄ has the BEP is similar. Following this, we can guarantee that certain subgraphs appear in an MB-homogeneous graph. Cameron and Nešetřil [9, Proposition 2.5] prove that every MM-homogeneous graph must contain an infinite complete subgraph; we expand this proposition. Corollary 3.2. Any infinite non-complete, non-null MB-homogeneous graph Γ contains both an infinite complete and an infinite null subgraph. Proof. Any MB-homogeneous graph is necessarily MM-homogeneous and hence it contains an infinite complete subgraph from the aforementioned result of [9]. By Proposition 3.1 we have that Γ̄ is also MB-homogeneous and so contains an infinite complete subgraph; the result follows from this. A consequence of this argument is that an MB-homogeneous graph Γ is neither a locally finite graph (where for all v ∈ V Γ, there are only finitely many edges involving v) nor the complement of a locally finite graph. In fact, we can say more than this. Recall that the diameter of a graph Γ is the greatest length of the shortest path between any two points u, v ∈ V Γ. The next result is a restatement of [9, Proposition 1.1(c)]; the proof follows as every MB-homogeneous graph is also an MH-homogeneous graph. Corollary 3.3 (Proposition 1.1(c), [9]). Suppose that Γ is a connected MB-homogeneous graph. Then Γ has diameter at most 2 and every edge is contained in a triangle.  We now examine cases where the graph is disconnected (and non-null to avoid triviality). It is shown in [9] that any disconnected MH-homogeneous graph is a disjoint union of complete graphs of all the same size. We use this result in conjunction with Corollary 3.2 to see that the only candidates for a disconnected MB-homogeneous graph must be disjoint unions of infinite complete graphs. Building on an observation of [31] that any disconnected MM-homogeneous graph is a disjoint union of infinite complete graphs, we classify disconnected MB-homogeneous graphs in our next result. F Proposition 3.4. Let Γ = i∈I Ki , where Ki ∼ = K ℵ0 for all i in some index set I. 1) If I is finite with size n > 1, then Γ is MM-homogeneous but not MB-homogeneous. 2) If I is countably infinite, then Γ is MB-homogeneous. Proof. In both cases, we note that every A ∈ Age(Γ) can be decomposed as finite F disjoint union of finite complete graphs; so we can write that A = kj=1 Cj , where Cj is a complete graph of some finite size. F 1) As |I| = n we note that k ≤ n for all A = kj=1 Cj in the age of Γ. Suppose that A ⊆ B ∈ Age(Γ) with B r A = {b}. We have two choices for b; either b is completely independent of A or b is related to exactly one Cj for some 1 ≤ j ≤ k. If it is the former, we can extend any monomorphism f : A − → Γ to a monomorphism g : B − →Γ by sending b to any vertex v ∈ V Γ r Af . If it is the latter, then we can extend any monomorphism f : A − → Γ to a monomorphism g : B − → Γ by sending b to a vertex 15 v ∈ Ki r Cj f , where j is defined as above. Hence Γ has the MEP. However, note that Γ does not embed an independent n + 1 set and so Γ is not MB-homogeneous by Corollary 3.2. 2) The proof that Γ is MM-homogeneous when I is infinite is as above. Assume then that A ⊆ B ∈ Age(Γ) with B r A = {b}, and let f¯ : A − → Γ be an antimonomorphism. We note that as A is finite then Af¯ is finite; since I is infinite, there will always exist i ∈ I such that Ki ∩ Af¯ = ∅. Therefore, regardless of how b is related to A, we can extend f¯ to an antimonomorphism ḡ : B − → Γ by mapping b to some v ∈ Ki , where i is as stated above. Hence Γ is MB-homogeneous by Proposition 2.5. Remark. We note that from Proposition 3.4 and Proposition 3.1 that the complement F of i∈N Kiℵ0 , which is the complete multipartite graph with infinitely many partitions each of infinite size, is also MB-homogeneous. F The proof that Γ = i∈N Kiℵ0 is MB-homogeneous relied on the existence of an independent element to every image of a finite antimonomorphism. Our aim now is to obtain some sufficient conditions for MB-homogeneity along these lines in order to construct some new examples. Definition 3.5. Let Γ be an infinite graph. • Say that Γ has property (△) if for every finite set U ⊆ V Γ there exists u ∈ V Γ such that u is adjacent to every member of U . • Say that Γ has property (∴) if for every finite set V ⊆ V Γ there exists v ∈ V Γ such that v is non-adjacent to every member of V . (See Figure 2 for a diagram.) property (△) property (∴) U V u Γ v Figure 2: A diagram of Definition 3.5 We note here that if a graph Γ has property (△) then it is algebraically closed (see [13]); due to the self-complementary nature of these properties, if Γ has property (∴) then its complement Γ is algebraically closed. These properties prove to be sufficient for MB-homogeneity. Proposition 3.6. Let Γ be an infinite graph. If Γ has both properties (△) and (∴) then Γ is MB-homogeneous. Proof. Suppose once more that A ⊆ B ∈ Age(Γ) with B r A = {b}, and that f : A − →Γ is a monomorphism. As A is finite, Af is a finite set of vertices in Γ and so by property 16 (△) there exists a vertex v of Γ such that v is adjacent to every element of Af . We have then that v is a potential image point of b, and the map g : B − → Γ extending f and sending b to v is a monomorphism; so Γ has the MEP. Using property (∴) in a similar fashion shows that Γ has the BEP and so is MB-homogeneous by Proposition 2.5. Remark. The converse of this result is not true. Proposition 3.4 2) is an example of an MB-homogeneous graph with property (∴) but not property (△). Its complement is an example of an MB-homogeneous graph with property (△) but not property (∴). This shows that any algebraically closed graph Γ whose complement is also algebraically closed is MB-homogeneous. We now present a notion of equivalence that extends an idea of [13]. Definition 3.7. Let Γ, ∆ be two graphs. We say that Γ is bimorphism equivalent to ∆ if there exist bijective homomorphisms α : Γ − → ∆ and β : ∆ − → Γ. Remark. Informally, this definition says that you can start with Γ, and draw some number (possibly infinite) of extra edges onto Γ to get ∆; from there, you can draw some number (possibly infinite) of extra edges onto ∆, to get a graph isomorphic to Γ. This is a weaker version of bi-equivalence introduced in Proposition 2.8. Every pair of bi-equivalent graphs are bimorphism equivalent by definition, but the converse is not true; specifically, bimorphism equivalent graphs need not have the same age (see Corollary 3.10 and Example 3.11). Note that this definition is equivalent to saying that Γ, ∆ contain each other as spanning subgraphs. Justifying the name, this is an equivalence relation of graphs (up to isomorphism); we denote this relation by ∼b . The product αβ : Γ − → Γ of the two bijective homomorphisms induces a bimorphism on Γ, and so if Bi(Γ) = Aut(Γ) we have that α and β are necessarily isomorphisms. If this occurs, then [Γ]∼b is a singleton equivalence class. We show that bimorphism equivalence preserves properties (△) and (∴). Proposition 3.8. Let Γ, ∆ be bimorphism equivalent graphs via bijective homomorphisms α : Γ − → ∆ and β : ∆ − → Γ. Then Γ has properties (△) and (∴) if and only if ∆ does. Proof. Suppose that Γ has property (△) and X ⊆ V Γ. From this, there exists a vertex v ∈ V Γ adjacent to every element of X. As α is a homomorphism, Xα is a finite subset of V ∆ and vα is adjacent to every element of Xα; since α is bijective, every finite subset Y of V ∆ can be written as Xα for some X ⊆ V Γ. These observations show that ∆ has property (△). Using the fact that α is a bijective monomorphism, by Lemma 2.4 there exists an antimonomorphism ᾱ : ∆ − → Γ. Since Γ has property (∴), for any finite X ⊆ V Γ there exists a vertex w ∈ Γ independent of every element in X. Due to the fact that ᾱ preserves non-edges, any Y ⊆ V ∆ has a vertex x ∈ V ∆ independent of every element of Y ; and as α is bijective this happens for every finite set X ⊆ V Γ and so ∆ has property (∴). The converse direction is symmetric. In fact, we can say more about the connection between bimorphism equivalence and properties (△) and (∴). Proposition 3.9. If Γ, ∆ are two graphs with properties (△) and (∴), then Γ and ∆ are bimorphism equivalent. 17 Proof. Assume that Γ, ∆ are two graphs with properties (△) and (∴). We use a back and forth argument to construct a bijective homomorphism α : Γ → ∆ and a bijective antimonomorphism β̄ : Γ → ∆, which by Lemma 2.4 will be the converse of a bijective homomorphism β : ∆ → Γ. Suppose that f : {c} → {d} is a function sending a vertex c of Γ to a vertex d of ∆; this is a bijective homomorphism. Now set {c} = C0 , {d} = D0 , f = f0 , and assume that we have extended f to a bijective homomorphism fk : Ck → Dk , where Ci and Di are finite and Ci ⊆ Ci+1 and D ⊆ Di+1 for all 0 ≤ i ≤ k − 1. Furthermore, as both Γ and ∆ are countable, we can enumerate their vertices as V Γ = {c0 , c1 , . . .} and V ∆ = {d0 , d1 , . . .}. If k is even, select a vertex cj ∈ Γ where j is the smallest number such that cj ∈ / Ck . As ∆ has property (△), there exists a vertex u ∈ ∆ such that u is adjacent to every element of Dk . Define a map fk+1 : Ck ∪{cj } → Dk ∪{u} sending cj to u and extending f ; this map is a bijective homomorphism as any edge from cj to some element of Ck is preserved (see Figure 3 for a diagram of an example). Ck Dk cj fk+1 u Γ ∆ Figure 3: k even in proof of Proposition 3.9 Now, if k is odd, choose a vertex dj ∈ ∆ where j is the smallest number such that dj ∈ / Dk . As Γ has property (∴), there exists a vertex v ∈ Γ such that v is independent of every element of Ck . Define a map fk+1 : Ck ∪ {v} → Dk ∪ {dj } sending c to dj and extending fk . Then fk+1 is a bijective homomorphism as fk is and every edge between c and Ck is preserved; because there are none. See Figure 4 for a diagram of an example of this stage. Ck Dk v fk+1 dj Γ ∆ Figure 4: k odd in proof of Proposition 3.9 18 Repeating this process infinitely many times, ensuring that each vertex of Γ appears at an even stage and each vertex of ∆ appears at an odd stage, defines a bijective homomorphism α : Γ → ∆. We can construct a bijective antimonomorphism β̄ : Γ → ∆ in a similar fashion; replacing homomorphism with antimonomorphism and using property (∴) of ∆ at even steps and property (△) of Γ at odd steps. So the converse map β : ∆ → Γ is a bijective homomorphism and so Γ and ∆ are bimorphism equivalent. Recall that the random graph R is the countable universal homogeneous graph. It is well known (see [8]) that R is characterised up to isomorphism by the following extension property (EP): (EP) For any two finite disjoint sets of vertices U, V of R there exists x ∈ V R such that x is adjacent to every vertex in U and non-adjacent to any vertex in V . (see Figure 5.) U R V x Figure 5: (EP) in the random graph R The next result extends [9, Proposition 2.1(i)] and establishes a complementary condition to the graph case of [13, Corollary 2.2]. Corollary 3.10. Suppose that Γ is a countable graph. Then Γ has properties (△) and (∴) if and only if it is bimorphism equivalent to R. Proof. As R has both properties (△) and (∴), the converse direction follows from Proposition 3.8, and the forward direction follows from Proposition 3.9. Remarks. These three results together show that the equivalence class [R]∼b is precisely the set of all countable graphs Γ with properties (△) and (∴). In particular, if Γ ∈ [R]∼b and Γ ≇ R (such a Γ exists: see Example 3.11), then Γ is bimorphism equivalent to R. This means that you can draw infinitely many extra edges on R (a necessity, see Proposition 2 of [8]) to get an MB-homogeneous graph Γ ≇ R, and then draw infinitely many more edges on Γ to get a graph isomorphic to R. 19 3.1 Constructing uncountably many examples The aim of this subsection is to use these properties of MB-homogeneous graphs in order to construct uncountably many examples. To begin with, we construct an initial example of an MB-homogeneous graph that is not homogeneous. This is important; if we wish to describe 2ℵ0 many examples of MB-homogeneous graphs, then they cannot also be homogeneous; as there are only countably many non-isomorphic homogeneous graphs [19]. Example 3.11. Let P = (pn )n∈N0 be an infinite binary sequence with infinitely many 0’s and 1’s. Define the graph Γ(P ) on the infinite vertex set V Γ(P ) = {v0 , v1 , . . .} with edge relation vi ∼ vj if and only if pmax(i,j) = 0. From this, we can observe that: • if pi = 0 then vi ∼ vj for all natural numbers j < i; • if pi = 1 then vi ≁ vj for all j < i; where < is the natural ordering on N. Say that Γ(P ) is the graph determined by the binary sequence P . An example (where P = (0, 1, 0, 1, . . .)) is given in Figure 6. v0 v1 v2 v3 v4 v5 v6 v7 v8 Figure 6: Γ(P ), with P = (0, 1, 0, 1, . . .) As P has infinitely many of each term, we have that for every finite subsequence A = {ai1 , . . . , aik } of P there exist natural numbers c, d > ik such that pc = 0 and pd = 1. This together with the manner of the construction ensures that Γ(P ) has both properties (△) and (∴) and is therefore MB-homogeneous. We check that for any sequence P satisfying the above conditions the graph Γ(P ) is not isomorphic to a homogeneous graph by using the classification of countable homogeneous graphs by Lachlan and Woodrow [19]. As Γ(P ) has both an edge and a non-edge it is neither K ℵ0 nor its complement K̄ ℵ0 . Since Γ(P ) is connected, it is not a disjoint union of complete graphs; as it has property (∴), it is not the complement of a disjoint union of complete graphs. From Corollary 3.2, as Γ(P ) is neither complete nor null it contains both an infinite complete subgraph and an infinite null subgraph; so it is not isomorphic to the Kn -free graph Hn or its complement H̄n for any n. Finally, we note that as no term p of P can be both 0 and 1 simultaneously, there is no vertex vp that is adjacent to {v0 } and non-adjacent to {v1 }. Hence Γ(P ) does not satisfy the extension property characteristic of the random graph. This accounts for all countable graphs in the classification; so Γ is not a homogeneous graph. 20 Remarks. Let P, Q be two infinite binary sequences with infinitely many 0’s and 1’s. Any such infinite binary sequence contains every finite binary sequence X as a subsequence. The finite induced subgraphs Γ(X) of Γ(P ) are those induced on V Γ(X) by the edge relation of P . As this is true for all such binary sequences P and Q, we conclude that Γ(P ) and Γ(Q) have the same age. It can be shown from here that for any two such sequences P and Q, then Γ(P ) and Γ(Q) are bi-equivalent (see Proposition 2.8). Throughout the rest of this section, any binary sequences P, Q have infinitely many 0’s and 1’s. This guarantees that any graph Γ(P ) determined by P has properties (△) and (∴). Many natural questions arise from this construction. Perhaps the most pertinent of these is: to what extent does Γ(P ) depend on the binary sequence P ? Answering this question will tell us exactly how many new MB-homogeneous graphs there are of this kind. We achieve a solution by investigating the automorphism group as an invariant of Γ(P ). Our first lemma establishes a convention for the zeroth place of such a sequence. We denote the neighbourhood set of a vertex v ∈ V Γ by N (v). Lemma 3.12. Suppose that Γ(P ) and Γ(Q) are the graphs on the vertex sets V = {v0 , v1 , . . .} and W = {w0 , w1 , . . .}, with edges determined by the binary sequences P = (pn )n∈N0 and Q = (qn )n∈N0 respectively, and assume that pi = qi for all i > 0. Then Γ(P ) ∼  = Γ(Q). Following this, we can take p0 = p1 for any binary sequence P without loss of generality; we adopt this as convention for the rest of the section. Now, if P is a binary sequence, denote the kth consecutive string of 0’s and 1’s by Ok and Ik respectively, and denote the vertex sets corresponding to these subsequences by V Ok and V Ik (see Figure 7). Furthermore, denote the graph induced by Γ(P ) on any subset V X of V Γ by Γ(X). 1 1 0 I1 v0 1 O1 v1 V I1 0 v2 1 0 I2 v3 V O1 1 v4 0 O2 v5 v6 V I2 v7 v8 V O2 1 0 I3 O3 v9 v10 V I3 V O3 Figure 7: Γ(P ), with P = (1, 1, 0, 0, 1, 1, 1, 0, 0, 1, 0, . . .) 21 ... Lemma 3.13. Let P = (pn )n∈N0 be a binary sequence, and let Γ(P ) be the graph determined by this binary sequence. Suppose that vj is a vertex in V In for some n ∈ N. Then Γ(N (vj )) ∼ = K ℵ0 . Proof. From the assumption that pj = 1, the observation of Example 3.11, and the definition of an edge in Γ(P ), we have that vj ∼ vk if and only if j < k and pk = 0; so N (vj ) = {vk : k > j, pk = 0}. As there are infinitely many 0’s in P , this set is infinite as j is finite. Now, take va , vb ∈ N (vj ). Here, va ∼ vb ∈ Γ(N (vj )) if and only if pmax(a,b) = 0; but pa = pb = 0 and so any two vertices of N (vj ) are adjacent. Lemma 3.14. Let P = (pn )n∈N0 be a binary sequence. Suppose that v, w are vertices in some V Ok = {vk1 , . . . , vkn } corresponding to some Ok = {pk1 , . . . , pkn }. Then N (v) ∪ {v} = N (w) ∪ {w} and Γ(N (v)) ∼ = Γ(N (w)). Proof. Define the sets X = {vj : j < i1 } and Y = {vk : k ≥ i1 , ak = 0}. Due to the construction of Γ in Example 3.11, we have that N (v) ∪ {v} = X ∪ Y = N (w) ∪ {w}. For all u ∈ V Γ(V Ok ), it is easy to see that N (u) = X ∪ (Y r {u}). Using a similar argument to the proof of Lemma 3.13, we have that Γ(Y r {u}) is an infinite complete graph for any u ∈ Γ(V Ok ), and every element in Y is adjacent to every element of X. For any v, w ∈ V Ok define a map f : X ∪ (Y r {v}) − → X ∪ (Y r {w}) fixing X pointwise and sending (Y r {v}) to (Y r {w}) in any fashion; this is an isomorphism between Γ(N (v)) and Γ(N (w)). Before our next proposition, recall that if there exists γ ∈ Aut(Γ) such that vγ = w, then the graphs induced on N (v) and N (w) are isomorphic. Furthermore, recall that an independent set U of a graph Γ is a maximum independent set if there does not exist a subset W of Γ such that W is a independent set with |W | > |U |. Proposition 3.15. Let P = (pn )n∈N0 be a binary sequence. Then Y Aut(Γ(P )) = (Aut(Γ(Ok )) × Aut(Γ(Ik ))) i∈N the infinite direct product of automorphism groups on each Γ(Ok ) and Γ(Ik ). Proof. Using Lemma 3.12, we set the convention that p0 = p1 throughout; hence either O1 or I1 (depending on whether P starts with a 0 or 1) has size at least 2. For some i, write Oi = {pi1 , . . . , pin } and Ii = {qi1 , . . . , qim }, and we write V Oi = {vi1 , . . . , vin } and V Ii = {wi1 , . . . , wim }. We first show that any automorphism of Γ(P ) fixes both V Ok and V Ik setwise for all k ∈ N, using a series of claims. Then, we prove that any bijective map from Γ(P ) to itself fixing every point except those in a single V Ok (or V Ik ) and acting as an automorphism on that V Ok (or V Ik ) is an automorphism of Γ(P ). We begin with our first claim. Claim 1. If v ∈ V Oi and w ∈ V Oj with i 6= j, then Γ(N (v)) ≇ Γ(N (w)). Proof of Claim 1. Without loss of generality, suppose that i < j and so i1 < i2 < . . . < in < j1 < j2 < . . . < jm . We define the following sets: Xi = {vk : k < i1 } Xj = {vk : k < j1 } Yi = {vk : k ≥ i1 , pk = 0} Yj = {vk : k ≥ j1 , pk = 0}. 22 Lemma 3.14 asserts that N (v) = Xi ∪ (Yi r {v}) and N (w) = Xj ∪ (Yj r {w}). By reasoning outlined in Lemma 3.14, if va ≁ vb ∈ Γ(N (v)) then va , vb ∈ Xi . Note also that both Xi and Xj are both finite sets, and so any maximum independent set of Xi , Xj (and hence of N (v), N (w)) must be finite. Consider the sets A = {va : a < i1 , pa = 1} ∪ {v0 } and B = {vb : b < j1 , pb = 1} ∪ {v0 }, contained in Xi and Xj respectively. So if va , vd ∈ A, then pmax(a,d) = 1 and so va ≁ vd . Now, if vc ∈ Xi r A then pc = 0, and as vc 6= v0 it follows that pmax(c,0) = 0 and so vc ∼ v0 . Hence A is the maximum independent set in Xi ; using a similar argument, we can show that B is the maximum independent set in Xj . Since i < j there exists an Ik between Oi and Oj ; so there is a e ∈ N where in < e < j1 and pe = 1. Hence ve ∈ B r A and so |B| > |A|. Therefore, as Γ(N (v)) and Γ(N (w)) have different sizes of maximum independent sets, they are not isomorphic and this concludes the proof of Claim 1. This shows that there is no automorphism α of Γ(P ) sending a vertex v ∈ V Oi to a vertex w ∈ V Oj where i 6= j, as they have non-isomorphic neighbourhoods. We move on to our next claim. Claim 2. Suppose that v ∈ V Oi (with i ≥ 2) and w ∈ V Ij . Then there is no automorphism of Γ(P ) sending v to w. Proof of Claim 2. Define the set A = {va : a < i1 , pa = 1} ∪ {v0 } as in the previous claim. As i ≥ 2, there exists a c such that 0 < c < i1 with pc = 1. Hence we have that |A| ≥ 2 and so Γ(N (v)) has at least one non-edge. However, Γ(N (w)) ∼ = K ℵ0 by Lemma 3.13 and so there cannot possibly be an automorphism sending v to w. This proves the second claim. From these claims, we see that any automorphism α of Γ(P ) fixes V Oi setwise for i ≥ 2. Now, for k ≥ 2, any V Ik (or V Ik+1 ) sandwiched between V Ok and V Ok+1 , as V Ik (or V Ik+1 ) are the only vertices not adjacent to every vertex in V Ok and adjacent to every vertex in V Ok+1 . As V Ok and V Ok+1 are fixed setwise, we conclude that V Ik (or V Ik+1 ) is fixed setwise for k ≥ 2. Claim 3. V O1 and V I1 are fixed setwise by any automorphism of Γ(P ). Proof of Claim 3: There are two cases to consider; where P either begins with a 0 or a 1. Case 1 (p0 = 0). Suppose for a contradiction that there exists an α ∈ Aut(Γ) sending a v ∈ V O1 to a w ∈ V I1 . Due to our case we have |V O1 | ≥ 2 and so Γ(V O1 ) has an edge from v to some u ∈ V O1 . But w ∈ V I1 and thus is independent of everything in V O1 ∪ V I1 ; so the edge between v and u is not preserved by α and so V O1 is fixed setwise. From this, we can use a similar argument to above to show that V I1 is fixed setwise. Case 2 (p0 = 1). From this assumption, we have that |V I1 | ≥ 2 and so Γ(V I1 ) contains a non-edge. Hence for some v ∈ V O1 , the graph Γ(N (v)) contains a nonedge. Therefore, from Lemma 3.13 and Claim 1, Γ(N (v)) ≇ Γ(N (w)) for some w ∈ V Γ(P ) r V O1 and so V O1 is fixed setwise. As this happens, both V I1 and V I2 are fixed setwise. This concludes the proof of Claim 3. 23 So for any k ∈ N, we have that V Ok and V Ik are fixed setwise by any automorphism of Γ(P ). It remains to prove that any automorphism of Γ(V Ok ) or Γ(V Ik ) whilst fixing every other point in Γ(P ) is an automorphism of Γ(P ). Here, as Γ(V Ok ) is a complete graph and Γ(V Ik ) is a null graph, it follows that Aut(Γ(V Ok )) ∼ = Sym(|V Ok |) and ∼ Aut(Γ(V Ik )) = Sym(|V Ik |) for all k ∈ N. So suppose that f : Γ(P ) − → Γ(P ) is a bijective map that acts as an automorphism on some Γ(V Ok ) and fixes V Γ r V Ok . By Lemma 3.14 any two elements v, w ∈ V Ok have the same extended neighbourhood N (v) ∪ {v} = N (w) ∪ {w} (and Γ(N (v)) ∼ = Γ(N (w))). It follows that f preserves all edges and non-edges between V Ok and V Γ(P ) r V Ok and so it is an automorphism of Γ(P ). The proof that the bijective map g : Γ(P ) − → Γ(P ) that acts as an automorphism of some Γ(V Ik ) and fixes every other point is similar. This proposition guarantees the existence of countably many MB-homogeneous graphs. For instance, define a binary sequence P n = (pi )i∈N by the following: ( 1 if i = 0, 1, 2, . . . , n − 1, n + 1, n + 3, . . . pi = 0 if i = n, n + 2, . . . Here, P n is a sequence of n many 1’s followed by alternating 0’s and 1’s. It follows that Aut(Γ(P n )) is the infinite direct product of one copy of Sym(n) together with infinitely many trivial groups; so Aut(Γ(P n )) ∼ = Sym(n). This is true for all n ≥ 2. So if m 6= n, then Aut(Γ(P m )) ≇ Aut(Γ(P n )) and so Γ(P m ) ≇ Γ(P n ). Furthermore, it is straightforward to see that if two monoids T, T ′ have nonisomorphic groups of units U, U ′ respectively, then T ≇ T ′ . Hence we have constructed several examples of non-isomorphic oligomorphic permutation monoids on bi-equivalent structures. By Proposition 1.6, this means that each of these oligomorphic permutation monoids have the same strong orbits. We now aim to use the basic framework established here to construct 2ℵ0 nonisomorphic examples of MB-homogeneous graphs. To achieve this, the idea is to add in pairwise non-embeddable finite structures into the age of some Γ(P ) to ensure uniqueness up to isomorphism. To this end, let A = (an )n∈N0 be a strictly increasing sequence of natural numbers. We use A to recursively define a binary sequence P A = (pi )i∈N as follows; Base: 0 followed by a1 many 1’s. Inductive: Assuming that the nth stage of the sequence has been constructed, add a 0 followed by an+1 many 1’s to the right hand side of the sequence. For instance, if A = (2, 3, 5, . . .) then P A = (0, 1, 1, 0, 1, 1, 1, 0, 1, 1, 1, 1, 1, . . .). Using such a binary sequence P A, we construct Γ(P A) in the fashion of Example 3.11. As P A has infinitely many 0’s and 1’s then Γ(P A), the graph determined by P A, is MBhomogeneous. The eventual plan is to induce finite graphs onto the independent sets induced on Γ(P A) by strings of consecutive 1’s in P A. By selecting a suitable countable family of pairwise non-embeddable graphs that do not appear in the age of Γ(P A), we ensure graphs of different ages. We prove two lemmas which form the basis for our construction of 2ℵ0 non-isomorphic examples of MB-homogeneous graphs. The second lemma is folklore; and the proof is omitted. 24 Lemma 3.16. Let P be any binary sequence. Then Γ(P ) does not embed any cycle graph of size m ≥ 4. Proof. Let V X = {vi1 , . . . , vim } ⊆ V Γ(P ), with m ≥ 4. Let X be the graph on V X with edges induced by Γ(P ), and suppose X is an m-cycle. As each vertex in a cycle graph has degree 2, we see that pij 6= 0 for ij > i3 . But this means that pi4 = . . . = pim = 1 and so vi4 has degree 0 in X. This is a contradiction and so X is not an m-cycle. Lemma 3.17. Let Cm and Cn be two cycle graphs with m, n ≥ 3. Then Cm embeds in Cn (and vice versa) if and only if m = n; in which case they are isomorphic.  Hence C = {Cn : n ≥ 4} is a countable family of pairwise non-embeddable graphs such that Age(Γ(P A)) ∩ C = ∅. Now suppose that A = (an )n∈N is a strictly increasing sequence of natural numbers with ai ≥ 4; construct Γ(P A) in the usual fashion. We have that the size of each Ik in P A is ak . For each independent set Γ(IK ) ⊆ Γ(P A), draw an ak -cycle on its vertices, thus creating a new graph Γ(P A)′ (see Figure 8). Figure 8: Γ(P A)′ corresponding to the sequence A = (4, 5, 6, . . .), with added cycles highlighted in red In particular, note that even with these additional structures, Γ(P A) is still MBhomogeneous as it has properties (△) and (∴). Since we have added so many structures to the age, we must be careful that we have not added extra cycles of sizes not expressed in the sequence A. The next proposition alleviates this concern. Proposition 3.18. Suppose that A = (an )n∈N is a strictly increasing sequence of natural numbers with a1 ≥ 4 and suppose that m ≥ 4 is a natural number such that m 6= an for all n ∈ N. Then the graph Γ(P A)′ outlined above does not contain an m-cycle. Proof. Suppose that M ⊆ Γ(P A)′ is an m-cycle. Then the edge set of M is a combination of the edges of the graph induced by the finite subsequence Q = (qi1 , . . . , qim ) of P A (where i1 < i2 < . . . < im ) on V M = {vi1 , . . . , vim } and the edges from cycles added onto Γ(P A). We aim to show that M = Γ(In ) for some n ∈ N; that is, the only cycles of size ≥ 4 in Γ(P A)′ are precisely those we added in the construction. So assume here that Q contains a 0. As M is an m-cycle, dM (v) = 2 for all v ∈ M and so the only elements of Q that can be 0 are qi1 , qi2 and qi3 . We split our consideration into cases. 25 Case 1 (qi3 = 0). As we assume this, vi3 is adjacent to both vi1 and vi2 . If qi2 = 0, then vi2 ∼ vi1 creating a 3-cycle; this is a contradiction as M does not embed a 3-cycle. Therefore, qi2 = 1 and so vi1 is adjacent to some vij where 3 < j ≤ m. Since qij = 1 for all ij > i3 , it follows that the edge between vi1 and vij was induced by an added cycle. This implies that vi1 , vij ∈ V Γ(Ik ) for some k. Therefore, (bi1 , . . . , bij ) is a sequence of 1’s where i1 < i2 < . . . < ij are consecutive natural numbers; a contradiction as i1 < i3 < ij and so 1 = qi3 = 0. Hence, qi3 6= 0. Case 2 (qi2 = 0). Since this happens, vi2 is adjacent to vi1 and some vertex vij 6= vi1 ; so ij > i2 . If qij is 1, then vij is non-adjacent to any vertex vik with ik < ij and qik = 0, as the construction of Γ(P A)′ ensures that no edges are drawn in this case. But this is a contradiction as qi2 = 0 and vij ∼ vi2 . So qij must be 0 in this case; but ij > i2 and so qij = 1 by Case 1 and the argument preceding Case 1. This is a contradiction and so qi2 = 1. A similar argument to that of Case 2 holds for when qi1 = 0 and so no element of Q is 0. Hence, Q is made up of 1’s; however, it is still a possibility that these originate from from different Ik ’s. We now show however that every vertex of M comes from a single V Ik for some k. As no element of Q is 0, we conclude that two vertices in M have an edge between them only if they are contained in the same V Ik and have an edge between them in Γ(Ik ). As M is connected, we have that M ⊆ Γ(Ik ) for some k. Finally, as Γ(Ik ) is an ak -cycle embedding an m-cycle, we are forced to conclude that m = ak by Lemma 3.17 and so we are done. Corollary 3.19. Suppose that A = (an )n∈N and B = (bn )n∈N are two different strictly increasing sequences of natural numbers with a1 , b1 ≥ 4. Then Γ(P A)′ ≇ Γ(P B)′ . Proof. As A and B are different sequences there exists a j ∈ N such that aj 6= bj ; without loss of generality assume that aj < bj . Hence Γ(P A)′ embeds an aj -cycle; but as aj ∈ / B, by Proposition 3.18 Γ(P B)′ does not embed an aj -cycle. Hence Age(Γ(P A)′ ) 6= Age(Γ(P B)′ ) and so they are not isomorphic. These results prove the following: Theorem 3.20. There are 2ℵ0 many non-isomorphic, non-bi-equivalent MB-homogeneous graphs, each of which is bimorphism equivalent to the random graph R. Proof. As there are 2ℵ0 strictly increasing sequences of natural numbers we have continuum many examples of Γ(P A)′ by Corollary 3.19. As these graphs have different ages, this means we have constructed 2ℵ0 many non-isomorphic, non-bi-equivalent MBhomogeneous graphs. Furthermore, as each these examples has property (△) and (∴), they are bimorphism equivalent to R by Corollary 3.10. Remark. As a consequence of this, |[R]∼b | = 2ℵ0 . This means that there are 2ℵ0 pairwise non-isomorphic graphs Γ with the property stated in the remark after Corollary 3.10. Finally in this section, we utilise this technique of overlaying finite graphs in order to prove the second main theorem of the section. Recall that a graph Γ is n-regular if every v ∈ V Γ has degree n for some n ∈ N. Theorem 3.21. Any finite group H arises as the automorphism group of an MBhomogeneous graph Γ. 26 Proof. By a version of Frucht’s theorem [15] there exists countably many 3-regular graphs Γ such that Aut(Γ) ∼ = H; and so, as there are only finitely many graphs of size less than or equal to 5, there exists a 3-regular graph ∆ of size n ≥ 6 such that Aut(∆) ∼ = H. By the handshake lemma (see p5 [11]), such a graph must have a total of 3n/2 edges out of a total of (n2 − n)/2 possible edges; as n ≥ 6, this means that ∆ must induce at least 6 non-edges. Define a binary sequence P = (pi )i∈N by the following: ( 1 if i = 0, 1, 2, . . . , n − 1, n + 1, n + 3, . . . pi = 0 if i = n, n + 2, . . . So P is a sequence of n many 1’s followed by alternating 0’s and 1’s. Using the notation established above for Lemma 3.12, it follows that |I1 | = n and |Ok | = |Im | = 1 for k ≥ 1 and m ≥ 2. Construct Γ(P ) on V Γ(P ) = {v0 , v1 , . . .} as illustrated in Example 3.11, and draw in edges on V I1 such that Γ(V I1 ) ∼ = ∆ to obtain a graph Γ(P )′ (see Figure 9). v0 v1 v2 vn−2 vn−1 vn vn+1 vn+2 vn+3 vn+4 Figure 9: Γ(P )′ , with ∆ highlighted in red In a similar fashion to Proposition 3.15, we aim to show that V Oi and V Ii are fixed setwise for any automorphism α of Γ(P )′ through a series of claims. Claim 1. If va ∈ V Oi and vb ∈ V Oj with i 6= j, then Γ(N (v)) ≇ Γ(N (w)). Proof of Claim 1. As |V Ok | = 1 for all k ∈ N, we have that V Oi = {va } and V Oj = {vb }. Assume without loss of generality that a < b. We define the following sets: Xa = {vk : k < a} Xb = {vk : k < b} Ya = {vk : k ≥ a, pk = 0} Yb = {vk : k ≥ b, pk = 0}. Lemma 3.14 applies in this situation; so N (va ) = Xa ∪ Ya and N (vb ) = Xb ∪ Yb . As in the proof of Proposition 3.15, any maximum independent set of N (va ), N (vb ) is contained in Xa , Xb respectively. Now, as Γ(V I1 ) ∼ = ∆ is a 3-regular graph on more than six vertices, there exists some maximal independent set M ⊆ V I1 of Γ(V I1 ) with size greater than or equal to 2. 27 Now we consider the sets A = {vc ∈ V Γ(P )′ : n − 1 < c < a, pc = 1} ∪ M and B = {vc ∈ V Γ(P )′ : n − 1 < c < b, pc = 1} ∪ M, the maximum independent sets of Xa and Xb respectively. As i < j, there exists d such that a < d < b with pd = 1. Hence vd ∈ B r A and so |B| > |A|. Since A, B are maximum independent sets of Γ(N (va )) and Γ(N (vb )) respectively with different sizes, we conclude that Γ(N (va )) ≇ Γ(N (vb )). This ends the proof of Claim 1. This shows that there exists no automorphism γ of Γ(P )′ sending any v ∈ V Oi to w ∈ V Oj with i 6= j. Claim 2. There exists no automorphism sending v ∈ V Ok to w ∈ V Im for all k, m ∈ N. Proof of Claim 2. We split the proof into two cases; where m = 1 and where m ≥ 2. For the latter, Γ(N (w)) ∼ = K ℵ0 for any w ∈ V Im with m ≥ 2 by Lemma 3.13. But as Γ(V I1 ) is not a complete graph, we have that Γ(V Ok ) contains a non-edge for all k ∈ N and so Γ(N (v)) ≇ Γ(N (w)) in this case. It remains to show that there is no automorphism sending v ∈ V Ok to w ∈ V I1 . In this case Γ(N (w)) is the union of an infinite complete graph K and G = Γ(NΓ(V I1 ) (w)), with every vertex of K connected to every vertex of G. This means any non-edge of Γ(N (w)) must be induced by G; as |NΓ(V I1 ) (w)| = 3, there are at most 3 of them for any w ∈ V I1 . However, as Xa contains V I1 , we have that Γ(N (v)) contains ∆ as an induced subgraph. By the reasoning above, ∆ has at least 6 non-edges and therefore so does Γ(N (v)). This means that Γ(N (v)) ≇ Γ(N (w)) for any v ∈ V Ok and any w ∈ V I1 and so we are done. Here, V Ok is fixed setwise for all k ∈ N; as |V Ok | = 1 for all such k we have that they are also fixed pointwise. As in the proof of Proposition 3.15, we have that any V Ik sandwiched between V Ok−1 and V Ok are the only vertices not adjacent to every vertex in V Ok and adjacent to every vertex in V Ok+1 . As V Ok and V Ok+1 are fixed setwise, we deduce that V Ik is fixed setwise (and hence pointwise) for k ≥ 2. We conclude that V I1 is fixed setwise under automorphisms of Γ(P )′ . Finally, we show that any bijective map γ : Γ(P )′ → Γ(P )′ acting as an automorphism on V I1 and fixing everything else is an automorphism of Γ(P )′ . As every v ∈ V Ok for all k is connected to each u ∈ V I1 and every w ∈ V Im for all m is independent of each u ∈ V I1 , we have that this map preserves all edges and non-edges of Γ(P )′ and so is an automorphism of Γ(P )′ . Using this together with Theorem 1.7, it follows that for any finite group U there exists an oligomorphic permutation monoid that has U as a group of units. 4 Worked examples This section is devoted to determining MB-homogeneity of examples of homogeneous structures. This investigation concludes in a complete classification of countable homogeneous graphs that are also MB-homogeneous. 28 There are a variety of ways to demonstrate that a structure M is MB-homogeneous. Firstly, if M is a homogeneous structure where each finite partial monomorphism h is also a finite partial isomorphism, then M is MB-homogeneous as we can extend h to an automorphism. If M is a graph, then it suffices to show that M has properties (△) and (∴) by Proposition 3.6. Finally, recall the remarks of Proposition 2.5; to prove that M is MB-homogeneous it suffices to show that M has both the 1PBEP and the 1PMEP. All of these techniques are used at points in demonstrating the following positive examples. Example 4.1. Let Γ = K ℵ0 , the complete graph on countably many vertices; this graph is homogeneous [19]. Suppose that h : A − → B is a monomorphism between two finite substructures of Γ. As there are no non-edges to preserve, it must preserve non-edges and so h is a finite partial isomorphism. Using homogeneity of Γ, we extend h to an automorphism (and hence a bimorphism) of Γ and so Γ is MB-homogeneous. Its complement Γ̄, the infinite null graph, is also MB-homogeneous by Proposition 3.1. Example 4.2. A tournament is defined to be an oriented, loopless complete graph. By a similar argument to the complete graph in Example 4.1, every finite partial monomorphism of a tournament is a finite partial isomorphism. So the three homogeneous tournaments (Q, <), the random tournament T and the local order S(2) (see Cherlin [10]) are all MB-homogeneous. Example 4.3. Let R be the countable universal homogeneous undirected graph, also known as the random graph. It follows from the extension property characteristic to the random graph (see Figure 5) that R has properties (△) and (∴) (see Definition 3.5) and so is an MB-homogeneous graph by Proposition 3.6. Example 4.4. Let D be the Fraı̈ssé limit of the class of directed graphs without loops or 2-cycles, otherwise known as the generic digraph. It is well known that D satisfies the following extension property (see [1]). (DEP) For any finite and pairwise disjoint sets of vertices U, V, W of D, there exists a vertex x of D such that there is an arc from x to every element of U , an arc to x from every element of V , and x is independent of every vertex in W . (see Figure 10 for a diagram of an example.) Using this, we show that D is MB-homogeneous by demonstrating that it has the 1PMEP and 1PBEP in turn. Suppose that A ⊆ B ∈ Age(D) with B r A = {b} and that f : A − → D is a → − monomorphism. Decompose A into three disjoint sets b = {a ∈ A : b − → a}, − = {a ∈ A : b ← b← − a} and bk = {a ∈ A : b k a}. The fact that f is injective means → f, b← − f and bk f are pairwise disjoint subsets of V D. Using the DEP, that the sets b− → f , an arc from all select a vertex x ∈ V D such that x has an arc to all elements of b− ← − elements of b f and is independent of all elements of b k f . Define g : B − → D to be the map such that bg = x and g|A = f ; due to our choice of x, this is a monomorphism. So D has the 1PMEP. Now suppose that X ⊆ Y ∈ Age(D) with Y r X = {y} and that f¯ : X → D is an antimonomorphism. The fact that X is finite implies that im f¯ is finite, and so there exists a vertex w ∈ V D such that w is independent of all elements in X f¯ by the DEP. 29 U V x W D Figure 10: Example of directed extension property in D Define ḡ : Y → D to be the function such that yḡ = w and ḡ|X = f¯; thanks to our choice of w, this is an antimonomorphism as all non-arcs are preserved. So D has the 1PBEP and hence D is MB-homogeneous by Proposition 2.5. Remark. It can be shown that the class of loopless digraphs with 2-cycles is a Fraı̈ssé class and hence there exists a unique homogeneous generic digraph with 2-cycles D ∗ , with a slightly different extension property (see Ch. 4 of [26]). With this, we can use a similar proof to above to show that D ∗ is MB-homogeneous. We continue our investigation by focusing on a class of structures known as cores; a structure M is a core if every endomorphism of M is an embedding. Every ℵ0 categorical structure has a core, and is homomorphically equivalent to a model-complete core [3]. Cores play an important role in the theory of constraint satisfaction problems; see Bodirsky’s habilitation thesis [4] for an introduction to the topic. Widely studied examples of cores include the countable dense linear order without endpoints (Q, <), the complete graph on countably many vertices K ℵ0 , and its complement K̄ ℵ0 . Proving that a structure M is a core is a useful way to show that a structure is not MBhomogeneous, as this next result shows. Lemma 4.5. Let M be a core such that there exists a finite partial monomorphism of M that is not an isomorphism. Then M is not MH-homogeneous (and hence, not MB-homogeneous). Proof. Let h be a finite partial monomorphism of a core M that is not an isomorphism. As any endomorphism of M is an embedding, we cannot extend h. We can use this result to detail some homogeneous structures that are not MBhomogeneous. Example 4.6. Let G be the countable homogeneous Kn -free graph for n ≥ 3. By results of Mudrinski in [28], it is shown that G is a core for all such n. As there are finite partial monomorphisms of G that are not isomorphisms (send any non-edge to an edge, for instance) we have that G is not MB-homogeneous by Lemma 4.5. 30 Example 4.7. The oriented graph analogues of the homogeneous Kn -free graphs are the Henson digraphs MT . These are the Fraı̈ssé limits of the class of all digraphs not embedding elements of some set T of finite tournaments. We show that MT is a core for any non-empty T containing tournaments of three or more vertices. Suppose for a contradiction there exists a γ ∈ End(MT ) such that for some independent pair of vertices v, w we have that vγ = wγ. Select a tournament Y ∈ T with the least number of vertices, and choose x, y ∈ Y such that x − → y. Create a oriented graph Y ′ by removing the arc between x and y, adding an extra vertex x′ and drawing an arc x′ − → y; see Figure 11 for an example. Y′ Y x y x y x′ Figure 11: Construction of Y ′ from Y in Example 4.7 Note that there is no tournament on any |Y |-set of vertices of Y ′ ; so Y ′ ∈ Age(MT ). By homogeneity of MT , we find a copy Y ′′ of Y ′ with v, w in place of x, x′ respectively, and a vertex u in place of y. The image of Y ′′ under γ is a oriented graph on |Y | vertices with vγ → uγ, that preserves all arcs involving v and u. It follows that Y ′′ γ ∼ = Y ; this is a contradiction as Y does not belong to the age of MT . So γ must be injective. Now assume that there exists an independent pair of vertices v, w ∈ MT such that vγ − → wγ. Select a Y ∈ T in the same fashion as before, choose two vertices x − → y of Y and remove this arc to obtain a oriented graph Z that embeds in MT . Via homogeneity of MT , we find an isomorphic copy of Z with v, w in place of x, y respectively. Hence the image of Z under γ induces a copy of Y in MT ; a contradiction as Y does not belong to the age of MT . So MT is a core for any such set of tournaments T ; therefore MT is not MB-homogeneous by Lemma 4.5. Example 4.8. Let S(3) be the myopic local order, defined as follows. Distribute ℵ0 many points densely around the unit circle such that for every point a there are no → b if and points b, c such that arg(a, b) = arg(b, c) = arg(c, a) = 2π 3 . Draw an arc a − only if arg(a, b) < 2π/3; note that this means that S(3) embeds no directed 3-cycles. We show that this structure is a core. Assume that there is an endomorphism γ of S(3) with aγ − → bγ for some independent pair of points a, b ∈ S(3). As this occurs, we have that both arg(a, b) and arg(b, a) > 2π/3. As arg(a, b) = 2π − arg(b, a), it follows that arg(b, a) < 4π/3. From this, there exists a point c such that arg(b, c) = arg(c, a) < 2π/3 and so b − → c and c − → a. The endomorphism γ then creates a directed 3-cycle (or a loop) and this is a contradiction. Now suppose that for some non-related pair a, b ∈ S(3), there is an endomorphism γ such that aγ = bγ. As before, we can find a point c ∈ S(3) such that b − → c and c − → a. As γ is an endomorphism it must preserve these relations and so bγ − → cγ and cγ − → aγ = bγ. Hence we have a directed 2-cycle and this is 31 obviously false; so S(3) is a core. Applying Lemma 4.5 again implies that S(3) is not MB-homogeneous. Finally, we note that as Proposition 2.5 is an if and only if statement, it is enough to prove that a structure M does not have the MEP or the BEP to show that M is not MB-homogeneous. Example 4.9. Let Dn be the generic In -free digraph for n ≥ 3; this is a homogeneous digraph [10]. We show here that Dn does not have the BEP, and hence is not MBhomogeneous by Proposition 2.5 So let T be some tournament on n − 1 vertices, and let U be the disjoint union of T with a vertex u. We note that T ⊆ U ∈ Age(Dn ). Let f¯ : T − → Dn be an antimonomorphism sending T to an independent set of n − 1 vertices in Dn ; such a substructure exists by construction. Then as antimonomorphisms preserve non-arcs, a potential image point for u in Dn must be independent of T f¯; this cannot happen as then Dn would induce an independent n-set. So Dn does not have the BEP and hence is not MB-homogeneous by Proposition 2.5. Example 4.10. Let H be the complement of the homogeneous Kn -free graph for n ≥ 3. We note that H contains R as a spanning subgraph (as it is algebraically closed) and so it is MM-homogeneous as it satisfies the MEP [9]. However, as H does not embed an independent n-set, it does not contain an infinite null graph. As H is not complete (as it has a non-edge), it follows that H is not MB-homogeneous by Corollary 3.2. Following this final example, we are able to present a complete classification of those homogeneous graphs that are also MB-homogeneous. Theorem 4.11. The only countably infinite homogeneous and MB-homogeneous graphs are the following: ℵ • K ℵ0 and its complement K 0 ; F F • i∈N Kiℵ0 and its complement i∈N Kiℵ0 ; • the random graph R. Proof. We check every item in the classification of countably infinite, undirected homogeneous graphs given in [19]. We showed that those graphs on the list are MBhomogeneous in Example 4.1, Proposition 3.4 and Example 4.3. Any other disconnected homogeneous graph must be the a countable union of complete graphs or a finite union of infinite complete graphs; these are not MB-homogeneous by Proposition 3.4. The only other countable homogeneous graphs are the Kn -free graphs and their complements; these are not MB-homogeneous by Example 4.6 and Example 4.10. We end on some open questions concerning MB-homogeneous graphs in general. As we have seen, it would be an arduous task to classify MB-homogeneous graphs up to isomorphism; the idea of bimorphism equivalence represents the best hope to identify all MB-homogeneous graphs. A positive answer to the following question would constitute the best classification result possible for MB-homogeneous graphs, given the amount and range of examples above. Question 4.12. Is every countable MB-homogeneous graph bimorphism equivalent to one of the five graphs in Theorem 4.11? 32 Related to this question is the following: Question 4.13. Are there only countably many MB-homogeneous graphs up to bimorphism equivalence? Finally, we notice that every example of an MB-homogeneous graph in this article is also HE-homogeneous. This motivates our final question: Question 4.14. Is there a countably infinite MB-homogeneous graph that is not HEhomogeneous? Conversely, is there a HE-homogeneous graph that is not MB-homogeneous? References [1] L. Agarwal. Reducts of the generic digraph. Annals of Pure and Applied Logic, 167(3):370–391, 2016. [2] M. Bhattacharjee, H. D. Macpherson, R. G. Möller, and P. M. Neumann. Notes on Infinite Permutation Groups. Number 1698 in Lecture Notes in Mathematics. Springer, 1998. [3] M. Bodirsky. The core of a countably categorical structure. In STACS 2005, pages 110–120. Springer, 2005. [4] M. Bodirsky. Complexity classification in infinite-domain constraint satisfaction. arXiv preprint arXiv:1201.0856, 2012. [5] M. Bodirsky and J. Nešetřil. Constraint satisfaction with countable homogeneous templates. Journal of Logic and Computation, 16(3):359–373, 2006. [6] M. Bodirsky and M. Pinsker. Schaefer’s theorem for graphs. Journal of the ACM (JACM), 62(3):19, 2015. [7] P. J. Cameron. Oligomorphic permutation groups, volume 152. Cambridge University Press, 1990. [8] P. J. Cameron. The random graph. In The Mathematics of Paul Erdös II, pages 333–351. Springer, 1997. [9] P. J. Cameron and J. Nešetřil. Homomorphism-homogeneous relational structures. Combinatorics, Probability & Computing, 15(1-2):91–103, 2006. [10] G. L. Cherlin. The classification of countable homogeneous directed graphs and countable homogeneous n-tournaments, volume 621. American Mathematical Soc., 1998. [11] R. Diestel. Graph theory. Springer-Verlag, 2000. [12] I. Dolinka. The Bergman property for endomorphism monoids of some Fraı̈ssé limits. In Forum Mathematicum, volume 26, pages 357–376, 2014. [13] I. Dolinka, R. D. Gray, J. D. McPhee, J. D. Mitchell, and M. Quick. Automorphism groups of countable algebraically closed graphs and endomorphisms of the random graph. Math. Proc. Cambridge Philos. Soc., 160(3):437–462, 2016. 33 [14] R. Fraı̈ssé. Sur certaines relations qui généralisent l’ordre des nombres rationnels. Comptes Rendus de l’Acádemie des Sciences de Paris, 237(11):540–542, 1953. [15] R. Frucht. Graphs of degree three with a given abstract group. Canadian J. Math, 1:365–378, 1949. [16] D. Hartman, J. Hubička, and D. Mašulović. Homomorphism-homogeneous Lcolored graphs. European J. Combin., 35:313–323, 2014. [17] W. Hodges. Model Theory, volume 42. Cambridge University Press, 1993. [18] A. Kechris. Classical descriptive set theory, volume 156. Springer Science & Business Media, 2012. [19] A. H. Lachlan and R. E. Woodrow. Countable ultrahomogeneous undirected graphs. Transactions of the American Mathematical Society, pages 51–94, 1980. [20] D. Lockett and J. K. Truss. Generic endomorphisms of homogeneous structures. Groups and Model Theory, Contemporary Mathematics, page 217, 2012. [21] D. C. Lockett and J. K. Truss. Some more notions of homomorphism–homogeneity. Discrete Mathematics, 336:69–79, 2014. [22] H. D. Macpherson. A survey of homogeneous structures. Discrete Mathematics, 311(15):1599–1634, 2011. [23] D. Mašulović. Homomorphism-homogeneous partially ordered sets. 24(4):215–226, 2007. Order, [24] D. Mašulović. Some classes of finite homomorphism-homogeneous point-line geometries. Combinatorica, 33(5):573–590, 2013. [25] D. Mašulović and M. Pech. Oligomorphic transformation monoids and homomorphism-homogeneous structures. Fundamenta Mathematicae, 212(1):17– 34, 2011. [26] J. D. McPhee. Endomorphisms of Fraı̈ssé limits and automorphism groups of algebraically closed relational structures. PhD thesis, University of St Andrews, 2012. [27] J. Meakin. Groups and semigroups: connections and contrasts. London Mathematical Society Lecture Note Series, 340:357, 2007. [28] N. Mudrinski. Notes on endomorphisms of Henson graphs and their complements. Ars Combinatoria, 96:173–183, 2010. [29] J. R. Munkres. Topology, volume 2. Prentice Hall Upper Saddle River, 2000. [30] G. E. Reyes. Local definability theory. Annals of Mathematical Logic, 1(1):95–137, 1970. [31] M. Rusinov and P. Schweitzer. Homomorphism–homogeneous graphs. Journal of Graph Theory, 65(3):253–262, 2010. 34 [32] J. H. Schmerl. Countable homogeneous partially ordered sets. Algebra Universalis, 9(1):317–321, 1979. [33] B. Steinberg. A theory of transformation monoids: combinatorics and representation theory. The Electronic Journal of Combinatorics, 17(1):R164, 2010. 35
4math.GR